<?xml version="1.0" encoding="UTF-8"?>
	<oval_definitions
		xsi:schemaLocation="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux linux-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#unix unix-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5 oval-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-common-5 oval-common-schema.xsd"
		xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5"
		xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
		xmlns:oval="http://oval.mitre.org/XMLSchema/oval-common-5"
		xmlns:oval-def="http://oval.mitre.org/XMLSchema/oval-definitions-5">
	  <generator>
	      <oval:product_name>Marcus Updateinfo to OVAL Converter</oval:product_name>
	      <oval:schema_version>5.5</oval:schema_version>
	      <oval:timestamp>2026-04-14T04:45:16</oval:timestamp>
	  </generator>
<definitions>
<definition id="oval:org.opensuse.security:def:20042771" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-2771</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2004-2771" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2771" source="CVE"/>
    <reference ref_id="SUSE CVE-2004-2771" ref_url="https://www.suse.com/security/cve/CVE-2004-2771" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001127.html" source="SUSE-SU"/>
    <description>
    The expand function in fio.c in Heirloom mailx 12.5 and earlier and BSD mailx 8.1.2 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in an email address.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2004-2771/">CVE-2004-2771 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2004-2771">CVE-2004-2771 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/909208">SUSE bug 909208</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820671" comment="mailx-12.5-12.el7_0 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20051080" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-1080</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2005-1080" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1080" source="CVE"/>
    <reference ref_id="SUSE CVE-2005-1080" ref_url="https://www.suse.com/security/cve/CVE-2005-1080" source="SUSE CVE"/>
    <description>
    Directory traversal vulnerability in the Java Archive Tool (Jar) utility in J2SE SDK 1.4.2 and 1.5, and OpenJDK, allows remote attackers to create or overwrite arbitrary files via a .. (dot dot) in filenames in a .jar file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2005-1080/">CVE-2005-1080 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2005-1080">CVE-2005-1080 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/191845">SUSE bug 191845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/607043">SUSE bug 607043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/607762">SUSE bug 607762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/818591">SUSE bug 818591</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820981" comment="java-1.6.0-openjdk-1.6.0.35-1.13.7.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820982" comment="java-1.6.0-openjdk-demo-1.6.0.35-1.13.7.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820983" comment="java-1.6.0-openjdk-devel-1.6.0.35-1.13.7.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820984" comment="java-1.6.0-openjdk-javadoc-1.6.0.35-1.13.7.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820985" comment="java-1.6.0-openjdk-src-1.6.0.35-1.13.7.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820974" comment="java-1.7.0-openjdk-1.7.0.79-2.5.5.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820975" comment="java-1.7.0-openjdk-accessibility-1.7.0.79-2.5.5.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820976" comment="java-1.7.0-openjdk-demo-1.7.0.79-2.5.5.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820977" comment="java-1.7.0-openjdk-devel-1.7.0.79-2.5.5.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820978" comment="java-1.7.0-openjdk-headless-1.7.0.79-2.5.5.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820979" comment="java-1.7.0-openjdk-javadoc-1.7.0.79-2.5.5.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820980" comment="java-1.7.0-openjdk-src-1.7.0.79-2.5.5.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820986" comment="java-1.8.0-openjdk-1.8.0.45-30.b13.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820987" comment="java-1.8.0-openjdk-accessibility-1.8.0.45-30.b13.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820988" comment="java-1.8.0-openjdk-demo-1.8.0.45-30.b13.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820989" comment="java-1.8.0-openjdk-devel-1.8.0.45-30.b13.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820990" comment="java-1.8.0-openjdk-headless-1.8.0.45-30.b13.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820991" comment="java-1.8.0-openjdk-javadoc-1.8.0.45-30.b13.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820992" comment="java-1.8.0-openjdk-src-1.8.0.45-30.b13.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20105298" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-5298</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-5298" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5298" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-5298" ref_url="https://www.suse.com/security/cve/CVE-2010-5298" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001353.html" source="SUSE-SU"/>
    <description>
    Race condition in the ssl3_read_bytes function in s3_pkt.c in OpenSSL through 1.0.1g, when SSL_MODE_RELEASE_BUFFERS is enabled, allows remote attackers to inject data across sessions or cause a denial of service (use-after-free and parsing error) via an SSL connection in a multithreaded environment.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-5298/">CVE-2010-5298 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-5298">CVE-2010-5298 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/873351">SUSE bug 873351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880891">SUSE bug 880891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883126">SUSE bug 883126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885777">SUSE bug 885777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915913">SUSE bug 915913</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820158" comment="openssl-1.0.1e-34.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820159" comment="openssl-devel-1.0.1e-34.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820160" comment="openssl-libs-1.0.1e-34.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820161" comment="openssl-perl-1.0.1e-34.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820162" comment="openssl-static-1.0.1e-34.el7_0.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20105312" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-5312</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-5312" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5312" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-5312" ref_url="https://www.suse.com/security/cve/CVE-2010-5312" source="SUSE CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in jquery.ui.dialog.js in the Dialog widget in jQuery UI before 1.10.0 allows remote attackers to inject arbitrary web script or HTML via the title option.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-5312/">CVE-2010-5312 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2010-5312">CVE-2010-5312 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820888" comment="ipa-admintools-4.1.0-18.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820889" comment="ipa-client-4.1.0-18.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820890" comment="ipa-python-4.1.0-18.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820891" comment="ipa-server-4.1.0-18.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820892" comment="ipa-server-trust-ad-4.1.0-18.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20105313" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-5313</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-5313" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5313" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-5313" ref_url="https://www.suse.com/security/cve/CVE-2010-5313" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001322.html" source="SUSE-SU"/>
    <description>
    Race condition in arch/x86/kvm/x86.c in the Linux kernel before 2.6.38 allows L2 guest OS users to cause a denial of service (L1 guest OS crash) via a crafted instruction that triggers an L2 emulation failure report, a similar issue to CVE-2014-7842.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-5313/">CVE-2010-5313 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-5313">CVE-2010-5313 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/905312">SUSE bug 905312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907822">SUSE bug 907822</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821413" comment="kernel-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821414" comment="kernel-abi-whitelists-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821415" comment="kernel-debug-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821418" comment="kernel-doc-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821419" comment="kernel-headers-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821420" comment="kernel-tools-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821421" comment="kernel-tools-libs-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821423" comment="perf-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821424" comment="python-perf-3.10.0-327.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201110007" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-10007</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-10007" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-10007" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-10007" ref_url="https://www.suse.com/security/cve/CVE-2011-10007" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:9517" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001702.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:9605" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001704.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:9740" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001752.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:9741" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02105-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040468.html" source="SUSE-SU"/>
    <description>
    File::Find::Rule through 0.34 for Perl is vulnerable to Arbitrary Code Execution when `grep()` encounters a crafted filename.

A file handle is opened with the 2 argument form of `open()` allowing an attacker controlled filename to provide the MODE parameter to `open()`, turning the filename into a command to be executed.

Example:

$ mkdir /tmp/poc; echo &gt; "/tmp/poc/|id"
$ perl -MFile::Find::Rule \
      -E 'File::Find::Rule-&gt;grep("foo")-&gt;in("/tmp/poc")'
uid=1000(user) gid=1000(user) groups=1000(user),100(users)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-07-04"/>
	<updated date="2025-12-19"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2011-10007/">CVE-2011-10007 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-10007">CVE-2011-10007 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244148">SUSE bug 1244148</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009998143" comment="perl-File-Find-Rule-0.33-5.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998142" comment="perl-File-Find-Rule-Perl-1.13-2.el7_9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122150" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2150</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-2150" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2150" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-2150" ref_url="https://www.suse.com/security/cve/CVE-2012-2150" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001765.html" source="SUSE-SU"/>
    <description>
    xfs_metadump in xfsprogs before 3.2.4 does not properly obfuscate file data, which allows remote attackers to obtain sensitive information by reading a generated image.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2150/">CVE-2012-2150 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2150">CVE-2012-2150 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/939367">SUSE bug 939367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821410" comment="xfsprogs-3.2.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821411" comment="xfsprogs-devel-3.2.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821412" comment="xfsprogs-qa-devel-3.2.2-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126662" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6662</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-6662" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6662" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-6662" ref_url="https://www.suse.com/security/cve/CVE-2012-6662" source="SUSE CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in the default content option in jquery.ui.tooltip.js in the Tooltip widget in jQuery UI before 1.10.0 allows remote attackers to inject arbitrary web script or HTML via the title attribute, which is not properly handled in the autocomplete combo box demo.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6662/">CVE-2012-6662 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-6662">CVE-2012-6662 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820888" comment="ipa-admintools-4.1.0-18.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820889" comment="ipa-client-4.1.0-18.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820890" comment="ipa-python-4.1.0-18.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820891" comment="ipa-server-4.1.0-18.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820892" comment="ipa-server-trust-ad-4.1.0-18.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130334" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0334</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0334" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0334" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0334" ref_url="https://www.suse.com/security/cve/CVE-2013-0334" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0795-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001365.html" source="SUSE-SU"/>
    <description>
    Bundler before 1.7, when multiple top-level source lines are used, allows remote attackers to install arbitrary gems by creating a gem with the same name as another gem in a different source.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0334/">CVE-2013-0334 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0334">CVE-2013-0334 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/898205">SUSE bug 898205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922719">SUSE bug 922719</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821446" comment="rubygem-bundler-1.7.8-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821447" comment="rubygem-bundler-doc-1.7.8-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821448" comment="rubygem-thor-0.19.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821449" comment="rubygem-thor-doc-0.19.1-1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131752" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1752</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1752" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1752" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1752" ref_url="https://www.suse.com/security/cve/CVE-2013-1752" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0444-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0447-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0450-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0452-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0456-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0086-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SRKGGFVSV7DDWCMAOSO6E3F66U2CF5XR/" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/pipermail/neuvector-updates/2023-November/000021.html" source="SUSE-SU"/>
    <description>
    Various versions of Python do not properly restrict readline calls, which allows remote attackers to cause a denial of service (memory consumption) via a long string, related to (1) httplib - fixed in 2.7.4, 2.6.9, and 3.3.3; (2) ftplib - fixed in 2.7.6, 2.6.9, 3.3.3; (3) imaplib - not yet fixed in 2.7.x, fixed in 2.6.9, 3.3.3; (4) nntplib - fixed in 2.7.6, 2.6.9, 3.3.3; (5) poplib - not yet fixed in 2.7.x, fixed in 2.6.9, 3.3.3; and (6) smtplib - not yet fixed in 2.7.x, fixed in 2.6.9, not yet fixed in 3.3.x. NOTE: this was REJECTed because it is incompatible with CNT1 "Independently Fixable" in the CVE Counting Decisions
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2013-1752/">CVE-2013-1752 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1752">CVE-2013-1752 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/856835">SUSE bug 856835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/856836">SUSE bug 856836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/863741">SUSE bug 863741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885882">SUSE bug 885882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898572">SUSE bug 898572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912739">SUSE bug 912739</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821393" comment="python-2.7.5-34.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821394" comment="python-debug-2.7.5-34.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821395" comment="python-devel-2.7.5-34.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821396" comment="python-libs-2.7.5-34.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821397" comment="python-test-2.7.5-34.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821398" comment="python-tools-2.7.5-34.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821399" comment="tkinter-2.7.5-34.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131753" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1753</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1753" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1753" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1753" ref_url="https://www.suse.com/security/cve/CVE-2013-1753" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
    <description>
    The gzip_decode function in the xmlrpc client library in Python 3.4 and earlier allows remote attackers to cause a denial of service (memory consumption) via a crafted HTTP request.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1753/">CVE-2013-1753 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-1753">CVE-2013-1753 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/856835">SUSE bug 856835</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821393" comment="python-2.7.5-34.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821394" comment="python-debug-2.7.5-34.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821395" comment="python-devel-2.7.5-34.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821396" comment="python-libs-2.7.5-34.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821397" comment="python-test-2.7.5-34.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821398" comment="python-tools-2.7.5-34.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821399" comment="tkinter-2.7.5-34.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2139</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2139" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2139" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2139" ref_url="https://www.suse.com/security/cve/CVE-2013-2139" source="SUSE CVE"/>
    <description>
    Buffer overflow in srtp.c in libsrtp in srtp 1.4.5 and earlier allows remote attackers to cause a denial of service (crash) via vectors related to a length inconsistency in the crypto_policy_set_from_profile_for_rtp and srtp_protect functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2139/">CVE-2013-2139 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2139">CVE-2013-2139 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/828009">SUSE bug 828009</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828224" comment="libsrtp-1.4.4-11.20101004cvs.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828225" comment="libsrtp-devel-1.4.4-11.20101004cvs.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132929" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2929</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2929" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2929" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2929" ref_url="https://www.suse.com/security/cve/CVE-2013-2929" source="SUSE CVE"/>
		<reference ref_id="SUSE-OU-2014:0907-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2014-July/002089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001282.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/45VR2J6DOCMZ7DOFZ5B4QZ5CLCL3DYNQ/#45VR2J6DOCMZ7DOFZ5B4QZ5CLCL3DYNQ" source="SUSE-SU"/>
    <description>
    The Linux kernel before 3.12.2 does not properly use the get_dumpable function, which allows local users to bypass intended ptrace restrictions or obtain sensitive information from IA64 scratch registers via a crafted application, related to kernel/ptrace.c and arch/ia64/include/asm/processor.h.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2929/">CVE-2013-2929 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2929">CVE-2013-2929 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/824295">SUSE bug 824295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/847652">SUSE bug 847652</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820632" comment="kernel-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820633" comment="kernel-abi-whitelists-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820634" comment="kernel-debug-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820637" comment="kernel-doc-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820638" comment="kernel-headers-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820639" comment="kernel-tools-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820640" comment="kernel-tools-libs-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820642" comment="perf-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820643" comment="python-perf-3.10.0-123.13.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134002" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4002</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4002" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4002" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4002" ref_url="https://www.suse.com/security/cve/CVE-2013-4002" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000559.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000543.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000558.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-August/000569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1666-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000655.html" source="SUSE-SU"/>
    <description>
    XMLscanner.java in Apache Xerces2 Java Parser before 2.12.0, as used in the Java Runtime Environment (JRE) in IBM Java 5.0 before 5.0 SR16-FP3, 6 before 6 SR14, 6.0.1 before 6.0.1 SR6, and 7 before 7 SR5 as well as Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, JRockit R28.2.8 and earlier, JRockit R27.7.6 and earlier, Java SE Embedded 7u40 and earlier, and possibly other products allows remote attackers to cause a denial of service via vectors related to XML attribute names.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-30"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4002/">CVE-2013-4002 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4002">CVE-2013-4002 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852367">SUSE bug 852367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977650">SUSE bug 977650</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820429" comment="xerces-j2-2.11.0-17.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820430" comment="xerces-j2-demo-2.11.0-17.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820431" comment="xerces-j2-javadoc-2.11.0-17.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134148" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4148</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4148" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4148" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4148" ref_url="https://www.suse.com/security/cve/CVE-2013-4148" source="SUSE CVE"/>
    <description>
    Integer signedness error in the virtio_net_load function in hw/net/virtio-net.c in QEMU 1.x before 1.7.2 allows remote attackers to execute arbitrary code via a crafted savevm image, which triggers a buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4148/">CVE-2013-4148 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4148">CVE-2013-4148 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/864812">SUSE bug 864812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871442">SUSE bug 871442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964630">SUSE bug 964630</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820289" comment="libcacard-1.5.3-60.el7_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820290" comment="libcacard-devel-1.5.3-60.el7_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820291" comment="libcacard-tools-1.5.3-60.el7_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820292" comment="qemu-guest-agent-1.5.3-60.el7_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820293" comment="qemu-img-1.5.3-60.el7_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820294" comment="qemu-kvm-1.5.3-60.el7_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820295" comment="qemu-kvm-common-1.5.3-60.el7_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820296" comment="qemu-kvm-tools-1.5.3-60.el7_0.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134149" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4149</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4149" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4149" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4149" ref_url="https://www.suse.com/security/cve/CVE-2013-4149" source="SUSE CVE"/>
    <description>
    Buffer overflow in virtio_net_load function in net/virtio-net.c in QEMU 1.3.0 through 1.7.x before 1.7.2 might allow remote attackers to execute arbitrary code via a large MAC table.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4149/">CVE-2013-4149 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4149">CVE-2013-4149 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/864649">SUSE bug 864649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871442">SUSE bug 871442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964443">SUSE bug 964443</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820289" comment="libcacard-1.5.3-60.el7_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820290" comment="libcacard-devel-1.5.3-60.el7_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820291" comment="libcacard-tools-1.5.3-60.el7_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820292" comment="qemu-guest-agent-1.5.3-60.el7_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820293" comment="qemu-img-1.5.3-60.el7_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820294" comment="qemu-kvm-1.5.3-60.el7_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820295" comment="qemu-kvm-common-1.5.3-60.el7_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820296" comment="qemu-kvm-tools-1.5.3-60.el7_0.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134150" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4150</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4150" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4150" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4150" ref_url="https://www.suse.com/security/cve/CVE-2013-4150" source="SUSE CVE"/>
    <description>
    The virtio_net_load function in hw/net/virtio-net.c in QEMU 1.5.0 through 1.7.x before 1.7.2 allows remote attackers to cause a denial of service or possibly execute arbitrary code via vectors in which the value of curr_queues is greater than max_queues, which triggers an out-of-bounds write.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4150/">CVE-2013-4150 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4150">CVE-2013-4150 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/864650">SUSE bug 864650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871442">SUSE bug 871442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820289" comment="libcacard-1.5.3-60.el7_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820290" comment="libcacard-devel-1.5.3-60.el7_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820291" comment="libcacard-tools-1.5.3-60.el7_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820292" comment="qemu-guest-agent-1.5.3-60.el7_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820293" comment="qemu-img-1.5.3-60.el7_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820294" comment="qemu-kvm-1.5.3-60.el7_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820295" comment="qemu-kvm-common-1.5.3-60.el7_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820296" comment="qemu-kvm-tools-1.5.3-60.el7_0.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134151" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4151</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4151" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4151" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4151" ref_url="https://www.suse.com/security/cve/CVE-2013-4151" source="SUSE CVE"/>
    <description>
    The virtio_load function in virtio/virtio.c in QEMU 1.x before 1.7.2 allows remote attackers to execute arbitrary code via a crafted savevm image, which triggers an out-of-bounds write.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4151/">CVE-2013-4151 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4151">CVE-2013-4151 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/864653">SUSE bug 864653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871442">SUSE bug 871442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964636">SUSE bug 964636</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820289" comment="libcacard-1.5.3-60.el7_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820290" comment="libcacard-devel-1.5.3-60.el7_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820291" comment="libcacard-tools-1.5.3-60.el7_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820292" comment="qemu-guest-agent-1.5.3-60.el7_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820293" comment="qemu-img-1.5.3-60.el7_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820294" comment="qemu-kvm-1.5.3-60.el7_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820295" comment="qemu-kvm-common-1.5.3-60.el7_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820296" comment="qemu-kvm-tools-1.5.3-60.el7_0.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134286" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4286</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4286" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4286" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4286" ref_url="https://www.suse.com/security/cve/CVE-2013-4286" source="SUSE CVE"/>
		<reference ref_id="TID7017332" ref_url="https://www.suse.com/support/kb/doc/?id=7017332" source="SUSE-SU"/>
    <description>
    Apache Tomcat before 6.0.39, 7.x before 7.0.47, and 8.x before 8.0.0-RC3, when an HTTP connector or AJP connector is used, does not properly handle certain inconsistent HTTP request headers, which allows remote attackers to trigger incorrect identification of a request's length and conduct request-smuggling attacks via (1) multiple Content-Length headers or (2) a Content-Length header and a "Transfer-Encoding: chunked" header.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2005-2090.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4286/">CVE-2013-4286 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4286">CVE-2013-4286 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/865740">SUSE bug 865740</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820174" comment="tomcat-7.0.42-5.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820175" comment="tomcat-admin-webapps-7.0.42-5.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820176" comment="tomcat-docs-webapp-7.0.42-5.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820177" comment="tomcat-el-2.2-api-7.0.42-5.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820178" comment="tomcat-javadoc-7.0.42-5.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820179" comment="tomcat-jsp-2.2-api-7.0.42-5.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820180" comment="tomcat-jsvc-7.0.42-5.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820181" comment="tomcat-lib-7.0.42-5.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820182" comment="tomcat-servlet-3.0-api-7.0.42-5.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820183" comment="tomcat-webapps-7.0.42-5.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134312" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4312</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4312" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4312" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4312" ref_url="https://www.suse.com/security/cve/CVE-2013-4312" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002609.html" source="SUSE-SU"/>
    <description>
    The Linux kernel before 4.4.1 allows local users to bypass file-descriptor limits and cause a denial of service (memory consumption) by sending each descriptor over a UNIX socket before closing it, related to net/unix/af_unix.c and net/unix/garbage.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4312/">CVE-2013-4312 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-4312">CVE-2013-4312 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1020452">SUSE bug 1020452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/839104">SUSE bug 839104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922947">SUSE bug 922947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968014">SUSE bug 968014</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822375" comment="kernel-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822376" comment="kernel-abi-whitelists-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822377" comment="kernel-debug-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822380" comment="kernel-doc-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822381" comment="kernel-headers-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822382" comment="kernel-tools-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822383" comment="kernel-tools-libs-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822385" comment="perf-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822386" comment="python-perf-3.10.0-514.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134322" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4322</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4322" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4322" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4322" ref_url="https://www.suse.com/security/cve/CVE-2013-4322" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000960.html" source="SUSE-SU"/>
		<reference ref_id="TID7017332" ref_url="https://www.suse.com/support/kb/doc/?id=7017332" source="SUSE-SU"/>
    <description>
    Apache Tomcat before 6.0.39, 7.x before 7.0.50, and 8.x before 8.0.0-RC10 processes chunked transfer coding without properly handling (1) a large total amount of chunked data or (2) whitespace characters in an HTTP header value within a trailer field, which allows remote attackers to cause a denial of service by streaming data.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-3544.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4322/">CVE-2013-4322 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4322">CVE-2013-4322 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/865746">SUSE bug 865746</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820174" comment="tomcat-7.0.42-5.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820175" comment="tomcat-admin-webapps-7.0.42-5.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820176" comment="tomcat-docs-webapp-7.0.42-5.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820177" comment="tomcat-el-2.2-api-7.0.42-5.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820178" comment="tomcat-javadoc-7.0.42-5.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820179" comment="tomcat-jsp-2.2-api-7.0.42-5.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820180" comment="tomcat-jsvc-7.0.42-5.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820181" comment="tomcat-lib-7.0.42-5.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820182" comment="tomcat-servlet-3.0-api-7.0.42-5.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820183" comment="tomcat-webapps-7.0.42-5.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134352" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4352</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4352" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4352" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4352" ref_url="https://www.suse.com/security/cve/CVE-2013-4352" source="SUSE CVE"/>
    <description>
    The cache_invalidate function in modules/cache/cache_storage.c in the mod_cache module in the Apache HTTP Server 2.4.6, when a caching forward proxy is enabled, allows remote HTTP servers to cause a denial of service (NULL pointer dereference and daemon crash) via vectors that trigger a missing hostname value.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4352/">CVE-2013-4352 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4352">CVE-2013-4352 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/887771">SUSE bug 887771</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820269" comment="httpd-2.4.6-18.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820270" comment="httpd-devel-2.4.6-18.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820271" comment="httpd-manual-2.4.6-18.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820272" comment="httpd-tools-2.4.6-18.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820273" comment="mod_ldap-2.4.6-18.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820274" comment="mod_proxy_html-2.4.6-18.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820275" comment="mod_session-2.4.6-18.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820276" comment="mod_ssl-2.4.6-18.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134527" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4527</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4527" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4527" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4527" ref_url="https://www.suse.com/security/cve/CVE-2013-4527" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002149.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in hw/timer/hpet.c in QEMU before 1.7.2 might allow remote attackers to execute arbitrary code via vectors related to the number of timers.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4527/">CVE-2013-4527 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4527">CVE-2013-4527 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/864673">SUSE bug 864673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871442">SUSE bug 871442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964746">SUSE bug 964746</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820289" comment="libcacard-1.5.3-60.el7_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820290" comment="libcacard-devel-1.5.3-60.el7_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820291" comment="libcacard-tools-1.5.3-60.el7_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820292" comment="qemu-guest-agent-1.5.3-60.el7_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820293" comment="qemu-img-1.5.3-60.el7_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820294" comment="qemu-kvm-1.5.3-60.el7_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820295" comment="qemu-kvm-common-1.5.3-60.el7_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820296" comment="qemu-kvm-tools-1.5.3-60.el7_0.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134529" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4529</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4529" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4529" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4529" ref_url="https://www.suse.com/security/cve/CVE-2013-4529" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002149.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4OGUN5F4IJ2HL42Y4XJBGLVFNE3RUZGG/#4OGUN5F4IJ2HL42Y4XJBGLVFNE3RUZGG" source="SUSE-SU"/>
    <description>
    Buffer overflow in hw/pci/pcie_aer.c in QEMU before 1.7.2 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a large log_num value in a savevm image.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4529/">CVE-2013-4529 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4529">CVE-2013-4529 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/864678">SUSE bug 864678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871442">SUSE bug 871442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964929">SUSE bug 964929</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820289" comment="libcacard-1.5.3-60.el7_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820290" comment="libcacard-devel-1.5.3-60.el7_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820291" comment="libcacard-tools-1.5.3-60.el7_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820292" comment="qemu-guest-agent-1.5.3-60.el7_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820293" comment="qemu-img-1.5.3-60.el7_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820294" comment="qemu-kvm-1.5.3-60.el7_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820295" comment="qemu-kvm-common-1.5.3-60.el7_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820296" comment="qemu-kvm-tools-1.5.3-60.el7_0.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134535" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4535</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4535" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4535" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4535" ref_url="https://www.suse.com/security/cve/CVE-2013-4535" source="SUSE CVE"/>
    <description>
    The virtqueue_map_sg function in hw/virtio/virtio.c in QEMU before 1.7.2 allows remote attackers to execute arbitrary files via a crafted savevm image, related to virtio-block or virtio-serial read.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4535/">CVE-2013-4535 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-4535">CVE-2013-4535 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/864665">SUSE bug 864665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964676">SUSE bug 964676</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820289" comment="libcacard-1.5.3-60.el7_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820290" comment="libcacard-devel-1.5.3-60.el7_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820291" comment="libcacard-tools-1.5.3-60.el7_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820292" comment="qemu-guest-agent-1.5.3-60.el7_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820293" comment="qemu-img-1.5.3-60.el7_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820294" comment="qemu-kvm-1.5.3-60.el7_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820295" comment="qemu-kvm-common-1.5.3-60.el7_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820296" comment="qemu-kvm-tools-1.5.3-60.el7_0.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134536" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4536</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4536" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4536" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4536" ref_url="https://www.suse.com/security/cve/CVE-2013-4536" source="SUSE CVE"/>
    <description>
    An user able to alter the savevm data (either on the disk or over the wire during migration) could use this flaw to to corrupt QEMU process memory on the (destination) host, which could potentially result in arbitrary code execution on the host with the privileges of the QEMU process.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4536/">CVE-2013-4536 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-4536">CVE-2013-4536 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/864665">SUSE bug 864665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871442">SUSE bug 871442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964676">SUSE bug 964676</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820289" comment="libcacard-1.5.3-60.el7_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820290" comment="libcacard-devel-1.5.3-60.el7_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820291" comment="libcacard-tools-1.5.3-60.el7_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820292" comment="qemu-guest-agent-1.5.3-60.el7_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820293" comment="qemu-img-1.5.3-60.el7_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820294" comment="qemu-kvm-1.5.3-60.el7_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820295" comment="qemu-kvm-common-1.5.3-60.el7_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820296" comment="qemu-kvm-tools-1.5.3-60.el7_0.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4541</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4541" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4541" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4541" ref_url="https://www.suse.com/security/cve/CVE-2013-4541" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000810.html" source="SUSE-SU"/>
    <description>
    The usb_device_post_load function in hw/usb/bus.c in QEMU before 1.7.2 might allow remote attackers to execute arbitrary code via a crafted savevm image, related to a negative setup_len or setup_index value.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4541/">CVE-2013-4541 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4541">CVE-2013-4541 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/864802">SUSE bug 864802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871442">SUSE bug 871442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820289" comment="libcacard-1.5.3-60.el7_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820290" comment="libcacard-devel-1.5.3-60.el7_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820291" comment="libcacard-tools-1.5.3-60.el7_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820292" comment="qemu-guest-agent-1.5.3-60.el7_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820293" comment="qemu-img-1.5.3-60.el7_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820294" comment="qemu-kvm-1.5.3-60.el7_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820295" comment="qemu-kvm-common-1.5.3-60.el7_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820296" comment="qemu-kvm-tools-1.5.3-60.el7_0.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134542" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4542</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4542" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4542" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4542" ref_url="https://www.suse.com/security/cve/CVE-2013-4542" source="SUSE CVE"/>
    <description>
    The virtio_scsi_load_request function in hw/scsi/scsi-bus.c in QEMU before 1.7.2 might allow remote attackers to execute arbitrary code via a crafted savevm image, which triggers an out-of-bounds array access.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4542/">CVE-2013-4542 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4542">CVE-2013-4542 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/864804">SUSE bug 864804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871442">SUSE bug 871442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820289" comment="libcacard-1.5.3-60.el7_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820290" comment="libcacard-devel-1.5.3-60.el7_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820291" comment="libcacard-tools-1.5.3-60.el7_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820292" comment="qemu-guest-agent-1.5.3-60.el7_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820293" comment="qemu-img-1.5.3-60.el7_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820294" comment="qemu-kvm-1.5.3-60.el7_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820295" comment="qemu-kvm-common-1.5.3-60.el7_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820296" comment="qemu-kvm-tools-1.5.3-60.el7_0.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135653" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5653</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5653" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5653" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5653" ref_url="https://www.suse.com/security/cve/CVE-2013-5653" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2492-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002404.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2574-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S7WKTZ4PISKGVT5P63DXCU4BCUX5WNAX/#S7WKTZ4PISKGVT5P63DXCU4BCUX5WNAX" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2648-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RY3QC46CHKONZZKJT4XEQOTQFY6IZCKR/#RY3QC46CHKONZZKJT4XEQOTQFY6IZCKR" source="SUSE-SU"/>
    <description>
    The getenv and filenameforall functions in Ghostscript 9.10 ignore the "-dSAFER" argument, which allows remote attackers to read data via a crafted postscript file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-04-22"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5653/">CVE-2013-5653 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2013-5653">CVE-2013-5653 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1001951">SUSE bug 1001951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1004237">SUSE bug 1004237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007816">SUSE bug 1007816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036453">SUSE bug 1036453</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822734" comment="ghostscript-9.07-20.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822735" comment="ghostscript-cups-9.07-20.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822736" comment="ghostscript-devel-9.07-20.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822737" comment="ghostscript-doc-9.07-20.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822738" comment="ghostscript-gtk-9.07-20.el7_3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135704" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5704</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5704" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5704" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5704" ref_url="https://www.suse.com/security/cve/CVE-2013-5704" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0974-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001415.html" source="SUSE-SU"/>
    <description>
    The mod_headers module in the Apache HTTP Server 2.2.22 allows remote attackers to bypass "RequestHeader unset" directives by placing a header in the trailer portion of data sent with chunked transfer coding.  NOTE: the vendor states "this is not a security issue in httpd as such."
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5704/">CVE-2013-5704 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5704">CVE-2013-5704 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/871310">SUSE bug 871310</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914535">SUSE bug 914535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930944">SUSE bug 930944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938728">SUSE bug 938728</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820845" comment="httpd-2.4.6-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820846" comment="httpd-devel-2.4.6-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820847" comment="httpd-manual-2.4.6-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820848" comment="httpd-tools-2.4.6-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820849" comment="mod_ldap-2.4.6-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820850" comment="mod_proxy_html-2.4.6-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820851" comment="mod_session-2.4.6-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820852" comment="mod_ssl-2.4.6-31.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136370" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6370</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6370" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6370" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6370" ref_url="https://www.suse.com/security/cve/CVE-2013-6370" source="SUSE CVE"/>
    <description>
    Buffer overflow in the printbuf APIs in json-c before 0.12 allows remote attackers to cause a denial of service via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6370/">CVE-2013-6370 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6370">CVE-2013-6370 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/870147">SUSE bug 870147</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820195" comment="json-c-0.11-4.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820196" comment="json-c-devel-0.11-4.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820197" comment="json-c-doc-0.11-4.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136371" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6371</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6371" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6371" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6371" ref_url="https://www.suse.com/security/cve/CVE-2013-6371" source="SUSE CVE"/>
    <description>
    The hash functionality in json-c before 0.12 allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted JSON data, involving collisions.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6371/">CVE-2013-6371 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6371">CVE-2013-6371 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/870147">SUSE bug 870147</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820195" comment="json-c-0.11-4.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820196" comment="json-c-devel-0.11-4.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820197" comment="json-c-doc-0.11-4.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136399" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6399</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6399" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6399" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6399" ref_url="https://www.suse.com/security/cve/CVE-2013-6399" source="SUSE CVE"/>
    <description>
    Array index error in the virtio_load function in hw/virtio/virtio.c in QEMU before 1.7.2 allows remote attackers to execute arbitrary code via a crafted savevm image.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6399/">CVE-2013-6399 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6399">CVE-2013-6399 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/864814">SUSE bug 864814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871442">SUSE bug 871442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964643">SUSE bug 964643</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820289" comment="libcacard-1.5.3-60.el7_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820290" comment="libcacard-devel-1.5.3-60.el7_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820291" comment="libcacard-tools-1.5.3-60.el7_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820292" comment="qemu-guest-agent-1.5.3-60.el7_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820293" comment="qemu-img-1.5.3-60.el7_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820294" comment="qemu-kvm-1.5.3-60.el7_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820295" comment="qemu-kvm-common-1.5.3-60.el7_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820296" comment="qemu-kvm-tools-1.5.3-60.el7_0.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136435" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6435</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6435" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6435" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6435" ref_url="https://www.suse.com/security/cve/CVE-2013-6435" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001169.html" source="SUSE-SU"/>
    <description>
    Race condition in RPM 4.11.1 and earlier allows remote attackers to execute arbitrary code via a crafted RPM file whose installation extracts the contents to temporary files before validating the signature, as demonstrated by installing a file in the /etc/cron.d directory.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6435/">CVE-2013-6435 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6435">CVE-2013-6435 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1101137">SUSE bug 1101137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127299">SUSE bug 1127299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/906803">SUSE bug 906803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/908128">SUSE bug 908128</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820644" comment="rpm-4.11.1-18.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820645" comment="rpm-apidocs-4.11.1-18.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820646" comment="rpm-build-4.11.1-18.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820647" comment="rpm-build-libs-4.11.1-18.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820648" comment="rpm-cron-4.11.1-18.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820649" comment="rpm-devel-4.11.1-18.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820650" comment="rpm-libs-4.11.1-18.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820651" comment="rpm-python-4.11.1-18.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820652" comment="rpm-sign-4.11.1-18.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137345" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7345</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-7345" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7345" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-7345" ref_url="https://www.suse.com/security/cve/CVE-2013-7345" source="SUSE CVE"/>
    <description>
    The BEGIN regular expression in the awk script detector in magic/Magdir/commands in file before 5.15 uses multiple wildcards with unlimited repetitions, which allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted ASCII file that triggers a large amount of backtracking, as demonstrated via a file with many newline characters.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7345/">CVE-2013-7345 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7345">CVE-2013-7345 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/869906">SUSE bug 869906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883306">SUSE bug 883306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987530">SUSE bug 987530</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820328" comment="php-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820329" comment="php-bcmath-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820330" comment="php-cli-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820331" comment="php-common-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820332" comment="php-dba-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820333" comment="php-devel-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820334" comment="php-embedded-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820335" comment="php-enchant-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820336" comment="php-fpm-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820337" comment="php-gd-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820338" comment="php-intl-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820339" comment="php-ldap-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820340" comment="php-mbstring-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820341" comment="php-mysql-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820342" comment="php-mysqlnd-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820343" comment="php-odbc-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820344" comment="php-pdo-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820345" comment="php-pgsql-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820346" comment="php-process-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820347" comment="php-pspell-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820348" comment="php-recode-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820349" comment="php-snmp-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820350" comment="php-soap-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820351" comment="php-xml-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820352" comment="php-xmlrpc-5.4.16-23.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137421" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7421</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-7421" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7421" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-7421" ref_url="https://www.suse.com/security/cve/CVE-2013-7421" source="SUSE CVE"/>
    <description>
    The Crypto API in the Linux kernel before 3.18.5 allows local users to load arbitrary kernel modules via a bind system call for an AF_ALG socket with a module name in the salg_name field, a different vulnerability than CVE-2014-9644.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7421/">CVE-2013-7421 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7421">CVE-2013-7421 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/914423">SUSE bug 914423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914660">SUSE bug 914660</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821413" comment="kernel-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821414" comment="kernel-abi-whitelists-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821415" comment="kernel-debug-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821418" comment="kernel-doc-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821419" comment="kernel-headers-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821420" comment="kernel-tools-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821421" comment="kernel-tools-libs-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821423" comment="perf-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821424" comment="python-perf-3.10.0-327.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137423" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7423</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-7423" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7423" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-7423" ref_url="https://www.suse.com/security/cve/CVE-2013-7423" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001305.html" source="SUSE-SU"/>
    <description>
    The send_dg function in resolv/res_send.c in GNU C Library (aka glibc or libc6) before 2.20 does not properly reuse file descriptors, which allows remote attackers to send DNS queries to unintended locations via a large number of requests that trigger a call to the getaddrinfo function.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7423/">CVE-2013-7423 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7423">CVE-2013-7423 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1123874">SUSE bug 1123874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915526">SUSE bug 915526</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821452" comment="glibc-2.17-105.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821453" comment="glibc-common-2.17-105.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821454" comment="glibc-devel-2.17-105.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821455" comment="glibc-headers-2.17-105.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821456" comment="glibc-static-2.17-105.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821457" comment="glibc-utils-2.17-105.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821458" comment="nscd-2.17-105.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140075" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0075</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0075" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0075" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0075" ref_url="https://www.suse.com/security/cve/CVE-2014-0075" source="SUSE CVE"/>
		<reference ref_id="TID7010166" ref_url="https://www.suse.com/support/kb/doc/?id=7010166" source="SUSE-SU"/>
    <description>
    Integer overflow in the parseChunkHeader function in java/org/apache/coyote/http11/filters/ChunkedInputFilter.java in Apache Tomcat before 6.0.40, 7.x before 7.0.53, and 8.x before 8.0.4 allows remote attackers to cause a denial of service (resource consumption) via a malformed chunk size in chunked transfer coding of a request during the streaming of data.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0075/">CVE-2014-0075 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0075">CVE-2014-0075 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/887557">SUSE bug 887557</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820219" comment="tomcat-7.0.42-6.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820220" comment="tomcat-admin-webapps-7.0.42-6.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820221" comment="tomcat-docs-webapp-7.0.42-6.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820222" comment="tomcat-el-2.2-api-7.0.42-6.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820223" comment="tomcat-javadoc-7.0.42-6.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820224" comment="tomcat-jsp-2.2-api-7.0.42-6.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820225" comment="tomcat-jsvc-7.0.42-6.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820226" comment="tomcat-lib-7.0.42-6.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820227" comment="tomcat-servlet-3.0-api-7.0.42-6.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820228" comment="tomcat-webapps-7.0.42-6.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140096" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0096</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0096" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0096" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0096" ref_url="https://www.suse.com/security/cve/CVE-2014-0096" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000960.html" source="SUSE-SU"/>
		<reference ref_id="TID7010166" ref_url="https://www.suse.com/support/kb/doc/?id=7010166" source="SUSE-SU"/>
    <description>
    java/org/apache/catalina/servlets/DefaultServlet.java in the default servlet in Apache Tomcat before 6.0.40, 7.x before 7.0.53, and 8.x before 8.0.4 does not properly restrict XSLT stylesheets, which allows remote attackers to bypass security-manager restrictions and read arbitrary files via a crafted web application that provides an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0096/">CVE-2014-0096 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0096">CVE-2014-0096 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/865746">SUSE bug 865746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880346">SUSE bug 880346</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820219" comment="tomcat-7.0.42-6.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820220" comment="tomcat-admin-webapps-7.0.42-6.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820221" comment="tomcat-docs-webapp-7.0.42-6.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820222" comment="tomcat-el-2.2-api-7.0.42-6.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820223" comment="tomcat-javadoc-7.0.42-6.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820224" comment="tomcat-jsp-2.2-api-7.0.42-6.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820225" comment="tomcat-jsvc-7.0.42-6.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820226" comment="tomcat-lib-7.0.42-6.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820227" comment="tomcat-servlet-3.0-api-7.0.42-6.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820228" comment="tomcat-webapps-7.0.42-6.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140099" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0099</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0099" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0099" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0099" ref_url="https://www.suse.com/security/cve/CVE-2014-0099" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000960.html" source="SUSE-SU"/>
    <description>
    Integer overflow in java/org/apache/tomcat/util/buf/Ascii.java in Apache Tomcat before 6.0.40, 7.x before 7.0.53, and 8.x before 8.0.4, when operated behind a reverse proxy, allows remote attackers to conduct HTTP request smuggling attacks via a crafted Content-Length HTTP header.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0099/">CVE-2014-0099 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0099">CVE-2014-0099 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/865746">SUSE bug 865746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880347">SUSE bug 880347</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820219" comment="tomcat-7.0.42-6.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820220" comment="tomcat-admin-webapps-7.0.42-6.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820221" comment="tomcat-docs-webapp-7.0.42-6.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820222" comment="tomcat-el-2.2-api-7.0.42-6.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820223" comment="tomcat-javadoc-7.0.42-6.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820224" comment="tomcat-jsp-2.2-api-7.0.42-6.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820225" comment="tomcat-jsvc-7.0.42-6.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820226" comment="tomcat-lib-7.0.42-6.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820227" comment="tomcat-servlet-3.0-api-7.0.42-6.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820228" comment="tomcat-webapps-7.0.42-6.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140117" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0117</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0117" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0117" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0117" ref_url="https://www.suse.com/security/cve/CVE-2014-0117" source="SUSE CVE"/>
    <description>
    The mod_proxy module in the Apache HTTP Server 2.4.x before 2.4.10, when a reverse proxy is enabled, allows remote attackers to cause a denial of service (child-process crash) via a crafted HTTP Connection header.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0117/">CVE-2014-0117 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0117">CVE-2014-0117 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/887767">SUSE bug 887767</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820269" comment="httpd-2.4.6-18.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820270" comment="httpd-devel-2.4.6-18.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820271" comment="httpd-manual-2.4.6-18.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820272" comment="httpd-tools-2.4.6-18.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820273" comment="mod_ldap-2.4.6-18.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820274" comment="mod_proxy_html-2.4.6-18.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820275" comment="mod_session-2.4.6-18.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820276" comment="mod_ssl-2.4.6-18.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140118" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0118</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0118" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0118" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0118" ref_url="https://www.suse.com/security/cve/CVE-2014-0118" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003365.html" source="SUSE-SU"/>
    <description>
    The deflate_in_filter function in mod_deflate.c in the mod_deflate module in the Apache HTTP Server before 2.4.10, when request body decompression is enabled, allows remote attackers to cause a denial of service (resource consumption) via crafted request data that decompresses to a much larger size.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0118/">CVE-2014-0118 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0118">CVE-2014-0118 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1078450">SUSE bug 1078450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/887769">SUSE bug 887769</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820269" comment="httpd-2.4.6-18.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820270" comment="httpd-devel-2.4.6-18.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820271" comment="httpd-manual-2.4.6-18.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820272" comment="httpd-tools-2.4.6-18.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820273" comment="mod_ldap-2.4.6-18.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820274" comment="mod_proxy_html-2.4.6-18.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820275" comment="mod_session-2.4.6-18.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820276" comment="mod_ssl-2.4.6-18.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140119" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0119</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0119" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0119" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0119" ref_url="https://www.suse.com/security/cve/CVE-2014-0119" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000960.html" source="SUSE-SU"/>
    <description>
    Apache Tomcat before 6.0.40, 7.x before 7.0.54, and 8.x before 8.0.6 does not properly constrain the class loader that accesses the XML parser used with an XSLT stylesheet, which allows remote attackers to (1) read arbitrary files via a crafted web application that provides an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue, or (2) read files associated with different web applications on a single Tomcat instance via a crafted web application.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0119/">CVE-2014-0119 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0119">CVE-2014-0119 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/865746">SUSE bug 865746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880348">SUSE bug 880348</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820365" comment="tomcat-7.0.42-8.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820366" comment="tomcat-admin-webapps-7.0.42-8.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820367" comment="tomcat-docs-webapp-7.0.42-8.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820368" comment="tomcat-el-2.2-api-7.0.42-8.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820369" comment="tomcat-javadoc-7.0.42-8.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820370" comment="tomcat-jsp-2.2-api-7.0.42-8.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820371" comment="tomcat-jsvc-7.0.42-8.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820372" comment="tomcat-lib-7.0.42-8.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820373" comment="tomcat-servlet-3.0-api-7.0.42-8.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820374" comment="tomcat-webapps-7.0.42-8.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140178" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0178</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0178" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0178" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0178" ref_url="https://www.suse.com/security/cve/CVE-2014-0178" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000917.html" source="SUSE-SU"/>
    <description>
    Samba 3.6.6 through 3.6.23, 4.0.x before 4.0.18, and 4.1.x before 4.1.8, when a certain vfs shadow copy configuration is enabled, does not properly initialize the SRV_SNAPSHOT_ARRAY response field, which allows remote authenticated users to obtain potentially sensitive information from process memory via a (1) FSCTL_GET_SHADOW_COPY_DATA or (2) FSCTL_SRV_ENUMERATE_SNAPSHOTS request.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0178/">CVE-2014-0178 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0178">CVE-2014-0178 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/872396">SUSE bug 872396</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820229" comment="libsmbclient-4.1.1-35.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820230" comment="libsmbclient-devel-4.1.1-35.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820231" comment="libwbclient-4.1.1-35.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820232" comment="libwbclient-devel-4.1.1-35.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820233" comment="samba-4.1.1-35.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820234" comment="samba-client-4.1.1-35.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820235" comment="samba-common-4.1.1-35.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820236" comment="samba-dc-4.1.1-35.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820237" comment="samba-dc-libs-4.1.1-35.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820238" comment="samba-devel-4.1.1-35.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820239" comment="samba-libs-4.1.1-35.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820240" comment="samba-pidl-4.1.1-35.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820241" comment="samba-python-4.1.1-35.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820242" comment="samba-test-4.1.1-35.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820243" comment="samba-test-devel-4.1.1-35.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820244" comment="samba-vfs-glusterfs-4.1.1-35.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820245" comment="samba-winbind-4.1.1-35.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820246" comment="samba-winbind-clients-4.1.1-35.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820247" comment="samba-winbind-krb5-locator-4.1.1-35.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820248" comment="samba-winbind-modules-4.1.1-35.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140179" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0179</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0179" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0179" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0179" ref_url="https://www.suse.com/security/cve/CVE-2014-0179" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000863.html" source="SUSE-SU"/>
    <description>
    libvirt 0.7.5 through 1.2.x before 1.2.5 allows local users to cause a denial of service (read block and hang) via a crafted XML document containing an XML external entity declaration in conjunction with an entity reference to the (1) virConnectCompareCPU or (2) virConnectBaselineCPU API method, related to an XML External Entity (XXE) issue.  NOTE: this issue was SPLIT per ADT3 due to different affected versions of some vectors. CVE-2014-5177 is used for other API methods.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-08"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0179/">CVE-2014-0179 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0179">CVE-2014-0179 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/873705">SUSE bug 873705</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820249" comment="libvirt-1.1.1-29.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820250" comment="libvirt-client-1.1.1-29.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820251" comment="libvirt-daemon-1.1.1-29.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820252" comment="libvirt-daemon-config-network-1.1.1-29.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820253" comment="libvirt-daemon-config-nwfilter-1.1.1-29.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820254" comment="libvirt-daemon-driver-interface-1.1.1-29.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820255" comment="libvirt-daemon-driver-lxc-1.1.1-29.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820256" comment="libvirt-daemon-driver-network-1.1.1-29.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820257" comment="libvirt-daemon-driver-nodedev-1.1.1-29.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820258" comment="libvirt-daemon-driver-nwfilter-1.1.1-29.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820259" comment="libvirt-daemon-driver-qemu-1.1.1-29.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820260" comment="libvirt-daemon-driver-secret-1.1.1-29.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820261" comment="libvirt-daemon-driver-storage-1.1.1-29.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820262" comment="libvirt-daemon-kvm-1.1.1-29.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820263" comment="libvirt-daemon-lxc-1.1.1-29.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820264" comment="libvirt-devel-1.1.1-29.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820265" comment="libvirt-docs-1.1.1-29.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820266" comment="libvirt-lock-sanlock-1.1.1-29.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820267" comment="libvirt-login-shell-1.1.1-29.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820268" comment="libvirt-python-1.1.1-29.el7_0.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140181" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0181</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0181" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0181" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0181" ref_url="https://www.suse.com/security/cve/CVE-2014-0181" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001368.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1677-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KMCOHP6GELYLJBOOYH4FHHAYS7Q36GJY/#KMCOHP6GELYLJBOOYH4FHHAYS7Q36GJY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/45VR2J6DOCMZ7DOFZ5B4QZ5CLCL3DYNQ/#45VR2J6DOCMZ7DOFZ5B4QZ5CLCL3DYNQ" source="SUSE-SU"/>
    <description>
    The Netlink implementation in the Linux kernel through 3.14.1 does not provide a mechanism for authorizing socket operations based on the opener of a socket, which allows local users to bypass intended access restrictions and modify network configurations by using a Netlink socket for the (1) stdout or (2) stderr of a setuid program.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0181/">CVE-2014-0181 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0181">CVE-2014-0181 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/875051">SUSE bug 875051</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820353" comment="kernel-3.10.0-123.6.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820354" comment="kernel-abi-whitelists-3.10.0-123.6.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820355" comment="kernel-debug-3.10.0-123.6.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820358" comment="kernel-doc-3.10.0-123.6.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820359" comment="kernel-headers-3.10.0-123.6.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820360" comment="kernel-tools-3.10.0-123.6.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820361" comment="kernel-tools-libs-3.10.0-123.6.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820363" comment="perf-3.10.0-123.6.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820364" comment="python-perf-3.10.0-123.6.3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0182</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0182" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0182" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0182" ref_url="https://www.suse.com/security/cve/CVE-2014-0182" source="SUSE CVE"/>
    <description>
    Heap-based buffer overflow in the virtio_load function in hw/virtio/virtio.c in QEMU before 1.7.2 might allow remote attackers to execute arbitrary code via a crafted config length in a savevm image.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0182/">CVE-2014-0182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0182">CVE-2014-0182 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/874788">SUSE bug 874788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964693">SUSE bug 964693</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820289" comment="libcacard-1.5.3-60.el7_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820290" comment="libcacard-devel-1.5.3-60.el7_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820291" comment="libcacard-tools-1.5.3-60.el7_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820292" comment="qemu-guest-agent-1.5.3-60.el7_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820293" comment="qemu-img-1.5.3-60.el7_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820294" comment="qemu-kvm-1.5.3-60.el7_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820295" comment="qemu-kvm-common-1.5.3-60.el7_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820296" comment="qemu-kvm-tools-1.5.3-60.el7_0.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140186" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0186</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0186" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0186" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0186" ref_url="https://www.suse.com/security/cve/CVE-2014-0186" source="SUSE CVE"/>
    <description>
    A certain tomcat7 package for Apache Tomcat 7 in Red Hat Enterprise Linux (RHEL) 7 allows remote attackers to cause a denial of service (CPU consumption) via a crafted request.  NOTE: this vulnerability exists because of an unspecified regression.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0186/">CVE-2014-0186 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0186">CVE-2014-0186 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820174" comment="tomcat-7.0.42-5.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820175" comment="tomcat-admin-webapps-7.0.42-5.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820176" comment="tomcat-docs-webapp-7.0.42-5.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820177" comment="tomcat-el-2.2-api-7.0.42-5.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820178" comment="tomcat-javadoc-7.0.42-5.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820179" comment="tomcat-jsp-2.2-api-7.0.42-5.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820180" comment="tomcat-jsvc-7.0.42-5.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820181" comment="tomcat-lib-7.0.42-5.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820182" comment="tomcat-servlet-3.0-api-7.0.42-5.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820183" comment="tomcat-webapps-7.0.42-5.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140191" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0191</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0191" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0191" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0191" ref_url="https://www.suse.com/security/cve/CVE-2014-0191" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1366-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008797.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14697-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U5YNW74OL2W7SH2XTAVN5TODNFIVFL3Y/" source="SUSE-SU"/>
    <description>
    The xmlParserHandlePEReference function in parser.c in libxml2 before 2.9.2, as used in Web Listener in Oracle HTTP Server in Oracle Fusion Middleware 11.1.1.7.0, 12.1.2.0, and 12.1.3.0 and other products, loads external parameter entities regardless of whether entity substitution or validation is enabled, which allows remote attackers to cause a denial of service (resource consumption) via a crafted XML document.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0191/">CVE-2014-0191 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0191">CVE-2014-0191 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1014873">SUSE bug 1014873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/876652">SUSE bug 876652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877506">SUSE bug 877506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/996079">SUSE bug 996079</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820944" comment="libxml2-2.9.1-5.el7_1.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820945" comment="libxml2-devel-2.9.1-5.el7_1.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820946" comment="libxml2-python-2.9.1-5.el7_1.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820947" comment="libxml2-static-2.9.1-5.el7_1.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140195" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0195</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0195" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0195" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0195" ref_url="https://www.suse.com/security/cve/CVE-2014-0195" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001353.html" source="SUSE-SU"/>
		<reference ref_id="TID7010867" ref_url="https://www.suse.com/support/kb/doc/?id=7010867" source="SUSE-SU"/>
		<reference ref_id="TID7015189" ref_url="https://www.suse.com/support/kb/doc?id=7015189" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0764-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PWZBRYVK7OUTTKRSPHEYXAZBMBT5C7BM/#PWZBRYVK7OUTTKRSPHEYXAZBMBT5C7BM" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0765-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/54XFUW7S2WOSHJ2J5AYNU42MAMKTFFWS/#54XFUW7S2WOSHJ2J5AYNU42MAMKTFFWS" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C5ZZO44NS35G5NQFFXUERK5DXLTQN534/#C5ZZO44NS35G5NQFFXUERK5DXLTQN534" source="SUSE-SU"/>
    <description>
    The dtls1_reassemble_fragment function in d1_both.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly validate fragment lengths in DTLS ClientHello messages, which allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow and application crash) via a long non-initial fragment.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0195/">CVE-2014-0195 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0195">CVE-2014-0195 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/880891">SUSE bug 880891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885777">SUSE bug 885777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915913">SUSE bug 915913</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820158" comment="openssl-1.0.1e-34.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820159" comment="openssl-devel-1.0.1e-34.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820160" comment="openssl-libs-1.0.1e-34.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820161" comment="openssl-perl-1.0.1e-34.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820162" comment="openssl-static-1.0.1e-34.el7_0.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140196" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0196</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0196" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0196" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0196" ref_url="https://www.suse.com/security/cve/CVE-2014-0196" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000874.html" source="SUSE-SU"/>
		<reference ref_id="TID7015061" ref_url="https://www.suse.com/support/kb/doc?id=7015061" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0677-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BCWIEOLJXTC6OSQ5E7LE3SLUJ5YQHDEU/#BCWIEOLJXTC6OSQ5E7LE3SLUJ5YQHDEU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0678-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EDN3IM3GY6YV6UDSEUSUOZ3MACM7TYS5/#EDN3IM3GY6YV6UDSEUSUOZ3MACM7TYS5" source="SUSE-SU"/>
    <description>
    The n_tty_write function in drivers/tty/n_tty.c in the Linux kernel through 3.14.3 does not properly manage tty driver access in the "LECHO &amp; !OPOST" case, which allows local users to cause a denial of service (memory corruption and system crash) or gain privileges by triggering a race condition involving read and write operations with long strings.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0196/">CVE-2014-0196 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0196">CVE-2014-0196 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/871252">SUSE bug 871252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/875690">SUSE bug 875690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877345">SUSE bug 877345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/879878">SUSE bug 879878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933423">SUSE bug 933423</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820146" comment="kernel-3.10.0-123.1.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820147" comment="kernel-abi-whitelists-3.10.0-123.1.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820148" comment="kernel-debug-3.10.0-123.1.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820151" comment="kernel-doc-3.10.0-123.1.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820152" comment="kernel-headers-3.10.0-123.1.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820153" comment="kernel-tools-3.10.0-123.1.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820154" comment="kernel-tools-libs-3.10.0-123.1.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820156" comment="perf-3.10.0-123.1.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820157" comment="python-perf-3.10.0-123.1.2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140198" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0198</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0198" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0198" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0198" ref_url="https://www.suse.com/security/cve/CVE-2014-0198" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001353.html" source="SUSE-SU"/>
		<reference ref_id="TID7015189" ref_url="https://www.suse.com/support/kb/doc?id=7015189" source="SUSE-SU"/>
    <description>
    The do_ssl3_write function in s3_pkt.c in OpenSSL 1.x through 1.0.1g, when SSL_MODE_RELEASE_BUFFERS is enabled, does not properly manage a buffer pointer during certain recursive calls, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via vectors that trigger an alert condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0198/">CVE-2014-0198 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0198">CVE-2014-0198 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/876282">SUSE bug 876282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880891">SUSE bug 880891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885777">SUSE bug 885777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915913">SUSE bug 915913</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820158" comment="openssl-1.0.1e-34.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820159" comment="openssl-devel-1.0.1e-34.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820160" comment="openssl-libs-1.0.1e-34.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820161" comment="openssl-perl-1.0.1e-34.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820162" comment="openssl-static-1.0.1e-34.el7_0.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140206" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0206</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0206" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0206" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0206" ref_url="https://www.suse.com/security/cve/CVE-2014-0206" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:1677-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KMCOHP6GELYLJBOOYH4FHHAYS7Q36GJY/#KMCOHP6GELYLJBOOYH4FHHAYS7Q36GJY" source="SUSE-SU"/>
    <description>
    Array index error in the aio_read_events_ring function in fs/aio.c in the Linux kernel through 3.15.1 allows local users to obtain sensitive information from kernel memory via a large head value.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0206/">CVE-2014-0206 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0206">CVE-2014-0206 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/884324">SUSE bug 884324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820206" comment="kernel-3.10.0-123.4.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820207" comment="kernel-abi-whitelists-3.10.0-123.4.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820208" comment="kernel-debug-3.10.0-123.4.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820211" comment="kernel-doc-3.10.0-123.4.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820212" comment="kernel-headers-3.10.0-123.4.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820213" comment="kernel-tools-3.10.0-123.4.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820214" comment="kernel-tools-libs-3.10.0-123.4.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820216" comment="perf-3.10.0-123.4.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820217" comment="python-perf-3.10.0-123.4.2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140207" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0207</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0207" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0207" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0207" ref_url="https://www.suse.com/security/cve/CVE-2014-0207" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0938-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1638-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002131.html" source="SUSE-SU"/>
    <description>
    The cdf_read_short_sector function in cdf.c in file before 5.19, as used in the Fileinfo component in PHP before 5.4.30 and 5.5.x before 5.5.14, allows remote attackers to cause a denial of service (assertion failure and application exit) via a crafted CDF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0207/">CVE-2014-0207 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0207">CVE-2014-0207 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/884986">SUSE bug 884986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992991">SUSE bug 992991</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821431" comment="file-5.11-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821432" comment="file-devel-5.11-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821433" comment="file-libs-5.11-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821434" comment="file-static-5.11-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820328" comment="php-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820329" comment="php-bcmath-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820330" comment="php-cli-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820331" comment="php-common-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820332" comment="php-dba-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820333" comment="php-devel-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820334" comment="php-embedded-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820335" comment="php-enchant-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820336" comment="php-fpm-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820337" comment="php-gd-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820338" comment="php-intl-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820339" comment="php-ldap-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820340" comment="php-mbstring-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820341" comment="php-mysql-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820342" comment="php-mysqlnd-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820343" comment="php-odbc-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820344" comment="php-pdo-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820345" comment="php-pgsql-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820346" comment="php-process-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820347" comment="php-pspell-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820348" comment="php-recode-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820349" comment="php-snmp-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820350" comment="php-soap-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820351" comment="php-xml-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820352" comment="php-xmlrpc-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821435" comment="python-magic-5.11-31.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140209" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0209</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0209" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0209" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0209" ref_url="https://www.suse.com/security/cve/CVE-2014-0209" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000904.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in the (1) FontFileAddEntry and (2) lexAlias functions in X.Org libXfont before 1.4.8 and 1.4.9x before 1.4.99.901 might allow local users to gain privileges by adding a directory with a large fonts.dir or fonts.alias file to the font path, which triggers a heap-based buffer overflow, related to metadata.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0209/">CVE-2014-0209 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0209">CVE-2014-0209 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/857544">SUSE bug 857544</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820602" comment="libXfont-1.4.7-2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820603" comment="libXfont-devel-1.4.7-2.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0210</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0210" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0210" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0210" ref_url="https://www.suse.com/security/cve/CVE-2014-0210" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000904.html" source="SUSE-SU"/>
    <description>
    Multiple buffer overflows in X.Org libXfont before 1.4.8 and 1.4.9x before 1.4.99.901 allow remote font servers to execute arbitrary code via a crafted xfs protocol reply to the (1) _fs_recv_conn_setup, (2) fs_read_open_font, (3) fs_read_query_info, (4) fs_read_extent_info, (5) fs_read_glyphs, (6) fs_read_list, or (7) fs_read_list_info function.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0210/">CVE-2014-0210 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0210">CVE-2014-0210 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/857544">SUSE bug 857544</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820602" comment="libXfont-1.4.7-2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820603" comment="libXfont-devel-1.4.7-2.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140211" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0211</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0211" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0211" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0211" ref_url="https://www.suse.com/security/cve/CVE-2014-0211" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000904.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in the (1) fs_get_reply, (2) fs_alloc_glyphs, and (3) fs_read_extent_info functions in X.Org libXfont before 1.4.8 and 1.4.9x before 1.4.99.901 allow remote font servers to execute arbitrary code via a crafted xfs reply, which triggers a buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0211/">CVE-2014-0211 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0211">CVE-2014-0211 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/857544">SUSE bug 857544</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820602" comment="libXfont-1.4.7-2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820603" comment="libXfont-devel-1.4.7-2.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140221" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0221</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0221" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0221" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0221" ref_url="https://www.suse.com/security/cve/CVE-2014-0221" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0759-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/001012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001353.html" source="SUSE-SU"/>
		<reference ref_id="TID7008708" ref_url="https://www.suse.com/support/kb/doc/?id=7008708" source="SUSE-SU"/>
		<reference ref_id="TID7010867" ref_url="https://www.suse.com/support/kb/doc/?id=7010867" source="SUSE-SU"/>
		<reference ref_id="TID7015162" ref_url="https://www.suse.com/support/kb/doc?id=7015162" source="SUSE-SU"/>
		<reference ref_id="TID7015189" ref_url="https://www.suse.com/support/kb/doc?id=7015189" source="SUSE-SU"/>
		<reference ref_id="TID7015264" ref_url="https://www.suse.com/support/kb/doc?id=7015264" source="SUSE-SU"/>
		<reference ref_id="TID7015300" ref_url="https://www.suse.com/support/kb/doc?id=7015300" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0764-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PWZBRYVK7OUTTKRSPHEYXAZBMBT5C7BM/#PWZBRYVK7OUTTKRSPHEYXAZBMBT5C7BM" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0765-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/54XFUW7S2WOSHJ2J5AYNU42MAMKTFFWS/#54XFUW7S2WOSHJ2J5AYNU42MAMKTFFWS" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C5ZZO44NS35G5NQFFXUERK5DXLTQN534/#C5ZZO44NS35G5NQFFXUERK5DXLTQN534" source="SUSE-SU"/>
    <description>
    The dtls1_get_message_fragment function in d1_both.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h allows remote attackers to cause a denial of service (recursion and client crash) via a DTLS hello message in an invalid DTLS handshake.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0221/">CVE-2014-0221 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0221">CVE-2014-0221 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/880891">SUSE bug 880891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883126">SUSE bug 883126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885777">SUSE bug 885777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905106">SUSE bug 905106</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915913">SUSE bug 915913</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820158" comment="openssl-1.0.1e-34.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820159" comment="openssl-devel-1.0.1e-34.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820160" comment="openssl-libs-1.0.1e-34.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820161" comment="openssl-perl-1.0.1e-34.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820162" comment="openssl-static-1.0.1e-34.el7_0.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140222" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0222</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0222" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0222" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0222" ref_url="https://www.suse.com/security/cve/CVE-2014-0222" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-October/001032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001665.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001668.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1445-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002149.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1964-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IDFPIHUORGRCSRYB743FA3OE4NKVH2VB/#IDFPIHUORGRCSRYB743FA3OE4NKVH2VB" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2003-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BQNNLOO42C2AJVHL72XWPCAH7YOGFT6Y/#BQNNLOO42C2AJVHL72XWPCAH7YOGFT6Y" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0914-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/56SB7O6IKG3PWP6IFVQ334V6YMU3GFH3/#56SB7O6IKG3PWP6IFVQ334V6YMU3GFH3" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4OGUN5F4IJ2HL42Y4XJBGLVFNE3RUZGG/#4OGUN5F4IJ2HL42Y4XJBGLVFNE3RUZGG" source="SUSE-SU"/>
    <description>
    Integer overflow in the qcow_open function in block/qcow.c in QEMU before 1.7.2 allows remote attackers to cause a denial of service (crash) via a large L2 table in a QCOW version 1 image.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0222/">CVE-2014-0222 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0222">CVE-2014-0222 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1072223">SUSE bug 1072223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877642">SUSE bug 877642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950367">SUSE bug 950367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964925">SUSE bug 964925</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820289" comment="libcacard-1.5.3-60.el7_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820290" comment="libcacard-devel-1.5.3-60.el7_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820291" comment="libcacard-tools-1.5.3-60.el7_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820292" comment="qemu-guest-agent-1.5.3-60.el7_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820293" comment="qemu-img-1.5.3-60.el7_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820294" comment="qemu-kvm-1.5.3-60.el7_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820295" comment="qemu-kvm-common-1.5.3-60.el7_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820296" comment="qemu-kvm-tools-1.5.3-60.el7_0.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140223" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0223</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0223" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0223" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0223" ref_url="https://www.suse.com/security/cve/CVE-2014-0223" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-October/001032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001402.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the qcow_open function in block/qcow.c in QEMU before 1.7.2 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a large image size, which triggers a buffer overflow or out-of-bounds read.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0223/">CVE-2014-0223 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0223">CVE-2014-0223 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/877645">SUSE bug 877645</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820289" comment="libcacard-1.5.3-60.el7_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820290" comment="libcacard-devel-1.5.3-60.el7_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820291" comment="libcacard-tools-1.5.3-60.el7_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820292" comment="qemu-guest-agent-1.5.3-60.el7_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820293" comment="qemu-img-1.5.3-60.el7_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820294" comment="qemu-kvm-1.5.3-60.el7_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820295" comment="qemu-kvm-common-1.5.3-60.el7_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820296" comment="qemu-kvm-tools-1.5.3-60.el7_0.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140224" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0224</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0224" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0224" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0224" ref_url="https://www.suse.com/security/cve/CVE-2014-0224" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0759-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/001012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1557-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="TID3426981" ref_url="https://www.suse.com/support/kb/doc/?id=3426981" source="SUSE-SU"/>
		<reference ref_id="TID7008708" ref_url="https://www.suse.com/support/kb/doc/?id=7008708" source="SUSE-SU"/>
		<reference ref_id="TID7010166" ref_url="https://www.suse.com/support/kb/doc/?id=7010166" source="SUSE-SU"/>
		<reference ref_id="TID7010867" ref_url="https://www.suse.com/support/kb/doc/?id=7010867" source="SUSE-SU"/>
		<reference ref_id="TID7015158" ref_url="https://www.suse.com/support/kb/doc/?id=7015158" source="SUSE-SU"/>
		<reference ref_id="TID7015162" ref_url="https://www.suse.com/support/kb/doc?id=7015162" source="SUSE-SU"/>
		<reference ref_id="TID7015189" ref_url="https://www.suse.com/support/kb/doc?id=7015189" source="SUSE-SU"/>
		<reference ref_id="TID7015264" ref_url="https://www.suse.com/support/kb/doc?id=7015264" source="SUSE-SU"/>
		<reference ref_id="TID7015300" ref_url="https://www.suse.com/support/kb/doc?id=7015300" source="SUSE-SU"/>
		<reference ref_id="TID7017332" ref_url="https://www.suse.com/support/kb/doc/?id=7017332" source="SUSE-SU"/>
		<reference ref_id="TID7021279" ref_url="https://www.suse.com/support/kb/doc/?id=7021279" source="SUSE-SU"/>
		<reference ref_id="TID7021300" ref_url="https://www.suse.com/support/kb/doc/?id=7021300" source="SUSE-SU"/>
		<reference ref_id="TID7021432" ref_url="https://www.suse.com/support/kb/doc/?id=7021432" source="SUSE-SU"/>
		<reference ref_id="TID7021518" ref_url="https://www.suse.com/support/kb/doc/?id=7021518" source="SUSE-SU"/>
		<reference ref_id="TID7021676" ref_url="https://www.suse.com/support/kb/doc/?id=7021676" source="SUSE-SU"/>
		<reference ref_id="TID7021739" ref_url="https://www.suse.com/support/kb/doc/?id=7021739" source="SUSE-SU"/>
		<reference ref_id="TID7021848" ref_url="https://www.suse.com/support/kb/doc/?id=7021848" source="SUSE-SU"/>
		<reference ref_id="TID7021990" ref_url="https://www.suse.com/support/kb/doc/?id=7021990" source="SUSE-SU"/>
		<reference ref_id="TID7022102" ref_url="https://www.suse.com/support/kb/doc/?id=7022102" source="SUSE-SU"/>
		<reference ref_id="TID7022768" ref_url="https://www.suse.com/support/kb/doc/?id=7022768" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0764-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PWZBRYVK7OUTTKRSPHEYXAZBMBT5C7BM/#PWZBRYVK7OUTTKRSPHEYXAZBMBT5C7BM" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0765-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/54XFUW7S2WOSHJ2J5AYNU42MAMKTFFWS/#54XFUW7S2WOSHJ2J5AYNU42MAMKTFFWS" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C5ZZO44NS35G5NQFFXUERK5DXLTQN534/#C5ZZO44NS35G5NQFFXUERK5DXLTQN534" source="SUSE-SU"/>
    <description>
    OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly restrict processing of ChangeCipherSpec messages, which allows man-in-the-middle attackers to trigger use of a zero-length master key in certain OpenSSL-to-OpenSSL communications, and consequently hijack sessions or obtain sensitive information, via a crafted TLS handshake, aka the "CCS Injection" vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0224/">CVE-2014-0224 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-0224">CVE-2014-0224 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1146657">SUSE bug 1146657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880891">SUSE bug 880891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/881743">SUSE bug 881743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883126">SUSE bug 883126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885777">SUSE bug 885777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/892403">SUSE bug 892403</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901237">SUSE bug 901237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903703">SUSE bug 903703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905018">SUSE bug 905018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905106">SUSE bug 905106</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914447">SUSE bug 914447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915913">SUSE bug 915913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916239">SUSE bug 916239</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820158" comment="openssl-1.0.1e-34.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820159" comment="openssl-devel-1.0.1e-34.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820160" comment="openssl-libs-1.0.1e-34.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820161" comment="openssl-perl-1.0.1e-34.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820162" comment="openssl-static-1.0.1e-34.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820163" comment="openssl098e-0.9.8e-29.el7_0.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140226" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0226</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0226" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0226" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0226" ref_url="https://www.suse.com/security/cve/CVE-2014-0226" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/000980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/000981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/000982.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0969-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QMNVKSYSRUBBHWVTHPBJK7JVV6ED2DJK/#QMNVKSYSRUBBHWVTHPBJK7JVV6ED2DJK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0976-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LOK3HVKC5GAIYSTVZDPCJ34YLUJVO3SQ/#LOK3HVKC5GAIYSTVZDPCJ34YLUJVO3SQ" source="SUSE-SU"/>
    <description>
    Race condition in the mod_status module in the Apache HTTP Server before 2.4.10 allows remote attackers to cause a denial of service (heap-based buffer overflow), or possibly obtain sensitive credential information or execute arbitrary code, via a crafted request that triggers improper scoreboard handling within the status_handler function in modules/generators/mod_status.c and the lua_ap_scoreboard_worker function in modules/lua/lua_request.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0226/">CVE-2014-0226 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0226">CVE-2014-0226 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/887765">SUSE bug 887765</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820269" comment="httpd-2.4.6-18.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820270" comment="httpd-devel-2.4.6-18.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820271" comment="httpd-manual-2.4.6-18.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820272" comment="httpd-tools-2.4.6-18.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820273" comment="mod_ldap-2.4.6-18.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820274" comment="mod_proxy_html-2.4.6-18.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820275" comment="mod_session-2.4.6-18.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820276" comment="mod_ssl-2.4.6-18.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140227" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0227</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0227" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0227" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0227" ref_url="https://www.suse.com/security/cve/CVE-2014-0227" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001594.html" source="SUSE-SU"/>
		<reference ref_id="TID7016198" ref_url="https://www.suse.com/support/kb/doc/?id=7016198" source="SUSE-SU"/>
    <description>
    java/org/apache/coyote/http11/filters/ChunkedInputFilter.java in Apache Tomcat 6.x before 6.0.42, 7.x before 7.0.55, and 8.x before 8.0.9 does not properly handle attempts to continue reading data after an error has occurred, which allows remote attackers to conduct HTTP request smuggling attacks or cause a denial of service (resource consumption) by streaming data with malformed chunked transfer coding.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0227/">CVE-2014-0227 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0227">CVE-2014-0227 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/917127">SUSE bug 917127</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/926762">SUSE bug 926762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988489">SUSE bug 988489</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820998" comment="tomcat-7.0.54-2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820999" comment="tomcat-admin-webapps-7.0.54-2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821000" comment="tomcat-docs-webapp-7.0.54-2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821001" comment="tomcat-el-2.2-api-7.0.54-2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821002" comment="tomcat-javadoc-7.0.54-2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821003" comment="tomcat-jsp-2.2-api-7.0.54-2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821004" comment="tomcat-jsvc-7.0.54-2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821005" comment="tomcat-lib-7.0.54-2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821006" comment="tomcat-servlet-3.0-api-7.0.54-2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821007" comment="tomcat-webapps-7.0.54-2.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140231" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0231</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0231" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0231" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0231" ref_url="https://www.suse.com/security/cve/CVE-2014-0231" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/000980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/000981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/000982.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0969-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QMNVKSYSRUBBHWVTHPBJK7JVV6ED2DJK/#QMNVKSYSRUBBHWVTHPBJK7JVV6ED2DJK" source="SUSE-SU"/>
    <description>
    The mod_cgid module in the Apache HTTP Server before 2.4.10 does not have a timeout mechanism, which allows remote attackers to cause a denial of service (process hang) via a request to a CGI script that does not read from its stdin file descriptor.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0231/">CVE-2014-0231 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0231">CVE-2014-0231 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/887768">SUSE bug 887768</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820269" comment="httpd-2.4.6-18.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820270" comment="httpd-devel-2.4.6-18.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820271" comment="httpd-manual-2.4.6-18.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820272" comment="httpd-tools-2.4.6-18.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820273" comment="mod_ldap-2.4.6-18.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820274" comment="mod_proxy_html-2.4.6-18.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820275" comment="mod_session-2.4.6-18.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820276" comment="mod_ssl-2.4.6-18.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140237" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0237</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0237" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0237" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0237" ref_url="https://www.suse.com/security/cve/CVE-2014-0237" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000896.html" source="SUSE-SU"/>
    <description>
    The cdf_unpack_summary_info function in cdf.c in the Fileinfo component in PHP before 5.4.29 and 5.5.x before 5.5.13 allows remote attackers to cause a denial of service (performance degradation) by triggering many file_printf calls.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0237/">CVE-2014-0237 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0237">CVE-2014-0237 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/880905">SUSE bug 880905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992991">SUSE bug 992991</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821431" comment="file-5.11-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821432" comment="file-devel-5.11-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821433" comment="file-libs-5.11-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821434" comment="file-static-5.11-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820328" comment="php-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820329" comment="php-bcmath-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820330" comment="php-cli-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820331" comment="php-common-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820332" comment="php-dba-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820333" comment="php-devel-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820334" comment="php-embedded-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820335" comment="php-enchant-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820336" comment="php-fpm-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820337" comment="php-gd-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820338" comment="php-intl-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820339" comment="php-ldap-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820340" comment="php-mbstring-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820341" comment="php-mysql-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820342" comment="php-mysqlnd-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820343" comment="php-odbc-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820344" comment="php-pdo-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820345" comment="php-pgsql-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820346" comment="php-process-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820347" comment="php-pspell-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820348" comment="php-recode-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820349" comment="php-snmp-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820350" comment="php-soap-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820351" comment="php-xml-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820352" comment="php-xmlrpc-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821435" comment="python-magic-5.11-31.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140238" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0238</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0238" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0238" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0238" ref_url="https://www.suse.com/security/cve/CVE-2014-0238" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000896.html" source="SUSE-SU"/>
    <description>
    The cdf_read_property_info function in cdf.c in the Fileinfo component in PHP before 5.4.29 and 5.5.x before 5.5.13 allows remote attackers to cause a denial of service (infinite loop or out-of-bounds memory access) via a vector that (1) has zero length or (2) is too long.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0238/">CVE-2014-0238 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0238">CVE-2014-0238 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/880904">SUSE bug 880904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992991">SUSE bug 992991</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821431" comment="file-5.11-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821432" comment="file-devel-5.11-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821433" comment="file-libs-5.11-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821434" comment="file-static-5.11-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820328" comment="php-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820329" comment="php-bcmath-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820330" comment="php-cli-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820331" comment="php-common-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820332" comment="php-dba-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820333" comment="php-devel-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820334" comment="php-embedded-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820335" comment="php-enchant-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820336" comment="php-fpm-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820337" comment="php-gd-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820338" comment="php-intl-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820339" comment="php-ldap-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820340" comment="php-mbstring-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820341" comment="php-mysql-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820342" comment="php-mysqlnd-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820343" comment="php-odbc-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820344" comment="php-pdo-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820345" comment="php-pgsql-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820346" comment="php-process-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820347" comment="php-pspell-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820348" comment="php-recode-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820349" comment="php-snmp-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820350" comment="php-soap-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820351" comment="php-xml-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820352" comment="php-xmlrpc-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821435" comment="python-magic-5.11-31.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140240" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0240</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0240" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0240" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0240" ref_url="https://www.suse.com/security/cve/CVE-2014-0240" source="SUSE CVE"/>
		<reference ref_id="SUSE-RU-2015:0611-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2015-March/002829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0794-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0956-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000937.html" source="SUSE-SU"/>
    <description>
    The mod_wsgi module before 3.5 for Apache, when daemon mode is enabled, does not properly handle error codes returned by setuid when run on certain Linux kernels, which allows local users to gain privileges via vectors related to the number of running processes.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0240/">CVE-2014-0240 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0240">CVE-2014-0240 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/878550">SUSE bug 878550</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820386" comment="mod_wsgi-3.4-12.el7_0 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140244" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0244</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0244" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0244" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0244" ref_url="https://www.suse.com/security/cve/CVE-2014-0244" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000917.html" source="SUSE-SU"/>
    <description>
    The sys_recvfrom function in nmbd in Samba 3.6.x before 3.6.24, 4.0.x before 4.0.19, and 4.1.x before 4.1.9 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a malformed UDP packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0244/">CVE-2014-0244 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0244">CVE-2014-0244 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/880962">SUSE bug 880962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883758">SUSE bug 883758</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820229" comment="libsmbclient-4.1.1-35.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820230" comment="libsmbclient-devel-4.1.1-35.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820231" comment="libwbclient-4.1.1-35.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820232" comment="libwbclient-devel-4.1.1-35.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820233" comment="samba-4.1.1-35.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820234" comment="samba-client-4.1.1-35.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820235" comment="samba-common-4.1.1-35.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820236" comment="samba-dc-4.1.1-35.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820237" comment="samba-dc-libs-4.1.1-35.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820238" comment="samba-devel-4.1.1-35.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820239" comment="samba-libs-4.1.1-35.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820240" comment="samba-pidl-4.1.1-35.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820241" comment="samba-python-4.1.1-35.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820242" comment="samba-test-4.1.1-35.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820243" comment="samba-test-devel-4.1.1-35.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820244" comment="samba-vfs-glusterfs-4.1.1-35.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820245" comment="samba-winbind-4.1.1-35.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820246" comment="samba-winbind-clients-4.1.1-35.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820247" comment="samba-winbind-krb5-locator-4.1.1-35.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820248" comment="samba-winbind-modules-4.1.1-35.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140384" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0384</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0384" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0384" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0384" ref_url="https://www.suse.com/security/cve/CVE-2014-0384" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000857.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.35 and earlier and 5.6.15 and earlier allows remote authenticated users to affect availability via vectors related to XML.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0384/">CVE-2014-0384 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0384">CVE-2014-0384 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/873896">SUSE bug 873896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999706">SUSE bug 999706</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820187" comment="mariadb-5.5.37-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820188" comment="mariadb-bench-5.5.37-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820189" comment="mariadb-devel-5.5.37-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820190" comment="mariadb-embedded-5.5.37-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820191" comment="mariadb-embedded-devel-5.5.37-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820192" comment="mariadb-libs-5.5.37-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820193" comment="mariadb-server-5.5.37-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820194" comment="mariadb-test-5.5.37-1.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140429" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0429</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0429" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0429" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0429" ref_url="https://www.suse.com/security/cve/CVE-2014-0429" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000839.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000843.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u61, 6u71, 7u51, and 8; JRockit R27.8.1 and R28.3.1; and Java SE Embedded 7u51 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0429/">CVE-2014-0429 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0429">CVE-2014-0429 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/873872">SUSE bug 873872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877430">SUSE bug 877430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820169" comment="java-1.6.0-openjdk-1.6.0.0-6.1.13.3.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820170" comment="java-1.6.0-openjdk-demo-1.6.0.0-6.1.13.3.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820171" comment="java-1.6.0-openjdk-devel-1.6.0.0-6.1.13.3.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820172" comment="java-1.6.0-openjdk-javadoc-1.6.0.0-6.1.13.3.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820173" comment="java-1.6.0-openjdk-src-1.6.0.0-6.1.13.3.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820139" comment="java-1.7.0-openjdk-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820140" comment="java-1.7.0-openjdk-accessibility-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820141" comment="java-1.7.0-openjdk-demo-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820142" comment="java-1.7.0-openjdk-devel-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820143" comment="java-1.7.0-openjdk-headless-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820144" comment="java-1.7.0-openjdk-javadoc-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820145" comment="java-1.7.0-openjdk-src-1.7.0.55-2.4.7.2.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140446" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0446</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0446" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0446" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0446" ref_url="https://www.suse.com/security/cve/CVE-2014-0446" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000839.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000843.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u61, 6u71, 7u51, and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0446/">CVE-2014-0446 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0446">CVE-2014-0446 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/873872">SUSE bug 873872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877430">SUSE bug 877430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820169" comment="java-1.6.0-openjdk-1.6.0.0-6.1.13.3.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820170" comment="java-1.6.0-openjdk-demo-1.6.0.0-6.1.13.3.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820171" comment="java-1.6.0-openjdk-devel-1.6.0.0-6.1.13.3.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820172" comment="java-1.6.0-openjdk-javadoc-1.6.0.0-6.1.13.3.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820173" comment="java-1.6.0-openjdk-src-1.6.0.0-6.1.13.3.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820139" comment="java-1.7.0-openjdk-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820140" comment="java-1.7.0-openjdk-accessibility-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820141" comment="java-1.7.0-openjdk-demo-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820142" comment="java-1.7.0-openjdk-devel-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820143" comment="java-1.7.0-openjdk-headless-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820144" comment="java-1.7.0-openjdk-javadoc-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820145" comment="java-1.7.0-openjdk-src-1.7.0.55-2.4.7.2.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140451" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0451</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0451" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0451" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0451" ref_url="https://www.suse.com/security/cve/CVE-2014-0451" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000839.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000843.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u61, 6u71, 7u51, and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT, a different vulnerability than CVE-2014-2412.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0451/">CVE-2014-0451 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0451">CVE-2014-0451 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/873872">SUSE bug 873872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877430">SUSE bug 877430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820169" comment="java-1.6.0-openjdk-1.6.0.0-6.1.13.3.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820170" comment="java-1.6.0-openjdk-demo-1.6.0.0-6.1.13.3.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820171" comment="java-1.6.0-openjdk-devel-1.6.0.0-6.1.13.3.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820172" comment="java-1.6.0-openjdk-javadoc-1.6.0.0-6.1.13.3.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820173" comment="java-1.6.0-openjdk-src-1.6.0.0-6.1.13.3.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820139" comment="java-1.7.0-openjdk-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820140" comment="java-1.7.0-openjdk-accessibility-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820141" comment="java-1.7.0-openjdk-demo-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820142" comment="java-1.7.0-openjdk-devel-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820143" comment="java-1.7.0-openjdk-headless-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820144" comment="java-1.7.0-openjdk-javadoc-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820145" comment="java-1.7.0-openjdk-src-1.7.0.55-2.4.7.2.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140452" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0452</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0452" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0452" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0452" ref_url="https://www.suse.com/security/cve/CVE-2014-0452" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000843.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u71, 7u51, and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JAX-WS, a different vulnerability than CVE-2014-0458 and CVE-2014-2423.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0452/">CVE-2014-0452 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0452">CVE-2014-0452 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/873872">SUSE bug 873872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877430">SUSE bug 877430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820169" comment="java-1.6.0-openjdk-1.6.0.0-6.1.13.3.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820170" comment="java-1.6.0-openjdk-demo-1.6.0.0-6.1.13.3.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820171" comment="java-1.6.0-openjdk-devel-1.6.0.0-6.1.13.3.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820172" comment="java-1.6.0-openjdk-javadoc-1.6.0.0-6.1.13.3.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820173" comment="java-1.6.0-openjdk-src-1.6.0.0-6.1.13.3.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820139" comment="java-1.7.0-openjdk-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820140" comment="java-1.7.0-openjdk-accessibility-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820141" comment="java-1.7.0-openjdk-demo-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820142" comment="java-1.7.0-openjdk-devel-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820143" comment="java-1.7.0-openjdk-headless-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820144" comment="java-1.7.0-openjdk-javadoc-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820145" comment="java-1.7.0-openjdk-src-1.7.0.55-2.4.7.2.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140453" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0453</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0453" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0453" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0453" ref_url="https://www.suse.com/security/cve/CVE-2014-0453" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000839.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000843.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u61, 6u71, 7u51, and 8; JRockit R27.8.1 and R28.3.1; and Java SE Embedded 7u51 allows remote attackers to affect confidentiality and integrity via unknown vectors related to Security.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0453/">CVE-2014-0453 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0453">CVE-2014-0453 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/873872">SUSE bug 873872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877430">SUSE bug 877430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820169" comment="java-1.6.0-openjdk-1.6.0.0-6.1.13.3.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820170" comment="java-1.6.0-openjdk-demo-1.6.0.0-6.1.13.3.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820171" comment="java-1.6.0-openjdk-devel-1.6.0.0-6.1.13.3.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820172" comment="java-1.6.0-openjdk-javadoc-1.6.0.0-6.1.13.3.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820173" comment="java-1.6.0-openjdk-src-1.6.0.0-6.1.13.3.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820139" comment="java-1.7.0-openjdk-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820140" comment="java-1.7.0-openjdk-accessibility-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820141" comment="java-1.7.0-openjdk-demo-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820142" comment="java-1.7.0-openjdk-devel-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820143" comment="java-1.7.0-openjdk-headless-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820144" comment="java-1.7.0-openjdk-javadoc-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820145" comment="java-1.7.0-openjdk-src-1.7.0.55-2.4.7.2.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140454" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0454</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0454" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0454" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0454" ref_url="https://www.suse.com/security/cve/CVE-2014-0454" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000843.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u51 and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Security.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0454/">CVE-2014-0454 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0454">CVE-2014-0454 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820139" comment="java-1.7.0-openjdk-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820140" comment="java-1.7.0-openjdk-accessibility-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820141" comment="java-1.7.0-openjdk-demo-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820142" comment="java-1.7.0-openjdk-devel-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820143" comment="java-1.7.0-openjdk-headless-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820144" comment="java-1.7.0-openjdk-javadoc-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820145" comment="java-1.7.0-openjdk-src-1.7.0.55-2.4.7.2.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140455" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0455</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0455" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0455" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0455" ref_url="https://www.suse.com/security/cve/CVE-2014-0455" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000843.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u51 and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2014-0432 and CVE-2014-2402.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0455/">CVE-2014-0455 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0455">CVE-2014-0455 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820139" comment="java-1.7.0-openjdk-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820140" comment="java-1.7.0-openjdk-accessibility-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820141" comment="java-1.7.0-openjdk-demo-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820142" comment="java-1.7.0-openjdk-devel-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820143" comment="java-1.7.0-openjdk-headless-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820144" comment="java-1.7.0-openjdk-javadoc-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820145" comment="java-1.7.0-openjdk-src-1.7.0.55-2.4.7.2.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140456" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0456</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0456" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0456" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0456" ref_url="https://www.suse.com/security/cve/CVE-2014-0456" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000814.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u71, 7u51, and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Hotspot.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0456/">CVE-2014-0456 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0456">CVE-2014-0456 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/873872">SUSE bug 873872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820169" comment="java-1.6.0-openjdk-1.6.0.0-6.1.13.3.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820170" comment="java-1.6.0-openjdk-demo-1.6.0.0-6.1.13.3.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820171" comment="java-1.6.0-openjdk-devel-1.6.0.0-6.1.13.3.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820172" comment="java-1.6.0-openjdk-javadoc-1.6.0.0-6.1.13.3.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820173" comment="java-1.6.0-openjdk-src-1.6.0.0-6.1.13.3.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820139" comment="java-1.7.0-openjdk-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820140" comment="java-1.7.0-openjdk-accessibility-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820141" comment="java-1.7.0-openjdk-demo-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820142" comment="java-1.7.0-openjdk-devel-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820143" comment="java-1.7.0-openjdk-headless-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820144" comment="java-1.7.0-openjdk-javadoc-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820145" comment="java-1.7.0-openjdk-src-1.7.0.55-2.4.7.2.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140457" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0457</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0457" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0457" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0457" ref_url="https://www.suse.com/security/cve/CVE-2014-0457" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000839.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000843.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u61, SE 6u71, 7u51, and 8; JRockit R27.8.1 and R28.3.1; and Java SE Embedded 7u51 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0457/">CVE-2014-0457 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0457">CVE-2014-0457 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/873872">SUSE bug 873872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877430">SUSE bug 877430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820169" comment="java-1.6.0-openjdk-1.6.0.0-6.1.13.3.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820170" comment="java-1.6.0-openjdk-demo-1.6.0.0-6.1.13.3.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820171" comment="java-1.6.0-openjdk-devel-1.6.0.0-6.1.13.3.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820172" comment="java-1.6.0-openjdk-javadoc-1.6.0.0-6.1.13.3.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820173" comment="java-1.6.0-openjdk-src-1.6.0.0-6.1.13.3.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820139" comment="java-1.7.0-openjdk-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820140" comment="java-1.7.0-openjdk-accessibility-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820141" comment="java-1.7.0-openjdk-demo-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820142" comment="java-1.7.0-openjdk-devel-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820143" comment="java-1.7.0-openjdk-headless-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820144" comment="java-1.7.0-openjdk-javadoc-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820145" comment="java-1.7.0-openjdk-src-1.7.0.55-2.4.7.2.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140458" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0458</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0458" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0458" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0458" ref_url="https://www.suse.com/security/cve/CVE-2014-0458" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000843.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u71, 7u51, and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JAX-WS, a different vulnerability than CVE-2014-0452 and CVE-2014-2423.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0458/">CVE-2014-0458 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0458">CVE-2014-0458 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/873872">SUSE bug 873872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877430">SUSE bug 877430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820169" comment="java-1.6.0-openjdk-1.6.0.0-6.1.13.3.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820170" comment="java-1.6.0-openjdk-demo-1.6.0.0-6.1.13.3.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820171" comment="java-1.6.0-openjdk-devel-1.6.0.0-6.1.13.3.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820172" comment="java-1.6.0-openjdk-javadoc-1.6.0.0-6.1.13.3.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820173" comment="java-1.6.0-openjdk-src-1.6.0.0-6.1.13.3.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820139" comment="java-1.7.0-openjdk-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820140" comment="java-1.7.0-openjdk-accessibility-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820141" comment="java-1.7.0-openjdk-demo-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820142" comment="java-1.7.0-openjdk-devel-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820143" comment="java-1.7.0-openjdk-headless-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820144" comment="java-1.7.0-openjdk-javadoc-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820145" comment="java-1.7.0-openjdk-src-1.7.0.55-2.4.7.2.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140459" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0459</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0459" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0459" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0459" ref_url="https://www.suse.com/security/cve/CVE-2014-0459" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000843.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u51 and 8, and Java SE Embedded 7u51, allows remote attackers to affect availability via unknown vectors related to 2D.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0459/">CVE-2014-0459 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0459">CVE-2014-0459 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/873872">SUSE bug 873872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877430">SUSE bug 877430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820139" comment="java-1.7.0-openjdk-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820140" comment="java-1.7.0-openjdk-accessibility-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820141" comment="java-1.7.0-openjdk-demo-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820142" comment="java-1.7.0-openjdk-devel-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820143" comment="java-1.7.0-openjdk-headless-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820144" comment="java-1.7.0-openjdk-javadoc-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820145" comment="java-1.7.0-openjdk-src-1.7.0.55-2.4.7.2.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140460" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0460</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0460" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0460" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0460" ref_url="https://www.suse.com/security/cve/CVE-2014-0460" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000839.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000843.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u61, 6u71, 7u51, and 8; JRockit R27.8.1 and R28.3.1; and Java SE Embedded 7u51 allows remote attackers to affect confidentiality and integrity via vectors related to JNDI.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0460/">CVE-2014-0460 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0460">CVE-2014-0460 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/873872">SUSE bug 873872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877430">SUSE bug 877430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820169" comment="java-1.6.0-openjdk-1.6.0.0-6.1.13.3.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820170" comment="java-1.6.0-openjdk-demo-1.6.0.0-6.1.13.3.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820171" comment="java-1.6.0-openjdk-devel-1.6.0.0-6.1.13.3.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820172" comment="java-1.6.0-openjdk-javadoc-1.6.0.0-6.1.13.3.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820173" comment="java-1.6.0-openjdk-src-1.6.0.0-6.1.13.3.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820139" comment="java-1.7.0-openjdk-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820140" comment="java-1.7.0-openjdk-accessibility-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820141" comment="java-1.7.0-openjdk-demo-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820142" comment="java-1.7.0-openjdk-devel-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820143" comment="java-1.7.0-openjdk-headless-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820144" comment="java-1.7.0-openjdk-javadoc-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820145" comment="java-1.7.0-openjdk-src-1.7.0.55-2.4.7.2.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140461" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0461</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0461" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0461" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0461" ref_url="https://www.suse.com/security/cve/CVE-2014-0461" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000843.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u71, 7u51, and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0461/">CVE-2014-0461 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0461">CVE-2014-0461 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/873872">SUSE bug 873872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877430">SUSE bug 877430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820169" comment="java-1.6.0-openjdk-1.6.0.0-6.1.13.3.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820170" comment="java-1.6.0-openjdk-demo-1.6.0.0-6.1.13.3.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820171" comment="java-1.6.0-openjdk-devel-1.6.0.0-6.1.13.3.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820172" comment="java-1.6.0-openjdk-javadoc-1.6.0.0-6.1.13.3.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820173" comment="java-1.6.0-openjdk-src-1.6.0.0-6.1.13.3.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820139" comment="java-1.7.0-openjdk-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820140" comment="java-1.7.0-openjdk-accessibility-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820141" comment="java-1.7.0-openjdk-demo-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820142" comment="java-1.7.0-openjdk-devel-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820143" comment="java-1.7.0-openjdk-headless-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820144" comment="java-1.7.0-openjdk-javadoc-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820145" comment="java-1.7.0-openjdk-src-1.7.0.55-2.4.7.2.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140475" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0475</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0475" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0475" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0475" ref_url="https://www.suse.com/security/cve/CVE-2014-0475" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/001014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/001015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/001016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1115-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J2MEK7O2VPSS6RNPRMNATCZFBZBMCGGM/#J2MEK7O2VPSS6RNPRMNATCZFBZBMCGGM" source="SUSE-SU"/>
    <description>
    Multiple directory traversal vulnerabilities in GNU C Library (aka glibc or libc6) before 2.20 allow context-dependent attackers to bypass ForceCommand restrictions and possibly have other unspecified impact via a .. (dot dot) in a (1) LC_*, (2) LANG, or other locale environment variable.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0475/">CVE-2014-0475 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0475">CVE-2014-0475 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/887022">SUSE bug 887022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/896776">SUSE bug 896776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916222">SUSE bug 916222</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820387" comment="glibc-2.17-55.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820388" comment="glibc-common-2.17-55.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820389" comment="glibc-devel-2.17-55.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820390" comment="glibc-headers-2.17-55.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820391" comment="glibc-static-2.17-55.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820392" comment="glibc-utils-2.17-55.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820393" comment="nscd-2.17-55.el7_0.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201410071" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-10071</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-10071" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-10071" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-10071" ref_url="https://www.suse.com/security/cve/CVE-2014-10071" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010436.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1093-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GK62YTNMQ4SBUW42W4UTPSYBGUSFJAAP/#GK62YTNMQ4SBUW42W4UTPSYBGUSFJAAP" source="SUSE-SU"/>
    <description>
    In exec.c in zsh before 5.0.7, there is a buffer overflow for very long fds in the "&gt;&amp; fd" syntax.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2014-10071/">CVE-2014-10071 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-10071">CVE-2014-10071 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1082977">SUSE bug 1082977</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200039">SUSE bug 1200039</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824784" comment="zsh-5.0.2-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824785" comment="zsh-html-5.0.2-31.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201410072" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-10072</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-10072" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-10072" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-10072" ref_url="https://www.suse.com/security/cve/CVE-2014-10072" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010436.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1093-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GK62YTNMQ4SBUW42W4UTPSYBGUSFJAAP/#GK62YTNMQ4SBUW42W4UTPSYBGUSFJAAP" source="SUSE-SU"/>
    <description>
    In utils.c in zsh before 5.0.6, there is a buffer overflow when scanning very long directory paths for symbolic links.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2014-10072/">CVE-2014-10072 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-10072">CVE-2014-10072 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1082975">SUSE bug 1082975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200039">SUSE bug 1200039</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824784" comment="zsh-5.0.2-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824785" comment="zsh-html-5.0.2-31.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141492" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1492</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1492" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1492" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1492" ref_url="https://www.suse.com/security/cve/CVE-2014-1492" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000818.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0665-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000835.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0950-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DB6WRE6JPC5QZJWQRBXP2PVERDUUM5ND/#DB6WRE6JPC5QZJWQRBXP2PVERDUUM5ND" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LZWA5IC5L2QN74MAY2LDOH57OMCZY4GE/#LZWA5IC5L2QN74MAY2LDOH57OMCZY4GE" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    The cert_TestHostName function in lib/certdb/certdb.c in the certificate-checking implementation in Mozilla Network Security Services (NSS) before 3.16 accepts a wildcard character that is embedded in an internationalized domain name's U-label, which might allow man-in-the-middle attackers to spoof SSL servers via a crafted certificate.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1492/">CVE-2014-1492 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1492">CVE-2014-1492 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/869827">SUSE bug 869827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/926974">SUSE bug 926974</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820375" comment="nss-3.16.2-2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820376" comment="nss-devel-3.16.2-2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820377" comment="nss-pkcs11-devel-3.16.2-2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820378" comment="nss-softokn-3.16.2-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820379" comment="nss-softokn-devel-3.16.2-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820380" comment="nss-softokn-freebl-3.16.2-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820381" comment="nss-softokn-freebl-devel-3.16.2-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820382" comment="nss-sysinit-3.16.2-2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820383" comment="nss-tools-3.16.2-2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820384" comment="nss-util-3.16.2-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820385" comment="nss-util-devel-3.16.2-1.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141568" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1568</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1568" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1568" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1568" ref_url="https://www.suse.com/security/cve/CVE-2014-1568" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/001019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1220-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/001023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1220-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/001025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1220-4" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-October/001029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001078.html" source="SUSE-SU"/>
		<reference ref_id="TID7010867" ref_url="https://www.suse.com/support/kb/doc/?id=7010867" source="SUSE-SU"/>
		<reference ref_id="TID7015701" ref_url="https://www.suse.com/support/kb/doc/?id=7015701" source="SUSE-SU"/>
		<reference ref_id="TID7015705" ref_url="https://www.suse.com/support/kb/doc/?id=7015705" source="SUSE-SU"/>
		<reference ref_id="TID7015713" ref_url="https://www.suse.com/support/kb/doc/?id=7015713" source="SUSE-SU"/>
		<reference ref_id="TID7015715" ref_url="https://www.suse.com/support/kb/doc/?id=7015715" source="SUSE-SU"/>
		<reference ref_id="TID7015717" ref_url="https://www.suse.com/support/kb/doc/?id=7015717" source="SUSE-SU"/>
		<reference ref_id="TID7015720" ref_url="https://www.suse.com/support/kb/doc/?id=7015720" source="SUSE-SU"/>
		<reference ref_id="TID7016147" ref_url="https://www.suse.com/support/kb/doc/?id=7016147" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1224-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SQ4EL4CISW5HIJKILS5PUIHDIW4B2Y6V/#SQ4EL4CISW5HIJKILS5PUIHDIW4B2Y6V" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1232-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BU6KX44VFFFWDXMCJMG7UOHWR2JPQMWO/#BU6KX44VFFFWDXMCJMG7UOHWR2JPQMWO" source="SUSE-SU"/>
    <description>
    Mozilla Network Security Services (NSS) before 3.16.2.1, 3.16.x before 3.16.5, and 3.17.x before 3.17.1, as used in Mozilla Firefox before 32.0.3, Mozilla Firefox ESR 24.x before 24.8.1 and 31.x before 31.1.1, Mozilla Thunderbird before 24.8.1 and 31.x before 31.1.2, Mozilla SeaMonkey before 2.29.1, Google Chrome before 37.0.2062.124 on Windows and OS X, and Google Chrome OS before 37.0.2062.120, does not properly parse ASN.1 values in X.509 certificates, which makes it easier for remote attackers to spoof RSA signatures via a crafted certificate, aka a "signature malleability" issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-12-13"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1568/">CVE-2014-1568 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1568">CVE-2014-1568 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1107874">SUSE bug 1107874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/897890">SUSE bug 897890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898959">SUSE bug 898959</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820418" comment="nss-3.16.2-7.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820419" comment="nss-devel-3.16.2-7.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820420" comment="nss-pkcs11-devel-3.16.2-7.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820421" comment="nss-softokn-3.16.2-2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820422" comment="nss-softokn-devel-3.16.2-2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820423" comment="nss-softokn-freebl-3.16.2-2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820424" comment="nss-softokn-freebl-devel-3.16.2-2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820425" comment="nss-sysinit-3.16.2-7.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820426" comment="nss-tools-3.16.2-7.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820427" comment="nss-util-3.16.2-2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820428" comment="nss-util-devel-3.16.2-2.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141574" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1574</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1574" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1574" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1574" ref_url="https://www.suse.com/security/cve/CVE-2014-1574" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1458-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1458-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0138-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CPNOA6KEWHUDLFMZUY6VPIEPD5JXBXHK/#CPNOA6KEWHUDLFMZUY6VPIEPD5JXBXHK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VNGKNJGYZV377DMZMDSGTC6LXFPDDSY/#5VNGKNJGYZV377DMZMDSGTC6LXFPDDSY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 33.0, Firefox ESR 31.x before 31.2, and Thunderbird 31.x before 31.2 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-11-28"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1574/">CVE-2014-1574 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1574">CVE-2014-1574 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/900941">SUSE bug 900941</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820508" comment="firefox-31.2.0-3.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820509" comment="xulrunner-31.2.0-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820510" comment="xulrunner-devel-31.2.0-1.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141576" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1576</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1576" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1576" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1576" ref_url="https://www.suse.com/security/cve/CVE-2014-1576" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1458-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1458-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0138-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CPNOA6KEWHUDLFMZUY6VPIEPD5JXBXHK/#CPNOA6KEWHUDLFMZUY6VPIEPD5JXBXHK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VNGKNJGYZV377DMZMDSGTC6LXFPDDSY/#5VNGKNJGYZV377DMZMDSGTC6LXFPDDSY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the nsTransformedTextRun function in Mozilla Firefox before 33.0, Firefox ESR 31.x before 31.2, and Thunderbird 31.x before 31.2 allows remote attackers to execute arbitrary code via Cascading Style Sheets (CSS) token sequences that trigger changes to capitalization style.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-11-25"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1576/">CVE-2014-1576 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1576">CVE-2014-1576 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/900941">SUSE bug 900941</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820508" comment="firefox-31.2.0-3.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820509" comment="xulrunner-31.2.0-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820510" comment="xulrunner-devel-31.2.0-1.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141577" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1577</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1577" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1577" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1577" ref_url="https://www.suse.com/security/cve/CVE-2014-1577" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1458-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1458-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0138-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CPNOA6KEWHUDLFMZUY6VPIEPD5JXBXHK/#CPNOA6KEWHUDLFMZUY6VPIEPD5JXBXHK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VNGKNJGYZV377DMZMDSGTC6LXFPDDSY/#5VNGKNJGYZV377DMZMDSGTC6LXFPDDSY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    The mozilla::dom::OscillatorNodeEngine::ComputeCustom function in the Web Audio subsystem in Mozilla Firefox before 33.0, Firefox ESR 31.x before 31.2, and Thunderbird 31.x before 31.2 allows remote attackers to obtain sensitive information from process memory or cause a denial of service (out-of-bounds read, memory corruption, and application crash) via an invalid custom waveform that triggers a calculation of a negative frequency value.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-11-21"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1577/">CVE-2014-1577 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1577">CVE-2014-1577 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/900941">SUSE bug 900941</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820508" comment="firefox-31.2.0-3.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820509" comment="xulrunner-31.2.0-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820510" comment="xulrunner-devel-31.2.0-1.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141578" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1578</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1578" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1578" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1578" ref_url="https://www.suse.com/security/cve/CVE-2014-1578" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1458-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1458-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0138-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CPNOA6KEWHUDLFMZUY6VPIEPD5JXBXHK/#CPNOA6KEWHUDLFMZUY6VPIEPD5JXBXHK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VNGKNJGYZV377DMZMDSGTC6LXFPDDSY/#5VNGKNJGYZV377DMZMDSGTC6LXFPDDSY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    The get_tile function in Mozilla Firefox before 33.0, Firefox ESR 31.x before 31.2, and Thunderbird 31.x before 31.2 allows remote attackers to cause a denial of service (out-of-bounds write and application crash) or possibly execute arbitrary code via WebM frames with invalid tile sizes that are improperly handled in buffering operations during video playback.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-11-21"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1578/">CVE-2014-1578 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1578">CVE-2014-1578 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/900941">SUSE bug 900941</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820508" comment="firefox-31.2.0-3.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820509" comment="xulrunner-31.2.0-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820510" comment="xulrunner-devel-31.2.0-1.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141581" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1581</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1581" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1581" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1581" ref_url="https://www.suse.com/security/cve/CVE-2014-1581" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1458-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1458-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0138-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CPNOA6KEWHUDLFMZUY6VPIEPD5JXBXHK/#CPNOA6KEWHUDLFMZUY6VPIEPD5JXBXHK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VNGKNJGYZV377DMZMDSGTC6LXFPDDSY/#5VNGKNJGYZV377DMZMDSGTC6LXFPDDSY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in DirectionalityUtils.cpp in Mozilla Firefox before 33.0, Firefox ESR 31.x before 31.2, and Thunderbird 31.x before 31.2 allows remote attackers to execute arbitrary code via text that is improperly handled during the interaction between directionality resolution and layout.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-11-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1581/">CVE-2014-1581 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1581">CVE-2014-1581 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/900941">SUSE bug 900941</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820508" comment="firefox-31.2.0-3.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820509" comment="xulrunner-31.2.0-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820510" comment="xulrunner-devel-31.2.0-1.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141583" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1583</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1583" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1583" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1583" ref_url="https://www.suse.com/security/cve/CVE-2014-1583" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1458-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1458-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    The Alarm API in Mozilla Firefox before 33.0 and Firefox ESR 31.x before 31.2 does not properly restrict toJSON calls, which allows remote attackers to bypass the Same Origin Policy via crafted API calls that access sensitive information within the JSON data of an alarm.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-11-21"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1583/">CVE-2014-1583 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1583">CVE-2014-1583 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/900941">SUSE bug 900941</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820508" comment="firefox-31.2.0-3.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820509" comment="xulrunner-31.2.0-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820510" comment="xulrunner-devel-31.2.0-1.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141587" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1587</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1587" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1587" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1587" ref_url="https://www.suse.com/security/cve/CVE-2014-1587" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001109.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0138-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CPNOA6KEWHUDLFMZUY6VPIEPD5JXBXHK/#CPNOA6KEWHUDLFMZUY6VPIEPD5JXBXHK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VNGKNJGYZV377DMZMDSGTC6LXFPDDSY/#5VNGKNJGYZV377DMZMDSGTC6LXFPDDSY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 34.0, Firefox ESR 31.x before 31.3, Thunderbird before 31.3, and SeaMonkey before 2.31 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1587/">CVE-2014-1587 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1587">CVE-2014-1587 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/908009">SUSE bug 908009</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820619" comment="firefox-31.3.0-3.el7_0 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141590" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1590</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1590" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1590" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1590" ref_url="https://www.suse.com/security/cve/CVE-2014-1590" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001109.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0138-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CPNOA6KEWHUDLFMZUY6VPIEPD5JXBXHK/#CPNOA6KEWHUDLFMZUY6VPIEPD5JXBXHK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VNGKNJGYZV377DMZMDSGTC6LXFPDDSY/#5VNGKNJGYZV377DMZMDSGTC6LXFPDDSY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    The XMLHttpRequest.prototype.send method in Mozilla Firefox before 34.0, Firefox ESR 31.x before 31.3, Thunderbird before 31.3, and SeaMonkey before 2.31 allows remote attackers to cause a denial of service (application crash) via a crafted JavaScript object.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1590/">CVE-2014-1590 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1590">CVE-2014-1590 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/908009">SUSE bug 908009</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820619" comment="firefox-31.3.0-3.el7_0 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141592" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1592</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1592" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1592" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1592" ref_url="https://www.suse.com/security/cve/CVE-2014-1592" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001109.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0138-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CPNOA6KEWHUDLFMZUY6VPIEPD5JXBXHK/#CPNOA6KEWHUDLFMZUY6VPIEPD5JXBXHK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VNGKNJGYZV377DMZMDSGTC6LXFPDDSY/#5VNGKNJGYZV377DMZMDSGTC6LXFPDDSY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsHtml5TreeOperation function in xul.dll in Mozilla Firefox before 34.0, Firefox ESR 31.x before 31.3, Thunderbird before 31.3, and SeaMonkey before 2.31 allows remote attackers to execute arbitrary code by adding a second root element to an HTML5 document during parsing.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1592/">CVE-2014-1592 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1592">CVE-2014-1592 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/908009">SUSE bug 908009</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820619" comment="firefox-31.3.0-3.el7_0 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141593" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1593</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1593" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1593" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1593" ref_url="https://www.suse.com/security/cve/CVE-2014-1593" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001109.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0138-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CPNOA6KEWHUDLFMZUY6VPIEPD5JXBXHK/#CPNOA6KEWHUDLFMZUY6VPIEPD5JXBXHK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VNGKNJGYZV377DMZMDSGTC6LXFPDDSY/#5VNGKNJGYZV377DMZMDSGTC6LXFPDDSY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the mozilla::FileBlockCache::Read function in Mozilla Firefox before 34.0, Firefox ESR 31.x before 31.3, Thunderbird before 31.3, and SeaMonkey before 2.31 allows remote attackers to execute arbitrary code via crafted media content.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1593/">CVE-2014-1593 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1593">CVE-2014-1593 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/908009">SUSE bug 908009</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820619" comment="firefox-31.3.0-3.el7_0 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141594" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1594</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1594" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1594" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1594" ref_url="https://www.suse.com/security/cve/CVE-2014-1594" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001109.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0138-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CPNOA6KEWHUDLFMZUY6VPIEPD5JXBXHK/#CPNOA6KEWHUDLFMZUY6VPIEPD5JXBXHK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VNGKNJGYZV377DMZMDSGTC6LXFPDDSY/#5VNGKNJGYZV377DMZMDSGTC6LXFPDDSY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 34.0, Firefox ESR 31.x before 31.3, Thunderbird before 31.3, and SeaMonkey before 2.31 might allow remote attackers to execute arbitrary code by leveraging an incorrect cast from the BasicThebesLayer data type to the BasicContainerLayer data type.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1594/">CVE-2014-1594 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1594">CVE-2014-1594 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/908009">SUSE bug 908009</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820619" comment="firefox-31.3.0-3.el7_0 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141737" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1737</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1737" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1737" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1737" ref_url="https://www.suse.com/security/cve/CVE-2014-1737" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000880.html" source="SUSE-SU"/>
		<reference ref_id="TID7015062" ref_url="https://www.suse.com/support/kb/doc?id=7015062" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0677-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BCWIEOLJXTC6OSQ5E7LE3SLUJ5YQHDEU/#BCWIEOLJXTC6OSQ5E7LE3SLUJ5YQHDEU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0678-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EDN3IM3GY6YV6UDSEUSUOZ3MACM7TYS5/#EDN3IM3GY6YV6UDSEUSUOZ3MACM7TYS5" source="SUSE-SU"/>
    <description>
    The raw_cmd_copyin function in drivers/block/floppy.c in the Linux kernel through 3.14.3 does not properly handle error conditions during processing of an FDRAWCMD ioctl call, which allows local users to trigger kfree operations and gain privileges by leveraging write access to a /dev/fd device.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1737/">CVE-2014-1737 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1737">CVE-2014-1737 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1115893">SUSE bug 1115893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/875798">SUSE bug 875798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877345">SUSE bug 877345</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820206" comment="kernel-3.10.0-123.4.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820207" comment="kernel-abi-whitelists-3.10.0-123.4.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820208" comment="kernel-debug-3.10.0-123.4.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820211" comment="kernel-doc-3.10.0-123.4.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820212" comment="kernel-headers-3.10.0-123.4.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820213" comment="kernel-tools-3.10.0-123.4.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820214" comment="kernel-tools-libs-3.10.0-123.4.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820216" comment="perf-3.10.0-123.4.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820217" comment="python-perf-3.10.0-123.4.2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141738" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1738</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1738" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1738" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1738" ref_url="https://www.suse.com/security/cve/CVE-2014-1738" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000880.html" source="SUSE-SU"/>
		<reference ref_id="TID7015062" ref_url="https://www.suse.com/support/kb/doc?id=7015062" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0677-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BCWIEOLJXTC6OSQ5E7LE3SLUJ5YQHDEU/#BCWIEOLJXTC6OSQ5E7LE3SLUJ5YQHDEU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0678-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EDN3IM3GY6YV6UDSEUSUOZ3MACM7TYS5/#EDN3IM3GY6YV6UDSEUSUOZ3MACM7TYS5" source="SUSE-SU"/>
    <description>
    The raw_cmd_copyout function in drivers/block/floppy.c in the Linux kernel through 3.14.3 does not properly restrict access to certain pointers during processing of an FDRAWCMD ioctl call, which allows local users to obtain sensitive information from kernel heap memory by leveraging write access to a /dev/fd device.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1738/">CVE-2014-1738 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1738">CVE-2014-1738 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/875798">SUSE bug 875798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877345">SUSE bug 877345</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820206" comment="kernel-3.10.0-123.4.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820207" comment="kernel-abi-whitelists-3.10.0-123.4.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820208" comment="kernel-debug-3.10.0-123.4.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820211" comment="kernel-doc-3.10.0-123.4.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820212" comment="kernel-headers-3.10.0-123.4.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820213" comment="kernel-tools-3.10.0-123.4.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820214" comment="kernel-tools-libs-3.10.0-123.4.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820216" comment="perf-3.10.0-123.4.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820217" comment="python-perf-3.10.0-123.4.2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141739" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1739</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1739" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1739" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1739" ref_url="https://www.suse.com/security/cve/CVE-2014-1739" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/000987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-October/001038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-October/001040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1677-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KMCOHP6GELYLJBOOYH4FHHAYS7Q36GJY/#KMCOHP6GELYLJBOOYH4FHHAYS7Q36GJY" source="SUSE-SU"/>
    <description>
    The media_device_enum_entities function in drivers/media/media-device.c in the Linux kernel before 3.14.6 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel memory by leveraging /dev/media0 read access for a MEDIA_IOC_ENUM_ENTITIES ioctl call.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1739/">CVE-2014-1739 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1739">CVE-2014-1739 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/882804">SUSE bug 882804</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820632" comment="kernel-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820633" comment="kernel-abi-whitelists-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820634" comment="kernel-debug-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820637" comment="kernel-doc-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820638" comment="kernel-headers-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820639" comment="kernel-tools-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820640" comment="kernel-tools-libs-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820642" comment="perf-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820643" comment="python-perf-3.10.0-123.13.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141876" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1876</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1876" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1876" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1876" ref_url="https://www.suse.com/security/cve/CVE-2014-1876" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000839.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000843.html" source="SUSE-SU"/>
    <description>
    The unpacker::redirect_stdio function in unpack.cpp in unpack200 in OpenJDK 6, 7, and 8; Oracle Java SE 5.0u61, 6u71, 7u51, and 8; JRockit R27.8.1 and R28.3.1; and Java SE Embedded 7u51 does not securely create temporary files when a log file cannot be opened, which allows local users to overwrite arbitrary files via a symlink attack on /tmp/unpack.log.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1876/">CVE-2014-1876 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1876">CVE-2014-1876 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/863305">SUSE bug 863305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873872">SUSE bug 873872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877430">SUSE bug 877430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820169" comment="java-1.6.0-openjdk-1.6.0.0-6.1.13.3.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820170" comment="java-1.6.0-openjdk-demo-1.6.0.0-6.1.13.3.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820171" comment="java-1.6.0-openjdk-devel-1.6.0.0-6.1.13.3.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820172" comment="java-1.6.0-openjdk-javadoc-1.6.0.0-6.1.13.3.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820173" comment="java-1.6.0-openjdk-src-1.6.0.0-6.1.13.3.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820139" comment="java-1.7.0-openjdk-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820140" comment="java-1.7.0-openjdk-accessibility-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820141" comment="java-1.7.0-openjdk-demo-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820142" comment="java-1.7.0-openjdk-devel-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820143" comment="java-1.7.0-openjdk-headless-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820144" comment="java-1.7.0-openjdk-javadoc-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820145" comment="java-1.7.0-openjdk-src-1.7.0.55-2.4.7.2.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142397" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2397</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2397" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2397" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2397" ref_url="https://www.suse.com/security/cve/CVE-2014-2397" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000814.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u51 and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Hotspot.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2397/">CVE-2014-2397 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2397">CVE-2014-2397 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/873872">SUSE bug 873872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820169" comment="java-1.6.0-openjdk-1.6.0.0-6.1.13.3.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820170" comment="java-1.6.0-openjdk-demo-1.6.0.0-6.1.13.3.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820171" comment="java-1.6.0-openjdk-devel-1.6.0.0-6.1.13.3.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820172" comment="java-1.6.0-openjdk-javadoc-1.6.0.0-6.1.13.3.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820173" comment="java-1.6.0-openjdk-src-1.6.0.0-6.1.13.3.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820139" comment="java-1.7.0-openjdk-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820140" comment="java-1.7.0-openjdk-accessibility-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820141" comment="java-1.7.0-openjdk-demo-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820142" comment="java-1.7.0-openjdk-devel-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820143" comment="java-1.7.0-openjdk-headless-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820144" comment="java-1.7.0-openjdk-javadoc-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820145" comment="java-1.7.0-openjdk-src-1.7.0.55-2.4.7.2.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142398" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2398</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2398" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2398" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2398" ref_url="https://www.suse.com/security/cve/CVE-2014-2398" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000839.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000843.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u61, 6u71, 7u51, and 8; JavaFX 2.2.51; and JRockit R27.8.1 and R28.3.1 allows remote authenticated users to affect integrity via unknown vectors related to Javadoc.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2398/">CVE-2014-2398 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2398">CVE-2014-2398 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/873872">SUSE bug 873872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877430">SUSE bug 877430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820169" comment="java-1.6.0-openjdk-1.6.0.0-6.1.13.3.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820170" comment="java-1.6.0-openjdk-demo-1.6.0.0-6.1.13.3.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820171" comment="java-1.6.0-openjdk-devel-1.6.0.0-6.1.13.3.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820172" comment="java-1.6.0-openjdk-javadoc-1.6.0.0-6.1.13.3.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820173" comment="java-1.6.0-openjdk-src-1.6.0.0-6.1.13.3.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820139" comment="java-1.7.0-openjdk-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820140" comment="java-1.7.0-openjdk-accessibility-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820141" comment="java-1.7.0-openjdk-demo-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820142" comment="java-1.7.0-openjdk-devel-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820143" comment="java-1.7.0-openjdk-headless-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820144" comment="java-1.7.0-openjdk-javadoc-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820145" comment="java-1.7.0-openjdk-src-1.7.0.55-2.4.7.2.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142402" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2402</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2402" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2402" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2402" ref_url="https://www.suse.com/security/cve/CVE-2014-2402" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000843.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u51 and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2014-0432 and CVE-2014-0455.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2402/">CVE-2014-2402 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2402">CVE-2014-2402 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820139" comment="java-1.7.0-openjdk-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820140" comment="java-1.7.0-openjdk-accessibility-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820141" comment="java-1.7.0-openjdk-demo-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820142" comment="java-1.7.0-openjdk-devel-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820143" comment="java-1.7.0-openjdk-headless-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820144" comment="java-1.7.0-openjdk-javadoc-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820145" comment="java-1.7.0-openjdk-src-1.7.0.55-2.4.7.2.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142403" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2403</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2403" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2403" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2403" ref_url="https://www.suse.com/security/cve/CVE-2014-2403" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000814.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u71, 7u51, and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality via vectors related to JAXP.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2403/">CVE-2014-2403 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2403">CVE-2014-2403 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/873872">SUSE bug 873872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820169" comment="java-1.6.0-openjdk-1.6.0.0-6.1.13.3.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820170" comment="java-1.6.0-openjdk-demo-1.6.0.0-6.1.13.3.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820171" comment="java-1.6.0-openjdk-devel-1.6.0.0-6.1.13.3.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820172" comment="java-1.6.0-openjdk-javadoc-1.6.0.0-6.1.13.3.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820173" comment="java-1.6.0-openjdk-src-1.6.0.0-6.1.13.3.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820139" comment="java-1.7.0-openjdk-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820140" comment="java-1.7.0-openjdk-accessibility-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820141" comment="java-1.7.0-openjdk-demo-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820142" comment="java-1.7.0-openjdk-devel-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820143" comment="java-1.7.0-openjdk-headless-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820144" comment="java-1.7.0-openjdk-javadoc-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820145" comment="java-1.7.0-openjdk-src-1.7.0.55-2.4.7.2.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142412" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2412</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2412" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2412" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2412" ref_url="https://www.suse.com/security/cve/CVE-2014-2412" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000839.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000843.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u61, 6u71, SE 7u51, and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT, a different vulnerability than CVE-2014-0451.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2412/">CVE-2014-2412 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2412">CVE-2014-2412 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/873872">SUSE bug 873872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877430">SUSE bug 877430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820169" comment="java-1.6.0-openjdk-1.6.0.0-6.1.13.3.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820170" comment="java-1.6.0-openjdk-demo-1.6.0.0-6.1.13.3.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820171" comment="java-1.6.0-openjdk-devel-1.6.0.0-6.1.13.3.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820172" comment="java-1.6.0-openjdk-javadoc-1.6.0.0-6.1.13.3.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820173" comment="java-1.6.0-openjdk-src-1.6.0.0-6.1.13.3.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820139" comment="java-1.7.0-openjdk-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820140" comment="java-1.7.0-openjdk-accessibility-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820141" comment="java-1.7.0-openjdk-demo-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820142" comment="java-1.7.0-openjdk-devel-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820143" comment="java-1.7.0-openjdk-headless-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820144" comment="java-1.7.0-openjdk-javadoc-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820145" comment="java-1.7.0-openjdk-src-1.7.0.55-2.4.7.2.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142413" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2413</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2413" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2413" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2413" ref_url="https://www.suse.com/security/cve/CVE-2014-2413" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000814.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u51 and 8, and Java SE Embedded 7u51, allows remote attackers to affect integrity via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2413/">CVE-2014-2413 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2413">CVE-2014-2413 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820139" comment="java-1.7.0-openjdk-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820140" comment="java-1.7.0-openjdk-accessibility-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820141" comment="java-1.7.0-openjdk-demo-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820142" comment="java-1.7.0-openjdk-devel-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820143" comment="java-1.7.0-openjdk-headless-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820144" comment="java-1.7.0-openjdk-javadoc-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820145" comment="java-1.7.0-openjdk-src-1.7.0.55-2.4.7.2.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142414" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2414</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2414" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2414" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2414" ref_url="https://www.suse.com/security/cve/CVE-2014-2414" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000843.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u71, 7u51, and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JAXB.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2414/">CVE-2014-2414 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2414">CVE-2014-2414 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/873872">SUSE bug 873872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877430">SUSE bug 877430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820169" comment="java-1.6.0-openjdk-1.6.0.0-6.1.13.3.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820170" comment="java-1.6.0-openjdk-demo-1.6.0.0-6.1.13.3.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820171" comment="java-1.6.0-openjdk-devel-1.6.0.0-6.1.13.3.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820172" comment="java-1.6.0-openjdk-javadoc-1.6.0.0-6.1.13.3.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820173" comment="java-1.6.0-openjdk-src-1.6.0.0-6.1.13.3.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820139" comment="java-1.7.0-openjdk-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820140" comment="java-1.7.0-openjdk-accessibility-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820141" comment="java-1.7.0-openjdk-demo-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820142" comment="java-1.7.0-openjdk-devel-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820143" comment="java-1.7.0-openjdk-headless-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820144" comment="java-1.7.0-openjdk-javadoc-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820145" comment="java-1.7.0-openjdk-src-1.7.0.55-2.4.7.2.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142419" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2419</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2419" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2419" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2419" ref_url="https://www.suse.com/security/cve/CVE-2014-2419" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000857.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.35 and earlier and 5.6.15 and earlier allows remote authenticated users to affect availability via unknown vectors related to Partition.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2419/">CVE-2014-2419 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2419">CVE-2014-2419 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/873896">SUSE bug 873896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999706">SUSE bug 999706</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820187" comment="mariadb-5.5.37-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820188" comment="mariadb-bench-5.5.37-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820189" comment="mariadb-devel-5.5.37-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820190" comment="mariadb-embedded-5.5.37-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820191" comment="mariadb-embedded-devel-5.5.37-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820192" comment="mariadb-libs-5.5.37-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820193" comment="mariadb-server-5.5.37-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820194" comment="mariadb-test-5.5.37-1.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142421" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2421</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2421" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2421" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2421" ref_url="https://www.suse.com/security/cve/CVE-2014-2421" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000839.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000843.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u61, 6u71, 7u51, and 8; JavaFX 2.2.51; and Java SE Embedded 7u51 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2421/">CVE-2014-2421 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2421">CVE-2014-2421 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/873872">SUSE bug 873872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877430">SUSE bug 877430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820169" comment="java-1.6.0-openjdk-1.6.0.0-6.1.13.3.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820170" comment="java-1.6.0-openjdk-demo-1.6.0.0-6.1.13.3.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820171" comment="java-1.6.0-openjdk-devel-1.6.0.0-6.1.13.3.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820172" comment="java-1.6.0-openjdk-javadoc-1.6.0.0-6.1.13.3.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820173" comment="java-1.6.0-openjdk-src-1.6.0.0-6.1.13.3.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820139" comment="java-1.7.0-openjdk-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820140" comment="java-1.7.0-openjdk-accessibility-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820141" comment="java-1.7.0-openjdk-demo-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820142" comment="java-1.7.0-openjdk-devel-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820143" comment="java-1.7.0-openjdk-headless-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820144" comment="java-1.7.0-openjdk-javadoc-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820145" comment="java-1.7.0-openjdk-src-1.7.0.55-2.4.7.2.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142423" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2423</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2423" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2423" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2423" ref_url="https://www.suse.com/security/cve/CVE-2014-2423" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000843.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u71, 7u51, and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JAX-WS, a different vulnerability than CVE-2014-0452 and CVE-2014-0458.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2423/">CVE-2014-2423 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2423">CVE-2014-2423 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/873872">SUSE bug 873872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877430">SUSE bug 877430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820169" comment="java-1.6.0-openjdk-1.6.0.0-6.1.13.3.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820170" comment="java-1.6.0-openjdk-demo-1.6.0.0-6.1.13.3.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820171" comment="java-1.6.0-openjdk-devel-1.6.0.0-6.1.13.3.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820172" comment="java-1.6.0-openjdk-javadoc-1.6.0.0-6.1.13.3.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820173" comment="java-1.6.0-openjdk-src-1.6.0.0-6.1.13.3.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820139" comment="java-1.7.0-openjdk-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820140" comment="java-1.7.0-openjdk-accessibility-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820141" comment="java-1.7.0-openjdk-demo-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820142" comment="java-1.7.0-openjdk-devel-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820143" comment="java-1.7.0-openjdk-headless-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820144" comment="java-1.7.0-openjdk-javadoc-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820145" comment="java-1.7.0-openjdk-src-1.7.0.55-2.4.7.2.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142427" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2427</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2427" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2427" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2427" ref_url="https://www.suse.com/security/cve/CVE-2014-2427" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000839.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000843.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u61, 6u71, 7u51, and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Sound.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2427/">CVE-2014-2427 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2427">CVE-2014-2427 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/873872">SUSE bug 873872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877430">SUSE bug 877430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820169" comment="java-1.6.0-openjdk-1.6.0.0-6.1.13.3.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820170" comment="java-1.6.0-openjdk-demo-1.6.0.0-6.1.13.3.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820171" comment="java-1.6.0-openjdk-devel-1.6.0.0-6.1.13.3.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820172" comment="java-1.6.0-openjdk-javadoc-1.6.0.0-6.1.13.3.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820173" comment="java-1.6.0-openjdk-src-1.6.0.0-6.1.13.3.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820139" comment="java-1.7.0-openjdk-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820140" comment="java-1.7.0-openjdk-accessibility-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820141" comment="java-1.7.0-openjdk-demo-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820142" comment="java-1.7.0-openjdk-devel-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820143" comment="java-1.7.0-openjdk-headless-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820144" comment="java-1.7.0-openjdk-javadoc-1.7.0.55-2.4.7.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820145" comment="java-1.7.0-openjdk-src-1.7.0.55-2.4.7.2.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142430" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2430</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2430" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2430" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2430" ref_url="https://www.suse.com/security/cve/CVE-2014-2430" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000857.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.36 and earlier and 5.6.16 and earlier allows remote authenticated users to affect availability via unknown vectors related to Performance Schema.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2430/">CVE-2014-2430 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2430">CVE-2014-2430 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/873896">SUSE bug 873896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999706">SUSE bug 999706</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820187" comment="mariadb-5.5.37-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820188" comment="mariadb-bench-5.5.37-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820189" comment="mariadb-devel-5.5.37-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820190" comment="mariadb-embedded-5.5.37-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820191" comment="mariadb-embedded-devel-5.5.37-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820192" comment="mariadb-libs-5.5.37-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820193" comment="mariadb-server-5.5.37-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820194" comment="mariadb-test-5.5.37-1.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142431" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2431</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2431" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2431" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2431" ref_url="https://www.suse.com/security/cve/CVE-2014-2431" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000857.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.36 and earlier and 5.6.16 and earlier allows remote attackers to affect availability via unknown vectors related to Options.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2431/">CVE-2014-2431 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2431">CVE-2014-2431 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/873896">SUSE bug 873896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999706">SUSE bug 999706</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820187" comment="mariadb-5.5.37-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820188" comment="mariadb-bench-5.5.37-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820189" comment="mariadb-devel-5.5.37-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820190" comment="mariadb-embedded-5.5.37-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820191" comment="mariadb-embedded-devel-5.5.37-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820192" comment="mariadb-libs-5.5.37-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820193" comment="mariadb-server-5.5.37-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820194" comment="mariadb-test-5.5.37-1.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142432" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2432</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2432" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2432" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2432" ref_url="https://www.suse.com/security/cve/CVE-2014-2432" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000857.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability Oracle the MySQL Server component 5.5.35 and earlier and 5.6.15 and earlier allows remote authenticated users to affect availability via unknown vectors related to Federated.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2432/">CVE-2014-2432 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2432">CVE-2014-2432 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/873896">SUSE bug 873896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999706">SUSE bug 999706</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820187" comment="mariadb-5.5.37-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820188" comment="mariadb-bench-5.5.37-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820189" comment="mariadb-devel-5.5.37-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820190" comment="mariadb-embedded-5.5.37-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820191" comment="mariadb-embedded-devel-5.5.37-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820192" comment="mariadb-libs-5.5.37-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820193" comment="mariadb-server-5.5.37-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820194" comment="mariadb-test-5.5.37-1.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142436" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2436</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2436" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2436" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2436" ref_url="https://www.suse.com/security/cve/CVE-2014-2436" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000857.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.36 and earlier and 5.6.16 and earlier allows remote authenticated users to affect confidentiality, integrity, and availability via vectors related to RBR.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2436/">CVE-2014-2436 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2436">CVE-2014-2436 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/873896">SUSE bug 873896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999706">SUSE bug 999706</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820187" comment="mariadb-5.5.37-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820188" comment="mariadb-bench-5.5.37-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820189" comment="mariadb-devel-5.5.37-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820190" comment="mariadb-embedded-5.5.37-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820191" comment="mariadb-embedded-devel-5.5.37-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820192" comment="mariadb-libs-5.5.37-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820193" comment="mariadb-server-5.5.37-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820194" comment="mariadb-test-5.5.37-1.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142438" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2438</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2438" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2438" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2438" ref_url="https://www.suse.com/security/cve/CVE-2014-2438" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000857.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.35 and earlier and 5.6.15 and earlier allows remote authenticated users to affect availability via unknown vectors related to Replication.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2438/">CVE-2014-2438 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2438">CVE-2014-2438 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/873896">SUSE bug 873896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999706">SUSE bug 999706</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820187" comment="mariadb-5.5.37-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820188" comment="mariadb-bench-5.5.37-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820189" comment="mariadb-devel-5.5.37-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820190" comment="mariadb-embedded-5.5.37-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820191" comment="mariadb-embedded-devel-5.5.37-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820192" comment="mariadb-libs-5.5.37-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820193" comment="mariadb-server-5.5.37-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820194" comment="mariadb-test-5.5.37-1.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142440" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2440</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2440" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2440" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2440" ref_url="https://www.suse.com/security/cve/CVE-2014-2440" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000857.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the MySQL Client component in Oracle MySQL 5.5.36 and earlier and 5.6.16 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2440/">CVE-2014-2440 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2440">CVE-2014-2440 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/873896">SUSE bug 873896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999706">SUSE bug 999706</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820187" comment="mariadb-5.5.37-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820188" comment="mariadb-bench-5.5.37-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820189" comment="mariadb-devel-5.5.37-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820190" comment="mariadb-embedded-5.5.37-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820191" comment="mariadb-embedded-devel-5.5.37-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820192" comment="mariadb-libs-5.5.37-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820193" comment="mariadb-server-5.5.37-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820194" comment="mariadb-test-5.5.37-1.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2494</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2494" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2494" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2494" ref_url="https://www.suse.com/security/cve/CVE-2014-2494" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001353.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.37 and earlier allows remote authenticated users to affect availability via vectors related to ENARC.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2494/">CVE-2014-2494 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2494">CVE-2014-2494 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/887580">SUSE bug 887580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915914">SUSE bug 915914</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820594" comment="mariadb-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820595" comment="mariadb-bench-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820596" comment="mariadb-devel-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820597" comment="mariadb-embedded-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820598" comment="mariadb-embedded-devel-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820599" comment="mariadb-libs-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820600" comment="mariadb-server-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820601" comment="mariadb-test-5.5.40-1.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142497" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2497</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2497" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2497" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2497" ref_url="https://www.suse.com/security/cve/CVE-2014-2497" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0868-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0873-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000901.html" source="SUSE-SU"/>
    <description>
    The gdImageCreateFromXpm function in gdxpm.c in libgd, as used in PHP 5.4.26 and earlier, allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted color table in an XPM file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2497/">CVE-2014-2497 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2497">CVE-2014-2497 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/868624">SUSE bug 868624</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820432" comment="php-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820433" comment="php-bcmath-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820434" comment="php-cli-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820435" comment="php-common-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820436" comment="php-dba-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820437" comment="php-devel-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820438" comment="php-embedded-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820439" comment="php-enchant-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820440" comment="php-fpm-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820441" comment="php-gd-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820442" comment="php-intl-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820443" comment="php-ldap-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820444" comment="php-mbstring-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820445" comment="php-mysql-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820446" comment="php-mysqlnd-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820447" comment="php-odbc-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820448" comment="php-pdo-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820449" comment="php-pgsql-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820450" comment="php-process-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820451" comment="php-pspell-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820452" comment="php-recode-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820453" comment="php-snmp-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820454" comment="php-soap-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820455" comment="php-xml-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820456" comment="php-xmlrpc-5.4.16-23.el7_0.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142568" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2568</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2568" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2568" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2568" ref_url="https://www.suse.com/security/cve/CVE-2014-2568" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OC7663UNXLKFWJKPITRGQNF4FU4KJWNK/#OC7663UNXLKFWJKPITRGQNF4FU4KJWNK" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nfqnl_zcopy function in net/netfilter/nfnetlink_queue_core.c in the Linux kernel through 3.13.6 allows attackers to obtain sensitive information from kernel memory by leveraging the absence of a certain orphaning operation. NOTE: the affected code was moved to the skb_zerocopy function in net/core/skbuff.c before the vulnerability was announced.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2568/">CVE-2014-2568 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2568">CVE-2014-2568 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/869564">SUSE bug 869564</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820206" comment="kernel-3.10.0-123.4.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820207" comment="kernel-abi-whitelists-3.10.0-123.4.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820208" comment="kernel-debug-3.10.0-123.4.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820211" comment="kernel-doc-3.10.0-123.4.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820212" comment="kernel-headers-3.10.0-123.4.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820213" comment="kernel-tools-3.10.0-123.4.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820214" comment="kernel-tools-libs-3.10.0-123.4.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820216" comment="perf-3.10.0-123.4.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820217" comment="python-perf-3.10.0-123.4.2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142653" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2653</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2653" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2653" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2653" ref_url="https://www.suse.com/security/cve/CVE-2014-2653" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000878.html" source="SUSE-SU"/>
    <description>
    The verify_host_key function in sshconnect.c in the client in OpenSSH 6.6 and earlier allows remote servers to trigger the skipping of SSHFP DNS RR checking by presenting an unacceptable HostCertificate.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2653/">CVE-2014-2653 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2653">CVE-2014-2653 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1074631">SUSE bug 1074631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/870532">SUSE bug 870532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913479">SUSE bug 913479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916239">SUSE bug 916239</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820874" comment="openssh-6.6.1p1-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820875" comment="openssh-askpass-6.6.1p1-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820876" comment="openssh-clients-6.6.1p1-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820877" comment="openssh-keycat-6.6.1p1-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820878" comment="openssh-ldap-6.6.1p1-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820879" comment="openssh-server-6.6.1p1-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820880" comment="openssh-server-sysvinit-6.6.1p1-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820881" comment="pam_ssh_agent_auth-0.9.3-9.11.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142672" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2672</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2672" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2672" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2672" ref_url="https://www.suse.com/security/cve/CVE-2014-2672" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000882.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0677-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BCWIEOLJXTC6OSQ5E7LE3SLUJ5YQHDEU/#BCWIEOLJXTC6OSQ5E7LE3SLUJ5YQHDEU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0678-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EDN3IM3GY6YV6UDSEUSUOZ3MACM7TYS5/#EDN3IM3GY6YV6UDSEUSUOZ3MACM7TYS5" source="SUSE-SU"/>
    <description>
    Race condition in the ath_tx_aggr_sleep function in drivers/net/wireless/ath/ath9k/xmit.c in the Linux kernel before 3.13.7 allows remote attackers to cause a denial of service (system crash) via a large amount of network traffic that triggers certain list deletions.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2672/">CVE-2014-2672 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2672">CVE-2014-2672 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/871148">SUSE bug 871148</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820353" comment="kernel-3.10.0-123.6.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820354" comment="kernel-abi-whitelists-3.10.0-123.6.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820355" comment="kernel-debug-3.10.0-123.6.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820358" comment="kernel-doc-3.10.0-123.6.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820359" comment="kernel-headers-3.10.0-123.6.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820360" comment="kernel-tools-3.10.0-123.6.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820361" comment="kernel-tools-libs-3.10.0-123.6.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820363" comment="perf-3.10.0-123.6.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820364" comment="python-perf-3.10.0-123.6.3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142673" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2673</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2673" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2673" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2673" ref_url="https://www.suse.com/security/cve/CVE-2014-2673" source="SUSE CVE"/>
    <description>
    The arch_dup_task_struct function in the Transactional Memory (TM) implementation in arch/powerpc/kernel/process.c in the Linux kernel before 3.13.7 on the powerpc platform does not properly interact with the clone and fork system calls, which allows local users to cause a denial of service (Program Check and system crash) via certain instructions that are executed with the processor in the Transactional state.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2673/">CVE-2014-2673 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2673">CVE-2014-2673 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/871149">SUSE bug 871149</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820353" comment="kernel-3.10.0-123.6.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820354" comment="kernel-abi-whitelists-3.10.0-123.6.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820355" comment="kernel-debug-3.10.0-123.6.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820358" comment="kernel-doc-3.10.0-123.6.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820359" comment="kernel-headers-3.10.0-123.6.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820360" comment="kernel-tools-3.10.0-123.6.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820361" comment="kernel-tools-libs-3.10.0-123.6.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820363" comment="perf-3.10.0-123.6.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820364" comment="python-perf-3.10.0-123.6.3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142706" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2706</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2706" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2706" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2706" ref_url="https://www.suse.com/security/cve/CVE-2014-2706" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/000987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-October/001038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-October/001040.html" source="SUSE-SU"/>
    <description>
    Race condition in the mac80211 subsystem in the Linux kernel before 3.13.7 allows remote attackers to cause a denial of service (system crash) via network traffic that improperly interacts with the WLAN_STA_PS_STA state (aka power-save mode), related to sta_info.c and tx.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2706/">CVE-2014-2706 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2706">CVE-2014-2706 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1115893">SUSE bug 1115893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871797">SUSE bug 871797</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820353" comment="kernel-3.10.0-123.6.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820354" comment="kernel-abi-whitelists-3.10.0-123.6.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820355" comment="kernel-debug-3.10.0-123.6.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820358" comment="kernel-doc-3.10.0-123.6.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820359" comment="kernel-headers-3.10.0-123.6.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820360" comment="kernel-tools-3.10.0-123.6.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820361" comment="kernel-tools-libs-3.10.0-123.6.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820363" comment="perf-3.10.0-123.6.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820364" comment="python-perf-3.10.0-123.6.3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142851" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2851</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2851" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2851" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2851" ref_url="https://www.suse.com/security/cve/CVE-2014-2851" source="SUSE CVE"/>
		<reference ref_id="SUSE-OU-2014:0907-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2014-July/002089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/000987.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0840-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XLXCCGEHVD47C5H2TLO2QIAAI7G5NSQU/#XLXCCGEHVD47C5H2TLO2QIAAI7G5NSQU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0856-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SEEEAGWYAN5SF226ACFJ347RDR4VKF5Z/#SEEEAGWYAN5SF226ACFJ347RDR4VKF5Z" source="SUSE-SU"/>
    <description>
    Integer overflow in the ping_init_sock function in net/ipv4/ping.c in the Linux kernel through 3.14.1 allows local users to cause a denial of service (use-after-free and system crash) or possibly gain privileges via a crafted application that leverages an improperly managed reference counter.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2851/">CVE-2014-2851 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2851">CVE-2014-2851 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/824295">SUSE bug 824295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873374">SUSE bug 873374</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820206" comment="kernel-3.10.0-123.4.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820207" comment="kernel-abi-whitelists-3.10.0-123.4.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820208" comment="kernel-debug-3.10.0-123.4.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820211" comment="kernel-doc-3.10.0-123.4.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820212" comment="kernel-headers-3.10.0-123.4.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820213" comment="kernel-tools-3.10.0-123.4.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820214" comment="kernel-tools-libs-3.10.0-123.4.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820216" comment="perf-3.10.0-123.4.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820217" comment="python-perf-3.10.0-123.4.2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142894" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2894</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2894" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2894" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2894" ref_url="https://www.suse.com/security/cve/CVE-2014-2894" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000876.html" source="SUSE-SU"/>
    <description>
    Off-by-one error in the cmd_smart function in the smart self test in hw/ide/core.c in QEMU before 2.0 allows local users to have unspecified impact via a SMART EXECUTE OFFLINE command that triggers a buffer underflow and memory corruption.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2894/">CVE-2014-2894 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2894">CVE-2014-2894 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/874749">SUSE bug 874749</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820198" comment="libcacard-1.5.3-60.el7_0.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820199" comment="libcacard-devel-1.5.3-60.el7_0.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820200" comment="libcacard-tools-1.5.3-60.el7_0.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820201" comment="qemu-guest-agent-1.5.3-60.el7_0.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820202" comment="qemu-img-1.5.3-60.el7_0.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820203" comment="qemu-kvm-1.5.3-60.el7_0.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820204" comment="qemu-kvm-common-1.5.3-60.el7_0.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820205" comment="qemu-kvm-tools-1.5.3-60.el7_0.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143144" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3144</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3144" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3144" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3144" ref_url="https://www.suse.com/security/cve/CVE-2014-3144" source="SUSE CVE"/>
		<reference ref_id="SUSE-OU-2014:0907-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2014-July/002089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/000987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/001005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0840-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XLXCCGEHVD47C5H2TLO2QIAAI7G5NSQU/#XLXCCGEHVD47C5H2TLO2QIAAI7G5NSQU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0957-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GO7GJ4UCFKZBCYTCLG7H63BO55AEZN76/#GO7GJ4UCFKZBCYTCLG7H63BO55AEZN76" source="SUSE-SU"/>
    <description>
    The (1) BPF_S_ANC_NLATTR and (2) BPF_S_ANC_NLATTR_NEST extension implementations in the sk_run_filter function in net/core/filter.c in the Linux kernel through 3.14.3 do not check whether a certain length value is sufficiently large, which allows local users to cause a denial of service (integer underflow and system crash) via crafted BPF instructions.  NOTE: the affected code was moved to the __skb_get_nlattr and __skb_get_nlattr_nest functions before the vulnerability was announced.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3144/">CVE-2014-3144 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3144">CVE-2014-3144 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/824295">SUSE bug 824295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877257">SUSE bug 877257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889071">SUSE bug 889071</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820206" comment="kernel-3.10.0-123.4.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820207" comment="kernel-abi-whitelists-3.10.0-123.4.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820208" comment="kernel-debug-3.10.0-123.4.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820211" comment="kernel-doc-3.10.0-123.4.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820212" comment="kernel-headers-3.10.0-123.4.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820213" comment="kernel-tools-3.10.0-123.4.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820214" comment="kernel-tools-libs-3.10.0-123.4.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820216" comment="perf-3.10.0-123.4.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820217" comment="python-perf-3.10.0-123.4.2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143145" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3145</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3145" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3145" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3145" ref_url="https://www.suse.com/security/cve/CVE-2014-3145" source="SUSE CVE"/>
		<reference ref_id="SUSE-OU-2014:0907-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2014-July/002089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/000987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/001005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0840-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XLXCCGEHVD47C5H2TLO2QIAAI7G5NSQU/#XLXCCGEHVD47C5H2TLO2QIAAI7G5NSQU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0957-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GO7GJ4UCFKZBCYTCLG7H63BO55AEZN76/#GO7GJ4UCFKZBCYTCLG7H63BO55AEZN76" source="SUSE-SU"/>
    <description>
    The BPF_S_ANC_NLATTR_NEST extension implementation in the sk_run_filter function in net/core/filter.c in the Linux kernel through 3.14.3 uses the reverse order in a certain subtraction, which allows local users to cause a denial of service (over-read and system crash) via crafted BPF instructions.  NOTE: the affected code was moved to the __skb_get_nlattr_nest function before the vulnerability was announced.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3145/">CVE-2014-3145 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3145">CVE-2014-3145 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/824295">SUSE bug 824295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877257">SUSE bug 877257</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820206" comment="kernel-3.10.0-123.4.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820207" comment="kernel-abi-whitelists-3.10.0-123.4.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820208" comment="kernel-debug-3.10.0-123.4.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820211" comment="kernel-doc-3.10.0-123.4.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820212" comment="kernel-headers-3.10.0-123.4.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820213" comment="kernel-tools-3.10.0-123.4.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820214" comment="kernel-tools-libs-3.10.0-123.4.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820216" comment="perf-3.10.0-123.4.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820217" comment="python-perf-3.10.0-123.4.2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143153" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3153</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3153" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3153" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3153" ref_url="https://www.suse.com/security/cve/CVE-2014-3153" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0837-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-October/001040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0840-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XLXCCGEHVD47C5H2TLO2QIAAI7G5NSQU/#XLXCCGEHVD47C5H2TLO2QIAAI7G5NSQU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0856-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SEEEAGWYAN5SF226ACFJ347RDR4VKF5Z/#SEEEAGWYAN5SF226ACFJ347RDR4VKF5Z" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0878-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XHN7RK7XDM3RYDYKQP5MRVZGMURCOHLB/#XHN7RK7XDM3RYDYKQP5MRVZGMURCOHLB" source="SUSE-SU"/>
    <description>
    The futex_requeue function in kernel/futex.c in the Linux kernel through 3.14.5 does not ensure that calls have two different futex addresses, which allows local users to gain privileges via a crafted FUTEX_REQUEUE command that facilitates unsafe waiter modification.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3153/">CVE-2014-3153 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3153">CVE-2014-3153 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/877775">SUSE bug 877775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880892">SUSE bug 880892</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882228">SUSE bug 882228</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820206" comment="kernel-3.10.0-123.4.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820207" comment="kernel-abi-whitelists-3.10.0-123.4.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820208" comment="kernel-debug-3.10.0-123.4.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820211" comment="kernel-doc-3.10.0-123.4.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820212" comment="kernel-headers-3.10.0-123.4.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820213" comment="kernel-tools-3.10.0-123.4.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820214" comment="kernel-tools-libs-3.10.0-123.4.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820216" comment="perf-3.10.0-123.4.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820217" comment="python-perf-3.10.0-123.4.2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143181" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3181</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3181" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3181" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3181" ref_url="https://www.suse.com/security/cve/CVE-2014-3181" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1693-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001282.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1669-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GDZOTMP2VOUC5CTGQ542UWQZWRTOES4X/#GDZOTMP2VOUC5CTGQ542UWQZWRTOES4X" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1677-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KMCOHP6GELYLJBOOYH4FHHAYS7Q36GJY/#KMCOHP6GELYLJBOOYH4FHHAYS7Q36GJY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/45VR2J6DOCMZ7DOFZ5B4QZ5CLCL3DYNQ/#45VR2J6DOCMZ7DOFZ5B4QZ5CLCL3DYNQ" source="SUSE-SU"/>
    <description>
    Multiple stack-based buffer overflows in the magicmouse_raw_event function in drivers/hid/hid-magicmouse.c in the Magic Mouse HID driver in the Linux kernel through 3.16.3 allow physically proximate attackers to cause a denial of service (system crash) or possibly execute arbitrary code via a crafted device that provides a large amount of (1) EHCI or (2) XHCI data associated with an event.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3181/">CVE-2014-3181 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3181">CVE-2014-3181 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/896382">SUSE bug 896382</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820632" comment="kernel-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820633" comment="kernel-abi-whitelists-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820634" comment="kernel-debug-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820637" comment="kernel-doc-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820638" comment="kernel-headers-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820639" comment="kernel-tools-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820640" comment="kernel-tools-libs-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820642" comment="perf-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820643" comment="python-perf-3.10.0-123.13.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3182</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3182" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3182" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3182" ref_url="https://www.suse.com/security/cve/CVE-2014-3182" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:1669-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GDZOTMP2VOUC5CTGQ542UWQZWRTOES4X/#GDZOTMP2VOUC5CTGQ542UWQZWRTOES4X" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1677-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KMCOHP6GELYLJBOOYH4FHHAYS7Q36GJY/#KMCOHP6GELYLJBOOYH4FHHAYS7Q36GJY" source="SUSE-SU"/>
    <description>
    Array index error in the logi_dj_raw_event function in drivers/hid/hid-logitech-dj.c in the Linux kernel before 3.16.2 allows physically proximate attackers to execute arbitrary code or cause a denial of service (invalid kfree) via a crafted device that provides a malformed REPORT_TYPE_NOTIF_DEVICE_UNPAIRED value.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3182/">CVE-2014-3182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3182">CVE-2014-3182 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/896385">SUSE bug 896385</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820632" comment="kernel-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820633" comment="kernel-abi-whitelists-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820634" comment="kernel-debug-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820637" comment="kernel-doc-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820638" comment="kernel-headers-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820639" comment="kernel-tools-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820640" comment="kernel-tools-libs-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820642" comment="perf-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820643" comment="python-perf-3.10.0-123.13.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143184" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3184</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3184" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3184" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3184" ref_url="https://www.suse.com/security/cve/CVE-2014-3184" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1693-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001368.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1669-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GDZOTMP2VOUC5CTGQ542UWQZWRTOES4X/#GDZOTMP2VOUC5CTGQ542UWQZWRTOES4X" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1677-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KMCOHP6GELYLJBOOYH4FHHAYS7Q36GJY/#KMCOHP6GELYLJBOOYH4FHHAYS7Q36GJY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/45VR2J6DOCMZ7DOFZ5B4QZ5CLCL3DYNQ/#45VR2J6DOCMZ7DOFZ5B4QZ5CLCL3DYNQ" source="SUSE-SU"/>
    <description>
    The report_fixup functions in the HID subsystem in the Linux kernel before 3.16.2 might allow physically proximate attackers to cause a denial of service (out-of-bounds write) via a crafted device that provides a small report descriptor, related to (1) drivers/hid/hid-cherry.c, (2) drivers/hid/hid-kye.c, (3) drivers/hid/hid-lg.c, (4) drivers/hid/hid-monterey.c, (5) drivers/hid/hid-petalynx.c, and (6) drivers/hid/hid-sunplus.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3184/">CVE-2014-3184 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3184">CVE-2014-3184 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/896390">SUSE bug 896390</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820632" comment="kernel-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820633" comment="kernel-abi-whitelists-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820634" comment="kernel-debug-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820637" comment="kernel-doc-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820638" comment="kernel-headers-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820639" comment="kernel-tools-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820640" comment="kernel-tools-libs-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820642" comment="perf-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820643" comment="python-perf-3.10.0-123.13.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3185</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3185" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3185" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3185" ref_url="https://www.suse.com/security/cve/CVE-2014-3185" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1693-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001368.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1669-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GDZOTMP2VOUC5CTGQ542UWQZWRTOES4X/#GDZOTMP2VOUC5CTGQ542UWQZWRTOES4X" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1677-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KMCOHP6GELYLJBOOYH4FHHAYS7Q36GJY/#KMCOHP6GELYLJBOOYH4FHHAYS7Q36GJY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/45VR2J6DOCMZ7DOFZ5B4QZ5CLCL3DYNQ/#45VR2J6DOCMZ7DOFZ5B4QZ5CLCL3DYNQ" source="SUSE-SU"/>
    <description>
    Multiple buffer overflows in the command_port_read_callback function in drivers/usb/serial/whiteheat.c in the Whiteheat USB Serial Driver in the Linux kernel before 3.16.2 allow physically proximate attackers to execute arbitrary code or cause a denial of service (memory corruption and system crash) via a crafted device that provides a large amount of (1) EHCI or (2) XHCI data associated with a bulk response.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3185/">CVE-2014-3185 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3185">CVE-2014-3185 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/896391">SUSE bug 896391</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820632" comment="kernel-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820633" comment="kernel-abi-whitelists-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820634" comment="kernel-debug-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820637" comment="kernel-doc-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820638" comment="kernel-headers-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820639" comment="kernel-tools-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820640" comment="kernel-tools-libs-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820642" comment="perf-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820643" comment="python-perf-3.10.0-123.13.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143186" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3186</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3186" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3186" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3186" ref_url="https://www.suse.com/security/cve/CVE-2014-3186" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1693-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001282.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1669-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GDZOTMP2VOUC5CTGQ542UWQZWRTOES4X/#GDZOTMP2VOUC5CTGQ542UWQZWRTOES4X" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1677-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KMCOHP6GELYLJBOOYH4FHHAYS7Q36GJY/#KMCOHP6GELYLJBOOYH4FHHAYS7Q36GJY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/45VR2J6DOCMZ7DOFZ5B4QZ5CLCL3DYNQ/#45VR2J6DOCMZ7DOFZ5B4QZ5CLCL3DYNQ" source="SUSE-SU"/>
    <description>
    Buffer overflow in the picolcd_raw_event function in devices/hid/hid-picolcd_core.c in the PicoLCD HID device driver in the Linux kernel through 3.16.3, as used in Android on Nexus 7 devices, allows physically proximate attackers to cause a denial of service (system crash) or possibly execute arbitrary code via a crafted device that sends a large report.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3186/">CVE-2014-3186 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3186">CVE-2014-3186 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/896392">SUSE bug 896392</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820632" comment="kernel-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820633" comment="kernel-abi-whitelists-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820634" comment="kernel-debug-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820637" comment="kernel-doc-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820638" comment="kernel-headers-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820639" comment="kernel-tools-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820640" comment="kernel-tools-libs-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820642" comment="perf-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820643" comment="python-perf-3.10.0-123.13.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143461" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3461</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3461" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3461" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3461" ref_url="https://www.suse.com/security/cve/CVE-2014-3461" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-October/001032.html" source="SUSE-SU"/>
    <description>
    hw/usb/bus.c in QEMU 1.6.2 allows remote attackers to execute arbitrary code via crafted savevm data, which triggers a heap-based buffer overflow, related to "USB post load checks."
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3461/">CVE-2014-3461 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3461">CVE-2014-3461 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/878541">SUSE bug 878541</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820289" comment="libcacard-1.5.3-60.el7_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820290" comment="libcacard-devel-1.5.3-60.el7_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820291" comment="libcacard-tools-1.5.3-60.el7_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820292" comment="qemu-guest-agent-1.5.3-60.el7_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820293" comment="qemu-img-1.5.3-60.el7_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820294" comment="qemu-kvm-1.5.3-60.el7_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820295" comment="qemu-kvm-common-1.5.3-60.el7_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820296" comment="qemu-kvm-tools-1.5.3-60.el7_0.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143465" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3465</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3465" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3465" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3465" ref_url="https://www.suse.com/security/cve/CVE-2014-3465" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:0763-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S676DGYNY2BR7J3COCIW32BRURHUOD45/#S676DGYNY2BR7J3COCIW32BRURHUOD45" source="SUSE-SU"/>
    <description>
    The gnutls_x509_dn_oid_name function in lib/x509/common.c in GnuTLS 3.0 before 3.1.20 and 3.2.x before 3.2.10 allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted X.509 certificate, related to a missing LDAP description for an OID when printing the DN.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3465/">CVE-2014-3465 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3465">CVE-2014-3465 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/880733">SUSE bug 880733</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820164" comment="gnutls-3.1.18-9.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820165" comment="gnutls-c++-3.1.18-9.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820166" comment="gnutls-dane-3.1.18-9.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820167" comment="gnutls-devel-3.1.18-9.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820168" comment="gnutls-utils-3.1.18-9.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143466" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3466</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3466" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3466" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3466" ref_url="https://www.suse.com/security/cve/CVE-2014-3466" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0758-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0758-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0788-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000871.html" source="SUSE-SU"/>
		<reference ref_id="TID7010867" ref_url="https://www.suse.com/support/kb/doc/?id=7010867" source="SUSE-SU"/>
		<reference ref_id="TID7015302" ref_url="https://www.suse.com/support/kb/doc?id=7015302" source="SUSE-SU"/>
		<reference ref_id="TID7015303" ref_url="https://www.suse.com/support/kb/doc?id=7015303" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0763-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S676DGYNY2BR7J3COCIW32BRURHUOD45/#S676DGYNY2BR7J3COCIW32BRURHUOD45" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0767-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4OHW67DFU7MD62PKCVRYEI4WYKTTDW2A/#4OHW67DFU7MD62PKCVRYEI4WYKTTDW2A" source="SUSE-SU"/>
    <description>
    Buffer overflow in the read_server_hello function in lib/gnutls_handshake.c in GnuTLS before 3.1.25, 3.2.x before 3.2.15, and 3.3.x before 3.3.4 allows remote servers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a long session id in a ServerHello message.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3466/">CVE-2014-3466 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3466">CVE-2014-3466 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/880730">SUSE bug 880730</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820164" comment="gnutls-3.1.18-9.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820165" comment="gnutls-c++-3.1.18-9.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820166" comment="gnutls-dane-3.1.18-9.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820167" comment="gnutls-devel-3.1.18-9.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820168" comment="gnutls-utils-3.1.18-9.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143467" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3467</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3467" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3467" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3467" ref_url="https://www.suse.com/security/cve/CVE-2014-3467" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0788-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0931-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000933.html" source="SUSE-SU"/>
		<reference ref_id="TID7010867" ref_url="https://www.suse.com/support/kb/doc/?id=7010867" source="SUSE-SU"/>
		<reference ref_id="TID7015302" ref_url="https://www.suse.com/support/kb/doc?id=7015302" source="SUSE-SU"/>
		<reference ref_id="TID7015303" ref_url="https://www.suse.com/support/kb/doc?id=7015303" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the DER decoder in GNU Libtasn1 before 3.6, as used in GnuTLS, allow remote attackers to cause a denial of service (out-of-bounds read) via crafted ASN.1 data.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3467/">CVE-2014-3467 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3467">CVE-2014-3467 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/880737">SUSE bug 880737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880910">SUSE bug 880910</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820184" comment="libtasn1-3.3-5.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820185" comment="libtasn1-devel-3.3-5.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820186" comment="libtasn1-tools-3.3-5.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143468" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3468</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3468" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3468" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3468" ref_url="https://www.suse.com/security/cve/CVE-2014-3468" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0788-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0931-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000933.html" source="SUSE-SU"/>
		<reference ref_id="TID7010867" ref_url="https://www.suse.com/support/kb/doc/?id=7010867" source="SUSE-SU"/>
		<reference ref_id="TID7015302" ref_url="https://www.suse.com/support/kb/doc?id=7015302" source="SUSE-SU"/>
		<reference ref_id="TID7015303" ref_url="https://www.suse.com/support/kb/doc?id=7015303" source="SUSE-SU"/>
    <description>
    The asn1_get_bit_der function in GNU Libtasn1 before 3.6 does not properly report an error when a negative bit length is identified, which allows context-dependent attackers to cause out-of-bounds access via crafted ASN.1 data.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3468/">CVE-2014-3468 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3468">CVE-2014-3468 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/880735">SUSE bug 880735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880910">SUSE bug 880910</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820184" comment="libtasn1-3.3-5.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820185" comment="libtasn1-devel-3.3-5.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820186" comment="libtasn1-tools-3.3-5.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143469" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3469</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3469" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3469" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3469" ref_url="https://www.suse.com/security/cve/CVE-2014-3469" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0788-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0931-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000933.html" source="SUSE-SU"/>
		<reference ref_id="TID7010867" ref_url="https://www.suse.com/support/kb/doc/?id=7010867" source="SUSE-SU"/>
		<reference ref_id="TID7015302" ref_url="https://www.suse.com/support/kb/doc?id=7015302" source="SUSE-SU"/>
		<reference ref_id="TID7015303" ref_url="https://www.suse.com/support/kb/doc?id=7015303" source="SUSE-SU"/>
    <description>
    The (1) asn1_read_value_type and (2) asn1_read_value functions in GNU Libtasn1 before 3.6 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via a NULL value in an ivalue argument.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3469/">CVE-2014-3469 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3469">CVE-2014-3469 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/880738">SUSE bug 880738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880910">SUSE bug 880910</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820184" comment="libtasn1-3.3-5.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820185" comment="libtasn1-devel-3.3-5.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820186" comment="libtasn1-tools-3.3-5.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143470" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3470</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3470" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3470" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3470" ref_url="https://www.suse.com/security/cve/CVE-2014-3470" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0759-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/001012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1557-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001353.html" source="SUSE-SU"/>
		<reference ref_id="TID7008708" ref_url="https://www.suse.com/support/kb/doc/?id=7008708" source="SUSE-SU"/>
		<reference ref_id="TID7010867" ref_url="https://www.suse.com/support/kb/doc/?id=7010867" source="SUSE-SU"/>
		<reference ref_id="TID7015162" ref_url="https://www.suse.com/support/kb/doc?id=7015162" source="SUSE-SU"/>
		<reference ref_id="TID7015189" ref_url="https://www.suse.com/support/kb/doc?id=7015189" source="SUSE-SU"/>
		<reference ref_id="TID7015264" ref_url="https://www.suse.com/support/kb/doc?id=7015264" source="SUSE-SU"/>
		<reference ref_id="TID7015300" ref_url="https://www.suse.com/support/kb/doc?id=7015300" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0764-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PWZBRYVK7OUTTKRSPHEYXAZBMBT5C7BM/#PWZBRYVK7OUTTKRSPHEYXAZBMBT5C7BM" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0765-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/54XFUW7S2WOSHJ2J5AYNU42MAMKTFFWS/#54XFUW7S2WOSHJ2J5AYNU42MAMKTFFWS" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C5ZZO44NS35G5NQFFXUERK5DXLTQN534/#C5ZZO44NS35G5NQFFXUERK5DXLTQN534" source="SUSE-SU"/>
    <description>
    The ssl3_send_client_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h, when an anonymous ECDH cipher suite is used, allows remote attackers to cause a denial of service (NULL pointer dereference and client crash) by triggering a NULL certificate value.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3470/">CVE-2014-3470 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3470">CVE-2014-3470 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/880891">SUSE bug 880891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883126">SUSE bug 883126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885777">SUSE bug 885777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905106">SUSE bug 905106</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915913">SUSE bug 915913</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820158" comment="openssl-1.0.1e-34.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820159" comment="openssl-devel-1.0.1e-34.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820160" comment="openssl-libs-1.0.1e-34.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820161" comment="openssl-perl-1.0.1e-34.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820162" comment="openssl-static-1.0.1e-34.el7_0.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143478" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3478</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3478" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3478" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3478" ref_url="https://www.suse.com/security/cve/CVE-2014-3478" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0938-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1638-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002131.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the mconvert function in softmagic.c in file before 5.19, as used in the Fileinfo component in PHP before 5.4.30 and 5.5.x before 5.5.14, allows remote attackers to cause a denial of service (application crash) via a crafted Pascal string in a FILE_PSTRING conversion.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3478/">CVE-2014-3478 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3478">CVE-2014-3478 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/884987">SUSE bug 884987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992991">SUSE bug 992991</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821431" comment="file-5.11-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821432" comment="file-devel-5.11-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821433" comment="file-libs-5.11-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821434" comment="file-static-5.11-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820432" comment="php-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820433" comment="php-bcmath-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820434" comment="php-cli-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820435" comment="php-common-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820436" comment="php-dba-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820437" comment="php-devel-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820438" comment="php-embedded-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820439" comment="php-enchant-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820440" comment="php-fpm-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820441" comment="php-gd-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820442" comment="php-intl-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820443" comment="php-ldap-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820444" comment="php-mbstring-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820445" comment="php-mysql-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820446" comment="php-mysqlnd-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820447" comment="php-odbc-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820448" comment="php-pdo-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820449" comment="php-pgsql-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820450" comment="php-process-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820451" comment="php-pspell-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820452" comment="php-recode-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820453" comment="php-snmp-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820454" comment="php-soap-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820455" comment="php-xml-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820456" comment="php-xmlrpc-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821435" comment="python-magic-5.11-31.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143479" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3479</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3479" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3479" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3479" ref_url="https://www.suse.com/security/cve/CVE-2014-3479" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0938-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1638-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002131.html" source="SUSE-SU"/>
    <description>
    The cdf_check_stream_offset function in cdf.c in file before 5.19, as used in the Fileinfo component in PHP before 5.4.30 and 5.5.x before 5.5.14, relies on incorrect sector-size data, which allows remote attackers to cause a denial of service (application crash) via a crafted stream offset in a CDF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3479/">CVE-2014-3479 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3479">CVE-2014-3479 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/884989">SUSE bug 884989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992991">SUSE bug 992991</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821431" comment="file-5.11-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821432" comment="file-devel-5.11-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821433" comment="file-libs-5.11-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821434" comment="file-static-5.11-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820328" comment="php-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820329" comment="php-bcmath-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820330" comment="php-cli-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820331" comment="php-common-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820332" comment="php-dba-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820333" comment="php-devel-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820334" comment="php-embedded-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820335" comment="php-enchant-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820336" comment="php-fpm-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820337" comment="php-gd-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820338" comment="php-intl-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820339" comment="php-ldap-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820340" comment="php-mbstring-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820341" comment="php-mysql-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820342" comment="php-mysqlnd-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820343" comment="php-odbc-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820344" comment="php-pdo-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820345" comment="php-pgsql-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820346" comment="php-process-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820347" comment="php-pspell-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820348" comment="php-recode-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820349" comment="php-snmp-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820350" comment="php-soap-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820351" comment="php-xml-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820352" comment="php-xmlrpc-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821435" comment="python-magic-5.11-31.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143480" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3480</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3480" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3480" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3480" ref_url="https://www.suse.com/security/cve/CVE-2014-3480" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0938-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1638-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002131.html" source="SUSE-SU"/>
    <description>
    The cdf_count_chain function in cdf.c in file before 5.19, as used in the Fileinfo component in PHP before 5.4.30 and 5.5.x before 5.5.14, does not properly validate sector-count data, which allows remote attackers to cause a denial of service (application crash) via a crafted CDF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3480/">CVE-2014-3480 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3480">CVE-2014-3480 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/884990">SUSE bug 884990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821431" comment="file-5.11-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821432" comment="file-devel-5.11-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821433" comment="file-libs-5.11-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821434" comment="file-static-5.11-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820328" comment="php-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820329" comment="php-bcmath-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820330" comment="php-cli-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820331" comment="php-common-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820332" comment="php-dba-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820333" comment="php-devel-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820334" comment="php-embedded-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820335" comment="php-enchant-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820336" comment="php-fpm-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820337" comment="php-gd-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820338" comment="php-intl-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820339" comment="php-ldap-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820340" comment="php-mbstring-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820341" comment="php-mysql-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820342" comment="php-mysqlnd-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820343" comment="php-odbc-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820344" comment="php-pdo-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820345" comment="php-pgsql-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820346" comment="php-process-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820347" comment="php-pspell-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820348" comment="php-recode-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820349" comment="php-snmp-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820350" comment="php-soap-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820351" comment="php-xml-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820352" comment="php-xmlrpc-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821435" comment="python-magic-5.11-31.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143487" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3487</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3487" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3487" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3487" ref_url="https://www.suse.com/security/cve/CVE-2014-3487" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0938-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1638-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002131.html" source="SUSE-SU"/>
    <description>
    The cdf_read_property_info function in file before 5.19, as used in the Fileinfo component in PHP before 5.4.30 and 5.5.x before 5.5.14, does not properly validate a stream offset, which allows remote attackers to cause a denial of service (application crash) via a crafted CDF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3487/">CVE-2014-3487 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3487">CVE-2014-3487 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/884991">SUSE bug 884991</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821431" comment="file-5.11-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821432" comment="file-devel-5.11-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821433" comment="file-libs-5.11-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821434" comment="file-static-5.11-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820328" comment="php-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820329" comment="php-bcmath-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820330" comment="php-cli-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820331" comment="php-common-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820332" comment="php-dba-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820333" comment="php-devel-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820334" comment="php-embedded-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820335" comment="php-enchant-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820336" comment="php-fpm-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820337" comment="php-gd-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820338" comment="php-intl-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820339" comment="php-ldap-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820340" comment="php-mbstring-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820341" comment="php-mysql-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820342" comment="php-mysqlnd-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820343" comment="php-odbc-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820344" comment="php-pdo-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820345" comment="php-pgsql-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820346" comment="php-process-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820347" comment="php-pspell-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820348" comment="php-recode-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820349" comment="php-snmp-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820350" comment="php-soap-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820351" comment="php-xml-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820352" comment="php-xmlrpc-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821435" comment="python-magic-5.11-31.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143490" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3490</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3490" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3490" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3490" ref_url="https://www.suse.com/security/cve/CVE-2014-3490" source="SUSE CVE"/>
    <description>
    RESTEasy 2.3.1 before 2.3.8.SP2 and 3.x before 3.0.9, as used in Red Hat JBoss Enterprise Application Platform (EAP) 6.3.0, does not disable external entities when the resteasy.document.expand.entity.references parameter is set to false, which allows remote attackers to read arbitrary files and have other unspecified impact via unspecified vectors, related to an XML External Entity (XXE) issue.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-0818.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-25"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3490/">CVE-2014-3490 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3490">CVE-2014-3490 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1101653">SUSE bug 1101653</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820317" comment="resteasy-base-2.3.5-3.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820318" comment="resteasy-base-atom-provider-2.3.5-3.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820319" comment="resteasy-base-jackson-provider-2.3.5-3.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820320" comment="resteasy-base-javadoc-2.3.5-3.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820321" comment="resteasy-base-jaxb-provider-2.3.5-3.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820322" comment="resteasy-base-jaxrs-2.3.5-3.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820323" comment="resteasy-base-jaxrs-all-2.3.5-3.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820324" comment="resteasy-base-jaxrs-api-2.3.5-3.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820325" comment="resteasy-base-jettison-provider-2.3.5-3.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820326" comment="resteasy-base-providers-pom-2.3.5-3.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820327" comment="resteasy-base-tjws-2.3.5-3.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143493" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3493</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3493" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3493" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3493" ref_url="https://www.suse.com/security/cve/CVE-2014-3493" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000917.html" source="SUSE-SU"/>
    <description>
    The push_ascii function in smbd in Samba 3.6.x before 3.6.24, 4.0.x before 4.0.19, and 4.1.x before 4.1.9 allows remote authenticated users to cause a denial of service (memory corruption and daemon crash) via an attempt to read a Unicode pathname without specifying use of Unicode, leading to a character-set conversion failure that triggers an invalid pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3493/">CVE-2014-3493 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3493">CVE-2014-3493 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/878642">SUSE bug 878642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880962">SUSE bug 880962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883758">SUSE bug 883758</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820229" comment="libsmbclient-4.1.1-35.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820230" comment="libsmbclient-devel-4.1.1-35.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820231" comment="libwbclient-4.1.1-35.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820232" comment="libwbclient-devel-4.1.1-35.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820233" comment="samba-4.1.1-35.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820234" comment="samba-client-4.1.1-35.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820235" comment="samba-common-4.1.1-35.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820236" comment="samba-dc-4.1.1-35.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820237" comment="samba-dc-libs-4.1.1-35.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820238" comment="samba-devel-4.1.1-35.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820239" comment="samba-libs-4.1.1-35.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820240" comment="samba-pidl-4.1.1-35.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820241" comment="samba-python-4.1.1-35.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820242" comment="samba-test-4.1.1-35.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820243" comment="samba-test-devel-4.1.1-35.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820244" comment="samba-vfs-glusterfs-4.1.1-35.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820245" comment="samba-winbind-4.1.1-35.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820246" comment="samba-winbind-clients-4.1.1-35.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820247" comment="samba-winbind-krb5-locator-4.1.1-35.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820248" comment="samba-winbind-modules-4.1.1-35.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143499" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3499</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3499" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3499" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3499" ref_url="https://www.suse.com/security/cve/CVE-2014-3499" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03540-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022860.html" source="SUSE-SU"/>
    <description>
    Docker 1.0.0 uses world-readable and world-writable permissions on the management socket, which allows local users to gain privileges via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-10-14"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3499/">CVE-2014-3499 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3499">CVE-2014-3499 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/885209">SUSE bug 885209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820218" comment="docker-0.11.1-22.el7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143513" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3513</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3513" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3513" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3513" ref_url="https://www.suse.com/security/cve/CVE-2014-3513" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001084.html" source="SUSE-SU"/>
		<reference ref_id="TID7010867" ref_url="https://www.suse.com/support/kb/doc/?id=7010867" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1331-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OXLUMJEZOOE2HOIJFB6A5TK5GVXXPQTH/#OXLUMJEZOOE2HOIJFB6A5TK5GVXXPQTH" source="SUSE-SU"/>
    <description>
    Memory leak in d1_srtp.c in the DTLS SRTP extension in OpenSSL 1.0.1 before 1.0.1j allows remote attackers to cause a denial of service (memory consumption) via a crafted handshake message.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2014-3513/">CVE-2014-3513 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3513">CVE-2014-3513 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/901277">SUSE bug 901277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820511" comment="openssl-1.0.1e-34.el7_0.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820512" comment="openssl-devel-1.0.1e-34.el7_0.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820513" comment="openssl-libs-1.0.1e-34.el7_0.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820514" comment="openssl-perl-1.0.1e-34.el7_0.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820515" comment="openssl-static-1.0.1e-34.el7_0.6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143515" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3515</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3515" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3515" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3515" ref_url="https://www.suse.com/security/cve/CVE-2014-3515" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0938-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1638-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002131.html" source="SUSE-SU"/>
    <description>
    The SPL component in PHP before 5.4.30 and 5.5.x before 5.5.14 incorrectly anticipates that certain data structures will have the array data type after unserialization, which allows remote attackers to execute arbitrary code via a crafted string that triggers use of a Hashtable destructor, related to "type confusion" issues in (1) ArrayObject and (2) SPLObjectStorage.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3515/">CVE-2014-3515 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3515">CVE-2014-3515 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/884992">SUSE bug 884992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992991">SUSE bug 992991</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820328" comment="php-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820329" comment="php-bcmath-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820330" comment="php-cli-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820331" comment="php-common-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820332" comment="php-dba-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820333" comment="php-devel-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820334" comment="php-embedded-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820335" comment="php-enchant-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820336" comment="php-fpm-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820337" comment="php-gd-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820338" comment="php-intl-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820339" comment="php-ldap-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820340" comment="php-mbstring-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820341" comment="php-mysql-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820342" comment="php-mysqlnd-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820343" comment="php-odbc-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820344" comment="php-pdo-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820345" comment="php-pgsql-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820346" comment="php-process-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820347" comment="php-pspell-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820348" comment="php-recode-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820349" comment="php-snmp-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820350" comment="php-soap-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820351" comment="php-xml-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820352" comment="php-xmlrpc-5.4.16-23.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143528" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3528</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3528" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3528" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3528" ref_url="https://www.suse.com/security/cve/CVE-2014-3528" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1071-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000978.html" source="SUSE-SU"/>
    <description>
    Apache Subversion 1.0.0 through 1.7.x before 1.7.17 and 1.8.x before 1.8.10 uses an MD5 hash of the URL and authentication realm to store cached credentials, which makes it easier for remote servers to obtain the credentials via a crafted authentication realm.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3528/">CVE-2014-3528 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3528">CVE-2014-3528 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/889849">SUSE bug 889849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/890511">SUSE bug 890511</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820773" comment="mod_dav_svn-1.7.14-7.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820774" comment="subversion-1.7.14-7.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820775" comment="subversion-devel-1.7.14-7.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820776" comment="subversion-gnome-1.7.14-7.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820777" comment="subversion-javahl-1.7.14-7.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820778" comment="subversion-kde-1.7.14-7.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820779" comment="subversion-libs-1.7.14-7.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820780" comment="subversion-perl-1.7.14-7.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820781" comment="subversion-python-1.7.14-7.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820782" comment="subversion-ruby-1.7.14-7.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820783" comment="subversion-tools-1.7.14-7.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143534" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3534</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3534" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3534" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3534" ref_url="https://www.suse.com/security/cve/CVE-2014-3534" source="SUSE CVE"/>
    <description>
    arch/s390/kernel/ptrace.c in the Linux kernel before 3.15.8 on the s390 platform does not properly restrict address-space control operations in PTRACE_POKEUSR_AREA requests, which allows local users to obtain read and write access to kernel memory locations, and consequently gain privileges, via a crafted application that makes a ptrace system call.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3534/">CVE-2014-3534 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3534">CVE-2014-3534 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/885460">SUSE bug 885460</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820353" comment="kernel-3.10.0-123.6.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820354" comment="kernel-abi-whitelists-3.10.0-123.6.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820355" comment="kernel-debug-3.10.0-123.6.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820358" comment="kernel-doc-3.10.0-123.6.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820359" comment="kernel-headers-3.10.0-123.6.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820360" comment="kernel-tools-3.10.0-123.6.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820361" comment="kernel-tools-libs-3.10.0-123.6.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820363" comment="perf-3.10.0-123.6.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820364" comment="python-perf-3.10.0-123.6.3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143538" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3538</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3538" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3538" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3538" ref_url="https://www.suse.com/security/cve/CVE-2014-3538" source="SUSE CVE"/>
    <description>
    file before 5.19 does not properly restrict the amount of data read during a regex search, which allows remote attackers to cause a denial of service (CPU consumption) via a crafted file that triggers backtracking during processing of an awk rule.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-7345.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3538/">CVE-2014-3538 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3538">CVE-2014-3538 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/935225">SUSE bug 935225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987530">SUSE bug 987530</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821431" comment="file-5.11-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821432" comment="file-devel-5.11-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821433" comment="file-libs-5.11-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821434" comment="file-static-5.11-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820432" comment="php-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820433" comment="php-bcmath-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820434" comment="php-cli-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820435" comment="php-common-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820436" comment="php-dba-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820437" comment="php-devel-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820438" comment="php-embedded-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820439" comment="php-enchant-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820440" comment="php-fpm-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820441" comment="php-gd-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820442" comment="php-intl-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820443" comment="php-ldap-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820444" comment="php-mbstring-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820445" comment="php-mysql-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820446" comment="php-mysqlnd-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820447" comment="php-odbc-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820448" comment="php-pdo-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820449" comment="php-pgsql-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820450" comment="php-process-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820451" comment="php-pspell-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820452" comment="php-recode-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820453" comment="php-snmp-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820454" comment="php-soap-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820455" comment="php-xml-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820456" comment="php-xmlrpc-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821435" comment="python-magic-5.11-31.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143560" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3560</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3560" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3560" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3560" ref_url="https://www.suse.com/security/cve/CVE-2014-3560" source="SUSE CVE"/>
    <description>
    NetBIOS name services daemon (nmbd) in Samba 4.0.x before 4.0.21 and 4.1.x before 4.1.11 allows remote attackers to execute arbitrary code via unspecified vectors that modify heap memory, involving a sizeof operation on an incorrect variable in the unstrcpy macro in string_wrappers.h.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3560/">CVE-2014-3560 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3560">CVE-2014-3560 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/889429">SUSE bug 889429</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820297" comment="libsmbclient-4.1.1-37.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820298" comment="libsmbclient-devel-4.1.1-37.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820299" comment="libwbclient-4.1.1-37.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820300" comment="libwbclient-devel-4.1.1-37.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820301" comment="samba-4.1.1-37.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820302" comment="samba-client-4.1.1-37.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820303" comment="samba-common-4.1.1-37.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820304" comment="samba-dc-4.1.1-37.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820305" comment="samba-dc-libs-4.1.1-37.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820306" comment="samba-devel-4.1.1-37.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820307" comment="samba-libs-4.1.1-37.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820308" comment="samba-pidl-4.1.1-37.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820309" comment="samba-python-4.1.1-37.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820310" comment="samba-test-4.1.1-37.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820311" comment="samba-test-devel-4.1.1-37.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820312" comment="samba-vfs-glusterfs-4.1.1-37.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820313" comment="samba-winbind-4.1.1-37.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820314" comment="samba-winbind-clients-4.1.1-37.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820315" comment="samba-winbind-krb5-locator-4.1.1-37.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820316" comment="samba-winbind-modules-4.1.1-37.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143565" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3565</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3565" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3565" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3565" ref_url="https://www.suse.com/security/cve/CVE-2014-3565" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/000988.html" source="SUSE-SU"/>
    <description>
    snmplib/mib.c in net-snmp 5.7.0 and earlier, when the -OQ option is used, allows remote attackers to cause a denial of service (snmptrapd crash) via a crafted SNMP trap message, which triggers a conversion to the variable type designated in the MIB file, as demonstrated by a NULL type in an ifMtu trap message.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3565/">CVE-2014-3565 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3565">CVE-2014-3565 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/894361">SUSE bug 894361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969779">SUSE bug 969779</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821503" comment="net-snmp-5.7.2-24.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821504" comment="net-snmp-agent-libs-5.7.2-24.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821505" comment="net-snmp-devel-5.7.2-24.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821506" comment="net-snmp-gui-5.7.2-24.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821507" comment="net-snmp-libs-5.7.2-24.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821508" comment="net-snmp-perl-5.7.2-24.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821509" comment="net-snmp-python-5.7.2-24.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821510" comment="net-snmp-sysvinit-5.7.2-24.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821511" comment="net-snmp-utils-5.7.2-24.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143566" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3566</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3566" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3566" ref_url="https://www.suse.com/security/cve/CVE-2014-3566" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:0039-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2015:1175-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2015-July/003181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1361-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1387-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1409-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1526-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1557-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0010-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1457-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2329-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002292.html" source="SUSE-SU"/>
		<reference ref_id="TID3426981" ref_url="https://www.suse.com/support/kb/doc/?id=3426981" source="SUSE-SU"/>
		<reference ref_id="TID7010166" ref_url="https://www.suse.com/support/kb/doc/?id=7010166" source="SUSE-SU"/>
		<reference ref_id="TID7010867" ref_url="https://www.suse.com/support/kb/doc/?id=7010867" source="SUSE-SU"/>
		<reference ref_id="TID7014420" ref_url="https://www.suse.com/support/kb/doc/?id=7014420" source="SUSE-SU"/>
		<reference ref_id="TID7015773" ref_url="https://www.suse.com/support/kb/doc?id=7015773" source="SUSE-SU"/>
		<reference ref_id="TID7015777" ref_url="https://www.suse.com/support/kb/doc/?id=7015777" source="SUSE-SU"/>
		<reference ref_id="TID7015785" ref_url="https://www.suse.com/support/kb/doc/?id=7015785" source="SUSE-SU"/>
		<reference ref_id="TID7015793" ref_url="https://www.suse.com/support/kb/doc/?id=7015793" source="SUSE-SU"/>
		<reference ref_id="TID7015804" ref_url="https://www.suse.com/support/kb/doc/?id=7015804" source="SUSE-SU"/>
		<reference ref_id="TID7015805" ref_url="https://www.suse.com/support/kb/doc/?id=7015805" source="SUSE-SU"/>
		<reference ref_id="TID7015809" ref_url="https://www.suse.com/support/kb/doc/?id=7015809" source="SUSE-SU"/>
		<reference ref_id="TID7015826" ref_url="https://www.suse.com/support/kb/doc/?id=7015826" source="SUSE-SU"/>
		<reference ref_id="TID7015854" ref_url="https://www.suse.com/support/kb/doc/?id=7015854" source="SUSE-SU"/>
		<reference ref_id="TID7015987" ref_url="https://www.suse.com/support/kb/doc/?id=7015987" source="SUSE-SU"/>
		<reference ref_id="TID7016067" ref_url="https://www.suse.com/support/kb/doc/?id=7016067" source="SUSE-SU"/>
		<reference ref_id="TID7016068" ref_url="https://www.suse.com/support/kb/doc/?id=7016068" source="SUSE-SU"/>
		<reference ref_id="TID7016144" ref_url="https://www.suse.com/support/kb/doc/?id=7016144" source="SUSE-SU"/>
		<reference ref_id="TID7016205" ref_url="https://www.suse.com/support/kb/doc/?id=7016205" source="SUSE-SU"/>
		<reference ref_id="TID7016299" ref_url="https://www.suse.com/support/kb/doc?id=7016299" source="SUSE-SU"/>
		<reference ref_id="TID7016328" ref_url="https://www.suse.com/support/kb/doc/?id=7016328" source="SUSE-SU"/>
		<reference ref_id="TID7016351" ref_url="https://www.suse.com/support/kb/doc/?id=7016351" source="SUSE-SU"/>
		<reference ref_id="TID7016875" ref_url="https://www.suse.com/support/kb/doc/?id=7016875" source="SUSE-SU"/>
		<reference ref_id="TID7017332" ref_url="https://www.suse.com/support/kb/doc/?id=7017332" source="SUSE-SU"/>
		<reference ref_id="TID7021300" ref_url="https://www.suse.com/support/kb/doc/?id=7021300" source="SUSE-SU"/>
		<reference ref_id="TID7021433" ref_url="https://www.suse.com/support/kb/doc/?id=7021433" source="SUSE-SU"/>
		<reference ref_id="TID7021975" ref_url="https://www.suse.com/support/kb/doc/?id=7021975" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1331-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OXLUMJEZOOE2HOIJFB6A5TK5GVXXPQTH/#OXLUMJEZOOE2HOIJFB6A5TK5GVXXPQTH" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0190-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QOHQUN3Q5MDA4SIFFIRNOJI5I5UILUJP/#QOHQUN3Q5MDA4SIFFIRNOJI5I5UILUJP" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C5ZZO44NS35G5NQFFXUERK5DXLTQN534/#C5ZZO44NS35G5NQFFXUERK5DXLTQN534" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/pipermail/neuvector-updates/2023-November/000021.html" source="SUSE-SU"/>
    <description>
    The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other products, uses nondeterministic CBC padding, which makes it easier for man-in-the-middle attackers to obtain cleartext data via a padding-oracle attack, aka the "POODLE" issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3566/">CVE-2014-3566 at SUSE</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3566">CVE-2014-3566 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1011293">SUSE bug 1011293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031023">SUSE bug 1031023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901223">SUSE bug 901223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901254">SUSE bug 901254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901277">SUSE bug 901277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901748">SUSE bug 901748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901757">SUSE bug 901757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901759">SUSE bug 901759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901889">SUSE bug 901889</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901968">SUSE bug 901968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902229">SUSE bug 902229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902233">SUSE bug 902233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902476">SUSE bug 902476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903405">SUSE bug 903405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903684">SUSE bug 903684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904889">SUSE bug 904889</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905106">SUSE bug 905106</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914041">SUSE bug 914041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994144">SUSE bug 994144</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820739" comment="java-1.6.0-openjdk-1.6.0.34-1.13.6.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820740" comment="java-1.6.0-openjdk-demo-1.6.0.34-1.13.6.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820741" comment="java-1.6.0-openjdk-devel-1.6.0.34-1.13.6.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820742" comment="java-1.6.0-openjdk-javadoc-1.6.0.34-1.13.6.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820743" comment="java-1.6.0-openjdk-src-1.6.0.34-1.13.6.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820728" comment="java-1.7.0-openjdk-1.7.0.75-2.5.4.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820729" comment="java-1.7.0-openjdk-accessibility-1.7.0.75-2.5.4.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820730" comment="java-1.7.0-openjdk-demo-1.7.0.75-2.5.4.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820731" comment="java-1.7.0-openjdk-devel-1.7.0.75-2.5.4.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820732" comment="java-1.7.0-openjdk-headless-1.7.0.75-2.5.4.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820733" comment="java-1.7.0-openjdk-javadoc-1.7.0.75-2.5.4.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820734" comment="java-1.7.0-openjdk-src-1.7.0.75-2.5.4.2.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143567" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3567</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3567" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3567" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3567" ref_url="https://www.suse.com/security/cve/CVE-2014-3567" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1361-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1387-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001084.html" source="SUSE-SU"/>
		<reference ref_id="TID7010867" ref_url="https://www.suse.com/support/kb/doc/?id=7010867" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1331-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OXLUMJEZOOE2HOIJFB6A5TK5GVXXPQTH/#OXLUMJEZOOE2HOIJFB6A5TK5GVXXPQTH" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C5ZZO44NS35G5NQFFXUERK5DXLTQN534/#C5ZZO44NS35G5NQFFXUERK5DXLTQN534" source="SUSE-SU"/>
    <description>
    Memory leak in the tls_decrypt_ticket function in t1_lib.c in OpenSSL before 0.9.8zc, 1.0.0 before 1.0.0o, and 1.0.1 before 1.0.1j allows remote attackers to cause a denial of service (memory consumption) via a crafted session ticket that triggers an integrity-check failure.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3567/">CVE-2014-3567 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3567">CVE-2014-3567 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/877506">SUSE bug 877506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901277">SUSE bug 901277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905106">SUSE bug 905106</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820511" comment="openssl-1.0.1e-34.el7_0.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820512" comment="openssl-devel-1.0.1e-34.el7_0.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820513" comment="openssl-libs-1.0.1e-34.el7_0.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820514" comment="openssl-perl-1.0.1e-34.el7_0.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820515" comment="openssl-static-1.0.1e-34.el7_0.6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143570" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3570</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3570" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3570" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3570" ref_url="https://www.suse.com/security/cve/CVE-2014-3570" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0172-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001410.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0130-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5NKKL36OVJL3XH5PE2LUB3THMPTHPONL/#5NKKL36OVJL3XH5PE2LUB3THMPTHPONL" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1277-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XQAZGF7SIGXMQQGI6UJF7VBAOBYMY5WF/#XQAZGF7SIGXMQQGI6UJF7VBAOBYMY5WF" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C5ZZO44NS35G5NQFFXUERK5DXLTQN534/#C5ZZO44NS35G5NQFFXUERK5DXLTQN534" source="SUSE-SU"/>
    <description>
    The BN_sqr implementation in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k does not properly calculate the square of a BIGNUM value, which might make it easier for remote attackers to defeat cryptographic protection mechanisms via unspecified vectors, related to crypto/bn/asm/mips.pl, crypto/bn/asm/x86_64-gcc.c, and crypto/bn/bn_asm.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3570/">CVE-2014-3570 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3570">CVE-2014-3570 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/912296">SUSE bug 912296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915848">SUSE bug 915848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927623">SUSE bug 927623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937891">SUSE bug 937891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944456">SUSE bug 944456</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820723" comment="openssl-1.0.1e-34.el7_0.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820724" comment="openssl-devel-1.0.1e-34.el7_0.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820725" comment="openssl-libs-1.0.1e-34.el7_0.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820726" comment="openssl-perl-1.0.1e-34.el7_0.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820727" comment="openssl-static-1.0.1e-34.el7_0.7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143571" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3571</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3571" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3571" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3571" ref_url="https://www.suse.com/security/cve/CVE-2014-3571" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0172-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001410.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0130-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5NKKL36OVJL3XH5PE2LUB3THMPTHPONL/#5NKKL36OVJL3XH5PE2LUB3THMPTHPONL" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C5ZZO44NS35G5NQFFXUERK5DXLTQN534/#C5ZZO44NS35G5NQFFXUERK5DXLTQN534" source="SUSE-SU"/>
    <description>
    OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted DTLS message that is processed with a different read operation for the handshake header than for the handshake body, related to the dtls1_get_record function in d1_pkt.c and the ssl3_read_n function in s3_pkt.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3571/">CVE-2014-3571 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3571">CVE-2014-3571 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/912294">SUSE bug 912294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915848">SUSE bug 915848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927623">SUSE bug 927623</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820723" comment="openssl-1.0.1e-34.el7_0.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820724" comment="openssl-devel-1.0.1e-34.el7_0.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820725" comment="openssl-libs-1.0.1e-34.el7_0.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820726" comment="openssl-perl-1.0.1e-34.el7_0.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820727" comment="openssl-static-1.0.1e-34.el7_0.7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143572" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3572</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3572" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3572" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3572" ref_url="https://www.suse.com/security/cve/CVE-2014-3572" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0172-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001410.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0130-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5NKKL36OVJL3XH5PE2LUB3THMPTHPONL/#5NKKL36OVJL3XH5PE2LUB3THMPTHPONL" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1277-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XQAZGF7SIGXMQQGI6UJF7VBAOBYMY5WF/#XQAZGF7SIGXMQQGI6UJF7VBAOBYMY5WF" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C5ZZO44NS35G5NQFFXUERK5DXLTQN534/#C5ZZO44NS35G5NQFFXUERK5DXLTQN534" source="SUSE-SU"/>
    <description>
    The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote SSL servers to conduct ECDHE-to-ECDH downgrade attacks and trigger a loss of forward secrecy by omitting the ServerKeyExchange message.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3572/">CVE-2014-3572 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3572">CVE-2014-3572 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/912015">SUSE bug 912015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915848">SUSE bug 915848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927623">SUSE bug 927623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937891">SUSE bug 937891</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820723" comment="openssl-1.0.1e-34.el7_0.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820724" comment="openssl-devel-1.0.1e-34.el7_0.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820725" comment="openssl-libs-1.0.1e-34.el7_0.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820726" comment="openssl-perl-1.0.1e-34.el7_0.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820727" comment="openssl-static-1.0.1e-34.el7_0.7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143577" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3577</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3577" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3577" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3577" ref_url="https://www.suse.com/security/cve/CVE-2014-3577" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3151-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007692.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1873-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YYYTF4MJKJCHN6CREKINZ6NZL66SOXHJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1875-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UMLTVDGHZRB3F3GUJJIBKNM256N34XBW/" source="SUSE-SU"/>
    <description>
    org.apache.http.conn.ssl.AbstractVerifier in Apache HttpComponents HttpClient before 4.3.5 and HttpAsyncClient before 4.0.2 does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a "CN=" string in a field in the distinguished name (DN) of a certificate, as demonstrated by the "foo,CN=www.apache.org" string in the O field.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2014-3577/">CVE-2014-3577 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3577">CVE-2014-3577 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1178171">SUSE bug 1178171</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820394" comment="httpcomponents-client-4.2.5-5.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820395" comment="httpcomponents-client-javadoc-4.2.5-5.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820398" comment="jakarta-commons-httpclient-3.1-16.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820399" comment="jakarta-commons-httpclient-demo-3.1-16.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820400" comment="jakarta-commons-httpclient-javadoc-3.1-16.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820401" comment="jakarta-commons-httpclient-manual-3.1-16.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143580" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3580</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3580" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3580" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3580" ref_url="https://www.suse.com/security/cve/CVE-2014-3580" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0155-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003142.html" source="SUSE-SU"/>
    <description>
    The mod_dav_svn Apache HTTPD server module in Apache Subversion 1.x before 1.7.19 and 1.8.x before 1.8.11 allows remote attackers to cause a denial of service (NULL pointer dereference and server crash) via a REPORT request for a resource that does not exist.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3580/">CVE-2014-3580 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3580">CVE-2014-3580 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/909935">SUSE bug 909935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910376">SUSE bug 910376</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820773" comment="mod_dav_svn-1.7.14-7.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820774" comment="subversion-1.7.14-7.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820775" comment="subversion-devel-1.7.14-7.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820776" comment="subversion-gnome-1.7.14-7.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820777" comment="subversion-javahl-1.7.14-7.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820778" comment="subversion-kde-1.7.14-7.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820779" comment="subversion-libs-1.7.14-7.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820780" comment="subversion-perl-1.7.14-7.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820781" comment="subversion-python-1.7.14-7.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820782" comment="subversion-ruby-1.7.14-7.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820783" comment="subversion-tools-1.7.14-7.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143581" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3581</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3581" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3581" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3581" ref_url="https://www.suse.com/security/cve/CVE-2014-3581" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0974-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001415.html" source="SUSE-SU"/>
    <description>
    The cache_merge_headers_out function in modules/cache/cache_util.c in the mod_cache module in the Apache HTTP Server before 2.4.11 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an empty HTTP Content-Type header.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3581/">CVE-2014-3581 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3581">CVE-2014-3581 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/899836">SUSE bug 899836</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820845" comment="httpd-2.4.6-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820846" comment="httpd-devel-2.4.6-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820847" comment="httpd-manual-2.4.6-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820848" comment="httpd-tools-2.4.6-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820849" comment="mod_ldap-2.4.6-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820850" comment="mod_proxy_html-2.4.6-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820851" comment="mod_session-2.4.6-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820852" comment="mod_ssl-2.4.6-31.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143587" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3587</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3587" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3587" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3587" ref_url="https://www.suse.com/security/cve/CVE-2014-3587" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002298.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2451-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YJJ34KZ3MW5MTS5HAZ73C7VNHMGMF3WQ/#YJJ34KZ3MW5MTS5HAZ73C7VNHMGMF3WQ" source="SUSE-SU"/>
    <description>
    Integer overflow in the cdf_read_property_info function in cdf.c in file through 5.19, as used in the Fileinfo component in PHP before 5.4.32 and 5.5.x before 5.5.16, allows remote attackers to cause a denial of service (application crash) via a crafted CDF file.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-1571.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3587/">CVE-2014-3587 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3587">CVE-2014-3587 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/987530">SUSE bug 987530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992991">SUSE bug 992991</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998845">SUSE bug 998845</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821431" comment="file-5.11-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821432" comment="file-devel-5.11-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821433" comment="file-libs-5.11-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821434" comment="file-static-5.11-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820432" comment="php-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820433" comment="php-bcmath-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820434" comment="php-cli-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820435" comment="php-common-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820436" comment="php-dba-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820437" comment="php-devel-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820438" comment="php-embedded-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820439" comment="php-enchant-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820440" comment="php-fpm-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820441" comment="php-gd-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820442" comment="php-intl-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820443" comment="php-ldap-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820444" comment="php-mbstring-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820445" comment="php-mysql-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820446" comment="php-mysqlnd-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820447" comment="php-odbc-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820448" comment="php-pdo-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820449" comment="php-pgsql-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820450" comment="php-process-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820451" comment="php-pspell-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820452" comment="php-recode-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820453" comment="php-snmp-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820454" comment="php-soap-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820455" comment="php-xml-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820456" comment="php-xmlrpc-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821435" comment="python-magic-5.11-31.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143597" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3597</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3597" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3597" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3597" ref_url="https://www.suse.com/security/cve/CVE-2014-3597" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1638-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002131.html" source="SUSE-SU"/>
    <description>
    Multiple buffer overflows in the php_parserr function in ext/standard/dns.c in PHP before 5.4.32 and 5.5.x before 5.5.16 allow remote DNS servers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted DNS record, related to the dns_get_record function and the dn_expand function.  NOTE: this issue exists because of an incomplete fix for CVE-2014-4049.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3597/">CVE-2014-3597 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3597">CVE-2014-3597 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/893853">SUSE bug 893853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992991">SUSE bug 992991</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820432" comment="php-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820433" comment="php-bcmath-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820434" comment="php-cli-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820435" comment="php-common-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820436" comment="php-dba-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820437" comment="php-devel-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820438" comment="php-embedded-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820439" comment="php-enchant-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820440" comment="php-fpm-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820441" comment="php-gd-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820442" comment="php-intl-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820443" comment="php-ldap-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820444" comment="php-mbstring-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820445" comment="php-mysql-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820446" comment="php-mysqlnd-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820447" comment="php-odbc-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820448" comment="php-pdo-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820449" comment="php-pgsql-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820450" comment="php-process-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820451" comment="php-pspell-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820452" comment="php-recode-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820453" comment="php-snmp-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820454" comment="php-soap-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820455" comment="php-xml-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820456" comment="php-xmlrpc-5.4.16-23.el7_0.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143609" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3609</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3609" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3609" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3609" ref_url="https://www.suse.com/security/cve/CVE-2014-3609" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/001006.html" source="SUSE-SU"/>
    <description>
    HttpHdrRange.cc in Squid 3.x before 3.3.12 and 3.4.x before 3.4.6 allows remote attackers to cause a denial of service (crash) via a request with crafted "Range headers with unidentifiable byte-range values."
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3609/">CVE-2014-3609 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3609">CVE-2014-3609 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/893649">SUSE bug 893649</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820396" comment="squid-3.3.8-12.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820397" comment="squid-sysvinit-3.3.8-12.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143611" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3611</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3611" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3611" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3611" ref_url="https://www.suse.com/security/cve/CVE-2014-3611" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001160.html" source="SUSE-SU"/>
    <description>
    Race condition in the __kvm_migrate_pit_timer function in arch/x86/kvm/i8254.c in the KVM subsystem in the Linux kernel through 3.17.2 allows guest OS users to cause a denial of service (host OS crash) by leveraging incorrect PIT emulation.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3611/">CVE-2014-3611 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3611">CVE-2014-3611 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/899192">SUSE bug 899192</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820531" comment="kernel-3.10.0-123.9.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820532" comment="kernel-abi-whitelists-3.10.0-123.9.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820533" comment="kernel-debug-3.10.0-123.9.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820536" comment="kernel-doc-3.10.0-123.9.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820537" comment="kernel-headers-3.10.0-123.9.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820538" comment="kernel-tools-3.10.0-123.9.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820539" comment="kernel-tools-libs-3.10.0-123.9.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820541" comment="perf-3.10.0-123.9.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820542" comment="python-perf-3.10.0-123.9.2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143613" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3613</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3613" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3613" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3613" ref_url="https://www.suse.com/security/cve/CVE-2014-3613" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001199.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1139-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q5AZUTZ6RS5D73CSUXN2E2XFXFFEMPWV/#Q5AZUTZ6RS5D73CSUXN2E2XFXFFEMPWV" source="SUSE-SU"/>
    <description>
    cURL and libcurl before 7.38.0 does not properly handle IP addresses in cookie domain names, which allows remote attackers to set cookies for or send arbitrary cookies to certain sites, as demonstrated by a site at 192.168.0.1 setting cookies for a site at 127.168.0.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3613/">CVE-2014-3613 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3613">CVE-2014-3613 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/894575">SUSE bug 894575</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821436" comment="curl-7.29.0-25.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821437" comment="libcurl-7.29.0-25.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821438" comment="libcurl-devel-7.29.0-25.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143615" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3615</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3615" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3615" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3615" ref_url="https://www.suse.com/security/cve/CVE-2014-3615" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002332.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002394.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0732-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OGNBI6YU4ZAITSWSBTLPUJCZBFQAD26P/#OGNBI6YU4ZAITSWSBTLPUJCZBFQAD26P" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1092-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CQMOBB2P5AC2XENWS2CQI3JBBQ3QBSML/#CQMOBB2P5AC2XENWS2CQI3JBBQ3QBSML" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SEGSV5T3S2ZKXR3FBHOEH6ZATP7GNXOI/#SEGSV5T3S2ZKXR3FBHOEH6ZATP7GNXOI" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2497-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SN42T3R5VY52V47YKP7INPGVVIOYAXJM/#SN42T3R5VY52V47YKP7INPGVVIOYAXJM" source="SUSE-SU"/>
    <description>
    The VGA emulator in QEMU allows local guest users to read host memory by setting the display to a high resolution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3615/">CVE-2014-3615 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3615">CVE-2014-3615 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/895528">SUSE bug 895528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918998">SUSE bug 918998</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820520" comment="libcacard-1.5.3-60.el7_0.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820521" comment="libcacard-devel-1.5.3-60.el7_0.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820522" comment="libcacard-tools-1.5.3-60.el7_0.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820523" comment="qemu-guest-agent-1.5.3-60.el7_0.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820524" comment="qemu-img-1.5.3-60.el7_0.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820525" comment="qemu-kvm-1.5.3-60.el7_0.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820526" comment="qemu-kvm-common-1.5.3-60.el7_0.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820527" comment="qemu-kvm-tools-1.5.3-60.el7_0.10 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143618" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3618</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3618" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3618" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3618" ref_url="https://www.suse.com/security/cve/CVE-2014-3618" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/001004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1114-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VNGTCHOCTMUUJQEML3RRP3WEJ3TPBT6A/#VNGTCHOCTMUUJQEML3RRP3WEJ3TPBT6A" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in formisc.c in formail in procmail 3.22 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted email header, related to "unbalanced quotes."
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3618/">CVE-2014-3618 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3618">CVE-2014-3618 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1068648">SUSE bug 1068648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/894999">SUSE bug 894999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898303">SUSE bug 898303</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820402" comment="procmail-3.22-34.el7_0.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143631" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3631</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3631" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3631" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3631" ref_url="https://www.suse.com/security/cve/CVE-2014-3631" source="SUSE CVE"/>
    <description>
    The assoc_array_gc function in the associative-array implementation in lib/assoc_array.c in the Linux kernel before 3.16.3 does not properly implement garbage collection, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via multiple "keyctl newring" operations followed by a "keyctl timeout" operation.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3631/">CVE-2014-3631 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3631">CVE-2014-3631 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/896262">SUSE bug 896262</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820632" comment="kernel-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820633" comment="kernel-abi-whitelists-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820634" comment="kernel-debug-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820637" comment="kernel-doc-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820638" comment="kernel-headers-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820639" comment="kernel-tools-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820640" comment="kernel-tools-libs-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820642" comment="perf-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820643" comment="python-perf-3.10.0-123.13.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143633" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3633</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3633" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3633" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3633" ref_url="https://www.suse.com/security/cve/CVE-2014-3633" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001247.html" source="SUSE-SU"/>
    <description>
    The qemuDomainGetBlockIoTune function in qemu/qemu_driver.c in libvirt before 1.2.9, when a disk has been hot-plugged or removed from the live image, allows remote attackers to cause a denial of service (crash) or read sensitive heap information via a crafted blkiotune query, which triggers an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3633/">CVE-2014-3633 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3633">CVE-2014-3633 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/897783">SUSE bug 897783</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820457" comment="libvirt-1.1.1-29.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820458" comment="libvirt-client-1.1.1-29.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820459" comment="libvirt-daemon-1.1.1-29.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820460" comment="libvirt-daemon-config-network-1.1.1-29.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820461" comment="libvirt-daemon-config-nwfilter-1.1.1-29.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820462" comment="libvirt-daemon-driver-interface-1.1.1-29.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820463" comment="libvirt-daemon-driver-lxc-1.1.1-29.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820464" comment="libvirt-daemon-driver-network-1.1.1-29.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820465" comment="libvirt-daemon-driver-nodedev-1.1.1-29.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820466" comment="libvirt-daemon-driver-nwfilter-1.1.1-29.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820467" comment="libvirt-daemon-driver-qemu-1.1.1-29.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820468" comment="libvirt-daemon-driver-secret-1.1.1-29.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820469" comment="libvirt-daemon-driver-storage-1.1.1-29.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820470" comment="libvirt-daemon-kvm-1.1.1-29.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820471" comment="libvirt-daemon-lxc-1.1.1-29.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820472" comment="libvirt-devel-1.1.1-29.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820473" comment="libvirt-docs-1.1.1-29.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820474" comment="libvirt-lock-sanlock-1.1.1-29.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820475" comment="libvirt-login-shell-1.1.1-29.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820476" comment="libvirt-python-1.1.1-29.el7_0.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143634" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3634</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3634" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3634" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3634" ref_url="https://www.suse.com/security/cve/CVE-2014-3634" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-October/001037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001064.html" source="SUSE-SU"/>
    <description>
    rsyslog before 7.6.6 and 8.x before 8.4.1 and sysklogd 1.5 and earlier allows remote attackers to cause a denial of service (crash), possibly execute arbitrary code, or have other unspecified impact via a crafted priority (PRI) value that triggers an out-of-bounds array access.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3634/">CVE-2014-3634 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3634">CVE-2014-3634 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/897262">SUSE bug 897262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/899756">SUSE bug 899756</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820480" comment="rsyslog-7.4.7-7.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820481" comment="rsyslog-crypto-7.4.7-7.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820482" comment="rsyslog-doc-7.4.7-7.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820483" comment="rsyslog-elasticsearch-7.4.7-7.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820484" comment="rsyslog-gnutls-7.4.7-7.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820485" comment="rsyslog-gssapi-7.4.7-7.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820486" comment="rsyslog-libdbi-7.4.7-7.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820487" comment="rsyslog-mmaudit-7.4.7-7.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820488" comment="rsyslog-mmjsonparse-7.4.7-7.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820489" comment="rsyslog-mmnormalize-7.4.7-7.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820490" comment="rsyslog-mmsnmptrapd-7.4.7-7.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820491" comment="rsyslog-mysql-7.4.7-7.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820492" comment="rsyslog-pgsql-7.4.7-7.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820493" comment="rsyslog-relp-7.4.7-7.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820494" comment="rsyslog-snmp-7.4.7-7.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820495" comment="rsyslog-udpspoof-7.4.7-7.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3640</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3640" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3640" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3640" ref_url="https://www.suse.com/security/cve/CVE-2014-3640" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002149.html" source="SUSE-SU"/>
    <description>
    The sosendto function in slirp/udp.c in QEMU before 2.1.2 allows local users to cause a denial of service (NULL pointer dereference) by sending a udp packet with a value of 0 in the source port and address, which triggers access of an uninitialized socket.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3640/">CVE-2014-3640 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3640">CVE-2014-3640 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/897654">SUSE bug 897654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965112">SUSE bug 965112</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820864" comment="libcacard-1.5.3-86.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820865" comment="libcacard-devel-1.5.3-86.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820866" comment="libcacard-tools-1.5.3-86.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820867" comment="qemu-img-1.5.3-86.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820868" comment="qemu-kvm-1.5.3-86.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820869" comment="qemu-kvm-common-1.5.3-86.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820870" comment="qemu-kvm-tools-1.5.3-86.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143645" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3645</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3645" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3645" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3645" ref_url="https://www.suse.com/security/cve/CVE-2014-3645" source="SUSE CVE"/>
    <description>
    arch/x86/kvm/vmx.c in the KVM subsystem in the Linux kernel before 3.12 does not have an exit handler for the INVEPT instruction, which allows guest OS users to cause a denial of service (guest OS crash) via a crafted application.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3645/">CVE-2014-3645 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3645">CVE-2014-3645 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/899192">SUSE bug 899192</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820531" comment="kernel-3.10.0-123.9.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820532" comment="kernel-abi-whitelists-3.10.0-123.9.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820533" comment="kernel-debug-3.10.0-123.9.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820536" comment="kernel-doc-3.10.0-123.9.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820537" comment="kernel-headers-3.10.0-123.9.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820538" comment="kernel-tools-3.10.0-123.9.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820539" comment="kernel-tools-libs-3.10.0-123.9.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820541" comment="perf-3.10.0-123.9.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820542" comment="python-perf-3.10.0-123.9.2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143646" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3646</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3646" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3646" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3646" ref_url="https://www.suse.com/security/cve/CVE-2014-3646" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1693-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001282.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/45VR2J6DOCMZ7DOFZ5B4QZ5CLCL3DYNQ/#45VR2J6DOCMZ7DOFZ5B4QZ5CLCL3DYNQ" source="SUSE-SU"/>
    <description>
    arch/x86/kvm/vmx.c in the KVM subsystem in the Linux kernel through 3.17.2 does not have an exit handler for the INVVPID instruction, which allows guest OS users to cause a denial of service (guest OS crash) via a crafted application.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3646/">CVE-2014-3646 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3646">CVE-2014-3646 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/899192">SUSE bug 899192</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820531" comment="kernel-3.10.0-123.9.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820532" comment="kernel-abi-whitelists-3.10.0-123.9.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820533" comment="kernel-debug-3.10.0-123.9.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820536" comment="kernel-doc-3.10.0-123.9.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820537" comment="kernel-headers-3.10.0-123.9.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820538" comment="kernel-tools-3.10.0-123.9.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820539" comment="kernel-tools-libs-3.10.0-123.9.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820541" comment="perf-3.10.0-123.9.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820542" comment="python-perf-3.10.0-123.9.2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143647" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3647</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3647" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3647" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3647" ref_url="https://www.suse.com/security/cve/CVE-2014-3647" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1693-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001441.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/45VR2J6DOCMZ7DOFZ5B4QZ5CLCL3DYNQ/#45VR2J6DOCMZ7DOFZ5B4QZ5CLCL3DYNQ" source="SUSE-SU"/>
    <description>
    arch/x86/kvm/emulate.c in the KVM subsystem in the Linux kernel through 3.17.2 does not properly perform RIP changes, which allows guest OS users to cause a denial of service (guest OS crash) via a crafted application.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2014-3647/">CVE-2014-3647 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3647">CVE-2014-3647 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1013038">SUSE bug 1013038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134834">SUSE bug 1134834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/899192">SUSE bug 899192</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821413" comment="kernel-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821414" comment="kernel-abi-whitelists-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821415" comment="kernel-debug-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821418" comment="kernel-doc-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821419" comment="kernel-headers-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821420" comment="kernel-tools-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821421" comment="kernel-tools-libs-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821423" comment="perf-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821424" comment="python-perf-3.10.0-327.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143657" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3657</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3657" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3657" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3657" ref_url="https://www.suse.com/security/cve/CVE-2014-3657" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001247.html" source="SUSE-SU"/>
    <description>
    The virDomainListPopulate function in conf/domain_conf.c in libvirt before 1.2.9 does not clean up the lock on the list of domains, which allows remote attackers to cause a denial of service (deadlock) via a NULL value in the second parameter in the virConnectListAllDomains API command.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3657/">CVE-2014-3657 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3657">CVE-2014-3657 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/897783">SUSE bug 897783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/899484">SUSE bug 899484</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820457" comment="libvirt-1.1.1-29.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820458" comment="libvirt-client-1.1.1-29.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820459" comment="libvirt-daemon-1.1.1-29.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820460" comment="libvirt-daemon-config-network-1.1.1-29.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820461" comment="libvirt-daemon-config-nwfilter-1.1.1-29.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820462" comment="libvirt-daemon-driver-interface-1.1.1-29.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820463" comment="libvirt-daemon-driver-lxc-1.1.1-29.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820464" comment="libvirt-daemon-driver-network-1.1.1-29.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820465" comment="libvirt-daemon-driver-nodedev-1.1.1-29.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820466" comment="libvirt-daemon-driver-nwfilter-1.1.1-29.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820467" comment="libvirt-daemon-driver-qemu-1.1.1-29.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820468" comment="libvirt-daemon-driver-secret-1.1.1-29.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820469" comment="libvirt-daemon-driver-storage-1.1.1-29.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820470" comment="libvirt-daemon-kvm-1.1.1-29.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820471" comment="libvirt-daemon-lxc-1.1.1-29.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820472" comment="libvirt-devel-1.1.1-29.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820473" comment="libvirt-docs-1.1.1-29.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820474" comment="libvirt-lock-sanlock-1.1.1-29.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820475" comment="libvirt-login-shell-1.1.1-29.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820476" comment="libvirt-python-1.1.1-29.el7_0.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143660" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3660</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3660" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3660" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3660" ref_url="https://www.suse.com/security/cve/CVE-2014-3660" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001142.html" source="SUSE-SU"/>
    <description>
    parser.c in libxml2 before 2.9.2 does not properly prevent entity expansion even when entity substitution has been disabled, which allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted XML document containing a large number of nested entity references, a variant of the "billion laughs" attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3660/">CVE-2014-3660 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3660">CVE-2014-3660 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901546">SUSE bug 901546</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820516" comment="libxml2-2.9.1-5.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820517" comment="libxml2-devel-2.9.1-5.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820518" comment="libxml2-python-2.9.1-5.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820519" comment="libxml2-static-2.9.1-5.el7_0.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143668" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3668</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3668" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3668" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3668" ref_url="https://www.suse.com/security/cve/CVE-2014-3668" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1638-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002131.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the date_from_ISO8601 function in the mkgmtime implementation in libxmlrpc/xmlrpc.c in the XMLRPC extension in PHP before 5.4.34, 5.5.x before 5.5.18, and 5.6.x before 5.6.2 allows remote attackers to cause a denial of service (application crash) via (1) a crafted first argument to the xmlrpc_set_type function or (2) a crafted argument to the xmlrpc_decode function, related to an out-of-bounds read operation.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3668/">CVE-2014-3668 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3668">CVE-2014-3668 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/902368">SUSE bug 902368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820544" comment="php-5.4.16-23.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820545" comment="php-bcmath-5.4.16-23.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820546" comment="php-cli-5.4.16-23.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820547" comment="php-common-5.4.16-23.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820548" comment="php-dba-5.4.16-23.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820549" comment="php-devel-5.4.16-23.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820550" comment="php-embedded-5.4.16-23.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820551" comment="php-enchant-5.4.16-23.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820552" comment="php-fpm-5.4.16-23.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820553" comment="php-gd-5.4.16-23.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820554" comment="php-intl-5.4.16-23.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820555" comment="php-ldap-5.4.16-23.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820556" comment="php-mbstring-5.4.16-23.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820557" comment="php-mysql-5.4.16-23.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820558" comment="php-mysqlnd-5.4.16-23.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820559" comment="php-odbc-5.4.16-23.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820560" comment="php-pdo-5.4.16-23.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820561" comment="php-pgsql-5.4.16-23.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820562" comment="php-process-5.4.16-23.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820563" comment="php-pspell-5.4.16-23.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820564" comment="php-recode-5.4.16-23.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820565" comment="php-snmp-5.4.16-23.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820566" comment="php-soap-5.4.16-23.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820567" comment="php-xml-5.4.16-23.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820568" comment="php-xmlrpc-5.4.16-23.el7_0.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143669" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3669</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3669" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3669" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3669" ref_url="https://www.suse.com/security/cve/CVE-2014-3669" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1638-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002131.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the object_custom function in ext/standard/var_unserializer.c in PHP before 5.4.34, 5.5.x before 5.5.18, and 5.6.x before 5.6.2 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an argument to the unserialize function that triggers calculation of a large length value.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-27"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3669/">CVE-2014-3669 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3669">CVE-2014-3669 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/902360">SUSE bug 902360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820544" comment="php-5.4.16-23.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820545" comment="php-bcmath-5.4.16-23.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820546" comment="php-cli-5.4.16-23.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820547" comment="php-common-5.4.16-23.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820548" comment="php-dba-5.4.16-23.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820549" comment="php-devel-5.4.16-23.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820550" comment="php-embedded-5.4.16-23.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820551" comment="php-enchant-5.4.16-23.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820552" comment="php-fpm-5.4.16-23.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820553" comment="php-gd-5.4.16-23.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820554" comment="php-intl-5.4.16-23.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820555" comment="php-ldap-5.4.16-23.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820556" comment="php-mbstring-5.4.16-23.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820557" comment="php-mysql-5.4.16-23.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820558" comment="php-mysqlnd-5.4.16-23.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820559" comment="php-odbc-5.4.16-23.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820560" comment="php-pdo-5.4.16-23.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820561" comment="php-pgsql-5.4.16-23.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820562" comment="php-process-5.4.16-23.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820563" comment="php-pspell-5.4.16-23.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820564" comment="php-recode-5.4.16-23.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820565" comment="php-snmp-5.4.16-23.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820566" comment="php-soap-5.4.16-23.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820567" comment="php-xml-5.4.16-23.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820568" comment="php-xmlrpc-5.4.16-23.el7_0.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143670" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3670</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3670" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3670" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3670" ref_url="https://www.suse.com/security/cve/CVE-2014-3670" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1638-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002131.html" source="SUSE-SU"/>
    <description>
    The exif_ifd_make_value function in exif.c in the EXIF extension in PHP before 5.4.34, 5.5.x before 5.5.18, and 5.6.x before 5.6.2 operates on floating-point arrays incorrectly, which allows remote attackers to cause a denial of service (heap memory corruption and application crash) or possibly execute arbitrary code via a crafted JPEG image with TIFF thumbnail data that is improperly handled by the exif_thumbnail function.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3670/">CVE-2014-3670 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3670">CVE-2014-3670 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/902357">SUSE bug 902357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820544" comment="php-5.4.16-23.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820545" comment="php-bcmath-5.4.16-23.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820546" comment="php-cli-5.4.16-23.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820547" comment="php-common-5.4.16-23.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820548" comment="php-dba-5.4.16-23.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820549" comment="php-devel-5.4.16-23.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820550" comment="php-embedded-5.4.16-23.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820551" comment="php-enchant-5.4.16-23.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820552" comment="php-fpm-5.4.16-23.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820553" comment="php-gd-5.4.16-23.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820554" comment="php-intl-5.4.16-23.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820555" comment="php-ldap-5.4.16-23.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820556" comment="php-mbstring-5.4.16-23.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820557" comment="php-mysql-5.4.16-23.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820558" comment="php-mysqlnd-5.4.16-23.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820559" comment="php-odbc-5.4.16-23.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820560" comment="php-pdo-5.4.16-23.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820561" comment="php-pgsql-5.4.16-23.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820562" comment="php-process-5.4.16-23.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820563" comment="php-pspell-5.4.16-23.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820564" comment="php-recode-5.4.16-23.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820565" comment="php-snmp-5.4.16-23.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820566" comment="php-soap-5.4.16-23.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820567" comment="php-xml-5.4.16-23.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820568" comment="php-xmlrpc-5.4.16-23.el7_0.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143673" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3673</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3673" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3673" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3673" ref_url="https://www.suse.com/security/cve/CVE-2014-3673" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1693-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001368.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1677-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KMCOHP6GELYLJBOOYH4FHHAYS7Q36GJY/#KMCOHP6GELYLJBOOYH4FHHAYS7Q36GJY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1678-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/537UDQ3EUWRMATJUJW6VCQRHQ6WZ7VVT/#537UDQ3EUWRMATJUJW6VCQRHQ6WZ7VVT" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/45VR2J6DOCMZ7DOFZ5B4QZ5CLCL3DYNQ/#45VR2J6DOCMZ7DOFZ5B4QZ5CLCL3DYNQ" source="SUSE-SU"/>
    <description>
    The SCTP implementation in the Linux kernel through 3.17.2 allows remote attackers to cause a denial of service (system crash) via a malformed ASCONF chunk, related to net/sctp/sm_make_chunk.c and net/sctp/sm_statefuns.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3673/">CVE-2014-3673 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3673">CVE-2014-3673 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1115893">SUSE bug 1115893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902346">SUSE bug 902346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902349">SUSE bug 902349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904899">SUSE bug 904899</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820632" comment="kernel-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820633" comment="kernel-abi-whitelists-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820634" comment="kernel-debug-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820637" comment="kernel-doc-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820638" comment="kernel-headers-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820639" comment="kernel-tools-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820640" comment="kernel-tools-libs-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820642" comment="perf-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820643" comment="python-perf-3.10.0-123.13.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143686" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3686</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3686" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3686" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3686" ref_url="https://www.suse.com/security/cve/CVE-2014-3686" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1356-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1013-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001423.html" source="SUSE-SU"/>
    <description>
    wpa_supplicant and hostapd 0.7.2 through 2.2, when running with certain configurations and using wpa_cli or hostapd_cli with action scripts, allows remote attackers to execute arbitrary commands via a crafted frame.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3686/">CVE-2014-3686 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3686">CVE-2014-3686 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1063667">SUSE bug 1063667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/900611">SUSE bug 900611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915323">SUSE bug 915323</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820631" comment="wpa_supplicant-2.0-13.el7_0 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143687" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3687</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3687" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3687" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3687" ref_url="https://www.suse.com/security/cve/CVE-2014-3687" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001198.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001572.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1677-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KMCOHP6GELYLJBOOYH4FHHAYS7Q36GJY/#KMCOHP6GELYLJBOOYH4FHHAYS7Q36GJY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1678-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/537UDQ3EUWRMATJUJW6VCQRHQ6WZ7VVT/#537UDQ3EUWRMATJUJW6VCQRHQ6WZ7VVT" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/45VR2J6DOCMZ7DOFZ5B4QZ5CLCL3DYNQ/#45VR2J6DOCMZ7DOFZ5B4QZ5CLCL3DYNQ" source="SUSE-SU"/>
    <description>
    The sctp_assoc_lookup_asconf_ack function in net/sctp/associola.c in the SCTP implementation in the Linux kernel through 3.17.2 allows remote attackers to cause a denial of service (panic) via duplicate ASCONF chunks that trigger an incorrect uncork within the side-effect interpreter.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3687/">CVE-2014-3687 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3687">CVE-2014-3687 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1115893">SUSE bug 1115893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902349">SUSE bug 902349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904899">SUSE bug 904899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909208">SUSE bug 909208</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820632" comment="kernel-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820633" comment="kernel-abi-whitelists-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820634" comment="kernel-debug-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820637" comment="kernel-doc-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820638" comment="kernel-headers-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820639" comment="kernel-tools-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820640" comment="kernel-tools-libs-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820642" comment="perf-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820643" comment="python-perf-3.10.0-123.13.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143688" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3688</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3688" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3688" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3688" ref_url="https://www.suse.com/security/cve/CVE-2014-3688" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2177-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20182177-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1677-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KMCOHP6GELYLJBOOYH4FHHAYS7Q36GJY/#KMCOHP6GELYLJBOOYH4FHHAYS7Q36GJY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1678-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/537UDQ3EUWRMATJUJW6VCQRHQ6WZ7VVT/#537UDQ3EUWRMATJUJW6VCQRHQ6WZ7VVT" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/45VR2J6DOCMZ7DOFZ5B4QZ5CLCL3DYNQ/#45VR2J6DOCMZ7DOFZ5B4QZ5CLCL3DYNQ" source="SUSE-SU"/>
    <description>
    The SCTP implementation in the Linux kernel before 3.17.4 allows remote attackers to cause a denial of service (memory consumption) by triggering a large number of chunks in an association's output queue, as demonstrated by ASCONF probes, related to net/sctp/inqueue.c and net/sctp/sm_statefuns.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3688/">CVE-2014-3688 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3688">CVE-2014-3688 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/902351">SUSE bug 902351</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820632" comment="kernel-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820633" comment="kernel-abi-whitelists-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820634" comment="kernel-debug-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820637" comment="kernel-doc-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820638" comment="kernel-headers-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820639" comment="kernel-tools-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820640" comment="kernel-tools-libs-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820642" comment="perf-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820643" comment="python-perf-3.10.0-123.13.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143690" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3690</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3690" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3690" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3690" ref_url="https://www.suse.com/security/cve/CVE-2014-3690" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001198.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/45VR2J6DOCMZ7DOFZ5B4QZ5CLCL3DYNQ/#45VR2J6DOCMZ7DOFZ5B4QZ5CLCL3DYNQ" source="SUSE-SU"/>
    <description>
    arch/x86/kvm/vmx.c in the KVM subsystem in the Linux kernel before 3.17.2 on Intel processors does not ensure that the value in the CR4 control register remains the same after a VM entry, which allows host OS users to kill arbitrary processes or cause a denial of service (system disruption) by leveraging /dev/kvm access, as demonstrated by PR_SET_TSC prctl calls within a modified copy of QEMU.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3690/">CVE-2014-3690 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3690">CVE-2014-3690 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/902232">SUSE bug 902232</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820807" comment="kernel-3.10.0-229.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820808" comment="kernel-abi-whitelists-3.10.0-229.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820809" comment="kernel-debug-3.10.0-229.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820812" comment="kernel-doc-3.10.0-229.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820813" comment="kernel-headers-3.10.0-229.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820814" comment="kernel-tools-3.10.0-229.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820815" comment="kernel-tools-libs-3.10.0-229.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820817" comment="perf-3.10.0-229.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820818" comment="python-perf-3.10.0-229.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143694" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3694</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3694" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3694" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3694" ref_url="https://www.suse.com/security/cve/CVE-2014-3694" source="SUSE CVE"/>
    <description>
    The (1) bundled GnuTLS SSL/TLS plugin and the (2) bundled OpenSSL SSL/TLS plugin in libpurple in Pidgin before 2.10.10 do not properly consider the Basic Constraints extension during verification of X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3694/">CVE-2014-3694 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3694">CVE-2014-3694 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/902495">SUSE bug 902495</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823185" comment="finch-2.10.11-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823186" comment="finch-devel-2.10.11-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823187" comment="libpurple-2.10.11-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823188" comment="libpurple-devel-2.10.11-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823189" comment="libpurple-perl-2.10.11-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823190" comment="libpurple-tcl-2.10.11-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823191" comment="pidgin-2.10.11-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823192" comment="pidgin-devel-2.10.11-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823193" comment="pidgin-perl-2.10.11-5.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143695" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3695</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3695" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3695" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3695" ref_url="https://www.suse.com/security/cve/CVE-2014-3695" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001108.html" source="SUSE-SU"/>
    <description>
    markup.c in the MXit protocol plugin in libpurple in Pidgin before 2.10.10 allows remote servers to cause a denial of service (application crash) via a large length value in an emoticon response.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3695/">CVE-2014-3695 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3695">CVE-2014-3695 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/902409">SUSE bug 902409</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823185" comment="finch-2.10.11-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823186" comment="finch-devel-2.10.11-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823187" comment="libpurple-2.10.11-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823188" comment="libpurple-devel-2.10.11-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823189" comment="libpurple-perl-2.10.11-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823190" comment="libpurple-tcl-2.10.11-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823191" comment="pidgin-2.10.11-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823192" comment="pidgin-devel-2.10.11-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823193" comment="pidgin-perl-2.10.11-5.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143696" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3696</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3696" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3696" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3696" ref_url="https://www.suse.com/security/cve/CVE-2014-3696" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001108.html" source="SUSE-SU"/>
    <description>
    nmevent.c in the Novell GroupWise protocol plugin in libpurple in Pidgin before 2.10.10 allows remote servers to cause a denial of service (application crash) via a crafted server message that triggers a large memory allocation.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3696/">CVE-2014-3696 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3696">CVE-2014-3696 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/902410">SUSE bug 902410</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823185" comment="finch-2.10.11-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823186" comment="finch-devel-2.10.11-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823187" comment="libpurple-2.10.11-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823188" comment="libpurple-devel-2.10.11-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823189" comment="libpurple-perl-2.10.11-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823190" comment="libpurple-tcl-2.10.11-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823191" comment="pidgin-2.10.11-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823192" comment="pidgin-devel-2.10.11-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823193" comment="pidgin-perl-2.10.11-5.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143698" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3698</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3698" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3698" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3698" ref_url="https://www.suse.com/security/cve/CVE-2014-3698" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001108.html" source="SUSE-SU"/>
    <description>
    The jabber_idn_validate function in jutil.c in the Jabber protocol plugin in libpurple in Pidgin before 2.10.10 allows remote attackers to obtain sensitive information from process memory via a crafted XMPP message.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3698/">CVE-2014-3698 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3698">CVE-2014-3698 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/902408">SUSE bug 902408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823185" comment="finch-2.10.11-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823186" comment="finch-devel-2.10.11-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823187" comment="libpurple-2.10.11-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823188" comment="libpurple-devel-2.10.11-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823189" comment="libpurple-perl-2.10.11-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823190" comment="libpurple-tcl-2.10.11-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823191" comment="pidgin-2.10.11-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823192" comment="pidgin-devel-2.10.11-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823193" comment="pidgin-perl-2.10.11-5.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143707" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3707</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3707" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3707" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3707" ref_url="https://www.suse.com/security/cve/CVE-2014-3707" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001199.html" source="SUSE-SU"/>
    <description>
    The curl_easy_duphandle function in libcurl 7.17.1 through 7.38.0, when running with the CURLOPT_COPYPOSTFIELDS option, does not properly copy HTTP POST data for an easy handle, which triggers an out-of-bounds read that allows remote web servers to read sensitive memory information.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3707/">CVE-2014-3707 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3707">CVE-2014-3707 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/901924">SUSE bug 901924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821436" comment="curl-7.29.0-25.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821437" comment="libcurl-7.29.0-25.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821438" comment="libcurl-devel-7.29.0-25.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143710" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3710</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3710" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3710" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3710" ref_url="https://www.suse.com/security/cve/CVE-2014-3710" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003580.html" source="SUSE-SU"/>
    <description>
    The donote function in readelf.c in file through 5.20, as used in the Fileinfo component in PHP 5.4.34, does not ensure that sufficient note headers are present, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted ELF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3710/">CVE-2014-3710 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3710">CVE-2014-3710 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/902367">SUSE bug 902367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910252">SUSE bug 910252</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821431" comment="file-5.11-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821432" comment="file-devel-5.11-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821433" comment="file-libs-5.11-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821434" comment="file-static-5.11-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820544" comment="php-5.4.16-23.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820545" comment="php-bcmath-5.4.16-23.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820546" comment="php-cli-5.4.16-23.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820547" comment="php-common-5.4.16-23.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820548" comment="php-dba-5.4.16-23.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820549" comment="php-devel-5.4.16-23.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820550" comment="php-embedded-5.4.16-23.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820551" comment="php-enchant-5.4.16-23.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820552" comment="php-fpm-5.4.16-23.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820553" comment="php-gd-5.4.16-23.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820554" comment="php-intl-5.4.16-23.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820555" comment="php-ldap-5.4.16-23.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820556" comment="php-mbstring-5.4.16-23.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820557" comment="php-mysql-5.4.16-23.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820558" comment="php-mysqlnd-5.4.16-23.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820559" comment="php-odbc-5.4.16-23.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820560" comment="php-pdo-5.4.16-23.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820561" comment="php-pgsql-5.4.16-23.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820562" comment="php-process-5.4.16-23.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820563" comment="php-pspell-5.4.16-23.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820564" comment="php-recode-5.4.16-23.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820565" comment="php-snmp-5.4.16-23.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820566" comment="php-soap-5.4.16-23.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820567" comment="php-xml-5.4.16-23.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820568" comment="php-xmlrpc-5.4.16-23.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821435" comment="python-magic-5.11-31.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143917" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3917</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3917" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3917" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3917" ref_url="https://www.suse.com/security/cve/CVE-2014-3917" source="SUSE CVE"/>
		<reference ref_id="SUSE-OU-2014:0907-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2014-July/002089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/000987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/001005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001368.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0957-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GO7GJ4UCFKZBCYTCLG7H63BO55AEZN76/#GO7GJ4UCFKZBCYTCLG7H63BO55AEZN76" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0985-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NWVYV5V3NMGO4WS5TC6FPFJL4CDM275W/#NWVYV5V3NMGO4WS5TC6FPFJL4CDM275W" source="SUSE-SU"/>
    <description>
    kernel/auditsc.c in the Linux kernel through 3.14.5, when CONFIG_AUDITSYSCALL is enabled with certain syscall rules, allows local users to obtain potentially sensitive single-bit values from kernel memory or cause a denial of service (OOPS) via a large value of a syscall number.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3917/">CVE-2014-3917 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3917">CVE-2014-3917 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/880484">SUSE bug 880484</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820403" comment="kernel-3.10.0-123.8.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820404" comment="kernel-abi-whitelists-3.10.0-123.8.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820405" comment="kernel-debug-3.10.0-123.8.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820408" comment="kernel-doc-3.10.0-123.8.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820409" comment="kernel-headers-3.10.0-123.8.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820410" comment="kernel-tools-3.10.0-123.8.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820411" comment="kernel-tools-libs-3.10.0-123.8.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820413" comment="perf-3.10.0-123.8.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820414" comment="python-perf-3.10.0-123.8.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143940" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3940</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3940" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3940" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3940" ref_url="https://www.suse.com/security/cve/CVE-2014-3940" source="SUSE CVE"/>
    <description>
    The Linux kernel through 3.14.5 does not properly consider the presence of hugetlb entries, which allows local users to cause a denial of service (memory corruption or system crash) by accessing certain memory locations, as demonstrated by triggering a race condition via numa_maps read operations during hugepage migration, related to fs/proc/task_mmu.c and mm/mempolicy.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3940/">CVE-2014-3940 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3940">CVE-2014-3940 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/881101">SUSE bug 881101</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820807" comment="kernel-3.10.0-229.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820808" comment="kernel-abi-whitelists-3.10.0-229.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820809" comment="kernel-debug-3.10.0-229.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820812" comment="kernel-doc-3.10.0-229.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820813" comment="kernel-headers-3.10.0-229.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820814" comment="kernel-tools-3.10.0-229.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820815" comment="kernel-tools-libs-3.10.0-229.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820817" comment="perf-3.10.0-229.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820818" comment="python-perf-3.10.0-229.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144027" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4027</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4027" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4027" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4027" ref_url="https://www.suse.com/security/cve/CVE-2014-4027" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-October/001038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-October/001040.html" source="SUSE-SU"/>
    <description>
    The rd_build_device_space function in drivers/target/target_core_rd.c in the Linux kernel before 3.14 does not properly initialize a certain data structure, which allows local users to obtain sensitive information from ramdisk_mcp memory by leveraging access to a SCSI initiator.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4027/">CVE-2014-4027 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4027">CVE-2014-4027 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/882639">SUSE bug 882639</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820632" comment="kernel-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820633" comment="kernel-abi-whitelists-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820634" comment="kernel-debug-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820637" comment="kernel-doc-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820638" comment="kernel-headers-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820639" comment="kernel-tools-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820640" comment="kernel-tools-libs-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820642" comment="perf-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820643" comment="python-perf-3.10.0-123.13.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144049" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4049</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4049" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4049" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4049" ref_url="https://www.suse.com/security/cve/CVE-2014-4049" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0868-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0873-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/001007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1638-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002131.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the php_parserr function in ext/standard/dns.c in PHP 5.6.0beta4 and earlier allows remote servers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted DNS TXT record, related to the dns_get_record function.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4049/">CVE-2014-4049 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4049">CVE-2014-4049 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/882992">SUSE bug 882992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/893853">SUSE bug 893853</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820328" comment="php-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820329" comment="php-bcmath-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820330" comment="php-cli-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820331" comment="php-common-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820332" comment="php-dba-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820333" comment="php-devel-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820334" comment="php-embedded-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820335" comment="php-enchant-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820336" comment="php-fpm-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820337" comment="php-gd-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820338" comment="php-intl-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820339" comment="php-ldap-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820340" comment="php-mbstring-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820341" comment="php-mysql-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820342" comment="php-mysqlnd-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820343" comment="php-odbc-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820344" comment="php-pdo-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820345" comment="php-pgsql-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820346" comment="php-process-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820347" comment="php-pspell-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820348" comment="php-recode-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820349" comment="php-snmp-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820350" comment="php-soap-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820351" comment="php-xml-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820352" comment="php-xmlrpc-5.4.16-23.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144171" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4171</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4171" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4171" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4171" ref_url="https://www.suse.com/security/cve/CVE-2014-4171" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-October/001038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-October/001040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0957-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GO7GJ4UCFKZBCYTCLG7H63BO55AEZN76/#GO7GJ4UCFKZBCYTCLG7H63BO55AEZN76" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0985-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NWVYV5V3NMGO4WS5TC6FPFJL4CDM275W/#NWVYV5V3NMGO4WS5TC6FPFJL4CDM275W" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1669-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GDZOTMP2VOUC5CTGQ542UWQZWRTOES4X/#GDZOTMP2VOUC5CTGQ542UWQZWRTOES4X" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1677-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KMCOHP6GELYLJBOOYH4FHHAYS7Q36GJY/#KMCOHP6GELYLJBOOYH4FHHAYS7Q36GJY" source="SUSE-SU"/>
    <description>
    mm/shmem.c in the Linux kernel through 3.15.1 does not properly implement the interaction between range notification and hole punching, which allows local users to cause a denial of service (i_mutex hold) by using the mmap system call to access a hole, as demonstrated by interfering with intended shmem activity by blocking completion of (1) an MADV_REMOVE madvise call or (2) an FALLOC_FL_PUNCH_HOLE fallocate call.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4171/">CVE-2014-4171 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4171">CVE-2014-4171 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/883518">SUSE bug 883518</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820753" comment="kernel-3.10.0-123.20.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820754" comment="kernel-abi-whitelists-3.10.0-123.20.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820755" comment="kernel-debug-3.10.0-123.20.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820758" comment="kernel-doc-3.10.0-123.20.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820759" comment="kernel-headers-3.10.0-123.20.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820760" comment="kernel-tools-3.10.0-123.20.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820761" comment="kernel-tools-libs-3.10.0-123.20.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820763" comment="perf-3.10.0-123.20.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820764" comment="python-perf-3.10.0-123.20.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144207" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4207</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4207" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4207" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4207" ref_url="https://www.suse.com/security/cve/CVE-2014-4207" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001353.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.37 and earlier allows remote authenticated users to affect availability via vectors related to SROPTZR.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4207/">CVE-2014-4207 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4207">CVE-2014-4207 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/887580">SUSE bug 887580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915914">SUSE bug 915914</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820594" comment="mariadb-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820595" comment="mariadb-bench-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820596" comment="mariadb-devel-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820597" comment="mariadb-embedded-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820598" comment="mariadb-embedded-devel-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820599" comment="mariadb-libs-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820600" comment="mariadb-server-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820601" comment="mariadb-test-5.5.40-1.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144243" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4243</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4243" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4243" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4243" ref_url="https://www.suse.com/security/cve/CVE-2014-4243" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000975.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.35 and earlier and 5.6.15 and earlier allows remote authenticated users to affect availability via vectors related to ENFED.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4243/">CVE-2014-4243 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4243">CVE-2014-4243 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/887580">SUSE bug 887580</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820594" comment="mariadb-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820595" comment="mariadb-bench-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820596" comment="mariadb-devel-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820597" comment="mariadb-embedded-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820598" comment="mariadb-embedded-devel-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820599" comment="mariadb-libs-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820600" comment="mariadb-server-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820601" comment="mariadb-test-5.5.40-1.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144258" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4258</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4258" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4258" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4258" ref_url="https://www.suse.com/security/cve/CVE-2014-4258" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001353.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.37 and earlier and 5.6.17 and earlier allows remote authenticated users to affect confidentiality, integrity, and availability via vectors related to SRINFOSC.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4258/">CVE-2014-4258 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4258">CVE-2014-4258 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/887580">SUSE bug 887580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915914">SUSE bug 915914</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820594" comment="mariadb-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820595" comment="mariadb-bench-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820596" comment="mariadb-devel-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820597" comment="mariadb-embedded-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820598" comment="mariadb-embedded-devel-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820599" comment="mariadb-libs-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820600" comment="mariadb-server-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820601" comment="mariadb-test-5.5.40-1.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144260" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4260</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4260" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4260" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4260" ref_url="https://www.suse.com/security/cve/CVE-2014-4260" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001353.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.37 and earlier, and 5.6.17 and earlier, allows remote authenticated users to affect integrity and availability via vectors related to SRCHAR.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4260/">CVE-2014-4260 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4260">CVE-2014-4260 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/887580">SUSE bug 887580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915914">SUSE bug 915914</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820594" comment="mariadb-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820595" comment="mariadb-bench-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820596" comment="mariadb-devel-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820597" comment="mariadb-embedded-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820598" comment="mariadb-embedded-devel-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820599" comment="mariadb-libs-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820600" comment="mariadb-server-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820601" comment="mariadb-test-5.5.40-1.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144274" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4274</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4274" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4274" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4274" ref_url="https://www.suse.com/security/cve/CVE-2014-4274" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001353.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier and 5.6.19 and earlier allows local users to affect confidentiality, integrity, and availability via vectors related to SERVER:MyISAM.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4274/">CVE-2014-4274 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4274">CVE-2014-4274 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/857678">SUSE bug 857678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/896400">SUSE bug 896400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901237">SUSE bug 901237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915913">SUSE bug 915913</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820594" comment="mariadb-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820595" comment="mariadb-bench-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820596" comment="mariadb-devel-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820597" comment="mariadb-embedded-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820598" comment="mariadb-embedded-devel-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820599" comment="mariadb-libs-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820600" comment="mariadb-server-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820601" comment="mariadb-test-5.5.40-1.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144287" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4287</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4287" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4287" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4287" ref_url="https://www.suse.com/security/cve/CVE-2014-4287" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001353.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier and 5.6.19 and earlier allows remote authenticated users to affect availability via vectors related to SERVER:CHARACTER SETS.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4287/">CVE-2014-4287 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4287">CVE-2014-4287 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/901237">SUSE bug 901237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915913">SUSE bug 915913</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820594" comment="mariadb-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820595" comment="mariadb-bench-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820596" comment="mariadb-devel-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820597" comment="mariadb-embedded-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820598" comment="mariadb-embedded-devel-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820599" comment="mariadb-libs-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820600" comment="mariadb-server-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820601" comment="mariadb-test-5.5.40-1.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144337" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4337</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4337" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4337" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4337" ref_url="https://www.suse.com/security/cve/CVE-2014-4337" source="SUSE CVE"/>
    <description>
    The process_browse_data function in utils/cups-browsed.c in cups-browsed in cups-filters before 1.0.53 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via crafted packet data.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4337/">CVE-2014-4337 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4337">CVE-2014-4337 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/871327">SUSE bug 871327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883543">SUSE bug 883543</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820569" comment="cups-filters-1.0.35-15.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820570" comment="cups-filters-devel-1.0.35-15.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820571" comment="cups-filters-libs-1.0.35-15.el7_0.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144338" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4338</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4338" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4338" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4338" ref_url="https://www.suse.com/security/cve/CVE-2014-4338" source="SUSE CVE"/>
    <description>
    cups-browsed in cups-filters before 1.0.53 allows remote attackers to bypass intended access restrictions in opportunistic circumstances by leveraging a malformed cups-browsed.conf BrowseAllow directive that is interpreted as granting browse access to all IP addresses.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4338/">CVE-2014-4338 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4338">CVE-2014-4338 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/871327">SUSE bug 871327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883536">SUSE bug 883536</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820569" comment="cups-filters-1.0.35-15.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820570" comment="cups-filters-devel-1.0.35-15.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820571" comment="cups-filters-libs-1.0.35-15.el7_0.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144341" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4341</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4341" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4341" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4341" ref_url="https://www.suse.com/security/cve/CVE-2014-4341" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0989-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000943.html" source="SUSE-SU"/>
    <description>
    MIT Kerberos 5 (aka krb5) before 1.12.2 allows remote attackers to cause a denial of service (buffer over-read and application crash) by injecting invalid tokens into a GSSAPI application session.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4341/">CVE-2014-4341 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4341">CVE-2014-4341 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/770172">SUSE bug 770172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/886016">SUSE bug 886016</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820882" comment="krb5-devel-1.12.2-14.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820883" comment="krb5-libs-1.12.2-14.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820884" comment="krb5-pkinit-1.12.2-14.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820885" comment="krb5-server-1.12.2-14.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820886" comment="krb5-server-ldap-1.12.2-14.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820887" comment="krb5-workstation-1.12.2-14.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144342" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4342</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4342" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4342" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4342" ref_url="https://www.suse.com/security/cve/CVE-2014-4342" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0989-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000943.html" source="SUSE-SU"/>
    <description>
    MIT Kerberos 5 (aka krb5) 1.7.x through 1.12.x before 1.12.2 allows remote attackers to cause a denial of service (buffer over-read or NULL pointer dereference, and application crash) by injecting invalid tokens into a GSSAPI application session.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4342/">CVE-2014-4342 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4342">CVE-2014-4342 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/770172">SUSE bug 770172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/886016">SUSE bug 886016</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820882" comment="krb5-devel-1.12.2-14.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820883" comment="krb5-libs-1.12.2-14.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820884" comment="krb5-pkinit-1.12.2-14.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820885" comment="krb5-server-1.12.2-14.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820886" comment="krb5-server-ldap-1.12.2-14.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820887" comment="krb5-workstation-1.12.2-14.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144343" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4343</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4343" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4343" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4343" ref_url="https://www.suse.com/security/cve/CVE-2014-4343" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0989-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000943.html" source="SUSE-SU"/>
    <description>
    Double free vulnerability in the init_ctx_reselect function in the SPNEGO initiator in lib/gssapi/spnego/spnego_mech.c in MIT Kerberos 5 (aka krb5) 1.10.x through 1.12.x before 1.12.2 allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via network traffic that appears to come from an intended acceptor, but specifies a security mechanism different from the one proposed by the initiator.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4343/">CVE-2014-4343 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4343">CVE-2014-4343 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/770172">SUSE bug 770172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/888697">SUSE bug 888697</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820882" comment="krb5-devel-1.12.2-14.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820883" comment="krb5-libs-1.12.2-14.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820884" comment="krb5-pkinit-1.12.2-14.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820885" comment="krb5-server-1.12.2-14.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820886" comment="krb5-server-ldap-1.12.2-14.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820887" comment="krb5-workstation-1.12.2-14.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144344" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4344</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4344" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4344" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4344" ref_url="https://www.suse.com/security/cve/CVE-2014-4344" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0989-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000943.html" source="SUSE-SU"/>
    <description>
    The acc_ctx_cont function in the SPNEGO acceptor in lib/gssapi/spnego/spnego_mech.c in MIT Kerberos 5 (aka krb5) 1.5.x through 1.12.x before 1.12.2 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an empty continuation token at a certain point during a SPNEGO negotiation.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4344/">CVE-2014-4344 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4344">CVE-2014-4344 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/888697">SUSE bug 888697</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820882" comment="krb5-devel-1.12.2-14.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820883" comment="krb5-libs-1.12.2-14.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820884" comment="krb5-pkinit-1.12.2-14.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820885" comment="krb5-server-1.12.2-14.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820886" comment="krb5-server-ldap-1.12.2-14.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820887" comment="krb5-workstation-1.12.2-14.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144345" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4345</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4345" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4345" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4345" ref_url="https://www.suse.com/security/cve/CVE-2014-4345" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000965.html" source="SUSE-SU"/>
    <description>
    Off-by-one error in the krb5_encode_krbsecretkey function in plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c in the LDAP KDB module in kadmind in MIT Kerberos 5 (aka krb5) 1.6.x through 1.11.x before 1.11.6 and 1.12.x before 1.12.2 allows remote authenticated users to cause a denial of service (buffer overflow) or possibly execute arbitrary code via a series of "cpw -keepold" commands.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4345/">CVE-2014-4345 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4345">CVE-2014-4345 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/770172">SUSE bug 770172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891082">SUSE bug 891082</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820882" comment="krb5-devel-1.12.2-14.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820883" comment="krb5-libs-1.12.2-14.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820884" comment="krb5-pkinit-1.12.2-14.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820885" comment="krb5-server-1.12.2-14.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820886" comment="krb5-server-ldap-1.12.2-14.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820887" comment="krb5-workstation-1.12.2-14.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144616" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4616</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4616" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4616" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4616" ref_url="https://www.suse.com/security/cve/CVE-2014-4616" source="SUSE CVE"/>
    <description>
    Array index error in the scanstring function in the _json module in Python 2.7 through 3.5 and simplejson before 2.6.1 allows context-dependent attackers to read arbitrary process memory via a negative index value in the idx argument to the raw_decode function.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4616/">CVE-2014-4616 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-4616">CVE-2014-4616 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/884075">SUSE bug 884075</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821393" comment="python-2.7.5-34.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821394" comment="python-debug-2.7.5-34.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821395" comment="python-devel-2.7.5-34.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821396" comment="python-libs-2.7.5-34.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821397" comment="python-test-2.7.5-34.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821398" comment="python-tools-2.7.5-34.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821399" comment="tkinter-2.7.5-34.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144650" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4650</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4650" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4650" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4650" ref_url="https://www.suse.com/security/cve/CVE-2014-4650" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0444-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0447-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0450-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0452-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0456-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1005-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1009-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0086-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SRKGGFVSV7DDWCMAOSO6E3F66U2CF5XR/" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/pipermail/neuvector-updates/2023-November/000021.html" source="SUSE-SU"/>
    <description>
    The CGIHTTPServer module in Python 2.7.5 and 3.3.4 does not properly handle URLs in which URL encoding is used for path separators, which allows remote attackers to read script source code or conduct directory traversal attacks and execute unintended code via a crafted character sequence, as demonstrated by a %2f separator.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2014-4650/">CVE-2014-4650 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-4650">CVE-2014-4650 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/856835">SUSE bug 856835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/856836">SUSE bug 856836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/863741">SUSE bug 863741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885882">SUSE bug 885882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898572">SUSE bug 898572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912739">SUSE bug 912739</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821393" comment="python-2.7.5-34.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821394" comment="python-debug-2.7.5-34.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821395" comment="python-devel-2.7.5-34.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821396" comment="python-libs-2.7.5-34.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821397" comment="python-test-2.7.5-34.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821398" comment="python-tools-2.7.5-34.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821399" comment="tkinter-2.7.5-34.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144652" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4652</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4652" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4652" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4652" ref_url="https://www.suse.com/security/cve/CVE-2014-4652" source="SUSE CVE"/>
		<reference ref_id="SUSE-OU-2014:0907-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2014-July/002089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/000987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/001005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001368.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0957-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GO7GJ4UCFKZBCYTCLG7H63BO55AEZN76/#GO7GJ4UCFKZBCYTCLG7H63BO55AEZN76" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0985-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NWVYV5V3NMGO4WS5TC6FPFJL4CDM275W/#NWVYV5V3NMGO4WS5TC6FPFJL4CDM275W" source="SUSE-SU"/>
    <description>
    Race condition in the tlv handler functionality in the snd_ctl_elem_user_tlv function in sound/core/control.c in the ALSA control implementation in the Linux kernel before 3.15.2 allows local users to obtain sensitive information from kernel memory by leveraging /dev/snd/controlCX access.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-24"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4652/">CVE-2014-4652 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4652">CVE-2014-4652 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/883795">SUSE bug 883795</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820632" comment="kernel-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820633" comment="kernel-abi-whitelists-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820634" comment="kernel-debug-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820637" comment="kernel-doc-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820638" comment="kernel-headers-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820639" comment="kernel-tools-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820640" comment="kernel-tools-libs-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820642" comment="perf-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820643" comment="python-perf-3.10.0-123.13.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144653" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4653</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4653" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4653" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4653" ref_url="https://www.suse.com/security/cve/CVE-2014-4653" source="SUSE CVE"/>
		<reference ref_id="SUSE-OU-2014:0907-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2014-July/002089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/000987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/001005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001368.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0957-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GO7GJ4UCFKZBCYTCLG7H63BO55AEZN76/#GO7GJ4UCFKZBCYTCLG7H63BO55AEZN76" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0985-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NWVYV5V3NMGO4WS5TC6FPFJL4CDM275W/#NWVYV5V3NMGO4WS5TC6FPFJL4CDM275W" source="SUSE-SU"/>
    <description>
    sound/core/control.c in the ALSA control implementation in the Linux kernel before 3.15.2 does not ensure possession of a read/write lock, which allows local users to cause a denial of service (use-after-free) and obtain sensitive information from kernel memory by leveraging /dev/snd/controlCX access.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4653/">CVE-2014-4653 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4653">CVE-2014-4653 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/883795">SUSE bug 883795</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820531" comment="kernel-3.10.0-123.9.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820532" comment="kernel-abi-whitelists-3.10.0-123.9.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820533" comment="kernel-debug-3.10.0-123.9.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820536" comment="kernel-doc-3.10.0-123.9.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820537" comment="kernel-headers-3.10.0-123.9.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820538" comment="kernel-tools-3.10.0-123.9.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820539" comment="kernel-tools-libs-3.10.0-123.9.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820541" comment="perf-3.10.0-123.9.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820542" comment="python-perf-3.10.0-123.9.2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144654" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4654</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4654" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4654" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4654" ref_url="https://www.suse.com/security/cve/CVE-2014-4654" source="SUSE CVE"/>
		<reference ref_id="SUSE-OU-2014:0907-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2014-July/002089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/000987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/001005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001368.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0957-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GO7GJ4UCFKZBCYTCLG7H63BO55AEZN76/#GO7GJ4UCFKZBCYTCLG7H63BO55AEZN76" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0985-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NWVYV5V3NMGO4WS5TC6FPFJL4CDM275W/#NWVYV5V3NMGO4WS5TC6FPFJL4CDM275W" source="SUSE-SU"/>
    <description>
    The snd_ctl_elem_add function in sound/core/control.c in the ALSA control implementation in the Linux kernel before 3.15.2 does not check authorization for SNDRV_CTL_IOCTL_ELEM_REPLACE commands, which allows local users to remove kernel controls and cause a denial of service (use-after-free and system crash) by leveraging /dev/snd/controlCX access for an ioctl call.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4654/">CVE-2014-4654 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4654">CVE-2014-4654 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/883795">SUSE bug 883795</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820632" comment="kernel-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820633" comment="kernel-abi-whitelists-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820634" comment="kernel-debug-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820637" comment="kernel-doc-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820638" comment="kernel-headers-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820639" comment="kernel-tools-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820640" comment="kernel-tools-libs-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820642" comment="perf-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820643" comment="python-perf-3.10.0-123.13.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144655" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4655</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4655" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4655" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4655" ref_url="https://www.suse.com/security/cve/CVE-2014-4655" source="SUSE CVE"/>
		<reference ref_id="SUSE-OU-2014:0907-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2014-July/002089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/000987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/001005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001368.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0957-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GO7GJ4UCFKZBCYTCLG7H63BO55AEZN76/#GO7GJ4UCFKZBCYTCLG7H63BO55AEZN76" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0985-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NWVYV5V3NMGO4WS5TC6FPFJL4CDM275W/#NWVYV5V3NMGO4WS5TC6FPFJL4CDM275W" source="SUSE-SU"/>
    <description>
    The snd_ctl_elem_add function in sound/core/control.c in the ALSA control implementation in the Linux kernel before 3.15.2 does not properly maintain the user_ctl_count value, which allows local users to cause a denial of service (integer overflow and limit bypass) by leveraging /dev/snd/controlCX access for a large number of SNDRV_CTL_IOCTL_ELEM_REPLACE ioctl calls.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4655/">CVE-2014-4655 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4655">CVE-2014-4655 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/883795">SUSE bug 883795</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820632" comment="kernel-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820633" comment="kernel-abi-whitelists-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820634" comment="kernel-debug-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820637" comment="kernel-doc-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820638" comment="kernel-headers-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820639" comment="kernel-tools-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820640" comment="kernel-tools-libs-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820642" comment="perf-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820643" comment="python-perf-3.10.0-123.13.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144656" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4656</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4656" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4656" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4656" ref_url="https://www.suse.com/security/cve/CVE-2014-4656" source="SUSE CVE"/>
		<reference ref_id="SUSE-OU-2014:0907-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2014-July/002089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/000987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/001005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001368.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0957-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GO7GJ4UCFKZBCYTCLG7H63BO55AEZN76/#GO7GJ4UCFKZBCYTCLG7H63BO55AEZN76" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0985-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NWVYV5V3NMGO4WS5TC6FPFJL4CDM275W/#NWVYV5V3NMGO4WS5TC6FPFJL4CDM275W" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in sound/core/control.c in the ALSA control implementation in the Linux kernel before 3.15.2 allow local users to cause a denial of service by leveraging /dev/snd/controlCX access, related to (1) index values in the snd_ctl_add function and (2) numid values in the snd_ctl_remove_numid_conflict function.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4656/">CVE-2014-4656 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4656">CVE-2014-4656 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/883795">SUSE bug 883795</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820632" comment="kernel-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820633" comment="kernel-abi-whitelists-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820634" comment="kernel-debug-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820637" comment="kernel-doc-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820638" comment="kernel-headers-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820639" comment="kernel-tools-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820640" comment="kernel-tools-libs-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820642" comment="perf-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820643" comment="python-perf-3.10.0-123.13.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144667" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4667</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4667" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4667" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4667" ref_url="https://www.suse.com/security/cve/CVE-2014-4667" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/000987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/001005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-October/001038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-October/001040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001368.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0957-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GO7GJ4UCFKZBCYTCLG7H63BO55AEZN76/#GO7GJ4UCFKZBCYTCLG7H63BO55AEZN76" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0985-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NWVYV5V3NMGO4WS5TC6FPFJL4CDM275W/#NWVYV5V3NMGO4WS5TC6FPFJL4CDM275W" source="SUSE-SU"/>
    <description>
    The sctp_association_free function in net/sctp/associola.c in the Linux kernel before 3.15.2 does not properly manage a certain backlog value, which allows remote attackers to cause a denial of service (socket outage) via a crafted SCTP packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4667/">CVE-2014-4667 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4667">CVE-2014-4667 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/885422">SUSE bug 885422</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820353" comment="kernel-3.10.0-123.6.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820354" comment="kernel-abi-whitelists-3.10.0-123.6.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820355" comment="kernel-debug-3.10.0-123.6.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820358" comment="kernel-doc-3.10.0-123.6.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820359" comment="kernel-headers-3.10.0-123.6.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820360" comment="kernel-tools-3.10.0-123.6.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820361" comment="kernel-tools-libs-3.10.0-123.6.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820363" comment="perf-3.10.0-123.6.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820364" comment="python-perf-3.10.0-123.6.3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144670" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4670</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4670" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4670" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4670" ref_url="https://www.suse.com/security/cve/CVE-2014-4670" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0938-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1638-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002131.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in ext/spl/spl_dllist.c in the SPL component in PHP through 5.5.14 allows context-dependent attackers to cause a denial of service or possibly have unspecified other impact via crafted iterator usage within applications in certain web-hosting environments.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4670/">CVE-2014-4670 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4670">CVE-2014-4670 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/886059">SUSE bug 886059</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992991">SUSE bug 992991</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820432" comment="php-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820433" comment="php-bcmath-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820434" comment="php-cli-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820435" comment="php-common-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820436" comment="php-dba-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820437" comment="php-devel-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820438" comment="php-embedded-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820439" comment="php-enchant-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820440" comment="php-fpm-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820441" comment="php-gd-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820442" comment="php-intl-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820443" comment="php-ldap-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820444" comment="php-mbstring-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820445" comment="php-mysql-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820446" comment="php-mysqlnd-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820447" comment="php-odbc-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820448" comment="php-pdo-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820449" comment="php-pgsql-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820450" comment="php-process-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820451" comment="php-pspell-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820452" comment="php-recode-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820453" comment="php-snmp-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820454" comment="php-soap-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820455" comment="php-xml-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820456" comment="php-xmlrpc-5.4.16-23.el7_0.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144698" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4698</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4698" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4698" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4698" ref_url="https://www.suse.com/security/cve/CVE-2014-4698" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0938-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1638-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002131.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in ext/spl/spl_array.c in the SPL component in PHP through 5.5.14 allows context-dependent attackers to cause a denial of service or possibly have unspecified other impact via crafted ArrayIterator usage within applications in certain web-hosting environments.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4698/">CVE-2014-4698 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4698">CVE-2014-4698 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/886060">SUSE bug 886060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820432" comment="php-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820433" comment="php-bcmath-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820434" comment="php-cli-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820435" comment="php-common-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820436" comment="php-dba-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820437" comment="php-devel-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820438" comment="php-embedded-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820439" comment="php-enchant-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820440" comment="php-fpm-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820441" comment="php-gd-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820442" comment="php-intl-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820443" comment="php-ldap-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820444" comment="php-mbstring-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820445" comment="php-mysql-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820446" comment="php-mysqlnd-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820447" comment="php-odbc-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820448" comment="php-pdo-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820449" comment="php-pgsql-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820450" comment="php-process-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820451" comment="php-pspell-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820452" comment="php-recode-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820453" comment="php-snmp-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820454" comment="php-soap-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820455" comment="php-xml-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820456" comment="php-xmlrpc-5.4.16-23.el7_0.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144699" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4699</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4699" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4699" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4699" ref_url="https://www.suse.com/security/cve/CVE-2014-4699" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/000987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/001005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0957-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GO7GJ4UCFKZBCYTCLG7H63BO55AEZN76/#GO7GJ4UCFKZBCYTCLG7H63BO55AEZN76" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0985-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NWVYV5V3NMGO4WS5TC6FPFJL4CDM275W/#NWVYV5V3NMGO4WS5TC6FPFJL4CDM275W" source="SUSE-SU"/>
    <description>
    The Linux kernel before 3.15.4 on Intel processors does not properly restrict use of a non-canonical value for the saved RIP address in the case of a system call that does not use IRET, which allows local users to leverage a race condition and gain privileges, or cause a denial of service (double fault), via a crafted application that makes ptrace and fork system calls.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4699/">CVE-2014-4699 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4699">CVE-2014-4699 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/885725">SUSE bug 885725</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820277" comment="kernel-3.10.0-123.4.4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820278" comment="kernel-abi-whitelists-3.10.0-123.4.4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820279" comment="kernel-debug-3.10.0-123.4.4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820282" comment="kernel-doc-3.10.0-123.4.4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820283" comment="kernel-headers-3.10.0-123.4.4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820284" comment="kernel-tools-3.10.0-123.4.4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820285" comment="kernel-tools-libs-3.10.0-123.4.4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820287" comment="perf-3.10.0-123.4.4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820288" comment="python-perf-3.10.0-123.4.4.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144721" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4721</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4721" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4721" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4721" ref_url="https://www.suse.com/security/cve/CVE-2014-4721" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0938-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1638-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002131.html" source="SUSE-SU"/>
    <description>
    The phpinfo implementation in ext/standard/info.c in PHP before 5.4.30 and 5.5.x before 5.5.14 does not ensure use of the string data type for the PHP_AUTH_PW, PHP_AUTH_TYPE, PHP_AUTH_USER, and PHP_SELF variables, which might allow context-dependent attackers to obtain sensitive information from process memory by using the integer data type with crafted values, related to a "type confusion" vulnerability, as demonstrated by reading a private SSL key in an Apache HTTP Server web-hosting environment with mod_ssl and a PHP 5.3.x mod_php.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4721/">CVE-2014-4721 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4721">CVE-2014-4721 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/885961">SUSE bug 885961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992991">SUSE bug 992991</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820328" comment="php-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820329" comment="php-bcmath-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820330" comment="php-cli-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820331" comment="php-common-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820332" comment="php-dba-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820333" comment="php-devel-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820334" comment="php-embedded-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820335" comment="php-enchant-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820336" comment="php-fpm-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820337" comment="php-gd-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820338" comment="php-intl-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820339" comment="php-ldap-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820340" comment="php-mbstring-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820341" comment="php-mysql-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820342" comment="php-mysqlnd-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820343" comment="php-odbc-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820344" comment="php-pdo-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820345" comment="php-pgsql-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820346" comment="php-process-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820347" comment="php-pspell-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820348" comment="php-recode-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820349" comment="php-snmp-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820350" comment="php-soap-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820351" comment="php-xml-5.4.16-23.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820352" comment="php-xmlrpc-5.4.16-23.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144877" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4877</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4877" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4877" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4877" ref_url="https://www.suse.com/security/cve/CVE-2014-4877" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1366-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1366-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001070.html" source="SUSE-SU"/>
    <description>
    Absolute path traversal vulnerability in GNU Wget before 1.16, when recursion is enabled, allows remote FTP servers to write to arbitrary files, and consequently execute arbitrary code, via a LIST response that references the same filename within two entries, one of which indicates that the filename is for a symlink.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4877/">CVE-2014-4877 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4877">CVE-2014-4877 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/902709">SUSE bug 902709</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820543" comment="wget-1.14-10.el7_0.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144943" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4943</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4943" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4943" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4943" ref_url="https://www.suse.com/security/cve/CVE-2014-4943" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/001005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-October/001038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-October/001040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001282.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1669-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GDZOTMP2VOUC5CTGQ542UWQZWRTOES4X/#GDZOTMP2VOUC5CTGQ542UWQZWRTOES4X" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1677-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KMCOHP6GELYLJBOOYH4FHHAYS7Q36GJY/#KMCOHP6GELYLJBOOYH4FHHAYS7Q36GJY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/45VR2J6DOCMZ7DOFZ5B4QZ5CLCL3DYNQ/#45VR2J6DOCMZ7DOFZ5B4QZ5CLCL3DYNQ" source="SUSE-SU"/>
    <description>
    The PPPoL2TP feature in net/l2tp/l2tp_ppp.c in the Linux kernel through 3.15.6 allows local users to gain privileges by leveraging data-structure differences between an l2tp socket and an inet socket.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4943/">CVE-2014-4943 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4943">CVE-2014-4943 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/887082">SUSE bug 887082</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820277" comment="kernel-3.10.0-123.4.4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820278" comment="kernel-abi-whitelists-3.10.0-123.4.4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820279" comment="kernel-debug-3.10.0-123.4.4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820282" comment="kernel-doc-3.10.0-123.4.4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820283" comment="kernel-headers-3.10.0-123.4.4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820284" comment="kernel-tools-3.10.0-123.4.4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820285" comment="kernel-tools-libs-3.10.0-123.4.4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820287" comment="perf-3.10.0-123.4.4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820288" comment="python-perf-3.10.0-123.4.4.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144975" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4975</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4975" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4975" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4975" ref_url="https://www.suse.com/security/cve/CVE-2014-4975" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002820.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1128-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IKBQ5YAMGLRNEEVLWJI5N2R3Q6Y32KQN/#IKBQ5YAMGLRNEEVLWJI5N2R3Q6Y32KQN" source="SUSE-SU"/>
    <description>
    Off-by-one error in the encodes function in pack.c in Ruby 1.9.3 and earlier, and 2.x through 2.1.2, when using certain format string specifiers, allows context-dependent attackers to cause a denial of service (segmentation fault) via vectors that trigger a stack-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4975/">CVE-2014-4975 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4975">CVE-2014-4975 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/887877">SUSE bug 887877</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820604" comment="ruby-2.0.0.353-22.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820605" comment="ruby-devel-2.0.0.353-22.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820606" comment="ruby-doc-2.0.0.353-22.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820607" comment="ruby-irb-2.0.0.353-22.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820608" comment="ruby-libs-2.0.0.353-22.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820609" comment="ruby-tcltk-2.0.0.353-22.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820610" comment="rubygem-bigdecimal-1.2.0-22.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820611" comment="rubygem-io-console-0.4.2-22.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820612" comment="rubygem-json-1.7.7-22.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820613" comment="rubygem-minitest-4.3.2-22.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820614" comment="rubygem-psych-2.0.0-22.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820615" comment="rubygem-rake-0.9.6-22.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820616" comment="rubygem-rdoc-4.0.0-22.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820617" comment="rubygems-2.0.14-22.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820618" comment="rubygems-devel-2.0.14-22.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145033" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5033</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-5033" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5033" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-5033" ref_url="https://www.suse.com/security/cve/CVE-2014-5033" source="SUSE CVE"/>
    <description>
    KDE kdelibs before 4.14 and kauth before 5.1 does not properly use D-Bus for communication with a polkit authority, which allows local users to bypass intended access restrictions by leveraging a PolkitUnixProcess PolkitSubject race condition via a (1) setuid process or (2) pkexec process, related to CVE-2013-4288 and "PID reuse race conditions."
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5033/">CVE-2014-5033 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5033">CVE-2014-5033 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/836931">SUSE bug 836931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864716">SUSE bug 864716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912121">SUSE bug 912121</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820477" comment="polkit-qt-0.103.0-10.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820478" comment="polkit-qt-devel-0.103.0-10.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820479" comment="polkit-qt-doc-0.103.0-10.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145045" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5045</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-5045" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5045" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-5045" ref_url="https://www.suse.com/security/cve/CVE-2014-5045" source="SUSE CVE"/>
    <description>
    The mountpoint_last function in fs/namei.c in the Linux kernel before 3.15.8 does not properly maintain a certain reference count during attempts to use the umount system call in conjunction with a symlink, which allows local users to cause a denial of service (memory consumption or use-after-free) or possibly have unspecified other impact via the umount program.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5045/">CVE-2014-5045 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5045">CVE-2014-5045 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/889060">SUSE bug 889060</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820632" comment="kernel-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820633" comment="kernel-abi-whitelists-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820634" comment="kernel-debug-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820637" comment="kernel-doc-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820638" comment="kernel-headers-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820639" comment="kernel-tools-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820640" comment="kernel-tools-libs-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820642" comment="perf-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820643" comment="python-perf-3.10.0-123.13.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5077</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-5077" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5077" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-5077" ref_url="https://www.suse.com/security/cve/CVE-2014-5077" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/000987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/001005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-October/001038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-October/001040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1669-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GDZOTMP2VOUC5CTGQ542UWQZWRTOES4X/#GDZOTMP2VOUC5CTGQ542UWQZWRTOES4X" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1677-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KMCOHP6GELYLJBOOYH4FHHAYS7Q36GJY/#KMCOHP6GELYLJBOOYH4FHHAYS7Q36GJY" source="SUSE-SU"/>
    <description>
    The sctp_assoc_update function in net/sctp/associola.c in the Linux kernel through 3.15.8, when SCTP authentication is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and OOPS) by starting to establish an association between two endpoints immediately after an exchange of INIT and INIT ACK chunks to establish an earlier association between these endpoints in the opposite direction.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5077/">CVE-2014-5077 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5077">CVE-2014-5077 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/889173">SUSE bug 889173</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820531" comment="kernel-3.10.0-123.9.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820532" comment="kernel-abi-whitelists-3.10.0-123.9.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820533" comment="kernel-debug-3.10.0-123.9.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820536" comment="kernel-doc-3.10.0-123.9.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820537" comment="kernel-headers-3.10.0-123.9.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820538" comment="kernel-tools-3.10.0-123.9.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820539" comment="kernel-tools-libs-3.10.0-123.9.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820541" comment="perf-3.10.0-123.9.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820542" comment="python-perf-3.10.0-123.9.2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145119" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5119</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-5119" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5119" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-5119" ref_url="https://www.suse.com/security/cve/CVE-2014-5119" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/000993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/000996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/001001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/001002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/001003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1115-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J2MEK7O2VPSS6RNPRMNATCZFBZBMCGGM/#J2MEK7O2VPSS6RNPRMNATCZFBZBMCGGM" source="SUSE-SU"/>
    <description>
    Off-by-one error in the __gconv_translit_find function in gconv_trans.c in GNU C Library (aka glibc) allows context-dependent attackers to cause a denial of service (crash) or execute arbitrary code via vectors related to the CHARSET environment variable and gconv transliteration modules.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5119/">CVE-2014-5119 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5119">CVE-2014-5119 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/892073">SUSE bug 892073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903057">SUSE bug 903057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916222">SUSE bug 916222</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820387" comment="glibc-2.17-55.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820388" comment="glibc-common-2.17-55.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820389" comment="glibc-devel-2.17-55.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820390" comment="glibc-headers-2.17-55.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820391" comment="glibc-static-2.17-55.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820392" comment="glibc-utils-2.17-55.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820393" comment="nscd-2.17-55.el7_0.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145120" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5120</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-5120" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5120" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-5120" ref_url="https://www.suse.com/security/cve/CVE-2014-5120" source="SUSE CVE"/>
    <description>
    gd_ctx.c in the GD component in PHP 5.4.x before 5.4.32 and 5.5.x before 5.5.16 does not ensure that pathnames lack %00 sequences, which might allow remote attackers to overwrite arbitrary files via crafted input to an application that calls the (1) imagegd, (2) imagegd2, (3) imagegif, (4) imagejpeg, (5) imagepng, (6) imagewbmp, or (7) imagewebp function.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5120/">CVE-2014-5120 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5120">CVE-2014-5120 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1067090">SUSE bug 1067090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/893855">SUSE bug 893855</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820432" comment="php-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820433" comment="php-bcmath-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820434" comment="php-cli-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820435" comment="php-common-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820436" comment="php-dba-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820437" comment="php-devel-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820438" comment="php-embedded-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820439" comment="php-enchant-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820440" comment="php-fpm-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820441" comment="php-gd-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820442" comment="php-intl-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820443" comment="php-ldap-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820444" comment="php-mbstring-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820445" comment="php-mysql-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820446" comment="php-mysqlnd-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820447" comment="php-odbc-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820448" comment="php-pdo-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820449" comment="php-pgsql-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820450" comment="php-process-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820451" comment="php-pspell-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820452" comment="php-recode-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820453" comment="php-snmp-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820454" comment="php-soap-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820455" comment="php-xml-5.4.16-23.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820456" comment="php-xmlrpc-5.4.16-23.el7_0.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145177" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5177</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-5177" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5177" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-5177" ref_url="https://www.suse.com/security/cve/CVE-2014-5177" source="SUSE CVE"/>
    <description>
    libvirt 1.0.0 through 1.2.x before 1.2.5, when fine grained access control is enabled, allows local users to read arbitrary files via a crafted XML document containing an XML external entity declaration in conjunction with an entity reference to the (1) virDomainDefineXML, (2) virNetworkCreateXML, (3) virNetworkDefineXML, (4) virStoragePoolCreateXML, (5) virStoragePoolDefineXML, (6) virStorageVolCreateXML, (7) virDomainCreateXML, (8) virNodeDeviceCreateXML, (9) virInterfaceDefineXML, (10) virStorageVolCreateXMLFrom, (11) virConnectDomainXMLFromNative, (12) virConnectDomainXMLToNative, (13) virSecretDefineXML, (14) virNWFilterDefineXML, (15) virDomainSnapshotCreateXML, (16) virDomainSaveImageDefineXML, (17) virDomainCreateXMLWithFiles, (18) virConnectCompareCPU, or (19) virConnectBaselineCPU API method, related to an XML External Entity (XXE) issue.  NOTE: this issue was SPLIT from CVE-2014-0179 per ADT3 due to different affected versions of some vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5177/">CVE-2014-5177 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5177">CVE-2014-5177 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/873705">SUSE bug 873705</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820249" comment="libvirt-1.1.1-29.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820250" comment="libvirt-client-1.1.1-29.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820251" comment="libvirt-daemon-1.1.1-29.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820252" comment="libvirt-daemon-config-network-1.1.1-29.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820253" comment="libvirt-daemon-config-nwfilter-1.1.1-29.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820254" comment="libvirt-daemon-driver-interface-1.1.1-29.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820255" comment="libvirt-daemon-driver-lxc-1.1.1-29.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820256" comment="libvirt-daemon-driver-network-1.1.1-29.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820257" comment="libvirt-daemon-driver-nodedev-1.1.1-29.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820258" comment="libvirt-daemon-driver-nwfilter-1.1.1-29.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820259" comment="libvirt-daemon-driver-qemu-1.1.1-29.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820260" comment="libvirt-daemon-driver-secret-1.1.1-29.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820261" comment="libvirt-daemon-driver-storage-1.1.1-29.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820262" comment="libvirt-daemon-kvm-1.1.1-29.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820263" comment="libvirt-daemon-lxc-1.1.1-29.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820264" comment="libvirt-devel-1.1.1-29.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820265" comment="libvirt-docs-1.1.1-29.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820266" comment="libvirt-lock-sanlock-1.1.1-29.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820267" comment="libvirt-login-shell-1.1.1-29.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820268" comment="libvirt-python-1.1.1-29.el7_0.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145352" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5352</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-5352" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5352" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-5352" ref_url="https://www.suse.com/security/cve/CVE-2014-5352" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0290-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001225.html" source="SUSE-SU"/>
    <description>
    The krb5_gss_process_context_token function in lib/gssapi/krb5/process_context_token.c in the libgssapi_krb5 library in MIT Kerberos 5 (aka krb5) through 1.11.5, 1.12.x through 1.12.2, and 1.13.x before 1.13.1 does not properly maintain security-context handles, which allows remote authenticated users to cause a denial of service (use-after-free and double free, and daemon crash) or possibly execute arbitrary code via crafted GSSAPI traffic, as demonstrated by traffic to kadmind.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5352/">CVE-2014-5352 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5352">CVE-2014-5352 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1005509">SUSE bug 1005509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/770172">SUSE bug 770172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912002">SUSE bug 912002</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820882" comment="krb5-devel-1.12.2-14.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820883" comment="krb5-libs-1.12.2-14.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820884" comment="krb5-pkinit-1.12.2-14.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820885" comment="krb5-server-1.12.2-14.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820886" comment="krb5-server-ldap-1.12.2-14.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820887" comment="krb5-workstation-1.12.2-14.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145353" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5353</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-5353" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5353" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-5353" ref_url="https://www.suse.com/security/cve/CVE-2014-5353" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001507.html" source="SUSE-SU"/>
    <description>
    The krb5_ldap_get_password_policy_from_dn function in plugins/kdb/ldap/libkdb_ldap/ldap_pwd_policy.c in MIT Kerberos 5 (aka krb5) before 1.13.1, when the KDC uses LDAP, allows remote authenticated users to cause a denial of service (daemon crash) via a successful LDAP query with no results, as demonstrated by using an incorrect object type for a password policy.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5353/">CVE-2014-5353 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5353">CVE-2014-5353 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/910457">SUSE bug 910457</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820882" comment="krb5-devel-1.12.2-14.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820883" comment="krb5-libs-1.12.2-14.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820884" comment="krb5-pkinit-1.12.2-14.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820885" comment="krb5-server-1.12.2-14.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820886" comment="krb5-server-ldap-1.12.2-14.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820887" comment="krb5-workstation-1.12.2-14.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145355" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5355</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-5355" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5355" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-5355" ref_url="https://www.suse.com/security/cve/CVE-2014-5355" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001507.html" source="SUSE-SU"/>
    <description>
    MIT Kerberos 5 (aka krb5) through 1.13.1 incorrectly expects that a krb5_read_message data field is represented as a string ending with a '\0' character, which allows remote attackers to (1) cause a denial of service (NULL pointer dereference) via a zero-byte version string or (2) cause a denial of service (out-of-bounds read) by omitting the '\0' character, related to appl/user_user/server.c and lib/krb5/krb/recvauth.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5355/">CVE-2014-5355 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5355">CVE-2014-5355 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/770172">SUSE bug 770172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918595">SUSE bug 918595</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821425" comment="krb5-devel-1.13.2-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821426" comment="krb5-libs-1.13.2-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821427" comment="krb5-pkinit-1.13.2-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821428" comment="krb5-server-1.13.2-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821429" comment="krb5-server-ldap-1.13.2-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821430" comment="krb5-workstation-1.13.2-10.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145471" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5471</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-5471" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5471" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-5471" ref_url="https://www.suse.com/security/cve/CVE-2014-5471" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-October/001038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-October/001040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001368.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1669-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GDZOTMP2VOUC5CTGQ542UWQZWRTOES4X/#GDZOTMP2VOUC5CTGQ542UWQZWRTOES4X" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1677-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KMCOHP6GELYLJBOOYH4FHHAYS7Q36GJY/#KMCOHP6GELYLJBOOYH4FHHAYS7Q36GJY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/45VR2J6DOCMZ7DOFZ5B4QZ5CLCL3DYNQ/#45VR2J6DOCMZ7DOFZ5B4QZ5CLCL3DYNQ" source="SUSE-SU"/>
    <description>
    Stack consumption vulnerability in the parse_rock_ridge_inode_internal function in fs/isofs/rock.c in the Linux kernel through 3.16.1 allows local users to cause a denial of service (uncontrolled recursion, and system crash or reboot) via a crafted iso9660 image with a CL entry referring to a directory entry that has a CL entry.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5471/">CVE-2014-5471 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5471">CVE-2014-5471 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/892490">SUSE bug 892490</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820753" comment="kernel-3.10.0-123.20.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820754" comment="kernel-abi-whitelists-3.10.0-123.20.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820755" comment="kernel-debug-3.10.0-123.20.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820758" comment="kernel-doc-3.10.0-123.20.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820759" comment="kernel-headers-3.10.0-123.20.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820760" comment="kernel-tools-3.10.0-123.20.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820761" comment="kernel-tools-libs-3.10.0-123.20.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820763" comment="perf-3.10.0-123.20.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820764" comment="python-perf-3.10.0-123.20.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145472" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5472</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-5472" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5472" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-5472" ref_url="https://www.suse.com/security/cve/CVE-2014-5472" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-October/001038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-October/001040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001368.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1669-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GDZOTMP2VOUC5CTGQ542UWQZWRTOES4X/#GDZOTMP2VOUC5CTGQ542UWQZWRTOES4X" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1677-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KMCOHP6GELYLJBOOYH4FHHAYS7Q36GJY/#KMCOHP6GELYLJBOOYH4FHHAYS7Q36GJY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/45VR2J6DOCMZ7DOFZ5B4QZ5CLCL3DYNQ/#45VR2J6DOCMZ7DOFZ5B4QZ5CLCL3DYNQ" source="SUSE-SU"/>
    <description>
    The parse_rock_ridge_inode_internal function in fs/isofs/rock.c in the Linux kernel through 3.16.1 allows local users to cause a denial of service (unkillable mount process) via a crafted iso9660 image with a self-referential CL entry.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5472/">CVE-2014-5472 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5472">CVE-2014-5472 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/892490">SUSE bug 892490</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820753" comment="kernel-3.10.0-123.20.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820754" comment="kernel-abi-whitelists-3.10.0-123.20.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820755" comment="kernel-debug-3.10.0-123.20.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820758" comment="kernel-doc-3.10.0-123.20.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820759" comment="kernel-headers-3.10.0-123.20.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820760" comment="kernel-tools-3.10.0-123.20.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820761" comment="kernel-tools-libs-3.10.0-123.20.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820763" comment="perf-3.10.0-123.20.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820764" comment="python-perf-3.10.0-123.20.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146040" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6040</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6040" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6040" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6040" ref_url="https://www.suse.com/security/cve/CVE-2014-6040" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/001003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001214.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1115-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J2MEK7O2VPSS6RNPRMNATCZFBZBMCGGM/#J2MEK7O2VPSS6RNPRMNATCZFBZBMCGGM" source="SUSE-SU"/>
    <description>
    GNU C Library (aka glibc) before 2.20 allows context-dependent attackers to cause a denial of service (out-of-bounds read and crash) via a multibyte character value of "0xffff" to the iconv function when converting (1) IBM933, (2) IBM935, (3) IBM937, (4) IBM939, or (5) IBM1364 encoded data to UTF-8.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6040/">CVE-2014-6040 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6040">CVE-2014-6040 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/894553">SUSE bug 894553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903057">SUSE bug 903057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916222">SUSE bug 916222</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820853" comment="glibc-2.17-78.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820854" comment="glibc-common-2.17-78.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820855" comment="glibc-devel-2.17-78.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820856" comment="glibc-headers-2.17-78.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820857" comment="glibc-static-2.17-78.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820858" comment="glibc-utils-2.17-78.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820859" comment="nscd-2.17-78.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146051" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6051</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6051" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6051" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6051" ref_url="https://www.suse.com/security/cve/CVE-2014-6051" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2088-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001701.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the MallocFrameBuffer function in vncviewer.c in LibVNCServer 0.9.9 and earlier allows remote VNC servers to cause a denial of service (crash) and possibly execute arbitrary code via an advertisement for a large screen size, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6051/">CVE-2014-6051 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6051">CVE-2014-6051 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/897031">SUSE bug 897031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/900896">SUSE bug 900896</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820572" comment="libvncserver-0.9.9-9.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820573" comment="libvncserver-devel-0.9.9-9.el7_0.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146052" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6052</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6052" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6052" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6052" ref_url="https://www.suse.com/security/cve/CVE-2014-6052" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2088-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001701.html" source="SUSE-SU"/>
    <description>
    The HandleRFBServerMessage function in libvncclient/rfbproto.c in LibVNCServer 0.9.9 and earlier does not check certain malloc return values, which allows remote VNC servers to cause a denial of service (application crash) or possibly execute arbitrary code by specifying a large screen size in a (1) FramebufferUpdate, (2) ResizeFrameBuffer, or (3) PalmVNCReSizeFrameBuffer message.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6052/">CVE-2014-6052 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6052">CVE-2014-6052 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/897031">SUSE bug 897031</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820572" comment="libvncserver-0.9.9-9.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820573" comment="libvncserver-devel-0.9.9-9.el7_0.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146053" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6053</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6053" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6053" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6053" ref_url="https://www.suse.com/security/cve/CVE-2014-6053" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2088-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001701.html" source="SUSE-SU"/>
    <description>
    The rfbProcessClientNormalMessage function in libvncserver/rfbserver.c in LibVNCServer 0.9.9 and earlier does not properly handle attempts to send a large amount of ClientCutText data, which allows remote attackers to cause a denial of service (memory consumption or daemon crash) via a crafted message that is processed by using a single unchecked malloc.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6053/">CVE-2014-6053 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6053">CVE-2014-6053 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/897031">SUSE bug 897031</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820574" comment="kdenetwork-4.10.5-8.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820575" comment="kdenetwork-common-4.10.5-8.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820576" comment="kdenetwork-devel-4.10.5-8.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820577" comment="kdenetwork-fileshare-samba-4.10.5-8.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820578" comment="kdenetwork-kdnssd-4.10.5-8.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820579" comment="kdenetwork-kget-4.10.5-8.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820580" comment="kdenetwork-kget-libs-4.10.5-8.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820581" comment="kdenetwork-kopete-4.10.5-8.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820582" comment="kdenetwork-kopete-devel-4.10.5-8.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820583" comment="kdenetwork-kopete-libs-4.10.5-8.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820584" comment="kdenetwork-krdc-4.10.5-8.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820585" comment="kdenetwork-krdc-devel-4.10.5-8.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820586" comment="kdenetwork-krdc-libs-4.10.5-8.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820587" comment="kdenetwork-krfb-4.10.5-8.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820588" comment="kdenetwork-krfb-libs-4.10.5-8.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820572" comment="libvncserver-0.9.9-9.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820573" comment="libvncserver-devel-0.9.9-9.el7_0.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820574" comment="kdenetwork-4.10.5-8.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820575" comment="kdenetwork-common-4.10.5-8.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820576" comment="kdenetwork-devel-4.10.5-8.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820577" comment="kdenetwork-fileshare-samba-4.10.5-8.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820578" comment="kdenetwork-kdnssd-4.10.5-8.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820579" comment="kdenetwork-kget-4.10.5-8.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820580" comment="kdenetwork-kget-libs-4.10.5-8.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820581" comment="kdenetwork-kopete-4.10.5-8.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820582" comment="kdenetwork-kopete-devel-4.10.5-8.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820583" comment="kdenetwork-kopete-libs-4.10.5-8.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820584" comment="kdenetwork-krdc-4.10.5-8.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820585" comment="kdenetwork-krdc-devel-4.10.5-8.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820586" comment="kdenetwork-krdc-libs-4.10.5-8.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820587" comment="kdenetwork-krfb-4.10.5-8.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820588" comment="kdenetwork-krfb-libs-4.10.5-8.el7_0 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146054" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6054</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6054" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6054" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6054" ref_url="https://www.suse.com/security/cve/CVE-2014-6054" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2088-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001701.html" source="SUSE-SU"/>
    <description>
    The rfbProcessClientNormalMessage function in libvncserver/rfbserver.c in LibVNCServer 0.9.9 and earlier allows remote attackers to cause a denial of service (divide-by-zero error and server crash) via a zero value in the scaling factor in a (1) PalmVNCSetScaleFactor or (2) SetScale message.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6054/">CVE-2014-6054 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6054">CVE-2014-6054 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/897031">SUSE bug 897031</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820574" comment="kdenetwork-4.10.5-8.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820575" comment="kdenetwork-common-4.10.5-8.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820576" comment="kdenetwork-devel-4.10.5-8.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820577" comment="kdenetwork-fileshare-samba-4.10.5-8.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820578" comment="kdenetwork-kdnssd-4.10.5-8.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820579" comment="kdenetwork-kget-4.10.5-8.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820580" comment="kdenetwork-kget-libs-4.10.5-8.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820581" comment="kdenetwork-kopete-4.10.5-8.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820582" comment="kdenetwork-kopete-devel-4.10.5-8.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820583" comment="kdenetwork-kopete-libs-4.10.5-8.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820584" comment="kdenetwork-krdc-4.10.5-8.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820585" comment="kdenetwork-krdc-devel-4.10.5-8.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820586" comment="kdenetwork-krdc-libs-4.10.5-8.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820587" comment="kdenetwork-krfb-4.10.5-8.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820588" comment="kdenetwork-krfb-libs-4.10.5-8.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820572" comment="libvncserver-0.9.9-9.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820573" comment="libvncserver-devel-0.9.9-9.el7_0.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820574" comment="kdenetwork-4.10.5-8.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820575" comment="kdenetwork-common-4.10.5-8.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820576" comment="kdenetwork-devel-4.10.5-8.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820577" comment="kdenetwork-fileshare-samba-4.10.5-8.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820578" comment="kdenetwork-kdnssd-4.10.5-8.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820579" comment="kdenetwork-kget-4.10.5-8.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820580" comment="kdenetwork-kget-libs-4.10.5-8.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820581" comment="kdenetwork-kopete-4.10.5-8.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820582" comment="kdenetwork-kopete-devel-4.10.5-8.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820583" comment="kdenetwork-kopete-libs-4.10.5-8.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820584" comment="kdenetwork-krdc-4.10.5-8.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820585" comment="kdenetwork-krdc-devel-4.10.5-8.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820586" comment="kdenetwork-krdc-libs-4.10.5-8.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820587" comment="kdenetwork-krfb-4.10.5-8.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820588" comment="kdenetwork-krfb-libs-4.10.5-8.el7_0 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146055" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6055</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6055" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6055" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6055" ref_url="https://www.suse.com/security/cve/CVE-2014-6055" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2088-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001701.html" source="SUSE-SU"/>
    <description>
    Multiple stack-based buffer overflows in the File Transfer feature in rfbserver.c in LibVNCServer 0.9.9 and earlier allow remote authenticated users to cause a denial of service (crash) and possibly execute arbitrary code via a (1) long file or (2) directory name or the (3) FileTime attribute in a rfbFileTransferOffer message.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6055/">CVE-2014-6055 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6055">CVE-2014-6055 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/897031">SUSE bug 897031</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820574" comment="kdenetwork-4.10.5-8.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820575" comment="kdenetwork-common-4.10.5-8.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820576" comment="kdenetwork-devel-4.10.5-8.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820577" comment="kdenetwork-fileshare-samba-4.10.5-8.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820578" comment="kdenetwork-kdnssd-4.10.5-8.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820579" comment="kdenetwork-kget-4.10.5-8.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820580" comment="kdenetwork-kget-libs-4.10.5-8.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820581" comment="kdenetwork-kopete-4.10.5-8.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820582" comment="kdenetwork-kopete-devel-4.10.5-8.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820583" comment="kdenetwork-kopete-libs-4.10.5-8.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820584" comment="kdenetwork-krdc-4.10.5-8.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820585" comment="kdenetwork-krdc-devel-4.10.5-8.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820586" comment="kdenetwork-krdc-libs-4.10.5-8.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820587" comment="kdenetwork-krfb-4.10.5-8.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820588" comment="kdenetwork-krfb-libs-4.10.5-8.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820572" comment="libvncserver-0.9.9-9.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820573" comment="libvncserver-devel-0.9.9-9.el7_0.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820574" comment="kdenetwork-4.10.5-8.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820575" comment="kdenetwork-common-4.10.5-8.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820576" comment="kdenetwork-devel-4.10.5-8.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820577" comment="kdenetwork-fileshare-samba-4.10.5-8.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820578" comment="kdenetwork-kdnssd-4.10.5-8.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820579" comment="kdenetwork-kget-4.10.5-8.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820580" comment="kdenetwork-kget-libs-4.10.5-8.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820581" comment="kdenetwork-kopete-4.10.5-8.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820582" comment="kdenetwork-kopete-devel-4.10.5-8.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820583" comment="kdenetwork-kopete-libs-4.10.5-8.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820584" comment="kdenetwork-krdc-4.10.5-8.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820585" comment="kdenetwork-krdc-devel-4.10.5-8.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820586" comment="kdenetwork-krdc-libs-4.10.5-8.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820587" comment="kdenetwork-krfb-4.10.5-8.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820588" comment="kdenetwork-krfb-libs-4.10.5-8.el7_0 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146269" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6269</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6269" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6269" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6269" ref_url="https://www.suse.com/security/cve/CVE-2014-6269" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001327.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6269/">CVE-2014-6269 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6269">CVE-2014-6269 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/895849">SUSE bug 895849</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820415" comment="haproxy-1.5.2-3.el7_0 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146271" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6271</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6271" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6271" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6271" ref_url="https://www.suse.com/security/cve/CVE-2014-6271" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/001014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/001015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/001016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/001021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/001028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-October/001036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
		<reference ref_id="TID7010867" ref_url="https://www.suse.com/support/kb/doc/?id=7010867" source="SUSE-SU"/>
		<reference ref_id="TID7015693" ref_url="https://www.suse.com/support/kb/doc/?id=7015693" source="SUSE-SU"/>
		<reference ref_id="TID7015701" ref_url="https://www.suse.com/support/kb/doc/?id=7015701" source="SUSE-SU"/>
		<reference ref_id="TID7015702" ref_url="https://www.suse.com/support/kb/doc?id=7015702" source="SUSE-SU"/>
		<reference ref_id="TID7015705" ref_url="https://www.suse.com/support/kb/doc/?id=7015705" source="SUSE-SU"/>
		<reference ref_id="TID7015713" ref_url="https://www.suse.com/support/kb/doc/?id=7015713" source="SUSE-SU"/>
		<reference ref_id="TID7015715" ref_url="https://www.suse.com/support/kb/doc/?id=7015715" source="SUSE-SU"/>
		<reference ref_id="TID7015717" ref_url="https://www.suse.com/support/kb/doc/?id=7015717" source="SUSE-SU"/>
		<reference ref_id="TID7015718" ref_url="https://www.suse.com/support/kb/doc/?id=7015718" source="SUSE-SU"/>
		<reference ref_id="TID7015719" ref_url="https://www.suse.com/support/kb/doc/?id=7015719" source="SUSE-SU"/>
		<reference ref_id="TID7015720" ref_url="https://www.suse.com/support/kb/doc/?id=7015720" source="SUSE-SU"/>
		<reference ref_id="TID7015721" ref_url="https://www.suse.com/support/kb/doc/?id=7015721" source="SUSE-SU"/>
		<reference ref_id="TID7015731" ref_url="https://www.suse.com/support/kb/doc?id=7015731" source="SUSE-SU"/>
		<reference ref_id="TID7015741" ref_url="https://www.suse.com/support/kb/doc/?id=7015741" source="SUSE-SU"/>
		<reference ref_id="TID7016147" ref_url="https://www.suse.com/support/kb/doc/?id=7016147" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1226-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RT7IHGACWKCOWO3QBIHKSLIOG5AE4FY5/#RT7IHGACWKCOWO3QBIHKSLIOG5AE4FY5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1238-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5DI4NNA6JPZU3AIDMTL5PH4ASD4ZT6AD/#5DI4NNA6JPZU3AIDMTL5PH4ASD4ZT6AD" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1254-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XYPYY4VQQ53Z7EPGSUBBRMK7LO375K3O/#XYPYY4VQQ53Z7EPGSUBBRMK7LO375K3O" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1279-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QRVIEAWUK5I2GI4AKVSPV4QCNPSZOAAJ/#QRVIEAWUK5I2GI4AKVSPV4QCNPSZOAAJ" source="SUSE-SU"/>
    <description>
    GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka "ShellShock."  NOTE: the original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6271/">CVE-2014-6271 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-6271">CVE-2014-6271 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1024628">SUSE bug 1024628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130324">SUSE bug 1130324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/870618">SUSE bug 870618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/896776">SUSE bug 896776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898346">SUSE bug 898346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898604">SUSE bug 898604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898812">SUSE bug 898812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898884">SUSE bug 898884</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/900127">SUSE bug 900127</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/900454">SUSE bug 900454</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820416" comment="bash-4.2.45-5.el7_0.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820417" comment="bash-doc-4.2.45-5.el7_0.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146410" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6410</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6410" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6410" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6410" ref_url="https://www.suse.com/security/cve/CVE-2014-6410" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-October/001040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1669-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GDZOTMP2VOUC5CTGQ542UWQZWRTOES4X/#GDZOTMP2VOUC5CTGQ542UWQZWRTOES4X" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1677-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KMCOHP6GELYLJBOOYH4FHHAYS7Q36GJY/#KMCOHP6GELYLJBOOYH4FHHAYS7Q36GJY" source="SUSE-SU"/>
    <description>
    The __udf_read_inode function in fs/udf/inode.c in the Linux kernel through 3.16.3 does not restrict the amount of ICB indirection, which allows physically proximate attackers to cause a denial of service (infinite loop or stack consumption) via a UDF filesystem with a crafted inode.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6410/">CVE-2014-6410 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6410">CVE-2014-6410 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/896689">SUSE bug 896689</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820632" comment="kernel-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820633" comment="kernel-abi-whitelists-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820634" comment="kernel-debug-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820637" comment="kernel-doc-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820638" comment="kernel-headers-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820639" comment="kernel-tools-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820640" comment="kernel-tools-libs-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820642" comment="perf-3.10.0-123.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820643" comment="python-perf-3.10.0-123.13.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146421" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6421</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6421" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6421" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6421" ref_url="https://www.suse.com/security/cve/CVE-2014-6421" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/001020.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the SDP dissector in Wireshark 1.10.x before 1.10.10 allows remote attackers to cause a denial of service (application crash) via a crafted packet that leverages split memory ownership between the SDP and RTP dissectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6421/">CVE-2014-6421 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6421">CVE-2014-6421 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/897055">SUSE bug 897055</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820528" comment="wireshark-1.10.3-12.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820529" comment="wireshark-devel-1.10.3-12.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820530" comment="wireshark-gnome-1.10.3-12.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146422" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6422</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6422" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6422" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6422" ref_url="https://www.suse.com/security/cve/CVE-2014-6422" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/001020.html" source="SUSE-SU"/>
    <description>
    The SDP dissector in Wireshark 1.10.x before 1.10.10 creates duplicate hashtables for a media channel, which allows remote attackers to cause a denial of service (application crash) via a crafted packet to the RTP dissector.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6422/">CVE-2014-6422 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6422">CVE-2014-6422 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/897055">SUSE bug 897055</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820528" comment="wireshark-1.10.3-12.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820529" comment="wireshark-devel-1.10.3-12.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820530" comment="wireshark-gnome-1.10.3-12.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146423" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6423</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6423" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6423" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6423" ref_url="https://www.suse.com/security/cve/CVE-2014-6423" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/001020.html" source="SUSE-SU"/>
    <description>
    The tvb_raw_text_add function in epan/dissectors/packet-megaco.c in the MEGACO dissector in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 allows remote attackers to cause a denial of service (infinite loop) via an empty line.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6423/">CVE-2014-6423 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6423">CVE-2014-6423 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/897055">SUSE bug 897055</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820528" comment="wireshark-1.10.3-12.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820529" comment="wireshark-devel-1.10.3-12.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820530" comment="wireshark-gnome-1.10.3-12.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146424" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6424</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6424" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6424" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6424" ref_url="https://www.suse.com/security/cve/CVE-2014-6424" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/001020.html" source="SUSE-SU"/>
    <description>
    The dissect_v9_v10_pdu_data function in epan/dissectors/packet-netflow.c in the Netflow dissector in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 refers to incorrect offset and start variables, which allows remote attackers to cause a denial of service (uninitialized memory read and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6424/">CVE-2014-6424 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6424">CVE-2014-6424 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/897055">SUSE bug 897055</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820528" comment="wireshark-1.10.3-12.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820529" comment="wireshark-devel-1.10.3-12.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820530" comment="wireshark-gnome-1.10.3-12.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146425" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6425</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6425" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6425" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6425" ref_url="https://www.suse.com/security/cve/CVE-2014-6425" source="SUSE CVE"/>
    <description>
    The (1) get_quoted_string and (2) get_unquoted_string functions in epan/dissectors/packet-cups.c in the CUPS dissector in Wireshark 1.12.x before 1.12.1 allow remote attackers to cause a denial of service (buffer over-read and application crash) via a CUPS packet that lacks a trailing '\0' character.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6425/">CVE-2014-6425 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6425">CVE-2014-6425 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820528" comment="wireshark-1.10.3-12.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820529" comment="wireshark-devel-1.10.3-12.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820530" comment="wireshark-gnome-1.10.3-12.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146426" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6426</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6426" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6426" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6426" ref_url="https://www.suse.com/security/cve/CVE-2014-6426" source="SUSE CVE"/>
    <description>
    The dissect_hip_tlv function in epan/dissectors/packet-hip.c in the HIP dissector in Wireshark 1.12.x before 1.12.1 does not properly handle a NULL tree, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6426/">CVE-2014-6426 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6426">CVE-2014-6426 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820528" comment="wireshark-1.10.3-12.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820529" comment="wireshark-devel-1.10.3-12.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820530" comment="wireshark-gnome-1.10.3-12.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146427" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6427</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6427" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6427" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6427" ref_url="https://www.suse.com/security/cve/CVE-2014-6427" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/001020.html" source="SUSE-SU"/>
    <description>
    Off-by-one error in the is_rtsp_request_or_reply function in epan/dissectors/packet-rtsp.c in the RTSP dissector in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 allows remote attackers to cause a denial of service (application crash) via a crafted packet that triggers parsing of a token located one position beyond the current position.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6427/">CVE-2014-6427 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6427">CVE-2014-6427 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/897055">SUSE bug 897055</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820528" comment="wireshark-1.10.3-12.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820529" comment="wireshark-devel-1.10.3-12.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820530" comment="wireshark-gnome-1.10.3-12.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146428" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6428</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6428" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6428" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6428" ref_url="https://www.suse.com/security/cve/CVE-2014-6428" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/001020.html" source="SUSE-SU"/>
    <description>
    The dissect_spdu function in epan/dissectors/packet-ses.c in the SES dissector in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 does not initialize a certain ID value, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6428/">CVE-2014-6428 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6428">CVE-2014-6428 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/897055">SUSE bug 897055</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820528" comment="wireshark-1.10.3-12.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820529" comment="wireshark-devel-1.10.3-12.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820530" comment="wireshark-gnome-1.10.3-12.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146429" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6429</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6429" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6429" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6429" ref_url="https://www.suse.com/security/cve/CVE-2014-6429" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/001020.html" source="SUSE-SU"/>
    <description>
    The SnifferDecompress function in wiretap/ngsniffer.c in the DOS Sniffer file parser in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 does not properly handle empty input data, which allows remote attackers to cause a denial of service (application crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6429/">CVE-2014-6429 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6429">CVE-2014-6429 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/897055">SUSE bug 897055</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820528" comment="wireshark-1.10.3-12.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820529" comment="wireshark-devel-1.10.3-12.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820530" comment="wireshark-gnome-1.10.3-12.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146430" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6430</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6430" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6430" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6430" ref_url="https://www.suse.com/security/cve/CVE-2014-6430" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/001020.html" source="SUSE-SU"/>
    <description>
    The SnifferDecompress function in wiretap/ngsniffer.c in the DOS Sniffer file parser in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 does not validate bitmask data, which allows remote attackers to cause a denial of service (application crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6430/">CVE-2014-6430 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6430">CVE-2014-6430 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/897055">SUSE bug 897055</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820528" comment="wireshark-1.10.3-12.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820529" comment="wireshark-devel-1.10.3-12.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820530" comment="wireshark-gnome-1.10.3-12.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146431" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6431</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6431" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6431" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6431" ref_url="https://www.suse.com/security/cve/CVE-2014-6431" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/001020.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the SnifferDecompress function in wiretap/ngsniffer.c in the DOS Sniffer file parser in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 allows remote attackers to cause a denial of service (application crash) via a crafted file that triggers writes of uncompressed bytes beyond the end of the output buffer.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6431/">CVE-2014-6431 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6431">CVE-2014-6431 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/897055">SUSE bug 897055</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820528" comment="wireshark-1.10.3-12.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820529" comment="wireshark-devel-1.10.3-12.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820530" comment="wireshark-gnome-1.10.3-12.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146432" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6432</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6432" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6432" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6432" ref_url="https://www.suse.com/security/cve/CVE-2014-6432" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/001020.html" source="SUSE-SU"/>
    <description>
    The SnifferDecompress function in wiretap/ngsniffer.c in the DOS Sniffer file parser in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 does not prevent data overwrites during copy operations, which allows remote attackers to cause a denial of service (application crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6432/">CVE-2014-6432 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6432">CVE-2014-6432 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/897055">SUSE bug 897055</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820528" comment="wireshark-1.10.3-12.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820529" comment="wireshark-devel-1.10.3-12.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820530" comment="wireshark-gnome-1.10.3-12.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146457" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6457</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6457" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6457" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6457" ref_url="https://www.suse.com/security/cve/CVE-2014-6457" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1526-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001091.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u71, 6u81, 7u67, and 8u20; Java SE Embedded 7u60; and JRockit R27.8.3, and R28.3.3 allows remote attackers to affect confidentiality and integrity via vectors related to JSSE.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6457/">CVE-2014-6457 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6457">CVE-2014-6457 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/901239">SUSE bug 901239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901242">SUSE bug 901242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901246">SUSE bug 901246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904889">SUSE bug 904889</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820503" comment="java-1.6.0-openjdk-1.6.0.33-1.13.5.0.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820504" comment="java-1.6.0-openjdk-demo-1.6.0.33-1.13.5.0.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820505" comment="java-1.6.0-openjdk-devel-1.6.0.33-1.13.5.0.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820506" comment="java-1.6.0-openjdk-javadoc-1.6.0.33-1.13.5.0.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820507" comment="java-1.6.0-openjdk-src-1.6.0.33-1.13.5.0.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820496" comment="java-1.7.0-openjdk-1.7.0.71-2.5.3.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820497" comment="java-1.7.0-openjdk-accessibility-1.7.0.71-2.5.3.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820498" comment="java-1.7.0-openjdk-demo-1.7.0.71-2.5.3.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820499" comment="java-1.7.0-openjdk-devel-1.7.0.71-2.5.3.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820500" comment="java-1.7.0-openjdk-headless-1.7.0.71-2.5.3.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820501" comment="java-1.7.0-openjdk-javadoc-1.7.0.71-2.5.3.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820502" comment="java-1.7.0-openjdk-src-1.7.0.71-2.5.3.1.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146463" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6463</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6463" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6463" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6463" ref_url="https://www.suse.com/security/cve/CVE-2014-6463" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001353.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier and 5.6.19 and earlier allows remote authenticated users to affect availability via vectors related to SERVER:REPLICATION ROW FORMAT BINARY LOG DML.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6463/">CVE-2014-6463 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6463">CVE-2014-6463 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/901237">SUSE bug 901237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915913">SUSE bug 915913</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820594" comment="mariadb-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820595" comment="mariadb-bench-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820596" comment="mariadb-devel-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820597" comment="mariadb-embedded-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820598" comment="mariadb-embedded-devel-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820599" comment="mariadb-libs-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820600" comment="mariadb-server-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820601" comment="mariadb-test-5.5.40-1.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146464" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6464</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6464" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6464" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6464" ref_url="https://www.suse.com/security/cve/CVE-2014-6464" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001353.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1216-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KHOOMDUPEQLMQZN7JRZIBDKGHYJ2TBKQ/#KHOOMDUPEQLMQZN7JRZIBDKGHYJ2TBKQ" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier and 5.6.20 and earlier allows remote authenticated users to affect availability via vectors related to SERVER:INNODB DML FOREIGN KEYS.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6464/">CVE-2014-6464 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6464">CVE-2014-6464 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/901237">SUSE bug 901237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915912">SUSE bug 915912</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820594" comment="mariadb-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820595" comment="mariadb-bench-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820596" comment="mariadb-devel-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820597" comment="mariadb-embedded-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820598" comment="mariadb-embedded-devel-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820599" comment="mariadb-libs-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820600" comment="mariadb-server-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820601" comment="mariadb-test-5.5.40-1.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146469" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6469</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6469" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6469" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6469" ref_url="https://www.suse.com/security/cve/CVE-2014-6469" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001353.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1216-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KHOOMDUPEQLMQZN7JRZIBDKGHYJ2TBKQ/#KHOOMDUPEQLMQZN7JRZIBDKGHYJ2TBKQ" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier and 5.6.20 and earlier allows remote authenticated users to affect availability via vectors related to SERVER:OPTIMIZER.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6469/">CVE-2014-6469 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6469">CVE-2014-6469 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/901237">SUSE bug 901237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915912">SUSE bug 915912</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820594" comment="mariadb-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820595" comment="mariadb-bench-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820596" comment="mariadb-devel-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820597" comment="mariadb-embedded-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820598" comment="mariadb-embedded-devel-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820599" comment="mariadb-libs-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820600" comment="mariadb-server-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820601" comment="mariadb-test-5.5.40-1.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6484</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6484" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6484" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6484" ref_url="https://www.suse.com/security/cve/CVE-2014-6484" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001353.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier, and 5.6.19 and earlier, allows remote authenticated users to affect availability via vectors related to SERVER:DML.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6484/">CVE-2014-6484 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6484">CVE-2014-6484 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/901237">SUSE bug 901237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915913">SUSE bug 915913</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820594" comment="mariadb-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820595" comment="mariadb-bench-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820596" comment="mariadb-devel-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820597" comment="mariadb-embedded-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820598" comment="mariadb-embedded-devel-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820599" comment="mariadb-libs-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820600" comment="mariadb-server-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820601" comment="mariadb-test-5.5.40-1.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146502" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6502</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6502" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6502" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6502" ref_url="https://www.suse.com/security/cve/CVE-2014-6502" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1526-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001091.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u71, 6u81, 7u67, and 8u20, and Java SE Embedded 7u60, allows remote attackers to affect integrity via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6502/">CVE-2014-6502 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6502">CVE-2014-6502 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/901239">SUSE bug 901239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901242">SUSE bug 901242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901246">SUSE bug 901246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904889">SUSE bug 904889</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820503" comment="java-1.6.0-openjdk-1.6.0.33-1.13.5.0.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820504" comment="java-1.6.0-openjdk-demo-1.6.0.33-1.13.5.0.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820505" comment="java-1.6.0-openjdk-devel-1.6.0.33-1.13.5.0.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820506" comment="java-1.6.0-openjdk-javadoc-1.6.0.33-1.13.5.0.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820507" comment="java-1.6.0-openjdk-src-1.6.0.33-1.13.5.0.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820496" comment="java-1.7.0-openjdk-1.7.0.71-2.5.3.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820497" comment="java-1.7.0-openjdk-accessibility-1.7.0.71-2.5.3.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820498" comment="java-1.7.0-openjdk-demo-1.7.0.71-2.5.3.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820499" comment="java-1.7.0-openjdk-devel-1.7.0.71-2.5.3.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820500" comment="java-1.7.0-openjdk-headless-1.7.0.71-2.5.3.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820501" comment="java-1.7.0-openjdk-javadoc-1.7.0.71-2.5.3.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820502" comment="java-1.7.0-openjdk-src-1.7.0.71-2.5.3.1.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146504" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6504</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6504" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6504" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6504" ref_url="https://www.suse.com/security/cve/CVE-2014-6504" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001062.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u71, 6u81, and 7u67, and Java SE Embedded 7u60, allows remote attackers to affect confidentiality via unknown vectors related to Hotspot.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6504/">CVE-2014-6504 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6504">CVE-2014-6504 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/901239">SUSE bug 901239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901242">SUSE bug 901242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901246">SUSE bug 901246</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820503" comment="java-1.6.0-openjdk-1.6.0.33-1.13.5.0.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820504" comment="java-1.6.0-openjdk-demo-1.6.0.33-1.13.5.0.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820505" comment="java-1.6.0-openjdk-devel-1.6.0.33-1.13.5.0.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820506" comment="java-1.6.0-openjdk-javadoc-1.6.0.33-1.13.5.0.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820507" comment="java-1.6.0-openjdk-src-1.6.0.33-1.13.5.0.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820496" comment="java-1.7.0-openjdk-1.7.0.71-2.5.3.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820497" comment="java-1.7.0-openjdk-accessibility-1.7.0.71-2.5.3.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820498" comment="java-1.7.0-openjdk-demo-1.7.0.71-2.5.3.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820499" comment="java-1.7.0-openjdk-devel-1.7.0.71-2.5.3.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820500" comment="java-1.7.0-openjdk-headless-1.7.0.71-2.5.3.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820501" comment="java-1.7.0-openjdk-javadoc-1.7.0.71-2.5.3.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820502" comment="java-1.7.0-openjdk-src-1.7.0.71-2.5.3.1.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146505" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6505</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6505" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6505" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6505" ref_url="https://www.suse.com/security/cve/CVE-2014-6505" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001353.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier, and 5.6.19 and earlier, allows remote authenticated users to affect availability via vectors related to SERVER:MEMORY STORAGE ENGINE.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6505/">CVE-2014-6505 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6505">CVE-2014-6505 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/901237">SUSE bug 901237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915913">SUSE bug 915913</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820594" comment="mariadb-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820595" comment="mariadb-bench-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820596" comment="mariadb-devel-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820597" comment="mariadb-embedded-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820598" comment="mariadb-embedded-devel-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820599" comment="mariadb-libs-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820600" comment="mariadb-server-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820601" comment="mariadb-test-5.5.40-1.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146506" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6506</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6506" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6506" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6506" ref_url="https://www.suse.com/security/cve/CVE-2014-6506" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1526-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001091.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u71, 6u81, 7u67, and 8u20, and Java SE Embedded 7u60, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6506/">CVE-2014-6506 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6506">CVE-2014-6506 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/901239">SUSE bug 901239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901242">SUSE bug 901242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901246">SUSE bug 901246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904889">SUSE bug 904889</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820503" comment="java-1.6.0-openjdk-1.6.0.33-1.13.5.0.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820504" comment="java-1.6.0-openjdk-demo-1.6.0.33-1.13.5.0.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820505" comment="java-1.6.0-openjdk-devel-1.6.0.33-1.13.5.0.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820506" comment="java-1.6.0-openjdk-javadoc-1.6.0.33-1.13.5.0.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820507" comment="java-1.6.0-openjdk-src-1.6.0.33-1.13.5.0.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820496" comment="java-1.7.0-openjdk-1.7.0.71-2.5.3.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820497" comment="java-1.7.0-openjdk-accessibility-1.7.0.71-2.5.3.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820498" comment="java-1.7.0-openjdk-demo-1.7.0.71-2.5.3.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820499" comment="java-1.7.0-openjdk-devel-1.7.0.71-2.5.3.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820500" comment="java-1.7.0-openjdk-headless-1.7.0.71-2.5.3.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820501" comment="java-1.7.0-openjdk-javadoc-1.7.0.71-2.5.3.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820502" comment="java-1.7.0-openjdk-src-1.7.0.71-2.5.3.1.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146507" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6507</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6507" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6507" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6507" ref_url="https://www.suse.com/security/cve/CVE-2014-6507" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001353.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1216-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KHOOMDUPEQLMQZN7JRZIBDKGHYJ2TBKQ/#KHOOMDUPEQLMQZN7JRZIBDKGHYJ2TBKQ" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier, and 5.6.20 and earlier, allows remote authenticated users to affect confidentiality, integrity, and availability via vectors related to SERVER:DML.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6507/">CVE-2014-6507 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6507">CVE-2014-6507 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/901237">SUSE bug 901237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915912">SUSE bug 915912</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820594" comment="mariadb-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820595" comment="mariadb-bench-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820596" comment="mariadb-devel-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820597" comment="mariadb-embedded-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820598" comment="mariadb-embedded-devel-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820599" comment="mariadb-libs-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820600" comment="mariadb-server-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820601" comment="mariadb-test-5.5.40-1.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6511</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6511" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6511" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6511" ref_url="https://www.suse.com/security/cve/CVE-2014-6511" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1526-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001091.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u71, 6u81, 7u67, and 8u20 allows remote attackers to affect confidentiality via unknown vectors related to 2D.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6511/">CVE-2014-6511 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6511">CVE-2014-6511 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/901239">SUSE bug 901239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901242">SUSE bug 901242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901246">SUSE bug 901246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904889">SUSE bug 904889</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820503" comment="java-1.6.0-openjdk-1.6.0.33-1.13.5.0.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820504" comment="java-1.6.0-openjdk-demo-1.6.0.33-1.13.5.0.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820505" comment="java-1.6.0-openjdk-devel-1.6.0.33-1.13.5.0.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820506" comment="java-1.6.0-openjdk-javadoc-1.6.0.33-1.13.5.0.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820507" comment="java-1.6.0-openjdk-src-1.6.0.33-1.13.5.0.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820496" comment="java-1.7.0-openjdk-1.7.0.71-2.5.3.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820497" comment="java-1.7.0-openjdk-accessibility-1.7.0.71-2.5.3.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820498" comment="java-1.7.0-openjdk-demo-1.7.0.71-2.5.3.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820499" comment="java-1.7.0-openjdk-devel-1.7.0.71-2.5.3.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820500" comment="java-1.7.0-openjdk-headless-1.7.0.71-2.5.3.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820501" comment="java-1.7.0-openjdk-javadoc-1.7.0.71-2.5.3.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820502" comment="java-1.7.0-openjdk-src-1.7.0.71-2.5.3.1.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146512" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6512</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6512" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6512" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6512" ref_url="https://www.suse.com/security/cve/CVE-2014-6512" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1526-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001091.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u71, 6u81, 7u67, and 8u20; Java SE Embedded 7u60; and JRockit R27.8.3 and R28.3.3 allows remote attackers to affect integrity via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6512/">CVE-2014-6512 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6512">CVE-2014-6512 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/901239">SUSE bug 901239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901242">SUSE bug 901242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901246">SUSE bug 901246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904889">SUSE bug 904889</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820503" comment="java-1.6.0-openjdk-1.6.0.33-1.13.5.0.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820504" comment="java-1.6.0-openjdk-demo-1.6.0.33-1.13.5.0.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820505" comment="java-1.6.0-openjdk-devel-1.6.0.33-1.13.5.0.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820506" comment="java-1.6.0-openjdk-javadoc-1.6.0.33-1.13.5.0.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820507" comment="java-1.6.0-openjdk-src-1.6.0.33-1.13.5.0.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820496" comment="java-1.7.0-openjdk-1.7.0.71-2.5.3.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820497" comment="java-1.7.0-openjdk-accessibility-1.7.0.71-2.5.3.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820498" comment="java-1.7.0-openjdk-demo-1.7.0.71-2.5.3.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820499" comment="java-1.7.0-openjdk-devel-1.7.0.71-2.5.3.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820500" comment="java-1.7.0-openjdk-headless-1.7.0.71-2.5.3.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820501" comment="java-1.7.0-openjdk-javadoc-1.7.0.71-2.5.3.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820502" comment="java-1.7.0-openjdk-src-1.7.0.71-2.5.3.1.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146517" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6517</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6517" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6517" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6517" ref_url="https://www.suse.com/security/cve/CVE-2014-6517" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001062.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20; Java SE Embedded 7u60; and Jrockit R27.8.3 and R28.3.3 allows remote attackers to affect confidentiality via vectors related to JAXP.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6517/">CVE-2014-6517 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6517">CVE-2014-6517 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/901239">SUSE bug 901239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901242">SUSE bug 901242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901246">SUSE bug 901246</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820503" comment="java-1.6.0-openjdk-1.6.0.33-1.13.5.0.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820504" comment="java-1.6.0-openjdk-demo-1.6.0.33-1.13.5.0.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820505" comment="java-1.6.0-openjdk-devel-1.6.0.33-1.13.5.0.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820506" comment="java-1.6.0-openjdk-javadoc-1.6.0.33-1.13.5.0.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820507" comment="java-1.6.0-openjdk-src-1.6.0.33-1.13.5.0.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820496" comment="java-1.7.0-openjdk-1.7.0.71-2.5.3.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820497" comment="java-1.7.0-openjdk-accessibility-1.7.0.71-2.5.3.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820498" comment="java-1.7.0-openjdk-demo-1.7.0.71-2.5.3.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820499" comment="java-1.7.0-openjdk-devel-1.7.0.71-2.5.3.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820500" comment="java-1.7.0-openjdk-headless-1.7.0.71-2.5.3.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820501" comment="java-1.7.0-openjdk-javadoc-1.7.0.71-2.5.3.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820502" comment="java-1.7.0-openjdk-src-1.7.0.71-2.5.3.1.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146519" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6519</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6519" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6519" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6519" ref_url="https://www.suse.com/security/cve/CVE-2014-6519" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001062.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u67 and 8u20, and Java SE Embedded 7u60, allows remote attackers to affect integrity via unknown vectors related to Hotspot.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6519/">CVE-2014-6519 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6519">CVE-2014-6519 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/901239">SUSE bug 901239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901242">SUSE bug 901242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901246">SUSE bug 901246</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820503" comment="java-1.6.0-openjdk-1.6.0.33-1.13.5.0.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820504" comment="java-1.6.0-openjdk-demo-1.6.0.33-1.13.5.0.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820505" comment="java-1.6.0-openjdk-devel-1.6.0.33-1.13.5.0.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820506" comment="java-1.6.0-openjdk-javadoc-1.6.0.33-1.13.5.0.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820507" comment="java-1.6.0-openjdk-src-1.6.0.33-1.13.5.0.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820496" comment="java-1.7.0-openjdk-1.7.0.71-2.5.3.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820497" comment="java-1.7.0-openjdk-accessibility-1.7.0.71-2.5.3.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820498" comment="java-1.7.0-openjdk-demo-1.7.0.71-2.5.3.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820499" comment="java-1.7.0-openjdk-devel-1.7.0.71-2.5.3.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820500" comment="java-1.7.0-openjdk-headless-1.7.0.71-2.5.3.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820501" comment="java-1.7.0-openjdk-javadoc-1.7.0.71-2.5.3.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820502" comment="java-1.7.0-openjdk-src-1.7.0.71-2.5.3.1.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146520" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6520</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6520" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6520" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6520" ref_url="https://www.suse.com/security/cve/CVE-2014-6520" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001353.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier allows remote authenticated users to affect availability via vectors related to SERVER:DDL.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6520/">CVE-2014-6520 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6520">CVE-2014-6520 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/901237">SUSE bug 901237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915913">SUSE bug 915913</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820594" comment="mariadb-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820595" comment="mariadb-bench-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820596" comment="mariadb-devel-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820597" comment="mariadb-embedded-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820598" comment="mariadb-embedded-devel-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820599" comment="mariadb-libs-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820600" comment="mariadb-server-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820601" comment="mariadb-test-5.5.40-1.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146530" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6530</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6530" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6530" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6530" ref_url="https://www.suse.com/security/cve/CVE-2014-6530" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001353.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier, and 5.6.19 and earlier, allows remote authenticated users to affect confidentiality, integrity, and availability via vectors related to CLIENT:MYSQLDUMP.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6530/">CVE-2014-6530 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6530">CVE-2014-6530 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/901237">SUSE bug 901237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915913">SUSE bug 915913</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820594" comment="mariadb-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820595" comment="mariadb-bench-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820596" comment="mariadb-devel-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820597" comment="mariadb-embedded-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820598" comment="mariadb-embedded-devel-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820599" comment="mariadb-libs-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820600" comment="mariadb-server-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820601" comment="mariadb-test-5.5.40-1.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146531" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6531</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6531" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6531" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6531" ref_url="https://www.suse.com/security/cve/CVE-2014-6531" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1526-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001091.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u71, 6u81, 7u67, and 8u20, and Java SE Embedded 7u60, allows remote attackers to affect confidentiality via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6531/">CVE-2014-6531 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6531">CVE-2014-6531 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/901239">SUSE bug 901239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901242">SUSE bug 901242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901246">SUSE bug 901246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904889">SUSE bug 904889</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820503" comment="java-1.6.0-openjdk-1.6.0.33-1.13.5.0.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820504" comment="java-1.6.0-openjdk-demo-1.6.0.33-1.13.5.0.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820505" comment="java-1.6.0-openjdk-devel-1.6.0.33-1.13.5.0.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820506" comment="java-1.6.0-openjdk-javadoc-1.6.0.33-1.13.5.0.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820507" comment="java-1.6.0-openjdk-src-1.6.0.33-1.13.5.0.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820496" comment="java-1.7.0-openjdk-1.7.0.71-2.5.3.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820497" comment="java-1.7.0-openjdk-accessibility-1.7.0.71-2.5.3.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820498" comment="java-1.7.0-openjdk-demo-1.7.0.71-2.5.3.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820499" comment="java-1.7.0-openjdk-devel-1.7.0.71-2.5.3.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820500" comment="java-1.7.0-openjdk-headless-1.7.0.71-2.5.3.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820501" comment="java-1.7.0-openjdk-javadoc-1.7.0.71-2.5.3.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820502" comment="java-1.7.0-openjdk-src-1.7.0.71-2.5.3.1.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146551" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6551</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6551" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6551" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6551" ref_url="https://www.suse.com/security/cve/CVE-2014-6551" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001353.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier and 5.6.19 and earlier allows local users to affect confidentiality via vectors related to CLIENT:MYSQLADMIN.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6551/">CVE-2014-6551 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6551">CVE-2014-6551 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/901237">SUSE bug 901237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915913">SUSE bug 915913</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820594" comment="mariadb-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820595" comment="mariadb-bench-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820596" comment="mariadb-devel-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820597" comment="mariadb-embedded-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820598" comment="mariadb-embedded-devel-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820599" comment="mariadb-libs-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820600" comment="mariadb-server-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820601" comment="mariadb-test-5.5.40-1.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6555</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6555" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6555" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6555" ref_url="https://www.suse.com/security/cve/CVE-2014-6555" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001353.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1216-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KHOOMDUPEQLMQZN7JRZIBDKGHYJ2TBKQ/#KHOOMDUPEQLMQZN7JRZIBDKGHYJ2TBKQ" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier and 5.6.20 and earlier allows remote authenticated users to affect confidentiality, integrity, and availability via vectors related to SERVER:DML.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6555/">CVE-2014-6555 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6555">CVE-2014-6555 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/901237">SUSE bug 901237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915912">SUSE bug 915912</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820594" comment="mariadb-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820595" comment="mariadb-bench-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820596" comment="mariadb-devel-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820597" comment="mariadb-embedded-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820598" comment="mariadb-embedded-devel-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820599" comment="mariadb-libs-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820600" comment="mariadb-server-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820601" comment="mariadb-test-5.5.40-1.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146558" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6558</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6558" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6558" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6558" ref_url="https://www.suse.com/security/cve/CVE-2014-6558" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1526-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001091.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u71, 6u81, 7u67, and 8u20; Java SE Embedded 7u60; and JRockit R27.8.3 and JRockit R28.3.3 allows remote attackers to affect integrity via unknown vectors related to Security.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6558/">CVE-2014-6558 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6558">CVE-2014-6558 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/901239">SUSE bug 901239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901242">SUSE bug 901242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901246">SUSE bug 901246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904889">SUSE bug 904889</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820503" comment="java-1.6.0-openjdk-1.6.0.33-1.13.5.0.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820504" comment="java-1.6.0-openjdk-demo-1.6.0.33-1.13.5.0.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820505" comment="java-1.6.0-openjdk-devel-1.6.0.33-1.13.5.0.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820506" comment="java-1.6.0-openjdk-javadoc-1.6.0.33-1.13.5.0.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820507" comment="java-1.6.0-openjdk-src-1.6.0.33-1.13.5.0.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820496" comment="java-1.7.0-openjdk-1.7.0.71-2.5.3.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820497" comment="java-1.7.0-openjdk-accessibility-1.7.0.71-2.5.3.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820498" comment="java-1.7.0-openjdk-demo-1.7.0.71-2.5.3.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820499" comment="java-1.7.0-openjdk-devel-1.7.0.71-2.5.3.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820500" comment="java-1.7.0-openjdk-headless-1.7.0.71-2.5.3.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820501" comment="java-1.7.0-openjdk-javadoc-1.7.0.71-2.5.3.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820502" comment="java-1.7.0-openjdk-src-1.7.0.71-2.5.3.1.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146559" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6559</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6559" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6559" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6559" ref_url="https://www.suse.com/security/cve/CVE-2014-6559" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001353.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1216-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KHOOMDUPEQLMQZN7JRZIBDKGHYJ2TBKQ/#KHOOMDUPEQLMQZN7JRZIBDKGHYJ2TBKQ" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier, and 5.6.20 and earlier, allows remote attackers to affect confidentiality via vectors related to C API SSL CERTIFICATE HANDLING.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6559/">CVE-2014-6559 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6559">CVE-2014-6559 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/901237">SUSE bug 901237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915912">SUSE bug 915912</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820594" comment="mariadb-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820595" comment="mariadb-bench-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820596" comment="mariadb-devel-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820597" comment="mariadb-embedded-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820598" comment="mariadb-embedded-devel-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820599" comment="mariadb-libs-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820600" comment="mariadb-server-5.5.40-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820601" comment="mariadb-test-5.5.40-1.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146568" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6568</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6568" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6568" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6568" ref_url="https://www.suse.com/security/cve/CVE-2014-6568" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001353.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1216-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KHOOMDUPEQLMQZN7JRZIBDKGHYJ2TBKQ/#KHOOMDUPEQLMQZN7JRZIBDKGHYJ2TBKQ" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier, and 5.6.21 and earlier, allows remote authenticated users to affect availability via vectors related to Server : InnoDB : DML.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6568/">CVE-2014-6568 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6568">CVE-2014-6568 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/914058">SUSE bug 914058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915911">SUSE bug 915911</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820765" comment="mariadb-5.5.41-2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820766" comment="mariadb-bench-5.5.41-2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820767" comment="mariadb-devel-5.5.41-2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820768" comment="mariadb-embedded-5.5.41-2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820769" comment="mariadb-embedded-devel-5.5.41-2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820770" comment="mariadb-libs-5.5.41-2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820771" comment="mariadb-server-5.5.41-2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820772" comment="mariadb-test-5.5.41-2.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146585" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6585</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6585" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6585" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6585" ref_url="https://www.suse.com/security/cve/CVE-2014-6585" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001288.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0190-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QOHQUN3Q5MDA4SIFFIRNOJI5I5UILUJP/#QOHQUN3Q5MDA4SIFFIRNOJI5I5UILUJP" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u75, 6u85, 7u72, and 8u25 allows remote attackers to affect confidentiality via unknown vectors related to 2D, a different vulnerability than CVE-2014-6591.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6585/">CVE-2014-6585 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6585">CVE-2014-6585 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/914041">SUSE bug 914041</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820739" comment="java-1.6.0-openjdk-1.6.0.34-1.13.6.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820740" comment="java-1.6.0-openjdk-demo-1.6.0.34-1.13.6.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820741" comment="java-1.6.0-openjdk-devel-1.6.0.34-1.13.6.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820742" comment="java-1.6.0-openjdk-javadoc-1.6.0.34-1.13.6.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820743" comment="java-1.6.0-openjdk-src-1.6.0.34-1.13.6.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820728" comment="java-1.7.0-openjdk-1.7.0.75-2.5.4.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820729" comment="java-1.7.0-openjdk-accessibility-1.7.0.75-2.5.4.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820730" comment="java-1.7.0-openjdk-demo-1.7.0.75-2.5.4.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820731" comment="java-1.7.0-openjdk-devel-1.7.0.75-2.5.4.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820732" comment="java-1.7.0-openjdk-headless-1.7.0.75-2.5.4.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820733" comment="java-1.7.0-openjdk-javadoc-1.7.0.75-2.5.4.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820734" comment="java-1.7.0-openjdk-src-1.7.0.75-2.5.4.2.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146587" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6587</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6587" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6587" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6587" ref_url="https://www.suse.com/security/cve/CVE-2014-6587" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001288.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0190-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QOHQUN3Q5MDA4SIFFIRNOJI5I5UILUJP/#QOHQUN3Q5MDA4SIFFIRNOJI5I5UILUJP" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u85, 7u72, and 8u25 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6587/">CVE-2014-6587 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6587">CVE-2014-6587 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/914041">SUSE bug 914041</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820739" comment="java-1.6.0-openjdk-1.6.0.34-1.13.6.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820740" comment="java-1.6.0-openjdk-demo-1.6.0.34-1.13.6.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820741" comment="java-1.6.0-openjdk-devel-1.6.0.34-1.13.6.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820742" comment="java-1.6.0-openjdk-javadoc-1.6.0.34-1.13.6.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820743" comment="java-1.6.0-openjdk-src-1.6.0.34-1.13.6.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820728" comment="java-1.7.0-openjdk-1.7.0.75-2.5.4.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820729" comment="java-1.7.0-openjdk-accessibility-1.7.0.75-2.5.4.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820730" comment="java-1.7.0-openjdk-demo-1.7.0.75-2.5.4.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820731" comment="java-1.7.0-openjdk-devel-1.7.0.75-2.5.4.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820732" comment="java-1.7.0-openjdk-headless-1.7.0.75-2.5.4.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820733" comment="java-1.7.0-openjdk-javadoc-1.7.0.75-2.5.4.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820734" comment="java-1.7.0-openjdk-src-1.7.0.75-2.5.4.2.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146591" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6591</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6591" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6591" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6591" ref_url="https://www.suse.com/security/cve/CVE-2014-6591" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001288.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0190-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QOHQUN3Q5MDA4SIFFIRNOJI5I5UILUJP/#QOHQUN3Q5MDA4SIFFIRNOJI5I5UILUJP" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java SE component in Oracle Java SE 5.0u75, 6u85, 7u72, and 8u25 allows remote attackers to affect confidentiality via unknown vectors related to 2D, a different vulnerability than CVE-2014-6585.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6591/">CVE-2014-6591 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6591">CVE-2014-6591 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/914041">SUSE bug 914041</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820739" comment="java-1.6.0-openjdk-1.6.0.34-1.13.6.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820740" comment="java-1.6.0-openjdk-demo-1.6.0.34-1.13.6.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820741" comment="java-1.6.0-openjdk-devel-1.6.0.34-1.13.6.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820742" comment="java-1.6.0-openjdk-javadoc-1.6.0.34-1.13.6.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820743" comment="java-1.6.0-openjdk-src-1.6.0.34-1.13.6.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820728" comment="java-1.7.0-openjdk-1.7.0.75-2.5.4.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820729" comment="java-1.7.0-openjdk-accessibility-1.7.0.75-2.5.4.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820730" comment="java-1.7.0-openjdk-demo-1.7.0.75-2.5.4.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820731" comment="java-1.7.0-openjdk-devel-1.7.0.75-2.5.4.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820732" comment="java-1.7.0-openjdk-headless-1.7.0.75-2.5.4.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820733" comment="java-1.7.0-openjdk-javadoc-1.7.0.75-2.5.4.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820734" comment="java-1.7.0-openjdk-src-1.7.0.75-2.5.4.2.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146593" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6593</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6593" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6593" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6593" ref_url="https://www.suse.com/security/cve/CVE-2014-6593" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001288.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0190-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QOHQUN3Q5MDA4SIFFIRNOJI5I5UILUJP/#QOHQUN3Q5MDA4SIFFIRNOJI5I5UILUJP" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u75, 6u85, 7u72, and 8u25; Java SE Embedded 7u71 and 8u6; and JRockit 27.8.4 and 28.3.4 allows remote attackers to affect confidentiality and integrity via vectors related to JSSE.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6593/">CVE-2014-6593 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6593">CVE-2014-6593 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/914041">SUSE bug 914041</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820739" comment="java-1.6.0-openjdk-1.6.0.34-1.13.6.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820740" comment="java-1.6.0-openjdk-demo-1.6.0.34-1.13.6.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820741" comment="java-1.6.0-openjdk-devel-1.6.0.34-1.13.6.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820742" comment="java-1.6.0-openjdk-javadoc-1.6.0.34-1.13.6.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820743" comment="java-1.6.0-openjdk-src-1.6.0.34-1.13.6.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820728" comment="java-1.7.0-openjdk-1.7.0.75-2.5.4.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820729" comment="java-1.7.0-openjdk-accessibility-1.7.0.75-2.5.4.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820730" comment="java-1.7.0-openjdk-demo-1.7.0.75-2.5.4.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820731" comment="java-1.7.0-openjdk-devel-1.7.0.75-2.5.4.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820732" comment="java-1.7.0-openjdk-headless-1.7.0.75-2.5.4.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820733" comment="java-1.7.0-openjdk-javadoc-1.7.0.75-2.5.4.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820734" comment="java-1.7.0-openjdk-src-1.7.0.75-2.5.4.2.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146601" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6601</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6601" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6601" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6601" ref_url="https://www.suse.com/security/cve/CVE-2014-6601" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001288.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0190-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QOHQUN3Q5MDA4SIFFIRNOJI5I5UILUJP/#QOHQUN3Q5MDA4SIFFIRNOJI5I5UILUJP" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u85, 7u72, and 8u25 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Hotspot.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6601/">CVE-2014-6601 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6601">CVE-2014-6601 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/914041">SUSE bug 914041</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820739" comment="java-1.6.0-openjdk-1.6.0.34-1.13.6.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820740" comment="java-1.6.0-openjdk-demo-1.6.0.34-1.13.6.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820741" comment="java-1.6.0-openjdk-devel-1.6.0.34-1.13.6.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820742" comment="java-1.6.0-openjdk-javadoc-1.6.0.34-1.13.6.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820743" comment="java-1.6.0-openjdk-src-1.6.0.34-1.13.6.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820728" comment="java-1.7.0-openjdk-1.7.0.75-2.5.4.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820729" comment="java-1.7.0-openjdk-accessibility-1.7.0.75-2.5.4.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820730" comment="java-1.7.0-openjdk-demo-1.7.0.75-2.5.4.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820731" comment="java-1.7.0-openjdk-devel-1.7.0.75-2.5.4.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820732" comment="java-1.7.0-openjdk-headless-1.7.0.75-2.5.4.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820733" comment="java-1.7.0-openjdk-javadoc-1.7.0.75-2.5.4.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820734" comment="java-1.7.0-openjdk-src-1.7.0.75-2.5.4.2.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147145" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7145</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-7145" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7145" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-7145" ref_url="https://www.suse.com/security/cve/CVE-2014-7145" source="SUSE CVE"/>
    <description>
    The SMB2_tcon function in fs/cifs/smb2pdu.c in the Linux kernel before 3.16.3 allows remote CIFS servers to cause a denial of service (NULL pointer dereference and client system crash) or possibly have unspecified other impact by deleting the IPC$ share during resolution of DFS referrals.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7145/">CVE-2014-7145 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7145">CVE-2014-7145 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/897101">SUSE bug 897101</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820753" comment="kernel-3.10.0-123.20.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820754" comment="kernel-abi-whitelists-3.10.0-123.20.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820755" comment="kernel-debug-3.10.0-123.20.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820758" comment="kernel-doc-3.10.0-123.20.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820759" comment="kernel-headers-3.10.0-123.20.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820760" comment="kernel-tools-3.10.0-123.20.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820761" comment="kernel-tools-libs-3.10.0-123.20.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820763" comment="perf-3.10.0-123.20.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820764" comment="python-perf-3.10.0-123.20.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7185</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-7185" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7185" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-7185" ref_url="https://www.suse.com/security/cve/CVE-2014-7185" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
    <description>
    Integer overflow in bufferobject.c in Python before 2.7.8 allows context-dependent attackers to obtain sensitive information from process memory via a large size and offset in a "buffer" function.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7185/">CVE-2014-7185 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7185">CVE-2014-7185 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/898572">SUSE bug 898572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912739">SUSE bug 912739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913479">SUSE bug 913479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955182">SUSE bug 955182</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821393" comment="python-2.7.5-34.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821394" comment="python-debug-2.7.5-34.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821395" comment="python-devel-2.7.5-34.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821396" comment="python-libs-2.7.5-34.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821397" comment="python-test-2.7.5-34.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821398" comment="python-tools-2.7.5-34.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821399" comment="tkinter-2.7.5-34.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147300" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7300</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-7300" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7300" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-7300" ref_url="https://www.suse.com/security/cve/CVE-2014-7300" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001293.html" source="SUSE-SU"/>
    <description>
    GNOME Shell 3.14.x before 3.14.1, when the Screen Lock feature is used, does not limit the aggregate memory consumption of all active PrtSc requests, which allows physically proximate attackers to execute arbitrary commands on an unattended workstation by making many PrtSc requests and leveraging a temporary lock outage, and the resulting temporary shell availability, caused by the Linux kernel OOM killer.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7300/">CVE-2014-7300 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7300">CVE-2014-7300 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/900031">SUSE bug 900031</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820893" comment="clutter-1.14.4-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820894" comment="clutter-devel-1.14.4-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820895" comment="clutter-doc-1.14.4-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820896" comment="cogl-1.14.0-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820897" comment="cogl-devel-1.14.0-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820898" comment="cogl-doc-1.14.0-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820899" comment="gnome-shell-3.8.4-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820900" comment="gnome-shell-browser-plugin-3.8.4-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820901" comment="mutter-3.8.4-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820902" comment="mutter-devel-3.8.4-16.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147810" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7810</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-7810" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7810" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-7810" ref_url="https://www.suse.com/security/cve/CVE-2014-7810" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001506.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001594.html" source="SUSE-SU"/>
    <description>
    The Expression Language (EL) implementation in Apache Tomcat 6.x before 6.0.44, 7.x before 7.0.58, and 8.x before 8.0.16 does not properly consider the possibility of an accessible interface implemented by an inaccessible class, which allows attackers to bypass a SecurityManager protection mechanism via a web application that leverages use of incorrect privileges during EL evaluation.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7810/">CVE-2014-7810 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7810">CVE-2014-7810 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/931442">SUSE bug 931442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822320" comment="tomcat-7.0.54-8.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822321" comment="tomcat-admin-webapps-7.0.54-8.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822322" comment="tomcat-docs-webapp-7.0.54-8.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822323" comment="tomcat-el-2.2-api-7.0.54-8.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822324" comment="tomcat-javadoc-7.0.54-8.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822325" comment="tomcat-jsp-2.2-api-7.0.54-8.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822326" comment="tomcat-jsvc-7.0.54-8.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822327" comment="tomcat-lib-7.0.54-8.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822328" comment="tomcat-servlet-3.0-api-7.0.54-8.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822329" comment="tomcat-webapps-7.0.54-8.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147815" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7815</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-7815" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7815" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-7815" ref_url="https://www.suse.com/security/cve/CVE-2014-7815" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1445-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0914-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/56SB7O6IKG3PWP6IFVQ334V6YMU3GFH3/#56SB7O6IKG3PWP6IFVQ334V6YMU3GFH3" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4OGUN5F4IJ2HL42Y4XJBGLVFNE3RUZGG/#4OGUN5F4IJ2HL42Y4XJBGLVFNE3RUZGG" source="SUSE-SU"/>
    <description>
    The set_pixel_format function in ui/vnc.c in QEMU allows remote attackers to cause a denial of service (crash) via a small bytes_per_pixel value.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7815/">CVE-2014-7815 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7815">CVE-2014-7815 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/902737">SUSE bug 902737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962627">SUSE bug 962627</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820864" comment="libcacard-1.5.3-86.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820865" comment="libcacard-devel-1.5.3-86.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820866" comment="libcacard-tools-1.5.3-86.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820867" comment="qemu-img-1.5.3-86.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820868" comment="qemu-kvm-1.5.3-86.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820869" comment="qemu-kvm-common-1.5.3-86.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820870" comment="qemu-kvm-tools-1.5.3-86.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7817</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-7817" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7817" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-7817" ref_url="https://www.suse.com/security/cve/CVE-2014-7817" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001305.html" source="SUSE-SU"/>
    <description>
    The wordexp function in GNU C Library (aka glibc) 2.21 does not enforce the WRDE_NOCMD flag, which allows context-dependent attackers to execute arbitrary commands, as demonstrated by input containing "$((`...`))".
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7817/">CVE-2014-7817 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7817">CVE-2014-7817 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/906371">SUSE bug 906371</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820688" comment="glibc-2.17-55.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820689" comment="glibc-common-2.17-55.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820690" comment="glibc-devel-2.17-55.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820691" comment="glibc-headers-2.17-55.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820692" comment="glibc-static-2.17-55.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820693" comment="glibc-utils-2.17-55.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820694" comment="nscd-2.17-55.el7_0.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147822" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7822</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-7822" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7822" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-7822" ref_url="https://www.suse.com/security/cve/CVE-2014-7822" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1488-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001572.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0714-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TGDFE2ZE62NVTCXF3ICQYCJ3S7RQZBVD/#TGDFE2ZE62NVTCXF3ICQYCJ3S7RQZBVD" source="SUSE-SU"/>
    <description>
    The implementation of certain splice_write file operations in the Linux kernel before 3.16 does not enforce a restriction on the maximum size of a single file, which allows local users to cause a denial of service (system crash) or possibly have unspecified other impact via a crafted splice system call, as demonstrated by use of a file descriptor associated with an ext4 filesystem.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7822/">CVE-2014-7822 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7822">CVE-2014-7822 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1115893">SUSE bug 1115893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915322">SUSE bug 915322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915517">SUSE bug 915517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939240">SUSE bug 939240</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820753" comment="kernel-3.10.0-123.20.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820754" comment="kernel-abi-whitelists-3.10.0-123.20.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820755" comment="kernel-debug-3.10.0-123.20.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820758" comment="kernel-doc-3.10.0-123.20.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820759" comment="kernel-headers-3.10.0-123.20.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820760" comment="kernel-tools-3.10.0-123.20.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820761" comment="kernel-tools-libs-3.10.0-123.20.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820763" comment="perf-3.10.0-123.20.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820764" comment="python-perf-3.10.0-123.20.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147823" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7823</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-7823" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7823" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-7823" ref_url="https://www.suse.com/security/cve/CVE-2014-7823" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001247.html" source="SUSE-SU"/>
    <description>
    The virDomainGetXMLDesc API in Libvirt before 1.2.11 allows remote read-only users to obtain the VNC password by using the VIR_DOMAIN_XML_MIGRATABLE flag, which triggers the use of the VIR_DOMAIN_XML_SECURE flag.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7823/">CVE-2014-7823 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7823">CVE-2014-7823 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/904176">SUSE bug 904176</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820700" comment="libvirt-1.1.1-29.el7_0.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820701" comment="libvirt-client-1.1.1-29.el7_0.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820702" comment="libvirt-daemon-1.1.1-29.el7_0.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820703" comment="libvirt-daemon-config-network-1.1.1-29.el7_0.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820704" comment="libvirt-daemon-config-nwfilter-1.1.1-29.el7_0.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820705" comment="libvirt-daemon-driver-interface-1.1.1-29.el7_0.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820706" comment="libvirt-daemon-driver-lxc-1.1.1-29.el7_0.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820707" comment="libvirt-daemon-driver-network-1.1.1-29.el7_0.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820708" comment="libvirt-daemon-driver-nodedev-1.1.1-29.el7_0.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820709" comment="libvirt-daemon-driver-nwfilter-1.1.1-29.el7_0.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820710" comment="libvirt-daemon-driver-qemu-1.1.1-29.el7_0.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820711" comment="libvirt-daemon-driver-secret-1.1.1-29.el7_0.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820712" comment="libvirt-daemon-driver-storage-1.1.1-29.el7_0.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820713" comment="libvirt-daemon-kvm-1.1.1-29.el7_0.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820714" comment="libvirt-daemon-lxc-1.1.1-29.el7_0.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820715" comment="libvirt-devel-1.1.1-29.el7_0.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820716" comment="libvirt-docs-1.1.1-29.el7_0.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820717" comment="libvirt-lock-sanlock-1.1.1-29.el7_0.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820718" comment="libvirt-login-shell-1.1.1-29.el7_0.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820719" comment="libvirt-python-1.1.1-29.el7_0.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147825" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7825</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-7825" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7825" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-7825" ref_url="https://www.suse.com/security/cve/CVE-2014-7825" source="SUSE CVE"/>
    <description>
    kernel/trace/trace_syscalls.c in the Linux kernel through 3.17.2 does not properly handle private syscall numbers during use of the perf subsystem, which allows local users to cause a denial of service (out-of-bounds read and OOPS) or bypass the ASLR protection mechanism via a crafted application.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7825/">CVE-2014-7825 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-7825">CVE-2014-7825 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/904012">SUSE bug 904012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904013">SUSE bug 904013</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820807" comment="kernel-3.10.0-229.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820808" comment="kernel-abi-whitelists-3.10.0-229.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820809" comment="kernel-debug-3.10.0-229.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820812" comment="kernel-doc-3.10.0-229.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820813" comment="kernel-headers-3.10.0-229.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820814" comment="kernel-tools-3.10.0-229.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820815" comment="kernel-tools-libs-3.10.0-229.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820817" comment="perf-3.10.0-229.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820818" comment="python-perf-3.10.0-229.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147826" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7826</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-7826" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7826" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-7826" ref_url="https://www.suse.com/security/cve/CVE-2014-7826" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1693-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001282.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1669-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GDZOTMP2VOUC5CTGQ542UWQZWRTOES4X/#GDZOTMP2VOUC5CTGQ542UWQZWRTOES4X" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1677-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KMCOHP6GELYLJBOOYH4FHHAYS7Q36GJY/#KMCOHP6GELYLJBOOYH4FHHAYS7Q36GJY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1678-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/537UDQ3EUWRMATJUJW6VCQRHQ6WZ7VVT/#537UDQ3EUWRMATJUJW6VCQRHQ6WZ7VVT" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/45VR2J6DOCMZ7DOFZ5B4QZ5CLCL3DYNQ/#45VR2J6DOCMZ7DOFZ5B4QZ5CLCL3DYNQ" source="SUSE-SU"/>
    <description>
    kernel/trace/trace_syscalls.c in the Linux kernel through 3.17.2 does not properly handle private syscall numbers during use of the ftrace subsystem, which allows local users to gain privileges or cause a denial of service (invalid pointer dereference) via a crafted application.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7826/">CVE-2014-7826 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-7826">CVE-2014-7826 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/904012">SUSE bug 904012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904013">SUSE bug 904013</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820807" comment="kernel-3.10.0-229.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820808" comment="kernel-abi-whitelists-3.10.0-229.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820809" comment="kernel-debug-3.10.0-229.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820812" comment="kernel-doc-3.10.0-229.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820813" comment="kernel-headers-3.10.0-229.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820814" comment="kernel-tools-3.10.0-229.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820815" comment="kernel-tools-libs-3.10.0-229.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820817" comment="perf-3.10.0-229.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820818" comment="python-perf-3.10.0-229.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147840" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7840</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-7840" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7840" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-7840" ref_url="https://www.suse.com/security/cve/CVE-2014-7840" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001243.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001247.html" source="SUSE-SU"/>
    <description>
    The host_from_stream_offset function in arch_init.c in QEMU, when loading RAM during migration, allows remote attackers to execute arbitrary code via a crafted (1) offset or (2) length value in savevm data.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7840/">CVE-2014-7840 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7840">CVE-2014-7840 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/905097">SUSE bug 905097</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820864" comment="libcacard-1.5.3-86.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820865" comment="libcacard-devel-1.5.3-86.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820866" comment="libcacard-tools-1.5.3-86.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820867" comment="qemu-img-1.5.3-86.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820868" comment="qemu-kvm-1.5.3-86.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820869" comment="qemu-kvm-common-1.5.3-86.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820870" comment="qemu-kvm-tools-1.5.3-86.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147841" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7841</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-7841" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7841" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-7841" ref_url="https://www.suse.com/security/cve/CVE-2014-7841" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1693-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009784.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1669-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GDZOTMP2VOUC5CTGQ542UWQZWRTOES4X/#GDZOTMP2VOUC5CTGQ542UWQZWRTOES4X" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1677-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KMCOHP6GELYLJBOOYH4FHHAYS7Q36GJY/#KMCOHP6GELYLJBOOYH4FHHAYS7Q36GJY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1678-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/537UDQ3EUWRMATJUJW6VCQRHQ6WZ7VVT/#537UDQ3EUWRMATJUJW6VCQRHQ6WZ7VVT" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/45VR2J6DOCMZ7DOFZ5B4QZ5CLCL3DYNQ/#45VR2J6DOCMZ7DOFZ5B4QZ5CLCL3DYNQ" source="SUSE-SU"/>
    <description>
    The sctp_process_param function in net/sctp/sm_make_chunk.c in the SCTP implementation in the Linux kernel before 3.17.4, when ASCONF is used, allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) via a malformed INIT chunk.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7841/">CVE-2014-7841 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7841">CVE-2014-7841 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/904899">SUSE bug 904899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905100">SUSE bug 905100</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820753" comment="kernel-3.10.0-123.20.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820754" comment="kernel-abi-whitelists-3.10.0-123.20.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820755" comment="kernel-debug-3.10.0-123.20.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820758" comment="kernel-doc-3.10.0-123.20.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820759" comment="kernel-headers-3.10.0-123.20.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820760" comment="kernel-tools-3.10.0-123.20.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820761" comment="kernel-tools-libs-3.10.0-123.20.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820763" comment="perf-3.10.0-123.20.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820764" comment="python-perf-3.10.0-123.20.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147842" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7842</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-7842" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7842" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-7842" ref_url="https://www.suse.com/security/cve/CVE-2014-7842" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/45VR2J6DOCMZ7DOFZ5B4QZ5CLCL3DYNQ/#45VR2J6DOCMZ7DOFZ5B4QZ5CLCL3DYNQ" source="SUSE-SU"/>
    <description>
    Race condition in arch/x86/kvm/x86.c in the Linux kernel before 3.17.4 allows guest OS users to cause a denial of service (guest OS crash) via a crafted application that performs an MMIO transaction or a PIO transaction to trigger a guest userspace emulation error report, a similar issue to CVE-2010-5313.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7842/">CVE-2014-7842 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7842">CVE-2014-7842 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/905312">SUSE bug 905312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907822">SUSE bug 907822</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821413" comment="kernel-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821414" comment="kernel-abi-whitelists-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821415" comment="kernel-debug-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821418" comment="kernel-doc-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821419" comment="kernel-headers-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821420" comment="kernel-tools-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821421" comment="kernel-tools-libs-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821423" comment="perf-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821424" comment="python-perf-3.10.0-327.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147844" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7844</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-7844" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7844" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-7844" ref_url="https://www.suse.com/security/cve/CVE-2014-7844" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001127.html" source="SUSE-SU"/>
    <description>
    BSD mailx 8.1.2 and earlier allows remote attackers to execute arbitrary commands via a crafted email address.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2014-7844/">CVE-2014-7844 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-7844">CVE-2014-7844 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/909208">SUSE bug 909208</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820671" comment="mailx-12.5-12.el7_0 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147970" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7970</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-7970" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7970" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-7970" ref_url="https://www.suse.com/security/cve/CVE-2014-7970" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001352.html" source="SUSE-SU"/>
    <description>
    The pivot_root implementation in fs/namespace.c in the Linux kernel through 3.17 does not properly interact with certain locations of a chroot directory, which allows local users to cause a denial of service (mount-tree loop) via . (dot) values in both arguments to the pivot_root system call.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7970/">CVE-2014-7970 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-7970">CVE-2014-7970 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/900644">SUSE bug 900644</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823168" comment="kernel-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823169" comment="kernel-abi-whitelists-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823170" comment="kernel-debug-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823173" comment="kernel-doc-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823174" comment="kernel-headers-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823175" comment="kernel-tools-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823176" comment="kernel-tools-libs-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823178" comment="perf-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823179" comment="python-perf-3.10.0-693.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147975" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7975</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-7975" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7975" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-7975" ref_url="https://www.suse.com/security/cve/CVE-2014-7975" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:1677-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KMCOHP6GELYLJBOOYH4FHHAYS7Q36GJY/#KMCOHP6GELYLJBOOYH4FHHAYS7Q36GJY" source="SUSE-SU"/>
    <description>
    The do_umount function in fs/namespace.c in the Linux kernel through 3.17 does not require the CAP_SYS_ADMIN capability for do_remount_sb calls that change the root filesystem to read-only, which allows local users to cause a denial of service (loss of writability) by making certain unshare system calls, clearing the / MNT_LOCKED flag, and making an MNT_FORCE umount system call.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7975/">CVE-2014-7975 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-7975">CVE-2014-7975 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/900392">SUSE bug 900392</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823168" comment="kernel-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823169" comment="kernel-abi-whitelists-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823170" comment="kernel-debug-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823173" comment="kernel-doc-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823174" comment="kernel-headers-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823175" comment="kernel-tools-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823176" comment="kernel-tools-libs-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823178" comment="perf-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823179" comment="python-perf-3.10.0-693.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148080" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8080</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8080" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8080" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8080" ref_url="https://www.suse.com/security/cve/CVE-2014-8080" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001185.html" source="SUSE-SU"/>
    <description>
    The REXML parser in Ruby 1.9.x before 1.9.3-p550, 2.0.x before 2.0.0-p594, and 2.1.x before 2.1.4 allows remote attackers to cause a denial of service (memory consumption) via a crafted XML document, aka an XML Entity Expansion (XEE) attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8080/">CVE-2014-8080 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8080">CVE-2014-8080 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/902851">SUSE bug 902851</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820604" comment="ruby-2.0.0.353-22.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820605" comment="ruby-devel-2.0.0.353-22.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820606" comment="ruby-doc-2.0.0.353-22.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820607" comment="ruby-irb-2.0.0.353-22.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820608" comment="ruby-libs-2.0.0.353-22.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820609" comment="ruby-tcltk-2.0.0.353-22.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820610" comment="rubygem-bigdecimal-1.2.0-22.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820611" comment="rubygem-io-console-0.4.2-22.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820612" comment="rubygem-json-1.7.7-22.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820613" comment="rubygem-minitest-4.3.2-22.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820614" comment="rubygem-psych-2.0.0-22.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820615" comment="rubygem-rake-0.9.6-22.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820616" comment="rubygem-rdoc-4.0.0-22.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820617" comment="rubygems-2.0.14-22.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820618" comment="rubygems-devel-2.0.14-22.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148086" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8086</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8086" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8086" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8086" ref_url="https://www.suse.com/security/cve/CVE-2014-8086" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001563.html" source="SUSE-SU"/>
    <description>
    Race condition in the ext4_file_write_iter function in fs/ext4/file.c in the Linux kernel through 3.17 allows local users to cause a denial of service (file unavailability) via a combination of a write action and an F_SETFL fcntl operation for the O_DIRECT flag.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8086/">CVE-2014-8086 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8086">CVE-2014-8086 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/900881">SUSE bug 900881</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820807" comment="kernel-3.10.0-229.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820808" comment="kernel-abi-whitelists-3.10.0-229.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820809" comment="kernel-debug-3.10.0-229.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820812" comment="kernel-doc-3.10.0-229.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820813" comment="kernel-headers-3.10.0-229.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820814" comment="kernel-tools-3.10.0-229.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820815" comment="kernel-tools-libs-3.10.0-229.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820817" comment="perf-3.10.0-229.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820818" comment="python-perf-3.10.0-229.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148090" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8090</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8090" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8090" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8090" ref_url="https://www.suse.com/security/cve/CVE-2014-8090" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001185.html" source="SUSE-SU"/>
    <description>
    The REXML parser in Ruby 1.9.x before 1.9.3 patchlevel 551, 2.0.x before 2.0.0 patchlevel 598, and 2.1.x before 2.1.5 allows remote attackers to cause a denial of service (CPU and memory consumption) a crafted XML document containing an empty string in an entity that is used in a large number of nested entity references, aka an XML Entity Expansion (XEE) attack.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-1821 and CVE-2014-8080.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8090/">CVE-2014-8090 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8090">CVE-2014-8090 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/905326">SUSE bug 905326</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820604" comment="ruby-2.0.0.353-22.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820605" comment="ruby-devel-2.0.0.353-22.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820606" comment="ruby-doc-2.0.0.353-22.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820607" comment="ruby-irb-2.0.0.353-22.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820608" comment="ruby-libs-2.0.0.353-22.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820609" comment="ruby-tcltk-2.0.0.353-22.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820610" comment="rubygem-bigdecimal-1.2.0-22.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820611" comment="rubygem-io-console-0.4.2-22.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820612" comment="rubygem-json-1.7.7-22.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820613" comment="rubygem-minitest-4.3.2-22.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820614" comment="rubygem-psych-2.0.0-22.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820615" comment="rubygem-rake-0.9.6-22.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820616" comment="rubygem-rdoc-4.0.0-22.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820617" comment="rubygems-2.0.14-22.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820618" comment="rubygems-devel-2.0.14-22.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148091" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8091</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8091" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8091" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8091" ref_url="https://www.suse.com/security/cve/CVE-2014-8091" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001157.html" source="SUSE-SU"/>
    <description>
    X.Org X Window System (aka X11 and X) X11R5 and X.Org Server (aka xserver and xorg-server) before 1.16.3, when using SUN-DES-1 (Secure RPC) authentication credentials, does not check the return value of a malloc call, which allows remote attackers to cause a denial of service (NULL pointer dereference and server crash) via a crafted connection request.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8091/">CVE-2014-8091 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8091">CVE-2014-8091 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1000496">SUSE bug 1000496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882226">SUSE bug 882226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907268">SUSE bug 907268</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820653" comment="xorg-x11-server-Xdmx-1.15.0-7.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820654" comment="xorg-x11-server-Xephyr-1.15.0-7.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820655" comment="xorg-x11-server-Xnest-1.15.0-7.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820656" comment="xorg-x11-server-Xorg-1.15.0-7.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820657" comment="xorg-x11-server-Xvfb-1.15.0-7.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820658" comment="xorg-x11-server-common-1.15.0-7.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820659" comment="xorg-x11-server-devel-1.15.0-7.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820660" comment="xorg-x11-server-source-1.15.0-7.el7_0.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148092" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8092</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8092" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8092" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8092" ref_url="https://www.suse.com/security/cve/CVE-2014-8092" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001456.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in X.Org X Window System (aka X11 or X) X11R1 and X.Org Server (aka xserver and xorg-server) before 1.16.3 allow remote authenticated users to cause a denial of service (crash) or possibly execute arbitrary code via a crafted request to the (1) ProcPutImage, (2) GetHosts, (3) RegionSizeof, or (4) REQUEST_FIXED_SIZE function, which triggers an out-of-bounds read or write.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2014-8092/">CVE-2014-8092 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8092">CVE-2014-8092 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1000496">SUSE bug 1000496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146596">SUSE bug 1146596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907268">SUSE bug 907268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928520">SUSE bug 928520</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820653" comment="xorg-x11-server-Xdmx-1.15.0-7.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820654" comment="xorg-x11-server-Xephyr-1.15.0-7.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820655" comment="xorg-x11-server-Xnest-1.15.0-7.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820656" comment="xorg-x11-server-Xorg-1.15.0-7.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820657" comment="xorg-x11-server-Xvfb-1.15.0-7.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820658" comment="xorg-x11-server-common-1.15.0-7.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820659" comment="xorg-x11-server-devel-1.15.0-7.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820660" comment="xorg-x11-server-source-1.15.0-7.el7_0.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148093" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8093</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8093" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8093" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8093" ref_url="https://www.suse.com/security/cve/CVE-2014-8093" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001157.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in the GLX extension in XFree86 4.0, X.Org X Window System (aka X11 or X) X11R6.7, and X.Org Server (aka xserver and xorg-server) before 1.16.3 allow remote authenticated users to cause a denial of service (crash) or possibly execute arbitrary code via a crafted request to the (1) __glXDisp_ReadPixels, (2) __glXDispSwap_ReadPixels, (3) __glXDisp_GetTexImage, (4) __glXDispSwap_GetTexImage, (5) GetSeparableFilter, (6) GetConvolutionFilter, (7) GetHistogram, (8) GetMinmax, (9) GetColorTable, (10) __glXGetAnswerBuffer, (11) __GLX_GET_ANSWER_BUFFER, (12) __glXMap1dReqSize, (13) __glXMap1fReqSize, (14) Map2Size, (15) __glXMap2dReqSize, (16) __glXMap2fReqSize, (17) __glXImageSize, or (18) __glXSeparableFilter2DReqSize function, which triggers an out-of-bounds read or write.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8093/">CVE-2014-8093 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8093">CVE-2014-8093 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1000496">SUSE bug 1000496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907268">SUSE bug 907268</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820653" comment="xorg-x11-server-Xdmx-1.15.0-7.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820654" comment="xorg-x11-server-Xephyr-1.15.0-7.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820655" comment="xorg-x11-server-Xnest-1.15.0-7.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820656" comment="xorg-x11-server-Xorg-1.15.0-7.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820657" comment="xorg-x11-server-Xvfb-1.15.0-7.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820658" comment="xorg-x11-server-common-1.15.0-7.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820659" comment="xorg-x11-server-devel-1.15.0-7.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820660" comment="xorg-x11-server-source-1.15.0-7.el7_0.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148094" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8094</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8094" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8094" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8094" ref_url="https://www.suse.com/security/cve/CVE-2014-8094" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001157.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the ProcDRI2GetBuffers function in the DRI2 extension in X.Org Server (aka xserver and xorg-server) 1.7.0 through 1.16.x before 1.16.3 allows remote authenticated users to cause a denial of service (crash) or possibly execute arbitrary code via a crafted request, which triggers an out-of-bounds read or write.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8094/">CVE-2014-8094 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8094">CVE-2014-8094 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1000496">SUSE bug 1000496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907268">SUSE bug 907268</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820653" comment="xorg-x11-server-Xdmx-1.15.0-7.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820654" comment="xorg-x11-server-Xephyr-1.15.0-7.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820655" comment="xorg-x11-server-Xnest-1.15.0-7.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820656" comment="xorg-x11-server-Xorg-1.15.0-7.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820657" comment="xorg-x11-server-Xvfb-1.15.0-7.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820658" comment="xorg-x11-server-common-1.15.0-7.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820659" comment="xorg-x11-server-devel-1.15.0-7.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820660" comment="xorg-x11-server-source-1.15.0-7.el7_0.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148095" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8095</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8095" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8095" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8095" ref_url="https://www.suse.com/security/cve/CVE-2014-8095" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001157.html" source="SUSE-SU"/>
    <description>
    The XInput extension in X.Org X Window System (aka X11 or X) X11R4 and X.Org Server (aka xserver and xorg-server) before 1.16.3 allows remote authenticated users to cause a denial of service (out-of-bounds read or write) or possibly execute arbitrary code via a crafted length or index value to the (1) SProcXChangeDeviceControl, (2) ProcXChangeDeviceControl, (3) ProcXChangeFeedbackControl, (4) ProcXSendExtensionEvent, (5) SProcXIAllowEvents, (6) SProcXIChangeCursor, (7) ProcXIChangeHierarchy, (8) SProcXIGetClientPointer, (9) SProcXIGrabDevice, (10) SProcXIUngrabDevice, (11) ProcXIUngrabDevice, (12) SProcXIPassiveGrabDevice, (13) ProcXIPassiveGrabDevice, (14) SProcXIPassiveUngrabDevice, (15) ProcXIPassiveUngrabDevice, (16) SProcXListDeviceProperties, (17) SProcXDeleteDeviceProperty, (18) SProcXIListProperties, (19) SProcXIDeleteProperty, (20) SProcXIGetProperty, (21) SProcXIQueryDevice, (22) SProcXIQueryPointer, (23) SProcXISelectEvents, (24) SProcXISetClientPointer, (25) SProcXISetFocus, (26) SProcXIGetFocus, or (27) SProcXIWarpPointer function.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8095/">CVE-2014-8095 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8095">CVE-2014-8095 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1000496">SUSE bug 1000496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907268">SUSE bug 907268</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820653" comment="xorg-x11-server-Xdmx-1.15.0-7.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820654" comment="xorg-x11-server-Xephyr-1.15.0-7.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820655" comment="xorg-x11-server-Xnest-1.15.0-7.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820656" comment="xorg-x11-server-Xorg-1.15.0-7.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820657" comment="xorg-x11-server-Xvfb-1.15.0-7.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820658" comment="xorg-x11-server-common-1.15.0-7.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820659" comment="xorg-x11-server-devel-1.15.0-7.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820660" comment="xorg-x11-server-source-1.15.0-7.el7_0.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148096" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8096</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8096" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8096" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8096" ref_url="https://www.suse.com/security/cve/CVE-2014-8096" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001157.html" source="SUSE-SU"/>
    <description>
    The SProcXCMiscGetXIDList function in the XC-MISC extension in X.Org X Window System (aka X11 or X) X11R6.0 and X.Org Server (aka xserver and xorg-server) before 1.16.3 allows remote authenticated users to cause a denial of service (out-of-bounds read or write) or possibly execute arbitrary code via a crafted length or index value.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8096/">CVE-2014-8096 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8096">CVE-2014-8096 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1000496">SUSE bug 1000496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907268">SUSE bug 907268</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820653" comment="xorg-x11-server-Xdmx-1.15.0-7.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820654" comment="xorg-x11-server-Xephyr-1.15.0-7.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820655" comment="xorg-x11-server-Xnest-1.15.0-7.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820656" comment="xorg-x11-server-Xorg-1.15.0-7.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820657" comment="xorg-x11-server-Xvfb-1.15.0-7.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820658" comment="xorg-x11-server-common-1.15.0-7.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820659" comment="xorg-x11-server-devel-1.15.0-7.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820660" comment="xorg-x11-server-source-1.15.0-7.el7_0.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148097" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8097</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8097" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8097" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8097" ref_url="https://www.suse.com/security/cve/CVE-2014-8097" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001157.html" source="SUSE-SU"/>
    <description>
    The DBE extension in X.Org X Window System (aka X11 or X) X11R6.1 and X.Org Server (aka xserver and xorg-server) before 1.16.3 allows remote authenticated users to cause a denial of service (out-of-bounds read or write) or possibly execute arbitrary code via a crafted length or index value to the (1) ProcDbeSwapBuffers or (2) SProcDbeSwapBuffers function.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8097/">CVE-2014-8097 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8097">CVE-2014-8097 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1000496">SUSE bug 1000496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907268">SUSE bug 907268</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820653" comment="xorg-x11-server-Xdmx-1.15.0-7.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820654" comment="xorg-x11-server-Xephyr-1.15.0-7.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820655" comment="xorg-x11-server-Xnest-1.15.0-7.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820656" comment="xorg-x11-server-Xorg-1.15.0-7.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820657" comment="xorg-x11-server-Xvfb-1.15.0-7.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820658" comment="xorg-x11-server-common-1.15.0-7.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820659" comment="xorg-x11-server-devel-1.15.0-7.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820660" comment="xorg-x11-server-source-1.15.0-7.el7_0.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148098" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8098</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8098" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8098" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8098" ref_url="https://www.suse.com/security/cve/CVE-2014-8098" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001157.html" source="SUSE-SU"/>
    <description>
    The GLX extension in XFree86 4.0, X.Org X Window System (aka X11 or X) X11R6.7, and X.Org Server (aka xserver and xorg-server) before 1.16.3 allows remote authenticated users to cause a denial of service (out-of-bounds read or write) or possibly execute arbitrary code via a crafted length or index value to the (1) __glXDisp_Render, (2) __glXDisp_RenderLarge, (3) __glXDispSwap_VendorPrivate, (4) __glXDispSwap_VendorPrivateWithReply, (5) set_client_info, (6) __glXDispSwap_SetClientInfoARB, (7) DoSwapInterval, (8) DoGetProgramString, (9) DoGetString, (10) __glXDispSwap_RenderMode, (11) __glXDisp_GetCompressedTexImage, (12) __glXDispSwap_GetCompressedTexImage, (13) __glXDisp_FeedbackBuffer, (14) __glXDispSwap_FeedbackBuffer, (15) __glXDisp_SelectBuffer, (16) __glXDispSwap_SelectBuffer, (17) __glXDisp_Flush, (18) __glXDispSwap_Flush, (19) __glXDisp_Finish, (20) __glXDispSwap_Finish, (21) __glXDisp_ReadPixels, (22) __glXDispSwap_ReadPixels, (23) __glXDisp_GetTexImage, (24) __glXDispSwap_GetTexImage, (25) __glXDisp_GetPolygonStipple, (26) __glXDispSwap_GetPolygonStipple, (27) __glXDisp_GetSeparableFilter, (28) __glXDisp_GetSeparableFilterEXT, (29) __glXDisp_GetConvolutionFilter, (30) __glXDisp_GetConvolutionFilterEXT, (31) __glXDisp_GetHistogram, (32) __glXDisp_GetHistogramEXT, (33) __glXDisp_GetMinmax, (34) __glXDisp_GetMinmaxEXT, (35) __glXDisp_GetColorTable, (36) __glXDisp_GetColorTableSGI, (37) GetSeparableFilter, (38) GetConvolutionFilter, (39) GetHistogram, (40) GetMinmax, or (41) GetColorTable function.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8098/">CVE-2014-8098 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8098">CVE-2014-8098 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1000496">SUSE bug 1000496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907268">SUSE bug 907268</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820653" comment="xorg-x11-server-Xdmx-1.15.0-7.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820654" comment="xorg-x11-server-Xephyr-1.15.0-7.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820655" comment="xorg-x11-server-Xnest-1.15.0-7.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820656" comment="xorg-x11-server-Xorg-1.15.0-7.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820657" comment="xorg-x11-server-Xvfb-1.15.0-7.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820658" comment="xorg-x11-server-common-1.15.0-7.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820659" comment="xorg-x11-server-devel-1.15.0-7.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820660" comment="xorg-x11-server-source-1.15.0-7.el7_0.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148099" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8099</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8099" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8099" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8099" ref_url="https://www.suse.com/security/cve/CVE-2014-8099" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001157.html" source="SUSE-SU"/>
    <description>
    The XVideo extension in XFree86 4.0.0, X.Org X Window System (aka X11 or X) X11R6.7, and X.Org Server (aka xserver and xorg-server) before 1.16.3 allows remote authenticated users to cause a denial of service (out-of-bounds read or write) or possibly execute arbitrary code via a crafted length or index value to the (1) SProcXvQueryExtension, (2) SProcXvQueryAdaptors, (3) SProcXvQueryEncodings, (4) SProcXvGrabPort, (5) SProcXvUngrabPort, (6) SProcXvPutVideo, (7) SProcXvPutStill, (8) SProcXvGetVideo, (9) SProcXvGetStill, (10) SProcXvPutImage, (11) SProcXvShmPutImage, (12) SProcXvSelectVideoNotify, (13) SProcXvSelectPortNotify, (14) SProcXvStopVideo, (15) SProcXvSetPortAttribute, (16) SProcXvGetPortAttribute, (17) SProcXvQueryBestSize, (18) SProcXvQueryPortAttributes, (19) SProcXvQueryImageAttributes, or (20) SProcXvListImageFormats function.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8099/">CVE-2014-8099 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8099">CVE-2014-8099 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1000496">SUSE bug 1000496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907268">SUSE bug 907268</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820653" comment="xorg-x11-server-Xdmx-1.15.0-7.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820654" comment="xorg-x11-server-Xephyr-1.15.0-7.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820655" comment="xorg-x11-server-Xnest-1.15.0-7.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820656" comment="xorg-x11-server-Xorg-1.15.0-7.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820657" comment="xorg-x11-server-Xvfb-1.15.0-7.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820658" comment="xorg-x11-server-common-1.15.0-7.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820659" comment="xorg-x11-server-devel-1.15.0-7.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820660" comment="xorg-x11-server-source-1.15.0-7.el7_0.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148100" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8100</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8100" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8100" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8100" ref_url="https://www.suse.com/security/cve/CVE-2014-8100" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001157.html" source="SUSE-SU"/>
    <description>
    The Render extension in XFree86 4.0.1, X.Org X Window System (aka X11 or X) X11R6.7, and X.Org Server (aka xserver and xorg-server) before 1.16.3 allows remote authenticated users to cause a denial of service (out-of-bounds read or write) or possibly execute arbitrary code via a crafted length or index value to the (1) ProcRenderQueryVersion, (2) SProcRenderQueryVersion, (3) SProcRenderQueryPictFormats, (4) SProcRenderQueryPictIndexValues, (5) SProcRenderCreatePicture, (6) SProcRenderChangePicture, (7) SProcRenderSetPictureClipRectangles, (8) SProcRenderFreePicture, (9) SProcRenderComposite, (10) SProcRenderScale, (11) SProcRenderCreateGlyphSet, (12) SProcRenderReferenceGlyphSet, (13) SProcRenderFreeGlyphSet, (14) SProcRenderFreeGlyphs, or (15) SProcRenderCompositeGlyphs function.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8100/">CVE-2014-8100 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8100">CVE-2014-8100 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1000496">SUSE bug 1000496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907268">SUSE bug 907268</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820653" comment="xorg-x11-server-Xdmx-1.15.0-7.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820654" comment="xorg-x11-server-Xephyr-1.15.0-7.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820655" comment="xorg-x11-server-Xnest-1.15.0-7.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820656" comment="xorg-x11-server-Xorg-1.15.0-7.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820657" comment="xorg-x11-server-Xvfb-1.15.0-7.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820658" comment="xorg-x11-server-common-1.15.0-7.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820659" comment="xorg-x11-server-devel-1.15.0-7.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820660" comment="xorg-x11-server-source-1.15.0-7.el7_0.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148101" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8101</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8101" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8101" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8101" ref_url="https://www.suse.com/security/cve/CVE-2014-8101" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001157.html" source="SUSE-SU"/>
    <description>
    The RandR extension in XFree86 4.2.0, X.Org X Window System (aka X11 or X) X11R6.7, and X.Org Server (aka xserver and xorg-server) before 1.16.3 allows remote authenticated users to cause a denial of service (out-of-bounds read or write) or possibly execute arbitrary code via a crafted length or index value to the (1) SProcRRQueryVersion, (2) SProcRRGetScreenInfo, (3) SProcRRSelectInput, or (4) SProcRRConfigureOutputProperty function.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8101/">CVE-2014-8101 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8101">CVE-2014-8101 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1000496">SUSE bug 1000496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907268">SUSE bug 907268</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820653" comment="xorg-x11-server-Xdmx-1.15.0-7.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820654" comment="xorg-x11-server-Xephyr-1.15.0-7.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820655" comment="xorg-x11-server-Xnest-1.15.0-7.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820656" comment="xorg-x11-server-Xorg-1.15.0-7.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820657" comment="xorg-x11-server-Xvfb-1.15.0-7.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820658" comment="xorg-x11-server-common-1.15.0-7.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820659" comment="xorg-x11-server-devel-1.15.0-7.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820660" comment="xorg-x11-server-source-1.15.0-7.el7_0.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148102" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8102</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8102" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8102" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8102" ref_url="https://www.suse.com/security/cve/CVE-2014-8102" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001157.html" source="SUSE-SU"/>
    <description>
    The SProcXFixesSelectSelectionInput function in the XFixes extension in X.Org X Window System (aka X11 or X) X11R6.8.0 and X.Org Server (aka xserver and xorg-server) before 1.16.3 allows remote authenticated users to cause a denial of service (out-of-bounds read or write) or possibly execute arbitrary code via a crafted length value.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8102/">CVE-2014-8102 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8102">CVE-2014-8102 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1000496">SUSE bug 1000496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907268">SUSE bug 907268</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820653" comment="xorg-x11-server-Xdmx-1.15.0-7.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820654" comment="xorg-x11-server-Xephyr-1.15.0-7.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820655" comment="xorg-x11-server-Xnest-1.15.0-7.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820656" comment="xorg-x11-server-Xorg-1.15.0-7.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820657" comment="xorg-x11-server-Xvfb-1.15.0-7.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820658" comment="xorg-x11-server-common-1.15.0-7.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820659" comment="xorg-x11-server-devel-1.15.0-7.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820660" comment="xorg-x11-server-source-1.15.0-7.el7_0.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148103" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8103</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8103" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8103" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8103" ref_url="https://www.suse.com/security/cve/CVE-2014-8103" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001157.html" source="SUSE-SU"/>
    <description>
    X.Org Server (aka xserver and xorg-server) 1.15.0 through 1.16.x before 1.16.3 allows remote authenticated users to cause a denial of service (out-of-bounds read or write) or possibly execute arbitrary code via a crafted length or index value to the (1) sproc_dri3_query_version, (2) sproc_dri3_open, (3) sproc_dri3_pixmap_from_buffer, (4) sproc_dri3_buffer_from_pixmap, (5) sproc_dri3_fence_from_fd, (6) sproc_dri3_fd_from_fence, (7) proc_present_query_capabilities, (8) sproc_present_query_version, (9) sproc_present_pixmap, (10) sproc_present_notify_msc, (11) sproc_present_select_input, or (12) sproc_present_query_capabilities function in the (a) DRI3 or (b) Present extension.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8103/">CVE-2014-8103 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8103">CVE-2014-8103 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/907268">SUSE bug 907268</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820653" comment="xorg-x11-server-Xdmx-1.15.0-7.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820654" comment="xorg-x11-server-Xephyr-1.15.0-7.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820655" comment="xorg-x11-server-Xnest-1.15.0-7.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820656" comment="xorg-x11-server-Xorg-1.15.0-7.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820657" comment="xorg-x11-server-Xvfb-1.15.0-7.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820658" comment="xorg-x11-server-common-1.15.0-7.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820659" comment="xorg-x11-server-devel-1.15.0-7.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820660" comment="xorg-x11-server-source-1.15.0-7.el7_0.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148105" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8105</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8105" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8105" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8105" ref_url="https://www.suse.com/security/cve/CVE-2014-8105" source="SUSE CVE"/>
    <description>
    389 Directory Server before 1.3.2.27 and 1.3.3.x before 1.3.3.9 does not properly restrict access to the "cn=changelog" LDAP sub-tree, which allows remote attackers to obtain sensitive information from the changelog via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8105/">CVE-2014-8105 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8105">CVE-2014-8105 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820871" comment="389-ds-base-1.3.3.1-13.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820872" comment="389-ds-base-devel-1.3.3.1-13.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820873" comment="389-ds-base-libs-1.3.3.1-13.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148106" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8106</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8106" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8106" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8106" ref_url="https://www.suse.com/security/cve/CVE-2014-8106" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001243.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002669.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0718-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002705.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the Cirrus VGA emulator (hw/display/cirrus_vga.c) in QEMU before 2.2.0 allows local guest users to execute arbitrary code via vectors related to blit regions. NOTE: this vulnerability exists because an incomplete fix for CVE-2007-1320.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8106/">CVE-2014-8106 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8106">CVE-2014-8106 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1023004">SUSE bug 1023004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907805">SUSE bug 907805</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820864" comment="libcacard-1.5.3-86.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820865" comment="libcacard-devel-1.5.3-86.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820866" comment="libcacard-tools-1.5.3-86.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820867" comment="qemu-img-1.5.3-86.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820868" comment="qemu-kvm-1.5.3-86.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820869" comment="qemu-kvm-common-1.5.3-86.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820870" comment="qemu-kvm-tools-1.5.3-86.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148108" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8108</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8108" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8108" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8108" ref_url="https://www.suse.com/security/cve/CVE-2014-8108" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0155-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003142.html" source="SUSE-SU"/>
    <description>
    The mod_dav_svn Apache HTTPD server module in Apache Subversion 1.7.x before 1.7.19 and 1.8.x before 1.8.11 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a request for a URI that triggers a lookup for a virtual transaction name that does not exist.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8108/">CVE-2014-8108 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8108">CVE-2014-8108 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/909935">SUSE bug 909935</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820773" comment="mod_dav_svn-1.7.14-7.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820774" comment="subversion-1.7.14-7.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820775" comment="subversion-devel-1.7.14-7.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820776" comment="subversion-gnome-1.7.14-7.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820777" comment="subversion-javahl-1.7.14-7.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820778" comment="subversion-kde-1.7.14-7.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820779" comment="subversion-libs-1.7.14-7.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820780" comment="subversion-perl-1.7.14-7.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820781" comment="subversion-python-1.7.14-7.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820782" comment="subversion-ruby-1.7.14-7.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820783" comment="subversion-tools-1.7.14-7.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148112" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8112</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8112" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8112" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8112" ref_url="https://www.suse.com/security/cve/CVE-2014-8112" source="SUSE CVE"/>
    <description>
    389 Directory Server 1.3.1.x, 1.3.2.x before 1.3.2.27, and 1.3.3.x before 1.3.3.9 stores "unhashed" passwords even when the nsslapd-unhashed-pw-switch option is set to off, which allows remote authenticated users to obtain sensitive information by reading the Changelog.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8112/">CVE-2014-8112 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8112">CVE-2014-8112 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820871" comment="389-ds-base-1.3.3.1-13.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820872" comment="389-ds-base-devel-1.3.3.1-13.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820873" comment="389-ds-base-libs-1.3.3.1-13.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148116" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8116</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8116" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8116" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8116" ref_url="https://www.suse.com/security/cve/CVE-2014-8116" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003580.html" source="SUSE-SU"/>
    <description>
    The ELF parser (readelf.c) in file before 5.21 allows remote attackers to cause a denial of service (CPU consumption or crash) via a large number of (1) program or (2) section headers or (3) invalid capabilities.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8116/">CVE-2014-8116 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8116">CVE-2014-8116 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/910252">SUSE bug 910252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910253">SUSE bug 910253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917152">SUSE bug 917152</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821431" comment="file-5.11-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821432" comment="file-devel-5.11-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821433" comment="file-libs-5.11-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821434" comment="file-static-5.11-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821435" comment="python-magic-5.11-31.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148117" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8117</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8117" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8117" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8117" ref_url="https://www.suse.com/security/cve/CVE-2014-8117" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003580.html" source="SUSE-SU"/>
    <description>
    softmagic.c in file before 5.21 does not properly limit recursion, which allows remote attackers to cause a denial of service (CPU consumption or crash) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8117/">CVE-2014-8117 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8117">CVE-2014-8117 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/910252">SUSE bug 910252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910253">SUSE bug 910253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917152">SUSE bug 917152</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821431" comment="file-5.11-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821432" comment="file-devel-5.11-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821433" comment="file-libs-5.11-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821434" comment="file-static-5.11-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821435" comment="python-magic-5.11-31.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148118" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8118</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8118" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8118" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8118" ref_url="https://www.suse.com/security/cve/CVE-2014-8118" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001169.html" source="SUSE-SU"/>
    <description>
    Integer overflow in RPM 4.12 and earlier allows remote attackers to execute arbitrary code via a crafted CPIO header in the payload section of an RPM file, which triggers a stack-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8118/">CVE-2014-8118 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8118">CVE-2014-8118 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1101137">SUSE bug 1101137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127299">SUSE bug 1127299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/906803">SUSE bug 906803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/908128">SUSE bug 908128</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820644" comment="rpm-4.11.1-18.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820645" comment="rpm-apidocs-4.11.1-18.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820646" comment="rpm-build-4.11.1-18.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820647" comment="rpm-build-libs-4.11.1-18.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820648" comment="rpm-cron-4.11.1-18.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820649" comment="rpm-devel-4.11.1-18.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820650" comment="rpm-libs-4.11.1-18.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820651" comment="rpm-python-4.11.1-18.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820652" comment="rpm-sign-4.11.1-18.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148119" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8119</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8119" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8119" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8119" ref_url="https://www.suse.com/security/cve/CVE-2014-8119" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1792-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001642.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0653-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003801.html" source="SUSE-SU"/>
    <description>
    The find_ifcfg_path function in netcf before 0.2.7 might allow attackers to cause a denial of service (application crash) via vectors involving augeas path expressions.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8119/">CVE-2014-8119 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8119">CVE-2014-8119 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/925225">SUSE bug 925225</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821474" comment="netcf-0.2.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821475" comment="netcf-devel-0.2.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821476" comment="netcf-libs-0.2.8-1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148121" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8121</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8121" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8121" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8121" ref_url="https://www.suse.com/security/cve/CVE-2014-8121" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001882.html" source="SUSE-SU"/>
    <description>
    DB_LOOKUP in nss_files/files-XXX.c in the Name Service Switch (NSS) in GNU C Library (aka glibc or libc6) 2.21 and earlier does not properly check if a file is open, which allows remote attackers to cause a denial of service (infinite loop) by performing a look-up on a database while iterating over it, which triggers the file pointer to be reset.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8121/">CVE-2014-8121 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8121">CVE-2014-8121 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1123874">SUSE bug 1123874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918187">SUSE bug 918187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945779">SUSE bug 945779</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820853" comment="glibc-2.17-78.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820854" comment="glibc-common-2.17-78.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820855" comment="glibc-devel-2.17-78.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820856" comment="glibc-headers-2.17-78.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820857" comment="glibc-static-2.17-78.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820858" comment="glibc-utils-2.17-78.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820859" comment="nscd-2.17-78.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148127" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8127</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8127" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8127" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8127" ref_url="https://www.suse.com/security/cve/CVE-2014-8127" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1420-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001561.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002537.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3035-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KXYOOAKMFNUKYDB2XZOT63J2Z2V6LSVK/#KXYOOAKMFNUKYDB2XZOT63J2Z2V6LSVK" source="SUSE-SU"/>
    <description>
    LibTIFF 4.0.3 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via a crafted TIFF image to the (1) checkInkNamesString function in tif_dir.c in the thumbnail tool, (2) compresscontig function in tiff2bw.c in the tiff2bw tool, (3) putcontig8bitCIELab function in tif_getimage.c in the tiff2rgba tool, LZWPreDecode function in tif_lzw.c in the (4) tiff2ps or (5) tiffdither tool, (6) NeXTDecode function in tif_next.c in the tiffmedian tool, or (7) TIFFWriteDirectoryTagLongLong8Array function in tif_dirwrite.c in the tiffset tool.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8127/">CVE-2014-8127 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8127">CVE-2014-8127 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1206220">SUSE bug 1206220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914890">SUSE bug 914890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916925">SUSE bug 916925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942690">SUSE bug 942690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969783">SUSE bug 969783</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822206" comment="libtiff-4.0.3-25.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822207" comment="libtiff-devel-4.0.3-25.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822208" comment="libtiff-static-4.0.3-25.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822209" comment="libtiff-tools-4.0.3-25.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148129" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8129</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8129" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8129" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8129" ref_url="https://www.suse.com/security/cve/CVE-2014-8129" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1420-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001561.html" source="SUSE-SU"/>
    <description>
    LibTIFF 4.0.3 allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via a crafted TIFF image, as demonstrated by failure of tif_next.c to verify that the BitsPerSample value is 2, and the t2p_sample_lab_signed_to_unsigned function in tiff2pdf.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8129/">CVE-2014-8129 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8129">CVE-2014-8129 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1206220">SUSE bug 1206220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914890">SUSE bug 914890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916925">SUSE bug 916925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942690">SUSE bug 942690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969783">SUSE bug 969783</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822206" comment="libtiff-4.0.3-25.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822207" comment="libtiff-devel-4.0.3-25.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822208" comment="libtiff-static-4.0.3-25.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822209" comment="libtiff-tools-4.0.3-25.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148130" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8130</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8130" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8130" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8130" ref_url="https://www.suse.com/security/cve/CVE-2014-8130" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1420-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001561.html" source="SUSE-SU"/>
    <description>
    The _TIFFmalloc function in tif_unix.c in LibTIFF 4.0.3 does not reject a zero size, which allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted TIFF image that is mishandled by the TIFFWriteScanline function in tif_write.c, as demonstrated by tiffdither.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8130/">CVE-2014-8130 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8130">CVE-2014-8130 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1206220">SUSE bug 1206220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914890">SUSE bug 914890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916925">SUSE bug 916925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942690">SUSE bug 942690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969783">SUSE bug 969783</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822206" comment="libtiff-4.0.3-25.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822207" comment="libtiff-devel-4.0.3-25.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822208" comment="libtiff-static-4.0.3-25.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822209" comment="libtiff-tools-4.0.3-25.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148136" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8136</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8136" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8136" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8136" ref_url="https://www.suse.com/security/cve/CVE-2014-8136" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001213.html" source="SUSE-SU"/>
    <description>
    The (1) qemuDomainMigratePerform and (2) qemuDomainMigrateFinish2 functions in qemu/qemu_driver.c in libvirt do not unlock the domain when an ACL check fails, which allow local users to cause a denial of service via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8136/">CVE-2014-8136 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8136">CVE-2014-8136 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/910862">SUSE bug 910862</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820826" comment="libvirt-1.2.8-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820827" comment="libvirt-client-1.2.8-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820828" comment="libvirt-daemon-1.2.8-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820829" comment="libvirt-daemon-config-network-1.2.8-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820830" comment="libvirt-daemon-config-nwfilter-1.2.8-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820831" comment="libvirt-daemon-driver-interface-1.2.8-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820832" comment="libvirt-daemon-driver-lxc-1.2.8-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820833" comment="libvirt-daemon-driver-network-1.2.8-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820834" comment="libvirt-daemon-driver-nodedev-1.2.8-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820835" comment="libvirt-daemon-driver-nwfilter-1.2.8-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820836" comment="libvirt-daemon-driver-qemu-1.2.8-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820837" comment="libvirt-daemon-driver-secret-1.2.8-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820838" comment="libvirt-daemon-driver-storage-1.2.8-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820839" comment="libvirt-daemon-kvm-1.2.8-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820840" comment="libvirt-daemon-lxc-1.2.8-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820841" comment="libvirt-devel-1.2.8-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820842" comment="libvirt-docs-1.2.8-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820843" comment="libvirt-lock-sanlock-1.2.8-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820844" comment="libvirt-login-shell-1.2.8-16.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148137" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8137</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8137" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8137" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8137" ref_url="https://www.suse.com/security/cve/CVE-2014-8137" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0016-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001216.html" source="SUSE-SU"/>
    <description>
    Double free vulnerability in the jas_iccattrval_destroy function in JasPer 1.900.1 and earlier allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted ICC color profile in a JPEG 2000 image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8137/">CVE-2014-8137 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8137">CVE-2014-8137 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909474">SUSE bug 909474</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909475">SUSE bug 909475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911837">SUSE bug 911837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968373">SUSE bug 968373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969776">SUSE bug 969776</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820684" comment="jasper-1.900.1-26.el7_0.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820685" comment="jasper-devel-1.900.1-26.el7_0.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820686" comment="jasper-libs-1.900.1-26.el7_0.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820687" comment="jasper-utils-1.900.1-26.el7_0.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148138" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8138</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8138" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8138" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8138" ref_url="https://www.suse.com/security/cve/CVE-2014-8138" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001216.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the jp2_decode function in JasPer 1.900.1 and earlier allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted JPEG 2000 file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8138/">CVE-2014-8138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8138">CVE-2014-8138 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909474">SUSE bug 909474</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909475">SUSE bug 909475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911837">SUSE bug 911837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969776">SUSE bug 969776</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820684" comment="jasper-1.900.1-26.el7_0.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820685" comment="jasper-devel-1.900.1-26.el7_0.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820686" comment="jasper-libs-1.900.1-26.el7_0.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820687" comment="jasper-utils-1.900.1-26.el7_0.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8139</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8139" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8139" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8139" ref_url="https://www.suse.com/security/cve/CVE-2014-8139" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001255.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the CRC32 verification in Info-ZIP UnZip 6.0 and earlier allows remote attackers to execute arbitrary code via a crafted zip file in the -t command argument to the unzip command.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8139/">CVE-2014-8139 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8139">CVE-2014-8139 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/909214">SUSE bug 909214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915880">SUSE bug 915880</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820917" comment="unzip-6.0-15.el7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148140" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8140</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8140" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8140" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8140" ref_url="https://www.suse.com/security/cve/CVE-2014-8140" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001161.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the test_compr_eb function in Info-ZIP UnZip 6.0 and earlier allows remote attackers to execute arbitrary code via a crafted zip file in the -t command argument to the unzip command.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8140/">CVE-2014-8140 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8140">CVE-2014-8140 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/909214">SUSE bug 909214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914442">SUSE bug 914442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915880">SUSE bug 915880</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820917" comment="unzip-6.0-15.el7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148141" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8141</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8141" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8141" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8141" ref_url="https://www.suse.com/security/cve/CVE-2014-8141" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001161.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the getZip64Data function in Info-ZIP UnZip 6.0 and earlier allows remote attackers to execute arbitrary code via a crafted zip file in the -t command argument to the unzip command.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8141/">CVE-2014-8141 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8141">CVE-2014-8141 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/909214">SUSE bug 909214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915880">SUSE bug 915880</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820917" comment="unzip-6.0-15.el7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148142" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8142</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8142" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8142" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8142" ref_url="https://www.suse.com/security/cve/CVE-2014-8142" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0365-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1638-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002131.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the process_nested_data function in ext/standard/var_unserializer.re in PHP before 5.4.36, 5.5.x before 5.5.20, and 5.6.x before 5.6.4 allows remote attackers to execute arbitrary code via a crafted unserialize call that leverages improper handling of duplicate keys within the serialized properties of an object, a different vulnerability than CVE-2004-1019.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-28"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8142/">CVE-2014-8142 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8142">CVE-2014-8142 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/910659">SUSE bug 910659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821089" comment="php-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821090" comment="php-bcmath-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821091" comment="php-cli-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821092" comment="php-common-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821093" comment="php-dba-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821094" comment="php-devel-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821095" comment="php-embedded-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821096" comment="php-enchant-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821097" comment="php-fpm-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821098" comment="php-gd-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821099" comment="php-intl-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821100" comment="php-ldap-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821101" comment="php-mbstring-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821102" comment="php-mysql-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821103" comment="php-mysqlnd-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821104" comment="php-odbc-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821105" comment="php-pdo-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821106" comment="php-pgsql-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821107" comment="php-process-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821108" comment="php-pspell-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821109" comment="php-recode-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821110" comment="php-snmp-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821111" comment="php-soap-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821112" comment="php-xml-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821113" comment="php-xmlrpc-5.4.16-36.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148150" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8150</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8150" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8150" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8150" ref_url="https://www.suse.com/security/cve/CVE-2014-8150" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001199.html" source="SUSE-SU"/>
    <description>
    CRLF injection vulnerability in libcurl 6.0 through 7.x before 7.40.0, when using an HTTP proxy, allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via CRLF sequences in a URL.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8150/">CVE-2014-8150 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8150">CVE-2014-8150 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/911363">SUSE bug 911363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821436" comment="curl-7.29.0-25.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821437" comment="libcurl-7.29.0-25.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821438" comment="libcurl-devel-7.29.0-25.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148157" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8157</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8157" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8157" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8157" ref_url="https://www.suse.com/security/cve/CVE-2014-8157" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001223.html" source="SUSE-SU"/>
    <description>
    Off-by-one error in the jpc_dec_process_sot function in JasPer 1.900.1 and earlier allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted JPEG 2000 image, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8157/">CVE-2014-8157 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8157">CVE-2014-8157 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911837">SUSE bug 911837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969776">SUSE bug 969776</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820735" comment="jasper-1.900.1-26.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820736" comment="jasper-devel-1.900.1-26.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820737" comment="jasper-libs-1.900.1-26.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820738" comment="jasper-utils-1.900.1-26.el7_0.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148158" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8158</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8158" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8158" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8158" ref_url="https://www.suse.com/security/cve/CVE-2014-8158" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002398.html" source="SUSE-SU"/>
    <description>
    Multiple stack-based buffer overflows in jpc_qmfb.c in JasPer 1.900.1 and earlier allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted JPEG 2000 image.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8158/">CVE-2014-8158 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8158">CVE-2014-8158 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911837">SUSE bug 911837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969776">SUSE bug 969776</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820735" comment="jasper-1.900.1-26.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820736" comment="jasper-devel-1.900.1-26.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820737" comment="jasper-libs-1.900.1-26.el7_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820738" comment="jasper-utils-1.900.1-26.el7_0.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148159" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8159</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8159" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8159" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8159" ref_url="https://www.suse.com/security/cve/CVE-2014-8159" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1488-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001574.html" source="SUSE-SU"/>
    <description>
    The InfiniBand (IB) implementation in the Linux kernel package before 2.6.32-504.12.2 on Red Hat Enterprise Linux (RHEL) 6 does not properly restrict use of User Verbs for registration of memory regions, which allows local users to access arbitrary physical memory locations, and consequently cause a denial of service (system crash) or gain privileges, by leveraging permissions on a uverbs device under /dev/infiniband/.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8159/">CVE-2014-8159 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8159">CVE-2014-8159 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/903967">SUSE bug 903967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914742">SUSE bug 914742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939241">SUSE bug 939241</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820924" comment="kernel-3.10.0-229.1.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820925" comment="kernel-abi-whitelists-3.10.0-229.1.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820926" comment="kernel-debug-3.10.0-229.1.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820929" comment="kernel-doc-3.10.0-229.1.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820930" comment="kernel-headers-3.10.0-229.1.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820931" comment="kernel-tools-3.10.0-229.1.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820932" comment="kernel-tools-libs-3.10.0-229.1.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820934" comment="perf-3.10.0-229.1.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820935" comment="python-perf-3.10.0-229.1.2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148160" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8160</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8160" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8160" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8160" ref_url="https://www.suse.com/security/cve/CVE-2014-8160" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001352.html" source="SUSE-SU"/>
		<reference ref_id="TID7016668" ref_url="https://www.suse.com/support/kb/doc?id=7016668" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0713-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NWCJPZ26DJQKJAYBVBW2J4THDLRJKACI/#NWCJPZ26DJQKJAYBVBW2J4THDLRJKACI" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0714-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TGDFE2ZE62NVTCXF3ICQYCJ3S7RQZBVD/#TGDFE2ZE62NVTCXF3ICQYCJ3S7RQZBVD" source="SUSE-SU"/>
    <description>
    net/netfilter/nf_conntrack_proto_generic.c in the Linux kernel before 3.18 generates incorrect conntrack entries during handling of certain iptables rule sets for the SCTP, DCCP, GRE, and UDP-Lite protocols, which allows remote attackers to bypass intended access restrictions via packets with disallowed port numbers.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" cvss4="7/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:N" href="https://www.suse.com/security/cve/CVE-2014-8160/">CVE-2014-8160 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8160">CVE-2014-8160 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/857643">SUSE bug 857643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913059">SUSE bug 913059</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820807" comment="kernel-3.10.0-229.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820808" comment="kernel-abi-whitelists-3.10.0-229.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820809" comment="kernel-debug-3.10.0-229.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820812" comment="kernel-doc-3.10.0-229.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820813" comment="kernel-headers-3.10.0-229.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820814" comment="kernel-tools-3.10.0-229.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820815" comment="kernel-tools-libs-3.10.0-229.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820817" comment="perf-3.10.0-229.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820818" comment="python-perf-3.10.0-229.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148161" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8161</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8161" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8161" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8161" ref_url="https://www.suse.com/security/cve/CVE-2014-8161" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001321.html" source="SUSE-SU"/>
    <description>
    PostgreSQL before 9.0.19, 9.1.x before 9.1.15, 9.2.x before 9.2.10, 9.3.x before 9.3.6, and 9.4.x before 9.4.1 allows remote authenticated users to obtain sensitive column values by triggering constraint violation and then reading the error message.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8161/">CVE-2014-8161 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8161">CVE-2014-8161 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/916953">SUSE bug 916953</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820948" comment="postgresql-9.2.10-2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820949" comment="postgresql-contrib-9.2.10-2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820950" comment="postgresql-devel-9.2.10-2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820951" comment="postgresql-docs-9.2.10-2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820952" comment="postgresql-libs-9.2.10-2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820953" comment="postgresql-plperl-9.2.10-2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820954" comment="postgresql-plpython-9.2.10-2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820955" comment="postgresql-pltcl-9.2.10-2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820956" comment="postgresql-server-9.2.10-2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820957" comment="postgresql-test-9.2.10-2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820958" comment="postgresql-upgrade-9.2.10-2.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148169" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8169</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8169" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8169" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8169" ref_url="https://www.suse.com/security/cve/CVE-2014-8169" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001428.html" source="SUSE-SU"/>
    <description>
    automount 5.0.8, when a program map uses certain interpreted languages, uses the calling user's USER and HOME environment variable values instead of the values for the user used to run the mapped program, which allows local users to gain privileges via a Trojan horse program in the user home directory.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8169/">CVE-2014-8169 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8169">CVE-2014-8169 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/917977">SUSE bug 917977</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821563" comment="autofs-5.0.7-54.el7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148171" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8171</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8171" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8171" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8171" ref_url="https://www.suse.com/security/cve/CVE-2014-8171" source="SUSE CVE"/>
    <description>
    The memory resource controller (aka memcg) in the Linux kernel allows local users to cause a denial of service (deadlock) by spawning new processes within a memory-constrained cgroup.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8171/">CVE-2014-8171 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8171">CVE-2014-8171 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/928128">SUSE bug 928128</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821413" comment="kernel-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821414" comment="kernel-abi-whitelists-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821415" comment="kernel-debug-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821418" comment="kernel-doc-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821419" comment="kernel-headers-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821420" comment="kernel-tools-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821421" comment="kernel-tools-libs-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821423" comment="perf-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821424" comment="python-perf-3.10.0-327.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148172" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8172</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8172" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8172" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8172" ref_url="https://www.suse.com/security/cve/CVE-2014-8172" source="SUSE CVE"/>
    <description>
    The filesystem implementation in the Linux kernel before 3.13 performs certain operations on lists of files with an inappropriate locking approach, which allows local users to cause a denial of service (soft lockup or system crash) via unspecified use of Asynchronous I/O (AIO) operations.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8172/">CVE-2014-8172 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8172">CVE-2014-8172 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/920632">SUSE bug 920632</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820807" comment="kernel-3.10.0-229.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820808" comment="kernel-abi-whitelists-3.10.0-229.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820809" comment="kernel-debug-3.10.0-229.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820812" comment="kernel-doc-3.10.0-229.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820813" comment="kernel-headers-3.10.0-229.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820814" comment="kernel-tools-3.10.0-229.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820815" comment="kernel-tools-libs-3.10.0-229.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820817" comment="perf-3.10.0-229.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820818" comment="python-perf-3.10.0-229.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148173" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8173</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8173" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8173" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8173" ref_url="https://www.suse.com/security/cve/CVE-2014-8173" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2015:0714-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TGDFE2ZE62NVTCXF3ICQYCJ3S7RQZBVD/#TGDFE2ZE62NVTCXF3ICQYCJ3S7RQZBVD" source="SUSE-SU"/>
    <description>
    The pmd_none_or_trans_huge_or_clear_bad function in include/asm-generic/pgtable.h in the Linux kernel before 3.13 on NUMA systems does not properly determine whether a Page Middle Directory (PMD) entry is a transparent huge-table entry, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted MADV_WILLNEED madvise system call that leverages the absence of a page-table lock.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8173/">CVE-2014-8173 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8173">CVE-2014-8173 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/920583">SUSE bug 920583</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820807" comment="kernel-3.10.0-229.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820808" comment="kernel-abi-whitelists-3.10.0-229.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820809" comment="kernel-debug-3.10.0-229.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820812" comment="kernel-doc-3.10.0-229.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820813" comment="kernel-headers-3.10.0-229.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820814" comment="kernel-tools-3.10.0-229.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820815" comment="kernel-tools-libs-3.10.0-229.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820817" comment="perf-3.10.0-229.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820818" comment="python-perf-3.10.0-229.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148176" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8176</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8176" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8176" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8176" ref_url="https://www.suse.com/security/cve/CVE-2014-8176" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001478.html" source="SUSE-SU"/>
		<reference ref_id="TID7016539" ref_url="https://www.suse.com/support/kb/doc/?id=7016539" source="SUSE-SU"/>
		<reference ref_id="TID7016602" ref_url="https://www.suse.com/support/kb/doc/?id=7016602" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1277-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XQAZGF7SIGXMQQGI6UJF7VBAOBYMY5WF/#XQAZGF7SIGXMQQGI6UJF7VBAOBYMY5WF" source="SUSE-SU"/>
    <description>
    The dtls1_clear_queues function in ssl/d1_lib.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h frees data structures without considering that application data can arrive between a ChangeCipherSpec message and a Finished message, which allows remote DTLS peers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via unexpected application data.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8176/">CVE-2014-8176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8176">CVE-2014-8176 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1148697">SUSE bug 1148697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934494">SUSE bug 934494</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934666">SUSE bug 934666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986238">SUSE bug 986238</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821077" comment="openssl-1.0.1e-42.el7_1.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821078" comment="openssl-devel-1.0.1e-42.el7_1.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821079" comment="openssl-libs-1.0.1e-42.el7_1.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821080" comment="openssl-perl-1.0.1e-42.el7_1.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821081" comment="openssl-static-1.0.1e-42.el7_1.8 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148184" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8184</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8184" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8184" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8184" ref_url="https://www.suse.com/security/cve/CVE-2014-8184" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003411.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in liblouis, versions 2.5.x before 2.5.4. A stack-based buffer overflow was found in findTable() in liblouis. An attacker could create a malicious file that would cause applications that use liblouis (such as Orca) to crash, or potentially execute arbitrary code when opened.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2014-8184/">CVE-2014-8184 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8184">CVE-2014-8184 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1056088">SUSE bug 1056088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056090">SUSE bug 1056090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056093">SUSE bug 1056093</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056095">SUSE bug 1056095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056105">SUSE bug 1056105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062458">SUSE bug 1062458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1067336">SUSE bug 1067336</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823722" comment="liblouis-2.5.2-11.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823723" comment="liblouis-devel-2.5.2-11.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823724" comment="liblouis-doc-2.5.2-11.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823725" comment="liblouis-python-2.5.2-11.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823726" comment="liblouis-utils-2.5.2-11.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148240" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8240</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8240" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8240" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8240" ref_url="https://www.suse.com/security/cve/CVE-2014-8240" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1592-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001100.html" source="SUSE-SU"/>
    <description>
    Integer overflow in TigerVNC allows remote VNC servers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to screen size handling, which triggers a heap-based buffer overflow, a similar issue to CVE-2014-6051.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8240/">CVE-2014-8240 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8240">CVE-2014-8240 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/900896">SUSE bug 900896</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821464" comment="tigervnc-1.3.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821465" comment="tigervnc-icons-1.3.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821466" comment="tigervnc-license-1.3.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821467" comment="tigervnc-server-1.3.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821468" comment="tigervnc-server-applet-1.3.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821469" comment="tigervnc-server-minimal-1.3.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821470" comment="tigervnc-server-module-1.3.1-3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148241" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8241</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8241" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8241" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8241" ref_url="https://www.suse.com/security/cve/CVE-2014-8241" source="SUSE CVE"/>
    <description>
    XRegion in TigerVNC allows remote VNC servers to cause a denial of service (NULL pointer dereference) by leveraging failure to check a malloc return value, a similar issue to CVE-2014-6052.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-04-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8241/">CVE-2014-8241 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8241">CVE-2014-8241 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/900898">SUSE bug 900898</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821464" comment="tigervnc-1.3.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821465" comment="tigervnc-icons-1.3.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821466" comment="tigervnc-license-1.3.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821467" comment="tigervnc-server-1.3.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821468" comment="tigervnc-server-applet-1.3.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821469" comment="tigervnc-server-minimal-1.3.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821470" comment="tigervnc-server-module-1.3.1-3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148275" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8275</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8275" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8275" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8275" ref_url="https://www.suse.com/security/cve/CVE-2014-8275" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0172-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001410.html" source="SUSE-SU"/>
		<reference ref_id="TID7021823" ref_url="https://www.suse.com/support/kb/doc/?id=7021823" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0130-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5NKKL36OVJL3XH5PE2LUB3THMPTHPONL/#5NKKL36OVJL3XH5PE2LUB3THMPTHPONL" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1277-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XQAZGF7SIGXMQQGI6UJF7VBAOBYMY5WF/#XQAZGF7SIGXMQQGI6UJF7VBAOBYMY5WF" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C5ZZO44NS35G5NQFFXUERK5DXLTQN534/#C5ZZO44NS35G5NQFFXUERK5DXLTQN534" source="SUSE-SU"/>
    <description>
    OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k does not enforce certain constraints on certificate data, which allows remote attackers to defeat a fingerprint-based certificate-blacklist protection mechanism by including crafted data within a certificate's unsigned portion, related to crypto/asn1/a_verify.c, crypto/dsa/dsa_asn1.c, crypto/ecdsa/ecs_vrf.c, and crypto/x509/x_all.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8275/">CVE-2014-8275 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8275">CVE-2014-8275 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/912018">SUSE bug 912018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915848">SUSE bug 915848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927623">SUSE bug 927623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937891">SUSE bug 937891</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820723" comment="openssl-1.0.1e-34.el7_0.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820724" comment="openssl-devel-1.0.1e-34.el7_0.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820725" comment="openssl-libs-1.0.1e-34.el7_0.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820726" comment="openssl-perl-1.0.1e-34.el7_0.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820727" comment="openssl-static-1.0.1e-34.el7_0.7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8484</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8484" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8484" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8484" ref_url="https://www.suse.com/security/cve/CVE-2014-8484" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001192.html" source="SUSE-SU"/>
    <description>
    The srec_scan function in bfd/srec.c in libdbfd in GNU binutils before 2.25 allows remote attackers to cause a denial of service (out-of-bounds read) via a small S-record.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8484/">CVE-2014-8484 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8484">CVE-2014-8484 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/902676">SUSE bug 902676</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902677">SUSE bug 902677</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821378" comment="binutils-2.23.52.0.1-55.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821379" comment="binutils-devel-2.23.52.0.1-55.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148485" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8485</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8485" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8485" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8485" ref_url="https://www.suse.com/security/cve/CVE-2014-8485" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001192.html" source="SUSE-SU"/>
    <description>
    The setup_group function in bfd/elf.c in libbfd in GNU binutils 2.24 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted section group headers in an ELF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8485/">CVE-2014-8485 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8485">CVE-2014-8485 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/902676">SUSE bug 902676</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821378" comment="binutils-2.23.52.0.1-55.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821379" comment="binutils-devel-2.23.52.0.1-55.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148500" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8500</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8500" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8500" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8500" ref_url="https://www.suse.com/security/cve/CVE-2014-8500" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0011-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001228.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0488-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001284.html" source="SUSE-SU"/>
    <description>
    ISC BIND 9.0.x through 9.8.x, 9.9.0 through 9.9.6, and 9.10.0 through 9.10.1 does not limit delegation chaining, which allows remote attackers to cause a denial of service (memory consumption and named crash) via a large or infinite number of referrals.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8500/">CVE-2014-8500 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8500">CVE-2014-8500 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/908994">SUSE bug 908994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986950">SUSE bug 986950</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820661" comment="bind-9.9.4-14.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820662" comment="bind-chroot-9.9.4-14.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820663" comment="bind-devel-9.9.4-14.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820664" comment="bind-libs-9.9.4-14.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820665" comment="bind-libs-lite-9.9.4-14.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820666" comment="bind-license-9.9.4-14.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820667" comment="bind-lite-devel-9.9.4-14.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820668" comment="bind-sdb-9.9.4-14.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820669" comment="bind-sdb-chroot-9.9.4-14.el7_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820670" comment="bind-utils-9.9.4-14.el7_0.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148501" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8501</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8501" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8501" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8501" ref_url="https://www.suse.com/security/cve/CVE-2014-8501" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001192.html" source="SUSE-SU"/>
    <description>
    The _bfd_XXi_swap_aouthdr_in function in bfd/peXXigen.c in GNU binutils 2.24 and earlier allows remote attackers to cause a denial of service (out-of-bounds write) and possibly have other unspecified impact via a crafted NumberOfRvaAndSizes field in the AOUT header in a PE executable.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-07"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8501/">CVE-2014-8501 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8501">CVE-2014-8501 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/903655">SUSE bug 903655</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821378" comment="binutils-2.23.52.0.1-55.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821379" comment="binutils-devel-2.23.52.0.1-55.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148502" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8502</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8502" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8502" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8502" ref_url="https://www.suse.com/security/cve/CVE-2014-8502" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001192.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the pe_print_edata function in bfd/peXXigen.c in GNU binutils 2.24 and earlier allows remote attackers to cause a denial of service (crash) and possibly have other unspecified impact via a truncated export table in a PE file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-09"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8502/">CVE-2014-8502 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8502">CVE-2014-8502 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/903655">SUSE bug 903655</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821378" comment="binutils-2.23.52.0.1-55.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821379" comment="binutils-devel-2.23.52.0.1-55.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148503" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8503</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8503" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8503" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8503" ref_url="https://www.suse.com/security/cve/CVE-2014-8503" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001192.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the ihex_scan function in bfd/ihex.c in GNU binutils 2.24 and earlier allows remote attackers to cause a denial of service (crash) and possibly have other unspecified impact via a crafted ihex file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8503/">CVE-2014-8503 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8503">CVE-2014-8503 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/903655">SUSE bug 903655</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821378" comment="binutils-2.23.52.0.1-55.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821379" comment="binutils-devel-2.23.52.0.1-55.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148504" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8504</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8504" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8504" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8504" ref_url="https://www.suse.com/security/cve/CVE-2014-8504" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001192.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the srec_scan function in bfd/srec.c in GNU binutils 2.24 and earlier allows remote attackers to cause a denial of service (crash) and possibly have other unspecified impact via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8504/">CVE-2014-8504 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8504">CVE-2014-8504 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/903655">SUSE bug 903655</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821378" comment="binutils-2.23.52.0.1-55.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821379" comment="binutils-devel-2.23.52.0.1-55.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148559" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8559</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8559" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8559" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8559" ref_url="https://www.suse.com/security/cve/CVE-2014-8559" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001198.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/45VR2J6DOCMZ7DOFZ5B4QZ5CLCL3DYNQ/#45VR2J6DOCMZ7DOFZ5B4QZ5CLCL3DYNQ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0713-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NWCJPZ26DJQKJAYBVBW2J4THDLRJKACI/#NWCJPZ26DJQKJAYBVBW2J4THDLRJKACI" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0714-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TGDFE2ZE62NVTCXF3ICQYCJ3S7RQZBVD/#TGDFE2ZE62NVTCXF3ICQYCJ3S7RQZBVD" source="SUSE-SU"/>
    <description>
    The d_walk function in fs/dcache.c in the Linux kernel through 3.17.2 does not properly maintain the semantics of rename_lock, which allows local users to cause a denial of service (deadlock and system hang) via a crafted application.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8559/">CVE-2014-8559 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8559">CVE-2014-8559 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/903640">SUSE bug 903640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915517">SUSE bug 915517</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821344" comment="kernel-3.10.0-229.20.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821345" comment="kernel-abi-whitelists-3.10.0-229.20.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821346" comment="kernel-debug-3.10.0-229.20.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821349" comment="kernel-doc-3.10.0-229.20.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821350" comment="kernel-headers-3.10.0-229.20.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821351" comment="kernel-tools-3.10.0-229.20.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821352" comment="kernel-tools-libs-3.10.0-229.20.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821354" comment="perf-3.10.0-229.20.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821355" comment="python-perf-3.10.0-229.20.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148564" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8564</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8564" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8564" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8564" ref_url="https://www.suse.com/security/cve/CVE-2014-8564" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001110.html" source="SUSE-SU"/>
    <description>
    The _gnutls_ecc_ansi_x963_export function in gnutls_ecc.c in GnuTLS 3.x before 3.1.28, 3.2.x before 3.2.20, and 3.3.x before 3.3.10 allows remote attackers to cause a denial of service (out-of-bounds write) via a crafted (1) Elliptic Curve Cryptography (ECC) certificate or (2) certificate signing requests (CSR), related to generating key IDs.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8564/">CVE-2014-8564 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8564">CVE-2014-8564 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/904603">SUSE bug 904603</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820589" comment="gnutls-3.1.18-10.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820590" comment="gnutls-c++-3.1.18-10.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820591" comment="gnutls-dane-3.1.18-10.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820592" comment="gnutls-devel-3.1.18-10.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820593" comment="gnutls-utils-3.1.18-10.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148602" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8602</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8602" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8602" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8602" ref_url="https://www.suse.com/security/cve/CVE-2014-8602" source="SUSE CVE"/>
    <description>
    iterator.c in NLnet Labs Unbound before 1.5.1 does not limit delegation chaining, which allows remote attackers to cause a denial of service (memory and CPU consumption) via a large or infinite number of referrals.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8602/">CVE-2014-8602 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8602">CVE-2014-8602 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/908990">SUSE bug 908990</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821564" comment="unbound-1.4.20-26.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821565" comment="unbound-devel-1.4.20-26.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821566" comment="unbound-libs-1.4.20-26.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821567" comment="unbound-python-1.4.20-26.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148634" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8634</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8634" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8634" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8634" ref_url="https://www.suse.com/security/cve/CVE-2014-8634" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001200.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0077-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XJTBO5UPGPRWAYKHBRDXR66B4EQLFSRA/#XJTBO5UPGPRWAYKHBRDXR66B4EQLFSRA" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0077-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GC5JHQPJI5YIT5OWIFLGB4BN6PPJPWGP/#GC5JHQPJI5YIT5OWIFLGB4BN6PPJPWGP" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0192-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TRYH6VCNUNNAKGN5C2WIHMXYJXR4UVS7/#TRYH6VCNUNNAKGN5C2WIHMXYJXR4UVS7" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VNGKNJGYZV377DMZMDSGTC6LXFPDDSY/#5VNGKNJGYZV377DMZMDSGTC6LXFPDDSY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 35.0, Firefox ESR 31.x before 31.4, Thunderbird before 31.4, and SeaMonkey before 2.32 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-11-20"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8634/">CVE-2014-8634 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8634">CVE-2014-8634 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/910669">SUSE bug 910669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913064">SUSE bug 913064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913096">SUSE bug 913096</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820720" comment="firefox-31.4.0-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820721" comment="xulrunner-31.4.0-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820722" comment="xulrunner-devel-31.4.0-1.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148638" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8638</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8638" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8638" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8638" ref_url="https://www.suse.com/security/cve/CVE-2014-8638" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001200.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0077-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XJTBO5UPGPRWAYKHBRDXR66B4EQLFSRA/#XJTBO5UPGPRWAYKHBRDXR66B4EQLFSRA" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0077-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GC5JHQPJI5YIT5OWIFLGB4BN6PPJPWGP/#GC5JHQPJI5YIT5OWIFLGB4BN6PPJPWGP" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0192-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TRYH6VCNUNNAKGN5C2WIHMXYJXR4UVS7/#TRYH6VCNUNNAKGN5C2WIHMXYJXR4UVS7" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VNGKNJGYZV377DMZMDSGTC6LXFPDDSY/#5VNGKNJGYZV377DMZMDSGTC6LXFPDDSY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    The navigator.sendBeacon implementation in Mozilla Firefox before 35.0, Firefox ESR 31.x before 31.4, Thunderbird before 31.4, and SeaMonkey before 2.32 omits the CORS Origin header, which allows remote attackers to bypass intended CORS access-control checks and conduct cross-site request forgery (CSRF) attacks via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-11-20"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8638/">CVE-2014-8638 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8638">CVE-2014-8638 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/910669">SUSE bug 910669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913068">SUSE bug 913068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913096">SUSE bug 913096</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820720" comment="firefox-31.4.0-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820721" comment="xulrunner-31.4.0-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820722" comment="xulrunner-devel-31.4.0-1.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148639" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8639</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8639" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8639" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8639" ref_url="https://www.suse.com/security/cve/CVE-2014-8639" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001200.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0077-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XJTBO5UPGPRWAYKHBRDXR66B4EQLFSRA/#XJTBO5UPGPRWAYKHBRDXR66B4EQLFSRA" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0077-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GC5JHQPJI5YIT5OWIFLGB4BN6PPJPWGP/#GC5JHQPJI5YIT5OWIFLGB4BN6PPJPWGP" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0192-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TRYH6VCNUNNAKGN5C2WIHMXYJXR4UVS7/#TRYH6VCNUNNAKGN5C2WIHMXYJXR4UVS7" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VNGKNJGYZV377DMZMDSGTC6LXFPDDSY/#5VNGKNJGYZV377DMZMDSGTC6LXFPDDSY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 35.0, Firefox ESR 31.x before 31.4, Thunderbird before 31.4, and SeaMonkey before 2.32 do not properly interpret Set-Cookie headers within responses that have a 407 (aka Proxy Authentication Required) status code, which allows remote HTTP proxy servers to conduct session fixation attacks by providing a cookie name that corresponds to the session cookie of the origin server.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-11-20"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8639/">CVE-2014-8639 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8639">CVE-2014-8639 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/910669">SUSE bug 910669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913066">SUSE bug 913066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913096">SUSE bug 913096</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820720" comment="firefox-31.4.0-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820721" comment="xulrunner-31.4.0-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820722" comment="xulrunner-devel-31.4.0-1.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148641" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8641</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8641" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8641" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8641" ref_url="https://www.suse.com/security/cve/CVE-2014-8641" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001200.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0077-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XJTBO5UPGPRWAYKHBRDXR66B4EQLFSRA/#XJTBO5UPGPRWAYKHBRDXR66B4EQLFSRA" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0077-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GC5JHQPJI5YIT5OWIFLGB4BN6PPJPWGP/#GC5JHQPJI5YIT5OWIFLGB4BN6PPJPWGP" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0192-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TRYH6VCNUNNAKGN5C2WIHMXYJXR4UVS7/#TRYH6VCNUNNAKGN5C2WIHMXYJXR4UVS7" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the WebRTC implementation in Mozilla Firefox before 35.0, Firefox ESR 31.x before 31.4, and SeaMonkey before 2.32 allows remote attackers to execute arbitrary code via crafted track data.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-11-20"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8641/">CVE-2014-8641 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8641">CVE-2014-8641 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/910669">SUSE bug 910669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913067">SUSE bug 913067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913096">SUSE bug 913096</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820720" comment="firefox-31.4.0-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820721" comment="xulrunner-31.4.0-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820722" comment="xulrunner-devel-31.4.0-1.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148709" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8709</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8709" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8709" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8709" ref_url="https://www.suse.com/security/cve/CVE-2014-8709" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1693-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001322.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1669-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GDZOTMP2VOUC5CTGQ542UWQZWRTOES4X/#GDZOTMP2VOUC5CTGQ542UWQZWRTOES4X" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1677-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KMCOHP6GELYLJBOOYH4FHHAYS7Q36GJY/#KMCOHP6GELYLJBOOYH4FHHAYS7Q36GJY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/45VR2J6DOCMZ7DOFZ5B4QZ5CLCL3DYNQ/#45VR2J6DOCMZ7DOFZ5B4QZ5CLCL3DYNQ" source="SUSE-SU"/>
    <description>
    The ieee80211_fragment function in net/mac80211/tx.c in the Linux kernel before 3.13.5 does not properly maintain a certain tail pointer, which allows remote attackers to obtain sensitive cleartext information by reading packets.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8709/">CVE-2014-8709 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8709">CVE-2014-8709 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/904700">SUSE bug 904700</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820807" comment="kernel-3.10.0-229.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820808" comment="kernel-abi-whitelists-3.10.0-229.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820809" comment="kernel-debug-3.10.0-229.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820812" comment="kernel-doc-3.10.0-229.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820813" comment="kernel-headers-3.10.0-229.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820814" comment="kernel-tools-3.10.0-229.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820815" comment="kernel-tools-libs-3.10.0-229.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820817" comment="perf-3.10.0-229.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820818" comment="python-perf-3.10.0-229.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148710" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8710</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8710" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8710" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8710" ref_url="https://www.suse.com/security/cve/CVE-2014-8710" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001083.html" source="SUSE-SU"/>
    <description>
    The decompress_sigcomp_message function in epan/sigcomp-udvm.c in the SigComp UDVM dissector in Wireshark 1.10.x before 1.10.11 allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8710/">CVE-2014-8710 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8710">CVE-2014-8710 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/905246">SUSE bug 905246</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821556" comment="wireshark-1.10.14-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821557" comment="wireshark-devel-1.10.14-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821558" comment="wireshark-gnome-1.10.14-7.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148711" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8711</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8711" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8711" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8711" ref_url="https://www.suse.com/security/cve/CVE-2014-8711" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001083.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in epan/dissectors/packet-amqp.c in the AMQP dissector in Wireshark 1.10.x before 1.10.11 and 1.12.x before 1.12.2 allow remote attackers to cause a denial of service (application crash) via a crafted amqp_0_10 PDU in a packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8711/">CVE-2014-8711 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8711">CVE-2014-8711 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/905245">SUSE bug 905245</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821556" comment="wireshark-1.10.14-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821557" comment="wireshark-devel-1.10.14-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821558" comment="wireshark-gnome-1.10.14-7.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148712" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8712</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8712" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8712" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8712" ref_url="https://www.suse.com/security/cve/CVE-2014-8712" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001083.html" source="SUSE-SU"/>
    <description>
    The build_expert_data function in epan/dissectors/packet-ncp2222.inc in the NCP dissector in Wireshark 1.10.x before 1.10.11 and 1.12.x before 1.12.2 does not properly initialize a data structure, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8712/">CVE-2014-8712 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8712">CVE-2014-8712 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/905248">SUSE bug 905248</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821556" comment="wireshark-1.10.14-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821557" comment="wireshark-devel-1.10.14-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821558" comment="wireshark-gnome-1.10.14-7.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148713" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8713</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8713" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8713" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8713" ref_url="https://www.suse.com/security/cve/CVE-2014-8713" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001083.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the build_expert_data function in epan/dissectors/packet-ncp2222.inc in the NCP dissector in Wireshark 1.10.x before 1.10.11 and 1.12.x before 1.12.2 allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8713/">CVE-2014-8713 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8713">CVE-2014-8713 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/905248">SUSE bug 905248</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821556" comment="wireshark-1.10.14-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821557" comment="wireshark-devel-1.10.14-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821558" comment="wireshark-gnome-1.10.14-7.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148714" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8714</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8714" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8714" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8714" ref_url="https://www.suse.com/security/cve/CVE-2014-8714" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001083.html" source="SUSE-SU"/>
    <description>
    The dissect_write_structured_field function in epan/dissectors/packet-tn5250.c in the TN5250 dissector in Wireshark 1.10.x before 1.10.11 and 1.12.x before 1.12.2 allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8714/">CVE-2014-8714 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8714">CVE-2014-8714 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/905247">SUSE bug 905247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821556" comment="wireshark-1.10.14-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821557" comment="wireshark-devel-1.10.14-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821558" comment="wireshark-gnome-1.10.14-7.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148737" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8737</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8737" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8737" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8737" ref_url="https://www.suse.com/security/cve/CVE-2014-8737" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001192.html" source="SUSE-SU"/>
    <description>
    Multiple directory traversal vulnerabilities in GNU binutils 2.24 and earlier allow local users to delete arbitrary files via a .. (dot dot) or full path name in an archive to (1) strip or (2) objcopy or create arbitrary files via (3) a .. (dot dot) or full path name in an archive to ar.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8737/">CVE-2014-8737 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8737">CVE-2014-8737 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/905736">SUSE bug 905736</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912408">SUSE bug 912408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821378" comment="binutils-2.23.52.0.1-55.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821379" comment="binutils-devel-2.23.52.0.1-55.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148738" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8738</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8738" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8738" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8738" ref_url="https://www.suse.com/security/cve/CVE-2014-8738" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001192.html" source="SUSE-SU"/>
    <description>
    The _bfd_slurp_extended_name_table function in bfd/archive.c in GNU binutils 2.24 and earlier allows remote attackers to cause a denial of service (invalid write, segmentation fault, and crash) via a crafted extended name table in an archive.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8738/">CVE-2014-8738 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8738">CVE-2014-8738 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/905735">SUSE bug 905735</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821378" comment="binutils-2.23.52.0.1-55.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821379" comment="binutils-devel-2.23.52.0.1-55.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148884" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8884</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8884" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8884" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8884" ref_url="https://www.suse.com/security/cve/CVE-2014-8884" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1693-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001155.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1669-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GDZOTMP2VOUC5CTGQ542UWQZWRTOES4X/#GDZOTMP2VOUC5CTGQ542UWQZWRTOES4X" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the ttusbdecfe_dvbs_diseqc_send_master_cmd function in drivers/media/usb/ttusb-dec/ttusbdecfe.c in the Linux kernel before 3.17.4 allows local users to cause a denial of service (system crash) or possibly gain privileges via a large message length in an ioctl call.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8884/">CVE-2014-8884 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8884">CVE-2014-8884 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/904876">SUSE bug 904876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905522">SUSE bug 905522</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905739">SUSE bug 905739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905744">SUSE bug 905744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905748">SUSE bug 905748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905764">SUSE bug 905764</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820807" comment="kernel-3.10.0-229.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820808" comment="kernel-abi-whitelists-3.10.0-229.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820809" comment="kernel-debug-3.10.0-229.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820812" comment="kernel-doc-3.10.0-229.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820813" comment="kernel-headers-3.10.0-229.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820814" comment="kernel-tools-3.10.0-229.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820815" comment="kernel-tools-libs-3.10.0-229.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820817" comment="perf-3.10.0-229.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820818" comment="python-perf-3.10.0-229.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148962" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8962</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8962" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8962" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8962" ref_url="https://www.suse.com/security/cve/CVE-2014-8962" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001117.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in stream_decoder.c in libFLAC before 1.3.1 allows remote attackers to execute arbitrary code via a crafted .flac file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8962/">CVE-2014-8962 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8962">CVE-2014-8962 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/906831">SUSE bug 906831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907764">SUSE bug 907764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969774">SUSE bug 969774</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820962" comment="flac-1.3.0-5.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820963" comment="flac-devel-1.3.0-5.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820964" comment="flac-libs-1.3.0-5.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148964" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8964</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8964" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8964" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8964" ref_url="https://www.suse.com/security/cve/CVE-2014-8964" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1216-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KHOOMDUPEQLMQZN7JRZIBDKGHYJ2TBKQ/#KHOOMDUPEQLMQZN7JRZIBDKGHYJ2TBKQ" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in PCRE 8.36 and earlier allows remote attackers to cause a denial of service (crash) or have other unspecified impact via a crafted regular expression, related to an assertion that allows zero repeats.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8964/">CVE-2014-8964 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8964">CVE-2014-8964 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/906574">SUSE bug 906574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924960">SUSE bug 924960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933288">SUSE bug 933288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936408">SUSE bug 936408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958373">SUSE bug 958373</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820860" comment="pcre-8.32-14.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820861" comment="pcre-devel-8.32-14.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820862" comment="pcre-static-8.32-14.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820863" comment="pcre-tools-8.32-14.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149028" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9028</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9028" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9028" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9028" ref_url="https://www.suse.com/security/cve/CVE-2014-9028" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001117.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in stream_decoder.c in libFLAC before 1.3.1 allows remote attackers to execute arbitrary code via a crafted .flac file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9028/">CVE-2014-9028 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9028">CVE-2014-9028 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/907016">SUSE bug 907016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969774">SUSE bug 969774</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820962" comment="flac-1.3.0-5.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820963" comment="flac-devel-1.3.0-5.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820964" comment="flac-libs-1.3.0-5.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149029" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9029</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9029" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9029" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9029" ref_url="https://www.suse.com/security/cve/CVE-2014-9029" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0016-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001206.html" source="SUSE-SU"/>
    <description>
    Multiple off-by-one errors in the (1) jpc_dec_cp_setfromcox and (2) jpc_dec_cp_setfromrgn functions in jpc/jpc_dec.c in JasPer 1.900.1 and earlier allow remote attackers to execute arbitrary code via a crafted jp2 file, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9029/">CVE-2014-9029 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9029">CVE-2014-9029 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/906364">SUSE bug 906364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909474">SUSE bug 909474</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992991">SUSE bug 992991</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820684" comment="jasper-1.900.1-26.el7_0.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820685" comment="jasper-devel-1.900.1-26.el7_0.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820686" comment="jasper-libs-1.900.1-26.el7_0.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820687" comment="jasper-utils-1.900.1-26.el7_0.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149112" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9112</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9112" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9112" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9112" ref_url="https://www.suse.com/security/cve/CVE-2014-9112" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001118.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the process_copy_in function in GNU Cpio 2.11 allows remote attackers to cause a denial of service via a large block value in a cpio archive.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9112/">CVE-2014-9112 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9112">CVE-2014-9112 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/907456">SUSE bug 907456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913479">SUSE bug 913479</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821400" comment="cpio-2.11-24.el7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149130" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9130</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9130" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9130" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9130" ref_url="https://www.suse.com/security/cve/CVE-2014-9130" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2015:0611-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2015-March/002829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1699-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1699-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0013-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0925-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0953-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001412.html" source="SUSE-SU"/>
    <description>
    scanner.c in LibYAML 0.1.5 and 0.1.6, as used in the YAML-LibYAML (aka YAML-XS) module for Perl, allows context-dependent attackers to cause a denial of service (assertion failure and crash) via vectors involving line-wrapping.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9130/">CVE-2014-9130 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9130">CVE-2014-9130 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/907809">SUSE bug 907809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911782">SUSE bug 911782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/921588">SUSE bug 921588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820751" comment="libyaml-0.1.4-11.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820752" comment="libyaml-devel-0.1.4-11.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149273" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9273</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9273" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9273" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9273" ref_url="https://www.suse.com/security/cve/CVE-2014-9273" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001236.html" source="SUSE-SU"/>
    <description>
    lib/handle.c in Hivex before 1.3.11 allows local users to execute arbitrary code and gain privileges via a small hive files, which triggers an out-of-bounds read or write.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9273/">CVE-2014-9273 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9273">CVE-2014-9273 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/908614">SUSE bug 908614</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820819" comment="hivex-1.3.10-5.7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820820" comment="hivex-devel-1.3.10-5.7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820821" comment="ocaml-hivex-1.3.10-5.7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820822" comment="ocaml-hivex-devel-1.3.10-5.7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820823" comment="perl-hivex-1.3.10-5.7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820824" comment="python-hivex-1.3.10-5.7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820825" comment="ruby-hivex-1.3.10-5.7.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149278" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9278</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9278" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9278" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9278" ref_url="https://www.suse.com/security/cve/CVE-2014-9278" source="SUSE CVE"/>
    <description>
    The OpenSSH server, as used in Fedora and Red Hat Enterprise Linux 7 and when running in a Kerberos environment, allows remote authenticated users to log in as another user when they are listed in the .k5users file of that user, which might bypass intended authentication requirements that would force a local login.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9278/">CVE-2014-9278 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9278">CVE-2014-9278 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/908424">SUSE bug 908424</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820874" comment="openssh-6.6.1p1-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820875" comment="openssh-askpass-6.6.1p1-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820876" comment="openssh-clients-6.6.1p1-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820877" comment="openssh-keycat-6.6.1p1-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820878" comment="openssh-ldap-6.6.1p1-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820879" comment="openssh-server-6.6.1p1-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820880" comment="openssh-server-sysvinit-6.6.1p1-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820881" comment="pam_ssh_agent_auth-0.9.3-9.11.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149293" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9293</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9293" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9293" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9293" ref_url="https://www.suse.com/security/cve/CVE-2014-9293" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0259-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0259-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001237.html" source="SUSE-SU"/>
    <description>
    The config_auth function in ntpd in NTP before 4.2.7p11, when an auth key is not configured, improperly generates a key, which makes it easier for remote attackers to defeat cryptographic protection mechanisms via a brute-force attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9293/">CVE-2014-9293 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9293">CVE-2014-9293 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/910764">SUSE bug 910764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911053">SUSE bug 911053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911792">SUSE bug 911792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820695" comment="ntp-4.2.6p5-19.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820696" comment="ntp-doc-4.2.6p5-19.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820697" comment="ntp-perl-4.2.6p5-19.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820698" comment="ntpdate-4.2.6p5-19.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820699" comment="sntp-4.2.6p5-19.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149294" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9294</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9294" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9294" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9294" ref_url="https://www.suse.com/security/cve/CVE-2014-9294" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0259-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0259-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001237.html" source="SUSE-SU"/>
    <description>
    util/ntp-keygen.c in ntp-keygen in NTP before 4.2.7p230 uses a weak RNG seed, which makes it easier for remote attackers to defeat cryptographic protection mechanisms via a brute-force attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9294/">CVE-2014-9294 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9294">CVE-2014-9294 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/910764">SUSE bug 910764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911053">SUSE bug 911053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911792">SUSE bug 911792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820695" comment="ntp-4.2.6p5-19.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820696" comment="ntp-doc-4.2.6p5-19.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820697" comment="ntp-perl-4.2.6p5-19.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820698" comment="ntpdate-4.2.6p5-19.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820699" comment="sntp-4.2.6p5-19.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149295" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9295</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9295" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9295" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9295" ref_url="https://www.suse.com/security/cve/CVE-2014-9295" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1686-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1686-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001121.html" source="SUSE-SU"/>
		<reference ref_id="TID7010867" ref_url="https://www.suse.com/support/kb/doc/?id=7010867" source="SUSE-SU"/>
		<reference ref_id="TID7016020" ref_url="https://www.suse.com/support/kb/doc?id=7016020" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1670-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Z3CJ74QOTG6ZYFZGEQJ3URMLZV2MGDIB/#Z3CJ74QOTG6ZYFZGEQJ3URMLZV2MGDIB" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1680-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XSEFAFOY6EQWWDGJFALQRZFKCS25V7RT/#XSEFAFOY6EQWWDGJFALQRZFKCS25V7RT" source="SUSE-SU"/>
    <description>
    Multiple stack-based buffer overflows in ntpd in NTP before 4.2.8 allow remote attackers to execute arbitrary code via a crafted packet, related to (1) the crypto_recv function when the Autokey Authentication feature is used, (2) the ctl_putdata function, and (3) the configure function.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9295/">CVE-2014-9295 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9295">CVE-2014-9295 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/910764">SUSE bug 910764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911053">SUSE bug 911053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911792">SUSE bug 911792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916239">SUSE bug 916239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820695" comment="ntp-4.2.6p5-19.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820696" comment="ntp-doc-4.2.6p5-19.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820697" comment="ntp-perl-4.2.6p5-19.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820698" comment="ntpdate-4.2.6p5-19.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820699" comment="sntp-4.2.6p5-19.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149296" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9296</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9296" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9296" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9296" ref_url="https://www.suse.com/security/cve/CVE-2014-9296" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001121.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1670-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Z3CJ74QOTG6ZYFZGEQJ3URMLZV2MGDIB/#Z3CJ74QOTG6ZYFZGEQJ3URMLZV2MGDIB" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1680-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XSEFAFOY6EQWWDGJFALQRZFKCS25V7RT/#XSEFAFOY6EQWWDGJFALQRZFKCS25V7RT" source="SUSE-SU"/>
    <description>
    The receive function in ntp_proto.c in ntpd in NTP before 4.2.8 continues to execute after detecting a certain authentication error, which might allow remote attackers to trigger an unintended association change via crafted packets.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9296/">CVE-2014-9296 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9296">CVE-2014-9296 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/910764">SUSE bug 910764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911053">SUSE bug 911053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911792">SUSE bug 911792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992991">SUSE bug 992991</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820695" comment="ntp-4.2.6p5-19.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820696" comment="ntp-doc-4.2.6p5-19.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820697" comment="ntp-perl-4.2.6p5-19.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820698" comment="ntpdate-4.2.6p5-19.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820699" comment="sntp-4.2.6p5-19.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149297" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9297</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9297" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9297" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9297" ref_url="https://www.suse.com/security/cve/CVE-2014-9297" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0259-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0259-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001237.html" source="SUSE-SU"/>
    <description>
    DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2014-9750, CVE-2014-9751.  Reason: this ID was intended for one issue, but was associated with two issues.  Notes: All CVE users should consult CVE-2014-9750 and CVE-2014-9751 to identify the ID or IDs of interest. All references and descriptions in this candidate have been removed to prevent accidental usage
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-09"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9297/">CVE-2014-9297 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9297">CVE-2014-9297 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/911792">SUSE bug 911792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948963">SUSE bug 948963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821459" comment="ntp-4.2.6p5-22.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821460" comment="ntp-doc-4.2.6p5-22.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821461" comment="ntp-perl-4.2.6p5-22.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821462" comment="ntpdate-4.2.6p5-22.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821463" comment="sntp-4.2.6p5-22.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149298" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9298</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9298" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9298" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9298" ref_url="https://www.suse.com/security/cve/CVE-2014-9298" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0259-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0259-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001237.html" source="SUSE-SU"/>
    <description>
    DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2014-9750, CVE-2014-9751.  Reason: this ID was intended for one issue, but was associated with two issues.  Notes: All CVE users should consult CVE-2014-9750 and CVE-2014-9751 to identify the ID or IDs of interest. All references and descriptions in this candidate have been removed to prevent accidental usage
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-09"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9298/">CVE-2014-9298 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9298">CVE-2014-9298 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/911792">SUSE bug 911792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948963">SUSE bug 948963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821459" comment="ntp-4.2.6p5-22.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821460" comment="ntp-doc-4.2.6p5-22.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821461" comment="ntp-perl-4.2.6p5-22.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821462" comment="ntpdate-4.2.6p5-22.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821463" comment="sntp-4.2.6p5-22.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149322" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9322</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9322" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9322" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9322" ref_url="https://www.suse.com/security/cve/CVE-2014-9322" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001368.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1669-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GDZOTMP2VOUC5CTGQ542UWQZWRTOES4X/#GDZOTMP2VOUC5CTGQ542UWQZWRTOES4X" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1677-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KMCOHP6GELYLJBOOYH4FHHAYS7Q36GJY/#KMCOHP6GELYLJBOOYH4FHHAYS7Q36GJY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1678-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/537UDQ3EUWRMATJUJW6VCQRHQ6WZ7VVT/#537UDQ3EUWRMATJUJW6VCQRHQ6WZ7VVT" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/45VR2J6DOCMZ7DOFZ5B4QZ5CLCL3DYNQ/#45VR2J6DOCMZ7DOFZ5B4QZ5CLCL3DYNQ" source="SUSE-SU"/>
    <description>
    arch/x86/kernel/entry_64.S in the Linux kernel before 3.17.5 does not properly handle faults associated with the Stack Segment (SS) segment register, which allows local users to gain privileges by triggering an IRET instruction that leads to access to a GS Base address from the wrong space.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9322/">CVE-2014-9322 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9322">CVE-2014-9322 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1115893">SUSE bug 1115893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/817142">SUSE bug 817142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910251">SUSE bug 910251</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820672" comment="kernel-3.10.0-123.13.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820673" comment="kernel-abi-whitelists-3.10.0-123.13.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820674" comment="kernel-debug-3.10.0-123.13.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820677" comment="kernel-doc-3.10.0-123.13.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820678" comment="kernel-headers-3.10.0-123.13.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820679" comment="kernel-tools-3.10.0-123.13.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820680" comment="kernel-tools-libs-3.10.0-123.13.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820682" comment="perf-3.10.0-123.13.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820683" comment="python-perf-3.10.0-123.13.2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149330" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9330</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9330" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9330" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9330" ref_url="https://www.suse.com/security/cve/CVE-2014-9330" source="SUSE CVE"/>
    <description>
    Integer overflow in tif_packbits.c in bmp2tif in libtiff 4.0.3 allows remote attackers to cause a denial of service (crash) via crafted BMP image, related to dimensions, which triggers an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9330/">CVE-2014-9330 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9330">CVE-2014-9330 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822206" comment="libtiff-4.0.3-25.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822207" comment="libtiff-devel-4.0.3-25.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822208" comment="libtiff-static-4.0.3-25.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822209" comment="libtiff-tools-4.0.3-25.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149365" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9365</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9365" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9365" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9365" ref_url="https://www.suse.com/security/cve/CVE-2014-9365" source="SUSE CVE"/>
    <description>
    The HTTP clients in the (1) httplib, (2) urllib, (3) urllib2, and (4) xmlrpclib libraries in CPython (aka Python) 2.x before 2.7.9 and 3.x before 3.4.3, when accessing an HTTPS URL, do not (a) check the certificate against a trust store or verify that the server hostname matches a domain name in the subject's (b) Common Name or (c) subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9365/">CVE-2014-9365 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9365">CVE-2014-9365 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/909713">SUSE bug 909713</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823294" comment="python-2.7.5-58.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823295" comment="python-debug-2.7.5-58.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823296" comment="python-devel-2.7.5-58.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823297" comment="python-libs-2.7.5-58.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823298" comment="python-test-2.7.5-58.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823299" comment="python-tools-2.7.5-58.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823300" comment="tkinter-2.7.5-58.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149402" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9402</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9402" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9402" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9402" ref_url="https://www.suse.com/security/cve/CVE-2014-9402" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001305.html" source="SUSE-SU"/>
    <description>
    The nss_dns implementation of getnetbyname in GNU C Library (aka glibc) before 2.21, when the DNS backend in the Name Service Switch configuration is enabled, allows remote attackers to cause a denial of service (infinite loop) by sending a positive answer while a network name is being process.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9402/">CVE-2014-9402 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9402">CVE-2014-9402 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/910599">SUSE bug 910599</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824075" comment="glibc-2.17-222.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824076" comment="glibc-common-2.17-222.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824077" comment="glibc-devel-2.17-222.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824078" comment="glibc-headers-2.17-222.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824079" comment="glibc-static-2.17-222.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824080" comment="glibc-utils-2.17-222.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824081" comment="nscd-2.17-222.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149419" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9419</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9419" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9419" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9419" ref_url="https://www.suse.com/security/cve/CVE-2014-9419" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001535.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0713-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NWCJPZ26DJQKJAYBVBW2J4THDLRJKACI/#NWCJPZ26DJQKJAYBVBW2J4THDLRJKACI" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0714-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TGDFE2ZE62NVTCXF3ICQYCJ3S7RQZBVD/#TGDFE2ZE62NVTCXF3ICQYCJ3S7RQZBVD" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OC7663UNXLKFWJKPITRGQNF4FU4KJWNK/#OC7663UNXLKFWJKPITRGQNF4FU4KJWNK" source="SUSE-SU"/>
    <description>
    The __switch_to function in arch/x86/kernel/process_64.c in the Linux kernel through 3.18.1 does not ensure that Thread Local Storage (TLS) descriptors are loaded before proceeding with other steps, which makes it easier for local users to bypass the ASLR protection mechanism via a crafted application that reads a TLS base address.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9419/">CVE-2014-9419 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9419">CVE-2014-9419 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/911326">SUSE bug 911326</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821413" comment="kernel-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821414" comment="kernel-abi-whitelists-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821415" comment="kernel-debug-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821418" comment="kernel-doc-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821419" comment="kernel-headers-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821420" comment="kernel-tools-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821421" comment="kernel-tools-libs-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821423" comment="perf-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821424" comment="python-perf-3.10.0-327.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149420" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9420</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9420" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9420" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9420" ref_url="https://www.suse.com/security/cve/CVE-2014-9420" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001198.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001368.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0713-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NWCJPZ26DJQKJAYBVBW2J4THDLRJKACI/#NWCJPZ26DJQKJAYBVBW2J4THDLRJKACI" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0714-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TGDFE2ZE62NVTCXF3ICQYCJ3S7RQZBVD/#TGDFE2ZE62NVTCXF3ICQYCJ3S7RQZBVD" source="SUSE-SU"/>
    <description>
    The rock_continue function in fs/isofs/rock.c in the Linux kernel through 3.18.1 does not restrict the number of Rock Ridge continuation entries, which allows local users to cause a denial of service (infinite loop, and system crash or hang) via a crafted iso9660 image.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9420/">CVE-2014-9420 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9420">CVE-2014-9420 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/906545">SUSE bug 906545</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911325">SUSE bug 911325</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821114" comment="kernel-3.10.0-229.7.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821115" comment="kernel-abi-whitelists-3.10.0-229.7.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821116" comment="kernel-debug-3.10.0-229.7.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821119" comment="kernel-doc-3.10.0-229.7.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821120" comment="kernel-headers-3.10.0-229.7.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821121" comment="kernel-tools-3.10.0-229.7.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821122" comment="kernel-tools-libs-3.10.0-229.7.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821124" comment="perf-3.10.0-229.7.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821125" comment="python-perf-3.10.0-229.7.2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149421" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9421</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9421" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9421" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9421" ref_url="https://www.suse.com/security/cve/CVE-2014-9421" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0290-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001225.html" source="SUSE-SU"/>
    <description>
    The auth_gssapi_unwrap_data function in lib/rpc/auth_gssapi_misc.c in MIT Kerberos 5 (aka krb5) through 1.11.5, 1.12.x through 1.12.2, and 1.13.x before 1.13.1 does not properly handle partial XDR deserialization, which allows remote authenticated users to cause a denial of service (use-after-free and double free, and daemon crash) or possibly execute arbitrary code via malformed XDR data, as demonstrated by data sent to kadmind.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9421/">CVE-2014-9421 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9421">CVE-2014-9421 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1005509">SUSE bug 1005509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/770172">SUSE bug 770172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912002">SUSE bug 912002</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820882" comment="krb5-devel-1.12.2-14.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820883" comment="krb5-libs-1.12.2-14.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820884" comment="krb5-pkinit-1.12.2-14.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820885" comment="krb5-server-1.12.2-14.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820886" comment="krb5-server-ldap-1.12.2-14.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820887" comment="krb5-workstation-1.12.2-14.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149422" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9422</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9422" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9422" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9422" ref_url="https://www.suse.com/security/cve/CVE-2014-9422" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0290-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001225.html" source="SUSE-SU"/>
    <description>
    The check_rpcsec_auth function in kadmin/server/kadm_rpc_svc.c in kadmind in MIT Kerberos 5 (aka krb5) through 1.11.5, 1.12.x through 1.12.2, and 1.13.x before 1.13.1 allows remote authenticated users to bypass a kadmin/* authorization check and obtain administrative access by leveraging access to a two-component principal with an initial "kadmind" substring, as demonstrated by a "ka/x" principal.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9422/">CVE-2014-9422 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9422">CVE-2014-9422 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1005509">SUSE bug 1005509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/770172">SUSE bug 770172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912002">SUSE bug 912002</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820882" comment="krb5-devel-1.12.2-14.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820883" comment="krb5-libs-1.12.2-14.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820884" comment="krb5-pkinit-1.12.2-14.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820885" comment="krb5-server-1.12.2-14.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820886" comment="krb5-server-ldap-1.12.2-14.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820887" comment="krb5-workstation-1.12.2-14.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149423" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9423</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9423" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9423" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9423" ref_url="https://www.suse.com/security/cve/CVE-2014-9423" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0290-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001225.html" source="SUSE-SU"/>
    <description>
    The svcauth_gss_accept_sec_context function in lib/rpc/svc_auth_gss.c in MIT Kerberos 5 (aka krb5) 1.11.x through 1.11.5, 1.12.x through 1.12.2, and 1.13.x before 1.13.1 transmits uninitialized interposer data to clients, which allows remote attackers to obtain sensitive information from process heap memory by sniffing the network for data in a handle field.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9423/">CVE-2014-9423 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9423">CVE-2014-9423 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1005509">SUSE bug 1005509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912002">SUSE bug 912002</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820882" comment="krb5-devel-1.12.2-14.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820883" comment="krb5-libs-1.12.2-14.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820884" comment="krb5-pkinit-1.12.2-14.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820885" comment="krb5-server-1.12.2-14.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820886" comment="krb5-server-ldap-1.12.2-14.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820887" comment="krb5-workstation-1.12.2-14.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149474" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9474</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9474" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9474" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9474" ref_url="https://www.suse.com/security/cve/CVE-2014-9474" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:9332" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001208.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the mpfr_strtofr function in GNU MPFR before 3.1.2-p11 allows context-dependent attackers to have unspecified impact via vectors related to incorrect documentation for mpn_set_str.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-07-04"/>
	<updated date="2025-08-09"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9474/">CVE-2014-9474 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9474">CVE-2014-9474 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/911812">SUSE bug 911812</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009998140" comment="mpfr-3.1.1-4.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998141" comment="mpfr-devel-3.1.1-4.el7_9.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149529" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9529</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9529" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9529" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9529" ref_url="https://www.suse.com/security/cve/CVE-2014-9529" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001535.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0713-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NWCJPZ26DJQKJAYBVBW2J4THDLRJKACI/#NWCJPZ26DJQKJAYBVBW2J4THDLRJKACI" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0714-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TGDFE2ZE62NVTCXF3ICQYCJ3S7RQZBVD/#TGDFE2ZE62NVTCXF3ICQYCJ3S7RQZBVD" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OC7663UNXLKFWJKPITRGQNF4FU4KJWNK/#OC7663UNXLKFWJKPITRGQNF4FU4KJWNK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0318-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7PLUD6GJFLZ2LR3VZPLUZ5KPDX3EVFZS/#7PLUD6GJFLZ2LR3VZPLUZ5KPDX3EVFZS" source="SUSE-SU"/>
    <description>
    Race condition in the key_gc_unused_keys function in security/keys/gc.c in the Linux kernel through 3.18.2 allows local users to cause a denial of service (memory corruption or panic) or possibly have unspecified other impact via keyctl commands that trigger access to a key structure member during garbage collection of a key.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9529/">CVE-2014-9529 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9529">CVE-2014-9529 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1072204">SUSE bug 1072204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115893">SUSE bug 1115893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912202">SUSE bug 912202</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821114" comment="kernel-3.10.0-229.7.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821115" comment="kernel-abi-whitelists-3.10.0-229.7.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821116" comment="kernel-debug-3.10.0-229.7.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821119" comment="kernel-doc-3.10.0-229.7.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821120" comment="kernel-headers-3.10.0-229.7.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821121" comment="kernel-tools-3.10.0-229.7.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821122" comment="kernel-tools-libs-3.10.0-229.7.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821124" comment="perf-3.10.0-229.7.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821125" comment="python-perf-3.10.0-229.7.2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149584" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9584</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9584" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9584" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9584" ref_url="https://www.suse.com/security/cve/CVE-2014-9584" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001368.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/45VR2J6DOCMZ7DOFZ5B4QZ5CLCL3DYNQ/#45VR2J6DOCMZ7DOFZ5B4QZ5CLCL3DYNQ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0713-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NWCJPZ26DJQKJAYBVBW2J4THDLRJKACI/#NWCJPZ26DJQKJAYBVBW2J4THDLRJKACI" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0714-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TGDFE2ZE62NVTCXF3ICQYCJ3S7RQZBVD/#TGDFE2ZE62NVTCXF3ICQYCJ3S7RQZBVD" source="SUSE-SU"/>
    <description>
    The parse_rock_ridge_inode_internal function in fs/isofs/rock.c in the Linux kernel before 3.18.2 does not validate a length value in the Extensions Reference (ER) System Use Field, which allows local users to obtain sensitive information from kernel memory via a crafted iso9660 image.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9584/">CVE-2014-9584 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9584">CVE-2014-9584 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/912654">SUSE bug 912654</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821114" comment="kernel-3.10.0-229.7.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821115" comment="kernel-abi-whitelists-3.10.0-229.7.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821116" comment="kernel-debug-3.10.0-229.7.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821119" comment="kernel-doc-3.10.0-229.7.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821120" comment="kernel-headers-3.10.0-229.7.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821121" comment="kernel-tools-3.10.0-229.7.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821122" comment="kernel-tools-libs-3.10.0-229.7.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821124" comment="perf-3.10.0-229.7.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821125" comment="python-perf-3.10.0-229.7.2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149585" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9585</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9585" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9585" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9585" ref_url="https://www.suse.com/security/cve/CVE-2014-9585" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001198.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/45VR2J6DOCMZ7DOFZ5B4QZ5CLCL3DYNQ/#45VR2J6DOCMZ7DOFZ5B4QZ5CLCL3DYNQ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0713-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NWCJPZ26DJQKJAYBVBW2J4THDLRJKACI/#NWCJPZ26DJQKJAYBVBW2J4THDLRJKACI" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0714-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TGDFE2ZE62NVTCXF3ICQYCJ3S7RQZBVD/#TGDFE2ZE62NVTCXF3ICQYCJ3S7RQZBVD" source="SUSE-SU"/>
    <description>
    The vdso_addr function in arch/x86/vdso/vma.c in the Linux kernel through 3.18.2 does not properly choose memory locations for the vDSO area, which makes it easier for local users to bypass the ASLR protection mechanism by guessing a location at the end of a PMD.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9585/">CVE-2014-9585 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9585">CVE-2014-9585 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/912705">SUSE bug 912705</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821287" comment="kernel-3.10.0-229.14.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821288" comment="kernel-abi-whitelists-3.10.0-229.14.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821289" comment="kernel-debug-3.10.0-229.14.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821292" comment="kernel-doc-3.10.0-229.14.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821293" comment="kernel-headers-3.10.0-229.14.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821294" comment="kernel-tools-3.10.0-229.14.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821295" comment="kernel-tools-libs-3.10.0-229.14.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821297" comment="perf-3.10.0-229.14.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821298" comment="python-perf-3.10.0-229.14.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149636" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9636</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9636" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9636" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9636" ref_url="https://www.suse.com/security/cve/CVE-2014-9636" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1883-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004241.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2978-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004635.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1914-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MRPFILWN6REFOJ3AEZFUAT3JOJVFPB6R/#MRPFILWN6REFOJ3AEZFUAT3JOJVFPB6R" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3043-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3JVQYGH5NAEPAWJBI4WWBT2WRRG2335A/#3JVQYGH5NAEPAWJBI4WWBT2WRRG2335A" source="SUSE-SU"/>
    <description>
    unzip 6.0 allows remote attackers to cause a denial of service (out-of-bounds read or write and crash) via an extra field with an uncompressed size smaller than the compressed field size in a zip archive that advertises STORED method compression.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9636/">CVE-2014-9636 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9636">CVE-2014-9636 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/914442">SUSE bug 914442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820917" comment="unzip-6.0-15.el7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149644" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9644</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9644" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9644" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9644" ref_url="https://www.suse.com/security/cve/CVE-2014-9644" source="SUSE CVE"/>
    <description>
    The Crypto API in the Linux kernel before 3.18.5 allows local users to load arbitrary kernel modules via a bind system call for an AF_ALG socket with a parenthesized module template expression in the salg_name field, as demonstrated by the vfat(aes) expression, a different vulnerability than CVE-2013-7421.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9644/">CVE-2014-9644 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9644">CVE-2014-9644 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/914423">SUSE bug 914423</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821413" comment="kernel-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821414" comment="kernel-abi-whitelists-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821415" comment="kernel-debug-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821418" comment="kernel-doc-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821419" comment="kernel-headers-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821420" comment="kernel-tools-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821421" comment="kernel-tools-libs-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821423" comment="perf-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821424" comment="python-perf-3.10.0-327.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149652" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9652</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9652" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9652" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9652" ref_url="https://www.suse.com/security/cve/CVE-2014-9652" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1638-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002131.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0440-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7UWLWNAUAI5ODEZUEBZACY7QXKCARUK3/#7UWLWNAUAI5ODEZUEBZACY7QXKCARUK3" source="SUSE-SU"/>
    <description>
    The mconvert function in softmagic.c in file before 5.21, as used in the Fileinfo component in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5, does not properly handle a certain string-length field during a copy of a truncated version of a Pascal string, which might allow remote attackers to cause a denial of service (out-of-bounds memory access and application crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9652/">CVE-2014-9652 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9652">CVE-2014-9652 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/917150">SUSE bug 917150</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917302">SUSE bug 917302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918768">SUSE bug 918768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821431" comment="file-5.11-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821432" comment="file-devel-5.11-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821433" comment="file-libs-5.11-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821434" comment="file-static-5.11-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821089" comment="php-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821090" comment="php-bcmath-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821091" comment="php-cli-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821092" comment="php-common-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821093" comment="php-dba-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821094" comment="php-devel-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821095" comment="php-embedded-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821096" comment="php-enchant-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821097" comment="php-fpm-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821098" comment="php-gd-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821099" comment="php-intl-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821100" comment="php-ldap-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821101" comment="php-mbstring-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821102" comment="php-mysql-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821103" comment="php-mysqlnd-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821104" comment="php-odbc-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821105" comment="php-pdo-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821106" comment="php-pgsql-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821107" comment="php-process-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821108" comment="php-pspell-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821109" comment="php-recode-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821110" comment="php-snmp-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821111" comment="php-soap-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821112" comment="php-xml-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821113" comment="php-xmlrpc-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821435" comment="python-magic-5.11-31.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149653" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9653</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9653" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9653" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9653" ref_url="https://www.suse.com/security/cve/CVE-2014-9653" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003580.html" source="SUSE-SU"/>
    <description>
    readelf.c in file before 5.22, as used in the Fileinfo component in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5, does not consider that pread calls sometimes read only a subset of the available data, which allows remote attackers to cause a denial of service (uninitialized memory access) or possibly have unspecified other impact via a crafted ELF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9653/">CVE-2014-9653 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9653">CVE-2014-9653 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/917152">SUSE bug 917152</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821431" comment="file-5.11-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821432" comment="file-devel-5.11-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821433" comment="file-libs-5.11-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821434" comment="file-static-5.11-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821435" comment="python-magic-5.11-31.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149655" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9655</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9655" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9655" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9655" ref_url="https://www.suse.com/security/cve/CVE-2014-9655" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1420-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001561.html" source="SUSE-SU"/>
    <description>
    The (1) putcontig8bitYCbCr21tile function in tif_getimage.c or (2) NeXTDecode function in tif_next.c in LibTIFF allows remote attackers to cause a denial of service (uninitialized memory access) via a crafted TIFF image, as demonstrated by libtiff-cvs-1.tif and libtiff-cvs-2.tif.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-04-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9655/">CVE-2014-9655 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9655">CVE-2014-9655 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1206220">SUSE bug 1206220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914890">SUSE bug 914890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916925">SUSE bug 916925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916927">SUSE bug 916927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969783">SUSE bug 969783</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822206" comment="libtiff-4.0.3-25.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822207" comment="libtiff-devel-4.0.3-25.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822208" comment="libtiff-static-4.0.3-25.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822209" comment="libtiff-tools-4.0.3-25.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149657" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9657</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9657" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9657" ref_url="https://www.suse.com/security/cve/CVE-2014-9657" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001277.html" source="SUSE-SU"/>
		<reference ref_id="TID7021823" ref_url="https://www.suse.com/support/kb/doc/?id=7021823" source="SUSE-SU"/>
		<reference ref_id="TID7021836" ref_url="https://www.suse.com/support/kb/doc/?id=7021836" source="SUSE-SU"/>
    <description>
    The tt_face_load_hdmx function in truetype/ttpload.c in FreeType before 2.5.4 does not establish a minimum record size, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted TrueType font.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9657/">CVE-2014-9657 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9657">CVE-2014-9657 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/916856">SUSE bug 916856</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820914" comment="freetype-2.4.11-10.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820915" comment="freetype-demos-2.4.11-10.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820916" comment="freetype-devel-2.4.11-10.el7_1.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149658" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9658</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9658" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9658" ref_url="https://www.suse.com/security/cve/CVE-2014-9658" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001277.html" source="SUSE-SU"/>
		<reference ref_id="TID7021823" ref_url="https://www.suse.com/support/kb/doc/?id=7021823" source="SUSE-SU"/>
		<reference ref_id="TID7021836" ref_url="https://www.suse.com/support/kb/doc/?id=7021836" source="SUSE-SU"/>
    <description>
    The tt_face_load_kern function in sfnt/ttkern.c in FreeType before 2.5.4 enforces an incorrect minimum table length, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted TrueType font.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9658/">CVE-2014-9658 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9658">CVE-2014-9658 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/916857">SUSE bug 916857</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820914" comment="freetype-2.4.11-10.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820915" comment="freetype-demos-2.4.11-10.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820916" comment="freetype-devel-2.4.11-10.el7_1.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149660" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9660</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9660" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9660" ref_url="https://www.suse.com/security/cve/CVE-2014-9660" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001277.html" source="SUSE-SU"/>
    <description>
    The _bdf_parse_glyphs function in bdf/bdflib.c in FreeType before 2.5.4 does not properly handle a missing ENDCHAR record, which allows remote attackers to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a crafted BDF font.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9660/">CVE-2014-9660 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9660">CVE-2014-9660 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/916858">SUSE bug 916858</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820914" comment="freetype-2.4.11-10.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820915" comment="freetype-demos-2.4.11-10.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820916" comment="freetype-devel-2.4.11-10.el7_1.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149661" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9661</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9661" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9661" ref_url="https://www.suse.com/security/cve/CVE-2014-9661" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001277.html" source="SUSE-SU"/>
    <description>
    type42/t42parse.c in FreeType before 2.5.4 does not consider that scanning can be incomplete without triggering an error, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted Type42 font.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9661/">CVE-2014-9661 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9661">CVE-2014-9661 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/916859">SUSE bug 916859</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820914" comment="freetype-2.4.11-10.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820915" comment="freetype-demos-2.4.11-10.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820916" comment="freetype-devel-2.4.11-10.el7_1.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149663" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9663</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9663" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9663" ref_url="https://www.suse.com/security/cve/CVE-2014-9663" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001277.html" source="SUSE-SU"/>
    <description>
    The tt_cmap4_validate function in sfnt/ttcmap.c in FreeType before 2.5.4 validates a certain length field before that field's value is completely calculated, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted cmap SFNT table.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9663/">CVE-2014-9663 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9663">CVE-2014-9663 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/916865">SUSE bug 916865</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820914" comment="freetype-2.4.11-10.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820915" comment="freetype-demos-2.4.11-10.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820916" comment="freetype-devel-2.4.11-10.el7_1.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149664" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9664</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9664" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9664" ref_url="https://www.suse.com/security/cve/CVE-2014-9664" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001277.html" source="SUSE-SU"/>
    <description>
    FreeType before 2.5.4 does not check for the end of the data during certain parsing actions, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted Type42 font, related to type42/t42parse.c and type1/t1load.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9664/">CVE-2014-9664 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9664">CVE-2014-9664 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/916864">SUSE bug 916864</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820914" comment="freetype-2.4.11-10.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820915" comment="freetype-demos-2.4.11-10.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820916" comment="freetype-devel-2.4.11-10.el7_1.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149667" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9667</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9667" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9667" ref_url="https://www.suse.com/security/cve/CVE-2014-9667" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001277.html" source="SUSE-SU"/>
    <description>
    sfnt/ttload.c in FreeType before 2.5.4 proceeds with offset+length calculations without restricting the values, which allows remote attackers to cause a denial of service (integer overflow and out-of-bounds read) or possibly have unspecified other impact via a crafted SFNT table.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9667/">CVE-2014-9667 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9667">CVE-2014-9667 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/916861">SUSE bug 916861</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820914" comment="freetype-2.4.11-10.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820915" comment="freetype-demos-2.4.11-10.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820916" comment="freetype-devel-2.4.11-10.el7_1.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149669" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9669</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9669" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9669" ref_url="https://www.suse.com/security/cve/CVE-2014-9669" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001277.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in sfnt/ttcmap.c in FreeType before 2.5.4 allow remote attackers to cause a denial of service (out-of-bounds read or memory corruption) or possibly have unspecified other impact via a crafted cmap SFNT table.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9669/">CVE-2014-9669 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9669">CVE-2014-9669 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/916870">SUSE bug 916870</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820914" comment="freetype-2.4.11-10.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820915" comment="freetype-demos-2.4.11-10.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820916" comment="freetype-devel-2.4.11-10.el7_1.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149670" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9670</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9670" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9670" ref_url="https://www.suse.com/security/cve/CVE-2014-9670" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001277.html" source="SUSE-SU"/>
    <description>
    Multiple integer signedness errors in the pcf_get_encodings function in pcf/pcfread.c in FreeType before 2.5.4 allow remote attackers to cause a denial of service (integer overflow, NULL pointer dereference, and application crash) via a crafted PCF file that specifies negative values for the first column and first row.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9670/">CVE-2014-9670 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9670">CVE-2014-9670 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/916871">SUSE bug 916871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933247">SUSE bug 933247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820914" comment="freetype-2.4.11-10.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820915" comment="freetype-demos-2.4.11-10.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820916" comment="freetype-devel-2.4.11-10.el7_1.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149671" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9671</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9671" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9671" ref_url="https://www.suse.com/security/cve/CVE-2014-9671" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001277.html" source="SUSE-SU"/>
    <description>
    Off-by-one error in the pcf_get_properties function in pcf/pcfread.c in FreeType before 2.5.4 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted PCF file with a 0xffffffff size value that is improperly incremented.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9671/">CVE-2014-9671 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9671">CVE-2014-9671 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/916872">SUSE bug 916872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933247">SUSE bug 933247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820914" comment="freetype-2.4.11-10.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820915" comment="freetype-demos-2.4.11-10.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820916" comment="freetype-devel-2.4.11-10.el7_1.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149673" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9673</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9673" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9673" ref_url="https://www.suse.com/security/cve/CVE-2014-9673" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001277.html" source="SUSE-SU"/>
    <description>
    Integer signedness error in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.5.4 allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted Mac font.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9673/">CVE-2014-9673 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9673">CVE-2014-9673 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/916874">SUSE bug 916874</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820914" comment="freetype-2.4.11-10.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820915" comment="freetype-demos-2.4.11-10.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820916" comment="freetype-devel-2.4.11-10.el7_1.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149674" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9674</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9674" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9674" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9674" ref_url="https://www.suse.com/security/cve/CVE-2014-9674" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001277.html" source="SUSE-SU"/>
    <description>
    The Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.5.4 proceeds with adding to length values without validating the original values, which allows remote attackers to cause a denial of service (integer overflow and heap-based buffer overflow) or possibly have unspecified other impact via a crafted Mac font.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9674/">CVE-2014-9674 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9674">CVE-2014-9674 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/916879">SUSE bug 916879</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820914" comment="freetype-2.4.11-10.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820915" comment="freetype-demos-2.4.11-10.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820916" comment="freetype-devel-2.4.11-10.el7_1.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149675" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9675</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9675" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9675" ref_url="https://www.suse.com/security/cve/CVE-2014-9675" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001277.html" source="SUSE-SU"/>
    <description>
    bdf/bdflib.c in FreeType before 2.5.4 identifies property names by only verifying that an initial substring is present, which allows remote attackers to discover heap pointer values and bypass the ASLR protection mechanism via a crafted BDF font.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9675/">CVE-2014-9675 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9675">CVE-2014-9675 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/916881">SUSE bug 916881</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820914" comment="freetype-2.4.11-10.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820915" comment="freetype-demos-2.4.11-10.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820916" comment="freetype-devel-2.4.11-10.el7_1.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149679" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9679</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9679" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9679" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9679" ref_url="https://www.suse.com/security/cve/CVE-2014-9679" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0465-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001311.html" source="SUSE-SU"/>
    <description>
    Integer underflow in the cupsRasterReadPixels function in filter/raster.c in CUPS before 2.0.2 allows remote attackers to have unspecified impact via a malformed compressed raster file, which triggers a buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-08"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2014-9679/">CVE-2014-9679 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9679">CVE-2014-9679 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/917799">SUSE bug 917799</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821082" comment="cups-1.6.3-17.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821083" comment="cups-client-1.6.3-17.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821084" comment="cups-devel-1.6.3-17.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821085" comment="cups-filesystem-1.6.3-17.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821086" comment="cups-ipptool-1.6.3-17.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821087" comment="cups-libs-1.6.3-17.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821088" comment="cups-lpd-1.6.3-17.el7_1.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149705" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9705</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9705" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9705" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9705" ref_url="https://www.suse.com/security/cve/CVE-2014-9705" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0868-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1638-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002131.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the enchant_broker_request_dict function in ext/enchant/enchant.c in PHP before 5.4.38, 5.5.x before 5.5.22, and 5.6.x before 5.6.6 allows remote attackers to execute arbitrary code via vectors that trigger creation of multiple dictionaries.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-27"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9705/">CVE-2014-9705 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9705">CVE-2014-9705 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/922451">SUSE bug 922451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821089" comment="php-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821090" comment="php-bcmath-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821091" comment="php-cli-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821092" comment="php-common-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821093" comment="php-dba-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821094" comment="php-devel-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821095" comment="php-embedded-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821096" comment="php-enchant-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821097" comment="php-fpm-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821098" comment="php-gd-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821099" comment="php-intl-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821100" comment="php-ldap-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821101" comment="php-mbstring-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821102" comment="php-mysql-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821103" comment="php-mysqlnd-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821104" comment="php-odbc-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821105" comment="php-pdo-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821106" comment="php-pgsql-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821107" comment="php-process-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821108" comment="php-pspell-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821109" comment="php-recode-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821110" comment="php-snmp-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821111" comment="php-soap-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821112" comment="php-xml-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821113" comment="php-xmlrpc-5.4.16-36.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149709" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9709</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9709" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9709" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9709" ref_url="https://www.suse.com/security/cve/CVE-2014-9709" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0866-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0868-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1638-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013458.html" source="SUSE-SU"/>
    <description>
    The GetCode_ function in gd_gif_in.c in GD 2.1.1 and earlier, as used in PHP before 5.5.21 and 5.6.x before 5.6.5, allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted GIF image that is improperly handled by the gdImageCreateFromGif function.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-28"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9709/">CVE-2014-9709 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9709">CVE-2014-9709 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/923945">SUSE bug 923945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923946">SUSE bug 923946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821089" comment="php-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821090" comment="php-bcmath-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821091" comment="php-cli-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821092" comment="php-common-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821093" comment="php-dba-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821094" comment="php-devel-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821095" comment="php-embedded-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821096" comment="php-enchant-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821097" comment="php-fpm-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821098" comment="php-gd-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821099" comment="php-intl-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821100" comment="php-ldap-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821101" comment="php-mbstring-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821102" comment="php-mysql-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821103" comment="php-mysqlnd-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821104" comment="php-odbc-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821105" comment="php-pdo-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821106" comment="php-pgsql-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821107" comment="php-process-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821108" comment="php-pspell-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821109" comment="php-recode-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821110" comment="php-snmp-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821111" comment="php-soap-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821112" comment="php-xml-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821113" comment="php-xmlrpc-5.4.16-36.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149715" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9715</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9715" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9715" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9715" ref_url="https://www.suse.com/security/cve/CVE-2014-9715" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OC7663UNXLKFWJKPITRGQNF4FU4KJWNK/#OC7663UNXLKFWJKPITRGQNF4FU4KJWNK" source="SUSE-SU"/>
    <description>
    include/net/netfilter/nf_conntrack_extend.h in the netfilter subsystem in the Linux kernel before 3.14.5 uses an insufficiently large data type for certain extension data, which allows local users to cause a denial of service (NULL pointer dereference and OOPS) via outbound network traffic that triggers extension loading, as demonstrated by configuring a PPTP tunnel in a NAT environment.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9715/">CVE-2014-9715 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9715">CVE-2014-9715 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/927780">SUSE bug 927780</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821203" comment="kernel-3.10.0-229.11.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821204" comment="kernel-abi-whitelists-3.10.0-229.11.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821205" comment="kernel-debug-3.10.0-229.11.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821208" comment="kernel-doc-3.10.0-229.11.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821209" comment="kernel-headers-3.10.0-229.11.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821210" comment="kernel-tools-3.10.0-229.11.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821211" comment="kernel-tools-libs-3.10.0-229.11.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821213" comment="perf-3.10.0-229.11.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821214" comment="python-perf-3.10.0-229.11.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149750" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9750</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9750" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9750" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9750" ref_url="https://www.suse.com/security/cve/CVE-2014-9750" source="SUSE CVE"/>
    <description>
    ntp_crypto.c in ntpd in NTP 4.x before 4.2.8p1, when Autokey Authentication is enabled, allows remote attackers to obtain sensitive information from process memory or cause a denial of service (daemon crash) via a packet containing an extension field with an invalid value for the length of its value field.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9750/">CVE-2014-9750 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9750">CVE-2014-9750 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/911792">SUSE bug 911792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821459" comment="ntp-4.2.6p5-22.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821460" comment="ntp-doc-4.2.6p5-22.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821461" comment="ntp-perl-4.2.6p5-22.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821462" comment="ntpdate-4.2.6p5-22.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821463" comment="sntp-4.2.6p5-22.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149751" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9751</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9751" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9751" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9751" ref_url="https://www.suse.com/security/cve/CVE-2014-9751" source="SUSE CVE"/>
    <description>
    The read_network_packet function in ntp_io.c in ntpd in NTP 4.x before 4.2.8p1 on Linux and OS X does not properly determine whether a source IP address is an IPv6 loopback address, which makes it easier for remote attackers to spoof restricted packets, and read or write to the runtime state, by leveraging the ability to reach the ntpd machine's network interface with a packet from the ::1 address.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9751/">CVE-2014-9751 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9751">CVE-2014-9751 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/911792">SUSE bug 911792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948963">SUSE bug 948963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821459" comment="ntp-4.2.6p5-22.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821460" comment="ntp-doc-4.2.6p5-22.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821461" comment="ntp-perl-4.2.6p5-22.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821462" comment="ntpdate-4.2.6p5-22.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821463" comment="sntp-4.2.6p5-22.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149761" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9761</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9761" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9761" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9761" ref_url="https://www.suse.com/security/cve/CVE-2014-9761" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001948.html" source="SUSE-SU"/>
		<reference ref_id="TID7017287" ref_url="https://www.suse.com/support/kb/doc?id=7017287" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0490-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YY2DTMAT2VLWPTXSSUAUBFCCAYY3S63X/#YY2DTMAT2VLWPTXSSUAUBFCCAYY3S63X" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0510-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XMCYM5IM5GBBV2HEJEZMVKTJIYVLENHN/#XMCYM5IM5GBBV2HEJEZMVKTJIYVLENHN" source="SUSE-SU"/>
    <description>
    Multiple stack-based buffer overflows in the GNU C Library (aka glibc or libc6) before 2.23 allow context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long argument to the (1) nan, (2) nanf, or (3) nanl function.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9761/">CVE-2014-9761 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9761">CVE-2014-9761 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1123874">SUSE bug 1123874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962738">SUSE bug 962738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986086">SUSE bug 986086</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823302" comment="glibc-2.17-196.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823303" comment="glibc-common-2.17-196.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823304" comment="glibc-devel-2.17-196.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823305" comment="glibc-headers-2.17-196.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823306" comment="glibc-static-2.17-196.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823307" comment="glibc-utils-2.17-196.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823308" comment="nscd-2.17-196.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149938" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9938</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9938" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9938" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9938" ref_url="https://www.suse.com/security/cve/CVE-2014-9938" source="SUSE CVE"/>
    <description>
    contrib/completion/git-prompt.sh in Git before 1.9.3 does not sanitize branch names in the PS1 variable, allowing a malicious repository to cause code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9938/">CVE-2014-9938 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9938">CVE-2014-9938 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1030059">SUSE bug 1030059</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823360" comment="emacs-git-1.8.3.1-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823361" comment="emacs-git-el-1.8.3.1-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823362" comment="git-1.8.3.1-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823363" comment="git-all-1.8.3.1-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823364" comment="git-bzr-1.8.3.1-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823365" comment="git-cvs-1.8.3.1-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823366" comment="git-daemon-1.8.3.1-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823367" comment="git-email-1.8.3.1-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823368" comment="git-gui-1.8.3.1-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823369" comment="git-hg-1.8.3.1-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823370" comment="git-p4-1.8.3.1-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823371" comment="git-svn-1.8.3.1-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823372" comment="gitk-1.8.3.1-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823373" comment="gitweb-1.8.3.1-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823374" comment="perl-Git-1.8.3.1-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823375" comment="perl-Git-SVN-1.8.3.1-11.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150204" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0204</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0204" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0204" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0204" ref_url="https://www.suse.com/security/cve/CVE-2015-0204" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0172-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001410.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-4" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001721.html" source="SUSE-SU"/>
		<reference ref_id="TID3426981" ref_url="https://www.suse.com/support/kb/doc/?id=3426981" source="SUSE-SU"/>
		<reference ref_id="TID7014420" ref_url="https://www.suse.com/support/kb/doc/?id=7014420" source="SUSE-SU"/>
		<reference ref_id="TID7016252" ref_url="https://www.suse.com/support/kb/doc?id=7016252" source="SUSE-SU"/>
		<reference ref_id="TID7016260" ref_url="https://www.suse.com/support/kb/doc/?id=7016260" source="SUSE-SU"/>
		<reference ref_id="TID7016273" ref_url="https://www.suse.com/support/kb/doc/?id=7016273" source="SUSE-SU"/>
		<reference ref_id="TID7016312" ref_url="https://www.suse.com/support/kb/doc/?id=7016312" source="SUSE-SU"/>
		<reference ref_id="TID7016336" ref_url="https://www.suse.com/support/kb/doc/?id=7016336" source="SUSE-SU"/>
		<reference ref_id="TID7016340" ref_url="https://www.suse.com/support/kb/doc/?id=7016340" source="SUSE-SU"/>
		<reference ref_id="TID7016875" ref_url="https://www.suse.com/support/kb/doc/?id=7016875" source="SUSE-SU"/>
		<reference ref_id="TID7021279" ref_url="https://www.suse.com/support/kb/doc/?id=7021279" source="SUSE-SU"/>
		<reference ref_id="TID7021435" ref_url="https://www.suse.com/support/kb/doc/?id=7021435" source="SUSE-SU"/>
		<reference ref_id="TID7021518" ref_url="https://www.suse.com/support/kb/doc/?id=7021518" source="SUSE-SU"/>
		<reference ref_id="TID7021676" ref_url="https://www.suse.com/support/kb/doc/?id=7021676" source="SUSE-SU"/>
		<reference ref_id="TID7021714" ref_url="https://www.suse.com/support/kb/doc/?id=7021714" source="SUSE-SU"/>
		<reference ref_id="TID7021743" ref_url="https://www.suse.com/support/kb/doc/?id=7021743" source="SUSE-SU"/>
		<reference ref_id="TID7021744" ref_url="https://www.suse.com/support/kb/doc/?id=7021744" source="SUSE-SU"/>
		<reference ref_id="TID7021848" ref_url="https://www.suse.com/support/kb/doc/?id=7021848" source="SUSE-SU"/>
		<reference ref_id="TID7021863" ref_url="https://www.suse.com/support/kb/doc/?id=7021863" source="SUSE-SU"/>
		<reference ref_id="TID7021977" ref_url="https://www.suse.com/support/kb/doc/?id=7021977" source="SUSE-SU"/>
		<reference ref_id="TID7021993" ref_url="https://www.suse.com/support/kb/doc/?id=7021993" source="SUSE-SU"/>
		<reference ref_id="TID7021994" ref_url="https://www.suse.com/support/kb/doc/?id=7021994" source="SUSE-SU"/>
		<reference ref_id="TID7021995" ref_url="https://www.suse.com/support/kb/doc/?id=7021995" source="SUSE-SU"/>
		<reference ref_id="TID7022102" ref_url="https://www.suse.com/support/kb/doc/?id=7022102" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0130-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5NKKL36OVJL3XH5PE2LUB3THMPTHPONL/#5NKKL36OVJL3XH5PE2LUB3THMPTHPONL" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C5ZZO44NS35G5NQFFXUERK5DXLTQN534/#C5ZZO44NS35G5NQFFXUERK5DXLTQN534" source="SUSE-SU"/>
    <description>
    The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote SSL servers to conduct RSA-to-EXPORT_RSA downgrade attacks and facilitate brute-force decryption by offering a weak ephemeral RSA key in a noncompliant role, related to the "FREAK" issue.  NOTE: the scope of this CVE is only client code based on OpenSSL, not EXPORT_RSA issues associated with servers or other TLS implementations.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0204/">CVE-2015-0204 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0204">CVE-2015-0204 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/912014">SUSE bug 912014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920482">SUSE bug 920482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920484">SUSE bug 920484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927591">SUSE bug 927591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927623">SUSE bug 927623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936787">SUSE bug 936787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952088">SUSE bug 952088</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820723" comment="openssl-1.0.1e-34.el7_0.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820724" comment="openssl-devel-1.0.1e-34.el7_0.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820725" comment="openssl-libs-1.0.1e-34.el7_0.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820726" comment="openssl-perl-1.0.1e-34.el7_0.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820727" comment="openssl-static-1.0.1e-34.el7_0.7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150205" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0205</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0205" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0205" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0205" ref_url="https://www.suse.com/security/cve/CVE-2015-0205" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0172-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001410.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0130-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5NKKL36OVJL3XH5PE2LUB3THMPTHPONL/#5NKKL36OVJL3XH5PE2LUB3THMPTHPONL" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1277-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XQAZGF7SIGXMQQGI6UJF7VBAOBYMY5WF/#XQAZGF7SIGXMQQGI6UJF7VBAOBYMY5WF" source="SUSE-SU"/>
    <description>
    The ssl3_get_cert_verify function in s3_srvr.c in OpenSSL 1.0.0 before 1.0.0p and 1.0.1 before 1.0.1k accepts client authentication with a Diffie-Hellman (DH) certificate without requiring a CertificateVerify message, which allows remote attackers to obtain access without knowledge of a private key via crafted TLS Handshake Protocol traffic to a server that recognizes a Certification Authority with DH support.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0205/">CVE-2015-0205 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0205">CVE-2015-0205 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/912293">SUSE bug 912293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915848">SUSE bug 915848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927623">SUSE bug 927623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937891">SUSE bug 937891</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820723" comment="openssl-1.0.1e-34.el7_0.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820724" comment="openssl-devel-1.0.1e-34.el7_0.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820725" comment="openssl-libs-1.0.1e-34.el7_0.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820726" comment="openssl-perl-1.0.1e-34.el7_0.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820727" comment="openssl-static-1.0.1e-34.el7_0.7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150206" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0206</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0206" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0206" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0206" ref_url="https://www.suse.com/security/cve/CVE-2015-0206" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001410.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0130-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5NKKL36OVJL3XH5PE2LUB3THMPTHPONL/#5NKKL36OVJL3XH5PE2LUB3THMPTHPONL" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1277-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XQAZGF7SIGXMQQGI6UJF7VBAOBYMY5WF/#XQAZGF7SIGXMQQGI6UJF7VBAOBYMY5WF" source="SUSE-SU"/>
    <description>
    Memory leak in the dtls1_buffer_record function in d1_pkt.c in OpenSSL 1.0.0 before 1.0.0p and 1.0.1 before 1.0.1k allows remote attackers to cause a denial of service (memory consumption) by sending many duplicate records for the next epoch, leading to failure of replay detection.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0206/">CVE-2015-0206 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0206">CVE-2015-0206 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/912292">SUSE bug 912292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927623">SUSE bug 927623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937891">SUSE bug 937891</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820723" comment="openssl-1.0.1e-34.el7_0.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820724" comment="openssl-devel-1.0.1e-34.el7_0.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820725" comment="openssl-libs-1.0.1e-34.el7_0.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820726" comment="openssl-perl-1.0.1e-34.el7_0.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820727" comment="openssl-static-1.0.1e-34.el7_0.7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150209" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0209</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0209" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0209" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0209" ref_url="https://www.suse.com/security/cve/CVE-2015-0209" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0545-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0546-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0553-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001307.html" source="SUSE-SU"/>
		<reference ref_id="TID7016336" ref_url="https://www.suse.com/support/kb/doc/?id=7016336" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1277-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XQAZGF7SIGXMQQGI6UJF7VBAOBYMY5WF/#XQAZGF7SIGXMQQGI6UJF7VBAOBYMY5WF" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C5ZZO44NS35G5NQFFXUERK5DXLTQN534/#C5ZZO44NS35G5NQFFXUERK5DXLTQN534" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the d2i_ECPrivateKey function in crypto/ec/ec_asn1.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a might allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via a malformed Elliptic Curve (EC) private-key file that is improperly handled during import.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-04-13"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0209/">CVE-2015-0209 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0209">CVE-2015-0209 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/912014">SUSE bug 912014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919648">SUSE bug 919648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936586">SUSE bug 936586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937891">SUSE bug 937891</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820918" comment="openssl-1.0.1e-42.el7_1.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820919" comment="openssl-devel-1.0.1e-42.el7_1.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820920" comment="openssl-libs-1.0.1e-42.el7_1.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820921" comment="openssl-perl-1.0.1e-42.el7_1.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820922" comment="openssl-static-1.0.1e-42.el7_1.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150231" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0231</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0231" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0231" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0231" ref_url="https://www.suse.com/security/cve/CVE-2015-0231" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0365-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1638-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002131.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the process_nested_data function in ext/standard/var_unserializer.re in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5 allows remote attackers to execute arbitrary code via a crafted unserialize call that leverages improper handling of duplicate numerical keys within the serialized properties of an object.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-8142.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-26"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0231/">CVE-2015-0231 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0231">CVE-2015-0231 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/910659">SUSE bug 910659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924972">SUSE bug 924972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992991">SUSE bug 992991</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821089" comment="php-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821090" comment="php-bcmath-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821091" comment="php-cli-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821092" comment="php-common-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821093" comment="php-dba-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821094" comment="php-devel-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821095" comment="php-embedded-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821096" comment="php-enchant-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821097" comment="php-fpm-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821098" comment="php-gd-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821099" comment="php-intl-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821100" comment="php-ldap-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821101" comment="php-mbstring-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821102" comment="php-mysql-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821103" comment="php-mysqlnd-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821104" comment="php-odbc-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821105" comment="php-pdo-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821106" comment="php-pgsql-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821107" comment="php-process-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821108" comment="php-pspell-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821109" comment="php-recode-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821110" comment="php-snmp-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821111" comment="php-soap-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821112" comment="php-xml-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821113" comment="php-xmlrpc-5.4.16-36.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150232" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0232</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0232" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0232" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0232" ref_url="https://www.suse.com/security/cve/CVE-2015-0232" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0365-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1638-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002131.html" source="SUSE-SU"/>
    <description>
    The exif_process_unicode function in ext/exif/exif.c in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5 allows remote attackers to execute arbitrary code or cause a denial of service (uninitialized pointer free and application crash) via crafted EXIF data in a JPEG image.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0232/">CVE-2015-0232 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0232">CVE-2015-0232 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/914690">SUSE bug 914690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992991">SUSE bug 992991</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821089" comment="php-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821090" comment="php-bcmath-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821091" comment="php-cli-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821092" comment="php-common-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821093" comment="php-dba-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821094" comment="php-devel-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821095" comment="php-embedded-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821096" comment="php-enchant-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821097" comment="php-fpm-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821098" comment="php-gd-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821099" comment="php-intl-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821100" comment="php-ldap-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821101" comment="php-mbstring-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821102" comment="php-mysql-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821103" comment="php-mysqlnd-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821104" comment="php-odbc-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821105" comment="php-pdo-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821106" comment="php-pgsql-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821107" comment="php-process-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821108" comment="php-pspell-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821109" comment="php-recode-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821110" comment="php-snmp-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821111" comment="php-soap-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821112" comment="php-xml-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821113" comment="php-xmlrpc-5.4.16-36.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150235" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0235</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0235" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0235" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0235" ref_url="https://www.suse.com/security/cve/CVE-2015-0235" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001186.html" source="SUSE-SU"/>
		<reference ref_id="TID7010867" ref_url="https://www.suse.com/support/kb/doc/?id=7010867" source="SUSE-SU"/>
		<reference ref_id="TID7016113" ref_url="https://www.suse.com/support/kb/doc?id=7016113" source="SUSE-SU"/>
		<reference ref_id="TID7016115" ref_url="https://www.suse.com/support/kb/doc/?id=7016115" source="SUSE-SU"/>
		<reference ref_id="TID7016118" ref_url="https://www.suse.com/support/kb/doc/?id=7016118" source="SUSE-SU"/>
		<reference ref_id="TID7016147" ref_url="https://www.suse.com/support/kb/doc/?id=7016147" source="SUSE-SU"/>
		<reference ref_id="TID7016171" ref_url="https://www.suse.com/support/kb/doc/?id=7016171" source="SUSE-SU"/>
		<reference ref_id="TID7016215" ref_url="https://www.suse.com/support/kb/doc/?id=7016215" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0184-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KCD4BRTH3J7GIHFTVJQCWIPPWANT5G2R/#KCD4BRTH3J7GIHFTVJQCWIPPWANT5G2R" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the __nss_hostname_digits_dots function in glibc 2.2, and other 2.x versions before 2.18, allows context-dependent attackers to execute arbitrary code via vectors related to the (1) gethostbyname or (2) gethostbyname2 function, aka "GHOST."
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0235/">CVE-2015-0235 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0235">CVE-2015-0235 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/844309">SUSE bug 844309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913646">SUSE bug 913646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949238">SUSE bug 949238</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954983">SUSE bug 954983</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820744" comment="glibc-2.17-55.el7_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820745" comment="glibc-common-2.17-55.el7_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820746" comment="glibc-devel-2.17-55.el7_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820747" comment="glibc-headers-2.17-55.el7_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820748" comment="glibc-static-2.17-55.el7_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820749" comment="glibc-utils-2.17-55.el7_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820750" comment="nscd-2.17-55.el7_0.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150236" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0236</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0236" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0236" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0236" ref_url="https://www.suse.com/security/cve/CVE-2015-0236" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0304-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001840.html" source="SUSE-SU"/>
    <description>
    libvirt before 1.2.12 allow remote authenticated users to obtain the VNC password by using the VIR_DOMAIN_XML_SECURE flag with a crafted (1) snapshot to the virDomainSnapshotGetXMLDesc interface or (2) image to the virDomainSaveImageGetXMLDesc interface.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0236/">CVE-2015-0236 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0236">CVE-2015-0236 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/914693">SUSE bug 914693</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820826" comment="libvirt-1.2.8-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820827" comment="libvirt-client-1.2.8-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820828" comment="libvirt-daemon-1.2.8-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820829" comment="libvirt-daemon-config-network-1.2.8-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820830" comment="libvirt-daemon-config-nwfilter-1.2.8-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820831" comment="libvirt-daemon-driver-interface-1.2.8-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820832" comment="libvirt-daemon-driver-lxc-1.2.8-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820833" comment="libvirt-daemon-driver-network-1.2.8-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820834" comment="libvirt-daemon-driver-nodedev-1.2.8-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820835" comment="libvirt-daemon-driver-nwfilter-1.2.8-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820836" comment="libvirt-daemon-driver-qemu-1.2.8-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820837" comment="libvirt-daemon-driver-secret-1.2.8-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820838" comment="libvirt-daemon-driver-storage-1.2.8-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820839" comment="libvirt-daemon-kvm-1.2.8-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820840" comment="libvirt-daemon-lxc-1.2.8-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820841" comment="libvirt-devel-1.2.8-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820842" comment="libvirt-docs-1.2.8-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820843" comment="libvirt-lock-sanlock-1.2.8-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820844" comment="libvirt-login-shell-1.2.8-16.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150239" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0239</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0239" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0239" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0239" ref_url="https://www.suse.com/security/cve/CVE-2015-0239" source="SUSE CVE"/>
    <description>
    The em_sysenter function in arch/x86/kvm/emulate.c in the Linux kernel before 3.18.5, when the guest OS lacks SYSENTER MSR initialization, allows guest OS users to gain guest OS privileges or cause a denial of service (guest OS crash) by triggering use of a 16-bit code segment for emulation of a SYSENTER instruction.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0239/">CVE-2015-0239 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0239">CVE-2015-0239 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/987709">SUSE bug 987709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994618">SUSE bug 994618</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821413" comment="kernel-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821414" comment="kernel-abi-whitelists-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821415" comment="kernel-debug-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821418" comment="kernel-doc-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821419" comment="kernel-headers-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821420" comment="kernel-tools-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821421" comment="kernel-tools-libs-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821423" comment="perf-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821424" comment="python-perf-3.10.0-327.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150240" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0240</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0240" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0240" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0240" ref_url="https://www.suse.com/security/cve/CVE-2015-0240" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001256.html" source="SUSE-SU"/>
		<reference ref_id="TID7014420" ref_url="https://www.suse.com/support/kb/doc/?id=7014420" source="SUSE-SU"/>
		<reference ref_id="TID7016875" ref_url="https://www.suse.com/support/kb/doc/?id=7016875" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0375-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ARVZ4YEG7D674GEVFGU2OB4JRWGIN63C/#ARVZ4YEG7D674GEVFGU2OB4JRWGIN63C" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1064-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/B7VW7SOZTMI4RQKFXAOX457XVPBRHQR3/#B7VW7SOZTMI4RQKFXAOX457XVPBRHQR3" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1106-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6BJWKRWY53KC46JMOYJSXTBEZC3KCJRV/#6BJWKRWY53KC46JMOYJSXTBEZC3KCJRV" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1107-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M3WNN5WVCJIGH6DFBT26M6LTZ7KM54R7/#M3WNN5WVCJIGH6DFBT26M6LTZ7KM54R7" source="SUSE-SU"/>
    <description>
    The Netlogon server implementation in smbd in Samba 3.5.x and 3.6.x before 3.6.25, 4.0.x before 4.0.25, 4.1.x before 4.1.17, and 4.2.x before 4.2.0rc5 performs a free operation on an uninitialized stack pointer, which allows remote attackers to execute arbitrary code via crafted Netlogon packets that use the ServerPasswordSet RPC API, as demonstrated by packets reaching the _netr_ServerPasswordSet function in rpc_server/netlogon/srv_netlog_nt.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0240/">CVE-2015-0240 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0240">CVE-2015-0240 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/917376">SUSE bug 917376</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820784" comment="libsmbclient-4.1.1-38.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820785" comment="libsmbclient-devel-4.1.1-38.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820786" comment="libwbclient-4.1.1-38.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820787" comment="libwbclient-devel-4.1.1-38.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820788" comment="samba-4.1.1-38.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820789" comment="samba-client-4.1.1-38.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820790" comment="samba-common-4.1.1-38.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820791" comment="samba-dc-4.1.1-38.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820792" comment="samba-dc-libs-4.1.1-38.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820793" comment="samba-devel-4.1.1-38.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820794" comment="samba-libs-4.1.1-38.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820795" comment="samba-pidl-4.1.1-38.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820796" comment="samba-python-4.1.1-38.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820797" comment="samba-test-4.1.1-38.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820798" comment="samba-test-devel-4.1.1-38.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820799" comment="samba-vfs-glusterfs-4.1.1-38.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820800" comment="samba-winbind-4.1.1-38.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820801" comment="samba-winbind-clients-4.1.1-38.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820802" comment="samba-winbind-krb5-locator-4.1.1-38.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820803" comment="samba-winbind-modules-4.1.1-38.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150241" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0241</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0241" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0241" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0241" ref_url="https://www.suse.com/security/cve/CVE-2015-0241" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001321.html" source="SUSE-SU"/>
    <description>
    The to_char function in PostgreSQL before 9.0.19, 9.1.x before 9.1.15, 9.2.x before 9.2.10, 9.3.x before 9.3.6, and 9.4.x before 9.4.1 allows remote authenticated users to cause a denial of service (crash) or possibly execute arbitrary code via a (1) large number of digits when processing a numeric formatting template, which triggers a buffer over-read, or (2) crafted timestamp formatting template, which triggers a buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0241/">CVE-2015-0241 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-0241">CVE-2015-0241 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/916953">SUSE bug 916953</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820948" comment="postgresql-9.2.10-2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820949" comment="postgresql-contrib-9.2.10-2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820950" comment="postgresql-devel-9.2.10-2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820951" comment="postgresql-docs-9.2.10-2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820952" comment="postgresql-libs-9.2.10-2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820953" comment="postgresql-plperl-9.2.10-2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820954" comment="postgresql-plpython-9.2.10-2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820955" comment="postgresql-pltcl-9.2.10-2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820956" comment="postgresql-server-9.2.10-2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820957" comment="postgresql-test-9.2.10-2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820958" comment="postgresql-upgrade-9.2.10-2.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150243" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0243</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0243" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0243" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0243" ref_url="https://www.suse.com/security/cve/CVE-2015-0243" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001321.html" source="SUSE-SU"/>
    <description>
    Multiple buffer overflows in contrib/pgcrypto in PostgreSQL before 9.0.19, 9.1.x before 9.1.15, 9.2.x before 9.2.10, 9.3.x before 9.3.6, and 9.4.x before 9.4.1 allow remote authenticated users to cause a denial of service (crash) and possibly execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0243/">CVE-2015-0243 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-0243">CVE-2015-0243 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/916953">SUSE bug 916953</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820948" comment="postgresql-9.2.10-2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820949" comment="postgresql-contrib-9.2.10-2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820950" comment="postgresql-devel-9.2.10-2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820951" comment="postgresql-docs-9.2.10-2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820952" comment="postgresql-libs-9.2.10-2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820953" comment="postgresql-plperl-9.2.10-2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820954" comment="postgresql-plpython-9.2.10-2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820955" comment="postgresql-pltcl-9.2.10-2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820956" comment="postgresql-server-9.2.10-2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820957" comment="postgresql-test-9.2.10-2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820958" comment="postgresql-upgrade-9.2.10-2.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150244" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0244</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0244" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0244" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0244" ref_url="https://www.suse.com/security/cve/CVE-2015-0244" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001321.html" source="SUSE-SU"/>
    <description>
    PostgreSQL before 9.0.19, 9.1.x before 9.1.15, 9.2.x before 9.2.10, 9.3.x before 9.3.6, and 9.4.x before 9.4.1 does not properly handle errors while reading a protocol message, which allows remote attackers to conduct SQL injection attacks via crafted binary data in a parameter and causing an error, which triggers the loss of synchronization and part of the protocol message to be treated as a new message, as demonstrated by causing a timeout or query cancellation.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0244/">CVE-2015-0244 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-0244">CVE-2015-0244 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/916953">SUSE bug 916953</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820948" comment="postgresql-9.2.10-2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820949" comment="postgresql-contrib-9.2.10-2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820950" comment="postgresql-devel-9.2.10-2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820951" comment="postgresql-docs-9.2.10-2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820952" comment="postgresql-libs-9.2.10-2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820953" comment="postgresql-plperl-9.2.10-2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820954" comment="postgresql-plpython-9.2.10-2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820955" comment="postgresql-pltcl-9.2.10-2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820956" comment="postgresql-server-9.2.10-2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820957" comment="postgresql-test-9.2.10-2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820958" comment="postgresql-upgrade-9.2.10-2.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150248" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0248</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0248" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0248" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0248" ref_url="https://www.suse.com/security/cve/CVE-2015-0248" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0709-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001347.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003142.html" source="SUSE-SU"/>
    <description>
    The (1) mod_dav_svn and (2) svnserve servers in Subversion 1.6.0 through 1.7.19 and 1.8.0 through 1.8.11 allow remote attackers to cause a denial of service (assertion failure and abort) via crafted parameter combinations related to dynamically evaluated revision numbers.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0248/">CVE-2015-0248 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0248">CVE-2015-0248 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/923794">SUSE bug 923794</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821276" comment="mod_dav_svn-1.7.14-7.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821277" comment="subversion-1.7.14-7.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821278" comment="subversion-devel-1.7.14-7.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821279" comment="subversion-gnome-1.7.14-7.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821280" comment="subversion-javahl-1.7.14-7.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821281" comment="subversion-kde-1.7.14-7.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821282" comment="subversion-libs-1.7.14-7.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821283" comment="subversion-perl-1.7.14-7.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821284" comment="subversion-python-1.7.14-7.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821285" comment="subversion-ruby-1.7.14-7.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821286" comment="subversion-tools-1.7.14-7.el7_1.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150251" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0251</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0251" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0251" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0251" ref_url="https://www.suse.com/security/cve/CVE-2015-0251" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0709-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001347.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003142.html" source="SUSE-SU"/>
    <description>
    The mod_dav_svn server in Subversion 1.5.0 through 1.7.19 and 1.8.0 through 1.8.11 allows remote authenticated users to spoof the svn:author property via a crafted v1 HTTP protocol request sequences.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0251/">CVE-2015-0251 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0251">CVE-2015-0251 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/923795">SUSE bug 923795</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821276" comment="mod_dav_svn-1.7.14-7.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821277" comment="subversion-1.7.14-7.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821278" comment="subversion-devel-1.7.14-7.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821279" comment="subversion-gnome-1.7.14-7.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821280" comment="subversion-javahl-1.7.14-7.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821281" comment="subversion-kde-1.7.14-7.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821282" comment="subversion-libs-1.7.14-7.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821283" comment="subversion-perl-1.7.14-7.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821284" comment="subversion-python-1.7.14-7.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821285" comment="subversion-ruby-1.7.14-7.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821286" comment="subversion-tools-1.7.14-7.el7_1.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150252" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0252</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0252" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0252" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0252" ref_url="https://www.suse.com/security/cve/CVE-2015-0252" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001316.html" source="SUSE-SU"/>
		<reference ref_id="TID7021300" ref_url="https://www.suse.com/support/kb/doc/?id=7021300" source="SUSE-SU"/>
    <description>
    internal/XMLReader.cpp in Apache Xerces-C before 3.1.2 allows remote attackers to cause a denial of service (segmentation fault and crash) via crafted XML data.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0252/">CVE-2015-0252 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0252">CVE-2015-0252 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/920810">SUSE bug 920810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821135" comment="xerces-c-3.1.1-7.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821136" comment="xerces-c-devel-3.1.1-7.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821137" comment="xerces-c-doc-3.1.1-7.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150254" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0254</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0254" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0254" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0254" ref_url="https://www.suse.com/security/cve/CVE-2015-0254" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1568-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1701-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002984.html" source="SUSE-SU"/>
    <description>
    Apache Standard Taglibs before 1.2.3 allows remote attackers to execute arbitrary code or conduct external XML entity (XXE) attacks via a crafted XSLT extension in a (1) &lt;x:parse&gt; or (2) &lt;x:transform&gt; JSTL XML tag.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0254/">CVE-2015-0254 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0254">CVE-2015-0254 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/920813">SUSE bug 920813</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821253" comment="jakarta-taglibs-standard-1.1.2-14.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821254" comment="jakarta-taglibs-standard-javadoc-1.1.2-14.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150255" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0255</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0255" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0255" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0255" ref_url="https://www.suse.com/security/cve/CVE-2015-0255" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0400-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0402-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0403-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0427-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001403.html" source="SUSE-SU"/>
		<reference ref_id="TID7016170" ref_url="https://www.suse.com/support/kb/doc/?id=7016170" source="SUSE-SU"/>
		<reference ref_id="TID7021676" ref_url="https://www.suse.com/support/kb/doc/?id=7021676" source="SUSE-SU"/>
		<reference ref_id="TID7021743" ref_url="https://www.suse.com/support/kb/doc/?id=7021743" source="SUSE-SU"/>
		<reference ref_id="TID7021744" ref_url="https://www.suse.com/support/kb/doc/?id=7021744" source="SUSE-SU"/>
		<reference ref_id="TID7021823" ref_url="https://www.suse.com/support/kb/doc/?id=7021823" source="SUSE-SU"/>
    <description>
    X.Org Server (aka xserver and xorg-server) before 1.16.3 and 1.17.x before 1.17.1 allows remote attackers to obtain sensitive information from process memory or cause a denial of service (crash) via a crafted string length value in a XkbSetGeometry request.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0255/">CVE-2015-0255 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0255">CVE-2015-0255 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/915810">SUSE bug 915810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820966" comment="xorg-x11-server-Xdmx-1.15.0-33.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820967" comment="xorg-x11-server-Xephyr-1.15.0-33.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820968" comment="xorg-x11-server-Xnest-1.15.0-33.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820969" comment="xorg-x11-server-Xorg-1.15.0-33.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820970" comment="xorg-x11-server-Xvfb-1.15.0-33.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820971" comment="xorg-x11-server-common-1.15.0-33.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820972" comment="xorg-x11-server-devel-1.15.0-33.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820973" comment="xorg-x11-server-source-1.15.0-33.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150261" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0261</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0261" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0261" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0261" ref_url="https://www.suse.com/security/cve/CVE-2015-0261" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
    <description>
    Integer signedness error in the mobility_opt_print function in the IPv6 mobility printer in tcpdump before 4.7.2 allows remote attackers to cause a denial of service (out-of-bounds read and crash) or possibly execute arbitrary code via a negative length value.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0261/">CVE-2015-0261 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0261">CVE-2015-0261 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/922220">SUSE bug 922220</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823301" comment="tcpdump-4.9.0-5.el7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150267" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0267</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0267" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0267" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0267" ref_url="https://www.suse.com/security/cve/CVE-2015-0267" source="SUSE CVE"/>
    <description>
    The Red Hat module-setup.sh script for kexec-tools, as distributed in the kexec-tools before 2.0.7-19 packages in Red Hat Enterprise Linux, allows local users to write to arbitrary files via a symlink attack on a temporary file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0267/">CVE-2015-0267 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0267">CVE-2015-0267 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821008" comment="kexec-tools-2.0.7-19.el7_1.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821009" comment="kexec-tools-anaconda-addon-2.0.7-19.el7_1.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821010" comment="kexec-tools-eppic-2.0.7-19.el7_1.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150272" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0272</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0272" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0272" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0272" ref_url="https://www.suse.com/security/cve/CVE-2015-0272" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002207.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1842-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/52CT3NPGIEFS3FRUZ5D6HC6XZML63T2K/#52CT3NPGIEFS3FRUZ5D6HC6XZML63T2K" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OC7663UNXLKFWJKPITRGQNF4FU4KJWNK/#OC7663UNXLKFWJKPITRGQNF4FU4KJWNK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M3DY3J73NZK532BN4KZEFFGULVYJU3D2/#M3DY3J73NZK532BN4KZEFFGULVYJU3D2" source="SUSE-SU"/>
    <description>
    GNOME NetworkManager allows remote attackers to cause a denial of service (IPv6 traffic disruption) via a crafted MTU value in an IPv6 Router Advertisement (RA) message, a different vulnerability than CVE-2015-8215.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-09-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0272/">CVE-2015-0272 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0272">CVE-2015-0272 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1020452">SUSE bug 1020452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944296">SUSE bug 944296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951638">SUSE bug 951638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955354">SUSE bug 955354</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821478" comment="ModemManager-1.1.0-8.git20130913.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821479" comment="ModemManager-devel-1.1.0-8.git20130913.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821480" comment="ModemManager-glib-1.1.0-8.git20130913.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821481" comment="ModemManager-glib-devel-1.1.0-8.git20130913.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821482" comment="ModemManager-vala-1.1.0-8.git20130913.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821483" comment="NetworkManager-1.0.6-27.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821484" comment="NetworkManager-adsl-1.0.6-27.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821485" comment="NetworkManager-bluetooth-1.0.6-27.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821486" comment="NetworkManager-config-routing-rules-1.0.6-27.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821487" comment="NetworkManager-config-server-1.0.6-27.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821488" comment="NetworkManager-devel-1.0.6-27.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821489" comment="NetworkManager-glib-1.0.6-27.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821490" comment="NetworkManager-glib-devel-1.0.6-27.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821491" comment="NetworkManager-libnm-1.0.6-27.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821492" comment="NetworkManager-libnm-devel-1.0.6-27.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821493" comment="NetworkManager-libreswan-1.0.6-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821494" comment="NetworkManager-libreswan-gnome-1.0.6-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821495" comment="NetworkManager-team-1.0.6-27.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821496" comment="NetworkManager-tui-1.0.6-27.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821497" comment="NetworkManager-wifi-1.0.6-27.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821498" comment="NetworkManager-wwan-1.0.6-27.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821499" comment="libnm-gtk-1.0.6-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821500" comment="libnm-gtk-devel-1.0.6-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821501" comment="network-manager-applet-1.0.6-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821502" comment="nm-connection-editor-1.0.6-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150273" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0273</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0273" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0273" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0273" ref_url="https://www.suse.com/security/cve/CVE-2015-0273" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1638-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002131.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0440-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7UWLWNAUAI5ODEZUEBZACY7QXKCARUK3/#7UWLWNAUAI5ODEZUEBZACY7QXKCARUK3" source="SUSE-SU"/>
    <description>
    Multiple use-after-free vulnerabilities in ext/date/php_date.c in PHP before 5.4.38, 5.5.x before 5.5.22, and 5.6.x before 5.6.6 allow remote attackers to execute arbitrary code via crafted serialized input containing a (1) R or (2) r type specifier in (a) DateTimeZone data handled by the php_date_timezone_initialize_from_hash function or (b) DateTime data handled by the php_date_initialize_from_hash function.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0273/">CVE-2015-0273 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0273">CVE-2015-0273 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/917302">SUSE bug 917302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918768">SUSE bug 918768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821089" comment="php-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821090" comment="php-bcmath-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821091" comment="php-cli-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821092" comment="php-common-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821093" comment="php-dba-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821094" comment="php-devel-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821095" comment="php-embedded-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821096" comment="php-enchant-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821097" comment="php-fpm-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821098" comment="php-gd-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821099" comment="php-intl-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821100" comment="php-ldap-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821101" comment="php-mbstring-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821102" comment="php-mysql-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821103" comment="php-mysqlnd-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821104" comment="php-odbc-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821105" comment="php-pdo-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821106" comment="php-pgsql-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821107" comment="php-process-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821108" comment="php-pspell-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821109" comment="php-recode-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821110" comment="php-snmp-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821111" comment="php-soap-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821112" comment="php-xml-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821113" comment="php-xmlrpc-5.4.16-36.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150274" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0274</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0274" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0274" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0274" ref_url="https://www.suse.com/security/cve/CVE-2015-0274" source="SUSE CVE"/>
    <description>
    The XFS implementation in the Linux kernel before 3.15 improperly uses an old size value during remote attribute replacement, which allows local users to cause a denial of service (transaction overrun and data corruption) or possibly gain privileges by leveraging XFS filesystem access.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0274/">CVE-2015-0274 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0274">CVE-2015-0274 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/919655">SUSE bug 919655</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820807" comment="kernel-3.10.0-229.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820808" comment="kernel-abi-whitelists-3.10.0-229.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820809" comment="kernel-debug-3.10.0-229.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820812" comment="kernel-doc-3.10.0-229.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820813" comment="kernel-headers-3.10.0-229.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820814" comment="kernel-tools-3.10.0-229.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820815" comment="kernel-tools-libs-3.10.0-229.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820817" comment="perf-3.10.0-229.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820818" comment="python-perf-3.10.0-229.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150275" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0275</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0275" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0275" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0275" ref_url="https://www.suse.com/security/cve/CVE-2015-0275" source="SUSE CVE"/>
    <description>
    The ext4_zero_range function in fs/ext4/extents.c in the Linux kernel before 4.1 allows local users to cause a denial of service (BUG) via a crafted fallocate zero-range request.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0275/">CVE-2015-0275 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0275">CVE-2015-0275 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/919032">SUSE bug 919032</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821287" comment="kernel-3.10.0-229.14.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821288" comment="kernel-abi-whitelists-3.10.0-229.14.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821289" comment="kernel-debug-3.10.0-229.14.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821292" comment="kernel-doc-3.10.0-229.14.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821293" comment="kernel-headers-3.10.0-229.14.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821294" comment="kernel-tools-3.10.0-229.14.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821295" comment="kernel-tools-libs-3.10.0-229.14.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821297" comment="perf-3.10.0-229.14.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821298" comment="python-perf-3.10.0-229.14.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150283" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0283</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0283" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0283" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0283" ref_url="https://www.suse.com/security/cve/CVE-2015-0283" source="SUSE CVE"/>
    <description>
    The slapi-nis plug-in before 0.54.2 does not properly reallocate memory when processing user accounts, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a request for a (1) group with a large number of members or (2) user that belongs to a large number of groups.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0283/">CVE-2015-0283 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0283">CVE-2015-0283 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820936" comment="ipa-admintools-4.1.0-18.el7_1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820937" comment="ipa-client-4.1.0-18.el7_1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820938" comment="ipa-python-4.1.0-18.el7_1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820939" comment="ipa-server-4.1.0-18.el7_1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820940" comment="ipa-server-trust-ad-4.1.0-18.el7_1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820941" comment="slapi-nis-0.54-3.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150286" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0286</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0286" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0286" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0286" ref_url="https://www.suse.com/security/cve/CVE-2015-0286" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0545-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0546-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0547-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0553-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001307.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001739.html" source="SUSE-SU"/>
		<reference ref_id="TID7016336" ref_url="https://www.suse.com/support/kb/doc/?id=7016336" source="SUSE-SU"/>
		<reference ref_id="TID7021977" ref_url="https://www.suse.com/support/kb/doc/?id=7021977" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1277-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XQAZGF7SIGXMQQGI6UJF7VBAOBYMY5WF/#XQAZGF7SIGXMQQGI6UJF7VBAOBYMY5WF" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2243-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CG5LJLU356KG55PZAGA4KDAMICLY5O5L/#CG5LJLU356KG55PZAGA4KDAMICLY5O5L" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C5ZZO44NS35G5NQFFXUERK5DXLTQN534/#C5ZZO44NS35G5NQFFXUERK5DXLTQN534" source="SUSE-SU"/>
    <description>
    The ASN1_TYPE_cmp function in crypto/asn1/a_type.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a does not properly perform boolean-type comparisons, which allows remote attackers to cause a denial of service (invalid read operation and application crash) via a crafted X.509 certificate to an endpoint that uses the certificate-verification feature.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-04-13"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0286/">CVE-2015-0286 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0286">CVE-2015-0286 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/912014">SUSE bug 912014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919648">SUSE bug 919648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922496">SUSE bug 922496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936586">SUSE bug 936586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937891">SUSE bug 937891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820918" comment="openssl-1.0.1e-42.el7_1.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820919" comment="openssl-devel-1.0.1e-42.el7_1.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820920" comment="openssl-libs-1.0.1e-42.el7_1.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820921" comment="openssl-perl-1.0.1e-42.el7_1.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820922" comment="openssl-static-1.0.1e-42.el7_1.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150287" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0287</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0287" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0287" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0287" ref_url="https://www.suse.com/security/cve/CVE-2015-0287" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2015:1411-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2015-August/003340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2015:1412-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2015-August/003341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2015:1469-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2015-September/003386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2015:1477-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2015-September/003394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0545-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0546-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0547-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0553-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001307.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1410-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001915.html" source="SUSE-SU"/>
		<reference ref_id="TID7016336" ref_url="https://www.suse.com/support/kb/doc/?id=7016336" source="SUSE-SU"/>
		<reference ref_id="TID7021977" ref_url="https://www.suse.com/support/kb/doc/?id=7021977" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1277-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XQAZGF7SIGXMQQGI6UJF7VBAOBYMY5WF/#XQAZGF7SIGXMQQGI6UJF7VBAOBYMY5WF" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C5ZZO44NS35G5NQFFXUERK5DXLTQN534/#C5ZZO44NS35G5NQFFXUERK5DXLTQN534" source="SUSE-SU"/>
    <description>
    The ASN1_item_ex_d2i function in crypto/asn1/tasn_dec.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a does not reinitialize CHOICE and ADB data structures, which might allow attackers to cause a denial of service (invalid write operation and memory corruption) by leveraging an application that relies on ASN.1 structure reuse.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-04-13"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0287/">CVE-2015-0287 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0287">CVE-2015-0287 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/912014">SUSE bug 912014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919648">SUSE bug 919648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922499">SUSE bug 922499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936586">SUSE bug 936586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937891">SUSE bug 937891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968888">SUSE bug 968888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991722">SUSE bug 991722</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820918" comment="openssl-1.0.1e-42.el7_1.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820919" comment="openssl-devel-1.0.1e-42.el7_1.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820920" comment="openssl-libs-1.0.1e-42.el7_1.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820921" comment="openssl-perl-1.0.1e-42.el7_1.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820922" comment="openssl-static-1.0.1e-42.el7_1.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150288" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0288</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0288" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0288" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0288" ref_url="https://www.suse.com/security/cve/CVE-2015-0288" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0545-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0546-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0547-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0553-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001307.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001739.html" source="SUSE-SU"/>
		<reference ref_id="TID7016336" ref_url="https://www.suse.com/support/kb/doc/?id=7016336" source="SUSE-SU"/>
		<reference ref_id="TID7021977" ref_url="https://www.suse.com/support/kb/doc/?id=7021977" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1277-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XQAZGF7SIGXMQQGI6UJF7VBAOBYMY5WF/#XQAZGF7SIGXMQQGI6UJF7VBAOBYMY5WF" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2243-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CG5LJLU356KG55PZAGA4KDAMICLY5O5L/#CG5LJLU356KG55PZAGA4KDAMICLY5O5L" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C5ZZO44NS35G5NQFFXUERK5DXLTQN534/#C5ZZO44NS35G5NQFFXUERK5DXLTQN534" source="SUSE-SU"/>
    <description>
    The X509_to_X509_REQ function in crypto/x509/x509_req.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a might allow attackers to cause a denial of service (NULL pointer dereference and application crash) via an invalid certificate key.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-04-13"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0288/">CVE-2015-0288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0288">CVE-2015-0288 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/912014">SUSE bug 912014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919648">SUSE bug 919648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920236">SUSE bug 920236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936586">SUSE bug 936586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937891">SUSE bug 937891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820918" comment="openssl-1.0.1e-42.el7_1.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820919" comment="openssl-devel-1.0.1e-42.el7_1.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820920" comment="openssl-libs-1.0.1e-42.el7_1.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820921" comment="openssl-perl-1.0.1e-42.el7_1.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820922" comment="openssl-static-1.0.1e-42.el7_1.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150289" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0289</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0289" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0289" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0289" ref_url="https://www.suse.com/security/cve/CVE-2015-0289" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0545-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0546-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0547-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0553-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001307.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001312.html" source="SUSE-SU"/>
		<reference ref_id="TID3426981" ref_url="https://www.suse.com/support/kb/doc/?id=3426981" source="SUSE-SU"/>
		<reference ref_id="TID7016336" ref_url="https://www.suse.com/support/kb/doc/?id=7016336" source="SUSE-SU"/>
		<reference ref_id="TID7021279" ref_url="https://www.suse.com/support/kb/doc/?id=7021279" source="SUSE-SU"/>
		<reference ref_id="TID7021518" ref_url="https://www.suse.com/support/kb/doc/?id=7021518" source="SUSE-SU"/>
		<reference ref_id="TID7021676" ref_url="https://www.suse.com/support/kb/doc/?id=7021676" source="SUSE-SU"/>
		<reference ref_id="TID7021714" ref_url="https://www.suse.com/support/kb/doc/?id=7021714" source="SUSE-SU"/>
		<reference ref_id="TID7021743" ref_url="https://www.suse.com/support/kb/doc/?id=7021743" source="SUSE-SU"/>
		<reference ref_id="TID7021744" ref_url="https://www.suse.com/support/kb/doc/?id=7021744" source="SUSE-SU"/>
		<reference ref_id="TID7021848" ref_url="https://www.suse.com/support/kb/doc/?id=7021848" source="SUSE-SU"/>
		<reference ref_id="TID7021863" ref_url="https://www.suse.com/support/kb/doc/?id=7021863" source="SUSE-SU"/>
		<reference ref_id="TID7021977" ref_url="https://www.suse.com/support/kb/doc/?id=7021977" source="SUSE-SU"/>
		<reference ref_id="TID7021993" ref_url="https://www.suse.com/support/kb/doc/?id=7021993" source="SUSE-SU"/>
		<reference ref_id="TID7021994" ref_url="https://www.suse.com/support/kb/doc/?id=7021994" source="SUSE-SU"/>
		<reference ref_id="TID7021995" ref_url="https://www.suse.com/support/kb/doc/?id=7021995" source="SUSE-SU"/>
		<reference ref_id="TID7022095" ref_url="https://www.suse.com/support/kb/doc/?id=7022095" source="SUSE-SU"/>
		<reference ref_id="TID7022096" ref_url="https://www.suse.com/support/kb/doc/?id=7022096" source="SUSE-SU"/>
		<reference ref_id="TID7022102" ref_url="https://www.suse.com/support/kb/doc/?id=7022102" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1277-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XQAZGF7SIGXMQQGI6UJF7VBAOBYMY5WF/#XQAZGF7SIGXMQQGI6UJF7VBAOBYMY5WF" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C5ZZO44NS35G5NQFFXUERK5DXLTQN534/#C5ZZO44NS35G5NQFFXUERK5DXLTQN534" source="SUSE-SU"/>
    <description>
    The PKCS#7 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a does not properly handle a lack of outer ContentInfo, which allows attackers to cause a denial of service (NULL pointer dereference and application crash) by leveraging an application that processes arbitrary PKCS#7 data and providing malformed data with ASN.1 encoding, related to crypto/pkcs7/pk7_doit.c and crypto/pkcs7/pk7_lib.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-04-13"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0289/">CVE-2015-0289 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0289">CVE-2015-0289 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/912014">SUSE bug 912014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919648">SUSE bug 919648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922500">SUSE bug 922500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936586">SUSE bug 936586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937891">SUSE bug 937891</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820918" comment="openssl-1.0.1e-42.el7_1.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820919" comment="openssl-devel-1.0.1e-42.el7_1.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820920" comment="openssl-libs-1.0.1e-42.el7_1.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820921" comment="openssl-perl-1.0.1e-42.el7_1.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820922" comment="openssl-static-1.0.1e-42.el7_1.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150292" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0292</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0292" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0292" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0292" ref_url="https://www.suse.com/security/cve/CVE-2015-0292" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0545-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0546-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0547-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0553-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001307.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001312.html" source="SUSE-SU"/>
		<reference ref_id="TID3426981" ref_url="https://www.suse.com/support/kb/doc/?id=3426981" source="SUSE-SU"/>
		<reference ref_id="TID7016336" ref_url="https://www.suse.com/support/kb/doc/?id=7016336" source="SUSE-SU"/>
		<reference ref_id="TID7021279" ref_url="https://www.suse.com/support/kb/doc/?id=7021279" source="SUSE-SU"/>
		<reference ref_id="TID7021518" ref_url="https://www.suse.com/support/kb/doc/?id=7021518" source="SUSE-SU"/>
		<reference ref_id="TID7021676" ref_url="https://www.suse.com/support/kb/doc/?id=7021676" source="SUSE-SU"/>
		<reference ref_id="TID7021714" ref_url="https://www.suse.com/support/kb/doc/?id=7021714" source="SUSE-SU"/>
		<reference ref_id="TID7021743" ref_url="https://www.suse.com/support/kb/doc/?id=7021743" source="SUSE-SU"/>
		<reference ref_id="TID7021744" ref_url="https://www.suse.com/support/kb/doc/?id=7021744" source="SUSE-SU"/>
		<reference ref_id="TID7021848" ref_url="https://www.suse.com/support/kb/doc/?id=7021848" source="SUSE-SU"/>
		<reference ref_id="TID7021863" ref_url="https://www.suse.com/support/kb/doc/?id=7021863" source="SUSE-SU"/>
		<reference ref_id="TID7021977" ref_url="https://www.suse.com/support/kb/doc/?id=7021977" source="SUSE-SU"/>
		<reference ref_id="TID7021993" ref_url="https://www.suse.com/support/kb/doc/?id=7021993" source="SUSE-SU"/>
		<reference ref_id="TID7021994" ref_url="https://www.suse.com/support/kb/doc/?id=7021994" source="SUSE-SU"/>
		<reference ref_id="TID7021995" ref_url="https://www.suse.com/support/kb/doc/?id=7021995" source="SUSE-SU"/>
		<reference ref_id="TID7022095" ref_url="https://www.suse.com/support/kb/doc/?id=7022095" source="SUSE-SU"/>
		<reference ref_id="TID7022096" ref_url="https://www.suse.com/support/kb/doc/?id=7022096" source="SUSE-SU"/>
		<reference ref_id="TID7022102" ref_url="https://www.suse.com/support/kb/doc/?id=7022102" source="SUSE-SU"/>
    <description>
    Integer underflow in the EVP_DecodeUpdate function in crypto/evp/encode.c in the base64-decoding implementation in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via crafted base64 data that triggers a buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-04-13"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0292/">CVE-2015-0292 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0292">CVE-2015-0292 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/912014">SUSE bug 912014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919648">SUSE bug 919648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922501">SUSE bug 922501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936586">SUSE bug 936586</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820918" comment="openssl-1.0.1e-42.el7_1.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820919" comment="openssl-devel-1.0.1e-42.el7_1.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820920" comment="openssl-libs-1.0.1e-42.el7_1.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820921" comment="openssl-perl-1.0.1e-42.el7_1.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820922" comment="openssl-static-1.0.1e-42.el7_1.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150293" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0293</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0293" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0293" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0293" ref_url="https://www.suse.com/security/cve/CVE-2015-0293" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0545-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0546-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0547-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0553-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001307.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002014.html" source="SUSE-SU"/>
		<reference ref_id="TID3426981" ref_url="https://www.suse.com/support/kb/doc/?id=3426981" source="SUSE-SU"/>
		<reference ref_id="TID7016336" ref_url="https://www.suse.com/support/kb/doc/?id=7016336" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0628-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PRZS7YRGBNMMNA7AOZICYXH6FDRHX57D/#PRZS7YRGBNMMNA7AOZICYXH6FDRHX57D" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0637-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/732C2WZF6MGNUGO3W3NVEM4POAHDFAKP/#732C2WZF6MGNUGO3W3NVEM4POAHDFAKP" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0638-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SCGIR2QPTXC36KQPVGJ7ILLZTTUN4LVQ/#SCGIR2QPTXC36KQPVGJ7ILLZTTUN4LVQ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C5ZZO44NS35G5NQFFXUERK5DXLTQN534/#C5ZZO44NS35G5NQFFXUERK5DXLTQN534" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0720-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EYE22ZU64KWEPJSQY75BXN2QAW2RIMF7/#EYE22ZU64KWEPJSQY75BXN2QAW2RIMF7" source="SUSE-SU"/>
    <description>
    The SSLv2 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (s2_lib.c assertion failure and daemon exit) via a crafted CLIENT-MASTER-KEY message.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-04-13"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0293/">CVE-2015-0293 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0293">CVE-2015-0293 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/912014">SUSE bug 912014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919648">SUSE bug 919648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922488">SUSE bug 922488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936586">SUSE bug 936586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968044">SUSE bug 968044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968051">SUSE bug 968051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968053">SUSE bug 968053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986238">SUSE bug 986238</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821840" comment="openssl098e-0.9.8e-29.el7_2.3 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820918" comment="openssl-1.0.1e-42.el7_1.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820919" comment="openssl-devel-1.0.1e-42.el7_1.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820920" comment="openssl-libs-1.0.1e-42.el7_1.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820921" comment="openssl-perl-1.0.1e-42.el7_1.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820922" comment="openssl-static-1.0.1e-42.el7_1.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821840" comment="openssl098e-0.9.8e-29.el7_2.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150374" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0374</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0374" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0374" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0374" ref_url="https://www.suse.com/security/cve/CVE-2015-0374" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001353.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1216-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KHOOMDUPEQLMQZN7JRZIBDKGHYJ2TBKQ/#KHOOMDUPEQLMQZN7JRZIBDKGHYJ2TBKQ" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier and 5.6.21 and earlier allows remote authenticated users to affect confidentiality via unknown vectors related to Server : Security : Privileges : Foreign Key.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0374/">CVE-2015-0374 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0374">CVE-2015-0374 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/914058">SUSE bug 914058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915911">SUSE bug 915911</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820765" comment="mariadb-5.5.41-2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820766" comment="mariadb-bench-5.5.41-2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820767" comment="mariadb-devel-5.5.41-2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820768" comment="mariadb-embedded-5.5.41-2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820769" comment="mariadb-embedded-devel-5.5.41-2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820770" comment="mariadb-libs-5.5.41-2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820771" comment="mariadb-server-5.5.41-2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820772" comment="mariadb-test-5.5.41-2.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150381" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0381</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0381" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0381" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0381" ref_url="https://www.suse.com/security/cve/CVE-2015-0381" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001353.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1216-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KHOOMDUPEQLMQZN7JRZIBDKGHYJ2TBKQ/#KHOOMDUPEQLMQZN7JRZIBDKGHYJ2TBKQ" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier and 5.6.21 and earlier allows remote attackers to affect availability via unknown vectors related to Server : Replication, a different vulnerability than CVE-2015-0382.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0381/">CVE-2015-0381 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0381">CVE-2015-0381 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/914058">SUSE bug 914058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915911">SUSE bug 915911</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820765" comment="mariadb-5.5.41-2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820766" comment="mariadb-bench-5.5.41-2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820767" comment="mariadb-devel-5.5.41-2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820768" comment="mariadb-embedded-5.5.41-2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820769" comment="mariadb-embedded-devel-5.5.41-2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820770" comment="mariadb-libs-5.5.41-2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820771" comment="mariadb-server-5.5.41-2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820772" comment="mariadb-test-5.5.41-2.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150382" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0382</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0382" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0382" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0382" ref_url="https://www.suse.com/security/cve/CVE-2015-0382" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001353.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1216-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KHOOMDUPEQLMQZN7JRZIBDKGHYJ2TBKQ/#KHOOMDUPEQLMQZN7JRZIBDKGHYJ2TBKQ" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier and 5.6.21 and earlier allows remote attackers to affect availability via unknown vectors related to Server : Replication, a different vulnerability than CVE-2015-0381.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0382/">CVE-2015-0382 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0382">CVE-2015-0382 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/914058">SUSE bug 914058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915911">SUSE bug 915911</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820765" comment="mariadb-5.5.41-2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820766" comment="mariadb-bench-5.5.41-2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820767" comment="mariadb-devel-5.5.41-2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820768" comment="mariadb-embedded-5.5.41-2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820769" comment="mariadb-embedded-devel-5.5.41-2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820770" comment="mariadb-libs-5.5.41-2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820771" comment="mariadb-server-5.5.41-2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820772" comment="mariadb-test-5.5.41-2.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150383" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0383</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0383" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0383" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0383" ref_url="https://www.suse.com/security/cve/CVE-2015-0383" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001288.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0190-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QOHQUN3Q5MDA4SIFFIRNOJI5I5UILUJP/#QOHQUN3Q5MDA4SIFFIRNOJI5I5UILUJP" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u75, 6u85, 7u72, and 8u25; Java SE Embedded 7u71 and 8u6; and JRockit R27.8.4 and R28.3.4 allows local users to affect integrity and availability via unknown vectors related to Hotspot.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0383/">CVE-2015-0383 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0383">CVE-2015-0383 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/914041">SUSE bug 914041</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820739" comment="java-1.6.0-openjdk-1.6.0.34-1.13.6.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820740" comment="java-1.6.0-openjdk-demo-1.6.0.34-1.13.6.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820741" comment="java-1.6.0-openjdk-devel-1.6.0.34-1.13.6.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820742" comment="java-1.6.0-openjdk-javadoc-1.6.0.34-1.13.6.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820743" comment="java-1.6.0-openjdk-src-1.6.0.34-1.13.6.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820728" comment="java-1.7.0-openjdk-1.7.0.75-2.5.4.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820729" comment="java-1.7.0-openjdk-accessibility-1.7.0.75-2.5.4.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820730" comment="java-1.7.0-openjdk-demo-1.7.0.75-2.5.4.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820731" comment="java-1.7.0-openjdk-devel-1.7.0.75-2.5.4.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820732" comment="java-1.7.0-openjdk-headless-1.7.0.75-2.5.4.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820733" comment="java-1.7.0-openjdk-javadoc-1.7.0.75-2.5.4.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820734" comment="java-1.7.0-openjdk-src-1.7.0.75-2.5.4.2.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150391" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0391</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0391" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0391" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0391" ref_url="https://www.suse.com/security/cve/CVE-2015-0391" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001353.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier, and 5.6.19 and earlier, allows remote authenticated users to affect availability via vectors related to DDL.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0391/">CVE-2015-0391 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0391">CVE-2015-0391 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/914058">SUSE bug 914058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915913">SUSE bug 915913</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820765" comment="mariadb-5.5.41-2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820766" comment="mariadb-bench-5.5.41-2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820767" comment="mariadb-devel-5.5.41-2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820768" comment="mariadb-embedded-5.5.41-2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820769" comment="mariadb-embedded-devel-5.5.41-2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820770" comment="mariadb-libs-5.5.41-2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820771" comment="mariadb-server-5.5.41-2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820772" comment="mariadb-test-5.5.41-2.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150395" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0395</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0395" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0395" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0395" ref_url="https://www.suse.com/security/cve/CVE-2015-0395" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001288.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0190-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QOHQUN3Q5MDA4SIFFIRNOJI5I5UILUJP/#QOHQUN3Q5MDA4SIFFIRNOJI5I5UILUJP" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u75, 6u85, 7u72, and 8u25 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Hotspot.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0395/">CVE-2015-0395 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0395">CVE-2015-0395 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/914041">SUSE bug 914041</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820739" comment="java-1.6.0-openjdk-1.6.0.34-1.13.6.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820740" comment="java-1.6.0-openjdk-demo-1.6.0.34-1.13.6.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820741" comment="java-1.6.0-openjdk-devel-1.6.0.34-1.13.6.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820742" comment="java-1.6.0-openjdk-javadoc-1.6.0.34-1.13.6.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820743" comment="java-1.6.0-openjdk-src-1.6.0.34-1.13.6.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820728" comment="java-1.7.0-openjdk-1.7.0.75-2.5.4.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820729" comment="java-1.7.0-openjdk-accessibility-1.7.0.75-2.5.4.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820730" comment="java-1.7.0-openjdk-demo-1.7.0.75-2.5.4.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820731" comment="java-1.7.0-openjdk-devel-1.7.0.75-2.5.4.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820732" comment="java-1.7.0-openjdk-headless-1.7.0.75-2.5.4.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820733" comment="java-1.7.0-openjdk-javadoc-1.7.0.75-2.5.4.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820734" comment="java-1.7.0-openjdk-src-1.7.0.75-2.5.4.2.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150407" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0407</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0407" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0407" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0407" ref_url="https://www.suse.com/security/cve/CVE-2015-0407" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001288.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0190-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QOHQUN3Q5MDA4SIFFIRNOJI5I5UILUJP/#QOHQUN3Q5MDA4SIFFIRNOJI5I5UILUJP" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u75, 6u85, 7u72, and 8u25 allows remote attackers to affect confidentiality via unknown vectors related to Swing.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0407/">CVE-2015-0407 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0407">CVE-2015-0407 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/914041">SUSE bug 914041</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820739" comment="java-1.6.0-openjdk-1.6.0.34-1.13.6.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820740" comment="java-1.6.0-openjdk-demo-1.6.0.34-1.13.6.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820741" comment="java-1.6.0-openjdk-devel-1.6.0.34-1.13.6.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820742" comment="java-1.6.0-openjdk-javadoc-1.6.0.34-1.13.6.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820743" comment="java-1.6.0-openjdk-src-1.6.0.34-1.13.6.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820728" comment="java-1.7.0-openjdk-1.7.0.75-2.5.4.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820729" comment="java-1.7.0-openjdk-accessibility-1.7.0.75-2.5.4.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820730" comment="java-1.7.0-openjdk-demo-1.7.0.75-2.5.4.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820731" comment="java-1.7.0-openjdk-devel-1.7.0.75-2.5.4.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820732" comment="java-1.7.0-openjdk-headless-1.7.0.75-2.5.4.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820733" comment="java-1.7.0-openjdk-javadoc-1.7.0.75-2.5.4.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820734" comment="java-1.7.0-openjdk-src-1.7.0.75-2.5.4.2.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150408" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0408</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0408" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0408" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0408" ref_url="https://www.suse.com/security/cve/CVE-2015-0408" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001288.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0190-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QOHQUN3Q5MDA4SIFFIRNOJI5I5UILUJP/#QOHQUN3Q5MDA4SIFFIRNOJI5I5UILUJP" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u75, 6u85, 7u72, and 8u25 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to RMI.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0408/">CVE-2015-0408 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0408">CVE-2015-0408 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/914041">SUSE bug 914041</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820739" comment="java-1.6.0-openjdk-1.6.0.34-1.13.6.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820740" comment="java-1.6.0-openjdk-demo-1.6.0.34-1.13.6.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820741" comment="java-1.6.0-openjdk-devel-1.6.0.34-1.13.6.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820742" comment="java-1.6.0-openjdk-javadoc-1.6.0.34-1.13.6.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820743" comment="java-1.6.0-openjdk-src-1.6.0.34-1.13.6.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820728" comment="java-1.7.0-openjdk-1.7.0.75-2.5.4.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820729" comment="java-1.7.0-openjdk-accessibility-1.7.0.75-2.5.4.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820730" comment="java-1.7.0-openjdk-demo-1.7.0.75-2.5.4.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820731" comment="java-1.7.0-openjdk-devel-1.7.0.75-2.5.4.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820732" comment="java-1.7.0-openjdk-headless-1.7.0.75-2.5.4.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820733" comment="java-1.7.0-openjdk-javadoc-1.7.0.75-2.5.4.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820734" comment="java-1.7.0-openjdk-src-1.7.0.75-2.5.4.2.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150410" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0410</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0410" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0410" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0410" ref_url="https://www.suse.com/security/cve/CVE-2015-0410" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001288.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0190-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QOHQUN3Q5MDA4SIFFIRNOJI5I5UILUJP/#QOHQUN3Q5MDA4SIFFIRNOJI5I5UILUJP" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java SE, Java SE Embedded, JRockit component in Oracle Java SE 5.0u75, 6u85, 7u72, and 8u25; Java SE Embedded 7u71 and 8u6; and JRockit R27.8.4 and R28.3.4 allows remote attackers to affect availability via unknown vectors related to Security.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0410/">CVE-2015-0410 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0410">CVE-2015-0410 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/914041">SUSE bug 914041</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820739" comment="java-1.6.0-openjdk-1.6.0.34-1.13.6.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820740" comment="java-1.6.0-openjdk-demo-1.6.0.34-1.13.6.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820741" comment="java-1.6.0-openjdk-devel-1.6.0.34-1.13.6.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820742" comment="java-1.6.0-openjdk-javadoc-1.6.0.34-1.13.6.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820743" comment="java-1.6.0-openjdk-src-1.6.0.34-1.13.6.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820728" comment="java-1.7.0-openjdk-1.7.0.75-2.5.4.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820729" comment="java-1.7.0-openjdk-accessibility-1.7.0.75-2.5.4.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820730" comment="java-1.7.0-openjdk-demo-1.7.0.75-2.5.4.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820731" comment="java-1.7.0-openjdk-devel-1.7.0.75-2.5.4.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820732" comment="java-1.7.0-openjdk-headless-1.7.0.75-2.5.4.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820733" comment="java-1.7.0-openjdk-javadoc-1.7.0.75-2.5.4.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820734" comment="java-1.7.0-openjdk-src-1.7.0.75-2.5.4.2.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150411" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0411</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0411" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0411" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0411" ref_url="https://www.suse.com/security/cve/CVE-2015-0411" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001353.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1216-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KHOOMDUPEQLMQZN7JRZIBDKGHYJ2TBKQ/#KHOOMDUPEQLMQZN7JRZIBDKGHYJ2TBKQ" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier, and 5.6.21 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Server : Security : Encryption.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0411/">CVE-2015-0411 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0411">CVE-2015-0411 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/914058">SUSE bug 914058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915911">SUSE bug 915911</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820765" comment="mariadb-5.5.41-2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820766" comment="mariadb-bench-5.5.41-2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820767" comment="mariadb-devel-5.5.41-2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820768" comment="mariadb-embedded-5.5.41-2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820769" comment="mariadb-embedded-devel-5.5.41-2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820770" comment="mariadb-libs-5.5.41-2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820771" comment="mariadb-server-5.5.41-2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820772" comment="mariadb-test-5.5.41-2.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150412" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0412</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0412" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0412" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0412" ref_url="https://www.suse.com/security/cve/CVE-2015-0412" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001288.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0190-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QOHQUN3Q5MDA4SIFFIRNOJI5I5UILUJP/#QOHQUN3Q5MDA4SIFFIRNOJI5I5UILUJP" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u85, 7u72, and 8u25 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JAX-WS.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0412/">CVE-2015-0412 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0412">CVE-2015-0412 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/914041">SUSE bug 914041</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820739" comment="java-1.6.0-openjdk-1.6.0.34-1.13.6.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820740" comment="java-1.6.0-openjdk-demo-1.6.0.34-1.13.6.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820741" comment="java-1.6.0-openjdk-devel-1.6.0.34-1.13.6.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820742" comment="java-1.6.0-openjdk-javadoc-1.6.0.34-1.13.6.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820743" comment="java-1.6.0-openjdk-src-1.6.0.34-1.13.6.1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820728" comment="java-1.7.0-openjdk-1.7.0.75-2.5.4.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820729" comment="java-1.7.0-openjdk-accessibility-1.7.0.75-2.5.4.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820730" comment="java-1.7.0-openjdk-demo-1.7.0.75-2.5.4.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820731" comment="java-1.7.0-openjdk-devel-1.7.0.75-2.5.4.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820732" comment="java-1.7.0-openjdk-headless-1.7.0.75-2.5.4.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820733" comment="java-1.7.0-openjdk-javadoc-1.7.0.75-2.5.4.2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820734" comment="java-1.7.0-openjdk-src-1.7.0.75-2.5.4.2.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150432" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0432</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0432" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0432" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0432" ref_url="https://www.suse.com/security/cve/CVE-2015-0432" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001353.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1216-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KHOOMDUPEQLMQZN7JRZIBDKGHYJ2TBKQ/#KHOOMDUPEQLMQZN7JRZIBDKGHYJ2TBKQ" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier allows remote authenticated users to affect availability via vectors related to Server : InnoDB : DDL : Foreign Key.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0432/">CVE-2015-0432 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0432">CVE-2015-0432 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/914058">SUSE bug 914058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915911">SUSE bug 915911</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820765" comment="mariadb-5.5.41-2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820766" comment="mariadb-bench-5.5.41-2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820767" comment="mariadb-devel-5.5.41-2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820768" comment="mariadb-embedded-5.5.41-2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820769" comment="mariadb-embedded-devel-5.5.41-2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820770" comment="mariadb-libs-5.5.41-2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820771" comment="mariadb-server-5.5.41-2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820772" comment="mariadb-test-5.5.41-2.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150433" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0433</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0433" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0433" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0433" ref_url="https://www.suse.com/security/cve/CVE-2015-0433" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001410.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001504.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1216-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KHOOMDUPEQLMQZN7JRZIBDKGHYJ2TBKQ/#KHOOMDUPEQLMQZN7JRZIBDKGHYJ2TBKQ" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.41 and earlier, and 5.6.22 and earlier, allows remote authenticated users to affect availability via vectors related to InnoDB : DML.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0433/">CVE-2015-0433 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0433">CVE-2015-0433 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/927623">SUSE bug 927623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936409">SUSE bug 936409</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821233" comment="mariadb-5.5.44-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821234" comment="mariadb-bench-5.5.44-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821235" comment="mariadb-devel-5.5.44-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821236" comment="mariadb-embedded-5.5.44-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821237" comment="mariadb-embedded-devel-5.5.44-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821238" comment="mariadb-libs-5.5.44-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821239" comment="mariadb-server-5.5.44-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821240" comment="mariadb-test-5.5.44-1.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150441" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0441</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0441" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0441" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0441" ref_url="https://www.suse.com/security/cve/CVE-2015-0441" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001410.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001504.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1216-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KHOOMDUPEQLMQZN7JRZIBDKGHYJ2TBKQ/#KHOOMDUPEQLMQZN7JRZIBDKGHYJ2TBKQ" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.41 and earlier, and 5.6.22 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : Security : Encryption.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0441/">CVE-2015-0441 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0441">CVE-2015-0441 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/927623">SUSE bug 927623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936409">SUSE bug 936409</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821233" comment="mariadb-5.5.44-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821234" comment="mariadb-bench-5.5.44-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821235" comment="mariadb-devel-5.5.44-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821236" comment="mariadb-embedded-5.5.44-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821237" comment="mariadb-embedded-devel-5.5.44-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821238" comment="mariadb-libs-5.5.44-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821239" comment="mariadb-server-5.5.44-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821240" comment="mariadb-test-5.5.44-1.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150460" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0460</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0460" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0460" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0460" ref_url="https://www.suse.com/security/cve/CVE-2015-0460" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001371.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0773-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/THZZK6HNI76NCUFUDOZ2AFXSSGSFNOQG/#THZZK6HNI76NCUFUDOZ2AFXSSGSFNOQG" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0774-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SXGX44IBE6EJMJBY2UWFB37WB45NBHIZ/#SXGX44IBE6EJMJBY2UWFB37WB45NBHIZ" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u81, 6u91, 7u76, and 8u40 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Hotspot.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0460/">CVE-2015-0460 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0460">CVE-2015-0460 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/927591">SUSE bug 927591</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820981" comment="java-1.6.0-openjdk-1.6.0.35-1.13.7.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820982" comment="java-1.6.0-openjdk-demo-1.6.0.35-1.13.7.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820983" comment="java-1.6.0-openjdk-devel-1.6.0.35-1.13.7.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820984" comment="java-1.6.0-openjdk-javadoc-1.6.0.35-1.13.7.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820985" comment="java-1.6.0-openjdk-src-1.6.0.35-1.13.7.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820974" comment="java-1.7.0-openjdk-1.7.0.79-2.5.5.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820975" comment="java-1.7.0-openjdk-accessibility-1.7.0.79-2.5.5.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820976" comment="java-1.7.0-openjdk-demo-1.7.0.79-2.5.5.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820977" comment="java-1.7.0-openjdk-devel-1.7.0.79-2.5.5.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820978" comment="java-1.7.0-openjdk-headless-1.7.0.79-2.5.5.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820979" comment="java-1.7.0-openjdk-javadoc-1.7.0.79-2.5.5.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820980" comment="java-1.7.0-openjdk-src-1.7.0.79-2.5.5.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820986" comment="java-1.8.0-openjdk-1.8.0.45-30.b13.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820987" comment="java-1.8.0-openjdk-accessibility-1.8.0.45-30.b13.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820988" comment="java-1.8.0-openjdk-demo-1.8.0.45-30.b13.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820989" comment="java-1.8.0-openjdk-devel-1.8.0.45-30.b13.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820990" comment="java-1.8.0-openjdk-headless-1.8.0.45-30.b13.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820991" comment="java-1.8.0-openjdk-javadoc-1.8.0.45-30.b13.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820992" comment="java-1.8.0-openjdk-src-1.8.0.45-30.b13.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150469" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0469</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0469" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0469" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0469" ref_url="https://www.suse.com/security/cve/CVE-2015-0469" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-4" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001721.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0773-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/THZZK6HNI76NCUFUDOZ2AFXSSGSFNOQG/#THZZK6HNI76NCUFUDOZ2AFXSSGSFNOQG" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0774-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SXGX44IBE6EJMJBY2UWFB37WB45NBHIZ/#SXGX44IBE6EJMJBY2UWFB37WB45NBHIZ" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u81, 6u91, 7u76, and 8u40 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0469/">CVE-2015-0469 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0469">CVE-2015-0469 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/927591">SUSE bug 927591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932310">SUSE bug 932310</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820981" comment="java-1.6.0-openjdk-1.6.0.35-1.13.7.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820982" comment="java-1.6.0-openjdk-demo-1.6.0.35-1.13.7.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820983" comment="java-1.6.0-openjdk-devel-1.6.0.35-1.13.7.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820984" comment="java-1.6.0-openjdk-javadoc-1.6.0.35-1.13.7.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820985" comment="java-1.6.0-openjdk-src-1.6.0.35-1.13.7.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820974" comment="java-1.7.0-openjdk-1.7.0.79-2.5.5.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820975" comment="java-1.7.0-openjdk-accessibility-1.7.0.79-2.5.5.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820976" comment="java-1.7.0-openjdk-demo-1.7.0.79-2.5.5.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820977" comment="java-1.7.0-openjdk-devel-1.7.0.79-2.5.5.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820978" comment="java-1.7.0-openjdk-headless-1.7.0.79-2.5.5.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820979" comment="java-1.7.0-openjdk-javadoc-1.7.0.79-2.5.5.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820980" comment="java-1.7.0-openjdk-src-1.7.0.79-2.5.5.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820986" comment="java-1.8.0-openjdk-1.8.0.45-30.b13.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820987" comment="java-1.8.0-openjdk-accessibility-1.8.0.45-30.b13.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820988" comment="java-1.8.0-openjdk-demo-1.8.0.45-30.b13.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820989" comment="java-1.8.0-openjdk-devel-1.8.0.45-30.b13.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820990" comment="java-1.8.0-openjdk-headless-1.8.0.45-30.b13.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820991" comment="java-1.8.0-openjdk-javadoc-1.8.0.45-30.b13.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820992" comment="java-1.8.0-openjdk-src-1.8.0.45-30.b13.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150470" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0470</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0470" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0470" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0470" ref_url="https://www.suse.com/security/cve/CVE-2015-0470" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2015:0773-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/THZZK6HNI76NCUFUDOZ2AFXSSGSFNOQG/#THZZK6HNI76NCUFUDOZ2AFXSSGSFNOQG" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 8u40 allows remote attackers to affect integrity via unknown vectors related to Hotspot.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0470/">CVE-2015-0470 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0470">CVE-2015-0470 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/927591">SUSE bug 927591</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820986" comment="java-1.8.0-openjdk-1.8.0.45-30.b13.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820987" comment="java-1.8.0-openjdk-accessibility-1.8.0.45-30.b13.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820988" comment="java-1.8.0-openjdk-demo-1.8.0.45-30.b13.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820989" comment="java-1.8.0-openjdk-devel-1.8.0.45-30.b13.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820990" comment="java-1.8.0-openjdk-headless-1.8.0.45-30.b13.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820991" comment="java-1.8.0-openjdk-javadoc-1.8.0.45-30.b13.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820992" comment="java-1.8.0-openjdk-src-1.8.0.45-30.b13.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150477" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0477</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0477" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0477" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0477" ref_url="https://www.suse.com/security/cve/CVE-2015-0477" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-4" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001721.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0773-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/THZZK6HNI76NCUFUDOZ2AFXSSGSFNOQG/#THZZK6HNI76NCUFUDOZ2AFXSSGSFNOQG" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0774-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SXGX44IBE6EJMJBY2UWFB37WB45NBHIZ/#SXGX44IBE6EJMJBY2UWFB37WB45NBHIZ" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u81, 6u91, 7u76, and 8u40 allows remote attackers to affect integrity via unknown vectors related to Beans.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0477/">CVE-2015-0477 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0477">CVE-2015-0477 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/927591">SUSE bug 927591</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820981" comment="java-1.6.0-openjdk-1.6.0.35-1.13.7.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820982" comment="java-1.6.0-openjdk-demo-1.6.0.35-1.13.7.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820983" comment="java-1.6.0-openjdk-devel-1.6.0.35-1.13.7.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820984" comment="java-1.6.0-openjdk-javadoc-1.6.0.35-1.13.7.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820985" comment="java-1.6.0-openjdk-src-1.6.0.35-1.13.7.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820974" comment="java-1.7.0-openjdk-1.7.0.79-2.5.5.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820975" comment="java-1.7.0-openjdk-accessibility-1.7.0.79-2.5.5.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820976" comment="java-1.7.0-openjdk-demo-1.7.0.79-2.5.5.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820977" comment="java-1.7.0-openjdk-devel-1.7.0.79-2.5.5.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820978" comment="java-1.7.0-openjdk-headless-1.7.0.79-2.5.5.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820979" comment="java-1.7.0-openjdk-javadoc-1.7.0.79-2.5.5.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820980" comment="java-1.7.0-openjdk-src-1.7.0.79-2.5.5.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820986" comment="java-1.8.0-openjdk-1.8.0.45-30.b13.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820987" comment="java-1.8.0-openjdk-accessibility-1.8.0.45-30.b13.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820988" comment="java-1.8.0-openjdk-demo-1.8.0.45-30.b13.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820989" comment="java-1.8.0-openjdk-devel-1.8.0.45-30.b13.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820990" comment="java-1.8.0-openjdk-headless-1.8.0.45-30.b13.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820991" comment="java-1.8.0-openjdk-javadoc-1.8.0.45-30.b13.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820992" comment="java-1.8.0-openjdk-src-1.8.0.45-30.b13.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150478" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0478</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0478" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0478" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0478" ref_url="https://www.suse.com/security/cve/CVE-2015-0478" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-4" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001721.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0773-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/THZZK6HNI76NCUFUDOZ2AFXSSGSFNOQG/#THZZK6HNI76NCUFUDOZ2AFXSSGSFNOQG" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0774-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SXGX44IBE6EJMJBY2UWFB37WB45NBHIZ/#SXGX44IBE6EJMJBY2UWFB37WB45NBHIZ" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u81, 6u91, 7u76, and 8u40, and JRockit R28.3.5, allows remote attackers to affect confidentiality via vectors related to JCE.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0478/">CVE-2015-0478 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0478">CVE-2015-0478 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/927591">SUSE bug 927591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944456">SUSE bug 944456</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820981" comment="java-1.6.0-openjdk-1.6.0.35-1.13.7.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820982" comment="java-1.6.0-openjdk-demo-1.6.0.35-1.13.7.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820983" comment="java-1.6.0-openjdk-devel-1.6.0.35-1.13.7.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820984" comment="java-1.6.0-openjdk-javadoc-1.6.0.35-1.13.7.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820985" comment="java-1.6.0-openjdk-src-1.6.0.35-1.13.7.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820974" comment="java-1.7.0-openjdk-1.7.0.79-2.5.5.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820975" comment="java-1.7.0-openjdk-accessibility-1.7.0.79-2.5.5.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820976" comment="java-1.7.0-openjdk-demo-1.7.0.79-2.5.5.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820977" comment="java-1.7.0-openjdk-devel-1.7.0.79-2.5.5.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820978" comment="java-1.7.0-openjdk-headless-1.7.0.79-2.5.5.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820979" comment="java-1.7.0-openjdk-javadoc-1.7.0.79-2.5.5.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820980" comment="java-1.7.0-openjdk-src-1.7.0.79-2.5.5.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820986" comment="java-1.8.0-openjdk-1.8.0.45-30.b13.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820987" comment="java-1.8.0-openjdk-accessibility-1.8.0.45-30.b13.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820988" comment="java-1.8.0-openjdk-demo-1.8.0.45-30.b13.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820989" comment="java-1.8.0-openjdk-devel-1.8.0.45-30.b13.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820990" comment="java-1.8.0-openjdk-headless-1.8.0.45-30.b13.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820991" comment="java-1.8.0-openjdk-javadoc-1.8.0.45-30.b13.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820992" comment="java-1.8.0-openjdk-src-1.8.0.45-30.b13.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150480" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0480</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0480" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0480" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0480" ref_url="https://www.suse.com/security/cve/CVE-2015-0480" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-4" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001721.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0773-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/THZZK6HNI76NCUFUDOZ2AFXSSGSFNOQG/#THZZK6HNI76NCUFUDOZ2AFXSSGSFNOQG" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0774-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SXGX44IBE6EJMJBY2UWFB37WB45NBHIZ/#SXGX44IBE6EJMJBY2UWFB37WB45NBHIZ" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u81, 6u91, 7u76, and 8u40 allows remote attackers to affect integrity and availability via unknown vectors related to Tools.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0480/">CVE-2015-0480 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0480">CVE-2015-0480 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/927591">SUSE bug 927591</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820981" comment="java-1.6.0-openjdk-1.6.0.35-1.13.7.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820982" comment="java-1.6.0-openjdk-demo-1.6.0.35-1.13.7.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820983" comment="java-1.6.0-openjdk-devel-1.6.0.35-1.13.7.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820984" comment="java-1.6.0-openjdk-javadoc-1.6.0.35-1.13.7.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820985" comment="java-1.6.0-openjdk-src-1.6.0.35-1.13.7.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820974" comment="java-1.7.0-openjdk-1.7.0.79-2.5.5.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820975" comment="java-1.7.0-openjdk-accessibility-1.7.0.79-2.5.5.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820976" comment="java-1.7.0-openjdk-demo-1.7.0.79-2.5.5.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820977" comment="java-1.7.0-openjdk-devel-1.7.0.79-2.5.5.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820978" comment="java-1.7.0-openjdk-headless-1.7.0.79-2.5.5.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820979" comment="java-1.7.0-openjdk-javadoc-1.7.0.79-2.5.5.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820980" comment="java-1.7.0-openjdk-src-1.7.0.79-2.5.5.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820986" comment="java-1.8.0-openjdk-1.8.0.45-30.b13.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820987" comment="java-1.8.0-openjdk-accessibility-1.8.0.45-30.b13.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820988" comment="java-1.8.0-openjdk-demo-1.8.0.45-30.b13.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820989" comment="java-1.8.0-openjdk-devel-1.8.0.45-30.b13.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820990" comment="java-1.8.0-openjdk-headless-1.8.0.45-30.b13.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820991" comment="java-1.8.0-openjdk-javadoc-1.8.0.45-30.b13.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820992" comment="java-1.8.0-openjdk-src-1.8.0.45-30.b13.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150488" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0488</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0488" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0488" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0488" ref_url="https://www.suse.com/security/cve/CVE-2015-0488" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-4" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001721.html" source="SUSE-SU"/>
		<reference ref_id="TID7021823" ref_url="https://www.suse.com/support/kb/doc/?id=7021823" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0773-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/THZZK6HNI76NCUFUDOZ2AFXSSGSFNOQG/#THZZK6HNI76NCUFUDOZ2AFXSSGSFNOQG" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0774-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SXGX44IBE6EJMJBY2UWFB37WB45NBHIZ/#SXGX44IBE6EJMJBY2UWFB37WB45NBHIZ" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u81, 6u91, 7u76, and 8u40, and JRockit R28.3.5, allows remote attackers to affect availability via vectors related to JSSE.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0488/">CVE-2015-0488 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0488">CVE-2015-0488 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/927591">SUSE bug 927591</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820981" comment="java-1.6.0-openjdk-1.6.0.35-1.13.7.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820982" comment="java-1.6.0-openjdk-demo-1.6.0.35-1.13.7.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820983" comment="java-1.6.0-openjdk-devel-1.6.0.35-1.13.7.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820984" comment="java-1.6.0-openjdk-javadoc-1.6.0.35-1.13.7.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820985" comment="java-1.6.0-openjdk-src-1.6.0.35-1.13.7.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820974" comment="java-1.7.0-openjdk-1.7.0.79-2.5.5.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820975" comment="java-1.7.0-openjdk-accessibility-1.7.0.79-2.5.5.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820976" comment="java-1.7.0-openjdk-demo-1.7.0.79-2.5.5.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820977" comment="java-1.7.0-openjdk-devel-1.7.0.79-2.5.5.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820978" comment="java-1.7.0-openjdk-headless-1.7.0.79-2.5.5.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820979" comment="java-1.7.0-openjdk-javadoc-1.7.0.79-2.5.5.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820980" comment="java-1.7.0-openjdk-src-1.7.0.79-2.5.5.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820986" comment="java-1.8.0-openjdk-1.8.0.45-30.b13.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820987" comment="java-1.8.0-openjdk-accessibility-1.8.0.45-30.b13.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820988" comment="java-1.8.0-openjdk-demo-1.8.0.45-30.b13.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820989" comment="java-1.8.0-openjdk-devel-1.8.0.45-30.b13.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820990" comment="java-1.8.0-openjdk-headless-1.8.0.45-30.b13.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820991" comment="java-1.8.0-openjdk-javadoc-1.8.0.45-30.b13.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820992" comment="java-1.8.0-openjdk-src-1.8.0.45-30.b13.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150499" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0499</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0499" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0499" ref_url="https://www.suse.com/security/cve/CVE-2015-0499" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001410.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001504.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1216-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KHOOMDUPEQLMQZN7JRZIBDKGHYJ2TBKQ/#KHOOMDUPEQLMQZN7JRZIBDKGHYJ2TBKQ" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.42 and earlier, and 5.6.23 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : Federated.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0499/">CVE-2015-0499 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0499">CVE-2015-0499 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/927623">SUSE bug 927623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936408">SUSE bug 936408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821233" comment="mariadb-5.5.44-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821234" comment="mariadb-bench-5.5.44-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821235" comment="mariadb-devel-5.5.44-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821236" comment="mariadb-embedded-5.5.44-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821237" comment="mariadb-embedded-devel-5.5.44-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821238" comment="mariadb-libs-5.5.44-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821239" comment="mariadb-server-5.5.44-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821240" comment="mariadb-test-5.5.44-1.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150501" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0501</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0501" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0501" ref_url="https://www.suse.com/security/cve/CVE-2015-0501" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001410.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001504.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1216-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KHOOMDUPEQLMQZN7JRZIBDKGHYJ2TBKQ/#KHOOMDUPEQLMQZN7JRZIBDKGHYJ2TBKQ" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.42 and earlier, and 5.6.23 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : Compiling.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0501/">CVE-2015-0501 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0501">CVE-2015-0501 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/927623">SUSE bug 927623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936408">SUSE bug 936408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821233" comment="mariadb-5.5.44-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821234" comment="mariadb-bench-5.5.44-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821235" comment="mariadb-devel-5.5.44-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821236" comment="mariadb-embedded-5.5.44-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821237" comment="mariadb-embedded-devel-5.5.44-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821238" comment="mariadb-libs-5.5.44-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821239" comment="mariadb-server-5.5.44-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821240" comment="mariadb-test-5.5.44-1.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150505" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0505</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0505" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0505" ref_url="https://www.suse.com/security/cve/CVE-2015-0505" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001410.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001504.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1216-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KHOOMDUPEQLMQZN7JRZIBDKGHYJ2TBKQ/#KHOOMDUPEQLMQZN7JRZIBDKGHYJ2TBKQ" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.42 and earlier, and 5.6.23 and earlier, allows remote authenticated users to affect availability via vectors related to DDL.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0505/">CVE-2015-0505 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0505">CVE-2015-0505 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/927623">SUSE bug 927623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936408">SUSE bug 936408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821233" comment="mariadb-5.5.44-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821234" comment="mariadb-bench-5.5.44-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821235" comment="mariadb-devel-5.5.44-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821236" comment="mariadb-embedded-5.5.44-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821237" comment="mariadb-embedded-devel-5.5.44-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821238" comment="mariadb-libs-5.5.44-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821239" comment="mariadb-server-5.5.44-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821240" comment="mariadb-test-5.5.44-1.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150562" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0562</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0562" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0562" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0562" ref_url="https://www.suse.com/security/cve/CVE-2015-0562" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0307-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001267.html" source="SUSE-SU"/>
    <description>
    Multiple use-after-free vulnerabilities in epan/dissectors/packet-dec-dnart.c in the DEC DNA Routing Protocol dissector in Wireshark 1.10.x before 1.10.12 and 1.12.x before 1.12.3 allow remote attackers to cause a denial of service (application crash) via a crafted packet, related to the use of packet-scope memory instead of pinfo-scope memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0562/">CVE-2015-0562 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0562">CVE-2015-0562 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/912369">SUSE bug 912369</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821556" comment="wireshark-1.10.14-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821557" comment="wireshark-devel-1.10.14-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821558" comment="wireshark-gnome-1.10.14-7.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150563" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0563</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0563" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0563" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0563" ref_url="https://www.suse.com/security/cve/CVE-2015-0563" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0307-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001267.html" source="SUSE-SU"/>
    <description>
    epan/dissectors/packet-smtp.c in the SMTP dissector in Wireshark 1.10.x before 1.10.12 and 1.12.x before 1.12.3 uses an incorrect length value for certain string-append operations, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0563/">CVE-2015-0563 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0563">CVE-2015-0563 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/912370">SUSE bug 912370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821556" comment="wireshark-1.10.14-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821557" comment="wireshark-devel-1.10.14-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821558" comment="wireshark-gnome-1.10.14-7.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150564" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0564</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0564" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0564" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0564" ref_url="https://www.suse.com/security/cve/CVE-2015-0564" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0307-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001267.html" source="SUSE-SU"/>
    <description>
    Buffer underflow in the ssl_decrypt_record function in epan/dissectors/packet-ssl-utils.c in Wireshark 1.10.x before 1.10.12 and 1.12.x before 1.12.3 allows remote attackers to cause a denial of service (application crash) via a crafted packet that is improperly handled during decryption of an SSL session.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0564/">CVE-2015-0564 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0564">CVE-2015-0564 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/912372">SUSE bug 912372</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821556" comment="wireshark-1.10.14-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821557" comment="wireshark-devel-1.10.14-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821558" comment="wireshark-gnome-1.10.14-7.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0797</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0797" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0797" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0797" ref_url="https://www.suse.com/security/cve/CVE-2015-0797" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0942-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001405.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0978-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001417.html" source="SUSE-SU"/>
    <description>
    GStreamer before 1.4.5, as used in Mozilla Firefox before 38.0, Firefox ESR 31.x before 31.7, and Thunderbird before 31.7 on Linux, allows remote attackers to cause a denial of service (buffer over-read and application crash) or possibly execute arbitrary code via crafted H.264 video data in an m4v file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0797/">CVE-2015-0797 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0797">CVE-2015-0797 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/927559">SUSE bug 927559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930622">SUSE bug 930622</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821023" comment="firefox-38.0-3.el7_1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150801" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0801</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0801" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0801" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0801" ref_url="https://www.suse.com/security/cve/CVE-2015-0801" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0704-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001346.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0677-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XHRW6XH75BVJHXKV4E6J4HKVFQTSMTY7/#XHRW6XH75BVJHXKV4E6J4HKVFQTSMTY7" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0892-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/A7GUOHF2JHZW75JGXTN7WYJAJHAHT6QM/#A7GUOHF2JHZW75JGXTN7WYJAJHAHT6QM" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VNGKNJGYZV377DMZMDSGTC6LXFPDDSY/#5VNGKNJGYZV377DMZMDSGTC6LXFPDDSY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 37.0, Firefox ESR 31.x before 31.6, and Thunderbird before 31.6 allow remote attackers to bypass the Same Origin Policy and execute arbitrary JavaScript code with chrome privileges via vectors involving anchor navigation, a similar issue to CVE-2015-0818.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0801/">CVE-2015-0801 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0801">CVE-2015-0801 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/925368">SUSE bug 925368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925401">SUSE bug 925401</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820959" comment="firefox-31.6.0-2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820960" comment="xulrunner-31.6.0-2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820961" comment="xulrunner-devel-31.6.0-2.el7_1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820959" comment="firefox-31.6.0-2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820965" comment="thunderbird-31.6.0-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820960" comment="xulrunner-31.6.0-2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820961" comment="xulrunner-devel-31.6.0-2.el7_1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150807" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0807</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0807" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0807" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0807" ref_url="https://www.suse.com/security/cve/CVE-2015-0807" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0704-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001346.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0677-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XHRW6XH75BVJHXKV4E6J4HKVFQTSMTY7/#XHRW6XH75BVJHXKV4E6J4HKVFQTSMTY7" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0892-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/A7GUOHF2JHZW75JGXTN7WYJAJHAHT6QM/#A7GUOHF2JHZW75JGXTN7WYJAJHAHT6QM" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VNGKNJGYZV377DMZMDSGTC6LXFPDDSY/#5VNGKNJGYZV377DMZMDSGTC6LXFPDDSY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    The navigator.sendBeacon implementation in Mozilla Firefox before 37.0, Firefox ESR 31.x before 31.6, and Thunderbird before 31.6 processes HTTP 30x status codes for redirects after a preflight request has occurred, which allows remote attackers to bypass intended CORS access-control checks and conduct cross-site request forgery (CSRF) attacks via a crafted web site, a similar issue to CVE-2014-8638.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0807/">CVE-2015-0807 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0807">CVE-2015-0807 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/913068">SUSE bug 913068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925368">SUSE bug 925368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925398">SUSE bug 925398</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820959" comment="firefox-31.6.0-2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820960" comment="xulrunner-31.6.0-2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820961" comment="xulrunner-devel-31.6.0-2.el7_1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820959" comment="firefox-31.6.0-2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820965" comment="thunderbird-31.6.0-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820960" comment="xulrunner-31.6.0-2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820961" comment="xulrunner-devel-31.6.0-2.el7_1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150813" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0813</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0813" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0813" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0813" ref_url="https://www.suse.com/security/cve/CVE-2015-0813" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0704-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001346.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0677-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XHRW6XH75BVJHXKV4E6J4HKVFQTSMTY7/#XHRW6XH75BVJHXKV4E6J4HKVFQTSMTY7" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0892-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/A7GUOHF2JHZW75JGXTN7WYJAJHAHT6QM/#A7GUOHF2JHZW75JGXTN7WYJAJHAHT6QM" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VNGKNJGYZV377DMZMDSGTC6LXFPDDSY/#5VNGKNJGYZV377DMZMDSGTC6LXFPDDSY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the AppendElements function in Mozilla Firefox before 37.0, Firefox ESR 31.x before 31.6, and Thunderbird before 31.6 on Linux, when the Fluendo MP3 plugin for GStreamer is used, allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a crafted MP3 file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0813/">CVE-2015-0813 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0813">CVE-2015-0813 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/925368">SUSE bug 925368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925393">SUSE bug 925393</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820959" comment="firefox-31.6.0-2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820960" comment="xulrunner-31.6.0-2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820961" comment="xulrunner-devel-31.6.0-2.el7_1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820959" comment="firefox-31.6.0-2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820965" comment="thunderbird-31.6.0-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820960" comment="xulrunner-31.6.0-2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820961" comment="xulrunner-devel-31.6.0-2.el7_1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150815" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0815</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0815" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0815" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0815" ref_url="https://www.suse.com/security/cve/CVE-2015-0815" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0704-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001345.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0677-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XHRW6XH75BVJHXKV4E6J4HKVFQTSMTY7/#XHRW6XH75BVJHXKV4E6J4HKVFQTSMTY7" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0892-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/A7GUOHF2JHZW75JGXTN7WYJAJHAHT6QM/#A7GUOHF2JHZW75JGXTN7WYJAJHAHT6QM" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VNGKNJGYZV377DMZMDSGTC6LXFPDDSY/#5VNGKNJGYZV377DMZMDSGTC6LXFPDDSY" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 37.0, Firefox ESR 31.x before 31.6, and Thunderbird before 31.6 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0815/">CVE-2015-0815 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0815">CVE-2015-0815 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/925368">SUSE bug 925368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925392">SUSE bug 925392</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820959" comment="firefox-31.6.0-2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820960" comment="xulrunner-31.6.0-2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820961" comment="xulrunner-devel-31.6.0-2.el7_1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820959" comment="firefox-31.6.0-2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820965" comment="thunderbird-31.6.0-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820960" comment="xulrunner-31.6.0-2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820961" comment="xulrunner-devel-31.6.0-2.el7_1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150816" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0816</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0816" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0816" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0816" ref_url="https://www.suse.com/security/cve/CVE-2015-0816" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0704-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001346.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0677-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XHRW6XH75BVJHXKV4E6J4HKVFQTSMTY7/#XHRW6XH75BVJHXKV4E6J4HKVFQTSMTY7" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0892-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/A7GUOHF2JHZW75JGXTN7WYJAJHAHT6QM/#A7GUOHF2JHZW75JGXTN7WYJAJHAHT6QM" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VNGKNJGYZV377DMZMDSGTC6LXFPDDSY/#5VNGKNJGYZV377DMZMDSGTC6LXFPDDSY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 37.0, Firefox ESR 31.x before 31.6, and Thunderbird before 31.6 do not properly restrict resource: URLs, which makes it easier for remote attackers to execute arbitrary JavaScript code with chrome privileges by leveraging the ability to bypass the Same Origin Policy, as demonstrated by the resource: URL associated with PDF.js.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0816/">CVE-2015-0816 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0816">CVE-2015-0816 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/925368">SUSE bug 925368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925395">SUSE bug 925395</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820959" comment="firefox-31.6.0-2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820960" comment="xulrunner-31.6.0-2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820961" comment="xulrunner-devel-31.6.0-2.el7_1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820959" comment="firefox-31.6.0-2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820965" comment="thunderbird-31.6.0-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820960" comment="xulrunner-31.6.0-2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820961" comment="xulrunner-devel-31.6.0-2.el7_1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0817</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0817" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0817" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0817" ref_url="https://www.suse.com/security/cve/CVE-2015-0817" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0593-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0593-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001320.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0567-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QIB3PEZPIQ7JLEZDN65IY2MX64RP4ZQ3/#QIB3PEZPIQ7JLEZDN65IY2MX64RP4ZQ3" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0607-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BNZIP4V4PYMNTHHC7MLPVFCJSSGRFFH3/#BNZIP4V4PYMNTHHC7MLPVFCJSSGRFFH3" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0636-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FDLHCXTRONHO5LO44ROFN5E7BVRC2ABF/#FDLHCXTRONHO5LO44ROFN5E7BVRC2ABF" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    The asm.js implementation in Mozilla Firefox before 36.0.3, Firefox ESR 31.x before 31.5.2, and SeaMonkey before 2.33.1 does not properly determine the cases in which bounds checking may be safely skipped during JIT compilation and heap access, which allows remote attackers to read or write to unintended memory locations, and consequently execute arbitrary code, via crafted JavaScript.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0817/">CVE-2015-0817 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0817">CVE-2015-0817 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/923495">SUSE bug 923495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923534">SUSE bug 923534</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820923" comment="firefox-31.5.3-3.el7_1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150818" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0818</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0818" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0818" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0818" ref_url="https://www.suse.com/security/cve/CVE-2015-0818" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0593-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0593-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001320.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0567-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QIB3PEZPIQ7JLEZDN65IY2MX64RP4ZQ3/#QIB3PEZPIQ7JLEZDN65IY2MX64RP4ZQ3" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0607-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BNZIP4V4PYMNTHHC7MLPVFCJSSGRFFH3/#BNZIP4V4PYMNTHHC7MLPVFCJSSGRFFH3" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0636-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FDLHCXTRONHO5LO44ROFN5E7BVRC2ABF/#FDLHCXTRONHO5LO44ROFN5E7BVRC2ABF" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 36.0.4, Firefox ESR 31.x before 31.5.3, and SeaMonkey before 2.33.1 allow remote attackers to bypass the Same Origin Policy and execute arbitrary JavaScript code with chrome privileges via vectors involving SVG hash navigation.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0818/">CVE-2015-0818 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0818">CVE-2015-0818 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/923495">SUSE bug 923495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923534">SUSE bug 923534</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820923" comment="firefox-31.5.3-3.el7_1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150822" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0822</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0822" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0822" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0822" ref_url="https://www.suse.com/security/cve/CVE-2015-0822" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0446-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001273.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0404-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SDBTOLJRA7KFYU5XRVWP4REQ3XZOS2FG/#SDBTOLJRA7KFYU5XRVWP4REQ3XZOS2FG" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0448-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HXJBTHUTNONOAUG25EU3G3MJCCOUSZVS/#HXJBTHUTNONOAUG25EU3G3MJCCOUSZVS" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0567-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QIB3PEZPIQ7JLEZDN65IY2MX64RP4ZQ3/#QIB3PEZPIQ7JLEZDN65IY2MX64RP4ZQ3" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VNGKNJGYZV377DMZMDSGTC6LXFPDDSY/#5VNGKNJGYZV377DMZMDSGTC6LXFPDDSY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    The Form Autocompletion feature in Mozilla Firefox before 36.0, Firefox ESR 31.x before 31.5, and Thunderbird before 31.5 allows remote attackers to read arbitrary files via crafted JavaScript code.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0822/">CVE-2015-0822 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0822">CVE-2015-0822 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/910669">SUSE bug 910669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917597">SUSE bug 917597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923534">SUSE bug 923534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924515">SUSE bug 924515</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820804" comment="firefox-31.5.0-2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820903" comment="thunderbird-31.5.0-2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820805" comment="xulrunner-31.5.0-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820806" comment="xulrunner-devel-31.5.0-1.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150827" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0827</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0827" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0827" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0827" ref_url="https://www.suse.com/security/cve/CVE-2015-0827" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0446-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001273.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0404-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SDBTOLJRA7KFYU5XRVWP4REQ3XZOS2FG/#SDBTOLJRA7KFYU5XRVWP4REQ3XZOS2FG" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0448-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HXJBTHUTNONOAUG25EU3G3MJCCOUSZVS/#HXJBTHUTNONOAUG25EU3G3MJCCOUSZVS" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0567-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QIB3PEZPIQ7JLEZDN65IY2MX64RP4ZQ3/#QIB3PEZPIQ7JLEZDN65IY2MX64RP4ZQ3" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VNGKNJGYZV377DMZMDSGTC6LXFPDDSY/#5VNGKNJGYZV377DMZMDSGTC6LXFPDDSY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the mozilla::gfx::CopyRect function in Mozilla Firefox before 36.0, Firefox ESR 31.x before 31.5, and Thunderbird before 31.5 allows remote attackers to obtain sensitive information from uninitialized process memory via a malformed SVG graphic.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0827/">CVE-2015-0827 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0827">CVE-2015-0827 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/910669">SUSE bug 910669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917597">SUSE bug 917597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923534">SUSE bug 923534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924515">SUSE bug 924515</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820804" comment="firefox-31.5.0-2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820903" comment="thunderbird-31.5.0-2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820805" comment="xulrunner-31.5.0-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820806" comment="xulrunner-devel-31.5.0-1.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150831" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0831</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0831" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0831" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0831" ref_url="https://www.suse.com/security/cve/CVE-2015-0831" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0446-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001273.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0404-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SDBTOLJRA7KFYU5XRVWP4REQ3XZOS2FG/#SDBTOLJRA7KFYU5XRVWP4REQ3XZOS2FG" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0448-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HXJBTHUTNONOAUG25EU3G3MJCCOUSZVS/#HXJBTHUTNONOAUG25EU3G3MJCCOUSZVS" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0567-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QIB3PEZPIQ7JLEZDN65IY2MX64RP4ZQ3/#QIB3PEZPIQ7JLEZDN65IY2MX64RP4ZQ3" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VNGKNJGYZV377DMZMDSGTC6LXFPDDSY/#5VNGKNJGYZV377DMZMDSGTC6LXFPDDSY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the mozilla::dom::IndexedDB::IDBObjectStore::CreateIndex function in Mozilla Firefox before 36.0, Firefox ESR 31.x before 31.5, and Thunderbird before 31.5 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via crafted content that is improperly handled during IndexedDB index creation.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0831/">CVE-2015-0831 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0831">CVE-2015-0831 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/910669">SUSE bug 910669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917597">SUSE bug 917597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923534">SUSE bug 923534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924515">SUSE bug 924515</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820804" comment="firefox-31.5.0-2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820903" comment="thunderbird-31.5.0-2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820805" comment="xulrunner-31.5.0-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820806" comment="xulrunner-devel-31.5.0-1.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0836</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0836" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0836" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0836" ref_url="https://www.suse.com/security/cve/CVE-2015-0836" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0446-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001273.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0404-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SDBTOLJRA7KFYU5XRVWP4REQ3XZOS2FG/#SDBTOLJRA7KFYU5XRVWP4REQ3XZOS2FG" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0448-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HXJBTHUTNONOAUG25EU3G3MJCCOUSZVS/#HXJBTHUTNONOAUG25EU3G3MJCCOUSZVS" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0567-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QIB3PEZPIQ7JLEZDN65IY2MX64RP4ZQ3/#QIB3PEZPIQ7JLEZDN65IY2MX64RP4ZQ3" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VNGKNJGYZV377DMZMDSGTC6LXFPDDSY/#5VNGKNJGYZV377DMZMDSGTC6LXFPDDSY" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 36.0, Firefox ESR 31.x before 31.5, and Thunderbird before 31.5 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0836/">CVE-2015-0836 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0836">CVE-2015-0836 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/910669">SUSE bug 910669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917597">SUSE bug 917597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923534">SUSE bug 923534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924515">SUSE bug 924515</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820804" comment="firefox-31.5.0-2.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820903" comment="thunderbird-31.5.0-2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820805" comment="xulrunner-31.5.0-1.el7_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820806" comment="xulrunner-devel-31.5.0-1.el7_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150848" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0848</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0848" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0848" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0848" ref_url="https://www.suse.com/security/cve/CVE-2015-0848" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001569.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in libwmf 0.2.8.4 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted BMP image.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0848/">CVE-2015-0848 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0848">CVE-2015-0848 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/933109">SUSE bug 933109</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821315" comment="libwmf-0.2.8.4-41.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821316" comment="libwmf-devel-0.2.8.4-41.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821317" comment="libwmf-lite-0.2.8.4-41.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151158" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1158</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1158" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1158" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1158" ref_url="https://www.suse.com/security/cve/CVE-2015-1158" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1044-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001436.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1056-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ECLXU5WQXR5LTHCDK36UPDIOPZNEQ33K/#ECLXU5WQXR5LTHCDK36UPDIOPZNEQ33K" source="SUSE-SU"/>
    <description>
    The add_job function in scheduler/ipp.c in cupsd in CUPS before 2.0.3 performs incorrect free operations for multiple-value job-originating-host-name attributes, which allows remote attackers to trigger data corruption for reference-counted strings via a crafted (1) IPP_CREATE_JOB or (2) IPP_PRINT_JOB request, as demonstrated by replacing the configuration file and consequently executing arbitrary code.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1158/">CVE-2015-1158 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1158">CVE-2015-1158 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/924208">SUSE bug 924208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976653">SUSE bug 976653</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821082" comment="cups-1.6.3-17.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821083" comment="cups-client-1.6.3-17.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821084" comment="cups-devel-1.6.3-17.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821085" comment="cups-filesystem-1.6.3-17.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821086" comment="cups-ipptool-1.6.3-17.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821087" comment="cups-libs-1.6.3-17.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821088" comment="cups-lpd-1.6.3-17.el7_1.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151159" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1159</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1159" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1159" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1159" ref_url="https://www.suse.com/security/cve/CVE-2015-1159" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1044-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001436.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1056-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ECLXU5WQXR5LTHCDK36UPDIOPZNEQ33K/#ECLXU5WQXR5LTHCDK36UPDIOPZNEQ33K" source="SUSE-SU"/>
    <description>
    Cross-site scripting (XSS) vulnerability in the cgi_puts function in cgi-bin/template.c in the template engine in CUPS before 2.0.3 allows remote attackers to inject arbitrary web script or HTML via the QUERY parameter to help/.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1159/">CVE-2015-1159 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1159">CVE-2015-1159 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/924208">SUSE bug 924208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976653">SUSE bug 976653</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821082" comment="cups-1.6.3-17.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821083" comment="cups-client-1.6.3-17.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821084" comment="cups-devel-1.6.3-17.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821085" comment="cups-filesystem-1.6.3-17.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821086" comment="cups-ipptool-1.6.3-17.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821087" comment="cups-libs-1.6.3-17.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821088" comment="cups-lpd-1.6.3-17.el7_1.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151333" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1333</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1333" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1333" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1333" ref_url="https://www.suse.com/security/cve/CVE-2015-1333" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2015:1842-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/52CT3NPGIEFS3FRUZ5D6HC6XZML63T2K/#52CT3NPGIEFS3FRUZ5D6HC6XZML63T2K" source="SUSE-SU"/>
    <description>
    Memory leak in the __key_link_end function in security/keys/keyring.c in the Linux kernel before 4.1.4 allows local users to cause a denial of service (memory consumption) via many add_key system calls that refer to existing keys.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1333/">CVE-2015-1333 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1333">CVE-2015-1333 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185451">SUSE bug 1185451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938645">SUSE bug 938645</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821287" comment="kernel-3.10.0-229.14.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821288" comment="kernel-abi-whitelists-3.10.0-229.14.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821289" comment="kernel-debug-3.10.0-229.14.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821292" comment="kernel-doc-3.10.0-229.14.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821293" comment="kernel-headers-3.10.0-229.14.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821294" comment="kernel-tools-3.10.0-229.14.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821295" comment="kernel-tools-libs-3.10.0-229.14.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821297" comment="perf-3.10.0-229.14.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821298" comment="python-perf-3.10.0-229.14.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151345" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1345</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1345" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1345" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1345" ref_url="https://www.suse.com/security/cve/CVE-2015-1345" source="SUSE CVE"/>
    <description>
    The bmexec_trans function in kwset.c in grep 2.19 through 2.21 allows local users to cause a denial of service (out-of-bounds heap read and crash) via crafted input when using the -F option.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1345/">CVE-2015-1345 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1345">CVE-2015-1345 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/914695">SUSE bug 914695</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821401" comment="grep-2.20-2.el7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151349" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1349</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1349" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1349" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1349" ref_url="https://www.suse.com/security/cve/CVE-2015-1349" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001485.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1326-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5JYFKBINQKHPJFLKL5BZCPTSO3WP5VFR/#5JYFKBINQKHPJFLKL5BZCPTSO3WP5VFR" source="SUSE-SU"/>
    <description>
    named in ISC BIND 9.7.0 through 9.9.6 before 9.9.6-P2 and 9.10.x before 9.10.1-P2, when DNSSEC validation and the managed-keys feature are enabled, allows remote attackers to cause a denial of service (assertion failure and daemon exit, or daemon crash) by triggering an incorrect trust-anchor management scenario in which no key is ready for use.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1349/">CVE-2015-1349 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1349">CVE-2015-1349 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/918330">SUSE bug 918330</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820904" comment="bind-9.9.4-18.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820905" comment="bind-chroot-9.9.4-18.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820906" comment="bind-devel-9.9.4-18.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820907" comment="bind-libs-9.9.4-18.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820908" comment="bind-libs-lite-9.9.4-18.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820909" comment="bind-license-9.9.4-18.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820910" comment="bind-lite-devel-9.9.4-18.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820911" comment="bind-sdb-9.9.4-18.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820912" comment="bind-sdb-chroot-9.9.4-18.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820913" comment="bind-utils-9.9.4-18.el7_1.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151421" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1421</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1421" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1421" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1421" ref_url="https://www.suse.com/security/cve/CVE-2015-1421" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001563.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0713-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NWCJPZ26DJQKJAYBVBW2J4THDLRJKACI/#NWCJPZ26DJQKJAYBVBW2J4THDLRJKACI" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OC7663UNXLKFWJKPITRGQNF4FU4KJWNK/#OC7663UNXLKFWJKPITRGQNF4FU4KJWNK" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the sctp_assoc_update function in net/sctp/associola.c in the Linux kernel before 3.18.8 allows remote attackers to cause a denial of service (slab corruption and panic) or possibly have unspecified other impact by triggering an INIT collision that leads to improper handling of shared-key data.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1421/">CVE-2015-1421 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1421">CVE-2015-1421 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1115893">SUSE bug 1115893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915577">SUSE bug 915577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922004">SUSE bug 922004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939261">SUSE bug 939261</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820924" comment="kernel-3.10.0-229.1.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820925" comment="kernel-abi-whitelists-3.10.0-229.1.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820926" comment="kernel-debug-3.10.0-229.1.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820929" comment="kernel-doc-3.10.0-229.1.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820930" comment="kernel-headers-3.10.0-229.1.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820931" comment="kernel-tools-3.10.0-229.1.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820932" comment="kernel-tools-libs-3.10.0-229.1.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820934" comment="perf-3.10.0-229.1.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820935" comment="python-perf-3.10.0-229.1.2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151472" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1472</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1472" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1472" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1472" ref_url="https://www.suse.com/security/cve/CVE-2015-1472" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001305.html" source="SUSE-SU"/>
    <description>
    The ADDW macro in stdio-common/vfscanf.c in the GNU C Library (aka glibc or libc6) before 2.21 does not properly consider data-type size during memory allocation, which allows context-dependent attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a long line containing wide characters that are improperly handled in a wscanf call.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1472/">CVE-2015-1472 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1472">CVE-2015-1472 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/916222">SUSE bug 916222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920341">SUSE bug 920341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922243">SUSE bug 922243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821452" comment="glibc-2.17-105.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821453" comment="glibc-common-2.17-105.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821454" comment="glibc-devel-2.17-105.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821455" comment="glibc-headers-2.17-105.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821456" comment="glibc-static-2.17-105.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821457" comment="glibc-utils-2.17-105.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821458" comment="nscd-2.17-105.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151473" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1473</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1473" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1473" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1473" ref_url="https://www.suse.com/security/cve/CVE-2015-1473" source="SUSE CVE"/>
    <description>
    The ADDW macro in stdio-common/vfscanf.c in the GNU C Library (aka glibc or libc6) before 2.21 does not properly consider data-type size during a risk-management decision for use of the alloca function, which might allow context-dependent attackers to cause a denial of service (segmentation violation) or overwrite memory locations beyond the stack boundary via a long line containing wide characters that are improperly handled in a wscanf call.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1473/">CVE-2015-1473 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1473">CVE-2015-1473 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/916222">SUSE bug 916222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920341">SUSE bug 920341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922243">SUSE bug 922243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821452" comment="glibc-2.17-105.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821453" comment="glibc-common-2.17-105.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821454" comment="glibc-devel-2.17-105.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821455" comment="glibc-headers-2.17-105.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821456" comment="glibc-static-2.17-105.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821457" comment="glibc-utils-2.17-105.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821458" comment="nscd-2.17-105.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1547</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1547" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1547" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1547" ref_url="https://www.suse.com/security/cve/CVE-2015-1547" source="SUSE CVE"/>
    <description>
    The NeXTDecode function in tif_next.c in LibTIFF allows remote attackers to cause a denial of service (uninitialized memory access) via a crafted TIFF image, as demonstrated by libtiff5.tif.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-04-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1547/">CVE-2015-1547 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-1547">CVE-2015-1547 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1206220">SUSE bug 1206220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914890">SUSE bug 914890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916925">SUSE bug 916925</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822206" comment="libtiff-4.0.3-25.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822207" comment="libtiff-devel-4.0.3-25.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822208" comment="libtiff-static-4.0.3-25.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822209" comment="libtiff-tools-4.0.3-25.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151573" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1573</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1573" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1573" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1573" ref_url="https://www.suse.com/security/cve/CVE-2015-1573" source="SUSE CVE"/>
    <description>
    The nft_flush_table function in net/netfilter/nf_tables_api.c in the Linux kernel before 3.18.5 mishandles the interaction between cross-chain jumps and ruleset flushes, which allows local users to cause a denial of service (panic) by leveraging the CAP_NET_ADMIN capability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1573/">CVE-2015-1573 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-1573">CVE-2015-1573 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/917274">SUSE bug 917274</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821114" comment="kernel-3.10.0-229.7.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821115" comment="kernel-abi-whitelists-3.10.0-229.7.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821116" comment="kernel-debug-3.10.0-229.7.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821119" comment="kernel-doc-3.10.0-229.7.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821120" comment="kernel-headers-3.10.0-229.7.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821121" comment="kernel-tools-3.10.0-229.7.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821122" comment="kernel-tools-libs-3.10.0-229.7.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821124" comment="perf-3.10.0-229.7.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821125" comment="python-perf-3.10.0-229.7.2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151593" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1593</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1593" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1593" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1593" ref_url="https://www.suse.com/security/cve/CVE-2015-1593" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0713-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NWCJPZ26DJQKJAYBVBW2J4THDLRJKACI/#NWCJPZ26DJQKJAYBVBW2J4THDLRJKACI" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0714-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TGDFE2ZE62NVTCXF3ICQYCJ3S7RQZBVD/#TGDFE2ZE62NVTCXF3ICQYCJ3S7RQZBVD" source="SUSE-SU"/>
    <description>
    The stack randomization feature in the Linux kernel before 3.19.1 on 64-bit platforms uses incorrect data types for the results of bitwise left-shift operations, which makes it easier for attackers to bypass the ASLR protection mechanism by predicting the address of the top of the stack, related to the randomize_stack_top function in fs/binfmt_elf.c and the stack_maxrandom_size function in arch/x86/mm/mmap.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1593/">CVE-2015-1593 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1593">CVE-2015-1593 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1044934">SUSE bug 1044934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917839">SUSE bug 917839</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821114" comment="kernel-3.10.0-229.7.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821115" comment="kernel-abi-whitelists-3.10.0-229.7.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821116" comment="kernel-debug-3.10.0-229.7.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821119" comment="kernel-doc-3.10.0-229.7.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821120" comment="kernel-headers-3.10.0-229.7.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821121" comment="kernel-tools-3.10.0-229.7.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821122" comment="kernel-tools-libs-3.10.0-229.7.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821124" comment="perf-3.10.0-229.7.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821125" comment="python-perf-3.10.0-229.7.2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151779" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1779</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1779" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1779" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1779" ref_url="https://www.suse.com/security/cve/CVE-2015-1779" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008673.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0914-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/56SB7O6IKG3PWP6IFVQ334V6YMU3GFH3/#56SB7O6IKG3PWP6IFVQ334V6YMU3GFH3" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4OGUN5F4IJ2HL42Y4XJBGLVFNE3RUZGG/#4OGUN5F4IJ2HL42Y4XJBGLVFNE3RUZGG" source="SUSE-SU"/>
    <description>
    The VNC websocket frame decoder in QEMU allows remote attackers to cause a denial of service (memory and CPU consumption) via a large (1) websocket payload or (2) HTTP headers section.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1779/">CVE-2015-1779 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-1779">CVE-2015-1779 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/924018">SUSE bug 924018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962632">SUSE bug 962632</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821337" comment="libcacard-1.5.3-86.el7_1.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821338" comment="libcacard-devel-1.5.3-86.el7_1.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821339" comment="libcacard-tools-1.5.3-86.el7_1.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821340" comment="qemu-img-1.5.3-86.el7_1.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821341" comment="qemu-kvm-1.5.3-86.el7_1.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821342" comment="qemu-kvm-common-1.5.3-86.el7_1.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821343" comment="qemu-kvm-tools-1.5.3-86.el7_1.8 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151781" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1781</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1781" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1781" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1781" ref_url="https://www.suse.com/security/cve/CVE-2015-1781" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001882.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the gethostbyname_r and other unspecified NSS functions in the GNU C Library (aka glibc or libc6) before 2.22 allows context-dependent attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DNS response, which triggers a call with a misaligned buffer.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1781/">CVE-2015-1781 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1781">CVE-2015-1781 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1123874">SUSE bug 1123874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927080">SUSE bug 927080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979109">SUSE bug 979109</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821452" comment="glibc-2.17-105.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821453" comment="glibc-common-2.17-105.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821454" comment="glibc-devel-2.17-105.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821455" comment="glibc-headers-2.17-105.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821456" comment="glibc-static-2.17-105.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821457" comment="glibc-utils-2.17-105.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821458" comment="nscd-2.17-105.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151782" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1782</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1782" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1782" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1782" ref_url="https://www.suse.com/security/cve/CVE-2015-1782" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4066-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0676-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001334.html" source="SUSE-SU"/>
		<reference ref_id="TID7021300" ref_url="https://www.suse.com/support/kb/doc/?id=7021300" source="SUSE-SU"/>
    <description>
    The kex_agree_methods function in libssh2 before 1.5.0 allows remote servers to cause a denial of service (crash) or have other unspecified impact via crafted length values in an SSH_MSG_KEXINIT packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1782/">CVE-2015-1782 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1782">CVE-2015-1782 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/921070">SUSE bug 921070</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821407" comment="libssh2-1.4.3-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821408" comment="libssh2-devel-1.4.3-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821409" comment="libssh2-docs-1.4.3-10.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151789" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1789</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1789" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1789" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1789" ref_url="https://www.suse.com/security/cve/CVE-2015-1789" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1181-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1183-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1184-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001739.html" source="SUSE-SU"/>
		<reference ref_id="TID3426981" ref_url="https://www.suse.com/support/kb/doc/?id=3426981" source="SUSE-SU"/>
		<reference ref_id="TID7016539" ref_url="https://www.suse.com/support/kb/doc/?id=7016539" source="SUSE-SU"/>
		<reference ref_id="TID7016602" ref_url="https://www.suse.com/support/kb/doc/?id=7016602" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1139-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FWJ5D6XMAKVEDCAJ7ERXTGMFTTDWN5PT/#FWJ5D6XMAKVEDCAJ7ERXTGMFTTDWN5PT" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1277-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XQAZGF7SIGXMQQGI6UJF7VBAOBYMY5WF/#XQAZGF7SIGXMQQGI6UJF7VBAOBYMY5WF" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2243-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CG5LJLU356KG55PZAGA4KDAMICLY5O5L/#CG5LJLU356KG55PZAGA4KDAMICLY5O5L" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C5ZZO44NS35G5NQFFXUERK5DXLTQN534/#C5ZZO44NS35G5NQFFXUERK5DXLTQN534" source="SUSE-SU"/>
    <description>
    The X509_cmp_time function in crypto/x509/x509_vfy.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted length field in ASN1_TIME data, as demonstrated by an attack against a server that supports client authentication with a custom verification callback.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1789/">CVE-2015-1789 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-1789">CVE-2015-1789 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/934489">SUSE bug 934489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934666">SUSE bug 934666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936586">SUSE bug 936586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937891">SUSE bug 937891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938432">SUSE bug 938432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821077" comment="openssl-1.0.1e-42.el7_1.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821078" comment="openssl-devel-1.0.1e-42.el7_1.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821079" comment="openssl-libs-1.0.1e-42.el7_1.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821080" comment="openssl-perl-1.0.1e-42.el7_1.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821081" comment="openssl-static-1.0.1e-42.el7_1.8 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151790" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1790</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1790" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1790" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1790" ref_url="https://www.suse.com/security/cve/CVE-2015-1790" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1181-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1183-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1184-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001478.html" source="SUSE-SU"/>
		<reference ref_id="TID3426981" ref_url="https://www.suse.com/support/kb/doc/?id=3426981" source="SUSE-SU"/>
		<reference ref_id="TID7016539" ref_url="https://www.suse.com/support/kb/doc/?id=7016539" source="SUSE-SU"/>
		<reference ref_id="TID7016602" ref_url="https://www.suse.com/support/kb/doc/?id=7016602" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1139-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FWJ5D6XMAKVEDCAJ7ERXTGMFTTDWN5PT/#FWJ5D6XMAKVEDCAJ7ERXTGMFTTDWN5PT" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1277-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XQAZGF7SIGXMQQGI6UJF7VBAOBYMY5WF/#XQAZGF7SIGXMQQGI6UJF7VBAOBYMY5WF" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C5ZZO44NS35G5NQFFXUERK5DXLTQN534/#C5ZZO44NS35G5NQFFXUERK5DXLTQN534" source="SUSE-SU"/>
    <description>
    The PKCS7_dataDecodefunction in crypto/pkcs7/pk7_doit.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a PKCS#7 blob that uses ASN.1 encoding and lacks inner EncryptedContent data.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1790/">CVE-2015-1790 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1790">CVE-2015-1790 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/934491">SUSE bug 934491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934666">SUSE bug 934666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936586">SUSE bug 936586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938432">SUSE bug 938432</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821077" comment="openssl-1.0.1e-42.el7_1.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821078" comment="openssl-devel-1.0.1e-42.el7_1.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821079" comment="openssl-libs-1.0.1e-42.el7_1.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821080" comment="openssl-perl-1.0.1e-42.el7_1.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821081" comment="openssl-static-1.0.1e-42.el7_1.8 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151791" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1791</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1791" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1791" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1791" ref_url="https://www.suse.com/security/cve/CVE-2015-1791" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1184-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001478.html" source="SUSE-SU"/>
		<reference ref_id="TID7016539" ref_url="https://www.suse.com/support/kb/doc/?id=7016539" source="SUSE-SU"/>
		<reference ref_id="TID7016602" ref_url="https://www.suse.com/support/kb/doc/?id=7016602" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1139-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FWJ5D6XMAKVEDCAJ7ERXTGMFTTDWN5PT/#FWJ5D6XMAKVEDCAJ7ERXTGMFTTDWN5PT" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C5ZZO44NS35G5NQFFXUERK5DXLTQN534/#C5ZZO44NS35G5NQFFXUERK5DXLTQN534" source="SUSE-SU"/>
    <description>
    Race condition in the ssl3_get_new_session_ticket function in ssl/s3_clnt.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b, when used for a multi-threaded client, allows remote attackers to cause a denial of service (double free and application crash) or possibly have unspecified other impact by providing a NewSessionTicket during an attempt to reuse a ticket that had been obtained earlier.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1791/">CVE-2015-1791 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1791">CVE-2015-1791 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/933911">SUSE bug 933911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934666">SUSE bug 934666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986238">SUSE bug 986238</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989464">SUSE bug 989464</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821077" comment="openssl-1.0.1e-42.el7_1.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821078" comment="openssl-devel-1.0.1e-42.el7_1.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821079" comment="openssl-libs-1.0.1e-42.el7_1.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821080" comment="openssl-perl-1.0.1e-42.el7_1.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821081" comment="openssl-static-1.0.1e-42.el7_1.8 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151792" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1792</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1792" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1792" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1792" ref_url="https://www.suse.com/security/cve/CVE-2015-1792" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1184-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001478.html" source="SUSE-SU"/>
		<reference ref_id="TID7016539" ref_url="https://www.suse.com/support/kb/doc/?id=7016539" source="SUSE-SU"/>
		<reference ref_id="TID7016602" ref_url="https://www.suse.com/support/kb/doc/?id=7016602" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1139-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FWJ5D6XMAKVEDCAJ7ERXTGMFTTDWN5PT/#FWJ5D6XMAKVEDCAJ7ERXTGMFTTDWN5PT" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1277-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XQAZGF7SIGXMQQGI6UJF7VBAOBYMY5WF/#XQAZGF7SIGXMQQGI6UJF7VBAOBYMY5WF" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C5ZZO44NS35G5NQFFXUERK5DXLTQN534/#C5ZZO44NS35G5NQFFXUERK5DXLTQN534" source="SUSE-SU"/>
    <description>
    The do_free_upto function in crypto/cms/cms_smime.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (infinite loop) via vectors that trigger a NULL value of a BIO data structure, as demonstrated by an unrecognized X.660 OID for a hash function.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1792/">CVE-2015-1792 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1792">CVE-2015-1792 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/934493">SUSE bug 934493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934666">SUSE bug 934666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937891">SUSE bug 937891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986238">SUSE bug 986238</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821077" comment="openssl-1.0.1e-42.el7_1.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821078" comment="openssl-devel-1.0.1e-42.el7_1.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821079" comment="openssl-libs-1.0.1e-42.el7_1.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821080" comment="openssl-perl-1.0.1e-42.el7_1.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821081" comment="openssl-static-1.0.1e-42.el7_1.8 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151798" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1798</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1798" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1798" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1798" ref_url="https://www.suse.com/security/cve/CVE-2015-1798" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0865-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002215.html" source="SUSE-SU"/>
    <description>
    The symmetric-key feature in the receive function in ntp_proto.c in ntpd in NTP 4.x before 4.2.8p2 requires a correct MAC only if the MAC field has a nonzero length, which makes it easier for man-in-the-middle attackers to spoof packets by omitting the MAC.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1798/">CVE-2015-1798 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1798">CVE-2015-1798 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/924202">SUSE bug 924202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927497">SUSE bug 927497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928321">SUSE bug 928321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936327">SUSE bug 936327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957163">SUSE bug 957163</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821459" comment="ntp-4.2.6p5-22.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821460" comment="ntp-doc-4.2.6p5-22.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821461" comment="ntp-perl-4.2.6p5-22.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821462" comment="ntpdate-4.2.6p5-22.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821463" comment="sntp-4.2.6p5-22.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151799" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1799</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1799" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1799" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1799" ref_url="https://www.suse.com/security/cve/CVE-2015-1799" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0865-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002215.html" source="SUSE-SU"/>
    <description>
    The symmetric-key feature in the receive function in ntp_proto.c in ntpd in NTP 3.x and 4.x before 4.2.8p2 performs state-variable updates upon receiving certain invalid packets, which makes it easier for man-in-the-middle attackers to cause a denial of service (synchronization loss) by spoofing the source IP address of a peer.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1799/">CVE-2015-1799 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1799">CVE-2015-1799 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/924202">SUSE bug 924202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927497">SUSE bug 927497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928321">SUSE bug 928321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936327">SUSE bug 936327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943565">SUSE bug 943565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957163">SUSE bug 957163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962624">SUSE bug 962624</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821459" comment="ntp-4.2.6p5-22.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821460" comment="ntp-doc-4.2.6p5-22.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821461" comment="ntp-perl-4.2.6p5-22.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821462" comment="ntpdate-4.2.6p5-22.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821463" comment="sntp-4.2.6p5-22.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151802" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1802</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1802" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1802" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1802" ref_url="https://www.suse.com/security/cve/CVE-2015-1802" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0674-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001332.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001343.html" source="SUSE-SU"/>
		<reference ref_id="TID7021676" ref_url="https://www.suse.com/support/kb/doc/?id=7021676" source="SUSE-SU"/>
		<reference ref_id="TID7021743" ref_url="https://www.suse.com/support/kb/doc/?id=7021743" source="SUSE-SU"/>
		<reference ref_id="TID7021744" ref_url="https://www.suse.com/support/kb/doc/?id=7021744" source="SUSE-SU"/>
		<reference ref_id="TID7021823" ref_url="https://www.suse.com/support/kb/doc/?id=7021823" source="SUSE-SU"/>
		<reference ref_id="TID7021836" ref_url="https://www.suse.com/support/kb/doc/?id=7021836" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0614-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DGI44NCOVWHLW6UQ3US6AUMTFC2ZT5HS/#DGI44NCOVWHLW6UQ3US6AUMTFC2ZT5HS" source="SUSE-SU"/>
    <description>
    The bdfReadProperties function in bitmap/bdfread.c in X.Org libXfont before 1.4.9 and 1.5.x before 1.5.1 allows remote authenticated users to cause a denial of service (out-of-bounds write and crash) or possibly execute arbitrary code via a (1) negative or (2) large property count in a BDF font file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1802/">CVE-2015-1802 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1802">CVE-2015-1802 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/921978">SUSE bug 921978</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821271" comment="libXfont-1.4.7-3.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821272" comment="libXfont-devel-1.4.7-3.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151803" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1803</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1803" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1803" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1803" ref_url="https://www.suse.com/security/cve/CVE-2015-1803" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0674-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001332.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001343.html" source="SUSE-SU"/>
		<reference ref_id="TID7021676" ref_url="https://www.suse.com/support/kb/doc/?id=7021676" source="SUSE-SU"/>
		<reference ref_id="TID7021743" ref_url="https://www.suse.com/support/kb/doc/?id=7021743" source="SUSE-SU"/>
		<reference ref_id="TID7021744" ref_url="https://www.suse.com/support/kb/doc/?id=7021744" source="SUSE-SU"/>
		<reference ref_id="TID7021823" ref_url="https://www.suse.com/support/kb/doc/?id=7021823" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0614-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DGI44NCOVWHLW6UQ3US6AUMTFC2ZT5HS/#DGI44NCOVWHLW6UQ3US6AUMTFC2ZT5HS" source="SUSE-SU"/>
    <description>
    The bdfReadCharacters function in bitmap/bdfread.c in X.Org libXfont before 1.4.9 and 1.5.x before 1.5.1 does not properly handle character bitmaps it cannot read, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and crash) and possibly execute arbitrary code via a crafted BDF font file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1803/">CVE-2015-1803 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1803">CVE-2015-1803 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/921978">SUSE bug 921978</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821271" comment="libXfont-1.4.7-3.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821272" comment="libXfont-devel-1.4.7-3.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151804" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1804</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1804" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1804" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1804" ref_url="https://www.suse.com/security/cve/CVE-2015-1804" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0674-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001332.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001343.html" source="SUSE-SU"/>
		<reference ref_id="TID7021676" ref_url="https://www.suse.com/support/kb/doc/?id=7021676" source="SUSE-SU"/>
		<reference ref_id="TID7021743" ref_url="https://www.suse.com/support/kb/doc/?id=7021743" source="SUSE-SU"/>
		<reference ref_id="TID7021744" ref_url="https://www.suse.com/support/kb/doc/?id=7021744" source="SUSE-SU"/>
		<reference ref_id="TID7021823" ref_url="https://www.suse.com/support/kb/doc/?id=7021823" source="SUSE-SU"/>
		<reference ref_id="TID7021836" ref_url="https://www.suse.com/support/kb/doc/?id=7021836" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0614-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DGI44NCOVWHLW6UQ3US6AUMTFC2ZT5HS/#DGI44NCOVWHLW6UQ3US6AUMTFC2ZT5HS" source="SUSE-SU"/>
    <description>
    The bdfReadCharacters function in bitmap/bdfread.c in X.Org libXfont before 1.4.9 and 1.5.x before 1.5.1 does not properly perform type conversion for metrics values, which allows remote authenticated users to cause a denial of service (out-of-bounds memory access) and possibly execute arbitrary code via a crafted BDF font file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1804/">CVE-2015-1804 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1804">CVE-2015-1804 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/921978">SUSE bug 921978</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821271" comment="libXfont-1.4.7-3.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821272" comment="libXfont-devel-1.4.7-3.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1805</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1805" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1805" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1805" ref_url="https://www.suse.com/security/cve/CVE-2015-1805" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1488-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1592-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001596.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001611.html" source="SUSE-SU"/>
    <description>
    The (1) pipe_read and (2) pipe_write implementations in fs/pipe.c in the Linux kernel before 3.16 do not properly consider the side effects of failed __copy_to_user_inatomic and __copy_from_user_inatomic calls, which allows local users to cause a denial of service (system crash) or possibly gain privileges via a crafted application, aka an "I/O vector array overrun."
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2015-1805/">CVE-2015-1805 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1805">CVE-2015-1805 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/917839">SUSE bug 917839</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933429">SUSE bug 933429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939270">SUSE bug 939270</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964730">SUSE bug 964730</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964732">SUSE bug 964732</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821114" comment="kernel-3.10.0-229.7.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821115" comment="kernel-abi-whitelists-3.10.0-229.7.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821116" comment="kernel-debug-3.10.0-229.7.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821119" comment="kernel-doc-3.10.0-229.7.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821120" comment="kernel-headers-3.10.0-229.7.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821121" comment="kernel-tools-3.10.0-229.7.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821122" comment="kernel-tools-libs-3.10.0-229.7.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821124" comment="perf-3.10.0-229.7.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821125" comment="python-perf-3.10.0-229.7.2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151815" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1815</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1815" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1815" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1815" ref_url="https://www.suse.com/security/cve/CVE-2015-1815" source="SUSE CVE"/>
    <description>
    The get_rpm_nvr_by_file_path_temporary function in util.py in setroubleshoot before 3.2.22 allows remote attackers to execute arbitrary commands via shell metacharacters in a file name.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1815/">CVE-2015-1815 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1815">CVE-2015-1815 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/983452">SUSE bug 983452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984780">SUSE bug 984780</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820942" comment="setroubleshoot-3.2.17-4.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820943" comment="setroubleshoot-server-3.2.17-4.1.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151819" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1819</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1819" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1819" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1819" ref_url="https://www.suse.com/security/cve/CVE-2015-1819" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001948.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14697-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U5YNW74OL2W7SH2XTAVN5TODNFIVFL3Y/" source="SUSE-SU"/>
    <description>
    The xmlreader in libxml allows remote attackers to cause a denial of service (memory consumption) via crafted XML data, related to an XML Entity Expansion (XEE) attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1819/">CVE-2015-1819 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1819">CVE-2015-1819 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928193">SUSE bug 928193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969769">SUSE bug 969769</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821611" comment="libxml2-2.9.1-6.el7_2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821612" comment="libxml2-devel-2.9.1-6.el7_2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821613" comment="libxml2-python-2.9.1-6.el7_2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821614" comment="libxml2-static-2.9.1-6.el7_2.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151821" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1821</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1821" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1821" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1821" ref_url="https://www.suse.com/security/cve/CVE-2015-1821" source="SUSE CVE"/>
    <description>
    Heap-based buffer overflow in chrony before 1.31.1 allows remote authenticated users to cause a denial of service (chronyd crash) or possibly execute arbitrary code by configuring the (1) NTP or (2) cmdmon access with a subnet size that is indivisible by four and an address with a nonzero bit in the subnet remainder.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1821/">CVE-2015-1821 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1821">CVE-2015-1821 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/926323">SUSE bug 926323</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821473" comment="chrony-2.1.1-1.el7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151822" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1822</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1822" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1822" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1822" ref_url="https://www.suse.com/security/cve/CVE-2015-1822" source="SUSE CVE"/>
    <description>
    chrony before 1.31.1 does not initialize the last "next" pointer when saving unacknowledged replies to command requests, which allows remote authenticated users to cause a denial of service (uninitialized pointer dereference and daemon crash) or possibly execute arbitrary code via a large number of command requests.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1822/">CVE-2015-1822 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1822">CVE-2015-1822 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/926323">SUSE bug 926323</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821473" comment="chrony-2.1.1-1.el7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151827" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1827</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1827" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1827" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1827" ref_url="https://www.suse.com/security/cve/CVE-2015-1827" source="SUSE CVE"/>
    <description>
    The get_user_grouplist function in the extdom plug-in in FreeIPA before 4.1.4 does not properly reallocate memory when processing user accounts, which allows remote attackers to cause a denial of service (crash) via a group list request for a user that belongs to a large number of groups.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1827/">CVE-2015-1827 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1827">CVE-2015-1827 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820936" comment="ipa-admintools-4.1.0-18.el7_1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820937" comment="ipa-client-4.1.0-18.el7_1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820938" comment="ipa-python-4.1.0-18.el7_1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820939" comment="ipa-server-4.1.0-18.el7_1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820940" comment="ipa-server-trust-ad-4.1.0-18.el7_1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820941" comment="slapi-nis-0.54-3.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151848" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1848</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1848" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1848" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1848" ref_url="https://www.suse.com/security/cve/CVE-2015-1848" source="SUSE CVE"/>
    <description>
    The pcs daemon (pcsd) in PCS 0.9.137 and earlier does not set the secure flag for a cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session.  NOTE: this issue was SPLIT per ADT2 due to different vulnerability types. CVE-2015-3983 is for the issue with not setting the HTTPOnly flag.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-08"/>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1848/">CVE-2015-1848 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1848">CVE-2015-1848 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/930578">SUSE bug 930578</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820996" comment="pcs-0.9.137-13.el7_1.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820997" comment="python-clufter-0.9.137-13.el7_1.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151853" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1853</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1853" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1853" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1853" ref_url="https://www.suse.com/security/cve/CVE-2015-1853" source="SUSE CVE"/>
    <description>
    chrony before 1.31.1 does not properly protect state variables in authenticated symmetric NTP associations, which allows remote attackers with knowledge of NTP peering to cause a denial of service (inability to synchronize) via random timestamps in crafted NTP data packets.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1853/">CVE-2015-1853 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-1853">CVE-2015-1853 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/926323">SUSE bug 926323</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821473" comment="chrony-2.1.1-1.el7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151854" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1854</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1854" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1854" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1854" ref_url="https://www.suse.com/security/cve/CVE-2015-1854" source="SUSE CVE"/>
    <description>
    389 Directory Server before 1.3.3.10 allows attackers to bypass intended access restrictions and modify directory entries via a crafted ldapmodrdn call.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1854/">CVE-2015-1854 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-1854">CVE-2015-1854 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/929034">SUSE bug 929034</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820993" comment="389-ds-base-1.3.3.1-16.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820994" comment="389-ds-base-devel-1.3.3.1-16.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820995" comment="389-ds-base-libs-1.3.3.1-16.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151863" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1863</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1863" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1863" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1863" ref_url="https://www.suse.com/security/cve/CVE-2015-1863" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1013-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001423.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0813-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/24WJWXAHA4BBDXWFY6U6WSBXW5IJPF7S/#24WJWXAHA4BBDXWFY6U6WSBXW5IJPF7S" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2896-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FVO5LGM6MML3JRTJIGXKSVAE727P46NU/#FVO5LGM6MML3JRTJIGXKSVAE727P46NU" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in wpa_supplicant 1.0 through 2.4 allows remote attackers to cause a denial of service (crash), read memory, or possibly execute arbitrary code via crafted SSID information in a management frame when creating or updating P2P entries.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1863/">CVE-2015-1863 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1863">CVE-2015-1863 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/915323">SUSE bug 915323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927558">SUSE bug 927558</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821076" comment="wpa_supplicant-2.0-17.el7_1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151867" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1867</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1867" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1867" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1867" ref_url="https://www.suse.com/security/cve/CVE-2015-1867" source="SUSE CVE"/>
    <description>
    Pacemaker before 1.1.13 does not properly evaluate added nodes, which allows remote read-only users to gain privileges via an acl command.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1867/">CVE-2015-1867 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1867">CVE-2015-1867 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/927828">SUSE bug 927828</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821547" comment="pacemaker-1.1.13-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821548" comment="pacemaker-cli-1.1.13-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821549" comment="pacemaker-cluster-libs-1.1.13-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821550" comment="pacemaker-cts-1.1.13-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821551" comment="pacemaker-doc-1.1.13-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821552" comment="pacemaker-libs-1.1.13-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821553" comment="pacemaker-libs-devel-1.1.13-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821554" comment="pacemaker-nagios-plugins-metadata-1.1.13-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821555" comment="pacemaker-remote-1.1.13-10.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151869" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1869</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1869" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1869" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1869" ref_url="https://www.suse.com/security/cve/CVE-2015-1869" source="SUSE CVE"/>
    <description>
    The default event handling scripts in Automatic Bug Reporting Tool (ABRT) allow local users to gain privileges as demonstrated by a symlink attack on a var_log_messages file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1869/">CVE-2015-1869 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-1869">CVE-2015-1869 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821037" comment="abrt-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821038" comment="abrt-addon-ccpp-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821039" comment="abrt-addon-kerneloops-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821040" comment="abrt-addon-pstoreoops-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821041" comment="abrt-addon-python-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821042" comment="abrt-addon-upload-watch-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821043" comment="abrt-addon-vmcore-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821044" comment="abrt-addon-xorg-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821045" comment="abrt-cli-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821046" comment="abrt-console-notification-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821047" comment="abrt-dbus-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821048" comment="abrt-desktop-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821049" comment="abrt-devel-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821050" comment="abrt-gui-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821051" comment="abrt-gui-devel-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821052" comment="abrt-gui-libs-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821053" comment="abrt-libs-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821054" comment="abrt-python-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821055" comment="abrt-python-doc-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821056" comment="abrt-retrace-client-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821057" comment="abrt-tui-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821058" comment="libreport-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821059" comment="libreport-anaconda-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821060" comment="libreport-cli-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821061" comment="libreport-compat-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821062" comment="libreport-devel-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821063" comment="libreport-filesystem-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821064" comment="libreport-gtk-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821065" comment="libreport-gtk-devel-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821066" comment="libreport-newt-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821067" comment="libreport-plugin-bugzilla-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821068" comment="libreport-plugin-kerneloops-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821069" comment="libreport-plugin-logger-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821070" comment="libreport-plugin-mailx-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821071" comment="libreport-plugin-reportuploader-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821072" comment="libreport-plugin-ureport-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821073" comment="libreport-python-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821074" comment="libreport-web-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821075" comment="libreport-web-devel-2.1.11-23.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151870" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1870</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1870" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1870" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1870" ref_url="https://www.suse.com/security/cve/CVE-2015-1870" source="SUSE CVE"/>
    <description>
    The event scripts in Automatic Bug Reporting Tool (ABRT) uses world-readable permission on a copy of sosreport file in problem directories, which allows local users to obtain sensitive information from /var/log/messages via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1870/">CVE-2015-1870 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-1870">CVE-2015-1870 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821037" comment="abrt-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821038" comment="abrt-addon-ccpp-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821039" comment="abrt-addon-kerneloops-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821040" comment="abrt-addon-pstoreoops-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821041" comment="abrt-addon-python-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821042" comment="abrt-addon-upload-watch-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821043" comment="abrt-addon-vmcore-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821044" comment="abrt-addon-xorg-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821045" comment="abrt-cli-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821046" comment="abrt-console-notification-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821047" comment="abrt-dbus-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821048" comment="abrt-desktop-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821049" comment="abrt-devel-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821050" comment="abrt-gui-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821051" comment="abrt-gui-devel-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821052" comment="abrt-gui-libs-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821053" comment="abrt-libs-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821054" comment="abrt-python-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821055" comment="abrt-python-doc-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821056" comment="abrt-retrace-client-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821057" comment="abrt-tui-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821058" comment="libreport-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821059" comment="libreport-anaconda-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821060" comment="libreport-cli-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821061" comment="libreport-compat-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821062" comment="libreport-devel-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821063" comment="libreport-filesystem-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821064" comment="libreport-gtk-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821065" comment="libreport-gtk-devel-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821066" comment="libreport-newt-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821067" comment="libreport-plugin-bugzilla-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821068" comment="libreport-plugin-kerneloops-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821069" comment="libreport-plugin-logger-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821070" comment="libreport-plugin-mailx-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821071" comment="libreport-plugin-reportuploader-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821072" comment="libreport-plugin-ureport-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821073" comment="libreport-python-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821074" comment="libreport-web-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821075" comment="libreport-web-devel-2.1.11-23.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152153" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2153</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2153" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2153" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2153" ref_url="https://www.suse.com/security/cve/CVE-2015-2153" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
    <description>
    The rpki_rtr_pdu_print function in print-rpki-rtr.c in the TCP printer in tcpdump before 4.7.2 allows remote attackers to cause a denial of service (out-of-bounds read or write and crash) via a crafted header length in an RPKI-RTR Protocol Data Unit (PDU).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2153/">CVE-2015-2153 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2153">CVE-2015-2153 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/922221">SUSE bug 922221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922222">SUSE bug 922222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922223">SUSE bug 922223</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823301" comment="tcpdump-4.9.0-5.el7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152154" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2154</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2154" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2154" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2154" ref_url="https://www.suse.com/security/cve/CVE-2015-2154" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
    <description>
    The osi_print_cksum function in print-isoclns.c in the ethernet printer in tcpdump before 4.7.2 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via a crafted (1) length, (2) offset, or (3) base pointer checksum value.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2154/">CVE-2015-2154 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2154">CVE-2015-2154 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/922222">SUSE bug 922222</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823301" comment="tcpdump-4.9.0-5.el7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152155" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2155</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2155" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2155" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2155" ref_url="https://www.suse.com/security/cve/CVE-2015-2155" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
    <description>
    The force printer in tcpdump before 4.7.2 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2155/">CVE-2015-2155 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2155">CVE-2015-2155 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/922220">SUSE bug 922220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922221">SUSE bug 922221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922222">SUSE bug 922222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922223">SUSE bug 922223</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823301" comment="tcpdump-4.9.0-5.el7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152188" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2188</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2188" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2188" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2188" ref_url="https://www.suse.com/security/cve/CVE-2015-2188" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0653-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0657-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0657-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001325.html" source="SUSE-SU"/>
    <description>
    epan/dissectors/packet-wcp.c in the WCP dissector in Wireshark 1.10.x before 1.10.13 and 1.12.x before 1.12.4 does not properly initialize a data structure, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet that is improperly handled during decompression.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2188/">CVE-2015-2188 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2188">CVE-2015-2188 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/920696">SUSE bug 920696</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821556" comment="wireshark-1.10.14-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821557" comment="wireshark-devel-1.10.14-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821558" comment="wireshark-gnome-1.10.14-7.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152189" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2189</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2189" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2189" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2189" ref_url="https://www.suse.com/security/cve/CVE-2015-2189" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0653-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0657-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0657-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001325.html" source="SUSE-SU"/>
    <description>
    Off-by-one error in the pcapng_read function in wiretap/pcapng.c in the pcapng file parser in Wireshark 1.10.x before 1.10.13 and 1.12.x before 1.12.4 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via an invalid Interface Statistics Block (ISB) interface ID in a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2189/">CVE-2015-2189 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2189">CVE-2015-2189 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/920697">SUSE bug 920697</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821556" comment="wireshark-1.10.14-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821557" comment="wireshark-devel-1.10.14-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821558" comment="wireshark-gnome-1.10.14-7.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152191" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2191</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2191" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2191" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2191" ref_url="https://www.suse.com/security/cve/CVE-2015-2191" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0653-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0657-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0657-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001325.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the dissect_tnef function in epan/dissectors/packet-tnef.c in the TNEF dissector in Wireshark 1.10.x before 1.10.13 and 1.12.x before 1.12.4 allows remote attackers to cause a denial of service (infinite loop) via a crafted length field in a packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2191/">CVE-2015-2191 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2191">CVE-2015-2191 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/920699">SUSE bug 920699</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821556" comment="wireshark-1.10.14-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821557" comment="wireshark-devel-1.10.14-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821558" comment="wireshark-gnome-1.10.14-7.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152301" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2301</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2301" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2301" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2301" ref_url="https://www.suse.com/security/cve/CVE-2015-2301" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0868-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1638-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002131.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the phar_rename_archive function in phar_object.c in PHP before 5.5.22 and 5.6.x before 5.6.6 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger an attempted renaming of a Phar archive to the name of an existing file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2301/">CVE-2015-2301 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2301">CVE-2015-2301 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/922452">SUSE bug 922452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821089" comment="php-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821090" comment="php-bcmath-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821091" comment="php-cli-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821092" comment="php-common-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821093" comment="php-dba-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821094" comment="php-devel-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821095" comment="php-embedded-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821096" comment="php-enchant-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821097" comment="php-fpm-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821098" comment="php-gd-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821099" comment="php-intl-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821100" comment="php-ldap-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821101" comment="php-mbstring-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821102" comment="php-mysql-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821103" comment="php-mysqlnd-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821104" comment="php-odbc-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821105" comment="php-pdo-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821106" comment="php-pgsql-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821107" comment="php-process-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821108" comment="php-pspell-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821109" comment="php-recode-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821110" comment="php-snmp-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821111" comment="php-soap-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821112" comment="php-xml-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821113" comment="php-xmlrpc-5.4.16-36.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152328" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2328</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2328" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2328" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2328" ref_url="https://www.suse.com/security/cve/CVE-2015-2328" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
    <description>
    PCRE before 8.36 mishandles the /((?(R)a|(?1)))+/ pattern and related patterns with certain recursion, which allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2328/">CVE-2015-2328 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2328">CVE-2015-2328 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/906574">SUSE bug 906574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957600">SUSE bug 957600</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822065" comment="pcre-8.32-15.el7_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822066" comment="pcre-devel-8.32-15.el7_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822067" comment="pcre-static-8.32-15.el7_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822068" comment="pcre-tools-8.32-15.el7_2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152348" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2348</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2348" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2348" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2348" ref_url="https://www.suse.com/security/cve/CVE-2015-2348" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0868-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001380.html" source="SUSE-SU"/>
    <description>
    The move_uploaded_file implementation in ext/standard/basic_functions.c in PHP before 5.4.39, 5.5.x before 5.5.23, and 5.6.x before 5.6.7 truncates a pathname upon encountering a \x00 character, which allows remote attackers to bypass intended extension restrictions and create files with unexpected names via a crafted second argument.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2006-7243.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2348/">CVE-2015-2348 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2348">CVE-2015-2348 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/924970">SUSE bug 924970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935227">SUSE bug 935227</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821089" comment="php-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821090" comment="php-bcmath-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821091" comment="php-cli-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821092" comment="php-common-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821093" comment="php-dba-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821094" comment="php-devel-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821095" comment="php-embedded-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821096" comment="php-enchant-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821097" comment="php-fpm-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821098" comment="php-gd-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821099" comment="php-intl-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821100" comment="php-ldap-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821101" comment="php-mbstring-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821102" comment="php-mysql-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821103" comment="php-mysqlnd-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821104" comment="php-odbc-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821105" comment="php-pdo-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821106" comment="php-pgsql-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821107" comment="php-process-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821108" comment="php-pspell-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821109" comment="php-recode-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821110" comment="php-snmp-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821111" comment="php-soap-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821112" comment="php-xml-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821113" comment="php-xmlrpc-5.4.16-36.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152568" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2568</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2568" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2568" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2568" ref_url="https://www.suse.com/security/cve/CVE-2015-2568" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001410.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001504.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1216-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KHOOMDUPEQLMQZN7JRZIBDKGHYJ2TBKQ/#KHOOMDUPEQLMQZN7JRZIBDKGHYJ2TBKQ" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.41 and earlier, and 5.6.22 and earlier, allows remote attackers to affect availability via unknown vectors related to Server : Security : Privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2568/">CVE-2015-2568 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2568">CVE-2015-2568 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/927623">SUSE bug 927623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936409">SUSE bug 936409</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821233" comment="mariadb-5.5.44-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821234" comment="mariadb-bench-5.5.44-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821235" comment="mariadb-devel-5.5.44-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821236" comment="mariadb-embedded-5.5.44-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821237" comment="mariadb-embedded-devel-5.5.44-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821238" comment="mariadb-libs-5.5.44-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821239" comment="mariadb-server-5.5.44-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821240" comment="mariadb-test-5.5.44-1.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152571" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2571</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2571" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2571" ref_url="https://www.suse.com/security/cve/CVE-2015-2571" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001410.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001504.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1216-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KHOOMDUPEQLMQZN7JRZIBDKGHYJ2TBKQ/#KHOOMDUPEQLMQZN7JRZIBDKGHYJ2TBKQ" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.42 and earlier, and 5.6.23 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : Optimizer.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2571/">CVE-2015-2571 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2571">CVE-2015-2571 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/927623">SUSE bug 927623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936408">SUSE bug 936408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821233" comment="mariadb-5.5.44-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821234" comment="mariadb-bench-5.5.44-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821235" comment="mariadb-devel-5.5.44-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821236" comment="mariadb-embedded-5.5.44-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821237" comment="mariadb-embedded-devel-5.5.44-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821238" comment="mariadb-libs-5.5.44-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821239" comment="mariadb-server-5.5.44-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821240" comment="mariadb-test-5.5.44-1.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152573" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2573</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2573" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2573" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2573" ref_url="https://www.suse.com/security/cve/CVE-2015-2573" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001410.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001504.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1216-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KHOOMDUPEQLMQZN7JRZIBDKGHYJ2TBKQ/#KHOOMDUPEQLMQZN7JRZIBDKGHYJ2TBKQ" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.41 and earlier, and 5.6.22 and earlier, allows remote authenticated users to affect availability via vectors related to DDL.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2573/">CVE-2015-2573 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2573">CVE-2015-2573 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/927623">SUSE bug 927623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936409">SUSE bug 936409</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821233" comment="mariadb-5.5.44-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821234" comment="mariadb-bench-5.5.44-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821235" comment="mariadb-devel-5.5.44-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821236" comment="mariadb-embedded-5.5.44-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821237" comment="mariadb-embedded-devel-5.5.44-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821238" comment="mariadb-libs-5.5.44-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821239" comment="mariadb-server-5.5.44-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821240" comment="mariadb-test-5.5.44-1.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152582" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2582</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2582" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2582" ref_url="https://www.suse.com/security/cve/CVE-2015-2582" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001639.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.43 and earlier and 5.6.24 and earlier allows remote authenticated users to affect availability via vectors related to GIS.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2582/">CVE-2015-2582 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2582">CVE-2015-2582 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/938412">SUSE bug 938412</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821233" comment="mariadb-5.5.44-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821234" comment="mariadb-bench-5.5.44-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821235" comment="mariadb-devel-5.5.44-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821236" comment="mariadb-embedded-5.5.44-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821237" comment="mariadb-embedded-devel-5.5.44-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821238" comment="mariadb-libs-5.5.44-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821239" comment="mariadb-server-5.5.44-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821240" comment="mariadb-test-5.5.44-1.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152590" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2590</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2590" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2590" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2590" ref_url="https://www.suse.com/security/cve/CVE-2015-2590" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1329-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001526.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001577.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1288-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TXVU3Y3MZTDHVP52DAEBRCD5GP4FAMIU/#TXVU3Y3MZTDHVP52DAEBRCD5GP4FAMIU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1289-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PZ3KWYO2IVEORKHG62M62G3UEKUH6TTO/#PZ3KWYO2IVEORKHG62M62G3UEKUH6TTO" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45, and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2015-4732.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2590/">CVE-2015-2590 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-2590">CVE-2015-2590 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/937828">SUSE bug 937828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938248">SUSE bug 938248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938895">SUSE bug 938895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821198" comment="java-1.6.0-openjdk-1.6.0.36-1.13.8.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821199" comment="java-1.6.0-openjdk-demo-1.6.0.36-1.13.8.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821200" comment="java-1.6.0-openjdk-devel-1.6.0.36-1.13.8.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821201" comment="java-1.6.0-openjdk-javadoc-1.6.0.36-1.13.8.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821202" comment="java-1.6.0-openjdk-src-1.6.0.36-1.13.8.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821157" comment="java-1.7.0-openjdk-1.7.0.85-2.6.1.2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821158" comment="java-1.7.0-openjdk-accessibility-1.7.0.85-2.6.1.2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821159" comment="java-1.7.0-openjdk-demo-1.7.0.85-2.6.1.2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821160" comment="java-1.7.0-openjdk-devel-1.7.0.85-2.6.1.2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821161" comment="java-1.7.0-openjdk-headless-1.7.0.85-2.6.1.2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821162" comment="java-1.7.0-openjdk-javadoc-1.7.0.85-2.6.1.2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821163" comment="java-1.7.0-openjdk-src-1.7.0.85-2.6.1.2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821150" comment="java-1.8.0-openjdk-1.8.0.51-1.b16.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821151" comment="java-1.8.0-openjdk-accessibility-1.8.0.51-1.b16.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821152" comment="java-1.8.0-openjdk-demo-1.8.0.51-1.b16.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821153" comment="java-1.8.0-openjdk-devel-1.8.0.51-1.b16.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821154" comment="java-1.8.0-openjdk-headless-1.8.0.51-1.b16.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821155" comment="java-1.8.0-openjdk-javadoc-1.8.0.51-1.b16.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821156" comment="java-1.8.0-openjdk-src-1.8.0.51-1.b16.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152601" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2601</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2601" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2601" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2601" ref_url="https://www.suse.com/security/cve/CVE-2015-2601" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1329-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001526.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001577.html" source="SUSE-SU"/>
		<reference ref_id="TID7016694" ref_url="https://www.suse.com/support/kb/doc/?id=7016694" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1288-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TXVU3Y3MZTDHVP52DAEBRCD5GP4FAMIU/#TXVU3Y3MZTDHVP52DAEBRCD5GP4FAMIU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1289-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PZ3KWYO2IVEORKHG62M62G3UEKUH6TTO/#PZ3KWYO2IVEORKHG62M62G3UEKUH6TTO" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45, JRockit R28.3.6, and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality via vectors related to JCE.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2601/">CVE-2015-2601 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2601">CVE-2015-2601 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/937828">SUSE bug 937828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938248">SUSE bug 938248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938895">SUSE bug 938895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821198" comment="java-1.6.0-openjdk-1.6.0.36-1.13.8.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821199" comment="java-1.6.0-openjdk-demo-1.6.0.36-1.13.8.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821200" comment="java-1.6.0-openjdk-devel-1.6.0.36-1.13.8.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821201" comment="java-1.6.0-openjdk-javadoc-1.6.0.36-1.13.8.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821202" comment="java-1.6.0-openjdk-src-1.6.0.36-1.13.8.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821157" comment="java-1.7.0-openjdk-1.7.0.85-2.6.1.2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821158" comment="java-1.7.0-openjdk-accessibility-1.7.0.85-2.6.1.2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821159" comment="java-1.7.0-openjdk-demo-1.7.0.85-2.6.1.2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821160" comment="java-1.7.0-openjdk-devel-1.7.0.85-2.6.1.2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821161" comment="java-1.7.0-openjdk-headless-1.7.0.85-2.6.1.2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821162" comment="java-1.7.0-openjdk-javadoc-1.7.0.85-2.6.1.2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821163" comment="java-1.7.0-openjdk-src-1.7.0.85-2.6.1.2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821150" comment="java-1.8.0-openjdk-1.8.0.51-1.b16.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821151" comment="java-1.8.0-openjdk-accessibility-1.8.0.51-1.b16.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821152" comment="java-1.8.0-openjdk-demo-1.8.0.51-1.b16.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821153" comment="java-1.8.0-openjdk-devel-1.8.0.51-1.b16.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821154" comment="java-1.8.0-openjdk-headless-1.8.0.51-1.b16.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821155" comment="java-1.8.0-openjdk-javadoc-1.8.0.51-1.b16.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821156" comment="java-1.8.0-openjdk-src-1.8.0.51-1.b16.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152620" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2620</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2620" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2620" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2620" ref_url="https://www.suse.com/security/cve/CVE-2015-2620" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001639.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.43 and earlier and 5.6.23 and earlier allows remote authenticated users to affect confidentiality via unknown vectors related to Server : Security : Privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2620/">CVE-2015-2620 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2620">CVE-2015-2620 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/938412">SUSE bug 938412</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821233" comment="mariadb-5.5.44-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821234" comment="mariadb-bench-5.5.44-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821235" comment="mariadb-devel-5.5.44-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821236" comment="mariadb-embedded-5.5.44-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821237" comment="mariadb-embedded-devel-5.5.44-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821238" comment="mariadb-libs-5.5.44-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821239" comment="mariadb-server-5.5.44-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821240" comment="mariadb-test-5.5.44-1.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152621" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2621</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2621" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2621" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2621" ref_url="https://www.suse.com/security/cve/CVE-2015-2621" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1329-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001526.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001577.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1288-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TXVU3Y3MZTDHVP52DAEBRCD5GP4FAMIU/#TXVU3Y3MZTDHVP52DAEBRCD5GP4FAMIU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1289-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PZ3KWYO2IVEORKHG62M62G3UEKUH6TTO/#PZ3KWYO2IVEORKHG62M62G3UEKUH6TTO" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45, and Java SE Embedded 7u75 and 8u33, allows remote attackers to affect confidentiality via vectors related to JMX.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2621/">CVE-2015-2621 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2621">CVE-2015-2621 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/937828">SUSE bug 937828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938248">SUSE bug 938248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938895">SUSE bug 938895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821198" comment="java-1.6.0-openjdk-1.6.0.36-1.13.8.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821199" comment="java-1.6.0-openjdk-demo-1.6.0.36-1.13.8.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821200" comment="java-1.6.0-openjdk-devel-1.6.0.36-1.13.8.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821201" comment="java-1.6.0-openjdk-javadoc-1.6.0.36-1.13.8.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821202" comment="java-1.6.0-openjdk-src-1.6.0.36-1.13.8.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821157" comment="java-1.7.0-openjdk-1.7.0.85-2.6.1.2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821158" comment="java-1.7.0-openjdk-accessibility-1.7.0.85-2.6.1.2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821159" comment="java-1.7.0-openjdk-demo-1.7.0.85-2.6.1.2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821160" comment="java-1.7.0-openjdk-devel-1.7.0.85-2.6.1.2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821161" comment="java-1.7.0-openjdk-headless-1.7.0.85-2.6.1.2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821162" comment="java-1.7.0-openjdk-javadoc-1.7.0.85-2.6.1.2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821163" comment="java-1.7.0-openjdk-src-1.7.0.85-2.6.1.2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821150" comment="java-1.8.0-openjdk-1.8.0.51-1.b16.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821151" comment="java-1.8.0-openjdk-accessibility-1.8.0.51-1.b16.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821152" comment="java-1.8.0-openjdk-demo-1.8.0.51-1.b16.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821153" comment="java-1.8.0-openjdk-devel-1.8.0.51-1.b16.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821154" comment="java-1.8.0-openjdk-headless-1.8.0.51-1.b16.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821155" comment="java-1.8.0-openjdk-javadoc-1.8.0.51-1.b16.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821156" comment="java-1.8.0-openjdk-src-1.8.0.51-1.b16.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152625" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2625</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2625" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2625" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2625" ref_url="https://www.suse.com/security/cve/CVE-2015-2625" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1329-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001526.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001717.html" source="SUSE-SU"/>
		<reference ref_id="TID7016694" ref_url="https://www.suse.com/support/kb/doc/?id=7016694" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1288-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TXVU3Y3MZTDHVP52DAEBRCD5GP4FAMIU/#TXVU3Y3MZTDHVP52DAEBRCD5GP4FAMIU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1289-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PZ3KWYO2IVEORKHG62M62G3UEKUH6TTO/#PZ3KWYO2IVEORKHG62M62G3UEKUH6TTO" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45; JRockit R28.3.6; and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality via vectors related to JSSE.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2625/">CVE-2015-2625 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2625">CVE-2015-2625 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/937828">SUSE bug 937828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938248">SUSE bug 938248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938895">SUSE bug 938895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821198" comment="java-1.6.0-openjdk-1.6.0.36-1.13.8.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821199" comment="java-1.6.0-openjdk-demo-1.6.0.36-1.13.8.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821200" comment="java-1.6.0-openjdk-devel-1.6.0.36-1.13.8.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821201" comment="java-1.6.0-openjdk-javadoc-1.6.0.36-1.13.8.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821202" comment="java-1.6.0-openjdk-src-1.6.0.36-1.13.8.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821157" comment="java-1.7.0-openjdk-1.7.0.85-2.6.1.2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821158" comment="java-1.7.0-openjdk-accessibility-1.7.0.85-2.6.1.2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821159" comment="java-1.7.0-openjdk-demo-1.7.0.85-2.6.1.2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821160" comment="java-1.7.0-openjdk-devel-1.7.0.85-2.6.1.2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821161" comment="java-1.7.0-openjdk-headless-1.7.0.85-2.6.1.2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821162" comment="java-1.7.0-openjdk-javadoc-1.7.0.85-2.6.1.2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821163" comment="java-1.7.0-openjdk-src-1.7.0.85-2.6.1.2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821150" comment="java-1.8.0-openjdk-1.8.0.51-1.b16.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821151" comment="java-1.8.0-openjdk-accessibility-1.8.0.51-1.b16.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821152" comment="java-1.8.0-openjdk-demo-1.8.0.51-1.b16.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821153" comment="java-1.8.0-openjdk-devel-1.8.0.51-1.b16.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821154" comment="java-1.8.0-openjdk-headless-1.8.0.51-1.b16.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821155" comment="java-1.8.0-openjdk-javadoc-1.8.0.51-1.b16.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821156" comment="java-1.8.0-openjdk-src-1.8.0.51-1.b16.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152628" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2628</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2628" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2628" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2628" ref_url="https://www.suse.com/security/cve/CVE-2015-2628" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001516.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1288-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TXVU3Y3MZTDHVP52DAEBRCD5GP4FAMIU/#TXVU3Y3MZTDHVP52DAEBRCD5GP4FAMIU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1289-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PZ3KWYO2IVEORKHG62M62G3UEKUH6TTO/#PZ3KWYO2IVEORKHG62M62G3UEKUH6TTO" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45, and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2628/">CVE-2015-2628 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2628">CVE-2015-2628 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/937828">SUSE bug 937828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938248">SUSE bug 938248</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821198" comment="java-1.6.0-openjdk-1.6.0.36-1.13.8.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821199" comment="java-1.6.0-openjdk-demo-1.6.0.36-1.13.8.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821200" comment="java-1.6.0-openjdk-devel-1.6.0.36-1.13.8.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821201" comment="java-1.6.0-openjdk-javadoc-1.6.0.36-1.13.8.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821202" comment="java-1.6.0-openjdk-src-1.6.0.36-1.13.8.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821157" comment="java-1.7.0-openjdk-1.7.0.85-2.6.1.2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821158" comment="java-1.7.0-openjdk-accessibility-1.7.0.85-2.6.1.2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821159" comment="java-1.7.0-openjdk-demo-1.7.0.85-2.6.1.2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821160" comment="java-1.7.0-openjdk-devel-1.7.0.85-2.6.1.2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821161" comment="java-1.7.0-openjdk-headless-1.7.0.85-2.6.1.2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821162" comment="java-1.7.0-openjdk-javadoc-1.7.0.85-2.6.1.2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821163" comment="java-1.7.0-openjdk-src-1.7.0.85-2.6.1.2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821150" comment="java-1.8.0-openjdk-1.8.0.51-1.b16.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821151" comment="java-1.8.0-openjdk-accessibility-1.8.0.51-1.b16.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821152" comment="java-1.8.0-openjdk-demo-1.8.0.51-1.b16.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821153" comment="java-1.8.0-openjdk-devel-1.8.0.51-1.b16.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821154" comment="java-1.8.0-openjdk-headless-1.8.0.51-1.b16.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821155" comment="java-1.8.0-openjdk-javadoc-1.8.0.51-1.b16.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821156" comment="java-1.8.0-openjdk-src-1.8.0.51-1.b16.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152632" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2632</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2632" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2632" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2632" ref_url="https://www.suse.com/security/cve/CVE-2015-2632" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1329-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001526.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001577.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1288-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TXVU3Y3MZTDHVP52DAEBRCD5GP4FAMIU/#TXVU3Y3MZTDHVP52DAEBRCD5GP4FAMIU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1289-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PZ3KWYO2IVEORKHG62M62G3UEKUH6TTO/#PZ3KWYO2IVEORKHG62M62G3UEKUH6TTO" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45 allows remote attackers to affect confidentiality via unknown vectors related to 2D.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2632/">CVE-2015-2632 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2632">CVE-2015-2632 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/937828">SUSE bug 937828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938248">SUSE bug 938248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938895">SUSE bug 938895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821198" comment="java-1.6.0-openjdk-1.6.0.36-1.13.8.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821199" comment="java-1.6.0-openjdk-demo-1.6.0.36-1.13.8.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821200" comment="java-1.6.0-openjdk-devel-1.6.0.36-1.13.8.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821201" comment="java-1.6.0-openjdk-javadoc-1.6.0.36-1.13.8.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821202" comment="java-1.6.0-openjdk-src-1.6.0.36-1.13.8.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821157" comment="java-1.7.0-openjdk-1.7.0.85-2.6.1.2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821158" comment="java-1.7.0-openjdk-accessibility-1.7.0.85-2.6.1.2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821159" comment="java-1.7.0-openjdk-demo-1.7.0.85-2.6.1.2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821160" comment="java-1.7.0-openjdk-devel-1.7.0.85-2.6.1.2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821161" comment="java-1.7.0-openjdk-headless-1.7.0.85-2.6.1.2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821162" comment="java-1.7.0-openjdk-javadoc-1.7.0.85-2.6.1.2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821163" comment="java-1.7.0-openjdk-src-1.7.0.85-2.6.1.2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821150" comment="java-1.8.0-openjdk-1.8.0.51-1.b16.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821151" comment="java-1.8.0-openjdk-accessibility-1.8.0.51-1.b16.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821152" comment="java-1.8.0-openjdk-demo-1.8.0.51-1.b16.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821153" comment="java-1.8.0-openjdk-devel-1.8.0.51-1.b16.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821154" comment="java-1.8.0-openjdk-headless-1.8.0.51-1.b16.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821155" comment="java-1.8.0-openjdk-javadoc-1.8.0.51-1.b16.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821156" comment="java-1.8.0-openjdk-src-1.8.0.51-1.b16.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152643" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2643</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2643" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2643" ref_url="https://www.suse.com/security/cve/CVE-2015-2643" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001639.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.43 and earlier and 5.6.24 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Optimizer.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2643/">CVE-2015-2643 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2643">CVE-2015-2643 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/938412">SUSE bug 938412</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821233" comment="mariadb-5.5.44-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821234" comment="mariadb-bench-5.5.44-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821235" comment="mariadb-devel-5.5.44-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821236" comment="mariadb-embedded-5.5.44-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821237" comment="mariadb-embedded-devel-5.5.44-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821238" comment="mariadb-libs-5.5.44-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821239" comment="mariadb-server-5.5.44-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821240" comment="mariadb-test-5.5.44-1.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152648" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2648</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2648" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2648" ref_url="https://www.suse.com/security/cve/CVE-2015-2648" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001639.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.43 and earlier and 5.6.24 and earlier allows remote authenticated users to affect availability via vectors related to DML.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2648/">CVE-2015-2648 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2648">CVE-2015-2648 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/938412">SUSE bug 938412</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821233" comment="mariadb-5.5.44-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821234" comment="mariadb-bench-5.5.44-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821235" comment="mariadb-devel-5.5.44-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821236" comment="mariadb-embedded-5.5.44-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821237" comment="mariadb-embedded-devel-5.5.44-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821238" comment="mariadb-libs-5.5.44-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821239" comment="mariadb-server-5.5.44-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821240" comment="mariadb-test-5.5.44-1.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152659" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2659</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2659" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2659" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2659" ref_url="https://www.suse.com/security/cve/CVE-2015-2659" source="SUSE CVE"/>
		<reference ref_id="TID7016694" ref_url="https://www.suse.com/support/kb/doc/?id=7016694" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1289-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PZ3KWYO2IVEORKHG62M62G3UEKUH6TTO/#PZ3KWYO2IVEORKHG62M62G3UEKUH6TTO" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 8u45 and Java SE Embedded 8u33 allows remote attackers to affect availability via unknown vectors related to Security.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2659/">CVE-2015-2659 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2659">CVE-2015-2659 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/937828">SUSE bug 937828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938248">SUSE bug 938248</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821150" comment="java-1.8.0-openjdk-1.8.0.51-1.b16.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821151" comment="java-1.8.0-openjdk-accessibility-1.8.0.51-1.b16.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821152" comment="java-1.8.0-openjdk-demo-1.8.0.51-1.b16.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821153" comment="java-1.8.0-openjdk-devel-1.8.0.51-1.b16.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821154" comment="java-1.8.0-openjdk-headless-1.8.0.51-1.b16.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821155" comment="java-1.8.0-openjdk-javadoc-1.8.0.51-1.b16.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821156" comment="java-1.8.0-openjdk-src-1.8.0.51-1.b16.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152666" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2666</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2666" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2666" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2666" ref_url="https://www.suse.com/security/cve/CVE-2015-2666" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001441.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OC7663UNXLKFWJKPITRGQNF4FU4KJWNK/#OC7663UNXLKFWJKPITRGQNF4FU4KJWNK" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the get_matching_model_microcode function in arch/x86/kernel/cpu/microcode/intel_early.c in the Linux kernel before 4.0 allows context-dependent attackers to gain privileges by constructing a crafted microcode header and leveraging root privileges for write access to the initrd.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2666/">CVE-2015-2666 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2666">CVE-2015-2666 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/922944">SUSE bug 922944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939044">SUSE bug 939044</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821203" comment="kernel-3.10.0-229.11.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821204" comment="kernel-abi-whitelists-3.10.0-229.11.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821205" comment="kernel-debug-3.10.0-229.11.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821208" comment="kernel-doc-3.10.0-229.11.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821209" comment="kernel-headers-3.10.0-229.11.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821210" comment="kernel-tools-3.10.0-229.11.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821211" comment="kernel-tools-libs-3.10.0-229.11.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821213" comment="perf-3.10.0-229.11.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821214" comment="python-perf-3.10.0-229.11.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152675" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2675</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2675" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2675" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2675" ref_url="https://www.suse.com/security/cve/CVE-2015-2675" source="SUSE CVE"/>
    <description>
    The OAuth implementation in librest before 0.7.93 incorrectly truncates the pointer returned by the rest_proxy_call_get_url function, which allows remote attackers to cause a denial of service (application crash) via running the EnsureCredentials method from the org.gnome.OnlineAccounts.Account interface on an object representing a Flickr account.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2675/">CVE-2015-2675 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-2675">CVE-2015-2675 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/923618">SUSE bug 923618</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821471" comment="rest-0.7.92-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821472" comment="rest-devel-0.7.92-3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152694" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2694</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2694" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2694" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2694" ref_url="https://www.suse.com/security/cve/CVE-2015-2694" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001505.html" source="SUSE-SU"/>
    <description>
    The kdcpreauth modules in MIT Kerberos 5 (aka krb5) 1.12.x and 1.13.x before 1.13.2 do not properly track whether a client's request has been validated, which allows remote attackers to bypass an intended preauthentication requirement by providing (1) zero bytes of data or (2) an arbitrary realm name, related to plugins/preauth/otp/main.c and plugins/preauth/pkinit/pkinit_srv.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2694/">CVE-2015-2694 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2694">CVE-2015-2694 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/928978">SUSE bug 928978</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821425" comment="krb5-devel-1.13.2-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821426" comment="krb5-libs-1.13.2-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821427" comment="krb5-pkinit-1.13.2-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821428" comment="krb5-server-1.13.2-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821429" comment="krb5-server-ldap-1.13.2-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821430" comment="krb5-workstation-1.13.2-10.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152704" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2704</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2704" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2704" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2704" ref_url="https://www.suse.com/security/cve/CVE-2015-2704" source="SUSE CVE"/>
    <description>
    realmd allows remote attackers to inject arbitrary configurations in to sssd.conf and smb.conf via a newline character in an LDAP response.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2704/">CVE-2015-2704 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2704">CVE-2015-2704 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1048025">SUSE bug 1048025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916766">SUSE bug 916766</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821450" comment="realmd-0.16.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821451" comment="realmd-devel-docs-0.16.1-5.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152708" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2708</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2708" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2708" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2708" ref_url="https://www.suse.com/security/cve/CVE-2015-2708" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0978-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001417.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0892-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/A7GUOHF2JHZW75JGXTN7WYJAJHAHT6QM/#A7GUOHF2JHZW75JGXTN7WYJAJHAHT6QM" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VNGKNJGYZV377DMZMDSGTC6LXFPDDSY/#5VNGKNJGYZV377DMZMDSGTC6LXFPDDSY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 38.0, Firefox ESR 31.x before 31.7, and Thunderbird before 31.7 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-11-20"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2708/">CVE-2015-2708 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2708">CVE-2015-2708 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/930622">SUSE bug 930622</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821023" comment="firefox-38.0-3.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821031" comment="thunderbird-31.7.0-1.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152710" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2710</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2710" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2710" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2710" ref_url="https://www.suse.com/security/cve/CVE-2015-2710" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0978-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001417.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0892-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/A7GUOHF2JHZW75JGXTN7WYJAJHAHT6QM/#A7GUOHF2JHZW75JGXTN7WYJAJHAHT6QM" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VNGKNJGYZV377DMZMDSGTC6LXFPDDSY/#5VNGKNJGYZV377DMZMDSGTC6LXFPDDSY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the SVGTextFrame class in Mozilla Firefox before 38.0, Firefox ESR 31.x before 31.7, and Thunderbird before 31.7 allows remote attackers to execute arbitrary code via crafted SVG graphics data in conjunction with a crafted Cascading Style Sheets (CSS) token sequence.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-11-20"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2710/">CVE-2015-2710 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2710">CVE-2015-2710 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/930622">SUSE bug 930622</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821023" comment="firefox-38.0-3.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821031" comment="thunderbird-31.7.0-1.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152713" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2713</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2713" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2713" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2713" ref_url="https://www.suse.com/security/cve/CVE-2015-2713" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0978-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001417.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0892-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/A7GUOHF2JHZW75JGXTN7WYJAJHAHT6QM/#A7GUOHF2JHZW75JGXTN7WYJAJHAHT6QM" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VNGKNJGYZV377DMZMDSGTC6LXFPDDSY/#5VNGKNJGYZV377DMZMDSGTC6LXFPDDSY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the SetBreaks function in Mozilla Firefox before 38.0, Firefox ESR 31.x before 31.7, and Thunderbird before 31.7 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a document containing crafted text in conjunction with a Cascading Style Sheets (CSS) token sequence containing properties related to vertical text.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-11-23"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2713/">CVE-2015-2713 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2713">CVE-2015-2713 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/930622">SUSE bug 930622</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821023" comment="firefox-38.0-3.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821031" comment="thunderbird-31.7.0-1.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152716" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2716</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2716" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2716" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2716" ref_url="https://www.suse.com/security/cve/CVE-2015-2716" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0978-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001417.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0892-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/A7GUOHF2JHZW75JGXTN7WYJAJHAHT6QM/#A7GUOHF2JHZW75JGXTN7WYJAJHAHT6QM" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VNGKNJGYZV377DMZMDSGTC6LXFPDDSY/#5VNGKNJGYZV377DMZMDSGTC6LXFPDDSY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Buffer overflow in the XML parser in Mozilla Firefox before 38.0, Firefox ESR 31.x before 31.7, and Thunderbird before 31.7 allows remote attackers to execute arbitrary code by providing a large amount of compressed XML data, a related issue to CVE-2015-1283.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-11-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2716/">CVE-2015-2716 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2716">CVE-2015-2716 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/930622">SUSE bug 930622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939077">SUSE bug 939077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980391">SUSE bug 980391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983985">SUSE bug 983985</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826990" comment="expat-2.1.0-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826991" comment="expat-devel-2.1.0-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826992" comment="expat-static-2.1.0-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821023" comment="firefox-38.0-3.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821031" comment="thunderbird-31.7.0-1.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152722" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2722</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2722" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2722" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2722" ref_url="https://www.suse.com/security/cve/CVE-2015-2722" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1268-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001502.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001556.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1229-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W6I3NS2A7HT62ZCI53NMT32HGQIV5BS4/#W6I3NS2A7HT62ZCI53NMT32HGQIV5BS4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VNGKNJGYZV377DMZMDSGTC6LXFPDDSY/#5VNGKNJGYZV377DMZMDSGTC6LXFPDDSY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the CanonicalizeXPCOMParticipant function in Mozilla Firefox before 39.0 and Firefox ESR 31.x before 31.8 and 38.x before 38.1 allows remote attackers to execute arbitrary code via vectors involving attachment of an XMLHttpRequest object to a shared worker.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-30"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2722/">CVE-2015-2722 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2722">CVE-2015-2722 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/863095">SUSE bug 863095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821149" comment="firefox-38.1.0-1.el7_1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152724" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2724</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2724" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2724" ref_url="https://www.suse.com/security/cve/CVE-2015-2724" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1268-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001502.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001556.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1229-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W6I3NS2A7HT62ZCI53NMT32HGQIV5BS4/#W6I3NS2A7HT62ZCI53NMT32HGQIV5BS4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VNGKNJGYZV377DMZMDSGTC6LXFPDDSY/#5VNGKNJGYZV377DMZMDSGTC6LXFPDDSY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 39.0, Firefox ESR 31.x before 31.8 and 38.x before 38.1, and Thunderbird before 38.1 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-31"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2724/">CVE-2015-2724 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2724">CVE-2015-2724 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/863095">SUSE bug 863095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821149" comment="firefox-38.1.0-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821174" comment="thunderbird-31.8.0-1.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152725" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2725</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2725" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2725" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2725" ref_url="https://www.suse.com/security/cve/CVE-2015-2725" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1268-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001502.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001556.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1229-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W6I3NS2A7HT62ZCI53NMT32HGQIV5BS4/#W6I3NS2A7HT62ZCI53NMT32HGQIV5BS4" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 39.0, Firefox ESR 38.x before 38.1, and Thunderbird before 38.1 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-31"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2725/">CVE-2015-2725 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2725">CVE-2015-2725 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/863095">SUSE bug 863095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821149" comment="firefox-38.1.0-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821174" comment="thunderbird-31.8.0-1.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152727" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2727</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2727" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2727" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2727" ref_url="https://www.suse.com/security/cve/CVE-2015-2727" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2015:1229-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W6I3NS2A7HT62ZCI53NMT32HGQIV5BS4/#W6I3NS2A7HT62ZCI53NMT32HGQIV5BS4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Mozilla Firefox 38.0 and Firefox ESR 38.0 allow user-assisted remote attackers to read arbitrary files or execute arbitrary JavaScript code with chrome privileges via a crafted web site that is accessed with unspecified mouse and keyboard actions.  NOTE: this vulnerability exists because of a CVE-2015-0821 regression.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-05"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2727/">CVE-2015-2727 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2727">CVE-2015-2727 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/863095">SUSE bug 863095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821149" comment="firefox-38.1.0-1.el7_1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152728" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2728</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2728" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2728" ref_url="https://www.suse.com/security/cve/CVE-2015-2728" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1268-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001502.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001556.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1229-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W6I3NS2A7HT62ZCI53NMT32HGQIV5BS4/#W6I3NS2A7HT62ZCI53NMT32HGQIV5BS4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VNGKNJGYZV377DMZMDSGTC6LXFPDDSY/#5VNGKNJGYZV377DMZMDSGTC6LXFPDDSY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    The IndexedDatabaseManager class in the IndexedDB implementation in Mozilla Firefox before 39.0 and Firefox ESR 31.x before 31.8 and 38.x before 38.1 misinterprets an unspecified IDBDatabase field as a pointer, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via unspecified vectors, related to a "type confusion" issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-02"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2728/">CVE-2015-2728 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2728">CVE-2015-2728 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/863095">SUSE bug 863095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821149" comment="firefox-38.1.0-1.el7_1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152729" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2729</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2729" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2729" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2729" ref_url="https://www.suse.com/security/cve/CVE-2015-2729" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2015:1229-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W6I3NS2A7HT62ZCI53NMT32HGQIV5BS4/#W6I3NS2A7HT62ZCI53NMT32HGQIV5BS4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    The AudioParamTimeline::AudioNodeInputValue function in the Web Audio implementation in Mozilla Firefox before 39.0 and Firefox ESR 38.x before 38.1 does not properly calculate an oscillator rendering range, which allows remote attackers to obtain sensitive information from process memory or cause a denial of service (out-of-bounds read) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-31"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2729/">CVE-2015-2729 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2729">CVE-2015-2729 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/863095">SUSE bug 863095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821149" comment="firefox-38.1.0-1.el7_1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152730" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2730</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2730" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2730" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2730" ref_url="https://www.suse.com/security/cve/CVE-2015-2730" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1268-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001502.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001556.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1229-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W6I3NS2A7HT62ZCI53NMT32HGQIV5BS4/#W6I3NS2A7HT62ZCI53NMT32HGQIV5BS4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VNGKNJGYZV377DMZMDSGTC6LXFPDDSY/#5VNGKNJGYZV377DMZMDSGTC6LXFPDDSY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Mozilla Network Security Services (NSS) before 3.19.1, as used in Mozilla Firefox before 39.0, Firefox ESR 31.x before 31.8 and 38.x before 38.1, and other products, does not properly perform Elliptical Curve Cryptography (ECC) multiplications, which makes it easier for remote attackers to spoof ECDSA signatures via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-02"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2730/">CVE-2015-2730 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2730">CVE-2015-2730 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/863095">SUSE bug 863095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821255" comment="nss-softokn-3.16.2.3-13.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821256" comment="nss-softokn-devel-3.16.2.3-13.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821257" comment="nss-softokn-freebl-3.16.2.3-13.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821258" comment="nss-softokn-freebl-devel-3.16.2.3-13.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152731" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2731</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2731" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2731" ref_url="https://www.suse.com/security/cve/CVE-2015-2731" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2015:1229-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W6I3NS2A7HT62ZCI53NMT32HGQIV5BS4/#W6I3NS2A7HT62ZCI53NMT32HGQIV5BS4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the CSPService::ShouldLoad function in the microtask implementation in Mozilla Firefox before 39.0, Firefox ESR 38.x before 38.1, and Thunderbird before 38.1 allows remote attackers to execute arbitrary code by leveraging client-side JavaScript that triggers removal of a DOM object on the basis of a Content Policy.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2731/">CVE-2015-2731 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2731">CVE-2015-2731 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/863095">SUSE bug 863095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821149" comment="firefox-38.1.0-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821174" comment="thunderbird-31.8.0-1.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152733" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2733</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2733" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2733" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2733" ref_url="https://www.suse.com/security/cve/CVE-2015-2733" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1268-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001502.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001556.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1229-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W6I3NS2A7HT62ZCI53NMT32HGQIV5BS4/#W6I3NS2A7HT62ZCI53NMT32HGQIV5BS4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VNGKNJGYZV377DMZMDSGTC6LXFPDDSY/#5VNGKNJGYZV377DMZMDSGTC6LXFPDDSY" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the CanonicalizeXPCOMParticipant function in Mozilla Firefox before 39.0 and Firefox ESR 31.x before 31.8 and 38.x before 38.1 allows remote attackers to execute arbitrary code via vectors involving attachment of an XMLHttpRequest object to a dedicated worker.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-30"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2733/">CVE-2015-2733 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2733">CVE-2015-2733 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/863095">SUSE bug 863095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821149" comment="firefox-38.1.0-1.el7_1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152734" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2734</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2734" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2734" ref_url="https://www.suse.com/security/cve/CVE-2015-2734" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1268-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001502.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001556.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1229-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W6I3NS2A7HT62ZCI53NMT32HGQIV5BS4/#W6I3NS2A7HT62ZCI53NMT32HGQIV5BS4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VNGKNJGYZV377DMZMDSGTC6LXFPDDSY/#5VNGKNJGYZV377DMZMDSGTC6LXFPDDSY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    The CairoTextureClientD3D9::BorrowDrawTarget function in the Direct3D 9 implementation in Mozilla Firefox before 39.0, Firefox ESR 31.x before 31.8 and 38.x before 38.1, and Thunderbird before 38.1 reads data from uninitialized memory locations, which has unspecified impact and attack vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-04"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2734/">CVE-2015-2734 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2734">CVE-2015-2734 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/863095">SUSE bug 863095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821149" comment="firefox-38.1.0-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821174" comment="thunderbird-31.8.0-1.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152735" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2735</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2735" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2735" ref_url="https://www.suse.com/security/cve/CVE-2015-2735" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1268-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001502.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001556.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1229-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W6I3NS2A7HT62ZCI53NMT32HGQIV5BS4/#W6I3NS2A7HT62ZCI53NMT32HGQIV5BS4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VNGKNJGYZV377DMZMDSGTC6LXFPDDSY/#5VNGKNJGYZV377DMZMDSGTC6LXFPDDSY" source="SUSE-SU"/>
    <description>
    nsZipArchive.cpp in Mozilla Firefox before 39.0, Firefox ESR 31.x before 31.8 and 38.x before 38.1, and Thunderbird before 38.1 accesses unintended memory locations, which allows remote attackers to have an unspecified impact via a crafted ZIP archive.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-04"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2735/">CVE-2015-2735 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2735">CVE-2015-2735 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/863095">SUSE bug 863095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821149" comment="firefox-38.1.0-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821174" comment="thunderbird-31.8.0-1.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152736" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2736</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2736" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2736" ref_url="https://www.suse.com/security/cve/CVE-2015-2736" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1268-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001502.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001556.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1229-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W6I3NS2A7HT62ZCI53NMT32HGQIV5BS4/#W6I3NS2A7HT62ZCI53NMT32HGQIV5BS4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VNGKNJGYZV377DMZMDSGTC6LXFPDDSY/#5VNGKNJGYZV377DMZMDSGTC6LXFPDDSY" source="SUSE-SU"/>
    <description>
    The nsZipArchive::BuildFileList function in Mozilla Firefox before 39.0, Firefox ESR 31.x before 31.8 and 38.x before 38.1, and Thunderbird before 38.1 accesses unintended memory locations, which allows remote attackers to have an unspecified impact via a crafted ZIP archive.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-31"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2736/">CVE-2015-2736 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2736">CVE-2015-2736 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/863095">SUSE bug 863095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821149" comment="firefox-38.1.0-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821174" comment="thunderbird-31.8.0-1.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152737" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2737</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2737" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2737" ref_url="https://www.suse.com/security/cve/CVE-2015-2737" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1268-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001502.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001556.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1229-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W6I3NS2A7HT62ZCI53NMT32HGQIV5BS4/#W6I3NS2A7HT62ZCI53NMT32HGQIV5BS4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VNGKNJGYZV377DMZMDSGTC6LXFPDDSY/#5VNGKNJGYZV377DMZMDSGTC6LXFPDDSY" source="SUSE-SU"/>
    <description>
    The rx::d3d11::SetBufferData function in the Direct3D 11 implementation in Mozilla Firefox before 39.0, Firefox ESR 31.x before 31.8 and 38.x before 38.1, and Thunderbird before 38.1 reads data from uninitialized memory locations, which has unspecified impact and attack vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-02"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2737/">CVE-2015-2737 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2737">CVE-2015-2737 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/863095">SUSE bug 863095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821149" comment="firefox-38.1.0-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821174" comment="thunderbird-31.8.0-1.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152738" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2738</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2738" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2738" ref_url="https://www.suse.com/security/cve/CVE-2015-2738" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1268-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001502.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001556.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1229-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W6I3NS2A7HT62ZCI53NMT32HGQIV5BS4/#W6I3NS2A7HT62ZCI53NMT32HGQIV5BS4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VNGKNJGYZV377DMZMDSGTC6LXFPDDSY/#5VNGKNJGYZV377DMZMDSGTC6LXFPDDSY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    The YCbCrImageDataDeserializer::ToDataSourceSurface function in the YCbCr implementation in Mozilla Firefox before 39.0, Firefox ESR 31.x before 31.8 and 38.x before 38.1, and Thunderbird before 38.1 reads data from uninitialized memory locations, which has unspecified impact and attack vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-02"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2738/">CVE-2015-2738 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2738">CVE-2015-2738 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/863095">SUSE bug 863095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821149" comment="firefox-38.1.0-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821174" comment="thunderbird-31.8.0-1.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152739" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2739</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2739" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2739" ref_url="https://www.suse.com/security/cve/CVE-2015-2739" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1268-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001502.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001556.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1229-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W6I3NS2A7HT62ZCI53NMT32HGQIV5BS4/#W6I3NS2A7HT62ZCI53NMT32HGQIV5BS4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VNGKNJGYZV377DMZMDSGTC6LXFPDDSY/#5VNGKNJGYZV377DMZMDSGTC6LXFPDDSY" source="SUSE-SU"/>
    <description>
    The ArrayBufferBuilder::append function in Mozilla Firefox before 39.0, Firefox ESR 31.x before 31.8 and 38.x before 38.1, and Thunderbird before 38.1 accesses unintended memory locations, which has unspecified impact and attack vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-02"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2739/">CVE-2015-2739 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2739">CVE-2015-2739 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/863095">SUSE bug 863095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821149" comment="firefox-38.1.0-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821174" comment="thunderbird-31.8.0-1.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152740" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2740</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2740" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2740" ref_url="https://www.suse.com/security/cve/CVE-2015-2740" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1268-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001502.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001556.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1229-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W6I3NS2A7HT62ZCI53NMT32HGQIV5BS4/#W6I3NS2A7HT62ZCI53NMT32HGQIV5BS4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VNGKNJGYZV377DMZMDSGTC6LXFPDDSY/#5VNGKNJGYZV377DMZMDSGTC6LXFPDDSY" source="SUSE-SU"/>
    <description>
    Buffer overflow in the nsXMLHttpRequest::AppendToResponseText function in Mozilla Firefox before 39.0, Firefox ESR 31.x before 31.8 and 38.x before 38.1, and Thunderbird before 38.1 might allow remote attackers to cause a denial of service or have unspecified other impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-02"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2740/">CVE-2015-2740 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2740">CVE-2015-2740 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/863095">SUSE bug 863095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821149" comment="firefox-38.1.0-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821174" comment="thunderbird-31.8.0-1.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152741" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2741</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2741" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2741" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2741" ref_url="https://www.suse.com/security/cve/CVE-2015-2741" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2015:1229-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W6I3NS2A7HT62ZCI53NMT32HGQIV5BS4/#W6I3NS2A7HT62ZCI53NMT32HGQIV5BS4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 39.0, Firefox ESR 38.x before 38.1, and Thunderbird before 38.1 do not enforce key pinning upon encountering an X.509 certificate problem that generates a user dialog, which allows user-assisted man-in-the-middle attackers to bypass intended access restrictions by triggering a (1) expired certificate or (2) mismatched hostname for a domain with pinning enabled.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-02"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2741/">CVE-2015-2741 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2741">CVE-2015-2741 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/863095">SUSE bug 863095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821149" comment="firefox-38.1.0-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821174" comment="thunderbird-31.8.0-1.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152743" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2743</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2743" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2743" ref_url="https://www.suse.com/security/cve/CVE-2015-2743" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1268-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001502.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001556.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1229-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W6I3NS2A7HT62ZCI53NMT32HGQIV5BS4/#W6I3NS2A7HT62ZCI53NMT32HGQIV5BS4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VNGKNJGYZV377DMZMDSGTC6LXFPDDSY/#5VNGKNJGYZV377DMZMDSGTC6LXFPDDSY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    PDF.js in Mozilla Firefox before 39.0 and Firefox ESR 31.x before 31.8 and 38.x before 38.1 enables excessive privileges for internal Workers, which might allow remote attackers to execute arbitrary code by leveraging a Same Origin Policy bypass.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-03"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2743/">CVE-2015-2743 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2743">CVE-2015-2743 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/863095">SUSE bug 863095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821149" comment="firefox-38.1.0-1.el7_1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152775" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2775</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2775" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2775" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2775" ref_url="https://www.suse.com/security/cve/CVE-2015-2775" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:4296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005015.html" source="SUSE-SU"/>
    <description>
    Directory traversal vulnerability in GNU Mailman before 2.1.20, when not using a static alias, allows remote attackers to execute arbitrary files via a .. (dot dot) in a list name.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2015-2775/">CVE-2015-2775 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2775">CVE-2015-2775 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/925502">SUSE bug 925502</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821126" comment="mailman-2.1.15-21.el7_1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152783" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2783</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2783" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2783" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2783" ref_url="https://www.suse.com/security/cve/CVE-2015-2783" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0868-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1638-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002131.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0855-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DWA3SLBZ2CAU24QEILAJZHOWAF27NHY2/#DWA3SLBZ2CAU24QEILAJZHOWAF27NHY2" source="SUSE-SU"/>
    <description>
    ext/phar/phar.c in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 allows remote attackers to obtain sensitive information from process memory or cause a denial of service (buffer over-read and application crash) via a crafted length value in conjunction with crafted serialized data in a phar archive, related to the phar_parse_metadata and phar_parse_pharfile functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2783/">CVE-2015-2783 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2783">CVE-2015-2783 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/928408">SUSE bug 928408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928506">SUSE bug 928506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928511">SUSE bug 928511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931418">SUSE bug 931418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821089" comment="php-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821090" comment="php-bcmath-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821091" comment="php-cli-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821092" comment="php-common-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821093" comment="php-dba-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821094" comment="php-devel-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821095" comment="php-embedded-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821096" comment="php-enchant-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821097" comment="php-fpm-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821098" comment="php-gd-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821099" comment="php-intl-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821100" comment="php-ldap-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821101" comment="php-mbstring-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821102" comment="php-mysql-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821103" comment="php-mysqlnd-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821104" comment="php-odbc-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821105" comment="php-pdo-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821106" comment="php-pgsql-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821107" comment="php-process-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821108" comment="php-pspell-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821109" comment="php-recode-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821110" comment="php-snmp-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821111" comment="php-soap-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821112" comment="php-xml-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821113" comment="php-xmlrpc-5.4.16-36.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152787" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2787</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2787" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2787" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2787" ref_url="https://www.suse.com/security/cve/CVE-2015-2787" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0868-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1638-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002131.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the process_nested_data function in ext/standard/var_unserializer.re in PHP before 5.4.39, 5.5.x before 5.5.23, and 5.6.x before 5.6.7 allows remote attackers to execute arbitrary code via a crafted unserialize call that leverages use of the unset function within an __wakeup function, a related issue to CVE-2015-0231.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2787/">CVE-2015-2787 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2787">CVE-2015-2787 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/924972">SUSE bug 924972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821089" comment="php-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821090" comment="php-bcmath-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821091" comment="php-cli-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821092" comment="php-common-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821093" comment="php-dba-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821094" comment="php-devel-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821095" comment="php-embedded-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821096" comment="php-enchant-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821097" comment="php-fpm-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821098" comment="php-gd-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821099" comment="php-intl-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821100" comment="php-ldap-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821101" comment="php-mbstring-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821102" comment="php-mysql-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821103" comment="php-mysqlnd-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821104" comment="php-odbc-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821105" comment="php-pdo-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821106" comment="php-pgsql-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821107" comment="php-process-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821108" comment="php-pspell-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821109" comment="php-recode-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821110" comment="php-snmp-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821111" comment="php-soap-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821112" comment="php-xml-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821113" comment="php-xmlrpc-5.4.16-36.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2806</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2806" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2806" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2806" ref_url="https://www.suse.com/security/cve/CVE-2015-2806" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001393.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001791.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in asn1_der_decoding in libtasn1 before 4.4 allows remote attackers to have unspecified impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2806/">CVE-2015-2806 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2806">CVE-2015-2806 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/924828">SUSE bug 924828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929414">SUSE bug 929414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961491">SUSE bug 961491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969208">SUSE bug 969208</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823204" comment="libtasn1-4.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823205" comment="libtasn1-devel-4.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823206" comment="libtasn1-tools-4.10-1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152808" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2808</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2808" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2808" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2808" ref_url="https://www.suse.com/security/cve/CVE-2015-2808" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-4" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1329-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001526.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001717.html" source="SUSE-SU"/>
		<reference ref_id="TID7016694" ref_url="https://www.suse.com/support/kb/doc/?id=7016694" source="SUSE-SU"/>
		<reference ref_id="TID7017143" ref_url="https://www.suse.com/support/kb/doc/?id=7017143" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1288-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TXVU3Y3MZTDHVP52DAEBRCD5GP4FAMIU/#TXVU3Y3MZTDHVP52DAEBRCD5GP4FAMIU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1289-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PZ3KWYO2IVEORKHG62M62G3UEKUH6TTO/#PZ3KWYO2IVEORKHG62M62G3UEKUH6TTO" source="SUSE-SU"/>
    <description>
    The RC4 algorithm, as used in the TLS protocol and SSL protocol, does not properly combine state data with key data during the initialization phase, which makes it easier for remote attackers to conduct plaintext-recovery attacks against the initial bytes of a stream by sniffing network traffic that occasionally relies on keys affected by the Invariance Weakness, and then using a brute-force approach involving LSB values, aka the "Bar Mitzvah" issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2808/">CVE-2015-2808 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2808">CVE-2015-2808 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/925378">SUSE bug 925378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938248">SUSE bug 938248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938895">SUSE bug 938895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952088">SUSE bug 952088</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821198" comment="java-1.6.0-openjdk-1.6.0.36-1.13.8.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821199" comment="java-1.6.0-openjdk-demo-1.6.0.36-1.13.8.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821200" comment="java-1.6.0-openjdk-devel-1.6.0.36-1.13.8.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821201" comment="java-1.6.0-openjdk-javadoc-1.6.0.36-1.13.8.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821202" comment="java-1.6.0-openjdk-src-1.6.0.36-1.13.8.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821157" comment="java-1.7.0-openjdk-1.7.0.85-2.6.1.2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821158" comment="java-1.7.0-openjdk-accessibility-1.7.0.85-2.6.1.2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821159" comment="java-1.7.0-openjdk-demo-1.7.0.85-2.6.1.2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821160" comment="java-1.7.0-openjdk-devel-1.7.0.85-2.6.1.2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821161" comment="java-1.7.0-openjdk-headless-1.7.0.85-2.6.1.2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821162" comment="java-1.7.0-openjdk-javadoc-1.7.0.85-2.6.1.2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821163" comment="java-1.7.0-openjdk-src-1.7.0.85-2.6.1.2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821150" comment="java-1.8.0-openjdk-1.8.0.51-1.b16.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821151" comment="java-1.8.0-openjdk-accessibility-1.8.0.51-1.b16.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821152" comment="java-1.8.0-openjdk-demo-1.8.0.51-1.b16.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821153" comment="java-1.8.0-openjdk-devel-1.8.0.51-1.b16.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821154" comment="java-1.8.0-openjdk-headless-1.8.0.51-1.b16.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821155" comment="java-1.8.0-openjdk-javadoc-1.8.0.51-1.b16.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821156" comment="java-1.8.0-openjdk-src-1.8.0.51-1.b16.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152830" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2830</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2830" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2830" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2830" ref_url="https://www.suse.com/security/cve/CVE-2015-2830" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1592-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001596.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001611.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OC7663UNXLKFWJKPITRGQNF4FU4KJWNK/#OC7663UNXLKFWJKPITRGQNF4FU4KJWNK" source="SUSE-SU"/>
    <description>
    arch/x86/kernel/entry_64.S in the Linux kernel before 3.19.2 does not prevent the TS_COMPAT flag from reaching a user-mode task, which might allow local users to bypass the seccomp or audit protection mechanism via a crafted application that uses the (1) fork or (2) close system call, as demonstrated by an attack against seccomp before 3.16.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2830/">CVE-2015-2830 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2830">CVE-2015-2830 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/903967">SUSE bug 903967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/926240">SUSE bug 926240</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821114" comment="kernel-3.10.0-229.7.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821115" comment="kernel-abi-whitelists-3.10.0-229.7.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821116" comment="kernel-debug-3.10.0-229.7.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821119" comment="kernel-doc-3.10.0-229.7.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821120" comment="kernel-headers-3.10.0-229.7.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821121" comment="kernel-tools-3.10.0-229.7.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821122" comment="kernel-tools-libs-3.10.0-229.7.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821124" comment="perf-3.10.0-229.7.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821125" comment="python-perf-3.10.0-229.7.2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152922" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2922</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2922" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2922" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2922" ref_url="https://www.suse.com/security/cve/CVE-2015-2922" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001563.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1382-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WK73PLTGJ2J7BSDKZCVOUPKENB4UND7S/#WK73PLTGJ2J7BSDKZCVOUPKENB4UND7S" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OC7663UNXLKFWJKPITRGQNF4FU4KJWNK/#OC7663UNXLKFWJKPITRGQNF4FU4KJWNK" source="SUSE-SU"/>
    <description>
    The ndisc_router_discovery function in net/ipv6/ndisc.c in the Neighbor Discovery (ND) protocol implementation in the IPv6 stack in the Linux kernel before 3.19.6 allows remote attackers to reconfigure a hop-limit setting via a small hop_limit value in a Router Advertisement (RA) message.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2922/">CVE-2015-2922 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2922">CVE-2015-2922 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/903967">SUSE bug 903967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922583">SUSE bug 922583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/926223">SUSE bug 926223</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821203" comment="kernel-3.10.0-229.11.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821204" comment="kernel-abi-whitelists-3.10.0-229.11.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821205" comment="kernel-debug-3.10.0-229.11.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821208" comment="kernel-doc-3.10.0-229.11.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821209" comment="kernel-headers-3.10.0-229.11.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821210" comment="kernel-tools-3.10.0-229.11.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821211" comment="kernel-tools-libs-3.10.0-229.11.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821213" comment="perf-3.10.0-229.11.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821214" comment="python-perf-3.10.0-229.11.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152924" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2924</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2924" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2924" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2924" ref_url="https://www.suse.com/security/cve/CVE-2015-2924" source="SUSE CVE"/>
    <description>
    The receive_ra function in rdisc/nm-lndp-rdisc.c in the Neighbor Discovery (ND) protocol implementation in the IPv6 stack in NetworkManager 1.x allows remote attackers to reconfigure a hop-limit setting via a small hop_limit value in a Router Advertisement (RA) message, a similar issue to CVE-2015-2922.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2924/">CVE-2015-2924 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2924">CVE-2015-2924 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/926223">SUSE bug 926223</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821478" comment="ModemManager-1.1.0-8.git20130913.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821479" comment="ModemManager-devel-1.1.0-8.git20130913.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821480" comment="ModemManager-glib-1.1.0-8.git20130913.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821481" comment="ModemManager-glib-devel-1.1.0-8.git20130913.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821482" comment="ModemManager-vala-1.1.0-8.git20130913.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821483" comment="NetworkManager-1.0.6-27.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821484" comment="NetworkManager-adsl-1.0.6-27.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821485" comment="NetworkManager-bluetooth-1.0.6-27.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821486" comment="NetworkManager-config-routing-rules-1.0.6-27.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821487" comment="NetworkManager-config-server-1.0.6-27.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821488" comment="NetworkManager-devel-1.0.6-27.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821489" comment="NetworkManager-glib-1.0.6-27.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821490" comment="NetworkManager-glib-devel-1.0.6-27.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821491" comment="NetworkManager-libnm-1.0.6-27.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821492" comment="NetworkManager-libnm-devel-1.0.6-27.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821493" comment="NetworkManager-libreswan-1.0.6-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821494" comment="NetworkManager-libreswan-gnome-1.0.6-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821495" comment="NetworkManager-team-1.0.6-27.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821496" comment="NetworkManager-tui-1.0.6-27.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821497" comment="NetworkManager-wifi-1.0.6-27.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821498" comment="NetworkManager-wwan-1.0.6-27.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821499" comment="libnm-gtk-1.0.6-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821500" comment="libnm-gtk-devel-1.0.6-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821501" comment="network-manager-applet-1.0.6-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821502" comment="nm-connection-editor-1.0.6-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152925" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2925</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2925" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2925" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2925" ref_url="https://www.suse.com/security/cve/CVE-2015-2925" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0335-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001875.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1842-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/52CT3NPGIEFS3FRUZ5D6HC6XZML63T2K/#52CT3NPGIEFS3FRUZ5D6HC6XZML63T2K" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OC7663UNXLKFWJKPITRGQNF4FU4KJWNK/#OC7663UNXLKFWJKPITRGQNF4FU4KJWNK" source="SUSE-SU"/>
    <description>
    The prepend_path function in fs/dcache.c in the Linux kernel before 4.2.4 does not properly handle rename actions inside a bind mount, which allows local users to bypass an intended container protection mechanism by renaming a directory, related to a "double-chroot attack."
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2925/">CVE-2015-2925 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2925">CVE-2015-2925 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/926238">SUSE bug 926238</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951625">SUSE bug 951625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951638">SUSE bug 951638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963994">SUSE bug 963994</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821413" comment="kernel-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821414" comment="kernel-abi-whitelists-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821415" comment="kernel-debug-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821418" comment="kernel-doc-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821419" comment="kernel-headers-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821420" comment="kernel-tools-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821421" comment="kernel-tools-libs-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821423" comment="perf-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821424" comment="python-perf-3.10.0-327.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153142" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3142</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3142" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3142" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3142" ref_url="https://www.suse.com/security/cve/CVE-2015-3142" source="SUSE CVE"/>
    <description>
    The kernel-invoked coredump processor in Automatic Bug Reporting Tool (ABRT) does not properly check the ownership of files before writing core dumps to them, which allows local users to obtain sensitive information by leveraging write permissions to the working directory of a crashed application.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3142/">CVE-2015-3142 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3142">CVE-2015-3142 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821037" comment="abrt-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821038" comment="abrt-addon-ccpp-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821039" comment="abrt-addon-kerneloops-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821040" comment="abrt-addon-pstoreoops-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821041" comment="abrt-addon-python-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821042" comment="abrt-addon-upload-watch-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821043" comment="abrt-addon-vmcore-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821044" comment="abrt-addon-xorg-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821045" comment="abrt-cli-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821046" comment="abrt-console-notification-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821047" comment="abrt-dbus-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821048" comment="abrt-desktop-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821049" comment="abrt-devel-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821050" comment="abrt-gui-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821051" comment="abrt-gui-devel-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821052" comment="abrt-gui-libs-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821053" comment="abrt-libs-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821054" comment="abrt-python-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821055" comment="abrt-python-doc-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821056" comment="abrt-retrace-client-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821057" comment="abrt-tui-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821058" comment="libreport-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821059" comment="libreport-anaconda-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821060" comment="libreport-cli-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821061" comment="libreport-compat-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821062" comment="libreport-devel-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821063" comment="libreport-filesystem-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821064" comment="libreport-gtk-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821065" comment="libreport-gtk-devel-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821066" comment="libreport-newt-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821067" comment="libreport-plugin-bugzilla-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821068" comment="libreport-plugin-kerneloops-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821069" comment="libreport-plugin-logger-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821070" comment="libreport-plugin-mailx-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821071" comment="libreport-plugin-reportuploader-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821072" comment="libreport-plugin-ureport-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821073" comment="libreport-python-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821074" comment="libreport-web-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821075" comment="libreport-web-devel-2.1.11-23.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153143" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3143</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3143" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3143" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3143" ref_url="https://www.suse.com/security/cve/CVE-2015-3143" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001421.html" source="SUSE-SU"/>
    <description>
    cURL and libcurl 7.10.6 through 7.41.0 does not properly re-use NTLM connections, which allows remote attackers to connect as other users via an unauthenticated request, a similar issue to CVE-2014-0015.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3143/">CVE-2015-3143 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3143">CVE-2015-3143 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/927556">SUSE bug 927556</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821436" comment="curl-7.29.0-25.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821437" comment="libcurl-7.29.0-25.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821438" comment="libcurl-devel-7.29.0-25.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153147" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3147</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3147" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3147" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3147" ref_url="https://www.suse.com/security/cve/CVE-2015-3147" source="SUSE CVE"/>
    <description>
    daemon/abrt-handle-upload.in in Automatic Bug Reporting Tool (ABRT), when moving problem reports from /var/spool/abrt-upload, allows local users to write to arbitrary files or possibly have other unspecified impact via a symlink attack on (1) /var/spool/abrt or (2) /var/tmp/abrt.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3147/">CVE-2015-3147 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3147">CVE-2015-3147 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821037" comment="abrt-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821038" comment="abrt-addon-ccpp-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821039" comment="abrt-addon-kerneloops-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821040" comment="abrt-addon-pstoreoops-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821041" comment="abrt-addon-python-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821042" comment="abrt-addon-upload-watch-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821043" comment="abrt-addon-vmcore-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821044" comment="abrt-addon-xorg-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821045" comment="abrt-cli-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821046" comment="abrt-console-notification-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821047" comment="abrt-dbus-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821048" comment="abrt-desktop-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821049" comment="abrt-devel-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821050" comment="abrt-gui-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821051" comment="abrt-gui-devel-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821052" comment="abrt-gui-libs-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821053" comment="abrt-libs-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821054" comment="abrt-python-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821055" comment="abrt-python-doc-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821056" comment="abrt-retrace-client-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821057" comment="abrt-tui-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821058" comment="libreport-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821059" comment="libreport-anaconda-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821060" comment="libreport-cli-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821061" comment="libreport-compat-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821062" comment="libreport-devel-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821063" comment="libreport-filesystem-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821064" comment="libreport-gtk-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821065" comment="libreport-gtk-devel-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821066" comment="libreport-newt-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821067" comment="libreport-plugin-bugzilla-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821068" comment="libreport-plugin-kerneloops-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821069" comment="libreport-plugin-logger-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821070" comment="libreport-plugin-mailx-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821071" comment="libreport-plugin-reportuploader-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821072" comment="libreport-plugin-ureport-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821073" comment="libreport-python-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821074" comment="libreport-web-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821075" comment="libreport-web-devel-2.1.11-23.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153148" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3148</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3148" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3148" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3148" ref_url="https://www.suse.com/security/cve/CVE-2015-3148" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001421.html" source="SUSE-SU"/>
    <description>
    cURL and libcurl 7.10.6 through 7.41.0 do not properly re-use authenticated Negotiate connections, which allows remote attackers to connect as other users via a request.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3148/">CVE-2015-3148 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3148">CVE-2015-3148 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1092962">SUSE bug 1092962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927746">SUSE bug 927746</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821436" comment="curl-7.29.0-25.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821437" comment="libcurl-7.29.0-25.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821438" comment="libcurl-devel-7.29.0-25.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153149" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3149</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3149" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3149" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3149" ref_url="https://www.suse.com/security/cve/CVE-2015-3149" source="SUSE CVE"/>
    <description>
    The Hotspot component in OpenJDK8 as packaged in Red Hat Enterprise Linux 6 and 7 allows local users to write to arbitrary files via a symlink attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3149/">CVE-2015-3149 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3149">CVE-2015-3149 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821150" comment="java-1.8.0-openjdk-1.8.0.51-1.b16.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821151" comment="java-1.8.0-openjdk-accessibility-1.8.0.51-1.b16.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821152" comment="java-1.8.0-openjdk-demo-1.8.0.51-1.b16.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821153" comment="java-1.8.0-openjdk-devel-1.8.0.51-1.b16.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821154" comment="java-1.8.0-openjdk-headless-1.8.0.51-1.b16.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821155" comment="java-1.8.0-openjdk-javadoc-1.8.0.51-1.b16.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821156" comment="java-1.8.0-openjdk-src-1.8.0.51-1.b16.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153150" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3150</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3150" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3150" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3150" ref_url="https://www.suse.com/security/cve/CVE-2015-3150" source="SUSE CVE"/>
    <description>
    abrt-dbus in Automatic Bug Reporting Tool (ABRT) allows local users to delete or change the ownership of arbitrary files via the problem directory argument to the (1) ChownProblemDir, (2) DeleteElement, or (3) DeleteProblem method.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3150/">CVE-2015-3150 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3150">CVE-2015-3150 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821037" comment="abrt-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821038" comment="abrt-addon-ccpp-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821039" comment="abrt-addon-kerneloops-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821040" comment="abrt-addon-pstoreoops-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821041" comment="abrt-addon-python-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821042" comment="abrt-addon-upload-watch-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821043" comment="abrt-addon-vmcore-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821044" comment="abrt-addon-xorg-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821045" comment="abrt-cli-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821046" comment="abrt-console-notification-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821047" comment="abrt-dbus-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821048" comment="abrt-desktop-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821049" comment="abrt-devel-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821050" comment="abrt-gui-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821051" comment="abrt-gui-devel-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821052" comment="abrt-gui-libs-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821053" comment="abrt-libs-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821054" comment="abrt-python-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821055" comment="abrt-python-doc-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821056" comment="abrt-retrace-client-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821057" comment="abrt-tui-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821058" comment="libreport-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821059" comment="libreport-anaconda-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821060" comment="libreport-cli-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821061" comment="libreport-compat-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821062" comment="libreport-devel-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821063" comment="libreport-filesystem-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821064" comment="libreport-gtk-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821065" comment="libreport-gtk-devel-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821066" comment="libreport-newt-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821067" comment="libreport-plugin-bugzilla-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821068" comment="libreport-plugin-kerneloops-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821069" comment="libreport-plugin-logger-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821070" comment="libreport-plugin-mailx-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821071" comment="libreport-plugin-reportuploader-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821072" comment="libreport-plugin-ureport-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821073" comment="libreport-python-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821074" comment="libreport-web-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821075" comment="libreport-web-devel-2.1.11-23.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153151" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3151</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3151" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3151" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3151" ref_url="https://www.suse.com/security/cve/CVE-2015-3151" source="SUSE CVE"/>
    <description>
    Directory traversal vulnerability in abrt-dbus in Automatic Bug Reporting Tool (ABRT) allows local users to read, write to, or change ownership of arbitrary files via unspecified vectors to the (1) NewProblem, (2) GetInfo, (3) SetElement, or (4) DeleteElement method.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3151/">CVE-2015-3151 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3151">CVE-2015-3151 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821037" comment="abrt-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821038" comment="abrt-addon-ccpp-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821039" comment="abrt-addon-kerneloops-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821040" comment="abrt-addon-pstoreoops-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821041" comment="abrt-addon-python-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821042" comment="abrt-addon-upload-watch-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821043" comment="abrt-addon-vmcore-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821044" comment="abrt-addon-xorg-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821045" comment="abrt-cli-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821046" comment="abrt-console-notification-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821047" comment="abrt-dbus-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821048" comment="abrt-desktop-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821049" comment="abrt-devel-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821050" comment="abrt-gui-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821051" comment="abrt-gui-devel-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821052" comment="abrt-gui-libs-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821053" comment="abrt-libs-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821054" comment="abrt-python-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821055" comment="abrt-python-doc-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821056" comment="abrt-retrace-client-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821057" comment="abrt-tui-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821058" comment="libreport-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821059" comment="libreport-anaconda-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821060" comment="libreport-cli-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821061" comment="libreport-compat-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821062" comment="libreport-devel-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821063" comment="libreport-filesystem-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821064" comment="libreport-gtk-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821065" comment="libreport-gtk-devel-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821066" comment="libreport-newt-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821067" comment="libreport-plugin-bugzilla-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821068" comment="libreport-plugin-kerneloops-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821069" comment="libreport-plugin-logger-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821070" comment="libreport-plugin-mailx-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821071" comment="libreport-plugin-reportuploader-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821072" comment="libreport-plugin-ureport-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821073" comment="libreport-python-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821074" comment="libreport-web-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821075" comment="libreport-web-devel-2.1.11-23.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153152" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3152</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3152" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3152" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3152" ref_url="https://www.suse.com/security/cve/CVE-2015-3152" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1638-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002131.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1216-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KHOOMDUPEQLMQZN7JRZIBDKGHYJ2TBKQ/#KHOOMDUPEQLMQZN7JRZIBDKGHYJ2TBKQ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2243-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CG5LJLU356KG55PZAGA4KDAMICLY5O5L/#CG5LJLU356KG55PZAGA4KDAMICLY5O5L" source="SUSE-SU"/>
    <description>
    Oracle MySQL before 5.7.3, Oracle MySQL Connector/C (aka libmysqlclient) before 6.1.3, and MariaDB before 5.5.44 use the --ssl option to mean that SSL is optional, which allows man-in-the-middle attackers to spoof servers via a cleartext-downgrade attack, aka a "BACKRONYM" attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3152/">CVE-2015-3152 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3152">CVE-2015-3152 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1037590">SUSE bug 1037590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047059">SUSE bug 1047059</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088681">SUSE bug 1088681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924663">SUSE bug 924663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928962">SUSE bug 928962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936407">SUSE bug 936407</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821233" comment="mariadb-5.5.44-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821234" comment="mariadb-bench-5.5.44-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821235" comment="mariadb-devel-5.5.44-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821236" comment="mariadb-embedded-5.5.44-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821237" comment="mariadb-embedded-devel-5.5.44-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821238" comment="mariadb-libs-5.5.44-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821239" comment="mariadb-server-5.5.44-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821240" comment="mariadb-test-5.5.44-1.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153159" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3159</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3159" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3159" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3159" ref_url="https://www.suse.com/security/cve/CVE-2015-3159" source="SUSE CVE"/>
    <description>
    The abrt-action-install-debuginfo-to-abrt-cache help program in Automatic Bug Reporting Tool (ABRT) does not properly handle the process environment before invoking abrt-action-install-debuginfo, which allows local users to gain privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3159/">CVE-2015-3159 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3159">CVE-2015-3159 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821037" comment="abrt-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821038" comment="abrt-addon-ccpp-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821039" comment="abrt-addon-kerneloops-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821040" comment="abrt-addon-pstoreoops-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821041" comment="abrt-addon-python-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821042" comment="abrt-addon-upload-watch-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821043" comment="abrt-addon-vmcore-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821044" comment="abrt-addon-xorg-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821045" comment="abrt-cli-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821046" comment="abrt-console-notification-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821047" comment="abrt-dbus-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821048" comment="abrt-desktop-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821049" comment="abrt-devel-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821050" comment="abrt-gui-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821051" comment="abrt-gui-devel-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821052" comment="abrt-gui-libs-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821053" comment="abrt-libs-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821054" comment="abrt-python-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821055" comment="abrt-python-doc-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821056" comment="abrt-retrace-client-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821057" comment="abrt-tui-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821058" comment="libreport-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821059" comment="libreport-anaconda-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821060" comment="libreport-cli-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821061" comment="libreport-compat-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821062" comment="libreport-devel-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821063" comment="libreport-filesystem-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821064" comment="libreport-gtk-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821065" comment="libreport-gtk-devel-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821066" comment="libreport-newt-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821067" comment="libreport-plugin-bugzilla-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821068" comment="libreport-plugin-kerneloops-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821069" comment="libreport-plugin-logger-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821070" comment="libreport-plugin-mailx-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821071" comment="libreport-plugin-reportuploader-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821072" comment="libreport-plugin-ureport-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821073" comment="libreport-python-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821074" comment="libreport-web-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821075" comment="libreport-web-devel-2.1.11-23.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153165" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3165</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3165" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3165" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3165" ref_url="https://www.suse.com/security/cve/CVE-2015-3165" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001499.html" source="SUSE-SU"/>
    <description>
    Double free vulnerability in PostgreSQL before 9.0.20, 9.1.x before 9.1.16, 9.2.x before 9.2.11, 9.3.x before 9.3.7, and 9.4.x before 9.4.2 allows remote attackers to cause a denial of service (crash) by closing an SSL session at a time when the authentication timeout will expire during the session shutdown sequence.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3165/">CVE-2015-3165 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3165">CVE-2015-3165 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/931972">SUSE bug 931972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931973">SUSE bug 931973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931974">SUSE bug 931974</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932040">SUSE bug 932040</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821138" comment="postgresql-9.2.13-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821139" comment="postgresql-contrib-9.2.13-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821140" comment="postgresql-devel-9.2.13-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821141" comment="postgresql-docs-9.2.13-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821142" comment="postgresql-libs-9.2.13-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821143" comment="postgresql-plperl-9.2.13-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821144" comment="postgresql-plpython-9.2.13-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821145" comment="postgresql-pltcl-9.2.13-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821146" comment="postgresql-server-9.2.13-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821147" comment="postgresql-test-9.2.13-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821148" comment="postgresql-upgrade-9.2.13-1.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3166</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3166" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3166" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3166" ref_url="https://www.suse.com/security/cve/CVE-2015-3166" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001499.html" source="SUSE-SU"/>
    <description>
    The snprintf implementation in PostgreSQL before 9.0.20, 9.1.x before 9.1.16, 9.2.x before 9.2.11, 9.3.x before 9.3.7, and 9.4.x before 9.4.2 does not properly handle system-call errors, which allows attackers to obtain sensitive information or have other unspecified impact via unknown vectors, as demonstrated by an out-of-memory error.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3166/">CVE-2015-3166 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3166">CVE-2015-3166 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/931972">SUSE bug 931972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931973">SUSE bug 931973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931974">SUSE bug 931974</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932040">SUSE bug 932040</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821138" comment="postgresql-9.2.13-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821139" comment="postgresql-contrib-9.2.13-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821140" comment="postgresql-devel-9.2.13-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821141" comment="postgresql-docs-9.2.13-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821142" comment="postgresql-libs-9.2.13-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821143" comment="postgresql-plperl-9.2.13-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821144" comment="postgresql-plpython-9.2.13-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821145" comment="postgresql-pltcl-9.2.13-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821146" comment="postgresql-server-9.2.13-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821147" comment="postgresql-test-9.2.13-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821148" comment="postgresql-upgrade-9.2.13-1.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153167" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3167</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3167" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3167" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3167" ref_url="https://www.suse.com/security/cve/CVE-2015-3167" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001499.html" source="SUSE-SU"/>
    <description>
    contrib/pgcrypto in PostgreSQL before 9.0.20, 9.1.x before 9.1.16, 9.2.x before 9.2.11, 9.3.x before 9.3.7, and 9.4.x before 9.4.2 uses different error responses when an incorrect key is used, which makes it easier for attackers to obtain the key via a brute force attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3167/">CVE-2015-3167 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3167">CVE-2015-3167 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/931972">SUSE bug 931972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931973">SUSE bug 931973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931974">SUSE bug 931974</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932040">SUSE bug 932040</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821138" comment="postgresql-9.2.13-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821139" comment="postgresql-contrib-9.2.13-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821140" comment="postgresql-devel-9.2.13-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821141" comment="postgresql-docs-9.2.13-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821142" comment="postgresql-libs-9.2.13-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821143" comment="postgresql-plperl-9.2.13-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821144" comment="postgresql-plpython-9.2.13-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821145" comment="postgresql-pltcl-9.2.13-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821146" comment="postgresql-server-9.2.13-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821147" comment="postgresql-test-9.2.13-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821148" comment="postgresql-upgrade-9.2.13-1.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3182</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3182" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3182" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3182" ref_url="https://www.suse.com/security/cve/CVE-2015-3182" source="SUSE CVE"/>
    <description>
    epan/dissectors/packet-dec-dnart.c in the DECnet NSP/RT dissector in Wireshark 1.10.12 through 1.10.14 mishandles a certain strdup return value, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3182/">CVE-2015-3182 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3182">CVE-2015-3182 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/930503">SUSE bug 930503</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930689">SUSE bug 930689</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821556" comment="wireshark-1.10.14-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821557" comment="wireshark-devel-1.10.14-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821558" comment="wireshark-gnome-1.10.14-7.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153183" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3183</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3183" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3183" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3183" ref_url="https://www.suse.com/security/cve/CVE-2015-3183" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1885-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1885-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001662.html" source="SUSE-SU"/>
    <description>
    The chunked transfer coding implementation in the Apache HTTP Server before 2.4.14 does not properly parse chunk headers, which allows remote attackers to conduct HTTP request smuggling attacks via a crafted request, related to mishandling of large chunk-size values and invalid chunk-extension characters in modules/http/http_filters.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3183/">CVE-2015-3183 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3183">CVE-2015-3183 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/938728">SUSE bug 938728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948325">SUSE bug 948325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949218">SUSE bug 949218</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821241" comment="httpd-2.4.6-31.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821242" comment="httpd-devel-2.4.6-31.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821243" comment="httpd-manual-2.4.6-31.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821244" comment="httpd-tools-2.4.6-31.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821245" comment="mod_ldap-2.4.6-31.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821246" comment="mod_proxy_html-2.4.6-31.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821247" comment="mod_session-2.4.6-31.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821248" comment="mod_ssl-2.4.6-31.el7_1.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153184" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3184</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3184" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3184" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3184" ref_url="https://www.suse.com/security/cve/CVE-2015-3184" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001560.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003142.html" source="SUSE-SU"/>
    <description>
    mod_authz_svn in Apache Subversion 1.7.x before 1.7.21 and 1.8.x before 1.8.14, when using Apache httpd 2.4.x, does not properly restrict anonymous access, which allows remote anonymous users to read hidden files via the path name.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3184/">CVE-2015-3184 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3184">CVE-2015-3184 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/938723">SUSE bug 938723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939514">SUSE bug 939514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939516">SUSE bug 939516</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821276" comment="mod_dav_svn-1.7.14-7.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821277" comment="subversion-1.7.14-7.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821278" comment="subversion-devel-1.7.14-7.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821279" comment="subversion-gnome-1.7.14-7.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821280" comment="subversion-javahl-1.7.14-7.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821281" comment="subversion-kde-1.7.14-7.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821282" comment="subversion-libs-1.7.14-7.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821283" comment="subversion-perl-1.7.14-7.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821284" comment="subversion-python-1.7.14-7.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821285" comment="subversion-ruby-1.7.14-7.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821286" comment="subversion-tools-1.7.14-7.el7_1.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3185</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3185" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3185" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3185" ref_url="https://www.suse.com/security/cve/CVE-2015-3185" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001653.html" source="SUSE-SU"/>
    <description>
    The ap_some_auth_required function in server/request.c in the Apache HTTP Server 2.4.x before 2.4.14 does not consider that a Require directive may be associated with an authorization setting rather than an authentication setting, which allows remote attackers to bypass intended access restrictions in opportunistic circumstances by leveraging the presence of a module that relies on the 2.2 API behavior.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3185/">CVE-2015-3185 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3185">CVE-2015-3185 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/938723">SUSE bug 938723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939514">SUSE bug 939514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939516">SUSE bug 939516</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821241" comment="httpd-2.4.6-31.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821242" comment="httpd-devel-2.4.6-31.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821243" comment="httpd-manual-2.4.6-31.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821244" comment="httpd-tools-2.4.6-31.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821245" comment="mod_ldap-2.4.6-31.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821246" comment="mod_proxy_html-2.4.6-31.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821247" comment="mod_session-2.4.6-31.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821248" comment="mod_ssl-2.4.6-31.el7_1.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153187" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3187</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3187" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3187" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3187" ref_url="https://www.suse.com/security/cve/CVE-2015-3187" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001560.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003142.html" source="SUSE-SU"/>
    <description>
    The svn_repos_trace_node_locations function in Apache Subversion before 1.7.21 and 1.8.x before 1.8.14, when path-based authorization is used, allows remote authenticated users to obtain sensitive path information by reading the history of a node that has been moved from a hidden path.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3187/">CVE-2015-3187 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3187">CVE-2015-3187 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/939517">SUSE bug 939517</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821276" comment="mod_dav_svn-1.7.14-7.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821277" comment="subversion-1.7.14-7.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821278" comment="subversion-devel-1.7.14-7.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821279" comment="subversion-gnome-1.7.14-7.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821280" comment="subversion-javahl-1.7.14-7.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821281" comment="subversion-kde-1.7.14-7.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821282" comment="subversion-libs-1.7.14-7.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821283" comment="subversion-perl-1.7.14-7.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821284" comment="subversion-python-1.7.14-7.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821285" comment="subversion-ruby-1.7.14-7.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821286" comment="subversion-tools-1.7.14-7.el7_1.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153194" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3194</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3194" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3194" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3194" ref_url="https://www.suse.com/security/cve/CVE-2015-3194" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="TID7017046" ref_url="https://www.suse.com/support/kb/doc/?id=7017046" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0637-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/732C2WZF6MGNUGO3W3NVEM4POAHDFAKP/#732C2WZF6MGNUGO3W3NVEM4POAHDFAKP" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1332-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SA47QPDDMRSXFULROHSU5XOJYAEI63UQ/#SA47QPDDMRSXFULROHSU5XOJYAEI63UQ" source="SUSE-SU"/>
    <description>
    crypto/rsa/rsa_ameth.c in OpenSSL 1.0.1 before 1.0.1q and 1.0.2 before 1.0.2e allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an RSA PSS ASN.1 signature that lacks a mask generation function parameter.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3194/">CVE-2015-3194 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3194">CVE-2015-3194 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/957812">SUSE bug 957812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957815">SUSE bug 957815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958768">SUSE bug 958768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976341">SUSE bug 976341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990370">SUSE bug 990370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821648" comment="openssl-1.0.1e-51.el7_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821649" comment="openssl-devel-1.0.1e-51.el7_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821650" comment="openssl-libs-1.0.1e-51.el7_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821651" comment="openssl-perl-1.0.1e-51.el7_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821652" comment="openssl-static-1.0.1e-51.el7_2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153195" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3195</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3195" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3195" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3195" ref_url="https://www.suse.com/security/cve/CVE-2015-3195" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001948.html" source="SUSE-SU"/>
		<reference ref_id="TID3426981" ref_url="https://www.suse.com/support/kb/doc/?id=3426981" source="SUSE-SU"/>
		<reference ref_id="TID7014420" ref_url="https://www.suse.com/support/kb/doc/?id=7014420" source="SUSE-SU"/>
		<reference ref_id="TID7016875" ref_url="https://www.suse.com/support/kb/doc/?id=7016875" source="SUSE-SU"/>
		<reference ref_id="TID7017047" ref_url="https://www.suse.com/support/kb/doc/?id=7017047" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0637-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/732C2WZF6MGNUGO3W3NVEM4POAHDFAKP/#732C2WZF6MGNUGO3W3NVEM4POAHDFAKP" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C5ZZO44NS35G5NQFFXUERK5DXLTQN534/#C5ZZO44NS35G5NQFFXUERK5DXLTQN534" source="SUSE-SU"/>
    <description>
    The ASN1_TFLG_COMBINE implementation in crypto/asn1/tasn_dec.c in OpenSSL before 0.9.8zh, 1.0.0 before 1.0.0t, 1.0.1 before 1.0.1q, and 1.0.2 before 1.0.2e mishandles errors caused by malformed X509_ATTRIBUTE data, which allows remote attackers to obtain sensitive information from process memory by triggering a decoding failure in a PKCS#7 or CMS application.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3195/">CVE-2015-3195 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3195">CVE-2015-3195 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/923755">SUSE bug 923755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957812">SUSE bug 957812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957815">SUSE bug 957815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958768">SUSE bug 958768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963977">SUSE bug 963977</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986238">SUSE bug 986238</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821648" comment="openssl-1.0.1e-51.el7_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821649" comment="openssl-devel-1.0.1e-51.el7_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821650" comment="openssl-libs-1.0.1e-51.el7_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821651" comment="openssl-perl-1.0.1e-51.el7_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821652" comment="openssl-static-1.0.1e-51.el7_2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153196" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3196</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3196" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3196" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3196" ref_url="https://www.suse.com/security/cve/CVE-2015-3196" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001948.html" source="SUSE-SU"/>
    <description>
    ssl/s3_clnt.c in OpenSSL 1.0.0 before 1.0.0t, 1.0.1 before 1.0.1p, and 1.0.2 before 1.0.2d, when used for a multi-threaded client, writes the PSK identity hint to an incorrect data structure, which allows remote servers to cause a denial of service (race condition and double free) via a crafted ServerKeyExchange message.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3196/">CVE-2015-3196 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3196">CVE-2015-3196 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/957813">SUSE bug 957813</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821648" comment="openssl-1.0.1e-51.el7_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821649" comment="openssl-devel-1.0.1e-51.el7_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821650" comment="openssl-libs-1.0.1e-51.el7_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821651" comment="openssl-perl-1.0.1e-51.el7_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821652" comment="openssl-static-1.0.1e-51.el7_2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153197" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3197</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3197" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3197" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3197" ref_url="https://www.suse.com/security/cve/CVE-2015-3197" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002014.html" source="SUSE-SU"/>
		<reference ref_id="TID3426981" ref_url="https://www.suse.com/support/kb/doc/?id=3426981" source="SUSE-SU"/>
		<reference ref_id="TID7016794" ref_url="https://www.suse.com/support/kb/doc/?id=7016794" source="SUSE-SU"/>
		<reference ref_id="TID7017297" ref_url="https://www.suse.com/support/kb/doc?id=7017297" source="SUSE-SU"/>
		<reference ref_id="TID7017315" ref_url="https://www.suse.com/support/kb/doc/?id=7017315" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0628-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PRZS7YRGBNMMNA7AOZICYXH6FDRHX57D/#PRZS7YRGBNMMNA7AOZICYXH6FDRHX57D" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0637-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/732C2WZF6MGNUGO3W3NVEM4POAHDFAKP/#732C2WZF6MGNUGO3W3NVEM4POAHDFAKP" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C5ZZO44NS35G5NQFFXUERK5DXLTQN534/#C5ZZO44NS35G5NQFFXUERK5DXLTQN534" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0720-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EYE22ZU64KWEPJSQY75BXN2QAW2RIMF7/#EYE22ZU64KWEPJSQY75BXN2QAW2RIMF7" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1239-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZNQRDVNZBEFFFUFANVI5BGCXK3VV7BLG/#ZNQRDVNZBEFFFUFANVI5BGCXK3VV7BLG" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1241-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MLVNWQIN3Y4GRZ5LBEYGXL7O5ECGS532/#MLVNWQIN3Y4GRZ5LBEYGXL7O5ECGS532" source="SUSE-SU"/>
    <description>
    ssl/s2_srvr.c in OpenSSL 1.0.1 before 1.0.1r and 1.0.2 before 1.0.2f does not prevent use of disabled ciphers, which makes it easier for man-in-the-middle attackers to defeat cryptographic protection mechanisms by performing computations on SSLv2 traffic, related to the get_client_master_key and get_client_hello functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3197/">CVE-2015-3197 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3197">CVE-2015-3197 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/963410">SUSE bug 963410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963415">SUSE bug 963415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968044">SUSE bug 968044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968046">SUSE bug 968046</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821840" comment="openssl098e-0.9.8e-29.el7_2.3 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821822" comment="openssl-1.0.1e-51.el7_2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821823" comment="openssl-devel-1.0.1e-51.el7_2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821824" comment="openssl-libs-1.0.1e-51.el7_2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821825" comment="openssl-perl-1.0.1e-51.el7_2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821826" comment="openssl-static-1.0.1e-51.el7_2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821840" comment="openssl098e-0.9.8e-29.el7_2.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153204" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3204</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3204" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3204" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3204" ref_url="https://www.suse.com/security/cve/CVE-2015-3204" source="SUSE CVE"/>
    <description>
    libreswan 3.9 through 3.12 allows remote attackers to cause a denial of service (daemon restart) via an IKEv1 packet with (1) unassigned bits set in the IPSEC DOI value or (2) the next payload value set to ISAKMP_NEXT_SAK.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3204/">CVE-2015-3204 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3204">CVE-2015-3204 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821127" comment="libreswan-3.12-10.1.el7_1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153212" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3212</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3212" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3212" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3212" ref_url="https://www.suse.com/security/cve/CVE-2015-3212" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001518.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1382-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WK73PLTGJ2J7BSDKZCVOUPKENB4UND7S/#WK73PLTGJ2J7BSDKZCVOUPKENB4UND7S" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OC7663UNXLKFWJKPITRGQNF4FU4KJWNK/#OC7663UNXLKFWJKPITRGQNF4FU4KJWNK" source="SUSE-SU"/>
    <description>
    Race condition in net/sctp/socket.c in the Linux kernel before 4.1.2 allows local users to cause a denial of service (list corruption and panic) via a rapid series of system calls related to sockets, as demonstrated by setsockopt calls.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3212/">CVE-2015-3212 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3212">CVE-2015-3212 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/936502">SUSE bug 936502</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821287" comment="kernel-3.10.0-229.14.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821288" comment="kernel-abi-whitelists-3.10.0-229.14.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821289" comment="kernel-debug-3.10.0-229.14.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821292" comment="kernel-doc-3.10.0-229.14.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821293" comment="kernel-headers-3.10.0-229.14.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821294" comment="kernel-tools-3.10.0-229.14.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821295" comment="kernel-tools-libs-3.10.0-229.14.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821297" comment="perf-3.10.0-229.14.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821298" comment="python-perf-3.10.0-229.14.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153213" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3213</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3213" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3213" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3213" ref_url="https://www.suse.com/security/cve/CVE-2015-3213" source="SUSE CVE"/>
    <description>
    The gesture handling code in Clutter before 1.16.2 allows physically proximate attackers to bypass the lock screen via certain (1) mouse or (2) touch gestures.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3213/">CVE-2015-3213 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3213">CVE-2015-3213 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/933927">SUSE bug 933927</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821185" comment="clutter-1.14.4-12.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821186" comment="clutter-devel-1.14.4-12.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821187" comment="clutter-doc-1.14.4-12.el7_1.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153214" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3214</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3214" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3214" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3214" ref_url="https://www.suse.com/security/cve/CVE-2015-3214" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002154.html" source="SUSE-SU"/>
    <description>
    The pit_ioport_read in i8254.c in the Linux kernel before 2.6.33 and QEMU before 2.3.1 does not distinguish between read lengths and write lengths, which might allow guest OS users to execute arbitrary code on the host OS by triggering use of an invalid index.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3214/">CVE-2015-3214 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3214">CVE-2015-3214 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/934069">SUSE bug 934069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936025">SUSE bug 936025</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821178" comment="libcacard-1.5.3-86.el7_1.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821179" comment="libcacard-devel-1.5.3-86.el7_1.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821180" comment="libcacard-tools-1.5.3-86.el7_1.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821181" comment="qemu-img-1.5.3-86.el7_1.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821182" comment="qemu-kvm-1.5.3-86.el7_1.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821183" comment="qemu-kvm-common-1.5.3-86.el7_1.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821184" comment="qemu-kvm-tools-1.5.3-86.el7_1.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153216" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3216</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3216" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3216" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3216" ref_url="https://www.suse.com/security/cve/CVE-2015-3216" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1184-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001479.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1139-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FWJ5D6XMAKVEDCAJ7ERXTGMFTTDWN5PT/#FWJ5D6XMAKVEDCAJ7ERXTGMFTTDWN5PT" source="SUSE-SU"/>
    <description>
    Race condition in a certain Red Hat patch to the PRNG lock implementation in the ssleay_rand_bytes function in OpenSSL, as distributed in openssl-1.0.1e-25.el7 in Red Hat Enterprise Linux (RHEL) 7 and other products, allows remote attackers to cause a denial of service (application crash) by establishing many TLS sessions to a multithreaded server, leading to use of a negative value for a certain length field.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3216/">CVE-2015-3216 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3216">CVE-2015-3216 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/933898">SUSE bug 933898</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821077" comment="openssl-1.0.1e-42.el7_1.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821078" comment="openssl-devel-1.0.1e-42.el7_1.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821079" comment="openssl-libs-1.0.1e-42.el7_1.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821080" comment="openssl-perl-1.0.1e-42.el7_1.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821081" comment="openssl-static-1.0.1e-42.el7_1.8 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153217" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3217</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3217" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3217" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3217" ref_url="https://www.suse.com/security/cve/CVE-2015-3217" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
    <description>
    PCRE 7.8 and 8.32 through 8.37, and PCRE2 10.10 mishandle group empty matches, which might allow remote attackers to cause a denial of service (stack-based buffer overflow) via a crafted regular expression, as demonstrated by /^(?:(?(1)\\.|([^\\\\W_])?)+)+$/.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-02-23"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3217/">CVE-2015-3217 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3217">CVE-2015-3217 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/933878">SUSE bug 933878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958373">SUSE bug 958373</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822065" comment="pcre-8.32-15.el7_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822066" comment="pcre-devel-8.32-15.el7_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822067" comment="pcre-static-8.32-15.el7_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822068" comment="pcre-tools-8.32-15.el7_2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153223" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3223</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3223" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3223" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3223" ref_url="https://www.suse.com/security/cve/CVE-2015-3223" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2304-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001741.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2354-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NE5KB3JIPNDCF6QIVTP43XPWWH3N26Q7/#NE5KB3JIPNDCF6QIVTP43XPWWH3N26Q7" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2356-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MHQQDJ3M5EHLUGFQCVVIKBPNUJWLEV5Y/#MHQQDJ3M5EHLUGFQCVVIKBPNUJWLEV5Y" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1064-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/B7VW7SOZTMI4RQKFXAOX457XVPBRHQR3/#B7VW7SOZTMI4RQKFXAOX457XVPBRHQR3" source="SUSE-SU"/>
    <description>
    The ldb_wildcard_compare function in ldb_match.c in ldb before 1.1.24, as used in the AD LDAP server in Samba 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, mishandles certain zero values, which allows remote attackers to cause a denial of service (infinite loop) via crafted packets.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-04-15"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3223/">CVE-2015-3223 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3223">CVE-2015-3223 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/958581">SUSE bug 958581</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821674" comment="ctdb-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821675" comment="ctdb-devel-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821676" comment="ctdb-tests-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821711" comment="ldb-tools-1.1.20-1.el7_2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821712" comment="libldb-1.1.20-1.el7_2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821713" comment="libldb-devel-1.1.20-1.el7_2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821677" comment="libsmbclient-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821678" comment="libsmbclient-devel-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821679" comment="libwbclient-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821680" comment="libwbclient-devel-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821714" comment="pyldb-1.1.20-1.el7_2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821715" comment="pyldb-devel-1.1.20-1.el7_2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821681" comment="samba-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821682" comment="samba-client-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821683" comment="samba-client-libs-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821684" comment="samba-common-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821685" comment="samba-common-libs-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821686" comment="samba-common-tools-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821687" comment="samba-dc-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821688" comment="samba-dc-libs-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821689" comment="samba-devel-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821690" comment="samba-libs-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821691" comment="samba-pidl-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821692" comment="samba-python-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821693" comment="samba-test-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821694" comment="samba-test-devel-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821695" comment="samba-test-libs-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821696" comment="samba-vfs-glusterfs-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821697" comment="samba-winbind-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821698" comment="samba-winbind-clients-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821699" comment="samba-winbind-krb5-locator-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821700" comment="samba-winbind-modules-4.2.3-11.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153225" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3225</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3225" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3225" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3225" ref_url="https://www.suse.com/security/cve/CVE-2015-3225" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001734.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14811-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FLQ74D2IZAJC5KD6QXVUZAQ6O5LNAWZX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14875-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MOZFATD6SCQREBY3SZW5KQJPN6KN7A6D/" source="SUSE-SU"/>
    <description>
    lib/rack/utils.rb in Rack before 1.5.4 and 1.6.x before 1.6.2, as used with Ruby on Rails 3.x and 4.x and other products, allows remote attackers to cause a denial of service (SystemStackError) via a request with a large parameter depth.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-03-13"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3225/">CVE-2015-3225 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3225">CVE-2015-3225 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/934797">SUSE bug 934797</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821477" comment="pcs-0.9.143-15.el7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153238" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3238</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3238" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3238" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3238" ref_url="https://www.suse.com/security/cve/CVE-2015-3238" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003289.html" source="SUSE-SU"/>
    <description>
    The _unix_run_helper_binary function in the pam_unix module in Linux-PAM (aka pam) before 1.2.1, when unable to directly access passwords, allows local users to enumerate usernames or cause a denial of service (hang) via a large password.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3238/">CVE-2015-3238 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3238">CVE-2015-3238 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1123794">SUSE bug 1123794</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934920">SUSE bug 934920</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821231" comment="pam-1.1.8-12.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821232" comment="pam-devel-1.1.8-12.el7_1.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153240" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3240</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3240" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3240" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3240" ref_url="https://www.suse.com/security/cve/CVE-2015-3240" source="SUSE CVE"/>
    <description>
    The pluto IKE daemon in libreswan before 3.15 and Openswan before 2.6.45, when built with NSS, allows remote attackers to cause a denial of service (assertion failure and daemon restart) via a zero DH g^x value in a KE payload in a IKE packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3240/">CVE-2015-3240 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3240">CVE-2015-3240 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/943104">SUSE bug 943104</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821356" comment="libreswan-3.15-5.el7_1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153245" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3245</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3245" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3245" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3245" ref_url="https://www.suse.com/security/cve/CVE-2015-3245" source="SUSE CVE"/>
    <description>
    Incomplete blacklist vulnerability in the chfn function in libuser before 0.56.13-8 and 0.60 before 0.60-7, as used in the userhelper program in the usermode package, allows local users to cause a denial of service (/etc/passwd corruption) via a newline character in the GECOS field.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3245/">CVE-2015-3245 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3245">CVE-2015-3245 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821175" comment="libuser-0.60-7.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821176" comment="libuser-devel-0.60-7.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821177" comment="libuser-python-0.60-7.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153246" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3246</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3246" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3246" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3246" ref_url="https://www.suse.com/security/cve/CVE-2015-3246" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2015:1332-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JT54A4PPSUVIFZW44WITV7PHV5GW4HKD/#JT54A4PPSUVIFZW44WITV7PHV5GW4HKD" source="SUSE-SU"/>
    <description>
    libuser before 0.56.13-8 and 0.60 before 0.60-7, as used in the userhelper program in the usermode package, directly modifies /etc/passwd, which allows local users to cause a denial of service (inconsistent file state) by causing an error during the modification. NOTE: this issue can be combined with CVE-2015-3245 to gain privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3246/">CVE-2015-3246 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3246">CVE-2015-3246 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/937533">SUSE bug 937533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821175" comment="libuser-0.60-7.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821176" comment="libuser-devel-0.60-7.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821177" comment="libuser-python-0.60-7.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153247" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3247</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3247" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3247" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3247" ref_url="https://www.suse.com/security/cve/CVE-2015-3247" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002048.html" source="SUSE-SU"/>
    <description>
    Race condition in the worker_update_monitors_config function in SPICE 0.12.4 allows a remote authenticated guest user to cause a denial of service (heap-based memory corruption and QEMU-KVM crash) or possibly execute arbitrary code on the host via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-17"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-3247/">CVE-2015-3247 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3247">CVE-2015-3247 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/944460">SUSE bug 944460</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821273" comment="spice-server-0.12.4-9.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821274" comment="spice-server-devel-0.12.4-9.el7_1.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153248" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3248</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3248" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3248" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3248" ref_url="https://www.suse.com/security/cve/CVE-2015-3248" source="SUSE CVE"/>
    <description>
    openhpi/Makefile.am in OpenHPI before 3.6.0 uses world-writable permissions for /var/lib/openhpi directory, which allows local users, when quotas are not properly setup, to fill the filesystem hosting /var/lib and cause a denial of service (disk consumption).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3248/">CVE-2015-3248 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3248">CVE-2015-3248 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/935389">SUSE bug 935389</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821542" comment="openhpi-3.4.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821543" comment="openhpi-devel-3.4.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821544" comment="openhpi-libs-3.4.0-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153256" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3256</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3256" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3256" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3256" ref_url="https://www.suse.com/security/cve/CVE-2015-3256" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001649.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1734-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2IETLXYNOVWQ7TJE66GLJU2WLE6YUEDC/#2IETLXYNOVWQ7TJE66GLJU2WLE6YUEDC" source="SUSE-SU"/>
    <description>
    PolicyKit (aka polkit) before 0.113 allows local users to cause a denial of service (memory corruption and polkitd daemon crash) and possibly gain privileges via unspecified vectors, related to "javascript rule evaluation."
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3256/">CVE-2015-3256 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3256">CVE-2015-3256 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/943816">SUSE bug 943816</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821814" comment="polkit-0.112-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821815" comment="polkit-devel-0.112-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821816" comment="polkit-docs-0.112-6.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153258" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3258</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3258" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3258" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3258" ref_url="https://www.suse.com/security/cve/CVE-2015-3258" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001536.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the WriteProlog function in filter/texttopdf.c in texttopdf in cups-filters before 1.0.70 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a small line size in a print job.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3258/">CVE-2015-3258 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3258">CVE-2015-3258 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/921753">SUSE bug 921753</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936281">SUSE bug 936281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937018">SUSE bug 937018</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821539" comment="cups-filters-1.0.35-21.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821540" comment="cups-filters-devel-1.0.35-21.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821541" comment="cups-filters-libs-1.0.35-21.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153276" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3276</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3276" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3276" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3276" ref_url="https://www.suse.com/security/cve/CVE-2015-3276" source="SUSE CVE"/>
    <description>
    The nss_parse_ciphers function in libraries/libldap/tls_m.c in OpenLDAP does not properly parse OpenSSL-style multi-keyword mode cipher strings, which might cause a weaker than intended cipher to be used and allow remote attackers to have unspecified impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3276/">CVE-2015-3276 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3276">CVE-2015-3276 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/938567">SUSE bug 938567</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821402" comment="openldap-2.4.40-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821403" comment="openldap-clients-2.4.40-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821404" comment="openldap-devel-2.4.40-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821405" comment="openldap-servers-2.4.40-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821406" comment="openldap-servers-sql-2.4.40-8.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153279" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3279</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3279" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3279" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3279" ref_url="https://www.suse.com/security/cve/CVE-2015-3279" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001536.html" source="SUSE-SU"/>
    <description>
    Integer overflow in filter/texttopdf.c in texttopdf in cups-filters before 1.0.71 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted line size in a print job, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3279/">CVE-2015-3279 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3279">CVE-2015-3279 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/921753">SUSE bug 921753</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936281">SUSE bug 936281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937018">SUSE bug 937018</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821539" comment="cups-filters-1.0.35-21.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821540" comment="cups-filters-devel-1.0.35-21.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821541" comment="cups-filters-libs-1.0.35-21.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153281" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3281</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3281" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3281" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3281" ref_url="https://www.suse.com/security/cve/CVE-2015-3281" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001607.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001635.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1831-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2ITSYHWMLEAVHDD6LY643QDCD4QIDHKE/#2ITSYHWMLEAVHDD6LY643QDCD4QIDHKE" source="SUSE-SU"/>
    <description>
    The buffer_slow_realign function in HAProxy 1.5.x before 1.5.14 and 1.6-dev does not properly realign a buffer that is used for pending outgoing data, which allows remote attackers to obtain sensitive information (uninitialized memory contents of previous requests) via a crafted request.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3281/">CVE-2015-3281 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3281">CVE-2015-3281 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/937042">SUSE bug 937042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937202">SUSE bug 937202</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821275" comment="haproxy-1.5.4-4.el7_1.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153307" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3307</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3307" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3307" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3307" ref_url="https://www.suse.com/security/cve/CVE-2015-3307" source="SUSE CVE"/>
    <description>
    The phar_parse_metadata function in ext/phar/phar.c in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 allows remote attackers to cause a denial of service (heap metadata corruption) or possibly have unspecified other impact via a crafted tar archive.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3307/">CVE-2015-3307 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3307">CVE-2015-3307 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/931418">SUSE bug 931418</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821089" comment="php-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821090" comment="php-bcmath-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821091" comment="php-cli-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821092" comment="php-common-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821093" comment="php-dba-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821094" comment="php-devel-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821095" comment="php-embedded-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821096" comment="php-enchant-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821097" comment="php-fpm-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821098" comment="php-gd-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821099" comment="php-intl-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821100" comment="php-ldap-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821101" comment="php-mbstring-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821102" comment="php-mysql-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821103" comment="php-mysqlnd-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821104" comment="php-odbc-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821105" comment="php-pdo-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821106" comment="php-pgsql-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821107" comment="php-process-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821108" comment="php-pspell-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821109" comment="php-recode-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821110" comment="php-snmp-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821111" comment="php-soap-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821112" comment="php-xml-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821113" comment="php-xmlrpc-5.4.16-36.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153315" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3315</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3315" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3315" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3315" ref_url="https://www.suse.com/security/cve/CVE-2015-3315" source="SUSE CVE"/>
    <description>
    Automatic Bug Reporting Tool (ABRT) allows local users to read, change the ownership of, or have other unspecified impact on arbitrary files via a symlink attack on (1) /var/tmp/abrt/*/maps, (2) /tmp/jvm-*/hs_error.log, (3) /proc/*/exe, (4) /etc/os-release in a chroot, or (5) an unspecified root directory related to librpm.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3315/">CVE-2015-3315 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3315">CVE-2015-3315 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821037" comment="abrt-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821038" comment="abrt-addon-ccpp-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821039" comment="abrt-addon-kerneloops-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821040" comment="abrt-addon-pstoreoops-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821041" comment="abrt-addon-python-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821042" comment="abrt-addon-upload-watch-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821043" comment="abrt-addon-vmcore-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821044" comment="abrt-addon-xorg-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821045" comment="abrt-cli-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821046" comment="abrt-console-notification-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821047" comment="abrt-dbus-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821048" comment="abrt-desktop-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821049" comment="abrt-devel-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821050" comment="abrt-gui-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821051" comment="abrt-gui-devel-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821052" comment="abrt-gui-libs-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821053" comment="abrt-libs-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821054" comment="abrt-python-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821055" comment="abrt-python-doc-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821056" comment="abrt-retrace-client-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821057" comment="abrt-tui-2.1.11-22.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821058" comment="libreport-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821059" comment="libreport-anaconda-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821060" comment="libreport-cli-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821061" comment="libreport-compat-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821062" comment="libreport-devel-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821063" comment="libreport-filesystem-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821064" comment="libreport-gtk-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821065" comment="libreport-gtk-devel-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821066" comment="libreport-newt-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821067" comment="libreport-plugin-bugzilla-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821068" comment="libreport-plugin-kerneloops-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821069" comment="libreport-plugin-logger-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821070" comment="libreport-plugin-mailx-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821071" comment="libreport-plugin-reportuploader-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821072" comment="libreport-plugin-ureport-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821073" comment="libreport-python-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821074" comment="libreport-web-2.1.11-23.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821075" comment="libreport-web-devel-2.1.11-23.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153329" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3329</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3329" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3329" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3329" ref_url="https://www.suse.com/security/cve/CVE-2015-3329" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0868-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1638-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002131.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0855-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DWA3SLBZ2CAU24QEILAJZHOWAF27NHY2/#DWA3SLBZ2CAU24QEILAJZHOWAF27NHY2" source="SUSE-SU"/>
    <description>
    Multiple stack-based buffer overflows in the phar_set_inode function in phar_internal.h in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 allow remote attackers to execute arbitrary code via a crafted length value in a (1) tar, (2) phar, or (3) ZIP archive.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3329/">CVE-2015-3329 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3329">CVE-2015-3329 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/928408">SUSE bug 928408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928506">SUSE bug 928506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928511">SUSE bug 928511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821089" comment="php-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821090" comment="php-bcmath-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821091" comment="php-cli-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821092" comment="php-common-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821093" comment="php-dba-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821094" comment="php-devel-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821095" comment="php-embedded-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821096" comment="php-enchant-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821097" comment="php-fpm-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821098" comment="php-gd-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821099" comment="php-intl-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821100" comment="php-ldap-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821101" comment="php-mbstring-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821102" comment="php-mysql-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821103" comment="php-mysqlnd-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821104" comment="php-odbc-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821105" comment="php-pdo-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821106" comment="php-pgsql-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821107" comment="php-process-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821108" comment="php-pspell-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821109" comment="php-recode-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821110" comment="php-snmp-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821111" comment="php-soap-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821112" comment="php-xml-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821113" comment="php-xmlrpc-5.4.16-36.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153330" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3330</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3330" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3330" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3330" ref_url="https://www.suse.com/security/cve/CVE-2015-3330" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0868-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001380.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0855-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DWA3SLBZ2CAU24QEILAJZHOWAF27NHY2/#DWA3SLBZ2CAU24QEILAJZHOWAF27NHY2" source="SUSE-SU"/>
    <description>
    The php_handler function in sapi/apache2handler/sapi_apache2.c in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8, when the Apache HTTP Server 2.4.x is used, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via pipelined HTTP requests that result in a "deconfigured interpreter."
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3330/">CVE-2015-3330 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3330">CVE-2015-3330 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/908782">SUSE bug 908782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928408">SUSE bug 928408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928506">SUSE bug 928506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928511">SUSE bug 928511</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821089" comment="php-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821090" comment="php-bcmath-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821091" comment="php-cli-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821092" comment="php-common-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821093" comment="php-dba-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821094" comment="php-devel-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821095" comment="php-embedded-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821096" comment="php-enchant-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821097" comment="php-fpm-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821098" comment="php-gd-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821099" comment="php-intl-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821100" comment="php-ldap-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821101" comment="php-mbstring-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821102" comment="php-mysql-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821103" comment="php-mysqlnd-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821104" comment="php-odbc-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821105" comment="php-pdo-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821106" comment="php-pgsql-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821107" comment="php-process-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821108" comment="php-pspell-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821109" comment="php-recode-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821110" comment="php-snmp-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821111" comment="php-soap-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821112" comment="php-xml-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821113" comment="php-xmlrpc-5.4.16-36.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153331" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3331</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3331" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3331" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3331" ref_url="https://www.suse.com/security/cve/CVE-2015-3331" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1488-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001574.html" source="SUSE-SU"/>
    <description>
    The __driver_rfc4106_decrypt function in arch/x86/crypto/aesni-intel_glue.c in the Linux kernel before 3.19.3 does not properly determine the memory locations used for encrypted data, which allows context-dependent attackers to cause a denial of service (buffer overflow and system crash) or possibly execute arbitrary code by triggering a crypto API call, as demonstrated by use of a libkcapi test program with an AF_ALG(aead) socket.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3331/">CVE-2015-3331 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3331">CVE-2015-3331 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1115893">SUSE bug 1115893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927257">SUSE bug 927257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931231">SUSE bug 931231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939262">SUSE bug 939262</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821011" comment="kernel-3.10.0-229.4.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821012" comment="kernel-abi-whitelists-3.10.0-229.4.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821013" comment="kernel-debug-3.10.0-229.4.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821016" comment="kernel-doc-3.10.0-229.4.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821017" comment="kernel-headers-3.10.0-229.4.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821018" comment="kernel-tools-3.10.0-229.4.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821019" comment="kernel-tools-libs-3.10.0-229.4.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821021" comment="perf-3.10.0-229.4.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821022" comment="python-perf-3.10.0-229.4.2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153339" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3339</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3339" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3339" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3339" ref_url="https://www.suse.com/security/cve/CVE-2015-3339" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1488-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002207.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1382-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WK73PLTGJ2J7BSDKZCVOUPKENB4UND7S/#WK73PLTGJ2J7BSDKZCVOUPKENB4UND7S" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OC7663UNXLKFWJKPITRGQNF4FU4KJWNK/#OC7663UNXLKFWJKPITRGQNF4FU4KJWNK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M3DY3J73NZK532BN4KZEFFGULVYJU3D2/#M3DY3J73NZK532BN4KZEFFGULVYJU3D2" source="SUSE-SU"/>
    <description>
    Race condition in the prepare_binprm function in fs/exec.c in the Linux kernel before 3.19.6 allows local users to gain privileges by executing a setuid program at a time instant when a chown to root is in progress, and the ownership is changed but the setuid bit is not yet stripped.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3339/">CVE-2015-3339 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3339">CVE-2015-3339 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/903967">SUSE bug 903967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928130">SUSE bug 928130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939263">SUSE bug 939263</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821413" comment="kernel-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821414" comment="kernel-abi-whitelists-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821415" comment="kernel-debug-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821418" comment="kernel-doc-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821419" comment="kernel-headers-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821420" comment="kernel-tools-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821421" comment="kernel-tools-libs-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821423" comment="perf-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821424" comment="python-perf-3.10.0-327.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153405" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3405</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3405" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3405" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3405" ref_url="https://www.suse.com/security/cve/CVE-2015-3405" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0865-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001470.html" source="SUSE-SU"/>
    <description>
    ntp-keygen in ntp 4.2.8px before 4.2.8p2-RC2 and 4.3.x before 4.3.12 does not generate MD5 keys with sufficient entropy on big endian machines when the lowest order byte of the temp variable is between 0x20 and 0x7f and not #, which might allow remote attackers to obtain the value of generated MD5 keys via a brute force attack with the 93 possible keys.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3405/">CVE-2015-3405 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3405">CVE-2015-3405 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/924202">SUSE bug 924202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928321">SUSE bug 928321</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821459" comment="ntp-4.2.6p5-22.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821460" comment="ntp-doc-4.2.6p5-22.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821461" comment="ntp-perl-4.2.6p5-22.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821462" comment="ntpdate-4.2.6p5-22.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821463" comment="sntp-4.2.6p5-22.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153411" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3411</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3411" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3411" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3411" ref_url="https://www.suse.com/security/cve/CVE-2015-3411" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1253-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001500.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1638-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013458.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1197-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KAM7CF47FZH7TLKJL6UQAD7JUYBLJ6HH/#KAM7CF47FZH7TLKJL6UQAD7JUYBLJ6HH" source="SUSE-SU"/>
    <description>
    PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 does not ensure that pathnames lack %00 sequences, which might allow remote attackers to read or write to arbitrary files via crafted input to an application that calls (1) a DOMDocument load method, (2) the xmlwriter_open_uri function, (3) the finfo_file function, or (4) the hash_hmac_file function, as demonstrated by a filename\0.xml attack that bypasses an intended configuration in which client users may read only .xml files.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-28"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3411/">CVE-2015-3411 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3411">CVE-2015-3411 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/935074">SUSE bug 935074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935227">SUSE bug 935227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935229">SUSE bug 935229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935232">SUSE bug 935232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821089" comment="php-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821090" comment="php-bcmath-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821091" comment="php-cli-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821092" comment="php-common-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821093" comment="php-dba-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821094" comment="php-devel-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821095" comment="php-embedded-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821096" comment="php-enchant-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821097" comment="php-fpm-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821098" comment="php-gd-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821099" comment="php-intl-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821100" comment="php-ldap-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821101" comment="php-mbstring-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821102" comment="php-mysql-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821103" comment="php-mysqlnd-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821104" comment="php-odbc-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821105" comment="php-pdo-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821106" comment="php-pgsql-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821107" comment="php-process-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821108" comment="php-pspell-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821109" comment="php-recode-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821110" comment="php-snmp-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821111" comment="php-soap-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821112" comment="php-xml-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821113" comment="php-xmlrpc-5.4.16-36.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153412" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3412</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3412" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3412" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3412" ref_url="https://www.suse.com/security/cve/CVE-2015-3412" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1253-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001500.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1638-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002131.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1197-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KAM7CF47FZH7TLKJL6UQAD7JUYBLJ6HH/#KAM7CF47FZH7TLKJL6UQAD7JUYBLJ6HH" source="SUSE-SU"/>
    <description>
    PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 does not ensure that pathnames lack %00 sequences, which might allow remote attackers to read arbitrary files via crafted input to an application that calls the stream_resolve_include_path function in ext/standard/streamsfuncs.c, as demonstrated by a filename\0.extension attack that bypasses an intended configuration in which client users may read files with only one specific extension.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3412/">CVE-2015-3412 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3412">CVE-2015-3412 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/935227">SUSE bug 935227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935229">SUSE bug 935229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935232">SUSE bug 935232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821089" comment="php-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821090" comment="php-bcmath-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821091" comment="php-cli-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821092" comment="php-common-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821093" comment="php-dba-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821094" comment="php-devel-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821095" comment="php-embedded-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821096" comment="php-enchant-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821097" comment="php-fpm-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821098" comment="php-gd-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821099" comment="php-intl-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821100" comment="php-ldap-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821101" comment="php-mbstring-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821102" comment="php-mysql-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821103" comment="php-mysqlnd-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821104" comment="php-odbc-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821105" comment="php-pdo-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821106" comment="php-pgsql-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821107" comment="php-process-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821108" comment="php-pspell-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821109" comment="php-recode-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821110" comment="php-snmp-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821111" comment="php-soap-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821112" comment="php-xml-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821113" comment="php-xmlrpc-5.4.16-36.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153414" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3414</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3414" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3414" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3414" ref_url="https://www.suse.com/security/cve/CVE-2015-3414" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2320-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JD4EZ74IZ57MKTDKDVIUAIG6VCAEKMD5/" source="SUSE-SU"/>
    <description>
    SQLite before 3.8.9 does not properly implement the dequoting of collation-sequence names, which allows context-dependent attackers to cause a denial of service (uninitialized memory access and application crash) or possibly have unspecified other impact via a crafted COLLATE clause, as demonstrated by COLLATE"""""""" at the end of a SELECT statement.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-3414/">CVE-2015-3414 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3414">CVE-2015-3414 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1085790">SUSE bug 1085790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190372">SUSE bug 1190372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193078">SUSE bug 1193078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928700">SUSE bug 928700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928701">SUSE bug 928701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928702">SUSE bug 928702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821217" comment="lemon-3.7.17-6.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821218" comment="sqlite-3.7.17-6.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821219" comment="sqlite-devel-3.7.17-6.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821220" comment="sqlite-doc-3.7.17-6.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821221" comment="sqlite-tcl-3.7.17-6.el7_1.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153415" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3415</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3415" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3415" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3415" ref_url="https://www.suse.com/security/cve/CVE-2015-3415" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2320-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JD4EZ74IZ57MKTDKDVIUAIG6VCAEKMD5/" source="SUSE-SU"/>
    <description>
    The sqlite3VdbeExec function in vdbe.c in SQLite before 3.8.9 does not properly implement comparison operators, which allows context-dependent attackers to cause a denial of service (invalid free operation) or possibly have unspecified other impact via a crafted CHECK clause, as demonstrated by CHECK(0&amp;O&gt;O) in a CREATE TABLE statement.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-3415/">CVE-2015-3415 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3415">CVE-2015-3415 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1190372">SUSE bug 1190372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928700">SUSE bug 928700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928701">SUSE bug 928701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928702">SUSE bug 928702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821217" comment="lemon-3.7.17-6.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821218" comment="sqlite-3.7.17-6.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821219" comment="sqlite-devel-3.7.17-6.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821220" comment="sqlite-doc-3.7.17-6.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821221" comment="sqlite-tcl-3.7.17-6.el7_1.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153416" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3416</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3416" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3416" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3416" ref_url="https://www.suse.com/security/cve/CVE-2015-3416" source="SUSE CVE"/>
    <description>
    The sqlite3VXPrintf function in printf.c in SQLite before 3.8.9 does not properly handle precision and width values during floating-point conversions, which allows context-dependent attackers to cause a denial of service (integer overflow and stack-based buffer overflow) or possibly have unspecified other impact via large integers in a crafted printf function call in a SELECT statement.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-3416/">CVE-2015-3416 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3416">CVE-2015-3416 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1190372">SUSE bug 1190372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928700">SUSE bug 928700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928701">SUSE bug 928701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928702">SUSE bug 928702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821217" comment="lemon-3.7.17-6.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821218" comment="sqlite-3.7.17-6.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821219" comment="sqlite-devel-3.7.17-6.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821220" comment="sqlite-doc-3.7.17-6.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821221" comment="sqlite-tcl-3.7.17-6.el7_1.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153455" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3455</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3455" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3455" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3455" ref_url="https://www.suse.com/security/cve/CVE-2015-3455" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002194.html" source="SUSE-SU"/>
    <description>
    Squid 3.2.x before 3.2.14, 3.3.x before 3.3.14, 3.4.x before 3.4.13, and 3.5.x before 3.5.4, when configured with client-first SSL-bump, do not properly validate the domain or hostname fields of X.509 certificates, which allows man-in-the-middle attackers to spoof SSL servers via a valid certificate.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3455/">CVE-2015-3455 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3455">CVE-2015-3455 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/929493">SUSE bug 929493</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821545" comment="squid-3.3.8-26.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821546" comment="squid-sysvinit-3.3.8-26.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153456" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3456</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3456" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3456" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3456" ref_url="https://www.suse.com/security/cve/CVE-2015-3456" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0889-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0944-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001408.html" source="SUSE-SU"/>
		<reference ref_id="TID7016497" ref_url="https://www.suse.com/support/kb/doc?id=7016497" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0893-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2V5WER4KNKN6PYRSUH3XIADXSRI6VT5J/#2V5WER4KNKN6PYRSUH3XIADXSRI6VT5J" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0894-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N4ZAOLBFFHRWEHZUAUTQKU56GURYVX4U/#N4ZAOLBFFHRWEHZUAUTQKU56GURYVX4U" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0983-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BJRBBVSCWK64IXCWDAQWMSYZBV6OOOZ4/#BJRBBVSCWK64IXCWDAQWMSYZBV6OOOZ4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1092-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CQMOBB2P5AC2XENWS2CQI3JBBQ3QBSML/#CQMOBB2P5AC2XENWS2CQI3JBBQ3QBSML" source="SUSE-SU"/>
    <description>
    The Floppy Disk Controller (FDC) in QEMU, as used in Xen 4.5.x and earlier and KVM, allows local guest users to cause a denial of service (out-of-bounds write and guest crash) or possibly execute arbitrary code via the (1) FD_CMD_READ_ID, (2) FD_CMD_DRIVE_SPECIFICATION_COMMAND, or other unspecified commands, aka VENOM.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3456/">CVE-2015-3456 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3456">CVE-2015-3456 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/929339">SUSE bug 929339</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932770">SUSE bug 932770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935900">SUSE bug 935900</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821024" comment="libcacard-1.5.3-86.el7_1.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821025" comment="libcacard-devel-1.5.3-86.el7_1.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821026" comment="libcacard-tools-1.5.3-86.el7_1.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821027" comment="qemu-img-1.5.3-86.el7_1.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821028" comment="qemu-kvm-1.5.3-86.el7_1.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821029" comment="qemu-kvm-common-1.5.3-86.el7_1.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821030" comment="qemu-kvm-tools-1.5.3-86.el7_1.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153622" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3622</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3622" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3622" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3622" ref_url="https://www.suse.com/security/cve/CVE-2015-3622" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
    <description>
    The _asn1_extract_der_octet function in lib/decoding.c in GNU Libtasn1 before 4.5 allows remote attackers to cause a denial of service (out-of-bounds heap read) via a crafted certificate.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3622/">CVE-2015-3622 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3622">CVE-2015-3622 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/929414">SUSE bug 929414</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823204" comment="libtasn1-4.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823205" comment="libtasn1-devel-4.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823206" comment="libtasn1-tools-4.10-1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153636" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3636</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3636" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3636" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3636" ref_url="https://www.suse.com/security/cve/CVE-2015-3636" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1488-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001574.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1382-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WK73PLTGJ2J7BSDKZCVOUPKENB4UND7S/#WK73PLTGJ2J7BSDKZCVOUPKENB4UND7S" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OC7663UNXLKFWJKPITRGQNF4FU4KJWNK/#OC7663UNXLKFWJKPITRGQNF4FU4KJWNK" source="SUSE-SU"/>
    <description>
    The ping_unhash function in net/ipv4/ping.c in the Linux kernel before 4.0.3 does not initialize a certain list data structure during an unhash operation, which allows local users to gain privileges or cause a denial of service (use-after-free and system crash) by leveraging the ability to make a SOCK_DGRAM socket system call for the IPPROTO_ICMP or IPPROTO_ICMPV6 protocol, and then making a connect system call after a disconnect.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3636/">CVE-2015-3636 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3636">CVE-2015-3636 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/929525">SUSE bug 929525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939277">SUSE bug 939277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994624">SUSE bug 994624</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821203" comment="kernel-3.10.0-229.11.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821204" comment="kernel-abi-whitelists-3.10.0-229.11.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821205" comment="kernel-debug-3.10.0-229.11.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821208" comment="kernel-doc-3.10.0-229.11.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821209" comment="kernel-headers-3.10.0-229.11.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821210" comment="kernel-tools-3.10.0-229.11.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821211" comment="kernel-tools-libs-3.10.0-229.11.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821213" comment="perf-3.10.0-229.11.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821214" comment="python-perf-3.10.0-229.11.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153810" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3810</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3810" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3810" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3810" ref_url="https://www.suse.com/security/cve/CVE-2015-3810" source="SUSE CVE"/>
    <description>
    epan/dissectors/packet-websocket.c in the WebSocket dissector in Wireshark 1.12.x before 1.12.5 uses a recursive algorithm, which allows remote attackers to cause a denial of service (CPU consumption) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3810/">CVE-2015-3810 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3810">CVE-2015-3810 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/930689">SUSE bug 930689</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821556" comment="wireshark-1.10.14-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821557" comment="wireshark-devel-1.10.14-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821558" comment="wireshark-gnome-1.10.14-7.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153811" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3811</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3811" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3811" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3811" ref_url="https://www.suse.com/security/cve/CVE-2015-3811" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001448.html" source="SUSE-SU"/>
    <description>
    epan/dissectors/packet-wcp.c in the WCP dissector in Wireshark 1.10.x before 1.10.14 and 1.12.x before 1.12.5 improperly refers to previously processed bytes, which allows remote attackers to cause a denial of service (application crash) via a crafted packet, a different vulnerability than CVE-2015-2188.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3811/">CVE-2015-3811 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3811">CVE-2015-3811 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/930689">SUSE bug 930689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930691">SUSE bug 930691</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821556" comment="wireshark-1.10.14-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821557" comment="wireshark-devel-1.10.14-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821558" comment="wireshark-gnome-1.10.14-7.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153812" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3812</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3812" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3812" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3812" ref_url="https://www.suse.com/security/cve/CVE-2015-3812" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001448.html" source="SUSE-SU"/>
    <description>
    Multiple memory leaks in the x11_init_protocol function in epan/dissectors/packet-x11.c in the X11 dissector in Wireshark 1.10.x before 1.10.14 and 1.12.x before 1.12.5 allow remote attackers to cause a denial of service (memory consumption) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3812/">CVE-2015-3812 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3812">CVE-2015-3812 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/930689">SUSE bug 930689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930691">SUSE bug 930691</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821556" comment="wireshark-1.10.14-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821557" comment="wireshark-devel-1.10.14-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821558" comment="wireshark-gnome-1.10.14-7.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153813" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3813</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3813" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3813" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3813" ref_url="https://www.suse.com/security/cve/CVE-2015-3813" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1676-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1676-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001625.html" source="SUSE-SU"/>
    <description>
    The fragment_add_work function in epan/reassemble.c in the packet-reassembly feature in Wireshark 1.12.x before 1.12.5 does not properly determine the defragmentation state in a case of an insufficient snapshot length, which allows remote attackers to cause a denial of service (memory consumption) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3813/">CVE-2015-3813 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3813">CVE-2015-3813 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/930689">SUSE bug 930689</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821556" comment="wireshark-1.10.14-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821557" comment="wireshark-devel-1.10.14-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821558" comment="wireshark-gnome-1.10.14-7.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154000" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4000</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4000" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1177-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1181-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1183-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1184-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1268-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001502.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1329-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001526.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1547-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1547-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001595.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001607.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1618-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017140.html" source="SUSE-SU"/>
		<reference ref_id="TID7010166" ref_url="https://www.suse.com/support/kb/doc/?id=7010166" source="SUSE-SU"/>
		<reference ref_id="TID7016528" ref_url="https://www.suse.com/support/kb/doc/?id=7016528" source="SUSE-SU"/>
		<reference ref_id="TID7016529" ref_url="https://www.suse.com/support/kb/doc?id=7016529" source="SUSE-SU"/>
		<reference ref_id="TID7016539" ref_url="https://www.suse.com/support/kb/doc/?id=7016539" source="SUSE-SU"/>
		<reference ref_id="TID7016657" ref_url="https://www.suse.com/support/kb/doc/?id=7016657" source="SUSE-SU"/>
		<reference ref_id="TID7016694" ref_url="https://www.suse.com/support/kb/doc/?id=7016694" source="SUSE-SU"/>
		<reference ref_id="TID7016726" ref_url="https://www.suse.com/support/kb/doc/?id=7016726" source="SUSE-SU"/>
		<reference ref_id="TID7016795" ref_url="https://www.suse.com/support/kb/doc/?id=7016795" source="SUSE-SU"/>
		<reference ref_id="TID7021279" ref_url="https://www.suse.com/support/kb/doc/?id=7021279" source="SUSE-SU"/>
		<reference ref_id="TID7021300" ref_url="https://www.suse.com/support/kb/doc/?id=7021300" source="SUSE-SU"/>
		<reference ref_id="TID7021433" ref_url="https://www.suse.com/support/kb/doc/?id=7021433" source="SUSE-SU"/>
		<reference ref_id="TID7021435" ref_url="https://www.suse.com/support/kb/doc/?id=7021435" source="SUSE-SU"/>
		<reference ref_id="TID7021518" ref_url="https://www.suse.com/support/kb/doc/?id=7021518" source="SUSE-SU"/>
		<reference ref_id="TID7021676" ref_url="https://www.suse.com/support/kb/doc/?id=7021676" source="SUSE-SU"/>
		<reference ref_id="TID7021743" ref_url="https://www.suse.com/support/kb/doc/?id=7021743" source="SUSE-SU"/>
		<reference ref_id="TID7021744" ref_url="https://www.suse.com/support/kb/doc/?id=7021744" source="SUSE-SU"/>
		<reference ref_id="TID7021823" ref_url="https://www.suse.com/support/kb/doc/?id=7021823" source="SUSE-SU"/>
		<reference ref_id="TID7021836" ref_url="https://www.suse.com/support/kb/doc/?id=7021836" source="SUSE-SU"/>
		<reference ref_id="TID7021848" ref_url="https://www.suse.com/support/kb/doc/?id=7021848" source="SUSE-SU"/>
		<reference ref_id="TID7021978" ref_url="https://www.suse.com/support/kb/doc/?id=7021978" source="SUSE-SU"/>
		<reference ref_id="TID7021993" ref_url="https://www.suse.com/support/kb/doc/?id=7021993" source="SUSE-SU"/>
		<reference ref_id="TID7021994" ref_url="https://www.suse.com/support/kb/doc/?id=7021994" source="SUSE-SU"/>
		<reference ref_id="TID7021995" ref_url="https://www.suse.com/support/kb/doc/?id=7021995" source="SUSE-SU"/>
		<reference ref_id="TID7022026" ref_url="https://www.suse.com/support/kb/doc/?id=7022026" source="SUSE-SU"/>
		<reference ref_id="TID7022077" ref_url="https://www.suse.com/support/kb/doc/?id=7022077" source="SUSE-SU"/>
		<reference ref_id="TID7022095" ref_url="https://www.suse.com/support/kb/doc/?id=7022095" source="SUSE-SU"/>
		<reference ref_id="TID7022096" ref_url="https://www.suse.com/support/kb/doc/?id=7022096" source="SUSE-SU"/>
		<reference ref_id="TID7022102" ref_url="https://www.suse.com/support/kb/doc/?id=7022102" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1139-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FWJ5D6XMAKVEDCAJ7ERXTGMFTTDWN5PT/#FWJ5D6XMAKVEDCAJ7ERXTGMFTTDWN5PT" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1216-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KHOOMDUPEQLMQZN7JRZIBDKGHYJ2TBKQ/#KHOOMDUPEQLMQZN7JRZIBDKGHYJ2TBKQ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1229-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W6I3NS2A7HT62ZCI53NMT32HGQIV5BS4/#W6I3NS2A7HT62ZCI53NMT32HGQIV5BS4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VNGKNJGYZV377DMZMDSGTC6LXFPDDSY/#5VNGKNJGYZV377DMZMDSGTC6LXFPDDSY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1277-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XQAZGF7SIGXMQQGI6UJF7VBAOBYMY5WF/#XQAZGF7SIGXMQQGI6UJF7VBAOBYMY5WF" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1288-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TXVU3Y3MZTDHVP52DAEBRCD5GP4FAMIU/#TXVU3Y3MZTDHVP52DAEBRCD5GP4FAMIU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1289-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PZ3KWYO2IVEORKHG62M62G3UEKUH6TTO/#PZ3KWYO2IVEORKHG62M62G3UEKUH6TTO" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0226-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6PJL6VDYM2BF76IMT64TDCZYCMTZLJLN/#6PJL6VDYM2BF76IMT64TDCZYCMTZLJLN" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0255-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HT6LYJCGGLAPRBTC4QN62E75JZBMUBRC/#HT6LYJCGGLAPRBTC4QN62E75JZBMUBRC" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0261-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OBCAOITX3L4BHAVIXSGXNTMWKD2QELP3/#OBCAOITX3L4BHAVIXSGXNTMWKD2QELP3" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    The TLS protocol 1.2 and earlier, when a DHE_EXPORT ciphersuite is enabled on a server but not on a client, does not properly convey a DHE_EXPORT choice, which allows man-in-the-middle attackers to conduct cipher-downgrade attacks by rewriting a ClientHello with DHE replaced by DHE_EXPORT and then rewriting a ServerHello with DHE_EXPORT replaced by DHE, aka the "Logjam" issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4000">CVE-2015-4000 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1074631">SUSE bug 1074631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211968">SUSE bug 1211968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931600">SUSE bug 931600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931698">SUSE bug 931698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931723">SUSE bug 931723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931845">SUSE bug 931845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932026">SUSE bug 932026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932483">SUSE bug 932483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934789">SUSE bug 934789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935033">SUSE bug 935033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935540">SUSE bug 935540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937202">SUSE bug 937202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937766">SUSE bug 937766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938248">SUSE bug 938248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938432">SUSE bug 938432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938895">SUSE bug 938895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938905">SUSE bug 938905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938906">SUSE bug 938906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938913">SUSE bug 938913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938945">SUSE bug 938945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943664">SUSE bug 943664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944729">SUSE bug 944729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945582">SUSE bug 945582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955589">SUSE bug 955589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980406">SUSE bug 980406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990592">SUSE bug 990592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994144">SUSE bug 994144</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821198" comment="java-1.6.0-openjdk-1.6.0.36-1.13.8.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821199" comment="java-1.6.0-openjdk-demo-1.6.0.36-1.13.8.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821200" comment="java-1.6.0-openjdk-devel-1.6.0.36-1.13.8.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821201" comment="java-1.6.0-openjdk-javadoc-1.6.0.36-1.13.8.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821202" comment="java-1.6.0-openjdk-src-1.6.0.36-1.13.8.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821157" comment="java-1.7.0-openjdk-1.7.0.85-2.6.1.2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821158" comment="java-1.7.0-openjdk-accessibility-1.7.0.85-2.6.1.2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821159" comment="java-1.7.0-openjdk-demo-1.7.0.85-2.6.1.2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821160" comment="java-1.7.0-openjdk-devel-1.7.0.85-2.6.1.2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821161" comment="java-1.7.0-openjdk-headless-1.7.0.85-2.6.1.2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821162" comment="java-1.7.0-openjdk-javadoc-1.7.0.85-2.6.1.2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821163" comment="java-1.7.0-openjdk-src-1.7.0.85-2.6.1.2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821150" comment="java-1.8.0-openjdk-1.8.0.51-1.b16.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821151" comment="java-1.8.0-openjdk-accessibility-1.8.0.51-1.b16.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821152" comment="java-1.8.0-openjdk-demo-1.8.0.51-1.b16.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821153" comment="java-1.8.0-openjdk-devel-1.8.0.51-1.b16.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821154" comment="java-1.8.0-openjdk-headless-1.8.0.51-1.b16.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821155" comment="java-1.8.0-openjdk-javadoc-1.8.0.51-1.b16.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821156" comment="java-1.8.0-openjdk-src-1.8.0.51-1.b16.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821128" comment="nss-3.19.1-3.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821129" comment="nss-devel-3.19.1-3.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821130" comment="nss-pkcs11-devel-3.19.1-3.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821131" comment="nss-sysinit-3.19.1-3.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821132" comment="nss-tools-3.19.1-3.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821133" comment="nss-util-3.19.1-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821134" comment="nss-util-devel-3.19.1-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821032" comment="openssl-1.0.1e-42.el7_1.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821033" comment="openssl-devel-1.0.1e-42.el7_1.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821034" comment="openssl-libs-1.0.1e-42.el7_1.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821035" comment="openssl-perl-1.0.1e-42.el7_1.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821036" comment="openssl-static-1.0.1e-42.el7_1.6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154021" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4021</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4021" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4021" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4021" ref_url="https://www.suse.com/security/cve/CVE-2015-4021" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1253-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1638-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002131.html" source="SUSE-SU"/>
    <description>
    The phar_parse_tarfile function in ext/phar/tar.c in PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before 5.6.9 does not verify that the first character of a filename is different from the \0 character, which allows remote attackers to cause a denial of service (integer underflow and memory corruption) via a crafted entry in a tar archive.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4021/">CVE-2015-4021 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4021">CVE-2015-4021 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/931769">SUSE bug 931769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935074">SUSE bug 935074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821089" comment="php-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821090" comment="php-bcmath-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821091" comment="php-cli-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821092" comment="php-common-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821093" comment="php-dba-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821094" comment="php-devel-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821095" comment="php-embedded-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821096" comment="php-enchant-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821097" comment="php-fpm-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821098" comment="php-gd-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821099" comment="php-intl-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821100" comment="php-ldap-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821101" comment="php-mbstring-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821102" comment="php-mysql-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821103" comment="php-mysqlnd-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821104" comment="php-odbc-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821105" comment="php-pdo-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821106" comment="php-pgsql-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821107" comment="php-process-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821108" comment="php-pspell-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821109" comment="php-recode-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821110" comment="php-snmp-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821111" comment="php-soap-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821112" comment="php-xml-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821113" comment="php-xmlrpc-5.4.16-36.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154022" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4022</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4022" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4022" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4022" ref_url="https://www.suse.com/security/cve/CVE-2015-4022" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1253-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1638-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002131.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the ftp_genlist function in ext/ftp/ftp.c in PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before 5.6.9 allows remote FTP servers to execute arbitrary code via a long reply to a LIST command, leading to a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-30"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4022/">CVE-2015-4022 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4022">CVE-2015-4022 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/931769">SUSE bug 931769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931772">SUSE bug 931772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935275">SUSE bug 935275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821089" comment="php-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821090" comment="php-bcmath-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821091" comment="php-cli-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821092" comment="php-common-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821093" comment="php-dba-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821094" comment="php-devel-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821095" comment="php-embedded-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821096" comment="php-enchant-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821097" comment="php-fpm-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821098" comment="php-gd-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821099" comment="php-intl-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821100" comment="php-ldap-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821101" comment="php-mbstring-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821102" comment="php-mysql-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821103" comment="php-mysqlnd-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821104" comment="php-odbc-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821105" comment="php-pdo-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821106" comment="php-pgsql-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821107" comment="php-process-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821108" comment="php-pspell-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821109" comment="php-recode-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821110" comment="php-snmp-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821111" comment="php-soap-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821112" comment="php-xml-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821113" comment="php-xmlrpc-5.4.16-36.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154024" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4024</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4024" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4024" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4024" ref_url="https://www.suse.com/security/cve/CVE-2015-4024" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1253-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1638-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002131.html" source="SUSE-SU"/>
    <description>
    Algorithmic complexity vulnerability in the multipart_buffer_headers function in main/rfc1867.c in PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before 5.6.9 allows remote attackers to cause a denial of service (CPU consumption) via crafted form data that triggers an improper order-of-growth outcome.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4024/">CVE-2015-4024 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4024">CVE-2015-4024 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/931421">SUSE bug 931421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821089" comment="php-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821090" comment="php-bcmath-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821091" comment="php-cli-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821092" comment="php-common-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821093" comment="php-dba-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821094" comment="php-devel-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821095" comment="php-embedded-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821096" comment="php-enchant-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821097" comment="php-fpm-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821098" comment="php-gd-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821099" comment="php-intl-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821100" comment="php-ldap-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821101" comment="php-mbstring-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821102" comment="php-mysql-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821103" comment="php-mysqlnd-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821104" comment="php-odbc-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821105" comment="php-pdo-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821106" comment="php-pgsql-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821107" comment="php-process-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821108" comment="php-pspell-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821109" comment="php-recode-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821110" comment="php-snmp-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821111" comment="php-soap-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821112" comment="php-xml-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821113" comment="php-xmlrpc-5.4.16-36.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154025" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4025</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4025" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4025" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4025" ref_url="https://www.suse.com/security/cve/CVE-2015-4025" source="SUSE CVE"/>
    <description>
    PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before 5.6.9 truncates a pathname upon encountering a \x00 character in certain situations, which allows remote attackers to bypass intended extension restrictions and access files or directories with unexpected names via a crafted argument to (1) set_include_path, (2) tempnam, (3) rmdir, or (4) readlink.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2006-7243.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2015-4025/">CVE-2015-4025 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4025">CVE-2015-4025 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1067090">SUSE bug 1067090</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821089" comment="php-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821090" comment="php-bcmath-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821091" comment="php-cli-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821092" comment="php-common-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821093" comment="php-dba-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821094" comment="php-devel-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821095" comment="php-embedded-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821096" comment="php-enchant-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821097" comment="php-fpm-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821098" comment="php-gd-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821099" comment="php-intl-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821100" comment="php-ldap-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821101" comment="php-mbstring-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821102" comment="php-mysql-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821103" comment="php-mysqlnd-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821104" comment="php-odbc-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821105" comment="php-pdo-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821106" comment="php-pgsql-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821107" comment="php-process-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821108" comment="php-pspell-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821109" comment="php-recode-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821110" comment="php-snmp-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821111" comment="php-soap-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821112" comment="php-xml-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821113" comment="php-xmlrpc-5.4.16-36.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154026" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4026</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4026" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4026" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4026" ref_url="https://www.suse.com/security/cve/CVE-2015-4026" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1253-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1638-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002131.html" source="SUSE-SU"/>
    <description>
    The pcntl_exec implementation in PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before 5.6.9 truncates a pathname upon encountering a \x00 character, which might allow remote attackers to bypass intended extension restrictions and execute files with unexpected names via a crafted first argument.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2006-7243.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-29"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4026/">CVE-2015-4026 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4026">CVE-2015-4026 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/931776">SUSE bug 931776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935227">SUSE bug 935227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821089" comment="php-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821090" comment="php-bcmath-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821091" comment="php-cli-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821092" comment="php-common-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821093" comment="php-dba-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821094" comment="php-devel-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821095" comment="php-embedded-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821096" comment="php-enchant-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821097" comment="php-fpm-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821098" comment="php-gd-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821099" comment="php-intl-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821100" comment="php-ldap-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821101" comment="php-mbstring-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821102" comment="php-mysql-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821103" comment="php-mysqlnd-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821104" comment="php-odbc-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821105" comment="php-pdo-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821106" comment="php-pgsql-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821107" comment="php-process-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821108" comment="php-pspell-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821109" comment="php-recode-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821110" comment="php-snmp-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821111" comment="php-soap-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821112" comment="php-xml-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821113" comment="php-xmlrpc-5.4.16-36.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154142" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4142</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4142" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4142" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4142" ref_url="https://www.suse.com/security/cve/CVE-2015-4142" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007800.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2896-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FVO5LGM6MML3JRTJIGXKSVAE727P46NU/#FVO5LGM6MML3JRTJIGXKSVAE727P46NU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2053-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2R3VXKTYLLUYFBZQ2NNAI5NSZOBXISJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HDY6AZL2NYOKU57GM74M5JHC5SYA3IY/" source="SUSE-SU"/>
    <description>
    Integer underflow in the WMM Action frame parser in hostapd 0.5.5 through 2.4 and wpa_supplicant 0.7.0 through 2.4, when used for AP mode MLME/SME functionality, allows remote attackers to cause a denial of service (crash) via a crafted frame, which triggers an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4142/">CVE-2015-4142 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4142">CVE-2015-4142 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/915323">SUSE bug 915323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930078">SUSE bug 930078</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821076" comment="wpa_supplicant-2.0-17.el7_1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154147" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4147</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4147" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4147" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4147" ref_url="https://www.suse.com/security/cve/CVE-2015-4147" source="SUSE CVE"/>
    <description>
    The SoapClient::__call method in ext/soap/soap.c in PHP before 5.4.39, 5.5.x before 5.5.23, and 5.6.x before 5.6.7 does not verify that __default_headers is an array, which allows remote attackers to execute arbitrary code by providing crafted serialized data with an unexpected data type, related to a "type confusion" issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4147/">CVE-2015-4147 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4147">CVE-2015-4147 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/925109">SUSE bug 925109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933227">SUSE bug 933227</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821089" comment="php-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821090" comment="php-bcmath-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821091" comment="php-cli-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821092" comment="php-common-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821093" comment="php-dba-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821094" comment="php-devel-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821095" comment="php-embedded-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821096" comment="php-enchant-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821097" comment="php-fpm-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821098" comment="php-gd-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821099" comment="php-intl-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821100" comment="php-ldap-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821101" comment="php-mbstring-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821102" comment="php-mysql-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821103" comment="php-mysqlnd-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821104" comment="php-odbc-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821105" comment="php-pdo-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821106" comment="php-pgsql-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821107" comment="php-process-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821108" comment="php-pspell-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821109" comment="php-recode-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821110" comment="php-snmp-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821111" comment="php-soap-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821112" comment="php-xml-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821113" comment="php-xmlrpc-5.4.16-36.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154148" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4148</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4148" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4148" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4148" ref_url="https://www.suse.com/security/cve/CVE-2015-4148" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1253-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001500.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1638-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002131.html" source="SUSE-SU"/>
    <description>
    The do_soap_call function in ext/soap/soap.c in PHP before 5.4.39, 5.5.x before 5.5.23, and 5.6.x before 5.6.7 does not verify that the uri property is a string, which allows remote attackers to obtain sensitive information by providing crafted serialized data with an int data type, related to a "type confusion" issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-26"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4148/">CVE-2015-4148 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4148">CVE-2015-4148 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/933227">SUSE bug 933227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935074">SUSE bug 935074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935226">SUSE bug 935226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821089" comment="php-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821090" comment="php-bcmath-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821091" comment="php-cli-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821092" comment="php-common-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821093" comment="php-dba-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821094" comment="php-devel-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821095" comment="php-embedded-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821096" comment="php-enchant-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821097" comment="php-fpm-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821098" comment="php-gd-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821099" comment="php-intl-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821100" comment="php-ldap-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821101" comment="php-mbstring-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821102" comment="php-mysql-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821103" comment="php-mysqlnd-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821104" comment="php-odbc-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821105" comment="php-pdo-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821106" comment="php-pgsql-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821107" comment="php-process-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821108" comment="php-pspell-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821109" comment="php-recode-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821110" comment="php-snmp-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821111" comment="php-soap-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821112" comment="php-xml-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821113" comment="php-xmlrpc-5.4.16-36.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154170" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4170</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4170" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4170" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4170" ref_url="https://www.suse.com/security/cve/CVE-2015-4170" source="SUSE CVE"/>
    <description>
    Race condition in the ldsem_cmpxchg function in drivers/tty/tty_ldsem.c in the Linux kernel before 3.13-rc4-next-20131218 allows local users to cause a denial of service (ldsem_down_read and ldsem_down_write deadlock) by establishing a new tty thread during shutdown of a previous tty thread.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4170/">CVE-2015-4170 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4170">CVE-2015-4170 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/933423">SUSE bug 933423</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821413" comment="kernel-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821414" comment="kernel-abi-whitelists-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821415" comment="kernel-debug-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821418" comment="kernel-doc-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821419" comment="kernel-headers-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821420" comment="kernel-tools-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821421" comment="kernel-tools-libs-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821423" comment="perf-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821424" comment="python-perf-3.10.0-327.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154473" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4473</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4473" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4473" ref_url="https://www.suse.com/security/cve/CVE-2015-4473" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001691.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1389-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EY2KMIQOWASGBHV5VJ6Z4BIIBYJRUX34/#EY2KMIQOWASGBHV5VJ6Z4BIIBYJRUX34" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1390-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MI5UMXX5RIRUL22SVUBQFLL43YQP2B7C/#MI5UMXX5RIRUL22SVUBQFLL43YQP2B7C" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4473/">CVE-2015-4473 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4473">CVE-2015-4473 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/940806">SUSE bug 940806</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821216" comment="firefox-38.2.0-4.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821249" comment="thunderbird-38.2.0-1.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154475" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4475</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4475" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4475" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4475" ref_url="https://www.suse.com/security/cve/CVE-2015-4475" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001691.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1389-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EY2KMIQOWASGBHV5VJ6Z4BIIBYJRUX34/#EY2KMIQOWASGBHV5VJ6Z4BIIBYJRUX34" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1390-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MI5UMXX5RIRUL22SVUBQFLL43YQP2B7C/#MI5UMXX5RIRUL22SVUBQFLL43YQP2B7C" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    The mozilla::AudioSink function in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 mishandles inconsistent sample formats within MP3 audio data, which allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read) via a malformed file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4475/">CVE-2015-4475 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4475">CVE-2015-4475 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/940806">SUSE bug 940806</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821216" comment="firefox-38.2.0-4.el7_1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154478" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4478</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4478" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4478" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4478" ref_url="https://www.suse.com/security/cve/CVE-2015-4478" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001691.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1389-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EY2KMIQOWASGBHV5VJ6Z4BIIBYJRUX34/#EY2KMIQOWASGBHV5VJ6Z4BIIBYJRUX34" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1390-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MI5UMXX5RIRUL22SVUBQFLL43YQP2B7C/#MI5UMXX5RIRUL22SVUBQFLL43YQP2B7C" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 do not impose certain ECMAScript 6 requirements on JavaScript object properties, which allows remote attackers to bypass the Same Origin Policy via the reviver parameter to the JSON.parse method.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4478/">CVE-2015-4478 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4478">CVE-2015-4478 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/940806">SUSE bug 940806</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821216" comment="firefox-38.2.0-4.el7_1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154479" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4479</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4479" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4479" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4479" ref_url="https://www.suse.com/security/cve/CVE-2015-4479" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001691.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1389-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EY2KMIQOWASGBHV5VJ6Z4BIIBYJRUX34/#EY2KMIQOWASGBHV5VJ6Z4BIIBYJRUX34" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1390-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MI5UMXX5RIRUL22SVUBQFLL43YQP2B7C/#MI5UMXX5RIRUL22SVUBQFLL43YQP2B7C" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in libstagefright in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 allow remote attackers to execute arbitrary code via a crafted saio chunk in MPEG-4 video data.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4479/">CVE-2015-4479 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4479">CVE-2015-4479 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/940806">SUSE bug 940806</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821216" comment="firefox-38.2.0-4.el7_1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154480" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4480</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4480" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4480" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4480" ref_url="https://www.suse.com/security/cve/CVE-2015-4480" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2015:1389-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EY2KMIQOWASGBHV5VJ6Z4BIIBYJRUX34/#EY2KMIQOWASGBHV5VJ6Z4BIIBYJRUX34" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1390-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MI5UMXX5RIRUL22SVUBQFLL43YQP2B7C/#MI5UMXX5RIRUL22SVUBQFLL43YQP2B7C" source="SUSE-SU"/>
    <description>
    Integer overflow in the stagefright::SampleTable::isValid function in libstagefright in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 allows remote attackers to execute arbitrary code via crafted MPEG-4 video data with H.264 encoding.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4480/">CVE-2015-4480 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4480">CVE-2015-4480 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/940806">SUSE bug 940806</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821216" comment="firefox-38.2.0-4.el7_1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4484</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4484" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4484" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4484" ref_url="https://www.suse.com/security/cve/CVE-2015-4484" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001691.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1389-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EY2KMIQOWASGBHV5VJ6Z4BIIBYJRUX34/#EY2KMIQOWASGBHV5VJ6Z4BIIBYJRUX34" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1390-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MI5UMXX5RIRUL22SVUBQFLL43YQP2B7C/#MI5UMXX5RIRUL22SVUBQFLL43YQP2B7C" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    The js::jit::AssemblerX86Shared::lock_addl function in the JavaScript implementation in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 allows remote attackers to cause a denial of service (application crash) by leveraging the use of shared memory and accessing (1) an Atomics object or (2) a SharedArrayBuffer object.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4484/">CVE-2015-4484 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4484">CVE-2015-4484 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/940806">SUSE bug 940806</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821216" comment="firefox-38.2.0-4.el7_1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154485" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4485</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4485" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4485" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4485" ref_url="https://www.suse.com/security/cve/CVE-2015-4485" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001691.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1389-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EY2KMIQOWASGBHV5VJ6Z4BIIBYJRUX34/#EY2KMIQOWASGBHV5VJ6Z4BIIBYJRUX34" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1390-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MI5UMXX5RIRUL22SVUBQFLL43YQP2B7C/#MI5UMXX5RIRUL22SVUBQFLL43YQP2B7C" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the resize_context_buffers function in libvpx in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 allows remote attackers to execute arbitrary code via malformed WebM video data.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4485/">CVE-2015-4485 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4485">CVE-2015-4485 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/940806">SUSE bug 940806</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821216" comment="firefox-38.2.0-4.el7_1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154486" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4486</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4486" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4486" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4486" ref_url="https://www.suse.com/security/cve/CVE-2015-4486" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001691.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1389-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EY2KMIQOWASGBHV5VJ6Z4BIIBYJRUX34/#EY2KMIQOWASGBHV5VJ6Z4BIIBYJRUX34" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1390-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MI5UMXX5RIRUL22SVUBQFLL43YQP2B7C/#MI5UMXX5RIRUL22SVUBQFLL43YQP2B7C" source="SUSE-SU"/>
    <description>
    The decrease_ref_count function in libvpx in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read) via malformed WebM video data.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4486/">CVE-2015-4486 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4486">CVE-2015-4486 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/940806">SUSE bug 940806</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821216" comment="firefox-38.2.0-4.el7_1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154487" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4487</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4487" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4487" ref_url="https://www.suse.com/security/cve/CVE-2015-4487" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001691.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1389-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EY2KMIQOWASGBHV5VJ6Z4BIIBYJRUX34/#EY2KMIQOWASGBHV5VJ6Z4BIIBYJRUX34" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1390-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MI5UMXX5RIRUL22SVUBQFLL43YQP2B7C/#MI5UMXX5RIRUL22SVUBQFLL43YQP2B7C" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    The nsTSubstring::ReplacePrep function in Mozilla Firefox before 40.0, Firefox ESR 38.x before 38.2, and Firefox OS before 2.2 might allow remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors, related to an "overflow."
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4487/">CVE-2015-4487 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4487">CVE-2015-4487 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/940806">SUSE bug 940806</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821216" comment="firefox-38.2.0-4.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821249" comment="thunderbird-38.2.0-1.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154488" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4488</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4488" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4488" ref_url="https://www.suse.com/security/cve/CVE-2015-4488" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001691.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1389-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EY2KMIQOWASGBHV5VJ6Z4BIIBYJRUX34/#EY2KMIQOWASGBHV5VJ6Z4BIIBYJRUX34" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1390-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MI5UMXX5RIRUL22SVUBQFLL43YQP2B7C/#MI5UMXX5RIRUL22SVUBQFLL43YQP2B7C" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the StyleAnimationValue class in Mozilla Firefox before 40.0, Firefox ESR 38.x before 38.2, and Firefox OS before 2.2 allows remote attackers to have an unspecified impact by leveraging a StyleAnimationValue::operator self assignment.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4488/">CVE-2015-4488 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4488">CVE-2015-4488 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/940806">SUSE bug 940806</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821216" comment="firefox-38.2.0-4.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821249" comment="thunderbird-38.2.0-1.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154489" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4489</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4489" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4489" ref_url="https://www.suse.com/security/cve/CVE-2015-4489" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001691.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1389-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EY2KMIQOWASGBHV5VJ6Z4BIIBYJRUX34/#EY2KMIQOWASGBHV5VJ6Z4BIIBYJRUX34" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1390-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MI5UMXX5RIRUL22SVUBQFLL43YQP2B7C/#MI5UMXX5RIRUL22SVUBQFLL43YQP2B7C" source="SUSE-SU"/>
    <description>
    The nsTArray_Impl class in Mozilla Firefox before 40.0, Firefox ESR 38.x before 38.2, and Firefox OS before 2.2 might allow remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging a self assignment.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4489/">CVE-2015-4489 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4489">CVE-2015-4489 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/940806">SUSE bug 940806</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821216" comment="firefox-38.2.0-4.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821249" comment="thunderbird-38.2.0-1.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154491" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4491</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4491" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4491" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4491" ref_url="https://www.suse.com/security/cve/CVE-2015-4491" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2195-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004361.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1389-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EY2KMIQOWASGBHV5VJ6Z4BIIBYJRUX34/#EY2KMIQOWASGBHV5VJ6Z4BIIBYJRUX34" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1390-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MI5UMXX5RIRUL22SVUBQFLL43YQP2B7C/#MI5UMXX5RIRUL22SVUBQFLL43YQP2B7C" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2287-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IZPDYSTS3MVVOT45BXXMTATEQVKJ63HE/#IZPDYSTS3MVVOT45BXXMTATEQVKJ63HE" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Integer overflow in the make_filter_table function in pixops/pixops.c in gdk-pixbuf before 2.31.5, as used in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 on Linux, Google Chrome on Linux, and other products, allows remote attackers to execute arbitrary code or cause a denial of service (heap-based buffer overflow and application crash) via crafted bitmap dimensions that are mishandled during scaling.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4491/">CVE-2015-4491 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4491">CVE-2015-4491 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/940806">SUSE bug 940806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942801">SUSE bug 942801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948790">SUSE bug 948790</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821216" comment="firefox-38.2.0-4.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821251" comment="gdk-pixbuf2-2.28.2-5.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821252" comment="gdk-pixbuf2-devel-2.28.2-5.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821249" comment="thunderbird-38.2.0-1.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154492" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4492</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4492" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4492" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4492" ref_url="https://www.suse.com/security/cve/CVE-2015-4492" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001691.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1389-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EY2KMIQOWASGBHV5VJ6Z4BIIBYJRUX34/#EY2KMIQOWASGBHV5VJ6Z4BIIBYJRUX34" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1390-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MI5UMXX5RIRUL22SVUBQFLL43YQP2B7C/#MI5UMXX5RIRUL22SVUBQFLL43YQP2B7C" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the XMLHttpRequest::Open implementation in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 might allow remote attackers to execute arbitrary code via a SharedWorker object that makes recursive calls to the open method of an XMLHttpRequest object.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4492/">CVE-2015-4492 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4492">CVE-2015-4492 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/940806">SUSE bug 940806</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821216" comment="firefox-38.2.0-4.el7_1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154493" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4493</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4493" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4493" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4493" ref_url="https://www.suse.com/security/cve/CVE-2015-4493" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2015:1389-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EY2KMIQOWASGBHV5VJ6Z4BIIBYJRUX34/#EY2KMIQOWASGBHV5VJ6Z4BIIBYJRUX34" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1390-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MI5UMXX5RIRUL22SVUBQFLL43YQP2B7C/#MI5UMXX5RIRUL22SVUBQFLL43YQP2B7C" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the stagefright::ESDS::parseESDescriptor function in libstagefright in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 allows remote attackers to execute arbitrary code via an invalid size field in an esds chunk in MPEG-4 video data, a related issue to CVE-2015-1539.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4493/">CVE-2015-4493 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4493">CVE-2015-4493 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/940806">SUSE bug 940806</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821216" comment="firefox-38.2.0-4.el7_1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154495" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4495</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4495" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4495" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4495" ref_url="https://www.suse.com/security/cve/CVE-2015-4495" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001588.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1389-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EY2KMIQOWASGBHV5VJ6Z4BIIBYJRUX34/#EY2KMIQOWASGBHV5VJ6Z4BIIBYJRUX34" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1390-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MI5UMXX5RIRUL22SVUBQFLL43YQP2B7C/#MI5UMXX5RIRUL22SVUBQFLL43YQP2B7C" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    The PDF reader in Mozilla Firefox before 39.0.3, Firefox ESR 38.x before 38.1.1, and Firefox OS before 2.2 allows remote attackers to bypass the Same Origin Policy, and read arbitrary files or gain privileges, via vectors involving crafted JavaScript code and a native setter, as exploited in the wild in August 2015.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4495/">CVE-2015-4495 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4495">CVE-2015-4495 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/863095">SUSE bug 863095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940806">SUSE bug 940806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940918">SUSE bug 940918</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821215" comment="firefox-38.1.1-1.el7_1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154497" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4497</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4497" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4497" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4497" ref_url="https://www.suse.com/security/cve/CVE-2015-4497" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001691.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the CanvasRenderingContext2D implementation in Mozilla Firefox before 40.0.3 and Firefox ESR 38.x before 38.2.1 allows remote attackers to execute arbitrary code by leveraging improper interaction between resize events and changes to Cascading Style Sheets (CSS) token sequences for a CANVAS element.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-30"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4497/">CVE-2015-4497 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4497">CVE-2015-4497 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/943550">SUSE bug 943550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943557">SUSE bug 943557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943608">SUSE bug 943608</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821250" comment="firefox-38.2.1-1.el7_1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154498" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4498</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4498" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4498" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4498" ref_url="https://www.suse.com/security/cve/CVE-2015-4498" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001691.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    The add-on installation feature in Mozilla Firefox before 40.0.3 and Firefox ESR 38.x before 38.2.1 allows remote attackers to bypass an intended user-confirmation requirement by constructing a crafted data: URL and triggering navigation to an arbitrary http: or https: URL at a certain early point in the installation process.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4498/">CVE-2015-4498 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4498">CVE-2015-4498 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/943550">SUSE bug 943550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943558">SUSE bug 943558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943608">SUSE bug 943608</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821250" comment="firefox-38.2.1-1.el7_1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154500" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4500</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4500" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4500" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4500" ref_url="https://www.suse.com/security/cve/CVE-2015-4500" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1680-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001691.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1658-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UKE3T4D6INUF75PEBOA5BSYGWIFZCR5Q/#UKE3T4D6INUF75PEBOA5BSYGWIFZCR5Q" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1679-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VWT26A2SOWF47FQL6GTIKRQ2F5225UG/#5VWT26A2SOWF47FQL6GTIKRQ2F5225UG" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1681-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FGFIKO6JXQMNHEO3OULWAXR65ILHEESQ/#FGFIKO6JXQMNHEO3OULWAXR65ILHEESQ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4500/">CVE-2015-4500 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4500">CVE-2015-4500 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/947003">SUSE bug 947003</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821306" comment="firefox-38.3.0-2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821312" comment="thunderbird-38.3.0-1.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154509" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4509</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4509" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4509" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4509" ref_url="https://www.suse.com/security/cve/CVE-2015-4509" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1680-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001691.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1658-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UKE3T4D6INUF75PEBOA5BSYGWIFZCR5Q/#UKE3T4D6INUF75PEBOA5BSYGWIFZCR5Q" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1679-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VWT26A2SOWF47FQL6GTIKRQ2F5225UG/#5VWT26A2SOWF47FQL6GTIKRQ2F5225UG" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1681-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FGFIKO6JXQMNHEO3OULWAXR65ILHEESQ/#FGFIKO6JXQMNHEO3OULWAXR65ILHEESQ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the HTMLVideoElement interface in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 allows remote attackers to execute arbitrary code via crafted JavaScript code that modifies the URI table of a media element, aka ZDI-CAN-3176.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4509/">CVE-2015-4509 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4509">CVE-2015-4509 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/947003">SUSE bug 947003</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821306" comment="firefox-38.3.0-2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821312" comment="thunderbird-38.3.0-1.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154510" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4510</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4510" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4510" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4510" ref_url="https://www.suse.com/security/cve/CVE-2015-4510" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2015:1658-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UKE3T4D6INUF75PEBOA5BSYGWIFZCR5Q/#UKE3T4D6INUF75PEBOA5BSYGWIFZCR5Q" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1681-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FGFIKO6JXQMNHEO3OULWAXR65ILHEESQ/#FGFIKO6JXQMNHEO3OULWAXR65ILHEESQ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Race condition in the WorkerPrivate::NotifyFeatures function in Mozilla Firefox before 41.0 allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free and application crash) by leveraging improper interaction between shared workers and the IndexedDB implementation.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4510/">CVE-2015-4510 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4510">CVE-2015-4510 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/947003">SUSE bug 947003</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821306" comment="firefox-38.3.0-2.el7_1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154513" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4513</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4513" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4513" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4513" ref_url="https://www.suse.com/security/cve/CVE-2015-4513" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1978-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1981-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001691.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1942-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5J7Y2TMONA53MKP4NVMADVEOHZPRGPG6/#5J7Y2TMONA53MKP4NVMADVEOHZPRGPG6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 42.0 and Firefox ESR 38.x before 38.4 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4513/">CVE-2015-4513 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4513">CVE-2015-4513 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/952810">SUSE bug 952810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821366" comment="firefox-38.4.0-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821606" comment="thunderbird-38.4.0-1.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154517" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4517</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4517" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4517" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4517" ref_url="https://www.suse.com/security/cve/CVE-2015-4517" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1680-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001691.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1658-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UKE3T4D6INUF75PEBOA5BSYGWIFZCR5Q/#UKE3T4D6INUF75PEBOA5BSYGWIFZCR5Q" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1679-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VWT26A2SOWF47FQL6GTIKRQ2F5225UG/#5VWT26A2SOWF47FQL6GTIKRQ2F5225UG" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1681-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FGFIKO6JXQMNHEO3OULWAXR65ILHEESQ/#FGFIKO6JXQMNHEO3OULWAXR65ILHEESQ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    NetworkUtils.cpp in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 might allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4517/">CVE-2015-4517 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4517">CVE-2015-4517 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/947003">SUSE bug 947003</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821312" comment="thunderbird-38.3.0-1.el7_1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154519" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4519</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4519" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4519" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4519" ref_url="https://www.suse.com/security/cve/CVE-2015-4519" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1680-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001691.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1658-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UKE3T4D6INUF75PEBOA5BSYGWIFZCR5Q/#UKE3T4D6INUF75PEBOA5BSYGWIFZCR5Q" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1679-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VWT26A2SOWF47FQL6GTIKRQ2F5225UG/#5VWT26A2SOWF47FQL6GTIKRQ2F5225UG" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1681-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FGFIKO6JXQMNHEO3OULWAXR65ILHEESQ/#FGFIKO6JXQMNHEO3OULWAXR65ILHEESQ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 allow user-assisted remote attackers to bypass intended access restrictions and discover a redirect's target URL via crafted JavaScript code that executes after a drag-and-drop action of an image into a TEXTBOX element.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4519/">CVE-2015-4519 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4519">CVE-2015-4519 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/947003">SUSE bug 947003</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821312" comment="thunderbird-38.3.0-1.el7_1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154520" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4520</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4520" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4520" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4520" ref_url="https://www.suse.com/security/cve/CVE-2015-4520" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1680-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001691.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1658-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UKE3T4D6INUF75PEBOA5BSYGWIFZCR5Q/#UKE3T4D6INUF75PEBOA5BSYGWIFZCR5Q" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1679-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VWT26A2SOWF47FQL6GTIKRQ2F5225UG/#5VWT26A2SOWF47FQL6GTIKRQ2F5225UG" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1681-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FGFIKO6JXQMNHEO3OULWAXR65ILHEESQ/#FGFIKO6JXQMNHEO3OULWAXR65ILHEESQ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 allow remote attackers to bypass CORS preflight protection mechanisms by leveraging (1) duplicate cache-key generation or (2) retrieval of a value from an incorrect HTTP Access-Control-* response header.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4520/">CVE-2015-4520 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4520">CVE-2015-4520 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/947003">SUSE bug 947003</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821312" comment="thunderbird-38.3.0-1.el7_1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154521" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4521</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4521" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4521" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4521" ref_url="https://www.suse.com/security/cve/CVE-2015-4521" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1680-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001691.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1658-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UKE3T4D6INUF75PEBOA5BSYGWIFZCR5Q/#UKE3T4D6INUF75PEBOA5BSYGWIFZCR5Q" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1679-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VWT26A2SOWF47FQL6GTIKRQ2F5225UG/#5VWT26A2SOWF47FQL6GTIKRQ2F5225UG" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1681-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FGFIKO6JXQMNHEO3OULWAXR65ILHEESQ/#FGFIKO6JXQMNHEO3OULWAXR65ILHEESQ" source="SUSE-SU"/>
    <description>
    The ConvertDialogOptions function in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 might allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4521/">CVE-2015-4521 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4521">CVE-2015-4521 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/947003">SUSE bug 947003</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821312" comment="thunderbird-38.3.0-1.el7_1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154522" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4522</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4522" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4522" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4522" ref_url="https://www.suse.com/security/cve/CVE-2015-4522" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1680-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001691.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1658-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UKE3T4D6INUF75PEBOA5BSYGWIFZCR5Q/#UKE3T4D6INUF75PEBOA5BSYGWIFZCR5Q" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1679-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VWT26A2SOWF47FQL6GTIKRQ2F5225UG/#5VWT26A2SOWF47FQL6GTIKRQ2F5225UG" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1681-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FGFIKO6JXQMNHEO3OULWAXR65ILHEESQ/#FGFIKO6JXQMNHEO3OULWAXR65ILHEESQ" source="SUSE-SU"/>
    <description>
    The nsUnicodeToUTF8::GetMaxLength function in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 might allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via unknown vectors, related to an "overflow."
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4522/">CVE-2015-4522 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4522">CVE-2015-4522 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/947003">SUSE bug 947003</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821312" comment="thunderbird-38.3.0-1.el7_1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154588" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4588</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4588" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4588" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4588" ref_url="https://www.suse.com/security/cve/CVE-2015-4588" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001569.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the DecodeImage function in libwmf 0.2.8.4 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted "run-length count" in an image in a WMF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4588/">CVE-2015-4588 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4588">CVE-2015-4588 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/933109">SUSE bug 933109</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821315" comment="libwmf-0.2.8.4-41.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821316" comment="libwmf-devel-0.2.8.4-41.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821317" comment="libwmf-lite-0.2.8.4-41.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154598" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4598</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4598" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4598" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4598" ref_url="https://www.suse.com/security/cve/CVE-2015-4598" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1253-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001500.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1638-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002131.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1197-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KAM7CF47FZH7TLKJL6UQAD7JUYBLJ6HH/#KAM7CF47FZH7TLKJL6UQAD7JUYBLJ6HH" source="SUSE-SU"/>
    <description>
    PHP before 5.4.42, 5.5.x before 5.5.26, and 5.6.x before 5.6.10 does not ensure that pathnames lack %00 sequences, which might allow remote attackers to read or write to arbitrary files via crafted input to an application that calls (1) a DOMDocument save method or (2) the GD imagepsloadfont function, as demonstrated by a filename\0.html attack that bypasses an intended configuration in which client users may write to only .html files.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4598/">CVE-2015-4598 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4598">CVE-2015-4598 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/935227">SUSE bug 935227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935232">SUSE bug 935232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821089" comment="php-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821090" comment="php-bcmath-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821091" comment="php-cli-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821092" comment="php-common-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821093" comment="php-dba-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821094" comment="php-devel-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821095" comment="php-embedded-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821096" comment="php-enchant-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821097" comment="php-fpm-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821098" comment="php-gd-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821099" comment="php-intl-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821100" comment="php-ldap-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821101" comment="php-mbstring-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821102" comment="php-mysql-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821103" comment="php-mysqlnd-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821104" comment="php-odbc-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821105" comment="php-pdo-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821106" comment="php-pgsql-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821107" comment="php-process-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821108" comment="php-pspell-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821109" comment="php-recode-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821110" comment="php-snmp-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821111" comment="php-soap-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821112" comment="php-xml-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821113" comment="php-xmlrpc-5.4.16-36.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154599" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4599</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4599" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4599" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4599" ref_url="https://www.suse.com/security/cve/CVE-2015-4599" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1253-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001500.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1638-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002131.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1197-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KAM7CF47FZH7TLKJL6UQAD7JUYBLJ6HH/#KAM7CF47FZH7TLKJL6UQAD7JUYBLJ6HH" source="SUSE-SU"/>
    <description>
    The SoapFault::__toString method in ext/soap/soap.c in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 allows remote attackers to obtain sensitive information, cause a denial of service (application crash), or possibly execute arbitrary code via an unexpected data type, related to a "type confusion" issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4599/">CVE-2015-4599 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4599">CVE-2015-4599 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/935074">SUSE bug 935074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935226">SUSE bug 935226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935234">SUSE bug 935234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821089" comment="php-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821090" comment="php-bcmath-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821091" comment="php-cli-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821092" comment="php-common-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821093" comment="php-dba-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821094" comment="php-devel-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821095" comment="php-embedded-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821096" comment="php-enchant-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821097" comment="php-fpm-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821098" comment="php-gd-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821099" comment="php-intl-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821100" comment="php-ldap-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821101" comment="php-mbstring-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821102" comment="php-mysql-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821103" comment="php-mysqlnd-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821104" comment="php-odbc-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821105" comment="php-pdo-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821106" comment="php-pgsql-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821107" comment="php-process-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821108" comment="php-pspell-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821109" comment="php-recode-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821110" comment="php-snmp-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821111" comment="php-soap-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821112" comment="php-xml-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821113" comment="php-xmlrpc-5.4.16-36.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154600" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4600</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4600" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4600" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4600" ref_url="https://www.suse.com/security/cve/CVE-2015-4600" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1253-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001500.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1638-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002131.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1197-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KAM7CF47FZH7TLKJL6UQAD7JUYBLJ6HH/#KAM7CF47FZH7TLKJL6UQAD7JUYBLJ6HH" source="SUSE-SU"/>
    <description>
    The SoapClient implementation in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an unexpected data type, related to "type confusion" issues in the (1) SoapClient::__getLastRequest, (2) SoapClient::__getLastResponse, (3) SoapClient::__getLastRequestHeaders, (4) SoapClient::__getLastResponseHeaders, (5) SoapClient::__getCookies, and (6) SoapClient::__setCookie methods.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-29"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4600/">CVE-2015-4600 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4600">CVE-2015-4600 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/935226">SUSE bug 935226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935234">SUSE bug 935234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821089" comment="php-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821090" comment="php-bcmath-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821091" comment="php-cli-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821092" comment="php-common-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821093" comment="php-dba-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821094" comment="php-devel-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821095" comment="php-embedded-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821096" comment="php-enchant-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821097" comment="php-fpm-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821098" comment="php-gd-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821099" comment="php-intl-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821100" comment="php-ldap-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821101" comment="php-mbstring-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821102" comment="php-mysql-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821103" comment="php-mysqlnd-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821104" comment="php-odbc-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821105" comment="php-pdo-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821106" comment="php-pgsql-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821107" comment="php-process-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821108" comment="php-pspell-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821109" comment="php-recode-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821110" comment="php-snmp-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821111" comment="php-soap-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821112" comment="php-xml-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821113" comment="php-xmlrpc-5.4.16-36.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154601" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4601</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4601" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4601" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4601" ref_url="https://www.suse.com/security/cve/CVE-2015-4601" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1253-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001500.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1638-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002131.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1197-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KAM7CF47FZH7TLKJL6UQAD7JUYBLJ6HH/#KAM7CF47FZH7TLKJL6UQAD7JUYBLJ6HH" source="SUSE-SU"/>
    <description>
    PHP before 5.6.7 might allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an unexpected data type, related to "type confusion" issues in (1) ext/soap/php_encoding.c, (2) ext/soap/php_http.c, and (3) ext/soap/soap.c, a different issue than CVE-2015-4600.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4601/">CVE-2015-4601 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4601">CVE-2015-4601 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/935226">SUSE bug 935226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935234">SUSE bug 935234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821089" comment="php-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821090" comment="php-bcmath-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821091" comment="php-cli-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821092" comment="php-common-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821093" comment="php-dba-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821094" comment="php-devel-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821095" comment="php-embedded-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821096" comment="php-enchant-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821097" comment="php-fpm-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821098" comment="php-gd-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821099" comment="php-intl-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821100" comment="php-ldap-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821101" comment="php-mbstring-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821102" comment="php-mysql-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821103" comment="php-mysqlnd-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821104" comment="php-odbc-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821105" comment="php-pdo-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821106" comment="php-pgsql-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821107" comment="php-process-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821108" comment="php-pspell-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821109" comment="php-recode-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821110" comment="php-snmp-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821111" comment="php-soap-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821112" comment="php-xml-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821113" comment="php-xmlrpc-5.4.16-36.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154602" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4602</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4602" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4602" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4602" ref_url="https://www.suse.com/security/cve/CVE-2015-4602" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1253-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001500.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1638-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002131.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1197-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KAM7CF47FZH7TLKJL6UQAD7JUYBLJ6HH/#KAM7CF47FZH7TLKJL6UQAD7JUYBLJ6HH" source="SUSE-SU"/>
    <description>
    The __PHP_Incomplete_Class function in ext/standard/incomplete_class.c in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an unexpected data type, related to a "type confusion" issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4602/">CVE-2015-4602 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4602">CVE-2015-4602 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/935074">SUSE bug 935074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935224">SUSE bug 935224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935226">SUSE bug 935226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821089" comment="php-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821090" comment="php-bcmath-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821091" comment="php-cli-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821092" comment="php-common-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821093" comment="php-dba-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821094" comment="php-devel-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821095" comment="php-embedded-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821096" comment="php-enchant-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821097" comment="php-fpm-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821098" comment="php-gd-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821099" comment="php-intl-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821100" comment="php-ldap-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821101" comment="php-mbstring-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821102" comment="php-mysql-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821103" comment="php-mysqlnd-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821104" comment="php-odbc-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821105" comment="php-pdo-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821106" comment="php-pgsql-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821107" comment="php-process-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821108" comment="php-pspell-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821109" comment="php-recode-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821110" comment="php-snmp-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821111" comment="php-soap-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821112" comment="php-xml-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821113" comment="php-xmlrpc-5.4.16-36.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154603" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4603</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4603" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4603" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4603" ref_url="https://www.suse.com/security/cve/CVE-2015-4603" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1253-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001500.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1638-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002131.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1197-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KAM7CF47FZH7TLKJL6UQAD7JUYBLJ6HH/#KAM7CF47FZH7TLKJL6UQAD7JUYBLJ6HH" source="SUSE-SU"/>
    <description>
    The exception::getTraceAsString function in Zend/zend_exceptions.c in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 allows remote attackers to execute arbitrary code via an unexpected data type, related to a "type confusion" issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-27"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4603/">CVE-2015-4603 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4603">CVE-2015-4603 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/935074">SUSE bug 935074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935226">SUSE bug 935226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935234">SUSE bug 935234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821089" comment="php-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821090" comment="php-bcmath-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821091" comment="php-cli-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821092" comment="php-common-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821093" comment="php-dba-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821094" comment="php-devel-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821095" comment="php-embedded-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821096" comment="php-enchant-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821097" comment="php-fpm-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821098" comment="php-gd-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821099" comment="php-intl-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821100" comment="php-ldap-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821101" comment="php-mbstring-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821102" comment="php-mysql-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821103" comment="php-mysqlnd-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821104" comment="php-odbc-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821105" comment="php-pdo-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821106" comment="php-pgsql-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821107" comment="php-process-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821108" comment="php-pspell-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821109" comment="php-recode-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821110" comment="php-snmp-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821111" comment="php-soap-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821112" comment="php-xml-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821113" comment="php-xmlrpc-5.4.16-36.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154604" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4604</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4604" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4604" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4604" ref_url="https://www.suse.com/security/cve/CVE-2015-4604" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2015:1197-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KAM7CF47FZH7TLKJL6UQAD7JUYBLJ6HH/#KAM7CF47FZH7TLKJL6UQAD7JUYBLJ6HH" source="SUSE-SU"/>
    <description>
    The mget function in softmagic.c in file 5.x, as used in the Fileinfo component in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8, does not properly maintain a certain pointer relationship, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted string that is mishandled by a "Python script text executable" rule.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4604/">CVE-2015-4604 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4604">CVE-2015-4604 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/935225">SUSE bug 935225</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821089" comment="php-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821090" comment="php-bcmath-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821091" comment="php-cli-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821092" comment="php-common-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821093" comment="php-dba-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821094" comment="php-devel-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821095" comment="php-embedded-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821096" comment="php-enchant-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821097" comment="php-fpm-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821098" comment="php-gd-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821099" comment="php-intl-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821100" comment="php-ldap-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821101" comment="php-mbstring-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821102" comment="php-mysql-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821103" comment="php-mysqlnd-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821104" comment="php-odbc-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821105" comment="php-pdo-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821106" comment="php-pgsql-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821107" comment="php-process-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821108" comment="php-pspell-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821109" comment="php-recode-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821110" comment="php-snmp-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821111" comment="php-soap-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821112" comment="php-xml-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821113" comment="php-xmlrpc-5.4.16-36.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154605" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4605</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4605" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4605" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4605" ref_url="https://www.suse.com/security/cve/CVE-2015-4605" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2015:1197-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KAM7CF47FZH7TLKJL6UQAD7JUYBLJ6HH/#KAM7CF47FZH7TLKJL6UQAD7JUYBLJ6HH" source="SUSE-SU"/>
    <description>
    The mcopy function in softmagic.c in file 5.x, as used in the Fileinfo component in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8, does not properly restrict a certain offset value, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted string that is mishandled by a "Python script text executable" rule.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4605/">CVE-2015-4605 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4605">CVE-2015-4605 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/935225">SUSE bug 935225</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821089" comment="php-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821090" comment="php-bcmath-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821091" comment="php-cli-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821092" comment="php-common-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821093" comment="php-dba-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821094" comment="php-devel-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821095" comment="php-embedded-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821096" comment="php-enchant-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821097" comment="php-fpm-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821098" comment="php-gd-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821099" comment="php-intl-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821100" comment="php-ldap-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821101" comment="php-mbstring-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821102" comment="php-mysql-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821103" comment="php-mysqlnd-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821104" comment="php-odbc-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821105" comment="php-pdo-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821106" comment="php-pgsql-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821107" comment="php-process-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821108" comment="php-pspell-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821109" comment="php-recode-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821110" comment="php-snmp-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821111" comment="php-soap-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821112" comment="php-xml-5.4.16-36.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821113" comment="php-xmlrpc-5.4.16-36.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154620" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4620</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4620" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4620" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4620" ref_url="https://www.suse.com/security/cve/CVE-2015-4620" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001485.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1326-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5JYFKBINQKHPJFLKL5BZCPTSO3WP5VFR/#5JYFKBINQKHPJFLKL5BZCPTSO3WP5VFR" source="SUSE-SU"/>
    <description>
    name.c in named in ISC BIND 9.7.x through 9.9.x before 9.9.7-P1 and 9.10.x before 9.10.2-P2, when configured as a recursive resolver with DNSSEC validation, allows remote attackers to cause a denial of service (REQUIRE assertion failure and daemon exit) by constructing crafted zone data and then making a query for a name in that zone.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4620/">CVE-2015-4620 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4620">CVE-2015-4620 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/936476">SUSE bug 936476</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821164" comment="bind-9.9.4-18.el7_1.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821165" comment="bind-chroot-9.9.4-18.el7_1.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821166" comment="bind-devel-9.9.4-18.el7_1.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821167" comment="bind-libs-9.9.4-18.el7_1.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821168" comment="bind-libs-lite-9.9.4-18.el7_1.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821169" comment="bind-license-9.9.4-18.el7_1.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821170" comment="bind-lite-devel-9.9.4-18.el7_1.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821171" comment="bind-sdb-9.9.4-18.el7_1.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821172" comment="bind-sdb-chroot-9.9.4-18.el7_1.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821173" comment="bind-utils-9.9.4-18.el7_1.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154695" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4695</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4695" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4695" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4695" ref_url="https://www.suse.com/security/cve/CVE-2015-4695" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001569.html" source="SUSE-SU"/>
    <description>
    meta.h in libwmf 0.2.8.4 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted WMF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4695/">CVE-2015-4695 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4695">CVE-2015-4695 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/936058">SUSE bug 936058</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821315" comment="libwmf-0.2.8.4-41.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821316" comment="libwmf-devel-0.2.8.4-41.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821317" comment="libwmf-lite-0.2.8.4-41.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154696" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4696</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4696" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4696" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4696" ref_url="https://www.suse.com/security/cve/CVE-2015-4696" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001569.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in libwmf 0.2.8.4 allows remote attackers to cause a denial of service (crash) via a crafted WMF file to the (1) wmf2gd or (2) wmf2eps command.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4696/">CVE-2015-4696 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4696">CVE-2015-4696 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/936062">SUSE bug 936062</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821315" comment="libwmf-0.2.8.4-41.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821316" comment="libwmf-devel-0.2.8.4-41.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821317" comment="libwmf-lite-0.2.8.4-41.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154700" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4700</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4700" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4700" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4700" ref_url="https://www.suse.com/security/cve/CVE-2015-4700" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1488-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1592-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001596.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001706.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1382-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WK73PLTGJ2J7BSDKZCVOUPKENB4UND7S/#WK73PLTGJ2J7BSDKZCVOUPKENB4UND7S" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OC7663UNXLKFWJKPITRGQNF4FU4KJWNK/#OC7663UNXLKFWJKPITRGQNF4FU4KJWNK" source="SUSE-SU"/>
    <description>
    The bpf_int_jit_compile function in arch/x86/net/bpf_jit_comp.c in the Linux kernel before 4.0.6 allows local users to cause a denial of service (system crash) by creating a packet filter and then loading crafted BPF instructions that trigger late convergence by the JIT compiler.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4700/">CVE-2015-4700 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4700">CVE-2015-4700 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/935705">SUSE bug 935705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939273">SUSE bug 939273</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821287" comment="kernel-3.10.0-229.14.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821288" comment="kernel-abi-whitelists-3.10.0-229.14.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821289" comment="kernel-debug-3.10.0-229.14.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821292" comment="kernel-doc-3.10.0-229.14.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821293" comment="kernel-headers-3.10.0-229.14.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821294" comment="kernel-tools-3.10.0-229.14.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821295" comment="kernel-tools-libs-3.10.0-229.14.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821297" comment="perf-3.10.0-229.14.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821298" comment="python-perf-3.10.0-229.14.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154731" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4731</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4731" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4731" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4731" ref_url="https://www.suse.com/security/cve/CVE-2015-4731" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1329-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001526.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001577.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1288-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TXVU3Y3MZTDHVP52DAEBRCD5GP4FAMIU/#TXVU3Y3MZTDHVP52DAEBRCD5GP4FAMIU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1289-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PZ3KWYO2IVEORKHG62M62G3UEKUH6TTO/#PZ3KWYO2IVEORKHG62M62G3UEKUH6TTO" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45; Java SE Embedded 7u75; and Java SE Embedded 8u33 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JMX.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4731/">CVE-2015-4731 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4731">CVE-2015-4731 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/937828">SUSE bug 937828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938248">SUSE bug 938248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938895">SUSE bug 938895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821198" comment="java-1.6.0-openjdk-1.6.0.36-1.13.8.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821199" comment="java-1.6.0-openjdk-demo-1.6.0.36-1.13.8.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821200" comment="java-1.6.0-openjdk-devel-1.6.0.36-1.13.8.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821201" comment="java-1.6.0-openjdk-javadoc-1.6.0.36-1.13.8.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821202" comment="java-1.6.0-openjdk-src-1.6.0.36-1.13.8.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821157" comment="java-1.7.0-openjdk-1.7.0.85-2.6.1.2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821158" comment="java-1.7.0-openjdk-accessibility-1.7.0.85-2.6.1.2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821159" comment="java-1.7.0-openjdk-demo-1.7.0.85-2.6.1.2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821160" comment="java-1.7.0-openjdk-devel-1.7.0.85-2.6.1.2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821161" comment="java-1.7.0-openjdk-headless-1.7.0.85-2.6.1.2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821162" comment="java-1.7.0-openjdk-javadoc-1.7.0.85-2.6.1.2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821163" comment="java-1.7.0-openjdk-src-1.7.0.85-2.6.1.2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821150" comment="java-1.8.0-openjdk-1.8.0.51-1.b16.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821151" comment="java-1.8.0-openjdk-accessibility-1.8.0.51-1.b16.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821152" comment="java-1.8.0-openjdk-demo-1.8.0.51-1.b16.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821153" comment="java-1.8.0-openjdk-devel-1.8.0.51-1.b16.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821154" comment="java-1.8.0-openjdk-headless-1.8.0.51-1.b16.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821155" comment="java-1.8.0-openjdk-javadoc-1.8.0.51-1.b16.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821156" comment="java-1.8.0-openjdk-src-1.8.0.51-1.b16.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154732" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4732</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4732" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4732" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4732" ref_url="https://www.suse.com/security/cve/CVE-2015-4732" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1329-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001526.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001577.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1288-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TXVU3Y3MZTDHVP52DAEBRCD5GP4FAMIU/#TXVU3Y3MZTDHVP52DAEBRCD5GP4FAMIU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1289-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PZ3KWYO2IVEORKHG62M62G3UEKUH6TTO/#PZ3KWYO2IVEORKHG62M62G3UEKUH6TTO" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45, and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2015-2590.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4732/">CVE-2015-4732 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4732">CVE-2015-4732 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/937828">SUSE bug 937828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938248">SUSE bug 938248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938895">SUSE bug 938895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821198" comment="java-1.6.0-openjdk-1.6.0.36-1.13.8.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821199" comment="java-1.6.0-openjdk-demo-1.6.0.36-1.13.8.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821200" comment="java-1.6.0-openjdk-devel-1.6.0.36-1.13.8.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821201" comment="java-1.6.0-openjdk-javadoc-1.6.0.36-1.13.8.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821202" comment="java-1.6.0-openjdk-src-1.6.0.36-1.13.8.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821157" comment="java-1.7.0-openjdk-1.7.0.85-2.6.1.2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821158" comment="java-1.7.0-openjdk-accessibility-1.7.0.85-2.6.1.2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821159" comment="java-1.7.0-openjdk-demo-1.7.0.85-2.6.1.2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821160" comment="java-1.7.0-openjdk-devel-1.7.0.85-2.6.1.2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821161" comment="java-1.7.0-openjdk-headless-1.7.0.85-2.6.1.2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821162" comment="java-1.7.0-openjdk-javadoc-1.7.0.85-2.6.1.2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821163" comment="java-1.7.0-openjdk-src-1.7.0.85-2.6.1.2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821150" comment="java-1.8.0-openjdk-1.8.0.51-1.b16.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821151" comment="java-1.8.0-openjdk-accessibility-1.8.0.51-1.b16.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821152" comment="java-1.8.0-openjdk-demo-1.8.0.51-1.b16.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821153" comment="java-1.8.0-openjdk-devel-1.8.0.51-1.b16.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821154" comment="java-1.8.0-openjdk-headless-1.8.0.51-1.b16.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821155" comment="java-1.8.0-openjdk-javadoc-1.8.0.51-1.b16.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821156" comment="java-1.8.0-openjdk-src-1.8.0.51-1.b16.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154733" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4733</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4733" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4733" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4733" ref_url="https://www.suse.com/security/cve/CVE-2015-4733" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1329-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001526.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001577.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1288-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TXVU3Y3MZTDHVP52DAEBRCD5GP4FAMIU/#TXVU3Y3MZTDHVP52DAEBRCD5GP4FAMIU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1289-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PZ3KWYO2IVEORKHG62M62G3UEKUH6TTO/#PZ3KWYO2IVEORKHG62M62G3UEKUH6TTO" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45, and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to RMI.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4733/">CVE-2015-4733 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4733">CVE-2015-4733 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/937828">SUSE bug 937828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938248">SUSE bug 938248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938895">SUSE bug 938895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821198" comment="java-1.6.0-openjdk-1.6.0.36-1.13.8.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821199" comment="java-1.6.0-openjdk-demo-1.6.0.36-1.13.8.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821200" comment="java-1.6.0-openjdk-devel-1.6.0.36-1.13.8.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821201" comment="java-1.6.0-openjdk-javadoc-1.6.0.36-1.13.8.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821202" comment="java-1.6.0-openjdk-src-1.6.0.36-1.13.8.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821157" comment="java-1.7.0-openjdk-1.7.0.85-2.6.1.2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821158" comment="java-1.7.0-openjdk-accessibility-1.7.0.85-2.6.1.2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821159" comment="java-1.7.0-openjdk-demo-1.7.0.85-2.6.1.2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821160" comment="java-1.7.0-openjdk-devel-1.7.0.85-2.6.1.2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821161" comment="java-1.7.0-openjdk-headless-1.7.0.85-2.6.1.2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821162" comment="java-1.7.0-openjdk-javadoc-1.7.0.85-2.6.1.2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821163" comment="java-1.7.0-openjdk-src-1.7.0.85-2.6.1.2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821150" comment="java-1.8.0-openjdk-1.8.0.51-1.b16.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821151" comment="java-1.8.0-openjdk-accessibility-1.8.0.51-1.b16.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821152" comment="java-1.8.0-openjdk-demo-1.8.0.51-1.b16.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821153" comment="java-1.8.0-openjdk-devel-1.8.0.51-1.b16.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821154" comment="java-1.8.0-openjdk-headless-1.8.0.51-1.b16.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821155" comment="java-1.8.0-openjdk-javadoc-1.8.0.51-1.b16.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821156" comment="java-1.8.0-openjdk-src-1.8.0.51-1.b16.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154734" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4734</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4734" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4734" ref_url="https://www.suse.com/security/cve/CVE-2015-4734" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1874-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1874-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001800.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1902-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FVL7UVPKWLVFRYUMLIOO3LSOJPPDB3EY/#FVL7UVPKWLVFRYUMLIOO3LSOJPPDB3EY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1905-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JH2ZVFKXVEWZYMCTHL2R42O642L6WS4X/#JH2ZVFKXVEWZYMCTHL2R42O642L6WS4X" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1906-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PA36MR3V23DPT2LWVZIDDRORX3X2W2WE/#PA36MR3V23DPT2LWVZIDDRORX3X2W2WE" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1971-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SCB7TEPDMKXAYGESXLRMCLSHNRHRZIJA/#SCB7TEPDMKXAYGESXLRMCLSHNRHRZIJA" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EM5IRJXZE66HIX564A56RBKHOFXINXH2/#EM5IRJXZE66HIX564A56RBKHOFXINXH2" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85 and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality via vectors related to JGSS.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-10-23"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4734/">CVE-2015-4734 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4734">CVE-2015-4734 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/951376">SUSE bug 951376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955131">SUSE bug 955131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821380" comment="java-1.6.0-openjdk-1.6.0.37-1.13.9.4.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821381" comment="java-1.6.0-openjdk-demo-1.6.0.37-1.13.9.4.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821382" comment="java-1.6.0-openjdk-devel-1.6.0.37-1.13.9.4.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821383" comment="java-1.6.0-openjdk-javadoc-1.6.0.37-1.13.9.4.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821384" comment="java-1.6.0-openjdk-src-1.6.0.37-1.13.9.4.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821325" comment="java-1.7.0-openjdk-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821326" comment="java-1.7.0-openjdk-accessibility-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821327" comment="java-1.7.0-openjdk-demo-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821328" comment="java-1.7.0-openjdk-devel-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821329" comment="java-1.7.0-openjdk-headless-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821330" comment="java-1.7.0-openjdk-javadoc-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821331" comment="java-1.7.0-openjdk-src-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821318" comment="java-1.8.0-openjdk-1.8.0.65-2.b17.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821319" comment="java-1.8.0-openjdk-accessibility-1.8.0.65-2.b17.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821320" comment="java-1.8.0-openjdk-demo-1.8.0.65-2.b17.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821321" comment="java-1.8.0-openjdk-devel-1.8.0.65-2.b17.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821322" comment="java-1.8.0-openjdk-headless-1.8.0.65-2.b17.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821323" comment="java-1.8.0-openjdk-javadoc-1.8.0.65-2.b17.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821324" comment="java-1.8.0-openjdk-src-1.8.0.65-2.b17.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154737" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4737</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4737" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4737" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4737" ref_url="https://www.suse.com/security/cve/CVE-2015-4737" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001639.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.43 and earlier, and 5.6.23 and earlier, allows remote authenticated users to affect confidentiality via unknown vectors related to Server : Pluggable Auth.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4737/">CVE-2015-4737 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4737">CVE-2015-4737 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/938412">SUSE bug 938412</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821233" comment="mariadb-5.5.44-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821234" comment="mariadb-bench-5.5.44-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821235" comment="mariadb-devel-5.5.44-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821236" comment="mariadb-embedded-5.5.44-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821237" comment="mariadb-embedded-devel-5.5.44-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821238" comment="mariadb-libs-5.5.44-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821239" comment="mariadb-server-5.5.44-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821240" comment="mariadb-test-5.5.44-1.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154748" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4748</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4748" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4748" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4748" ref_url="https://www.suse.com/security/cve/CVE-2015-4748" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1329-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001526.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001577.html" source="SUSE-SU"/>
		<reference ref_id="TID7016694" ref_url="https://www.suse.com/support/kb/doc/?id=7016694" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1288-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TXVU3Y3MZTDHVP52DAEBRCD5GP4FAMIU/#TXVU3Y3MZTDHVP52DAEBRCD5GP4FAMIU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1289-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PZ3KWYO2IVEORKHG62M62G3UEKUH6TTO/#PZ3KWYO2IVEORKHG62M62G3UEKUH6TTO" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45; JRockit R28.3.6; and Java SE Embedded 7u75 and Embedded 8u33 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Security.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4748/">CVE-2015-4748 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4748">CVE-2015-4748 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/937828">SUSE bug 937828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938248">SUSE bug 938248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938895">SUSE bug 938895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821198" comment="java-1.6.0-openjdk-1.6.0.36-1.13.8.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821199" comment="java-1.6.0-openjdk-demo-1.6.0.36-1.13.8.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821200" comment="java-1.6.0-openjdk-devel-1.6.0.36-1.13.8.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821201" comment="java-1.6.0-openjdk-javadoc-1.6.0.36-1.13.8.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821202" comment="java-1.6.0-openjdk-src-1.6.0.36-1.13.8.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821157" comment="java-1.7.0-openjdk-1.7.0.85-2.6.1.2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821158" comment="java-1.7.0-openjdk-accessibility-1.7.0.85-2.6.1.2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821159" comment="java-1.7.0-openjdk-demo-1.7.0.85-2.6.1.2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821160" comment="java-1.7.0-openjdk-devel-1.7.0.85-2.6.1.2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821161" comment="java-1.7.0-openjdk-headless-1.7.0.85-2.6.1.2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821162" comment="java-1.7.0-openjdk-javadoc-1.7.0.85-2.6.1.2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821163" comment="java-1.7.0-openjdk-src-1.7.0.85-2.6.1.2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821150" comment="java-1.8.0-openjdk-1.8.0.51-1.b16.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821151" comment="java-1.8.0-openjdk-accessibility-1.8.0.51-1.b16.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821152" comment="java-1.8.0-openjdk-demo-1.8.0.51-1.b16.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821153" comment="java-1.8.0-openjdk-devel-1.8.0.51-1.b16.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821154" comment="java-1.8.0-openjdk-headless-1.8.0.51-1.b16.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821155" comment="java-1.8.0-openjdk-javadoc-1.8.0.51-1.b16.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821156" comment="java-1.8.0-openjdk-src-1.8.0.51-1.b16.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154749" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4749</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4749" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4749" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4749" ref_url="https://www.suse.com/security/cve/CVE-2015-4749" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1329-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001526.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001577.html" source="SUSE-SU"/>
		<reference ref_id="TID7016694" ref_url="https://www.suse.com/support/kb/doc/?id=7016694" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1288-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TXVU3Y3MZTDHVP52DAEBRCD5GP4FAMIU/#TXVU3Y3MZTDHVP52DAEBRCD5GP4FAMIU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1289-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PZ3KWYO2IVEORKHG62M62G3UEKUH6TTO/#PZ3KWYO2IVEORKHG62M62G3UEKUH6TTO" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45; JRockit R28.3.6; and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect availability via vectors related to JNDI.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4749/">CVE-2015-4749 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4749">CVE-2015-4749 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/937828">SUSE bug 937828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938248">SUSE bug 938248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938895">SUSE bug 938895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821198" comment="java-1.6.0-openjdk-1.6.0.36-1.13.8.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821199" comment="java-1.6.0-openjdk-demo-1.6.0.36-1.13.8.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821200" comment="java-1.6.0-openjdk-devel-1.6.0.36-1.13.8.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821201" comment="java-1.6.0-openjdk-javadoc-1.6.0.36-1.13.8.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821202" comment="java-1.6.0-openjdk-src-1.6.0.36-1.13.8.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821157" comment="java-1.7.0-openjdk-1.7.0.85-2.6.1.2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821158" comment="java-1.7.0-openjdk-accessibility-1.7.0.85-2.6.1.2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821159" comment="java-1.7.0-openjdk-demo-1.7.0.85-2.6.1.2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821160" comment="java-1.7.0-openjdk-devel-1.7.0.85-2.6.1.2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821161" comment="java-1.7.0-openjdk-headless-1.7.0.85-2.6.1.2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821162" comment="java-1.7.0-openjdk-javadoc-1.7.0.85-2.6.1.2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821163" comment="java-1.7.0-openjdk-src-1.7.0.85-2.6.1.2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821150" comment="java-1.8.0-openjdk-1.8.0.51-1.b16.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821151" comment="java-1.8.0-openjdk-accessibility-1.8.0.51-1.b16.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821152" comment="java-1.8.0-openjdk-demo-1.8.0.51-1.b16.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821153" comment="java-1.8.0-openjdk-devel-1.8.0.51-1.b16.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821154" comment="java-1.8.0-openjdk-headless-1.8.0.51-1.b16.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821155" comment="java-1.8.0-openjdk-javadoc-1.8.0.51-1.b16.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821156" comment="java-1.8.0-openjdk-src-1.8.0.51-1.b16.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154752" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4752</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4752" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4752" ref_url="https://www.suse.com/security/cve/CVE-2015-4752" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001639.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.43 and earlier and 5.6.24 and earlier allows remote authenticated users to affect availability via vectors related to Server : I_S.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4752/">CVE-2015-4752 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4752">CVE-2015-4752 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/938412">SUSE bug 938412</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821233" comment="mariadb-5.5.44-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821234" comment="mariadb-bench-5.5.44-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821235" comment="mariadb-devel-5.5.44-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821236" comment="mariadb-embedded-5.5.44-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821237" comment="mariadb-embedded-devel-5.5.44-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821238" comment="mariadb-libs-5.5.44-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821239" comment="mariadb-server-5.5.44-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821240" comment="mariadb-test-5.5.44-1.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154757" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4757</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4757" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4757" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4757" ref_url="https://www.suse.com/security/cve/CVE-2015-4757" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001639.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.42 and earlier and 5.6.23 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Optimizer.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4757/">CVE-2015-4757 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4757">CVE-2015-4757 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/938412">SUSE bug 938412</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821233" comment="mariadb-5.5.44-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821234" comment="mariadb-bench-5.5.44-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821235" comment="mariadb-devel-5.5.44-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821236" comment="mariadb-embedded-5.5.44-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821237" comment="mariadb-embedded-devel-5.5.44-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821238" comment="mariadb-libs-5.5.44-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821239" comment="mariadb-server-5.5.44-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821240" comment="mariadb-test-5.5.44-1.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154760" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4760</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4760" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4760" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4760" ref_url="https://www.suse.com/security/cve/CVE-2015-4760" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1329-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001526.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001577.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1288-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TXVU3Y3MZTDHVP52DAEBRCD5GP4FAMIU/#TXVU3Y3MZTDHVP52DAEBRCD5GP4FAMIU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1289-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PZ3KWYO2IVEORKHG62M62G3UEKUH6TTO/#PZ3KWYO2IVEORKHG62M62G3UEKUH6TTO" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4760/">CVE-2015-4760 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4760">CVE-2015-4760 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/937828">SUSE bug 937828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938248">SUSE bug 938248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938895">SUSE bug 938895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821198" comment="java-1.6.0-openjdk-1.6.0.36-1.13.8.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821199" comment="java-1.6.0-openjdk-demo-1.6.0.36-1.13.8.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821200" comment="java-1.6.0-openjdk-devel-1.6.0.36-1.13.8.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821201" comment="java-1.6.0-openjdk-javadoc-1.6.0.36-1.13.8.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821202" comment="java-1.6.0-openjdk-src-1.6.0.36-1.13.8.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821157" comment="java-1.7.0-openjdk-1.7.0.85-2.6.1.2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821158" comment="java-1.7.0-openjdk-accessibility-1.7.0.85-2.6.1.2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821159" comment="java-1.7.0-openjdk-demo-1.7.0.85-2.6.1.2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821160" comment="java-1.7.0-openjdk-devel-1.7.0.85-2.6.1.2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821161" comment="java-1.7.0-openjdk-headless-1.7.0.85-2.6.1.2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821162" comment="java-1.7.0-openjdk-javadoc-1.7.0.85-2.6.1.2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821163" comment="java-1.7.0-openjdk-src-1.7.0.85-2.6.1.2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821150" comment="java-1.8.0-openjdk-1.8.0.51-1.b16.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821151" comment="java-1.8.0-openjdk-accessibility-1.8.0.51-1.b16.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821152" comment="java-1.8.0-openjdk-demo-1.8.0.51-1.b16.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821153" comment="java-1.8.0-openjdk-devel-1.8.0.51-1.b16.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821154" comment="java-1.8.0-openjdk-headless-1.8.0.51-1.b16.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821155" comment="java-1.8.0-openjdk-javadoc-1.8.0.51-1.b16.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821156" comment="java-1.8.0-openjdk-src-1.8.0.51-1.b16.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154792" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4792</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4792" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4792" ref_url="https://www.suse.com/security/cve/CVE-2015-4792" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001838.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2243-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CG5LJLU356KG55PZAGA4KDAMICLY5O5L/#CG5LJLU356KG55PZAGA4KDAMICLY5O5L" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2244-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JWKCJSXYRA3CMFTZUZBJDMPHRAAXTHPE/#JWKCJSXYRA3CMFTZUZBJDMPHRAAXTHPE" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2246-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UNHHC75S6DSYT5A5TM3OWG2HVE26HXSY/#UNHHC75S6DSYT5A5TM3OWG2HVE26HXSY" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier and 5.6.26 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Partition, a different vulnerability than CVE-2015-4802.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4792/">CVE-2015-4792 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4792">CVE-2015-4792 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958789">SUSE bug 958789</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821941" comment="mariadb-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821942" comment="mariadb-bench-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821943" comment="mariadb-devel-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821944" comment="mariadb-embedded-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821945" comment="mariadb-embedded-devel-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821946" comment="mariadb-libs-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821947" comment="mariadb-server-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821948" comment="mariadb-test-5.5.47-1.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154802" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4802</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4802" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4802" ref_url="https://www.suse.com/security/cve/CVE-2015-4802" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001838.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2243-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CG5LJLU356KG55PZAGA4KDAMICLY5O5L/#CG5LJLU356KG55PZAGA4KDAMICLY5O5L" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2244-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JWKCJSXYRA3CMFTZUZBJDMPHRAAXTHPE/#JWKCJSXYRA3CMFTZUZBJDMPHRAAXTHPE" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2246-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UNHHC75S6DSYT5A5TM3OWG2HVE26HXSY/#UNHHC75S6DSYT5A5TM3OWG2HVE26HXSY" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier and 5.6.26 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Partition, a different vulnerability than CVE-2015-4792.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4802/">CVE-2015-4802 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4802">CVE-2015-4802 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958789">SUSE bug 958789</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821941" comment="mariadb-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821942" comment="mariadb-bench-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821943" comment="mariadb-devel-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821944" comment="mariadb-embedded-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821945" comment="mariadb-embedded-devel-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821946" comment="mariadb-libs-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821947" comment="mariadb-server-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821948" comment="mariadb-test-5.5.47-1.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154803" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4803</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4803" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4803" ref_url="https://www.suse.com/security/cve/CVE-2015-4803" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1874-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1874-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001800.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1902-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FVL7UVPKWLVFRYUMLIOO3LSOJPPDB3EY/#FVL7UVPKWLVFRYUMLIOO3LSOJPPDB3EY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1905-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JH2ZVFKXVEWZYMCTHL2R42O642L6WS4X/#JH2ZVFKXVEWZYMCTHL2R42O642L6WS4X" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1906-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PA36MR3V23DPT2LWVZIDDRORX3X2W2WE/#PA36MR3V23DPT2LWVZIDDRORX3X2W2WE" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1971-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SCB7TEPDMKXAYGESXLRMCLSHNRHRZIJA/#SCB7TEPDMKXAYGESXLRMCLSHNRHRZIJA" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EM5IRJXZE66HIX564A56RBKHOFXINXH2/#EM5IRJXZE66HIX564A56RBKHOFXINXH2" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60; Java SE Embedded 8u51; and JRockit R28.3.7 allows remote attackers to affect availability via vectors related to JAXP, a different vulnerability than CVE-2015-4893 and CVE-2015-4911.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-10-24"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4803/">CVE-2015-4803 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4803">CVE-2015-4803 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/951376">SUSE bug 951376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955131">SUSE bug 955131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821380" comment="java-1.6.0-openjdk-1.6.0.37-1.13.9.4.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821381" comment="java-1.6.0-openjdk-demo-1.6.0.37-1.13.9.4.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821382" comment="java-1.6.0-openjdk-devel-1.6.0.37-1.13.9.4.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821383" comment="java-1.6.0-openjdk-javadoc-1.6.0.37-1.13.9.4.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821384" comment="java-1.6.0-openjdk-src-1.6.0.37-1.13.9.4.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821325" comment="java-1.7.0-openjdk-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821326" comment="java-1.7.0-openjdk-accessibility-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821327" comment="java-1.7.0-openjdk-demo-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821328" comment="java-1.7.0-openjdk-devel-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821329" comment="java-1.7.0-openjdk-headless-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821330" comment="java-1.7.0-openjdk-javadoc-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821331" comment="java-1.7.0-openjdk-src-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821318" comment="java-1.8.0-openjdk-1.8.0.65-2.b17.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821319" comment="java-1.8.0-openjdk-accessibility-1.8.0.65-2.b17.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821320" comment="java-1.8.0-openjdk-demo-1.8.0.65-2.b17.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821321" comment="java-1.8.0-openjdk-devel-1.8.0.65-2.b17.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821322" comment="java-1.8.0-openjdk-headless-1.8.0.65-2.b17.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821323" comment="java-1.8.0-openjdk-javadoc-1.8.0.65-2.b17.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821324" comment="java-1.8.0-openjdk-src-1.8.0.65-2.b17.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4805</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4805" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4805" ref_url="https://www.suse.com/security/cve/CVE-2015-4805" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1874-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1874-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001800.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1902-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FVL7UVPKWLVFRYUMLIOO3LSOJPPDB3EY/#FVL7UVPKWLVFRYUMLIOO3LSOJPPDB3EY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1905-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JH2ZVFKXVEWZYMCTHL2R42O642L6WS4X/#JH2ZVFKXVEWZYMCTHL2R42O642L6WS4X" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1906-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PA36MR3V23DPT2LWVZIDDRORX3X2W2WE/#PA36MR3V23DPT2LWVZIDDRORX3X2W2WE" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1971-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SCB7TEPDMKXAYGESXLRMCLSHNRHRZIJA/#SCB7TEPDMKXAYGESXLRMCLSHNRHRZIJA" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EM5IRJXZE66HIX564A56RBKHOFXINXH2/#EM5IRJXZE66HIX564A56RBKHOFXINXH2" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Serialization.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-10-25"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4805/">CVE-2015-4805 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4805">CVE-2015-4805 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/951376">SUSE bug 951376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955131">SUSE bug 955131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821380" comment="java-1.6.0-openjdk-1.6.0.37-1.13.9.4.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821381" comment="java-1.6.0-openjdk-demo-1.6.0.37-1.13.9.4.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821382" comment="java-1.6.0-openjdk-devel-1.6.0.37-1.13.9.4.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821383" comment="java-1.6.0-openjdk-javadoc-1.6.0.37-1.13.9.4.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821384" comment="java-1.6.0-openjdk-src-1.6.0.37-1.13.9.4.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821325" comment="java-1.7.0-openjdk-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821326" comment="java-1.7.0-openjdk-accessibility-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821327" comment="java-1.7.0-openjdk-demo-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821328" comment="java-1.7.0-openjdk-devel-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821329" comment="java-1.7.0-openjdk-headless-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821330" comment="java-1.7.0-openjdk-javadoc-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821331" comment="java-1.7.0-openjdk-src-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821318" comment="java-1.8.0-openjdk-1.8.0.65-2.b17.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821319" comment="java-1.8.0-openjdk-accessibility-1.8.0.65-2.b17.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821320" comment="java-1.8.0-openjdk-demo-1.8.0.65-2.b17.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821321" comment="java-1.8.0-openjdk-devel-1.8.0.65-2.b17.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821322" comment="java-1.8.0-openjdk-headless-1.8.0.65-2.b17.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821323" comment="java-1.8.0-openjdk-javadoc-1.8.0.65-2.b17.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821324" comment="java-1.8.0-openjdk-src-1.8.0.65-2.b17.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4806</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4806" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4806" ref_url="https://www.suse.com/security/cve/CVE-2015-4806" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1874-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1874-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001800.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1902-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FVL7UVPKWLVFRYUMLIOO3LSOJPPDB3EY/#FVL7UVPKWLVFRYUMLIOO3LSOJPPDB3EY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1905-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JH2ZVFKXVEWZYMCTHL2R42O642L6WS4X/#JH2ZVFKXVEWZYMCTHL2R42O642L6WS4X" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1906-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PA36MR3V23DPT2LWVZIDDRORX3X2W2WE/#PA36MR3V23DPT2LWVZIDDRORX3X2W2WE" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1971-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SCB7TEPDMKXAYGESXLRMCLSHNRHRZIJA/#SCB7TEPDMKXAYGESXLRMCLSHNRHRZIJA" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EM5IRJXZE66HIX564A56RBKHOFXINXH2/#EM5IRJXZE66HIX564A56RBKHOFXINXH2" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality and integrity via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-10-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4806/">CVE-2015-4806 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4806">CVE-2015-4806 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/951376">SUSE bug 951376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955131">SUSE bug 955131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821380" comment="java-1.6.0-openjdk-1.6.0.37-1.13.9.4.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821381" comment="java-1.6.0-openjdk-demo-1.6.0.37-1.13.9.4.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821382" comment="java-1.6.0-openjdk-devel-1.6.0.37-1.13.9.4.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821383" comment="java-1.6.0-openjdk-javadoc-1.6.0.37-1.13.9.4.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821384" comment="java-1.6.0-openjdk-src-1.6.0.37-1.13.9.4.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821325" comment="java-1.7.0-openjdk-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821326" comment="java-1.7.0-openjdk-accessibility-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821327" comment="java-1.7.0-openjdk-demo-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821328" comment="java-1.7.0-openjdk-devel-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821329" comment="java-1.7.0-openjdk-headless-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821330" comment="java-1.7.0-openjdk-javadoc-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821331" comment="java-1.7.0-openjdk-src-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821318" comment="java-1.8.0-openjdk-1.8.0.65-2.b17.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821319" comment="java-1.8.0-openjdk-accessibility-1.8.0.65-2.b17.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821320" comment="java-1.8.0-openjdk-demo-1.8.0.65-2.b17.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821321" comment="java-1.8.0-openjdk-devel-1.8.0.65-2.b17.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821322" comment="java-1.8.0-openjdk-headless-1.8.0.65-2.b17.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821323" comment="java-1.8.0-openjdk-javadoc-1.8.0.65-2.b17.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821324" comment="java-1.8.0-openjdk-src-1.8.0.65-2.b17.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154815" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4815</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4815" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4815" ref_url="https://www.suse.com/security/cve/CVE-2015-4815" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001838.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2243-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CG5LJLU356KG55PZAGA4KDAMICLY5O5L/#CG5LJLU356KG55PZAGA4KDAMICLY5O5L" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2244-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JWKCJSXYRA3CMFTZUZBJDMPHRAAXTHPE/#JWKCJSXYRA3CMFTZUZBJDMPHRAAXTHPE" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2246-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UNHHC75S6DSYT5A5TM3OWG2HVE26HXSY/#UNHHC75S6DSYT5A5TM3OWG2HVE26HXSY" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier and 5.6.26 and earlier allows remote authenticated users to affect availability via vectors related to Server : DDL.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4815/">CVE-2015-4815 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4815">CVE-2015-4815 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958789">SUSE bug 958789</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821941" comment="mariadb-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821942" comment="mariadb-bench-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821943" comment="mariadb-devel-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821944" comment="mariadb-embedded-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821945" comment="mariadb-embedded-devel-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821946" comment="mariadb-libs-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821947" comment="mariadb-server-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821948" comment="mariadb-test-5.5.47-1.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154816" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4816</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4816" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4816" ref_url="https://www.suse.com/security/cve/CVE-2015-4816" source="SUSE CVE"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001806.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2243-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CG5LJLU356KG55PZAGA4KDAMICLY5O5L/#CG5LJLU356KG55PZAGA4KDAMICLY5O5L" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.44 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : InnoDB.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4816/">CVE-2015-4816 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4816">CVE-2015-4816 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958790">SUSE bug 958790</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821941" comment="mariadb-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821942" comment="mariadb-bench-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821943" comment="mariadb-devel-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821944" comment="mariadb-embedded-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821945" comment="mariadb-embedded-devel-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821946" comment="mariadb-libs-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821947" comment="mariadb-server-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821948" comment="mariadb-test-5.5.47-1.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154819" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4819</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4819" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4819" ref_url="https://www.suse.com/security/cve/CVE-2015-4819" source="SUSE CVE"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001806.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2243-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CG5LJLU356KG55PZAGA4KDAMICLY5O5L/#CG5LJLU356KG55PZAGA4KDAMICLY5O5L" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.44 and earlier, and 5.6.25 and earlier, allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Client programs.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4819/">CVE-2015-4819 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4819">CVE-2015-4819 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958790">SUSE bug 958790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969667">SUSE bug 969667</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821941" comment="mariadb-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821942" comment="mariadb-bench-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821943" comment="mariadb-devel-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821944" comment="mariadb-embedded-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821945" comment="mariadb-embedded-devel-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821946" comment="mariadb-libs-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821947" comment="mariadb-server-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821948" comment="mariadb-test-5.5.47-1.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154826" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4826</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4826" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4826" ref_url="https://www.suse.com/security/cve/CVE-2015-4826" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001838.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2243-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CG5LJLU356KG55PZAGA4KDAMICLY5O5L/#CG5LJLU356KG55PZAGA4KDAMICLY5O5L" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2244-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JWKCJSXYRA3CMFTZUZBJDMPHRAAXTHPE/#JWKCJSXYRA3CMFTZUZBJDMPHRAAXTHPE" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2246-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UNHHC75S6DSYT5A5TM3OWG2HVE26HXSY/#UNHHC75S6DSYT5A5TM3OWG2HVE26HXSY" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier and 5.6.26 and earlier allows remote authenticated users to affect confidentiality via unknown vectors related to Server : Types.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4826/">CVE-2015-4826 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4826">CVE-2015-4826 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958789">SUSE bug 958789</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821941" comment="mariadb-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821942" comment="mariadb-bench-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821943" comment="mariadb-devel-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821944" comment="mariadb-embedded-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821945" comment="mariadb-embedded-devel-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821946" comment="mariadb-libs-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821947" comment="mariadb-server-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821948" comment="mariadb-test-5.5.47-1.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154830" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4830</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4830" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4830" ref_url="https://www.suse.com/security/cve/CVE-2015-4830" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001838.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2243-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CG5LJLU356KG55PZAGA4KDAMICLY5O5L/#CG5LJLU356KG55PZAGA4KDAMICLY5O5L" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2244-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JWKCJSXYRA3CMFTZUZBJDMPHRAAXTHPE/#JWKCJSXYRA3CMFTZUZBJDMPHRAAXTHPE" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2246-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UNHHC75S6DSYT5A5TM3OWG2HVE26HXSY/#UNHHC75S6DSYT5A5TM3OWG2HVE26HXSY" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier and 5.6.26 and earlier allows remote authenticated users to affect integrity via unknown vectors related to Server : Security : Privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4830/">CVE-2015-4830 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4830">CVE-2015-4830 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958789">SUSE bug 958789</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821941" comment="mariadb-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821942" comment="mariadb-bench-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821943" comment="mariadb-devel-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821944" comment="mariadb-embedded-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821945" comment="mariadb-embedded-devel-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821946" comment="mariadb-libs-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821947" comment="mariadb-server-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821948" comment="mariadb-test-5.5.47-1.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4835</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4835" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4835" ref_url="https://www.suse.com/security/cve/CVE-2015-4835" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1874-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1874-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001800.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1902-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FVL7UVPKWLVFRYUMLIOO3LSOJPPDB3EY/#FVL7UVPKWLVFRYUMLIOO3LSOJPPDB3EY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1905-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JH2ZVFKXVEWZYMCTHL2R42O642L6WS4X/#JH2ZVFKXVEWZYMCTHL2R42O642L6WS4X" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1906-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PA36MR3V23DPT2LWVZIDDRORX3X2W2WE/#PA36MR3V23DPT2LWVZIDDRORX3X2W2WE" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1971-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SCB7TEPDMKXAYGESXLRMCLSHNRHRZIJA/#SCB7TEPDMKXAYGESXLRMCLSHNRHRZIJA" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EM5IRJXZE66HIX564A56RBKHOFXINXH2/#EM5IRJXZE66HIX564A56RBKHOFXINXH2" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA, a different vulnerability than CVE-2015-4881.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-10-25"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4835/">CVE-2015-4835 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4835">CVE-2015-4835 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/951376">SUSE bug 951376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955131">SUSE bug 955131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821380" comment="java-1.6.0-openjdk-1.6.0.37-1.13.9.4.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821381" comment="java-1.6.0-openjdk-demo-1.6.0.37-1.13.9.4.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821382" comment="java-1.6.0-openjdk-devel-1.6.0.37-1.13.9.4.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821383" comment="java-1.6.0-openjdk-javadoc-1.6.0.37-1.13.9.4.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821384" comment="java-1.6.0-openjdk-src-1.6.0.37-1.13.9.4.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821325" comment="java-1.7.0-openjdk-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821326" comment="java-1.7.0-openjdk-accessibility-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821327" comment="java-1.7.0-openjdk-demo-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821328" comment="java-1.7.0-openjdk-devel-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821329" comment="java-1.7.0-openjdk-headless-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821330" comment="java-1.7.0-openjdk-javadoc-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821331" comment="java-1.7.0-openjdk-src-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821318" comment="java-1.8.0-openjdk-1.8.0.65-2.b17.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821319" comment="java-1.8.0-openjdk-accessibility-1.8.0.65-2.b17.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821320" comment="java-1.8.0-openjdk-demo-1.8.0.65-2.b17.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821321" comment="java-1.8.0-openjdk-devel-1.8.0.65-2.b17.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821322" comment="java-1.8.0-openjdk-headless-1.8.0.65-2.b17.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821323" comment="java-1.8.0-openjdk-javadoc-1.8.0.65-2.b17.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821324" comment="java-1.8.0-openjdk-src-1.8.0.65-2.b17.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4836</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4836" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4836" ref_url="https://www.suse.com/security/cve/CVE-2015-4836" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001838.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2243-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CG5LJLU356KG55PZAGA4KDAMICLY5O5L/#CG5LJLU356KG55PZAGA4KDAMICLY5O5L" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2244-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JWKCJSXYRA3CMFTZUZBJDMPHRAAXTHPE/#JWKCJSXYRA3CMFTZUZBJDMPHRAAXTHPE" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2246-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UNHHC75S6DSYT5A5TM3OWG2HVE26HXSY/#UNHHC75S6DSYT5A5TM3OWG2HVE26HXSY" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier, and 5.6.26 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : SP.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4836/">CVE-2015-4836 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4836">CVE-2015-4836 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958789">SUSE bug 958789</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821941" comment="mariadb-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821942" comment="mariadb-bench-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821943" comment="mariadb-devel-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821944" comment="mariadb-embedded-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821945" comment="mariadb-embedded-devel-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821946" comment="mariadb-libs-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821947" comment="mariadb-server-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821948" comment="mariadb-test-5.5.47-1.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154840" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4840</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4840" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4840" ref_url="https://www.suse.com/security/cve/CVE-2015-4840" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1874-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1874-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001800.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1902-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FVL7UVPKWLVFRYUMLIOO3LSOJPPDB3EY/#FVL7UVPKWLVFRYUMLIOO3LSOJPPDB3EY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1905-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JH2ZVFKXVEWZYMCTHL2R42O642L6WS4X/#JH2ZVFKXVEWZYMCTHL2R42O642L6WS4X" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1906-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PA36MR3V23DPT2LWVZIDDRORX3X2W2WE/#PA36MR3V23DPT2LWVZIDDRORX3X2W2WE" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1971-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SCB7TEPDMKXAYGESXLRMCLSHNRHRZIJA/#SCB7TEPDMKXAYGESXLRMCLSHNRHRZIJA" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EM5IRJXZE66HIX564A56RBKHOFXINXH2/#EM5IRJXZE66HIX564A56RBKHOFXINXH2" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u85 and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality via unknown vectors related to 2D.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-10-24"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4840/">CVE-2015-4840 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4840">CVE-2015-4840 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/951376">SUSE bug 951376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955131">SUSE bug 955131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821325" comment="java-1.7.0-openjdk-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821326" comment="java-1.7.0-openjdk-accessibility-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821327" comment="java-1.7.0-openjdk-demo-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821328" comment="java-1.7.0-openjdk-devel-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821329" comment="java-1.7.0-openjdk-headless-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821330" comment="java-1.7.0-openjdk-javadoc-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821331" comment="java-1.7.0-openjdk-src-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821318" comment="java-1.8.0-openjdk-1.8.0.65-2.b17.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821319" comment="java-1.8.0-openjdk-accessibility-1.8.0.65-2.b17.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821320" comment="java-1.8.0-openjdk-demo-1.8.0.65-2.b17.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821321" comment="java-1.8.0-openjdk-devel-1.8.0.65-2.b17.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821322" comment="java-1.8.0-openjdk-headless-1.8.0.65-2.b17.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821323" comment="java-1.8.0-openjdk-javadoc-1.8.0.65-2.b17.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821324" comment="java-1.8.0-openjdk-src-1.8.0.65-2.b17.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154842" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4842</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4842" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4842" ref_url="https://www.suse.com/security/cve/CVE-2015-4842" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1874-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1874-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001800.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1902-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FVL7UVPKWLVFRYUMLIOO3LSOJPPDB3EY/#FVL7UVPKWLVFRYUMLIOO3LSOJPPDB3EY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1905-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JH2ZVFKXVEWZYMCTHL2R42O642L6WS4X/#JH2ZVFKXVEWZYMCTHL2R42O642L6WS4X" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1906-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PA36MR3V23DPT2LWVZIDDRORX3X2W2WE/#PA36MR3V23DPT2LWVZIDDRORX3X2W2WE" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1971-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SCB7TEPDMKXAYGESXLRMCLSHNRHRZIJA/#SCB7TEPDMKXAYGESXLRMCLSHNRHRZIJA" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EM5IRJXZE66HIX564A56RBKHOFXINXH2/#EM5IRJXZE66HIX564A56RBKHOFXINXH2" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality via vectors related to JAXP.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-10-23"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4842/">CVE-2015-4842 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4842">CVE-2015-4842 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/951376">SUSE bug 951376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955131">SUSE bug 955131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821380" comment="java-1.6.0-openjdk-1.6.0.37-1.13.9.4.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821381" comment="java-1.6.0-openjdk-demo-1.6.0.37-1.13.9.4.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821382" comment="java-1.6.0-openjdk-devel-1.6.0.37-1.13.9.4.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821383" comment="java-1.6.0-openjdk-javadoc-1.6.0.37-1.13.9.4.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821384" comment="java-1.6.0-openjdk-src-1.6.0.37-1.13.9.4.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821325" comment="java-1.7.0-openjdk-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821326" comment="java-1.7.0-openjdk-accessibility-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821327" comment="java-1.7.0-openjdk-demo-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821328" comment="java-1.7.0-openjdk-devel-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821329" comment="java-1.7.0-openjdk-headless-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821330" comment="java-1.7.0-openjdk-javadoc-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821331" comment="java-1.7.0-openjdk-src-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821318" comment="java-1.8.0-openjdk-1.8.0.65-2.b17.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821319" comment="java-1.8.0-openjdk-accessibility-1.8.0.65-2.b17.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821320" comment="java-1.8.0-openjdk-demo-1.8.0.65-2.b17.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821321" comment="java-1.8.0-openjdk-devel-1.8.0.65-2.b17.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821322" comment="java-1.8.0-openjdk-headless-1.8.0.65-2.b17.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821323" comment="java-1.8.0-openjdk-javadoc-1.8.0.65-2.b17.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821324" comment="java-1.8.0-openjdk-src-1.8.0.65-2.b17.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154843" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4843</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4843" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4843" ref_url="https://www.suse.com/security/cve/CVE-2015-4843" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1874-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1874-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001800.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1902-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FVL7UVPKWLVFRYUMLIOO3LSOJPPDB3EY/#FVL7UVPKWLVFRYUMLIOO3LSOJPPDB3EY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1905-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JH2ZVFKXVEWZYMCTHL2R42O642L6WS4X/#JH2ZVFKXVEWZYMCTHL2R42O642L6WS4X" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1906-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PA36MR3V23DPT2LWVZIDDRORX3X2W2WE/#PA36MR3V23DPT2LWVZIDDRORX3X2W2WE" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1971-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SCB7TEPDMKXAYGESXLRMCLSHNRHRZIJA/#SCB7TEPDMKXAYGESXLRMCLSHNRHRZIJA" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EM5IRJXZE66HIX564A56RBKHOFXINXH2/#EM5IRJXZE66HIX564A56RBKHOFXINXH2" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-10-23"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4843/">CVE-2015-4843 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4843">CVE-2015-4843 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/951376">SUSE bug 951376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955131">SUSE bug 955131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821380" comment="java-1.6.0-openjdk-1.6.0.37-1.13.9.4.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821381" comment="java-1.6.0-openjdk-demo-1.6.0.37-1.13.9.4.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821382" comment="java-1.6.0-openjdk-devel-1.6.0.37-1.13.9.4.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821383" comment="java-1.6.0-openjdk-javadoc-1.6.0.37-1.13.9.4.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821384" comment="java-1.6.0-openjdk-src-1.6.0.37-1.13.9.4.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821325" comment="java-1.7.0-openjdk-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821326" comment="java-1.7.0-openjdk-accessibility-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821327" comment="java-1.7.0-openjdk-demo-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821328" comment="java-1.7.0-openjdk-devel-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821329" comment="java-1.7.0-openjdk-headless-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821330" comment="java-1.7.0-openjdk-javadoc-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821331" comment="java-1.7.0-openjdk-src-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821318" comment="java-1.8.0-openjdk-1.8.0.65-2.b17.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821319" comment="java-1.8.0-openjdk-accessibility-1.8.0.65-2.b17.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821320" comment="java-1.8.0-openjdk-demo-1.8.0.65-2.b17.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821321" comment="java-1.8.0-openjdk-devel-1.8.0.65-2.b17.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821322" comment="java-1.8.0-openjdk-headless-1.8.0.65-2.b17.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821323" comment="java-1.8.0-openjdk-javadoc-1.8.0.65-2.b17.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821324" comment="java-1.8.0-openjdk-src-1.8.0.65-2.b17.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154844" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4844</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4844" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4844" ref_url="https://www.suse.com/security/cve/CVE-2015-4844" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1874-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1874-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001800.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1902-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FVL7UVPKWLVFRYUMLIOO3LSOJPPDB3EY/#FVL7UVPKWLVFRYUMLIOO3LSOJPPDB3EY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1905-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JH2ZVFKXVEWZYMCTHL2R42O642L6WS4X/#JH2ZVFKXVEWZYMCTHL2R42O642L6WS4X" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1906-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PA36MR3V23DPT2LWVZIDDRORX3X2W2WE/#PA36MR3V23DPT2LWVZIDDRORX3X2W2WE" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1971-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SCB7TEPDMKXAYGESXLRMCLSHNRHRZIJA/#SCB7TEPDMKXAYGESXLRMCLSHNRHRZIJA" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EM5IRJXZE66HIX564A56RBKHOFXINXH2/#EM5IRJXZE66HIX564A56RBKHOFXINXH2" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-10-25"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4844/">CVE-2015-4844 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4844">CVE-2015-4844 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/951376">SUSE bug 951376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955131">SUSE bug 955131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821380" comment="java-1.6.0-openjdk-1.6.0.37-1.13.9.4.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821381" comment="java-1.6.0-openjdk-demo-1.6.0.37-1.13.9.4.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821382" comment="java-1.6.0-openjdk-devel-1.6.0.37-1.13.9.4.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821383" comment="java-1.6.0-openjdk-javadoc-1.6.0.37-1.13.9.4.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821384" comment="java-1.6.0-openjdk-src-1.6.0.37-1.13.9.4.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821325" comment="java-1.7.0-openjdk-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821326" comment="java-1.7.0-openjdk-accessibility-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821327" comment="java-1.7.0-openjdk-demo-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821328" comment="java-1.7.0-openjdk-devel-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821329" comment="java-1.7.0-openjdk-headless-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821330" comment="java-1.7.0-openjdk-javadoc-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821331" comment="java-1.7.0-openjdk-src-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821318" comment="java-1.8.0-openjdk-1.8.0.65-2.b17.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821319" comment="java-1.8.0-openjdk-accessibility-1.8.0.65-2.b17.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821320" comment="java-1.8.0-openjdk-demo-1.8.0.65-2.b17.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821321" comment="java-1.8.0-openjdk-devel-1.8.0.65-2.b17.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821322" comment="java-1.8.0-openjdk-headless-1.8.0.65-2.b17.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821323" comment="java-1.8.0-openjdk-javadoc-1.8.0.65-2.b17.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821324" comment="java-1.8.0-openjdk-src-1.8.0.65-2.b17.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154858" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4858</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4858" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4858" ref_url="https://www.suse.com/security/cve/CVE-2015-4858" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001838.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2243-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CG5LJLU356KG55PZAGA4KDAMICLY5O5L/#CG5LJLU356KG55PZAGA4KDAMICLY5O5L" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2244-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JWKCJSXYRA3CMFTZUZBJDMPHRAAXTHPE/#JWKCJSXYRA3CMFTZUZBJDMPHRAAXTHPE" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2246-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UNHHC75S6DSYT5A5TM3OWG2HVE26HXSY/#UNHHC75S6DSYT5A5TM3OWG2HVE26HXSY" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier, and 5.6.26 and earlier, allows remote authenticated users to affect availability via vectors related to DML, a different vulnerability than CVE-2015-4913.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4858/">CVE-2015-4858 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4858">CVE-2015-4858 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958789">SUSE bug 958789</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821941" comment="mariadb-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821942" comment="mariadb-bench-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821943" comment="mariadb-devel-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821944" comment="mariadb-embedded-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821945" comment="mariadb-embedded-devel-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821946" comment="mariadb-libs-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821947" comment="mariadb-server-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821948" comment="mariadb-test-5.5.47-1.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154860" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4860</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4860" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4860" ref_url="https://www.suse.com/security/cve/CVE-2015-4860" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1874-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1874-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001800.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1902-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FVL7UVPKWLVFRYUMLIOO3LSOJPPDB3EY/#FVL7UVPKWLVFRYUMLIOO3LSOJPPDB3EY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1905-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JH2ZVFKXVEWZYMCTHL2R42O642L6WS4X/#JH2ZVFKXVEWZYMCTHL2R42O642L6WS4X" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1906-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PA36MR3V23DPT2LWVZIDDRORX3X2W2WE/#PA36MR3V23DPT2LWVZIDDRORX3X2W2WE" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1971-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SCB7TEPDMKXAYGESXLRMCLSHNRHRZIJA/#SCB7TEPDMKXAYGESXLRMCLSHNRHRZIJA" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EM5IRJXZE66HIX564A56RBKHOFXINXH2/#EM5IRJXZE66HIX564A56RBKHOFXINXH2" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to RMI, a different vulnerability than CVE-2015-4883.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-10-24"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4860/">CVE-2015-4860 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4860">CVE-2015-4860 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/951376">SUSE bug 951376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955131">SUSE bug 955131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821380" comment="java-1.6.0-openjdk-1.6.0.37-1.13.9.4.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821381" comment="java-1.6.0-openjdk-demo-1.6.0.37-1.13.9.4.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821382" comment="java-1.6.0-openjdk-devel-1.6.0.37-1.13.9.4.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821383" comment="java-1.6.0-openjdk-javadoc-1.6.0.37-1.13.9.4.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821384" comment="java-1.6.0-openjdk-src-1.6.0.37-1.13.9.4.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821325" comment="java-1.7.0-openjdk-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821326" comment="java-1.7.0-openjdk-accessibility-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821327" comment="java-1.7.0-openjdk-demo-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821328" comment="java-1.7.0-openjdk-devel-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821329" comment="java-1.7.0-openjdk-headless-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821330" comment="java-1.7.0-openjdk-javadoc-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821331" comment="java-1.7.0-openjdk-src-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821318" comment="java-1.8.0-openjdk-1.8.0.65-2.b17.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821319" comment="java-1.8.0-openjdk-accessibility-1.8.0.65-2.b17.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821320" comment="java-1.8.0-openjdk-demo-1.8.0.65-2.b17.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821321" comment="java-1.8.0-openjdk-devel-1.8.0.65-2.b17.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821322" comment="java-1.8.0-openjdk-headless-1.8.0.65-2.b17.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821323" comment="java-1.8.0-openjdk-javadoc-1.8.0.65-2.b17.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821324" comment="java-1.8.0-openjdk-src-1.8.0.65-2.b17.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154861" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4861</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4861" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4861" ref_url="https://www.suse.com/security/cve/CVE-2015-4861" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001838.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2243-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CG5LJLU356KG55PZAGA4KDAMICLY5O5L/#CG5LJLU356KG55PZAGA4KDAMICLY5O5L" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2244-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JWKCJSXYRA3CMFTZUZBJDMPHRAAXTHPE/#JWKCJSXYRA3CMFTZUZBJDMPHRAAXTHPE" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2246-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UNHHC75S6DSYT5A5TM3OWG2HVE26HXSY/#UNHHC75S6DSYT5A5TM3OWG2HVE26HXSY" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier, and 5.6.26 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : InnoDB.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4861/">CVE-2015-4861 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4861">CVE-2015-4861 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958789">SUSE bug 958789</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821941" comment="mariadb-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821942" comment="mariadb-bench-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821943" comment="mariadb-devel-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821944" comment="mariadb-embedded-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821945" comment="mariadb-embedded-devel-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821946" comment="mariadb-libs-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821947" comment="mariadb-server-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821948" comment="mariadb-test-5.5.47-1.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154868" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4868</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4868" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4868" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4868" ref_url="https://www.suse.com/security/cve/CVE-2015-4868" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2015:1905-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JH2ZVFKXVEWZYMCTHL2R42O642L6WS4X/#JH2ZVFKXVEWZYMCTHL2R42O642L6WS4X" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EM5IRJXZE66HIX564A56RBKHOFXINXH2/#EM5IRJXZE66HIX564A56RBKHOFXINXH2" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 8u60 and Java SE Embedded 8u51 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-30"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4868/">CVE-2015-4868 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4868">CVE-2015-4868 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/951376">SUSE bug 951376</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821318" comment="java-1.8.0-openjdk-1.8.0.65-2.b17.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821319" comment="java-1.8.0-openjdk-accessibility-1.8.0.65-2.b17.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821320" comment="java-1.8.0-openjdk-demo-1.8.0.65-2.b17.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821321" comment="java-1.8.0-openjdk-devel-1.8.0.65-2.b17.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821322" comment="java-1.8.0-openjdk-headless-1.8.0.65-2.b17.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821323" comment="java-1.8.0-openjdk-javadoc-1.8.0.65-2.b17.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821324" comment="java-1.8.0-openjdk-src-1.8.0.65-2.b17.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154870" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4870</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4870" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4870" ref_url="https://www.suse.com/security/cve/CVE-2015-4870" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001838.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2243-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CG5LJLU356KG55PZAGA4KDAMICLY5O5L/#CG5LJLU356KG55PZAGA4KDAMICLY5O5L" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2244-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JWKCJSXYRA3CMFTZUZBJDMPHRAAXTHPE/#JWKCJSXYRA3CMFTZUZBJDMPHRAAXTHPE" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2246-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UNHHC75S6DSYT5A5TM3OWG2HVE26HXSY/#UNHHC75S6DSYT5A5TM3OWG2HVE26HXSY" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier, and 5.6.26 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : Parser.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4870/">CVE-2015-4870 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4870">CVE-2015-4870 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958789">SUSE bug 958789</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821941" comment="mariadb-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821942" comment="mariadb-bench-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821943" comment="mariadb-devel-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821944" comment="mariadb-embedded-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821945" comment="mariadb-embedded-devel-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821946" comment="mariadb-libs-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821947" comment="mariadb-server-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821948" comment="mariadb-test-5.5.47-1.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154871" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4871</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4871" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4871" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4871" ref_url="https://www.suse.com/security/cve/CVE-2015-4871" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001834.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0268-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OXB4QAFWJUQEZEK2MFV5C6VMXORCHTOC/#OXB4QAFWJUQEZEK2MFV5C6VMXORCHTOC" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0272-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YX6XI7PJCN66EMA6MG6N5F3SLBKL3UF6/#YX6XI7PJCN66EMA6MG6N5F3SLBKL3UF6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0279-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5PDBMSXPRSUZRBQWXDNZ3KHQVA53KFEH/#5PDBMSXPRSUZRBQWXDNZ3KHQVA53KFEH" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u85 allows remote attackers to affect confidentiality and integrity via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4871/">CVE-2015-4871 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4871">CVE-2015-4871 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/951376">SUSE bug 951376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955131">SUSE bug 955131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821743" comment="java-1.7.0-openjdk-1.7.0.95-2.6.4.0.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821744" comment="java-1.7.0-openjdk-accessibility-1.7.0.95-2.6.4.0.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821745" comment="java-1.7.0-openjdk-demo-1.7.0.95-2.6.4.0.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821746" comment="java-1.7.0-openjdk-devel-1.7.0.95-2.6.4.0.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821747" comment="java-1.7.0-openjdk-headless-1.7.0.95-2.6.4.0.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821748" comment="java-1.7.0-openjdk-javadoc-1.7.0.95-2.6.4.0.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821749" comment="java-1.7.0-openjdk-src-1.7.0.95-2.6.4.0.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154872" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4872</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4872" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4872" ref_url="https://www.suse.com/security/cve/CVE-2015-4872" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1874-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1874-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001800.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1902-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FVL7UVPKWLVFRYUMLIOO3LSOJPPDB3EY/#FVL7UVPKWLVFRYUMLIOO3LSOJPPDB3EY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1905-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JH2ZVFKXVEWZYMCTHL2R42O642L6WS4X/#JH2ZVFKXVEWZYMCTHL2R42O642L6WS4X" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1906-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PA36MR3V23DPT2LWVZIDDRORX3X2W2WE/#PA36MR3V23DPT2LWVZIDDRORX3X2W2WE" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1971-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SCB7TEPDMKXAYGESXLRMCLSHNRHRZIJA/#SCB7TEPDMKXAYGESXLRMCLSHNRHRZIJA" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EM5IRJXZE66HIX564A56RBKHOFXINXH2/#EM5IRJXZE66HIX564A56RBKHOFXINXH2" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60; Java SE Embedded 8u51; and JRockit R28.3.7 allows remote attackers to affect integrity via unknown vectors related to Security.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-10-25"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4872/">CVE-2015-4872 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4872">CVE-2015-4872 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/951376">SUSE bug 951376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955131">SUSE bug 955131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821380" comment="java-1.6.0-openjdk-1.6.0.37-1.13.9.4.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821381" comment="java-1.6.0-openjdk-demo-1.6.0.37-1.13.9.4.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821382" comment="java-1.6.0-openjdk-devel-1.6.0.37-1.13.9.4.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821383" comment="java-1.6.0-openjdk-javadoc-1.6.0.37-1.13.9.4.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821384" comment="java-1.6.0-openjdk-src-1.6.0.37-1.13.9.4.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821325" comment="java-1.7.0-openjdk-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821326" comment="java-1.7.0-openjdk-accessibility-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821327" comment="java-1.7.0-openjdk-demo-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821328" comment="java-1.7.0-openjdk-devel-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821329" comment="java-1.7.0-openjdk-headless-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821330" comment="java-1.7.0-openjdk-javadoc-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821331" comment="java-1.7.0-openjdk-src-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821318" comment="java-1.8.0-openjdk-1.8.0.65-2.b17.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821319" comment="java-1.8.0-openjdk-accessibility-1.8.0.65-2.b17.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821320" comment="java-1.8.0-openjdk-demo-1.8.0.65-2.b17.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821321" comment="java-1.8.0-openjdk-devel-1.8.0.65-2.b17.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821322" comment="java-1.8.0-openjdk-headless-1.8.0.65-2.b17.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821323" comment="java-1.8.0-openjdk-javadoc-1.8.0.65-2.b17.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821324" comment="java-1.8.0-openjdk-src-1.8.0.65-2.b17.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154879" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4879</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4879" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4879" ref_url="https://www.suse.com/security/cve/CVE-2015-4879" source="SUSE CVE"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001806.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2243-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CG5LJLU356KG55PZAGA4KDAMICLY5O5L/#CG5LJLU356KG55PZAGA4KDAMICLY5O5L" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.44 and earlier, and 5.6.25 and earlier, allows remote authenticated users to affect confidentiality, integrity, and availability via vectors related to DML.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4879/">CVE-2015-4879 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4879">CVE-2015-4879 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958790">SUSE bug 958790</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821941" comment="mariadb-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821942" comment="mariadb-bench-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821943" comment="mariadb-devel-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821944" comment="mariadb-embedded-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821945" comment="mariadb-embedded-devel-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821946" comment="mariadb-libs-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821947" comment="mariadb-server-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821948" comment="mariadb-test-5.5.47-1.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154881" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4881</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4881" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4881" ref_url="https://www.suse.com/security/cve/CVE-2015-4881" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1874-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1874-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001660.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1902-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FVL7UVPKWLVFRYUMLIOO3LSOJPPDB3EY/#FVL7UVPKWLVFRYUMLIOO3LSOJPPDB3EY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1905-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JH2ZVFKXVEWZYMCTHL2R42O642L6WS4X/#JH2ZVFKXVEWZYMCTHL2R42O642L6WS4X" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1906-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PA36MR3V23DPT2LWVZIDDRORX3X2W2WE/#PA36MR3V23DPT2LWVZIDDRORX3X2W2WE" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1971-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SCB7TEPDMKXAYGESXLRMCLSHNRHRZIJA/#SCB7TEPDMKXAYGESXLRMCLSHNRHRZIJA" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EM5IRJXZE66HIX564A56RBKHOFXINXH2/#EM5IRJXZE66HIX564A56RBKHOFXINXH2" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA, a different vulnerability than CVE-2015-4835.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4881/">CVE-2015-4881 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4881">CVE-2015-4881 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/951376">SUSE bug 951376</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821380" comment="java-1.6.0-openjdk-1.6.0.37-1.13.9.4.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821381" comment="java-1.6.0-openjdk-demo-1.6.0.37-1.13.9.4.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821382" comment="java-1.6.0-openjdk-devel-1.6.0.37-1.13.9.4.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821383" comment="java-1.6.0-openjdk-javadoc-1.6.0.37-1.13.9.4.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821384" comment="java-1.6.0-openjdk-src-1.6.0.37-1.13.9.4.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821325" comment="java-1.7.0-openjdk-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821326" comment="java-1.7.0-openjdk-accessibility-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821327" comment="java-1.7.0-openjdk-demo-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821328" comment="java-1.7.0-openjdk-devel-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821329" comment="java-1.7.0-openjdk-headless-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821330" comment="java-1.7.0-openjdk-javadoc-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821331" comment="java-1.7.0-openjdk-src-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821318" comment="java-1.8.0-openjdk-1.8.0.65-2.b17.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821319" comment="java-1.8.0-openjdk-accessibility-1.8.0.65-2.b17.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821320" comment="java-1.8.0-openjdk-demo-1.8.0.65-2.b17.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821321" comment="java-1.8.0-openjdk-devel-1.8.0.65-2.b17.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821322" comment="java-1.8.0-openjdk-headless-1.8.0.65-2.b17.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821323" comment="java-1.8.0-openjdk-javadoc-1.8.0.65-2.b17.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821324" comment="java-1.8.0-openjdk-src-1.8.0.65-2.b17.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154882" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4882</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4882" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4882" ref_url="https://www.suse.com/security/cve/CVE-2015-4882" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1874-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1874-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001800.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1902-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FVL7UVPKWLVFRYUMLIOO3LSOJPPDB3EY/#FVL7UVPKWLVFRYUMLIOO3LSOJPPDB3EY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1905-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JH2ZVFKXVEWZYMCTHL2R42O642L6WS4X/#JH2ZVFKXVEWZYMCTHL2R42O642L6WS4X" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1906-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PA36MR3V23DPT2LWVZIDDRORX3X2W2WE/#PA36MR3V23DPT2LWVZIDDRORX3X2W2WE" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1971-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SCB7TEPDMKXAYGESXLRMCLSHNRHRZIJA/#SCB7TEPDMKXAYGESXLRMCLSHNRHRZIJA" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EM5IRJXZE66HIX564A56RBKHOFXINXH2/#EM5IRJXZE66HIX564A56RBKHOFXINXH2" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect availability via vectors related to CORBA.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-10-24"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4882/">CVE-2015-4882 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4882">CVE-2015-4882 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/951376">SUSE bug 951376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955131">SUSE bug 955131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821380" comment="java-1.6.0-openjdk-1.6.0.37-1.13.9.4.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821381" comment="java-1.6.0-openjdk-demo-1.6.0.37-1.13.9.4.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821382" comment="java-1.6.0-openjdk-devel-1.6.0.37-1.13.9.4.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821383" comment="java-1.6.0-openjdk-javadoc-1.6.0.37-1.13.9.4.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821384" comment="java-1.6.0-openjdk-src-1.6.0.37-1.13.9.4.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821325" comment="java-1.7.0-openjdk-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821326" comment="java-1.7.0-openjdk-accessibility-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821327" comment="java-1.7.0-openjdk-demo-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821328" comment="java-1.7.0-openjdk-devel-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821329" comment="java-1.7.0-openjdk-headless-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821330" comment="java-1.7.0-openjdk-javadoc-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821331" comment="java-1.7.0-openjdk-src-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821318" comment="java-1.8.0-openjdk-1.8.0.65-2.b17.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821319" comment="java-1.8.0-openjdk-accessibility-1.8.0.65-2.b17.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821320" comment="java-1.8.0-openjdk-demo-1.8.0.65-2.b17.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821321" comment="java-1.8.0-openjdk-devel-1.8.0.65-2.b17.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821322" comment="java-1.8.0-openjdk-headless-1.8.0.65-2.b17.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821323" comment="java-1.8.0-openjdk-javadoc-1.8.0.65-2.b17.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821324" comment="java-1.8.0-openjdk-src-1.8.0.65-2.b17.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154883" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4883</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4883" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4883" ref_url="https://www.suse.com/security/cve/CVE-2015-4883" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1874-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1874-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001800.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1902-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FVL7UVPKWLVFRYUMLIOO3LSOJPPDB3EY/#FVL7UVPKWLVFRYUMLIOO3LSOJPPDB3EY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1905-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JH2ZVFKXVEWZYMCTHL2R42O642L6WS4X/#JH2ZVFKXVEWZYMCTHL2R42O642L6WS4X" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1906-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PA36MR3V23DPT2LWVZIDDRORX3X2W2WE/#PA36MR3V23DPT2LWVZIDDRORX3X2W2WE" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1971-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SCB7TEPDMKXAYGESXLRMCLSHNRHRZIJA/#SCB7TEPDMKXAYGESXLRMCLSHNRHRZIJA" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EM5IRJXZE66HIX564A56RBKHOFXINXH2/#EM5IRJXZE66HIX564A56RBKHOFXINXH2" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to RMI, a different vulnerability than CVE-2015-4860.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-10-23"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4883/">CVE-2015-4883 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4883">CVE-2015-4883 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/951376">SUSE bug 951376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955131">SUSE bug 955131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821380" comment="java-1.6.0-openjdk-1.6.0.37-1.13.9.4.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821381" comment="java-1.6.0-openjdk-demo-1.6.0.37-1.13.9.4.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821382" comment="java-1.6.0-openjdk-devel-1.6.0.37-1.13.9.4.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821383" comment="java-1.6.0-openjdk-javadoc-1.6.0.37-1.13.9.4.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821384" comment="java-1.6.0-openjdk-src-1.6.0.37-1.13.9.4.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821325" comment="java-1.7.0-openjdk-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821326" comment="java-1.7.0-openjdk-accessibility-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821327" comment="java-1.7.0-openjdk-demo-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821328" comment="java-1.7.0-openjdk-devel-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821329" comment="java-1.7.0-openjdk-headless-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821330" comment="java-1.7.0-openjdk-javadoc-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821331" comment="java-1.7.0-openjdk-src-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821318" comment="java-1.8.0-openjdk-1.8.0.65-2.b17.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821319" comment="java-1.8.0-openjdk-accessibility-1.8.0.65-2.b17.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821320" comment="java-1.8.0-openjdk-demo-1.8.0.65-2.b17.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821321" comment="java-1.8.0-openjdk-devel-1.8.0.65-2.b17.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821322" comment="java-1.8.0-openjdk-headless-1.8.0.65-2.b17.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821323" comment="java-1.8.0-openjdk-javadoc-1.8.0.65-2.b17.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821324" comment="java-1.8.0-openjdk-src-1.8.0.65-2.b17.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154893" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4893</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4893" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4893" ref_url="https://www.suse.com/security/cve/CVE-2015-4893" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1874-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1874-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001800.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1902-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FVL7UVPKWLVFRYUMLIOO3LSOJPPDB3EY/#FVL7UVPKWLVFRYUMLIOO3LSOJPPDB3EY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1905-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JH2ZVFKXVEWZYMCTHL2R42O642L6WS4X/#JH2ZVFKXVEWZYMCTHL2R42O642L6WS4X" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1906-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PA36MR3V23DPT2LWVZIDDRORX3X2W2WE/#PA36MR3V23DPT2LWVZIDDRORX3X2W2WE" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1971-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SCB7TEPDMKXAYGESXLRMCLSHNRHRZIJA/#SCB7TEPDMKXAYGESXLRMCLSHNRHRZIJA" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EM5IRJXZE66HIX564A56RBKHOFXINXH2/#EM5IRJXZE66HIX564A56RBKHOFXINXH2" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60; Java SE Embedded 8u51; and JRockit R28.3.7 allows remote attackers to affect availability via vectors related to JAXP, a different vulnerability than CVE-2015-4803 and CVE-2015-4911.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-10-23"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4893/">CVE-2015-4893 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4893">CVE-2015-4893 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/951376">SUSE bug 951376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955131">SUSE bug 955131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821380" comment="java-1.6.0-openjdk-1.6.0.37-1.13.9.4.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821381" comment="java-1.6.0-openjdk-demo-1.6.0.37-1.13.9.4.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821382" comment="java-1.6.0-openjdk-devel-1.6.0.37-1.13.9.4.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821383" comment="java-1.6.0-openjdk-javadoc-1.6.0.37-1.13.9.4.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821384" comment="java-1.6.0-openjdk-src-1.6.0.37-1.13.9.4.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821325" comment="java-1.7.0-openjdk-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821326" comment="java-1.7.0-openjdk-accessibility-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821327" comment="java-1.7.0-openjdk-demo-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821328" comment="java-1.7.0-openjdk-devel-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821329" comment="java-1.7.0-openjdk-headless-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821330" comment="java-1.7.0-openjdk-javadoc-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821331" comment="java-1.7.0-openjdk-src-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821318" comment="java-1.8.0-openjdk-1.8.0.65-2.b17.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821319" comment="java-1.8.0-openjdk-accessibility-1.8.0.65-2.b17.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821320" comment="java-1.8.0-openjdk-demo-1.8.0.65-2.b17.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821321" comment="java-1.8.0-openjdk-devel-1.8.0.65-2.b17.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821322" comment="java-1.8.0-openjdk-headless-1.8.0.65-2.b17.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821323" comment="java-1.8.0-openjdk-javadoc-1.8.0.65-2.b17.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821324" comment="java-1.8.0-openjdk-src-1.8.0.65-2.b17.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154903" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4903</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4903" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4903" ref_url="https://www.suse.com/security/cve/CVE-2015-4903" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1874-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1874-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001800.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1902-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FVL7UVPKWLVFRYUMLIOO3LSOJPPDB3EY/#FVL7UVPKWLVFRYUMLIOO3LSOJPPDB3EY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1905-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JH2ZVFKXVEWZYMCTHL2R42O642L6WS4X/#JH2ZVFKXVEWZYMCTHL2R42O642L6WS4X" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1906-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PA36MR3V23DPT2LWVZIDDRORX3X2W2WE/#PA36MR3V23DPT2LWVZIDDRORX3X2W2WE" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1971-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SCB7TEPDMKXAYGESXLRMCLSHNRHRZIJA/#SCB7TEPDMKXAYGESXLRMCLSHNRHRZIJA" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EM5IRJXZE66HIX564A56RBKHOFXINXH2/#EM5IRJXZE66HIX564A56RBKHOFXINXH2" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality via vectors related to RMI.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-10-23"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4903/">CVE-2015-4903 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4903">CVE-2015-4903 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/951376">SUSE bug 951376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955131">SUSE bug 955131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821380" comment="java-1.6.0-openjdk-1.6.0.37-1.13.9.4.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821381" comment="java-1.6.0-openjdk-demo-1.6.0.37-1.13.9.4.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821382" comment="java-1.6.0-openjdk-devel-1.6.0.37-1.13.9.4.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821383" comment="java-1.6.0-openjdk-javadoc-1.6.0.37-1.13.9.4.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821384" comment="java-1.6.0-openjdk-src-1.6.0.37-1.13.9.4.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821325" comment="java-1.7.0-openjdk-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821326" comment="java-1.7.0-openjdk-accessibility-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821327" comment="java-1.7.0-openjdk-demo-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821328" comment="java-1.7.0-openjdk-devel-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821329" comment="java-1.7.0-openjdk-headless-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821330" comment="java-1.7.0-openjdk-javadoc-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821331" comment="java-1.7.0-openjdk-src-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821318" comment="java-1.8.0-openjdk-1.8.0.65-2.b17.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821319" comment="java-1.8.0-openjdk-accessibility-1.8.0.65-2.b17.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821320" comment="java-1.8.0-openjdk-demo-1.8.0.65-2.b17.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821321" comment="java-1.8.0-openjdk-devel-1.8.0.65-2.b17.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821322" comment="java-1.8.0-openjdk-headless-1.8.0.65-2.b17.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821323" comment="java-1.8.0-openjdk-javadoc-1.8.0.65-2.b17.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821324" comment="java-1.8.0-openjdk-src-1.8.0.65-2.b17.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154911" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4911</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4911" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4911" ref_url="https://www.suse.com/security/cve/CVE-2015-4911" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1874-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1874-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001800.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1902-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FVL7UVPKWLVFRYUMLIOO3LSOJPPDB3EY/#FVL7UVPKWLVFRYUMLIOO3LSOJPPDB3EY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1905-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JH2ZVFKXVEWZYMCTHL2R42O642L6WS4X/#JH2ZVFKXVEWZYMCTHL2R42O642L6WS4X" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1906-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PA36MR3V23DPT2LWVZIDDRORX3X2W2WE/#PA36MR3V23DPT2LWVZIDDRORX3X2W2WE" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1971-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SCB7TEPDMKXAYGESXLRMCLSHNRHRZIJA/#SCB7TEPDMKXAYGESXLRMCLSHNRHRZIJA" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EM5IRJXZE66HIX564A56RBKHOFXINXH2/#EM5IRJXZE66HIX564A56RBKHOFXINXH2" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60; Java SE Embedded 8u51; and JRockit R28.3.7 allows remote attackers to affect availability via vectors related to JAXP, a different vulnerability than CVE-2015-4803 and CVE-2015-4893.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-11-02"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4911/">CVE-2015-4911 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4911">CVE-2015-4911 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/951376">SUSE bug 951376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955131">SUSE bug 955131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821380" comment="java-1.6.0-openjdk-1.6.0.37-1.13.9.4.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821381" comment="java-1.6.0-openjdk-demo-1.6.0.37-1.13.9.4.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821382" comment="java-1.6.0-openjdk-devel-1.6.0.37-1.13.9.4.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821383" comment="java-1.6.0-openjdk-javadoc-1.6.0.37-1.13.9.4.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821384" comment="java-1.6.0-openjdk-src-1.6.0.37-1.13.9.4.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821325" comment="java-1.7.0-openjdk-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821326" comment="java-1.7.0-openjdk-accessibility-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821327" comment="java-1.7.0-openjdk-demo-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821328" comment="java-1.7.0-openjdk-devel-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821329" comment="java-1.7.0-openjdk-headless-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821330" comment="java-1.7.0-openjdk-javadoc-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821331" comment="java-1.7.0-openjdk-src-1.7.0.91-2.6.2.1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821318" comment="java-1.8.0-openjdk-1.8.0.65-2.b17.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821319" comment="java-1.8.0-openjdk-accessibility-1.8.0.65-2.b17.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821320" comment="java-1.8.0-openjdk-demo-1.8.0.65-2.b17.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821321" comment="java-1.8.0-openjdk-devel-1.8.0.65-2.b17.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821322" comment="java-1.8.0-openjdk-headless-1.8.0.65-2.b17.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821323" comment="java-1.8.0-openjdk-javadoc-1.8.0.65-2.b17.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821324" comment="java-1.8.0-openjdk-src-1.8.0.65-2.b17.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154913" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4913</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4913" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4913" ref_url="https://www.suse.com/security/cve/CVE-2015-4913" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001838.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2243-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CG5LJLU356KG55PZAGA4KDAMICLY5O5L/#CG5LJLU356KG55PZAGA4KDAMICLY5O5L" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2244-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JWKCJSXYRA3CMFTZUZBJDMPHRAAXTHPE/#JWKCJSXYRA3CMFTZUZBJDMPHRAAXTHPE" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2246-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UNHHC75S6DSYT5A5TM3OWG2HVE26HXSY/#UNHHC75S6DSYT5A5TM3OWG2HVE26HXSY" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier and 5.6.26 and earlier allows remote authenticated users to affect availability via vectors related to Server : DML, a different vulnerability than CVE-2015-4858.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4913/">CVE-2015-4913 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4913">CVE-2015-4913 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958789">SUSE bug 958789</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821941" comment="mariadb-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821942" comment="mariadb-bench-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821943" comment="mariadb-devel-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821944" comment="mariadb-embedded-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821945" comment="mariadb-embedded-devel-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821946" comment="mariadb-libs-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821947" comment="mariadb-server-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821948" comment="mariadb-test-5.5.47-1.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155073" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5073</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5073" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5073" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5073" ref_url="https://www.suse.com/security/cve/CVE-2015-5073" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the find_fixedlength function in pcre_compile.c in PCRE before 8.38 allows remote attackers to cause a denial of service (crash) or obtain sensitive information from heap memory and possibly bypass the ASLR protection mechanism via a crafted regular expression with an excess closing parenthesis.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-04-20"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5073/">CVE-2015-5073 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5073">CVE-2015-5073 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/936227">SUSE bug 936227</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822065" comment="pcre-8.32-15.el7_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822066" comment="pcre-devel-8.32-15.el7_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822067" comment="pcre-static-8.32-15.el7_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822068" comment="pcre-tools-8.32-15.el7_2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155154" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5154</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5154" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5154" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5154" ref_url="https://www.suse.com/security/cve/CVE-2015-5154" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001509.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001543.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1409-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001544.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001547.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001550.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001559.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1479-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001743.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1964-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IDFPIHUORGRCSRYB743FA3OE4NKVH2VB/#IDFPIHUORGRCSRYB743FA3OE4NKVH2VB" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2003-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BQNNLOO42C2AJVHL72XWPCAH7YOGFT6Y/#BQNNLOO42C2AJVHL72XWPCAH7YOGFT6Y" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the IDE subsystem in QEMU, as used in Xen 4.5.x and earlier, when the container has a CDROM drive enabled, allows local guest users to execute arbitrary code on the host via unspecified ATAPI commands.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5154/">CVE-2015-5154 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5154">CVE-2015-5154 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/938344">SUSE bug 938344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950367">SUSE bug 950367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821178" comment="libcacard-1.5.3-86.el7_1.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821179" comment="libcacard-devel-1.5.3-86.el7_1.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821180" comment="libcacard-tools-1.5.3-86.el7_1.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821181" comment="qemu-img-1.5.3-86.el7_1.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821182" comment="qemu-kvm-1.5.3-86.el7_1.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821183" comment="qemu-kvm-common-1.5.3-86.el7_1.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821184" comment="qemu-kvm-tools-1.5.3-86.el7_1.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155156" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5156</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5156" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5156" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5156" ref_url="https://www.suse.com/security/cve/CVE-2015-5156" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004055.html" source="SUSE-SU"/>
    <description>
    The virtnet_probe function in drivers/net/virtio_net.c in the Linux kernel before 4.2 attempts to support a FRAGLIST feature without proper memory allocation, which allows guest OS users to cause a denial of service (buffer overflow and memory corruption) via a crafted sequence of fragmented packets.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5156/">CVE-2015-5156 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5156">CVE-2015-5156 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1091815">SUSE bug 1091815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123903">SUSE bug 1123903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940776">SUSE bug 940776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945048">SUSE bug 945048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951638">SUSE bug 951638</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821344" comment="kernel-3.10.0-229.20.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821345" comment="kernel-abi-whitelists-3.10.0-229.20.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821346" comment="kernel-debug-3.10.0-229.20.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821349" comment="kernel-doc-3.10.0-229.20.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821350" comment="kernel-headers-3.10.0-229.20.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821351" comment="kernel-tools-3.10.0-229.20.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821352" comment="kernel-tools-libs-3.10.0-229.20.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821354" comment="perf-3.10.0-229.20.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821355" comment="python-perf-3.10.0-229.20.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155157" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5157</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5157" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5157" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5157" ref_url="https://www.suse.com/security/cve/CVE-2015-5157" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001855.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OC7663UNXLKFWJKPITRGQNF4FU4KJWNK/#OC7663UNXLKFWJKPITRGQNF4FU4KJWNK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0318-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7PLUD6GJFLZ2LR3VZPLUZ5KPDX3EVFZS/#7PLUD6GJFLZ2LR3VZPLUZ5KPDX3EVFZS" source="SUSE-SU"/>
    <description>
    arch/x86/entry/entry_64.S in the Linux kernel before 4.1.6 on the x86_64 platform mishandles IRET faults in processing NMIs that occurred during userspace execution, which might allow local users to gain privileges by triggering an NMI.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-5157/">CVE-2015-5157 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5157">CVE-2015-5157 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1072204">SUSE bug 1072204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115893">SUSE bug 1115893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937969">SUSE bug 937969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937970">SUSE bug 937970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938706">SUSE bug 938706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939207">SUSE bug 939207</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821801" comment="kernel-3.10.0-327.10.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821802" comment="kernel-abi-whitelists-3.10.0-327.10.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821803" comment="kernel-debug-3.10.0-327.10.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821806" comment="kernel-doc-3.10.0-327.10.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821807" comment="kernel-headers-3.10.0-327.10.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821808" comment="kernel-tools-3.10.0-327.10.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821809" comment="kernel-tools-libs-3.10.0-327.10.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821811" comment="perf-3.10.0-327.10.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821812" comment="python-perf-3.10.0-327.10.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155160" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5160</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5160" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5160" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5160" ref_url="https://www.suse.com/security/cve/CVE-2015-5160" source="SUSE CVE"/>
    <description>
    libvirt before 2.2 includes Ceph credentials on the qemu command line when using RADOS Block Device (aka RBD), which allows local users to obtain sensitive information via a process listing.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5160/">CVE-2015-5160 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5160">CVE-2015-5160 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/939348">SUSE bug 939348</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822416" comment="libvirt-2.0.0-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822417" comment="libvirt-client-2.0.0-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822418" comment="libvirt-daemon-2.0.0-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822419" comment="libvirt-daemon-config-network-2.0.0-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822420" comment="libvirt-daemon-config-nwfilter-2.0.0-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822421" comment="libvirt-daemon-driver-interface-2.0.0-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822422" comment="libvirt-daemon-driver-lxc-2.0.0-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822423" comment="libvirt-daemon-driver-network-2.0.0-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822424" comment="libvirt-daemon-driver-nodedev-2.0.0-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822425" comment="libvirt-daemon-driver-nwfilter-2.0.0-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822426" comment="libvirt-daemon-driver-qemu-2.0.0-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822427" comment="libvirt-daemon-driver-secret-2.0.0-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822428" comment="libvirt-daemon-driver-storage-2.0.0-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822429" comment="libvirt-daemon-kvm-2.0.0-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822430" comment="libvirt-daemon-lxc-2.0.0-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822431" comment="libvirt-devel-2.0.0-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822432" comment="libvirt-docs-2.0.0-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822433" comment="libvirt-lock-sanlock-2.0.0-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822434" comment="libvirt-login-shell-2.0.0-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822435" comment="libvirt-nss-2.0.0-10.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155165" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5165</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5165" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5165" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5165" ref_url="https://www.suse.com/security/cve/CVE-2015-5165" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1404-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001543.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001547.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1479-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001605.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1964-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IDFPIHUORGRCSRYB743FA3OE4NKVH2VB/#IDFPIHUORGRCSRYB743FA3OE4NKVH2VB" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2003-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BQNNLOO42C2AJVHL72XWPCAH7YOGFT6Y/#BQNNLOO42C2AJVHL72XWPCAH7YOGFT6Y" source="SUSE-SU"/>
    <description>
    The C+ mode offload emulation in the RTL8139 network card device model in QEMU, as used in Xen 4.5.x and earlier, allows remote attackers to read process heap memory via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2015-5165/">CVE-2015-5165 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5165">CVE-2015-5165 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/939712">SUSE bug 939712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950367">SUSE bug 950367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821299" comment="libcacard-1.5.3-86.el7_1.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821300" comment="libcacard-devel-1.5.3-86.el7_1.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821301" comment="libcacard-tools-1.5.3-86.el7_1.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821302" comment="qemu-img-1.5.3-86.el7_1.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821303" comment="qemu-kvm-1.5.3-86.el7_1.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821304" comment="qemu-kvm-common-1.5.3-86.el7_1.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821305" comment="qemu-kvm-tools-1.5.3-86.el7_1.6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155174" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5174</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5174" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5174" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5174" ref_url="https://www.suse.com/security/cve/CVE-2015-5174" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001960.html" source="SUSE-SU"/>
		<reference ref_id="TID7017401" ref_url="https://www.suse.com/support/kb/doc/?id=7017401" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0865-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J2YPI4F6E4ZO2KQ6XN55WTMWMICRAMNY/#J2YPI4F6E4ZO2KQ6XN55WTMWMICRAMNY" source="SUSE-SU"/>
    <description>
    Directory traversal vulnerability in RequestUtil.java in Apache Tomcat 6.x before 6.0.45, 7.x before 7.0.65, and 8.x before 8.0.27 allows remote authenticated users to bypass intended SecurityManager restrictions and list a parent directory via a /.. (slash dot dot) in a pathname used by a web application in a getResource, getResourceAsStream, or getResourcePaths call, as demonstrated by the $CATALINA_BASE/webapps directory.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5174/">CVE-2015-5174 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5174">CVE-2015-5174 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/967967">SUSE bug 967967</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822586" comment="tomcat-7.0.69-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822587" comment="tomcat-admin-webapps-7.0.69-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822588" comment="tomcat-docs-webapp-7.0.69-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822589" comment="tomcat-el-2.2-api-7.0.69-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822590" comment="tomcat-javadoc-7.0.69-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822591" comment="tomcat-jsp-2.2-api-7.0.69-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822592" comment="tomcat-jsvc-7.0.69-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822593" comment="tomcat-lib-7.0.69-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822594" comment="tomcat-servlet-3.0-api-7.0.69-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822595" comment="tomcat-webapps-7.0.69-10.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5180</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5180" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5180" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5180" ref_url="https://www.suse.com/security/cve/CVE-2015-5180" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2883-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005635.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011984.html" source="SUSE-SU"/>
    <description>
    res_query in libresolv in glibc before 2.25 allows remote attackers to cause a denial of service (NULL pointer dereference and process crash).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-5180/">CVE-2015-5180 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5180">CVE-2015-5180 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1123874">SUSE bug 1123874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215582">SUSE bug 1215582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/941234">SUSE bug 941234</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824075" comment="glibc-2.17-222.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824076" comment="glibc-common-2.17-222.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824077" comment="glibc-devel-2.17-222.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824078" comment="glibc-headers-2.17-222.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824079" comment="glibc-static-2.17-222.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824080" comment="glibc-utils-2.17-222.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824081" comment="nscd-2.17-222.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155189" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5189</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5189" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5189" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5189" ref_url="https://www.suse.com/security/cve/CVE-2015-5189" source="SUSE CVE"/>
    <description>
    Race condition in pcsd in PCS 0.9.139 and earlier uses a global variable to validate usernames, which allows remote authenticated users to gain privileges by sending a command that is checked for security after another user is authenticated.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5189/">CVE-2015-5189 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5189">CVE-2015-5189 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821259" comment="pcs-0.9.137-13.el7_1.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821260" comment="python-clufter-0.9.137-13.el7_1.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155190" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5190</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5190" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5190" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5190" ref_url="https://www.suse.com/security/cve/CVE-2015-5190" source="SUSE CVE"/>
    <description>
    The pcsd web UI in PCS 0.9.139 and earlier allows remote authenticated users to execute arbitrary commands via "escape characters" in a URL.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5190/">CVE-2015-5190 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5190">CVE-2015-5190 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821259" comment="pcs-0.9.137-13.el7_1.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821260" comment="python-clufter-0.9.137-13.el7_1.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155194" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5194</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5194" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5194" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5194" ref_url="https://www.suse.com/security/cve/CVE-2015-5194" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002215.html" source="SUSE-SU"/>
    <description>
    The log_config_command function in ntp_parser.y in ntpd in NTP before 4.2.7p42 allows remote attackers to cause a denial of service (ntpd crash) via crafted logconfig commands.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5194/">CVE-2015-5194 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5194">CVE-2015-5194 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/943216">SUSE bug 943216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943218">SUSE bug 943218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943219">SUSE bug 943219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943221">SUSE bug 943221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822482" comment="ntp-4.2.6p5-25.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822483" comment="ntp-doc-4.2.6p5-25.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822484" comment="ntp-perl-4.2.6p5-25.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822485" comment="ntpdate-4.2.6p5-25.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822486" comment="sntp-4.2.6p5-25.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155195" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5195</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5195" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5195" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5195" ref_url="https://www.suse.com/security/cve/CVE-2015-5195" source="SUSE CVE"/>
    <description>
    ntp_openssl.m4 in ntpd in NTP before 4.2.7p112 allows remote attackers to cause a denial of service (segmentation fault) via a crafted statistics or filegen configuration command that is not enabled during compilation.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5195/">CVE-2015-5195 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5195">CVE-2015-5195 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/943216">SUSE bug 943216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943218">SUSE bug 943218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943219">SUSE bug 943219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943221">SUSE bug 943221</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822482" comment="ntp-4.2.6p5-25.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822483" comment="ntp-doc-4.2.6p5-25.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822484" comment="ntp-perl-4.2.6p5-25.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822485" comment="ntpdate-4.2.6p5-25.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822486" comment="sntp-4.2.6p5-25.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155196" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5196</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5196" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5196" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5196" ref_url="https://www.suse.com/security/cve/CVE-2015-5196" source="SUSE CVE"/>
    <description>
    DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2015-7703. Reason: This candidate is a reservation duplicate of CVE-2015-7703. Notes: All CVE users should reference CVE-2015-7703 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-09"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5196/">CVE-2015-5196 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5196">CVE-2015-5196 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1010964">SUSE bug 1010964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943216">SUSE bug 943216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943218">SUSE bug 943218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943219">SUSE bug 943219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943221">SUSE bug 943221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951608">SUSE bug 951608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992991">SUSE bug 992991</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822482" comment="ntp-4.2.6p5-25.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822483" comment="ntp-doc-4.2.6p5-25.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822484" comment="ntp-perl-4.2.6p5-25.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822485" comment="ntpdate-4.2.6p5-25.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822486" comment="sntp-4.2.6p5-25.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155203" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5203</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5203" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5203" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5203" ref_url="https://www.suse.com/security/cve/CVE-2015-5203" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002399.html" source="SUSE-SU"/>
    <description>
    Double free vulnerability in the jasper_image_stop_load function in JasPer 1.900.17 allows remote attackers to cause a denial of service (crash) via a crafted JPEG 2000 image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-07"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-5203/">CVE-2015-5203 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5203">CVE-2015-5203 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/941919">SUSE bug 941919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942553">SUSE bug 942553</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822979" comment="jasper-1.900.1-30.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822980" comment="jasper-devel-1.900.1-30.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822981" comment="jasper-libs-1.900.1-30.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822982" comment="jasper-utils-1.900.1-30.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155219" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5219</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5219" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5219" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5219" ref_url="https://www.suse.com/security/cve/CVE-2015-5219" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002589.html" source="SUSE-SU"/>
    <description>
    The ULOGTOD function in ntp.d in SNTP before 4.2.7p366 does not properly perform type conversions from a precision value to a double, which allows remote attackers to cause a denial of service (infinite loop) via a crafted NTP packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5219/">CVE-2015-5219 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5219">CVE-2015-5219 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1010964">SUSE bug 1010964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943216">SUSE bug 943216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943218">SUSE bug 943218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943219">SUSE bug 943219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943221">SUSE bug 943221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822482" comment="ntp-4.2.6p5-25.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822483" comment="ntp-doc-4.2.6p5-25.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822484" comment="ntp-perl-4.2.6p5-25.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822485" comment="ntpdate-4.2.6p5-25.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822486" comment="sntp-4.2.6p5-25.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155221" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5221</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5221" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5221" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5221" ref_url="https://www.suse.com/security/cve/CVE-2015-5221" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002399.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the mif_process_cmpt function in libjasper/mif/mif_cod.c in the JasPer JPEG-2000 library before 1.900.2 allows remote attackers to cause a denial of service (crash) via a crafted JPEG 2000 image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-08"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-5221/">CVE-2015-5221 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5221">CVE-2015-5221 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942553">SUSE bug 942553</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822979" comment="jasper-1.900.1-30.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822980" comment="jasper-devel-1.900.1-30.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822981" comment="jasper-libs-1.900.1-30.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822982" comment="jasper-utils-1.900.1-30.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155229" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5229</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5229" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5229" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5229" ref_url="https://www.suse.com/security/cve/CVE-2015-5229" source="SUSE CVE"/>
    <description>
    The calloc function in the glibc package in Red Hat Enterprise Linux (RHEL) 6.7 and 7.2 does not properly initialize memory areas, which might allow context-dependent attackers to cause a denial of service (hang or crash) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-04-17"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5229/">CVE-2015-5229 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5229">CVE-2015-5229 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/943015">SUSE bug 943015</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821794" comment="glibc-2.17-106.el7_2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821795" comment="glibc-common-2.17-106.el7_2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821796" comment="glibc-devel-2.17-106.el7_2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821797" comment="glibc-headers-2.17-106.el7_2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821798" comment="glibc-static-2.17-106.el7_2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821799" comment="glibc-utils-2.17-106.el7_2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821800" comment="nscd-2.17-106.el7_2.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155252" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5252</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5252" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5252" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5252" ref_url="https://www.suse.com/security/cve/CVE-2015-5252" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2304-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001809.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2354-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NE5KB3JIPNDCF6QIVTP43XPWWH3N26Q7/#NE5KB3JIPNDCF6QIVTP43XPWWH3N26Q7" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2356-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MHQQDJ3M5EHLUGFQCVVIKBPNUJWLEV5Y/#MHQQDJ3M5EHLUGFQCVVIKBPNUJWLEV5Y" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1064-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/B7VW7SOZTMI4RQKFXAOX457XVPBRHQR3/#B7VW7SOZTMI4RQKFXAOX457XVPBRHQR3" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1106-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6BJWKRWY53KC46JMOYJSXTBEZC3KCJRV/#6BJWKRWY53KC46JMOYJSXTBEZC3KCJRV" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1107-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M3WNN5WVCJIGH6DFBT26M6LTZ7KM54R7/#M3WNN5WVCJIGH6DFBT26M6LTZ7KM54R7" source="SUSE-SU"/>
    <description>
    vfs.c in smbd in Samba 3.x and 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, when share names with certain substring relationships exist, allows remote attackers to bypass intended file-access restrictions via a symlink that points outside of a share.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5252/">CVE-2015-5252 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5252">CVE-2015-5252 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/958582">SUSE bug 958582</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821674" comment="ctdb-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821675" comment="ctdb-devel-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821676" comment="ctdb-tests-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821677" comment="libsmbclient-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821678" comment="libsmbclient-devel-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821679" comment="libwbclient-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821680" comment="libwbclient-devel-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821681" comment="samba-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821682" comment="samba-client-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821683" comment="samba-client-libs-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821684" comment="samba-common-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821685" comment="samba-common-libs-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821686" comment="samba-common-tools-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821687" comment="samba-dc-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821688" comment="samba-dc-libs-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821689" comment="samba-devel-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821690" comment="samba-libs-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821691" comment="samba-pidl-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821692" comment="samba-python-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821693" comment="samba-test-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821694" comment="samba-test-devel-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821695" comment="samba-test-libs-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821696" comment="samba-vfs-glusterfs-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821697" comment="samba-winbind-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821698" comment="samba-winbind-clients-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821699" comment="samba-winbind-krb5-locator-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821700" comment="samba-winbind-modules-4.2.3-11.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155260" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5260</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5260" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5260" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5260" ref_url="https://www.suse.com/security/cve/CVE-2015-5260" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002108.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in SPICE before 0.12.6 allows guest OS users to cause a denial of service (heap-based memory corruption and QEMU-KVM crash) or possibly execute arbitrary code on the host via QXL commands related to the surface_id parameter.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-5260/">CVE-2015-5260 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5260">CVE-2015-5260 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/944787">SUSE bug 944787</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821313" comment="spice-server-0.12.4-9.el7_1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821314" comment="spice-server-devel-0.12.4-9.el7_1.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155261" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5261</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5261" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5261" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5261" ref_url="https://www.suse.com/security/cve/CVE-2015-5261" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002108.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in SPICE before 0.12.6 allows guest OS users to read and write to arbitrary memory locations on the host via guest QXL commands related to surface creation.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-04-15"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2015-5261/">CVE-2015-5261 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5261">CVE-2015-5261 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/948976">SUSE bug 948976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982386">SUSE bug 982386</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821313" comment="spice-server-0.12.4-9.el7_1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821314" comment="spice-server-devel-0.12.4-9.el7_1.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155273" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5273</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5273" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5273" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5273" ref_url="https://www.suse.com/security/cve/CVE-2015-5273" source="SUSE CVE"/>
    <description>
    The abrt-action-install-debuginfo-to-abrt-cache help program in Automatic Bug Reporting Tool (ABRT) before 2.7.1 allows local users to write to arbitrary files via a symlink attack on unpacked.cpio in a pre-created directory with a predictable name in /var/tmp.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5273/">CVE-2015-5273 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5273">CVE-2015-5273 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821568" comment="abrt-2.1.11-35.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821569" comment="abrt-addon-ccpp-2.1.11-35.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821570" comment="abrt-addon-kerneloops-2.1.11-35.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821571" comment="abrt-addon-pstoreoops-2.1.11-35.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821572" comment="abrt-addon-python-2.1.11-35.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821573" comment="abrt-addon-upload-watch-2.1.11-35.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821574" comment="abrt-addon-vmcore-2.1.11-35.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821575" comment="abrt-addon-xorg-2.1.11-35.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821576" comment="abrt-cli-2.1.11-35.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821577" comment="abrt-console-notification-2.1.11-35.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821578" comment="abrt-dbus-2.1.11-35.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821579" comment="abrt-desktop-2.1.11-35.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821580" comment="abrt-devel-2.1.11-35.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821581" comment="abrt-gui-2.1.11-35.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821582" comment="abrt-gui-devel-2.1.11-35.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821583" comment="abrt-gui-libs-2.1.11-35.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821584" comment="abrt-libs-2.1.11-35.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821585" comment="abrt-python-2.1.11-35.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821586" comment="abrt-python-doc-2.1.11-35.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821587" comment="abrt-retrace-client-2.1.11-35.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821588" comment="abrt-tui-2.1.11-35.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821589" comment="libreport-2.1.11-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821590" comment="libreport-anaconda-2.1.11-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821591" comment="libreport-cli-2.1.11-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821592" comment="libreport-compat-2.1.11-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821593" comment="libreport-devel-2.1.11-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821594" comment="libreport-filesystem-2.1.11-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821595" comment="libreport-gtk-2.1.11-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821596" comment="libreport-gtk-devel-2.1.11-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821597" comment="libreport-newt-2.1.11-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821598" comment="libreport-plugin-bugzilla-2.1.11-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821599" comment="libreport-plugin-kerneloops-2.1.11-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821600" comment="libreport-plugin-logger-2.1.11-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821601" comment="libreport-plugin-mailx-2.1.11-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821602" comment="libreport-plugin-reportuploader-2.1.11-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821603" comment="libreport-python-2.1.11-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821604" comment="libreport-web-2.1.11-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821605" comment="libreport-web-devel-2.1.11-31.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155277" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5277</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5277" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5277" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5277" ref_url="https://www.suse.com/security/cve/CVE-2015-5277" source="SUSE CVE"/>
    <description>
    The get_contents function in nss_files/files-XXX.c in the Name Service Switch (NSS) in GNU C Library (aka glibc or libc6) before 2.20 might allow local users to cause a denial of service (heap corruption) or gain privileges via a long line in the NSS files database.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5277/">CVE-2015-5277 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5277">CVE-2015-5277 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1123874">SUSE bug 1123874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945830">SUSE bug 945830</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821439" comment="glibc-2.17-106.el7_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821440" comment="glibc-common-2.17-106.el7_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821441" comment="glibc-devel-2.17-106.el7_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821442" comment="glibc-headers-2.17-106.el7_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821443" comment="glibc-static-2.17-106.el7_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821444" comment="glibc-utils-2.17-106.el7_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821445" comment="nscd-2.17-106.el7_2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155281" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5281</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5281" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5281" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5281" ref_url="https://www.suse.com/security/cve/CVE-2015-5281" source="SUSE CVE"/>
    <description>
    The grub2 package before 2.02-0.29 in Red Hat Enterprise Linux (RHEL) 7, when used on UEFI systems, allows local users to bypass intended Secure Boot restrictions and execute non-verified code via a crafted (1) multiboot or (2) multiboot2 module in the configuration file or physically proximate attackers to bypass intended Secure Boot restrictions and execute non-verified code via the (3) boot menu.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5281/">CVE-2015-5281 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5281">CVE-2015-5281 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821559" comment="grub2-2.02-0.29.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821560" comment="grub2-efi-2.02-0.29.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821561" comment="grub2-efi-modules-2.02-0.29.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821562" comment="grub2-tools-2.02-0.29.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155283" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5283</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5283" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5283" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5283" ref_url="https://www.suse.com/security/cve/CVE-2015-5283" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001718.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1842-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/52CT3NPGIEFS3FRUZ5D6HC6XZML63T2K/#52CT3NPGIEFS3FRUZ5D6HC6XZML63T2K" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OC7663UNXLKFWJKPITRGQNF4FU4KJWNK/#OC7663UNXLKFWJKPITRGQNF4FU4KJWNK" source="SUSE-SU"/>
    <description>
    The sctp_init function in net/sctp/protocol.c in the Linux kernel before 4.2.3 has an incorrect sequence of protocol-initialization steps, which allows local users to cause a denial of service (panic or memory corruption) by creating SCTP sockets before all of the steps have finished.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5283/">CVE-2015-5283 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5283">CVE-2015-5283 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/947155">SUSE bug 947155</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821413" comment="kernel-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821414" comment="kernel-abi-whitelists-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821415" comment="kernel-debug-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821418" comment="kernel-doc-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821419" comment="kernel-headers-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821420" comment="kernel-tools-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821421" comment="kernel-tools-libs-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821423" comment="perf-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821424" comment="python-perf-3.10.0-327.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155287" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5287</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5287" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5287" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5287" ref_url="https://www.suse.com/security/cve/CVE-2015-5287" source="SUSE CVE"/>
    <description>
    The abrt-hook-ccpp help program in Automatic Bug Reporting Tool (ABRT) before 2.7.1 allows local users with certain permissions to gain privileges via a symlink attack on a file with a predictable name, as demonstrated by /var/tmp/abrt/abrt-hax-coredump or /var/spool/abrt/abrt-hax-coredump.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5287/">CVE-2015-5287 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5287">CVE-2015-5287 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821568" comment="abrt-2.1.11-35.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821569" comment="abrt-addon-ccpp-2.1.11-35.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821570" comment="abrt-addon-kerneloops-2.1.11-35.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821571" comment="abrt-addon-pstoreoops-2.1.11-35.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821572" comment="abrt-addon-python-2.1.11-35.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821573" comment="abrt-addon-upload-watch-2.1.11-35.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821574" comment="abrt-addon-vmcore-2.1.11-35.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821575" comment="abrt-addon-xorg-2.1.11-35.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821576" comment="abrt-cli-2.1.11-35.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821577" comment="abrt-console-notification-2.1.11-35.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821578" comment="abrt-dbus-2.1.11-35.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821579" comment="abrt-desktop-2.1.11-35.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821580" comment="abrt-devel-2.1.11-35.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821581" comment="abrt-gui-2.1.11-35.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821582" comment="abrt-gui-devel-2.1.11-35.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821583" comment="abrt-gui-libs-2.1.11-35.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821584" comment="abrt-libs-2.1.11-35.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821585" comment="abrt-python-2.1.11-35.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821586" comment="abrt-python-doc-2.1.11-35.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821587" comment="abrt-retrace-client-2.1.11-35.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821588" comment="abrt-tui-2.1.11-35.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821589" comment="libreport-2.1.11-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821590" comment="libreport-anaconda-2.1.11-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821591" comment="libreport-cli-2.1.11-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821592" comment="libreport-compat-2.1.11-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821593" comment="libreport-devel-2.1.11-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821594" comment="libreport-filesystem-2.1.11-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821595" comment="libreport-gtk-2.1.11-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821596" comment="libreport-gtk-devel-2.1.11-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821597" comment="libreport-newt-2.1.11-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821598" comment="libreport-plugin-bugzilla-2.1.11-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821599" comment="libreport-plugin-kerneloops-2.1.11-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821600" comment="libreport-plugin-logger-2.1.11-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821601" comment="libreport-plugin-mailx-2.1.11-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821602" comment="libreport-plugin-reportuploader-2.1.11-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821603" comment="libreport-python-2.1.11-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821604" comment="libreport-web-2.1.11-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821605" comment="libreport-web-devel-2.1.11-31.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155288" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5288</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5288" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5288" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5288" ref_url="https://www.suse.com/security/cve/CVE-2015-5288" source="SUSE CVE"/>
		<reference ref_id="SUSE-OU-2015:1847-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2015-October/003670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0677-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001914.html" source="SUSE-SU"/>
    <description>
    The crypt function in contrib/pgcrypto in PostgreSQL before 9.0.23, 9.1.x before 9.1.19, 9.2.x before 9.2.14, 9.3.x before 9.3.10, and 9.4.x before 9.4.5 allows attackers to cause a denial of service (server crash) or read arbitrary server memory via a "too-short" salt.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5288/">CVE-2015-5288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5288">CVE-2015-5288 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/949669">SUSE bug 949669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949670">SUSE bug 949670</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821367" comment="postgresql-9.2.14-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821368" comment="postgresql-contrib-9.2.14-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821369" comment="postgresql-devel-9.2.14-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821370" comment="postgresql-docs-9.2.14-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821371" comment="postgresql-libs-9.2.14-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821372" comment="postgresql-plperl-9.2.14-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821373" comment="postgresql-plpython-9.2.14-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821374" comment="postgresql-pltcl-9.2.14-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821375" comment="postgresql-server-9.2.14-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821376" comment="postgresql-test-9.2.14-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821377" comment="postgresql-upgrade-9.2.14-1.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155289" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5289</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5289" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5289" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5289" ref_url="https://www.suse.com/security/cve/CVE-2015-5289" source="SUSE CVE"/>
		<reference ref_id="SUSE-OU-2015:1847-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2015-October/003670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0677-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001914.html" source="SUSE-SU"/>
    <description>
    Multiple stack-based buffer overflows in json parsing in PostgreSQL before 9.3.x before 9.3.10 and 9.4.x before 9.4.5 allow attackers to cause a denial of service (server crash) via unspecified vectors, which are not properly handled in (1) json or (2) jsonb values.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5289/">CVE-2015-5289 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5289">CVE-2015-5289 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/949669">SUSE bug 949669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949670">SUSE bug 949670</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821367" comment="postgresql-9.2.14-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821368" comment="postgresql-contrib-9.2.14-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821369" comment="postgresql-devel-9.2.14-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821370" comment="postgresql-docs-9.2.14-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821371" comment="postgresql-libs-9.2.14-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821372" comment="postgresql-plperl-9.2.14-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821373" comment="postgresql-plpython-9.2.14-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821374" comment="postgresql-pltcl-9.2.14-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821375" comment="postgresql-server-9.2.14-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821376" comment="postgresql-test-9.2.14-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821377" comment="postgresql-upgrade-9.2.14-1.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155292" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5292</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5292" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5292" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5292" ref_url="https://www.suse.com/security/cve/CVE-2015-5292" source="SUSE CVE"/>
    <description>
    Memory leak in the Privilege Attribute Certificate (PAC) responder plugin (sssd_pac_plugin.so) in System Security Services Daemon (SSSD) 1.10 before 1.13.1 allows remote authenticated users to cause a denial of service (memory consumption) via a large number of logins that trigger parsing of PAC blobs during Kerberos authentication.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5292/">CVE-2015-5292 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5292">CVE-2015-5292 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/948819">SUSE bug 948819</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821512" comment="libipa_hbac-1.13.0-40.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821513" comment="libipa_hbac-devel-1.13.0-40.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821514" comment="libsss_idmap-1.13.0-40.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821515" comment="libsss_idmap-devel-1.13.0-40.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821516" comment="libsss_nss_idmap-1.13.0-40.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821517" comment="libsss_nss_idmap-devel-1.13.0-40.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821518" comment="libsss_simpleifp-1.13.0-40.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821519" comment="libsss_simpleifp-devel-1.13.0-40.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821520" comment="python-libipa_hbac-1.13.0-40.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821521" comment="python-libsss_nss_idmap-1.13.0-40.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821522" comment="python-sss-1.13.0-40.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821523" comment="python-sss-murmur-1.13.0-40.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821524" comment="python-sssdconfig-1.13.0-40.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821525" comment="sssd-1.13.0-40.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821526" comment="sssd-ad-1.13.0-40.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821527" comment="sssd-client-1.13.0-40.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821528" comment="sssd-common-1.13.0-40.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821529" comment="sssd-common-pac-1.13.0-40.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821530" comment="sssd-dbus-1.13.0-40.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821531" comment="sssd-ipa-1.13.0-40.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821532" comment="sssd-krb5-1.13.0-40.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821533" comment="sssd-krb5-common-1.13.0-40.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821534" comment="sssd-ldap-1.13.0-40.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821535" comment="sssd-libwbclient-1.13.0-40.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821536" comment="sssd-libwbclient-devel-1.13.0-40.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821537" comment="sssd-proxy-1.13.0-40.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821538" comment="sssd-tools-1.13.0-40.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155296" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5296</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5296" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5296" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5296" ref_url="https://www.suse.com/security/cve/CVE-2015-5296" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2304-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001809.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2354-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NE5KB3JIPNDCF6QIVTP43XPWWH3N26Q7/#NE5KB3JIPNDCF6QIVTP43XPWWH3N26Q7" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2356-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MHQQDJ3M5EHLUGFQCVVIKBPNUJWLEV5Y/#MHQQDJ3M5EHLUGFQCVVIKBPNUJWLEV5Y" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1064-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/B7VW7SOZTMI4RQKFXAOX457XVPBRHQR3/#B7VW7SOZTMI4RQKFXAOX457XVPBRHQR3" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1106-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6BJWKRWY53KC46JMOYJSXTBEZC3KCJRV/#6BJWKRWY53KC46JMOYJSXTBEZC3KCJRV" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1107-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M3WNN5WVCJIGH6DFBT26M6LTZ7KM54R7/#M3WNN5WVCJIGH6DFBT26M6LTZ7KM54R7" source="SUSE-SU"/>
    <description>
    Samba 3.x and 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3 supports connections that are encrypted but unsigned, which allows man-in-the-middle attackers to conduct encrypted-to-unencrypted downgrade attacks by modifying the client-server data stream, related to clidfs.c, libsmb_server.c, and smbXcli_base.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5296/">CVE-2015-5296 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5296">CVE-2015-5296 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1058622">SUSE bug 1058622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958584">SUSE bug 958584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973031">SUSE bug 973031</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821674" comment="ctdb-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821675" comment="ctdb-devel-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821676" comment="ctdb-tests-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821677" comment="libsmbclient-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821678" comment="libsmbclient-devel-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821679" comment="libwbclient-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821680" comment="libwbclient-devel-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821681" comment="samba-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821682" comment="samba-client-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821683" comment="samba-client-libs-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821684" comment="samba-common-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821685" comment="samba-common-libs-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821686" comment="samba-common-tools-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821687" comment="samba-dc-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821688" comment="samba-dc-libs-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821689" comment="samba-devel-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821690" comment="samba-libs-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821691" comment="samba-pidl-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821692" comment="samba-python-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821693" comment="samba-test-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821694" comment="samba-test-devel-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821695" comment="samba-test-libs-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821696" comment="samba-vfs-glusterfs-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821697" comment="samba-winbind-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821698" comment="samba-winbind-clients-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821699" comment="samba-winbind-krb5-locator-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821700" comment="samba-winbind-modules-4.2.3-11.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155299" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5299</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5299" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5299" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5299" ref_url="https://www.suse.com/security/cve/CVE-2015-5299" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2304-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001809.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2354-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NE5KB3JIPNDCF6QIVTP43XPWWH3N26Q7/#NE5KB3JIPNDCF6QIVTP43XPWWH3N26Q7" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2356-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MHQQDJ3M5EHLUGFQCVVIKBPNUJWLEV5Y/#MHQQDJ3M5EHLUGFQCVVIKBPNUJWLEV5Y" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1064-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/B7VW7SOZTMI4RQKFXAOX457XVPBRHQR3/#B7VW7SOZTMI4RQKFXAOX457XVPBRHQR3" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1106-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6BJWKRWY53KC46JMOYJSXTBEZC3KCJRV/#6BJWKRWY53KC46JMOYJSXTBEZC3KCJRV" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1107-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M3WNN5WVCJIGH6DFBT26M6LTZ7KM54R7/#M3WNN5WVCJIGH6DFBT26M6LTZ7KM54R7" source="SUSE-SU"/>
    <description>
    The shadow_copy2_get_shadow_copy_data function in modules/vfs_shadow_copy2.c in Samba 3.x and 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3 does not verify that the DIRECTORY_LIST access right has been granted, which allows remote attackers to access snapshots by visiting a shadow copy directory.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5299/">CVE-2015-5299 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5299">CVE-2015-5299 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/958583">SUSE bug 958583</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821674" comment="ctdb-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821675" comment="ctdb-devel-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821676" comment="ctdb-tests-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821677" comment="libsmbclient-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821678" comment="libsmbclient-devel-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821679" comment="libwbclient-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821680" comment="libwbclient-devel-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821681" comment="samba-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821682" comment="samba-client-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821683" comment="samba-client-libs-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821684" comment="samba-common-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821685" comment="samba-common-libs-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821686" comment="samba-common-tools-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821687" comment="samba-dc-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821688" comment="samba-dc-libs-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821689" comment="samba-devel-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821690" comment="samba-libs-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821691" comment="samba-pidl-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821692" comment="samba-python-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821693" comment="samba-test-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821694" comment="samba-test-devel-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821695" comment="samba-test-libs-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821696" comment="samba-vfs-glusterfs-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821697" comment="samba-winbind-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821698" comment="samba-winbind-clients-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821699" comment="samba-winbind-krb5-locator-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821700" comment="samba-winbind-modules-4.2.3-11.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155300" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5300</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5300" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5300" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5300" ref_url="https://www.suse.com/security/cve/CVE-2015-5300" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002215.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1292-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3TNDHINHCNU765I5S27EQLRF6VZJEADV/#3TNDHINHCNU765I5S27EQLRF6VZJEADV" source="SUSE-SU"/>
    <description>
    The panic_gate check in NTP before 4.2.8p5 is only re-enabled after the first change to the system clock that was greater than 128 milliseconds by default, which allows remote attackers to set NTP to an arbitrary time when started with the -g option, or to alter the time by up to 900 seconds otherwise by responding to an unspecified number of requests from trusted sources, and leveraging a resulting denial of service (abort and restart).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-04-23"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5300/">CVE-2015-5300 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5300">CVE-2015-5300 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/951629">SUSE bug 951629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962624">SUSE bug 962624</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821332" comment="ntp-4.2.6p5-19.el7_1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821333" comment="ntp-doc-4.2.6p5-19.el7_1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821334" comment="ntp-perl-4.2.6p5-19.el7_1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821335" comment="ntpdate-4.2.6p5-19.el7_1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821336" comment="sntp-4.2.6p5-19.el7_1.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155302" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5302</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5302" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5302" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5302" ref_url="https://www.suse.com/security/cve/CVE-2015-5302" source="SUSE CVE"/>
    <description>
    libreport 2.0.7 before 2.6.3 only saves changes to the first file when editing a crash report, which allows remote attackers to obtain sensitive information via unspecified vectors related to the (1) backtrace, (2) cmdline, (3) environ, (4) open_fds, (5) maps, (6) smaps, (7) hostname, (8) remote, (9) ks.cfg, or (10) anaconda-tb file attachment included in a Red Hat Bugzilla bug report.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5302/">CVE-2015-5302 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5302">CVE-2015-5302 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821568" comment="abrt-2.1.11-35.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821569" comment="abrt-addon-ccpp-2.1.11-35.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821570" comment="abrt-addon-kerneloops-2.1.11-35.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821571" comment="abrt-addon-pstoreoops-2.1.11-35.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821572" comment="abrt-addon-python-2.1.11-35.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821573" comment="abrt-addon-upload-watch-2.1.11-35.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821574" comment="abrt-addon-vmcore-2.1.11-35.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821575" comment="abrt-addon-xorg-2.1.11-35.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821576" comment="abrt-cli-2.1.11-35.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821577" comment="abrt-console-notification-2.1.11-35.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821578" comment="abrt-dbus-2.1.11-35.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821579" comment="abrt-desktop-2.1.11-35.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821580" comment="abrt-devel-2.1.11-35.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821581" comment="abrt-gui-2.1.11-35.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821582" comment="abrt-gui-devel-2.1.11-35.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821583" comment="abrt-gui-libs-2.1.11-35.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821584" comment="abrt-libs-2.1.11-35.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821585" comment="abrt-python-2.1.11-35.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821586" comment="abrt-python-doc-2.1.11-35.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821587" comment="abrt-retrace-client-2.1.11-35.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821588" comment="abrt-tui-2.1.11-35.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821589" comment="libreport-2.1.11-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821590" comment="libreport-anaconda-2.1.11-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821591" comment="libreport-cli-2.1.11-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821592" comment="libreport-compat-2.1.11-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821593" comment="libreport-devel-2.1.11-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821594" comment="libreport-filesystem-2.1.11-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821595" comment="libreport-gtk-2.1.11-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821596" comment="libreport-gtk-devel-2.1.11-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821597" comment="libreport-newt-2.1.11-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821598" comment="libreport-plugin-bugzilla-2.1.11-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821599" comment="libreport-plugin-kerneloops-2.1.11-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821600" comment="libreport-plugin-logger-2.1.11-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821601" comment="libreport-plugin-mailx-2.1.11-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821602" comment="libreport-plugin-reportuploader-2.1.11-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821603" comment="libreport-python-2.1.11-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821604" comment="libreport-web-2.1.11-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821605" comment="libreport-web-devel-2.1.11-31.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155307" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5307</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5307" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5307" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5307" ref_url="https://www.suse.com/security/cve/CVE-2015-5307" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002207.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0123-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WTAARVAKQCKIR26HIJTUZQCNJJ7CRNGJ/#WTAARVAKQCKIR26HIJTUZQCNJJ7CRNGJ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0124-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PKFBCJLYM3GQVTBACNHPS6L4SXGP266S/#PKFBCJLYM3GQVTBACNHPS6L4SXGP266S" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0126-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3LZI7C7SN5OGIWRGLROZX45HYK4KCQDQ/#3LZI7C7SN5OGIWRGLROZX45HYK4KCQDQ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OC7663UNXLKFWJKPITRGQNF4FU4KJWNK/#OC7663UNXLKFWJKPITRGQNF4FU4KJWNK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0318-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7PLUD6GJFLZ2LR3VZPLUZ5KPDX3EVFZS/#7PLUD6GJFLZ2LR3VZPLUZ5KPDX3EVFZS" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M3DY3J73NZK532BN4KZEFFGULVYJU3D2/#M3DY3J73NZK532BN4KZEFFGULVYJU3D2" source="SUSE-SU"/>
    <description>
    The KVM subsystem in the Linux kernel through 4.2.6, and Xen 4.3.x through 4.6.x, allows guest OS users to cause a denial of service (host OS panic or hang) by triggering many #AC (aka Alignment Check) exceptions, related to svm.c and vmx.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5307/">CVE-2015-5307 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5307">CVE-2015-5307 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/953527">SUSE bug 953527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954018">SUSE bug 954018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954404">SUSE bug 954404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954405">SUSE bug 954405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962977">SUSE bug 962977</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821615" comment="kernel-3.10.0-327.3.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821616" comment="kernel-abi-whitelists-3.10.0-327.3.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821617" comment="kernel-debug-3.10.0-327.3.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821620" comment="kernel-doc-3.10.0-327.3.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821621" comment="kernel-headers-3.10.0-327.3.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821622" comment="kernel-tools-3.10.0-327.3.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821623" comment="kernel-tools-libs-3.10.0-327.3.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821625" comment="perf-3.10.0-327.3.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821626" comment="python-perf-3.10.0-327.3.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155312" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5312</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5312" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5312" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5312" ref_url="https://www.suse.com/security/cve/CVE-2015-5312" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001948.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14697-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U5YNW74OL2W7SH2XTAVN5TODNFIVFL3Y/" source="SUSE-SU"/>
    <description>
    The xmlStringLenDecodeEntities function in parser.c in libxml2 before 2.9.3 does not properly prevent entity expansion, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted XML data, a different vulnerability than CVE-2014-3660.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5312/">CVE-2015-5312 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5312">CVE-2015-5312 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957105">SUSE bug 957105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959469">SUSE bug 959469</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969769">SUSE bug 969769</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821611" comment="libxml2-2.9.1-6.el7_2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821612" comment="libxml2-devel-2.9.1-6.el7_2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821613" comment="libxml2-python-2.9.1-6.el7_2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821614" comment="libxml2-static-2.9.1-6.el7_2.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155313" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5313</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5313" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5313" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5313" ref_url="https://www.suse.com/security/cve/CVE-2015-5313" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0304-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0931-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001977.html" source="SUSE-SU"/>
    <description>
    Directory traversal vulnerability in the virStorageBackendFileSystemVolCreate function in storage/storage_backend_fs.c in libvirt, when fine-grained Access Control Lists (ACL) are in effect, allows local users with storage_vol:create ACL but not domain:write permission to write to arbitrary files via a .. (dot dot) in a volume name.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5313/">CVE-2015-5313 at SUSE</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5313">CVE-2015-5313 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/953110">SUSE bug 953110</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822416" comment="libvirt-2.0.0-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822417" comment="libvirt-client-2.0.0-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822418" comment="libvirt-daemon-2.0.0-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822419" comment="libvirt-daemon-config-network-2.0.0-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822420" comment="libvirt-daemon-config-nwfilter-2.0.0-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822421" comment="libvirt-daemon-driver-interface-2.0.0-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822422" comment="libvirt-daemon-driver-lxc-2.0.0-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822423" comment="libvirt-daemon-driver-network-2.0.0-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822424" comment="libvirt-daemon-driver-nodedev-2.0.0-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822425" comment="libvirt-daemon-driver-nwfilter-2.0.0-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822426" comment="libvirt-daemon-driver-qemu-2.0.0-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822427" comment="libvirt-daemon-driver-secret-2.0.0-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822428" comment="libvirt-daemon-driver-storage-2.0.0-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822429" comment="libvirt-daemon-kvm-2.0.0-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822430" comment="libvirt-daemon-lxc-2.0.0-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822431" comment="libvirt-devel-2.0.0-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822432" comment="libvirt-docs-2.0.0-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822433" comment="libvirt-lock-sanlock-2.0.0-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822434" comment="libvirt-login-shell-2.0.0-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822435" comment="libvirt-nss-2.0.0-10.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155330" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5330</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5330" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5330" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5330" ref_url="https://www.suse.com/security/cve/CVE-2015-5330" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2304-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001809.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2354-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NE5KB3JIPNDCF6QIVTP43XPWWH3N26Q7/#NE5KB3JIPNDCF6QIVTP43XPWWH3N26Q7" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2356-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MHQQDJ3M5EHLUGFQCVVIKBPNUJWLEV5Y/#MHQQDJ3M5EHLUGFQCVVIKBPNUJWLEV5Y" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1064-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/B7VW7SOZTMI4RQKFXAOX457XVPBRHQR3/#B7VW7SOZTMI4RQKFXAOX457XVPBRHQR3" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1106-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6BJWKRWY53KC46JMOYJSXTBEZC3KCJRV/#6BJWKRWY53KC46JMOYJSXTBEZC3KCJRV" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1107-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M3WNN5WVCJIGH6DFBT26M6LTZ7KM54R7/#M3WNN5WVCJIGH6DFBT26M6LTZ7KM54R7" source="SUSE-SU"/>
    <description>
    ldb before 1.1.24, as used in the AD LDAP server in Samba 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, mishandles string lengths, which allows remote attackers to obtain sensitive information from daemon heap memory by sending crafted packets and then reading (1) an error message or (2) a database value.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-04-19"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5330/">CVE-2015-5330 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5330">CVE-2015-5330 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/958581">SUSE bug 958581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958586">SUSE bug 958586</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821711" comment="ldb-tools-1.1.20-1.el7_2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821712" comment="libldb-1.1.20-1.el7_2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821713" comment="libldb-devel-1.1.20-1.el7_2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821714" comment="pyldb-1.1.20-1.el7_2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821715" comment="pyldb-devel-1.1.20-1.el7_2.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155345" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5345</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5345" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5345" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5345" ref_url="https://www.suse.com/security/cve/CVE-2015-5345" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001960.html" source="SUSE-SU"/>
		<reference ref_id="TID7017401" ref_url="https://www.suse.com/support/kb/doc/?id=7017401" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0865-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J2YPI4F6E4ZO2KQ6XN55WTMWMICRAMNY/#J2YPI4F6E4ZO2KQ6XN55WTMWMICRAMNY" source="SUSE-SU"/>
    <description>
    The Mapper component in Apache Tomcat 6.x before 6.0.45, 7.x before 7.0.68, 8.x before 8.0.30, and 9.x before 9.0.0.M2 processes redirects before considering security constraints and Filters, which allows remote attackers to determine the existence of a directory via a URL that lacks a trailing / (slash) character.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5345/">CVE-2015-5345 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5345">CVE-2015-5345 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/967965">SUSE bug 967965</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822586" comment="tomcat-7.0.69-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822587" comment="tomcat-admin-webapps-7.0.69-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822588" comment="tomcat-docs-webapp-7.0.69-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822589" comment="tomcat-el-2.2-api-7.0.69-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822590" comment="tomcat-javadoc-7.0.69-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822591" comment="tomcat-jsp-2.2-api-7.0.69-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822592" comment="tomcat-jsvc-7.0.69-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822593" comment="tomcat-lib-7.0.69-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822594" comment="tomcat-servlet-3.0-api-7.0.69-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822595" comment="tomcat-webapps-7.0.69-10.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155346" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5346</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5346" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5346" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5346" ref_url="https://www.suse.com/security/cve/CVE-2015-5346" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001957.html" source="SUSE-SU"/>
		<reference ref_id="TID7017401" ref_url="https://www.suse.com/support/kb/doc/?id=7017401" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0865-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J2YPI4F6E4ZO2KQ6XN55WTMWMICRAMNY/#J2YPI4F6E4ZO2KQ6XN55WTMWMICRAMNY" source="SUSE-SU"/>
    <description>
    Session fixation vulnerability in Apache Tomcat 7.x before 7.0.66, 8.x before 8.0.30, and 9.x before 9.0.0.M2, when different session settings are used for deployments of multiple versions of the same web application, might allow remote attackers to hijack web sessions by leveraging use of a requestedSessionSSL field for an unintended request, related to CoyoteAdapter.java and Request.java.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5346/">CVE-2015-5346 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5346">CVE-2015-5346 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/967814">SUSE bug 967814</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822320" comment="tomcat-7.0.54-8.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822321" comment="tomcat-admin-webapps-7.0.54-8.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822322" comment="tomcat-docs-webapp-7.0.54-8.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822323" comment="tomcat-el-2.2-api-7.0.54-8.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822324" comment="tomcat-javadoc-7.0.54-8.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822325" comment="tomcat-jsp-2.2-api-7.0.54-8.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822326" comment="tomcat-jsvc-7.0.54-8.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822327" comment="tomcat-lib-7.0.54-8.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822328" comment="tomcat-servlet-3.0-api-7.0.54-8.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822329" comment="tomcat-webapps-7.0.54-8.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155351" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5351</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5351" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5351" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5351" ref_url="https://www.suse.com/security/cve/CVE-2015-5351" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001957.html" source="SUSE-SU"/>
		<reference ref_id="TID7016795" ref_url="https://www.suse.com/support/kb/doc/?id=7016795" source="SUSE-SU"/>
		<reference ref_id="TID7017401" ref_url="https://www.suse.com/support/kb/doc/?id=7017401" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0865-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J2YPI4F6E4ZO2KQ6XN55WTMWMICRAMNY/#J2YPI4F6E4ZO2KQ6XN55WTMWMICRAMNY" source="SUSE-SU"/>
    <description>
    The (1) Manager and (2) Host Manager applications in Apache Tomcat 7.x before 7.0.68, 8.x before 8.0.31, and 9.x before 9.0.0.M2 establish sessions and send CSRF tokens for arbitrary new requests, which allows remote attackers to bypass a CSRF protection mechanism by using a token.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5351/">CVE-2015-5351 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5351">CVE-2015-5351 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/967812">SUSE bug 967812</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822586" comment="tomcat-7.0.69-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822587" comment="tomcat-admin-webapps-7.0.69-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822588" comment="tomcat-docs-webapp-7.0.69-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822589" comment="tomcat-el-2.2-api-7.0.69-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822590" comment="tomcat-javadoc-7.0.69-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822591" comment="tomcat-jsp-2.2-api-7.0.69-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822592" comment="tomcat-jsvc-7.0.69-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822593" comment="tomcat-lib-7.0.69-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822594" comment="tomcat-servlet-3.0-api-7.0.69-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822595" comment="tomcat-webapps-7.0.69-10.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155364" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5364</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5364" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5364" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5364" ref_url="https://www.suse.com/security/cve/CVE-2015-5364" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1488-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1592-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001596.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001706.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1382-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WK73PLTGJ2J7BSDKZCVOUPKENB4UND7S/#WK73PLTGJ2J7BSDKZCVOUPKENB4UND7S" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OC7663UNXLKFWJKPITRGQNF4FU4KJWNK/#OC7663UNXLKFWJKPITRGQNF4FU4KJWNK" source="SUSE-SU"/>
    <description>
    The (1) udp_recvmsg and (2) udpv6_recvmsg functions in the Linux kernel before 4.0.6 do not properly consider yielding a processor, which allows remote attackers to cause a denial of service (system hang) via incorrect checksums within a UDP packet flood.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5364/">CVE-2015-5364 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5364">CVE-2015-5364 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1115893">SUSE bug 1115893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/781018">SUSE bug 781018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936831">SUSE bug 936831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939276">SUSE bug 939276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945112">SUSE bug 945112</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821287" comment="kernel-3.10.0-229.14.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821288" comment="kernel-abi-whitelists-3.10.0-229.14.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821289" comment="kernel-debug-3.10.0-229.14.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821292" comment="kernel-doc-3.10.0-229.14.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821293" comment="kernel-headers-3.10.0-229.14.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821294" comment="kernel-tools-3.10.0-229.14.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821295" comment="kernel-tools-libs-3.10.0-229.14.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821297" comment="perf-3.10.0-229.14.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821298" comment="python-perf-3.10.0-229.14.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155366" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5366</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5366" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5366" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5366" ref_url="https://www.suse.com/security/cve/CVE-2015-5366" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1488-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1592-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001596.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001706.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1382-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WK73PLTGJ2J7BSDKZCVOUPKENB4UND7S/#WK73PLTGJ2J7BSDKZCVOUPKENB4UND7S" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OC7663UNXLKFWJKPITRGQNF4FU4KJWNK/#OC7663UNXLKFWJKPITRGQNF4FU4KJWNK" source="SUSE-SU"/>
    <description>
    The (1) udp_recvmsg and (2) udpv6_recvmsg functions in the Linux kernel before 4.0.6 provide inappropriate -EAGAIN return values, which allows remote attackers to cause a denial of service (EPOLLET epoll application read outage) via an incorrect checksum in a UDP packet, a different vulnerability than CVE-2015-5364.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5366/">CVE-2015-5366 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5366">CVE-2015-5366 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/781018">SUSE bug 781018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936831">SUSE bug 936831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939276">SUSE bug 939276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945112">SUSE bug 945112</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821287" comment="kernel-3.10.0-229.14.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821288" comment="kernel-abi-whitelists-3.10.0-229.14.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821289" comment="kernel-debug-3.10.0-229.14.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821292" comment="kernel-doc-3.10.0-229.14.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821293" comment="kernel-headers-3.10.0-229.14.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821294" comment="kernel-tools-3.10.0-229.14.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821295" comment="kernel-tools-libs-3.10.0-229.14.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821297" comment="perf-3.10.0-229.14.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821298" comment="python-perf-3.10.0-229.14.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155370" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5370</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5370" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5370" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5370" ref_url="https://www.suse.com/security/cve/CVE-2015-5370" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1022-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1023-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002001.html" source="SUSE-SU"/>
		<reference ref_id="TID7017473" ref_url="https://www.suse.com/support/kb/doc?id=7017473" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1025-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GI2LJ6GRYASP6GSA6YZUDC6SYEK6EUZ6/#GI2LJ6GRYASP6GSA6YZUDC6SYEK6EUZ6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1064-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/B7VW7SOZTMI4RQKFXAOX457XVPBRHQR3/#B7VW7SOZTMI4RQKFXAOX457XVPBRHQR3" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1106-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6BJWKRWY53KC46JMOYJSXTBEZC3KCJRV/#6BJWKRWY53KC46JMOYJSXTBEZC3KCJRV" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1107-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M3WNN5WVCJIGH6DFBT26M6LTZ7KM54R7/#M3WNN5WVCJIGH6DFBT26M6LTZ7KM54R7" source="SUSE-SU"/>
    <description>
    Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 does not properly implement the DCE-RPC layer, which allows remote attackers to perform protocol-downgrade attacks, cause a denial of service (application crash or CPU consumption), or possibly execute arbitrary code on a client system via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-04-18"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5370/">CVE-2015-5370 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5370">CVE-2015-5370 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/936862">SUSE bug 936862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975276">SUSE bug 975276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977416">SUSE bug 977416</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821951" comment="ctdb-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821952" comment="ctdb-devel-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821953" comment="ctdb-tests-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821954" comment="ipa-admintools-4.2.0-15.el7_2.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821955" comment="ipa-client-4.2.0-15.el7_2.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821956" comment="ipa-python-4.2.0-15.el7_2.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821957" comment="ipa-server-4.2.0-15.el7_2.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821958" comment="ipa-server-dns-4.2.0-15.el7_2.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821959" comment="ipa-server-trust-ad-4.2.0-15.el7_2.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821960" comment="ldb-tools-1.1.25-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821961" comment="libldb-1.1.25-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821962" comment="libldb-devel-1.1.25-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821963" comment="libsmbclient-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821964" comment="libsmbclient-devel-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821965" comment="libtalloc-2.1.5-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821966" comment="libtalloc-devel-2.1.5-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821967" comment="libtdb-1.3.8-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821968" comment="libtdb-devel-1.3.8-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821969" comment="libtevent-0.9.26-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821970" comment="libtevent-devel-0.9.26-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821971" comment="libwbclient-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821972" comment="libwbclient-devel-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821973" comment="openchange-2.0-10.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821974" comment="openchange-client-2.0-10.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821975" comment="openchange-devel-2.0-10.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821976" comment="openchange-devel-docs-2.0-10.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821977" comment="pyldb-1.1.25-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821978" comment="pyldb-devel-1.1.25-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821979" comment="pytalloc-2.1.5-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821980" comment="pytalloc-devel-2.1.5-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821981" comment="python-tdb-1.3.8-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821982" comment="python-tevent-0.9.26-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821983" comment="samba-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821984" comment="samba-client-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821985" comment="samba-client-libs-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821986" comment="samba-common-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821987" comment="samba-common-libs-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821988" comment="samba-common-tools-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821989" comment="samba-dc-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821990" comment="samba-dc-libs-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821991" comment="samba-devel-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821992" comment="samba-libs-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821993" comment="samba-pidl-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821994" comment="samba-python-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821995" comment="samba-test-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821996" comment="samba-test-devel-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821997" comment="samba-test-libs-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821998" comment="samba-vfs-glusterfs-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821999" comment="samba-winbind-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822000" comment="samba-winbind-clients-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822001" comment="samba-winbind-krb5-locator-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822002" comment="samba-winbind-modules-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822003" comment="tdb-tools-1.3.8-1.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155477" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5477</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5477" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5477" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5477" ref_url="https://www.suse.com/security/cve/CVE-2015-5477" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1304-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001513.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001514.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0227-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001825.html" source="SUSE-SU"/>
		<reference ref_id="TID7016709" ref_url="https://www.suse.com/support/kb/doc?id=7016709" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1326-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5JYFKBINQKHPJFLKL5BZCPTSO3WP5VFR/#5JYFKBINQKHPJFLKL5BZCPTSO3WP5VFR" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1335-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4IK3TYEVUE7NL53VLRM3W4IAUV2UUTLO/#4IK3TYEVUE7NL53VLRM3W4IAUV2UUTLO" source="SUSE-SU"/>
    <description>
    named in ISC BIND 9.x before 9.9.7-P2 and 9.10.x before 9.10.2-P3 allows remote attackers to cause a denial of service (REQUIRE assertion failure and daemon exit) via TKEY queries.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5477/">CVE-2015-5477 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5477">CVE-2015-5477 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1000362">SUSE bug 1000362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939567">SUSE bug 939567</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980168">SUSE bug 980168</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821188" comment="bind-9.9.4-18.el7_1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821189" comment="bind-chroot-9.9.4-18.el7_1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821190" comment="bind-devel-9.9.4-18.el7_1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821191" comment="bind-libs-9.9.4-18.el7_1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821192" comment="bind-libs-lite-9.9.4-18.el7_1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821193" comment="bind-license-9.9.4-18.el7_1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821194" comment="bind-lite-devel-9.9.4-18.el7_1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821195" comment="bind-sdb-9.9.4-18.el7_1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821196" comment="bind-sdb-chroot-9.9.4-18.el7_1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821197" comment="bind-utils-9.9.4-18.el7_1.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155600" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5600</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5600" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5600" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5600" ref_url="https://www.suse.com/security/cve/CVE-2015-5600" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1547-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1547-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001595.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001650.html" source="SUSE-SU"/>
		<reference ref_id="TID7022096" ref_url="https://www.suse.com/support/kb/doc/?id=7022096" source="SUSE-SU"/>
		<reference ref_id="TID7022102" ref_url="https://www.suse.com/support/kb/doc/?id=7022102" source="SUSE-SU"/>
    <description>
    The kbdint_next_device function in auth2-chall.c in sshd in OpenSSH through 6.9 does not properly restrict the processing of keyboard-interactive devices within a single connection, which makes it easier for remote attackers to conduct brute-force attacks or cause a denial of service (CPU consumption) via a long and duplicative list in the ssh -oKbdInteractiveDevices option, as demonstrated by a modified client that provides a different password for each pam element on this list.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5600/">CVE-2015-5600 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5600">CVE-2015-5600 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1009988">SUSE bug 1009988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074631">SUSE bug 1074631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138392">SUSE bug 1138392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938746">SUSE bug 938746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943006">SUSE bug 943006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943007">SUSE bug 943007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943010">SUSE bug 943010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943504">SUSE bug 943504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945985">SUSE bug 945985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948086">SUSE bug 948086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954457">SUSE bug 954457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957883">SUSE bug 957883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/996040">SUSE bug 996040</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821385" comment="openssh-6.6.1p1-22.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821386" comment="openssh-askpass-6.6.1p1-22.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821387" comment="openssh-clients-6.6.1p1-22.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821388" comment="openssh-keycat-6.6.1p1-22.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821389" comment="openssh-ldap-6.6.1p1-22.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821390" comment="openssh-server-6.6.1p1-22.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821391" comment="openssh-server-sysvinit-6.6.1p1-22.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821392" comment="pam_ssh_agent_auth-0.9.3-9.22.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155621" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5621</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5621" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5621" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5621" ref_url="https://www.suse.com/security/cve/CVE-2015-5621" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001593.html" source="SUSE-SU"/>
    <description>
    The snmp_pdu_parse function in snmp_api.c in net-snmp 5.7.2 and earlier does not remove the varBind variable in a netsnmp_variable_list item when parsing of the SNMP PDU fails, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5621/">CVE-2015-5621 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5621">CVE-2015-5621 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1111123">SUSE bug 1111123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940188">SUSE bug 940188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969779">SUSE bug 969779</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821222" comment="net-snmp-5.7.2-20.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821223" comment="net-snmp-agent-libs-5.7.2-20.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821224" comment="net-snmp-devel-5.7.2-20.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821225" comment="net-snmp-gui-5.7.2-20.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821226" comment="net-snmp-libs-5.7.2-20.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821227" comment="net-snmp-perl-5.7.2-20.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821228" comment="net-snmp-python-5.7.2-20.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821229" comment="net-snmp-sysvinit-5.7.2-20.el7_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821230" comment="net-snmp-utils-5.7.2-20.el7_1.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155722" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5722</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5722" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5722" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5722" ref_url="https://www.suse.com/security/cve/CVE-2015-5722" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0227-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001825.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1597-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WVEJHIEE7IEFL52ZCQO4T22W6BXK2YDW/#WVEJHIEE7IEFL52ZCQO4T22W6BXK2YDW" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1667-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/X7SRCGGW6TRUEDCBV44KYT76LNA6FFQ7/#X7SRCGGW6TRUEDCBV44KYT76LNA6FFQ7" source="SUSE-SU"/>
    <description>
    buffer.c in named in ISC BIND 9.x before 9.9.7-P3 and 9.10.x before 9.10.2-P4 allows remote attackers to cause a denial of service (assertion failure and daemon exit) by creating a zone containing a malformed DNSSEC key and issuing a query for a name in that zone.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5722/">CVE-2015-5722 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5722">CVE-2015-5722 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/944066">SUSE bug 944066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944107">SUSE bug 944107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954983">SUSE bug 954983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958861">SUSE bug 958861</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821261" comment="bind-9.9.4-18.el7_1.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821262" comment="bind-chroot-9.9.4-18.el7_1.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821263" comment="bind-devel-9.9.4-18.el7_1.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821264" comment="bind-libs-9.9.4-18.el7_1.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821265" comment="bind-libs-lite-9.9.4-18.el7_1.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821266" comment="bind-license-9.9.4-18.el7_1.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821267" comment="bind-lite-devel-9.9.4-18.el7_1.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821268" comment="bind-sdb-9.9.4-18.el7_1.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821269" comment="bind-sdb-chroot-9.9.4-18.el7_1.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821270" comment="bind-utils-9.9.4-18.el7_1.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156243" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6243</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-6243" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6243" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-6243" ref_url="https://www.suse.com/security/cve/CVE-2015-6243" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1676-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1676-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001625.html" source="SUSE-SU"/>
    <description>
    The dissector-table implementation in epan/packet.c in Wireshark 1.12.x before 1.12.7 mishandles table searches for empty strings, which allows remote attackers to cause a denial of service (application crash) via a crafted packet, related to the (1) dissector_get_string_handle and (2) dissector_get_default_string_handle functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6243/">CVE-2015-6243 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6243">CVE-2015-6243 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/941500">SUSE bug 941500</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821556" comment="wireshark-1.10.14-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821557" comment="wireshark-devel-1.10.14-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821558" comment="wireshark-gnome-1.10.14-7.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156244" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6244</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-6244" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6244" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-6244" ref_url="https://www.suse.com/security/cve/CVE-2015-6244" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1676-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1676-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001625.html" source="SUSE-SU"/>
    <description>
    The dissect_zbee_secure function in epan/dissectors/packet-zbee-security.c in the ZigBee dissector in Wireshark 1.12.x before 1.12.7 improperly relies on length fields contained in packet data, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6244/">CVE-2015-6244 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6244">CVE-2015-6244 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/941500">SUSE bug 941500</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821556" comment="wireshark-1.10.14-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821557" comment="wireshark-devel-1.10.14-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821558" comment="wireshark-gnome-1.10.14-7.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156245" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6245</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-6245" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6245" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-6245" ref_url="https://www.suse.com/security/cve/CVE-2015-6245" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1676-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1676-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001625.html" source="SUSE-SU"/>
    <description>
    epan/dissectors/packet-gsm_rlcmac.c in the GSM RLC/MAC dissector in Wireshark 1.12.x before 1.12.7 uses incorrect integer data types, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6245/">CVE-2015-6245 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6245">CVE-2015-6245 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/941500">SUSE bug 941500</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821556" comment="wireshark-1.10.14-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821557" comment="wireshark-devel-1.10.14-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821558" comment="wireshark-gnome-1.10.14-7.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156246" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6246</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-6246" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6246" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-6246" ref_url="https://www.suse.com/security/cve/CVE-2015-6246" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1676-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1676-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001625.html" source="SUSE-SU"/>
    <description>
    The dissect_wa_payload function in epan/dissectors/packet-waveagent.c in the WaveAgent dissector in Wireshark 1.12.x before 1.12.7 mishandles large tag values, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6246/">CVE-2015-6246 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6246">CVE-2015-6246 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/941500">SUSE bug 941500</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821556" comment="wireshark-1.10.14-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821557" comment="wireshark-devel-1.10.14-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821558" comment="wireshark-gnome-1.10.14-7.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156248" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6248</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-6248" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6248" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-6248" ref_url="https://www.suse.com/security/cve/CVE-2015-6248" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1676-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1676-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001625.html" source="SUSE-SU"/>
    <description>
    The ptvcursor_add function in the ptvcursor implementation in epan/proto.c in Wireshark 1.12.x before 1.12.7 does not check whether the expected amount of data is available, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6248/">CVE-2015-6248 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6248">CVE-2015-6248 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/941500">SUSE bug 941500</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821556" comment="wireshark-1.10.14-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821557" comment="wireshark-devel-1.10.14-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821558" comment="wireshark-gnome-1.10.14-7.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156360" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6360</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-6360" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6360" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-6360" ref_url="https://www.suse.com/security/cve/CVE-2015-6360" source="SUSE CVE"/>
    <description>
    The encryption-processing feature in Cisco libSRTP before 1.5.3 allows remote attackers to cause a denial of service via crafted fields in SRTP packets, aka Bug ID CSCux00686.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6360/">CVE-2015-6360 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-6360">CVE-2015-6360 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/957376">SUSE bug 957376</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828224" comment="libsrtp-1.4.4-11.20101004cvs.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828225" comment="libsrtp-devel-1.4.4-11.20101004cvs.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156526" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6526</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-6526" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6526" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-6526" ref_url="https://www.suse.com/security/cve/CVE-2015-6526" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G3VWHAWQDEVZ37XRAAROFMJVDBBQ6YF5/#G3VWHAWQDEVZ37XRAAROFMJVDBBQ6YF5" source="SUSE-SU"/>
    <description>
    The perf_callchain_user_64 function in arch/powerpc/perf/callchain.c in the Linux kernel before 4.0.2 on ppc64 platforms allows local users to cause a denial of service (infinite loop) via a deep 64-bit userspace backtrace.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6526/">CVE-2015-6526 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6526">CVE-2015-6526 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/942702">SUSE bug 942702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821413" comment="kernel-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821414" comment="kernel-abi-whitelists-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821415" comment="kernel-debug-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821418" comment="kernel-doc-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821419" comment="kernel-headers-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821420" comment="kernel-tools-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821421" comment="kernel-tools-libs-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821423" comment="perf-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821424" comment="python-perf-3.10.0-327.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156563" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6563</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-6563" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6563" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-6563" ref_url="https://www.suse.com/security/cve/CVE-2015-6563" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1547-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1547-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001595.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001616.html" source="SUSE-SU"/>
		<reference ref_id="TID7022095" ref_url="https://www.suse.com/support/kb/doc/?id=7022095" source="SUSE-SU"/>
		<reference ref_id="TID7022096" ref_url="https://www.suse.com/support/kb/doc/?id=7022096" source="SUSE-SU"/>
		<reference ref_id="TID7022102" ref_url="https://www.suse.com/support/kb/doc/?id=7022102" source="SUSE-SU"/>
    <description>
    The monitor component in sshd in OpenSSH before 7.0 on non-OpenBSD platforms accepts extraneous username data in MONITOR_REQ_PAM_INIT_CTX requests, which allows local users to conduct impersonation attacks by leveraging any SSH login access in conjunction with control of the sshd uid to send a crafted MONITOR_REQ_PWNAM request, related to monitor.c and monitor_wrap.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6563/">CVE-2015-6563 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6563">CVE-2015-6563 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1074631">SUSE bug 1074631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943006">SUSE bug 943006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943007">SUSE bug 943007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943010">SUSE bug 943010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948086">SUSE bug 948086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/996040">SUSE bug 996040</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821385" comment="openssh-6.6.1p1-22.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821386" comment="openssh-askpass-6.6.1p1-22.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821387" comment="openssh-clients-6.6.1p1-22.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821388" comment="openssh-keycat-6.6.1p1-22.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821389" comment="openssh-ldap-6.6.1p1-22.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821390" comment="openssh-server-6.6.1p1-22.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821391" comment="openssh-server-sysvinit-6.6.1p1-22.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821392" comment="pam_ssh_agent_auth-0.9.3-9.22.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156564" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6564</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-6564" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6564" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-6564" ref_url="https://www.suse.com/security/cve/CVE-2015-6564" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1547-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1547-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001595.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001616.html" source="SUSE-SU"/>
		<reference ref_id="TID7022095" ref_url="https://www.suse.com/support/kb/doc/?id=7022095" source="SUSE-SU"/>
		<reference ref_id="TID7022096" ref_url="https://www.suse.com/support/kb/doc/?id=7022096" source="SUSE-SU"/>
		<reference ref_id="TID7022102" ref_url="https://www.suse.com/support/kb/doc/?id=7022102" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the mm_answer_pam_free_ctx function in monitor.c in sshd in OpenSSH before 7.0 on non-OpenBSD platforms might allow local users to gain privileges by leveraging control of the sshd uid to send an unexpectedly early MONITOR_REQ_PAM_FREE_CTX request.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6564/">CVE-2015-6564 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6564">CVE-2015-6564 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1074631">SUSE bug 1074631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138392">SUSE bug 1138392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942850">SUSE bug 942850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943006">SUSE bug 943006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943007">SUSE bug 943007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943010">SUSE bug 943010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948086">SUSE bug 948086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/996040">SUSE bug 996040</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821385" comment="openssh-6.6.1p1-22.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821386" comment="openssh-askpass-6.6.1p1-22.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821387" comment="openssh-clients-6.6.1p1-22.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821388" comment="openssh-keycat-6.6.1p1-22.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821389" comment="openssh-ldap-6.6.1p1-22.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821390" comment="openssh-server-6.6.1p1-22.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821391" comment="openssh-server-sysvinit-6.6.1p1-22.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821392" comment="pam_ssh_agent_auth-0.9.3-9.22.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156908" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6908</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-6908" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6908" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-6908" ref_url="https://www.suse.com/security/cve/CVE-2015-6908" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001944.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0226-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6PJL6VDYM2BF76IMT64TDCZYCMTZLJLN/#6PJL6VDYM2BF76IMT64TDCZYCMTZLJLN" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0255-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HT6LYJCGGLAPRBTC4QN62E75JZBMUBRC/#HT6LYJCGGLAPRBTC4QN62E75JZBMUBRC" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0261-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OBCAOITX3L4BHAVIXSGXNTMWKD2QELP3/#OBCAOITX3L4BHAVIXSGXNTMWKD2QELP3" source="SUSE-SU"/>
    <description>
    The ber_get_next function in libraries/liblber/io.c in OpenLDAP 2.4.42 and earlier allows remote attackers to cause a denial of service (reachable assertion and application crash) via crafted BER data, as demonstrated by an attack against slapd.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6908/">CVE-2015-6908 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6908">CVE-2015-6908 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/945582">SUSE bug 945582</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821307" comment="openldap-2.4.39-7.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821308" comment="openldap-clients-2.4.39-7.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821309" comment="openldap-devel-2.4.39-7.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821310" comment="openldap-servers-2.4.39-7.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821311" comment="openldap-servers-sql-2.4.39-7.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157174" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7174</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7174" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7174" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7174" ref_url="https://www.suse.com/security/cve/CVE-2015-7174" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1680-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001691.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1658-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UKE3T4D6INUF75PEBOA5BSYGWIFZCR5Q/#UKE3T4D6INUF75PEBOA5BSYGWIFZCR5Q" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1679-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VWT26A2SOWF47FQL6GTIKRQ2F5225UG/#5VWT26A2SOWF47FQL6GTIKRQ2F5225UG" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1681-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FGFIKO6JXQMNHEO3OULWAXR65ILHEESQ/#FGFIKO6JXQMNHEO3OULWAXR65ILHEESQ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    The nsAttrAndChildArray::GrowBy function in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 might allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via unknown vectors, related to an "overflow."
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7174/">CVE-2015-7174 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7174">CVE-2015-7174 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/947003">SUSE bug 947003</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821312" comment="thunderbird-38.3.0-1.el7_1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157175" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7175</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7175" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7175" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7175" ref_url="https://www.suse.com/security/cve/CVE-2015-7175" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1680-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001691.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1658-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UKE3T4D6INUF75PEBOA5BSYGWIFZCR5Q/#UKE3T4D6INUF75PEBOA5BSYGWIFZCR5Q" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1679-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VWT26A2SOWF47FQL6GTIKRQ2F5225UG/#5VWT26A2SOWF47FQL6GTIKRQ2F5225UG" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1681-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FGFIKO6JXQMNHEO3OULWAXR65ILHEESQ/#FGFIKO6JXQMNHEO3OULWAXR65ILHEESQ" source="SUSE-SU"/>
    <description>
    The XULContentSinkImpl::AddText function in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 might allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via unknown vectors, related to an "overflow."
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7175/">CVE-2015-7175 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7175">CVE-2015-7175 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/947003">SUSE bug 947003</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821312" comment="thunderbird-38.3.0-1.el7_1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157176" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7176</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7176" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7176" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7176" ref_url="https://www.suse.com/security/cve/CVE-2015-7176" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1680-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001691.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1658-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UKE3T4D6INUF75PEBOA5BSYGWIFZCR5Q/#UKE3T4D6INUF75PEBOA5BSYGWIFZCR5Q" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1679-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VWT26A2SOWF47FQL6GTIKRQ2F5225UG/#5VWT26A2SOWF47FQL6GTIKRQ2F5225UG" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1681-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FGFIKO6JXQMNHEO3OULWAXR65ILHEESQ/#FGFIKO6JXQMNHEO3OULWAXR65ILHEESQ" source="SUSE-SU"/>
    <description>
    The AnimationThread function in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 uses an incorrect argument to the sscanf function, which might allow remote attackers to cause a denial of service (stack-based buffer overflow and application crash) or possibly have unspecified other impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7176/">CVE-2015-7176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7176">CVE-2015-7176 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/947003">SUSE bug 947003</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821312" comment="thunderbird-38.3.0-1.el7_1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157177" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7177</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7177" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7177" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7177" ref_url="https://www.suse.com/security/cve/CVE-2015-7177" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1680-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001691.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1658-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UKE3T4D6INUF75PEBOA5BSYGWIFZCR5Q/#UKE3T4D6INUF75PEBOA5BSYGWIFZCR5Q" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1679-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VWT26A2SOWF47FQL6GTIKRQ2F5225UG/#5VWT26A2SOWF47FQL6GTIKRQ2F5225UG" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1681-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FGFIKO6JXQMNHEO3OULWAXR65ILHEESQ/#FGFIKO6JXQMNHEO3OULWAXR65ILHEESQ" source="SUSE-SU"/>
    <description>
    The InitTextures function in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 might allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7177/">CVE-2015-7177 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7177">CVE-2015-7177 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/947003">SUSE bug 947003</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821312" comment="thunderbird-38.3.0-1.el7_1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7180</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7180" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7180" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7180" ref_url="https://www.suse.com/security/cve/CVE-2015-7180" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1680-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001691.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1658-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UKE3T4D6INUF75PEBOA5BSYGWIFZCR5Q/#UKE3T4D6INUF75PEBOA5BSYGWIFZCR5Q" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1679-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VWT26A2SOWF47FQL6GTIKRQ2F5225UG/#5VWT26A2SOWF47FQL6GTIKRQ2F5225UG" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1681-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FGFIKO6JXQMNHEO3OULWAXR65ILHEESQ/#FGFIKO6JXQMNHEO3OULWAXR65ILHEESQ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    The ReadbackResultWriterD3D11::Run function in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 misinterprets the return value of a function call, which might allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7180/">CVE-2015-7180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7180">CVE-2015-7180 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/947003">SUSE bug 947003</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821312" comment="thunderbird-38.3.0-1.el7_1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157181" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7181</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7181" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7181" ref_url="https://www.suse.com/security/cve/CVE-2015-7181" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1978-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1981-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001691.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1942-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5J7Y2TMONA53MKP4NVMADVEOHZPRGPG6/#5J7Y2TMONA53MKP4NVMADVEOHZPRGPG6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    The sec_asn1d_parse_leaf function in Mozilla Network Security Services (NSS) before 3.19.2.1 and 3.20.x before 3.20.1, as used in Firefox before 42.0 and Firefox ESR 38.x before 38.4 and other products, improperly restricts access to an unspecified data structure, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted OCTET STRING data, related to a "use-after-poison" issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7181/">CVE-2015-7181 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7181">CVE-2015-7181 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/952810">SUSE bug 952810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962977">SUSE bug 962977</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821357" comment="nspr-4.10.8-2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821358" comment="nspr-devel-4.10.8-2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821359" comment="nss-3.19.1-7.el7_1.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821360" comment="nss-devel-3.19.1-7.el7_1.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821361" comment="nss-pkcs11-devel-3.19.1-7.el7_1.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821362" comment="nss-sysinit-3.19.1-7.el7_1.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821363" comment="nss-tools-3.19.1-7.el7_1.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821364" comment="nss-util-3.19.1-4.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821365" comment="nss-util-devel-3.19.1-4.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7182</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7182" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7182" ref_url="https://www.suse.com/security/cve/CVE-2015-7182" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1978-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1981-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001691.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1942-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5J7Y2TMONA53MKP4NVMADVEOHZPRGPG6/#5J7Y2TMONA53MKP4NVMADVEOHZPRGPG6" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the ASN.1 decoder in Mozilla Network Security Services (NSS) before 3.19.2.1 and 3.20.x before 3.20.1, as used in Firefox before 42.0 and Firefox ESR 38.x before 38.4 and other products, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted OCTET STRING data.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-09"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7182/">CVE-2015-7182 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7182">CVE-2015-7182 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/952810">SUSE bug 952810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962977">SUSE bug 962977</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821357" comment="nspr-4.10.8-2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821358" comment="nspr-devel-4.10.8-2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821359" comment="nss-3.19.1-7.el7_1.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821360" comment="nss-devel-3.19.1-7.el7_1.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821361" comment="nss-pkcs11-devel-3.19.1-7.el7_1.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821362" comment="nss-sysinit-3.19.1-7.el7_1.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821363" comment="nss-tools-3.19.1-7.el7_1.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821364" comment="nss-util-3.19.1-4.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821365" comment="nss-util-devel-3.19.1-4.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157183" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7183</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7183" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7183" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7183" ref_url="https://www.suse.com/security/cve/CVE-2015-7183" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1978-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1981-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001691.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1942-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5J7Y2TMONA53MKP4NVMADVEOHZPRGPG6/#5J7Y2TMONA53MKP4NVMADVEOHZPRGPG6" source="SUSE-SU"/>
    <description>
    Integer overflow in the PL_ARENA_ALLOCATE implementation in Netscape Portable Runtime (NSPR) in Mozilla Network Security Services (NSS) before 3.19.2.1 and 3.20.x before 3.20.1, as used in Firefox before 42.0 and Firefox ESR 38.x before 38.4 and other products, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7183/">CVE-2015-7183 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7183">CVE-2015-7183 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/952810">SUSE bug 952810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962977">SUSE bug 962977</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821357" comment="nspr-4.10.8-2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821358" comment="nspr-devel-4.10.8-2.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821359" comment="nss-3.19.1-7.el7_1.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821360" comment="nss-devel-3.19.1-7.el7_1.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821361" comment="nss-pkcs11-devel-3.19.1-7.el7_1.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821362" comment="nss-sysinit-3.19.1-7.el7_1.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821363" comment="nss-tools-3.19.1-7.el7_1.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821364" comment="nss-util-3.19.1-4.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821365" comment="nss-util-devel-3.19.1-4.el7_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157188" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7188</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7188" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7188" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7188" ref_url="https://www.suse.com/security/cve/CVE-2015-7188" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1978-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1981-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001691.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1942-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5J7Y2TMONA53MKP4NVMADVEOHZPRGPG6/#5J7Y2TMONA53MKP4NVMADVEOHZPRGPG6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 42.0 and Firefox ESR 38.x before 38.4 allow remote attackers to bypass the Same Origin Policy for an IP address origin, and conduct cross-site scripting (XSS) attacks, by appending whitespace characters to an IP address string.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-03"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7188/">CVE-2015-7188 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7188">CVE-2015-7188 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/952810">SUSE bug 952810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821366" comment="firefox-38.4.0-1.el7_1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157189" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7189</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7189" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7189" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7189" ref_url="https://www.suse.com/security/cve/CVE-2015-7189" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1978-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1981-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001691.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1942-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5J7Y2TMONA53MKP4NVMADVEOHZPRGPG6/#5J7Y2TMONA53MKP4NVMADVEOHZPRGPG6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Race condition in the JPEGEncoder function in Mozilla Firefox before 42.0 and Firefox ESR 38.x before 38.4 allows remote attackers to execute arbitrary code or cause a denial of service (heap-based buffer overflow) via vectors involving a CANVAS element and crafted JavaScript code.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7189/">CVE-2015-7189 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7189">CVE-2015-7189 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/952810">SUSE bug 952810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821366" comment="firefox-38.4.0-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821606" comment="thunderbird-38.4.0-1.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157193" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7193</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7193" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7193" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7193" ref_url="https://www.suse.com/security/cve/CVE-2015-7193" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1978-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1981-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001691.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1942-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5J7Y2TMONA53MKP4NVMADVEOHZPRGPG6/#5J7Y2TMONA53MKP4NVMADVEOHZPRGPG6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 42.0 and Firefox ESR 38.x before 38.4 improperly follow the CORS cross-origin request algorithm for the POST method in situations involving an unspecified Content-Type header manipulation, which allows remote attackers to bypass the Same Origin Policy by leveraging the lack of a preflight-request step.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-03"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7193/">CVE-2015-7193 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7193">CVE-2015-7193 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/952810">SUSE bug 952810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821366" comment="firefox-38.4.0-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821606" comment="thunderbird-38.4.0-1.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157194" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7194</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7194" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7194" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7194" ref_url="https://www.suse.com/security/cve/CVE-2015-7194" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1978-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1981-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001691.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1942-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5J7Y2TMONA53MKP4NVMADVEOHZPRGPG6/#5J7Y2TMONA53MKP4NVMADVEOHZPRGPG6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Buffer underflow in libjar in Mozilla Firefox before 42.0 and Firefox ESR 38.x before 38.4 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted ZIP archive.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-06"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7194/">CVE-2015-7194 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7194">CVE-2015-7194 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/952810">SUSE bug 952810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821366" comment="firefox-38.4.0-1.el7_1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157196" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7196</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7196" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7196" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7196" ref_url="https://www.suse.com/security/cve/CVE-2015-7196" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1978-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1981-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001691.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1942-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5J7Y2TMONA53MKP4NVMADVEOHZPRGPG6/#5J7Y2TMONA53MKP4NVMADVEOHZPRGPG6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 42.0 and Firefox ESR 38.x before 38.4, when a Java plugin is enabled, allow remote attackers to cause a denial of service (incorrect garbage collection and application crash) or possibly execute arbitrary code via a crafted Java applet that deallocates an in-use JavaScript wrapper.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-04"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7196/">CVE-2015-7196 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7196">CVE-2015-7196 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/952810">SUSE bug 952810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821366" comment="firefox-38.4.0-1.el7_1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157197" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7197</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7197" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7197" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7197" ref_url="https://www.suse.com/security/cve/CVE-2015-7197" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1978-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1981-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001691.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1942-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5J7Y2TMONA53MKP4NVMADVEOHZPRGPG6/#5J7Y2TMONA53MKP4NVMADVEOHZPRGPG6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 42.0 and Firefox ESR 38.x before 38.4 improperly control the ability of a web worker to create a WebSocket object, which allows remote attackers to bypass intended mixed-content restrictions via crafted JavaScript code.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7197/">CVE-2015-7197 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7197">CVE-2015-7197 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/952810">SUSE bug 952810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821366" comment="firefox-38.4.0-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821606" comment="thunderbird-38.4.0-1.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157198" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7198</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7198" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7198" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7198" ref_url="https://www.suse.com/security/cve/CVE-2015-7198" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1978-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1981-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001691.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1942-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5J7Y2TMONA53MKP4NVMADVEOHZPRGPG6/#5J7Y2TMONA53MKP4NVMADVEOHZPRGPG6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Buffer overflow in the rx::TextureStorage11 class in ANGLE, as used in Mozilla Firefox before 42.0 and Firefox ESR 38.x before 38.4, allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via crafted texture data.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7198/">CVE-2015-7198 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7198">CVE-2015-7198 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/952810">SUSE bug 952810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821366" comment="firefox-38.4.0-1.el7_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821606" comment="thunderbird-38.4.0-1.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157199" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7199</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7199" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7199" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7199" ref_url="https://www.suse.com/security/cve/CVE-2015-7199" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1978-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1981-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001691.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1942-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5J7Y2TMONA53MKP4NVMADVEOHZPRGPG6/#5J7Y2TMONA53MKP4NVMADVEOHZPRGPG6" source="SUSE-SU"/>
    <description>
    The (1) AddWeightedPathSegLists and (2) SVGPathSegListSMILType::Interpolate functions in Mozilla Firefox before 42.0 and Firefox ESR 38.x before 38.4 lack status checking, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted SVG document.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-03"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7199/">CVE-2015-7199 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7199">CVE-2015-7199 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/952810">SUSE bug 952810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821606" comment="thunderbird-38.4.0-1.el7_2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157200" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7200</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7200" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7200" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7200" ref_url="https://www.suse.com/security/cve/CVE-2015-7200" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1978-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1981-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001691.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1942-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5J7Y2TMONA53MKP4NVMADVEOHZPRGPG6/#5J7Y2TMONA53MKP4NVMADVEOHZPRGPG6" source="SUSE-SU"/>
    <description>
    The CryptoKey interface implementation in Mozilla Firefox before 42.0 and Firefox ESR 38.x before 38.4 lacks status checking, which allows attackers to have an unspecified impact via vectors related to a cryptographic key.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-03"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7200/">CVE-2015-7200 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7200">CVE-2015-7200 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/952810">SUSE bug 952810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821606" comment="thunderbird-38.4.0-1.el7_2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157201" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7201</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7201" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7201" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7201" ref_url="https://www.suse.com/security/cve/CVE-2015-7201" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2335-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001750.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2380-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MCXS4FIEPBQ6UUMX622SGNJMQBGRGQUQ/#MCXS4FIEPBQ6UUMX622SGNJMQBGRGQUQ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2406-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2R3POV6ESMLDD4MXUO4DMF2HUZB5R6GX/#2R3POV6ESMLDD4MXUO4DMF2HUZB5R6GX" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 43.0 and Firefox ESR 38.x before 38.5 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7201/">CVE-2015-7201 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7201">CVE-2015-7201 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/959277">SUSE bug 959277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821671" comment="firefox-38.5.0-3.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821672" comment="thunderbird-38.5.0-1.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157205" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7205</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7205" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7205" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7205" ref_url="https://www.suse.com/security/cve/CVE-2015-7205" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2335-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001750.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2380-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MCXS4FIEPBQ6UUMX622SGNJMQBGRGQUQ/#MCXS4FIEPBQ6UUMX622SGNJMQBGRGQUQ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2406-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2R3POV6ESMLDD4MXUO4DMF2HUZB5R6GX/#2R3POV6ESMLDD4MXUO4DMF2HUZB5R6GX" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Integer underflow in the RTPReceiverVideo::ParseRtpPacket function in Mozilla Firefox before 43.0 and Firefox ESR 38.x before 38.5 might allow remote attackers to obtain sensitive information, cause a denial of service, or possibly have unspecified other impact by triggering a crafted WebRTC RTP packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7205/">CVE-2015-7205 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7205">CVE-2015-7205 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/959277">SUSE bug 959277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821671" comment="firefox-38.5.0-3.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821672" comment="thunderbird-38.5.0-1.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7210</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7210" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7210" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7210" ref_url="https://www.suse.com/security/cve/CVE-2015-7210" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2335-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001750.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2380-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MCXS4FIEPBQ6UUMX622SGNJMQBGRGQUQ/#MCXS4FIEPBQ6UUMX622SGNJMQBGRGQUQ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2406-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2R3POV6ESMLDD4MXUO4DMF2HUZB5R6GX/#2R3POV6ESMLDD4MXUO4DMF2HUZB5R6GX" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Mozilla Firefox before 43.0 and Firefox ESR 38.x before 38.5 allows remote attackers to execute arbitrary code by triggering attempted use of a data channel that has been closed by a WebRTC function.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-11-21"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7210/">CVE-2015-7210 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7210">CVE-2015-7210 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/959277">SUSE bug 959277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821671" comment="firefox-38.5.0-3.el7_2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157212" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7212</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7212" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7212" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7212" ref_url="https://www.suse.com/security/cve/CVE-2015-7212" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2335-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001750.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2380-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MCXS4FIEPBQ6UUMX622SGNJMQBGRGQUQ/#MCXS4FIEPBQ6UUMX622SGNJMQBGRGQUQ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2406-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2R3POV6ESMLDD4MXUO4DMF2HUZB5R6GX/#2R3POV6ESMLDD4MXUO4DMF2HUZB5R6GX" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Integer overflow in the mozilla::layers::BufferTextureClient::AllocateForSurface function in Mozilla Firefox before 43.0 and Firefox ESR 38.x before 38.5 allows remote attackers to execute arbitrary code by triggering a graphics operation that requires a large texture allocation.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7212/">CVE-2015-7212 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7212">CVE-2015-7212 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/959277">SUSE bug 959277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821671" comment="firefox-38.5.0-3.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821672" comment="thunderbird-38.5.0-1.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157213" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7213</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7213" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7213" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7213" ref_url="https://www.suse.com/security/cve/CVE-2015-7213" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2335-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001750.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2380-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MCXS4FIEPBQ6UUMX622SGNJMQBGRGQUQ/#MCXS4FIEPBQ6UUMX622SGNJMQBGRGQUQ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2406-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2R3POV6ESMLDD4MXUO4DMF2HUZB5R6GX/#2R3POV6ESMLDD4MXUO4DMF2HUZB5R6GX" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Integer overflow in the MPEG4Extractor::readMetaData function in MPEG4Extractor.cpp in libstagefright in Mozilla Firefox before 43.0 and Firefox ESR 38.x before 38.5 on 64-bit platforms allows remote attackers to execute arbitrary code via a crafted MP4 video file that triggers a buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7213/">CVE-2015-7213 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7213">CVE-2015-7213 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/959277">SUSE bug 959277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821671" comment="firefox-38.5.0-3.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821672" comment="thunderbird-38.5.0-1.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157214" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7214</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7214" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7214" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7214" ref_url="https://www.suse.com/security/cve/CVE-2015-7214" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2335-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001750.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2380-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MCXS4FIEPBQ6UUMX622SGNJMQBGRGQUQ/#MCXS4FIEPBQ6UUMX622SGNJMQBGRGQUQ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2406-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2R3POV6ESMLDD4MXUO4DMF2HUZB5R6GX/#2R3POV6ESMLDD4MXUO4DMF2HUZB5R6GX" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 43.0 and Firefox ESR 38.x before 38.5 allow remote attackers to bypass the Same Origin Policy via data: and view-source: URIs.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7214/">CVE-2015-7214 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7214">CVE-2015-7214 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/959277">SUSE bug 959277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821671" comment="firefox-38.5.0-3.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821672" comment="thunderbird-38.5.0-1.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157222" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7222</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7222" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7222" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7222" ref_url="https://www.suse.com/security/cve/CVE-2015-7222" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2335-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001750.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2380-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MCXS4FIEPBQ6UUMX622SGNJMQBGRGQUQ/#MCXS4FIEPBQ6UUMX622SGNJMQBGRGQUQ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2406-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2R3POV6ESMLDD4MXUO4DMF2HUZB5R6GX/#2R3POV6ESMLDD4MXUO4DMF2HUZB5R6GX" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Integer underflow in the Metadata::setData function in MetaData.cpp in libstagefright in Mozilla Firefox before 43.0 and Firefox ESR 38.x before 38.5 allows remote attackers to execute arbitrary code or cause a denial of service (incorrect memory allocation and application crash) via an MP4 video file with crafted covr metadata that triggers a buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7222/">CVE-2015-7222 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7222">CVE-2015-7222 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/959277">SUSE bug 959277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821671" comment="firefox-38.5.0-3.el7_2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157236" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7236</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7236" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7236" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7236" ref_url="https://www.suse.com/security/cve/CVE-2015-7236" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1705-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1706-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001623.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in xprt_set_caller in rpcb_svc_com.c in rpcbind 0.2.1 and earlier allows remote attackers to cause a denial of service (daemon crash) via crafted packets, involving a PMAP_CALLIT code.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-02"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7236/">CVE-2015-7236 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7236">CVE-2015-7236 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/940191">SUSE bug 940191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/946204">SUSE bug 946204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979097">SUSE bug 979097</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821673" comment="rpcbind-0.2.0-33.el7_2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157496" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7496</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7496" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7496" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7496" ref_url="https://www.suse.com/security/cve/CVE-2015-7496" source="SUSE CVE"/>
    <description>
    GNOME Display Manager (gdm) before 3.18.2 allows physically proximate attackers to bypass the lock screen by holding the Escape key.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7496/">CVE-2015-7496 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7496">CVE-2015-7496 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/955552">SUSE bug 955552</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823411" comment="gdm-3.22.3-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823412" comment="gdm-devel-3.22.3-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823413" comment="gnome-session-3.22.3-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823414" comment="gnome-session-custom-session-3.22.3-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823415" comment="gnome-session-xsession-3.22.3-4.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157497" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7497</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7497" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7497" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7497" ref_url="https://www.suse.com/security/cve/CVE-2015-7497" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001948.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14697-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U5YNW74OL2W7SH2XTAVN5TODNFIVFL3Y/" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the xmlDictComputeFastQKey function in dict.c in libxml2 before 2.9.3 allows context-dependent attackers to cause a denial of service via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7497/">CVE-2015-7497 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7497">CVE-2015-7497 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957106">SUSE bug 957106</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959469">SUSE bug 959469</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969769">SUSE bug 969769</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821611" comment="libxml2-2.9.1-6.el7_2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821612" comment="libxml2-devel-2.9.1-6.el7_2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821613" comment="libxml2-python-2.9.1-6.el7_2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821614" comment="libxml2-static-2.9.1-6.el7_2.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157498" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7498</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7498" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7498" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7498" ref_url="https://www.suse.com/security/cve/CVE-2015-7498" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001948.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14697-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U5YNW74OL2W7SH2XTAVN5TODNFIVFL3Y/" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the xmlParseXmlDecl function in parser.c in libxml2 before 2.9.3 allows context-dependent attackers to cause a denial of service via unspecified vectors related to extracting errors after an encoding conversion failure.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7498/">CVE-2015-7498 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7498">CVE-2015-7498 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957107">SUSE bug 957107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959469">SUSE bug 959469</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969769">SUSE bug 969769</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821611" comment="libxml2-2.9.1-6.el7_2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821612" comment="libxml2-devel-2.9.1-6.el7_2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821613" comment="libxml2-python-2.9.1-6.el7_2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821614" comment="libxml2-static-2.9.1-6.el7_2.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157499" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7499</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7499" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7499" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7499" ref_url="https://www.suse.com/security/cve/CVE-2015-7499" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001948.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14697-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U5YNW74OL2W7SH2XTAVN5TODNFIVFL3Y/" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the xmlGROW function in parser.c in libxml2 before 2.9.3 allows context-dependent attackers to obtain sensitive process memory information via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7499/">CVE-2015-7499 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7499">CVE-2015-7499 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957109">SUSE bug 957109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959469">SUSE bug 959469</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969769">SUSE bug 969769</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821611" comment="libxml2-2.9.1-6.el7_2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821612" comment="libxml2-devel-2.9.1-6.el7_2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821613" comment="libxml2-python-2.9.1-6.el7_2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821614" comment="libxml2-static-2.9.1-6.el7_2.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157500" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7500</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7500" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7500" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7500" ref_url="https://www.suse.com/security/cve/CVE-2015-7500" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001948.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14697-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U5YNW74OL2W7SH2XTAVN5TODNFIVFL3Y/" source="SUSE-SU"/>
    <description>
    The xmlParseMisc function in parser.c in libxml2 before 2.9.3 allows context-dependent attackers to cause a denial of service (out-of-bounds heap read) via unspecified vectors related to incorrect entities boundaries and start tags.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7500/">CVE-2015-7500 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7500">CVE-2015-7500 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957110">SUSE bug 957110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959469">SUSE bug 959469</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969769">SUSE bug 969769</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821611" comment="libxml2-2.9.1-6.el7_2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821612" comment="libxml2-devel-2.9.1-6.el7_2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821613" comment="libxml2-python-2.9.1-6.el7_2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821614" comment="libxml2-static-2.9.1-6.el7_2.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157501" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7501</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7501" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7501" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7501" ref_url="https://www.suse.com/security/cve/CVE-2015-7501" source="SUSE CVE"/>
    <description>
    Red Hat JBoss A-MQ 6.x; BPM Suite (BPMS) 6.x; BRMS 6.x and 5.x; Data Grid (JDG) 6.x; Data Virtualization (JDV) 6.x and 5.x; Enterprise Application Platform 6.x, 5.x, and 4.3.x; Fuse 6.x; Fuse Service Works (FSW) 6.x; Operations Network (JBoss ON) 3.x; Portal 6.x; SOA Platform (SOA-P) 5.x; Web Server (JWS) 3.x; Red Hat OpenShift/xPAAS 3.x; and Red Hat Subscription Asset Manager 1.3 allow remote attackers to execute arbitrary commands via a crafted serialized Java object, related to the Apache Commons Collections (ACC) library.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7501/">CVE-2015-7501 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7501">CVE-2015-7501 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821607" comment="apache-commons-collections-3.2.1-22.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821608" comment="apache-commons-collections-javadoc-3.2.1-22.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821609" comment="apache-commons-collections-testframework-3.2.1-22.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821610" comment="apache-commons-collections-testframework-javadoc-3.2.1-22.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157529" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7529</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7529" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7529" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7529" ref_url="https://www.suse.com/security/cve/CVE-2015-7529" source="SUSE CVE"/>
    <description>
    sosreport in SoS 3.x allows local users to obtain sensitive information from sosreport files or gain privileges via a symlink attack on an archive file in a temporary directory, as demonstrated by sosreport-$hostname-$date.tar in /tmp/sosreport-$hostname-$date.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7529/">CVE-2015-7529 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7529">CVE-2015-7529 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821813" comment="sos-3.2-35.el7_2.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157540" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7540</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7540" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7540" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7540" ref_url="https://www.suse.com/security/cve/CVE-2015-7540" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2015:2356-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MHQQDJ3M5EHLUGFQCVVIKBPNUJWLEV5Y/#MHQQDJ3M5EHLUGFQCVVIKBPNUJWLEV5Y" source="SUSE-SU"/>
    <description>
    The LDAP server in the AD domain controller in Samba 4.x before 4.1.22 does not check return values to ensure successful ASN.1 memory allocation, which allows remote attackers to cause a denial of service (memory consumption and daemon crash) via crafted packets.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7540/">CVE-2015-7540 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7540">CVE-2015-7540 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/958580">SUSE bug 958580</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821674" comment="ctdb-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821675" comment="ctdb-devel-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821676" comment="ctdb-tests-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821677" comment="libsmbclient-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821678" comment="libsmbclient-devel-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821679" comment="libwbclient-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821680" comment="libwbclient-devel-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821681" comment="samba-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821682" comment="samba-client-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821683" comment="samba-client-libs-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821684" comment="samba-common-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821685" comment="samba-common-libs-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821686" comment="samba-common-tools-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821687" comment="samba-dc-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821688" comment="samba-dc-libs-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821689" comment="samba-devel-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821690" comment="samba-libs-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821691" comment="samba-pidl-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821692" comment="samba-python-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821693" comment="samba-test-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821694" comment="samba-test-devel-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821695" comment="samba-test-libs-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821696" comment="samba-vfs-glusterfs-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821697" comment="samba-winbind-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821698" comment="samba-winbind-clients-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821699" comment="samba-winbind-krb5-locator-4.2.3-11.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821700" comment="samba-winbind-modules-4.2.3-11.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7547</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7547" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7547" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7547" ref_url="https://www.suse.com/security/cve/CVE-2015-7547" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001948.html" source="SUSE-SU"/>
		<reference ref_id="TID7017265" ref_url="https://www.suse.com/support/kb/doc?id=7017265" source="SUSE-SU"/>
		<reference ref_id="TID7017273" ref_url="https://www.suse.com/support/kb/doc/?id=7017273" source="SUSE-SU"/>
		<reference ref_id="TID7017287" ref_url="https://www.suse.com/support/kb/doc?id=7017287" source="SUSE-SU"/>
		<reference ref_id="TID7017315" ref_url="https://www.suse.com/support/kb/doc/?id=7017315" source="SUSE-SU"/>
		<reference ref_id="TID7017329" ref_url="https://www.suse.com/support/kb/doc/?id=7017329" source="SUSE-SU"/>
		<reference ref_id="TID7021300" ref_url="https://www.suse.com/support/kb/doc/?id=7021300" source="SUSE-SU"/>
		<reference ref_id="TID7021823" ref_url="https://www.suse.com/support/kb/doc/?id=7021823" source="SUSE-SU"/>
		<reference ref_id="TID7022077" ref_url="https://www.suse.com/support/kb/doc/?id=7022077" source="SUSE-SU"/>
		<reference ref_id="TID7022102" ref_url="https://www.suse.com/support/kb/doc/?id=7022102" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0490-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YY2DTMAT2VLWPTXSSUAUBFCCAYY3S63X/#YY2DTMAT2VLWPTXSSUAUBFCCAYY3S63X" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0510-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XMCYM5IM5GBBV2HEJEZMVKTJIYVLENHN/#XMCYM5IM5GBBV2HEJEZMVKTJIYVLENHN" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0511-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CV7CKNEEDXVSF4NS5NGK7OXLJA7ZKLKU/#CV7CKNEEDXVSF4NS5NGK7OXLJA7ZKLKU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0512-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/X24EQEUQCAY6HF7XTDWCO3ECDCY7DTY5/#X24EQEUQCAY6HF7XTDWCO3ECDCY7DTY5" source="SUSE-SU"/>
    <description>
    Multiple stack-based buffer overflows in the (1) send_dg and (2) send_vc functions in the libresolv library in the GNU C Library (aka glibc or libc6) before 2.23 allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted DNS response that triggers a call to the getaddrinfo function with the AF_UNSPEC or AF_INET6 address family, related to performing "dual A/AAAA DNS queries" and the libnss_dns.so.2 NSS module.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7547/">CVE-2015-7547 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7547">CVE-2015-7547 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1077097">SUSE bug 1077097</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/847227">SUSE bug 847227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961721">SUSE bug 961721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967023">SUSE bug 967023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967061">SUSE bug 967061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967072">SUSE bug 967072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967496">SUSE bug 967496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969216">SUSE bug 969216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969241">SUSE bug 969241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969591">SUSE bug 969591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986086">SUSE bug 986086</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821794" comment="glibc-2.17-106.el7_2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821795" comment="glibc-common-2.17-106.el7_2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821796" comment="glibc-devel-2.17-106.el7_2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821797" comment="glibc-headers-2.17-106.el7_2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821798" comment="glibc-static-2.17-106.el7_2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821799" comment="glibc-utils-2.17-106.el7_2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821800" comment="nscd-2.17-106.el7_2.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157554" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7554</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7554" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7554" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7554" ref_url="https://www.suse.com/security/cve/CVE-2015-7554" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004228.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3035-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KXYOOAKMFNUKYDB2XZOT63J2Z2V6LSVK/#KXYOOAKMFNUKYDB2XZOT63J2Z2V6LSVK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0097-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RNWKZ6W3U3UFNEGJKR2GQLHXOFKOWNVG/#RNWKZ6W3U3UFNEGJKR2GQLHXOFKOWNVG" source="SUSE-SU"/>
    <description>
    The _TIFFVGetField function in tif_dir.c in libtiff 4.0.6 allows attackers to cause a denial of service (invalid memory write and crash) or possibly have unspecified other impact via crafted field data in an extension tag in a TIFF image.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-04-15"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7554/">CVE-2015-7554 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7554">CVE-2015-7554 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1007276">SUSE bug 1007276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017690">SUSE bug 1017690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040322">SUSE bug 1040322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960341">SUSE bug 960341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974621">SUSE bug 974621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983436">SUSE bug 983436</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822206" comment="libtiff-4.0.3-25.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822207" comment="libtiff-devel-4.0.3-25.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822208" comment="libtiff-static-4.0.3-25.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822209" comment="libtiff-tools-4.0.3-25.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157560" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7560</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7560" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7560" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7560" ref_url="https://www.suse.com/security/cve/CVE-2015-7560" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001969.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0813-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BEWYEPLFEBZ3HNLXNZI5ISQC6NKVC3JZ/#BEWYEPLFEBZ3HNLXNZI5ISQC6NKVC3JZ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0877-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VVGV44OIJXJPLOBGFBMZQSDMHW7FICJ/#5VVGV44OIJXJPLOBGFBMZQSDMHW7FICJ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1064-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/B7VW7SOZTMI4RQKFXAOX457XVPBRHQR3/#B7VW7SOZTMI4RQKFXAOX457XVPBRHQR3" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1106-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6BJWKRWY53KC46JMOYJSXTBEZC3KCJRV/#6BJWKRWY53KC46JMOYJSXTBEZC3KCJRV" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1107-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M3WNN5WVCJIGH6DFBT26M6LTZ7KM54R7/#M3WNN5WVCJIGH6DFBT26M6LTZ7KM54R7" source="SUSE-SU"/>
    <description>
    The SMB1 implementation in smbd in Samba 3.x and 4.x before 4.1.23, 4.2.x before 4.2.9, 4.3.x before 4.3.6, and 4.4.x before 4.4.0rc4 allows remote authenticated users to modify arbitrary ACLs by using a UNIX SMB1 call to create a symlink, and then using a non-UNIX SMB1 call to write to the ACL content.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7560/">CVE-2015-7560 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7560">CVE-2015-7560 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/968222">SUSE bug 968222</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821848" comment="ctdb-4.2.3-12.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821849" comment="ctdb-devel-4.2.3-12.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821850" comment="ctdb-tests-4.2.3-12.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821851" comment="libsmbclient-4.2.3-12.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821852" comment="libsmbclient-devel-4.2.3-12.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821853" comment="libwbclient-4.2.3-12.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821854" comment="libwbclient-devel-4.2.3-12.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821855" comment="samba-4.2.3-12.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821856" comment="samba-client-4.2.3-12.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821857" comment="samba-client-libs-4.2.3-12.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821858" comment="samba-common-4.2.3-12.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821859" comment="samba-common-libs-4.2.3-12.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821860" comment="samba-common-tools-4.2.3-12.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821861" comment="samba-dc-4.2.3-12.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821862" comment="samba-dc-libs-4.2.3-12.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821863" comment="samba-devel-4.2.3-12.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821864" comment="samba-libs-4.2.3-12.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821865" comment="samba-pidl-4.2.3-12.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821866" comment="samba-python-4.2.3-12.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821867" comment="samba-test-4.2.3-12.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821868" comment="samba-test-devel-4.2.3-12.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821869" comment="samba-test-libs-4.2.3-12.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821870" comment="samba-vfs-glusterfs-4.2.3-12.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821871" comment="samba-winbind-4.2.3-12.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821872" comment="samba-winbind-clients-4.2.3-12.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821873" comment="samba-winbind-krb5-locator-4.2.3-12.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821874" comment="samba-winbind-modules-4.2.3-12.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157575" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7575</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7575" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7575" ref_url="https://www.suse.com/security/cve/CVE-2015-7575" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001807.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001818.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0636-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001942.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0263-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WB2NQ3V2BHAFYEU5DCOQH3B3SIMMKMRI/#WB2NQ3V2BHAFYEU5DCOQH3B3SIMMKMRI" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0268-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OXB4QAFWJUQEZEK2MFV5C6VMXORCHTOC/#OXB4QAFWJUQEZEK2MFV5C6VMXORCHTOC" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EM5IRJXZE66HIX564A56RBKHOFXINXH2/#EM5IRJXZE66HIX564A56RBKHOFXINXH2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0272-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YX6XI7PJCN66EMA6MG6N5F3SLBKL3UF6/#YX6XI7PJCN66EMA6MG6N5F3SLBKL3UF6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0279-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5PDBMSXPRSUZRBQWXDNZ3KHQVA53KFEH/#5PDBMSXPRSUZRBQWXDNZ3KHQVA53KFEH" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Mozilla Network Security Services (NSS) before 3.20.2, as used in Mozilla Firefox before 43.0.2 and Firefox ESR 38.x before 38.5.2, does not reject MD5 signatures in Server Key Exchange messages in TLS 1.2 Handshake Protocol traffic, which makes it easier for man-in-the-middle attackers to spoof servers by triggering a collision.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7575/">CVE-2015-7575 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7575">CVE-2015-7575 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/959888">SUSE bug 959888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960402">SUSE bug 960402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960996">SUSE bug 960996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961280">SUSE bug 961280</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961281">SUSE bug 961281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961282">SUSE bug 961282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961283">SUSE bug 961283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961284">SUSE bug 961284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961290">SUSE bug 961290</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961357">SUSE bug 961357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962743">SUSE bug 962743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963937">SUSE bug 963937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967521">SUSE bug 967521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981087">SUSE bug 981087</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821716" comment="gnutls-3.3.8-14.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821717" comment="gnutls-c++-3.3.8-14.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821718" comment="gnutls-dane-3.3.8-14.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821719" comment="gnutls-devel-3.3.8-14.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821720" comment="gnutls-utils-3.3.8-14.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821743" comment="java-1.7.0-openjdk-1.7.0.95-2.6.4.0.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821744" comment="java-1.7.0-openjdk-accessibility-1.7.0.95-2.6.4.0.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821745" comment="java-1.7.0-openjdk-demo-1.7.0.95-2.6.4.0.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821746" comment="java-1.7.0-openjdk-devel-1.7.0.95-2.6.4.0.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821747" comment="java-1.7.0-openjdk-headless-1.7.0.95-2.6.4.0.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821748" comment="java-1.7.0-openjdk-javadoc-1.7.0.95-2.6.4.0.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821749" comment="java-1.7.0-openjdk-src-1.7.0.95-2.6.4.0.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821729" comment="java-1.8.0-openjdk-1.8.0.71-2.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821730" comment="java-1.8.0-openjdk-accessibility-1.8.0.71-2.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821731" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.71-2.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821732" comment="java-1.8.0-openjdk-debug-1.8.0.71-2.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821733" comment="java-1.8.0-openjdk-demo-1.8.0.71-2.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821734" comment="java-1.8.0-openjdk-demo-debug-1.8.0.71-2.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821735" comment="java-1.8.0-openjdk-devel-1.8.0.71-2.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821736" comment="java-1.8.0-openjdk-devel-debug-1.8.0.71-2.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821737" comment="java-1.8.0-openjdk-headless-1.8.0.71-2.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821738" comment="java-1.8.0-openjdk-headless-debug-1.8.0.71-2.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821739" comment="java-1.8.0-openjdk-javadoc-1.8.0.71-2.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821740" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.71-2.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821741" comment="java-1.8.0-openjdk-src-1.8.0.71-2.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821742" comment="java-1.8.0-openjdk-src-debug-1.8.0.71-2.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821701" comment="nss-3.19.1-19.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821702" comment="nss-devel-3.19.1-19.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821703" comment="nss-pkcs11-devel-3.19.1-19.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821704" comment="nss-sysinit-3.19.1-19.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821705" comment="nss-tools-3.19.1-19.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821706" comment="openssl-1.0.1e-51.el7_2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821707" comment="openssl-devel-1.0.1e-51.el7_2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821708" comment="openssl-libs-1.0.1e-51.el7_2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821709" comment="openssl-perl-1.0.1e-51.el7_2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821710" comment="openssl-static-1.0.1e-51.el7_2.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157613" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7613</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7613" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7613" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7613" ref_url="https://www.suse.com/security/cve/CVE-2015-7613" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001699.html" source="SUSE-SU"/>
    <description>
    Race condition in the IPC object implementation in the Linux kernel through 4.2.3 allows local users to gain privileges by triggering an ipc_addid call that leads to uid and gid comparisons against uninitialized data, related to msg.c, shm.c, and util.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-7613/">CVE-2015-7613 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7613">CVE-2015-7613 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/923755">SUSE bug 923755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948536">SUSE bug 948536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948701">SUSE bug 948701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963994">SUSE bug 963994</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821413" comment="kernel-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821414" comment="kernel-abi-whitelists-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821415" comment="kernel-debug-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821418" comment="kernel-doc-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821419" comment="kernel-headers-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821420" comment="kernel-tools-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821421" comment="kernel-tools-libs-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821423" comment="perf-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821424" comment="python-perf-3.10.0-327.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157691" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7691</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7691" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7691" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7691" ref_url="https://www.suse.com/security/cve/CVE-2015-7691" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002215.html" source="SUSE-SU"/>
    <description>
    The crypto_xmit function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (crash) via crafted packets containing particular autokey operations.  NOTE: This vulnerability exists due to an incomplete fix for CVE-2014-9750.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7691/">CVE-2015-7691 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7691">CVE-2015-7691 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1010964">SUSE bug 1010964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911792">SUSE bug 911792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951608">SUSE bug 951608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992991">SUSE bug 992991</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822482" comment="ntp-4.2.6p5-25.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822483" comment="ntp-doc-4.2.6p5-25.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822484" comment="ntp-perl-4.2.6p5-25.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822485" comment="ntpdate-4.2.6p5-25.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822486" comment="sntp-4.2.6p5-25.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157692" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7692</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7692" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7692" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7692" ref_url="https://www.suse.com/security/cve/CVE-2015-7692" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002215.html" source="SUSE-SU"/>
    <description>
    The crypto_xmit function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (crash).  NOTE: This vulnerability exists due to an incomplete fix for CVE-2014-9750.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7692/">CVE-2015-7692 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7692">CVE-2015-7692 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1010964">SUSE bug 1010964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911792">SUSE bug 911792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951608">SUSE bug 951608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992991">SUSE bug 992991</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822482" comment="ntp-4.2.6p5-25.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822483" comment="ntp-doc-4.2.6p5-25.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822484" comment="ntp-perl-4.2.6p5-25.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822485" comment="ntpdate-4.2.6p5-25.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822486" comment="sntp-4.2.6p5-25.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157701" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7701</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7701" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7701" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7701" ref_url="https://www.suse.com/security/cve/CVE-2015-7701" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002215.html" source="SUSE-SU"/>
    <description>
    Memory leak in the CRYPTO_ASSOC function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (memory consumption).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7701/">CVE-2015-7701 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7701">CVE-2015-7701 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1010964">SUSE bug 1010964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951608">SUSE bug 951608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992991">SUSE bug 992991</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822482" comment="ntp-4.2.6p5-25.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822483" comment="ntp-doc-4.2.6p5-25.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822484" comment="ntp-perl-4.2.6p5-25.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822485" comment="ntpdate-4.2.6p5-25.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822486" comment="sntp-4.2.6p5-25.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157702" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7702</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7702" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7702" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7702" ref_url="https://www.suse.com/security/cve/CVE-2015-7702" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002215.html" source="SUSE-SU"/>
    <description>
    The crypto_xmit function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (crash).  NOTE: This vulnerability exists due to an incomplete fix for CVE-2014-9750.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7702/">CVE-2015-7702 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7702">CVE-2015-7702 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1010964">SUSE bug 1010964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911792">SUSE bug 911792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951608">SUSE bug 951608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992991">SUSE bug 992991</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822482" comment="ntp-4.2.6p5-25.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822483" comment="ntp-doc-4.2.6p5-25.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822484" comment="ntp-perl-4.2.6p5-25.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822485" comment="ntpdate-4.2.6p5-25.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822486" comment="sntp-4.2.6p5-25.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157703" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7703</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7703" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7703" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7703" ref_url="https://www.suse.com/security/cve/CVE-2015-7703" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002215.html" source="SUSE-SU"/>
    <description>
    The "pidfile" or "driftfile" directives in NTP ntpd 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77, when ntpd is configured to allow remote configuration, allows remote attackers with an IP address that is allowed to send configuration requests, and with knowledge of the remote configuration password to write to arbitrary files via the :config command.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-04-21"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7703/">CVE-2015-7703 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7703">CVE-2015-7703 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1010964">SUSE bug 1010964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943216">SUSE bug 943216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943218">SUSE bug 943218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943219">SUSE bug 943219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943221">SUSE bug 943221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951608">SUSE bug 951608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822482" comment="ntp-4.2.6p5-25.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822483" comment="ntp-doc-4.2.6p5-25.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822484" comment="ntp-perl-4.2.6p5-25.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822485" comment="ntpdate-4.2.6p5-25.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822486" comment="sntp-4.2.6p5-25.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157704" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7704</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7704" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7704" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7704" ref_url="https://www.suse.com/security/cve/CVE-2015-7704" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1568-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002215.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1329-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QVMT4ZV3NQWZAZSNNE6QHFWQCWEKTFI6/#QVMT4ZV3NQWZAZSNNE6QHFWQCWEKTFI6" source="SUSE-SU"/>
    <description>
    The ntpd client in NTP 4.x before 4.2.8p4 and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service via a number of crafted "KOD" messages.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7704/">CVE-2015-7704 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7704">CVE-2015-7704 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1010964">SUSE bug 1010964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951608">SUSE bug 951608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952611">SUSE bug 952611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977446">SUSE bug 977446</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821332" comment="ntp-4.2.6p5-19.el7_1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821333" comment="ntp-doc-4.2.6p5-19.el7_1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821334" comment="ntp-perl-4.2.6p5-19.el7_1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821335" comment="ntpdate-4.2.6p5-19.el7_1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821336" comment="sntp-4.2.6p5-19.el7_1.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157837" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7837</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7837" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7837" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7837" ref_url="https://www.suse.com/security/cve/CVE-2015-7837" source="SUSE CVE"/>
    <description>
    The Linux kernel, as used in Red Hat Enterprise Linux 7, kernel-rt, and Enterprise MRG 2 and when booted with UEFI Secure Boot enabled, allows local users to bypass intended securelevel/secureboot restrictions by leveraging improper handling of secure_boot flag across kexec reboot.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7837/">CVE-2015-7837 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7837">CVE-2015-7837 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/950804">SUSE bug 950804</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821413" comment="kernel-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821414" comment="kernel-abi-whitelists-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821415" comment="kernel-debug-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821418" comment="kernel-doc-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821419" comment="kernel-headers-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821420" comment="kernel-tools-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821421" comment="kernel-tools-libs-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821423" comment="perf-3.10.0-327.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821424" comment="python-perf-3.10.0-327.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157852" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7852</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7852" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7852" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7852" ref_url="https://www.suse.com/security/cve/CVE-2015-7852" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002215.html" source="SUSE-SU"/>
    <description>
    ntpq in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (crash) via crafted mode 6 response packets.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7852/">CVE-2015-7852 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7852">CVE-2015-7852 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1010964">SUSE bug 1010964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951608">SUSE bug 951608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992991">SUSE bug 992991</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822482" comment="ntp-4.2.6p5-25.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822483" comment="ntp-doc-4.2.6p5-25.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822484" comment="ntp-perl-4.2.6p5-25.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822485" comment="ntpdate-4.2.6p5-25.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822486" comment="sntp-4.2.6p5-25.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157872" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7872</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7872" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7872" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7872" ref_url="https://www.suse.com/security/cve/CVE-2015-7872" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0335-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002207.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1842-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/52CT3NPGIEFS3FRUZ5D6HC6XZML63T2K/#52CT3NPGIEFS3FRUZ5D6HC6XZML63T2K" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OC7663UNXLKFWJKPITRGQNF4FU4KJWNK/#OC7663UNXLKFWJKPITRGQNF4FU4KJWNK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1008-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SZXKXH7AVPHU63LOTNQP5IB3D5RGAWEB/#SZXKXH7AVPHU63LOTNQP5IB3D5RGAWEB" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M3DY3J73NZK532BN4KZEFFGULVYJU3D2/#M3DY3J73NZK532BN4KZEFFGULVYJU3D2" source="SUSE-SU"/>
    <description>
    The key_gc_unused_keys function in security/keys/gc.c in the Linux kernel through 4.2.6 allows local users to cause a denial of service (OOPS) via crafted keyctl commands.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7872/">CVE-2015-7872 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7872">CVE-2015-7872 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/951440">SUSE bug 951440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951542">SUSE bug 951542</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951638">SUSE bug 951638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958463">SUSE bug 958463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958601">SUSE bug 958601</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821801" comment="kernel-3.10.0-327.10.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821802" comment="kernel-abi-whitelists-3.10.0-327.10.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821803" comment="kernel-debug-3.10.0-327.10.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821806" comment="kernel-doc-3.10.0-327.10.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821807" comment="kernel-headers-3.10.0-327.10.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821808" comment="kernel-tools-3.10.0-327.10.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821809" comment="kernel-tools-libs-3.10.0-327.10.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821811" comment="perf-3.10.0-327.10.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821812" comment="python-perf-3.10.0-327.10.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157941" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7941</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7941" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7941" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7941" ref_url="https://www.suse.com/security/cve/CVE-2015-7941" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001948.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14697-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U5YNW74OL2W7SH2XTAVN5TODNFIVFL3Y/" source="SUSE-SU"/>
    <description>
    libxml2 2.9.2 does not properly stop parsing invalid input, which allows context-dependent attackers to cause a denial of service (out-of-bounds read and libxml2 crash) via crafted XML data to the (1) xmlParseEntityDecl or (2) xmlParseConditionalSections function in parser.c, as demonstrated by non-terminated entities.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7941/">CVE-2015-7941 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7941">CVE-2015-7941 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951734">SUSE bug 951734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951735">SUSE bug 951735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969769">SUSE bug 969769</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821611" comment="libxml2-2.9.1-6.el7_2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821612" comment="libxml2-devel-2.9.1-6.el7_2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821613" comment="libxml2-python-2.9.1-6.el7_2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821614" comment="libxml2-static-2.9.1-6.el7_2.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157942" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7942</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7942" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7942" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7942" ref_url="https://www.suse.com/security/cve/CVE-2015-7942" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001948.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14697-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U5YNW74OL2W7SH2XTAVN5TODNFIVFL3Y/" source="SUSE-SU"/>
    <description>
    The xmlParseConditionalSections function in parser.c in libxml2 does not properly skip intermediary entities when it stops parsing invalid input, which allows context-dependent attackers to cause a denial of service (out-of-bounds read and crash) via crafted XML data, a different vulnerability than CVE-2015-7941.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7942/">CVE-2015-7942 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7942">CVE-2015-7942 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951735">SUSE bug 951735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969769">SUSE bug 969769</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821611" comment="libxml2-2.9.1-6.el7_2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821612" comment="libxml2-devel-2.9.1-6.el7_2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821613" comment="libxml2-python-2.9.1-6.el7_2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821614" comment="libxml2-static-2.9.1-6.el7_2.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157974" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7974</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7974" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7974" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7974" ref_url="https://www.suse.com/security/cve/CVE-2015-7974" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1568-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002215.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1292-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3TNDHINHCNU765I5S27EQLRF6VZJEADV/#3TNDHINHCNU765I5S27EQLRF6VZJEADV" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1329-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QVMT4ZV3NQWZAZSNNE6QHFWQCWEKTFI6/#QVMT4ZV3NQWZAZSNNE6QHFWQCWEKTFI6" source="SUSE-SU"/>
    <description>
    NTP 4.x before 4.2.8p6 and 4.3.x before 4.3.90 do not verify peer associations of symmetric keys when authenticating packets, which might allow remote attackers to conduct impersonation attacks via an arbitrary trusted key, aka a "skeleton key."
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7974/">CVE-2015-7974 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7974">CVE-2015-7974 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962960">SUSE bug 962960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962995">SUSE bug 962995</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822482" comment="ntp-4.2.6p5-25.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822483" comment="ntp-doc-4.2.6p5-25.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822484" comment="ntp-perl-4.2.6p5-25.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822485" comment="ntpdate-4.2.6p5-25.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822486" comment="sntp-4.2.6p5-25.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157977" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7977</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7977" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7977" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7977" ref_url="https://www.suse.com/security/cve/CVE-2015-7977" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002215.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1292-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3TNDHINHCNU765I5S27EQLRF6VZJEADV/#3TNDHINHCNU765I5S27EQLRF6VZJEADV" source="SUSE-SU"/>
    <description>
    ntpd in NTP before 4.2.8p6 and 4.3.x before 4.3.90 allows remote attackers to cause a denial of service (NULL pointer dereference) via a ntpdc reslist command.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7977/">CVE-2015-7977 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7977">CVE-2015-7977 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962970">SUSE bug 962970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962995">SUSE bug 962995</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822482" comment="ntp-4.2.6p5-25.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822483" comment="ntp-doc-4.2.6p5-25.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822484" comment="ntp-perl-4.2.6p5-25.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822485" comment="ntpdate-4.2.6p5-25.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822486" comment="sntp-4.2.6p5-25.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157978" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7978</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7978" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7978" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7978" ref_url="https://www.suse.com/security/cve/CVE-2015-7978" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002215.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1292-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3TNDHINHCNU765I5S27EQLRF6VZJEADV/#3TNDHINHCNU765I5S27EQLRF6VZJEADV" source="SUSE-SU"/>
    <description>
    NTP before 4.2.8p6 and 4.3.0 before 4.3.90 allows a remote attackers to cause a denial of service (stack exhaustion) via an ntpdc relist command, which triggers recursive traversal of the restriction list.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-04-21"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7978/">CVE-2015-7978 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7978">CVE-2015-7978 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962970">SUSE bug 962970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962995">SUSE bug 962995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963000">SUSE bug 963000</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822482" comment="ntp-4.2.6p5-25.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822483" comment="ntp-doc-4.2.6p5-25.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822484" comment="ntp-perl-4.2.6p5-25.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822485" comment="ntpdate-4.2.6p5-25.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822486" comment="sntp-4.2.6p5-25.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157979" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7979</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7979" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7979" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7979" ref_url="https://www.suse.com/security/cve/CVE-2015-7979" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002215.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1292-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3TNDHINHCNU765I5S27EQLRF6VZJEADV/#3TNDHINHCNU765I5S27EQLRF6VZJEADV" source="SUSE-SU"/>
    <description>
    NTP before 4.2.8p6 and 4.3.x before 4.3.90 allows remote attackers to cause a denial of service (client-server association tear down) by sending broadcast packets with invalid authentication to a broadcast client.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7979/">CVE-2015-7979 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7979">CVE-2015-7979 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962784">SUSE bug 962784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962995">SUSE bug 962995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977459">SUSE bug 977459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982065">SUSE bug 982065</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822482" comment="ntp-4.2.6p5-25.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822483" comment="ntp-doc-4.2.6p5-25.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822484" comment="ntp-perl-4.2.6p5-25.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822485" comment="ntpdate-4.2.6p5-25.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822486" comment="sntp-4.2.6p5-25.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157981" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7981</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7981" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7981" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7981" ref_url="https://www.suse.com/security/cve/CVE-2015-7981" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2017-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0636-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001942.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2099-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IA3JSOC6TODLLXWQSU7IIE27WYY434BQ/#IA3JSOC6TODLLXWQSU7IIE27WYY434BQ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1652-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YY3W2XBVKUBNO6MRKKQXJUMKNUQOVG67/#YY3W2XBVKUBNO6MRKKQXJUMKNUQOVG67" source="SUSE-SU"/>
    <description>
    The png_convert_to_rfc1123 function in png.c in libpng 1.0.x before 1.0.64, 1.2.x before 1.2.54, and 1.4.x before 1.4.17 allows remote attackers to obtain sensitive process memory information via crafted tIME chunk data in an image file, which triggers an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7981/">CVE-2015-7981 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7981">CVE-2015-7981 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/952051">SUSE bug 952051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960402">SUSE bug 960402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963937">SUSE bug 963937</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821643" comment="libpng12-1.2.50-7.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821644" comment="libpng12-devel-1.2.50-7.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158000" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8000</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8000" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8000" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8000" ref_url="https://www.suse.com/security/cve/CVE-2015-8000" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2340-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2341-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0227-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001825.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2364-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4LLAY7U4UZOWUMSQQQUGA2XQZDZLE2XZ/#4LLAY7U4UZOWUMSQQQUGA2XQZDZLE2XZ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2365-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LKSGDTDLLOP6WH3G6UDRZYUALO3SFCJN/#LKSGDTDLLOP6WH3G6UDRZYUALO3SFCJN" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2391-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BN6RB4J4H7MP2Z6KTTUCIPB3QEIUR4IL/#BN6RB4J4H7MP2Z6KTTUCIPB3QEIUR4IL" source="SUSE-SU"/>
    <description>
    db.c in named in ISC BIND 9.x before 9.9.8-P2 and 9.10.x before 9.10.3-P2 allows remote attackers to cause a denial of service (REQUIRE assertion failure and daemon exit) via a malformed class attribute.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8000/">CVE-2015-8000 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8000">CVE-2015-8000 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/944066">SUSE bug 944066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958861">SUSE bug 958861</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821657" comment="bind-9.9.4-29.el7_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821658" comment="bind-chroot-9.9.4-29.el7_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821659" comment="bind-devel-9.9.4-29.el7_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821660" comment="bind-libs-9.9.4-29.el7_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821661" comment="bind-libs-lite-9.9.4-29.el7_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821662" comment="bind-license-9.9.4-29.el7_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821663" comment="bind-lite-devel-9.9.4-29.el7_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821664" comment="bind-pkcs11-9.9.4-29.el7_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821665" comment="bind-pkcs11-devel-9.9.4-29.el7_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821666" comment="bind-pkcs11-libs-9.9.4-29.el7_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821667" comment="bind-pkcs11-utils-9.9.4-29.el7_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821668" comment="bind-sdb-9.9.4-29.el7_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821669" comment="bind-sdb-chroot-9.9.4-29.el7_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821670" comment="bind-utils-9.9.4-29.el7_2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158035" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8035</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8035" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8035" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8035" ref_url="https://www.suse.com/security/cve/CVE-2015-8035" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001948.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14697-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U5YNW74OL2W7SH2XTAVN5TODNFIVFL3Y/" source="SUSE-SU"/>
    <description>
    The xz_decomp function in xzlib.c in libxml2 2.9.1 does not properly detect compression errors, which allows context-dependent attackers to cause a denial of service (process hang) via crafted XML data.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8035/">CVE-2015-8035 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8035">CVE-2015-8035 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1088279">SUSE bug 1088279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105166">SUSE bug 1105166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954429">SUSE bug 954429</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827903" comment="libxml2-2.9.1-6.el7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827904" comment="libxml2-devel-2.9.1-6.el7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827905" comment="libxml2-python-2.9.1-6.el7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827906" comment="libxml2-static-2.9.1-6.el7.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158104" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8104</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8104" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8104" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8104" ref_url="https://www.suse.com/security/cve/CVE-2015-8104" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002207.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0124-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PKFBCJLYM3GQVTBACNHPS6L4SXGP266S/#PKFBCJLYM3GQVTBACNHPS6L4SXGP266S" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OC7663UNXLKFWJKPITRGQNF4FU4KJWNK/#OC7663UNXLKFWJKPITRGQNF4FU4KJWNK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0318-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7PLUD6GJFLZ2LR3VZPLUZ5KPDX3EVFZS/#7PLUD6GJFLZ2LR3VZPLUZ5KPDX3EVFZS" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1008-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SZXKXH7AVPHU63LOTNQP5IB3D5RGAWEB/#SZXKXH7AVPHU63LOTNQP5IB3D5RGAWEB" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M3DY3J73NZK532BN4KZEFFGULVYJU3D2/#M3DY3J73NZK532BN4KZEFFGULVYJU3D2" source="SUSE-SU"/>
    <description>
    The KVM subsystem in the Linux kernel through 4.2.6, and Xen 4.3.x through 4.6.x, allows guest OS users to cause a denial of service (host OS panic or hang) by triggering many #DB (aka Debug) exceptions, related to svm.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8104/">CVE-2015-8104 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8104">CVE-2015-8104 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215748">SUSE bug 1215748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953527">SUSE bug 953527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954018">SUSE bug 954018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954404">SUSE bug 954404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954405">SUSE bug 954405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962977">SUSE bug 962977</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821615" comment="kernel-3.10.0-327.3.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821616" comment="kernel-abi-whitelists-3.10.0-327.3.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821617" comment="kernel-debug-3.10.0-327.3.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821620" comment="kernel-doc-3.10.0-327.3.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821621" comment="kernel-headers-3.10.0-327.3.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821622" comment="kernel-tools-3.10.0-327.3.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821623" comment="kernel-tools-libs-3.10.0-327.3.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821625" comment="perf-3.10.0-327.3.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821626" comment="python-perf-3.10.0-327.3.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158126" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8126</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8126" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8126" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8126" ref_url="https://www.suse.com/security/cve/CVE-2015-8126" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2013-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2017-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001779.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001783.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001790.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0636-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001942.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2099-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IA3JSOC6TODLLXWQSU7IIE27WYY434BQ/#IA3JSOC6TODLLXWQSU7IIE27WYY434BQ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2100-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O3RIBJLRBMGLPB65CDCRVKAPQAUO27ON/#O3RIBJLRBMGLPB65CDCRVKAPQAUO27ON" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0263-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WB2NQ3V2BHAFYEU5DCOQH3B3SIMMKMRI/#WB2NQ3V2BHAFYEU5DCOQH3B3SIMMKMRI" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0268-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OXB4QAFWJUQEZEK2MFV5C6VMXORCHTOC/#OXB4QAFWJUQEZEK2MFV5C6VMXORCHTOC" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EM5IRJXZE66HIX564A56RBKHOFXINXH2/#EM5IRJXZE66HIX564A56RBKHOFXINXH2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0272-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YX6XI7PJCN66EMA6MG6N5F3SLBKL3UF6/#YX6XI7PJCN66EMA6MG6N5F3SLBKL3UF6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0279-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5PDBMSXPRSUZRBQWXDNZ3KHQVA53KFEH/#5PDBMSXPRSUZRBQWXDNZ3KHQVA53KFEH" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0664-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/D3C3NOJM72UXURYDWTEMDOPUCNQC7J6A/#D3C3NOJM72UXURYDWTEMDOPUCNQC7J6A" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0684-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DDITRUQS4SRIKAXVWYM3UEYWRLUUYM7Z/#DDITRUQS4SRIKAXVWYM3UEYWRLUUYM7Z" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0729-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3OPH54WIXHYBZND4XGIJC36WO62H6YQD/#3OPH54WIXHYBZND4XGIJC36WO62H6YQD" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1652-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YY3W2XBVKUBNO6MRKKQXJUMKNUQOVG67/#YY3W2XBVKUBNO6MRKKQXJUMKNUQOVG67" source="SUSE-SU"/>
    <description>
    Multiple buffer overflows in the (1) png_set_PLTE and (2) png_get_PLTE functions in libpng before 1.0.64, 1.1.x and 1.2.x before 1.2.54, 1.3.x and 1.4.x before 1.4.17, 1.5.x before 1.5.24, and 1.6.x before 1.6.19 allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a small bit-depth value in an IHDR (aka image header) chunk in a PNG image.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8126/">CVE-2015-8126 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8126">CVE-2015-8126 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/954980">SUSE bug 954980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958198">SUSE bug 958198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960402">SUSE bug 960402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962743">SUSE bug 962743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963937">SUSE bug 963937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969333">SUSE bug 969333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821645" comment="libpng-1.5.13-7.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821646" comment="libpng-devel-1.5.13-7.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821647" comment="libpng-static-1.5.13-7.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821643" comment="libpng12-1.2.50-7.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821644" comment="libpng12-devel-1.2.50-7.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158138" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8138</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8138" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8138" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8138" ref_url="https://www.suse.com/security/cve/CVE-2015-8138" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002215.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1292-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3TNDHINHCNU765I5S27EQLRF6VZJEADV/#3TNDHINHCNU765I5S27EQLRF6VZJEADV" source="SUSE-SU"/>
    <description>
    NTP before 4.2.8p6 and 4.3.x before 4.3.90 allows remote attackers to bypass the origin timestamp validation via a packet with an origin timestamp set to zero.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8138/">CVE-2015-8138 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8138">CVE-2015-8138 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/951608">SUSE bug 951608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963002">SUSE bug 963002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974668">SUSE bug 974668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977446">SUSE bug 977446</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821750" comment="ntp-4.2.6p5-22.el7_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821751" comment="ntp-doc-4.2.6p5-22.el7_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821752" comment="ntp-perl-4.2.6p5-22.el7_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821753" comment="ntpdate-4.2.6p5-22.el7_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821754" comment="sntp-4.2.6p5-22.el7_2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158158" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8158</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8158" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8158" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8158" ref_url="https://www.suse.com/security/cve/CVE-2015-8158" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002215.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1292-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3TNDHINHCNU765I5S27EQLRF6VZJEADV/#3TNDHINHCNU765I5S27EQLRF6VZJEADV" source="SUSE-SU"/>
    <description>
    The getresponse function in ntpq in NTP versions before 4.2.8p9 and 4.3.x before 4.3.90 allows remote attackers to cause a denial of service (infinite loop) via crafted packets with incorrect values.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-04-21"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8158/">CVE-2015-8158 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8158">CVE-2015-8158 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962966">SUSE bug 962966</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822482" comment="ntp-4.2.6p5-25.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822483" comment="ntp-doc-4.2.6p5-25.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822484" comment="ntp-perl-4.2.6p5-25.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822485" comment="ntpdate-4.2.6p5-25.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822486" comment="sntp-4.2.6p5-25.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158241" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8241</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8241" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8241" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8241" ref_url="https://www.suse.com/security/cve/CVE-2015-8241" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001948.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14697-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U5YNW74OL2W7SH2XTAVN5TODNFIVFL3Y/" source="SUSE-SU"/>
    <description>
    The xmlNextChar function in libxml2 2.9.2 does not properly check the state, which allows context-dependent attackers to cause a denial of service (heap-based buffer over-read and application crash) or obtain sensitive information via crafted XML data.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8241/">CVE-2015-8241 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8241">CVE-2015-8241 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956018">SUSE bug 956018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959469">SUSE bug 959469</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969769">SUSE bug 969769</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821611" comment="libxml2-2.9.1-6.el7_2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821612" comment="libxml2-devel-2.9.1-6.el7_2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821613" comment="libxml2-python-2.9.1-6.el7_2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821614" comment="libxml2-static-2.9.1-6.el7_2.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158242" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8242</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8242" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8242" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8242" ref_url="https://www.suse.com/security/cve/CVE-2015-8242" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001948.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14697-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U5YNW74OL2W7SH2XTAVN5TODNFIVFL3Y/" source="SUSE-SU"/>
    <description>
    The xmlSAX2TextNode function in SAX2.c in the push interface in the HTML parser in libxml2 before 2.9.3 allows context-dependent attackers to cause a denial of service (stack-based buffer over-read and application crash) or obtain sensitive information via crafted XML data.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8242/">CVE-2015-8242 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8242">CVE-2015-8242 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956021">SUSE bug 956021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959469">SUSE bug 959469</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969769">SUSE bug 969769</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821611" comment="libxml2-2.9.1-6.el7_2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821612" comment="libxml2-devel-2.9.1-6.el7_2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821613" comment="libxml2-python-2.9.1-6.el7_2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821614" comment="libxml2-static-2.9.1-6.el7_2.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158317" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8317</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8317" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8317" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8317" ref_url="https://www.suse.com/security/cve/CVE-2015-8317" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001948.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14697-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U5YNW74OL2W7SH2XTAVN5TODNFIVFL3Y/" source="SUSE-SU"/>
    <description>
    The xmlParseXMLDecl function in parser.c in libxml2 before 2.9.3 allows context-dependent attackers to obtain sensitive information via an (1) unterminated encoding value or (2) incomplete XML declaration in XML data, which triggers an out-of-bounds heap read.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8317/">CVE-2015-8317 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8317">CVE-2015-8317 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956260">SUSE bug 956260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959469">SUSE bug 959469</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969769">SUSE bug 969769</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821611" comment="libxml2-2.9.1-6.el7_2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821612" comment="libxml2-devel-2.9.1-6.el7_2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821613" comment="libxml2-python-2.9.1-6.el7_2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821614" comment="libxml2-static-2.9.1-6.el7_2.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158325" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8325</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8325" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8325" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8325" ref_url="https://www.suse.com/security/cve/CVE-2015-8325" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002338.html" source="SUSE-SU"/>
		<reference ref_id="TID7022102" ref_url="https://www.suse.com/support/kb/doc/?id=7022102" source="SUSE-SU"/>
    <description>
    The do_setup_env function in session.c in sshd in OpenSSH through 7.2p2, when the UseLogin feature is enabled and PAM is configured to read .pam_environment files in user home directories, allows local users to gain privileges by triggering a crafted environment for the /bin/login program, as demonstrated by an LD_PRELOAD environment variable.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8325/">CVE-2015-8325 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8325">CVE-2015-8325 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1138392">SUSE bug 1138392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975865">SUSE bug 975865</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/996040">SUSE bug 996040</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822499" comment="openssh-6.6.1p1-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822500" comment="openssh-askpass-6.6.1p1-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822501" comment="openssh-clients-6.6.1p1-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822502" comment="openssh-keycat-6.6.1p1-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822503" comment="openssh-ldap-6.6.1p1-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822504" comment="openssh-server-6.6.1p1-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822505" comment="openssh-server-sysvinit-6.6.1p1-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822506" comment="pam_ssh_agent_auth-0.9.3-9.31.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158370" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8370</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8370" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8370" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8370" ref_url="https://www.suse.com/security/cve/CVE-2015-8370" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001770.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2375-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6HCIOHRYCBOGNSMICWP7RHCYVA2NZZPO/#6HCIOHRYCBOGNSMICWP7RHCYVA2NZZPO" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2392-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WQ4XUBQD26IVJUIRHZGRTUF7Z6ZUULDV/#WQ4XUBQD26IVJUIRHZGRTUF7Z6ZUULDV" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0036-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4OAXX6TGRO3I5KL46K32COXYNVNDPNXG/#4OAXX6TGRO3I5KL46K32COXYNVNDPNXG" source="SUSE-SU"/>
    <description>
    Multiple integer underflows in Grub2 1.98 through 2.02 allow physically proximate attackers to bypass authentication, obtain sensitive information, or cause a denial of service (disk corruption) via backspace characters in the (1) grub_username_get function in grub-core/normal/auth.c or the (2) grub_password_get function in lib/crypto.c, which trigger an "Off-by-two" or "Out of bounds overwrite" memory error.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8370/">CVE-2015-8370 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8370">CVE-2015-8370 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/956631">SUSE bug 956631</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821653" comment="grub2-2.02-0.33.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821654" comment="grub2-efi-2.02-0.33.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821655" comment="grub2-efi-modules-2.02-0.33.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821656" comment="grub2-tools-2.02-0.33.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158374" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8374</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8374" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8374" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8374" ref_url="https://www.suse.com/security/cve/CVE-2015-8374" source="SUSE CVE"/>
    <description>
    fs/btrfs/inode.c in the Linux kernel before 4.3.3 mishandles compressed inline extents, which allows local users to obtain sensitive pre-truncation information from a file via a clone action.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8374/">CVE-2015-8374 at SUSE</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8374">CVE-2015-8374 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/923755">SUSE bug 923755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956053">SUSE bug 956053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963994">SUSE bug 963994</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822375" comment="kernel-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822376" comment="kernel-abi-whitelists-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822377" comment="kernel-debug-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822380" comment="kernel-doc-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822381" comment="kernel-headers-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822382" comment="kernel-tools-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822383" comment="kernel-tools-libs-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822385" comment="perf-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822386" comment="python-perf-3.10.0-514.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158385" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8385</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8385" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8385" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8385" ref_url="https://www.suse.com/security/cve/CVE-2015-8385" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
    <description>
    PCRE before 8.38 mishandles the /(?|(\k'Pm')|(?'Pm'))/ pattern and related patterns with certain forward references, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8385/">CVE-2015-8385 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8385">CVE-2015-8385 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/957598">SUSE bug 957598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958373">SUSE bug 958373</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822065" comment="pcre-8.32-15.el7_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822066" comment="pcre-devel-8.32-15.el7_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822067" comment="pcre-static-8.32-15.el7_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822068" comment="pcre-tools-8.32-15.el7_2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158386" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8386</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8386" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8386" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8386" ref_url="https://www.suse.com/security/cve/CVE-2015-8386" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
    <description>
    PCRE before 8.38 mishandles the interaction of lookbehind assertions and mutually recursive subpatterns, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8386/">CVE-2015-8386 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8386">CVE-2015-8386 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/957598">SUSE bug 957598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958373">SUSE bug 958373</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822065" comment="pcre-8.32-15.el7_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822066" comment="pcre-devel-8.32-15.el7_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822067" comment="pcre-static-8.32-15.el7_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822068" comment="pcre-tools-8.32-15.el7_2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158388" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8388</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8388" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8388" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8388" ref_url="https://www.suse.com/security/cve/CVE-2015-8388" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
    <description>
    PCRE before 8.38 mishandles the /(?=di(?&lt;=(?1))|(?=(.))))/ pattern and related patterns with an unmatched closing parenthesis, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8388/">CVE-2015-8388 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8388">CVE-2015-8388 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/936227">SUSE bug 936227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957598">SUSE bug 957598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958373">SUSE bug 958373</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822065" comment="pcre-8.32-15.el7_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822066" comment="pcre-devel-8.32-15.el7_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822067" comment="pcre-static-8.32-15.el7_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822068" comment="pcre-tools-8.32-15.el7_2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158391" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8391</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8391" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8391" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8391" ref_url="https://www.suse.com/security/cve/CVE-2015-8391" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
    <description>
    The pcre_compile function in pcre_compile.c in PCRE before 8.38 mishandles certain [: nesting, which allows remote attackers to cause a denial of service (CPU consumption) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8391/">CVE-2015-8391 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8391">CVE-2015-8391 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/957598">SUSE bug 957598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958373">SUSE bug 958373</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822065" comment="pcre-8.32-15.el7_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822066" comment="pcre-devel-8.32-15.el7_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822067" comment="pcre-static-8.32-15.el7_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822068" comment="pcre-tools-8.32-15.el7_2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158472" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8472</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8472" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8472" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8472" ref_url="https://www.suse.com/security/cve/CVE-2015-8472" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0636-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001942.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0263-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WB2NQ3V2BHAFYEU5DCOQH3B3SIMMKMRI/#WB2NQ3V2BHAFYEU5DCOQH3B3SIMMKMRI" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0268-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OXB4QAFWJUQEZEK2MFV5C6VMXORCHTOC/#OXB4QAFWJUQEZEK2MFV5C6VMXORCHTOC" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EM5IRJXZE66HIX564A56RBKHOFXINXH2/#EM5IRJXZE66HIX564A56RBKHOFXINXH2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0272-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YX6XI7PJCN66EMA6MG6N5F3SLBKL3UF6/#YX6XI7PJCN66EMA6MG6N5F3SLBKL3UF6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0279-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5PDBMSXPRSUZRBQWXDNZ3KHQVA53KFEH/#5PDBMSXPRSUZRBQWXDNZ3KHQVA53KFEH" source="SUSE-SU"/>
    <description>
    Buffer overflow in the png_set_PLTE function in libpng before 1.0.65, 1.1.x and 1.2.x before 1.2.55, 1.3.x, 1.4.x before 1.4.18, 1.5.x before 1.5.25, and 1.6.x before 1.6.20 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a small bit-depth value in an IHDR (aka image header) chunk in a PNG image.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-8126.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-04-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8472/">CVE-2015-8472 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8472">CVE-2015-8472 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/954980">SUSE bug 954980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958198">SUSE bug 958198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960402">SUSE bug 960402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963937">SUSE bug 963937</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821645" comment="libpng-1.5.13-7.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821646" comment="libpng-devel-1.5.13-7.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821647" comment="libpng-static-1.5.13-7.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821643" comment="libpng12-1.2.50-7.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821644" comment="libpng12-devel-1.2.50-7.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158539" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8539</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8539" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8539" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8539" ref_url="https://www.suse.com/security/cve/CVE-2015-8539" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0335-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001847.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1937-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002207.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0280-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TD5WLQ4FFRPU2BIT7RWEY3U73G4UNDCS/#TD5WLQ4FFRPU2BIT7RWEY3U73G4UNDCS" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M3DY3J73NZK532BN4KZEFFGULVYJU3D2/#M3DY3J73NZK532BN4KZEFFGULVYJU3D2" source="SUSE-SU"/>
    <description>
    The KEYS subsystem in the Linux kernel before 4.4 allows local users to gain privileges or cause a denial of service (BUG) via crafted keyctl commands that negatively instantiate a key, related to security/keys/encrypted-keys/encrypted.c, security/keys/trusted.c, and security/keys/user_defined.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8539/">CVE-2015-8539 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8539">CVE-2015-8539 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1115893">SUSE bug 1115893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/781018">SUSE bug 781018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958463">SUSE bug 958463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958601">SUSE bug 958601</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823952" comment="kernel-3.10.0-693.17.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823953" comment="kernel-abi-whitelists-3.10.0-693.17.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823954" comment="kernel-debug-3.10.0-693.17.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823957" comment="kernel-doc-3.10.0-693.17.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823958" comment="kernel-headers-3.10.0-693.17.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823959" comment="kernel-tools-3.10.0-693.17.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823960" comment="kernel-tools-libs-3.10.0-693.17.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823962" comment="perf-3.10.0-693.17.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823963" comment="python-perf-3.10.0-693.17.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158543" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8543</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8543" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8543" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8543" ref_url="https://www.suse.com/security/cve/CVE-2015-8543" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002207.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0280-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TD5WLQ4FFRPU2BIT7RWEY3U73G4UNDCS/#TD5WLQ4FFRPU2BIT7RWEY3U73G4UNDCS" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OC7663UNXLKFWJKPITRGQNF4FU4KJWNK/#OC7663UNXLKFWJKPITRGQNF4FU4KJWNK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0318-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7PLUD6GJFLZ2LR3VZPLUZ5KPDX3EVFZS/#7PLUD6GJFLZ2LR3VZPLUZ5KPDX3EVFZS" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M3DY3J73NZK532BN4KZEFFGULVYJU3D2/#M3DY3J73NZK532BN4KZEFFGULVYJU3D2" source="SUSE-SU"/>
    <description>
    The networking implementation in the Linux kernel through 4.3.3, as used in Android and other products, does not validate protocol identifiers for certain protocol families, which allows local users to cause a denial of service (NULL function pointer dereference and system crash) or possibly gain privileges by leveraging CLONE_NEWUSER support to execute a crafted SOCK_RAW application.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8543/">CVE-2015-8543 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8543">CVE-2015-8543 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1020452">SUSE bug 1020452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052256">SUSE bug 1052256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115893">SUSE bug 1115893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923755">SUSE bug 923755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958886">SUSE bug 958886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963994">SUSE bug 963994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969522">SUSE bug 969522</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822375" comment="kernel-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822376" comment="kernel-abi-whitelists-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822377" comment="kernel-debug-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822380" comment="kernel-doc-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822381" comment="kernel-headers-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822382" comment="kernel-tools-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822383" comment="kernel-tools-libs-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822385" comment="perf-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822386" comment="python-perf-3.10.0-514.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158629" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8629</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8629" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8629" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8629" ref_url="https://www.suse.com/security/cve/CVE-2015-8629" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001871.html" source="SUSE-SU"/>
    <description>
    The xdr_nullstring function in lib/kadm5/kadm_rpc_xdr.c in kadmind in MIT Kerberos 5 (aka krb5) before 1.13.4 and 1.14.x before 1.14.1 does not verify whether '\0' characters exist as expected, which allows remote authenticated users to obtain sensitive information or cause a denial of service (out-of-bounds read) via a crafted string.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8629/">CVE-2015-8629 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8629">CVE-2015-8629 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/770172">SUSE bug 770172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963968">SUSE bug 963968</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821935" comment="krb5-devel-1.13.2-12.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821936" comment="krb5-libs-1.13.2-12.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821937" comment="krb5-pkinit-1.13.2-12.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821938" comment="krb5-server-1.13.2-12.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821939" comment="krb5-server-ldap-1.13.2-12.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821940" comment="krb5-workstation-1.13.2-12.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158630" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8630</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8630" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8630" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8630" ref_url="https://www.suse.com/security/cve/CVE-2015-8630" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001870.html" source="SUSE-SU"/>
    <description>
    The (1) kadm5_create_principal_3 and (2) kadm5_modify_principal functions in lib/kadm5/srv/svr_principal.c in kadmind in MIT Kerberos 5 (aka krb5) 1.12.x and 1.13.x before 1.13.4 and 1.14.x before 1.14.1 allow remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) by specifying KADM5_POLICY with a NULL policy name.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8630/">CVE-2015-8630 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8630">CVE-2015-8630 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/963964">SUSE bug 963964</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821935" comment="krb5-devel-1.13.2-12.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821936" comment="krb5-libs-1.13.2-12.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821937" comment="krb5-pkinit-1.13.2-12.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821938" comment="krb5-server-1.13.2-12.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821939" comment="krb5-server-ldap-1.13.2-12.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821940" comment="krb5-workstation-1.13.2-12.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158631" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8631</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8631" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8631" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8631" ref_url="https://www.suse.com/security/cve/CVE-2015-8631" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001871.html" source="SUSE-SU"/>
    <description>
    Multiple memory leaks in kadmin/server/server_stubs.c in kadmind in MIT Kerberos 5 (aka krb5) before 1.13.4 and 1.14.x before 1.14.1 allow remote authenticated users to cause a denial of service (memory consumption) via a request specifying a NULL principal name.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8631/">CVE-2015-8631 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8631">CVE-2015-8631 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/963975">SUSE bug 963975</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821935" comment="krb5-devel-1.13.2-12.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821936" comment="krb5-libs-1.13.2-12.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821937" comment="krb5-pkinit-1.13.2-12.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821938" comment="krb5-server-1.13.2-12.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821939" comment="krb5-server-ldap-1.13.2-12.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821940" comment="krb5-workstation-1.13.2-12.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158660" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8660</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8660" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8660" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8660" ref_url="https://www.suse.com/security/cve/CVE-2015-8660" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001932.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0752-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0755-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001936.html" source="SUSE-SU"/>
    <description>
    The ovl_setattr function in fs/overlayfs/inode.c in the Linux kernel through 4.3.3 attempts to merge distinct setattr operations, which allows local users to bypass intended access restrictions and modify the attributes of arbitrary overlay files via a crafted application.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8660/">CVE-2015-8660 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8660">CVE-2015-8660 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/923755">SUSE bug 923755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960281">SUSE bug 960281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960329">SUSE bug 960329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963994">SUSE bug 963994</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822194" comment="kernel-3.10.0-327.28.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822195" comment="kernel-abi-whitelists-3.10.0-327.28.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822196" comment="kernel-debug-3.10.0-327.28.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822199" comment="kernel-doc-3.10.0-327.28.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822200" comment="kernel-headers-3.10.0-327.28.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822201" comment="kernel-tools-3.10.0-327.28.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822202" comment="kernel-tools-libs-3.10.0-327.28.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822204" comment="perf-3.10.0-327.28.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822205" comment="python-perf-3.10.0-327.28.2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158665" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8665</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8665" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8665" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8665" ref_url="https://www.suse.com/security/cve/CVE-2015-8665" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:14888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010250.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3035-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KXYOOAKMFNUKYDB2XZOT63J2Z2V6LSVK/#KXYOOAKMFNUKYDB2XZOT63J2Z2V6LSVK" source="SUSE-SU"/>
    <description>
    tif_getimage.c in LibTIFF 4.0.6 allows remote attackers to cause a denial of service (out-of-bounds read) via the SamplesPerPixel tag in a TIFF image.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-04-17"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2015-8665/">CVE-2015-8665 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8665">CVE-2015-8665 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1156749">SUSE bug 1156749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156754">SUSE bug 1156754</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200195">SUSE bug 1200195</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822206" comment="libtiff-4.0.3-25.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822207" comment="libtiff-devel-4.0.3-25.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822208" comment="libtiff-static-4.0.3-25.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822209" comment="libtiff-tools-4.0.3-25.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158668" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8668</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8668" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8668" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8668" ref_url="https://www.suse.com/security/cve/CVE-2015-8668" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2676-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004543.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018183.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the PackBitsPreEncode function in tif_packbits.c in bmp2tiff in libtiff 4.0.6 and earlier allows remote attackers to execute arbitrary code or cause a denial of service via a large width field in a BMP image.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8668/">CVE-2015-8668 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8668">CVE-2015-8668 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1014461">SUSE bug 1014461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960589">SUSE bug 960589</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822206" comment="libtiff-4.0.3-25.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822207" comment="libtiff-devel-4.0.3-25.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822208" comment="libtiff-static-4.0.3-25.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822209" comment="libtiff-tools-4.0.3-25.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158683" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8683</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8683" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8683" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8683" ref_url="https://www.suse.com/security/cve/CVE-2015-8683" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:14888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010250.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3035-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KXYOOAKMFNUKYDB2XZOT63J2Z2V6LSVK/#KXYOOAKMFNUKYDB2XZOT63J2Z2V6LSVK" source="SUSE-SU"/>
    <description>
    The putcontig8bitCIELab function in tif_getimage.c in LibTIFF 4.0.6 allows remote attackers to cause a denial of service (out-of-bounds read) via a packed TIFF image.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-04-15"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2015-8683/">CVE-2015-8683 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8683">CVE-2015-8683 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1156749">SUSE bug 1156749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156754">SUSE bug 1156754</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200195">SUSE bug 1200195</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822206" comment="libtiff-4.0.3-25.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822207" comment="libtiff-devel-4.0.3-25.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822208" comment="libtiff-static-4.0.3-25.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822209" comment="libtiff-tools-4.0.3-25.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158704" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8704</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8704" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8704" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8704" ref_url="https://www.suse.com/security/cve/CVE-2015-8704" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0227-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001825.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0197-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JXRV5MH57HLNFFWVUFT7RIXRHMA7WFIG/#JXRV5MH57HLNFFWVUFT7RIXRHMA7WFIG" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0199-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YRVSHVPDU3HE7OZCBHBK2J5RIZOYZ6PQ/#YRVSHVPDU3HE7OZCBHBK2J5RIZOYZ6PQ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0204-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UB74QOHZ35TRUFG2RVKY76BAOCLXHA46/#UB74QOHZ35TRUFG2RVKY76BAOCLXHA46" source="SUSE-SU"/>
    <description>
    apl_42.c in ISC BIND 9.x before 9.9.8-P3, 9.9.x, and 9.10.x before 9.10.3-P3 allows remote authenticated users to cause a denial of service (INSIST assertion failure and daemon exit) via a malformed Address Prefix List (APL) record.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-04-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8704/">CVE-2015-8704 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8704">CVE-2015-8704 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/962189">SUSE bug 962189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962190">SUSE bug 962190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986950">SUSE bug 986950</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821773" comment="bind-9.9.4-29.el7_2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821774" comment="bind-chroot-9.9.4-29.el7_2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821775" comment="bind-devel-9.9.4-29.el7_2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821776" comment="bind-libs-9.9.4-29.el7_2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821777" comment="bind-libs-lite-9.9.4-29.el7_2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821778" comment="bind-license-9.9.4-29.el7_2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821779" comment="bind-lite-devel-9.9.4-29.el7_2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821780" comment="bind-pkcs11-9.9.4-29.el7_2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821781" comment="bind-pkcs11-devel-9.9.4-29.el7_2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821782" comment="bind-pkcs11-libs-9.9.4-29.el7_2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821783" comment="bind-pkcs11-utils-9.9.4-29.el7_2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821784" comment="bind-sdb-9.9.4-29.el7_2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821785" comment="bind-sdb-chroot-9.9.4-29.el7_2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821786" comment="bind-utils-9.9.4-29.el7_2.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158746" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8746</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8746" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8746" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8746" ref_url="https://www.suse.com/security/cve/CVE-2015-8746" source="SUSE CVE"/>
    <description>
    fs/nfs/nfs4proc.c in the NFS client in the Linux kernel before 4.2.2 does not properly initialize memory for migration recovery operations, which allows remote NFS servers to cause a denial of service (NULL pointer dereference and panic) via crafted network traffic.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8746/">CVE-2015-8746 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8746">CVE-2015-8746 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/960839">SUSE bug 960839</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822375" comment="kernel-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822376" comment="kernel-abi-whitelists-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822377" comment="kernel-debug-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822380" comment="kernel-doc-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822381" comment="kernel-headers-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822382" comment="kernel-tools-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822383" comment="kernel-tools-libs-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822385" comment="perf-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822386" comment="python-perf-3.10.0-514.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158767" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8767</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8767" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8767" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8767" ref_url="https://www.suse.com/security/cve/CVE-2015-8767" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002207.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0280-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TD5WLQ4FFRPU2BIT7RWEY3U73G4UNDCS/#TD5WLQ4FFRPU2BIT7RWEY3U73G4UNDCS" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OC7663UNXLKFWJKPITRGQNF4FU4KJWNK/#OC7663UNXLKFWJKPITRGQNF4FU4KJWNK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0318-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7PLUD6GJFLZ2LR3VZPLUZ5KPDX3EVFZS/#7PLUD6GJFLZ2LR3VZPLUZ5KPDX3EVFZS" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1008-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SZXKXH7AVPHU63LOTNQP5IB3D5RGAWEB/#SZXKXH7AVPHU63LOTNQP5IB3D5RGAWEB" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M3DY3J73NZK532BN4KZEFFGULVYJU3D2/#M3DY3J73NZK532BN4KZEFFGULVYJU3D2" source="SUSE-SU"/>
    <description>
    net/sctp/sm_sideeffect.c in the Linux kernel before 4.3 does not properly manage the relationship between a lock and a socket, which allows local users to cause a denial of service (deadlock) via a crafted sctp_accept call.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8767/">CVE-2015-8767 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8767">CVE-2015-8767 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1020452">SUSE bug 1020452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115893">SUSE bug 1115893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961509">SUSE bug 961509</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822100" comment="kernel-3.10.0-327.22.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822101" comment="kernel-abi-whitelists-3.10.0-327.22.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822102" comment="kernel-debug-3.10.0-327.22.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822105" comment="kernel-doc-3.10.0-327.22.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822106" comment="kernel-headers-3.10.0-327.22.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822107" comment="kernel-tools-3.10.0-327.22.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822108" comment="kernel-tools-libs-3.10.0-327.22.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822110" comment="perf-3.10.0-327.22.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822111" comment="python-perf-3.10.0-327.22.2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158776" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8776</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8776" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8776" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8776" ref_url="https://www.suse.com/security/cve/CVE-2015-8776" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001948.html" source="SUSE-SU"/>
		<reference ref_id="TID7017287" ref_url="https://www.suse.com/support/kb/doc?id=7017287" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0490-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YY2DTMAT2VLWPTXSSUAUBFCCAYY3S63X/#YY2DTMAT2VLWPTXSSUAUBFCCAYY3S63X" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0510-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XMCYM5IM5GBBV2HEJEZMVKTJIYVLENHN/#XMCYM5IM5GBBV2HEJEZMVKTJIYVLENHN" source="SUSE-SU"/>
    <description>
    The strftime function in the GNU C Library (aka glibc or libc6) before 2.23 allows context-dependent attackers to cause a denial of service (application crash) or possibly obtain sensitive information via an out-of-range time value.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-04-18"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8776/">CVE-2015-8776 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8776">CVE-2015-8776 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1123874">SUSE bug 1123874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962736">SUSE bug 962736</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986086">SUSE bug 986086</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823302" comment="glibc-2.17-196.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823303" comment="glibc-common-2.17-196.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823304" comment="glibc-devel-2.17-196.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823305" comment="glibc-headers-2.17-196.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823306" comment="glibc-static-2.17-196.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823307" comment="glibc-utils-2.17-196.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823308" comment="nscd-2.17-196.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158777" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8777</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8777" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8777" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8777" ref_url="https://www.suse.com/security/cve/CVE-2015-8777" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001948.html" source="SUSE-SU"/>
		<reference ref_id="TID7017287" ref_url="https://www.suse.com/support/kb/doc?id=7017287" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0490-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YY2DTMAT2VLWPTXSSUAUBFCCAYY3S63X/#YY2DTMAT2VLWPTXSSUAUBFCCAYY3S63X" source="SUSE-SU"/>
    <description>
    The process_envvars function in elf/rtld.c in the GNU C Library (aka glibc or libc6) before 2.23 allows local users to bypass a pointer-guarding protection mechanism via a zero value of the LD_POINTER_GUARD environment variable.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-04-15"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8777/">CVE-2015-8777 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8777">CVE-2015-8777 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1123874">SUSE bug 1123874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950944">SUSE bug 950944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962735">SUSE bug 962735</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823302" comment="glibc-2.17-196.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823303" comment="glibc-common-2.17-196.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823304" comment="glibc-devel-2.17-196.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823305" comment="glibc-headers-2.17-196.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823306" comment="glibc-static-2.17-196.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823307" comment="glibc-utils-2.17-196.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823308" comment="nscd-2.17-196.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158778" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8778</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8778" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8778" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8778" ref_url="https://www.suse.com/security/cve/CVE-2015-8778" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001948.html" source="SUSE-SU"/>
		<reference ref_id="TID7017287" ref_url="https://www.suse.com/support/kb/doc?id=7017287" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0490-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YY2DTMAT2VLWPTXSSUAUBFCCAYY3S63X/#YY2DTMAT2VLWPTXSSUAUBFCCAYY3S63X" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0510-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XMCYM5IM5GBBV2HEJEZMVKTJIYVLENHN/#XMCYM5IM5GBBV2HEJEZMVKTJIYVLENHN" source="SUSE-SU"/>
    <description>
    Integer overflow in the GNU C Library (aka glibc or libc6) before 2.23 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via the size argument to the __hcreate_r function, which triggers out-of-bounds heap-memory access.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-04-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8778/">CVE-2015-8778 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8778">CVE-2015-8778 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1123874">SUSE bug 1123874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962737">SUSE bug 962737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986086">SUSE bug 986086</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823302" comment="glibc-2.17-196.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823303" comment="glibc-common-2.17-196.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823304" comment="glibc-devel-2.17-196.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823305" comment="glibc-headers-2.17-196.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823306" comment="glibc-static-2.17-196.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823307" comment="glibc-utils-2.17-196.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823308" comment="nscd-2.17-196.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158779" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8779</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8779" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8779" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8779" ref_url="https://www.suse.com/security/cve/CVE-2015-8779" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001948.html" source="SUSE-SU"/>
		<reference ref_id="TID7017287" ref_url="https://www.suse.com/support/kb/doc?id=7017287" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0490-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YY2DTMAT2VLWPTXSSUAUBFCCAYY3S63X/#YY2DTMAT2VLWPTXSSUAUBFCCAYY3S63X" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0510-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XMCYM5IM5GBBV2HEJEZMVKTJIYVLENHN/#XMCYM5IM5GBBV2HEJEZMVKTJIYVLENHN" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the catopen function in the GNU C Library (aka glibc or libc6) before 2.23 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long catalog name.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-04-13"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8779/">CVE-2015-8779 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8779">CVE-2015-8779 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1123874">SUSE bug 1123874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962739">SUSE bug 962739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965453">SUSE bug 965453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986086">SUSE bug 986086</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823302" comment="glibc-2.17-196.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823303" comment="glibc-common-2.17-196.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823304" comment="glibc-devel-2.17-196.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823305" comment="glibc-headers-2.17-196.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823306" comment="glibc-static-2.17-196.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823307" comment="glibc-utils-2.17-196.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823308" comment="nscd-2.17-196.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158781" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8781</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8781" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8781" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8781" ref_url="https://www.suse.com/security/cve/CVE-2015-8781" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002264.html" source="SUSE-SU"/>
    <description>
    tif_luv.c in libtiff allows attackers to cause a denial of service (out-of-bounds write) via an invalid number of samples per pixel in a LogL compressed TIFF image, a different vulnerability than CVE-2015-8782.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8781/">CVE-2015-8781 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8781">CVE-2015-8781 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/964213">SUSE bug 964213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964225">SUSE bug 964225</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822206" comment="libtiff-4.0.3-25.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822207" comment="libtiff-devel-4.0.3-25.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822208" comment="libtiff-static-4.0.3-25.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822209" comment="libtiff-tools-4.0.3-25.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158782" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8782</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8782" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8782" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8782" ref_url="https://www.suse.com/security/cve/CVE-2015-8782" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002264.html" source="SUSE-SU"/>
    <description>
    tif_luv.c in libtiff allows attackers to cause a denial of service (out-of-bounds writes) via a crafted TIFF image, a different vulnerability than CVE-2015-8781.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8782/">CVE-2015-8782 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8782">CVE-2015-8782 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/964213">SUSE bug 964213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964225">SUSE bug 964225</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822206" comment="libtiff-4.0.3-25.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822207" comment="libtiff-devel-4.0.3-25.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822208" comment="libtiff-static-4.0.3-25.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822209" comment="libtiff-tools-4.0.3-25.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158783" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8783</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8783" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8783" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8783" ref_url="https://www.suse.com/security/cve/CVE-2015-8783" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002264.html" source="SUSE-SU"/>
    <description>
    tif_luv.c in libtiff allows attackers to cause a denial of service (out-of-bounds reads) via a crafted TIFF image.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8783/">CVE-2015-8783 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8783">CVE-2015-8783 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/964213">SUSE bug 964213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964225">SUSE bug 964225</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822206" comment="libtiff-4.0.3-25.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822207" comment="libtiff-devel-4.0.3-25.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822208" comment="libtiff-static-4.0.3-25.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822209" comment="libtiff-tools-4.0.3-25.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158784" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8784</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8784" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8784" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8784" ref_url="https://www.suse.com/security/cve/CVE-2015-8784" source="SUSE CVE"/>
    <description>
    The NeXTDecode function in tif_next.c in LibTIFF allows remote attackers to cause a denial of service (out-of-bounds write) via a crafted TIFF image, as demonstrated by libtiff5.tif.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2015-8784/">CVE-2015-8784 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8784">CVE-2015-8784 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1206220">SUSE bug 1206220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206479">SUSE bug 1206479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916925">SUSE bug 916925</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822206" comment="libtiff-4.0.3-25.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822207" comment="libtiff-devel-4.0.3-25.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822208" comment="libtiff-static-4.0.3-25.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822209" comment="libtiff-tools-4.0.3-25.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158803" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8803</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8803" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8803" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8803" ref_url="https://www.suse.com/security/cve/CVE-2015-8803" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001877.html" source="SUSE-SU"/>
    <description>
    The ecc_256_modp function in ecc-256.c in Nettle before 3.2 does not properly handle carry propagation and produces incorrect output in its implementation of the P-256 NIST elliptic curve, which allows attackers to have unspecified impact via unknown vectors, a different vulnerability than CVE-2015-8805.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-04-13"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8803/">CVE-2015-8803 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8803">CVE-2015-8803 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/964845">SUSE bug 964845</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822480" comment="nettle-2.7.1-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822481" comment="nettle-devel-2.7.1-8.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158804" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8804</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8804" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8804" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8804" ref_url="https://www.suse.com/security/cve/CVE-2015-8804" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001877.html" source="SUSE-SU"/>
    <description>
    x86_64/ecc-384-modp.asm in Nettle before 3.2 does not properly handle carry propagation and produces incorrect output in its implementation of the P-384 NIST elliptic curve, which allows attackers to have unspecified impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-04-13"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8804/">CVE-2015-8804 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8804">CVE-2015-8804 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/964847">SUSE bug 964847</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822480" comment="nettle-2.7.1-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822481" comment="nettle-devel-2.7.1-8.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8805</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8805" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8805" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8805" ref_url="https://www.suse.com/security/cve/CVE-2015-8805" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001877.html" source="SUSE-SU"/>
    <description>
    The ecc_256_modq function in ecc-256.c in Nettle before 3.2 does not properly handle carry propagation and produces incorrect output in its implementation of the P-256 NIST elliptic curve, which allows attackers to have unspecified impact via unknown vectors, a different vulnerability than CVE-2015-8803.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-04-13"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8805/">CVE-2015-8805 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8805">CVE-2015-8805 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/964849">SUSE bug 964849</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822480" comment="nettle-2.7.1-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822481" comment="nettle-devel-2.7.1-8.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158812" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8812</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8812" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8812" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8812" ref_url="https://www.suse.com/security/cve/CVE-2015-8812" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1019-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002207.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1008-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SZXKXH7AVPHU63LOTNQP5IB3D5RGAWEB/#SZXKXH7AVPHU63LOTNQP5IB3D5RGAWEB" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G3VWHAWQDEVZ37XRAAROFMJVDBBQ6YF5/#G3VWHAWQDEVZ37XRAAROFMJVDBBQ6YF5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M3DY3J73NZK532BN4KZEFFGULVYJU3D2/#M3DY3J73NZK532BN4KZEFFGULVYJU3D2" source="SUSE-SU"/>
    <description>
    drivers/infiniband/hw/cxgb3/iwch_cm.c in the Linux kernel before 4.5 does not properly identify error conditions, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free) via crafted packets.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8812/">CVE-2015-8812 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8812">CVE-2015-8812 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1020452">SUSE bug 1020452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115893">SUSE bug 1115893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966437">SUSE bug 966437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966683">SUSE bug 966683</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822375" comment="kernel-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822376" comment="kernel-abi-whitelists-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822377" comment="kernel-debug-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822380" comment="kernel-doc-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822381" comment="kernel-headers-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822382" comment="kernel-tools-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822383" comment="kernel-tools-libs-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822385" comment="perf-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822386" comment="python-perf-3.10.0-514.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158830" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8830</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8830" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8830" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8830" ref_url="https://www.suse.com/security/cve/CVE-2015-8830" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G3VWHAWQDEVZ37XRAAROFMJVDBBQ6YF5/#G3VWHAWQDEVZ37XRAAROFMJVDBBQ6YF5" source="SUSE-SU"/>
    <description>
    Integer overflow in the aio_setup_single_vector function in fs/aio.c in the Linux kernel 4.0 allows local users to cause a denial of service or possibly have unspecified other impact via a large AIO iovec.  NOTE: this vulnerability exists because of a CVE-2012-6701 regression.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8830/">CVE-2015-8830 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8830">CVE-2015-8830 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/969354">SUSE bug 969354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969355">SUSE bug 969355</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824786" comment="bpftool-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824787" comment="kernel-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824788" comment="kernel-abi-whitelists-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824789" comment="kernel-debug-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824792" comment="kernel-doc-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824793" comment="kernel-headers-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824794" comment="kernel-tools-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824795" comment="kernel-tools-libs-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824797" comment="perf-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824798" comment="python-perf-3.10.0-957.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158839" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8839</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8839" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8839" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8839" ref_url="https://www.suse.com/security/cve/CVE-2015-8839" source="SUSE CVE"/>
    <description>
    Multiple race conditions in the ext4 filesystem implementation in the Linux kernel before 4.5 allow local users to cause a denial of service (disk corruption) by writing to a page that is associated with a different user's file after unsynchronized hole punching and page-fault handling.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8839/">CVE-2015-8839 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8839">CVE-2015-8839 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/972174">SUSE bug 972174</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823168" comment="kernel-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823169" comment="kernel-abi-whitelists-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823170" comment="kernel-debug-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823173" comment="kernel-doc-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823174" comment="kernel-headers-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823175" comment="kernel-tools-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823176" comment="kernel-tools-libs-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823178" comment="perf-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823179" comment="python-perf-3.10.0-693.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158844" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8844</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8844" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8844" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8844" ref_url="https://www.suse.com/security/cve/CVE-2015-8844" source="SUSE CVE"/>
    <description>
    The signal implementation in the Linux kernel before 4.3.5 on powerpc platforms does not check for an MSR with both the S and T bits set, which allows local users to cause a denial of service (TM Bad Thing exception and panic) via a crafted application.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8844/">CVE-2015-8844 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8844">CVE-2015-8844 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/975531">SUSE bug 975531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975533">SUSE bug 975533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822375" comment="kernel-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822376" comment="kernel-abi-whitelists-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822377" comment="kernel-debug-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822380" comment="kernel-doc-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822381" comment="kernel-headers-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822382" comment="kernel-tools-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822383" comment="kernel-tools-libs-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822385" comment="perf-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822386" comment="python-perf-3.10.0-514.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158845" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8845</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8845" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8845" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8845" ref_url="https://www.suse.com/security/cve/CVE-2015-8845" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1937-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002218.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2184-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NA2C2XZHCLKYOLPO7FG5N5MJ7TLHYLY2/#NA2C2XZHCLKYOLPO7FG5N5MJ7TLHYLY2" source="SUSE-SU"/>
    <description>
    The tm_reclaim_thread function in arch/powerpc/kernel/process.c in the Linux kernel before 4.4.1 on powerpc platforms does not ensure that TM suspend mode exists before proceeding with a tm_reclaim call, which allows local users to cause a denial of service (TM Bad Thing exception and panic) via a crafted application.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8845/">CVE-2015-8845 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8845">CVE-2015-8845 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/975531">SUSE bug 975531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975533">SUSE bug 975533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822375" comment="kernel-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822376" comment="kernel-abi-whitelists-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822377" comment="kernel-debug-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822380" comment="kernel-doc-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822381" comment="kernel-headers-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822382" comment="kernel-tools-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822383" comment="kernel-tools-libs-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822385" comment="perf-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822386" comment="python-perf-3.10.0-514.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158868" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8868</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8868" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8868" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8868" ref_url="https://www.suse.com/security/cve/CVE-2015-8868" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002107.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the ExponentialFunction::ExponentialFunction function in Poppler before 0.40.0 allows remote attackers to cause a denial of service (memory corruption and crash) or possibly execute arbitrary code via an invalid blend mode in the ExtGState dictionary in a crafted PDF document.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-04-13"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8868/">CVE-2015-8868 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8868">CVE-2015-8868 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/976844">SUSE bug 976844</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822445" comment="poppler-0.26.5-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822446" comment="poppler-cpp-0.26.5-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822447" comment="poppler-cpp-devel-0.26.5-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822448" comment="poppler-demos-0.26.5-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822449" comment="poppler-devel-0.26.5-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822450" comment="poppler-glib-0.26.5-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822451" comment="poppler-glib-devel-0.26.5-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822452" comment="poppler-qt-0.26.5-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822453" comment="poppler-qt-devel-0.26.5-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822454" comment="poppler-utils-0.26.5-16.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158869" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8869</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8869" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8869" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8869" ref_url="https://www.suse.com/security/cve/CVE-2015-8869" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002243.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002244.html" source="SUSE-SU"/>
    <description>
    OCaml before 4.03.0 does not properly handle sign extensions, which allows remote attackers to conduct buffer overflow attacks or obtain sensitive information as demonstrated by a long string to the String.copy function.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-04-15"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8869/">CVE-2015-8869 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8869">CVE-2015-8869 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/977990">SUSE bug 977990</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822390" comment="libguestfs-1.32.7-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822391" comment="libguestfs-bash-completion-1.32.7-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822392" comment="libguestfs-devel-1.32.7-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822393" comment="libguestfs-gfs2-1.32.7-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822394" comment="libguestfs-gobject-1.32.7-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822395" comment="libguestfs-gobject-devel-1.32.7-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822396" comment="libguestfs-gobject-doc-1.32.7-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822397" comment="libguestfs-inspect-icons-1.32.7-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822398" comment="libguestfs-java-1.32.7-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822399" comment="libguestfs-java-devel-1.32.7-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822400" comment="libguestfs-javadoc-1.32.7-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822401" comment="libguestfs-man-pages-ja-1.32.7-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822402" comment="libguestfs-man-pages-uk-1.32.7-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822403" comment="libguestfs-rescue-1.32.7-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822404" comment="libguestfs-rsync-1.32.7-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822405" comment="libguestfs-tools-1.32.7-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822406" comment="libguestfs-tools-c-1.32.7-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822407" comment="libguestfs-xfs-1.32.7-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822408" comment="lua-guestfs-1.32.7-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822119" comment="ocaml-4.01.0-22.7.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822120" comment="ocaml-camlp4-4.01.0-22.7.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822121" comment="ocaml-camlp4-devel-4.01.0-22.7.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822122" comment="ocaml-compiler-libs-4.01.0-22.7.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822123" comment="ocaml-docs-4.01.0-22.7.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822124" comment="ocaml-emacs-4.01.0-22.7.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822125" comment="ocaml-labltk-4.01.0-22.7.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822126" comment="ocaml-labltk-devel-4.01.0-22.7.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822409" comment="ocaml-libguestfs-1.32.7-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822410" comment="ocaml-libguestfs-devel-1.32.7-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822127" comment="ocaml-ocamldoc-4.01.0-22.7.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822128" comment="ocaml-runtime-4.01.0-22.7.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822129" comment="ocaml-source-4.01.0-22.7.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822130" comment="ocaml-x11-4.01.0-22.7.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822411" comment="perl-Sys-Guestfs-1.32.7-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822412" comment="python-libguestfs-1.32.7-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822413" comment="ruby-libguestfs-1.32.7-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822414" comment="virt-dib-1.32.7-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822415" comment="virt-v2v-1.32.7-3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158870" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8870</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8870" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8870" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8870" ref_url="https://www.suse.com/security/cve/CVE-2015-8870" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004880.html" source="SUSE-SU"/>
    <description>
    Integer overflow in tools/bmp2tiff.c in LibTIFF before 4.0.4 allows remote attackers to cause a denial of service (heap-based buffer over-read), or possibly obtain sensitive information from process memory, via crafted width and length values in RLE4 or RLE8 data in a BMP file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-04-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8870/">CVE-2015-8870 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8870">CVE-2015-8870 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1014461">SUSE bug 1014461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150480">SUSE bug 1150480</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822802" comment="libtiff-4.0.3-27.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822803" comment="libtiff-devel-4.0.3-27.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822804" comment="libtiff-static-4.0.3-27.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822805" comment="libtiff-tools-4.0.3-27.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158895" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8895</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8895" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8895" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8895" ref_url="https://www.suse.com/security/cve/CVE-2015-8895" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002153.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RNQ7PJDMFDMCXQ2JDNVCC4UKLSFEDO2G/#RNQ7PJDMFDMCXQ2JDNVCC4UKLSFEDO2G" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3V3OAR2RV2MJYP3WAH6E4D4KZZFXSQ3B/#3V3OAR2RV2MJYP3WAH6E4D4KZZFXSQ3B" source="SUSE-SU"/>
    <description>
    Integer overflow in coders/icon.c in ImageMagick 6.9.1-3 and later allows remote attackers to cause a denial of service (application crash) via a crafted length value, which triggers a buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-04-24"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8895/">CVE-2015-8895 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8895">CVE-2015-8895 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983527">SUSE bug 983527</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822094" comment="ImageMagick-6.7.8.9-15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822095" comment="ImageMagick-c++-6.7.8.9-15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822096" comment="ImageMagick-c++-devel-6.7.8.9-15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822097" comment="ImageMagick-devel-6.7.8.9-15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822098" comment="ImageMagick-doc-6.7.8.9-15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822099" comment="ImageMagick-perl-6.7.8.9-15.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158896" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8896</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8896" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8896" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8896" ref_url="https://www.suse.com/security/cve/CVE-2015-8896" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002153.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1724-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S3XIJBEG3P7EGWD4IGXHPL43JATXE7NF/#S3XIJBEG3P7EGWD4IGXHPL43JATXE7NF" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RNQ7PJDMFDMCXQ2JDNVCC4UKLSFEDO2G/#RNQ7PJDMFDMCXQ2JDNVCC4UKLSFEDO2G" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3V3OAR2RV2MJYP3WAH6E4D4KZZFXSQ3B/#3V3OAR2RV2MJYP3WAH6E4D4KZZFXSQ3B" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2073-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WHSIRIKAPJKXFRGBDEXSAMU6LEKJCPUC/#WHSIRIKAPJKXFRGBDEXSAMU6LEKJCPUC" source="SUSE-SU"/>
    <description>
    Integer truncation issue in coders/pict.c in ImageMagick before 7.0.5-0 allows remote attackers to cause a denial of service (application crash) via a crafted .pict file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8896/">CVE-2015-8896 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8896">CVE-2015-8896 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983533">SUSE bug 983533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822094" comment="ImageMagick-6.7.8.9-15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822095" comment="ImageMagick-c++-6.7.8.9-15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822096" comment="ImageMagick-c++-devel-6.7.8.9-15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822097" comment="ImageMagick-devel-6.7.8.9-15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822098" comment="ImageMagick-doc-6.7.8.9-15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822099" comment="ImageMagick-perl-6.7.8.9-15.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158897" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8897</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8897" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8897" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8897" ref_url="https://www.suse.com/security/cve/CVE-2015-8897" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002153.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RNQ7PJDMFDMCXQ2JDNVCC4UKLSFEDO2G/#RNQ7PJDMFDMCXQ2JDNVCC4UKLSFEDO2G" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3V3OAR2RV2MJYP3WAH6E4D4KZZFXSQ3B/#3V3OAR2RV2MJYP3WAH6E4D4KZZFXSQ3B" source="SUSE-SU"/>
    <description>
    The SpliceImage function in MagickCore/transform.c in ImageMagick before 6.9.2-4 allows remote attackers to cause a denial of service (application crash) via a crafted png file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-04-24"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8897/">CVE-2015-8897 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8897">CVE-2015-8897 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983739">SUSE bug 983739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983746">SUSE bug 983746</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822094" comment="ImageMagick-6.7.8.9-15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822095" comment="ImageMagick-c++-6.7.8.9-15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822096" comment="ImageMagick-c++-devel-6.7.8.9-15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822097" comment="ImageMagick-devel-6.7.8.9-15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822098" comment="ImageMagick-doc-6.7.8.9-15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822099" comment="ImageMagick-perl-6.7.8.9-15.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158898" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8898</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8898" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8898" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8898" ref_url="https://www.suse.com/security/cve/CVE-2015-8898" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002153.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RNQ7PJDMFDMCXQ2JDNVCC4UKLSFEDO2G/#RNQ7PJDMFDMCXQ2JDNVCC4UKLSFEDO2G" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3V3OAR2RV2MJYP3WAH6E4D4KZZFXSQ3B/#3V3OAR2RV2MJYP3WAH6E4D4KZZFXSQ3B" source="SUSE-SU"/>
    <description>
    The WriteImages function in magick/constitute.c in ImageMagick before 6.9.2-4 allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-04-21"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8898/">CVE-2015-8898 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8898">CVE-2015-8898 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983739">SUSE bug 983739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983746">SUSE bug 983746</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822094" comment="ImageMagick-6.7.8.9-15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822095" comment="ImageMagick-c++-6.7.8.9-15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822096" comment="ImageMagick-c++-devel-6.7.8.9-15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822097" comment="ImageMagick-devel-6.7.8.9-15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822098" comment="ImageMagick-doc-6.7.8.9-15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822099" comment="ImageMagick-perl-6.7.8.9-15.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158916" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8916</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8916" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8916" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8916" ref_url="https://www.suse.com/security/cve/CVE-2015-8916" source="SUSE CVE"/>
    <description>
    bsdtar in libarchive before 3.2.0 returns a success code without filling the entry when the header is a "split file in multivolume RAR," which allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted rar file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-04-17"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8916/">CVE-2015-8916 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8916">CVE-2015-8916 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/985694">SUSE bug 985694</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822282" comment="bsdcpio-3.1.2-10.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822283" comment="bsdtar-3.1.2-10.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822284" comment="libarchive-3.1.2-10.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822285" comment="libarchive-devel-3.1.2-10.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158917" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8917</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8917" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8917" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8917" ref_url="https://www.suse.com/security/cve/CVE-2015-8917" source="SUSE CVE"/>
    <description>
    bsdtar in libarchive before 3.2.0 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via an invalid character in the name of a cab file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-04-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8917/">CVE-2015-8917 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8917">CVE-2015-8917 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/985691">SUSE bug 985691</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822282" comment="bsdcpio-3.1.2-10.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822283" comment="bsdtar-3.1.2-10.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822284" comment="libarchive-3.1.2-10.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822285" comment="libarchive-devel-3.1.2-10.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158919" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8919</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8919" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8919" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8919" ref_url="https://www.suse.com/security/cve/CVE-2015-8919" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002169.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2036-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PKPZOJ6M6PEAXJXLQRB6DDQBTJI3IZLC/#PKPZOJ6M6PEAXJXLQRB6DDQBTJI3IZLC" source="SUSE-SU"/>
    <description>
    The lha_read_file_extended_header function in archive_read_support_format_lha.c in libarchive before 3.2.0 allows remote attackers to cause a denial of service (out-of-bounds heap) via a crafted (1) lzh or (2) lha file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8919/">CVE-2015-8919 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8919">CVE-2015-8919 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/985697">SUSE bug 985697</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822282" comment="bsdcpio-3.1.2-10.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822283" comment="bsdtar-3.1.2-10.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822284" comment="libarchive-3.1.2-10.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822285" comment="libarchive-devel-3.1.2-10.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158920" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8920</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8920" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8920" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8920" ref_url="https://www.suse.com/security/cve/CVE-2015-8920" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2036-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PKPZOJ6M6PEAXJXLQRB6DDQBTJI3IZLC/#PKPZOJ6M6PEAXJXLQRB6DDQBTJI3IZLC" source="SUSE-SU"/>
    <description>
    The _ar_read_header function in archive_read_support_format_ar.c in libarchive before 3.2.0 allows remote attackers to cause a denial of service (out-of-bounds stack read) via a crafted ar file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8920/">CVE-2015-8920 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8920">CVE-2015-8920 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/985675">SUSE bug 985675</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822282" comment="bsdcpio-3.1.2-10.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822283" comment="bsdtar-3.1.2-10.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822284" comment="libarchive-3.1.2-10.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822285" comment="libarchive-devel-3.1.2-10.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158921" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8921</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8921" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8921" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8921" ref_url="https://www.suse.com/security/cve/CVE-2015-8921" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2036-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PKPZOJ6M6PEAXJXLQRB6DDQBTJI3IZLC/#PKPZOJ6M6PEAXJXLQRB6DDQBTJI3IZLC" source="SUSE-SU"/>
    <description>
    The ae_strtofflags function in archive_entry.c in libarchive before 3.2.0 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted mtree file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8921/">CVE-2015-8921 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8921">CVE-2015-8921 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/985682">SUSE bug 985682</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822282" comment="bsdcpio-3.1.2-10.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822283" comment="bsdtar-3.1.2-10.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822284" comment="libarchive-3.1.2-10.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822285" comment="libarchive-devel-3.1.2-10.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158922" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8922</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8922" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8922" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8922" ref_url="https://www.suse.com/security/cve/CVE-2015-8922" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002169.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2036-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PKPZOJ6M6PEAXJXLQRB6DDQBTJI3IZLC/#PKPZOJ6M6PEAXJXLQRB6DDQBTJI3IZLC" source="SUSE-SU"/>
    <description>
    The read_CodersInfo function in archive_read_support_format_7zip.c in libarchive before 3.2.0 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted 7z file, related to the _7z_folder struct.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8922/">CVE-2015-8922 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8922">CVE-2015-8922 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/985685">SUSE bug 985685</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822282" comment="bsdcpio-3.1.2-10.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822283" comment="bsdtar-3.1.2-10.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822284" comment="libarchive-3.1.2-10.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822285" comment="libarchive-devel-3.1.2-10.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158923" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8923</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8923" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8923" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8923" ref_url="https://www.suse.com/security/cve/CVE-2015-8923" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002169.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2036-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PKPZOJ6M6PEAXJXLQRB6DDQBTJI3IZLC/#PKPZOJ6M6PEAXJXLQRB6DDQBTJI3IZLC" source="SUSE-SU"/>
    <description>
    The process_extra function in libarchive before 3.2.0 uses the size field and a signed number in an offset, which allows remote attackers to cause a denial of service (crash) via a crafted zip file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8923/">CVE-2015-8923 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8923">CVE-2015-8923 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/985703">SUSE bug 985703</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822282" comment="bsdcpio-3.1.2-10.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822283" comment="bsdtar-3.1.2-10.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822284" comment="libarchive-3.1.2-10.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822285" comment="libarchive-devel-3.1.2-10.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158924" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8924</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8924" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8924" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8924" ref_url="https://www.suse.com/security/cve/CVE-2015-8924" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2036-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PKPZOJ6M6PEAXJXLQRB6DDQBTJI3IZLC/#PKPZOJ6M6PEAXJXLQRB6DDQBTJI3IZLC" source="SUSE-SU"/>
    <description>
    The archive_read_format_tar_read_header function in archive_read_support_format_tar.c in libarchive before 3.2.0 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted tar file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8924/">CVE-2015-8924 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8924">CVE-2015-8924 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/985609">SUSE bug 985609</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822282" comment="bsdcpio-3.1.2-10.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822283" comment="bsdtar-3.1.2-10.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822284" comment="libarchive-3.1.2-10.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822285" comment="libarchive-devel-3.1.2-10.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158925" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8925</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8925" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8925" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8925" ref_url="https://www.suse.com/security/cve/CVE-2015-8925" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006190.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2036-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PKPZOJ6M6PEAXJXLQRB6DDQBTJI3IZLC/#PKPZOJ6M6PEAXJXLQRB6DDQBTJI3IZLC" source="SUSE-SU"/>
    <description>
    The readline function in archive_read_support_format_mtree.c in libarchive before 3.2.0 allows remote attackers to cause a denial of service (invalid read) via a crafted mtree file, related to newline parsing.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-04-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8925/">CVE-2015-8925 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8925">CVE-2015-8925 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/985706">SUSE bug 985706</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822282" comment="bsdcpio-3.1.2-10.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822283" comment="bsdtar-3.1.2-10.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822284" comment="libarchive-3.1.2-10.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822285" comment="libarchive-devel-3.1.2-10.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158926" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8926</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8926" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8926" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8926" ref_url="https://www.suse.com/security/cve/CVE-2015-8926" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002169.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2036-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PKPZOJ6M6PEAXJXLQRB6DDQBTJI3IZLC/#PKPZOJ6M6PEAXJXLQRB6DDQBTJI3IZLC" source="SUSE-SU"/>
    <description>
    The archive_read_format_rar_read_data function in archive_read_support_format_rar.c in libarchive before 3.2.0 allows remote attackers to cause a denial of service (crash) via a crafted rar archive.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-04-18"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8926/">CVE-2015-8926 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8926">CVE-2015-8926 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/985704">SUSE bug 985704</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822282" comment="bsdcpio-3.1.2-10.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822283" comment="bsdtar-3.1.2-10.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822284" comment="libarchive-3.1.2-10.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822285" comment="libarchive-devel-3.1.2-10.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158928" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8928</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8928" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8928" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8928" ref_url="https://www.suse.com/security/cve/CVE-2015-8928" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002169.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2036-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PKPZOJ6M6PEAXJXLQRB6DDQBTJI3IZLC/#PKPZOJ6M6PEAXJXLQRB6DDQBTJI3IZLC" source="SUSE-SU"/>
    <description>
    The process_add_entry function in archive_read_support_format_mtree.c in libarchive before 3.2.0 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted mtree file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-04-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8928/">CVE-2015-8928 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8928">CVE-2015-8928 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/985679">SUSE bug 985679</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822282" comment="bsdcpio-3.1.2-10.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822283" comment="bsdtar-3.1.2-10.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822284" comment="libarchive-3.1.2-10.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822285" comment="libarchive-devel-3.1.2-10.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158930" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8930</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8930" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8930" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8930" ref_url="https://www.suse.com/security/cve/CVE-2015-8930" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002169.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2036-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PKPZOJ6M6PEAXJXLQRB6DDQBTJI3IZLC/#PKPZOJ6M6PEAXJXLQRB6DDQBTJI3IZLC" source="SUSE-SU"/>
    <description>
    bsdtar in libarchive before 3.2.0 allows remote attackers to cause a denial of service (infinite loop) via an ISO with a directory that is a member of itself.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-04-18"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8930/">CVE-2015-8930 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8930">CVE-2015-8930 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/985700">SUSE bug 985700</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822282" comment="bsdcpio-3.1.2-10.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822283" comment="bsdtar-3.1.2-10.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822284" comment="libarchive-3.1.2-10.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822285" comment="libarchive-devel-3.1.2-10.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158931" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8931</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8931" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8931" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8931" ref_url="https://www.suse.com/security/cve/CVE-2015-8931" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002169.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2036-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PKPZOJ6M6PEAXJXLQRB6DDQBTJI3IZLC/#PKPZOJ6M6PEAXJXLQRB6DDQBTJI3IZLC" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in the (1) get_time_t_max and (2) get_time_t_min functions in archive_read_support_format_mtree.c in libarchive before 3.2.0 allow remote attackers to have unspecified impact via a crafted mtree file, which triggers undefined behavior.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-04-13"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8931/">CVE-2015-8931 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8931">CVE-2015-8931 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/985689">SUSE bug 985689</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822282" comment="bsdcpio-3.1.2-10.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822283" comment="bsdtar-3.1.2-10.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822284" comment="libarchive-3.1.2-10.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822285" comment="libarchive-devel-3.1.2-10.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158932" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8932</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8932" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8932" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8932" ref_url="https://www.suse.com/security/cve/CVE-2015-8932" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002169.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2036-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PKPZOJ6M6PEAXJXLQRB6DDQBTJI3IZLC/#PKPZOJ6M6PEAXJXLQRB6DDQBTJI3IZLC" source="SUSE-SU"/>
    <description>
    The compress_bidder_init function in archive_read_support_filter_compress.c in libarchive before 3.2.0 allows remote attackers to cause a denial of service (crash) via a crafted tar file, which triggers an invalid left shift.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-04-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8932/">CVE-2015-8932 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8932">CVE-2015-8932 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/985665">SUSE bug 985665</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822282" comment="bsdcpio-3.1.2-10.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822283" comment="bsdtar-3.1.2-10.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822284" comment="libarchive-3.1.2-10.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822285" comment="libarchive-devel-3.1.2-10.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158934" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8934</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8934" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8934" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8934" ref_url="https://www.suse.com/security/cve/CVE-2015-8934" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002169.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2036-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PKPZOJ6M6PEAXJXLQRB6DDQBTJI3IZLC/#PKPZOJ6M6PEAXJXLQRB6DDQBTJI3IZLC" source="SUSE-SU"/>
    <description>
    The copy_from_lzss_window function in archive_read_support_format_rar.c in libarchive 3.2.0 and earlier allows remote attackers to cause a denial of service (out-of-bounds heap read) via a crafted rar file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-04-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8934/">CVE-2015-8934 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8934">CVE-2015-8934 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/985673">SUSE bug 985673</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822282" comment="bsdcpio-3.1.2-10.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822283" comment="bsdtar-3.1.2-10.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822284" comment="libarchive-3.1.2-10.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822285" comment="libarchive-devel-3.1.2-10.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158956" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8956</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8956" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8956" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8956" ref_url="https://www.suse.com/security/cve/CVE-2015-8956" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3304-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002828.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2625-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4S7UHJM6T55DAAXQ6V2UZD53B3N7CANL/#4S7UHJM6T55DAAXQ6V2UZD53B3N7CANL" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3021-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RNLBL6OKPBVGYFXWDCIZX6MURLH6ERPD/#RNLBL6OKPBVGYFXWDCIZX6MURLH6ERPD" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TYANF56WB457ENVSY7PHYIW7M4H3WVH5/#TYANF56WB457ENVSY7PHYIW7M4H3WVH5" source="SUSE-SU"/>
    <description>
    The rfcomm_sock_bind function in net/bluetooth/rfcomm/sock.c in the Linux kernel before 4.2 allows local users to obtain sensitive information or cause a denial of service (NULL pointer dereference) via vectors involving a bind system call on a Bluetooth RFCOMM socket.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8956/">CVE-2015-8956 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8956">CVE-2015-8956 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1003925">SUSE bug 1003925</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822375" comment="kernel-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822376" comment="kernel-abi-whitelists-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822377" comment="kernel-debug-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822380" comment="kernel-doc-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822381" comment="kernel-headers-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822382" comment="kernel-tools-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822383" comment="kernel-tools-libs-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822385" comment="perf-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822386" comment="python-perf-3.10.0-514.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158970" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8970</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8970" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8970" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8970" ref_url="https://www.suse.com/security/cve/CVE-2015-8970" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003182.html" source="SUSE-SU"/>
    <description>
    crypto/algif_skcipher.c in the Linux kernel before 4.4.2 does not verify that a setkey operation has been performed on an AF_ALG socket before an accept system call is processed, which allows local users to cause a denial of service (NULL pointer dereference and system crash) via a crafted application that does not supply a key, related to the lrw_crypt function in crypto/lrw.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-8970/">CVE-2015-8970 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8970">CVE-2015-8970 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1008374">SUSE bug 1008374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008850">SUSE bug 1008850</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823168" comment="kernel-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823169" comment="kernel-abi-whitelists-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823170" comment="kernel-debug-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823173" comment="kernel-doc-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823174" comment="kernel-headers-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823175" comment="kernel-tools-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823176" comment="kernel-tools-libs-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823178" comment="perf-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823179" comment="python-perf-3.10.0-693.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20159251" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-9251</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-9251" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9251" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-9251" ref_url="https://www.suse.com/security/cve/CVE-2015-9251" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006630.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0395-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZJAMCVFC2KL342QI4W5HGYIZXTNBURQT/" source="SUSE-SU"/>
    <description>
    jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing text/javascript responses to be executed.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-02"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-9251/">CVE-2015-9251 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-9251">CVE-2015-9251 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1099458">SUSE bug 1099458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100133">SUSE bug 1100133</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111660">SUSE bug 1111660</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828282" comment="ipa-client-4.6.8-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828283" comment="ipa-client-common-4.6.8-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828284" comment="ipa-common-4.6.8-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828285" comment="ipa-python-compat-4.6.8-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828286" comment="ipa-server-4.6.8-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828287" comment="ipa-server-common-4.6.8-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828288" comment="ipa-server-dns-4.6.8-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828289" comment="ipa-server-trust-ad-4.6.8-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828290" comment="python2-ipaclient-4.6.8-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828291" comment="python2-ipalib-4.6.8-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828292" comment="python2-ipaserver-4.6.8-5.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20159262" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-9262</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-9262" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9262" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-9262" ref_url="https://www.suse.com/security/cve/CVE-2015-9262" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004592.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2487-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/D7ZDOJGR2B4BE7VH5RTJQFIZJAAUXDPB/#D7ZDOJGR2B4BE7VH5RTJQFIZJAAUXDPB" source="SUSE-SU"/>
    <description>
    _XcursorThemeInherits in library.c in libXcursor before 1.1.15 allows remote attackers to cause denial of service or potentially code execution via a one-byte heap overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2015-9262/">CVE-2015-9262 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-9262">CVE-2015-9262 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1103511">SUSE bug 1103511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123801">SUSE bug 1123801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159415">SUSE bug 1159415</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824666" comment="drm-utils-2.4.91-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824667" comment="egl-utils-8.3.0-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824668" comment="freeglut-3.0.0-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824669" comment="freeglut-devel-3.0.0-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824670" comment="glx-utils-8.3.0-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824671" comment="intel-gpu-tools-2.99.917-28.20180530.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824672" comment="libX11-1.6.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824673" comment="libX11-common-1.6.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824674" comment="libX11-devel-1.6.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824675" comment="libXcursor-1.1.15-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824676" comment="libXcursor-devel-1.1.15-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824677" comment="libXfont-1.5.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824678" comment="libXfont-devel-1.5.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824679" comment="libXfont2-2.0.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824680" comment="libXfont2-devel-2.0.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824681" comment="libXres-1.2.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824682" comment="libXres-devel-1.2.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824683" comment="libdrm-2.4.91-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824684" comment="libdrm-devel-2.4.91-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824685" comment="libepoxy-1.5.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824686" comment="libepoxy-devel-1.5.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824687" comment="libglvnd-1.0.1-0.8.git5baa1e5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824688" comment="libglvnd-core-devel-1.0.1-0.8.git5baa1e5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824689" comment="libglvnd-devel-1.0.1-0.8.git5baa1e5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824690" comment="libglvnd-egl-1.0.1-0.8.git5baa1e5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824691" comment="libglvnd-gles-1.0.1-0.8.git5baa1e5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824692" comment="libglvnd-glx-1.0.1-0.8.git5baa1e5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824693" comment="libglvnd-opengl-1.0.1-0.8.git5baa1e5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824694" comment="libinput-1.10.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824695" comment="libinput-devel-1.10.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824696" comment="libwacom-0.30-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824697" comment="libwacom-data-0.30-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824698" comment="libwacom-devel-0.30-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824699" comment="libxcb-1.13-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824700" comment="libxcb-devel-1.13-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824701" comment="libxcb-doc-1.13-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824702" comment="mesa-demos-8.3.0-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824703" comment="mesa-dri-drivers-18.0.5-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824704" comment="mesa-filesystem-18.0.5-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824705" comment="mesa-libEGL-18.0.5-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824706" comment="mesa-libEGL-devel-18.0.5-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824707" comment="mesa-libGL-18.0.5-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824708" comment="mesa-libGL-devel-18.0.5-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824709" comment="mesa-libGLES-18.0.5-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824710" comment="mesa-libGLES-devel-18.0.5-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824711" comment="mesa-libOSMesa-18.0.5-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824712" comment="mesa-libOSMesa-devel-18.0.5-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824713" comment="mesa-libgbm-18.0.5-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824714" comment="mesa-libgbm-devel-18.0.5-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824715" comment="mesa-libglapi-18.0.5-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824716" comment="mesa-libwayland-egl-18.0.5-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824717" comment="mesa-libwayland-egl-devel-18.0.5-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824718" comment="mesa-libxatracker-18.0.5-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824719" comment="mesa-libxatracker-devel-18.0.5-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824720" comment="mesa-vdpau-drivers-18.0.5-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824721" comment="mesa-vulkan-drivers-18.0.5-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824722" comment="tigervnc-1.8.0-13.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824723" comment="tigervnc-icons-1.8.0-13.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824724" comment="tigervnc-license-1.8.0-13.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824725" comment="tigervnc-server-1.8.0-13.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824726" comment="tigervnc-server-applet-1.8.0-13.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824727" comment="tigervnc-server-minimal-1.8.0-13.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824728" comment="tigervnc-server-module-1.8.0-13.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824729" comment="vulkan-1.1.73.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824730" comment="vulkan-devel-1.1.73.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824731" comment="vulkan-filesystem-1.1.73.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824732" comment="xcb-proto-1.13-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824733" comment="xkeyboard-config-2.24-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824734" comment="xkeyboard-config-devel-2.24-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824735" comment="xorg-x11-drv-ati-18.0.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824736" comment="xorg-x11-drv-dummy-0.3.7-1.el7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824737" comment="xorg-x11-drv-evdev-2.10.6-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824738" comment="xorg-x11-drv-evdev-devel-2.10.6-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824739" comment="xorg-x11-drv-fbdev-0.5.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824740" comment="xorg-x11-drv-intel-2.99.917-28.20180530.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824741" comment="xorg-x11-drv-intel-devel-2.99.917-28.20180530.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824742" comment="xorg-x11-drv-libinput-0.27.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824743" comment="xorg-x11-drv-libinput-devel-0.27.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824744" comment="xorg-x11-drv-mouse-1.9.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824745" comment="xorg-x11-drv-mouse-devel-1.9.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824746" comment="xorg-x11-drv-nouveau-1.0.15-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824747" comment="xorg-x11-drv-openchrome-0.5.0-3.el7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824748" comment="xorg-x11-drv-openchrome-devel-0.5.0-3.el7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824749" comment="xorg-x11-drv-qxl-0.1.5-4.el7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824750" comment="xorg-x11-drv-synaptics-1.9.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824751" comment="xorg-x11-drv-synaptics-devel-1.9.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824752" comment="xorg-x11-drv-v4l-0.2.0-49.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824753" comment="xorg-x11-drv-vesa-2.4.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824754" comment="xorg-x11-drv-vmmouse-13.1.0-1.el7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824755" comment="xorg-x11-drv-vmware-13.2.1-1.el7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824756" comment="xorg-x11-drv-void-1.4.1-2.el7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824757" comment="xorg-x11-drv-wacom-0.36.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824758" comment="xorg-x11-drv-wacom-devel-0.36.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824759" comment="xorg-x11-font-utils-7.5-21.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824760" comment="xorg-x11-proto-devel-2018.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824761" comment="xorg-x11-server-Xdmx-1.20.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824762" comment="xorg-x11-server-Xephyr-1.20.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824763" comment="xorg-x11-server-Xnest-1.20.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824764" comment="xorg-x11-server-Xorg-1.20.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824765" comment="xorg-x11-server-Xspice-0.1.5-4.el7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824766" comment="xorg-x11-server-Xvfb-1.20.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824767" comment="xorg-x11-server-Xwayland-1.20.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824768" comment="xorg-x11-server-common-1.20.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824769" comment="xorg-x11-server-devel-1.20.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824770" comment="xorg-x11-server-source-1.20.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824771" comment="xorg-x11-utils-7.5-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824772" comment="xorg-x11-xkb-extras-7.7-14.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824773" comment="xorg-x11-xkb-utils-7.7-14.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824774" comment="xorg-x11-xkb-utils-devel-7.7-14.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20159289" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-9289</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-9289" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9289" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-9289" ref_url="https://www.suse.com/security/cve/CVE-2015-9289" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005859.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 4.1.4, a buffer overflow occurs when checking userspace params in drivers/media/dvb-frontends/cx24116.c. The maximum size for a DiSEqC command is 6, according to the userspace API. However, the code allows larger values such as 23.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-9289/">CVE-2015-9289 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-9289">CVE-2015-9289 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1143179">SUSE bug 1143179</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826993" comment="bpftool-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826994" comment="kernel-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826995" comment="kernel-abi-whitelists-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826996" comment="kernel-debug-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826999" comment="kernel-doc-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827000" comment="kernel-headers-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827001" comment="kernel-tools-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827002" comment="kernel-tools-libs-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827004" comment="perf-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827005" comment="python-perf-3.10.0-1127.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20159381" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-9381</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-9381" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9381" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-9381" ref_url="https://www.suse.com/security/cve/CVE-2015-9381" source="SUSE CVE"/>
    <description>
    FreeType before 2.6.1 has a heap-based buffer over-read in T1_Get_Private_Dict in type1/t1parse.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-07"/>
	<updated date="2026-03-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2015-9381/">CVE-2015-9381 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-9381">CVE-2015-9381 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1149384">SUSE bug 1149384</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824843" comment="PackageKit-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824844" comment="PackageKit-command-not-found-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824845" comment="PackageKit-cron-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824846" comment="PackageKit-glib-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824847" comment="PackageKit-glib-devel-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824848" comment="PackageKit-gstreamer-plugin-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824849" comment="PackageKit-gtk3-module-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824850" comment="PackageKit-yum-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824851" comment="PackageKit-yum-plugin-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824852" comment="accountsservice-0.6.50-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824853" comment="accountsservice-devel-0.6.50-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824854" comment="accountsservice-libs-0.6.50-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824855" comment="adwaita-cursor-theme-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824856" comment="adwaita-gtk2-theme-3.28-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824857" comment="adwaita-icon-theme-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824858" comment="adwaita-icon-theme-devel-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824859" comment="appstream-data-7-20180614.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824860" comment="at-spi2-atk-2.26.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824861" comment="at-spi2-atk-devel-2.26.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824862" comment="at-spi2-core-2.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824863" comment="at-spi2-core-devel-2.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824864" comment="atk-2.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824865" comment="atk-devel-2.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824866" comment="baobab-3.28.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824867" comment="bolt-0.4-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824868" comment="brasero-3.12.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824869" comment="brasero-devel-3.12.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824870" comment="brasero-libs-3.12.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824871" comment="brasero-nautilus-3.12.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824872" comment="cairo-1.15.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824873" comment="cairo-devel-1.15.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824874" comment="cairo-gobject-1.15.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824875" comment="cairo-gobject-devel-1.15.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824876" comment="cairo-tools-1.15.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824877" comment="cheese-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824878" comment="cheese-libs-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824879" comment="cheese-libs-devel-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824880" comment="clutter-gst3-3.0.26-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824881" comment="clutter-gst3-devel-3.0.26-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824882" comment="compat-exiv2-023-0.23-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824883" comment="compat-libical1-1.0.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824884" comment="control-center-3.28.1-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824885" comment="control-center-filesystem-3.28.1-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824886" comment="dconf-0.28.0-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824887" comment="dconf-devel-0.28.0-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824888" comment="dconf-editor-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824889" comment="devhelp-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824890" comment="devhelp-devel-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824891" comment="devhelp-libs-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824892" comment="ekiga-4.0.1-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824893" comment="empathy-3.12.13-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824894" comment="eog-3.28.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824895" comment="eog-devel-3.28.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824896" comment="evince-3.28.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824897" comment="evince-browser-plugin-3.28.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824898" comment="evince-devel-3.28.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824899" comment="evince-dvi-3.28.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824900" comment="evince-libs-3.28.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824901" comment="evince-nautilus-3.28.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824902" comment="evolution-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824903" comment="evolution-bogofilter-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824904" comment="evolution-data-server-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824905" comment="evolution-data-server-devel-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824906" comment="evolution-data-server-doc-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824907" comment="evolution-data-server-langpacks-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824908" comment="evolution-data-server-perl-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824909" comment="evolution-data-server-tests-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824910" comment="evolution-devel-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824911" comment="evolution-devel-docs-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824912" comment="evolution-ews-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824913" comment="evolution-ews-langpacks-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824914" comment="evolution-help-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824915" comment="evolution-langpacks-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824916" comment="evolution-mapi-3.28.3-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824917" comment="evolution-mapi-langpacks-3.28.3-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824918" comment="evolution-pst-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824919" comment="evolution-spamassassin-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824920" comment="evolution-tests-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824921" comment="file-roller-3.28.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824922" comment="file-roller-nautilus-3.28.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824923" comment="flatpak-1.0.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824924" comment="flatpak-builder-1.0.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824925" comment="flatpak-devel-1.0.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824926" comment="flatpak-libs-1.0.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824927" comment="folks-0.11.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824928" comment="folks-devel-0.11.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824929" comment="folks-tools-0.11.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824930" comment="fontconfig-2.13.0-4.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824931" comment="fontconfig-devel-2.13.0-4.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824932" comment="fontconfig-devel-doc-2.13.0-4.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824933" comment="freetype-2.8-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824934" comment="freetype-demos-2.8-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824935" comment="freetype-devel-2.8-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824936" comment="fribidi-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824937" comment="fribidi-devel-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824938" comment="fwupd-1.0.8-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824939" comment="fwupd-devel-1.0.8-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824940" comment="fwupdate-12-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824941" comment="fwupdate-devel-12-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824942" comment="fwupdate-efi-12-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824943" comment="fwupdate-libs-12-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824944" comment="gcr-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824945" comment="gcr-devel-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824946" comment="gdk-pixbuf2-2.36.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824947" comment="gdk-pixbuf2-devel-2.36.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824948" comment="gdk-pixbuf2-tests-2.36.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824949" comment="gdm-3.28.2-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824950" comment="gdm-devel-3.28.2-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824951" comment="gdm-pam-extensions-devel-3.28.2-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824952" comment="gedit-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824953" comment="gedit-devel-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824954" comment="gedit-plugin-bookmarks-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824955" comment="gedit-plugin-bracketcompletion-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824956" comment="gedit-plugin-charmap-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824957" comment="gedit-plugin-codecomment-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824958" comment="gedit-plugin-colorpicker-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824959" comment="gedit-plugin-colorschemer-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824960" comment="gedit-plugin-commander-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824961" comment="gedit-plugin-drawspaces-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824962" comment="gedit-plugin-findinfiles-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824963" comment="gedit-plugin-joinlines-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824964" comment="gedit-plugin-multiedit-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824965" comment="gedit-plugin-smartspaces-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824966" comment="gedit-plugin-synctex-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824967" comment="gedit-plugin-terminal-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824968" comment="gedit-plugin-textsize-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824969" comment="gedit-plugin-translate-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824970" comment="gedit-plugin-wordcompletion-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824971" comment="gedit-plugins-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824972" comment="gedit-plugins-data-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824973" comment="geoclue2-2.4.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824974" comment="geoclue2-demos-2.4.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824975" comment="geoclue2-devel-2.4.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824976" comment="geoclue2-libs-2.4.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824977" comment="geocode-glib-3.26.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824978" comment="geocode-glib-devel-3.26.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824979" comment="gjs-1.52.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824980" comment="gjs-devel-1.52.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824981" comment="gjs-tests-1.52.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824982" comment="glade-3.22.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824983" comment="glade-devel-3.22.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824984" comment="glade-libs-3.22.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824985" comment="glib-networking-2.56.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824986" comment="glib-networking-tests-2.56.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824987" comment="glib2-2.56.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824988" comment="glib2-devel-2.56.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824989" comment="glib2-doc-2.56.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824990" comment="glib2-fam-2.56.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824991" comment="glib2-static-2.56.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824992" comment="glib2-tests-2.56.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824993" comment="glibmm24-2.56.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824994" comment="glibmm24-devel-2.56.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824995" comment="glibmm24-doc-2.56.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824996" comment="gnome-backgrounds-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824997" comment="gnome-bluetooth-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824998" comment="gnome-bluetooth-libs-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824999" comment="gnome-bluetooth-libs-devel-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825000" comment="gnome-boxes-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825001" comment="gnome-calculator-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825002" comment="gnome-classic-session-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825003" comment="gnome-clocks-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825004" comment="gnome-color-manager-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825005" comment="gnome-contacts-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825006" comment="gnome-desktop3-3.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825007" comment="gnome-desktop3-devel-3.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825008" comment="gnome-desktop3-tests-3.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825009" comment="gnome-devel-docs-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825010" comment="gnome-dictionary-3.26.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825011" comment="gnome-disk-utility-3.28.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825012" comment="gnome-documents-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825013" comment="gnome-documents-libs-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825014" comment="gnome-font-viewer-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825015" comment="gnome-getting-started-docs-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825016" comment="gnome-getting-started-docs-cs-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825017" comment="gnome-getting-started-docs-de-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825018" comment="gnome-getting-started-docs-es-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825019" comment="gnome-getting-started-docs-fr-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825020" comment="gnome-getting-started-docs-gl-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825021" comment="gnome-getting-started-docs-hu-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825022" comment="gnome-getting-started-docs-it-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825023" comment="gnome-getting-started-docs-pl-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825024" comment="gnome-getting-started-docs-pt_BR-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825025" comment="gnome-getting-started-docs-ru-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825026" comment="gnome-initial-setup-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825027" comment="gnome-keyring-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825028" comment="gnome-keyring-pam-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825029" comment="gnome-online-accounts-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825030" comment="gnome-online-accounts-devel-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825031" comment="gnome-online-miners-3.26.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825032" comment="gnome-packagekit-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825033" comment="gnome-packagekit-common-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825034" comment="gnome-packagekit-installer-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825035" comment="gnome-packagekit-updater-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825036" comment="gnome-screenshot-3.26.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825037" comment="gnome-session-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825038" comment="gnome-session-custom-session-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825039" comment="gnome-session-wayland-session-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825040" comment="gnome-session-xsession-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825041" comment="gnome-settings-daemon-3.28.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825042" comment="gnome-settings-daemon-devel-3.28.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825043" comment="gnome-shell-3.28.3-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825044" comment="gnome-shell-extension-alternate-tab-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825045" comment="gnome-shell-extension-apps-menu-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825046" comment="gnome-shell-extension-auto-move-windows-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825047" comment="gnome-shell-extension-common-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825048" comment="gnome-shell-extension-dash-to-dock-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825049" comment="gnome-shell-extension-drive-menu-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825050" comment="gnome-shell-extension-launch-new-instance-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825051" comment="gnome-shell-extension-native-window-placement-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825052" comment="gnome-shell-extension-no-hot-corner-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825053" comment="gnome-shell-extension-panel-favorites-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825054" comment="gnome-shell-extension-places-menu-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825055" comment="gnome-shell-extension-screenshot-window-sizer-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825056" comment="gnome-shell-extension-systemMonitor-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825057" comment="gnome-shell-extension-top-icons-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825058" comment="gnome-shell-extension-updates-dialog-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825059" comment="gnome-shell-extension-user-theme-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825060" comment="gnome-shell-extension-window-list-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825061" comment="gnome-shell-extension-windowsNavigator-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825062" comment="gnome-shell-extension-workspace-indicator-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825063" comment="gnome-software-3.28.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825064" comment="gnome-software-devel-3.28.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825065" comment="gnome-software-editor-3.28.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825066" comment="gnome-system-monitor-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825067" comment="gnome-terminal-3.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825068" comment="gnome-terminal-nautilus-3.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825069" comment="gnome-themes-standard-3.28-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825070" comment="gnome-tweak-tool-3.28.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825071" comment="gnome-user-docs-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825072" comment="gnote-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825073" comment="gobject-introspection-1.56.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825074" comment="gobject-introspection-devel-1.56.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825075" comment="gom-0.3.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825076" comment="gom-devel-0.3.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825077" comment="google-noto-emoji-color-fonts-20180508-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825078" comment="google-noto-emoji-fonts-20180508-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825079" comment="grilo-0.3.6-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825080" comment="grilo-devel-0.3.6-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825081" comment="grilo-plugins-0.3.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825082" comment="gsettings-desktop-schemas-3.28.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825083" comment="gsettings-desktop-schemas-devel-3.28.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825084" comment="gspell-1.6.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825085" comment="gspell-devel-1.6.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825086" comment="gspell-doc-1.6.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825087" comment="gssdp-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825088" comment="gssdp-devel-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825089" comment="gssdp-docs-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825090" comment="gssdp-utils-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825091" comment="gstreamer1-plugins-base-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825092" comment="gstreamer1-plugins-base-devel-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825093" comment="gstreamer1-plugins-base-devel-docs-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825094" comment="gstreamer1-plugins-base-tools-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825095" comment="gtk-doc-1.28-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825096" comment="gtk-update-icon-cache-3.22.30-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825097" comment="gtk3-3.22.30-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825098" comment="gtk3-devel-3.22.30-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825099" comment="gtk3-devel-docs-3.22.30-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825100" comment="gtk3-immodule-xim-3.22.30-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825101" comment="gtk3-immodules-3.22.30-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825102" comment="gtk3-tests-3.22.30-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825103" comment="gtksourceview3-3.24.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825104" comment="gtksourceview3-devel-3.24.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825105" comment="gtksourceview3-tests-3.24.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825106" comment="gucharmap-10.0.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825107" comment="gucharmap-devel-10.0.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825108" comment="gucharmap-libs-10.0.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825109" comment="gupnp-1.0.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825110" comment="gupnp-devel-1.0.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825111" comment="gupnp-docs-1.0.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825112" comment="gupnp-igd-0.2.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825113" comment="gupnp-igd-devel-0.2.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825114" comment="gupnp-igd-python-0.2.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825115" comment="gvfs-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825116" comment="gvfs-afc-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825117" comment="gvfs-afp-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825118" comment="gvfs-archive-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825119" comment="gvfs-client-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825120" comment="gvfs-devel-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825121" comment="gvfs-fuse-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825122" comment="gvfs-goa-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825123" comment="gvfs-gphoto2-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825124" comment="gvfs-mtp-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825125" comment="gvfs-smb-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825126" comment="gvfs-tests-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825127" comment="harfbuzz-1.7.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825128" comment="harfbuzz-devel-1.7.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825129" comment="harfbuzz-icu-1.7.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825130" comment="json-glib-1.4.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825131" comment="json-glib-devel-1.4.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825132" comment="json-glib-tests-1.4.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825133" comment="libappstream-glib-0.7.8-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825134" comment="libappstream-glib-builder-0.7.8-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825135" comment="libappstream-glib-builder-devel-0.7.8-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825136" comment="libappstream-glib-devel-0.7.8-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825137" comment="libchamplain-0.12.16-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825138" comment="libchamplain-demos-0.12.16-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825139" comment="libchamplain-devel-0.12.16-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825140" comment="libchamplain-gtk-0.12.16-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825141" comment="libcroco-0.6.12-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825142" comment="libcroco-devel-0.6.12-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825143" comment="libgdata-0.17.9-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825144" comment="libgdata-devel-0.17.9-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825145" comment="libgee-0.20.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825146" comment="libgee-devel-0.20.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825147" comment="libgepub-0.6.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825148" comment="libgepub-devel-0.6.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825149" comment="libgexiv2-0.10.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825150" comment="libgexiv2-devel-0.10.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825151" comment="libgnomekbd-3.26.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825152" comment="libgnomekbd-devel-3.26.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825153" comment="libgovirt-0.3.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825154" comment="libgovirt-devel-0.3.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825155" comment="libgtop2-2.38.0-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825156" comment="libgtop2-devel-2.38.0-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825157" comment="libgweather-3.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825158" comment="libgweather-devel-3.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825159" comment="libgxps-0.3.0-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825160" comment="libgxps-devel-0.3.0-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825161" comment="libgxps-tools-0.3.0-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825162" comment="libical-3.0.3-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825163" comment="libical-devel-3.0.3-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825164" comment="libical-glib-3.0.3-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825165" comment="libical-glib-devel-3.0.3-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825166" comment="libical-glib-doc-3.0.3-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825167" comment="libjpeg-turbo-1.2.90-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825168" comment="libjpeg-turbo-devel-1.2.90-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825169" comment="libjpeg-turbo-static-1.2.90-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825170" comment="libjpeg-turbo-utils-1.2.90-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825171" comment="libmediaart-1.9.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825172" comment="libmediaart-devel-1.9.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825173" comment="libmediaart-tests-1.9.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825174" comment="libosinfo-1.1.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825175" comment="libosinfo-devel-1.1.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825176" comment="libosinfo-vala-1.1.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825177" comment="libpeas-1.22.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825178" comment="libpeas-devel-1.22.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825179" comment="libpeas-gtk-1.22.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825180" comment="libpeas-loader-python-1.22.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825181" comment="librsvg2-2.40.20-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825182" comment="librsvg2-devel-2.40.20-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825183" comment="librsvg2-tools-2.40.20-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825184" comment="libsecret-0.18.6-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825185" comment="libsecret-devel-0.18.6-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825186" comment="libsoup-2.62.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825187" comment="libsoup-devel-2.62.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825188" comment="libwayland-client-1.15.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825189" comment="libwayland-cursor-1.15.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825190" comment="libwayland-egl-1.15.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825191" comment="libwayland-server-1.15.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825192" comment="libwnck3-3.24.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825193" comment="libwnck3-devel-3.24.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825194" comment="mozjs52-52.9.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825195" comment="mozjs52-devel-52.9.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825196" comment="mutter-3.28.3-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825197" comment="mutter-devel-3.28.3-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825198" comment="nautilus-3.26.3.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825199" comment="nautilus-devel-3.26.3.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825200" comment="nautilus-extensions-3.26.3.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825201" comment="nautilus-sendto-3.8.6-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825202" comment="openchange-2.3-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825203" comment="openchange-client-2.3-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825204" comment="openchange-devel-2.3-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825205" comment="openchange-devel-docs-2.3-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825206" comment="osinfo-db-20180531-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825207" comment="pango-1.42.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825208" comment="pango-devel-1.42.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825209" comment="pango-tests-1.42.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825210" comment="poppler-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825211" comment="poppler-cpp-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825212" comment="poppler-cpp-devel-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825213" comment="poppler-demos-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825214" comment="poppler-devel-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825215" comment="poppler-glib-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825216" comment="poppler-glib-devel-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825217" comment="poppler-qt-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825218" comment="poppler-qt-devel-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825219" comment="poppler-utils-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825220" comment="python2-gexiv2-0.10.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825221" comment="python2-pyatspi-2.26.0-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825222" comment="rest-0.8.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825223" comment="rest-devel-0.8.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825224" comment="rhythmbox-3.4.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825225" comment="rhythmbox-devel-3.4.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825226" comment="seahorse-nautilus-3.11.92-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825227" comment="shotwell-0.28.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825228" comment="sushi-3.28.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825229" comment="totem-3.26.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825230" comment="totem-devel-3.26.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825231" comment="totem-nautilus-3.26.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825232" comment="totem-pl-parser-3.26.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825233" comment="totem-pl-parser-devel-3.26.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825234" comment="turbojpeg-1.2.90-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825235" comment="turbojpeg-devel-1.2.90-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825236" comment="upower-0.99.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825237" comment="upower-devel-0.99.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825238" comment="upower-devel-docs-0.99.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825239" comment="vala-0.40.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825240" comment="vala-devel-0.40.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825241" comment="vala-doc-0.40.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825242" comment="valadoc-0.40.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825243" comment="valadoc-devel-0.40.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825244" comment="vino-3.22.0-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825245" comment="vte-profile-0.52.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825246" comment="vte291-0.52.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825247" comment="vte291-devel-0.52.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825248" comment="wayland-devel-1.15.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825249" comment="wayland-doc-1.15.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825250" comment="wayland-protocols-devel-1.14-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825251" comment="webkitgtk4-2.20.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825252" comment="webkitgtk4-devel-2.20.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825253" comment="webkitgtk4-doc-2.20.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825254" comment="webkitgtk4-jsc-2.20.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825255" comment="webkitgtk4-jsc-devel-2.20.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825256" comment="webkitgtk4-plugin-process-gtk2-2.20.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825257" comment="xdg-desktop-portal-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825258" comment="xdg-desktop-portal-devel-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825259" comment="xdg-desktop-portal-gtk-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825260" comment="yelp-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825261" comment="yelp-devel-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825262" comment="yelp-libs-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825263" comment="yelp-tools-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825264" comment="yelp-xsl-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825265" comment="yelp-xsl-devel-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825266" comment="zenity-3.28.1-1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20159382" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-9382</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-9382" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9382" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-9382" ref_url="https://www.suse.com/security/cve/CVE-2015-9382" source="SUSE CVE"/>
    <description>
    FreeType before 2.6.1 has a buffer over-read in skip_comment in psaux/psobjs.c because ps_parser_skip_PS_token is mishandled in an FT_New_Memory_Face operation.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-07"/>
	<updated date="2026-03-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2015-9382/">CVE-2015-9382 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-9382">CVE-2015-9382 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1149395">SUSE bug 1149395</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824843" comment="PackageKit-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824844" comment="PackageKit-command-not-found-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824845" comment="PackageKit-cron-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824846" comment="PackageKit-glib-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824847" comment="PackageKit-glib-devel-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824848" comment="PackageKit-gstreamer-plugin-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824849" comment="PackageKit-gtk3-module-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824850" comment="PackageKit-yum-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824851" comment="PackageKit-yum-plugin-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824852" comment="accountsservice-0.6.50-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824853" comment="accountsservice-devel-0.6.50-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824854" comment="accountsservice-libs-0.6.50-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824855" comment="adwaita-cursor-theme-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824856" comment="adwaita-gtk2-theme-3.28-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824857" comment="adwaita-icon-theme-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824858" comment="adwaita-icon-theme-devel-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824859" comment="appstream-data-7-20180614.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824860" comment="at-spi2-atk-2.26.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824861" comment="at-spi2-atk-devel-2.26.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824862" comment="at-spi2-core-2.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824863" comment="at-spi2-core-devel-2.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824864" comment="atk-2.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824865" comment="atk-devel-2.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824866" comment="baobab-3.28.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824867" comment="bolt-0.4-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824868" comment="brasero-3.12.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824869" comment="brasero-devel-3.12.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824870" comment="brasero-libs-3.12.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824871" comment="brasero-nautilus-3.12.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824872" comment="cairo-1.15.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824873" comment="cairo-devel-1.15.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824874" comment="cairo-gobject-1.15.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824875" comment="cairo-gobject-devel-1.15.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824876" comment="cairo-tools-1.15.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824877" comment="cheese-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824878" comment="cheese-libs-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824879" comment="cheese-libs-devel-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824880" comment="clutter-gst3-3.0.26-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824881" comment="clutter-gst3-devel-3.0.26-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824882" comment="compat-exiv2-023-0.23-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824883" comment="compat-libical1-1.0.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824884" comment="control-center-3.28.1-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824885" comment="control-center-filesystem-3.28.1-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824886" comment="dconf-0.28.0-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824887" comment="dconf-devel-0.28.0-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824888" comment="dconf-editor-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824889" comment="devhelp-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824890" comment="devhelp-devel-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824891" comment="devhelp-libs-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824892" comment="ekiga-4.0.1-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824893" comment="empathy-3.12.13-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824894" comment="eog-3.28.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824895" comment="eog-devel-3.28.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824896" comment="evince-3.28.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824897" comment="evince-browser-plugin-3.28.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824898" comment="evince-devel-3.28.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824899" comment="evince-dvi-3.28.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824900" comment="evince-libs-3.28.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824901" comment="evince-nautilus-3.28.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824902" comment="evolution-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824903" comment="evolution-bogofilter-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824904" comment="evolution-data-server-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824905" comment="evolution-data-server-devel-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824906" comment="evolution-data-server-doc-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824907" comment="evolution-data-server-langpacks-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824908" comment="evolution-data-server-perl-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824909" comment="evolution-data-server-tests-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824910" comment="evolution-devel-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824911" comment="evolution-devel-docs-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824912" comment="evolution-ews-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824913" comment="evolution-ews-langpacks-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824914" comment="evolution-help-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824915" comment="evolution-langpacks-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824916" comment="evolution-mapi-3.28.3-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824917" comment="evolution-mapi-langpacks-3.28.3-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824918" comment="evolution-pst-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824919" comment="evolution-spamassassin-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824920" comment="evolution-tests-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824921" comment="file-roller-3.28.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824922" comment="file-roller-nautilus-3.28.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824923" comment="flatpak-1.0.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824924" comment="flatpak-builder-1.0.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824925" comment="flatpak-devel-1.0.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824926" comment="flatpak-libs-1.0.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824927" comment="folks-0.11.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824928" comment="folks-devel-0.11.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824929" comment="folks-tools-0.11.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824930" comment="fontconfig-2.13.0-4.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824931" comment="fontconfig-devel-2.13.0-4.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824932" comment="fontconfig-devel-doc-2.13.0-4.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824933" comment="freetype-2.8-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824934" comment="freetype-demos-2.8-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824935" comment="freetype-devel-2.8-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824936" comment="fribidi-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824937" comment="fribidi-devel-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824938" comment="fwupd-1.0.8-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824939" comment="fwupd-devel-1.0.8-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824940" comment="fwupdate-12-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824941" comment="fwupdate-devel-12-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824942" comment="fwupdate-efi-12-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824943" comment="fwupdate-libs-12-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824944" comment="gcr-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824945" comment="gcr-devel-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824946" comment="gdk-pixbuf2-2.36.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824947" comment="gdk-pixbuf2-devel-2.36.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824948" comment="gdk-pixbuf2-tests-2.36.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824949" comment="gdm-3.28.2-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824950" comment="gdm-devel-3.28.2-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824951" comment="gdm-pam-extensions-devel-3.28.2-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824952" comment="gedit-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824953" comment="gedit-devel-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824954" comment="gedit-plugin-bookmarks-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824955" comment="gedit-plugin-bracketcompletion-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824956" comment="gedit-plugin-charmap-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824957" comment="gedit-plugin-codecomment-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824958" comment="gedit-plugin-colorpicker-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824959" comment="gedit-plugin-colorschemer-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824960" comment="gedit-plugin-commander-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824961" comment="gedit-plugin-drawspaces-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824962" comment="gedit-plugin-findinfiles-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824963" comment="gedit-plugin-joinlines-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824964" comment="gedit-plugin-multiedit-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824965" comment="gedit-plugin-smartspaces-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824966" comment="gedit-plugin-synctex-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824967" comment="gedit-plugin-terminal-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824968" comment="gedit-plugin-textsize-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824969" comment="gedit-plugin-translate-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824970" comment="gedit-plugin-wordcompletion-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824971" comment="gedit-plugins-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824972" comment="gedit-plugins-data-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824973" comment="geoclue2-2.4.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824974" comment="geoclue2-demos-2.4.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824975" comment="geoclue2-devel-2.4.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824976" comment="geoclue2-libs-2.4.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824977" comment="geocode-glib-3.26.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824978" comment="geocode-glib-devel-3.26.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824979" comment="gjs-1.52.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824980" comment="gjs-devel-1.52.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824981" comment="gjs-tests-1.52.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824982" comment="glade-3.22.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824983" comment="glade-devel-3.22.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824984" comment="glade-libs-3.22.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824985" comment="glib-networking-2.56.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824986" comment="glib-networking-tests-2.56.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824987" comment="glib2-2.56.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824988" comment="glib2-devel-2.56.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824989" comment="glib2-doc-2.56.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824990" comment="glib2-fam-2.56.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824991" comment="glib2-static-2.56.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824992" comment="glib2-tests-2.56.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824993" comment="glibmm24-2.56.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824994" comment="glibmm24-devel-2.56.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824995" comment="glibmm24-doc-2.56.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824996" comment="gnome-backgrounds-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824997" comment="gnome-bluetooth-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824998" comment="gnome-bluetooth-libs-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824999" comment="gnome-bluetooth-libs-devel-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825000" comment="gnome-boxes-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825001" comment="gnome-calculator-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825002" comment="gnome-classic-session-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825003" comment="gnome-clocks-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825004" comment="gnome-color-manager-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825005" comment="gnome-contacts-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825006" comment="gnome-desktop3-3.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825007" comment="gnome-desktop3-devel-3.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825008" comment="gnome-desktop3-tests-3.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825009" comment="gnome-devel-docs-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825010" comment="gnome-dictionary-3.26.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825011" comment="gnome-disk-utility-3.28.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825012" comment="gnome-documents-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825013" comment="gnome-documents-libs-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825014" comment="gnome-font-viewer-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825015" comment="gnome-getting-started-docs-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825016" comment="gnome-getting-started-docs-cs-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825017" comment="gnome-getting-started-docs-de-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825018" comment="gnome-getting-started-docs-es-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825019" comment="gnome-getting-started-docs-fr-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825020" comment="gnome-getting-started-docs-gl-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825021" comment="gnome-getting-started-docs-hu-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825022" comment="gnome-getting-started-docs-it-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825023" comment="gnome-getting-started-docs-pl-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825024" comment="gnome-getting-started-docs-pt_BR-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825025" comment="gnome-getting-started-docs-ru-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825026" comment="gnome-initial-setup-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825027" comment="gnome-keyring-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825028" comment="gnome-keyring-pam-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825029" comment="gnome-online-accounts-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825030" comment="gnome-online-accounts-devel-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825031" comment="gnome-online-miners-3.26.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825032" comment="gnome-packagekit-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825033" comment="gnome-packagekit-common-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825034" comment="gnome-packagekit-installer-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825035" comment="gnome-packagekit-updater-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825036" comment="gnome-screenshot-3.26.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825037" comment="gnome-session-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825038" comment="gnome-session-custom-session-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825039" comment="gnome-session-wayland-session-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825040" comment="gnome-session-xsession-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825041" comment="gnome-settings-daemon-3.28.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825042" comment="gnome-settings-daemon-devel-3.28.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825043" comment="gnome-shell-3.28.3-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825044" comment="gnome-shell-extension-alternate-tab-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825045" comment="gnome-shell-extension-apps-menu-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825046" comment="gnome-shell-extension-auto-move-windows-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825047" comment="gnome-shell-extension-common-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825048" comment="gnome-shell-extension-dash-to-dock-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825049" comment="gnome-shell-extension-drive-menu-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825050" comment="gnome-shell-extension-launch-new-instance-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825051" comment="gnome-shell-extension-native-window-placement-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825052" comment="gnome-shell-extension-no-hot-corner-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825053" comment="gnome-shell-extension-panel-favorites-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825054" comment="gnome-shell-extension-places-menu-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825055" comment="gnome-shell-extension-screenshot-window-sizer-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825056" comment="gnome-shell-extension-systemMonitor-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825057" comment="gnome-shell-extension-top-icons-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825058" comment="gnome-shell-extension-updates-dialog-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825059" comment="gnome-shell-extension-user-theme-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825060" comment="gnome-shell-extension-window-list-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825061" comment="gnome-shell-extension-windowsNavigator-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825062" comment="gnome-shell-extension-workspace-indicator-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825063" comment="gnome-software-3.28.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825064" comment="gnome-software-devel-3.28.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825065" comment="gnome-software-editor-3.28.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825066" comment="gnome-system-monitor-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825067" comment="gnome-terminal-3.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825068" comment="gnome-terminal-nautilus-3.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825069" comment="gnome-themes-standard-3.28-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825070" comment="gnome-tweak-tool-3.28.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825071" comment="gnome-user-docs-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825072" comment="gnote-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825073" comment="gobject-introspection-1.56.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825074" comment="gobject-introspection-devel-1.56.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825075" comment="gom-0.3.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825076" comment="gom-devel-0.3.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825077" comment="google-noto-emoji-color-fonts-20180508-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825078" comment="google-noto-emoji-fonts-20180508-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825079" comment="grilo-0.3.6-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825080" comment="grilo-devel-0.3.6-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825081" comment="grilo-plugins-0.3.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825082" comment="gsettings-desktop-schemas-3.28.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825083" comment="gsettings-desktop-schemas-devel-3.28.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825084" comment="gspell-1.6.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825085" comment="gspell-devel-1.6.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825086" comment="gspell-doc-1.6.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825087" comment="gssdp-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825088" comment="gssdp-devel-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825089" comment="gssdp-docs-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825090" comment="gssdp-utils-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825091" comment="gstreamer1-plugins-base-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825092" comment="gstreamer1-plugins-base-devel-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825093" comment="gstreamer1-plugins-base-devel-docs-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825094" comment="gstreamer1-plugins-base-tools-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825095" comment="gtk-doc-1.28-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825096" comment="gtk-update-icon-cache-3.22.30-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825097" comment="gtk3-3.22.30-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825098" comment="gtk3-devel-3.22.30-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825099" comment="gtk3-devel-docs-3.22.30-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825100" comment="gtk3-immodule-xim-3.22.30-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825101" comment="gtk3-immodules-3.22.30-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825102" comment="gtk3-tests-3.22.30-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825103" comment="gtksourceview3-3.24.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825104" comment="gtksourceview3-devel-3.24.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825105" comment="gtksourceview3-tests-3.24.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825106" comment="gucharmap-10.0.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825107" comment="gucharmap-devel-10.0.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825108" comment="gucharmap-libs-10.0.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825109" comment="gupnp-1.0.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825110" comment="gupnp-devel-1.0.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825111" comment="gupnp-docs-1.0.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825112" comment="gupnp-igd-0.2.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825113" comment="gupnp-igd-devel-0.2.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825114" comment="gupnp-igd-python-0.2.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825115" comment="gvfs-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825116" comment="gvfs-afc-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825117" comment="gvfs-afp-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825118" comment="gvfs-archive-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825119" comment="gvfs-client-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825120" comment="gvfs-devel-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825121" comment="gvfs-fuse-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825122" comment="gvfs-goa-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825123" comment="gvfs-gphoto2-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825124" comment="gvfs-mtp-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825125" comment="gvfs-smb-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825126" comment="gvfs-tests-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825127" comment="harfbuzz-1.7.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825128" comment="harfbuzz-devel-1.7.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825129" comment="harfbuzz-icu-1.7.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825130" comment="json-glib-1.4.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825131" comment="json-glib-devel-1.4.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825132" comment="json-glib-tests-1.4.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825133" comment="libappstream-glib-0.7.8-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825134" comment="libappstream-glib-builder-0.7.8-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825135" comment="libappstream-glib-builder-devel-0.7.8-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825136" comment="libappstream-glib-devel-0.7.8-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825137" comment="libchamplain-0.12.16-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825138" comment="libchamplain-demos-0.12.16-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825139" comment="libchamplain-devel-0.12.16-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825140" comment="libchamplain-gtk-0.12.16-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825141" comment="libcroco-0.6.12-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825142" comment="libcroco-devel-0.6.12-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825143" comment="libgdata-0.17.9-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825144" comment="libgdata-devel-0.17.9-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825145" comment="libgee-0.20.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825146" comment="libgee-devel-0.20.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825147" comment="libgepub-0.6.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825148" comment="libgepub-devel-0.6.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825149" comment="libgexiv2-0.10.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825150" comment="libgexiv2-devel-0.10.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825151" comment="libgnomekbd-3.26.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825152" comment="libgnomekbd-devel-3.26.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825153" comment="libgovirt-0.3.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825154" comment="libgovirt-devel-0.3.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825155" comment="libgtop2-2.38.0-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825156" comment="libgtop2-devel-2.38.0-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825157" comment="libgweather-3.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825158" comment="libgweather-devel-3.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825159" comment="libgxps-0.3.0-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825160" comment="libgxps-devel-0.3.0-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825161" comment="libgxps-tools-0.3.0-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825162" comment="libical-3.0.3-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825163" comment="libical-devel-3.0.3-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825164" comment="libical-glib-3.0.3-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825165" comment="libical-glib-devel-3.0.3-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825166" comment="libical-glib-doc-3.0.3-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825167" comment="libjpeg-turbo-1.2.90-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825168" comment="libjpeg-turbo-devel-1.2.90-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825169" comment="libjpeg-turbo-static-1.2.90-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825170" comment="libjpeg-turbo-utils-1.2.90-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825171" comment="libmediaart-1.9.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825172" comment="libmediaart-devel-1.9.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825173" comment="libmediaart-tests-1.9.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825174" comment="libosinfo-1.1.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825175" comment="libosinfo-devel-1.1.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825176" comment="libosinfo-vala-1.1.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825177" comment="libpeas-1.22.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825178" comment="libpeas-devel-1.22.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825179" comment="libpeas-gtk-1.22.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825180" comment="libpeas-loader-python-1.22.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825181" comment="librsvg2-2.40.20-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825182" comment="librsvg2-devel-2.40.20-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825183" comment="librsvg2-tools-2.40.20-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825184" comment="libsecret-0.18.6-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825185" comment="libsecret-devel-0.18.6-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825186" comment="libsoup-2.62.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825187" comment="libsoup-devel-2.62.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825188" comment="libwayland-client-1.15.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825189" comment="libwayland-cursor-1.15.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825190" comment="libwayland-egl-1.15.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825191" comment="libwayland-server-1.15.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825192" comment="libwnck3-3.24.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825193" comment="libwnck3-devel-3.24.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825194" comment="mozjs52-52.9.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825195" comment="mozjs52-devel-52.9.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825196" comment="mutter-3.28.3-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825197" comment="mutter-devel-3.28.3-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825198" comment="nautilus-3.26.3.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825199" comment="nautilus-devel-3.26.3.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825200" comment="nautilus-extensions-3.26.3.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825201" comment="nautilus-sendto-3.8.6-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825202" comment="openchange-2.3-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825203" comment="openchange-client-2.3-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825204" comment="openchange-devel-2.3-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825205" comment="openchange-devel-docs-2.3-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825206" comment="osinfo-db-20180531-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825207" comment="pango-1.42.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825208" comment="pango-devel-1.42.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825209" comment="pango-tests-1.42.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825210" comment="poppler-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825211" comment="poppler-cpp-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825212" comment="poppler-cpp-devel-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825213" comment="poppler-demos-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825214" comment="poppler-devel-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825215" comment="poppler-glib-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825216" comment="poppler-glib-devel-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825217" comment="poppler-qt-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825218" comment="poppler-qt-devel-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825219" comment="poppler-utils-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825220" comment="python2-gexiv2-0.10.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825221" comment="python2-pyatspi-2.26.0-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825222" comment="rest-0.8.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825223" comment="rest-devel-0.8.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825224" comment="rhythmbox-3.4.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825225" comment="rhythmbox-devel-3.4.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825226" comment="seahorse-nautilus-3.11.92-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825227" comment="shotwell-0.28.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825228" comment="sushi-3.28.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825229" comment="totem-3.26.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825230" comment="totem-devel-3.26.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825231" comment="totem-nautilus-3.26.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825232" comment="totem-pl-parser-3.26.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825233" comment="totem-pl-parser-devel-3.26.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825234" comment="turbojpeg-1.2.90-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825235" comment="turbojpeg-devel-1.2.90-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825236" comment="upower-0.99.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825237" comment="upower-devel-0.99.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825238" comment="upower-devel-docs-0.99.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825239" comment="vala-0.40.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825240" comment="vala-devel-0.40.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825241" comment="vala-doc-0.40.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825242" comment="valadoc-0.40.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825243" comment="valadoc-devel-0.40.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825244" comment="vino-3.22.0-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825245" comment="vte-profile-0.52.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825246" comment="vte291-0.52.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825247" comment="vte291-devel-0.52.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825248" comment="wayland-devel-1.15.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825249" comment="wayland-doc-1.15.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825250" comment="wayland-protocols-devel-1.14-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825251" comment="webkitgtk4-2.20.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825252" comment="webkitgtk4-devel-2.20.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825253" comment="webkitgtk4-doc-2.20.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825254" comment="webkitgtk4-jsc-2.20.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825255" comment="webkitgtk4-jsc-devel-2.20.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825256" comment="webkitgtk4-plugin-process-gtk2-2.20.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825257" comment="xdg-desktop-portal-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825258" comment="xdg-desktop-portal-devel-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825259" comment="xdg-desktop-portal-gtk-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825260" comment="yelp-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825261" comment="yelp-devel-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825262" comment="yelp-libs-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825263" comment="yelp-tools-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825264" comment="yelp-xsl-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825265" comment="yelp-xsl-devel-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825266" comment="zenity-3.28.1-1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160402" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0402</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0402" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0402" ref_url="https://www.suse.com/security/cve/CVE-2016-0402" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0636-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001942.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0263-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WB2NQ3V2BHAFYEU5DCOQH3B3SIMMKMRI/#WB2NQ3V2BHAFYEU5DCOQH3B3SIMMKMRI" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0268-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OXB4QAFWJUQEZEK2MFV5C6VMXORCHTOC/#OXB4QAFWJUQEZEK2MFV5C6VMXORCHTOC" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EM5IRJXZE66HIX564A56RBKHOFXINXH2/#EM5IRJXZE66HIX564A56RBKHOFXINXH2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0272-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YX6XI7PJCN66EMA6MG6N5F3SLBKL3UF6/#YX6XI7PJCN66EMA6MG6N5F3SLBKL3UF6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0279-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5PDBMSXPRSUZRBQWXDNZ3KHQVA53KFEH/#5PDBMSXPRSUZRBQWXDNZ3KHQVA53KFEH" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java SE and Java SE Embedded components in Oracle Java SE 6u105, 7u91, and 8u66 and Java SE Embedded 8u65 allows remote attackers to affect integrity via unknown vectors related to Networking.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-31"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0402/">CVE-2016-0402 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0402">CVE-2016-0402 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/960402">SUSE bug 960402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962743">SUSE bug 962743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963937">SUSE bug 963937</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821767" comment="java-1.6.0-openjdk-1.6.0.38-1.13.10.0.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821768" comment="java-1.6.0-openjdk-demo-1.6.0.38-1.13.10.0.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821769" comment="java-1.6.0-openjdk-devel-1.6.0.38-1.13.10.0.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821770" comment="java-1.6.0-openjdk-javadoc-1.6.0.38-1.13.10.0.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821771" comment="java-1.6.0-openjdk-src-1.6.0.38-1.13.10.0.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821743" comment="java-1.7.0-openjdk-1.7.0.95-2.6.4.0.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821744" comment="java-1.7.0-openjdk-accessibility-1.7.0.95-2.6.4.0.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821745" comment="java-1.7.0-openjdk-demo-1.7.0.95-2.6.4.0.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821746" comment="java-1.7.0-openjdk-devel-1.7.0.95-2.6.4.0.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821747" comment="java-1.7.0-openjdk-headless-1.7.0.95-2.6.4.0.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821748" comment="java-1.7.0-openjdk-javadoc-1.7.0.95-2.6.4.0.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821749" comment="java-1.7.0-openjdk-src-1.7.0.95-2.6.4.0.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821729" comment="java-1.8.0-openjdk-1.8.0.71-2.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821730" comment="java-1.8.0-openjdk-accessibility-1.8.0.71-2.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821731" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.71-2.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821732" comment="java-1.8.0-openjdk-debug-1.8.0.71-2.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821733" comment="java-1.8.0-openjdk-demo-1.8.0.71-2.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821734" comment="java-1.8.0-openjdk-demo-debug-1.8.0.71-2.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821735" comment="java-1.8.0-openjdk-devel-1.8.0.71-2.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821736" comment="java-1.8.0-openjdk-devel-debug-1.8.0.71-2.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821737" comment="java-1.8.0-openjdk-headless-1.8.0.71-2.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821738" comment="java-1.8.0-openjdk-headless-debug-1.8.0.71-2.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821739" comment="java-1.8.0-openjdk-javadoc-1.8.0.71-2.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821740" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.71-2.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821741" comment="java-1.8.0-openjdk-src-1.8.0.71-2.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821742" comment="java-1.8.0-openjdk-src-debug-1.8.0.71-2.b15.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160448" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0448</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0448" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0448" ref_url="https://www.suse.com/security/cve/CVE-2016-0448" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0636-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001942.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0263-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WB2NQ3V2BHAFYEU5DCOQH3B3SIMMKMRI/#WB2NQ3V2BHAFYEU5DCOQH3B3SIMMKMRI" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0268-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OXB4QAFWJUQEZEK2MFV5C6VMXORCHTOC/#OXB4QAFWJUQEZEK2MFV5C6VMXORCHTOC" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EM5IRJXZE66HIX564A56RBKHOFXINXH2/#EM5IRJXZE66HIX564A56RBKHOFXINXH2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0272-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YX6XI7PJCN66EMA6MG6N5F3SLBKL3UF6/#YX6XI7PJCN66EMA6MG6N5F3SLBKL3UF6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0279-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5PDBMSXPRSUZRBQWXDNZ3KHQVA53KFEH/#5PDBMSXPRSUZRBQWXDNZ3KHQVA53KFEH" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java SE and Java SE Embedded components in Oracle Java SE 6u105, 7u91, and 8u66, and Java SE Embedded 8u65 allows remote authenticated users to affect confidentiality via vectors related to JMX.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-30"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0448/">CVE-2016-0448 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0448">CVE-2016-0448 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/960402">SUSE bug 960402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962743">SUSE bug 962743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963937">SUSE bug 963937</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821767" comment="java-1.6.0-openjdk-1.6.0.38-1.13.10.0.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821768" comment="java-1.6.0-openjdk-demo-1.6.0.38-1.13.10.0.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821769" comment="java-1.6.0-openjdk-devel-1.6.0.38-1.13.10.0.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821770" comment="java-1.6.0-openjdk-javadoc-1.6.0.38-1.13.10.0.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821771" comment="java-1.6.0-openjdk-src-1.6.0.38-1.13.10.0.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821743" comment="java-1.7.0-openjdk-1.7.0.95-2.6.4.0.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821744" comment="java-1.7.0-openjdk-accessibility-1.7.0.95-2.6.4.0.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821745" comment="java-1.7.0-openjdk-demo-1.7.0.95-2.6.4.0.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821746" comment="java-1.7.0-openjdk-devel-1.7.0.95-2.6.4.0.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821747" comment="java-1.7.0-openjdk-headless-1.7.0.95-2.6.4.0.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821748" comment="java-1.7.0-openjdk-javadoc-1.7.0.95-2.6.4.0.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821749" comment="java-1.7.0-openjdk-src-1.7.0.95-2.6.4.0.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821729" comment="java-1.8.0-openjdk-1.8.0.71-2.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821730" comment="java-1.8.0-openjdk-accessibility-1.8.0.71-2.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821731" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.71-2.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821732" comment="java-1.8.0-openjdk-debug-1.8.0.71-2.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821733" comment="java-1.8.0-openjdk-demo-1.8.0.71-2.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821734" comment="java-1.8.0-openjdk-demo-debug-1.8.0.71-2.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821735" comment="java-1.8.0-openjdk-devel-1.8.0.71-2.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821736" comment="java-1.8.0-openjdk-devel-debug-1.8.0.71-2.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821737" comment="java-1.8.0-openjdk-headless-1.8.0.71-2.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821738" comment="java-1.8.0-openjdk-headless-debug-1.8.0.71-2.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821739" comment="java-1.8.0-openjdk-javadoc-1.8.0.71-2.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821740" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.71-2.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821741" comment="java-1.8.0-openjdk-src-1.8.0.71-2.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821742" comment="java-1.8.0-openjdk-src-debug-1.8.0.71-2.b15.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160466" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0466</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0466" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0466" ref_url="https://www.suse.com/security/cve/CVE-2016-0466" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0636-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001942.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0263-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WB2NQ3V2BHAFYEU5DCOQH3B3SIMMKMRI/#WB2NQ3V2BHAFYEU5DCOQH3B3SIMMKMRI" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0268-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OXB4QAFWJUQEZEK2MFV5C6VMXORCHTOC/#OXB4QAFWJUQEZEK2MFV5C6VMXORCHTOC" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EM5IRJXZE66HIX564A56RBKHOFXINXH2/#EM5IRJXZE66HIX564A56RBKHOFXINXH2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0272-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YX6XI7PJCN66EMA6MG6N5F3SLBKL3UF6/#YX6XI7PJCN66EMA6MG6N5F3SLBKL3UF6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0279-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5PDBMSXPRSUZRBQWXDNZ3KHQVA53KFEH/#5PDBMSXPRSUZRBQWXDNZ3KHQVA53KFEH" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java SE, Java SE Embedded, and JRockit components in Oracle Java SE 6u105, 7u91, and 8u66; Java SE Embedded 8u65; and JRockit R28.3.8 allows remote attackers to affect availability via vectors related to JAXP.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-02"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0466/">CVE-2016-0466 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0466">CVE-2016-0466 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/960402">SUSE bug 960402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962743">SUSE bug 962743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963937">SUSE bug 963937</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821767" comment="java-1.6.0-openjdk-1.6.0.38-1.13.10.0.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821768" comment="java-1.6.0-openjdk-demo-1.6.0.38-1.13.10.0.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821769" comment="java-1.6.0-openjdk-devel-1.6.0.38-1.13.10.0.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821770" comment="java-1.6.0-openjdk-javadoc-1.6.0.38-1.13.10.0.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821771" comment="java-1.6.0-openjdk-src-1.6.0.38-1.13.10.0.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821743" comment="java-1.7.0-openjdk-1.7.0.95-2.6.4.0.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821744" comment="java-1.7.0-openjdk-accessibility-1.7.0.95-2.6.4.0.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821745" comment="java-1.7.0-openjdk-demo-1.7.0.95-2.6.4.0.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821746" comment="java-1.7.0-openjdk-devel-1.7.0.95-2.6.4.0.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821747" comment="java-1.7.0-openjdk-headless-1.7.0.95-2.6.4.0.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821748" comment="java-1.7.0-openjdk-javadoc-1.7.0.95-2.6.4.0.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821749" comment="java-1.7.0-openjdk-src-1.7.0.95-2.6.4.0.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821729" comment="java-1.8.0-openjdk-1.8.0.71-2.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821730" comment="java-1.8.0-openjdk-accessibility-1.8.0.71-2.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821731" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.71-2.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821732" comment="java-1.8.0-openjdk-debug-1.8.0.71-2.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821733" comment="java-1.8.0-openjdk-demo-1.8.0.71-2.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821734" comment="java-1.8.0-openjdk-demo-debug-1.8.0.71-2.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821735" comment="java-1.8.0-openjdk-devel-1.8.0.71-2.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821736" comment="java-1.8.0-openjdk-devel-debug-1.8.0.71-2.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821737" comment="java-1.8.0-openjdk-headless-1.8.0.71-2.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821738" comment="java-1.8.0-openjdk-headless-debug-1.8.0.71-2.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821739" comment="java-1.8.0-openjdk-javadoc-1.8.0.71-2.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821740" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.71-2.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821741" comment="java-1.8.0-openjdk-src-1.8.0.71-2.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821742" comment="java-1.8.0-openjdk-src-debug-1.8.0.71-2.b15.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160475" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0475</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0475" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0475" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0475" ref_url="https://www.suse.com/security/cve/CVE-2016-0475" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001863.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java SE, Java SE Embedded, and JRockit components in Oracle Java SE 8u66; Java SE Embedded 8u65; and JRockit R28.3.8 allows remote attackers to affect confidentiality and integrity via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-30"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0475/">CVE-2016-0475 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0475">CVE-2016-0475 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/962743">SUSE bug 962743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963937">SUSE bug 963937</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821729" comment="java-1.8.0-openjdk-1.8.0.71-2.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821730" comment="java-1.8.0-openjdk-accessibility-1.8.0.71-2.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821731" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.71-2.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821732" comment="java-1.8.0-openjdk-debug-1.8.0.71-2.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821733" comment="java-1.8.0-openjdk-demo-1.8.0.71-2.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821734" comment="java-1.8.0-openjdk-demo-debug-1.8.0.71-2.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821735" comment="java-1.8.0-openjdk-devel-1.8.0.71-2.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821736" comment="java-1.8.0-openjdk-devel-debug-1.8.0.71-2.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821737" comment="java-1.8.0-openjdk-headless-1.8.0.71-2.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821738" comment="java-1.8.0-openjdk-headless-debug-1.8.0.71-2.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821739" comment="java-1.8.0-openjdk-javadoc-1.8.0.71-2.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821740" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.71-2.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821741" comment="java-1.8.0-openjdk-src-1.8.0.71-2.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821742" comment="java-1.8.0-openjdk-src-debug-1.8.0.71-2.b15.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160483" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0483</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0483" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0483" ref_url="https://www.suse.com/security/cve/CVE-2016-0483" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0636-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001942.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0263-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WB2NQ3V2BHAFYEU5DCOQH3B3SIMMKMRI/#WB2NQ3V2BHAFYEU5DCOQH3B3SIMMKMRI" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0268-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OXB4QAFWJUQEZEK2MFV5C6VMXORCHTOC/#OXB4QAFWJUQEZEK2MFV5C6VMXORCHTOC" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EM5IRJXZE66HIX564A56RBKHOFXINXH2/#EM5IRJXZE66HIX564A56RBKHOFXINXH2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0272-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YX6XI7PJCN66EMA6MG6N5F3SLBKL3UF6/#YX6XI7PJCN66EMA6MG6N5F3SLBKL3UF6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0279-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5PDBMSXPRSUZRBQWXDNZ3KHQVA53KFEH/#5PDBMSXPRSUZRBQWXDNZ3KHQVA53KFEH" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u105, 7u91, and 8u66; Java SE Embedded 8u65; and JRockit R28.3.8 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT.  NOTE: the previous information is from the January 2016 CPU. Oracle has not commented on third-party claims that this is a heap-based buffer overflow in the readImage function, which allows remote attackers to execute arbitrary code via crafted image data.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-30"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0483/">CVE-2016-0483 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0483">CVE-2016-0483 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/960402">SUSE bug 960402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962743">SUSE bug 962743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963937">SUSE bug 963937</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821767" comment="java-1.6.0-openjdk-1.6.0.38-1.13.10.0.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821768" comment="java-1.6.0-openjdk-demo-1.6.0.38-1.13.10.0.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821769" comment="java-1.6.0-openjdk-devel-1.6.0.38-1.13.10.0.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821770" comment="java-1.6.0-openjdk-javadoc-1.6.0.38-1.13.10.0.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821771" comment="java-1.6.0-openjdk-src-1.6.0.38-1.13.10.0.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821743" comment="java-1.7.0-openjdk-1.7.0.95-2.6.4.0.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821744" comment="java-1.7.0-openjdk-accessibility-1.7.0.95-2.6.4.0.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821745" comment="java-1.7.0-openjdk-demo-1.7.0.95-2.6.4.0.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821746" comment="java-1.7.0-openjdk-devel-1.7.0.95-2.6.4.0.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821747" comment="java-1.7.0-openjdk-headless-1.7.0.95-2.6.4.0.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821748" comment="java-1.7.0-openjdk-javadoc-1.7.0.95-2.6.4.0.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821749" comment="java-1.7.0-openjdk-src-1.7.0.95-2.6.4.0.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821729" comment="java-1.8.0-openjdk-1.8.0.71-2.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821730" comment="java-1.8.0-openjdk-accessibility-1.8.0.71-2.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821731" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.71-2.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821732" comment="java-1.8.0-openjdk-debug-1.8.0.71-2.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821733" comment="java-1.8.0-openjdk-demo-1.8.0.71-2.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821734" comment="java-1.8.0-openjdk-demo-debug-1.8.0.71-2.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821735" comment="java-1.8.0-openjdk-devel-1.8.0.71-2.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821736" comment="java-1.8.0-openjdk-devel-debug-1.8.0.71-2.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821737" comment="java-1.8.0-openjdk-headless-1.8.0.71-2.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821738" comment="java-1.8.0-openjdk-headless-debug-1.8.0.71-2.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821739" comment="java-1.8.0-openjdk-javadoc-1.8.0.71-2.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821740" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.71-2.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821741" comment="java-1.8.0-openjdk-src-1.8.0.71-2.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821742" comment="java-1.8.0-openjdk-src-debug-1.8.0.71-2.b15.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0494</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0494" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0494" ref_url="https://www.suse.com/security/cve/CVE-2016-0494" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0636-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001942.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0263-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WB2NQ3V2BHAFYEU5DCOQH3B3SIMMKMRI/#WB2NQ3V2BHAFYEU5DCOQH3B3SIMMKMRI" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0268-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OXB4QAFWJUQEZEK2MFV5C6VMXORCHTOC/#OXB4QAFWJUQEZEK2MFV5C6VMXORCHTOC" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EM5IRJXZE66HIX564A56RBKHOFXINXH2/#EM5IRJXZE66HIX564A56RBKHOFXINXH2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0272-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YX6XI7PJCN66EMA6MG6N5F3SLBKL3UF6/#YX6XI7PJCN66EMA6MG6N5F3SLBKL3UF6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0279-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5PDBMSXPRSUZRBQWXDNZ3KHQVA53KFEH/#5PDBMSXPRSUZRBQWXDNZ3KHQVA53KFEH" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java SE and Java SE Embedded components in Oracle Java SE 6u105, 7u91, and 8u66 and Java SE Embedded 8u65 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-31"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0494/">CVE-2016-0494 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0494">CVE-2016-0494 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/962743">SUSE bug 962743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963937">SUSE bug 963937</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821767" comment="java-1.6.0-openjdk-1.6.0.38-1.13.10.0.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821768" comment="java-1.6.0-openjdk-demo-1.6.0.38-1.13.10.0.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821769" comment="java-1.6.0-openjdk-devel-1.6.0.38-1.13.10.0.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821770" comment="java-1.6.0-openjdk-javadoc-1.6.0.38-1.13.10.0.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821771" comment="java-1.6.0-openjdk-src-1.6.0.38-1.13.10.0.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821743" comment="java-1.7.0-openjdk-1.7.0.95-2.6.4.0.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821744" comment="java-1.7.0-openjdk-accessibility-1.7.0.95-2.6.4.0.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821745" comment="java-1.7.0-openjdk-demo-1.7.0.95-2.6.4.0.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821746" comment="java-1.7.0-openjdk-devel-1.7.0.95-2.6.4.0.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821747" comment="java-1.7.0-openjdk-headless-1.7.0.95-2.6.4.0.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821748" comment="java-1.7.0-openjdk-javadoc-1.7.0.95-2.6.4.0.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821749" comment="java-1.7.0-openjdk-src-1.7.0.95-2.6.4.0.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821729" comment="java-1.8.0-openjdk-1.8.0.71-2.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821730" comment="java-1.8.0-openjdk-accessibility-1.8.0.71-2.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821731" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.71-2.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821732" comment="java-1.8.0-openjdk-debug-1.8.0.71-2.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821733" comment="java-1.8.0-openjdk-demo-1.8.0.71-2.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821734" comment="java-1.8.0-openjdk-demo-debug-1.8.0.71-2.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821735" comment="java-1.8.0-openjdk-devel-1.8.0.71-2.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821736" comment="java-1.8.0-openjdk-devel-debug-1.8.0.71-2.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821737" comment="java-1.8.0-openjdk-headless-1.8.0.71-2.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821738" comment="java-1.8.0-openjdk-headless-debug-1.8.0.71-2.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821739" comment="java-1.8.0-openjdk-javadoc-1.8.0.71-2.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821740" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.71-2.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821741" comment="java-1.8.0-openjdk-src-1.8.0.71-2.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821742" comment="java-1.8.0-openjdk-src-debug-1.8.0.71-2.b15.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160505" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0505</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0505" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0505" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0505" ref_url="https://www.suse.com/security/cve/CVE-2016-0505" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002129.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0367-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MNXXBKR27OCBTL4X72QF2FXHNCHLPN3W/#MNXXBKR27OCBTL4X72QF2FXHNCHLPN3W" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0377-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y64E3EWBZMLORHUBLQ7FAQIRZQJP5GWT/#Y64E3EWBZMLORHUBLQ7FAQIRZQJP5GWT" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1664-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RDR3EMSODHXKVMG4CT6FAJI4NCGNUXW2/#RDR3EMSODHXKVMG4CT6FAJI4NCGNUXW2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1686-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GY3UT7X4G7N7NHARWS74DGVWBZJMUOZ4/#GY3UT7X4G7N7NHARWS74DGVWBZJMUOZ4" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via unknown vectors related to Options.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0505/">CVE-2016-0505 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0505">CVE-2016-0505 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/962779">SUSE bug 962779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962817">SUSE bug 962817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962930">SUSE bug 962930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962931">SUSE bug 962931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962932">SUSE bug 962932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962934">SUSE bug 962934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962935">SUSE bug 962935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962936">SUSE bug 962936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962937">SUSE bug 962937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962938">SUSE bug 962938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962939">SUSE bug 962939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962941">SUSE bug 962941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962942">SUSE bug 962942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962943">SUSE bug 962943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962944">SUSE bug 962944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962945">SUSE bug 962945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962946">SUSE bug 962946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962947">SUSE bug 962947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962948">SUSE bug 962948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962949">SUSE bug 962949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962950">SUSE bug 962950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962951">SUSE bug 962951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962952">SUSE bug 962952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980904">SUSE bug 980904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821941" comment="mariadb-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821942" comment="mariadb-bench-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821943" comment="mariadb-devel-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821944" comment="mariadb-embedded-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821945" comment="mariadb-embedded-devel-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821946" comment="mariadb-libs-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821947" comment="mariadb-server-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821948" comment="mariadb-test-5.5.47-1.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160546" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0546</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0546" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0546" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0546" ref_url="https://www.suse.com/security/cve/CVE-2016-0546" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002129.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0367-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MNXXBKR27OCBTL4X72QF2FXHNCHLPN3W/#MNXXBKR27OCBTL4X72QF2FXHNCHLPN3W" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0377-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y64E3EWBZMLORHUBLQ7FAQIRZQJP5GWT/#Y64E3EWBZMLORHUBLQ7FAQIRZQJP5GWT" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1664-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RDR3EMSODHXKVMG4CT6FAJI4NCGNUXW2/#RDR3EMSODHXKVMG4CT6FAJI4NCGNUXW2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1686-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GY3UT7X4G7N7NHARWS74DGVWBZJMUOZ4/#GY3UT7X4G7N7NHARWS74DGVWBZJMUOZ4" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Client.  NOTE: the previous information is from the January 2016 CPU. Oracle has not commented on third-party claims that these are multiple buffer overflows in the mysqlshow tool that allow remote database servers to have unspecified impact via a long table or database name.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0546/">CVE-2016-0546 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0546">CVE-2016-0546 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/962779">SUSE bug 962779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962817">SUSE bug 962817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962930">SUSE bug 962930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962931">SUSE bug 962931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962932">SUSE bug 962932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962934">SUSE bug 962934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962935">SUSE bug 962935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962936">SUSE bug 962936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962937">SUSE bug 962937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962938">SUSE bug 962938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962939">SUSE bug 962939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962941">SUSE bug 962941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962942">SUSE bug 962942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962943">SUSE bug 962943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962944">SUSE bug 962944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962945">SUSE bug 962945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962946">SUSE bug 962946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962947">SUSE bug 962947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962948">SUSE bug 962948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962949">SUSE bug 962949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962950">SUSE bug 962950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962951">SUSE bug 962951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962952">SUSE bug 962952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980904">SUSE bug 980904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821941" comment="mariadb-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821942" comment="mariadb-bench-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821943" comment="mariadb-devel-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821944" comment="mariadb-embedded-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821945" comment="mariadb-embedded-devel-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821946" comment="mariadb-libs-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821947" comment="mariadb-server-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821948" comment="mariadb-test-5.5.47-1.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160596" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0596</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0596" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0596" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0596" ref_url="https://www.suse.com/security/cve/CVE-2016-0596" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002129.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0367-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MNXXBKR27OCBTL4X72QF2FXHNCHLPN3W/#MNXXBKR27OCBTL4X72QF2FXHNCHLPN3W" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0377-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y64E3EWBZMLORHUBLQ7FAQIRZQJP5GWT/#Y64E3EWBZMLORHUBLQ7FAQIRZQJP5GWT" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1664-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RDR3EMSODHXKVMG4CT6FAJI4NCGNUXW2/#RDR3EMSODHXKVMG4CT6FAJI4NCGNUXW2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1686-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GY3UT7X4G7N7NHARWS74DGVWBZJMUOZ4/#GY3UT7X4G7N7NHARWS74DGVWBZJMUOZ4" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier and 5.6.27 and earlier and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via vectors related to DML.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0596/">CVE-2016-0596 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0596">CVE-2016-0596 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/962779">SUSE bug 962779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962817">SUSE bug 962817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962930">SUSE bug 962930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962931">SUSE bug 962931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962932">SUSE bug 962932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962934">SUSE bug 962934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962935">SUSE bug 962935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962936">SUSE bug 962936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962937">SUSE bug 962937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962938">SUSE bug 962938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962939">SUSE bug 962939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962941">SUSE bug 962941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962942">SUSE bug 962942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962943">SUSE bug 962943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962944">SUSE bug 962944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962945">SUSE bug 962945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962946">SUSE bug 962946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962947">SUSE bug 962947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962948">SUSE bug 962948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962949">SUSE bug 962949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962950">SUSE bug 962950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962951">SUSE bug 962951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962952">SUSE bug 962952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980904">SUSE bug 980904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821941" comment="mariadb-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821942" comment="mariadb-bench-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821943" comment="mariadb-devel-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821944" comment="mariadb-embedded-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821945" comment="mariadb-embedded-devel-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821946" comment="mariadb-libs-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821947" comment="mariadb-server-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821948" comment="mariadb-test-5.5.47-1.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160597" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0597</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0597" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0597" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0597" ref_url="https://www.suse.com/security/cve/CVE-2016-0597" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002129.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0367-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MNXXBKR27OCBTL4X72QF2FXHNCHLPN3W/#MNXXBKR27OCBTL4X72QF2FXHNCHLPN3W" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0377-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y64E3EWBZMLORHUBLQ7FAQIRZQJP5GWT/#Y64E3EWBZMLORHUBLQ7FAQIRZQJP5GWT" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1664-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RDR3EMSODHXKVMG4CT6FAJI4NCGNUXW2/#RDR3EMSODHXKVMG4CT6FAJI4NCGNUXW2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1686-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GY3UT7X4G7N7NHARWS74DGVWBZJMUOZ4/#GY3UT7X4G7N7NHARWS74DGVWBZJMUOZ4" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via unknown vectors related to Optimizer.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0597/">CVE-2016-0597 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0597">CVE-2016-0597 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/962779">SUSE bug 962779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962817">SUSE bug 962817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962930">SUSE bug 962930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962931">SUSE bug 962931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962932">SUSE bug 962932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962934">SUSE bug 962934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962935">SUSE bug 962935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962936">SUSE bug 962936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962937">SUSE bug 962937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962938">SUSE bug 962938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962939">SUSE bug 962939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962941">SUSE bug 962941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962942">SUSE bug 962942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962943">SUSE bug 962943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962944">SUSE bug 962944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962945">SUSE bug 962945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962946">SUSE bug 962946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962947">SUSE bug 962947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962948">SUSE bug 962948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962949">SUSE bug 962949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962950">SUSE bug 962950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962951">SUSE bug 962951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962952">SUSE bug 962952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980904">SUSE bug 980904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821941" comment="mariadb-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821942" comment="mariadb-bench-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821943" comment="mariadb-devel-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821944" comment="mariadb-embedded-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821945" comment="mariadb-embedded-devel-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821946" comment="mariadb-libs-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821947" comment="mariadb-server-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821948" comment="mariadb-test-5.5.47-1.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160598" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0598</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0598" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0598" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0598" ref_url="https://www.suse.com/security/cve/CVE-2016-0598" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002129.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0367-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MNXXBKR27OCBTL4X72QF2FXHNCHLPN3W/#MNXXBKR27OCBTL4X72QF2FXHNCHLPN3W" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0377-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y64E3EWBZMLORHUBLQ7FAQIRZQJP5GWT/#Y64E3EWBZMLORHUBLQ7FAQIRZQJP5GWT" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1664-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RDR3EMSODHXKVMG4CT6FAJI4NCGNUXW2/#RDR3EMSODHXKVMG4CT6FAJI4NCGNUXW2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1686-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GY3UT7X4G7N7NHARWS74DGVWBZJMUOZ4/#GY3UT7X4G7N7NHARWS74DGVWBZJMUOZ4" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via vectors related to DML.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0598/">CVE-2016-0598 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0598">CVE-2016-0598 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/962779">SUSE bug 962779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962817">SUSE bug 962817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962930">SUSE bug 962930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962931">SUSE bug 962931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962932">SUSE bug 962932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962934">SUSE bug 962934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962935">SUSE bug 962935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962936">SUSE bug 962936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962937">SUSE bug 962937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962938">SUSE bug 962938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962939">SUSE bug 962939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962941">SUSE bug 962941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962942">SUSE bug 962942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962943">SUSE bug 962943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962944">SUSE bug 962944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962945">SUSE bug 962945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962946">SUSE bug 962946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962947">SUSE bug 962947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962948">SUSE bug 962948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962949">SUSE bug 962949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962950">SUSE bug 962950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962951">SUSE bug 962951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962952">SUSE bug 962952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980904">SUSE bug 980904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821941" comment="mariadb-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821942" comment="mariadb-bench-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821943" comment="mariadb-devel-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821944" comment="mariadb-embedded-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821945" comment="mariadb-embedded-devel-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821946" comment="mariadb-libs-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821947" comment="mariadb-server-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821948" comment="mariadb-test-5.5.47-1.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160600" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0600</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0600" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0600" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0600" ref_url="https://www.suse.com/security/cve/CVE-2016-0600" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002129.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0367-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MNXXBKR27OCBTL4X72QF2FXHNCHLPN3W/#MNXXBKR27OCBTL4X72QF2FXHNCHLPN3W" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0377-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y64E3EWBZMLORHUBLQ7FAQIRZQJP5GWT/#Y64E3EWBZMLORHUBLQ7FAQIRZQJP5GWT" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1664-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RDR3EMSODHXKVMG4CT6FAJI4NCGNUXW2/#RDR3EMSODHXKVMG4CT6FAJI4NCGNUXW2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1686-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GY3UT7X4G7N7NHARWS74DGVWBZJMUOZ4/#GY3UT7X4G7N7NHARWS74DGVWBZJMUOZ4" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via unknown vectors related to InnoDB.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0600/">CVE-2016-0600 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0600">CVE-2016-0600 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/962779">SUSE bug 962779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962817">SUSE bug 962817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962930">SUSE bug 962930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962931">SUSE bug 962931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962932">SUSE bug 962932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962934">SUSE bug 962934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962935">SUSE bug 962935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962936">SUSE bug 962936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962937">SUSE bug 962937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962938">SUSE bug 962938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962939">SUSE bug 962939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962941">SUSE bug 962941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962942">SUSE bug 962942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962943">SUSE bug 962943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962944">SUSE bug 962944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962945">SUSE bug 962945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962946">SUSE bug 962946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962947">SUSE bug 962947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962948">SUSE bug 962948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962949">SUSE bug 962949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962950">SUSE bug 962950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962951">SUSE bug 962951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962952">SUSE bug 962952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980904">SUSE bug 980904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821941" comment="mariadb-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821942" comment="mariadb-bench-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821943" comment="mariadb-devel-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821944" comment="mariadb-embedded-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821945" comment="mariadb-embedded-devel-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821946" comment="mariadb-libs-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821947" comment="mariadb-server-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821948" comment="mariadb-test-5.5.47-1.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160606" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0606</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0606" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0606" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0606" ref_url="https://www.suse.com/security/cve/CVE-2016-0606" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002129.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0367-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MNXXBKR27OCBTL4X72QF2FXHNCHLPN3W/#MNXXBKR27OCBTL4X72QF2FXHNCHLPN3W" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0377-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y64E3EWBZMLORHUBLQ7FAQIRZQJP5GWT/#Y64E3EWBZMLORHUBLQ7FAQIRZQJP5GWT" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1664-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RDR3EMSODHXKVMG4CT6FAJI4NCGNUXW2/#RDR3EMSODHXKVMG4CT6FAJI4NCGNUXW2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1686-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GY3UT7X4G7N7NHARWS74DGVWBZJMUOZ4/#GY3UT7X4G7N7NHARWS74DGVWBZJMUOZ4" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect integrity via unknown vectors related to encryption.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0606/">CVE-2016-0606 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0606">CVE-2016-0606 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/962779">SUSE bug 962779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962817">SUSE bug 962817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962930">SUSE bug 962930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962931">SUSE bug 962931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962932">SUSE bug 962932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962934">SUSE bug 962934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962935">SUSE bug 962935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962936">SUSE bug 962936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962937">SUSE bug 962937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962938">SUSE bug 962938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962939">SUSE bug 962939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962941">SUSE bug 962941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962942">SUSE bug 962942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962943">SUSE bug 962943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962944">SUSE bug 962944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962945">SUSE bug 962945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962946">SUSE bug 962946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962947">SUSE bug 962947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962948">SUSE bug 962948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962949">SUSE bug 962949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962950">SUSE bug 962950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962951">SUSE bug 962951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962952">SUSE bug 962952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980904">SUSE bug 980904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821941" comment="mariadb-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821942" comment="mariadb-bench-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821943" comment="mariadb-devel-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821944" comment="mariadb-embedded-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821945" comment="mariadb-embedded-devel-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821946" comment="mariadb-libs-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821947" comment="mariadb-server-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821948" comment="mariadb-test-5.5.47-1.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160608" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0608</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0608" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0608" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0608" ref_url="https://www.suse.com/security/cve/CVE-2016-0608" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002129.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0367-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MNXXBKR27OCBTL4X72QF2FXHNCHLPN3W/#MNXXBKR27OCBTL4X72QF2FXHNCHLPN3W" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0377-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y64E3EWBZMLORHUBLQ7FAQIRZQJP5GWT/#Y64E3EWBZMLORHUBLQ7FAQIRZQJP5GWT" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1664-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RDR3EMSODHXKVMG4CT6FAJI4NCGNUXW2/#RDR3EMSODHXKVMG4CT6FAJI4NCGNUXW2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1686-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GY3UT7X4G7N7NHARWS74DGVWBZJMUOZ4/#GY3UT7X4G7N7NHARWS74DGVWBZJMUOZ4" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via vectors related to UDF.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0608/">CVE-2016-0608 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0608">CVE-2016-0608 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/962779">SUSE bug 962779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962817">SUSE bug 962817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962930">SUSE bug 962930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962931">SUSE bug 962931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962932">SUSE bug 962932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962934">SUSE bug 962934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962935">SUSE bug 962935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962936">SUSE bug 962936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962937">SUSE bug 962937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962938">SUSE bug 962938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962939">SUSE bug 962939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962941">SUSE bug 962941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962942">SUSE bug 962942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962943">SUSE bug 962943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962944">SUSE bug 962944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962945">SUSE bug 962945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962946">SUSE bug 962946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962947">SUSE bug 962947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962948">SUSE bug 962948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962949">SUSE bug 962949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962950">SUSE bug 962950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962951">SUSE bug 962951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962952">SUSE bug 962952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980904">SUSE bug 980904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821941" comment="mariadb-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821942" comment="mariadb-bench-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821943" comment="mariadb-devel-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821944" comment="mariadb-embedded-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821945" comment="mariadb-embedded-devel-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821946" comment="mariadb-libs-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821947" comment="mariadb-server-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821948" comment="mariadb-test-5.5.47-1.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160609" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0609</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0609" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0609" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0609" ref_url="https://www.suse.com/security/cve/CVE-2016-0609" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002129.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0367-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MNXXBKR27OCBTL4X72QF2FXHNCHLPN3W/#MNXXBKR27OCBTL4X72QF2FXHNCHLPN3W" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0377-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y64E3EWBZMLORHUBLQ7FAQIRZQJP5GWT/#Y64E3EWBZMLORHUBLQ7FAQIRZQJP5GWT" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1664-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RDR3EMSODHXKVMG4CT6FAJI4NCGNUXW2/#RDR3EMSODHXKVMG4CT6FAJI4NCGNUXW2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1686-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GY3UT7X4G7N7NHARWS74DGVWBZJMUOZ4/#GY3UT7X4G7N7NHARWS74DGVWBZJMUOZ4" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via unknown vectors related to privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0609/">CVE-2016-0609 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0609">CVE-2016-0609 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/962779">SUSE bug 962779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962817">SUSE bug 962817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962930">SUSE bug 962930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962931">SUSE bug 962931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962932">SUSE bug 962932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962934">SUSE bug 962934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962935">SUSE bug 962935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962936">SUSE bug 962936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962937">SUSE bug 962937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962938">SUSE bug 962938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962939">SUSE bug 962939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962941">SUSE bug 962941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962942">SUSE bug 962942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962943">SUSE bug 962943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962944">SUSE bug 962944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962945">SUSE bug 962945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962946">SUSE bug 962946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962947">SUSE bug 962947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962948">SUSE bug 962948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962949">SUSE bug 962949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962950">SUSE bug 962950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962951">SUSE bug 962951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962952">SUSE bug 962952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980904">SUSE bug 980904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821941" comment="mariadb-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821942" comment="mariadb-bench-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821943" comment="mariadb-devel-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821944" comment="mariadb-embedded-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821945" comment="mariadb-embedded-devel-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821946" comment="mariadb-libs-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821947" comment="mariadb-server-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821948" comment="mariadb-test-5.5.47-1.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160616" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0616</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0616" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0616" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0616" ref_url="https://www.suse.com/security/cve/CVE-2016-0616" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002129.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1664-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RDR3EMSODHXKVMG4CT6FAJI4NCGNUXW2/#RDR3EMSODHXKVMG4CT6FAJI4NCGNUXW2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1686-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GY3UT7X4G7N7NHARWS74DGVWBZJMUOZ4/#GY3UT7X4G7N7NHARWS74DGVWBZJMUOZ4" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via unknown vectors related to Optimizer.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0616/">CVE-2016-0616 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0616">CVE-2016-0616 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/962779">SUSE bug 962779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962817">SUSE bug 962817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962930">SUSE bug 962930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962931">SUSE bug 962931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962932">SUSE bug 962932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962934">SUSE bug 962934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962935">SUSE bug 962935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962936">SUSE bug 962936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962937">SUSE bug 962937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962938">SUSE bug 962938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962939">SUSE bug 962939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962941">SUSE bug 962941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962942">SUSE bug 962942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962943">SUSE bug 962943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962944">SUSE bug 962944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962945">SUSE bug 962945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962946">SUSE bug 962946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962947">SUSE bug 962947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962948">SUSE bug 962948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962949">SUSE bug 962949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962950">SUSE bug 962950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962951">SUSE bug 962951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962952">SUSE bug 962952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980904">SUSE bug 980904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821941" comment="mariadb-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821942" comment="mariadb-bench-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821943" comment="mariadb-devel-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821944" comment="mariadb-embedded-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821945" comment="mariadb-embedded-devel-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821946" comment="mariadb-libs-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821947" comment="mariadb-server-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821948" comment="mariadb-test-5.5.47-1.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160634" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0634</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0634" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0634" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0634" ref_url="https://www.suse.com/security/cve/CVE-2016-0634" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002410.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1398-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004706.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1419-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/V72YYZ3G5GYG3WCMLHREH5XCGR2EASCW/#V72YYZ3G5GYG3WCMLHREH5XCGR2EASCW" source="SUSE-SU"/>
    <description>
    The expansion of '\h' in the prompt string in bash 4.3 allows remote authenticated users to execute arbitrary code via shell metacharacters placed in 'hostname' of a machine.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-10-07"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0634/">CVE-2016-0634 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0634">CVE-2016-0634 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1000396">SUSE bug 1000396</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1001299">SUSE bug 1001299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159416">SUSE bug 1159416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188388">SUSE bug 1188388</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823309" comment="bash-4.2.46-28.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823310" comment="bash-doc-4.2.46-28.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160636" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0636</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0636" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0636" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0636" ref_url="https://www.suse.com/security/cve/CVE-2016-0636" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0956-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0957-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0959-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001986.html" source="SUSE-SU"/>
		<reference ref_id="TID7010166" ref_url="https://www.suse.com/support/kb/doc/?id=7010166" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0971-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IMQRMDN7MR7QLGKG4A25ZCT6OX3YZ6ZP/#IMQRMDN7MR7QLGKG4A25ZCT6OX3YZ6ZP" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0983-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YRD6RZX66RCLTRCCCWPXUCPBPD34JMQF/#YRD6RZX66RCLTRCCCWPXUCPBPD34JMQF" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1004-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QQA7DU3P2FWTKYKPQ6UEBLHQTHIXT4J3/#QQA7DU3P2FWTKYKPQ6UEBLHQTHIXT4J3" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1005-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BDLF5WOFOQFK5TBSPLW3LJVGOFAKYZMN/#BDLF5WOFOQFK5TBSPLW3LJVGOFAKYZMN" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1042-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6UV2FNGYELFP34NJNJJIZPEVC3ZZW3F7/#6UV2FNGYELFP34NJNJJIZPEVC3ZZW3F7" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u97, 8u73, and 8u74 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to the Hotspot sub-component.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-02-24"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0636/">CVE-2016-0636 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0636">CVE-2016-0636 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/972468">SUSE bug 972468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979252">SUSE bug 979252</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821914" comment="java-1.7.0-openjdk-1.7.0.99-2.6.5.0.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821915" comment="java-1.7.0-openjdk-accessibility-1.7.0.99-2.6.5.0.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821916" comment="java-1.7.0-openjdk-demo-1.7.0.99-2.6.5.0.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821917" comment="java-1.7.0-openjdk-devel-1.7.0.99-2.6.5.0.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821918" comment="java-1.7.0-openjdk-headless-1.7.0.99-2.6.5.0.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821919" comment="java-1.7.0-openjdk-javadoc-1.7.0.99-2.6.5.0.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821920" comment="java-1.7.0-openjdk-src-1.7.0.99-2.6.5.0.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821921" comment="java-1.8.0-openjdk-1.8.0.77-0.b03.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821922" comment="java-1.8.0-openjdk-accessibility-1.8.0.77-0.b03.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821923" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.77-0.b03.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821924" comment="java-1.8.0-openjdk-debug-1.8.0.77-0.b03.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821925" comment="java-1.8.0-openjdk-demo-1.8.0.77-0.b03.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821926" comment="java-1.8.0-openjdk-demo-debug-1.8.0.77-0.b03.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821927" comment="java-1.8.0-openjdk-devel-1.8.0.77-0.b03.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821928" comment="java-1.8.0-openjdk-devel-debug-1.8.0.77-0.b03.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821929" comment="java-1.8.0-openjdk-headless-1.8.0.77-0.b03.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821930" comment="java-1.8.0-openjdk-headless-debug-1.8.0.77-0.b03.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821931" comment="java-1.8.0-openjdk-javadoc-1.8.0.77-0.b03.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821932" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.77-0.b03.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821933" comment="java-1.8.0-openjdk-src-1.8.0.77-0.b03.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821934" comment="java-1.8.0-openjdk-src-debug-1.8.0.77-0.b03.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0640</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0640" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0640" ref_url="https://www.suse.com/security/cve/CVE-2016-0640" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002129.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1332-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SA47QPDDMRSXFULROHSU5XOJYAEI63UQ/#SA47QPDDMRSXFULROHSU5XOJYAEI63UQ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1664-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RDR3EMSODHXKVMG4CT6FAJI4NCGNUXW2/#RDR3EMSODHXKVMG4CT6FAJI4NCGNUXW2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1686-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GY3UT7X4G7N7NHARWS74DGVWBZJMUOZ4/#GY3UT7X4G7N7NHARWS74DGVWBZJMUOZ4" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.47 and earlier, 5.6.28 and earlier, and 5.7.10 and earlier and MariaDB before 5.5.48, 10.0.x before 10.0.24, and 10.1.x before 10.1.12 allows local users to affect integrity and availability via vectors related to DML.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-02-28"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0640/">CVE-2016-0640 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0640">CVE-2016-0640 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/976341">SUSE bug 976341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980904">SUSE bug 980904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822211" comment="mariadb-5.5.50-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822212" comment="mariadb-bench-5.5.50-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822213" comment="mariadb-devel-5.5.50-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822214" comment="mariadb-embedded-5.5.50-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822215" comment="mariadb-embedded-devel-5.5.50-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822216" comment="mariadb-libs-5.5.50-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822217" comment="mariadb-server-5.5.50-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822218" comment="mariadb-test-5.5.50-1.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160641" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0641</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0641" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0641" ref_url="https://www.suse.com/security/cve/CVE-2016-0641" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002129.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1332-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SA47QPDDMRSXFULROHSU5XOJYAEI63UQ/#SA47QPDDMRSXFULROHSU5XOJYAEI63UQ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1664-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RDR3EMSODHXKVMG4CT6FAJI4NCGNUXW2/#RDR3EMSODHXKVMG4CT6FAJI4NCGNUXW2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1686-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GY3UT7X4G7N7NHARWS74DGVWBZJMUOZ4/#GY3UT7X4G7N7NHARWS74DGVWBZJMUOZ4" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.47 and earlier, 5.6.28 and earlier, and 5.7.10 and earlier and MariaDB before 5.5.48, 10.0.x before 10.0.24, and 10.1.x before 10.1.12 allows local users to affect confidentiality and availability via vectors related to MyISAM.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-02-28"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0641/">CVE-2016-0641 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0641">CVE-2016-0641 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/976341">SUSE bug 976341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980904">SUSE bug 980904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822211" comment="mariadb-5.5.50-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822212" comment="mariadb-bench-5.5.50-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822213" comment="mariadb-devel-5.5.50-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822214" comment="mariadb-embedded-5.5.50-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822215" comment="mariadb-embedded-devel-5.5.50-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822216" comment="mariadb-libs-5.5.50-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822217" comment="mariadb-server-5.5.50-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822218" comment="mariadb-test-5.5.50-1.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160643" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0643</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0643" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0643" ref_url="https://www.suse.com/security/cve/CVE-2016-0643" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002129.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1332-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SA47QPDDMRSXFULROHSU5XOJYAEI63UQ/#SA47QPDDMRSXFULROHSU5XOJYAEI63UQ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1664-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RDR3EMSODHXKVMG4CT6FAJI4NCGNUXW2/#RDR3EMSODHXKVMG4CT6FAJI4NCGNUXW2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1686-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GY3UT7X4G7N7NHARWS74DGVWBZJMUOZ4/#GY3UT7X4G7N7NHARWS74DGVWBZJMUOZ4" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.11 and earlier and MariaDB before 5.5.49, 10.0.x before 10.0.25, and 10.1.x before 10.1.14 allows local users to affect confidentiality via vectors related to DML.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-02-25"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0643/">CVE-2016-0643 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0643">CVE-2016-0643 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/976341">SUSE bug 976341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980904">SUSE bug 980904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822211" comment="mariadb-5.5.50-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822212" comment="mariadb-bench-5.5.50-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822213" comment="mariadb-devel-5.5.50-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822214" comment="mariadb-embedded-5.5.50-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822215" comment="mariadb-embedded-devel-5.5.50-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822216" comment="mariadb-libs-5.5.50-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822217" comment="mariadb-server-5.5.50-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822218" comment="mariadb-test-5.5.50-1.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160644" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0644</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0644" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0644" ref_url="https://www.suse.com/security/cve/CVE-2016-0644" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002129.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1332-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SA47QPDDMRSXFULROHSU5XOJYAEI63UQ/#SA47QPDDMRSXFULROHSU5XOJYAEI63UQ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1664-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RDR3EMSODHXKVMG4CT6FAJI4NCGNUXW2/#RDR3EMSODHXKVMG4CT6FAJI4NCGNUXW2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1686-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GY3UT7X4G7N7NHARWS74DGVWBZJMUOZ4/#GY3UT7X4G7N7NHARWS74DGVWBZJMUOZ4" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.47 and earlier, 5.6.28 and earlier, and 5.7.10 and earlier and MariaDB before 5.5.48, 10.0.x before 10.0.24, and 10.1.x before 10.1.12 allows local users to affect availability via vectors related to DDL.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-02-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0644/">CVE-2016-0644 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0644">CVE-2016-0644 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/976341">SUSE bug 976341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980904">SUSE bug 980904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822211" comment="mariadb-5.5.50-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822212" comment="mariadb-bench-5.5.50-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822213" comment="mariadb-devel-5.5.50-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822214" comment="mariadb-embedded-5.5.50-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822215" comment="mariadb-embedded-devel-5.5.50-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822216" comment="mariadb-libs-5.5.50-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822217" comment="mariadb-server-5.5.50-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822218" comment="mariadb-test-5.5.50-1.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160646" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0646</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0646" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0646" ref_url="https://www.suse.com/security/cve/CVE-2016-0646" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002129.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1332-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SA47QPDDMRSXFULROHSU5XOJYAEI63UQ/#SA47QPDDMRSXFULROHSU5XOJYAEI63UQ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1664-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RDR3EMSODHXKVMG4CT6FAJI4NCGNUXW2/#RDR3EMSODHXKVMG4CT6FAJI4NCGNUXW2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1686-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GY3UT7X4G7N7NHARWS74DGVWBZJMUOZ4/#GY3UT7X4G7N7NHARWS74DGVWBZJMUOZ4" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.47 and earlier, 5.6.28 and earlier, and 5.7.10 and earlier and MariaDB before 5.5.48, 10.0.x before 10.0.24, and 10.1.x before 10.1.12 allows local users to affect availability via vectors related to DML.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-02-28"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0646/">CVE-2016-0646 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0646">CVE-2016-0646 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/976341">SUSE bug 976341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980904">SUSE bug 980904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822211" comment="mariadb-5.5.50-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822212" comment="mariadb-bench-5.5.50-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822213" comment="mariadb-devel-5.5.50-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822214" comment="mariadb-embedded-5.5.50-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822215" comment="mariadb-embedded-devel-5.5.50-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822216" comment="mariadb-libs-5.5.50-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822217" comment="mariadb-server-5.5.50-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822218" comment="mariadb-test-5.5.50-1.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160647" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0647</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0647" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0647" ref_url="https://www.suse.com/security/cve/CVE-2016-0647" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002129.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1332-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SA47QPDDMRSXFULROHSU5XOJYAEI63UQ/#SA47QPDDMRSXFULROHSU5XOJYAEI63UQ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1664-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RDR3EMSODHXKVMG4CT6FAJI4NCGNUXW2/#RDR3EMSODHXKVMG4CT6FAJI4NCGNUXW2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1686-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GY3UT7X4G7N7NHARWS74DGVWBZJMUOZ4/#GY3UT7X4G7N7NHARWS74DGVWBZJMUOZ4" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.11 and earlier and MariaDB before 5.5.49, 10.0.x before 10.0.25, and 10.1.x before 10.1.14 allows local users to affect availability via vectors related to FTS.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-02-21"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0647/">CVE-2016-0647 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0647">CVE-2016-0647 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/976341">SUSE bug 976341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980904">SUSE bug 980904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822211" comment="mariadb-5.5.50-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822212" comment="mariadb-bench-5.5.50-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822213" comment="mariadb-devel-5.5.50-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822214" comment="mariadb-embedded-5.5.50-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822215" comment="mariadb-embedded-devel-5.5.50-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822216" comment="mariadb-libs-5.5.50-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822217" comment="mariadb-server-5.5.50-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822218" comment="mariadb-test-5.5.50-1.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160648" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0648</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0648" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0648" ref_url="https://www.suse.com/security/cve/CVE-2016-0648" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002129.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1332-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SA47QPDDMRSXFULROHSU5XOJYAEI63UQ/#SA47QPDDMRSXFULROHSU5XOJYAEI63UQ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1664-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RDR3EMSODHXKVMG4CT6FAJI4NCGNUXW2/#RDR3EMSODHXKVMG4CT6FAJI4NCGNUXW2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1686-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GY3UT7X4G7N7NHARWS74DGVWBZJMUOZ4/#GY3UT7X4G7N7NHARWS74DGVWBZJMUOZ4" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.11 and earlier and MariaDB before 5.5.49, 10.0.x before 10.0.25, and 10.1.x before 10.1.14 allows local users to affect availability via vectors related to PS.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-02-21"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0648/">CVE-2016-0648 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0648">CVE-2016-0648 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/976341">SUSE bug 976341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980904">SUSE bug 980904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822211" comment="mariadb-5.5.50-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822212" comment="mariadb-bench-5.5.50-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822213" comment="mariadb-devel-5.5.50-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822214" comment="mariadb-embedded-5.5.50-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822215" comment="mariadb-embedded-devel-5.5.50-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822216" comment="mariadb-libs-5.5.50-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822217" comment="mariadb-server-5.5.50-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822218" comment="mariadb-test-5.5.50-1.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160649" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0649</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0649" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0649" ref_url="https://www.suse.com/security/cve/CVE-2016-0649" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002129.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1332-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SA47QPDDMRSXFULROHSU5XOJYAEI63UQ/#SA47QPDDMRSXFULROHSU5XOJYAEI63UQ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1664-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RDR3EMSODHXKVMG4CT6FAJI4NCGNUXW2/#RDR3EMSODHXKVMG4CT6FAJI4NCGNUXW2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1686-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GY3UT7X4G7N7NHARWS74DGVWBZJMUOZ4/#GY3UT7X4G7N7NHARWS74DGVWBZJMUOZ4" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.47 and earlier, 5.6.28 and earlier, and 5.7.10 and earlier and MariaDB before 5.5.48, 10.0.x before 10.0.24, and 10.1.x before 10.1.12 allows local users to affect availability via vectors related to PS.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-02-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0649/">CVE-2016-0649 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0649">CVE-2016-0649 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/976341">SUSE bug 976341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980904">SUSE bug 980904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822211" comment="mariadb-5.5.50-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822212" comment="mariadb-bench-5.5.50-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822213" comment="mariadb-devel-5.5.50-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822214" comment="mariadb-embedded-5.5.50-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822215" comment="mariadb-embedded-devel-5.5.50-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822216" comment="mariadb-libs-5.5.50-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822217" comment="mariadb-server-5.5.50-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822218" comment="mariadb-test-5.5.50-1.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160650" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0650</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0650" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0650" ref_url="https://www.suse.com/security/cve/CVE-2016-0650" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002129.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1332-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SA47QPDDMRSXFULROHSU5XOJYAEI63UQ/#SA47QPDDMRSXFULROHSU5XOJYAEI63UQ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1664-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RDR3EMSODHXKVMG4CT6FAJI4NCGNUXW2/#RDR3EMSODHXKVMG4CT6FAJI4NCGNUXW2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1686-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GY3UT7X4G7N7NHARWS74DGVWBZJMUOZ4/#GY3UT7X4G7N7NHARWS74DGVWBZJMUOZ4" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.47 and earlier, 5.6.28 and earlier, and 5.7.10 and earlier and MariaDB before 5.5.48, 10.0.x before 10.0.24, and 10.1.x before 10.1.12 allows local users to affect availability via vectors related to Replication.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-02-23"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0650/">CVE-2016-0650 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0650">CVE-2016-0650 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/976341">SUSE bug 976341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980904">SUSE bug 980904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822211" comment="mariadb-5.5.50-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822212" comment="mariadb-bench-5.5.50-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822213" comment="mariadb-devel-5.5.50-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822214" comment="mariadb-embedded-5.5.50-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822215" comment="mariadb-embedded-devel-5.5.50-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822216" comment="mariadb-libs-5.5.50-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822217" comment="mariadb-server-5.5.50-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822218" comment="mariadb-test-5.5.50-1.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160666" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0666</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0666" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0666" ref_url="https://www.suse.com/security/cve/CVE-2016-0666" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002129.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1332-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SA47QPDDMRSXFULROHSU5XOJYAEI63UQ/#SA47QPDDMRSXFULROHSU5XOJYAEI63UQ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1664-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RDR3EMSODHXKVMG4CT6FAJI4NCGNUXW2/#RDR3EMSODHXKVMG4CT6FAJI4NCGNUXW2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1686-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GY3UT7X4G7N7NHARWS74DGVWBZJMUOZ4/#GY3UT7X4G7N7NHARWS74DGVWBZJMUOZ4" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.11 and earlier and MariaDB before 5.5.49, 10.0.x before 10.0.25, and 10.1.x before 10.1.14 allows local users to affect availability via vectors related to Security: Privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-02-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0666/">CVE-2016-0666 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0666">CVE-2016-0666 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/976341">SUSE bug 976341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980904">SUSE bug 980904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822211" comment="mariadb-5.5.50-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822212" comment="mariadb-bench-5.5.50-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822213" comment="mariadb-devel-5.5.50-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822214" comment="mariadb-embedded-5.5.50-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822215" comment="mariadb-embedded-devel-5.5.50-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822216" comment="mariadb-libs-5.5.50-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822217" comment="mariadb-server-5.5.50-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822218" comment="mariadb-test-5.5.50-1.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160686" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0686</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0686" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0686" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0686" ref_url="https://www.suse.com/security/cve/CVE-2016-0686" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1222-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4CG6BFZVACHVAGOTBXKOHGCQKDPY5PIY/#4CG6BFZVACHVAGOTBXKOHGCQKDPY5PIY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1230-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2O7E5H23GAWZANGEOAVOCMRR2PEZQQHX/#2O7E5H23GAWZANGEOAVOCMRR2PEZQQHX" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1235-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MDUVHCTULLQTSPXV7WEWBA2K4DASYJAA/#MDUVHCTULLQTSPXV7WEWBA2K4DASYJAA" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1262-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QKZT7MK2WWAEBMNSVXWGHVBWPZBTE5K7/#QKZT7MK2WWAEBMNSVXWGHVBWPZBTE5K7" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1265-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WL22B3OVGLTQ52RVCLPFKALGHU7NB2I3/#WL22B3OVGLTQ52RVCLPFKALGHU7NB2I3" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u113, 7u99, and 8u77 and Java SE Embedded 8u77 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Serialization.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0686/">CVE-2016-0686 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0686">CVE-2016-0686 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/976340">SUSE bug 976340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979252">SUSE bug 979252</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822047" comment="java-1.6.0-openjdk-1.6.0.39-1.13.11.0.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822048" comment="java-1.6.0-openjdk-demo-1.6.0.39-1.13.11.0.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822049" comment="java-1.6.0-openjdk-devel-1.6.0.39-1.13.11.0.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822050" comment="java-1.6.0-openjdk-javadoc-1.6.0.39-1.13.11.0.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822051" comment="java-1.6.0-openjdk-src-1.6.0.39-1.13.11.0.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822017" comment="java-1.7.0-openjdk-1.7.0.101-2.6.6.1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822018" comment="java-1.7.0-openjdk-accessibility-1.7.0.101-2.6.6.1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822019" comment="java-1.7.0-openjdk-demo-1.7.0.101-2.6.6.1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822020" comment="java-1.7.0-openjdk-devel-1.7.0.101-2.6.6.1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822021" comment="java-1.7.0-openjdk-headless-1.7.0.101-2.6.6.1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822022" comment="java-1.7.0-openjdk-javadoc-1.7.0.101-2.6.6.1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822023" comment="java-1.7.0-openjdk-src-1.7.0.101-2.6.6.1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822004" comment="java-1.8.0-openjdk-1.8.0.91-0.b14.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822005" comment="java-1.8.0-openjdk-accessibility-1.8.0.91-0.b14.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822006" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.91-0.b14.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822007" comment="java-1.8.0-openjdk-debug-1.8.0.91-0.b14.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822008" comment="java-1.8.0-openjdk-demo-1.8.0.91-0.b14.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822009" comment="java-1.8.0-openjdk-demo-debug-1.8.0.91-0.b14.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822010" comment="java-1.8.0-openjdk-devel-1.8.0.91-0.b14.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822011" comment="java-1.8.0-openjdk-devel-debug-1.8.0.91-0.b14.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822012" comment="java-1.8.0-openjdk-headless-1.8.0.91-0.b14.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822013" comment="java-1.8.0-openjdk-javadoc-1.8.0.91-0.b14.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822014" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.91-0.b14.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822015" comment="java-1.8.0-openjdk-src-1.8.0.91-0.b14.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822016" comment="java-1.8.0-openjdk-src-debug-1.8.0.91-0.b14.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160687" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0687</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0687" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0687" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0687" ref_url="https://www.suse.com/security/cve/CVE-2016-0687" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1222-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4CG6BFZVACHVAGOTBXKOHGCQKDPY5PIY/#4CG6BFZVACHVAGOTBXKOHGCQKDPY5PIY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1230-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2O7E5H23GAWZANGEOAVOCMRR2PEZQQHX/#2O7E5H23GAWZANGEOAVOCMRR2PEZQQHX" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1235-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MDUVHCTULLQTSPXV7WEWBA2K4DASYJAA/#MDUVHCTULLQTSPXV7WEWBA2K4DASYJAA" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1262-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QKZT7MK2WWAEBMNSVXWGHVBWPZBTE5K7/#QKZT7MK2WWAEBMNSVXWGHVBWPZBTE5K7" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1265-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WL22B3OVGLTQ52RVCLPFKALGHU7NB2I3/#WL22B3OVGLTQ52RVCLPFKALGHU7NB2I3" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u113, 7u99, and 8u77 and Java SE Embedded 8u77 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to the Hotspot sub-component.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0687/">CVE-2016-0687 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0687">CVE-2016-0687 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/976340">SUSE bug 976340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979252">SUSE bug 979252</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822047" comment="java-1.6.0-openjdk-1.6.0.39-1.13.11.0.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822048" comment="java-1.6.0-openjdk-demo-1.6.0.39-1.13.11.0.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822049" comment="java-1.6.0-openjdk-devel-1.6.0.39-1.13.11.0.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822050" comment="java-1.6.0-openjdk-javadoc-1.6.0.39-1.13.11.0.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822051" comment="java-1.6.0-openjdk-src-1.6.0.39-1.13.11.0.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822017" comment="java-1.7.0-openjdk-1.7.0.101-2.6.6.1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822018" comment="java-1.7.0-openjdk-accessibility-1.7.0.101-2.6.6.1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822019" comment="java-1.7.0-openjdk-demo-1.7.0.101-2.6.6.1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822020" comment="java-1.7.0-openjdk-devel-1.7.0.101-2.6.6.1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822021" comment="java-1.7.0-openjdk-headless-1.7.0.101-2.6.6.1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822022" comment="java-1.7.0-openjdk-javadoc-1.7.0.101-2.6.6.1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822023" comment="java-1.7.0-openjdk-src-1.7.0.101-2.6.6.1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822004" comment="java-1.8.0-openjdk-1.8.0.91-0.b14.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822005" comment="java-1.8.0-openjdk-accessibility-1.8.0.91-0.b14.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822006" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.91-0.b14.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822007" comment="java-1.8.0-openjdk-debug-1.8.0.91-0.b14.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822008" comment="java-1.8.0-openjdk-demo-1.8.0.91-0.b14.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822009" comment="java-1.8.0-openjdk-demo-debug-1.8.0.91-0.b14.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822010" comment="java-1.8.0-openjdk-devel-1.8.0.91-0.b14.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822011" comment="java-1.8.0-openjdk-devel-debug-1.8.0.91-0.b14.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822012" comment="java-1.8.0-openjdk-headless-1.8.0.91-0.b14.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822013" comment="java-1.8.0-openjdk-javadoc-1.8.0.91-0.b14.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822014" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.91-0.b14.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822015" comment="java-1.8.0-openjdk-src-1.8.0.91-0.b14.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822016" comment="java-1.8.0-openjdk-src-debug-1.8.0.91-0.b14.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160695" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0695</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0695" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0695" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0695" ref_url="https://www.suse.com/security/cve/CVE-2016-0695" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1222-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4CG6BFZVACHVAGOTBXKOHGCQKDPY5PIY/#4CG6BFZVACHVAGOTBXKOHGCQKDPY5PIY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1230-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2O7E5H23GAWZANGEOAVOCMRR2PEZQQHX/#2O7E5H23GAWZANGEOAVOCMRR2PEZQQHX" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1235-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MDUVHCTULLQTSPXV7WEWBA2K4DASYJAA/#MDUVHCTULLQTSPXV7WEWBA2K4DASYJAA" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1262-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QKZT7MK2WWAEBMNSVXWGHVBWPZBTE5K7/#QKZT7MK2WWAEBMNSVXWGHVBWPZBTE5K7" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1265-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WL22B3OVGLTQ52RVCLPFKALGHU7NB2I3/#WL22B3OVGLTQ52RVCLPFKALGHU7NB2I3" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u113, 7u99, and 8u77; Java SE Embedded 8u77; and JRockit R28.3.9 allows remote attackers to affect confidentiality via vectors related to Security.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0695/">CVE-2016-0695 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0695">CVE-2016-0695 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/976340">SUSE bug 976340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979252">SUSE bug 979252</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822047" comment="java-1.6.0-openjdk-1.6.0.39-1.13.11.0.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822048" comment="java-1.6.0-openjdk-demo-1.6.0.39-1.13.11.0.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822049" comment="java-1.6.0-openjdk-devel-1.6.0.39-1.13.11.0.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822050" comment="java-1.6.0-openjdk-javadoc-1.6.0.39-1.13.11.0.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822051" comment="java-1.6.0-openjdk-src-1.6.0.39-1.13.11.0.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822017" comment="java-1.7.0-openjdk-1.7.0.101-2.6.6.1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822018" comment="java-1.7.0-openjdk-accessibility-1.7.0.101-2.6.6.1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822019" comment="java-1.7.0-openjdk-demo-1.7.0.101-2.6.6.1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822020" comment="java-1.7.0-openjdk-devel-1.7.0.101-2.6.6.1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822021" comment="java-1.7.0-openjdk-headless-1.7.0.101-2.6.6.1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822022" comment="java-1.7.0-openjdk-javadoc-1.7.0.101-2.6.6.1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822023" comment="java-1.7.0-openjdk-src-1.7.0.101-2.6.6.1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822004" comment="java-1.8.0-openjdk-1.8.0.91-0.b14.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822005" comment="java-1.8.0-openjdk-accessibility-1.8.0.91-0.b14.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822006" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.91-0.b14.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822007" comment="java-1.8.0-openjdk-debug-1.8.0.91-0.b14.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822008" comment="java-1.8.0-openjdk-demo-1.8.0.91-0.b14.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822009" comment="java-1.8.0-openjdk-demo-debug-1.8.0.91-0.b14.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822010" comment="java-1.8.0-openjdk-devel-1.8.0.91-0.b14.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822011" comment="java-1.8.0-openjdk-devel-debug-1.8.0.91-0.b14.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822012" comment="java-1.8.0-openjdk-headless-1.8.0.91-0.b14.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822013" comment="java-1.8.0-openjdk-javadoc-1.8.0.91-0.b14.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822014" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.91-0.b14.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822015" comment="java-1.8.0-openjdk-src-1.8.0.91-0.b14.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822016" comment="java-1.8.0-openjdk-src-debug-1.8.0.91-0.b14.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160702" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0702</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0702" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0702" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0702" ref_url="https://www.suse.com/security/cve/CVE-2016-0702" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002074.html" source="SUSE-SU"/>
		<reference ref_id="TID3426981" ref_url="https://www.suse.com/support/kb/doc/?id=3426981" source="SUSE-SU"/>
		<reference ref_id="TID7021744" ref_url="https://www.suse.com/support/kb/doc/?id=7021744" source="SUSE-SU"/>
		<reference ref_id="TID7021994" ref_url="https://www.suse.com/support/kb/doc/?id=7021994" source="SUSE-SU"/>
		<reference ref_id="TID7021995" ref_url="https://www.suse.com/support/kb/doc/?id=7021995" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0627-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BKJTQ7YEQCOVAXCXA6XUS5C6AY6CDJTT/#BKJTQ7YEQCOVAXCXA6XUS5C6AY6CDJTT" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0628-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PRZS7YRGBNMMNA7AOZICYXH6FDRHX57D/#PRZS7YRGBNMMNA7AOZICYXH6FDRHX57D" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0637-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/732C2WZF6MGNUGO3W3NVEM4POAHDFAKP/#732C2WZF6MGNUGO3W3NVEM4POAHDFAKP" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0720-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EYE22ZU64KWEPJSQY75BXN2QAW2RIMF7/#EYE22ZU64KWEPJSQY75BXN2QAW2RIMF7" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1239-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZNQRDVNZBEFFFUFANVI5BGCXK3VV7BLG/#ZNQRDVNZBEFFFUFANVI5BGCXK3VV7BLG" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1241-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MLVNWQIN3Y4GRZ5LBEYGXL7O5ECGS532/#MLVNWQIN3Y4GRZ5LBEYGXL7O5ECGS532" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J2UWKLVEL4Y4YDNH4P5SV2WSLSW42P3P/#J2UWKLVEL4Y4YDNH4P5SV2WSLSW42P3P" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1273-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3KDMMNY7VQAJW736NN5LHFSPNXJZFXB6/#3KDMMNY7VQAJW736NN5LHFSPNXJZFXB6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1566-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/X5IGZQ5VZE75TBXVAEAEK72WKRMYLO4K/#X5IGZQ5VZE75TBXVAEAEK72WKRMYLO4K" source="SUSE-SU"/>
    <description>
    The MOD_EXP_CTIME_COPY_FROM_PREBUF function in crypto/bn/bn_exp.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g does not properly consider cache-bank access times during modular exponentiation, which makes it easier for local users to discover RSA keys by running a crafted application on the same Intel Sandy Bridge CPU core as a victim and leveraging cache-bank conflicts, aka a "CacheBleed" attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-11-29"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0702/">CVE-2016-0702 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0702">CVE-2016-0702 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1007806">SUSE bug 1007806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968044">SUSE bug 968044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968050">SUSE bug 968050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971238">SUSE bug 971238</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990370">SUSE bug 990370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821822" comment="openssl-1.0.1e-51.el7_2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821823" comment="openssl-devel-1.0.1e-51.el7_2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821824" comment="openssl-libs-1.0.1e-51.el7_2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821825" comment="openssl-perl-1.0.1e-51.el7_2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821826" comment="openssl-static-1.0.1e-51.el7_2.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160703" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0703</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0703" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0703" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0703" ref_url="https://www.suse.com/security/cve/CVE-2016-0703" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0628-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PRZS7YRGBNMMNA7AOZICYXH6FDRHX57D/#PRZS7YRGBNMMNA7AOZICYXH6FDRHX57D" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0720-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EYE22ZU64KWEPJSQY75BXN2QAW2RIMF7/#EYE22ZU64KWEPJSQY75BXN2QAW2RIMF7" source="SUSE-SU"/>
    <description>
    The get_client_master_key function in s2_srvr.c in the SSLv2 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a accepts a nonzero CLIENT-MASTER-KEY CLEAR-KEY-LENGTH value for an arbitrary cipher, which allows man-in-the-middle attackers to determine the MASTER-KEY value and decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, a related issue to CVE-2016-0800.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0703/">CVE-2016-0703 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0703">CVE-2016-0703 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/968044">SUSE bug 968044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968046">SUSE bug 968046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968051">SUSE bug 968051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986238">SUSE bug 986238</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821840" comment="openssl098e-0.9.8e-29.el7_2.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160704" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0704</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0704" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0704" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0704" ref_url="https://www.suse.com/security/cve/CVE-2016-0704" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001948.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0628-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PRZS7YRGBNMMNA7AOZICYXH6FDRHX57D/#PRZS7YRGBNMMNA7AOZICYXH6FDRHX57D" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0720-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EYE22ZU64KWEPJSQY75BXN2QAW2RIMF7/#EYE22ZU64KWEPJSQY75BXN2QAW2RIMF7" source="SUSE-SU"/>
    <description>
    An oracle protection mechanism in the get_client_master_key function in s2_srvr.c in the SSLv2 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a overwrites incorrect MASTER-KEY bytes during use of export cipher suites, which makes it easier for remote attackers to decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, a related issue to CVE-2016-0800.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0704/">CVE-2016-0704 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0704">CVE-2016-0704 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/968044">SUSE bug 968044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968053">SUSE bug 968053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986238">SUSE bug 986238</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821840" comment="openssl098e-0.9.8e-29.el7_2.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160705" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0705</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0705" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0705" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0705" ref_url="https://www.suse.com/security/cve/CVE-2016-0705" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2839-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004658.html" source="SUSE-SU"/>
		<reference ref_id="TID7021744" ref_url="https://www.suse.com/support/kb/doc/?id=7021744" source="SUSE-SU"/>
		<reference ref_id="TID7021994" ref_url="https://www.suse.com/support/kb/doc/?id=7021994" source="SUSE-SU"/>
		<reference ref_id="TID7021995" ref_url="https://www.suse.com/support/kb/doc/?id=7021995" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0627-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BKJTQ7YEQCOVAXCXA6XUS5C6AY6CDJTT/#BKJTQ7YEQCOVAXCXA6XUS5C6AY6CDJTT" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0628-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PRZS7YRGBNMMNA7AOZICYXH6FDRHX57D/#PRZS7YRGBNMMNA7AOZICYXH6FDRHX57D" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0637-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/732C2WZF6MGNUGO3W3NVEM4POAHDFAKP/#732C2WZF6MGNUGO3W3NVEM4POAHDFAKP" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1332-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SA47QPDDMRSXFULROHSU5XOJYAEI63UQ/#SA47QPDDMRSXFULROHSU5XOJYAEI63UQ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1566-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/X5IGZQ5VZE75TBXVAEAEK72WKRMYLO4K/#X5IGZQ5VZE75TBXVAEAEK72WKRMYLO4K" source="SUSE-SU"/>
    <description>
    Double free vulnerability in the dsa_priv_decode function in crypto/dsa/dsa_ameth.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a malformed DSA private key.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-25"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0705/">CVE-2016-0705 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0705">CVE-2016-0705 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/968044">SUSE bug 968044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968047">SUSE bug 968047</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971238">SUSE bug 971238</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976341">SUSE bug 976341</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821822" comment="openssl-1.0.1e-51.el7_2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821823" comment="openssl-devel-1.0.1e-51.el7_2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821824" comment="openssl-libs-1.0.1e-51.el7_2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821825" comment="openssl-perl-1.0.1e-51.el7_2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821826" comment="openssl-static-1.0.1e-51.el7_2.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160706" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0706</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0706" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0706" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0706" ref_url="https://www.suse.com/security/cve/CVE-2016-0706" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001960.html" source="SUSE-SU"/>
		<reference ref_id="TID7010166" ref_url="https://www.suse.com/support/kb/doc/?id=7010166" source="SUSE-SU"/>
		<reference ref_id="TID7017354" ref_url="https://www.suse.com/support/kb/doc/?id=7017354" source="SUSE-SU"/>
		<reference ref_id="TID7017401" ref_url="https://www.suse.com/support/kb/doc/?id=7017401" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0865-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J2YPI4F6E4ZO2KQ6XN55WTMWMICRAMNY/#J2YPI4F6E4ZO2KQ6XN55WTMWMICRAMNY" source="SUSE-SU"/>
    <description>
    Apache Tomcat 6.x before 6.0.45, 7.x before 7.0.68, 8.x before 8.0.31, and 9.x before 9.0.0.M2 does not place org.apache.catalina.manager.StatusManagerServlet on the org/apache/catalina/core/RestrictedServlets.properties list, which allows remote authenticated users to bypass intended SecurityManager restrictions and read arbitrary HTTP requests, and consequently discover session ID values, via a crafted web application.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0706/">CVE-2016-0706 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0706">CVE-2016-0706 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/967815">SUSE bug 967815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971085">SUSE bug 971085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988489">SUSE bug 988489</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822586" comment="tomcat-7.0.69-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822587" comment="tomcat-admin-webapps-7.0.69-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822588" comment="tomcat-docs-webapp-7.0.69-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822589" comment="tomcat-el-2.2-api-7.0.69-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822590" comment="tomcat-javadoc-7.0.69-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822591" comment="tomcat-jsp-2.2-api-7.0.69-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822592" comment="tomcat-jsvc-7.0.69-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822593" comment="tomcat-lib-7.0.69-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822594" comment="tomcat-servlet-3.0-api-7.0.69-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822595" comment="tomcat-webapps-7.0.69-10.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160714" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0714</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0714" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0714" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0714" ref_url="https://www.suse.com/security/cve/CVE-2016-0714" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001960.html" source="SUSE-SU"/>
		<reference ref_id="TID7017354" ref_url="https://www.suse.com/support/kb/doc/?id=7017354" source="SUSE-SU"/>
		<reference ref_id="TID7017401" ref_url="https://www.suse.com/support/kb/doc/?id=7017401" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0865-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J2YPI4F6E4ZO2KQ6XN55WTMWMICRAMNY/#J2YPI4F6E4ZO2KQ6XN55WTMWMICRAMNY" source="SUSE-SU"/>
    <description>
    The session-persistence implementation in Apache Tomcat 6.x before 6.0.45, 7.x before 7.0.68, 8.x before 8.0.31, and 9.x before 9.0.0.M2 mishandles session attributes, which allows remote authenticated users to bypass intended SecurityManager restrictions and execute arbitrary code in a privileged context via a web application that places a crafted object in a session.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0714/">CVE-2016-0714 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0714">CVE-2016-0714 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/967964">SUSE bug 967964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971085">SUSE bug 971085</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822586" comment="tomcat-7.0.69-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822587" comment="tomcat-admin-webapps-7.0.69-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822588" comment="tomcat-docs-webapp-7.0.69-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822589" comment="tomcat-el-2.2-api-7.0.69-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822590" comment="tomcat-javadoc-7.0.69-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822591" comment="tomcat-jsp-2.2-api-7.0.69-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822592" comment="tomcat-jsvc-7.0.69-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822593" comment="tomcat-lib-7.0.69-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822594" comment="tomcat-servlet-3.0-api-7.0.69-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822595" comment="tomcat-webapps-7.0.69-10.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160718" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0718</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0718" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0718" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0718" ref_url="https://www.suse.com/security/cve/CVE-2016-0718" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006536.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1441-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MDPURAJ5I4VP56UBTJSE3VWOEJE74DNB/#MDPURAJ5I4VP56UBTJSE3VWOEJE74DNB" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1523-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5FFR7NYQL7GYPXPBU6TRQN3XO5Z3M73U/#5FFR7NYQL7GYPXPBU6TRQN3XO5Z3M73U" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1964-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HBRNDT43TAT3XC3DQZSVPGF7XNM7YD6/#5HBRNDT43TAT3XC3DQZSVPGF7XNM7YD6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2026-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5FOCHWPBBRB5OK6GTW52LXIMIMMZD6Q6/#5FOCHWPBBRB5OK6GTW52LXIMIMMZD6Q6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Expat allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a malformed input document, which triggers a buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0718/">CVE-2016-0718 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0718">CVE-2016-0718 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/979441">SUSE bug 979441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991809">SUSE bug 991809</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822707" comment="expat-2.1.0-10.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822708" comment="expat-devel-2.1.0-10.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822709" comment="expat-static-2.1.0-10.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160720" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0720</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0720" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0720" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0720" ref_url="https://www.suse.com/security/cve/CVE-2016-0720" source="SUSE CVE"/>
    <description>
    Cross-site request forgery (CSRF) vulnerability in pcsd web UI in pcs before 0.9.149.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0720/">CVE-2016-0720 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0720">CVE-2016-0720 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822555" comment="pcs-0.9.152-10.el7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160721" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0721</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0721" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0721" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0721" ref_url="https://www.suse.com/security/cve/CVE-2016-0721" source="SUSE CVE"/>
    <description>
    Session fixation vulnerability in pcsd in pcs before 0.9.157.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0721/">CVE-2016-0721 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0721">CVE-2016-0721 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822555" comment="pcs-0.9.152-10.el7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160728" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0728</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0728" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0728" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0728" ref_url="https://www.suse.com/security/cve/CVE-2016-0728" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0341-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0746-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0750-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001932.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0752-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0755-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0757-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001938.html" source="SUSE-SU"/>
		<reference ref_id="TID7017169" ref_url="https://www.suse.com/support/kb/doc?id=7017169" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0280-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TD5WLQ4FFRPU2BIT7RWEY3U73G4UNDCS/#TD5WLQ4FFRPU2BIT7RWEY3U73G4UNDCS" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OC7663UNXLKFWJKPITRGQNF4FU4KJWNK/#OC7663UNXLKFWJKPITRGQNF4FU4KJWNK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0318-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7PLUD6GJFLZ2LR3VZPLUZ5KPDX3EVFZS/#7PLUD6GJFLZ2LR3VZPLUZ5KPDX3EVFZS" source="SUSE-SU"/>
    <description>
    The join_session_keyring function in security/keys/process_keys.c in the Linux kernel before 4.4.1 mishandles object references in a certain error case, which allows local users to gain privileges or cause a denial of service (integer overflow and use-after-free) via crafted keyctl commands.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0728/">CVE-2016-0728 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0728">CVE-2016-0728 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/923755">SUSE bug 923755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962075">SUSE bug 962075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962078">SUSE bug 962078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963994">SUSE bug 963994</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821755" comment="kernel-3.10.0-327.4.5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821756" comment="kernel-abi-whitelists-3.10.0-327.4.5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821757" comment="kernel-debug-3.10.0-327.4.5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821760" comment="kernel-doc-3.10.0-327.4.5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821761" comment="kernel-headers-3.10.0-327.4.5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821762" comment="kernel-tools-3.10.0-327.4.5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821763" comment="kernel-tools-libs-3.10.0-327.4.5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821765" comment="perf-3.10.0-327.4.5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821766" comment="python-perf-3.10.0-327.4.5.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160729" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0729</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0729" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0729" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0729" ref_url="https://www.suse.com/security/cve/CVE-2016-0729" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002000.html" source="SUSE-SU"/>
		<reference ref_id="TID7017306" ref_url="https://www.suse.com/support/kb/doc/?id=7017306" source="SUSE-SU"/>
    <description>
    Multiple buffer overflows in (1) internal/XMLReader.cpp, (2) util/XMLURL.cpp, and (3) util/XMLUri.cpp in the XML Parser library in Apache Xerces-C before 3.1.3 allow remote attackers to cause a denial of service (segmentation fault or memory corruption) or possibly execute arbitrary code via a crafted document.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0729/">CVE-2016-0729 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0729">CVE-2016-0729 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/966822">SUSE bug 966822</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821845" comment="xerces-c-3.1.1-8.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821846" comment="xerces-c-devel-3.1.1-8.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821847" comment="xerces-c-doc-3.1.1-8.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160736" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0736</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0736" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0736" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0736" ref_url="https://www.suse.com/security/cve/CVE-2016-0736" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002741.html" source="SUSE-SU"/>
    <description>
    In Apache HTTP Server versions 2.4.0 to 2.4.23, mod_session_crypto was encrypting its data/cookie using the configured ciphers with possibly either CBC or ECB modes of operation (AES256-CBC by default), hence no selectable or builtin authenticated encryption. This made it vulnerable to padding oracle attacks, particularly with CBC.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0736/">CVE-2016-0736 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0736">CVE-2016-0736 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1016712">SUSE bug 1016712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033513">SUSE bug 1033513</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822887" comment="httpd-2.4.6-45.el7_3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822888" comment="httpd-devel-2.4.6-45.el7_3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822889" comment="httpd-manual-2.4.6-45.el7_3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822890" comment="httpd-tools-2.4.6-45.el7_3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822891" comment="mod_ldap-2.4.6-45.el7_3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822892" comment="mod_proxy_html-2.4.6-45.el7_3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822893" comment="mod_session-2.4.6-45.el7_3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822894" comment="mod_ssl-2.4.6-45.el7_3.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160741" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0741</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0741" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0741" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0741" ref_url="https://www.suse.com/security/cve/CVE-2016-0741" source="SUSE CVE"/>
    <description>
    slapd/connection.c in 389 Directory Server (formerly Fedora Directory Server) 1.3.4.x before 1.3.4.7 allows remote attackers to cause a denial of service (infinite loop and connection blocking) by leveraging an abnormally closed connection.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0741/">CVE-2016-0741 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0741">CVE-2016-0741 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1069074">SUSE bug 1069074</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821818" comment="389-ds-base-1.3.4.0-26.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821819" comment="389-ds-base-devel-1.3.4.0-26.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821820" comment="389-ds-base-libs-1.3.4.0-26.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160749" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0749</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0749" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0749" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0749" ref_url="https://www.suse.com/security/cve/CVE-2016-0749" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002108.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002110.html" source="SUSE-SU"/>
    <description>
    The smartcard interaction in SPICE allows remote attackers to cause a denial of service (QEMU-KVM process crash) or possibly execute arbitrary code via vectors related to connecting to a guest VM, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-0749/">CVE-2016-0749 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0749">CVE-2016-0749 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/982385">SUSE bug 982385</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982386">SUSE bug 982386</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822091" comment="spice-server-0.12.4-15.el7_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822092" comment="spice-server-devel-0.12.4-15.el7_2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160758" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0758</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0758" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0758" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0758" ref_url="https://www.suse.com/security/cve/CVE-2016-0758" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1672-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1937-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1995-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2005-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002192.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2009-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2010-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002200.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002255.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1641-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IGM6U4LKVWMXO6ZXETRLFQOGMA4A2ZQL/#IGM6U4LKVWMXO6ZXETRLFQOGMA4A2ZQL" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G3VWHAWQDEVZ37XRAAROFMJVDBBQ6YF5/#G3VWHAWQDEVZ37XRAAROFMJVDBBQ6YF5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2184-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NA2C2XZHCLKYOLPO7FG5N5MJ7TLHYLY2/#NA2C2XZHCLKYOLPO7FG5N5MJ7TLHYLY2" source="SUSE-SU"/>
    <description>
    Integer overflow in lib/asn1_decoder.c in the Linux kernel before 4.6 allows local users to gain privileges via crafted ASN.1 data.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0758/">CVE-2016-0758 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0758">CVE-2016-0758 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1020452">SUSE bug 1020452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072204">SUSE bug 1072204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115893">SUSE bug 1115893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979867">SUSE bug 979867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980856">SUSE bug 980856</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822069" comment="kernel-3.10.0-327.18.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822070" comment="kernel-abi-whitelists-3.10.0-327.18.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822071" comment="kernel-debug-3.10.0-327.18.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822074" comment="kernel-doc-3.10.0-327.18.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822075" comment="kernel-headers-3.10.0-327.18.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822076" comment="kernel-tools-3.10.0-327.18.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822077" comment="kernel-tools-libs-3.10.0-327.18.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822079" comment="perf-3.10.0-327.18.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822080" comment="python-perf-3.10.0-327.18.2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160762" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0762</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0762" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0762" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0762" ref_url="https://www.suse.com/security/cve/CVE-2016-0762" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002971.html" source="SUSE-SU"/>
		<reference ref_id="TID7010166" ref_url="https://www.suse.com/support/kb/doc/?id=7010166" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3129-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SGMBZCOJXORZN3SH4O7AD4MHCKWUSZI2/#SGMBZCOJXORZN3SH4O7AD4MHCKWUSZI2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3144-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6ZNY6SBERRBLMIGYS4YSNYRKOJMNXY57/#6ZNY6SBERRBLMIGYS4YSNYRKOJMNXY57" source="SUSE-SU"/>
    <description>
    The Realm implementations in Apache Tomcat versions 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70 and 6.0.0 to 6.0.45 did not process the supplied password if the supplied user name did not exist. This made a timing attack possible to determine valid user names. Note that the default configuration includes the LockOutRealm which makes exploitation of this vulnerability harder.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-30"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0762/">CVE-2016-0762 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0762">CVE-2016-0762 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1007854">SUSE bug 1007854</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823429" comment="tomcat-7.0.76-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823430" comment="tomcat-admin-webapps-7.0.76-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823431" comment="tomcat-docs-webapp-7.0.76-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823432" comment="tomcat-el-2.2-api-7.0.76-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823433" comment="tomcat-javadoc-7.0.76-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823434" comment="tomcat-jsp-2.2-api-7.0.76-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823435" comment="tomcat-jsvc-7.0.76-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823436" comment="tomcat-lib-7.0.76-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823437" comment="tomcat-servlet-3.0-api-7.0.76-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823438" comment="tomcat-webapps-7.0.76-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160763" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0763</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0763" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0763" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0763" ref_url="https://www.suse.com/security/cve/CVE-2016-0763" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001957.html" source="SUSE-SU"/>
		<reference ref_id="TID7017354" ref_url="https://www.suse.com/support/kb/doc/?id=7017354" source="SUSE-SU"/>
		<reference ref_id="TID7017401" ref_url="https://www.suse.com/support/kb/doc/?id=7017401" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0865-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J2YPI4F6E4ZO2KQ6XN55WTMWMICRAMNY/#J2YPI4F6E4ZO2KQ6XN55WTMWMICRAMNY" source="SUSE-SU"/>
    <description>
    The setGlobalContext method in org/apache/naming/factory/ResourceLinkFactory.java in Apache Tomcat 7.x before 7.0.68, 8.x before 8.0.31, and 9.x before 9.0.0.M3 does not consider whether ResourceLinkFactory.setGlobalContext callers are authorized, which allows remote authenticated users to bypass intended SecurityManager restrictions and read or write to arbitrary application data, or cause a denial of service (application disruption), via a web application that sets a crafted global context.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0763/">CVE-2016-0763 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0763">CVE-2016-0763 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/967966">SUSE bug 967966</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971085">SUSE bug 971085</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822586" comment="tomcat-7.0.69-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822587" comment="tomcat-admin-webapps-7.0.69-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822588" comment="tomcat-docs-webapp-7.0.69-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822589" comment="tomcat-el-2.2-api-7.0.69-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822590" comment="tomcat-javadoc-7.0.69-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822591" comment="tomcat-jsp-2.2-api-7.0.69-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822592" comment="tomcat-jsvc-7.0.69-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822593" comment="tomcat-lib-7.0.69-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822594" comment="tomcat-servlet-3.0-api-7.0.69-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822595" comment="tomcat-webapps-7.0.69-10.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160764" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0764</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0764" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0764" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0764" ref_url="https://www.suse.com/security/cve/CVE-2016-0764" source="SUSE CVE"/>
    <description>
    Race condition in Network Manager before 1.0.12 as packaged in Red Hat Enterprise Linux Desktop 7, Red Hat Enterprise Linux HPC Node 7, Red Hat Enterprise Linux Server 7, and Red Hat Enterprise Linux Workstation 7 allows local users to obtain sensitive connection information by reading temporary files during ifcfg and keyfile changes.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0764/">CVE-2016-0764 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0764">CVE-2016-0764 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/974072">SUSE bug 974072</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822455" comment="NetworkManager-1.4.0-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822456" comment="NetworkManager-adsl-1.4.0-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822457" comment="NetworkManager-bluetooth-1.4.0-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822458" comment="NetworkManager-config-server-1.4.0-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822459" comment="NetworkManager-dispatcher-routing-rules-1.4.0-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822460" comment="NetworkManager-glib-1.4.0-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822461" comment="NetworkManager-glib-devel-1.4.0-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822462" comment="NetworkManager-libnm-1.4.0-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822463" comment="NetworkManager-libnm-devel-1.4.0-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822464" comment="NetworkManager-libreswan-1.2.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822465" comment="NetworkManager-libreswan-gnome-1.2.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822466" comment="NetworkManager-team-1.4.0-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822467" comment="NetworkManager-tui-1.4.0-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822468" comment="NetworkManager-wifi-1.4.0-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822469" comment="NetworkManager-wwan-1.4.0-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822470" comment="libnl3-3.2.28-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822471" comment="libnl3-cli-3.2.28-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822472" comment="libnl3-devel-3.2.28-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822473" comment="libnl3-doc-3.2.28-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822474" comment="libnm-gtk-1.4.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822475" comment="libnm-gtk-devel-1.4.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822476" comment="libnma-1.4.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822477" comment="libnma-devel-1.4.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822478" comment="network-manager-applet-1.4.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822479" comment="nm-connection-editor-1.4.0-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160773" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0773</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0773" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0773" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0773" ref_url="https://www.suse.com/security/cve/CVE-2016-0773" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0539-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0677-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001914.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0531-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YA3S4CWBA5BZUN55U722H6ARJX6B2DKE/#YA3S4CWBA5BZUN55U722H6ARJX6B2DKE" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0578-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CWB26AOEVWMCJ3I5U7K5ADXFJOGFN5D4/#CWB26AOEVWMCJ3I5U7K5ADXFJOGFN5D4" source="SUSE-SU"/>
    <description>
    PostgreSQL before 9.1.20, 9.2.x before 9.2.15, 9.3.x before 9.3.11, 9.4.x before 9.4.6, and 9.5.x before 9.5.1 allows remote attackers to cause a denial of service (infinite loop or buffer overflow and crash) via a large Unicode character range in a regular expression.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0773/">CVE-2016-0773 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0773">CVE-2016-0773 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/966435">SUSE bug 966435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966436">SUSE bug 966436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978323">SUSE bug 978323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983246">SUSE bug 983246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986409">SUSE bug 986409</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821827" comment="postgresql-9.2.15-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821828" comment="postgresql-contrib-9.2.15-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821829" comment="postgresql-devel-9.2.15-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821830" comment="postgresql-docs-9.2.15-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821831" comment="postgresql-libs-9.2.15-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821832" comment="postgresql-plperl-9.2.15-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821833" comment="postgresql-plpython-9.2.15-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821834" comment="postgresql-pltcl-9.2.15-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821835" comment="postgresql-server-9.2.15-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821836" comment="postgresql-test-9.2.15-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821837" comment="postgresql-upgrade-9.2.15-1.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160777" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0777</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0777" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0777" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0777" ref_url="https://www.suse.com/security/cve/CVE-2016-0777" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001805.html" source="SUSE-SU"/>
		<reference ref_id="TID7017154" ref_url="https://www.suse.com/support/kb/doc?id=7017154" source="SUSE-SU"/>
		<reference ref_id="TID7017155" ref_url="https://www.suse.com/support/kb/doc?id=7017155" source="SUSE-SU"/>
		<reference ref_id="TID7017180" ref_url="https://www.suse.com/support/kb/doc/?id=7017180" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0127-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R7FZXC627WBJIDCDZEYQLLMKYOCLGTH2/#R7FZXC627WBJIDCDZEYQLLMKYOCLGTH2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0128-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KG22AHWOUP3O2CQJXLG3TPW4BOFPPN5Q/#KG22AHWOUP3O2CQJXLG3TPW4BOFPPN5Q" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0144-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SKEQIBI4FAQSK2KSGNHUDTP6IFNW72I3/#SKEQIBI4FAQSK2KSGNHUDTP6IFNW72I3" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0145-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZQX4IUCQNLQ6M7HK5P6KRSV2TQWA4FTF/#ZQX4IUCQNLQ6M7HK5P6KRSV2TQWA4FTF" source="SUSE-SU"/>
    <description>
    The resend_bytes function in roaming_common.c in the client in OpenSSH 5.x, 6.x, and 7.x before 7.1p2 allows remote servers to obtain sensitive information from process memory by requesting transmission of an entire buffer, as demonstrated by reading a private key.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0777/">CVE-2016-0777 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0777">CVE-2016-0777 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/961642">SUSE bug 961642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/996040">SUSE bug 996040</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821721" comment="openssh-6.6.1p1-23.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821722" comment="openssh-askpass-6.6.1p1-23.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821723" comment="openssh-clients-6.6.1p1-23.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821724" comment="openssh-keycat-6.6.1p1-23.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821725" comment="openssh-ldap-6.6.1p1-23.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821726" comment="openssh-server-6.6.1p1-23.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821727" comment="openssh-server-sysvinit-6.6.1p1-23.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821728" comment="pam_ssh_agent_auth-0.9.3-9.23.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160778" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0778</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0778" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0778" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0778" ref_url="https://www.suse.com/security/cve/CVE-2016-0778" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001805.html" source="SUSE-SU"/>
		<reference ref_id="TID7017154" ref_url="https://www.suse.com/support/kb/doc?id=7017154" source="SUSE-SU"/>
		<reference ref_id="TID7017155" ref_url="https://www.suse.com/support/kb/doc?id=7017155" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0127-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R7FZXC627WBJIDCDZEYQLLMKYOCLGTH2/#R7FZXC627WBJIDCDZEYQLLMKYOCLGTH2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0128-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KG22AHWOUP3O2CQJXLG3TPW4BOFPPN5Q/#KG22AHWOUP3O2CQJXLG3TPW4BOFPPN5Q" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0144-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SKEQIBI4FAQSK2KSGNHUDTP6IFNW72I3/#SKEQIBI4FAQSK2KSGNHUDTP6IFNW72I3" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0145-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZQX4IUCQNLQ6M7HK5P6KRSV2TQWA4FTF/#ZQX4IUCQNLQ6M7HK5P6KRSV2TQWA4FTF" source="SUSE-SU"/>
    <description>
    The (1) roaming_read and (2) roaming_write functions in roaming_common.c in the client in OpenSSH 5.x, 6.x, and 7.x before 7.1p2, when certain proxy and forward options are enabled, do not properly maintain connection file descriptors, which allows remote servers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact by requesting many forwardings.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0778/">CVE-2016-0778 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0778">CVE-2016-0778 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/961645">SUSE bug 961645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/996040">SUSE bug 996040</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821721" comment="openssh-6.6.1p1-23.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821722" comment="openssh-askpass-6.6.1p1-23.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821723" comment="openssh-clients-6.6.1p1-23.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821724" comment="openssh-keycat-6.6.1p1-23.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821725" comment="openssh-ldap-6.6.1p1-23.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821726" comment="openssh-server-6.6.1p1-23.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821727" comment="openssh-server-sysvinit-6.6.1p1-23.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821728" comment="pam_ssh_agent_auth-0.9.3-9.23.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160787" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0787</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0787" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0787" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0787" ref_url="https://www.suse.com/security/cve/CVE-2016-0787" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0718-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
    <description>
    The diffie_hellman_sha256 function in kex.c in libssh2 before 1.7.0 improperly truncates secrets to 128 or 256 bits, which makes it easier for man-in-the-middle attackers to decrypt or intercept SSH sessions via unspecified vectors, aka a "bits/bytes confusion bug."
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0787/">CVE-2016-0787 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0787">CVE-2016-0787 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1149968">SUSE bug 1149968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967026">SUSE bug 967026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968174">SUSE bug 968174</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974691">SUSE bug 974691</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821842" comment="libssh2-1.4.3-10.el7_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821843" comment="libssh2-devel-1.4.3-10.el7_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821844" comment="libssh2-docs-1.4.3-10.el7_2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0797</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0797" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0797" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0797" ref_url="https://www.suse.com/security/cve/CVE-2016-0797" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0627-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BKJTQ7YEQCOVAXCXA6XUS5C6AY6CDJTT/#BKJTQ7YEQCOVAXCXA6XUS5C6AY6CDJTT" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0628-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PRZS7YRGBNMMNA7AOZICYXH6FDRHX57D/#PRZS7YRGBNMMNA7AOZICYXH6FDRHX57D" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0637-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/732C2WZF6MGNUGO3W3NVEM4POAHDFAKP/#732C2WZF6MGNUGO3W3NVEM4POAHDFAKP" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C5ZZO44NS35G5NQFFXUERK5DXLTQN534/#C5ZZO44NS35G5NQFFXUERK5DXLTQN534" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0720-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EYE22ZU64KWEPJSQY75BXN2QAW2RIMF7/#EYE22ZU64KWEPJSQY75BXN2QAW2RIMF7" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1239-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZNQRDVNZBEFFFUFANVI5BGCXK3VV7BLG/#ZNQRDVNZBEFFFUFANVI5BGCXK3VV7BLG" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1241-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MLVNWQIN3Y4GRZ5LBEYGXL7O5ECGS532/#MLVNWQIN3Y4GRZ5LBEYGXL7O5ECGS532" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1566-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/X5IGZQ5VZE75TBXVAEAEK72WKRMYLO4K/#X5IGZQ5VZE75TBXVAEAEK72WKRMYLO4K" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g allow remote attackers to cause a denial of service (heap memory corruption or NULL pointer dereference) or possibly have unspecified other impact via a long digit string that is mishandled by the (1) BN_dec2bn or (2) BN_hex2bn function, related to crypto/bn/bn.h and crypto/bn/bn_print.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0797/">CVE-2016-0797 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0797">CVE-2016-0797 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/968044">SUSE bug 968044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968048">SUSE bug 968048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990370">SUSE bug 990370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821822" comment="openssl-1.0.1e-51.el7_2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821823" comment="openssl-devel-1.0.1e-51.el7_2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821824" comment="openssl-libs-1.0.1e-51.el7_2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821825" comment="openssl-perl-1.0.1e-51.el7_2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821826" comment="openssl-static-1.0.1e-51.el7_2.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160799" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0799</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0799" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0799" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0799" ref_url="https://www.suse.com/security/cve/CVE-2016-0799" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0627-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BKJTQ7YEQCOVAXCXA6XUS5C6AY6CDJTT/#BKJTQ7YEQCOVAXCXA6XUS5C6AY6CDJTT" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0628-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PRZS7YRGBNMMNA7AOZICYXH6FDRHX57D/#PRZS7YRGBNMMNA7AOZICYXH6FDRHX57D" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0637-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/732C2WZF6MGNUGO3W3NVEM4POAHDFAKP/#732C2WZF6MGNUGO3W3NVEM4POAHDFAKP" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C5ZZO44NS35G5NQFFXUERK5DXLTQN534/#C5ZZO44NS35G5NQFFXUERK5DXLTQN534" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0720-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EYE22ZU64KWEPJSQY75BXN2QAW2RIMF7/#EYE22ZU64KWEPJSQY75BXN2QAW2RIMF7" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1239-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZNQRDVNZBEFFFUFANVI5BGCXK3VV7BLG/#ZNQRDVNZBEFFFUFANVI5BGCXK3VV7BLG" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1241-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MLVNWQIN3Y4GRZ5LBEYGXL7O5ECGS532/#MLVNWQIN3Y4GRZ5LBEYGXL7O5ECGS532" source="SUSE-SU"/>
    <description>
    The fmtstr function in crypto/bio/b_print.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g improperly calculates string lengths, which allows remote attackers to cause a denial of service (overflow and out-of-bounds read) or possibly have unspecified other impact via a long string, as demonstrated by a large amount of ASN.1 data, a different vulnerability than CVE-2016-2842.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-12-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0799/">CVE-2016-0799 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0799">CVE-2016-0799 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/968044">SUSE bug 968044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968374">SUSE bug 968374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969517">SUSE bug 969517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989345">SUSE bug 989345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990370">SUSE bug 990370</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991722">SUSE bug 991722</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822042" comment="openssl-1.0.1e-51.el7_2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822043" comment="openssl-devel-1.0.1e-51.el7_2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822044" comment="openssl-libs-1.0.1e-51.el7_2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822045" comment="openssl-perl-1.0.1e-51.el7_2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822046" comment="openssl-static-1.0.1e-51.el7_2.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0800</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0800" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0800" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0800" ref_url="https://www.suse.com/security/cve/CVE-2016-0800" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002014.html" source="SUSE-SU"/>
		<reference ref_id="TID3426981" ref_url="https://www.suse.com/support/kb/doc/?id=3426981" source="SUSE-SU"/>
		<reference ref_id="TID7016794" ref_url="https://www.suse.com/support/kb/doc/?id=7016794" source="SUSE-SU"/>
		<reference ref_id="TID7017297" ref_url="https://www.suse.com/support/kb/doc?id=7017297" source="SUSE-SU"/>
		<reference ref_id="TID7017315" ref_url="https://www.suse.com/support/kb/doc/?id=7017315" source="SUSE-SU"/>
		<reference ref_id="TID7017316" ref_url="https://www.suse.com/support/kb/doc/?id=7017316" source="SUSE-SU"/>
		<reference ref_id="TID7017317" ref_url="https://www.suse.com/support/kb/doc/?id=7017317" source="SUSE-SU"/>
		<reference ref_id="TID7017338" ref_url="https://www.suse.com/support/kb/doc/?id=7017338" source="SUSE-SU"/>
		<reference ref_id="TID7017374" ref_url="https://www.suse.com/support/kb/doc/?id=7017374" source="SUSE-SU"/>
		<reference ref_id="TID7021979" ref_url="https://www.suse.com/support/kb/doc/?id=7021979" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0627-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BKJTQ7YEQCOVAXCXA6XUS5C6AY6CDJTT/#BKJTQ7YEQCOVAXCXA6XUS5C6AY6CDJTT" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0628-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PRZS7YRGBNMMNA7AOZICYXH6FDRHX57D/#PRZS7YRGBNMMNA7AOZICYXH6FDRHX57D" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0637-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/732C2WZF6MGNUGO3W3NVEM4POAHDFAKP/#732C2WZF6MGNUGO3W3NVEM4POAHDFAKP" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C5ZZO44NS35G5NQFFXUERK5DXLTQN534/#C5ZZO44NS35G5NQFFXUERK5DXLTQN534" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0720-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EYE22ZU64KWEPJSQY75BXN2QAW2RIMF7/#EYE22ZU64KWEPJSQY75BXN2QAW2RIMF7" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1239-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZNQRDVNZBEFFFUFANVI5BGCXK3VV7BLG/#ZNQRDVNZBEFFFUFANVI5BGCXK3VV7BLG" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1241-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MLVNWQIN3Y4GRZ5LBEYGXL7O5ECGS532/#MLVNWQIN3Y4GRZ5LBEYGXL7O5ECGS532" source="SUSE-SU"/>
    <description>
    The SSLv2 protocol, as used in OpenSSL before 1.0.1s and 1.0.2 before 1.0.2g and other products, requires a server to send a ServerVerify message before establishing that a client possesses certain plaintext RSA data, which makes it easier for remote attackers to decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, aka a "DROWN" attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0800/">CVE-2016-0800 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0800">CVE-2016-0800 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1106871">SUSE bug 1106871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961377">SUSE bug 961377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968044">SUSE bug 968044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968046">SUSE bug 968046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968888">SUSE bug 968888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969591">SUSE bug 969591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979060">SUSE bug 979060</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821840" comment="openssl098e-0.9.8e-29.el7_2.3 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821822" comment="openssl-1.0.1e-51.el7_2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821823" comment="openssl-devel-1.0.1e-51.el7_2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821824" comment="openssl-libs-1.0.1e-51.el7_2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821825" comment="openssl-perl-1.0.1e-51.el7_2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821826" comment="openssl-static-1.0.1e-51.el7_2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821840" comment="openssl098e-0.9.8e-29.el7_2.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161000110" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1000110</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1000110" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000110" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1000110" ref_url="https://www.suse.com/security/cve/CVE-2016-1000110" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2653-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0086-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SRKGGFVSV7DDWCMAOSO6E3F66U2CF5XR/" source="SUSE-SU"/>
    <description>
    The CGIHandler class in Python before 2.7.12 does not protect against the HTTP_PROXY variable name clash in a CGI script, which could allow a remote attacker to redirect HTTP requests.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1000110/">CVE-2016-1000110 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1000110">CVE-2016-1000110 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/988484">SUSE bug 988484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989523">SUSE bug 989523</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822251" comment="python-2.7.5-38.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822252" comment="python-debug-2.7.5-38.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822253" comment="python-devel-2.7.5-38.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822254" comment="python-libs-2.7.5-38.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822255" comment="python-test-2.7.5-38.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822256" comment="python-tools-2.7.5-38.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822257" comment="tkinter-2.7.5-38.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161000111" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1000111</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1000111" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000111" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1000111" ref_url="https://www.suse.com/security/cve/CVE-2016-1000111" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002557.html" source="SUSE-SU"/>
    <description>
    Twisted before 16.3.1 does not attempt to address RFC 3875 section 4.1.18 namespace conflicts and therefore does not protect CGI applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect a CGI application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1000111/">CVE-2016-1000111 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1000111">CVE-2016-1000111 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/989997">SUSE bug 989997</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822318" comment="python-twisted-web-12.1.0-5.el7_2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610002" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10002</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10002" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10002" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10002" ref_url="https://www.suse.com/security/cve/CVE-2016-10002" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002558.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002562.html" source="SUSE-SU"/>
    <description>
    Incorrect processing of responses to If-None-Modified HTTP conditional requests in Squid HTTP Proxy 3.1.10 through 3.1.23, 3.2.0.3 through 3.5.22, and 4.0.1 through 4.0.16 leads to client-specific Cookie data being leaked to other clients. Attack requests can easily be crafted by a client to probe a cache for this information.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10002/">CVE-2016-10002 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10002">CVE-2016-10002 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1016168">SUSE bug 1016168</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822798" comment="squid-3.5.20-2.el7_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822799" comment="squid-migration-script-3.5.20-2.el7_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822800" comment="squid-sysvinit-3.5.20-2.el7_3.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610009" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10009</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10009" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10009" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10009" ref_url="https://www.suse.com/security/cve/CVE-2016-10009" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0607-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002685.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0607-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002972.html" source="SUSE-SU"/>
		<reference ref_id="TID7022102" ref_url="https://www.suse.com/support/kb/doc/?id=7022102" source="SUSE-SU"/>
    <description>
    Untrusted search path vulnerability in ssh-agent.c in ssh-agent in OpenSSH before 7.4 allows remote attackers to execute arbitrary local PKCS#11 modules by leveraging control over a forwarded agent-socket.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-10-23"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10009/">CVE-2016-10009 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10009">CVE-2016-10009 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1016336">SUSE bug 1016336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016366">SUSE bug 1016366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016370">SUSE bug 1016370</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026634">SUSE bug 1026634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138392">SUSE bug 1138392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213504">SUSE bug 1213504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217035">SUSE bug 1217035</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823379" comment="openssh-7.4p1-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823380" comment="openssh-askpass-7.4p1-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823381" comment="openssh-cavs-7.4p1-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823382" comment="openssh-clients-7.4p1-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823383" comment="openssh-keycat-7.4p1-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823384" comment="openssh-ldap-7.4p1-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823385" comment="openssh-server-7.4p1-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823386" comment="openssh-server-sysvinit-7.4p1-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823387" comment="pam_ssh_agent_auth-0.10.3-1.11.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610011" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10011</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10011" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10011" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10011" ref_url="https://www.suse.com/security/cve/CVE-2016-10011" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0607-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002685.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0607-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002972.html" source="SUSE-SU"/>
    <description>
    authfile.c in sshd in OpenSSH before 7.4 does not properly consider the effects of realloc on buffer contents, which might allow local users to obtain sensitive private-key information by leveraging access to a privilege-separated child process.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-10-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10011/">CVE-2016-10011 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10011">CVE-2016-10011 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1016336">SUSE bug 1016336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016369">SUSE bug 1016369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016370">SUSE bug 1016370</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017870">SUSE bug 1017870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026634">SUSE bug 1026634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029445">SUSE bug 1029445</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823379" comment="openssh-7.4p1-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823380" comment="openssh-askpass-7.4p1-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823381" comment="openssh-cavs-7.4p1-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823382" comment="openssh-clients-7.4p1-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823383" comment="openssh-keycat-7.4p1-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823384" comment="openssh-ldap-7.4p1-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823385" comment="openssh-server-7.4p1-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823386" comment="openssh-server-sysvinit-7.4p1-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823387" comment="pam_ssh_agent_auth-0.10.3-1.11.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610012" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10012</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10012" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10012" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10012" ref_url="https://www.suse.com/security/cve/CVE-2016-10012" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004804.html" source="SUSE-SU"/>
		<reference ref_id="TID7022102" ref_url="https://www.suse.com/support/kb/doc/?id=7022102" source="SUSE-SU"/>
    <description>
    The shared memory manager (associated with pre-authentication compression) in sshd in OpenSSH before 7.4 does not ensure that a bounds check is enforced by all compilers, which might allows local users to gain privileges by leveraging access to a sandboxed privilege-separation process, related to the m_zback and m_zlib data structures.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-12-20"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10012/">CVE-2016-10012 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10012">CVE-2016-10012 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1006166">SUSE bug 1006166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016336">SUSE bug 1016336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016369">SUSE bug 1016369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016370">SUSE bug 1016370</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017870">SUSE bug 1017870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026634">SUSE bug 1026634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035742">SUSE bug 1035742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073044">SUSE bug 1073044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092582">SUSE bug 1092582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138392">SUSE bug 1138392</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823379" comment="openssh-7.4p1-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823380" comment="openssh-askpass-7.4p1-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823381" comment="openssh-cavs-7.4p1-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823382" comment="openssh-clients-7.4p1-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823383" comment="openssh-keycat-7.4p1-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823384" comment="openssh-ldap-7.4p1-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823385" comment="openssh-server-7.4p1-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823386" comment="openssh-server-sysvinit-7.4p1-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823387" comment="pam_ssh_agent_auth-0.10.3-1.11.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610088" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10088</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10088" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10088" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10088" ref_url="https://www.suse.com/security/cve/CVE-2016-10088" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0227-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0307-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002828.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0458-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4NRW2RRQBPH6CB4X5XXCAI3A3XMYRHHZ/#4NRW2RRQBPH6CB4X5XXCAI3A3XMYRHHZ" source="SUSE-SU"/>
    <description>
    The sg implementation in the Linux kernel through 4.9 does not properly restrict write operations in situations where the KERNEL_DS option is set, which allows local users to read or write to arbitrary kernel memory locations or cause a denial of service (use-after-free) by leveraging access to a /dev/sg device, related to block/bsg.c and drivers/scsi/sg.c.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-9576.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10088/">CVE-2016-10088 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10088">CVE-2016-10088 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1013604">SUSE bug 1013604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014271">SUSE bug 1014271</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017710">SUSE bug 1017710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019079">SUSE bug 1019079</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115893">SUSE bug 1115893</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823168" comment="kernel-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823169" comment="kernel-abi-whitelists-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823170" comment="kernel-debug-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823173" comment="kernel-doc-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823174" comment="kernel-headers-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823175" comment="kernel-tools-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823176" comment="kernel-tools-libs-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823178" comment="perf-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823179" comment="python-perf-3.10.0-693.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610147" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10147</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10147" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10147" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10147" ref_url="https://www.suse.com/security/cve/CVE-2016-10147" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2017:0458-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4NRW2RRQBPH6CB4X5XXCAI3A3XMYRHHZ/#4NRW2RRQBPH6CB4X5XXCAI3A3XMYRHHZ" source="SUSE-SU"/>
    <description>
    crypto/mcryptd.c in the Linux kernel before 4.8.15 allows local users to cause a denial of service (NULL pointer dereference and system crash) by using an AF_ALG socket with an incompatible algorithm, as demonstrated by mcryptd(md5).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-10147/">CVE-2016-10147 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10147">CVE-2016-10147 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1020381">SUSE bug 1020381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020429">SUSE bug 1020429</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823168" comment="kernel-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823169" comment="kernel-abi-whitelists-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823170" comment="kernel-debug-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823173" comment="kernel-doc-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823174" comment="kernel-headers-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823175" comment="kernel-tools-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823176" comment="kernel-tools-libs-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823178" comment="perf-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823179" comment="python-perf-3.10.0-693.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610164" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10164</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10164" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10164" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10164" ref_url="https://www.suse.com/security/cve/CVE-2016-10164" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002644.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002646.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in libXpm before 3.5.12, when a program requests parsing XPM extensions on a 64-bit platform, allow remote attackers to cause a denial of service (out-of-bounds write) or execute arbitrary code via (1) the number of extensions or (2) their concatenated length in a crafted XPM file, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10164/">CVE-2016-10164 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10164">CVE-2016-10164 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1021315">SUSE bug 1021315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123144">SUSE bug 1123144</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823207" comment="drm-utils-2.4.74-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823208" comment="libICE-1.0.9-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823209" comment="libICE-devel-1.0.9-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823210" comment="libX11-1.6.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823211" comment="libX11-common-1.6.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823212" comment="libX11-devel-1.6.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823213" comment="libXaw-1.0.13-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823214" comment="libXaw-devel-1.0.13-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823215" comment="libXcursor-1.1.14-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823216" comment="libXcursor-devel-1.1.14-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823217" comment="libXdmcp-1.1.2-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823218" comment="libXdmcp-devel-1.1.2-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823219" comment="libXfixes-5.0.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823220" comment="libXfixes-devel-5.0.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823221" comment="libXfont-1.5.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823222" comment="libXfont-devel-1.5.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823223" comment="libXfont2-2.0.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823224" comment="libXfont2-devel-2.0.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823225" comment="libXi-1.7.9-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823226" comment="libXi-devel-1.7.9-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823227" comment="libXpm-3.5.12-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823228" comment="libXpm-devel-3.5.12-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823229" comment="libXrandr-1.5.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823230" comment="libXrandr-devel-1.5.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823231" comment="libXrender-0.9.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823232" comment="libXrender-devel-0.9.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823233" comment="libXt-1.1.5-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823234" comment="libXt-devel-1.1.5-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823235" comment="libXtst-1.2.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823236" comment="libXtst-devel-1.2.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823237" comment="libXv-1.0.11-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823238" comment="libXv-devel-1.0.11-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823239" comment="libXvMC-1.0.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823240" comment="libXvMC-devel-1.0.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823241" comment="libXxf86vm-1.1.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823242" comment="libXxf86vm-devel-1.1.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823243" comment="libdrm-2.4.74-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823244" comment="libdrm-devel-2.4.74-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823245" comment="libepoxy-1.3.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823246" comment="libepoxy-devel-1.3.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823247" comment="libevdev-1.5.6-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823248" comment="libevdev-devel-1.5.6-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823249" comment="libevdev-utils-1.5.6-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823250" comment="libfontenc-1.1.3-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823251" comment="libfontenc-devel-1.1.3-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823252" comment="libinput-1.6.3-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823253" comment="libinput-devel-1.6.3-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823254" comment="libvdpau-1.1.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823255" comment="libvdpau-devel-1.1.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823256" comment="libvdpau-docs-1.1.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823257" comment="libwacom-0.24-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823258" comment="libwacom-data-0.24-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823259" comment="libwacom-devel-0.24-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823260" comment="libxcb-1.12-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823261" comment="libxcb-devel-1.12-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823262" comment="libxcb-doc-1.12-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823263" comment="libxkbcommon-0.7.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823264" comment="libxkbcommon-devel-0.7.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823265" comment="libxkbcommon-x11-0.7.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823266" comment="libxkbcommon-x11-devel-0.7.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823267" comment="libxkbfile-1.0.9-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823268" comment="libxkbfile-devel-1.0.9-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823269" comment="mesa-dri-drivers-17.0.1-6.20170307.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823270" comment="mesa-filesystem-17.0.1-6.20170307.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823271" comment="mesa-libEGL-17.0.1-6.20170307.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823272" comment="mesa-libEGL-devel-17.0.1-6.20170307.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823273" comment="mesa-libGL-17.0.1-6.20170307.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823274" comment="mesa-libGL-devel-17.0.1-6.20170307.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823275" comment="mesa-libGLES-17.0.1-6.20170307.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823276" comment="mesa-libGLES-devel-17.0.1-6.20170307.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823277" comment="mesa-libOSMesa-17.0.1-6.20170307.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823278" comment="mesa-libOSMesa-devel-17.0.1-6.20170307.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823279" comment="mesa-libgbm-17.0.1-6.20170307.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823280" comment="mesa-libgbm-devel-17.0.1-6.20170307.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823281" comment="mesa-libglapi-17.0.1-6.20170307.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823282" comment="mesa-libxatracker-17.0.1-6.20170307.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823283" comment="mesa-libxatracker-devel-17.0.1-6.20170307.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823284" comment="mesa-private-llvm-3.9.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823285" comment="mesa-private-llvm-devel-3.9.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823286" comment="mesa-vulkan-drivers-17.0.1-6.20170307.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823287" comment="vulkan-1.0.39.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823288" comment="vulkan-devel-1.0.39.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823289" comment="vulkan-filesystem-1.0.39.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823290" comment="xcb-proto-1.12-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823291" comment="xkeyboard-config-2.20-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823292" comment="xkeyboard-config-devel-2.20-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823293" comment="xorg-x11-proto-devel-7.7-20.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610167" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10167</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10167" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10167" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10167" ref_url="https://www.suse.com/security/cve/CVE-2016-10167" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0568-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002664.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0588-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HNR5PHERASFBZR3PAWA46DO2U4JE3IQH/#HNR5PHERASFBZR3PAWA46DO2U4JE3IQH" source="SUSE-SU"/>
    <description>
    The gdImageCreateFromGd2Ctx function in gd_gd2.c in the GD Graphics Library (aka libgd) before 2.2.4 allows remote attackers to cause a denial of service (application crash) via a crafted image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10167/">CVE-2016-10167 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10167">CVE-2016-10167 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1022069">SUSE bug 1022069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022264">SUSE bug 1022264</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823727" comment="php-5.4.16-43.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823728" comment="php-bcmath-5.4.16-43.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823729" comment="php-cli-5.4.16-43.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823730" comment="php-common-5.4.16-43.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823731" comment="php-dba-5.4.16-43.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823732" comment="php-devel-5.4.16-43.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823733" comment="php-embedded-5.4.16-43.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823734" comment="php-enchant-5.4.16-43.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823735" comment="php-fpm-5.4.16-43.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823736" comment="php-gd-5.4.16-43.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823737" comment="php-intl-5.4.16-43.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823738" comment="php-ldap-5.4.16-43.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823739" comment="php-mbstring-5.4.16-43.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823740" comment="php-mysql-5.4.16-43.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823741" comment="php-mysqlnd-5.4.16-43.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823742" comment="php-odbc-5.4.16-43.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823743" comment="php-pdo-5.4.16-43.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823744" comment="php-pgsql-5.4.16-43.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823745" comment="php-process-5.4.16-43.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823746" comment="php-pspell-5.4.16-43.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823747" comment="php-recode-5.4.16-43.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823748" comment="php-snmp-5.4.16-43.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823749" comment="php-soap-5.4.16-43.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823750" comment="php-xml-5.4.16-43.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823751" comment="php-xmlrpc-5.4.16-43.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610168" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10168</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10168" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10168" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10168" ref_url="https://www.suse.com/security/cve/CVE-2016-10168" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0568-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003246.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0588-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HNR5PHERASFBZR3PAWA46DO2U4JE3IQH/#HNR5PHERASFBZR3PAWA46DO2U4JE3IQH" source="SUSE-SU"/>
    <description>
    Integer overflow in gd_io.c in the GD Graphics Library (aka libgd) before 2.2.4 allows remote attackers to have unspecified impact via vectors involving the number of horizontal and vertical chunks in an image.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10168/">CVE-2016-10168 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10168">CVE-2016-10168 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1022069">SUSE bug 1022069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022265">SUSE bug 1022265</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823727" comment="php-5.4.16-43.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823728" comment="php-bcmath-5.4.16-43.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823729" comment="php-cli-5.4.16-43.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823730" comment="php-common-5.4.16-43.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823731" comment="php-dba-5.4.16-43.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823732" comment="php-devel-5.4.16-43.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823733" comment="php-embedded-5.4.16-43.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823734" comment="php-enchant-5.4.16-43.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823735" comment="php-fpm-5.4.16-43.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823736" comment="php-gd-5.4.16-43.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823737" comment="php-intl-5.4.16-43.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823738" comment="php-ldap-5.4.16-43.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823739" comment="php-mbstring-5.4.16-43.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823740" comment="php-mysql-5.4.16-43.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823741" comment="php-mysqlnd-5.4.16-43.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823742" comment="php-odbc-5.4.16-43.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823743" comment="php-pdo-5.4.16-43.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823744" comment="php-pgsql-5.4.16-43.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823745" comment="php-process-5.4.16-43.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823746" comment="php-pspell-5.4.16-43.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823747" comment="php-recode-5.4.16-43.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823748" comment="php-snmp-5.4.16-43.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823749" comment="php-soap-5.4.16-43.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823750" comment="php-xml-5.4.16-43.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823751" comment="php-xmlrpc-5.4.16-43.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610195" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10195</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10195" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10195" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10195" ref_url="https://www.suse.com/security/cve/CVE-2016-10195" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003628.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003659.html" source="SUSE-SU"/>
    <description>
    The name_parse function in evdns.c in libevent before 2.1.6-beta allows remote attackers to have unspecified impact via vectors involving the label_len variable, which triggers an out-of-bounds stack read.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10195/">CVE-2016-10195 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10195">CVE-2016-10195 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1022917">SUSE bug 1022917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075618">SUSE bug 1075618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123122">SUSE bug 1123122</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822971" comment="thunderbird-52.1.0-1.el7_3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610196" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10196</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10196" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10196" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10196" ref_url="https://www.suse.com/security/cve/CVE-2016-10196" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003628.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003659.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the evutil_parse_sockaddr_port function in evutil.c in libevent before 2.1.6-beta allows attackers to cause a denial of service (segmentation fault) via vectors involving a long string in brackets in the ip_as_string argument.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10196/">CVE-2016-10196 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10196">CVE-2016-10196 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1022918">SUSE bug 1022918</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075618">SUSE bug 1075618</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822971" comment="thunderbird-52.1.0-1.el7_3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610197" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10197</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10197" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10197" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10197" ref_url="https://www.suse.com/security/cve/CVE-2016-10197" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003628.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003659.html" source="SUSE-SU"/>
    <description>
    The search_make_new function in evdns.c in libevent before 2.1.6-beta allows attackers to cause a denial of service (out-of-bounds read) via an empty hostname.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10197/">CVE-2016-10197 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10197">CVE-2016-10197 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1022919">SUSE bug 1022919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075618">SUSE bug 1075618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123122">SUSE bug 1123122</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822971" comment="thunderbird-52.1.0-1.el7_3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610198" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10198</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10198" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10198" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10198" ref_url="https://www.suse.com/security/cve/CVE-2016-10198" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1004-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1010-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002801.html" source="SUSE-SU"/>
    <description>
    The gst_aac_parse_sink_setcaps function in gst/audioparsers/gstaacparse.c in gst-plugins-good in GStreamer before 1.10.3 allows remote attackers to cause a denial of service (invalid memory read and crash) via a crafted audio file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10198/">CVE-2016-10198 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10198">CVE-2016-10198 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1023259">SUSE bug 1023259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024014">SUSE bug 1024014</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823388" comment="clutter-gst2-2.0.18-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823389" comment="clutter-gst2-devel-2.0.18-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823390" comment="gnome-video-effects-0.4.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823391" comment="gstreamer-plugins-bad-free-0.10.23-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823392" comment="gstreamer-plugins-bad-free-devel-0.10.23-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823393" comment="gstreamer-plugins-bad-free-devel-docs-0.10.23-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823394" comment="gstreamer-plugins-good-0.10.31-13.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823395" comment="gstreamer-plugins-good-devel-docs-0.10.31-13.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823396" comment="gstreamer1-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823397" comment="gstreamer1-devel-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823398" comment="gstreamer1-devel-docs-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823399" comment="gstreamer1-plugins-bad-free-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823400" comment="gstreamer1-plugins-bad-free-devel-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823401" comment="gstreamer1-plugins-bad-free-gtk-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823402" comment="gstreamer1-plugins-base-1.10.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823403" comment="gstreamer1-plugins-base-devel-1.10.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823404" comment="gstreamer1-plugins-base-devel-docs-1.10.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823405" comment="gstreamer1-plugins-base-tools-1.10.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823406" comment="gstreamer1-plugins-good-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823407" comment="orc-0.4.26-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823408" comment="orc-compiler-0.4.26-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823409" comment="orc-devel-0.4.26-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823410" comment="orc-doc-0.4.26-1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610199" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10199</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10199" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10199" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10199" ref_url="https://www.suse.com/security/cve/CVE-2016-10199" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1004-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1010-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002801.html" source="SUSE-SU"/>
    <description>
    The qtdemux_tag_add_str_full function in gst/isomp4/qtdemux.c in gst-plugins-good in GStreamer before 1.10.3 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via a crafted tag value.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10199/">CVE-2016-10199 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10199">CVE-2016-10199 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1023259">SUSE bug 1023259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024017">SUSE bug 1024017</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823388" comment="clutter-gst2-2.0.18-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823389" comment="clutter-gst2-devel-2.0.18-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823390" comment="gnome-video-effects-0.4.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823391" comment="gstreamer-plugins-bad-free-0.10.23-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823392" comment="gstreamer-plugins-bad-free-devel-0.10.23-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823393" comment="gstreamer-plugins-bad-free-devel-docs-0.10.23-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823394" comment="gstreamer-plugins-good-0.10.31-13.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823395" comment="gstreamer-plugins-good-devel-docs-0.10.31-13.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823396" comment="gstreamer1-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823397" comment="gstreamer1-devel-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823398" comment="gstreamer1-devel-docs-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823399" comment="gstreamer1-plugins-bad-free-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823400" comment="gstreamer1-plugins-bad-free-devel-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823401" comment="gstreamer1-plugins-bad-free-gtk-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823402" comment="gstreamer1-plugins-base-1.10.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823403" comment="gstreamer1-plugins-base-devel-1.10.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823404" comment="gstreamer1-plugins-base-devel-docs-1.10.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823405" comment="gstreamer1-plugins-base-tools-1.10.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823406" comment="gstreamer1-plugins-good-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823407" comment="orc-0.4.26-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823408" comment="orc-compiler-0.4.26-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823409" comment="orc-devel-0.4.26-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823410" comment="orc-doc-0.4.26-1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610200" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10200</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10200" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10200" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10200" ref_url="https://www.suse.com/security/cve/CVE-2016-10200" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002847.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003248.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0906-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4LKB4K2PHJZ4HXCYAGRXG6YSPVEHMLTY/#4LKB4K2PHJZ4HXCYAGRXG6YSPVEHMLTY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0907-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/53AU4WLWNJVGYTRR745YR4MG5H4LZMNQ/#53AU4WLWNJVGYTRR745YR4MG5H4LZMNQ" source="SUSE-SU"/>
    <description>
    Race condition in the L2TPv3 IP Encapsulation feature in the Linux kernel before 4.8.14 allows local users to gain privileges or cause a denial of service (use-after-free) by making multiple bind system calls without properly ascertaining whether a socket has the SOCK_ZAPPED status, related to net/l2tp/l2tp_ip.c and net/l2tp/l2tp_ip6.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10200/">CVE-2016-10200 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10200">CVE-2016-10200 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1027179">SUSE bug 1027179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028415">SUSE bug 1028415</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823168" comment="kernel-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823169" comment="kernel-abi-whitelists-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823170" comment="kernel-debug-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823173" comment="kernel-doc-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823174" comment="kernel-headers-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823175" comment="kernel-tools-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823176" comment="kernel-tools-libs-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823178" comment="perf-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823179" comment="python-perf-3.10.0-693.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610207" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10207</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10207" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10207" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10207" ref_url="https://www.suse.com/security/cve/CVE-2016-10207" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0622-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002682.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0444-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M5DSUZT4DPTB22TTMDJUOPAUXWCBYKWI/#M5DSUZT4DPTB22TTMDJUOPAUXWCBYKWI" source="SUSE-SU"/>
    <description>
    The Xvnc server in TigerVNC allows remote attackers to cause a denial of service (invalid memory access and crash) by terminating a TLS handshake early.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10207/">CVE-2016-10207 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10207">CVE-2016-10207 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1023012">SUSE bug 1023012</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823349" comment="fltk-1.3.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823350" comment="fltk-devel-1.3.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823351" comment="fltk-fluid-1.3.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823352" comment="fltk-static-1.3.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823353" comment="tigervnc-1.8.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823354" comment="tigervnc-icons-1.8.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823355" comment="tigervnc-license-1.8.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823356" comment="tigervnc-server-1.8.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823357" comment="tigervnc-server-applet-1.8.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823358" comment="tigervnc-server-minimal-1.8.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823359" comment="tigervnc-server-module-1.8.0-1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610208" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10208</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10208" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10208" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10208" ref_url="https://www.suse.com/security/cve/CVE-2016-10208" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002903.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0906-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4LKB4K2PHJZ4HXCYAGRXG6YSPVEHMLTY/#4LKB4K2PHJZ4HXCYAGRXG6YSPVEHMLTY" source="SUSE-SU"/>
    <description>
    The ext4_fill_super function in fs/ext4/super.c in the Linux kernel through 4.9.8 does not properly validate meta block groups, which allows physically proximate attackers to cause a denial of service (out-of-bounds read and system crash) via a crafted ext4 image.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-10208/">CVE-2016-10208 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10208">CVE-2016-10208 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1023377">SUSE bug 1023377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823048" comment="kernel-3.10.0-514.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823049" comment="kernel-abi-whitelists-3.10.0-514.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823050" comment="kernel-debug-3.10.0-514.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823053" comment="kernel-doc-3.10.0-514.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823054" comment="kernel-headers-3.10.0-514.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823055" comment="kernel-tools-3.10.0-514.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823056" comment="kernel-tools-libs-3.10.0-514.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823058" comment="perf-3.10.0-514.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823059" comment="python-perf-3.10.0-514.21.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610245" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10245</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10245" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10245" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10245" ref_url="https://www.suse.com/security/cve/CVE-2016-10245" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005588.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1486-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/376NLITXUIFGMVISTMANZCTDF4YBTJV4/#376NLITXUIFGMVISTMANZCTDF4YBTJV4" source="SUSE-SU"/>
    <description>
    Insufficient sanitization of the query parameter in templates/html/search_opensearch.php could lead to reflected cross-site scripting or iframe injection.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-10245/">CVE-2016-10245 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10245">CVE-2016-10245 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1136364">SUSE bug 1136364</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827089" comment="doxygen-1.8.5-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827090" comment="doxygen-doxywizard-1.8.5-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827091" comment="doxygen-latex-1.8.5-4.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610248" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10248</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10248" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10248" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10248" ref_url="https://www.suse.com/security/cve/CVE-2016-10248" source="SUSE CVE"/>
    <description>
    The jpc_tsfb_synthesize function in jpc_tsfb.c in JasPer before 1.900.9 allows remote attackers to cause a denial of service (NULL pointer dereference) via vectors involving an empty sequence.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-10248/">CVE-2016-10248 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10248">CVE-2016-10248 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1029705">SUSE bug 1029705</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822979" comment="jasper-1.900.1-30.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822980" comment="jasper-devel-1.900.1-30.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822981" comment="jasper-libs-1.900.1-30.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822982" comment="jasper-utils-1.900.1-30.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610249" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10249</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10249" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10249" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10249" ref_url="https://www.suse.com/security/cve/CVE-2016-10249" source="SUSE CVE"/>
    <description>
    Integer overflow in the jpc_dec_tiledecode function in jpc_dec.c in JasPer before 1.900.12 allows remote attackers to have unspecified impact via a crafted image file, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-10"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-10249/">CVE-2016-10249 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10249">CVE-2016-10249 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1029704">SUSE bug 1029704</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822979" comment="jasper-1.900.1-30.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822980" comment="jasper-devel-1.900.1-30.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822981" comment="jasper-libs-1.900.1-30.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822982" comment="jasper-utils-1.900.1-30.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610251" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10251</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10251" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10251" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10251" ref_url="https://www.suse.com/security/cve/CVE-2016-10251" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002789.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the jpc_pi_nextcprl function in jpc_t2cod.c in JasPer before 1.900.20 allows remote attackers to have unspecified impact via a crafted file, which triggers use of an uninitialized value.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-10251/">CVE-2016-10251 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10251">CVE-2016-10251 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1029497">SUSE bug 1029497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822979" comment="jasper-1.900.1-30.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822980" comment="jasper-devel-1.900.1-30.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822981" comment="jasper-libs-1.900.1-30.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822982" comment="jasper-utils-1.900.1-30.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610713" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10713</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10713" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10713" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10713" ref_url="https://www.suse.com/security/cve/CVE-2016-10713" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003975.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1137-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HPS723LCT5FI65CKXGSHVIQ3APKKN2RY/#HPS723LCT5FI65CKXGSHVIQ3APKKN2RY" source="SUSE-SU"/>
    <description>
    An issue was discovered in GNU patch before 2.7.6. Out-of-bounds access within pch_write_line() in pch.c can possibly lead to DoS via a crafted input file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10713/">CVE-2016-10713 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10713">CVE-2016-10713 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1080918">SUSE bug 1080918</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101128">SUSE bug 1101128</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826027" comment="patch-2.7.1-11.el7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610735" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10735</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10735" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10735" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10735" ref_url="https://www.suse.com/security/cve/CVE-2016-10735" source="SUSE CVE"/>
    <description>
    In Bootstrap 3.x before 3.4.0 and 4.x-beta before 4.0.0-beta.2, XSS is possible in the data-target attribute, a different vulnerability than CVE-2018-14041.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10735/">CVE-2016-10735 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10735">CVE-2016-10735 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828282" comment="ipa-client-4.6.8-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828283" comment="ipa-client-common-4.6.8-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828284" comment="ipa-common-4.6.8-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828285" comment="ipa-python-compat-4.6.8-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828286" comment="ipa-server-4.6.8-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828287" comment="ipa-server-common-4.6.8-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828288" comment="ipa-server-dns-4.6.8-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828289" comment="ipa-server-trust-ad-4.6.8-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828290" comment="python2-ipaclient-4.6.8-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828291" comment="python2-ipalib-4.6.8-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828292" comment="python2-ipaserver-4.6.8-5.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610739" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10739</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10739" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10739" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10739" ref_url="https://www.suse.com/security/cve/CVE-2016-10739" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0903-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190903-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013417.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1250-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SEBZ42G23A4PRQRKKG425HHEGA3GK7EF/#SEBZ42G23A4PRQRKKG425HHEGA3GK7EF" source="SUSE-SU"/>
    <description>
    In the GNU C Library (aka glibc or libc6) through 2.28, the getaddrinfo function would successfully parse a string that contained an IPv4 address followed by whitespace and arbitrary characters, which could lead applications to incorrectly assume that it had parsed a valid string, without the possibility of embedded HTTP headers or other potentially dangerous substrings.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-10739/">CVE-2016-10739 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10739">CVE-2016-10739 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1122729">SUSE bug 1122729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155094">SUSE bug 1155094</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826210" comment="glibc-2.17-292.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826211" comment="glibc-common-2.17-292.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826212" comment="glibc-devel-2.17-292.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826213" comment="glibc-headers-2.17-292.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826214" comment="glibc-static-2.17-292.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826215" comment="glibc-utils-2.17-292.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826216" comment="nscd-2.17-292.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610745" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10745</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10745" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10745" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10745" ref_url="https://www.suse.com/security/cve/CVE-2016-10745" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0444-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0447-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0450-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0452-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0456-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1395-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KPV2O2QPXQEQ5BKRBRQ2RKA7RHVLTZ7E/#KPV2O2QPXQEQ5BKRBRQ2RKA7RHVLTZ7E" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1614-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4QG2AJ6CCSOAIRI2PJS5V7B5H7SPO3LR/#4QG2AJ6CCSOAIRI2PJS5V7B5H7SPO3LR" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/pipermail/neuvector-updates/2023-November/000021.html" source="SUSE-SU"/>
    <description>
    In Pallets Jinja before 2.8.1, str.format allows a sandbox escape.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.7/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2016-10745/">CVE-2016-10745 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10745">CVE-2016-10745 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1132174">SUSE bug 1132174</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825705" comment="python-jinja2-2.7.2-3.el7_6 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161248" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1248</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1248" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1248" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1248" ref_url="https://www.suse.com/security/cve/CVE-2016-1248" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2938-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2942-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013343.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2992-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UALT2SYJPGBP6JGTUAQGVZMYJSTG4AFQ/#UALT2SYJPGBP6JGTUAQGVZMYJSTG4AFQ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2993-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2AJEZT3ONRA7JUFTUQCHX7ZWNH2UEKNM/#2AJEZT3ONRA7JUFTUQCHX7ZWNH2UEKNM" source="SUSE-SU"/>
    <description>
    vim before patch 8.0.0056 does not properly validate values for the 'filetype', 'syntax' and 'keymap' options, which may result in the execution of arbitrary code if a file with a specially crafted modeline is opened.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1248/">CVE-2016-1248 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1248">CVE-2016-1248 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1010685">SUSE bug 1010685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173534">SUSE bug 1173534</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822716" comment="vim-X11-7.4.160-1.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822717" comment="vim-common-7.4.160-1.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822718" comment="vim-enhanced-7.4.160-1.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822719" comment="vim-filesystem-7.4.160-1.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822720" comment="vim-minimal-7.4.160-1.el7_3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161285" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1285</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1285" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1285" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1285" ref_url="https://www.suse.com/security/cve/CVE-2016-1285" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002105.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0827-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UJZEWQPF7Q4PNDHIMD6FAJG6A35KZD4T/#UJZEWQPF7Q4PNDHIMD6FAJG6A35KZD4T" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0830-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W5V4ZWFPWYIXPAD3QWMVR5RHXK6S2OIS/#W5V4ZWFPWYIXPAD3QWMVR5RHXK6S2OIS" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0834-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y2IOVTHPZQ6BAFBZCDSRMJAOTFWGKGST/#Y2IOVTHPZQ6BAFBZCDSRMJAOTFWGKGST" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0859-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XVLMV7PPVZNIBNMB3KBT64OETGYIXG2I/#XVLMV7PPVZNIBNMB3KBT64OETGYIXG2I" source="SUSE-SU"/>
    <description>
    named in ISC BIND 9.x before 9.9.8-P4 and 9.10.x before 9.10.3-P4 does not properly handle DNAME records when parsing fetch reply messages, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a malformed packet to the rndc (aka control channel) interface, related to alist.c and sexpr.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1285/">CVE-2016-1285 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1285">CVE-2016-1285 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/970072">SUSE bug 970072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981200">SUSE bug 981200</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821875" comment="bind-9.9.4-29.el7_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821876" comment="bind-chroot-9.9.4-29.el7_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821877" comment="bind-devel-9.9.4-29.el7_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821878" comment="bind-libs-9.9.4-29.el7_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821879" comment="bind-libs-lite-9.9.4-29.el7_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821880" comment="bind-license-9.9.4-29.el7_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821881" comment="bind-lite-devel-9.9.4-29.el7_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821882" comment="bind-pkcs11-9.9.4-29.el7_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821883" comment="bind-pkcs11-devel-9.9.4-29.el7_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821884" comment="bind-pkcs11-libs-9.9.4-29.el7_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821885" comment="bind-pkcs11-utils-9.9.4-29.el7_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821886" comment="bind-sdb-9.9.4-29.el7_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821887" comment="bind-sdb-chroot-9.9.4-29.el7_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821888" comment="bind-utils-9.9.4-29.el7_2.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161286" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1286</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1286" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1286" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1286" ref_url="https://www.suse.com/security/cve/CVE-2016-1286" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002105.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0827-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UJZEWQPF7Q4PNDHIMD6FAJG6A35KZD4T/#UJZEWQPF7Q4PNDHIMD6FAJG6A35KZD4T" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0830-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W5V4ZWFPWYIXPAD3QWMVR5RHXK6S2OIS/#W5V4ZWFPWYIXPAD3QWMVR5RHXK6S2OIS" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0834-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y2IOVTHPZQ6BAFBZCDSRMJAOTFWGKGST/#Y2IOVTHPZQ6BAFBZCDSRMJAOTFWGKGST" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0859-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XVLMV7PPVZNIBNMB3KBT64OETGYIXG2I/#XVLMV7PPVZNIBNMB3KBT64OETGYIXG2I" source="SUSE-SU"/>
    <description>
    named in ISC BIND 9.x before 9.9.8-P4 and 9.10.x before 9.10.3-P4 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a crafted signature record for a DNAME record, related to db.c and resolver.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1286/">CVE-2016-1286 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1286">CVE-2016-1286 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/970073">SUSE bug 970073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981200">SUSE bug 981200</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821875" comment="bind-9.9.4-29.el7_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821876" comment="bind-chroot-9.9.4-29.el7_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821877" comment="bind-devel-9.9.4-29.el7_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821878" comment="bind-libs-9.9.4-29.el7_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821879" comment="bind-libs-lite-9.9.4-29.el7_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821880" comment="bind-license-9.9.4-29.el7_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821881" comment="bind-lite-devel-9.9.4-29.el7_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821882" comment="bind-pkcs11-9.9.4-29.el7_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821883" comment="bind-pkcs11-devel-9.9.4-29.el7_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821884" comment="bind-pkcs11-libs-9.9.4-29.el7_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821885" comment="bind-pkcs11-utils-9.9.4-29.el7_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821886" comment="bind-sdb-9.9.4-29.el7_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821887" comment="bind-sdb-chroot-9.9.4-29.el7_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821888" comment="bind-utils-9.9.4-29.el7_2.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161521" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1521</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1521" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1521" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1521" ref_url="https://www.suse.com/security/cve/CVE-2016-1521" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001945.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0791-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XBUTQW2MV4VDVRQLFNZUGQBGKTVOVIT6/#XBUTQW2MV4VDVRQLFNZUGQBGKTVOVIT6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0875-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DIW536NOJY6TFBQ3EAPIL4BZ3B35D2LA/#DIW536NOJY6TFBQ3EAPIL4BZ3B35D2LA" source="SUSE-SU"/>
    <description>
    The directrun function in directmachine.cpp in Libgraphite in Graphite 2 1.2.4, as used in Mozilla Firefox before 43.0 and Firefox ESR 38.x before 38.6.1, does not validate a certain skip operation, which allows remote attackers to execute arbitrary code, obtain sensitive information, or cause a denial of service (out-of-bounds read and application crash) via a crafted Graphite smart font.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1521/">CVE-2016-1521 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1521">CVE-2016-1521 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/965803">SUSE bug 965803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965806">SUSE bug 965806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965807">SUSE bug 965807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965810">SUSE bug 965810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821817" comment="firefox-38.6.1-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821949" comment="graphite2-1.3.6-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821950" comment="graphite2-devel-1.3.6-1.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161522" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1522</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1522" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1522" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1522" ref_url="https://www.suse.com/security/cve/CVE-2016-1522" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:0791-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XBUTQW2MV4VDVRQLFNZUGQBGKTVOVIT6/#XBUTQW2MV4VDVRQLFNZUGQBGKTVOVIT6" source="SUSE-SU"/>
    <description>
    Code.cpp in Libgraphite in Graphite 2 1.2.4, as used in Mozilla Firefox before 43.0 and Firefox ESR 38.x before 38.6.1, does not consider recursive load calls during a size check, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly execute arbitrary code via a crafted Graphite smart font.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1522/">CVE-2016-1522 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1522">CVE-2016-1522 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/965803">SUSE bug 965803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965806">SUSE bug 965806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965807">SUSE bug 965807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965810">SUSE bug 965810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821817" comment="firefox-38.6.1-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821949" comment="graphite2-1.3.6-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821950" comment="graphite2-devel-1.3.6-1.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161523" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1523</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1523" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1523" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1523" ref_url="https://www.suse.com/security/cve/CVE-2016-1523" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001891.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001945.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0791-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XBUTQW2MV4VDVRQLFNZUGQBGKTVOVIT6/#XBUTQW2MV4VDVRQLFNZUGQBGKTVOVIT6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0875-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DIW536NOJY6TFBQ3EAPIL4BZ3B35D2LA/#DIW536NOJY6TFBQ3EAPIL4BZ3B35D2LA" source="SUSE-SU"/>
    <description>
    The SillMap::readFace function in FeatureMap.cpp in Libgraphite in Graphite 2 1.2.4, as used in Mozilla Firefox before 43.0 and Firefox ESR 38.x before 38.6.1, mishandles a return value, which allows remote attackers to cause a denial of service (missing initialization, NULL pointer dereference, and application crash) via a crafted Graphite smart font.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1523/">CVE-2016-1523 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1523">CVE-2016-1523 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/965803">SUSE bug 965803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965806">SUSE bug 965806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965807">SUSE bug 965807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965810">SUSE bug 965810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967087">SUSE bug 967087</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821817" comment="firefox-38.6.1-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821949" comment="graphite2-1.3.6-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821950" comment="graphite2-devel-1.3.6-1.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161526" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1526</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1526" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1526" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1526" ref_url="https://www.suse.com/security/cve/CVE-2016-1526" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001945.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0791-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XBUTQW2MV4VDVRQLFNZUGQBGKTVOVIT6/#XBUTQW2MV4VDVRQLFNZUGQBGKTVOVIT6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0875-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DIW536NOJY6TFBQ3EAPIL4BZ3B35D2LA/#DIW536NOJY6TFBQ3EAPIL4BZ3B35D2LA" source="SUSE-SU"/>
    <description>
    The TtfUtil:LocaLookup function in TtfUtil.cpp in Libgraphite in Graphite 2 1.2.4, as used in Mozilla Firefox before 43.0 and Firefox ESR 38.x before 38.6.1, incorrectly validates a size value, which allows remote attackers to obtain sensitive information or cause a denial of service (out-of-bounds read and application crash) via a crafted Graphite smart font.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1526/">CVE-2016-1526 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1526">CVE-2016-1526 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/965803">SUSE bug 965803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965806">SUSE bug 965806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965807">SUSE bug 965807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965810">SUSE bug 965810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966438">SUSE bug 966438</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821949" comment="graphite2-1.3.6-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821950" comment="graphite2-devel-1.3.6-1.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1541</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1541" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1541" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1541" ref_url="https://www.suse.com/security/cve/CVE-2016-1541" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002117.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the zip_read_mac_metadata function in archive_read_support_format_zip.c in libarchive before 3.2.0 allows remote attackers to execute arbitrary code via crafted entry-size values in a ZIP archive.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1541/">CVE-2016-1541 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1541">CVE-2016-1541 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/979005">SUSE bug 979005</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822282" comment="bsdcpio-3.1.2-10.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822283" comment="bsdtar-3.1.2-10.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822284" comment="libarchive-3.1.2-10.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822285" comment="libarchive-devel-3.1.2-10.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1547</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1547" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1547" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1547" ref_url="https://www.suse.com/security/cve/CVE-2016-1547" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1568-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002215.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1329-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QVMT4ZV3NQWZAZSNNE6QHFWQCWEKTFI6/#QVMT4ZV3NQWZAZSNNE6QHFWQCWEKTFI6" source="SUSE-SU"/>
    <description>
    An off-path attacker can cause a preemptible client association to be demobilized in NTP 4.2.8p4 and earlier and NTPSec a5fb34b9cc89b92a8fef2f459004865c93bb7f92 by sending a crypto NAK packet to a victim client with a spoofed source address of an existing associated peer. This is true even if authentication is enabled.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1547/">CVE-2016-1547 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1547">CVE-2016-1547 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/962784">SUSE bug 962784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977446">SUSE bug 977446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977459">SUSE bug 977459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982064">SUSE bug 982064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982065">SUSE bug 982065</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822086" comment="ntp-4.2.6p5-22.el7_2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822087" comment="ntp-doc-4.2.6p5-22.el7_2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822088" comment="ntp-perl-4.2.6p5-22.el7_2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822089" comment="ntpdate-4.2.6p5-22.el7_2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822090" comment="sntp-4.2.6p5-22.el7_2.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161548" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1548</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1548" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1548" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1548" ref_url="https://www.suse.com/security/cve/CVE-2016-1548" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1568-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002215.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1329-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QVMT4ZV3NQWZAZSNNE6QHFWQCWEKTFI6/#QVMT4ZV3NQWZAZSNNE6QHFWQCWEKTFI6" source="SUSE-SU"/>
    <description>
    An attacker can spoof a packet from a legitimate ntpd server with an origin timestamp that matches the peer-&gt;dst timestamp recorded for that server. After making this switch, the client in NTP 4.2.8p4 and earlier and NTPSec aa48d001683e5b791a743ec9c575aaf7d867a2b0c will reject all future legitimate server responses. It is possible to force the victim client to move time after the mode has been changed. ntpq gives no indication that the mode has been switched.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1548/">CVE-2016-1548 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1548">CVE-2016-1548 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977446">SUSE bug 977446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977461">SUSE bug 977461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982068">SUSE bug 982068</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822086" comment="ntp-4.2.6p5-22.el7_2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822087" comment="ntp-doc-4.2.6p5-22.el7_2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822088" comment="ntp-perl-4.2.6p5-22.el7_2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822089" comment="ntpdate-4.2.6p5-22.el7_2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822090" comment="sntp-4.2.6p5-22.el7_2.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161550" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1550</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1550" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1550" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1550" ref_url="https://www.suse.com/security/cve/CVE-2016-1550" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1568-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002215.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1329-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QVMT4ZV3NQWZAZSNNE6QHFWQCWEKTFI6/#QVMT4ZV3NQWZAZSNNE6QHFWQCWEKTFI6" source="SUSE-SU"/>
    <description>
    An exploitable vulnerability exists in the message authentication functionality of libntp in ntp 4.2.8p4 and NTPSec a5fb34b9cc89b92a8fef2f459004865c93bb7f92. An attacker can send a series of crafted messages to attempt to recover the message digest key.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1550/">CVE-2016-1550 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1550">CVE-2016-1550 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/977446">SUSE bug 977446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977464">SUSE bug 977464</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822086" comment="ntp-4.2.6p5-22.el7_2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822087" comment="ntp-doc-4.2.6p5-22.el7_2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822088" comment="ntp-perl-4.2.6p5-22.el7_2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822089" comment="ntpdate-4.2.6p5-22.el7_2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822090" comment="sntp-4.2.6p5-22.el7_2.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161577" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1577</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1577" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1577" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1577" ref_url="https://www.suse.com/security/cve/CVE-2016-1577" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002399.html" source="SUSE-SU"/>
    <description>
    Double free vulnerability in the jas_iccattrval_destroy function in JasPer 1.900.1 and earlier allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted ICC color profile in a JPEG 2000 image file, a different vulnerability than CVE-2014-8137.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-09"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1577/">CVE-2016-1577 at SUSE</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1577">CVE-2016-1577 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968373">SUSE bug 968373</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822979" comment="jasper-1.900.1-30.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822980" comment="jasper-devel-1.900.1-30.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822981" comment="jasper-libs-1.900.1-30.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822982" comment="jasper-utils-1.900.1-30.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161714" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1714</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1714" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1714" ref_url="https://www.suse.com/security/cve/CVE-2016-1714" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002154.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0914-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/56SB7O6IKG3PWP6IFVQ334V6YMU3GFH3/#56SB7O6IKG3PWP6IFVQ334V6YMU3GFH3" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4OGUN5F4IJ2HL42Y4XJBGLVFNE3RUZGG/#4OGUN5F4IJ2HL42Y4XJBGLVFNE3RUZGG" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1750-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SSRKERVXT73P7DSZ6HZX7CRK2ECW4YU5/#SSRKERVXT73P7DSZ6HZX7CRK2ECW4YU5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SEGSV5T3S2ZKXR3FBHOEH6ZATP7GNXOI/#SEGSV5T3S2ZKXR3FBHOEH6ZATP7GNXOI" source="SUSE-SU"/>
    <description>
    The (1) fw_cfg_write and (2) fw_cfg_read functions in hw/nvram/fw_cfg.c in QEMU before 2.4, when built with the Firmware Configuration device emulation support, allow guest OS users with the CAP_SYS_RAWIO privilege to cause a denial of service (out-of-bounds read or write access and process crash) or possibly execute arbitrary code via an invalid current entry value in a firmware configuration.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1714/">CVE-2016-1714 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1714">CVE-2016-1714 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/961691">SUSE bug 961691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961692">SUSE bug 961692</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821787" comment="libcacard-1.5.3-105.el7_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821788" comment="libcacard-devel-1.5.3-105.el7_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821789" comment="libcacard-tools-1.5.3-105.el7_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821790" comment="qemu-img-1.5.3-105.el7_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821791" comment="qemu-kvm-1.5.3-105.el7_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821792" comment="qemu-kvm-common-1.5.3-105.el7_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821793" comment="qemu-kvm-tools-1.5.3-105.el7_2.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161762" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1762</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1762" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1762" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1762" ref_url="https://www.suse.com/security/cve/CVE-2016-1762" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1594-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VPIWVKUKHLGF55QF7LRF4BCZDRFSIAA5/#VPIWVKUKHLGF55QF7LRF4BCZDRFSIAA5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1595-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U4WPGCASE7GW5OQYSFLRWUX74F6KB6OW/#U4WPGCASE7GW5OQYSFLRWUX74F6KB6OW" source="SUSE-SU"/>
    <description>
    The xmlNextChar function in libxml2 before 2.9.4 allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted XML document.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1762/">CVE-2016-1762 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1762">CVE-2016-1762 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981040">SUSE bug 981040</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822112" comment="libxml2-2.9.1-6.el7_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822113" comment="libxml2-devel-2.9.1-6.el7_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822114" comment="libxml2-python-2.9.1-6.el7_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822115" comment="libxml2-static-2.9.1-6.el7_2.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161833" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1833</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1833" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1833" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1833" ref_url="https://www.suse.com/security/cve/CVE-2016-1833" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1594-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VPIWVKUKHLGF55QF7LRF4BCZDRFSIAA5/#VPIWVKUKHLGF55QF7LRF4BCZDRFSIAA5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1595-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U4WPGCASE7GW5OQYSFLRWUX74F6KB6OW/#U4WPGCASE7GW5OQYSFLRWUX74F6KB6OW" source="SUSE-SU"/>
    <description>
    The htmlCurrentChar function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted XML document.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-04-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1833/">CVE-2016-1833 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1833">CVE-2016-1833 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981108">SUSE bug 981108</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822112" comment="libxml2-2.9.1-6.el7_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822113" comment="libxml2-devel-2.9.1-6.el7_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822114" comment="libxml2-python-2.9.1-6.el7_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822115" comment="libxml2-static-2.9.1-6.el7_2.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161834" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1834</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1834" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1834" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1834" ref_url="https://www.suse.com/security/cve/CVE-2016-1834" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1594-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VPIWVKUKHLGF55QF7LRF4BCZDRFSIAA5/#VPIWVKUKHLGF55QF7LRF4BCZDRFSIAA5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1595-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U4WPGCASE7GW5OQYSFLRWUX74F6KB6OW/#U4WPGCASE7GW5OQYSFLRWUX74F6KB6OW" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the xmlStrncat function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted XML document.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-04-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1834/">CVE-2016-1834 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1834">CVE-2016-1834 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981041">SUSE bug 981041</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822112" comment="libxml2-2.9.1-6.el7_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822113" comment="libxml2-devel-2.9.1-6.el7_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822114" comment="libxml2-python-2.9.1-6.el7_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822115" comment="libxml2-static-2.9.1-6.el7_2.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1835</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1835" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1835" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1835" ref_url="https://www.suse.com/security/cve/CVE-2016-1835" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1594-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VPIWVKUKHLGF55QF7LRF4BCZDRFSIAA5/#VPIWVKUKHLGF55QF7LRF4BCZDRFSIAA5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1595-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U4WPGCASE7GW5OQYSFLRWUX74F6KB6OW/#U4WPGCASE7GW5OQYSFLRWUX74F6KB6OW" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the xmlSAX2AttributeNs function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2 and OS X before 10.11.5, allows remote attackers to cause a denial of service via a crafted XML document.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-12-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1835/">CVE-2016-1835 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1835">CVE-2016-1835 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981109">SUSE bug 981109</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822112" comment="libxml2-2.9.1-6.el7_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822113" comment="libxml2-devel-2.9.1-6.el7_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822114" comment="libxml2-python-2.9.1-6.el7_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822115" comment="libxml2-static-2.9.1-6.el7_2.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1836</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1836" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1836" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1836" ref_url="https://www.suse.com/security/cve/CVE-2016-1836" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:1594-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VPIWVKUKHLGF55QF7LRF4BCZDRFSIAA5/#VPIWVKUKHLGF55QF7LRF4BCZDRFSIAA5" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the xmlDictComputeFastKey function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to cause a denial of service via a crafted XML document.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-04-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1836/">CVE-2016-1836 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1836">CVE-2016-1836 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1174862">SUSE bug 1174862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981110">SUSE bug 981110</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822112" comment="libxml2-2.9.1-6.el7_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822113" comment="libxml2-devel-2.9.1-6.el7_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822114" comment="libxml2-python-2.9.1-6.el7_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822115" comment="libxml2-static-2.9.1-6.el7_2.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161837" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1837</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1837" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1837" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1837" ref_url="https://www.suse.com/security/cve/CVE-2016-1837" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1594-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VPIWVKUKHLGF55QF7LRF4BCZDRFSIAA5/#VPIWVKUKHLGF55QF7LRF4BCZDRFSIAA5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1595-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U4WPGCASE7GW5OQYSFLRWUX74F6KB6OW/#U4WPGCASE7GW5OQYSFLRWUX74F6KB6OW" source="SUSE-SU"/>
    <description>
    Multiple use-after-free vulnerabilities in the (1) htmlPArsePubidLiteral and (2) htmlParseSystemiteral functions in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allow remote attackers to cause a denial of service via a crafted XML document.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-04-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1837/">CVE-2016-1837 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1837">CVE-2016-1837 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981111">SUSE bug 981111</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822112" comment="libxml2-2.9.1-6.el7_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822113" comment="libxml2-devel-2.9.1-6.el7_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822114" comment="libxml2-python-2.9.1-6.el7_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822115" comment="libxml2-static-2.9.1-6.el7_2.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161838" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1838</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1838" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1838" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1838" ref_url="https://www.suse.com/security/cve/CVE-2016-1838" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1594-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VPIWVKUKHLGF55QF7LRF4BCZDRFSIAA5/#VPIWVKUKHLGF55QF7LRF4BCZDRFSIAA5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1595-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U4WPGCASE7GW5OQYSFLRWUX74F6KB6OW/#U4WPGCASE7GW5OQYSFLRWUX74F6KB6OW" source="SUSE-SU"/>
    <description>
    The xmlPArserPrintFileContextInternal function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted XML document.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-04-13"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1838/">CVE-2016-1838 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1838">CVE-2016-1838 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981112">SUSE bug 981112</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822112" comment="libxml2-2.9.1-6.el7_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822113" comment="libxml2-devel-2.9.1-6.el7_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822114" comment="libxml2-python-2.9.1-6.el7_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822115" comment="libxml2-static-2.9.1-6.el7_2.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161839" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1839</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1839" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1839" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1839" ref_url="https://www.suse.com/security/cve/CVE-2016-1839" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1454-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003289.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1594-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VPIWVKUKHLGF55QF7LRF4BCZDRFSIAA5/#VPIWVKUKHLGF55QF7LRF4BCZDRFSIAA5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1595-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U4WPGCASE7GW5OQYSFLRWUX74F6KB6OW/#U4WPGCASE7GW5OQYSFLRWUX74F6KB6OW" source="SUSE-SU"/>
    <description>
    The xmlDictAddString function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted XML document.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-04-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-1839/">CVE-2016-1839 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1839">CVE-2016-1839 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1039069">SUSE bug 1039069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039661">SUSE bug 1039661</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069433">SUSE bug 1069433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069690">SUSE bug 1069690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963963">SUSE bug 963963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981114">SUSE bug 981114</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822112" comment="libxml2-2.9.1-6.el7_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822113" comment="libxml2-devel-2.9.1-6.el7_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822114" comment="libxml2-python-2.9.1-6.el7_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822115" comment="libxml2-static-2.9.1-6.el7_2.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161840" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1840</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1840" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1840" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1840" ref_url="https://www.suse.com/security/cve/CVE-2016-1840" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1594-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VPIWVKUKHLGF55QF7LRF4BCZDRFSIAA5/#VPIWVKUKHLGF55QF7LRF4BCZDRFSIAA5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1595-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U4WPGCASE7GW5OQYSFLRWUX74F6KB6OW/#U4WPGCASE7GW5OQYSFLRWUX74F6KB6OW" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the xmlFAParsePosCharGroup function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted XML document.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-12-06"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1840/">CVE-2016-1840 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1840">CVE-2016-1840 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981115">SUSE bug 981115</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822112" comment="libxml2-2.9.1-6.el7_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822113" comment="libxml2-devel-2.9.1-6.el7_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822114" comment="libxml2-python-2.9.1-6.el7_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822115" comment="libxml2-static-2.9.1-6.el7_2.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161867" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1867</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1867" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1867" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1867" ref_url="https://www.suse.com/security/cve/CVE-2016-1867" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002399.html" source="SUSE-SU"/>
    <description>
    The jpc_pi_nextcprl function in JasPer 1.900.1 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted JPEG 2000 image.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-1867/">CVE-2016-1867 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1867">CVE-2016-1867 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961886">SUSE bug 961886</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822979" comment="jasper-1.900.1-30.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822980" comment="jasper-devel-1.900.1-30.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822981" comment="jasper-libs-1.900.1-30.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822982" comment="jasper-utils-1.900.1-30.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161908" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1908</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1908" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1908" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1908" ref_url="https://www.suse.com/security/cve/CVE-2016-1908" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002338.html" source="SUSE-SU"/>
		<reference ref_id="TID7022102" ref_url="https://www.suse.com/support/kb/doc/?id=7022102" source="SUSE-SU"/>
    <description>
    The client in OpenSSH before 7.2 mishandles failed cookie generation for untrusted X11 forwarding and relies on the local X11 server for access-control decisions, which allows remote X11 clients to trigger a fallback and obtain trusted X11 forwarding privileges by leveraging configuration issues on this X11 server, as demonstrated by lack of the SECURITY extension on this X11 server.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1908/">CVE-2016-1908 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1908">CVE-2016-1908 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1001712">SUSE bug 1001712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005738">SUSE bug 1005738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010950">SUSE bug 1010950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138392">SUSE bug 1138392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962313">SUSE bug 962313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/996040">SUSE bug 996040</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821890" comment="openssh-6.6.1p1-25.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821891" comment="openssh-askpass-6.6.1p1-25.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821892" comment="openssh-clients-6.6.1p1-25.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821893" comment="openssh-keycat-6.6.1p1-25.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821894" comment="openssh-ldap-6.6.1p1-25.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821895" comment="openssh-server-6.6.1p1-25.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821896" comment="openssh-server-sysvinit-6.6.1p1-25.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821897" comment="pam_ssh_agent_auth-0.9.3-9.25.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161930" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1930</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1930" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1930" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1930" ref_url="https://www.suse.com/security/cve/CVE-2016-1930" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001894.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0309-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GTPYCS4VBVLSV4Q7M2I5LBL3TKC5OYGF/#GTPYCS4VBVLSV4Q7M2I5LBL3TKC5OYGF" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0310-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7FIWMG4NEPGEOXAAZETDF5FBIR22Q5KB/#7FIWMG4NEPGEOXAAZETDF5FBIR22Q5KB" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 44.0 and Firefox ESR 38.x before 38.6 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1930/">CVE-2016-1930 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1930">CVE-2016-1930 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/963520">SUSE bug 963520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963632">SUSE bug 963632</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821772" comment="firefox-38.6.0-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821821" comment="thunderbird-38.6.0-1.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161935" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1935</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1935" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1935" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1935" ref_url="https://www.suse.com/security/cve/CVE-2016-1935" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001894.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0309-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GTPYCS4VBVLSV4Q7M2I5LBL3TKC5OYGF/#GTPYCS4VBVLSV4Q7M2I5LBL3TKC5OYGF" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0310-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7FIWMG4NEPGEOXAAZETDF5FBIR22Q5KB/#7FIWMG4NEPGEOXAAZETDF5FBIR22Q5KB" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Buffer overflow in the BufferSubData function in Mozilla Firefox before 44.0 and Firefox ESR 38.x before 38.6 allows remote attackers to execute arbitrary code via crafted WebGL content.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1935/">CVE-2016-1935 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1935">CVE-2016-1935 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/963520">SUSE bug 963520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963635">SUSE bug 963635</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821772" comment="firefox-38.6.0-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821821" comment="thunderbird-38.6.0-1.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161950" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1950</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1950" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1950" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1950" ref_url="https://www.suse.com/security/cve/CVE-2016-1950" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002858.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0731-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/E3N7NQ7QAE3HH2XCKBURJIR2VROQ4NP4/#E3N7NQ7QAE3HH2XCKBURJIR2VROQ4NP4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0733-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2TMO77LZI5PLXBX43DUX7QKP5MGYJXZ2/#2TMO77LZI5PLXBX43DUX7QKP5MGYJXZ2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1557-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ILY2VDGTTJZSAXCYD4RXVCUPXRIBH65Y/#ILY2VDGTTJZSAXCYD4RXVCUPXRIBH65Y" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in Mozilla Network Security Services (NSS) before 3.19.2.3 and 3.20.x and 3.21.x before 3.21.1, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to execute arbitrary code via crafted ASN.1 data in an X.509 certificate.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1950/">CVE-2016-1950 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1950">CVE-2016-1950 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970257">SUSE bug 970257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970377">SUSE bug 970377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970378">SUSE bug 970378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970379">SUSE bug 970379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970380">SUSE bug 970380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970381">SUSE bug 970381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970431">SUSE bug 970431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970433">SUSE bug 970433</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821838" comment="nss-util-3.19.1-9.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821839" comment="nss-util-devel-3.19.1-9.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161952" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1952</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1952" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1952" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1952" ref_url="https://www.suse.com/security/cve/CVE-2016-1952" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0731-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/E3N7NQ7QAE3HH2XCKBURJIR2VROQ4NP4/#E3N7NQ7QAE3HH2XCKBURJIR2VROQ4NP4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0733-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2TMO77LZI5PLXBX43DUX7QKP5MGYJXZ2/#2TMO77LZI5PLXBX43DUX7QKP5MGYJXZ2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PLVKBXELCWUE2MUFMRXSMQ4OLSTOQL3S/#PLVKBXELCWUE2MUFMRXSMQ4OLSTOQL3S" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0894-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GATTQJ2JXTSBNIMC3HLZJNWX2M3VKPGA/#GATTQJ2JXTSBNIMC3HLZJNWX2M3VKPGA" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1767-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MO2WO6ZWDV36CWCXZCY7DNEMCHCBUMJO/#MO2WO6ZWDV36CWCXZCY7DNEMCHCBUMJO" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1769-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IT5Z2MQVCUU2PY7AOHLQUFDN44PCYHX5/#IT5Z2MQVCUU2PY7AOHLQUFDN44PCYHX5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1778-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HCMXP7OML46I3X4TRHDOHMURKLSPQK2P/#HCMXP7OML46I3X4TRHDOHMURKLSPQK2P" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1952/">CVE-2016-1952 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1952">CVE-2016-1952 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821841" comment="firefox-38.7.0-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821889" comment="thunderbird-38.7.0-1.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161954" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1954</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1954" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1954" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1954" ref_url="https://www.suse.com/security/cve/CVE-2016-1954" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0731-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/E3N7NQ7QAE3HH2XCKBURJIR2VROQ4NP4/#E3N7NQ7QAE3HH2XCKBURJIR2VROQ4NP4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0733-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2TMO77LZI5PLXBX43DUX7QKP5MGYJXZ2/#2TMO77LZI5PLXBX43DUX7QKP5MGYJXZ2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PLVKBXELCWUE2MUFMRXSMQ4OLSTOQL3S/#PLVKBXELCWUE2MUFMRXSMQ4OLSTOQL3S" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0894-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GATTQJ2JXTSBNIMC3HLZJNWX2M3VKPGA/#GATTQJ2JXTSBNIMC3HLZJNWX2M3VKPGA" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1767-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MO2WO6ZWDV36CWCXZCY7DNEMCHCBUMJO/#MO2WO6ZWDV36CWCXZCY7DNEMCHCBUMJO" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1769-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IT5Z2MQVCUU2PY7AOHLQUFDN44PCYHX5/#IT5Z2MQVCUU2PY7AOHLQUFDN44PCYHX5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1778-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HCMXP7OML46I3X4TRHDOHMURKLSPQK2P/#HCMXP7OML46I3X4TRHDOHMURKLSPQK2P" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    The nsCSPContext::SendReports function in dom/security/nsCSPContext.cpp in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 does not prevent use of a non-HTTP report-uri for a Content Security Policy (CSP) violation report, which allows remote attackers to cause a denial of service (data overwrite) or possibly gain privileges by specifying a URL of a local file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1954/">CVE-2016-1954 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1954">CVE-2016-1954 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821841" comment="firefox-38.7.0-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821889" comment="thunderbird-38.7.0-1.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161957" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1957</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1957" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1957" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1957" ref_url="https://www.suse.com/security/cve/CVE-2016-1957" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0731-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/E3N7NQ7QAE3HH2XCKBURJIR2VROQ4NP4/#E3N7NQ7QAE3HH2XCKBURJIR2VROQ4NP4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0733-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2TMO77LZI5PLXBX43DUX7QKP5MGYJXZ2/#2TMO77LZI5PLXBX43DUX7QKP5MGYJXZ2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PLVKBXELCWUE2MUFMRXSMQ4OLSTOQL3S/#PLVKBXELCWUE2MUFMRXSMQ4OLSTOQL3S" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0894-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GATTQJ2JXTSBNIMC3HLZJNWX2M3VKPGA/#GATTQJ2JXTSBNIMC3HLZJNWX2M3VKPGA" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1767-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MO2WO6ZWDV36CWCXZCY7DNEMCHCBUMJO/#MO2WO6ZWDV36CWCXZCY7DNEMCHCBUMJO" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1769-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IT5Z2MQVCUU2PY7AOHLQUFDN44PCYHX5/#IT5Z2MQVCUU2PY7AOHLQUFDN44PCYHX5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1778-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HCMXP7OML46I3X4TRHDOHMURKLSPQK2P/#HCMXP7OML46I3X4TRHDOHMURKLSPQK2P" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Memory leak in libstagefright in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 allows remote attackers to cause a denial of service (memory consumption) via an MPEG-4 file that triggers a delete operation on an array.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1957/">CVE-2016-1957 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1957">CVE-2016-1957 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821841" comment="firefox-38.7.0-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821889" comment="thunderbird-38.7.0-1.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161958" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1958</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1958" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1958" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1958" ref_url="https://www.suse.com/security/cve/CVE-2016-1958" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0731-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/E3N7NQ7QAE3HH2XCKBURJIR2VROQ4NP4/#E3N7NQ7QAE3HH2XCKBURJIR2VROQ4NP4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0733-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2TMO77LZI5PLXBX43DUX7QKP5MGYJXZ2/#2TMO77LZI5PLXBX43DUX7QKP5MGYJXZ2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PLVKBXELCWUE2MUFMRXSMQ4OLSTOQL3S/#PLVKBXELCWUE2MUFMRXSMQ4OLSTOQL3S" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0894-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GATTQJ2JXTSBNIMC3HLZJNWX2M3VKPGA/#GATTQJ2JXTSBNIMC3HLZJNWX2M3VKPGA" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    browser/base/content/browser.js in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 allows remote attackers to spoof the address bar via a javascript: URL.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1958/">CVE-2016-1958 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1958">CVE-2016-1958 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821841" comment="firefox-38.7.0-1.el7_2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161960" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1960</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1960" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1960" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1960" ref_url="https://www.suse.com/security/cve/CVE-2016-1960" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0731-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/E3N7NQ7QAE3HH2XCKBURJIR2VROQ4NP4/#E3N7NQ7QAE3HH2XCKBURJIR2VROQ4NP4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0733-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2TMO77LZI5PLXBX43DUX7QKP5MGYJXZ2/#2TMO77LZI5PLXBX43DUX7QKP5MGYJXZ2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PLVKBXELCWUE2MUFMRXSMQ4OLSTOQL3S/#PLVKBXELCWUE2MUFMRXSMQ4OLSTOQL3S" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0894-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GATTQJ2JXTSBNIMC3HLZJNWX2M3VKPGA/#GATTQJ2JXTSBNIMC3HLZJNWX2M3VKPGA" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1767-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MO2WO6ZWDV36CWCXZCY7DNEMCHCBUMJO/#MO2WO6ZWDV36CWCXZCY7DNEMCHCBUMJO" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1769-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IT5Z2MQVCUU2PY7AOHLQUFDN44PCYHX5/#IT5Z2MQVCUU2PY7AOHLQUFDN44PCYHX5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1778-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HCMXP7OML46I3X4TRHDOHMURKLSPQK2P/#HCMXP7OML46I3X4TRHDOHMURKLSPQK2P" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Integer underflow in the nsHtml5TreeBuilder class in the HTML5 string parser in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free) by leveraging mishandling of end tags, as demonstrated by incorrect SVG processing, aka ZDI-CAN-3545.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1960/">CVE-2016-1960 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1960">CVE-2016-1960 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821841" comment="firefox-38.7.0-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821889" comment="thunderbird-38.7.0-1.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161961" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1961</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1961" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1961" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1961" ref_url="https://www.suse.com/security/cve/CVE-2016-1961" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0731-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/E3N7NQ7QAE3HH2XCKBURJIR2VROQ4NP4/#E3N7NQ7QAE3HH2XCKBURJIR2VROQ4NP4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0733-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2TMO77LZI5PLXBX43DUX7QKP5MGYJXZ2/#2TMO77LZI5PLXBX43DUX7QKP5MGYJXZ2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PLVKBXELCWUE2MUFMRXSMQ4OLSTOQL3S/#PLVKBXELCWUE2MUFMRXSMQ4OLSTOQL3S" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0894-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GATTQJ2JXTSBNIMC3HLZJNWX2M3VKPGA/#GATTQJ2JXTSBNIMC3HLZJNWX2M3VKPGA" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1767-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MO2WO6ZWDV36CWCXZCY7DNEMCHCBUMJO/#MO2WO6ZWDV36CWCXZCY7DNEMCHCBUMJO" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1769-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IT5Z2MQVCUU2PY7AOHLQUFDN44PCYHX5/#IT5Z2MQVCUU2PY7AOHLQUFDN44PCYHX5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1778-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HCMXP7OML46I3X4TRHDOHMURKLSPQK2P/#HCMXP7OML46I3X4TRHDOHMURKLSPQK2P" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsHTMLDocument::SetBody function in dom/html/nsHTMLDocument.cpp in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 allows remote attackers to execute arbitrary code by leveraging mishandling of a root element, aka ZDI-CAN-3574.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1961/">CVE-2016-1961 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1961">CVE-2016-1961 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821841" comment="firefox-38.7.0-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821889" comment="thunderbird-38.7.0-1.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161962" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1962</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1962" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1962" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1962" ref_url="https://www.suse.com/security/cve/CVE-2016-1962" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0731-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/E3N7NQ7QAE3HH2XCKBURJIR2VROQ4NP4/#E3N7NQ7QAE3HH2XCKBURJIR2VROQ4NP4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0733-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2TMO77LZI5PLXBX43DUX7QKP5MGYJXZ2/#2TMO77LZI5PLXBX43DUX7QKP5MGYJXZ2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PLVKBXELCWUE2MUFMRXSMQ4OLSTOQL3S/#PLVKBXELCWUE2MUFMRXSMQ4OLSTOQL3S" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0894-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GATTQJ2JXTSBNIMC3HLZJNWX2M3VKPGA/#GATTQJ2JXTSBNIMC3HLZJNWX2M3VKPGA" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the mozilla::DataChannelConnection::Close function in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 allows remote attackers to execute arbitrary code by leveraging mishandling of WebRTC data-channel connections.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1962/">CVE-2016-1962 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1962">CVE-2016-1962 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821841" comment="firefox-38.7.0-1.el7_2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161964" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1964</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1964" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1964" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1964" ref_url="https://www.suse.com/security/cve/CVE-2016-1964" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0731-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/E3N7NQ7QAE3HH2XCKBURJIR2VROQ4NP4/#E3N7NQ7QAE3HH2XCKBURJIR2VROQ4NP4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0733-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2TMO77LZI5PLXBX43DUX7QKP5MGYJXZ2/#2TMO77LZI5PLXBX43DUX7QKP5MGYJXZ2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PLVKBXELCWUE2MUFMRXSMQ4OLSTOQL3S/#PLVKBXELCWUE2MUFMRXSMQ4OLSTOQL3S" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0894-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GATTQJ2JXTSBNIMC3HLZJNWX2M3VKPGA/#GATTQJ2JXTSBNIMC3HLZJNWX2M3VKPGA" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1767-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MO2WO6ZWDV36CWCXZCY7DNEMCHCBUMJO/#MO2WO6ZWDV36CWCXZCY7DNEMCHCBUMJO" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1769-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IT5Z2MQVCUU2PY7AOHLQUFDN44PCYHX5/#IT5Z2MQVCUU2PY7AOHLQUFDN44PCYHX5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1778-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HCMXP7OML46I3X4TRHDOHMURKLSPQK2P/#HCMXP7OML46I3X4TRHDOHMURKLSPQK2P" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the AtomicBaseIncDec function in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) by leveraging mishandling of XML transformations.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1964/">CVE-2016-1964 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1964">CVE-2016-1964 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821841" comment="firefox-38.7.0-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821889" comment="thunderbird-38.7.0-1.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161965" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1965</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1965" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1965" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1965" ref_url="https://www.suse.com/security/cve/CVE-2016-1965" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0731-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/E3N7NQ7QAE3HH2XCKBURJIR2VROQ4NP4/#E3N7NQ7QAE3HH2XCKBURJIR2VROQ4NP4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0733-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2TMO77LZI5PLXBX43DUX7QKP5MGYJXZ2/#2TMO77LZI5PLXBX43DUX7QKP5MGYJXZ2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PLVKBXELCWUE2MUFMRXSMQ4OLSTOQL3S/#PLVKBXELCWUE2MUFMRXSMQ4OLSTOQL3S" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0894-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GATTQJ2JXTSBNIMC3HLZJNWX2M3VKPGA/#GATTQJ2JXTSBNIMC3HLZJNWX2M3VKPGA" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 mishandle a navigation sequence that returns to the original page, which allows remote attackers to spoof the address bar via vectors involving the history.back method and the location.protocol property.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1965/">CVE-2016-1965 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1965">CVE-2016-1965 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821841" comment="firefox-38.7.0-1.el7_2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161966" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1966</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1966" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1966" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1966" ref_url="https://www.suse.com/security/cve/CVE-2016-1966" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0731-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/E3N7NQ7QAE3HH2XCKBURJIR2VROQ4NP4/#E3N7NQ7QAE3HH2XCKBURJIR2VROQ4NP4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0733-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2TMO77LZI5PLXBX43DUX7QKP5MGYJXZ2/#2TMO77LZI5PLXBX43DUX7QKP5MGYJXZ2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PLVKBXELCWUE2MUFMRXSMQ4OLSTOQL3S/#PLVKBXELCWUE2MUFMRXSMQ4OLSTOQL3S" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0894-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GATTQJ2JXTSBNIMC3HLZJNWX2M3VKPGA/#GATTQJ2JXTSBNIMC3HLZJNWX2M3VKPGA" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    The nsNPObjWrapper::GetNewOrUsed function in dom/plugins/base/nsJSNPRuntime.cpp in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 allows remote attackers to execute arbitrary code or cause a denial of service (invalid pointer dereference and memory corruption) via a crafted NPAPI plugin.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1966/">CVE-2016-1966 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1966">CVE-2016-1966 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821841" comment="firefox-38.7.0-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821889" comment="thunderbird-38.7.0-1.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161973" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1973</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1973" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1973" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1973" ref_url="https://www.suse.com/security/cve/CVE-2016-1973" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:0731-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/E3N7NQ7QAE3HH2XCKBURJIR2VROQ4NP4/#E3N7NQ7QAE3HH2XCKBURJIR2VROQ4NP4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0733-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2TMO77LZI5PLXBX43DUX7QKP5MGYJXZ2/#2TMO77LZI5PLXBX43DUX7QKP5MGYJXZ2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Race condition in the GetStaticInstance function in the WebRTC implementation in Mozilla Firefox before 45.0 might allow remote attackers to execute arbitrary code or cause a denial of service (use-after-free) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1973/">CVE-2016-1973 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1973">CVE-2016-1973 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970257">SUSE bug 970257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970377">SUSE bug 970377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970378">SUSE bug 970378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970379">SUSE bug 970379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970380">SUSE bug 970380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970381">SUSE bug 970381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970431">SUSE bug 970431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970433">SUSE bug 970433</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821841" comment="firefox-38.7.0-1.el7_2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161974" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1974</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1974" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1974" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1974" ref_url="https://www.suse.com/security/cve/CVE-2016-1974" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0731-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/E3N7NQ7QAE3HH2XCKBURJIR2VROQ4NP4/#E3N7NQ7QAE3HH2XCKBURJIR2VROQ4NP4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0733-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2TMO77LZI5PLXBX43DUX7QKP5MGYJXZ2/#2TMO77LZI5PLXBX43DUX7QKP5MGYJXZ2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PLVKBXELCWUE2MUFMRXSMQ4OLSTOQL3S/#PLVKBXELCWUE2MUFMRXSMQ4OLSTOQL3S" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0894-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GATTQJ2JXTSBNIMC3HLZJNWX2M3VKPGA/#GATTQJ2JXTSBNIMC3HLZJNWX2M3VKPGA" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1767-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MO2WO6ZWDV36CWCXZCY7DNEMCHCBUMJO/#MO2WO6ZWDV36CWCXZCY7DNEMCHCBUMJO" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1769-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IT5Z2MQVCUU2PY7AOHLQUFDN44PCYHX5/#IT5Z2MQVCUU2PY7AOHLQUFDN44PCYHX5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1778-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HCMXP7OML46I3X4TRHDOHMURKLSPQK2P/#HCMXP7OML46I3X4TRHDOHMURKLSPQK2P" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    The nsScannerString::AppendUnicodeTo function in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 does not verify that memory allocation succeeds, which allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read) via crafted Unicode data in an HTML, XML, or SVG document.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1974/">CVE-2016-1974 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1974">CVE-2016-1974 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821841" comment="firefox-38.7.0-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821889" comment="thunderbird-38.7.0-1.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161977" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1977</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1977" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1977" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1977" ref_url="https://www.suse.com/security/cve/CVE-2016-1977" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0731-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/E3N7NQ7QAE3HH2XCKBURJIR2VROQ4NP4/#E3N7NQ7QAE3HH2XCKBURJIR2VROQ4NP4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0733-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2TMO77LZI5PLXBX43DUX7QKP5MGYJXZ2/#2TMO77LZI5PLXBX43DUX7QKP5MGYJXZ2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PLVKBXELCWUE2MUFMRXSMQ4OLSTOQL3S/#PLVKBXELCWUE2MUFMRXSMQ4OLSTOQL3S" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0894-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GATTQJ2JXTSBNIMC3HLZJNWX2M3VKPGA/#GATTQJ2JXTSBNIMC3HLZJNWX2M3VKPGA" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1767-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MO2WO6ZWDV36CWCXZCY7DNEMCHCBUMJO/#MO2WO6ZWDV36CWCXZCY7DNEMCHCBUMJO" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1769-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IT5Z2MQVCUU2PY7AOHLQUFDN44PCYHX5/#IT5Z2MQVCUU2PY7AOHLQUFDN44PCYHX5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1778-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HCMXP7OML46I3X4TRHDOHMURKLSPQK2P/#HCMXP7OML46I3X4TRHDOHMURKLSPQK2P" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    The Machine::Code::decoder::analysis::set_ref function in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to execute arbitrary code or cause a denial of service (stack memory corruption) via a crafted Graphite smart font.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1977/">CVE-2016-1977 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1977">CVE-2016-1977 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821841" comment="firefox-38.7.0-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821889" comment="thunderbird-38.7.0-1.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161978" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1978</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1978" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1978" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1978" ref_url="https://www.suse.com/security/cve/CVE-2016-1978" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001971.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the ssl3_HandleECDHServerKeyExchange function in Mozilla Network Security Services (NSS) before 3.21, as used in Mozilla Firefox before 44.0, allows remote attackers to cause a denial of service or possibly have unspecified other impact by making an SSL (1) DHE or (2) ECDHE handshake at a time of high memory consumption.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1978/">CVE-2016-1978 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1978">CVE-2016-1978 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822024" comment="nspr-4.11.0-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822025" comment="nspr-devel-4.11.0-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822026" comment="nss-3.21.0-9.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822027" comment="nss-devel-3.21.0-9.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822028" comment="nss-pkcs11-devel-3.21.0-9.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822029" comment="nss-softokn-3.16.2.3-14.2.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822030" comment="nss-softokn-devel-3.16.2.3-14.2.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822031" comment="nss-softokn-freebl-3.16.2.3-14.2.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822032" comment="nss-softokn-freebl-devel-3.16.2.3-14.2.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822033" comment="nss-sysinit-3.21.0-9.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822034" comment="nss-tools-3.21.0-9.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822035" comment="nss-util-3.21.0-2.2.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822036" comment="nss-util-devel-3.21.0-2.2.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161979" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1979</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1979" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1979" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1979" ref_url="https://www.suse.com/security/cve/CVE-2016-1979" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0731-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/E3N7NQ7QAE3HH2XCKBURJIR2VROQ4NP4/#E3N7NQ7QAE3HH2XCKBURJIR2VROQ4NP4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0733-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2TMO77LZI5PLXBX43DUX7QKP5MGYJXZ2/#2TMO77LZI5PLXBX43DUX7QKP5MGYJXZ2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the PK11_ImportDERPrivateKeyInfoAndReturnKey function in Mozilla Network Security Services (NSS) before 3.21.1, as used in Mozilla Firefox before 45.0, allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted key data with DER encoding.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1979/">CVE-2016-1979 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1979">CVE-2016-1979 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822024" comment="nspr-4.11.0-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822025" comment="nspr-devel-4.11.0-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822026" comment="nss-3.21.0-9.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822027" comment="nss-devel-3.21.0-9.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822028" comment="nss-pkcs11-devel-3.21.0-9.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822029" comment="nss-softokn-3.16.2.3-14.2.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822030" comment="nss-softokn-devel-3.16.2.3-14.2.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822031" comment="nss-softokn-freebl-3.16.2.3-14.2.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822032" comment="nss-softokn-freebl-devel-3.16.2.3-14.2.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822033" comment="nss-sysinit-3.21.0-9.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822034" comment="nss-tools-3.21.0-9.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822035" comment="nss-util-3.21.0-2.2.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822036" comment="nss-util-devel-3.21.0-2.2.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161981" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1981</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1981" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1981" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1981" ref_url="https://www.suse.com/security/cve/CVE-2016-1981" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002154.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0914-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/56SB7O6IKG3PWP6IFVQ334V6YMU3GFH3/#56SB7O6IKG3PWP6IFVQ334V6YMU3GFH3" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4OGUN5F4IJ2HL42Y4XJBGLVFNE3RUZGG/#4OGUN5F4IJ2HL42Y4XJBGLVFNE3RUZGG" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1750-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SSRKERVXT73P7DSZ6HZX7CRK2ECW4YU5/#SSRKERVXT73P7DSZ6HZX7CRK2ECW4YU5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SEGSV5T3S2ZKXR3FBHOEH6ZATP7GNXOI/#SEGSV5T3S2ZKXR3FBHOEH6ZATP7GNXOI" source="SUSE-SU"/>
    <description>
    QEMU (aka Quick Emulator) built with the e1000 NIC emulation support is vulnerable to an infinite loop issue. It could occur while processing data via transmit or receive descriptors, provided the initial receive/transmit descriptor head (TDH/RDH) is set outside the allocated descriptor buffer. A privileged user inside guest could use this flaw to crash the QEMU instance resulting in DoS.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1981/">CVE-2016-1981 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1981">CVE-2016-1981 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/963782">SUSE bug 963782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963783">SUSE bug 963783</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822487" comment="qemu-img-1.5.3-126.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822488" comment="qemu-kvm-1.5.3-126.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822489" comment="qemu-kvm-common-1.5.3-126.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822490" comment="qemu-kvm-tools-1.5.3-126.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162047" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2047</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2047" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2047" ref_url="https://www.suse.com/security/cve/CVE-2016-2047" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002129.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1332-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SA47QPDDMRSXFULROHSU5XOJYAEI63UQ/#SA47QPDDMRSXFULROHSU5XOJYAEI63UQ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1664-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RDR3EMSODHXKVMG4CT6FAJI4NCGNUXW2/#RDR3EMSODHXKVMG4CT6FAJI4NCGNUXW2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1686-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GY3UT7X4G7N7NHARWS74DGVWBZJMUOZ4/#GY3UT7X4G7N7NHARWS74DGVWBZJMUOZ4" source="SUSE-SU"/>
    <description>
    The ssl_verify_server_cert function in sql-common/client.c in MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10; Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.11 and earlier; and Percona Server do not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a "/CN=" string in a field in a certificate, as demonstrated by "/OU=/CN=bar.com/CN=foo.com."
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2047/">CVE-2016-2047 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2047">CVE-2016-2047 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/963806">SUSE bug 963806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976341">SUSE bug 976341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980904">SUSE bug 980904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821941" comment="mariadb-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821942" comment="mariadb-bench-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821943" comment="mariadb-devel-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821944" comment="mariadb-embedded-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821945" comment="mariadb-embedded-devel-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821946" comment="mariadb-libs-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821947" comment="mariadb-server-5.5.47-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821948" comment="mariadb-test-5.5.47-1.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162053" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2053</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2053" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2053" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2053" ref_url="https://www.suse.com/security/cve/CVE-2016-2053" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1672-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1937-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1995-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2005-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002192.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2009-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2010-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002200.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002255.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1641-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IGM6U4LKVWMXO6ZXETRLFQOGMA4A2ZQL/#IGM6U4LKVWMXO6ZXETRLFQOGMA4A2ZQL" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G3VWHAWQDEVZ37XRAAROFMJVDBBQ6YF5/#G3VWHAWQDEVZ37XRAAROFMJVDBBQ6YF5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2184-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NA2C2XZHCLKYOLPO7FG5N5MJ7TLHYLY2/#NA2C2XZHCLKYOLPO7FG5N5MJ7TLHYLY2" source="SUSE-SU"/>
    <description>
    The asn1_ber_decoder function in lib/asn1_decoder.c in the Linux kernel before 4.3 allows attackers to cause a denial of service (panic) via an ASN.1 BER file that lacks a public key, leading to mishandling by the public_key_verify_signature function in crypto/asymmetric_keys/public_key.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2053/">CVE-2016-2053 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2053">CVE-2016-2053 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1020452">SUSE bug 1020452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963762">SUSE bug 963762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979074">SUSE bug 979074</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822375" comment="kernel-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822376" comment="kernel-abi-whitelists-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822377" comment="kernel-debug-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822380" comment="kernel-doc-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822381" comment="kernel-headers-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822382" comment="kernel-tools-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822383" comment="kernel-tools-libs-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822385" comment="perf-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822386" comment="python-perf-3.10.0-514.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162069" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2069</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2069" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2069" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2069" ref_url="https://www.suse.com/security/cve/CVE-2016-2069" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3304-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002539.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0537-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QADGVDK4RHWKM73YWXH6NGINKOOP2QTR/#QADGVDK4RHWKM73YWXH6NGINKOOP2QTR" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1008-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SZXKXH7AVPHU63LOTNQP5IB3D5RGAWEB/#SZXKXH7AVPHU63LOTNQP5IB3D5RGAWEB" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M3DY3J73NZK532BN4KZEFFGULVYJU3D2/#M3DY3J73NZK532BN4KZEFFGULVYJU3D2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3021-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RNLBL6OKPBVGYFXWDCIZX6MURLH6ERPD/#RNLBL6OKPBVGYFXWDCIZX6MURLH6ERPD" source="SUSE-SU"/>
    <description>
    Race condition in arch/x86/mm/tlb.c in the Linux kernel before 4.4.1 allows local users to gain privileges by triggering access to a paging structure by a different CPU.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2069/">CVE-2016-2069 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2069">CVE-2016-2069 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1020452">SUSE bug 1020452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115893">SUSE bug 1115893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/870618">SUSE bug 870618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963767">SUSE bug 963767</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822375" comment="kernel-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822376" comment="kernel-abi-whitelists-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822377" comment="kernel-debug-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822380" comment="kernel-doc-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822381" comment="kernel-headers-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822382" comment="kernel-tools-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822383" comment="kernel-tools-libs-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822385" comment="perf-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822386" comment="python-perf-3.10.0-514.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162089" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2089</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2089" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2089" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2089" ref_url="https://www.suse.com/security/cve/CVE-2016-2089" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002399.html" source="SUSE-SU"/>
    <description>
    The jas_matrix_clip function in jas_seq.c in JasPer 1.900.1 allows remote attackers to cause a denial of service (invalid read and application crash) via a crafted JPEG 2000 image.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-2089/">CVE-2016-2089 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2089">CVE-2016-2089 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963983">SUSE bug 963983</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822979" comment="jasper-1.900.1-30.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822980" comment="jasper-devel-1.900.1-30.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822981" comment="jasper-libs-1.900.1-30.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822982" comment="jasper-utils-1.900.1-30.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162105" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2105</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2105" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2105" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2105" ref_url="https://www.suse.com/security/cve/CVE-2016-2105" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
		<reference ref_id="TID7017583" ref_url="https://www.suse.com/support/kb/doc/?id=7017583" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1237-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WSFMTFAUIIKKH3I6GTU6QJ57RZO3W5MP/#WSFMTFAUIIKKH3I6GTU6QJ57RZO3W5MP" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1238-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VYJ2NJ5W4TATUG4MZ2IB7COQYQG3JKYW/#VYJ2NJ5W4TATUG4MZ2IB7COQYQG3JKYW" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1239-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZNQRDVNZBEFFFUFANVI5BGCXK3VV7BLG/#ZNQRDVNZBEFFFUFANVI5BGCXK3VV7BLG" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1240-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NQ6BE3KQYEDRTVTZ6S7H3L3NZGFAMQEL/#NQ6BE3KQYEDRTVTZ6S7H3L3NZGFAMQEL" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1241-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MLVNWQIN3Y4GRZ5LBEYGXL7O5ECGS532/#MLVNWQIN3Y4GRZ5LBEYGXL7O5ECGS532" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J2UWKLVEL4Y4YDNH4P5SV2WSLSW42P3P/#J2UWKLVEL4Y4YDNH4P5SV2WSLSW42P3P" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1243-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WMIZV3VWTKX3FDPSEQAPDV77CWNBSVZS/#WMIZV3VWTKX3FDPSEQAPDV77CWNBSVZS" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1273-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3KDMMNY7VQAJW736NN5LHFSPNXJZFXB6/#3KDMMNY7VQAJW736NN5LHFSPNXJZFXB6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1566-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/X5IGZQ5VZE75TBXVAEAEK72WKRMYLO4K/#X5IGZQ5VZE75TBXVAEAEK72WKRMYLO4K" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2769-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BOIVZNRI2WQ56MPKE6BVFPLBB4RKMOJF/#BOIVZNRI2WQ56MPKE6BVFPLBB4RKMOJF" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2788-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2XSIJ4CL46B7JEPC7XYAF6F24TA3GW4B/#2XSIJ4CL46B7JEPC7XYAF6F24TA3GW4B" source="SUSE-SU"/>
    <description>
    Integer overflow in the EVP_EncodeUpdate function in crypto/evp/encode.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of binary data.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2105/">CVE-2016-2105 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2105">CVE-2016-2105 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/977584">SUSE bug 977584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977614">SUSE bug 977614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978492">SUSE bug 978492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989902">SUSE bug 989902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990369">SUSE bug 990369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990370">SUSE bug 990370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822042" comment="openssl-1.0.1e-51.el7_2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822043" comment="openssl-devel-1.0.1e-51.el7_2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822044" comment="openssl-libs-1.0.1e-51.el7_2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822045" comment="openssl-perl-1.0.1e-51.el7_2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822046" comment="openssl-static-1.0.1e-51.el7_2.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162106" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2106</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2106" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2106" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2106" ref_url="https://www.suse.com/security/cve/CVE-2016-2106" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
		<reference ref_id="TID7017583" ref_url="https://www.suse.com/support/kb/doc/?id=7017583" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1237-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WSFMTFAUIIKKH3I6GTU6QJ57RZO3W5MP/#WSFMTFAUIIKKH3I6GTU6QJ57RZO3W5MP" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1238-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VYJ2NJ5W4TATUG4MZ2IB7COQYQG3JKYW/#VYJ2NJ5W4TATUG4MZ2IB7COQYQG3JKYW" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1239-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZNQRDVNZBEFFFUFANVI5BGCXK3VV7BLG/#ZNQRDVNZBEFFFUFANVI5BGCXK3VV7BLG" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1240-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NQ6BE3KQYEDRTVTZ6S7H3L3NZGFAMQEL/#NQ6BE3KQYEDRTVTZ6S7H3L3NZGFAMQEL" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1241-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MLVNWQIN3Y4GRZ5LBEYGXL7O5ECGS532/#MLVNWQIN3Y4GRZ5LBEYGXL7O5ECGS532" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J2UWKLVEL4Y4YDNH4P5SV2WSLSW42P3P/#J2UWKLVEL4Y4YDNH4P5SV2WSLSW42P3P" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1243-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WMIZV3VWTKX3FDPSEQAPDV77CWNBSVZS/#WMIZV3VWTKX3FDPSEQAPDV77CWNBSVZS" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1273-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3KDMMNY7VQAJW736NN5LHFSPNXJZFXB6/#3KDMMNY7VQAJW736NN5LHFSPNXJZFXB6" source="SUSE-SU"/>
    <description>
    Integer overflow in the EVP_EncryptUpdate function in crypto/evp/evp_enc.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of data.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2106/">CVE-2016-2106 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2106">CVE-2016-2106 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/977584">SUSE bug 977584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977615">SUSE bug 977615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978492">SUSE bug 978492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979279">SUSE bug 979279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990369">SUSE bug 990369</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822042" comment="openssl-1.0.1e-51.el7_2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822043" comment="openssl-devel-1.0.1e-51.el7_2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822044" comment="openssl-libs-1.0.1e-51.el7_2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822045" comment="openssl-perl-1.0.1e-51.el7_2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822046" comment="openssl-static-1.0.1e-51.el7_2.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162107" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2107</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2107" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2107" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2107" ref_url="https://www.suse.com/security/cve/CVE-2016-2107" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
		<reference ref_id="TID7017583" ref_url="https://www.suse.com/support/kb/doc/?id=7017583" source="SUSE-SU"/>
		<reference ref_id="TID7017793" ref_url="https://www.suse.com/support/kb/doc/?id=7017793" source="SUSE-SU"/>
		<reference ref_id="TID7017881" ref_url="https://www.suse.com/support/kb/doc/?id=7017881" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1237-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WSFMTFAUIIKKH3I6GTU6QJ57RZO3W5MP/#WSFMTFAUIIKKH3I6GTU6QJ57RZO3W5MP" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1238-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VYJ2NJ5W4TATUG4MZ2IB7COQYQG3JKYW/#VYJ2NJ5W4TATUG4MZ2IB7COQYQG3JKYW" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1240-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NQ6BE3KQYEDRTVTZ6S7H3L3NZGFAMQEL/#NQ6BE3KQYEDRTVTZ6S7H3L3NZGFAMQEL" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1243-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WMIZV3VWTKX3FDPSEQAPDV77CWNBSVZS/#WMIZV3VWTKX3FDPSEQAPDV77CWNBSVZS" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1566-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/X5IGZQ5VZE75TBXVAEAEK72WKRMYLO4K/#X5IGZQ5VZE75TBXVAEAEK72WKRMYLO4K" source="SUSE-SU"/>
    <description>
    The AES-NI implementation in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h does not consider memory allocation during a certain padding check, which allows remote attackers to obtain sensitive cleartext information via a padding-oracle attack against an AES CBC session. NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-0169.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2107/">CVE-2016-2107 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2107">CVE-2016-2107 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/976942">SUSE bug 976942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977584">SUSE bug 977584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977616">SUSE bug 977616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978492">SUSE bug 978492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990369">SUSE bug 990369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990370">SUSE bug 990370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822042" comment="openssl-1.0.1e-51.el7_2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822043" comment="openssl-devel-1.0.1e-51.el7_2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822044" comment="openssl-libs-1.0.1e-51.el7_2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822045" comment="openssl-perl-1.0.1e-51.el7_2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822046" comment="openssl-static-1.0.1e-51.el7_2.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162108" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2108</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2108" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2108" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2108" ref_url="https://www.suse.com/security/cve/CVE-2016-2108" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002642.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002676.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003599.html" source="SUSE-SU"/>
		<reference ref_id="TID7021279" ref_url="https://www.suse.com/support/kb/doc/?id=7021279" source="SUSE-SU"/>
		<reference ref_id="TID7021518" ref_url="https://www.suse.com/support/kb/doc/?id=7021518" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1237-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WSFMTFAUIIKKH3I6GTU6QJ57RZO3W5MP/#WSFMTFAUIIKKH3I6GTU6QJ57RZO3W5MP" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1238-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VYJ2NJ5W4TATUG4MZ2IB7COQYQG3JKYW/#VYJ2NJ5W4TATUG4MZ2IB7COQYQG3JKYW" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1239-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZNQRDVNZBEFFFUFANVI5BGCXK3VV7BLG/#ZNQRDVNZBEFFFUFANVI5BGCXK3VV7BLG" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1240-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NQ6BE3KQYEDRTVTZ6S7H3L3NZGFAMQEL/#NQ6BE3KQYEDRTVTZ6S7H3L3NZGFAMQEL" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1241-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MLVNWQIN3Y4GRZ5LBEYGXL7O5ECGS532/#MLVNWQIN3Y4GRZ5LBEYGXL7O5ECGS532" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J2UWKLVEL4Y4YDNH4P5SV2WSLSW42P3P/#J2UWKLVEL4Y4YDNH4P5SV2WSLSW42P3P" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1243-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WMIZV3VWTKX3FDPSEQAPDV77CWNBSVZS/#WMIZV3VWTKX3FDPSEQAPDV77CWNBSVZS" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1273-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3KDMMNY7VQAJW736NN5LHFSPNXJZFXB6/#3KDMMNY7VQAJW736NN5LHFSPNXJZFXB6" source="SUSE-SU"/>
    <description>
    The ASN.1 implementation in OpenSSL before 1.0.1o and 1.0.2 before 1.0.2c allows remote attackers to execute arbitrary code or cause a denial of service (buffer underflow and memory corruption) via an ANY field in crafted serialized data, aka the "negative zero" issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2108/">CVE-2016-2108 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2108">CVE-2016-2108 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1001502">SUSE bug 1001502</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1004499">SUSE bug 1004499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005878">SUSE bug 1005878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148697">SUSE bug 1148697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977584">SUSE bug 977584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977617">SUSE bug 977617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978492">SUSE bug 978492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989345">SUSE bug 989345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/996067">SUSE bug 996067</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822042" comment="openssl-1.0.1e-51.el7_2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822043" comment="openssl-devel-1.0.1e-51.el7_2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822044" comment="openssl-libs-1.0.1e-51.el7_2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822045" comment="openssl-perl-1.0.1e-51.el7_2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822046" comment="openssl-static-1.0.1e-51.el7_2.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162109" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2109</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2109" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2109" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2109" ref_url="https://www.suse.com/security/cve/CVE-2016-2109" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
		<reference ref_id="TID7017583" ref_url="https://www.suse.com/support/kb/doc/?id=7017583" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1237-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WSFMTFAUIIKKH3I6GTU6QJ57RZO3W5MP/#WSFMTFAUIIKKH3I6GTU6QJ57RZO3W5MP" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1238-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VYJ2NJ5W4TATUG4MZ2IB7COQYQG3JKYW/#VYJ2NJ5W4TATUG4MZ2IB7COQYQG3JKYW" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1239-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZNQRDVNZBEFFFUFANVI5BGCXK3VV7BLG/#ZNQRDVNZBEFFFUFANVI5BGCXK3VV7BLG" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1240-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NQ6BE3KQYEDRTVTZ6S7H3L3NZGFAMQEL/#NQ6BE3KQYEDRTVTZ6S7H3L3NZGFAMQEL" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1241-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MLVNWQIN3Y4GRZ5LBEYGXL7O5ECGS532/#MLVNWQIN3Y4GRZ5LBEYGXL7O5ECGS532" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J2UWKLVEL4Y4YDNH4P5SV2WSLSW42P3P/#J2UWKLVEL4Y4YDNH4P5SV2WSLSW42P3P" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1243-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WMIZV3VWTKX3FDPSEQAPDV77CWNBSVZS/#WMIZV3VWTKX3FDPSEQAPDV77CWNBSVZS" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1273-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3KDMMNY7VQAJW736NN5LHFSPNXJZFXB6/#3KDMMNY7VQAJW736NN5LHFSPNXJZFXB6" source="SUSE-SU"/>
    <description>
    The asn1_d2i_read_bio function in crypto/asn1/a_d2i_fp.c in the ASN.1 BIO implementation in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (memory consumption) via a short invalid encoding.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2109/">CVE-2016-2109 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2109">CVE-2016-2109 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1015243">SUSE bug 1015243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976942">SUSE bug 976942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977584">SUSE bug 977584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978492">SUSE bug 978492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990369">SUSE bug 990369</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822042" comment="openssl-1.0.1e-51.el7_2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822043" comment="openssl-devel-1.0.1e-51.el7_2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822044" comment="openssl-libs-1.0.1e-51.el7_2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822045" comment="openssl-perl-1.0.1e-51.el7_2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822046" comment="openssl-static-1.0.1e-51.el7_2.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162110" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2110</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2110" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2110" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2110" ref_url="https://www.suse.com/security/cve/CVE-2016-2110" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1022-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1023-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002022.html" source="SUSE-SU"/>
		<reference ref_id="TID7017473" ref_url="https://www.suse.com/support/kb/doc?id=7017473" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1025-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GI2LJ6GRYASP6GSA6YZUDC6SYEK6EUZ6/#GI2LJ6GRYASP6GSA6YZUDC6SYEK6EUZ6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1064-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/B7VW7SOZTMI4RQKFXAOX457XVPBRHQR3/#B7VW7SOZTMI4RQKFXAOX457XVPBRHQR3" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1106-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6BJWKRWY53KC46JMOYJSXTBEZC3KCJRV/#6BJWKRWY53KC46JMOYJSXTBEZC3KCJRV" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1107-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M3WNN5WVCJIGH6DFBT26M6LTZ7KM54R7/#M3WNN5WVCJIGH6DFBT26M6LTZ7KM54R7" source="SUSE-SU"/>
    <description>
    The NTLMSSP authentication implementation in Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 allows man-in-the-middle attackers to perform protocol-downgrade attacks by modifying the client-server data stream to remove application-layer flags or encryption settings, as demonstrated by clearing the NTLMSSP_NEGOTIATE_SEAL or NTLMSSP_NEGOTIATE_SIGN option to disrupt LDAP security.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2110/">CVE-2016-2110 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2110">CVE-2016-2110 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1009711">SUSE bug 1009711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973031">SUSE bug 973031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973033">SUSE bug 973033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973036">SUSE bug 973036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975276">SUSE bug 975276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977416">SUSE bug 977416</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821951" comment="ctdb-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821952" comment="ctdb-devel-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821953" comment="ctdb-tests-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821954" comment="ipa-admintools-4.2.0-15.el7_2.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821955" comment="ipa-client-4.2.0-15.el7_2.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821956" comment="ipa-python-4.2.0-15.el7_2.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821957" comment="ipa-server-4.2.0-15.el7_2.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821958" comment="ipa-server-dns-4.2.0-15.el7_2.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821959" comment="ipa-server-trust-ad-4.2.0-15.el7_2.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821960" comment="ldb-tools-1.1.25-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821961" comment="libldb-1.1.25-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821962" comment="libldb-devel-1.1.25-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821963" comment="libsmbclient-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821964" comment="libsmbclient-devel-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821965" comment="libtalloc-2.1.5-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821966" comment="libtalloc-devel-2.1.5-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821967" comment="libtdb-1.3.8-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821968" comment="libtdb-devel-1.3.8-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821969" comment="libtevent-0.9.26-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821970" comment="libtevent-devel-0.9.26-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821971" comment="libwbclient-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821972" comment="libwbclient-devel-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821973" comment="openchange-2.0-10.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821974" comment="openchange-client-2.0-10.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821975" comment="openchange-devel-2.0-10.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821976" comment="openchange-devel-docs-2.0-10.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821977" comment="pyldb-1.1.25-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821978" comment="pyldb-devel-1.1.25-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821979" comment="pytalloc-2.1.5-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821980" comment="pytalloc-devel-2.1.5-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821981" comment="python-tdb-1.3.8-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821982" comment="python-tevent-0.9.26-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821983" comment="samba-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821984" comment="samba-client-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821985" comment="samba-client-libs-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821986" comment="samba-common-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821987" comment="samba-common-libs-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821988" comment="samba-common-tools-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821989" comment="samba-dc-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821990" comment="samba-dc-libs-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821991" comment="samba-devel-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821992" comment="samba-libs-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821993" comment="samba-pidl-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821994" comment="samba-python-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821995" comment="samba-test-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821996" comment="samba-test-devel-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821997" comment="samba-test-libs-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821998" comment="samba-vfs-glusterfs-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821999" comment="samba-winbind-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822000" comment="samba-winbind-clients-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822001" comment="samba-winbind-krb5-locator-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822002" comment="samba-winbind-modules-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822003" comment="tdb-tools-1.3.8-1.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162111" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2111</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2111" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2111" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2111" ref_url="https://www.suse.com/security/cve/CVE-2016-2111" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1022-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1023-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002022.html" source="SUSE-SU"/>
		<reference ref_id="TID7017473" ref_url="https://www.suse.com/support/kb/doc?id=7017473" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1025-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GI2LJ6GRYASP6GSA6YZUDC6SYEK6EUZ6/#GI2LJ6GRYASP6GSA6YZUDC6SYEK6EUZ6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1064-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/B7VW7SOZTMI4RQKFXAOX457XVPBRHQR3/#B7VW7SOZTMI4RQKFXAOX457XVPBRHQR3" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1106-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6BJWKRWY53KC46JMOYJSXTBEZC3KCJRV/#6BJWKRWY53KC46JMOYJSXTBEZC3KCJRV" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1107-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M3WNN5WVCJIGH6DFBT26M6LTZ7KM54R7/#M3WNN5WVCJIGH6DFBT26M6LTZ7KM54R7" source="SUSE-SU"/>
    <description>
    The NETLOGON service in Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2, when a domain controller is configured, allows remote attackers to spoof the computer name of a secure channel's endpoint, and obtain sensitive session information, by running a crafted application and leveraging the ability to sniff network traffic, a related issue to CVE-2015-0005.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2111/">CVE-2016-2111 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2111">CVE-2016-2111 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/973032">SUSE bug 973032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975276">SUSE bug 975276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977416">SUSE bug 977416</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821951" comment="ctdb-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821952" comment="ctdb-devel-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821953" comment="ctdb-tests-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821954" comment="ipa-admintools-4.2.0-15.el7_2.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821955" comment="ipa-client-4.2.0-15.el7_2.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821956" comment="ipa-python-4.2.0-15.el7_2.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821957" comment="ipa-server-4.2.0-15.el7_2.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821958" comment="ipa-server-dns-4.2.0-15.el7_2.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821959" comment="ipa-server-trust-ad-4.2.0-15.el7_2.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821960" comment="ldb-tools-1.1.25-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821961" comment="libldb-1.1.25-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821962" comment="libldb-devel-1.1.25-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821963" comment="libsmbclient-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821964" comment="libsmbclient-devel-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821965" comment="libtalloc-2.1.5-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821966" comment="libtalloc-devel-2.1.5-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821967" comment="libtdb-1.3.8-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821968" comment="libtdb-devel-1.3.8-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821969" comment="libtevent-0.9.26-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821970" comment="libtevent-devel-0.9.26-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821971" comment="libwbclient-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821972" comment="libwbclient-devel-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821973" comment="openchange-2.0-10.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821974" comment="openchange-client-2.0-10.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821975" comment="openchange-devel-2.0-10.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821976" comment="openchange-devel-docs-2.0-10.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821977" comment="pyldb-1.1.25-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821978" comment="pyldb-devel-1.1.25-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821979" comment="pytalloc-2.1.5-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821980" comment="pytalloc-devel-2.1.5-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821981" comment="python-tdb-1.3.8-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821982" comment="python-tevent-0.9.26-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821983" comment="samba-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821984" comment="samba-client-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821985" comment="samba-client-libs-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821986" comment="samba-common-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821987" comment="samba-common-libs-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821988" comment="samba-common-tools-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821989" comment="samba-dc-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821990" comment="samba-dc-libs-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821991" comment="samba-devel-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821992" comment="samba-libs-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821993" comment="samba-pidl-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821994" comment="samba-python-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821995" comment="samba-test-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821996" comment="samba-test-devel-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821997" comment="samba-test-libs-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821998" comment="samba-vfs-glusterfs-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821999" comment="samba-winbind-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822000" comment="samba-winbind-clients-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822001" comment="samba-winbind-krb5-locator-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822002" comment="samba-winbind-modules-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822003" comment="tdb-tools-1.3.8-1.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162112" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2112</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2112" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2112" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2112" ref_url="https://www.suse.com/security/cve/CVE-2016-2112" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1022-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1023-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002001.html" source="SUSE-SU"/>
		<reference ref_id="TID7017473" ref_url="https://www.suse.com/support/kb/doc?id=7017473" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1025-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GI2LJ6GRYASP6GSA6YZUDC6SYEK6EUZ6/#GI2LJ6GRYASP6GSA6YZUDC6SYEK6EUZ6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1064-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/B7VW7SOZTMI4RQKFXAOX457XVPBRHQR3/#B7VW7SOZTMI4RQKFXAOX457XVPBRHQR3" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1106-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6BJWKRWY53KC46JMOYJSXTBEZC3KCJRV/#6BJWKRWY53KC46JMOYJSXTBEZC3KCJRV" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1107-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M3WNN5WVCJIGH6DFBT26M6LTZ7KM54R7/#M3WNN5WVCJIGH6DFBT26M6LTZ7KM54R7" source="SUSE-SU"/>
    <description>
    The bundled LDAP client library in Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 does not recognize the "client ldap sasl wrapping" setting, which allows man-in-the-middle attackers to perform LDAP protocol-downgrade attacks by modifying the client-server data stream.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2112/">CVE-2016-2112 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2112">CVE-2016-2112 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/973031">SUSE bug 973031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973033">SUSE bug 973033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975276">SUSE bug 975276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977416">SUSE bug 977416</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821951" comment="ctdb-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821952" comment="ctdb-devel-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821953" comment="ctdb-tests-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821954" comment="ipa-admintools-4.2.0-15.el7_2.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821955" comment="ipa-client-4.2.0-15.el7_2.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821956" comment="ipa-python-4.2.0-15.el7_2.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821957" comment="ipa-server-4.2.0-15.el7_2.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821958" comment="ipa-server-dns-4.2.0-15.el7_2.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821959" comment="ipa-server-trust-ad-4.2.0-15.el7_2.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821960" comment="ldb-tools-1.1.25-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821961" comment="libldb-1.1.25-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821962" comment="libldb-devel-1.1.25-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821963" comment="libsmbclient-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821964" comment="libsmbclient-devel-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821965" comment="libtalloc-2.1.5-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821966" comment="libtalloc-devel-2.1.5-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821967" comment="libtdb-1.3.8-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821968" comment="libtdb-devel-1.3.8-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821969" comment="libtevent-0.9.26-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821970" comment="libtevent-devel-0.9.26-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821971" comment="libwbclient-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821972" comment="libwbclient-devel-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821973" comment="openchange-2.0-10.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821974" comment="openchange-client-2.0-10.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821975" comment="openchange-devel-2.0-10.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821976" comment="openchange-devel-docs-2.0-10.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821977" comment="pyldb-1.1.25-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821978" comment="pyldb-devel-1.1.25-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821979" comment="pytalloc-2.1.5-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821980" comment="pytalloc-devel-2.1.5-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821981" comment="python-tdb-1.3.8-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821982" comment="python-tevent-0.9.26-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821983" comment="samba-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821984" comment="samba-client-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821985" comment="samba-client-libs-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821986" comment="samba-common-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821987" comment="samba-common-libs-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821988" comment="samba-common-tools-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821989" comment="samba-dc-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821990" comment="samba-dc-libs-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821991" comment="samba-devel-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821992" comment="samba-libs-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821993" comment="samba-pidl-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821994" comment="samba-python-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821995" comment="samba-test-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821996" comment="samba-test-devel-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821997" comment="samba-test-libs-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821998" comment="samba-vfs-glusterfs-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821999" comment="samba-winbind-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822000" comment="samba-winbind-clients-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822001" comment="samba-winbind-krb5-locator-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822002" comment="samba-winbind-modules-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822003" comment="tdb-tools-1.3.8-1.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162113" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2113</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2113" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2113" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2113" ref_url="https://www.suse.com/security/cve/CVE-2016-2113" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1022-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1023-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002001.html" source="SUSE-SU"/>
		<reference ref_id="TID7017473" ref_url="https://www.suse.com/support/kb/doc?id=7017473" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1025-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GI2LJ6GRYASP6GSA6YZUDC6SYEK6EUZ6/#GI2LJ6GRYASP6GSA6YZUDC6SYEK6EUZ6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1064-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/B7VW7SOZTMI4RQKFXAOX457XVPBRHQR3/#B7VW7SOZTMI4RQKFXAOX457XVPBRHQR3" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1106-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6BJWKRWY53KC46JMOYJSXTBEZC3KCJRV/#6BJWKRWY53KC46JMOYJSXTBEZC3KCJRV" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1107-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M3WNN5WVCJIGH6DFBT26M6LTZ7KM54R7/#M3WNN5WVCJIGH6DFBT26M6LTZ7KM54R7" source="SUSE-SU"/>
    <description>
    Samba 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 does not verify X.509 certificates from TLS servers, which allows man-in-the-middle attackers to spoof LDAPS and HTTPS servers and obtain sensitive information via a crafted certificate.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2113/">CVE-2016-2113 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2113">CVE-2016-2113 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/973031">SUSE bug 973031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973033">SUSE bug 973033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973034">SUSE bug 973034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975276">SUSE bug 975276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977416">SUSE bug 977416</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821951" comment="ctdb-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821952" comment="ctdb-devel-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821953" comment="ctdb-tests-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821954" comment="ipa-admintools-4.2.0-15.el7_2.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821955" comment="ipa-client-4.2.0-15.el7_2.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821956" comment="ipa-python-4.2.0-15.el7_2.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821957" comment="ipa-server-4.2.0-15.el7_2.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821958" comment="ipa-server-dns-4.2.0-15.el7_2.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821959" comment="ipa-server-trust-ad-4.2.0-15.el7_2.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821960" comment="ldb-tools-1.1.25-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821961" comment="libldb-1.1.25-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821962" comment="libldb-devel-1.1.25-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821963" comment="libsmbclient-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821964" comment="libsmbclient-devel-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821965" comment="libtalloc-2.1.5-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821966" comment="libtalloc-devel-2.1.5-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821967" comment="libtdb-1.3.8-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821968" comment="libtdb-devel-1.3.8-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821969" comment="libtevent-0.9.26-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821970" comment="libtevent-devel-0.9.26-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821971" comment="libwbclient-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821972" comment="libwbclient-devel-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821973" comment="openchange-2.0-10.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821974" comment="openchange-client-2.0-10.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821975" comment="openchange-devel-2.0-10.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821976" comment="openchange-devel-docs-2.0-10.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821977" comment="pyldb-1.1.25-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821978" comment="pyldb-devel-1.1.25-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821979" comment="pytalloc-2.1.5-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821980" comment="pytalloc-devel-2.1.5-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821981" comment="python-tdb-1.3.8-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821982" comment="python-tevent-0.9.26-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821983" comment="samba-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821984" comment="samba-client-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821985" comment="samba-client-libs-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821986" comment="samba-common-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821987" comment="samba-common-libs-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821988" comment="samba-common-tools-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821989" comment="samba-dc-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821990" comment="samba-dc-libs-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821991" comment="samba-devel-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821992" comment="samba-libs-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821993" comment="samba-pidl-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821994" comment="samba-python-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821995" comment="samba-test-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821996" comment="samba-test-devel-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821997" comment="samba-test-libs-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821998" comment="samba-vfs-glusterfs-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821999" comment="samba-winbind-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822000" comment="samba-winbind-clients-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822001" comment="samba-winbind-krb5-locator-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822002" comment="samba-winbind-modules-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822003" comment="tdb-tools-1.3.8-1.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162114" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2114</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2114" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2114" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2114" ref_url="https://www.suse.com/security/cve/CVE-2016-2114" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:1106-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6BJWKRWY53KC46JMOYJSXTBEZC3KCJRV/#6BJWKRWY53KC46JMOYJSXTBEZC3KCJRV" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1107-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M3WNN5WVCJIGH6DFBT26M6LTZ7KM54R7/#M3WNN5WVCJIGH6DFBT26M6LTZ7KM54R7" source="SUSE-SU"/>
    <description>
    The SMB1 protocol implementation in Samba 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 does not recognize the "server signing = mandatory" setting, which allows man-in-the-middle attackers to spoof SMB servers by modifying the client-server data stream.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2114/">CVE-2016-2114 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2114">CVE-2016-2114 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/973035">SUSE bug 973035</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821951" comment="ctdb-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821952" comment="ctdb-devel-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821953" comment="ctdb-tests-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821954" comment="ipa-admintools-4.2.0-15.el7_2.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821955" comment="ipa-client-4.2.0-15.el7_2.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821956" comment="ipa-python-4.2.0-15.el7_2.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821957" comment="ipa-server-4.2.0-15.el7_2.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821958" comment="ipa-server-dns-4.2.0-15.el7_2.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821959" comment="ipa-server-trust-ad-4.2.0-15.el7_2.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821960" comment="ldb-tools-1.1.25-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821961" comment="libldb-1.1.25-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821962" comment="libldb-devel-1.1.25-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821963" comment="libsmbclient-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821964" comment="libsmbclient-devel-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821965" comment="libtalloc-2.1.5-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821966" comment="libtalloc-devel-2.1.5-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821967" comment="libtdb-1.3.8-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821968" comment="libtdb-devel-1.3.8-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821969" comment="libtevent-0.9.26-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821970" comment="libtevent-devel-0.9.26-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821971" comment="libwbclient-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821972" comment="libwbclient-devel-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821973" comment="openchange-2.0-10.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821974" comment="openchange-client-2.0-10.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821975" comment="openchange-devel-2.0-10.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821976" comment="openchange-devel-docs-2.0-10.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821977" comment="pyldb-1.1.25-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821978" comment="pyldb-devel-1.1.25-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821979" comment="pytalloc-2.1.5-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821980" comment="pytalloc-devel-2.1.5-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821981" comment="python-tdb-1.3.8-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821982" comment="python-tevent-0.9.26-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821983" comment="samba-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821984" comment="samba-client-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821985" comment="samba-client-libs-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821986" comment="samba-common-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821987" comment="samba-common-libs-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821988" comment="samba-common-tools-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821989" comment="samba-dc-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821990" comment="samba-dc-libs-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821991" comment="samba-devel-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821992" comment="samba-libs-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821993" comment="samba-pidl-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821994" comment="samba-python-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821995" comment="samba-test-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821996" comment="samba-test-devel-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821997" comment="samba-test-libs-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821998" comment="samba-vfs-glusterfs-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821999" comment="samba-winbind-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822000" comment="samba-winbind-clients-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822001" comment="samba-winbind-krb5-locator-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822002" comment="samba-winbind-modules-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822003" comment="tdb-tools-1.3.8-1.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162115" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2115</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2115" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2115" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2115" ref_url="https://www.suse.com/security/cve/CVE-2016-2115" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1022-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1023-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002001.html" source="SUSE-SU"/>
		<reference ref_id="TID7017473" ref_url="https://www.suse.com/support/kb/doc?id=7017473" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1025-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GI2LJ6GRYASP6GSA6YZUDC6SYEK6EUZ6/#GI2LJ6GRYASP6GSA6YZUDC6SYEK6EUZ6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1064-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/B7VW7SOZTMI4RQKFXAOX457XVPBRHQR3/#B7VW7SOZTMI4RQKFXAOX457XVPBRHQR3" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1106-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6BJWKRWY53KC46JMOYJSXTBEZC3KCJRV/#6BJWKRWY53KC46JMOYJSXTBEZC3KCJRV" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1107-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M3WNN5WVCJIGH6DFBT26M6LTZ7KM54R7/#M3WNN5WVCJIGH6DFBT26M6LTZ7KM54R7" source="SUSE-SU"/>
    <description>
    Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 does not require SMB signing within a DCERPC session over ncacn_np, which allows man-in-the-middle attackers to spoof SMB clients by modifying the client-server data stream.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2115/">CVE-2016-2115 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2115">CVE-2016-2115 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/973036">SUSE bug 973036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975276">SUSE bug 975276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977416">SUSE bug 977416</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821951" comment="ctdb-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821952" comment="ctdb-devel-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821953" comment="ctdb-tests-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821954" comment="ipa-admintools-4.2.0-15.el7_2.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821955" comment="ipa-client-4.2.0-15.el7_2.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821956" comment="ipa-python-4.2.0-15.el7_2.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821957" comment="ipa-server-4.2.0-15.el7_2.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821958" comment="ipa-server-dns-4.2.0-15.el7_2.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821959" comment="ipa-server-trust-ad-4.2.0-15.el7_2.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821960" comment="ldb-tools-1.1.25-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821961" comment="libldb-1.1.25-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821962" comment="libldb-devel-1.1.25-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821963" comment="libsmbclient-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821964" comment="libsmbclient-devel-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821965" comment="libtalloc-2.1.5-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821966" comment="libtalloc-devel-2.1.5-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821967" comment="libtdb-1.3.8-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821968" comment="libtdb-devel-1.3.8-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821969" comment="libtevent-0.9.26-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821970" comment="libtevent-devel-0.9.26-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821971" comment="libwbclient-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821972" comment="libwbclient-devel-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821973" comment="openchange-2.0-10.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821974" comment="openchange-client-2.0-10.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821975" comment="openchange-devel-2.0-10.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821976" comment="openchange-devel-docs-2.0-10.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821977" comment="pyldb-1.1.25-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821978" comment="pyldb-devel-1.1.25-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821979" comment="pytalloc-2.1.5-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821980" comment="pytalloc-devel-2.1.5-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821981" comment="python-tdb-1.3.8-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821982" comment="python-tevent-0.9.26-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821983" comment="samba-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821984" comment="samba-client-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821985" comment="samba-client-libs-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821986" comment="samba-common-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821987" comment="samba-common-libs-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821988" comment="samba-common-tools-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821989" comment="samba-dc-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821990" comment="samba-dc-libs-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821991" comment="samba-devel-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821992" comment="samba-libs-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821993" comment="samba-pidl-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821994" comment="samba-python-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821995" comment="samba-test-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821996" comment="samba-test-devel-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821997" comment="samba-test-libs-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821998" comment="samba-vfs-glusterfs-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821999" comment="samba-winbind-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822000" comment="samba-winbind-clients-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822001" comment="samba-winbind-krb5-locator-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822002" comment="samba-winbind-modules-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822003" comment="tdb-tools-1.3.8-1.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162116" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2116</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2116" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2116" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2116" ref_url="https://www.suse.com/security/cve/CVE-2016-2116" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002399.html" source="SUSE-SU"/>
    <description>
    Memory leak in the jas_iccprof_createfrombuf function in JasPer 1.900.1 and earlier allows remote attackers to cause a denial of service (memory consumption) via a crafted ICC color profile in a JPEG 2000 image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-21"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-2116/">CVE-2016-2116 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2116">CVE-2016-2116 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968373">SUSE bug 968373</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822979" comment="jasper-1.900.1-30.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822980" comment="jasper-devel-1.900.1-30.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822981" comment="jasper-libs-1.900.1-30.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822982" comment="jasper-utils-1.900.1-30.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162117" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2117</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2117" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2117" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2117" ref_url="https://www.suse.com/security/cve/CVE-2016-2117" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002847.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0906-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4LKB4K2PHJZ4HXCYAGRXG6YSPVEHMLTY/#4LKB4K2PHJZ4HXCYAGRXG6YSPVEHMLTY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0907-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/53AU4WLWNJVGYTRR745YR4MG5H4LZMNQ/#53AU4WLWNJVGYTRR745YR4MG5H4LZMNQ" source="SUSE-SU"/>
    <description>
    The atl2_probe function in drivers/net/ethernet/atheros/atlx/atl2.c in the Linux kernel through 4.5.2 incorrectly enables scatter/gather I/O, which allows remote attackers to obtain sensitive information from kernel memory by reading packet data.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2117/">CVE-2016-2117 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2117">CVE-2016-2117 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1027179">SUSE bug 1027179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968697">SUSE bug 968697</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822375" comment="kernel-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822376" comment="kernel-abi-whitelists-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822377" comment="kernel-debug-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822380" comment="kernel-doc-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822381" comment="kernel-headers-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822382" comment="kernel-tools-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822383" comment="kernel-tools-libs-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822385" comment="perf-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822386" comment="python-perf-3.10.0-514.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162118" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2118</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2118" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2118" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2118" ref_url="https://www.suse.com/security/cve/CVE-2016-2118" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1022-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1023-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002001.html" source="SUSE-SU"/>
		<reference ref_id="TID7017473" ref_url="https://www.suse.com/support/kb/doc?id=7017473" source="SUSE-SU"/>
		<reference ref_id="TID7017482" ref_url="https://www.suse.com/support/kb/doc/?id=7017482" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1025-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GI2LJ6GRYASP6GSA6YZUDC6SYEK6EUZ6/#GI2LJ6GRYASP6GSA6YZUDC6SYEK6EUZ6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1064-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/B7VW7SOZTMI4RQKFXAOX457XVPBRHQR3/#B7VW7SOZTMI4RQKFXAOX457XVPBRHQR3" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1106-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6BJWKRWY53KC46JMOYJSXTBEZC3KCJRV/#6BJWKRWY53KC46JMOYJSXTBEZC3KCJRV" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1107-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M3WNN5WVCJIGH6DFBT26M6LTZ7KM54R7/#M3WNN5WVCJIGH6DFBT26M6LTZ7KM54R7" source="SUSE-SU"/>
    <description>
    The MS-SAMR and MS-LSAD protocol implementations in Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 mishandle DCERPC connections, which allows man-in-the-middle attackers to perform protocol-downgrade attacks and impersonate users by modifying the client-server data stream, aka "BADLOCK."
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2118/">CVE-2016-2118 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2118">CVE-2016-2118 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/971965">SUSE bug 971965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975276">SUSE bug 975276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977416">SUSE bug 977416</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821951" comment="ctdb-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821952" comment="ctdb-devel-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821953" comment="ctdb-tests-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821954" comment="ipa-admintools-4.2.0-15.el7_2.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821955" comment="ipa-client-4.2.0-15.el7_2.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821956" comment="ipa-python-4.2.0-15.el7_2.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821957" comment="ipa-server-4.2.0-15.el7_2.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821958" comment="ipa-server-dns-4.2.0-15.el7_2.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821959" comment="ipa-server-trust-ad-4.2.0-15.el7_2.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821960" comment="ldb-tools-1.1.25-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821961" comment="libldb-1.1.25-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821962" comment="libldb-devel-1.1.25-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821963" comment="libsmbclient-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821964" comment="libsmbclient-devel-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821965" comment="libtalloc-2.1.5-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821966" comment="libtalloc-devel-2.1.5-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821967" comment="libtdb-1.3.8-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821968" comment="libtdb-devel-1.3.8-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821969" comment="libtevent-0.9.26-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821970" comment="libtevent-devel-0.9.26-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821971" comment="libwbclient-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821972" comment="libwbclient-devel-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821973" comment="openchange-2.0-10.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821974" comment="openchange-client-2.0-10.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821975" comment="openchange-devel-2.0-10.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821976" comment="openchange-devel-docs-2.0-10.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821977" comment="pyldb-1.1.25-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821978" comment="pyldb-devel-1.1.25-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821979" comment="pytalloc-2.1.5-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821980" comment="pytalloc-devel-2.1.5-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821981" comment="python-tdb-1.3.8-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821982" comment="python-tevent-0.9.26-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821983" comment="samba-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821984" comment="samba-client-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821985" comment="samba-client-libs-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821986" comment="samba-common-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821987" comment="samba-common-libs-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821988" comment="samba-common-tools-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821989" comment="samba-dc-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821990" comment="samba-dc-libs-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821991" comment="samba-devel-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821992" comment="samba-libs-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821993" comment="samba-pidl-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821994" comment="samba-python-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821995" comment="samba-test-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821996" comment="samba-test-devel-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821997" comment="samba-test-libs-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821998" comment="samba-vfs-glusterfs-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821999" comment="samba-winbind-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822000" comment="samba-winbind-clients-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822001" comment="samba-winbind-krb5-locator-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822002" comment="samba-winbind-modules-4.2.10-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822003" comment="tdb-tools-1.3.8-1.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162119" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2119</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2119" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2119" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2119" ref_url="https://www.suse.com/security/cve/CVE-2016-2119" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002341.html" source="SUSE-SU"/>
    <description>
    libcli/smb/smbXcli_base.c in Samba 4.x before 4.2.14, 4.3.x before 4.3.11, and 4.4.x before 4.4.5 allows man-in-the-middle attackers to bypass a client-signing protection mechanism, and consequently spoof SMB2 and SMB3 servers, via the (1) SMB2_SESSION_FLAG_IS_GUEST or (2) SMB2_SESSION_FLAG_IS_NULL flag.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2119/">CVE-2016-2119 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2119">CVE-2016-2119 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/986869">SUSE bug 986869</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822154" comment="ctdb-4.2.10-7.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822155" comment="ctdb-devel-4.2.10-7.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822156" comment="ctdb-tests-4.2.10-7.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822157" comment="libsmbclient-4.2.10-7.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822158" comment="libsmbclient-devel-4.2.10-7.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822159" comment="libwbclient-4.2.10-7.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822160" comment="libwbclient-devel-4.2.10-7.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822161" comment="samba-4.2.10-7.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822162" comment="samba-client-4.2.10-7.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822163" comment="samba-client-libs-4.2.10-7.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822164" comment="samba-common-4.2.10-7.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822165" comment="samba-common-libs-4.2.10-7.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822166" comment="samba-common-tools-4.2.10-7.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822167" comment="samba-dc-4.2.10-7.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822168" comment="samba-dc-libs-4.2.10-7.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822169" comment="samba-devel-4.2.10-7.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822170" comment="samba-libs-4.2.10-7.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822171" comment="samba-pidl-4.2.10-7.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822172" comment="samba-python-4.2.10-7.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822173" comment="samba-test-4.2.10-7.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822174" comment="samba-test-devel-4.2.10-7.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822175" comment="samba-test-libs-4.2.10-7.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822176" comment="samba-vfs-glusterfs-4.2.10-7.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822177" comment="samba-winbind-4.2.10-7.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822178" comment="samba-winbind-clients-4.2.10-7.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822179" comment="samba-winbind-krb5-locator-4.2.10-7.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822180" comment="samba-winbind-modules-4.2.10-7.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162124" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2124</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2124" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2124" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2124" ref_url="https://www.suse.com/security/cve/CVE-2016-2124" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3650-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3673-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3674-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3746-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0361-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010209.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1471-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6W4QSQCTUGSIZCTRT4FGJNMRLZDUZS6Y/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3647-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/36K5HNX67LYX5XOVQRL3MSIC5YSJ5M5W/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3650-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7ZU5FWTEOBTHR7WNP3HEICT3NJTBNV2V/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3674-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZYEHJEQQ7LEL2T775B7QLR3IFR6LJGLZ/" source="SUSE-SU"/>
    <description>
    A flaw was found in the way samba implemented SMB1 authentication. An attacker could use this flaw to retrieve the plaintext password sent over the wire even if Kerberos authentication was required.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-2124/">CVE-2016-2124 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2124">CVE-2016-2124 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1014440">SUSE bug 1014440</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829457" comment="ctdb-4.10.16-17.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829458" comment="ctdb-tests-4.10.16-17.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829459" comment="libsmbclient-4.10.16-17.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829460" comment="libsmbclient-devel-4.10.16-17.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829461" comment="libwbclient-4.10.16-17.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829462" comment="libwbclient-devel-4.10.16-17.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829463" comment="samba-4.10.16-17.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829464" comment="samba-client-4.10.16-17.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829465" comment="samba-client-libs-4.10.16-17.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829466" comment="samba-common-4.10.16-17.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829467" comment="samba-common-libs-4.10.16-17.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829468" comment="samba-common-tools-4.10.16-17.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829469" comment="samba-dc-4.10.16-17.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829470" comment="samba-dc-libs-4.10.16-17.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829471" comment="samba-devel-4.10.16-17.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829472" comment="samba-krb5-printing-4.10.16-17.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829473" comment="samba-libs-4.10.16-17.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829474" comment="samba-pidl-4.10.16-17.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829475" comment="samba-python-4.10.16-17.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829476" comment="samba-python-test-4.10.16-17.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829477" comment="samba-test-4.10.16-17.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829478" comment="samba-test-libs-4.10.16-17.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829479" comment="samba-vfs-glusterfs-4.10.16-17.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829480" comment="samba-winbind-4.10.16-17.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829481" comment="samba-winbind-clients-4.10.16-17.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829482" comment="samba-winbind-krb5-locator-4.10.16-17.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829483" comment="samba-winbind-modules-4.10.16-17.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162125" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2125</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2125" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2125" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2125" ref_url="https://www.suse.com/security/cve/CVE-2016-2125" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002526.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002536.html" source="SUSE-SU"/>
    <description>
    It was found that Samba before versions 4.5.3, 4.4.8, 4.3.13 always requested forwardable tickets when using Kerberos authentication. A service to which Samba authenticated using Kerberos could subsequently use the ticket to impersonate Samba to other services or domain users.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2125/">CVE-2016-2125 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2125">CVE-2016-2125 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1014441">SUSE bug 1014441</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822996" comment="ctdb-4.4.4-13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822997" comment="ctdb-tests-4.4.4-13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822998" comment="libsmbclient-4.4.4-13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822999" comment="libsmbclient-devel-4.4.4-13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823000" comment="libwbclient-4.4.4-13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823001" comment="libwbclient-devel-4.4.4-13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823002" comment="samba-4.4.4-13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823003" comment="samba-client-4.4.4-13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823004" comment="samba-client-libs-4.4.4-13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823005" comment="samba-common-4.4.4-13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823006" comment="samba-common-libs-4.4.4-13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823007" comment="samba-common-tools-4.4.4-13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823008" comment="samba-dc-4.4.4-13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823009" comment="samba-dc-libs-4.4.4-13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823010" comment="samba-devel-4.4.4-13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823011" comment="samba-krb5-printing-4.4.4-13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823012" comment="samba-libs-4.4.4-13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823013" comment="samba-pidl-4.4.4-13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823014" comment="samba-python-4.4.4-13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823015" comment="samba-test-4.4.4-13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823016" comment="samba-test-libs-4.4.4-13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823017" comment="samba-vfs-glusterfs-4.4.4-13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823018" comment="samba-winbind-4.4.4-13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823019" comment="samba-winbind-clients-4.4.4-13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823020" comment="samba-winbind-krb5-locator-4.4.4-13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823021" comment="samba-winbind-modules-4.4.4-13.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162126" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2126</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2126" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2126" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2126" ref_url="https://www.suse.com/security/cve/CVE-2016-2126" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002526.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002536.html" source="SUSE-SU"/>
    <description>
    Samba version 4.0.0 up to 4.5.2 is vulnerable to privilege elevation due to incorrect handling of the PAC (Privilege Attribute Certificate) checksum. A remote, authenticated, attacker can cause the winbindd process to crash using a legitimate Kerberos ticket. A local service with access to the winbindd privileged pipe can cause winbindd to cache elevated access permissions.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2126/">CVE-2016-2126 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2126">CVE-2016-2126 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1014442">SUSE bug 1014442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822996" comment="ctdb-4.4.4-13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822997" comment="ctdb-tests-4.4.4-13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822998" comment="libsmbclient-4.4.4-13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822999" comment="libsmbclient-devel-4.4.4-13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823000" comment="libwbclient-4.4.4-13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823001" comment="libwbclient-devel-4.4.4-13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823002" comment="samba-4.4.4-13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823003" comment="samba-client-4.4.4-13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823004" comment="samba-client-libs-4.4.4-13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823005" comment="samba-common-4.4.4-13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823006" comment="samba-common-libs-4.4.4-13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823007" comment="samba-common-tools-4.4.4-13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823008" comment="samba-dc-4.4.4-13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823009" comment="samba-dc-libs-4.4.4-13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823010" comment="samba-devel-4.4.4-13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823011" comment="samba-krb5-printing-4.4.4-13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823012" comment="samba-libs-4.4.4-13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823013" comment="samba-pidl-4.4.4-13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823014" comment="samba-python-4.4.4-13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823015" comment="samba-test-4.4.4-13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823016" comment="samba-test-libs-4.4.4-13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823017" comment="samba-vfs-glusterfs-4.4.4-13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823018" comment="samba-winbind-4.4.4-13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823019" comment="samba-winbind-clients-4.4.4-13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823020" comment="samba-winbind-krb5-locator-4.4.4-13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823021" comment="samba-winbind-modules-4.4.4-13.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162143" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2143</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2143" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2143" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2143" ref_url="https://www.suse.com/security/cve/CVE-2016-2143" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1019-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1672-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1707-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002207.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M3DY3J73NZK532BN4KZEFFGULVYJU3D2/#M3DY3J73NZK532BN4KZEFFGULVYJU3D2" source="SUSE-SU"/>
    <description>
    The fork implementation in the Linux kernel before 4.5 on s390 platforms mishandles the case of four page-table levels, which allows local users to cause a denial of service (system crash) or possibly have unspecified other impact via a crafted application, related to arch/s390/include/asm/mmu_context.h and arch/s390/include/asm/pgalloc.h.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2143/">CVE-2016-2143 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2143">CVE-2016-2143 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1115893">SUSE bug 1115893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970504">SUSE bug 970504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993872">SUSE bug 993872</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822194" comment="kernel-3.10.0-327.28.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822195" comment="kernel-abi-whitelists-3.10.0-327.28.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822196" comment="kernel-debug-3.10.0-327.28.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822199" comment="kernel-doc-3.10.0-327.28.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822200" comment="kernel-headers-3.10.0-327.28.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822201" comment="kernel-tools-3.10.0-327.28.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822202" comment="kernel-tools-libs-3.10.0-327.28.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822204" comment="perf-3.10.0-327.28.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822205" comment="python-perf-3.10.0-327.28.2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162150" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2150</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2150" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2150" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2150" ref_url="https://www.suse.com/security/cve/CVE-2016-2150" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002108.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008966.html" source="SUSE-SU"/>
    <description>
    SPICE allows local guest OS users to read from or write to arbitrary host memory locations via crafted primary surface parameters, a similar issue to CVE-2015-5261.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-2150/">CVE-2016-2150 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2150">CVE-2016-2150 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/982385">SUSE bug 982385</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982386">SUSE bug 982386</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822091" comment="spice-server-0.12.4-15.el7_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822092" comment="spice-server-devel-0.12.4-15.el7_2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162161" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2161</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2161" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2161" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2161" ref_url="https://www.suse.com/security/cve/CVE-2016-2161" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002741.html" source="SUSE-SU"/>
    <description>
    In Apache HTTP Server versions 2.4.0 to 2.4.23, malicious input to mod_auth_digest can cause the server to crash, and each instance continues to crash even for subsequently valid requests.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2161/">CVE-2016-2161 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2161">CVE-2016-2161 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1016714">SUSE bug 1016714</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033513">SUSE bug 1033513</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822887" comment="httpd-2.4.6-45.el7_3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822888" comment="httpd-devel-2.4.6-45.el7_3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822889" comment="httpd-manual-2.4.6-45.el7_3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822890" comment="httpd-tools-2.4.6-45.el7_3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822891" comment="mod_ldap-2.4.6-45.el7_3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822892" comment="mod_proxy_html-2.4.6-45.el7_3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822893" comment="mod_session-2.4.6-45.el7_3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822894" comment="mod_ssl-2.4.6-45.el7_3.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162177" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2177</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2177" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2177" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2177" ref_url="https://www.suse.com/security/cve/CVE-2016-2177" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
		<reference ref_id="TID3426981" ref_url="https://www.suse.com/support/kb/doc/?id=3426981" source="SUSE-SU"/>
		<reference ref_id="TID7016794" ref_url="https://www.suse.com/support/kb/doc/?id=7016794" source="SUSE-SU"/>
		<reference ref_id="TID7018311" ref_url="https://www.suse.com/support/kb/doc/?id=7018311" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2391-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/457PQSBNF5LPTML5PWFZ5WOFHAE6PCC6/#457PQSBNF5LPTML5PWFZ5WOFHAE6PCC6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2407-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UC3J55W76QZY2RGZ6NR6FKQWCAIVCF6L/#UC3J55W76QZY2RGZ6NR6FKQWCAIVCF6L" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2537-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3K4Z2X4Q5GYLAOESQ5O5R5ESW4LZENO6/#3K4Z2X4Q5GYLAOESQ5O5R5ESW4LZENO6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0458-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FBYBD5ZUSPVBWEEIVTKA25Q5QWELRG65/#FBYBD5ZUSPVBWEEIVTKA25Q5QWELRG65" source="SUSE-SU"/>
    <description>
    OpenSSL through 1.0.2h incorrectly uses pointer arithmetic for heap-buffer boundary checks, which might allow remote attackers to cause a denial of service (integer overflow and application crash) or possibly have unspecified other impact by leveraging unexpected malloc behavior, related to s3_srvr.c, ssl_sess.c, and t1_lib.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-2177/">CVE-2016-2177 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2177">CVE-2016-2177 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/982575">SUSE bug 982575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999075">SUSE bug 999075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999665">SUSE bug 999665</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822299" comment="openssl-1.0.1e-51.el7_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822300" comment="openssl-devel-1.0.1e-51.el7_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822301" comment="openssl-libs-1.0.1e-51.el7_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822302" comment="openssl-perl-1.0.1e-51.el7_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822303" comment="openssl-static-1.0.1e-51.el7_2.7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162178" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2178</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2178" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2178" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2178" ref_url="https://www.suse.com/security/cve/CVE-2016-2178" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2470-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="TID3426981" ref_url="https://www.suse.com/support/kb/doc/?id=3426981" source="SUSE-SU"/>
		<reference ref_id="TID7016794" ref_url="https://www.suse.com/support/kb/doc/?id=7016794" source="SUSE-SU"/>
		<reference ref_id="TID7018311" ref_url="https://www.suse.com/support/kb/doc/?id=7018311" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2391-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/457PQSBNF5LPTML5PWFZ5WOFHAE6PCC6/#457PQSBNF5LPTML5PWFZ5WOFHAE6PCC6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2407-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UC3J55W76QZY2RGZ6NR6FKQWCAIVCF6L/#UC3J55W76QZY2RGZ6NR6FKQWCAIVCF6L" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2496-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZBUNI7MQOGTTK5V6ZEUBGZKAQMZP6XAR/#ZBUNI7MQOGTTK5V6ZEUBGZKAQMZP6XAR" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2537-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3K4Z2X4Q5GYLAOESQ5O5R5ESW4LZENO6/#3K4Z2X4Q5GYLAOESQ5O5R5ESW4LZENO6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0458-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FBYBD5ZUSPVBWEEIVTKA25Q5QWELRG65/#FBYBD5ZUSPVBWEEIVTKA25Q5QWELRG65" source="SUSE-SU"/>
    <description>
    The dsa_sign_setup function in crypto/dsa/dsa_ossl.c in OpenSSL through 1.0.2h does not properly ensure the use of constant-time operations, which makes it easier for local users to discover a DSA private key via a timing side-channel attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-10-13"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2178/">CVE-2016-2178 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2178">CVE-2016-2178 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1004104">SUSE bug 1004104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983249">SUSE bug 983249</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983519">SUSE bug 983519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999665">SUSE bug 999665</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822299" comment="openssl-1.0.1e-51.el7_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822300" comment="openssl-devel-1.0.1e-51.el7_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822301" comment="openssl-libs-1.0.1e-51.el7_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822302" comment="openssl-perl-1.0.1e-51.el7_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822303" comment="openssl-static-1.0.1e-51.el7_2.7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162179" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2179</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2179" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2179" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2179" ref_url="https://www.suse.com/security/cve/CVE-2016-2179" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
		<reference ref_id="TID7016794" ref_url="https://www.suse.com/support/kb/doc/?id=7016794" source="SUSE-SU"/>
		<reference ref_id="TID7018311" ref_url="https://www.suse.com/support/kb/doc/?id=7018311" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2391-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/457PQSBNF5LPTML5PWFZ5WOFHAE6PCC6/#457PQSBNF5LPTML5PWFZ5WOFHAE6PCC6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2407-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UC3J55W76QZY2RGZ6NR6FKQWCAIVCF6L/#UC3J55W76QZY2RGZ6NR6FKQWCAIVCF6L" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2537-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3K4Z2X4Q5GYLAOESQ5O5R5ESW4LZENO6/#3K4Z2X4Q5GYLAOESQ5O5R5ESW4LZENO6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0458-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FBYBD5ZUSPVBWEEIVTKA25Q5QWELRG65/#FBYBD5ZUSPVBWEEIVTKA25Q5QWELRG65" source="SUSE-SU"/>
    <description>
    The DTLS implementation in OpenSSL before 1.1.0 does not properly restrict the lifetime of queue entries associated with unused out-of-order messages, which allows remote attackers to cause a denial of service (memory consumption) by maintaining many crafted DTLS sessions simultaneously, related to d1_lib.c, statem_dtls.c, statem_lib.c, and statem_srvr.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2179/">CVE-2016-2179 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2179">CVE-2016-2179 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1004104">SUSE bug 1004104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994844">SUSE bug 994844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999665">SUSE bug 999665</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822299" comment="openssl-1.0.1e-51.el7_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822300" comment="openssl-devel-1.0.1e-51.el7_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822301" comment="openssl-libs-1.0.1e-51.el7_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822302" comment="openssl-perl-1.0.1e-51.el7_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822303" comment="openssl-static-1.0.1e-51.el7_2.7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2180</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2180" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2180" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2180" ref_url="https://www.suse.com/security/cve/CVE-2016-2180" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
		<reference ref_id="TID7016794" ref_url="https://www.suse.com/support/kb/doc/?id=7016794" source="SUSE-SU"/>
		<reference ref_id="TID7018311" ref_url="https://www.suse.com/support/kb/doc/?id=7018311" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2391-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/457PQSBNF5LPTML5PWFZ5WOFHAE6PCC6/#457PQSBNF5LPTML5PWFZ5WOFHAE6PCC6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2407-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UC3J55W76QZY2RGZ6NR6FKQWCAIVCF6L/#UC3J55W76QZY2RGZ6NR6FKQWCAIVCF6L" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0458-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FBYBD5ZUSPVBWEEIVTKA25Q5QWELRG65/#FBYBD5ZUSPVBWEEIVTKA25Q5QWELRG65" source="SUSE-SU"/>
    <description>
    The TS_OBJ_print_bio function in crypto/ts/ts_lib.c in the X.509 Public Key Infrastructure Time-Stamp Protocol (TSP) implementation in OpenSSL through 1.0.2h allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted time-stamp file that is mishandled by the "openssl ts" command.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2180/">CVE-2016-2180 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2180">CVE-2016-2180 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1003811">SUSE bug 1003811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990419">SUSE bug 990419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999665">SUSE bug 999665</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822299" comment="openssl-1.0.1e-51.el7_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822300" comment="openssl-devel-1.0.1e-51.el7_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822301" comment="openssl-libs-1.0.1e-51.el7_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822302" comment="openssl-perl-1.0.1e-51.el7_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822303" comment="openssl-static-1.0.1e-51.el7_2.7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162181" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2181</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2181" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2181" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2181" ref_url="https://www.suse.com/security/cve/CVE-2016-2181" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
		<reference ref_id="TID3426981" ref_url="https://www.suse.com/support/kb/doc/?id=3426981" source="SUSE-SU"/>
		<reference ref_id="TID7016794" ref_url="https://www.suse.com/support/kb/doc/?id=7016794" source="SUSE-SU"/>
		<reference ref_id="TID7018311" ref_url="https://www.suse.com/support/kb/doc/?id=7018311" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2391-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/457PQSBNF5LPTML5PWFZ5WOFHAE6PCC6/#457PQSBNF5LPTML5PWFZ5WOFHAE6PCC6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2407-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UC3J55W76QZY2RGZ6NR6FKQWCAIVCF6L/#UC3J55W76QZY2RGZ6NR6FKQWCAIVCF6L" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2537-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3K4Z2X4Q5GYLAOESQ5O5R5ESW4LZENO6/#3K4Z2X4Q5GYLAOESQ5O5R5ESW4LZENO6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0458-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FBYBD5ZUSPVBWEEIVTKA25Q5QWELRG65/#FBYBD5ZUSPVBWEEIVTKA25Q5QWELRG65" source="SUSE-SU"/>
    <description>
    The Anti-Replay feature in the DTLS implementation in OpenSSL before 1.1.0 mishandles early use of a new epoch number in conjunction with a large sequence number, which allows remote attackers to cause a denial of service (false-positive packet drops) via spoofed DTLS records, related to rec_layer_d1.c and ssl3_record.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-10-11"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2181/">CVE-2016-2181 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2181">CVE-2016-2181 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1004104">SUSE bug 1004104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994749">SUSE bug 994749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994844">SUSE bug 994844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999665">SUSE bug 999665</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822299" comment="openssl-1.0.1e-51.el7_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822300" comment="openssl-devel-1.0.1e-51.el7_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822301" comment="openssl-libs-1.0.1e-51.el7_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822302" comment="openssl-perl-1.0.1e-51.el7_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822303" comment="openssl-static-1.0.1e-51.el7_2.7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2182</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2182" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2182" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2182" ref_url="https://www.suse.com/security/cve/CVE-2016-2182" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
		<reference ref_id="TID3426981" ref_url="https://www.suse.com/support/kb/doc/?id=3426981" source="SUSE-SU"/>
		<reference ref_id="TID7016794" ref_url="https://www.suse.com/support/kb/doc/?id=7016794" source="SUSE-SU"/>
		<reference ref_id="TID7018311" ref_url="https://www.suse.com/support/kb/doc/?id=7018311" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2391-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/457PQSBNF5LPTML5PWFZ5WOFHAE6PCC6/#457PQSBNF5LPTML5PWFZ5WOFHAE6PCC6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2407-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UC3J55W76QZY2RGZ6NR6FKQWCAIVCF6L/#UC3J55W76QZY2RGZ6NR6FKQWCAIVCF6L" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2537-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3K4Z2X4Q5GYLAOESQ5O5R5ESW4LZENO6/#3K4Z2X4Q5GYLAOESQ5O5R5ESW4LZENO6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0458-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FBYBD5ZUSPVBWEEIVTKA25Q5QWELRG65/#FBYBD5ZUSPVBWEEIVTKA25Q5QWELRG65" source="SUSE-SU"/>
    <description>
    The BN_bn2dec function in crypto/bn/bn_print.c in OpenSSL before 1.1.0 does not properly validate division results, which allows remote attackers to cause a denial of service (out-of-bounds write and application crash) or possibly have unspecified other impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-10-13"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2182/">CVE-2016-2182 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2182">CVE-2016-2182 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1004104">SUSE bug 1004104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993819">SUSE bug 993819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994844">SUSE bug 994844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995959">SUSE bug 995959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999665">SUSE bug 999665</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822299" comment="openssl-1.0.1e-51.el7_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822300" comment="openssl-devel-1.0.1e-51.el7_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822301" comment="openssl-libs-1.0.1e-51.el7_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822302" comment="openssl-perl-1.0.1e-51.el7_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822303" comment="openssl-static-1.0.1e-51.el7_2.7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162183" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2183</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2183" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2183" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2183" ref_url="https://www.suse.com/security/cve/CVE-2016-2183" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2470-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002613.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002641.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0726-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="TID3426981" ref_url="https://www.suse.com/support/kb/doc/?id=3426981" source="SUSE-SU"/>
		<reference ref_id="TID7016794" ref_url="https://www.suse.com/support/kb/doc/?id=7016794" source="SUSE-SU"/>
		<reference ref_id="TID7017985" ref_url="https://www.suse.com/support/kb/doc/?id=7017985" source="SUSE-SU"/>
		<reference ref_id="TID7018311" ref_url="https://www.suse.com/support/kb/doc/?id=7018311" source="SUSE-SU"/>
		<reference ref_id="TID7020150" ref_url="https://www.suse.com/support/kb/doc/?id=7020150" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2391-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/457PQSBNF5LPTML5PWFZ5WOFHAE6PCC6/#457PQSBNF5LPTML5PWFZ5WOFHAE6PCC6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2407-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UC3J55W76QZY2RGZ6NR6FKQWCAIVCF6L/#UC3J55W76QZY2RGZ6NR6FKQWCAIVCF6L" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2496-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZBUNI7MQOGTTK5V6ZEUBGZKAQMZP6XAR/#ZBUNI7MQOGTTK5V6ZEUBGZKAQMZP6XAR" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2537-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3K4Z2X4Q5GYLAOESQ5O5R5ESW4LZENO6/#3K4Z2X4Q5GYLAOESQ5O5R5ESW4LZENO6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0374-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CFQXMIUEYAAFEMNGA4VAINBTGFZC5IIJ/#CFQXMIUEYAAFEMNGA4VAINBTGFZC5IIJ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0513-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5MQTL4UZJTP3OTMSAPDFWKNC6HVTCMS6/#5MQTL4UZJTP3OTMSAPDFWKNC6HVTCMS6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0458-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FBYBD5ZUSPVBWEEIVTKA25Q5QWELRG65/#FBYBD5ZUSPVBWEEIVTKA25Q5QWELRG65" source="SUSE-SU"/>
    <description>
    The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode, aka a "Sweet32" attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2183/">CVE-2016-2183 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2183">CVE-2016-2183 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1001912">SUSE bug 1001912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024218">SUSE bug 1024218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027038">SUSE bug 1027038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034689">SUSE bug 1034689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056614">SUSE bug 1056614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171693">SUSE bug 1171693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994844">SUSE bug 994844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995359">SUSE bug 995359</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824440" comment="python-2.7.5-69.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824441" comment="python-debug-2.7.5-69.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824442" comment="python-devel-2.7.5-69.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824443" comment="python-libs-2.7.5-69.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824444" comment="python-test-2.7.5-69.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824445" comment="python-tools-2.7.5-69.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824446" comment="tkinter-2.7.5-69.el7_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162315" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2315</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2315" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2315" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2315" ref_url="https://www.suse.com/security/cve/CVE-2016-2315" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001950.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0802-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7V7QEZAYQIHH5KXN5V535IUCLG6WMF7O/#7V7QEZAYQIHH5KXN5V535IUCLG6WMF7O" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0803-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G4DFPVE5I2YSCX524OAIDT2GN3IY6D6J/#G4DFPVE5I2YSCX524OAIDT2GN3IY6D6J" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0826-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WEOHYQA7FJ6YGHJ45TISIBRJTQ2ZZRDJ/#WEOHYQA7FJ6YGHJ45TISIBRJTQ2ZZRDJ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0829-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SFTVT3JWRXGI2WFVEEDH5QE36TUH65AU/#SFTVT3JWRXGI2WFVEEDH5QE36TUH65AU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0831-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KGCAWJFZ252OHKOLG7M7STJZIMJZDGQJ/#KGCAWJFZ252OHKOLG7M7STJZIMJZDGQJ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0832-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RRKDZ6LNFYUPMRMJNFJD6YJFNWECFAZL/#RRKDZ6LNFYUPMRMJNFJD6YJFNWECFAZL" source="SUSE-SU"/>
    <description>
    revision.c in git before 2.7.4 uses an incorrect integer data type, which allows remote attackers to execute arbitrary code via a (1) long filename or (2) many nested trees, leading to a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2315/">CVE-2016-2315 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2315">CVE-2016-2315 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/971328">SUSE bug 971328</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821898" comment="emacs-git-1.8.3.1-6.el7_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821899" comment="emacs-git-el-1.8.3.1-6.el7_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821900" comment="git-1.8.3.1-6.el7_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821901" comment="git-all-1.8.3.1-6.el7_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821902" comment="git-bzr-1.8.3.1-6.el7_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821903" comment="git-cvs-1.8.3.1-6.el7_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821904" comment="git-daemon-1.8.3.1-6.el7_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821905" comment="git-email-1.8.3.1-6.el7_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821906" comment="git-gui-1.8.3.1-6.el7_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821907" comment="git-hg-1.8.3.1-6.el7_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821908" comment="git-p4-1.8.3.1-6.el7_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821909" comment="git-svn-1.8.3.1-6.el7_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821910" comment="gitk-1.8.3.1-6.el7_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821911" comment="gitweb-1.8.3.1-6.el7_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821912" comment="perl-Git-1.8.3.1-6.el7_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821913" comment="perl-Git-SVN-1.8.3.1-6.el7_2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162324" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2324</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2324" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2324" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2324" ref_url="https://www.suse.com/security/cve/CVE-2016-2324" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001950.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0802-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7V7QEZAYQIHH5KXN5V535IUCLG6WMF7O/#7V7QEZAYQIHH5KXN5V535IUCLG6WMF7O" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0803-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G4DFPVE5I2YSCX524OAIDT2GN3IY6D6J/#G4DFPVE5I2YSCX524OAIDT2GN3IY6D6J" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0826-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WEOHYQA7FJ6YGHJ45TISIBRJTQ2ZZRDJ/#WEOHYQA7FJ6YGHJ45TISIBRJTQ2ZZRDJ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0829-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SFTVT3JWRXGI2WFVEEDH5QE36TUH65AU/#SFTVT3JWRXGI2WFVEEDH5QE36TUH65AU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0831-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KGCAWJFZ252OHKOLG7M7STJZIMJZDGQJ/#KGCAWJFZ252OHKOLG7M7STJZIMJZDGQJ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0832-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RRKDZ6LNFYUPMRMJNFJD6YJFNWECFAZL/#RRKDZ6LNFYUPMRMJNFJD6YJFNWECFAZL" source="SUSE-SU"/>
    <description>
    Integer overflow in Git before 2.7.4 allows remote attackers to execute arbitrary code via a (1) long filename or (2) many nested trees, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2324/">CVE-2016-2324 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2324">CVE-2016-2324 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/971328">SUSE bug 971328</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821898" comment="emacs-git-1.8.3.1-6.el7_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821899" comment="emacs-git-el-1.8.3.1-6.el7_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821900" comment="git-1.8.3.1-6.el7_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821901" comment="git-all-1.8.3.1-6.el7_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821902" comment="git-bzr-1.8.3.1-6.el7_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821903" comment="git-cvs-1.8.3.1-6.el7_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821904" comment="git-daemon-1.8.3.1-6.el7_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821905" comment="git-email-1.8.3.1-6.el7_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821906" comment="git-gui-1.8.3.1-6.el7_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821907" comment="git-hg-1.8.3.1-6.el7_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821908" comment="git-p4-1.8.3.1-6.el7_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821909" comment="git-svn-1.8.3.1-6.el7_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821910" comment="gitk-1.8.3.1-6.el7_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821911" comment="gitweb-1.8.3.1-6.el7_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821912" comment="perl-Git-1.8.3.1-6.el7_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821913" comment="perl-Git-SVN-1.8.3.1-6.el7_2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162384" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2384</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2384" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2384" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2384" ref_url="https://www.suse.com/security/cve/CVE-2016-2384" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1019-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002207.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1008-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SZXKXH7AVPHU63LOTNQP5IB3D5RGAWEB/#SZXKXH7AVPHU63LOTNQP5IB3D5RGAWEB" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G3VWHAWQDEVZ37XRAAROFMJVDBBQ6YF5/#G3VWHAWQDEVZ37XRAAROFMJVDBBQ6YF5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M3DY3J73NZK532BN4KZEFFGULVYJU3D2/#M3DY3J73NZK532BN4KZEFFGULVYJU3D2" source="SUSE-SU"/>
    <description>
    Double free vulnerability in the snd_usbmidi_create function in sound/usb/midi.c in the Linux kernel before 4.5 allows physically proximate attackers to cause a denial of service (panic) or possibly have unspecified other impact via vectors involving an invalid USB descriptor.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2384/">CVE-2016-2384 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2384">CVE-2016-2384 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1020452">SUSE bug 1020452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966693">SUSE bug 966693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967773">SUSE bug 967773</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822375" comment="kernel-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822376" comment="kernel-abi-whitelists-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822377" comment="kernel-debug-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822380" comment="kernel-doc-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822381" comment="kernel-headers-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822382" comment="kernel-tools-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822383" comment="kernel-tools-libs-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822385" comment="perf-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822386" comment="python-perf-3.10.0-514.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162518" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2518</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2518" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2518" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2518" ref_url="https://www.suse.com/security/cve/CVE-2016-2518" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1568-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002215.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1329-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QVMT4ZV3NQWZAZSNNE6QHFWQCWEKTFI6/#QVMT4ZV3NQWZAZSNNE6QHFWQCWEKTFI6" source="SUSE-SU"/>
    <description>
    The MATCH_ASSOC function in NTP before version 4.2.8p9 and 4.3.x before 4.3.92 allows remote attackers to cause an out-of-bounds reference via an addpeer request with a large hmode value.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2518/">CVE-2016-2518 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2518">CVE-2016-2518 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/977446">SUSE bug 977446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977457">SUSE bug 977457</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822086" comment="ntp-4.2.6p5-22.el7_2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822087" comment="ntp-doc-4.2.6p5-22.el7_2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822088" comment="ntp-perl-4.2.6p5-22.el7_2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822089" comment="ntpdate-4.2.6p5-22.el7_2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822090" comment="sntp-4.2.6p5-22.el7_2.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162569" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2569</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2569" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2569" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2569" ref_url="https://www.suse.com/security/cve/CVE-2016-2569" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002212.html" source="SUSE-SU"/>
    <description>
    Squid 3.x before 3.5.15 and 4.x before 4.0.7 does not properly append data to String objects, which allows remote servers to cause a denial of service (assertion failure and daemon exit) via a long string, as demonstrated by a crafted HTTP Vary header.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2569/">CVE-2016-2569 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2569">CVE-2016-2569 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/968392">SUSE bug 968392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968393">SUSE bug 968393</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822596" comment="squid-3.5.20-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822597" comment="squid-migration-script-3.5.20-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822598" comment="squid-sysvinit-3.5.20-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162570" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2570</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2570" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2570" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2570" ref_url="https://www.suse.com/security/cve/CVE-2016-2570" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002212.html" source="SUSE-SU"/>
    <description>
    The Edge Side Includes (ESI) parser in Squid 3.x before 3.5.15 and 4.x before 4.0.7 does not check buffer limits during XML parsing, which allows remote HTTP servers to cause a denial of service (assertion failure and daemon exit) via a crafted XML document, related to esi/CustomParser.cc and esi/CustomParser.h.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2570/">CVE-2016-2570 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2570">CVE-2016-2570 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/968392">SUSE bug 968392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968393">SUSE bug 968393</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822596" comment="squid-3.5.20-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822597" comment="squid-migration-script-3.5.20-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822598" comment="squid-sysvinit-3.5.20-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162571" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2571</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2571" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2571" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2571" ref_url="https://www.suse.com/security/cve/CVE-2016-2571" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002212.html" source="SUSE-SU"/>
    <description>
    http.cc in Squid 3.x before 3.5.15 and 4.x before 4.0.7 proceeds with the storage of certain data after a response-parsing failure, which allows remote HTTP servers to cause a denial of service (assertion failure and daemon exit) via a malformed response.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2571/">CVE-2016-2571 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2571">CVE-2016-2571 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/968394">SUSE bug 968394</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968395">SUSE bug 968395</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822596" comment="squid-3.5.20-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822597" comment="squid-migration-script-3.5.20-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822598" comment="squid-sysvinit-3.5.20-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162572" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2572</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2572" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2572" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2572" ref_url="https://www.suse.com/security/cve/CVE-2016-2572" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002212.html" source="SUSE-SU"/>
    <description>
    http.cc in Squid 4.x before 4.0.7 relies on the HTTP status code after a response-parsing failure, which allows remote HTTP servers to cause a denial of service (assertion failure and daemon exit) via a malformed response.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2572/">CVE-2016-2572 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2572">CVE-2016-2572 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/968394">SUSE bug 968394</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968395">SUSE bug 968395</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822596" comment="squid-3.5.20-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822597" comment="squid-migration-script-3.5.20-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822598" comment="squid-sysvinit-3.5.20-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162774" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2774</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2774" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2774" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2774" ref_url="https://www.suse.com/security/cve/CVE-2016-2774" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002204.html" source="SUSE-SU"/>
    <description>
    ISC DHCP 4.1.x before 4.1-ESV-R13 and 4.2.x and 4.3.x before 4.3.4 does not restrict the number of concurrent TCP sessions, which allows remote attackers to cause a denial of service (INSIST assertion failure or request-processing outage) by establishing many sessions.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-04-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2774/">CVE-2016-2774 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2774">CVE-2016-2774 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/969820">SUSE bug 969820</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822529" comment="dhclient-4.2.5-47.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822530" comment="dhcp-4.2.5-47.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822531" comment="dhcp-common-4.2.5-47.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822532" comment="dhcp-devel-4.2.5-47.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822533" comment="dhcp-libs-4.2.5-47.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162776" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2776</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2776" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2776" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2776" ref_url="https://www.suse.com/security/cve/CVE-2016-2776" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2405-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002297.html" source="SUSE-SU"/>
		<reference ref_id="TID7018100" ref_url="https://www.suse.com/support/kb/doc/?id=7018100" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2406-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DDSBDGMEICMKDZCMPZX7F6NW6U7LQ64B/#DDSBDGMEICMKDZCMPZX7F6NW6U7LQ64B" source="SUSE-SU"/>
    <description>
    buffer.c in named in ISC BIND 9 before 9.9.9-P3, 9.10.x before 9.10.4-P3, and 9.11.x before 9.11.0rc3 does not properly construct responses, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a crafted query.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2776/">CVE-2016-2776 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2776">CVE-2016-2776 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1000362">SUSE bug 1000362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1001595">SUSE bug 1001595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1001597">SUSE bug 1001597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007829">SUSE bug 1007829</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822304" comment="bind-9.9.4-29.el7_2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822305" comment="bind-chroot-9.9.4-29.el7_2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822306" comment="bind-devel-9.9.4-29.el7_2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822307" comment="bind-libs-9.9.4-29.el7_2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822308" comment="bind-libs-lite-9.9.4-29.el7_2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822309" comment="bind-license-9.9.4-29.el7_2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822310" comment="bind-lite-devel-9.9.4-29.el7_2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822311" comment="bind-pkcs11-9.9.4-29.el7_2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822312" comment="bind-pkcs11-devel-9.9.4-29.el7_2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822313" comment="bind-pkcs11-libs-9.9.4-29.el7_2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822314" comment="bind-pkcs11-utils-9.9.4-29.el7_2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822315" comment="bind-sdb-9.9.4-29.el7_2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822316" comment="bind-sdb-chroot-9.9.4-29.el7_2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822317" comment="bind-utils-9.9.4-29.el7_2.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162790" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2790</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2790" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2790" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2790" ref_url="https://www.suse.com/security/cve/CVE-2016-2790" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0731-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/E3N7NQ7QAE3HH2XCKBURJIR2VROQ4NP4/#E3N7NQ7QAE3HH2XCKBURJIR2VROQ4NP4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0733-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2TMO77LZI5PLXBX43DUX7QKP5MGYJXZ2/#2TMO77LZI5PLXBX43DUX7QKP5MGYJXZ2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PLVKBXELCWUE2MUFMRXSMQ4OLSTOQL3S/#PLVKBXELCWUE2MUFMRXSMQ4OLSTOQL3S" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0894-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GATTQJ2JXTSBNIMC3HLZJNWX2M3VKPGA/#GATTQJ2JXTSBNIMC3HLZJNWX2M3VKPGA" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1767-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MO2WO6ZWDV36CWCXZCY7DNEMCHCBUMJO/#MO2WO6ZWDV36CWCXZCY7DNEMCHCBUMJO" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1769-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IT5Z2MQVCUU2PY7AOHLQUFDN44PCYHX5/#IT5Z2MQVCUU2PY7AOHLQUFDN44PCYHX5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1778-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HCMXP7OML46I3X4TRHDOHMURKLSPQK2P/#HCMXP7OML46I3X4TRHDOHMURKLSPQK2P" source="SUSE-SU"/>
    <description>
    The graphite2::TtfUtil::GetTableInfo function in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, does not initialize memory for an unspecified data structure, which allows remote attackers to cause a denial of service or possibly have unknown other impact via a crafted Graphite smart font.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2790/">CVE-2016-2790 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2790">CVE-2016-2790 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821841" comment="firefox-38.7.0-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821889" comment="thunderbird-38.7.0-1.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162791" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2791</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2791" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2791" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2791" ref_url="https://www.suse.com/security/cve/CVE-2016-2791" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0731-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/E3N7NQ7QAE3HH2XCKBURJIR2VROQ4NP4/#E3N7NQ7QAE3HH2XCKBURJIR2VROQ4NP4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0733-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2TMO77LZI5PLXBX43DUX7QKP5MGYJXZ2/#2TMO77LZI5PLXBX43DUX7QKP5MGYJXZ2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PLVKBXELCWUE2MUFMRXSMQ4OLSTOQL3S/#PLVKBXELCWUE2MUFMRXSMQ4OLSTOQL3S" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0894-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GATTQJ2JXTSBNIMC3HLZJNWX2M3VKPGA/#GATTQJ2JXTSBNIMC3HLZJNWX2M3VKPGA" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1767-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MO2WO6ZWDV36CWCXZCY7DNEMCHCBUMJO/#MO2WO6ZWDV36CWCXZCY7DNEMCHCBUMJO" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1769-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IT5Z2MQVCUU2PY7AOHLQUFDN44PCYHX5/#IT5Z2MQVCUU2PY7AOHLQUFDN44PCYHX5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1778-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HCMXP7OML46I3X4TRHDOHMURKLSPQK2P/#HCMXP7OML46I3X4TRHDOHMURKLSPQK2P" source="SUSE-SU"/>
    <description>
    The graphite2::GlyphCache::glyph function in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted Graphite smart font.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2791/">CVE-2016-2791 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2791">CVE-2016-2791 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821841" comment="firefox-38.7.0-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821889" comment="thunderbird-38.7.0-1.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162792" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2792</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2792" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2792" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2792" ref_url="https://www.suse.com/security/cve/CVE-2016-2792" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0731-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/E3N7NQ7QAE3HH2XCKBURJIR2VROQ4NP4/#E3N7NQ7QAE3HH2XCKBURJIR2VROQ4NP4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0733-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2TMO77LZI5PLXBX43DUX7QKP5MGYJXZ2/#2TMO77LZI5PLXBX43DUX7QKP5MGYJXZ2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PLVKBXELCWUE2MUFMRXSMQ4OLSTOQL3S/#PLVKBXELCWUE2MUFMRXSMQ4OLSTOQL3S" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0894-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GATTQJ2JXTSBNIMC3HLZJNWX2M3VKPGA/#GATTQJ2JXTSBNIMC3HLZJNWX2M3VKPGA" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1767-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MO2WO6ZWDV36CWCXZCY7DNEMCHCBUMJO/#MO2WO6ZWDV36CWCXZCY7DNEMCHCBUMJO" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1769-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IT5Z2MQVCUU2PY7AOHLQUFDN44PCYHX5/#IT5Z2MQVCUU2PY7AOHLQUFDN44PCYHX5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1778-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HCMXP7OML46I3X4TRHDOHMURKLSPQK2P/#HCMXP7OML46I3X4TRHDOHMURKLSPQK2P" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    The graphite2::Slot::getAttr function in Slot.cpp in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted Graphite smart font, a different vulnerability than CVE-2016-2800.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2792/">CVE-2016-2792 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2792">CVE-2016-2792 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821841" comment="firefox-38.7.0-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821889" comment="thunderbird-38.7.0-1.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162793" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2793</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2793" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2793" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2793" ref_url="https://www.suse.com/security/cve/CVE-2016-2793" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0731-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/E3N7NQ7QAE3HH2XCKBURJIR2VROQ4NP4/#E3N7NQ7QAE3HH2XCKBURJIR2VROQ4NP4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0733-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2TMO77LZI5PLXBX43DUX7QKP5MGYJXZ2/#2TMO77LZI5PLXBX43DUX7QKP5MGYJXZ2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PLVKBXELCWUE2MUFMRXSMQ4OLSTOQL3S/#PLVKBXELCWUE2MUFMRXSMQ4OLSTOQL3S" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0894-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GATTQJ2JXTSBNIMC3HLZJNWX2M3VKPGA/#GATTQJ2JXTSBNIMC3HLZJNWX2M3VKPGA" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1767-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MO2WO6ZWDV36CWCXZCY7DNEMCHCBUMJO/#MO2WO6ZWDV36CWCXZCY7DNEMCHCBUMJO" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1769-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IT5Z2MQVCUU2PY7AOHLQUFDN44PCYHX5/#IT5Z2MQVCUU2PY7AOHLQUFDN44PCYHX5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1778-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HCMXP7OML46I3X4TRHDOHMURKLSPQK2P/#HCMXP7OML46I3X4TRHDOHMURKLSPQK2P" source="SUSE-SU"/>
    <description>
    CachedCmap.cpp in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted Graphite smart font.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2793/">CVE-2016-2793 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2793">CVE-2016-2793 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821841" comment="firefox-38.7.0-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821889" comment="thunderbird-38.7.0-1.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162794" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2794</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2794" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2794" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2794" ref_url="https://www.suse.com/security/cve/CVE-2016-2794" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0731-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/E3N7NQ7QAE3HH2XCKBURJIR2VROQ4NP4/#E3N7NQ7QAE3HH2XCKBURJIR2VROQ4NP4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0733-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2TMO77LZI5PLXBX43DUX7QKP5MGYJXZ2/#2TMO77LZI5PLXBX43DUX7QKP5MGYJXZ2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PLVKBXELCWUE2MUFMRXSMQ4OLSTOQL3S/#PLVKBXELCWUE2MUFMRXSMQ4OLSTOQL3S" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0894-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GATTQJ2JXTSBNIMC3HLZJNWX2M3VKPGA/#GATTQJ2JXTSBNIMC3HLZJNWX2M3VKPGA" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1767-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MO2WO6ZWDV36CWCXZCY7DNEMCHCBUMJO/#MO2WO6ZWDV36CWCXZCY7DNEMCHCBUMJO" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1769-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IT5Z2MQVCUU2PY7AOHLQUFDN44PCYHX5/#IT5Z2MQVCUU2PY7AOHLQUFDN44PCYHX5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1778-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HCMXP7OML46I3X4TRHDOHMURKLSPQK2P/#HCMXP7OML46I3X4TRHDOHMURKLSPQK2P" source="SUSE-SU"/>
    <description>
    The graphite2::TtfUtil::CmapSubtable12NextCodepoint function in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted Graphite smart font.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-02"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2794/">CVE-2016-2794 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2794">CVE-2016-2794 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821841" comment="firefox-38.7.0-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821889" comment="thunderbird-38.7.0-1.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162795" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2795</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2795" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2795" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2795" ref_url="https://www.suse.com/security/cve/CVE-2016-2795" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0731-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/E3N7NQ7QAE3HH2XCKBURJIR2VROQ4NP4/#E3N7NQ7QAE3HH2XCKBURJIR2VROQ4NP4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0733-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2TMO77LZI5PLXBX43DUX7QKP5MGYJXZ2/#2TMO77LZI5PLXBX43DUX7QKP5MGYJXZ2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PLVKBXELCWUE2MUFMRXSMQ4OLSTOQL3S/#PLVKBXELCWUE2MUFMRXSMQ4OLSTOQL3S" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0894-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GATTQJ2JXTSBNIMC3HLZJNWX2M3VKPGA/#GATTQJ2JXTSBNIMC3HLZJNWX2M3VKPGA" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1767-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MO2WO6ZWDV36CWCXZCY7DNEMCHCBUMJO/#MO2WO6ZWDV36CWCXZCY7DNEMCHCBUMJO" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1769-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IT5Z2MQVCUU2PY7AOHLQUFDN44PCYHX5/#IT5Z2MQVCUU2PY7AOHLQUFDN44PCYHX5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1778-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HCMXP7OML46I3X4TRHDOHMURKLSPQK2P/#HCMXP7OML46I3X4TRHDOHMURKLSPQK2P" source="SUSE-SU"/>
    <description>
    The graphite2::FileFace::get_table_fn function in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, does not initialize memory for an unspecified data structure, which allows remote attackers to cause a denial of service or possibly have unknown other impact via a crafted Graphite smart font.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2795/">CVE-2016-2795 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2795">CVE-2016-2795 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821841" comment="firefox-38.7.0-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821889" comment="thunderbird-38.7.0-1.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162796" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2796</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2796" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2796" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2796" ref_url="https://www.suse.com/security/cve/CVE-2016-2796" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0731-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/E3N7NQ7QAE3HH2XCKBURJIR2VROQ4NP4/#E3N7NQ7QAE3HH2XCKBURJIR2VROQ4NP4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0733-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2TMO77LZI5PLXBX43DUX7QKP5MGYJXZ2/#2TMO77LZI5PLXBX43DUX7QKP5MGYJXZ2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PLVKBXELCWUE2MUFMRXSMQ4OLSTOQL3S/#PLVKBXELCWUE2MUFMRXSMQ4OLSTOQL3S" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0894-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GATTQJ2JXTSBNIMC3HLZJNWX2M3VKPGA/#GATTQJ2JXTSBNIMC3HLZJNWX2M3VKPGA" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1767-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MO2WO6ZWDV36CWCXZCY7DNEMCHCBUMJO/#MO2WO6ZWDV36CWCXZCY7DNEMCHCBUMJO" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1769-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IT5Z2MQVCUU2PY7AOHLQUFDN44PCYHX5/#IT5Z2MQVCUU2PY7AOHLQUFDN44PCYHX5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1778-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HCMXP7OML46I3X4TRHDOHMURKLSPQK2P/#HCMXP7OML46I3X4TRHDOHMURKLSPQK2P" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the graphite2::vm::Machine::Code::Code function in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted Graphite smart font.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2796/">CVE-2016-2796 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2796">CVE-2016-2796 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821841" comment="firefox-38.7.0-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821889" comment="thunderbird-38.7.0-1.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2797</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2797" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2797" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2797" ref_url="https://www.suse.com/security/cve/CVE-2016-2797" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0731-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/E3N7NQ7QAE3HH2XCKBURJIR2VROQ4NP4/#E3N7NQ7QAE3HH2XCKBURJIR2VROQ4NP4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0733-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2TMO77LZI5PLXBX43DUX7QKP5MGYJXZ2/#2TMO77LZI5PLXBX43DUX7QKP5MGYJXZ2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PLVKBXELCWUE2MUFMRXSMQ4OLSTOQL3S/#PLVKBXELCWUE2MUFMRXSMQ4OLSTOQL3S" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0894-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GATTQJ2JXTSBNIMC3HLZJNWX2M3VKPGA/#GATTQJ2JXTSBNIMC3HLZJNWX2M3VKPGA" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1767-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MO2WO6ZWDV36CWCXZCY7DNEMCHCBUMJO/#MO2WO6ZWDV36CWCXZCY7DNEMCHCBUMJO" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1769-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IT5Z2MQVCUU2PY7AOHLQUFDN44PCYHX5/#IT5Z2MQVCUU2PY7AOHLQUFDN44PCYHX5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1778-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HCMXP7OML46I3X4TRHDOHMURKLSPQK2P/#HCMXP7OML46I3X4TRHDOHMURKLSPQK2P" source="SUSE-SU"/>
    <description>
    The graphite2::TtfUtil::CmapSubtable12Lookup function in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted Graphite smart font, a different vulnerability than CVE-2016-2801.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2797/">CVE-2016-2797 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2797">CVE-2016-2797 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821841" comment="firefox-38.7.0-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821889" comment="thunderbird-38.7.0-1.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162798" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2798</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2798" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2798" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2798" ref_url="https://www.suse.com/security/cve/CVE-2016-2798" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0731-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/E3N7NQ7QAE3HH2XCKBURJIR2VROQ4NP4/#E3N7NQ7QAE3HH2XCKBURJIR2VROQ4NP4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0733-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2TMO77LZI5PLXBX43DUX7QKP5MGYJXZ2/#2TMO77LZI5PLXBX43DUX7QKP5MGYJXZ2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PLVKBXELCWUE2MUFMRXSMQ4OLSTOQL3S/#PLVKBXELCWUE2MUFMRXSMQ4OLSTOQL3S" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0894-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GATTQJ2JXTSBNIMC3HLZJNWX2M3VKPGA/#GATTQJ2JXTSBNIMC3HLZJNWX2M3VKPGA" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1767-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MO2WO6ZWDV36CWCXZCY7DNEMCHCBUMJO/#MO2WO6ZWDV36CWCXZCY7DNEMCHCBUMJO" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1769-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IT5Z2MQVCUU2PY7AOHLQUFDN44PCYHX5/#IT5Z2MQVCUU2PY7AOHLQUFDN44PCYHX5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1778-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HCMXP7OML46I3X4TRHDOHMURKLSPQK2P/#HCMXP7OML46I3X4TRHDOHMURKLSPQK2P" source="SUSE-SU"/>
    <description>
    The graphite2::GlyphCache::Loader::Loader function in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted Graphite smart font.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2798/">CVE-2016-2798 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2798">CVE-2016-2798 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821841" comment="firefox-38.7.0-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821889" comment="thunderbird-38.7.0-1.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162799" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2799</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2799" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2799" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2799" ref_url="https://www.suse.com/security/cve/CVE-2016-2799" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0731-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/E3N7NQ7QAE3HH2XCKBURJIR2VROQ4NP4/#E3N7NQ7QAE3HH2XCKBURJIR2VROQ4NP4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0733-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2TMO77LZI5PLXBX43DUX7QKP5MGYJXZ2/#2TMO77LZI5PLXBX43DUX7QKP5MGYJXZ2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PLVKBXELCWUE2MUFMRXSMQ4OLSTOQL3S/#PLVKBXELCWUE2MUFMRXSMQ4OLSTOQL3S" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0894-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GATTQJ2JXTSBNIMC3HLZJNWX2M3VKPGA/#GATTQJ2JXTSBNIMC3HLZJNWX2M3VKPGA" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1767-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MO2WO6ZWDV36CWCXZCY7DNEMCHCBUMJO/#MO2WO6ZWDV36CWCXZCY7DNEMCHCBUMJO" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1769-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IT5Z2MQVCUU2PY7AOHLQUFDN44PCYHX5/#IT5Z2MQVCUU2PY7AOHLQUFDN44PCYHX5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1778-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HCMXP7OML46I3X4TRHDOHMURKLSPQK2P/#HCMXP7OML46I3X4TRHDOHMURKLSPQK2P" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the graphite2::Slot::setAttr function in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted Graphite smart font.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-02"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2799/">CVE-2016-2799 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2799">CVE-2016-2799 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821841" comment="firefox-38.7.0-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821889" comment="thunderbird-38.7.0-1.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2800</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2800" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2800" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2800" ref_url="https://www.suse.com/security/cve/CVE-2016-2800" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0731-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/E3N7NQ7QAE3HH2XCKBURJIR2VROQ4NP4/#E3N7NQ7QAE3HH2XCKBURJIR2VROQ4NP4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0733-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2TMO77LZI5PLXBX43DUX7QKP5MGYJXZ2/#2TMO77LZI5PLXBX43DUX7QKP5MGYJXZ2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PLVKBXELCWUE2MUFMRXSMQ4OLSTOQL3S/#PLVKBXELCWUE2MUFMRXSMQ4OLSTOQL3S" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0894-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GATTQJ2JXTSBNIMC3HLZJNWX2M3VKPGA/#GATTQJ2JXTSBNIMC3HLZJNWX2M3VKPGA" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1767-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MO2WO6ZWDV36CWCXZCY7DNEMCHCBUMJO/#MO2WO6ZWDV36CWCXZCY7DNEMCHCBUMJO" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1769-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IT5Z2MQVCUU2PY7AOHLQUFDN44PCYHX5/#IT5Z2MQVCUU2PY7AOHLQUFDN44PCYHX5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1778-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HCMXP7OML46I3X4TRHDOHMURKLSPQK2P/#HCMXP7OML46I3X4TRHDOHMURKLSPQK2P" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    The graphite2::Slot::getAttr function in Slot.cpp in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted Graphite smart font, a different vulnerability than CVE-2016-2792.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2800/">CVE-2016-2800 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2800">CVE-2016-2800 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821841" comment="firefox-38.7.0-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821889" comment="thunderbird-38.7.0-1.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162801" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2801</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2801" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2801" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2801" ref_url="https://www.suse.com/security/cve/CVE-2016-2801" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0731-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/E3N7NQ7QAE3HH2XCKBURJIR2VROQ4NP4/#E3N7NQ7QAE3HH2XCKBURJIR2VROQ4NP4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0733-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2TMO77LZI5PLXBX43DUX7QKP5MGYJXZ2/#2TMO77LZI5PLXBX43DUX7QKP5MGYJXZ2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PLVKBXELCWUE2MUFMRXSMQ4OLSTOQL3S/#PLVKBXELCWUE2MUFMRXSMQ4OLSTOQL3S" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0894-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GATTQJ2JXTSBNIMC3HLZJNWX2M3VKPGA/#GATTQJ2JXTSBNIMC3HLZJNWX2M3VKPGA" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1767-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MO2WO6ZWDV36CWCXZCY7DNEMCHCBUMJO/#MO2WO6ZWDV36CWCXZCY7DNEMCHCBUMJO" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1769-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IT5Z2MQVCUU2PY7AOHLQUFDN44PCYHX5/#IT5Z2MQVCUU2PY7AOHLQUFDN44PCYHX5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1778-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HCMXP7OML46I3X4TRHDOHMURKLSPQK2P/#HCMXP7OML46I3X4TRHDOHMURKLSPQK2P" source="SUSE-SU"/>
    <description>
    The graphite2::TtfUtil::CmapSubtable12Lookup function in TtfUtil.cpp in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted Graphite smart font, a different vulnerability than CVE-2016-2797.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2801/">CVE-2016-2801 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2801">CVE-2016-2801 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821841" comment="firefox-38.7.0-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821889" comment="thunderbird-38.7.0-1.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162802" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2802</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2802" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2802" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2802" ref_url="https://www.suse.com/security/cve/CVE-2016-2802" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0731-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/E3N7NQ7QAE3HH2XCKBURJIR2VROQ4NP4/#E3N7NQ7QAE3HH2XCKBURJIR2VROQ4NP4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0733-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2TMO77LZI5PLXBX43DUX7QKP5MGYJXZ2/#2TMO77LZI5PLXBX43DUX7QKP5MGYJXZ2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PLVKBXELCWUE2MUFMRXSMQ4OLSTOQL3S/#PLVKBXELCWUE2MUFMRXSMQ4OLSTOQL3S" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0894-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GATTQJ2JXTSBNIMC3HLZJNWX2M3VKPGA/#GATTQJ2JXTSBNIMC3HLZJNWX2M3VKPGA" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1767-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MO2WO6ZWDV36CWCXZCY7DNEMCHCBUMJO/#MO2WO6ZWDV36CWCXZCY7DNEMCHCBUMJO" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1769-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IT5Z2MQVCUU2PY7AOHLQUFDN44PCYHX5/#IT5Z2MQVCUU2PY7AOHLQUFDN44PCYHX5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1778-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HCMXP7OML46I3X4TRHDOHMURKLSPQK2P/#HCMXP7OML46I3X4TRHDOHMURKLSPQK2P" source="SUSE-SU"/>
    <description>
    The graphite2::TtfUtil::CmapSubtable4NextCodepoint function in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted Graphite smart font.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2802/">CVE-2016-2802 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2802">CVE-2016-2802 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821841" comment="firefox-38.7.0-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821889" comment="thunderbird-38.7.0-1.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2805</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2805" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2805" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2805" ref_url="https://www.suse.com/security/cve/CVE-2016-2805" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002077.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the browser engine in Mozilla Firefox ESR 38.x before 38.8 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2805/">CVE-2016-2805 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2805">CVE-2016-2805 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/977333">SUSE bug 977333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977374">SUSE bug 977374</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822037" comment="firefox-45.1.0-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822081" comment="thunderbird-38.8.0-1.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2806</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2806" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2806" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2806" ref_url="https://www.suse.com/security/cve/CVE-2016-2806" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:1211-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HSYD27UUX3AENXAG6PKOXWIOJERTS6NS/#HSYD27UUX3AENXAG6PKOXWIOJERTS6NS" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1767-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MO2WO6ZWDV36CWCXZCY7DNEMCHCBUMJO/#MO2WO6ZWDV36CWCXZCY7DNEMCHCBUMJO" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1769-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IT5Z2MQVCUU2PY7AOHLQUFDN44PCYHX5/#IT5Z2MQVCUU2PY7AOHLQUFDN44PCYHX5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1778-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HCMXP7OML46I3X4TRHDOHMURKLSPQK2P/#HCMXP7OML46I3X4TRHDOHMURKLSPQK2P" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 46.0 and Firefox ESR 45.x before 45.1 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2806/">CVE-2016-2806 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2806">CVE-2016-2806 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/977375">SUSE bug 977375</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822037" comment="firefox-45.1.0-1.el7_2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162807" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2807</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2807" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2807" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2807" ref_url="https://www.suse.com/security/cve/CVE-2016-2807" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002077.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1211-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HSYD27UUX3AENXAG6PKOXWIOJERTS6NS/#HSYD27UUX3AENXAG6PKOXWIOJERTS6NS" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1767-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MO2WO6ZWDV36CWCXZCY7DNEMCHCBUMJO/#MO2WO6ZWDV36CWCXZCY7DNEMCHCBUMJO" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1769-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IT5Z2MQVCUU2PY7AOHLQUFDN44PCYHX5/#IT5Z2MQVCUU2PY7AOHLQUFDN44PCYHX5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1778-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HCMXP7OML46I3X4TRHDOHMURKLSPQK2P/#HCMXP7OML46I3X4TRHDOHMURKLSPQK2P" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 46.0, Firefox ESR 38.x before 38.8, and Firefox ESR 45.x before 45.1 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2807/">CVE-2016-2807 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2807">CVE-2016-2807 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/977333">SUSE bug 977333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977376">SUSE bug 977376</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822037" comment="firefox-45.1.0-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822081" comment="thunderbird-38.8.0-1.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162808" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2808</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2808" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2808" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2808" ref_url="https://www.suse.com/security/cve/CVE-2016-2808" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002077.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1211-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HSYD27UUX3AENXAG6PKOXWIOJERTS6NS/#HSYD27UUX3AENXAG6PKOXWIOJERTS6NS" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    The watch implementation in the JavaScript engine in Mozilla Firefox before 46.0, Firefox ESR 38.x before 38.8, and Firefox ESR 45.x before 45.1 allows remote attackers to execute arbitrary code or cause a denial of service (generation-count overflow, out-of-bounds HashMap write access, and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2808/">CVE-2016-2808 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2808">CVE-2016-2808 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/977333">SUSE bug 977333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977386">SUSE bug 977386</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822037" comment="firefox-45.1.0-1.el7_2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2814</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2814" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2814" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2814" ref_url="https://www.suse.com/security/cve/CVE-2016-2814" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002077.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1211-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HSYD27UUX3AENXAG6PKOXWIOJERTS6NS/#HSYD27UUX3AENXAG6PKOXWIOJERTS6NS" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the stagefright::SampleTable::parseSampleCencInfo function in libstagefright in Mozilla Firefox before 46.0, Firefox ESR 38.x before 38.8, and Firefox ESR 45.x before 45.1 allows remote attackers to execute arbitrary code via crafted CENC offsets that lead to mismanagement of the sizes table.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2814/">CVE-2016-2814 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2814">CVE-2016-2814 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/977333">SUSE bug 977333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977381">SUSE bug 977381</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822037" comment="firefox-45.1.0-1.el7_2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162818" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2818</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2818" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2818" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2818" ref_url="https://www.suse.com/security/cve/CVE-2016-2818" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1691-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002206.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1552-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OFVLXYUR62NIMEMDMMTTSVO7ZBXO6NRT/#OFVLXYUR62NIMEMDMMTTSVO7ZBXO6NRT" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1557-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ILY2VDGTTJZSAXCYD4RXVCUPXRIBH65Y/#ILY2VDGTTJZSAXCYD4RXVCUPXRIBH65Y" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1767-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MO2WO6ZWDV36CWCXZCY7DNEMCHCBUMJO/#MO2WO6ZWDV36CWCXZCY7DNEMCHCBUMJO" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1769-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IT5Z2MQVCUU2PY7AOHLQUFDN44PCYHX5/#IT5Z2MQVCUU2PY7AOHLQUFDN44PCYHX5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1778-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HCMXP7OML46I3X4TRHDOHMURKLSPQK2P/#HCMXP7OML46I3X4TRHDOHMURKLSPQK2P" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 47.0 and Firefox ESR 45.x before 45.2 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2818/">CVE-2016-2818 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2818">CVE-2016-2818 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/983549">SUSE bug 983549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983638">SUSE bug 983638</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822093" comment="firefox-45.2.0-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822131" comment="thunderbird-45.2-1.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162819" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2819</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2819" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2819" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2819" ref_url="https://www.suse.com/security/cve/CVE-2016-2819" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1691-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002206.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1552-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OFVLXYUR62NIMEMDMMTTSVO7ZBXO6NRT/#OFVLXYUR62NIMEMDMMTTSVO7ZBXO6NRT" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1557-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ILY2VDGTTJZSAXCYD4RXVCUPXRIBH65Y/#ILY2VDGTTJZSAXCYD4RXVCUPXRIBH65Y" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in Mozilla Firefox before 47.0 and Firefox ESR 45.x before 45.2 allows remote attackers to execute arbitrary code via foreign-context HTML5 fragments, as demonstrated by fragments within an SVG element.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2819/">CVE-2016-2819 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2819">CVE-2016-2819 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/983549">SUSE bug 983549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983655">SUSE bug 983655</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822093" comment="firefox-45.2.0-1.el7_2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162821" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2821</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2821" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2821" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2821" ref_url="https://www.suse.com/security/cve/CVE-2016-2821" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1691-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002206.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1552-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OFVLXYUR62NIMEMDMMTTSVO7ZBXO6NRT/#OFVLXYUR62NIMEMDMMTTSVO7ZBXO6NRT" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1557-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ILY2VDGTTJZSAXCYD4RXVCUPXRIBH65Y/#ILY2VDGTTJZSAXCYD4RXVCUPXRIBH65Y" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the mozilla::dom::Element class in Mozilla Firefox before 47.0 and Firefox ESR 45.x before 45.2, when contenteditable mode is enabled, allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) by triggering deletion of DOM elements that were created in the editor.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2821/">CVE-2016-2821 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2821">CVE-2016-2821 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/983549">SUSE bug 983549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983653">SUSE bug 983653</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822093" comment="firefox-45.2.0-1.el7_2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162822" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2822</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2822" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2822" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2822" ref_url="https://www.suse.com/security/cve/CVE-2016-2822" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1691-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002206.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1552-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OFVLXYUR62NIMEMDMMTTSVO7ZBXO6NRT/#OFVLXYUR62NIMEMDMMTTSVO7ZBXO6NRT" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1557-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ILY2VDGTTJZSAXCYD4RXVCUPXRIBH65Y/#ILY2VDGTTJZSAXCYD4RXVCUPXRIBH65Y" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 47.0 and Firefox ESR 45.x before 45.2 allow remote attackers to spoof the address bar via a SELECT element with a persistent menu.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2822/">CVE-2016-2822 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2822">CVE-2016-2822 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/983549">SUSE bug 983549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983652">SUSE bug 983652</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822093" comment="firefox-45.2.0-1.el7_2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162828" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2828</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2828" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2828" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2828" ref_url="https://www.suse.com/security/cve/CVE-2016-2828" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1691-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002206.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1552-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OFVLXYUR62NIMEMDMMTTSVO7ZBXO6NRT/#OFVLXYUR62NIMEMDMMTTSVO7ZBXO6NRT" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1557-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ILY2VDGTTJZSAXCYD4RXVCUPXRIBH65Y/#ILY2VDGTTJZSAXCYD4RXVCUPXRIBH65Y" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Mozilla Firefox before 47.0 and Firefox ESR 45.x before 45.2 allows remote attackers to execute arbitrary code via WebGL content that triggers texture access after destruction of the texture's recycle pool.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2828/">CVE-2016-2828 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2828">CVE-2016-2828 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/983549">SUSE bug 983549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983646">SUSE bug 983646</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822093" comment="firefox-45.2.0-1.el7_2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162830" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2830</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2830" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2830" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2830" ref_url="https://www.suse.com/security/cve/CVE-2016-2830" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1964-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HBRNDT43TAT3XC3DQZSVPGF7XNM7YD6/#5HBRNDT43TAT3XC3DQZSVPGF7XNM7YD6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2026-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5FOCHWPBBRB5OK6GTW52LXIMIMMZD6Q6/#5FOCHWPBBRB5OK6GTW52LXIMIMMZD6Q6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 preserve the network connection used for favicon resource retrieval after the associated browser window is closed, which makes it easier for remote web servers to track users by observing network traffic from multiple IP addresses.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2830/">CVE-2016-2830 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2830">CVE-2016-2830 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/983922">SUSE bug 983922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991809">SUSE bug 991809</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822210" comment="firefox-45.3.0-1.el7_2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162831" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2831</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2831" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2831" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2831" ref_url="https://www.suse.com/security/cve/CVE-2016-2831" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1691-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002206.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1552-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OFVLXYUR62NIMEMDMMTTSVO7ZBXO6NRT/#OFVLXYUR62NIMEMDMMTTSVO7ZBXO6NRT" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1557-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ILY2VDGTTJZSAXCYD4RXVCUPXRIBH65Y/#ILY2VDGTTJZSAXCYD4RXVCUPXRIBH65Y" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 47.0 and Firefox ESR 45.x before 45.2 do not ensure that the user approves the fullscreen and pointerlock settings, which allows remote attackers to cause a denial of service (UI outage), or conduct clickjacking or spoofing attacks, via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2831/">CVE-2016-2831 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2831">CVE-2016-2831 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/983549">SUSE bug 983549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983632">SUSE bug 983632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983643">SUSE bug 983643</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822093" comment="firefox-45.2.0-1.el7_2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162834" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2834</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2834" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2834" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2834" ref_url="https://www.suse.com/security/cve/CVE-2016-2834" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1691-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002858.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1552-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OFVLXYUR62NIMEMDMMTTSVO7ZBXO6NRT/#OFVLXYUR62NIMEMDMMTTSVO7ZBXO6NRT" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1557-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ILY2VDGTTJZSAXCYD4RXVCUPXRIBH65Y/#ILY2VDGTTJZSAXCYD4RXVCUPXRIBH65Y" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Mozilla Network Security Services (NSS) before 3.23, as used in Mozilla Firefox before 47.0, allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2834/">CVE-2016-2834 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2834">CVE-2016-2834 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/983549">SUSE bug 983549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983639">SUSE bug 983639</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822685" comment="nss-3.21.3-2.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822686" comment="nss-devel-3.21.3-2.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822687" comment="nss-pkcs11-devel-3.21.3-2.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822688" comment="nss-sysinit-3.21.3-2.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822689" comment="nss-tools-3.21.3-2.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822690" comment="nss-util-3.21.3-1.1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822691" comment="nss-util-devel-3.21.3-1.1.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2836</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2836" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2836" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2836" ref_url="https://www.suse.com/security/cve/CVE-2016-2836" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002245.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1964-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HBRNDT43TAT3XC3DQZSVPGF7XNM7YD6/#5HBRNDT43TAT3XC3DQZSVPGF7XNM7YD6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2026-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5FOCHWPBBRB5OK6GTW52LXIMIMMZD6Q6/#5FOCHWPBBRB5OK6GTW52LXIMIMMZD6Q6" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to Http2Session::Shutdown and SpdySession31::Shutdown, and other vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2836/">CVE-2016-2836 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2836">CVE-2016-2836 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/991809">SUSE bug 991809</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822210" comment="firefox-45.3.0-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822281" comment="thunderbird-45.3.0-1.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162837" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2837</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2837" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2837" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2837" ref_url="https://www.suse.com/security/cve/CVE-2016-2837" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002245.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1964-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HBRNDT43TAT3XC3DQZSVPGF7XNM7YD6/#5HBRNDT43TAT3XC3DQZSVPGF7XNM7YD6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2026-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5FOCHWPBBRB5OK6GTW52LXIMIMMZD6Q6/#5FOCHWPBBRB5OK6GTW52LXIMIMMZD6Q6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the ClearKey Content Decryption Module (CDM) in the Encrypted Media Extensions (EME) API in Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 might allow remote attackers to execute arbitrary code by providing a malformed video and leveraging a Gecko Media Plugin (GMP) sandbox bypass.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2837/">CVE-2016-2837 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2837">CVE-2016-2837 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/991809">SUSE bug 991809</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822210" comment="firefox-45.3.0-1.el7_2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162838" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2838</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2838" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2838" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2838" ref_url="https://www.suse.com/security/cve/CVE-2016-2838" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002245.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1964-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HBRNDT43TAT3XC3DQZSVPGF7XNM7YD6/#5HBRNDT43TAT3XC3DQZSVPGF7XNM7YD6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2026-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5FOCHWPBBRB5OK6GTW52LXIMIMMZD6Q6/#5FOCHWPBBRB5OK6GTW52LXIMIMMZD6Q6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the nsBidi::BracketData::AddOpening function in Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 allows remote attackers to execute arbitrary code via directional content in an SVG document.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2838/">CVE-2016-2838 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2838">CVE-2016-2838 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/991809">SUSE bug 991809</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822210" comment="firefox-45.3.0-1.el7_2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162842" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2842</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2842" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2842" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2842" ref_url="https://www.suse.com/security/cve/CVE-2016-2842" source="SUSE CVE"/>
    <description>
    The doapr_outch function in crypto/bio/b_print.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g does not verify that a certain memory allocation succeeds, which allows remote attackers to cause a denial of service (out-of-bounds write or memory consumption) or possibly have unspecified other impact via a long string, as demonstrated by a large amount of ASN.1 data, a different vulnerability than CVE-2016-0799.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2842/">CVE-2016-2842 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2842">CVE-2016-2842 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/969517">SUSE bug 969517</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822042" comment="openssl-1.0.1e-51.el7_2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822043" comment="openssl-devel-1.0.1e-51.el7_2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822044" comment="openssl-libs-1.0.1e-51.el7_2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822045" comment="openssl-perl-1.0.1e-51.el7_2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822046" comment="openssl-static-1.0.1e-51.el7_2.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162847" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2847</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2847" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2847" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2847" ref_url="https://www.suse.com/security/cve/CVE-2016-2847" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1672-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1707-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1937-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002207.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1382-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/63T7MPEXO4FJGO6VMAHMMK2GLCCK7TE7/#63T7MPEXO4FJGO6VMAHMMK2GLCCK7TE7" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G3VWHAWQDEVZ37XRAAROFMJVDBBQ6YF5/#G3VWHAWQDEVZ37XRAAROFMJVDBBQ6YF5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2290-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TVIOU3ZPOAQ2W3SQKZVQILGGHDJYFHOT/#TVIOU3ZPOAQ2W3SQKZVQILGGHDJYFHOT" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M3DY3J73NZK532BN4KZEFFGULVYJU3D2/#M3DY3J73NZK532BN4KZEFFGULVYJU3D2" source="SUSE-SU"/>
    <description>
    fs/pipe.c in the Linux kernel before 4.5 does not limit the amount of unread data in pipes, which allows local users to cause a denial of service (memory consumption) by creating many pipes with non-default sizes.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2847/">CVE-2016-2847 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2847">CVE-2016-2847 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1020452">SUSE bug 1020452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970948">SUSE bug 970948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974646">SUSE bug 974646</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822375" comment="kernel-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822376" comment="kernel-abi-whitelists-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822377" comment="kernel-debug-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822380" comment="kernel-doc-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822381" comment="kernel-headers-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822382" comment="kernel-tools-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822383" comment="kernel-tools-libs-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822385" comment="perf-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822386" comment="python-perf-3.10.0-514.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162857" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2857</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2857" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2857" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2857" ref_url="https://www.suse.com/security/cve/CVE-2016-2857" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002154.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1750-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SSRKERVXT73P7DSZ6HZX7CRK2ECW4YU5/#SSRKERVXT73P7DSZ6HZX7CRK2ECW4YU5" source="SUSE-SU"/>
    <description>
    The net_checksum_calculate function in net/checksum.c in QEMU allows local guest OS users to cause a denial of service (out-of-bounds heap read and crash) via the payload length in a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2857/">CVE-2016-2857 at SUSE</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2857">CVE-2016-2857 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/970037">SUSE bug 970037</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822766" comment="qemu-img-1.5.3-126.el7_3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822767" comment="qemu-kvm-1.5.3-126.el7_3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822768" comment="qemu-kvm-common-1.5.3-126.el7_3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822769" comment="qemu-kvm-tools-1.5.3-126.el7_3.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163068" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3068</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3068" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3068" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3068" ref_url="https://www.suse.com/security/cve/CVE-2016-3068" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1010-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001995.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1016-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PHDLEUYNBIL5FZIMFLESR3L7CFGYFZJD/#PHDLEUYNBIL5FZIMFLESR3L7CFGYFZJD" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1073-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OJUAL24Q7Y65ABKO3V2BKY3OMHKKCZS7/#OJUAL24Q7Y65ABKO3V2BKY3OMHKKCZS7" source="SUSE-SU"/>
    <description>
    Mercurial before 3.7.3 allows remote attackers to execute arbitrary code via a crafted git ext:: URL when cloning a subrepository.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3068/">CVE-2016-3068 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3068">CVE-2016-3068 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/973175">SUSE bug 973175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973177">SUSE bug 973177</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822038" comment="emacs-mercurial-2.6.2-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822039" comment="emacs-mercurial-el-2.6.2-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822040" comment="mercurial-2.6.2-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822041" comment="mercurial-hgk-2.6.2-6.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163069" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3069</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3069" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3069" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3069" ref_url="https://www.suse.com/security/cve/CVE-2016-3069" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1010-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001995.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1016-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PHDLEUYNBIL5FZIMFLESR3L7CFGYFZJD/#PHDLEUYNBIL5FZIMFLESR3L7CFGYFZJD" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1073-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OJUAL24Q7Y65ABKO3V2BKY3OMHKKCZS7/#OJUAL24Q7Y65ABKO3V2BKY3OMHKKCZS7" source="SUSE-SU"/>
    <description>
    Mercurial before 3.7.3 allows remote attackers to execute arbitrary code via a crafted name when converting a Git repository.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3069/">CVE-2016-3069 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3069">CVE-2016-3069 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/973175">SUSE bug 973175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973176">SUSE bug 973176</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822038" comment="emacs-mercurial-2.6.2-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822039" comment="emacs-mercurial-el-2.6.2-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822040" comment="mercurial-2.6.2-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822041" comment="mercurial-hgk-2.6.2-6.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163070" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3070</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3070" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3070" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3070" ref_url="https://www.suse.com/security/cve/CVE-2016-3070" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002903.html" source="SUSE-SU"/>
    <description>
    The trace_writeback_dirty_page implementation in include/trace/events/writeback.h in the Linux kernel before 4.4 improperly interacts with mm/migrate.c, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by triggering a certain page move.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3070/">CVE-2016-3070 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3070">CVE-2016-3070 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/979215">SUSE bug 979215</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822375" comment="kernel-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822376" comment="kernel-abi-whitelists-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822377" comment="kernel-debug-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822380" comment="kernel-doc-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822381" comment="kernel-headers-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822382" comment="kernel-tools-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822383" comment="kernel-tools-libs-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822385" comment="perf-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822386" comment="python-perf-3.10.0-514.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163075" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3075</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3075" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3075" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3075" ref_url="https://www.suse.com/security/cve/CVE-2016-3075" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the nss_dns implementation of the getnetbyname function in GNU C Library (aka glibc) before 2.24 allows context-dependent attackers to cause a denial of service (stack consumption and application crash) via a long name.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3075/">CVE-2016-3075 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3075">CVE-2016-3075 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1123874">SUSE bug 1123874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973164">SUSE bug 973164</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822368" comment="glibc-2.17-157.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822369" comment="glibc-common-2.17-157.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822370" comment="glibc-devel-2.17-157.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822371" comment="glibc-headers-2.17-157.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822372" comment="glibc-static-2.17-157.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822373" comment="glibc-utils-2.17-157.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822374" comment="nscd-2.17-157.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163092" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3092</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3092" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3092" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3092" ref_url="https://www.suse.com/security/cve/CVE-2016-3092" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0758-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014070.html" source="SUSE-SU"/>
		<reference ref_id="TID7010166" ref_url="https://www.suse.com/support/kb/doc/?id=7010166" source="SUSE-SU"/>
		<reference ref_id="TID7021433" ref_url="https://www.suse.com/support/kb/doc/?id=7021433" source="SUSE-SU"/>
    <description>
    The MultipartStream class in Apache Commons Fileupload before 1.3.2, as used in Apache Tomcat 7.x before 7.0.70, 8.x before 8.0.36, 8.5.x before 8.5.3, and 9.x before 9.0.0.M7 and other products, allows remote attackers to cause a denial of service (CPU consumption) via a long boundary string.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-3092/">CVE-2016-3092 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3092">CVE-2016-3092 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1068865">SUSE bug 1068865</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986359">SUSE bug 986359</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988489">SUSE bug 988489</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822586" comment="tomcat-7.0.69-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822587" comment="tomcat-admin-webapps-7.0.69-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822588" comment="tomcat-docs-webapp-7.0.69-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822589" comment="tomcat-el-2.2-api-7.0.69-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822590" comment="tomcat-javadoc-7.0.69-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822591" comment="tomcat-jsp-2.2-api-7.0.69-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822592" comment="tomcat-jsvc-7.0.69-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822593" comment="tomcat-lib-7.0.69-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822594" comment="tomcat-servlet-3.0-api-7.0.69-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822595" comment="tomcat-webapps-7.0.69-10.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163099" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3099</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3099" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3099" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3099" ref_url="https://www.suse.com/security/cve/CVE-2016-3099" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002292.html" source="SUSE-SU"/>
    <description>
    mod_ns in Red Hat Enterprise Linux Desktop 7, Red Hat Enterprise Linux HPC Node 7, Red Hat Enterprise Linux Server 7, and Red Hat Enterprise Linux Workstation 7 allows remote attackers to force the use of ciphers that were not intended to be enabled.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3099/">CVE-2016-3099 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3099">CVE-2016-3099 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/973996">SUSE bug 973996</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822602" comment="mod_nss-1.0.14-7.el7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163115" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3115</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3115" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3115" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3115" ref_url="https://www.suse.com/security/cve/CVE-2016-3115" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002338.html" source="SUSE-SU"/>
		<reference ref_id="TID7022102" ref_url="https://www.suse.com/support/kb/doc/?id=7022102" source="SUSE-SU"/>
		<reference ref_id="TID7022313" ref_url="https://www.suse.com/support/kb/doc/?id=7022313" source="SUSE-SU"/>
    <description>
    Multiple CRLF injection vulnerabilities in session.c in sshd in OpenSSH before 7.2p2 allow remote authenticated users to bypass intended shell-command restrictions via crafted X11 forwarding data, related to the (1) do_authenticated1 and (2) session_x11_req functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3115/">CVE-2016-3115 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3115">CVE-2016-3115 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1005738">SUSE bug 1005738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010950">SUSE bug 1010950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059233">SUSE bug 1059233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138392">SUSE bug 1138392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970632">SUSE bug 970632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992296">SUSE bug 992296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992991">SUSE bug 992991</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/996040">SUSE bug 996040</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009821890" comment="openssh-6.6.1p1-25.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821891" comment="openssh-askpass-6.6.1p1-25.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821892" comment="openssh-clients-6.6.1p1-25.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821893" comment="openssh-keycat-6.6.1p1-25.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821894" comment="openssh-ldap-6.6.1p1-25.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821895" comment="openssh-server-6.6.1p1-25.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821896" comment="openssh-server-sysvinit-6.6.1p1-25.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009821897" comment="pam_ssh_agent_auth-0.9.3-9.25.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163119" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3119</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3119" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3119" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3119" ref_url="https://www.suse.com/security/cve/CVE-2016-3119" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002016.html" source="SUSE-SU"/>
    <description>
    The process_db_args function in plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c in the LDAP KDB module in kadmind in MIT Kerberos 5 (aka krb5) through 1.13.4 and 1.14.x through 1.14.1 mishandles the DB argument, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted request to modify a principal.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3119/">CVE-2016-3119 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3119">CVE-2016-3119 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/971942">SUSE bug 971942</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822534" comment="krb5-devel-1.14.1-26.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822535" comment="krb5-libs-1.14.1-26.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822536" comment="krb5-pkinit-1.14.1-26.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822537" comment="krb5-server-1.14.1-26.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822538" comment="krb5-server-ldap-1.14.1-26.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822539" comment="krb5-workstation-1.14.1-26.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822540" comment="libkadm5-1.14.1-26.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163120" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3120</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3120" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3120" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3120" ref_url="https://www.suse.com/security/cve/CVE-2016-3120" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2136-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002222.html" source="SUSE-SU"/>
    <description>
    The validate_as_request function in kdc_util.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.13.6 and 1.4.x before 1.14.3, when restrict_anonymous_to_tgt is enabled, uses an incorrect client data structure, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via an S4U2Self request.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3120/">CVE-2016-3120 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3120">CVE-2016-3120 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/991088">SUSE bug 991088</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822534" comment="krb5-devel-1.14.1-26.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822535" comment="krb5-libs-1.14.1-26.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822536" comment="krb5-pkinit-1.14.1-26.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822537" comment="krb5-server-1.14.1-26.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822538" comment="krb5-server-ldap-1.14.1-26.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822539" comment="krb5-workstation-1.14.1-26.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822540" comment="libkadm5-1.14.1-26.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163134" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3134</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3134" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3134" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3134" ref_url="https://www.suse.com/security/cve/CVE-2016-3134" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1672-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1995-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2005-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002192.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2009-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2010-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002200.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002255.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1641-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IGM6U4LKVWMXO6ZXETRLFQOGMA4A2ZQL/#IGM6U4LKVWMXO6ZXETRLFQOGMA4A2ZQL" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G3VWHAWQDEVZ37XRAAROFMJVDBBQ6YF5/#G3VWHAWQDEVZ37XRAAROFMJVDBBQ6YF5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2290-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TVIOU3ZPOAQ2W3SQKZVQILGGHDJYFHOT/#TVIOU3ZPOAQ2W3SQKZVQILGGHDJYFHOT" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M3DY3J73NZK532BN4KZEFFGULVYJU3D2/#M3DY3J73NZK532BN4KZEFFGULVYJU3D2" source="SUSE-SU"/>
    <description>
    The netfilter subsystem in the Linux kernel through 4.5.2 does not validate certain offset fields, which allows local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3134/">CVE-2016-3134 at SUSE</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3134">CVE-2016-3134 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1020452">SUSE bug 1020452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052256">SUSE bug 1052256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115893">SUSE bug 1115893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971126">SUSE bug 971126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971793">SUSE bug 971793</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986362">SUSE bug 986362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986365">SUSE bug 986365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986377">SUSE bug 986377</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822286" comment="kernel-3.10.0-327.36.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822287" comment="kernel-abi-whitelists-3.10.0-327.36.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822288" comment="kernel-debug-3.10.0-327.36.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822291" comment="kernel-doc-3.10.0-327.36.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822292" comment="kernel-headers-3.10.0-327.36.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822293" comment="kernel-tools-3.10.0-327.36.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822294" comment="kernel-tools-libs-3.10.0-327.36.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822296" comment="perf-3.10.0-327.36.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822297" comment="python-perf-3.10.0-327.36.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163156" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3156</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3156" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3156" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3156" ref_url="https://www.suse.com/security/cve/CVE-2016-3156" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1019-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1672-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1707-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002207.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1382-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/63T7MPEXO4FJGO6VMAHMMK2GLCCK7TE7/#63T7MPEXO4FJGO6VMAHMMK2GLCCK7TE7" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G3VWHAWQDEVZ37XRAAROFMJVDBBQ6YF5/#G3VWHAWQDEVZ37XRAAROFMJVDBBQ6YF5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2290-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TVIOU3ZPOAQ2W3SQKZVQILGGHDJYFHOT/#TVIOU3ZPOAQ2W3SQKZVQILGGHDJYFHOT" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M3DY3J73NZK532BN4KZEFFGULVYJU3D2/#M3DY3J73NZK532BN4KZEFFGULVYJU3D2" source="SUSE-SU"/>
    <description>
    The IPv4 implementation in the Linux kernel before 4.5.2 mishandles destruction of device objects, which allows guest OS users to cause a denial of service (host OS networking outage) by arranging for a large number of IP addresses.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3156/">CVE-2016-3156 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3156">CVE-2016-3156 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1020452">SUSE bug 1020452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971360">SUSE bug 971360</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822375" comment="kernel-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822376" comment="kernel-abi-whitelists-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822377" comment="kernel-debug-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822380" comment="kernel-doc-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822381" comment="kernel-headers-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822382" comment="kernel-tools-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822383" comment="kernel-tools-libs-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822385" comment="perf-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822386" comment="python-perf-3.10.0-514.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163186" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3186</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3186" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3186" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3186" ref_url="https://www.suse.com/security/cve/CVE-2016-3186" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002331.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the readextension function in gif2tiff.c in LibTIFF 4.0.6 allows remote attackers to cause a denial of service (application crash) via a crafted GIF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3186/">CVE-2016-3186 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3186">CVE-2016-3186 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/973340">SUSE bug 973340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983268">SUSE bug 983268</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826088" comment="libtiff-4.0.3-32.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826089" comment="libtiff-devel-4.0.3-32.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826090" comment="libtiff-static-4.0.3-32.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826091" comment="libtiff-tools-4.0.3-32.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163191" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3191</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3191" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3191" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3191" ref_url="https://www.suse.com/security/cve/CVE-2016-3191" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
    <description>
    The compile_branch function in pcre_compile.c in PCRE 8.x before 8.39 and pcre2_compile.c in PCRE2 before 10.22 mishandles patterns containing an (*ACCEPT) substring in conjunction with nested parentheses, which allows remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow) via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, aka ZDI-CAN-3542.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-3191/">CVE-2016-3191 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3191">CVE-2016-3191 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/971741">SUSE bug 971741</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822065" comment="pcre-8.32-15.el7_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822066" comment="pcre-devel-8.32-15.el7_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822067" comment="pcre-static-8.32-15.el7_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822068" comment="pcre-tools-8.32-15.el7_2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163425" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3425</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3425" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3425" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3425" ref_url="https://www.suse.com/security/cve/CVE-2016-3425" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1222-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4CG6BFZVACHVAGOTBXKOHGCQKDPY5PIY/#4CG6BFZVACHVAGOTBXKOHGCQKDPY5PIY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1230-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2O7E5H23GAWZANGEOAVOCMRR2PEZQQHX/#2O7E5H23GAWZANGEOAVOCMRR2PEZQQHX" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1235-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MDUVHCTULLQTSPXV7WEWBA2K4DASYJAA/#MDUVHCTULLQTSPXV7WEWBA2K4DASYJAA" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1262-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QKZT7MK2WWAEBMNSVXWGHVBWPZBTE5K7/#QKZT7MK2WWAEBMNSVXWGHVBWPZBTE5K7" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1265-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WL22B3OVGLTQ52RVCLPFKALGHU7NB2I3/#WL22B3OVGLTQ52RVCLPFKALGHU7NB2I3" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u113, 7u99, and 8u77; Java SE Embedded 8u77; and JRockit R28.3.9 allows remote attackers to affect availability via vectors related to JAXP.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3425/">CVE-2016-3425 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3425">CVE-2016-3425 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/976340">SUSE bug 976340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979252">SUSE bug 979252</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822047" comment="java-1.6.0-openjdk-1.6.0.39-1.13.11.0.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822048" comment="java-1.6.0-openjdk-demo-1.6.0.39-1.13.11.0.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822049" comment="java-1.6.0-openjdk-devel-1.6.0.39-1.13.11.0.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822050" comment="java-1.6.0-openjdk-javadoc-1.6.0.39-1.13.11.0.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822051" comment="java-1.6.0-openjdk-src-1.6.0.39-1.13.11.0.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822017" comment="java-1.7.0-openjdk-1.7.0.101-2.6.6.1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822018" comment="java-1.7.0-openjdk-accessibility-1.7.0.101-2.6.6.1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822019" comment="java-1.7.0-openjdk-demo-1.7.0.101-2.6.6.1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822020" comment="java-1.7.0-openjdk-devel-1.7.0.101-2.6.6.1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822021" comment="java-1.7.0-openjdk-headless-1.7.0.101-2.6.6.1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822022" comment="java-1.7.0-openjdk-javadoc-1.7.0.101-2.6.6.1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822023" comment="java-1.7.0-openjdk-src-1.7.0.101-2.6.6.1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822004" comment="java-1.8.0-openjdk-1.8.0.91-0.b14.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822005" comment="java-1.8.0-openjdk-accessibility-1.8.0.91-0.b14.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822006" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.91-0.b14.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822007" comment="java-1.8.0-openjdk-debug-1.8.0.91-0.b14.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822008" comment="java-1.8.0-openjdk-demo-1.8.0.91-0.b14.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822009" comment="java-1.8.0-openjdk-demo-debug-1.8.0.91-0.b14.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822010" comment="java-1.8.0-openjdk-devel-1.8.0.91-0.b14.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822011" comment="java-1.8.0-openjdk-devel-debug-1.8.0.91-0.b14.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822012" comment="java-1.8.0-openjdk-headless-1.8.0.91-0.b14.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822013" comment="java-1.8.0-openjdk-javadoc-1.8.0.91-0.b14.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822014" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.91-0.b14.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822015" comment="java-1.8.0-openjdk-src-1.8.0.91-0.b14.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822016" comment="java-1.8.0-openjdk-src-debug-1.8.0.91-0.b14.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163426" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3426</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3426" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3426" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3426" ref_url="https://www.suse.com/security/cve/CVE-2016-3426" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1222-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4CG6BFZVACHVAGOTBXKOHGCQKDPY5PIY/#4CG6BFZVACHVAGOTBXKOHGCQKDPY5PIY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1262-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QKZT7MK2WWAEBMNSVXWGHVBWPZBTE5K7/#QKZT7MK2WWAEBMNSVXWGHVBWPZBTE5K7" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 8u77 and Java SE Embedded 8u77 allows remote attackers to affect confidentiality via vectors related to JCE.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3426/">CVE-2016-3426 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3426">CVE-2016-3426 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/976340">SUSE bug 976340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979252">SUSE bug 979252</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822004" comment="java-1.8.0-openjdk-1.8.0.91-0.b14.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822005" comment="java-1.8.0-openjdk-accessibility-1.8.0.91-0.b14.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822006" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.91-0.b14.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822007" comment="java-1.8.0-openjdk-debug-1.8.0.91-0.b14.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822008" comment="java-1.8.0-openjdk-demo-1.8.0.91-0.b14.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822009" comment="java-1.8.0-openjdk-demo-debug-1.8.0.91-0.b14.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822010" comment="java-1.8.0-openjdk-devel-1.8.0.91-0.b14.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822011" comment="java-1.8.0-openjdk-devel-debug-1.8.0.91-0.b14.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822012" comment="java-1.8.0-openjdk-headless-1.8.0.91-0.b14.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822013" comment="java-1.8.0-openjdk-javadoc-1.8.0.91-0.b14.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822014" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.91-0.b14.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822015" comment="java-1.8.0-openjdk-src-1.8.0.91-0.b14.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822016" comment="java-1.8.0-openjdk-src-debug-1.8.0.91-0.b14.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163427" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3427</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3427" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3427" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3427" ref_url="https://www.suse.com/security/cve/CVE-2016-3427" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1222-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4CG6BFZVACHVAGOTBXKOHGCQKDPY5PIY/#4CG6BFZVACHVAGOTBXKOHGCQKDPY5PIY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1230-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2O7E5H23GAWZANGEOAVOCMRR2PEZQQHX/#2O7E5H23GAWZANGEOAVOCMRR2PEZQQHX" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1235-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MDUVHCTULLQTSPXV7WEWBA2K4DASYJAA/#MDUVHCTULLQTSPXV7WEWBA2K4DASYJAA" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1262-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QKZT7MK2WWAEBMNSVXWGHVBWPZBTE5K7/#QKZT7MK2WWAEBMNSVXWGHVBWPZBTE5K7" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1265-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WL22B3OVGLTQ52RVCLPFKALGHU7NB2I3/#WL22B3OVGLTQ52RVCLPFKALGHU7NB2I3" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u113, 7u99, and 8u77; Java SE Embedded 8u77; and JRockit R28.3.9 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JMX.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3427/">CVE-2016-3427 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3427">CVE-2016-3427 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1011805">SUSE bug 1011805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976340">SUSE bug 976340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979252">SUSE bug 979252</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822047" comment="java-1.6.0-openjdk-1.6.0.39-1.13.11.0.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822048" comment="java-1.6.0-openjdk-demo-1.6.0.39-1.13.11.0.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822049" comment="java-1.6.0-openjdk-devel-1.6.0.39-1.13.11.0.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822050" comment="java-1.6.0-openjdk-javadoc-1.6.0.39-1.13.11.0.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822051" comment="java-1.6.0-openjdk-src-1.6.0.39-1.13.11.0.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822017" comment="java-1.7.0-openjdk-1.7.0.101-2.6.6.1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822018" comment="java-1.7.0-openjdk-accessibility-1.7.0.101-2.6.6.1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822019" comment="java-1.7.0-openjdk-demo-1.7.0.101-2.6.6.1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822020" comment="java-1.7.0-openjdk-devel-1.7.0.101-2.6.6.1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822021" comment="java-1.7.0-openjdk-headless-1.7.0.101-2.6.6.1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822022" comment="java-1.7.0-openjdk-javadoc-1.7.0.101-2.6.6.1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822023" comment="java-1.7.0-openjdk-src-1.7.0.101-2.6.6.1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822004" comment="java-1.8.0-openjdk-1.8.0.91-0.b14.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822005" comment="java-1.8.0-openjdk-accessibility-1.8.0.91-0.b14.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822006" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.91-0.b14.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822007" comment="java-1.8.0-openjdk-debug-1.8.0.91-0.b14.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822008" comment="java-1.8.0-openjdk-demo-1.8.0.91-0.b14.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822009" comment="java-1.8.0-openjdk-demo-debug-1.8.0.91-0.b14.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822010" comment="java-1.8.0-openjdk-devel-1.8.0.91-0.b14.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822011" comment="java-1.8.0-openjdk-devel-debug-1.8.0.91-0.b14.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822012" comment="java-1.8.0-openjdk-headless-1.8.0.91-0.b14.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822013" comment="java-1.8.0-openjdk-javadoc-1.8.0.91-0.b14.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822014" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.91-0.b14.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822015" comment="java-1.8.0-openjdk-src-1.8.0.91-0.b14.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822016" comment="java-1.8.0-openjdk-src-debug-1.8.0.91-0.b14.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163452" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3452</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3452" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3452" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3452" ref_url="https://www.suse.com/security/cve/CVE-2016-3452" source="SUSE CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.10 and earlier and MariaDB before 5.5.49, 10.0.x before 10.0.25, and 10.1.x before 10.1.14 allows remote attackers to affect confidentiality via vectors related to Server: Security: Encryption.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3452/">CVE-2016-3452 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3452">CVE-2016-3452 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/989910">SUSE bug 989910</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822211" comment="mariadb-5.5.50-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822212" comment="mariadb-bench-5.5.50-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822213" comment="mariadb-devel-5.5.50-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822214" comment="mariadb-embedded-5.5.50-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822215" comment="mariadb-embedded-devel-5.5.50-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822216" comment="mariadb-libs-5.5.50-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822217" comment="mariadb-server-5.5.50-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822218" comment="mariadb-test-5.5.50-1.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163458" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3458</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3458" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3458" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3458" ref_url="https://www.suse.com/security/cve/CVE-2016-3458" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002198.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2050-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WYC4BL7HFWLYKDXEZ63S5MVTCVXNJVSE/#WYC4BL7HFWLYKDXEZ63S5MVTCVXNJVSE" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2051-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2HXYPDD65WHR2XSOW5VDPW65KA46HJ4H/#2HXYPDD65WHR2XSOW5VDPW65KA46HJ4H" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2052-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ASICMX3SQDKWSSDE4S6AUXKVMULMUPRO/#ASICMX3SQDKWSSDE4S6AUXKVMULMUPRO" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7V3COKV66UBIAAYCIPIFONGXX3K5RBEK/#7V3COKV66UBIAAYCIPIFONGXX3K5RBEK" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u115, 7u101, and 8u92; and Java SE Embedded 8u91 allows remote attackers to affect integrity via vectors related to CORBA.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-02-22"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3458/">CVE-2016-3458 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3458">CVE-2016-3458 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/989732">SUSE bug 989732</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822270" comment="java-1.6.0-openjdk-1.6.0.40-1.13.12.5.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822271" comment="java-1.6.0-openjdk-demo-1.6.0.40-1.13.12.5.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822272" comment="java-1.6.0-openjdk-devel-1.6.0.40-1.13.12.5.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822273" comment="java-1.6.0-openjdk-javadoc-1.6.0.40-1.13.12.5.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822274" comment="java-1.6.0-openjdk-src-1.6.0.40-1.13.12.5.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822181" comment="java-1.7.0-openjdk-1.7.0.111-2.6.7.2.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822182" comment="java-1.7.0-openjdk-accessibility-1.7.0.111-2.6.7.2.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822183" comment="java-1.7.0-openjdk-demo-1.7.0.111-2.6.7.2.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822184" comment="java-1.7.0-openjdk-devel-1.7.0.111-2.6.7.2.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822185" comment="java-1.7.0-openjdk-headless-1.7.0.111-2.6.7.2.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822186" comment="java-1.7.0-openjdk-javadoc-1.7.0.111-2.6.7.2.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822187" comment="java-1.7.0-openjdk-src-1.7.0.111-2.6.7.2.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822140" comment="java-1.8.0-openjdk-1.8.0.101-3.b13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822141" comment="java-1.8.0-openjdk-accessibility-1.8.0.101-3.b13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822142" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.101-3.b13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822143" comment="java-1.8.0-openjdk-debug-1.8.0.101-3.b13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822144" comment="java-1.8.0-openjdk-demo-1.8.0.101-3.b13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822145" comment="java-1.8.0-openjdk-demo-debug-1.8.0.101-3.b13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822146" comment="java-1.8.0-openjdk-devel-1.8.0.101-3.b13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822147" comment="java-1.8.0-openjdk-devel-debug-1.8.0.101-3.b13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822148" comment="java-1.8.0-openjdk-headless-1.8.0.101-3.b13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822149" comment="java-1.8.0-openjdk-headless-debug-1.8.0.101-3.b13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822150" comment="java-1.8.0-openjdk-javadoc-1.8.0.101-3.b13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822151" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.101-3.b13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822152" comment="java-1.8.0-openjdk-src-1.8.0.101-3.b13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822153" comment="java-1.8.0-openjdk-src-debug-1.8.0.101-3.b13.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163477" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3477</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3477" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3477" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3477" ref_url="https://www.suse.com/security/cve/CVE-2016-3477" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002279.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2746-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3CUYJAGC7JTKPQYLE2ZTEPBVQ3J4BFHO/#3CUYJAGC7JTKPQYLE2ZTEPBVQ3J4BFHO" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2769-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BOIVZNRI2WQ56MPKE6BVFPLBB4RKMOJF/#BOIVZNRI2WQ56MPKE6BVFPLBB4RKMOJF" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2788-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2XSIJ4CL46B7JEPC7XYAF6F24TA3GW4B/#2XSIJ4CL46B7JEPC7XYAF6F24TA3GW4B" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.49 and earlier, 5.6.30 and earlier, and 5.7.12 and earlier and MariaDB before 5.5.50, 10.0.x before 10.0.26, and 10.1.x before 10.1.15 allows local users to affect confidentiality, integrity, and availability via vectors related to Server: Parser.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-02-21"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3477/">CVE-2016-3477 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3477">CVE-2016-3477 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/989913">SUSE bug 989913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991616">SUSE bug 991616</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822211" comment="mariadb-5.5.50-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822212" comment="mariadb-bench-5.5.50-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822213" comment="mariadb-devel-5.5.50-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822214" comment="mariadb-embedded-5.5.50-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822215" comment="mariadb-embedded-devel-5.5.50-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822216" comment="mariadb-libs-5.5.50-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822217" comment="mariadb-server-5.5.50-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822218" comment="mariadb-test-5.5.50-1.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163492" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3492</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3492" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3492" ref_url="https://www.suse.com/security/cve/CVE-2016-3492" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2932-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2933-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002425.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2769-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BOIVZNRI2WQ56MPKE6BVFPLBB4RKMOJF/#BOIVZNRI2WQ56MPKE6BVFPLBB4RKMOJF" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2788-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2XSIJ4CL46B7JEPC7XYAF6F24TA3GW4B/#2XSIJ4CL46B7JEPC7XYAF6F24TA3GW4B" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3025-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QJSFC32WO5YWZA6552W5XZXTGD2XJXPA/#QJSFC32WO5YWZA6552W5XZXTGD2XJXPA" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3028-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QHAQ2AORXI3O4NFNDTK4VIKCWAM3IJEU/#QHAQ2AORXI3O4NFNDTK4VIKCWAM3IJEU" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.51 and earlier, 5.6.32 and earlier, and 5.7.14 and earlier allows remote authenticated users to affect availability via vectors related to Server: Optimizer.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3492/">CVE-2016-3492 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3492">CVE-2016-3492 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1005555">SUSE bug 1005555</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008318">SUSE bug 1008318</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822547" comment="mariadb-5.5.52-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822548" comment="mariadb-bench-5.5.52-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822549" comment="mariadb-devel-5.5.52-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822550" comment="mariadb-embedded-5.5.52-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822551" comment="mariadb-embedded-devel-5.5.52-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822552" comment="mariadb-libs-5.5.52-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822553" comment="mariadb-server-5.5.52-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822554" comment="mariadb-test-5.5.52-1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163500" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3500</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3500" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3500" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3500" ref_url="https://www.suse.com/security/cve/CVE-2016-3500" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002198.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2050-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WYC4BL7HFWLYKDXEZ63S5MVTCVXNJVSE/#WYC4BL7HFWLYKDXEZ63S5MVTCVXNJVSE" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2051-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2HXYPDD65WHR2XSOW5VDPW65KA46HJ4H/#2HXYPDD65WHR2XSOW5VDPW65KA46HJ4H" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2052-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ASICMX3SQDKWSSDE4S6AUXKVMULMUPRO/#ASICMX3SQDKWSSDE4S6AUXKVMULMUPRO" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7V3COKV66UBIAAYCIPIFONGXX3K5RBEK/#7V3COKV66UBIAAYCIPIFONGXX3K5RBEK" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u115, 7u101, and 8u92; Java SE Embedded 8u91; and JRockit R28.3.10 allows remote attackers to affect availability via vectors related to JAXP, a different vulnerability than CVE-2016-3508.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3500/">CVE-2016-3500 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3500">CVE-2016-3500 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/989730">SUSE bug 989730</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822270" comment="java-1.6.0-openjdk-1.6.0.40-1.13.12.5.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822271" comment="java-1.6.0-openjdk-demo-1.6.0.40-1.13.12.5.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822272" comment="java-1.6.0-openjdk-devel-1.6.0.40-1.13.12.5.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822273" comment="java-1.6.0-openjdk-javadoc-1.6.0.40-1.13.12.5.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822274" comment="java-1.6.0-openjdk-src-1.6.0.40-1.13.12.5.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822181" comment="java-1.7.0-openjdk-1.7.0.111-2.6.7.2.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822182" comment="java-1.7.0-openjdk-accessibility-1.7.0.111-2.6.7.2.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822183" comment="java-1.7.0-openjdk-demo-1.7.0.111-2.6.7.2.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822184" comment="java-1.7.0-openjdk-devel-1.7.0.111-2.6.7.2.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822185" comment="java-1.7.0-openjdk-headless-1.7.0.111-2.6.7.2.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822186" comment="java-1.7.0-openjdk-javadoc-1.7.0.111-2.6.7.2.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822187" comment="java-1.7.0-openjdk-src-1.7.0.111-2.6.7.2.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822140" comment="java-1.8.0-openjdk-1.8.0.101-3.b13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822141" comment="java-1.8.0-openjdk-accessibility-1.8.0.101-3.b13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822142" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.101-3.b13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822143" comment="java-1.8.0-openjdk-debug-1.8.0.101-3.b13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822144" comment="java-1.8.0-openjdk-demo-1.8.0.101-3.b13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822145" comment="java-1.8.0-openjdk-demo-debug-1.8.0.101-3.b13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822146" comment="java-1.8.0-openjdk-devel-1.8.0.101-3.b13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822147" comment="java-1.8.0-openjdk-devel-debug-1.8.0.101-3.b13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822148" comment="java-1.8.0-openjdk-headless-1.8.0.101-3.b13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822149" comment="java-1.8.0-openjdk-headless-debug-1.8.0.101-3.b13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822150" comment="java-1.8.0-openjdk-javadoc-1.8.0.101-3.b13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822151" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.101-3.b13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822152" comment="java-1.8.0-openjdk-src-1.8.0.101-3.b13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822153" comment="java-1.8.0-openjdk-src-debug-1.8.0.101-3.b13.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163508" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3508</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3508" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3508" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3508" ref_url="https://www.suse.com/security/cve/CVE-2016-3508" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002198.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2050-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WYC4BL7HFWLYKDXEZ63S5MVTCVXNJVSE/#WYC4BL7HFWLYKDXEZ63S5MVTCVXNJVSE" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2051-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2HXYPDD65WHR2XSOW5VDPW65KA46HJ4H/#2HXYPDD65WHR2XSOW5VDPW65KA46HJ4H" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2052-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ASICMX3SQDKWSSDE4S6AUXKVMULMUPRO/#ASICMX3SQDKWSSDE4S6AUXKVMULMUPRO" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7V3COKV66UBIAAYCIPIFONGXX3K5RBEK/#7V3COKV66UBIAAYCIPIFONGXX3K5RBEK" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u115, 7u101, and 8u92; Java SE Embedded 8u91; and JRockit R28.3.10 allows remote attackers to affect availability via vectors related to JAXP, a different vulnerability than CVE-2016-3500.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3508/">CVE-2016-3508 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3508">CVE-2016-3508 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/989731">SUSE bug 989731</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822270" comment="java-1.6.0-openjdk-1.6.0.40-1.13.12.5.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822271" comment="java-1.6.0-openjdk-demo-1.6.0.40-1.13.12.5.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822272" comment="java-1.6.0-openjdk-devel-1.6.0.40-1.13.12.5.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822273" comment="java-1.6.0-openjdk-javadoc-1.6.0.40-1.13.12.5.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822274" comment="java-1.6.0-openjdk-src-1.6.0.40-1.13.12.5.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822181" comment="java-1.7.0-openjdk-1.7.0.111-2.6.7.2.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822182" comment="java-1.7.0-openjdk-accessibility-1.7.0.111-2.6.7.2.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822183" comment="java-1.7.0-openjdk-demo-1.7.0.111-2.6.7.2.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822184" comment="java-1.7.0-openjdk-devel-1.7.0.111-2.6.7.2.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822185" comment="java-1.7.0-openjdk-headless-1.7.0.111-2.6.7.2.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822186" comment="java-1.7.0-openjdk-javadoc-1.7.0.111-2.6.7.2.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822187" comment="java-1.7.0-openjdk-src-1.7.0.111-2.6.7.2.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822140" comment="java-1.8.0-openjdk-1.8.0.101-3.b13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822141" comment="java-1.8.0-openjdk-accessibility-1.8.0.101-3.b13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822142" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.101-3.b13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822143" comment="java-1.8.0-openjdk-debug-1.8.0.101-3.b13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822144" comment="java-1.8.0-openjdk-demo-1.8.0.101-3.b13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822145" comment="java-1.8.0-openjdk-demo-debug-1.8.0.101-3.b13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822146" comment="java-1.8.0-openjdk-devel-1.8.0.101-3.b13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822147" comment="java-1.8.0-openjdk-devel-debug-1.8.0.101-3.b13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822148" comment="java-1.8.0-openjdk-headless-1.8.0.101-3.b13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822149" comment="java-1.8.0-openjdk-headless-debug-1.8.0.101-3.b13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822150" comment="java-1.8.0-openjdk-javadoc-1.8.0.101-3.b13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822151" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.101-3.b13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822152" comment="java-1.8.0-openjdk-src-1.8.0.101-3.b13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822153" comment="java-1.8.0-openjdk-src-debug-1.8.0.101-3.b13.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163521" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3521</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3521" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3521" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3521" ref_url="https://www.suse.com/security/cve/CVE-2016-3521" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002279.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2746-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3CUYJAGC7JTKPQYLE2ZTEPBVQ3J4BFHO/#3CUYJAGC7JTKPQYLE2ZTEPBVQ3J4BFHO" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2769-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BOIVZNRI2WQ56MPKE6BVFPLBB4RKMOJF/#BOIVZNRI2WQ56MPKE6BVFPLBB4RKMOJF" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2788-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2XSIJ4CL46B7JEPC7XYAF6F24TA3GW4B/#2XSIJ4CL46B7JEPC7XYAF6F24TA3GW4B" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.49 and earlier, 5.6.30 and earlier, and 5.7.12 and earlier and MariaDB before 5.5.50, 10.0.x before 10.0.26, and 10.1.x before 10.1.15 allows remote authenticated users to affect availability via vectors related to Server: Types.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3521/">CVE-2016-3521 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3521">CVE-2016-3521 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/989919">SUSE bug 989919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991616">SUSE bug 991616</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822211" comment="mariadb-5.5.50-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822212" comment="mariadb-bench-5.5.50-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822213" comment="mariadb-devel-5.5.50-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822214" comment="mariadb-embedded-5.5.50-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822215" comment="mariadb-embedded-devel-5.5.50-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822216" comment="mariadb-libs-5.5.50-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822217" comment="mariadb-server-5.5.50-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822218" comment="mariadb-test-5.5.50-1.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163550" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3550</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3550" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3550" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3550" ref_url="https://www.suse.com/security/cve/CVE-2016-3550" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002198.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2050-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WYC4BL7HFWLYKDXEZ63S5MVTCVXNJVSE/#WYC4BL7HFWLYKDXEZ63S5MVTCVXNJVSE" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2051-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2HXYPDD65WHR2XSOW5VDPW65KA46HJ4H/#2HXYPDD65WHR2XSOW5VDPW65KA46HJ4H" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2052-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ASICMX3SQDKWSSDE4S6AUXKVMULMUPRO/#ASICMX3SQDKWSSDE4S6AUXKVMULMUPRO" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7V3COKV66UBIAAYCIPIFONGXX3K5RBEK/#7V3COKV66UBIAAYCIPIFONGXX3K5RBEK" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u115, 7u101, and 8u92 and Java SE Embedded 8u91 allows remote attackers to affect confidentiality via vectors related to Hotspot.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-02-26"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3550/">CVE-2016-3550 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3550">CVE-2016-3550 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/989733">SUSE bug 989733</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822270" comment="java-1.6.0-openjdk-1.6.0.40-1.13.12.5.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822271" comment="java-1.6.0-openjdk-demo-1.6.0.40-1.13.12.5.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822272" comment="java-1.6.0-openjdk-devel-1.6.0.40-1.13.12.5.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822273" comment="java-1.6.0-openjdk-javadoc-1.6.0.40-1.13.12.5.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822274" comment="java-1.6.0-openjdk-src-1.6.0.40-1.13.12.5.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822181" comment="java-1.7.0-openjdk-1.7.0.111-2.6.7.2.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822182" comment="java-1.7.0-openjdk-accessibility-1.7.0.111-2.6.7.2.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822183" comment="java-1.7.0-openjdk-demo-1.7.0.111-2.6.7.2.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822184" comment="java-1.7.0-openjdk-devel-1.7.0.111-2.6.7.2.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822185" comment="java-1.7.0-openjdk-headless-1.7.0.111-2.6.7.2.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822186" comment="java-1.7.0-openjdk-javadoc-1.7.0.111-2.6.7.2.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822187" comment="java-1.7.0-openjdk-src-1.7.0.111-2.6.7.2.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822140" comment="java-1.8.0-openjdk-1.8.0.101-3.b13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822141" comment="java-1.8.0-openjdk-accessibility-1.8.0.101-3.b13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822142" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.101-3.b13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822143" comment="java-1.8.0-openjdk-debug-1.8.0.101-3.b13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822144" comment="java-1.8.0-openjdk-demo-1.8.0.101-3.b13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822145" comment="java-1.8.0-openjdk-demo-debug-1.8.0.101-3.b13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822146" comment="java-1.8.0-openjdk-devel-1.8.0.101-3.b13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822147" comment="java-1.8.0-openjdk-devel-debug-1.8.0.101-3.b13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822148" comment="java-1.8.0-openjdk-headless-1.8.0.101-3.b13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822149" comment="java-1.8.0-openjdk-headless-debug-1.8.0.101-3.b13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822150" comment="java-1.8.0-openjdk-javadoc-1.8.0.101-3.b13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822151" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.101-3.b13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822152" comment="java-1.8.0-openjdk-src-1.8.0.101-3.b13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822153" comment="java-1.8.0-openjdk-src-debug-1.8.0.101-3.b13.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163587" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3587</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3587" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3587" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3587" ref_url="https://www.suse.com/security/cve/CVE-2016-3587" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002198.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002298.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2051-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2HXYPDD65WHR2XSOW5VDPW65KA46HJ4H/#2HXYPDD65WHR2XSOW5VDPW65KA46HJ4H" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2451-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YJJ34KZ3MW5MTS5HAZ73C7VNHMGMF3WQ/#YJJ34KZ3MW5MTS5HAZ73C7VNHMGMF3WQ" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 8u92 and Java SE Embedded 8u91 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Hotspot.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3587/">CVE-2016-3587 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3587">CVE-2016-3587 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/989721">SUSE bug 989721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998845">SUSE bug 998845</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822140" comment="java-1.8.0-openjdk-1.8.0.101-3.b13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822141" comment="java-1.8.0-openjdk-accessibility-1.8.0.101-3.b13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822142" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.101-3.b13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822143" comment="java-1.8.0-openjdk-debug-1.8.0.101-3.b13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822144" comment="java-1.8.0-openjdk-demo-1.8.0.101-3.b13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822145" comment="java-1.8.0-openjdk-demo-debug-1.8.0.101-3.b13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822146" comment="java-1.8.0-openjdk-devel-1.8.0.101-3.b13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822147" comment="java-1.8.0-openjdk-devel-debug-1.8.0.101-3.b13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822148" comment="java-1.8.0-openjdk-headless-1.8.0.101-3.b13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822149" comment="java-1.8.0-openjdk-headless-debug-1.8.0.101-3.b13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822150" comment="java-1.8.0-openjdk-javadoc-1.8.0.101-3.b13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822151" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.101-3.b13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822152" comment="java-1.8.0-openjdk-src-1.8.0.101-3.b13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822153" comment="java-1.8.0-openjdk-src-debug-1.8.0.101-3.b13.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163598" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3598</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3598" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3598" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3598" ref_url="https://www.suse.com/security/cve/CVE-2016-3598" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002198.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2726-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002395.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2050-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WYC4BL7HFWLYKDXEZ63S5MVTCVXNJVSE/#WYC4BL7HFWLYKDXEZ63S5MVTCVXNJVSE" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2051-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2HXYPDD65WHR2XSOW5VDPW65KA46HJ4H/#2HXYPDD65WHR2XSOW5VDPW65KA46HJ4H" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2052-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ASICMX3SQDKWSSDE4S6AUXKVMULMUPRO/#ASICMX3SQDKWSSDE4S6AUXKVMULMUPRO" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7V3COKV66UBIAAYCIPIFONGXX3K5RBEK/#7V3COKV66UBIAAYCIPIFONGXX3K5RBEK" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 8u92 and Java SE Embedded 8u91 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Libraries, a different vulnerability than CVE-2016-3610.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3598/">CVE-2016-3598 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3598">CVE-2016-3598 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1009280">SUSE bug 1009280</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989723">SUSE bug 989723</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822181" comment="java-1.7.0-openjdk-1.7.0.111-2.6.7.2.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822182" comment="java-1.7.0-openjdk-accessibility-1.7.0.111-2.6.7.2.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822183" comment="java-1.7.0-openjdk-demo-1.7.0.111-2.6.7.2.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822184" comment="java-1.7.0-openjdk-devel-1.7.0.111-2.6.7.2.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822185" comment="java-1.7.0-openjdk-headless-1.7.0.111-2.6.7.2.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822186" comment="java-1.7.0-openjdk-javadoc-1.7.0.111-2.6.7.2.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822187" comment="java-1.7.0-openjdk-src-1.7.0.111-2.6.7.2.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822140" comment="java-1.8.0-openjdk-1.8.0.101-3.b13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822141" comment="java-1.8.0-openjdk-accessibility-1.8.0.101-3.b13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822142" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.101-3.b13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822143" comment="java-1.8.0-openjdk-debug-1.8.0.101-3.b13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822144" comment="java-1.8.0-openjdk-demo-1.8.0.101-3.b13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822145" comment="java-1.8.0-openjdk-demo-debug-1.8.0.101-3.b13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822146" comment="java-1.8.0-openjdk-devel-1.8.0.101-3.b13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822147" comment="java-1.8.0-openjdk-devel-debug-1.8.0.101-3.b13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822148" comment="java-1.8.0-openjdk-headless-1.8.0.101-3.b13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822149" comment="java-1.8.0-openjdk-headless-debug-1.8.0.101-3.b13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822150" comment="java-1.8.0-openjdk-javadoc-1.8.0.101-3.b13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822151" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.101-3.b13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822152" comment="java-1.8.0-openjdk-src-1.8.0.101-3.b13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822153" comment="java-1.8.0-openjdk-src-debug-1.8.0.101-3.b13.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163606" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3606</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3606" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3606" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3606" ref_url="https://www.suse.com/security/cve/CVE-2016-3606" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002198.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2050-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WYC4BL7HFWLYKDXEZ63S5MVTCVXNJVSE/#WYC4BL7HFWLYKDXEZ63S5MVTCVXNJVSE" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2051-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2HXYPDD65WHR2XSOW5VDPW65KA46HJ4H/#2HXYPDD65WHR2XSOW5VDPW65KA46HJ4H" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2052-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ASICMX3SQDKWSSDE4S6AUXKVMULMUPRO/#ASICMX3SQDKWSSDE4S6AUXKVMULMUPRO" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7V3COKV66UBIAAYCIPIFONGXX3K5RBEK/#7V3COKV66UBIAAYCIPIFONGXX3K5RBEK" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u101 and 8u92 and Java SE Embedded 8u91 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Hotspot.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-3606/">CVE-2016-3606 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3606">CVE-2016-3606 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/989722">SUSE bug 989722</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822270" comment="java-1.6.0-openjdk-1.6.0.40-1.13.12.5.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822271" comment="java-1.6.0-openjdk-demo-1.6.0.40-1.13.12.5.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822272" comment="java-1.6.0-openjdk-devel-1.6.0.40-1.13.12.5.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822273" comment="java-1.6.0-openjdk-javadoc-1.6.0.40-1.13.12.5.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822274" comment="java-1.6.0-openjdk-src-1.6.0.40-1.13.12.5.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822181" comment="java-1.7.0-openjdk-1.7.0.111-2.6.7.2.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822182" comment="java-1.7.0-openjdk-accessibility-1.7.0.111-2.6.7.2.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822183" comment="java-1.7.0-openjdk-demo-1.7.0.111-2.6.7.2.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822184" comment="java-1.7.0-openjdk-devel-1.7.0.111-2.6.7.2.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822185" comment="java-1.7.0-openjdk-headless-1.7.0.111-2.6.7.2.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822186" comment="java-1.7.0-openjdk-javadoc-1.7.0.111-2.6.7.2.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822187" comment="java-1.7.0-openjdk-src-1.7.0.111-2.6.7.2.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822140" comment="java-1.8.0-openjdk-1.8.0.101-3.b13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822141" comment="java-1.8.0-openjdk-accessibility-1.8.0.101-3.b13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822142" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.101-3.b13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822143" comment="java-1.8.0-openjdk-debug-1.8.0.101-3.b13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822144" comment="java-1.8.0-openjdk-demo-1.8.0.101-3.b13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822145" comment="java-1.8.0-openjdk-demo-debug-1.8.0.101-3.b13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822146" comment="java-1.8.0-openjdk-devel-1.8.0.101-3.b13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822147" comment="java-1.8.0-openjdk-devel-debug-1.8.0.101-3.b13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822148" comment="java-1.8.0-openjdk-headless-1.8.0.101-3.b13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822149" comment="java-1.8.0-openjdk-headless-debug-1.8.0.101-3.b13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822150" comment="java-1.8.0-openjdk-javadoc-1.8.0.101-3.b13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822151" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.101-3.b13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822152" comment="java-1.8.0-openjdk-src-1.8.0.101-3.b13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822153" comment="java-1.8.0-openjdk-src-debug-1.8.0.101-3.b13.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163610" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3610</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3610" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3610" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3610" ref_url="https://www.suse.com/security/cve/CVE-2016-3610" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002198.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2050-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WYC4BL7HFWLYKDXEZ63S5MVTCVXNJVSE/#WYC4BL7HFWLYKDXEZ63S5MVTCVXNJVSE" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2051-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2HXYPDD65WHR2XSOW5VDPW65KA46HJ4H/#2HXYPDD65WHR2XSOW5VDPW65KA46HJ4H" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2052-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ASICMX3SQDKWSSDE4S6AUXKVMULMUPRO/#ASICMX3SQDKWSSDE4S6AUXKVMULMUPRO" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7V3COKV66UBIAAYCIPIFONGXX3K5RBEK/#7V3COKV66UBIAAYCIPIFONGXX3K5RBEK" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 8u92 and Java SE Embedded 8u91 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Libraries, a different vulnerability than CVE-2016-3598.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3610/">CVE-2016-3610 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3610">CVE-2016-3610 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/989725">SUSE bug 989725</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822181" comment="java-1.7.0-openjdk-1.7.0.111-2.6.7.2.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822182" comment="java-1.7.0-openjdk-accessibility-1.7.0.111-2.6.7.2.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822183" comment="java-1.7.0-openjdk-demo-1.7.0.111-2.6.7.2.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822184" comment="java-1.7.0-openjdk-devel-1.7.0.111-2.6.7.2.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822185" comment="java-1.7.0-openjdk-headless-1.7.0.111-2.6.7.2.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822186" comment="java-1.7.0-openjdk-javadoc-1.7.0.111-2.6.7.2.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822187" comment="java-1.7.0-openjdk-src-1.7.0.111-2.6.7.2.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822140" comment="java-1.8.0-openjdk-1.8.0.101-3.b13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822141" comment="java-1.8.0-openjdk-accessibility-1.8.0.101-3.b13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822142" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.101-3.b13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822143" comment="java-1.8.0-openjdk-debug-1.8.0.101-3.b13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822144" comment="java-1.8.0-openjdk-demo-1.8.0.101-3.b13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822145" comment="java-1.8.0-openjdk-demo-debug-1.8.0.101-3.b13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822146" comment="java-1.8.0-openjdk-devel-1.8.0.101-3.b13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822147" comment="java-1.8.0-openjdk-devel-debug-1.8.0.101-3.b13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822148" comment="java-1.8.0-openjdk-headless-1.8.0.101-3.b13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822149" comment="java-1.8.0-openjdk-headless-debug-1.8.0.101-3.b13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822150" comment="java-1.8.0-openjdk-javadoc-1.8.0.101-3.b13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822151" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.101-3.b13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822152" comment="java-1.8.0-openjdk-src-1.8.0.101-3.b13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822153" comment="java-1.8.0-openjdk-src-debug-1.8.0.101-3.b13.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163615" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3615</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3615" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3615" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3615" ref_url="https://www.suse.com/security/cve/CVE-2016-3615" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002279.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2746-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3CUYJAGC7JTKPQYLE2ZTEPBVQ3J4BFHO/#3CUYJAGC7JTKPQYLE2ZTEPBVQ3J4BFHO" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2769-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BOIVZNRI2WQ56MPKE6BVFPLBB4RKMOJF/#BOIVZNRI2WQ56MPKE6BVFPLBB4RKMOJF" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2788-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2XSIJ4CL46B7JEPC7XYAF6F24TA3GW4B/#2XSIJ4CL46B7JEPC7XYAF6F24TA3GW4B" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.49 and earlier, 5.6.30 and earlier, and 5.7.12 and earlier and MariaDB before 5.5.50, 10.0.x before 10.0.26, and 10.1.x before 10.1.15 allows remote authenticated users to affect availability via vectors related to Server: DML.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3615/">CVE-2016-3615 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3615">CVE-2016-3615 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/989922">SUSE bug 989922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991616">SUSE bug 991616</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822211" comment="mariadb-5.5.50-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822212" comment="mariadb-bench-5.5.50-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822213" comment="mariadb-devel-5.5.50-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822214" comment="mariadb-embedded-5.5.50-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822215" comment="mariadb-embedded-devel-5.5.50-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822216" comment="mariadb-libs-5.5.50-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822217" comment="mariadb-server-5.5.50-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822218" comment="mariadb-test-5.5.50-1.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163616" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3616</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3616" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3616" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3616" ref_url="https://www.suse.com/security/cve/CVE-2016-3616" source="SUSE CVE"/>
    <description>
    The cjpeg utility in libjpeg allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) or execute arbitrary code via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-3616/">CVE-2016-3616 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3616">CVE-2016-3616 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1160884">SUSE bug 1160884</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826082" comment="libjpeg-turbo-1.2.90-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826083" comment="libjpeg-turbo-devel-1.2.90-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826084" comment="libjpeg-turbo-static-1.2.90-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826085" comment="libjpeg-turbo-utils-1.2.90-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826086" comment="turbojpeg-1.2.90-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826087" comment="turbojpeg-devel-1.2.90-8.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163627" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3627</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3627" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3627" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3627" ref_url="https://www.suse.com/security/cve/CVE-2016-3627" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1594-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VPIWVKUKHLGF55QF7LRF4BCZDRFSIAA5/#VPIWVKUKHLGF55QF7LRF4BCZDRFSIAA5" source="SUSE-SU"/>
    <description>
    The xmlStringGetNodeList function in tree.c in libxml2 2.9.3 and earlier, when used in recovery mode, allows context-dependent attackers to cause a denial of service (infinite recursion, stack consumption, and application crash) via a crafted XML document.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3627/">CVE-2016-3627 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3627">CVE-2016-3627 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1026099">SUSE bug 1026099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026101">SUSE bug 1026101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/972335">SUSE bug 972335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975947">SUSE bug 975947</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822112" comment="libxml2-2.9.1-6.el7_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822113" comment="libxml2-devel-2.9.1-6.el7_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822114" comment="libxml2-python-2.9.1-6.el7_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822115" comment="libxml2-static-2.9.1-6.el7_2.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163632" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3632</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3632" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3632" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3632" ref_url="https://www.suse.com/security/cve/CVE-2016-3632" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004228.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1834-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/35GXTTHY6R26WIDWDJILDL4B3SUNHWM4/#35GXTTHY6R26WIDWDJILDL4B3SUNHWM4" source="SUSE-SU"/>
    <description>
    The _TIFFVGetField function in tif_dirinfo.c in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (out-of-bounds write) or execute arbitrary code via a crafted TIFF image.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3632/">CVE-2016-3632 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3632">CVE-2016-3632 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1007276">SUSE bug 1007276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974621">SUSE bug 974621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983436">SUSE bug 983436</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822206" comment="libtiff-4.0.3-25.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822207" comment="libtiff-devel-4.0.3-25.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822208" comment="libtiff-static-4.0.3-25.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822209" comment="libtiff-tools-4.0.3-25.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163672" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3672</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3672" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3672" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3672" ref_url="https://www.suse.com/security/cve/CVE-2016-3672" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1937-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002218.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1641-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IGM6U4LKVWMXO6ZXETRLFQOGMA4A2ZQL/#IGM6U4LKVWMXO6ZXETRLFQOGMA4A2ZQL" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G3VWHAWQDEVZ37XRAAROFMJVDBBQ6YF5/#G3VWHAWQDEVZ37XRAAROFMJVDBBQ6YF5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2184-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NA2C2XZHCLKYOLPO7FG5N5MJ7TLHYLY2/#NA2C2XZHCLKYOLPO7FG5N5MJ7TLHYLY2" source="SUSE-SU"/>
    <description>
    The arch_pick_mmap_layout function in arch/x86/mm/mmap.c in the Linux kernel through 4.5.2 does not properly randomize the legacy base address, which makes it easier for local users to defeat the intended restrictions on the ADDR_NO_RANDOMIZE flag, and bypass the ASLR protection mechanism for a setuid or setgid program, by disabling stack-consumption resource limits.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3672/">CVE-2016-3672 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3672">CVE-2016-3672 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/974308">SUSE bug 974308</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824165" comment="kernel-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824166" comment="kernel-abi-whitelists-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824167" comment="kernel-debug-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824170" comment="kernel-doc-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824171" comment="kernel-headers-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824172" comment="kernel-tools-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824173" comment="kernel-tools-libs-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824175" comment="perf-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824176" comment="python-perf-3.10.0-862.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163698" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3698</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3698" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3698" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3698" ref_url="https://www.suse.com/security/cve/CVE-2016-3698" source="SUSE CVE"/>
    <description>
    libndp before 1.6, as used in NetworkManager, does not properly validate the origin of Neighbor Discovery Protocol (NDP) messages, which allows remote attackers to conduct man-in-the-middle attacks or cause a denial of service (network connectivity disruption) by advertising a node as a router from a non-local network.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3698/">CVE-2016-3698 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3698">CVE-2016-3698 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/979645">SUSE bug 979645</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822082" comment="libndp-1.2-6.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822083" comment="libndp-devel-1.2-6.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163699" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3699</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3699" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3699" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3699" ref_url="https://www.suse.com/security/cve/CVE-2016-3699" source="SUSE CVE"/>
    <description>
    The Linux kernel, as used in Red Hat Enterprise Linux 7.2 and Red Hat Enterprise MRG 2 and when booted with UEFI Secure Boot enabled, allows local users to bypass intended Secure Boot restrictions and execute untrusted code by appending ACPI tables to the initrd.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3699/">CVE-2016-3699 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3699">CVE-2016-3699 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1001153">SUSE bug 1001153</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822375" comment="kernel-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822376" comment="kernel-abi-whitelists-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822377" comment="kernel-debug-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822380" comment="kernel-doc-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822381" comment="kernel-headers-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822382" comment="kernel-tools-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822383" comment="kernel-tools-libs-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822385" comment="perf-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822386" comment="python-perf-3.10.0-514.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163705" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3705</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3705" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3705" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3705" ref_url="https://www.suse.com/security/cve/CVE-2016-3705" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1594-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VPIWVKUKHLGF55QF7LRF4BCZDRFSIAA5/#VPIWVKUKHLGF55QF7LRF4BCZDRFSIAA5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1595-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U4WPGCASE7GW5OQYSFLRWUX74F6KB6OW/#U4WPGCASE7GW5OQYSFLRWUX74F6KB6OW" source="SUSE-SU"/>
    <description>
    The (1) xmlParserEntityCheck and (2) xmlParseAttValueComplex functions in parser.c in libxml2 2.9.3 do not properly keep track of the recursion depth, which allows context-dependent attackers to cause a denial of service (stack consumption and application crash) via a crafted XML document containing a large number of nested entity references.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-02"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3705/">CVE-2016-3705 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3705">CVE-2016-3705 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1017497">SUSE bug 1017497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975947">SUSE bug 975947</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822112" comment="libxml2-2.9.1-6.el7_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822113" comment="libxml2-devel-2.9.1-6.el7_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822114" comment="libxml2-python-2.9.1-6.el7_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822115" comment="libxml2-static-2.9.1-6.el7_2.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163710" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3710</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3710" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3710" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3710" ref_url="https://www.suse.com/security/cve/CVE-2016-3710" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002332.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002394.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1750-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SSRKERVXT73P7DSZ6HZX7CRK2ECW4YU5/#SSRKERVXT73P7DSZ6HZX7CRK2ECW4YU5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SEGSV5T3S2ZKXR3FBHOEH6ZATP7GNXOI/#SEGSV5T3S2ZKXR3FBHOEH6ZATP7GNXOI" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2497-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SN42T3R5VY52V47YKP7INPGVVIOYAXJM/#SN42T3R5VY52V47YKP7INPGVVIOYAXJM" source="SUSE-SU"/>
    <description>
    The VGA module in QEMU improperly performs bounds checking on banked access to video memory, which allows local guest OS administrators to execute arbitrary code on the host by changing access modes after setting the bank register, aka the "Dark Portal" issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3710/">CVE-2016-3710 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3710">CVE-2016-3710 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/978158">SUSE bug 978158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978164">SUSE bug 978164</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978167">SUSE bug 978167</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822052" comment="libcacard-1.5.3-105.el7_2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822053" comment="libcacard-devel-1.5.3-105.el7_2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822054" comment="libcacard-tools-1.5.3-105.el7_2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822055" comment="qemu-img-1.5.3-105.el7_2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822056" comment="qemu-kvm-1.5.3-105.el7_2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822057" comment="qemu-kvm-common-1.5.3-105.el7_2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822058" comment="qemu-kvm-tools-1.5.3-105.el7_2.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163712" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3712</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3712" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3712" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3712" ref_url="https://www.suse.com/security/cve/CVE-2016-3712" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002394.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1750-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SSRKERVXT73P7DSZ6HZX7CRK2ECW4YU5/#SSRKERVXT73P7DSZ6HZX7CRK2ECW4YU5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SEGSV5T3S2ZKXR3FBHOEH6ZATP7GNXOI/#SEGSV5T3S2ZKXR3FBHOEH6ZATP7GNXOI" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2497-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SN42T3R5VY52V47YKP7INPGVVIOYAXJM/#SN42T3R5VY52V47YKP7INPGVVIOYAXJM" source="SUSE-SU"/>
    <description>
    Integer overflow in the VGA module in QEMU allows local guest OS users to cause a denial of service (out-of-bounds read and QEMU process crash) by editing VGA registers in VBE mode.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3712/">CVE-2016-3712 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3712">CVE-2016-3712 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/978160">SUSE bug 978160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978164">SUSE bug 978164</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978167">SUSE bug 978167</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822487" comment="qemu-img-1.5.3-126.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822488" comment="qemu-kvm-1.5.3-126.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822489" comment="qemu-kvm-common-1.5.3-126.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822490" comment="qemu-kvm-tools-1.5.3-126.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163714" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3714</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3714" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3714" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3714" ref_url="https://www.suse.com/security/cve/CVE-2016-3714" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002060.html" source="SUSE-SU"/>
		<reference ref_id="TID7017647" ref_url="https://www.suse.com/support/kb/doc/?id=7017647" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1261-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WKWAHVYPT6K2TRMSA5GIUXYCTLN46U5E/#WKWAHVYPT6K2TRMSA5GIUXYCTLN46U5E" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1266-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7X32DIQCGWWNC337VPXE2ZH6EECEWZVP/#7X32DIQCGWWNC337VPXE2ZH6EECEWZVP" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1326-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5265XQV2YZBJ62MXFWYEOMMNZRBEJ22T/#5265XQV2YZBJ62MXFWYEOMMNZRBEJ22T" source="SUSE-SU"/>
    <description>
    The (1) EPHEMERAL, (2) HTTPS, (3) MVG, (4) MSL, (5) TEXT, (6) SHOW, (7) WIN, and (8) PLT coders in ImageMagick before 6.9.3-10 and 7.x before 7.0.1-1 allow remote attackers to execute arbitrary code via shell metacharacters in a crafted image, aka "ImageTragick."
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-31"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3714/">CVE-2016-3714 at SUSE</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3714">CVE-2016-3714 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1000484">SUSE bug 1000484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057163">SUSE bug 1057163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105592">SUSE bug 1105592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978061">SUSE bug 978061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980401">SUSE bug 980401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982178">SUSE bug 982178</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822059" comment="ImageMagick-6.7.8.9-13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822060" comment="ImageMagick-c++-6.7.8.9-13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822061" comment="ImageMagick-c++-devel-6.7.8.9-13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822062" comment="ImageMagick-devel-6.7.8.9-13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822063" comment="ImageMagick-doc-6.7.8.9-13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822064" comment="ImageMagick-perl-6.7.8.9-13.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163715" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3715</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3715" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3715" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3715" ref_url="https://www.suse.com/security/cve/CVE-2016-3715" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1261-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WKWAHVYPT6K2TRMSA5GIUXYCTLN46U5E/#WKWAHVYPT6K2TRMSA5GIUXYCTLN46U5E" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1266-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7X32DIQCGWWNC337VPXE2ZH6EECEWZVP/#7X32DIQCGWWNC337VPXE2ZH6EECEWZVP" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1326-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5265XQV2YZBJ62MXFWYEOMMNZRBEJ22T/#5265XQV2YZBJ62MXFWYEOMMNZRBEJ22T" source="SUSE-SU"/>
    <description>
    The EPHEMERAL coder in ImageMagick before 6.9.3-10 and 7.x before 7.0.1-1 allows remote attackers to delete arbitrary files via a crafted image.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3715/">CVE-2016-3715 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3715">CVE-2016-3715 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1000484">SUSE bug 1000484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057163">SUSE bug 1057163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105592">SUSE bug 1105592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978061">SUSE bug 978061</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822059" comment="ImageMagick-6.7.8.9-13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822060" comment="ImageMagick-c++-6.7.8.9-13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822061" comment="ImageMagick-c++-devel-6.7.8.9-13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822062" comment="ImageMagick-devel-6.7.8.9-13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822063" comment="ImageMagick-doc-6.7.8.9-13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822064" comment="ImageMagick-perl-6.7.8.9-13.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163716" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3716</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3716" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3716" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3716" ref_url="https://www.suse.com/security/cve/CVE-2016-3716" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1261-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WKWAHVYPT6K2TRMSA5GIUXYCTLN46U5E/#WKWAHVYPT6K2TRMSA5GIUXYCTLN46U5E" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1266-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7X32DIQCGWWNC337VPXE2ZH6EECEWZVP/#7X32DIQCGWWNC337VPXE2ZH6EECEWZVP" source="SUSE-SU"/>
    <description>
    The MSL coder in ImageMagick before 6.9.3-10 and 7.x before 7.0.1-1 allows remote attackers to move arbitrary files via a crafted image.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3716/">CVE-2016-3716 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3716">CVE-2016-3716 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1000484">SUSE bug 1000484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057163">SUSE bug 1057163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105592">SUSE bug 1105592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978061">SUSE bug 978061</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822059" comment="ImageMagick-6.7.8.9-13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822060" comment="ImageMagick-c++-6.7.8.9-13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822061" comment="ImageMagick-c++-devel-6.7.8.9-13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822062" comment="ImageMagick-devel-6.7.8.9-13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822063" comment="ImageMagick-doc-6.7.8.9-13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822064" comment="ImageMagick-perl-6.7.8.9-13.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163717" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3717</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3717" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3717" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3717" ref_url="https://www.suse.com/security/cve/CVE-2016-3717" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1261-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WKWAHVYPT6K2TRMSA5GIUXYCTLN46U5E/#WKWAHVYPT6K2TRMSA5GIUXYCTLN46U5E" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1266-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7X32DIQCGWWNC337VPXE2ZH6EECEWZVP/#7X32DIQCGWWNC337VPXE2ZH6EECEWZVP" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1326-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5265XQV2YZBJ62MXFWYEOMMNZRBEJ22T/#5265XQV2YZBJ62MXFWYEOMMNZRBEJ22T" source="SUSE-SU"/>
    <description>
    The LABEL coder in ImageMagick before 6.9.3-10 and 7.x before 7.0.1-1 allows remote attackers to read arbitrary files via a crafted image.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3717/">CVE-2016-3717 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3717">CVE-2016-3717 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1000484">SUSE bug 1000484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057163">SUSE bug 1057163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105592">SUSE bug 1105592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978061">SUSE bug 978061</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822059" comment="ImageMagick-6.7.8.9-13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822060" comment="ImageMagick-c++-6.7.8.9-13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822061" comment="ImageMagick-c++-devel-6.7.8.9-13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822062" comment="ImageMagick-devel-6.7.8.9-13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822063" comment="ImageMagick-doc-6.7.8.9-13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822064" comment="ImageMagick-perl-6.7.8.9-13.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163718" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3718</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3718" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3718" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3718" ref_url="https://www.suse.com/security/cve/CVE-2016-3718" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1261-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WKWAHVYPT6K2TRMSA5GIUXYCTLN46U5E/#WKWAHVYPT6K2TRMSA5GIUXYCTLN46U5E" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1266-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7X32DIQCGWWNC337VPXE2ZH6EECEWZVP/#7X32DIQCGWWNC337VPXE2ZH6EECEWZVP" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1326-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5265XQV2YZBJ62MXFWYEOMMNZRBEJ22T/#5265XQV2YZBJ62MXFWYEOMMNZRBEJ22T" source="SUSE-SU"/>
    <description>
    The (1) HTTP and (2) FTP coders in ImageMagick before 6.9.3-10 and 7.x before 7.0.1-1 allow remote attackers to conduct server-side request forgery (SSRF) attacks via a crafted image.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3718/">CVE-2016-3718 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3718">CVE-2016-3718 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1000484">SUSE bug 1000484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057163">SUSE bug 1057163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105592">SUSE bug 1105592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978061">SUSE bug 978061</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822059" comment="ImageMagick-6.7.8.9-13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822060" comment="ImageMagick-c++-6.7.8.9-13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822061" comment="ImageMagick-c++-devel-6.7.8.9-13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822062" comment="ImageMagick-devel-6.7.8.9-13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822063" comment="ImageMagick-doc-6.7.8.9-13.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822064" comment="ImageMagick-perl-6.7.8.9-13.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163841" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3841</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3841" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3841" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3841" ref_url="https://www.suse.com/security/cve/CVE-2016-3841" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002828.html" source="SUSE-SU"/>
    <description>
    The IPv6 stack in the Linux kernel before 4.3.3 mishandles options data, which allows local users to gain privileges or cause a denial of service (use-after-free and system crash) via a crafted sendmsg system call.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3841/">CVE-2016-3841 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3841">CVE-2016-3841 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1052256">SUSE bug 1052256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115893">SUSE bug 1115893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992566">SUSE bug 992566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992569">SUSE bug 992569</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822375" comment="kernel-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822376" comment="kernel-abi-whitelists-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822377" comment="kernel-debug-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822380" comment="kernel-doc-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822381" comment="kernel-headers-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822382" comment="kernel-tools-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822383" comment="kernel-tools-libs-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822385" comment="perf-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822386" comment="python-perf-3.10.0-514.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163945" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3945</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3945" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3945" ref_url="https://www.suse.com/security/cve/CVE-2016-3945" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003984.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in the (1) cvt_by_strip and (2) cvt_by_tile functions in the tiff2rgba tool in LibTIFF 4.0.6 and earlier, when -b mode is enabled, allow remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted TIFF image, which triggers an out-of-bounds write.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3945/">CVE-2016-3945 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3945">CVE-2016-3945 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/974614">SUSE bug 974614</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822206" comment="libtiff-4.0.3-25.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822207" comment="libtiff-devel-4.0.3-25.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822208" comment="libtiff-static-4.0.3-25.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822209" comment="libtiff-tools-4.0.3-25.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163948" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3948</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3948" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3948" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3948" ref_url="https://www.suse.com/security/cve/CVE-2016-3948" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002212.html" source="SUSE-SU"/>
    <description>
    Squid 3.x before 3.5.16 and 4.x before 4.0.8 improperly perform bounds checking, which allows remote attackers to cause a denial of service via a crafted HTTP response, related to Vary headers.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-07"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-3948/">CVE-2016-3948 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3948">CVE-2016-3948 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/973783">SUSE bug 973783</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822596" comment="squid-3.5.20-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822597" comment="squid-migration-script-3.5.20-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822598" comment="squid-sysvinit-3.5.20-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163990" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3990</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3990" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3990" ref_url="https://www.suse.com/security/cve/CVE-2016-3990" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002331.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the horizontalDifference8 function in tif_pixarlog.c in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted TIFF image to tiffcp.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3990/">CVE-2016-3990 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3990">CVE-2016-3990 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/975069">SUSE bug 975069</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822206" comment="libtiff-4.0.3-25.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822207" comment="libtiff-devel-4.0.3-25.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822208" comment="libtiff-static-4.0.3-25.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822209" comment="libtiff-tools-4.0.3-25.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163991" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3991</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3991" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3991" ref_url="https://www.suse.com/security/cve/CVE-2016-3991" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002326.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the loadImage function in the tiffcrop tool in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (out-of-bounds write) or execute arbitrary code via a crafted TIFF image with zero tiles.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3991/">CVE-2016-3991 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3991">CVE-2016-3991 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/975070">SUSE bug 975070</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822206" comment="libtiff-4.0.3-25.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822207" comment="libtiff-devel-4.0.3-25.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822208" comment="libtiff-static-4.0.3-25.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822209" comment="libtiff-tools-4.0.3-25.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164020" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4020</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4020" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4020" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4020" ref_url="https://www.suse.com/security/cve/CVE-2016-4020" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002334.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1750-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SSRKERVXT73P7DSZ6HZX7CRK2ECW4YU5/#SSRKERVXT73P7DSZ6HZX7CRK2ECW4YU5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SEGSV5T3S2ZKXR3FBHOEH6ZATP7GNXOI/#SEGSV5T3S2ZKXR3FBHOEH6ZATP7GNXOI" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2497-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SN42T3R5VY52V47YKP7INPGVVIOYAXJM/#SN42T3R5VY52V47YKP7INPGVVIOYAXJM" source="SUSE-SU"/>
    <description>
    The patch_instruction function in hw/i386/kvmvapic.c in QEMU does not initialize the imm32 variable, which allows local guest OS administrators to obtain sensitive information from host stack memory by accessing the Task Priority Register (TPR).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4020/">CVE-2016-4020 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4020">CVE-2016-4020 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/975700">SUSE bug 975700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975907">SUSE bug 975907</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823194" comment="qemu-img-1.5.3-141.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823195" comment="qemu-kvm-1.5.3-141.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823196" comment="qemu-kvm-common-1.5.3-141.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823197" comment="qemu-kvm-tools-1.5.3-141.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164051" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4051</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4051" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4051" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4051" ref_url="https://www.suse.com/security/cve/CVE-2016-4051" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002226.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in cachemgr.cgi in Squid 2.x, 3.x before 3.5.17, and 4.x before 4.0.9 might allow remote attackers to cause a denial of service or execute arbitrary code by seeding manager reports with crafted data.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4051/">CVE-2016-4051 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4051">CVE-2016-4051 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/976553">SUSE bug 976553</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822084" comment="squid-3.3.8-26.el7_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822085" comment="squid-sysvinit-3.3.8-26.el7_2.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164052" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4052</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4052" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4052" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4052" ref_url="https://www.suse.com/security/cve/CVE-2016-4052" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002212.html" source="SUSE-SU"/>
    <description>
    Multiple stack-based buffer overflows in Squid 3.x before 3.5.17 and 4.x before 4.0.9 allow remote HTTP servers to cause a denial of service or execute arbitrary code via crafted Edge Side Includes (ESI) responses.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4052/">CVE-2016-4052 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4052">CVE-2016-4052 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/976556">SUSE bug 976556</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822084" comment="squid-3.3.8-26.el7_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822085" comment="squid-sysvinit-3.3.8-26.el7_2.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164053" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4053</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4053" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4053" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4053" ref_url="https://www.suse.com/security/cve/CVE-2016-4053" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002212.html" source="SUSE-SU"/>
    <description>
    Squid 3.x before 3.5.17 and 4.x before 4.0.9 allow remote attackers to obtain sensitive stack layout information via crafted Edge Side Includes (ESI) responses, related to incorrect use of assert and compiler optimization.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4053/">CVE-2016-4053 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4053">CVE-2016-4053 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/976556">SUSE bug 976556</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822084" comment="squid-3.3.8-26.el7_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822085" comment="squid-sysvinit-3.3.8-26.el7_2.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164054" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4054</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4054" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4054" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4054" ref_url="https://www.suse.com/security/cve/CVE-2016-4054" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002212.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in Squid 3.x before 3.5.17 and 4.x before 4.0.9 allows remote attackers to execute arbitrary code via crafted Edge Side Includes (ESI) responses.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4054/">CVE-2016-4054 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4054">CVE-2016-4054 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/976556">SUSE bug 976556</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822084" comment="squid-3.3.8-26.el7_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822085" comment="squid-sysvinit-3.3.8-26.el7_2.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164300" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4300</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4300" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4300" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4300" ref_url="https://www.suse.com/security/cve/CVE-2016-4300" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002169.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2036-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PKPZOJ6M6PEAXJXLQRB6DDQBTJI3IZLC/#PKPZOJ6M6PEAXJXLQRB6DDQBTJI3IZLC" source="SUSE-SU"/>
    <description>
    Integer overflow in the read_SubStreamsInfo function in archive_read_support_format_7zip.c in libarchive before 3.2.1 allows remote attackers to execute arbitrary code via a 7zip file with a large number of substreams, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4300/">CVE-2016-4300 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4300">CVE-2016-4300 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/985832">SUSE bug 985832</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822282" comment="bsdcpio-3.1.2-10.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822283" comment="bsdtar-3.1.2-10.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822284" comment="libarchive-3.1.2-10.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822285" comment="libarchive-devel-3.1.2-10.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164302" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4302</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4302" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4302" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4302" ref_url="https://www.suse.com/security/cve/CVE-2016-4302" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002169.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2036-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PKPZOJ6M6PEAXJXLQRB6DDQBTJI3IZLC/#PKPZOJ6M6PEAXJXLQRB6DDQBTJI3IZLC" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the parse_codes function in archive_read_support_format_rar.c in libarchive before 3.2.1 allows remote attackers to execute arbitrary code via a RAR file with a zero-sized dictionary.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4302/">CVE-2016-4302 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4302">CVE-2016-4302 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/985835">SUSE bug 985835</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822282" comment="bsdcpio-3.1.2-10.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822283" comment="bsdtar-3.1.2-10.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822284" comment="libarchive-3.1.2-10.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822285" comment="libarchive-devel-3.1.2-10.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164444" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4444</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4444" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4444" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4444" ref_url="https://www.suse.com/security/cve/CVE-2016-4444" source="SUSE CVE"/>
    <description>
    The allow_execmod plugin for setroubleshoot before 3.2.23 allows local users to execute arbitrary commands by triggering an execmod SELinux denial with a crafted binary filename, related to the commands.getstatusoutput function.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4444/">CVE-2016-4444 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4444">CVE-2016-4444 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/983452">SUSE bug 983452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984780">SUSE bug 984780</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822116" comment="setroubleshoot-3.2.24-4.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822117" comment="setroubleshoot-plugins-3.0.59-2.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822118" comment="setroubleshoot-server-3.2.24-4.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164446" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4446</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4446" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4446" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4446" ref_url="https://www.suse.com/security/cve/CVE-2016-4446" source="SUSE CVE"/>
    <description>
    The allow_execstack plugin for setroubleshoot allows local users to execute arbitrary commands by triggering an execstack SELinux denial with a crafted filename, related to the commands.getoutput function.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4446/">CVE-2016-4446 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4446">CVE-2016-4446 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/984780">SUSE bug 984780</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822116" comment="setroubleshoot-3.2.24-4.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822117" comment="setroubleshoot-plugins-3.0.59-2.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822118" comment="setroubleshoot-server-3.2.24-4.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164447" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4447</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4447" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4447" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4447" ref_url="https://www.suse.com/security/cve/CVE-2016-4447" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1595-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U4WPGCASE7GW5OQYSFLRWUX74F6KB6OW/#U4WPGCASE7GW5OQYSFLRWUX74F6KB6OW" source="SUSE-SU"/>
    <description>
    The xmlParseElementDecl function in parser.c in libxml2 before 2.9.4 allows context-dependent attackers to cause a denial of service (heap-based buffer underread and application crash) via a crafted file, involving xmlParseName.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4447/">CVE-2016-4447 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4447">CVE-2016-4447 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981548">SUSE bug 981548</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822112" comment="libxml2-2.9.1-6.el7_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822113" comment="libxml2-devel-2.9.1-6.el7_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822114" comment="libxml2-python-2.9.1-6.el7_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822115" comment="libxml2-static-2.9.1-6.el7_2.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164448" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4448</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4448" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4448" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4448" ref_url="https://www.suse.com/security/cve/CVE-2016-4448" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1595-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U4WPGCASE7GW5OQYSFLRWUX74F6KB6OW/#U4WPGCASE7GW5OQYSFLRWUX74F6KB6OW" source="SUSE-SU"/>
    <description>
    Format string vulnerability in libxml2 before 2.9.4 allows attackers to have unspecified impact via format string specifiers in unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4448/">CVE-2016-4448 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4448">CVE-2016-4448 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1010299">SUSE bug 1010299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981549">SUSE bug 981549</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822112" comment="libxml2-2.9.1-6.el7_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822113" comment="libxml2-devel-2.9.1-6.el7_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822114" comment="libxml2-python-2.9.1-6.el7_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822115" comment="libxml2-static-2.9.1-6.el7_2.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164449" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4449</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4449" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4449" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4449" ref_url="https://www.suse.com/security/cve/CVE-2016-4449" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1595-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U4WPGCASE7GW5OQYSFLRWUX74F6KB6OW/#U4WPGCASE7GW5OQYSFLRWUX74F6KB6OW" source="SUSE-SU"/>
    <description>
    XML external entity (XXE) vulnerability in the xmlStringLenDecodeEntities function in parser.c in libxml2 before 2.9.4, when not in validating mode, allows context-dependent attackers to read arbitrary files or cause a denial of service (resource consumption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4449/">CVE-2016-4449 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4449">CVE-2016-4449 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981550">SUSE bug 981550</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822112" comment="libxml2-2.9.1-6.el7_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822113" comment="libxml2-devel-2.9.1-6.el7_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822114" comment="libxml2-python-2.9.1-6.el7_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822115" comment="libxml2-static-2.9.1-6.el7_2.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164463" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4463</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4463" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4463" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4463" ref_url="https://www.suse.com/security/cve/CVE-2016-4463" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002228.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004754.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in Apache Xerces-C++ before 3.1.4 allows context-dependent attackers to cause a denial of service via a deeply nested DTD.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4463/">CVE-2016-4463 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4463">CVE-2016-4463 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/985860">SUSE bug 985860</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825335" comment="xerces-c-3.1.1-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825336" comment="xerces-c-devel-3.1.1-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825337" comment="xerces-c-doc-3.1.1-9.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164470" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4470</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4470" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4470" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4470" ref_url="https://www.suse.com/security/cve/CVE-2016-4470" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1937-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1995-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2005-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002192.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2009-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2010-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002200.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002647.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1798-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5FLLPQLWSS6KPU5LQ2LLJQIWQXEEE77W/#5FLLPQLWSS6KPU5LQ2LLJQIWQXEEE77W" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G3VWHAWQDEVZ37XRAAROFMJVDBBQ6YF5/#G3VWHAWQDEVZ37XRAAROFMJVDBBQ6YF5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2184-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NA2C2XZHCLKYOLPO7FG5N5MJ7TLHYLY2/#NA2C2XZHCLKYOLPO7FG5N5MJ7TLHYLY2" source="SUSE-SU"/>
    <description>
    The key_reject_and_link function in security/keys/key.c in the Linux kernel through 4.6.3 does not ensure that a certain data structure is initialized, which allows local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4470/">CVE-2016-4470 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4470">CVE-2016-4470 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1020452">SUSE bug 1020452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984755">SUSE bug 984755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984764">SUSE bug 984764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991651">SUSE bug 991651</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822194" comment="kernel-3.10.0-327.28.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822195" comment="kernel-abi-whitelists-3.10.0-327.28.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822196" comment="kernel-debug-3.10.0-327.28.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822199" comment="kernel-doc-3.10.0-327.28.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822200" comment="kernel-headers-3.10.0-327.28.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822201" comment="kernel-tools-3.10.0-327.28.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822202" comment="kernel-tools-libs-3.10.0-327.28.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822204" comment="perf-3.10.0-327.28.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822205" comment="python-perf-3.10.0-327.28.2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164553" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4553</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4553" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4553" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4553" ref_url="https://www.suse.com/security/cve/CVE-2016-4553" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002212.html" source="SUSE-SU"/>
    <description>
    client_side.cc in Squid before 3.5.18 and 4.x before 4.0.10 does not properly ignore the Host header when absolute-URI is provided, which allows remote attackers to conduct cache-poisoning attacks via an HTTP request.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4553/">CVE-2016-4553 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4553">CVE-2016-4553 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/979009">SUSE bug 979009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990451">SUSE bug 990451</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822084" comment="squid-3.3.8-26.el7_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822085" comment="squid-sysvinit-3.3.8-26.el7_2.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164554" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4554</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4554" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4554" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4554" ref_url="https://www.suse.com/security/cve/CVE-2016-4554" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002226.html" source="SUSE-SU"/>
    <description>
    mime_header.cc in Squid before 3.5.18 allows remote attackers to bypass intended same-origin restrictions and possibly conduct cache-poisoning attacks via a crafted HTTP Host header, aka a "header smuggling" issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4554/">CVE-2016-4554 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4554">CVE-2016-4554 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/979010">SUSE bug 979010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990451">SUSE bug 990451</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822084" comment="squid-3.3.8-26.el7_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822085" comment="squid-sysvinit-3.3.8-26.el7_2.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4555</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4555" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4555" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4555" ref_url="https://www.suse.com/security/cve/CVE-2016-4555" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002212.html" source="SUSE-SU"/>
    <description>
    client_side_request.cc in Squid 3.x before 3.5.18 and 4.x before 4.0.10 allows remote servers to cause a denial of service (crash) via crafted Edge Side Includes (ESI) responses.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4555/">CVE-2016-4555 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4555">CVE-2016-4555 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/979008">SUSE bug 979008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979011">SUSE bug 979011</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822084" comment="squid-3.3.8-26.el7_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822085" comment="squid-sysvinit-3.3.8-26.el7_2.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164556" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4556</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4556" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4556" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4556" ref_url="https://www.suse.com/security/cve/CVE-2016-4556" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002212.html" source="SUSE-SU"/>
    <description>
    Double free vulnerability in Esi.cc in Squid 3.x before 3.5.18 and 4.x before 4.0.10 allows remote servers to cause a denial of service (crash) via a crafted Edge Side Includes (ESI) response.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4556/">CVE-2016-4556 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4556">CVE-2016-4556 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/979008">SUSE bug 979008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979011">SUSE bug 979011</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822084" comment="squid-3.3.8-26.el7_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822085" comment="squid-sysvinit-3.3.8-26.el7_2.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164565" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4565</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4565" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4565" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4565" ref_url="https://www.suse.com/security/cve/CVE-2016-4565" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1672-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1937-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1995-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2005-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002192.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2009-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2010-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002200.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002609.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1641-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IGM6U4LKVWMXO6ZXETRLFQOGMA4A2ZQL/#IGM6U4LKVWMXO6ZXETRLFQOGMA4A2ZQL" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G3VWHAWQDEVZ37XRAAROFMJVDBBQ6YF5/#G3VWHAWQDEVZ37XRAAROFMJVDBBQ6YF5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2184-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NA2C2XZHCLKYOLPO7FG5N5MJ7TLHYLY2/#NA2C2XZHCLKYOLPO7FG5N5MJ7TLHYLY2" source="SUSE-SU"/>
    <description>
    The InfiniBand (aka IB) stack in the Linux kernel before 4.5.3 incorrectly relies on the write system call, which allows local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4565/">CVE-2016-4565 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4565">CVE-2016-4565 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1020452">SUSE bug 1020452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979548">SUSE bug 979548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980363">SUSE bug 980363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980883">SUSE bug 980883</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822100" comment="kernel-3.10.0-327.22.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822101" comment="kernel-abi-whitelists-3.10.0-327.22.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822102" comment="kernel-debug-3.10.0-327.22.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822105" comment="kernel-doc-3.10.0-327.22.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822106" comment="kernel-headers-3.10.0-327.22.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822107" comment="kernel-tools-3.10.0-327.22.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822108" comment="kernel-tools-libs-3.10.0-327.22.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822110" comment="perf-3.10.0-327.22.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822111" comment="python-perf-3.10.0-327.22.2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164569" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4569</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4569" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4569" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4569" ref_url="https://www.suse.com/security/cve/CVE-2016-4569" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1672-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1937-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002609.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1641-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IGM6U4LKVWMXO6ZXETRLFQOGMA4A2ZQL/#IGM6U4LKVWMXO6ZXETRLFQOGMA4A2ZQL" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G3VWHAWQDEVZ37XRAAROFMJVDBBQ6YF5/#G3VWHAWQDEVZ37XRAAROFMJVDBBQ6YF5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2184-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NA2C2XZHCLKYOLPO7FG5N5MJ7TLHYLY2/#NA2C2XZHCLKYOLPO7FG5N5MJ7TLHYLY2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2290-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TVIOU3ZPOAQ2W3SQKZVQILGGHDJYFHOT/#TVIOU3ZPOAQ2W3SQKZVQILGGHDJYFHOT" source="SUSE-SU"/>
    <description>
    The snd_timer_user_params function in sound/core/timer.c in the Linux kernel through 4.6 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-4569/">CVE-2016-4569 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4569">CVE-2016-4569 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1020452">SUSE bug 1020452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979213">SUSE bug 979213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979879">SUSE bug 979879</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822375" comment="kernel-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822376" comment="kernel-abi-whitelists-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822377" comment="kernel-debug-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822380" comment="kernel-doc-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822381" comment="kernel-headers-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822382" comment="kernel-tools-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822383" comment="kernel-tools-libs-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822385" comment="perf-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822386" comment="python-perf-3.10.0-514.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164578" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4578</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4578" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4578" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4578" ref_url="https://www.suse.com/security/cve/CVE-2016-4578" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1672-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1937-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002609.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1641-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IGM6U4LKVWMXO6ZXETRLFQOGMA4A2ZQL/#IGM6U4LKVWMXO6ZXETRLFQOGMA4A2ZQL" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G3VWHAWQDEVZ37XRAAROFMJVDBBQ6YF5/#G3VWHAWQDEVZ37XRAAROFMJVDBBQ6YF5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2184-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NA2C2XZHCLKYOLPO7FG5N5MJ7TLHYLY2/#NA2C2XZHCLKYOLPO7FG5N5MJ7TLHYLY2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2290-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TVIOU3ZPOAQ2W3SQKZVQILGGHDJYFHOT/#TVIOU3ZPOAQ2W3SQKZVQILGGHDJYFHOT" source="SUSE-SU"/>
    <description>
    sound/core/timer.c in the Linux kernel through 4.6 does not initialize certain r1 data structures, which allows local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface, related to the (1) snd_timer_user_ccallback and (2) snd_timer_user_tinterrupt functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4578/">CVE-2016-4578 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4578">CVE-2016-4578 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1020452">SUSE bug 1020452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052256">SUSE bug 1052256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979879">SUSE bug 979879</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822375" comment="kernel-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822376" comment="kernel-abi-whitelists-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822377" comment="kernel-debug-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822380" comment="kernel-doc-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822381" comment="kernel-headers-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822382" comment="kernel-tools-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822383" comment="kernel-tools-libs-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822385" comment="perf-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822386" comment="python-perf-3.10.0-514.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164581" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4581</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4581" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4581" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4581" ref_url="https://www.suse.com/security/cve/CVE-2016-4581" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:1641-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IGM6U4LKVWMXO6ZXETRLFQOGMA4A2ZQL/#IGM6U4LKVWMXO6ZXETRLFQOGMA4A2ZQL" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G3VWHAWQDEVZ37XRAAROFMJVDBBQ6YF5/#G3VWHAWQDEVZ37XRAAROFMJVDBBQ6YF5" source="SUSE-SU"/>
    <description>
    fs/pnode.c in the Linux kernel before 4.5.4 does not properly traverse a mount propagation tree in a certain case involving a slave mount, which allows local users to cause a denial of service (NULL pointer dereference and OOPS) via a crafted series of mount system calls.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4581/">CVE-2016-4581 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4581">CVE-2016-4581 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/979913">SUSE bug 979913</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822375" comment="kernel-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822376" comment="kernel-abi-whitelists-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822377" comment="kernel-debug-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822380" comment="kernel-doc-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822381" comment="kernel-headers-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822382" comment="kernel-tools-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822383" comment="kernel-tools-libs-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822385" comment="perf-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822386" comment="python-perf-3.10.0-514.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164658" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4658</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4658" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4658" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4658" ref_url="https://www.suse.com/security/cve/CVE-2016-4658" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2650-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003289.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14697-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U5YNW74OL2W7SH2XTAVN5TODNFIVFL3Y/" source="SUSE-SU"/>
    <description>
    xpointer.c in libxml2 before 2.9.5 (as used in Apple iOS before 10, OS X before 10.12, tvOS before 10, and watchOS before 3, and other products) does not forbid namespace nodes in XPointer ranges, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free and memory corruption) via a crafted XML document.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4658/">CVE-2016-4658 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4658">CVE-2016-4658 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1005544">SUSE bug 1005544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014873">SUSE bug 1014873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069433">SUSE bug 1069433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078813">SUSE bug 1078813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829365" comment="libxml2-2.9.1-6.el7_9.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829366" comment="libxml2-devel-2.9.1-6.el7_9.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829367" comment="libxml2-python-2.9.1-6.el7_9.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829368" comment="libxml2-static-2.9.1-6.el7_9.6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164794" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4794</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4794" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4794" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4794" ref_url="https://www.suse.com/security/cve/CVE-2016-4794" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:1798-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5FLLPQLWSS6KPU5LQ2LLJQIWQXEEE77W/#5FLLPQLWSS6KPU5LQ2LLJQIWQXEEE77W" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in mm/percpu.c in the Linux kernel through 4.6 allows local users to cause a denial of service (BUG) or possibly have unspecified other impact via crafted use of the mmap and bpf system calls.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4794/">CVE-2016-4794 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4794">CVE-2016-4794 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/980265">SUSE bug 980265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981517">SUSE bug 981517</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822375" comment="kernel-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822376" comment="kernel-abi-whitelists-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822377" comment="kernel-debug-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822380" comment="kernel-doc-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822381" comment="kernel-headers-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822382" comment="kernel-tools-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822383" comment="kernel-tools-libs-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822385" comment="perf-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822386" comment="python-perf-3.10.0-514.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164809" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4809</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4809" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4809" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4809" ref_url="https://www.suse.com/security/cve/CVE-2016-4809" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2036-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PKPZOJ6M6PEAXJXLQRB6DDQBTJI3IZLC/#PKPZOJ6M6PEAXJXLQRB6DDQBTJI3IZLC" source="SUSE-SU"/>
    <description>
    The archive_read_format_cpio_read_header function in archive_read_support_format_cpio.c in libarchive before 3.2.1 allows remote attackers to cause a denial of service (application crash) via a CPIO archive with a large symlink.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4809/">CVE-2016-4809 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4809">CVE-2016-4809 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/984990">SUSE bug 984990</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822282" comment="bsdcpio-3.1.2-10.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822283" comment="bsdtar-3.1.2-10.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822284" comment="libarchive-3.1.2-10.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822285" comment="libarchive-devel-3.1.2-10.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164913" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4913</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4913" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4913" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4913" ref_url="https://www.suse.com/security/cve/CVE-2016-4913" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1672-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002609.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G3VWHAWQDEVZ37XRAAROFMJVDBBQ6YF5/#G3VWHAWQDEVZ37XRAAROFMJVDBBQ6YF5" source="SUSE-SU"/>
    <description>
    The get_rock_ridge_filename function in fs/isofs/rock.c in the Linux kernel before 4.5.5 mishandles NM (aka alternate name) entries containing \0 characters, which allows local users to obtain sensitive information from kernel memory or possibly have unspecified other impact via a crafted isofs filesystem.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-4913/">CVE-2016-4913 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4913">CVE-2016-4913 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1115893">SUSE bug 1115893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/870618">SUSE bug 870618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980725">SUSE bug 980725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985132">SUSE bug 985132</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824786" comment="bpftool-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824787" comment="kernel-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824788" comment="kernel-abi-whitelists-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824789" comment="kernel-debug-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824792" comment="kernel-doc-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824793" comment="kernel-headers-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824794" comment="kernel-tools-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824795" comment="kernel-tools-libs-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824797" comment="perf-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824798" comment="python-perf-3.10.0-957.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164971" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4971</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4971" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4971" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4971" ref_url="https://www.suse.com/security/cve/CVE-2016-4971" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002286.html" source="SUSE-SU"/>
    <description>
    GNU wget before 1.18 allows remote servers to write to arbitrary files by redirecting a request from HTTP to a crafted FTP resource.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4971/">CVE-2016-4971 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4971">CVE-2016-4971 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1023231">SUSE bug 1023231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984060">SUSE bug 984060</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822498" comment="wget-1.14-13.el7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164989" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4989</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4989" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4989" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4989" ref_url="https://www.suse.com/security/cve/CVE-2016-4989" source="SUSE CVE"/>
    <description>
    setroubleshoot allows local users to bypass an intended container protection mechanism and execute arbitrary commands by (1) triggering an SELinux denial with a crafted file name, which is handled by the _set_tpath function in audit_data.py or via a crafted (2) local_id or (3) analysis_id field in a crafted XML document to the run_fix function in SetroubleshootFixit.py, related to the subprocess.check_output and commands.getstatusoutput functions, a different vulnerability than CVE-2016-4445.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4989/">CVE-2016-4989 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4989">CVE-2016-4989 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/984780">SUSE bug 984780</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822116" comment="setroubleshoot-3.2.24-4.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822117" comment="setroubleshoot-plugins-3.0.59-2.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822118" comment="setroubleshoot-server-3.2.24-4.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164992" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4992</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4992" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4992" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4992" ref_url="https://www.suse.com/security/cve/CVE-2016-4992" source="SUSE CVE"/>
    <description>
    389 Directory Server in Red Hat Enterprise Linux Desktop 6 through 7, Red Hat Enterprise Linux HPC Node 6 through 7, Red Hat Enterprise Linux Server 6 through 7, and Red Hat Enterprise Linux Workstation 6 through 7 allows remote attackers to infer the existence of RDN component objects.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4992/">CVE-2016-4992 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4992">CVE-2016-4992 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/991201">SUSE bug 991201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997256">SUSE bug 997256</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822543" comment="389-ds-base-1.3.5.10-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822544" comment="389-ds-base-devel-1.3.5.10-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822545" comment="389-ds-base-libs-1.3.5.10-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822546" comment="389-ds-base-snmp-1.3.5.10-11.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164994" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4994</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4994" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4994" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4994" ref_url="https://www.suse.com/security/cve/CVE-2016-4994" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002178.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the xcf_load_image function in app/xcf/xcf-load.c in GIMP allows remote attackers to cause a denial of service (program crash) or possibly execute arbitrary code via a crafted XCF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4994/">CVE-2016-4994 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4994">CVE-2016-4994 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/986021">SUSE bug 986021</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822507" comment="gimp-2.8.16-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822508" comment="gimp-devel-2.8.16-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822509" comment="gimp-devel-tools-2.8.16-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822510" comment="gimp-help-2.8.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822511" comment="gimp-help-ca-2.8.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822512" comment="gimp-help-da-2.8.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822513" comment="gimp-help-de-2.8.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822514" comment="gimp-help-el-2.8.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822515" comment="gimp-help-en_GB-2.8.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822516" comment="gimp-help-es-2.8.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822517" comment="gimp-help-fr-2.8.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822518" comment="gimp-help-it-2.8.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822519" comment="gimp-help-ja-2.8.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822520" comment="gimp-help-ko-2.8.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822521" comment="gimp-help-nl-2.8.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822522" comment="gimp-help-nn-2.8.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822523" comment="gimp-help-pt_BR-2.8.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822524" comment="gimp-help-ru-2.8.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822525" comment="gimp-help-sl-2.8.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822526" comment="gimp-help-sv-2.8.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822527" comment="gimp-help-zh_CN-2.8.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822528" comment="gimp-libs-2.8.16-3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164997" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4997</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4997" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4997" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4997" ref_url="https://www.suse.com/security/cve/CVE-2016-4997" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1937-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002233.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002357.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2636-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003182.html" source="SUSE-SU"/>
		<reference ref_id="TID7017773" ref_url="https://www.suse.com/support/kb/doc/?id=7017773" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1798-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5FLLPQLWSS6KPU5LQ2LLJQIWQXEEE77W/#5FLLPQLWSS6KPU5LQ2LLJQIWQXEEE77W" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G3VWHAWQDEVZ37XRAAROFMJVDBBQ6YF5/#G3VWHAWQDEVZ37XRAAROFMJVDBBQ6YF5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2184-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NA2C2XZHCLKYOLPO7FG5N5MJ7TLHYLY2/#NA2C2XZHCLKYOLPO7FG5N5MJ7TLHYLY2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1140-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y5XA3CLIM5GZTSS4UJWBZNQ4VSK43EYW/#Y5XA3CLIM5GZTSS4UJWBZNQ4VSK43EYW" source="SUSE-SU"/>
    <description>
    The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel before 4.6.3 allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4997/">CVE-2016-4997 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4997">CVE-2016-4997 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1020452">SUSE bug 1020452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986362">SUSE bug 986362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986365">SUSE bug 986365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986377">SUSE bug 986377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991651">SUSE bug 991651</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822286" comment="kernel-3.10.0-327.36.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822287" comment="kernel-abi-whitelists-3.10.0-327.36.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822288" comment="kernel-debug-3.10.0-327.36.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822291" comment="kernel-doc-3.10.0-327.36.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822292" comment="kernel-headers-3.10.0-327.36.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822293" comment="kernel-tools-3.10.0-327.36.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822294" comment="kernel-tools-libs-3.10.0-327.36.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822296" comment="perf-3.10.0-327.36.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822297" comment="python-perf-3.10.0-327.36.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165003" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5003</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5003" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5003" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5003" ref_url="https://www.suse.com/security/cve/CVE-2016-5003" source="SUSE CVE"/>
    <description>
    The Apache XML-RPC (aka ws-xmlrpc) library 3.1.3, as used in Apache Archiva, allows remote attackers to execute arbitrary code via a crafted serialized Java object in an &lt;ex:serializable&gt; element.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5003/">CVE-2016-5003 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5003">CVE-2016-5003 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824347" comment="xmlrpc-client-3.1.3-9.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824348" comment="xmlrpc-common-3.1.3-9.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824349" comment="xmlrpc-javadoc-3.1.3-9.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824350" comment="xmlrpc-server-3.1.3-9.el7_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165008" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5008</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5008" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5008" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5008" ref_url="https://www.suse.com/security/cve/CVE-2016-5008" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1944-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004357.html" source="SUSE-SU"/>
    <description>
    libvirt before 2.0.0 improperly disables password checking when the password on a VNC server is set to an empty string, which allows remote attackers to bypass authentication and establish a VNC session by connecting to the server.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5008/">CVE-2016-5008 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5008">CVE-2016-5008 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/987527">SUSE bug 987527</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822416" comment="libvirt-2.0.0-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822417" comment="libvirt-client-2.0.0-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822418" comment="libvirt-daemon-2.0.0-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822419" comment="libvirt-daemon-config-network-2.0.0-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822420" comment="libvirt-daemon-config-nwfilter-2.0.0-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822421" comment="libvirt-daemon-driver-interface-2.0.0-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822422" comment="libvirt-daemon-driver-lxc-2.0.0-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822423" comment="libvirt-daemon-driver-network-2.0.0-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822424" comment="libvirt-daemon-driver-nodedev-2.0.0-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822425" comment="libvirt-daemon-driver-nwfilter-2.0.0-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822426" comment="libvirt-daemon-driver-qemu-2.0.0-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822427" comment="libvirt-daemon-driver-secret-2.0.0-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822428" comment="libvirt-daemon-driver-storage-2.0.0-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822429" comment="libvirt-daemon-kvm-2.0.0-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822430" comment="libvirt-daemon-lxc-2.0.0-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822431" comment="libvirt-devel-2.0.0-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822432" comment="libvirt-docs-2.0.0-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822433" comment="libvirt-lock-sanlock-2.0.0-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822434" comment="libvirt-login-shell-2.0.0-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822435" comment="libvirt-nss-2.0.0-10.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165011" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5011</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5011" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5011" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5011" ref_url="https://www.suse.com/security/cve/CVE-2016-5011" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003289.html" source="SUSE-SU"/>
    <description>
    The parse_dos_extended function in partitions/dos.c in the libblkid library in util-linux allows physically proximate attackers to cause a denial of service (memory consumption) via a crafted MSDOS partition table with an extended partition boot record at zero offset.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5011/">CVE-2016-5011 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5011">CVE-2016-5011 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/988361">SUSE bug 988361</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822617" comment="libblkid-2.23.2-33.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822618" comment="libblkid-devel-2.23.2-33.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822619" comment="libmount-2.23.2-33.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822620" comment="libmount-devel-2.23.2-33.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822621" comment="libuuid-2.23.2-33.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822622" comment="libuuid-devel-2.23.2-33.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822623" comment="util-linux-2.23.2-33.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822624" comment="uuidd-2.23.2-33.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165018" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5018</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5018" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5018" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5018" ref_url="https://www.suse.com/security/cve/CVE-2016-5018" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002971.html" source="SUSE-SU"/>
		<reference ref_id="TID7010166" ref_url="https://www.suse.com/support/kb/doc/?id=7010166" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3129-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SGMBZCOJXORZN3SH4O7AD4MHCKWUSZI2/#SGMBZCOJXORZN3SH4O7AD4MHCKWUSZI2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3144-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6ZNY6SBERRBLMIGYS4YSNYRKOJMNXY57/#6ZNY6SBERRBLMIGYS4YSNYRKOJMNXY57" source="SUSE-SU"/>
    <description>
    In Apache Tomcat 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70 and 6.0.0 to 6.0.45 a malicious web application was able to bypass a configured SecurityManager via a Tomcat utility method that was accessible to web applications.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-30"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5018/">CVE-2016-5018 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5018">CVE-2016-5018 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1007855">SUSE bug 1007855</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823429" comment="tomcat-7.0.76-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823430" comment="tomcat-admin-webapps-7.0.76-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823431" comment="tomcat-docs-webapp-7.0.76-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823432" comment="tomcat-el-2.2-api-7.0.76-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823433" comment="tomcat-javadoc-7.0.76-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823434" comment="tomcat-jsp-2.2-api-7.0.76-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823435" comment="tomcat-jsvc-7.0.76-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823436" comment="tomcat-lib-7.0.76-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823437" comment="tomcat-servlet-3.0-api-7.0.76-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823438" comment="tomcat-webapps-7.0.76-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165118" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5118</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5118" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5118" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5118" ref_url="https://www.suse.com/security/cve/CVE-2016-5118" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1610-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002126.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1521-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/25GLN5FN23DO53T5ORQEOLVREXZZJXHA/#25GLN5FN23DO53T5ORQEOLVREXZZJXHA" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1522-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PCVKAWE2QDTRHJ56QLRSTZUXB4IZJDQL/#PCVKAWE2QDTRHJ56QLRSTZUXB4IZJDQL" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1534-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/APDOV4AJ2D55BJDUP25Q6FHMH3EBD7U3/#APDOV4AJ2D55BJDUP25Q6FHMH3EBD7U3" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1653-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EFVFYDO7KGNIVQ2M35FP5U3J3WDMEGIC/#EFVFYDO7KGNIVQ2M35FP5U3J3WDMEGIC" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3060-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMLVDKO3IESNWMZN6JMFLYGWMJ5KKHZS/#YMLVDKO3IESNWMZN6JMFLYGWMJ5KKHZS" source="SUSE-SU"/>
    <description>
    The OpenBlob function in blob.c in GraphicsMagick before 1.3.24 and ImageMagick allows remote attackers to execute arbitrary code via a | (pipe) character at the start of a filename.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5118/">CVE-2016-5118 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5118">CVE-2016-5118 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1000484">SUSE bug 1000484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982178">SUSE bug 982178</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822094" comment="ImageMagick-6.7.8.9-15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822095" comment="ImageMagick-c++-6.7.8.9-15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822096" comment="ImageMagick-c++-devel-6.7.8.9-15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822097" comment="ImageMagick-devel-6.7.8.9-15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822098" comment="ImageMagick-doc-6.7.8.9-15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822099" comment="ImageMagick-perl-6.7.8.9-15.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165126" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5126</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5126" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5126" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5126" ref_url="https://www.suse.com/security/cve/CVE-2016-5126" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002402.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SEGSV5T3S2ZKXR3FBHOEH6ZATP7GNXOI/#SEGSV5T3S2ZKXR3FBHOEH6ZATP7GNXOI" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2497-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SN42T3R5VY52V47YKP7INPGVVIOYAXJM/#SN42T3R5VY52V47YKP7INPGVVIOYAXJM" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2642-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LC23VKKIEESEEWT2LOAIKN4OILWG3KQ7/#LC23VKKIEESEEWT2LOAIKN4OILWG3KQ7" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the iscsi_aio_ioctl function in block/iscsi.c in QEMU allows local guest OS users to cause a denial of service (QEMU process crash) or possibly execute arbitrary code via a crafted iSCSI asynchronous I/O ioctl call.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5126/">CVE-2016-5126 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5126">CVE-2016-5126 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/982285">SUSE bug 982285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982286">SUSE bug 982286</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822219" comment="libcacard-1.5.3-105.el7_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822220" comment="libcacard-devel-1.5.3-105.el7_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822221" comment="libcacard-tools-1.5.3-105.el7_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822222" comment="qemu-img-1.5.3-105.el7_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822223" comment="qemu-kvm-1.5.3-105.el7_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822224" comment="qemu-kvm-common-1.5.3-105.el7_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822225" comment="qemu-kvm-tools-1.5.3-105.el7_2.7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165131" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5131</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5131" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5131" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5131" ref_url="https://www.suse.com/security/cve/CVE-2016-5131" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003716.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1865-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DRE27M53CUP2JWDSC4VNPW6HFJ6YDEBQ/#DRE27M53CUP2JWDSC4VNPW6HFJ6YDEBQ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1868-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EFOAQPOUMGPNDVB5ZWHMMBG27GEBJHC6/#EFOAQPOUMGPNDVB5ZWHMMBG27GEBJHC6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1869-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R4NHTU4KKV46O6ZC6IR3Z6EDHZB7OQI2/#R4NHTU4KKV46O6ZC6IR3Z6EDHZB7OQI2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1918-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EVQCMGD5YVXQB5NAWXMNLFEFSMZ4ZRIA/#EVQCMGD5YVXQB5NAWXMNLFEFSMZ4ZRIA" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14697-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U5YNW74OL2W7SH2XTAVN5TODNFIVFL3Y/" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in libxml2 through 2.9.4, as used in Google Chrome before 52.0.2743.82, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the XPointer range-to function.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-12-05"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5131/">CVE-2016-5131 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5131">CVE-2016-5131 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1014873">SUSE bug 1014873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069433">SUSE bug 1069433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078813">SUSE bug 1078813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989901">SUSE bug 989901</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827903" comment="libxml2-2.9.1-6.el7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827904" comment="libxml2-devel-2.9.1-6.el7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827905" comment="libxml2-python-2.9.1-6.el7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827906" comment="libxml2-static-2.9.1-6.el7.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5139</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5139" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5139" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5139" ref_url="https://www.suse.com/security/cve/CVE-2016-5139" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:1982-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NYQEG22WWDWBWP62EHVKSBZ23VETP5RQ/#NYQEG22WWDWBWP62EHVKSBZ23VETP5RQ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1983-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VDI2SYR4SQQNIUDTWH6BXSMO56JTMRWJ/#VDI2SYR4SQQNIUDTWH6BXSMO56JTMRWJ" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in the opj_tcd_init_tile function in tcd.c in OpenJPEG, as used in PDFium in Google Chrome before 52.0.2743.116, allow remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted JPEG 2000 data.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5139/">CVE-2016-5139 at SUSE</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5139">CVE-2016-5139 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/992305">SUSE bug 992305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992311">SUSE bug 992311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992325">SUSE bug 992325</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822884" comment="openjpeg-1.5.1-16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822885" comment="openjpeg-devel-1.5.1-16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822886" comment="openjpeg-libs-1.5.1-16.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165158" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5158</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5158" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5158" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5158" ref_url="https://www.suse.com/security/cve/CVE-2016-5158" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002259.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2250-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MCPX6GR3YGGFCR6NLONCI657GAJD4LVP/#MCPX6GR3YGGFCR6NLONCI657GAJD4LVP" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2296-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EY7WB6TMJ5FV3VB7FXOWHI4KTVM6ZVUT/#EY7WB6TMJ5FV3VB7FXOWHI4KTVM6ZVUT" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in the opj_tcd_init_tile function in tcd.c in OpenJPEG, as used in PDFium in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux, allow remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted JPEG 2000 data.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5158/">CVE-2016-5158 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5158">CVE-2016-5158 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/996648">SUSE bug 996648</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822884" comment="openjpeg-1.5.1-16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822885" comment="openjpeg-devel-1.5.1-16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822886" comment="openjpeg-libs-1.5.1-16.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165159" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5159</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5159" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5159" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5159" ref_url="https://www.suse.com/security/cve/CVE-2016-5159" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002259.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2250-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MCPX6GR3YGGFCR6NLONCI657GAJD4LVP/#MCPX6GR3YGGFCR6NLONCI657GAJD4LVP" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2296-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EY7WB6TMJ5FV3VB7FXOWHI4KTVM6ZVUT/#EY7WB6TMJ5FV3VB7FXOWHI4KTVM6ZVUT" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in OpenJPEG, as used in PDFium in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux, allow remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted JPEG 2000 data that is mishandled during opj_aligned_malloc calls in dwt.c and t1.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5159/">CVE-2016-5159 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5159">CVE-2016-5159 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/996648">SUSE bug 996648</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822884" comment="openjpeg-1.5.1-16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822885" comment="openjpeg-devel-1.5.1-16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822886" comment="openjpeg-libs-1.5.1-16.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165195" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5195</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5195" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5195" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5195" ref_url="https://www.suse.com/security/cve/CVE-2016-5195" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2592-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2593-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002347.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002349.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002357.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2634-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002358.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2635-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002359.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2636-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2638-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2657-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2673-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3304-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002539.html" source="SUSE-SU"/>
		<reference ref_id="TID7018178" ref_url="https://www.suse.com/support/kb/doc/?id=7018178" source="SUSE-SU"/>
		<reference ref_id="TID7018287" ref_url="https://www.suse.com/support/kb/doc/?id=7018287" source="SUSE-SU"/>
		<reference ref_id="TID7022455" ref_url="https://www.suse.com/support/kb/doc/?id=7022455" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2583-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RQFL6VT6HOSDOVBCI7IGQVPVXDZ5ENNE/#RQFL6VT6HOSDOVBCI7IGQVPVXDZ5ENNE" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2584-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R3JSYC5HQ62KQQAIX3VGSTO6E3RP3Y6O/#R3JSYC5HQ62KQQAIX3VGSTO6E3RP3Y6O" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2625-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4S7UHJM6T55DAAXQ6V2UZD53B3N7CANL/#4S7UHJM6T55DAAXQ6V2UZD53B3N7CANL" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M3DY3J73NZK532BN4KZEFFGULVYJU3D2/#M3DY3J73NZK532BN4KZEFFGULVYJU3D2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0554-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4KLMQUDJXG7ORWF7M42NKLDUJSKHAUTS/" source="SUSE-SU"/>
    <description>
    Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka "Dirty COW."
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5195/">CVE-2016-5195 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5195">CVE-2016-5195 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1004418">SUSE bug 1004418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1004419">SUSE bug 1004419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1004436">SUSE bug 1004436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006323">SUSE bug 1006323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006695">SUSE bug 1006695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007291">SUSE bug 1007291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008110">SUSE bug 1008110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030118">SUSE bug 1030118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046453">SUSE bug 1046453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069496">SUSE bug 1069496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149725">SUSE bug 1149725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/870618">SUSE bug 870618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986445">SUSE bug 986445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998689">SUSE bug 998689</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822356" comment="kernel-3.10.0-327.36.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822357" comment="kernel-abi-whitelists-3.10.0-327.36.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822358" comment="kernel-debug-3.10.0-327.36.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822361" comment="kernel-doc-3.10.0-327.36.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822362" comment="kernel-headers-3.10.0-327.36.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822363" comment="kernel-tools-3.10.0-327.36.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822364" comment="kernel-tools-libs-3.10.0-327.36.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822366" comment="perf-3.10.0-327.36.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822367" comment="python-perf-3.10.0-327.36.3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165239" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5239</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5239" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5239" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5239" ref_url="https://www.suse.com/security/cve/CVE-2016-5239" source="SUSE CVE"/>
    <description>
    The gnuplot delegate functionality in ImageMagick before 6.9.4-0 and GraphicsMagick allows remote attackers to execute arbitrary commands via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5239/">CVE-2016-5239 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5239">CVE-2016-5239 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983539">SUSE bug 983539</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822094" comment="ImageMagick-6.7.8.9-15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822095" comment="ImageMagick-c++-6.7.8.9-15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822096" comment="ImageMagick-c++-devel-6.7.8.9-15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822097" comment="ImageMagick-devel-6.7.8.9-15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822098" comment="ImageMagick-doc-6.7.8.9-15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822099" comment="ImageMagick-perl-6.7.8.9-15.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165240" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5240</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5240" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5240" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5240" ref_url="https://www.suse.com/security/cve/CVE-2016-5240" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002152.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1724-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S3XIJBEG3P7EGWD4IGXHPL43JATXE7NF/#S3XIJBEG3P7EGWD4IGXHPL43JATXE7NF" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2073-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WHSIRIKAPJKXFRGBDEXSAMU6LEKJCPUC/#WHSIRIKAPJKXFRGBDEXSAMU6LEKJCPUC" source="SUSE-SU"/>
    <description>
    The DrawDashPolygon function in magick/render.c in GraphicsMagick before 1.3.24 and the SVG renderer in ImageMagick allow remote attackers to cause a denial of service (infinite loop) by converting a circularly defined SVG file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5240/">CVE-2016-5240 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5240">CVE-2016-5240 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/983309">SUSE bug 983309</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822094" comment="ImageMagick-6.7.8.9-15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822095" comment="ImageMagick-c++-6.7.8.9-15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822096" comment="ImageMagick-c++-devel-6.7.8.9-15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822097" comment="ImageMagick-devel-6.7.8.9-15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822098" comment="ImageMagick-doc-6.7.8.9-15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822099" comment="ImageMagick-perl-6.7.8.9-15.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165250" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5250</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5250" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5250" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5250" ref_url="https://www.suse.com/security/cve/CVE-2016-5250" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002330.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1964-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HBRNDT43TAT3XC3DQZSVPGF7XNM7YD6/#5HBRNDT43TAT3XC3DQZSVPGF7XNM7YD6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2026-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5FOCHWPBBRB5OK6GTW52LXIMIMMZD6Q6/#5FOCHWPBBRB5OK6GTW52LXIMIMMZD6Q6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 48.0, Firefox ESR &lt; 45.4 and Thunderbird &lt; 45.4 allow remote attackers to obtain sensitive information about the previously retrieved page via Resource Timing API calls.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5250/">CVE-2016-5250 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5250">CVE-2016-5250 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/991809">SUSE bug 991809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999701">SUSE bug 999701</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822298" comment="firefox-45.4.0-1.el7_2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165252" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5252</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5252" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5252" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5252" ref_url="https://www.suse.com/security/cve/CVE-2016-5252" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002245.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1964-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HBRNDT43TAT3XC3DQZSVPGF7XNM7YD6/#5HBRNDT43TAT3XC3DQZSVPGF7XNM7YD6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2026-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5FOCHWPBBRB5OK6GTW52LXIMIMMZD6Q6/#5FOCHWPBBRB5OK6GTW52LXIMIMMZD6Q6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Stack-based buffer underflow in the mozilla::gfx::BasePoint4d function in Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 allows remote attackers to execute arbitrary code via crafted two-dimensional graphics data that is mishandled during clipping-region calculations.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5252/">CVE-2016-5252 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5252">CVE-2016-5252 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/991809">SUSE bug 991809</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822210" comment="firefox-45.3.0-1.el7_2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165254" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5254</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5254" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5254" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5254" ref_url="https://www.suse.com/security/cve/CVE-2016-5254" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002245.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1964-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HBRNDT43TAT3XC3DQZSVPGF7XNM7YD6/#5HBRNDT43TAT3XC3DQZSVPGF7XNM7YD6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2026-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5FOCHWPBBRB5OK6GTW52LXIMIMMZD6Q6/#5FOCHWPBBRB5OK6GTW52LXIMIMMZD6Q6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsXULPopupManager::KeyDown function in Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 allows attackers to execute arbitrary code or cause a denial of service (heap memory corruption and application crash) by leveraging keyboard access to use the Alt key during selection of top-level menu items.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5254/">CVE-2016-5254 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5254">CVE-2016-5254 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/991809">SUSE bug 991809</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822210" comment="firefox-45.3.0-1.el7_2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165257" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5257</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5257" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5257" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5257" ref_url="https://www.suse.com/security/cve/CVE-2016-5257" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002330.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2368-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UM7BJLBOK7YPBRMVC6BFQOLQOV6CUYKV/#UM7BJLBOK7YPBRMVC6BFQOLQOV6CUYKV" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2386-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NOVJWB2J7HZDNNSNJ35VREHRKYDKMFML/#NOVJWB2J7HZDNNSNJ35VREHRKYDKMFML" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 49.0, Firefox ESR 45.x before 45.4 and Thunderbird &lt; 45.4 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5257/">CVE-2016-5257 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5257">CVE-2016-5257 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/999701">SUSE bug 999701</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822298" comment="firefox-45.4.0-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822319" comment="thunderbird-45.4.0-1.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165258" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5258</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5258" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5258" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5258" ref_url="https://www.suse.com/security/cve/CVE-2016-5258" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002245.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1964-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HBRNDT43TAT3XC3DQZSVPGF7XNM7YD6/#5HBRNDT43TAT3XC3DQZSVPGF7XNM7YD6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2026-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5FOCHWPBBRB5OK6GTW52LXIMIMMZD6Q6/#5FOCHWPBBRB5OK6GTW52LXIMIMMZD6Q6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the WebRTC socket thread in Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 allows remote attackers to execute arbitrary code by leveraging incorrect free operations on DTLS objects during the shutdown of a WebRTC session.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5258/">CVE-2016-5258 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5258">CVE-2016-5258 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/991809">SUSE bug 991809</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822210" comment="firefox-45.3.0-1.el7_2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165259" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5259</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5259" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5259" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5259" ref_url="https://www.suse.com/security/cve/CVE-2016-5259" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002245.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1964-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HBRNDT43TAT3XC3DQZSVPGF7XNM7YD6/#5HBRNDT43TAT3XC3DQZSVPGF7XNM7YD6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2026-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5FOCHWPBBRB5OK6GTW52LXIMIMMZD6Q6/#5FOCHWPBBRB5OK6GTW52LXIMIMMZD6Q6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the CanonicalizeXPCOMParticipant function in Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 allows remote attackers to execute arbitrary code via a script that closes its own Service Worker within a nested sync event loop.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5259/">CVE-2016-5259 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5259">CVE-2016-5259 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/991809">SUSE bug 991809</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822210" comment="firefox-45.3.0-1.el7_2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165261" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5261</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5261" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5261" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5261" ref_url="https://www.suse.com/security/cve/CVE-2016-5261" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002330.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1964-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HBRNDT43TAT3XC3DQZSVPGF7XNM7YD6/#5HBRNDT43TAT3XC3DQZSVPGF7XNM7YD6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2026-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5FOCHWPBBRB5OK6GTW52LXIMIMMZD6Q6/#5FOCHWPBBRB5OK6GTW52LXIMIMMZD6Q6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Integer overflow in the WebSocketChannel class in the WebSockets subsystem in Mozilla Firefox before 48.0 and Firefox ESR &lt; 45.4 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted packets that trigger incorrect buffer-resize operations during buffering.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5261/">CVE-2016-5261 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5261">CVE-2016-5261 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/991809">SUSE bug 991809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999701">SUSE bug 999701</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822298" comment="firefox-45.4.0-1.el7_2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165262" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5262</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5262" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5262" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5262" ref_url="https://www.suse.com/security/cve/CVE-2016-5262" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002245.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1964-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HBRNDT43TAT3XC3DQZSVPGF7XNM7YD6/#5HBRNDT43TAT3XC3DQZSVPGF7XNM7YD6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2026-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5FOCHWPBBRB5OK6GTW52LXIMIMMZD6Q6/#5FOCHWPBBRB5OK6GTW52LXIMIMMZD6Q6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 process JavaScript event-handler attributes of a MARQUEE element within a sandboxed IFRAME element that lacks the sandbox="allow-scripts" attribute value, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5262/">CVE-2016-5262 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5262">CVE-2016-5262 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/991809">SUSE bug 991809</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822210" comment="firefox-45.3.0-1.el7_2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165263" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5263</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5263" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5263" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5263" ref_url="https://www.suse.com/security/cve/CVE-2016-5263" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002245.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1964-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HBRNDT43TAT3XC3DQZSVPGF7XNM7YD6/#5HBRNDT43TAT3XC3DQZSVPGF7XNM7YD6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2026-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5FOCHWPBBRB5OK6GTW52LXIMIMMZD6Q6/#5FOCHWPBBRB5OK6GTW52LXIMIMMZD6Q6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    The nsDisplayList::HitTest function in Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 mishandles rendering display transformation, which allows remote attackers to execute arbitrary code via a crafted web site that leverages "type confusion."
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5263/">CVE-2016-5263 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5263">CVE-2016-5263 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/991809">SUSE bug 991809</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822210" comment="firefox-45.3.0-1.el7_2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165264" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5264</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5264" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5264" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5264" ref_url="https://www.suse.com/security/cve/CVE-2016-5264" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002245.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1964-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HBRNDT43TAT3XC3DQZSVPGF7XNM7YD6/#5HBRNDT43TAT3XC3DQZSVPGF7XNM7YD6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2026-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5FOCHWPBBRB5OK6GTW52LXIMIMMZD6Q6/#5FOCHWPBBRB5OK6GTW52LXIMIMMZD6Q6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsNodeUtils::NativeAnonymousChildListChange function in Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via an SVG element that is mishandled during effect application.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5264/">CVE-2016-5264 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5264">CVE-2016-5264 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/991809">SUSE bug 991809</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822210" comment="firefox-45.3.0-1.el7_2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165265" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5265</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5265" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5265" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5265" ref_url="https://www.suse.com/security/cve/CVE-2016-5265" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002245.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1964-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HBRNDT43TAT3XC3DQZSVPGF7XNM7YD6/#5HBRNDT43TAT3XC3DQZSVPGF7XNM7YD6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2026-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5FOCHWPBBRB5OK6GTW52LXIMIMMZD6Q6/#5FOCHWPBBRB5OK6GTW52LXIMIMMZD6Q6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 allow user-assisted remote attackers to bypass the Same Origin Policy, and conduct Universal XSS (UXSS) attacks or read arbitrary files, by arranging for the presence of a crafted HTML document and a crafted shortcut file in the same local directory.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5265/">CVE-2016-5265 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5265">CVE-2016-5265 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/991809">SUSE bug 991809</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822210" comment="firefox-45.3.0-1.el7_2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165270" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5270</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5270" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5270" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5270" ref_url="https://www.suse.com/security/cve/CVE-2016-5270" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002330.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2368-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UM7BJLBOK7YPBRMVC6BFQOLQOV6CUYKV/#UM7BJLBOK7YPBRMVC6BFQOLQOV6CUYKV" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2386-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NOVJWB2J7HZDNNSNJ35VREHRKYDKMFML/#NOVJWB2J7HZDNNSNJ35VREHRKYDKMFML" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the nsCaseTransformTextRunFactory::TransformString function in Mozilla Firefox before 49.0, Firefox ESR 45.x before 45.4, and Thunderbird &lt; 45.4 allows remote attackers to cause a denial of service (boolean out-of-bounds write) or possibly have unspecified other impact via Unicode characters that are mishandled during text conversion.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5270/">CVE-2016-5270 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5270">CVE-2016-5270 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/999701">SUSE bug 999701</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822298" comment="firefox-45.4.0-1.el7_2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165272" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5272</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5272" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5272" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5272" ref_url="https://www.suse.com/security/cve/CVE-2016-5272" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002330.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2368-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UM7BJLBOK7YPBRMVC6BFQOLQOV6CUYKV/#UM7BJLBOK7YPBRMVC6BFQOLQOV6CUYKV" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2386-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NOVJWB2J7HZDNNSNJ35VREHRKYDKMFML/#NOVJWB2J7HZDNNSNJ35VREHRKYDKMFML" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    The nsImageGeometryMixin class in Mozilla Firefox before 49.0, Firefox ESR 45.x before 45.4, and Thunderbird &lt; 45.4 does not properly perform a cast of an unspecified variable during handling of INPUT elements, which allows remote attackers to execute arbitrary code via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5272/">CVE-2016-5272 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5272">CVE-2016-5272 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/999701">SUSE bug 999701</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822298" comment="firefox-45.4.0-1.el7_2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165274" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5274</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5274" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5274" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5274" ref_url="https://www.suse.com/security/cve/CVE-2016-5274" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002330.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2368-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UM7BJLBOK7YPBRMVC6BFQOLQOV6CUYKV/#UM7BJLBOK7YPBRMVC6BFQOLQOV6CUYKV" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2386-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NOVJWB2J7HZDNNSNJ35VREHRKYDKMFML/#NOVJWB2J7HZDNNSNJ35VREHRKYDKMFML" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsFrameManager::CaptureFrameState function in Mozilla Firefox before 49.0, Firefox ESR 45.x before 45.4, and Thunderbird &lt; 45.4 allows remote attackers to execute arbitrary code by leveraging improper interaction between restyling and the Web Animations model implementation.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5274/">CVE-2016-5274 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5274">CVE-2016-5274 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/999701">SUSE bug 999701</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822298" comment="firefox-45.4.0-1.el7_2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165276" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5276</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5276" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5276" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5276" ref_url="https://www.suse.com/security/cve/CVE-2016-5276" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002330.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2368-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UM7BJLBOK7YPBRMVC6BFQOLQOV6CUYKV/#UM7BJLBOK7YPBRMVC6BFQOLQOV6CUYKV" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2386-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NOVJWB2J7HZDNNSNJ35VREHRKYDKMFML/#NOVJWB2J7HZDNNSNJ35VREHRKYDKMFML" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the mozilla::a11y::DocAccessible::ProcessInvalidationList function in Mozilla Firefox before 49.0, Firefox ESR 45.x before 45.4, and Thunderbird &lt; 45.4 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via an aria-owns attribute.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5276/">CVE-2016-5276 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5276">CVE-2016-5276 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/999701">SUSE bug 999701</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822298" comment="firefox-45.4.0-1.el7_2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165277" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5277</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5277" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5277" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5277" ref_url="https://www.suse.com/security/cve/CVE-2016-5277" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002330.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2368-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UM7BJLBOK7YPBRMVC6BFQOLQOV6CUYKV/#UM7BJLBOK7YPBRMVC6BFQOLQOV6CUYKV" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2386-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NOVJWB2J7HZDNNSNJ35VREHRKYDKMFML/#NOVJWB2J7HZDNNSNJ35VREHRKYDKMFML" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsRefreshDriver::Tick function in Mozilla Firefox before 49.0, Firefox ESR 45.x before 45.4, and Thunderbird &lt; 45.4 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) by leveraging improper interaction between timeline destruction and the Web Animations model implementation.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5277/">CVE-2016-5277 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5277">CVE-2016-5277 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/999701">SUSE bug 999701</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822298" comment="firefox-45.4.0-1.el7_2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165278" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5278</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5278" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5278" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5278" ref_url="https://www.suse.com/security/cve/CVE-2016-5278" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002330.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2368-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UM7BJLBOK7YPBRMVC6BFQOLQOV6CUYKV/#UM7BJLBOK7YPBRMVC6BFQOLQOV6CUYKV" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2386-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NOVJWB2J7HZDNNSNJ35VREHRKYDKMFML/#NOVJWB2J7HZDNNSNJ35VREHRKYDKMFML" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the nsBMPEncoder::AddImageFrame function in Mozilla Firefox before 49.0, Firefox ESR 45.x before 45.4, and Thunderbird &lt; 45.4 allows remote attackers to execute arbitrary code via a crafted image data that is mishandled during the encoding of an image frame to an image.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5278/">CVE-2016-5278 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5278">CVE-2016-5278 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/999701">SUSE bug 999701</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822298" comment="firefox-45.4.0-1.el7_2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165280" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5280</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5280" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5280" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5280" ref_url="https://www.suse.com/security/cve/CVE-2016-5280" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002330.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2368-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UM7BJLBOK7YPBRMVC6BFQOLQOV6CUYKV/#UM7BJLBOK7YPBRMVC6BFQOLQOV6CUYKV" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2386-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NOVJWB2J7HZDNNSNJ35VREHRKYDKMFML/#NOVJWB2J7HZDNNSNJ35VREHRKYDKMFML" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the mozilla::nsTextNodeDirectionalityMap::RemoveElementFromMap function in Mozilla Firefox before 49.0, Firefox ESR 45.x before 45.4, and Thunderbird &lt; 45.4 allows remote attackers to execute arbitrary code via bidirectional text.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5280/">CVE-2016-5280 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5280">CVE-2016-5280 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/999701">SUSE bug 999701</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822298" comment="firefox-45.4.0-1.el7_2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165281" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5281</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5281" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5281" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5281" ref_url="https://www.suse.com/security/cve/CVE-2016-5281" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002330.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2368-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UM7BJLBOK7YPBRMVC6BFQOLQOV6CUYKV/#UM7BJLBOK7YPBRMVC6BFQOLQOV6CUYKV" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2386-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NOVJWB2J7HZDNNSNJ35VREHRKYDKMFML/#NOVJWB2J7HZDNNSNJ35VREHRKYDKMFML" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the DOMSVGLength class in Mozilla Firefox before 49.0, Firefox ESR 45.x before 45.4, and Thunderbird &lt; 45.4 allows remote attackers to execute arbitrary code by leveraging improper interaction between JavaScript code and an SVG document.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5281/">CVE-2016-5281 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5281">CVE-2016-5281 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/999701">SUSE bug 999701</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822298" comment="firefox-45.4.0-1.el7_2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165284" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5284</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5284" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5284" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5284" ref_url="https://www.suse.com/security/cve/CVE-2016-5284" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002330.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2368-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UM7BJLBOK7YPBRMVC6BFQOLQOV6CUYKV/#UM7BJLBOK7YPBRMVC6BFQOLQOV6CUYKV" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2386-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NOVJWB2J7HZDNNSNJ35VREHRKYDKMFML/#NOVJWB2J7HZDNNSNJ35VREHRKYDKMFML" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 49.0, Firefox ESR 45.x before 45.4, and Thunderbird &lt; 45.4 rely on unintended expiration dates for Preloaded Public Key Pinning, which allows man-in-the-middle attackers to spoof add-on updates by leveraging possession of an X.509 server certificate for addons.mozilla.org signed by an arbitrary built-in Certification Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5284/">CVE-2016-5284 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5284">CVE-2016-5284 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/999701">SUSE bug 999701</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822298" comment="firefox-45.4.0-1.el7_2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165285" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5285</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5285" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5285" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5285" ref_url="https://www.suse.com/security/cve/CVE-2016-5285" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002474.html" source="SUSE-SU"/>
    <description>
    A Null pointer dereference vulnerability exists in Mozilla Network Security Services due to a missing NULL check in PK11_SignWithSymKey / ssl3_ComputeRecordMACConstantTime, which could let a remote malicious user cause a Denial of Service.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5285/">CVE-2016-5285 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5285">CVE-2016-5285 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1010517">SUSE bug 1010517</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822685" comment="nss-3.21.3-2.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822686" comment="nss-devel-3.21.3-2.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822687" comment="nss-pkcs11-devel-3.21.3-2.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822688" comment="nss-sysinit-3.21.3-2.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822689" comment="nss-tools-3.21.3-2.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822690" comment="nss-util-3.21.3-1.1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822691" comment="nss-util-devel-3.21.3-1.1.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165290" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5290</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5290" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5290" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5290" ref_url="https://www.suse.com/security/cve/CVE-2016-5290" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002474.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2861-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZCR7QQVKUUZQ2Z6RNKLB2WOCJVSQUWUA/#ZCR7QQVKUUZQ2Z6RNKLB2WOCJVSQUWUA" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3011-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S5LAOL4JSUPVGNKECSFNO5CPDJG2CPKN/#S5LAOL4JSUPVGNKECSFNO5CPDJG2CPKN" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3019-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TGREHQXPWYA3JLTHOF5UWISQWEQ7FXCL/#TGREHQXPWYA3JLTHOF5UWISQWEQ7FXCL" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Memory safety bugs were reported in Firefox 49 and Firefox ESR 45.4. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird &lt; 45.5, Firefox ESR &lt; 45.5, and Firefox &lt; 50.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5290/">CVE-2016-5290 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5290">CVE-2016-5290 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1009026">SUSE bug 1009026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010427">SUSE bug 1010427</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822692" comment="firefox-45.5.0-1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822710" comment="thunderbird-45.5.0-1.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165291" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5291</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5291" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5291" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5291" ref_url="https://www.suse.com/security/cve/CVE-2016-5291" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002474.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2861-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZCR7QQVKUUZQ2Z6RNKLB2WOCJVSQUWUA/#ZCR7QQVKUUZQ2Z6RNKLB2WOCJVSQUWUA" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3011-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S5LAOL4JSUPVGNKECSFNO5CPDJG2CPKN/#S5LAOL4JSUPVGNKECSFNO5CPDJG2CPKN" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3019-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TGREHQXPWYA3JLTHOF5UWISQWEQ7FXCL/#TGREHQXPWYA3JLTHOF5UWISQWEQ7FXCL" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A same-origin policy bypass with local shortcut files to load arbitrary local content from disk. This vulnerability affects Thunderbird &lt; 45.5, Firefox ESR &lt; 45.5, and Firefox &lt; 50.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-10-23"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5291/">CVE-2016-5291 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5291">CVE-2016-5291 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1009026">SUSE bug 1009026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010410">SUSE bug 1010410</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822692" comment="firefox-45.5.0-1.el7_3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165296" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5296</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5296" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5296" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5296" ref_url="https://www.suse.com/security/cve/CVE-2016-5296" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002474.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2861-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZCR7QQVKUUZQ2Z6RNKLB2WOCJVSQUWUA/#ZCR7QQVKUUZQ2Z6RNKLB2WOCJVSQUWUA" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3011-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S5LAOL4JSUPVGNKECSFNO5CPDJG2CPKN/#S5LAOL4JSUPVGNKECSFNO5CPDJG2CPKN" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3019-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TGREHQXPWYA3JLTHOF5UWISQWEQ7FXCL/#TGREHQXPWYA3JLTHOF5UWISQWEQ7FXCL" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A heap-buffer-overflow in Cairo when processing SVG content caused by compiler optimization, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 45.5, Firefox ESR &lt; 45.5, and Firefox &lt; 50.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5296/">CVE-2016-5296 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5296">CVE-2016-5296 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1009026">SUSE bug 1009026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010395">SUSE bug 1010395</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822692" comment="firefox-45.5.0-1.el7_3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165297" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5297</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5297" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5297" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5297" ref_url="https://www.suse.com/security/cve/CVE-2016-5297" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002474.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2861-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZCR7QQVKUUZQ2Z6RNKLB2WOCJVSQUWUA/#ZCR7QQVKUUZQ2Z6RNKLB2WOCJVSQUWUA" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3011-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S5LAOL4JSUPVGNKECSFNO5CPDJG2CPKN/#S5LAOL4JSUPVGNKECSFNO5CPDJG2CPKN" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3019-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TGREHQXPWYA3JLTHOF5UWISQWEQ7FXCL/#TGREHQXPWYA3JLTHOF5UWISQWEQ7FXCL" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    An error in argument length checking in JavaScript, leading to potential integer overflows or other bounds checking issues. This vulnerability affects Thunderbird &lt; 45.5, Firefox ESR &lt; 45.5, and Firefox &lt; 50.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5297/">CVE-2016-5297 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5297">CVE-2016-5297 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1009026">SUSE bug 1009026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010401">SUSE bug 1010401</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822692" comment="firefox-45.5.0-1.el7_3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165320" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5320</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5320" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5320" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5320" ref_url="https://www.suse.com/security/cve/CVE-2016-5320" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002331.html" source="SUSE-SU"/>
    <description>
    DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2016-5314.  Reason: This candidate is a reservation duplicate of CVE-2016-5314.  Notes: All CVE users should reference CVE-2016-5314 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-04"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5320/">CVE-2016-5320 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-5320">CVE-2016-5320 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1007284">SUSE bug 1007284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974621">SUSE bug 974621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984808">SUSE bug 984808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987351">SUSE bug 987351</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822206" comment="libtiff-4.0.3-25.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822207" comment="libtiff-devel-4.0.3-25.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822208" comment="libtiff-static-4.0.3-25.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822209" comment="libtiff-tools-4.0.3-25.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165361" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5361</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5361" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5361" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5361" ref_url="https://www.suse.com/security/cve/CVE-2016-5361" source="SUSE CVE"/>
    <description>
    programs/pluto/ikev1.c in libreswan before 3.17 retransmits in initial-responder states, which allows remote attackers to cause a denial of service (traffic amplification) via a spoofed UDP packet. NOTE: the original behavior complies with the IKEv1 protocol, but has a required security update from the libreswan vendor; as of 2016-06-10, it is expected that several other IKEv1 implementations will have vendor-required security updates, with separate CVE IDs assigned to each.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-12-10"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5361/">CVE-2016-5361 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5361">CVE-2016-5361 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/984628">SUSE bug 984628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984630">SUSE bug 984630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985012">SUSE bug 985012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985016">SUSE bug 985016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985017">SUSE bug 985017</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822603" comment="libreswan-3.15-8.el7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165384" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5384</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5384" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5384" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5384" ref_url="https://www.suse.com/security/cve/CVE-2016-5384" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002242.html" source="SUSE-SU"/>
    <description>
    fontconfig before 2.12.1 does not validate offsets, which allows local users to trigger arbitrary free calls and consequently conduct double free attacks and execute arbitrary code via a crafted cache file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5384/">CVE-2016-5384 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5384">CVE-2016-5384 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1123116">SUSE bug 1123116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992534">SUSE bug 992534</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822599" comment="fontconfig-2.10.95-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822600" comment="fontconfig-devel-2.10.95-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822601" comment="fontconfig-devel-doc-2.10.95-10.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165385" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5385</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5385" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5385" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5385" ref_url="https://www.suse.com/security/cve/CVE-2016-5385" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2941-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002428.html" source="SUSE-SU"/>
    <description>
    PHP through 7.0.8 does not attempt to address RFC 3875 section 4.1.18 namespace conflicts and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, as demonstrated by (1) an application that makes a getenv('HTTP_PROXY') call or (2) a CGI configuration of PHP, aka an "httpoxy" issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5385/">CVE-2016-5385 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5385">CVE-2016-5385 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/988484">SUSE bug 988484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988486">SUSE bug 988486</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988487">SUSE bug 988487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988488">SUSE bug 988488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988489">SUSE bug 988489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988491">SUSE bug 988491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988492">SUSE bug 988492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989125">SUSE bug 989125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989174">SUSE bug 989174</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822226" comment="php-5.4.16-36.3.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822227" comment="php-bcmath-5.4.16-36.3.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822228" comment="php-cli-5.4.16-36.3.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822229" comment="php-common-5.4.16-36.3.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822230" comment="php-dba-5.4.16-36.3.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822231" comment="php-devel-5.4.16-36.3.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822232" comment="php-embedded-5.4.16-36.3.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822233" comment="php-enchant-5.4.16-36.3.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822234" comment="php-fpm-5.4.16-36.3.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822235" comment="php-gd-5.4.16-36.3.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822236" comment="php-intl-5.4.16-36.3.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822237" comment="php-ldap-5.4.16-36.3.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822238" comment="php-mbstring-5.4.16-36.3.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822239" comment="php-mysql-5.4.16-36.3.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822240" comment="php-mysqlnd-5.4.16-36.3.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822241" comment="php-odbc-5.4.16-36.3.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822242" comment="php-pdo-5.4.16-36.3.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822243" comment="php-pgsql-5.4.16-36.3.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822244" comment="php-process-5.4.16-36.3.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822245" comment="php-pspell-5.4.16-36.3.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822246" comment="php-recode-5.4.16-36.3.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822247" comment="php-snmp-5.4.16-36.3.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822248" comment="php-soap-5.4.16-36.3.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822249" comment="php-xml-5.4.16-36.3.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822250" comment="php-xmlrpc-5.4.16-36.3.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165386" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5386</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5386" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5386" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5386" ref_url="https://www.suse.com/security/cve/CVE-2016-5386" source="SUSE CVE"/>
    <description>
    The net/http package in Go through 1.6 does not attempt to address RFC 3875 section 4.1.18 namespace conflicts and therefore does not protect CGI applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect a CGI application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5386/">CVE-2016-5386 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5386">CVE-2016-5386 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/988484">SUSE bug 988484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988486">SUSE bug 988486</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988487">SUSE bug 988487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988488">SUSE bug 988488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988489">SUSE bug 988489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988491">SUSE bug 988491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988492">SUSE bug 988492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989125">SUSE bug 989125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989174">SUSE bug 989174</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822188" comment="golang-1.6.3-1.el7_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822189" comment="golang-bin-1.6.3-1.el7_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822190" comment="golang-docs-1.6.3-1.el7_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822191" comment="golang-misc-1.6.3-1.el7_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822192" comment="golang-src-1.6.3-1.el7_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822193" comment="golang-tests-1.6.3-1.el7_2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165387" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5387</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5387" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5387" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5387" ref_url="https://www.suse.com/security/cve/CVE-2016-5387" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002213.html" source="SUSE-SU"/>
		<reference ref_id="TID7017856" ref_url="https://www.suse.com/support/kb/doc/?id=7017856" source="SUSE-SU"/>
    <description>
    The Apache HTTP Server through 2.4.23 follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue.  NOTE: the vendor states "This mitigation has been assigned the identifier CVE-2016-5387"; in other words, this is not a CVE ID for a vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5387/">CVE-2016-5387 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5387">CVE-2016-5387 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/988484">SUSE bug 988484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988486">SUSE bug 988486</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988487">SUSE bug 988487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988488">SUSE bug 988488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988489">SUSE bug 988489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988491">SUSE bug 988491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988492">SUSE bug 988492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989125">SUSE bug 989125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989174">SUSE bug 989174</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989684">SUSE bug 989684</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822132" comment="httpd-2.4.6-40.el7_2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822133" comment="httpd-devel-2.4.6-40.el7_2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822134" comment="httpd-manual-2.4.6-40.el7_2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822135" comment="httpd-tools-2.4.6-40.el7_2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822136" comment="mod_ldap-2.4.6-40.el7_2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822137" comment="mod_proxy_html-2.4.6-40.el7_2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822138" comment="mod_session-2.4.6-40.el7_2.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822139" comment="mod_ssl-2.4.6-40.el7_2.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165388" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5388</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5388" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5388" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5388" ref_url="https://www.suse.com/security/cve/CVE-2016-5388" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002971.html" source="SUSE-SU"/>
		<reference ref_id="TID7017856" ref_url="https://www.suse.com/support/kb/doc/?id=7017856" source="SUSE-SU"/>
    <description>
    Apache Tomcat 7.x through 7.0.70 and 8.x through 8.5.4, when the CGI Servlet is enabled, follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue. NOTE: the vendor states "A mitigation is planned for future releases of Tomcat, tracked as CVE-2016-5388"; in other words, this is not a CVE ID for a vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5388/">CVE-2016-5388 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5388">CVE-2016-5388 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/988484">SUSE bug 988484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988486">SUSE bug 988486</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988487">SUSE bug 988487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988488">SUSE bug 988488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988489">SUSE bug 988489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988491">SUSE bug 988491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988492">SUSE bug 988492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989125">SUSE bug 989125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989174">SUSE bug 989174</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822320" comment="tomcat-7.0.54-8.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822321" comment="tomcat-admin-webapps-7.0.54-8.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822322" comment="tomcat-docs-webapp-7.0.54-8.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822323" comment="tomcat-el-2.2-api-7.0.54-8.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822324" comment="tomcat-javadoc-7.0.54-8.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822325" comment="tomcat-jsp-2.2-api-7.0.54-8.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822326" comment="tomcat-jsvc-7.0.54-8.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822327" comment="tomcat-lib-7.0.54-8.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822328" comment="tomcat-servlet-3.0-api-7.0.54-8.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822329" comment="tomcat-webapps-7.0.54-8.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165399" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5399</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5399" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5399" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5399" ref_url="https://www.suse.com/security/cve/CVE-2016-5399" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2460-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002382.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2451-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YJJ34KZ3MW5MTS5HAZ73C7VNHMGMF3WQ/#YJJ34KZ3MW5MTS5HAZ73C7VNHMGMF3WQ" source="SUSE-SU"/>
    <description>
    The bzread function in ext/bz2/bz2.c in PHP before 5.5.38, 5.6.x before 5.6.24, and 7.x before 7.0.9 allows remote attackers to cause a denial of service (out-of-bounds write) or execute arbitrary code via a crafted bz2 archive.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5399/">CVE-2016-5399 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5399">CVE-2016-5399 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/991430">SUSE bug 991430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822561" comment="php-5.4.16-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822562" comment="php-bcmath-5.4.16-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822563" comment="php-cli-5.4.16-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822564" comment="php-common-5.4.16-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822565" comment="php-dba-5.4.16-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822566" comment="php-devel-5.4.16-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822567" comment="php-embedded-5.4.16-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822568" comment="php-enchant-5.4.16-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822569" comment="php-fpm-5.4.16-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822570" comment="php-gd-5.4.16-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822571" comment="php-intl-5.4.16-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822572" comment="php-ldap-5.4.16-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822573" comment="php-mbstring-5.4.16-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822574" comment="php-mysql-5.4.16-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822575" comment="php-mysqlnd-5.4.16-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822576" comment="php-odbc-5.4.16-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822577" comment="php-pdo-5.4.16-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822578" comment="php-pgsql-5.4.16-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822579" comment="php-process-5.4.16-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822580" comment="php-pspell-5.4.16-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822581" comment="php-recode-5.4.16-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822582" comment="php-snmp-5.4.16-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822583" comment="php-soap-5.4.16-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822584" comment="php-xml-5.4.16-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822585" comment="php-xmlrpc-5.4.16-42.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165403" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5403</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5403" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5403" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5403" ref_url="https://www.suse.com/security/cve/CVE-2016-5403" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002402.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SEGSV5T3S2ZKXR3FBHOEH6ZATP7GNXOI/#SEGSV5T3S2ZKXR3FBHOEH6ZATP7GNXOI" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2497-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SN42T3R5VY52V47YKP7INPGVVIOYAXJM/#SN42T3R5VY52V47YKP7INPGVVIOYAXJM" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2642-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LC23VKKIEESEEWT2LOAIKN4OILWG3KQ7/#LC23VKKIEESEEWT2LOAIKN4OILWG3KQ7" source="SUSE-SU"/>
    <description>
    The virtqueue_pop function in hw/virtio/virtio.c in QEMU allows local guest OS administrators to cause a denial of service (memory consumption and QEMU process crash) by submitting requests without waiting for completion.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-04-15"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5403/">CVE-2016-5403 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5403">CVE-2016-5403 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/990923">SUSE bug 990923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991080">SUSE bug 991080</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822219" comment="libcacard-1.5.3-105.el7_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822220" comment="libcacard-devel-1.5.3-105.el7_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822221" comment="libcacard-tools-1.5.3-105.el7_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822222" comment="qemu-img-1.5.3-105.el7_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822223" comment="qemu-kvm-1.5.3-105.el7_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822224" comment="qemu-kvm-common-1.5.3-105.el7_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822225" comment="qemu-kvm-tools-1.5.3-105.el7_2.7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165404" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5404</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5404" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5404" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5404" ref_url="https://www.suse.com/security/cve/CVE-2016-5404" source="SUSE CVE"/>
    <description>
    The cert_revoke command in FreeIPA does not check for the "revoke certificate" permission, which allows remote authenticated users to revoke arbitrary certificates by leveraging the "retrieve certificate" permission.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5404/">CVE-2016-5404 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5404">CVE-2016-5404 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822275" comment="ipa-admintools-4.2.0-15.el7_2.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822276" comment="ipa-client-4.2.0-15.el7_2.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822277" comment="ipa-python-4.2.0-15.el7_2.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822278" comment="ipa-server-4.2.0-15.el7_2.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822279" comment="ipa-server-dns-4.2.0-15.el7_2.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822280" comment="ipa-server-trust-ad-4.2.0-15.el7_2.19 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165405" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5405</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5405" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5405" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5405" ref_url="https://www.suse.com/security/cve/CVE-2016-5405" source="SUSE CVE"/>
    <description>
    389 Directory Server in Red Hat Enterprise Linux Desktop 6 through 7, Red Hat Enterprise Linux HPC Node 6 through 7, Red Hat Enterprise Linux Server 6 through 7, and Red Hat Enterprise Linux Workstation 6 through 7 allows remote attackers to obtain user passwords.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5405/">CVE-2016-5405 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5405">CVE-2016-5405 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1007004">SUSE bug 1007004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076530">SUSE bug 1076530</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822543" comment="389-ds-base-1.3.5.10-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822544" comment="389-ds-base-devel-1.3.5.10-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822545" comment="389-ds-base-libs-1.3.5.10-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822546" comment="389-ds-base-snmp-1.3.5.10-11.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165410" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5410</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5410" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5410" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5410" ref_url="https://www.suse.com/security/cve/CVE-2016-5410" source="SUSE CVE"/>
    <description>
    firewalld.py in firewalld before 0.4.3.3 allows local users to bypass authentication and modify firewall configurations via the (1) addPassthrough, (2) removePassthrough, (3) addEntry, (4) removeEntry, or (5) setEntries D-Bus API method.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5410/">CVE-2016-5410 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5410">CVE-2016-5410 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/992772">SUSE bug 992772</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822556" comment="firewall-applet-0.4.3.2-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822557" comment="firewall-config-0.4.3.2-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822558" comment="firewalld-0.4.3.2-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822559" comment="firewalld-filesystem-0.4.3.2-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822560" comment="python-firewall-0.4.3.2-8.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165412" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5412</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5412" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5412" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5412" ref_url="https://www.suse.com/security/cve/CVE-2016-5412" source="SUSE CVE"/>
    <description>
    arch/powerpc/kvm/book3s_hv_rmhandlers.S in the Linux kernel through 4.7 on PowerPC platforms, when CONFIG_KVM_BOOK3S_64_HV is enabled, allows guest OS users to cause a denial of service (host OS infinite loop) by making a H_CEDE hypercall during the existence of a suspended transaction.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5412/">CVE-2016-5412 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5412">CVE-2016-5412 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1013013">SUSE bug 1013013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991065">SUSE bug 991065</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822375" comment="kernel-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822376" comment="kernel-abi-whitelists-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822377" comment="kernel-debug-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822380" comment="kernel-doc-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822381" comment="kernel-headers-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822382" comment="kernel-tools-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822383" comment="kernel-tools-libs-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822385" comment="perf-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822386" comment="python-perf-3.10.0-514.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165416" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5416</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5416" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5416" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5416" ref_url="https://www.suse.com/security/cve/CVE-2016-5416" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005817.html" source="SUSE-SU"/>
    <description>
    389 Directory Server in Red Hat Enterprise Linux Desktop 6 through 7, Red Hat Enterprise Linux HPC Node 6 through 7, Red Hat Enterprise Linux Server 6 through 7, and Red Hat Enterprise Linux Workstation 6 through 7 allows remote attackers to read the default Access Control Instructions.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5416/">CVE-2016-5416 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5416">CVE-2016-5416 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/991201">SUSE bug 991201</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822543" comment="389-ds-base-1.3.5.10-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822544" comment="389-ds-base-devel-1.3.5.10-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822545" comment="389-ds-base-libs-1.3.5.10-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822546" comment="389-ds-base-snmp-1.3.5.10-11.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165418" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5418</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5418" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5418" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5418" ref_url="https://www.suse.com/security/cve/CVE-2016-5418" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002421.html" source="SUSE-SU"/>
    <description>
    The sandboxing code in libarchive 3.2.0 and earlier mishandles hardlink archive entries of non-zero data size, which might allow remote attackers to write to arbitrary files via a crafted archive file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5418/">CVE-2016-5418 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5418">CVE-2016-5418 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/998677">SUSE bug 998677</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822282" comment="bsdcpio-3.1.2-10.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822283" comment="bsdtar-3.1.2-10.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822284" comment="libarchive-3.1.2-10.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822285" comment="libarchive-devel-3.1.2-10.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165419" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5419</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5419" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5419" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5419" ref_url="https://www.suse.com/security/cve/CVE-2016-5419" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
    <description>
    curl and libcurl before 7.50.1 do not prevent TLS session resumption when the client certificate has changed, which allows remote attackers to bypass intended restrictions by resuming a session.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5419/">CVE-2016-5419 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5419">CVE-2016-5419 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1033413">SUSE bug 1033413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033442">SUSE bug 1033442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991389">SUSE bug 991389</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822387" comment="curl-7.29.0-35.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822388" comment="libcurl-7.29.0-35.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822389" comment="libcurl-devel-7.29.0-35.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165420" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5420</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5420" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5420" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5420" ref_url="https://www.suse.com/security/cve/CVE-2016-5420" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002387.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
    <description>
    curl and libcurl before 7.50.1 do not check the client certificate when choosing the TLS connection to reuse, which might allow remote attackers to hijack the authentication of the connection by leveraging a previously created connection with a different client certificate.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5420/">CVE-2016-5420 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5420">CVE-2016-5420 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/991390">SUSE bug 991390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997420">SUSE bug 997420</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822387" comment="curl-7.29.0-35.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822388" comment="libcurl-7.29.0-35.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822389" comment="libcurl-devel-7.29.0-35.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165423" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5423</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5423" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5423" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5423" ref_url="https://www.suse.com/security/cve/CVE-2016-5423" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002302.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2425-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WV55N6TJ3HC3NB5K3N456CZCKCKU5YOC/#WV55N6TJ3HC3NB5K3N456CZCKCKU5YOC" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2464-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DCY55VN2HEMVAYYE4IAD4WIQUDFXVBIT/#DCY55VN2HEMVAYYE4IAD4WIQUDFXVBIT" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1021-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NKHJOTG5GP7RNQ2TVYGOUR5MRV4DZTZM/#NKHJOTG5GP7RNQ2TVYGOUR5MRV4DZTZM" source="SUSE-SU"/>
    <description>
    PostgreSQL before 9.1.23, 9.2.x before 9.2.18, 9.3.x before 9.3.14, 9.4.x before 9.4.9, and 9.5.x before 9.5.4 allow remote authenticated users to cause a denial of service (NULL pointer dereference and server crash), obtain sensitive memory information, or possibly execute arbitrary code via (1) a CASE expression within the test value subexpression of another CASE or (2) inlining of an SQL function that implements the equality operator used for a CASE expression involving values of different types.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5423/">CVE-2016-5423 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5423">CVE-2016-5423 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1041981">SUSE bug 1041981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042497">SUSE bug 1042497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052683">SUSE bug 1052683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993454">SUSE bug 993454</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822625" comment="postgresql-9.2.18-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822626" comment="postgresql-contrib-9.2.18-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822627" comment="postgresql-devel-9.2.18-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822628" comment="postgresql-docs-9.2.18-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822629" comment="postgresql-libs-9.2.18-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822630" comment="postgresql-plperl-9.2.18-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822631" comment="postgresql-plpython-9.2.18-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822632" comment="postgresql-pltcl-9.2.18-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822633" comment="postgresql-server-9.2.18-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822634" comment="postgresql-test-9.2.18-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822635" comment="postgresql-upgrade-9.2.18-1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165424" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5424</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5424" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5424" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5424" ref_url="https://www.suse.com/security/cve/CVE-2016-5424" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002302.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2425-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WV55N6TJ3HC3NB5K3N456CZCKCKU5YOC/#WV55N6TJ3HC3NB5K3N456CZCKCKU5YOC" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2464-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DCY55VN2HEMVAYYE4IAD4WIQUDFXVBIT/#DCY55VN2HEMVAYYE4IAD4WIQUDFXVBIT" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1021-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NKHJOTG5GP7RNQ2TVYGOUR5MRV4DZTZM/#NKHJOTG5GP7RNQ2TVYGOUR5MRV4DZTZM" source="SUSE-SU"/>
    <description>
    PostgreSQL before 9.1.23, 9.2.x before 9.2.18, 9.3.x before 9.3.14, 9.4.x before 9.4.9, and 9.5.x before 9.5.4 might allow remote authenticated users with the CREATEDB or CREATEROLE role to gain superuser privileges via a (1) " (double quote), (2) \ (backslash), (3) carriage return, or (4) newline character in a (a) database or (b) role name that is mishandled during an administrative operation.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5424/">CVE-2016-5424 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5424">CVE-2016-5424 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1041981">SUSE bug 1041981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042497">SUSE bug 1042497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052683">SUSE bug 1052683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993453">SUSE bug 993453</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822625" comment="postgresql-9.2.18-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822626" comment="postgresql-contrib-9.2.18-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822627" comment="postgresql-devel-9.2.18-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822628" comment="postgresql-docs-9.2.18-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822629" comment="postgresql-libs-9.2.18-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822630" comment="postgresql-plperl-9.2.18-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822631" comment="postgresql-plpython-9.2.18-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822632" comment="postgresql-pltcl-9.2.18-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822633" comment="postgresql-server-9.2.18-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822634" comment="postgresql-test-9.2.18-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822635" comment="postgresql-upgrade-9.2.18-1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165425" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5425</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5425" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5425" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5425" ref_url="https://www.suse.com/security/cve/CVE-2016-5425" source="SUSE CVE"/>
    <description>
    The Tomcat package on Red Hat Enterprise Linux (RHEL) 7, Fedora, CentOS, Oracle Linux, and possibly other Linux distributions uses weak permissions for /usr/lib/tmpfiles.d/tomcat.conf, which allows local users to gain root privileges by leveraging membership in the tomcat group.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5425/">CVE-2016-5425 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5425">CVE-2016-5425 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1003877">SUSE bug 1003877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172405">SUSE bug 1172405</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822320" comment="tomcat-7.0.54-8.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822321" comment="tomcat-admin-webapps-7.0.54-8.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822322" comment="tomcat-docs-webapp-7.0.54-8.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822323" comment="tomcat-el-2.2-api-7.0.54-8.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822324" comment="tomcat-javadoc-7.0.54-8.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822325" comment="tomcat-jsp-2.2-api-7.0.54-8.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822326" comment="tomcat-jsvc-7.0.54-8.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822327" comment="tomcat-lib-7.0.54-8.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822328" comment="tomcat-servlet-3.0-api-7.0.54-8.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822329" comment="tomcat-webapps-7.0.54-8.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165440" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5440</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5440" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5440" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5440" ref_url="https://www.suse.com/security/cve/CVE-2016-5440" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002279.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2746-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3CUYJAGC7JTKPQYLE2ZTEPBVQ3J4BFHO/#3CUYJAGC7JTKPQYLE2ZTEPBVQ3J4BFHO" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2769-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BOIVZNRI2WQ56MPKE6BVFPLBB4RKMOJF/#BOIVZNRI2WQ56MPKE6BVFPLBB4RKMOJF" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2788-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2XSIJ4CL46B7JEPC7XYAF6F24TA3GW4B/#2XSIJ4CL46B7JEPC7XYAF6F24TA3GW4B" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.49 and earlier, 5.6.30 and earlier, and 5.7.12 and earlier and MariaDB before 5.5.50, 10.0.x before 10.0.26, and 10.1.x before 10.1.15 allows remote administrators to affect availability via vectors related to Server: RBR.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5440/">CVE-2016-5440 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5440">CVE-2016-5440 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/989926">SUSE bug 989926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991616">SUSE bug 991616</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822211" comment="mariadb-5.5.50-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822212" comment="mariadb-bench-5.5.50-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822213" comment="mariadb-devel-5.5.50-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822214" comment="mariadb-embedded-5.5.50-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822215" comment="mariadb-embedded-devel-5.5.50-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822216" comment="mariadb-libs-5.5.50-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822217" comment="mariadb-server-5.5.50-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822218" comment="mariadb-test-5.5.50-1.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165444" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5444</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5444" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5444" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5444" ref_url="https://www.suse.com/security/cve/CVE-2016-5444" source="SUSE CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.11 and earlier and MariaDB before 5.5.49, 10.0.x before 10.0.25, and 10.1.x before 10.1.14 allows remote attackers to affect confidentiality via vectors related to Server: Connection.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5444/">CVE-2016-5444 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5444">CVE-2016-5444 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/989930">SUSE bug 989930</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822211" comment="mariadb-5.5.50-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822212" comment="mariadb-bench-5.5.50-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822213" comment="mariadb-devel-5.5.50-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822214" comment="mariadb-embedded-5.5.50-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822215" comment="mariadb-embedded-devel-5.5.50-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822216" comment="mariadb-libs-5.5.50-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822217" comment="mariadb-server-5.5.50-1.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822218" comment="mariadb-test-5.5.50-1.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165542" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5542</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5542" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5542" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5542" ref_url="https://www.suse.com/security/cve/CVE-2016-5542" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002412.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3010-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002462.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2862-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KWKIXAIQNNYT4YXTWGPFKWK5EKFDLMZR/#KWKIXAIQNNYT4YXTWGPFKWK5EKFDLMZR" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2985-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HVS4QUY6Q3I4K6UUZQUJC42ZUQE7FKCL/#HVS4QUY6Q3I4K6UUZQUJC42ZUQE7FKCL" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u121, 7u111, 8u102; and Java SE Embedded 8u101 allows remote attackers to affect integrity via vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-02-25"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5542/">CVE-2016-5542 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5542">CVE-2016-5542 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1005522">SUSE bug 1005522</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009280">SUSE bug 1009280</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822747" comment="java-1.6.0-openjdk-1.6.0.41-1.13.13.1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822748" comment="java-1.6.0-openjdk-demo-1.6.0.41-1.13.13.1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822749" comment="java-1.6.0-openjdk-devel-1.6.0.41-1.13.13.1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822750" comment="java-1.6.0-openjdk-javadoc-1.6.0.41-1.13.13.1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822751" comment="java-1.6.0-openjdk-src-1.6.0.41-1.13.13.1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822669" comment="java-1.7.0-openjdk-1.7.0.121-2.6.8.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822670" comment="java-1.7.0-openjdk-accessibility-1.7.0.121-2.6.8.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822671" comment="java-1.7.0-openjdk-demo-1.7.0.121-2.6.8.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822672" comment="java-1.7.0-openjdk-devel-1.7.0.121-2.6.8.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822673" comment="java-1.7.0-openjdk-headless-1.7.0.121-2.6.8.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822674" comment="java-1.7.0-openjdk-javadoc-1.7.0.121-2.6.8.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822675" comment="java-1.7.0-openjdk-src-1.7.0.121-2.6.8.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822342" comment="java-1.8.0-openjdk-1.8.0.111-1.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822343" comment="java-1.8.0-openjdk-accessibility-1.8.0.111-1.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822344" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.111-1.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822345" comment="java-1.8.0-openjdk-debug-1.8.0.111-1.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822346" comment="java-1.8.0-openjdk-demo-1.8.0.111-1.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822347" comment="java-1.8.0-openjdk-demo-debug-1.8.0.111-1.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822348" comment="java-1.8.0-openjdk-devel-1.8.0.111-1.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822349" comment="java-1.8.0-openjdk-devel-debug-1.8.0.111-1.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822350" comment="java-1.8.0-openjdk-headless-1.8.0.111-1.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822351" comment="java-1.8.0-openjdk-headless-debug-1.8.0.111-1.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822352" comment="java-1.8.0-openjdk-javadoc-1.8.0.111-1.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822353" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.111-1.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822354" comment="java-1.8.0-openjdk-src-1.8.0.111-1.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822355" comment="java-1.8.0-openjdk-src-debug-1.8.0.111-1.b15.el7_2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822747" comment="java-1.6.0-openjdk-1.6.0.41-1.13.13.1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822748" comment="java-1.6.0-openjdk-demo-1.6.0.41-1.13.13.1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822749" comment="java-1.6.0-openjdk-devel-1.6.0.41-1.13.13.1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822750" comment="java-1.6.0-openjdk-javadoc-1.6.0.41-1.13.13.1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822751" comment="java-1.6.0-openjdk-src-1.6.0.41-1.13.13.1.el7_3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165546" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5546</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5546" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5546" ref_url="https://www.suse.com/security/cve/CVE-2016-5546" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002613.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002651.html" source="SUSE-SU"/>
		<reference ref_id="TID7020150" ref_url="https://www.suse.com/support/kb/doc/?id=7020150" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0374-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CFQXMIUEYAAFEMNGA4VAINBTGFZC5IIJ/#CFQXMIUEYAAFEMNGA4VAINBTGFZC5IIJ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0513-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5MQTL4UZJTP3OTMSAPDFWKNC6HVTCMS6/#5MQTL4UZJTP3OTMSAPDFWKNC6HVTCMS6" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111; JRockit: R28.3.12. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, JRockit accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS v3.0 Base Score 7.5 (Integrity impacts).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5546/">CVE-2016-5546 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5546">CVE-2016-5546 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1020905">SUSE bug 1020905</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822814" comment="java-1.7.0-openjdk-1.7.0.131-2.6.9.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822815" comment="java-1.7.0-openjdk-accessibility-1.7.0.131-2.6.9.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822816" comment="java-1.7.0-openjdk-demo-1.7.0.131-2.6.9.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822817" comment="java-1.7.0-openjdk-devel-1.7.0.131-2.6.9.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822818" comment="java-1.7.0-openjdk-headless-1.7.0.131-2.6.9.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822819" comment="java-1.7.0-openjdk-javadoc-1.7.0.131-2.6.9.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822820" comment="java-1.7.0-openjdk-src-1.7.0.131-2.6.9.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822782" comment="java-1.8.0-openjdk-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822783" comment="java-1.8.0-openjdk-accessibility-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822784" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822785" comment="java-1.8.0-openjdk-debug-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822786" comment="java-1.8.0-openjdk-demo-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822787" comment="java-1.8.0-openjdk-demo-debug-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822788" comment="java-1.8.0-openjdk-devel-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822789" comment="java-1.8.0-openjdk-devel-debug-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822790" comment="java-1.8.0-openjdk-headless-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822791" comment="java-1.8.0-openjdk-headless-debug-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822792" comment="java-1.8.0-openjdk-javadoc-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822793" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822794" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822795" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822796" comment="java-1.8.0-openjdk-src-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822797" comment="java-1.8.0-openjdk-src-debug-1.8.0.121-0.b13.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5547</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5547" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5547" ref_url="https://www.suse.com/security/cve/CVE-2016-5547" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002613.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002641.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002651.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0374-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CFQXMIUEYAAFEMNGA4VAINBTGFZC5IIJ/#CFQXMIUEYAAFEMNGA4VAINBTGFZC5IIJ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0513-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5MQTL4UZJTP3OTMSAPDFWKNC6HVTCMS6/#5MQTL4UZJTP3OTMSAPDFWKNC6HVTCMS6" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u121 and 8u112; Java SE Embedded: 8u111; JRockit: R28.3.12. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS v3.0 Base Score 5.3 (Availability impacts).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5547/">CVE-2016-5547 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5547">CVE-2016-5547 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1020905">SUSE bug 1020905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024218">SUSE bug 1024218</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822814" comment="java-1.7.0-openjdk-1.7.0.131-2.6.9.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822815" comment="java-1.7.0-openjdk-accessibility-1.7.0.131-2.6.9.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822816" comment="java-1.7.0-openjdk-demo-1.7.0.131-2.6.9.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822817" comment="java-1.7.0-openjdk-devel-1.7.0.131-2.6.9.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822818" comment="java-1.7.0-openjdk-headless-1.7.0.131-2.6.9.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822819" comment="java-1.7.0-openjdk-javadoc-1.7.0.131-2.6.9.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822820" comment="java-1.7.0-openjdk-src-1.7.0.131-2.6.9.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822782" comment="java-1.8.0-openjdk-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822783" comment="java-1.8.0-openjdk-accessibility-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822784" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822785" comment="java-1.8.0-openjdk-debug-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822786" comment="java-1.8.0-openjdk-demo-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822787" comment="java-1.8.0-openjdk-demo-debug-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822788" comment="java-1.8.0-openjdk-devel-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822789" comment="java-1.8.0-openjdk-devel-debug-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822790" comment="java-1.8.0-openjdk-headless-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822791" comment="java-1.8.0-openjdk-headless-debug-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822792" comment="java-1.8.0-openjdk-javadoc-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822793" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822794" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822795" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822796" comment="java-1.8.0-openjdk-src-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822797" comment="java-1.8.0-openjdk-src-debug-1.8.0.121-0.b13.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165548" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5548</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5548" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5548" ref_url="https://www.suse.com/security/cve/CVE-2016-5548" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002613.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002641.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002651.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0374-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CFQXMIUEYAAFEMNGA4VAINBTGFZC5IIJ/#CFQXMIUEYAAFEMNGA4VAINBTGFZC5IIJ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0513-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5MQTL4UZJTP3OTMSAPDFWKNC6HVTCMS6/#5MQTL4UZJTP3OTMSAPDFWKNC6HVTCMS6" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS v3.0 Base Score 6.5 (Confidentiality impacts).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5548/">CVE-2016-5548 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5548">CVE-2016-5548 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1020905">SUSE bug 1020905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024218">SUSE bug 1024218</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822814" comment="java-1.7.0-openjdk-1.7.0.131-2.6.9.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822815" comment="java-1.7.0-openjdk-accessibility-1.7.0.131-2.6.9.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822816" comment="java-1.7.0-openjdk-demo-1.7.0.131-2.6.9.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822817" comment="java-1.7.0-openjdk-devel-1.7.0.131-2.6.9.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822818" comment="java-1.7.0-openjdk-headless-1.7.0.131-2.6.9.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822819" comment="java-1.7.0-openjdk-javadoc-1.7.0.131-2.6.9.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822820" comment="java-1.7.0-openjdk-src-1.7.0.131-2.6.9.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822782" comment="java-1.8.0-openjdk-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822783" comment="java-1.8.0-openjdk-accessibility-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822784" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822785" comment="java-1.8.0-openjdk-debug-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822786" comment="java-1.8.0-openjdk-demo-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822787" comment="java-1.8.0-openjdk-demo-debug-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822788" comment="java-1.8.0-openjdk-devel-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822789" comment="java-1.8.0-openjdk-devel-debug-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822790" comment="java-1.8.0-openjdk-headless-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822791" comment="java-1.8.0-openjdk-headless-debug-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822792" comment="java-1.8.0-openjdk-javadoc-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822793" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822794" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822795" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822796" comment="java-1.8.0-openjdk-src-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822797" comment="java-1.8.0-openjdk-src-debug-1.8.0.121-0.b13.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165552" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5552</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5552" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5552" ref_url="https://www.suse.com/security/cve/CVE-2016-5552" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002613.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002641.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002651.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0374-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CFQXMIUEYAAFEMNGA4VAINBTGFZC5IIJ/#CFQXMIUEYAAFEMNGA4VAINBTGFZC5IIJ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0513-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5MQTL4UZJTP3OTMSAPDFWKNC6HVTCMS6/#5MQTL4UZJTP3OTMSAPDFWKNC6HVTCMS6" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111; JRockit: R28.3.12. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded, JRockit accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS v3.0 Base Score 5.3 (Integrity impacts).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5552/">CVE-2016-5552 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5552">CVE-2016-5552 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1020905">SUSE bug 1020905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024218">SUSE bug 1024218</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822814" comment="java-1.7.0-openjdk-1.7.0.131-2.6.9.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822815" comment="java-1.7.0-openjdk-accessibility-1.7.0.131-2.6.9.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822816" comment="java-1.7.0-openjdk-demo-1.7.0.131-2.6.9.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822817" comment="java-1.7.0-openjdk-devel-1.7.0.131-2.6.9.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822818" comment="java-1.7.0-openjdk-headless-1.7.0.131-2.6.9.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822819" comment="java-1.7.0-openjdk-javadoc-1.7.0.131-2.6.9.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822820" comment="java-1.7.0-openjdk-src-1.7.0.131-2.6.9.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822782" comment="java-1.8.0-openjdk-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822783" comment="java-1.8.0-openjdk-accessibility-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822784" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822785" comment="java-1.8.0-openjdk-debug-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822786" comment="java-1.8.0-openjdk-demo-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822787" comment="java-1.8.0-openjdk-demo-debug-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822788" comment="java-1.8.0-openjdk-devel-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822789" comment="java-1.8.0-openjdk-devel-debug-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822790" comment="java-1.8.0-openjdk-headless-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822791" comment="java-1.8.0-openjdk-headless-debug-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822792" comment="java-1.8.0-openjdk-javadoc-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822793" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822794" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822795" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822796" comment="java-1.8.0-openjdk-src-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822797" comment="java-1.8.0-openjdk-src-debug-1.8.0.121-0.b13.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165554" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5554</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5554" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5554" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5554" ref_url="https://www.suse.com/security/cve/CVE-2016-5554" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002412.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3010-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002462.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2862-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KWKIXAIQNNYT4YXTWGPFKWK5EKFDLMZR/#KWKIXAIQNNYT4YXTWGPFKWK5EKFDLMZR" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2985-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HVS4QUY6Q3I4K6UUZQUJC42ZUQE7FKCL/#HVS4QUY6Q3I4K6UUZQUJC42ZUQE7FKCL" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u121, 7u111, 8u102; and Java SE Embedded 8u101 allows remote attackers to affect integrity via vectors related to JMX.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5554/">CVE-2016-5554 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5554">CVE-2016-5554 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1005523">SUSE bug 1005523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009280">SUSE bug 1009280</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822747" comment="java-1.6.0-openjdk-1.6.0.41-1.13.13.1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822748" comment="java-1.6.0-openjdk-demo-1.6.0.41-1.13.13.1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822749" comment="java-1.6.0-openjdk-devel-1.6.0.41-1.13.13.1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822750" comment="java-1.6.0-openjdk-javadoc-1.6.0.41-1.13.13.1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822751" comment="java-1.6.0-openjdk-src-1.6.0.41-1.13.13.1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822669" comment="java-1.7.0-openjdk-1.7.0.121-2.6.8.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822670" comment="java-1.7.0-openjdk-accessibility-1.7.0.121-2.6.8.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822671" comment="java-1.7.0-openjdk-demo-1.7.0.121-2.6.8.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822672" comment="java-1.7.0-openjdk-devel-1.7.0.121-2.6.8.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822673" comment="java-1.7.0-openjdk-headless-1.7.0.121-2.6.8.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822674" comment="java-1.7.0-openjdk-javadoc-1.7.0.121-2.6.8.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822675" comment="java-1.7.0-openjdk-src-1.7.0.121-2.6.8.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822342" comment="java-1.8.0-openjdk-1.8.0.111-1.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822343" comment="java-1.8.0-openjdk-accessibility-1.8.0.111-1.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822344" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.111-1.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822345" comment="java-1.8.0-openjdk-debug-1.8.0.111-1.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822346" comment="java-1.8.0-openjdk-demo-1.8.0.111-1.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822347" comment="java-1.8.0-openjdk-demo-debug-1.8.0.111-1.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822348" comment="java-1.8.0-openjdk-devel-1.8.0.111-1.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822349" comment="java-1.8.0-openjdk-devel-debug-1.8.0.111-1.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822350" comment="java-1.8.0-openjdk-headless-1.8.0.111-1.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822351" comment="java-1.8.0-openjdk-headless-debug-1.8.0.111-1.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822352" comment="java-1.8.0-openjdk-javadoc-1.8.0.111-1.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822353" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.111-1.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822354" comment="java-1.8.0-openjdk-src-1.8.0.111-1.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822355" comment="java-1.8.0-openjdk-src-debug-1.8.0.111-1.b15.el7_2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822747" comment="java-1.6.0-openjdk-1.6.0.41-1.13.13.1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822748" comment="java-1.6.0-openjdk-demo-1.6.0.41-1.13.13.1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822749" comment="java-1.6.0-openjdk-devel-1.6.0.41-1.13.13.1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822750" comment="java-1.6.0-openjdk-javadoc-1.6.0.41-1.13.13.1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822751" comment="java-1.6.0-openjdk-src-1.6.0.41-1.13.13.1.el7_3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165573" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5573</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5573" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5573" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5573" ref_url="https://www.suse.com/security/cve/CVE-2016-5573" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002412.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3010-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002462.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2862-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KWKIXAIQNNYT4YXTWGPFKWK5EKFDLMZR/#KWKIXAIQNNYT4YXTWGPFKWK5EKFDLMZR" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2985-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HVS4QUY6Q3I4K6UUZQUJC42ZUQE7FKCL/#HVS4QUY6Q3I4K6UUZQUJC42ZUQE7FKCL" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u121, 7u111, 8u102; and Java SE Embedded 8u101 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Hotspot, a different vulnerability than CVE-2016-5582.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5573/">CVE-2016-5573 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5573">CVE-2016-5573 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1005526">SUSE bug 1005526</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009280">SUSE bug 1009280</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822747" comment="java-1.6.0-openjdk-1.6.0.41-1.13.13.1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822748" comment="java-1.6.0-openjdk-demo-1.6.0.41-1.13.13.1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822749" comment="java-1.6.0-openjdk-devel-1.6.0.41-1.13.13.1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822750" comment="java-1.6.0-openjdk-javadoc-1.6.0.41-1.13.13.1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822751" comment="java-1.6.0-openjdk-src-1.6.0.41-1.13.13.1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822669" comment="java-1.7.0-openjdk-1.7.0.121-2.6.8.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822670" comment="java-1.7.0-openjdk-accessibility-1.7.0.121-2.6.8.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822671" comment="java-1.7.0-openjdk-demo-1.7.0.121-2.6.8.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822672" comment="java-1.7.0-openjdk-devel-1.7.0.121-2.6.8.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822673" comment="java-1.7.0-openjdk-headless-1.7.0.121-2.6.8.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822674" comment="java-1.7.0-openjdk-javadoc-1.7.0.121-2.6.8.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822675" comment="java-1.7.0-openjdk-src-1.7.0.121-2.6.8.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822342" comment="java-1.8.0-openjdk-1.8.0.111-1.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822343" comment="java-1.8.0-openjdk-accessibility-1.8.0.111-1.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822344" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.111-1.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822345" comment="java-1.8.0-openjdk-debug-1.8.0.111-1.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822346" comment="java-1.8.0-openjdk-demo-1.8.0.111-1.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822347" comment="java-1.8.0-openjdk-demo-debug-1.8.0.111-1.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822348" comment="java-1.8.0-openjdk-devel-1.8.0.111-1.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822349" comment="java-1.8.0-openjdk-devel-debug-1.8.0.111-1.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822350" comment="java-1.8.0-openjdk-headless-1.8.0.111-1.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822351" comment="java-1.8.0-openjdk-headless-debug-1.8.0.111-1.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822352" comment="java-1.8.0-openjdk-javadoc-1.8.0.111-1.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822353" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.111-1.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822354" comment="java-1.8.0-openjdk-src-1.8.0.111-1.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822355" comment="java-1.8.0-openjdk-src-debug-1.8.0.111-1.b15.el7_2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822747" comment="java-1.6.0-openjdk-1.6.0.41-1.13.13.1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822748" comment="java-1.6.0-openjdk-demo-1.6.0.41-1.13.13.1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822749" comment="java-1.6.0-openjdk-devel-1.6.0.41-1.13.13.1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822750" comment="java-1.6.0-openjdk-javadoc-1.6.0.41-1.13.13.1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822751" comment="java-1.6.0-openjdk-src-1.6.0.41-1.13.13.1.el7_3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165582" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5582</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5582" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5582" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5582" ref_url="https://www.suse.com/security/cve/CVE-2016-5582" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002412.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002431.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2862-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KWKIXAIQNNYT4YXTWGPFKWK5EKFDLMZR/#KWKIXAIQNNYT4YXTWGPFKWK5EKFDLMZR" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2985-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HVS4QUY6Q3I4K6UUZQUJC42ZUQE7FKCL/#HVS4QUY6Q3I4K6UUZQUJC42ZUQE7FKCL" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u121, 7u111, 8u102; and Java SE Embedded 8u101 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Hotspot, a different vulnerability than CVE-2016-5573.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-11-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5582/">CVE-2016-5582 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5582">CVE-2016-5582 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1005527">SUSE bug 1005527</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822747" comment="java-1.6.0-openjdk-1.6.0.41-1.13.13.1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822748" comment="java-1.6.0-openjdk-demo-1.6.0.41-1.13.13.1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822749" comment="java-1.6.0-openjdk-devel-1.6.0.41-1.13.13.1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822750" comment="java-1.6.0-openjdk-javadoc-1.6.0.41-1.13.13.1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822751" comment="java-1.6.0-openjdk-src-1.6.0.41-1.13.13.1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822669" comment="java-1.7.0-openjdk-1.7.0.121-2.6.8.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822670" comment="java-1.7.0-openjdk-accessibility-1.7.0.121-2.6.8.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822671" comment="java-1.7.0-openjdk-demo-1.7.0.121-2.6.8.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822672" comment="java-1.7.0-openjdk-devel-1.7.0.121-2.6.8.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822673" comment="java-1.7.0-openjdk-headless-1.7.0.121-2.6.8.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822674" comment="java-1.7.0-openjdk-javadoc-1.7.0.121-2.6.8.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822675" comment="java-1.7.0-openjdk-src-1.7.0.121-2.6.8.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822342" comment="java-1.8.0-openjdk-1.8.0.111-1.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822343" comment="java-1.8.0-openjdk-accessibility-1.8.0.111-1.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822344" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.111-1.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822345" comment="java-1.8.0-openjdk-debug-1.8.0.111-1.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822346" comment="java-1.8.0-openjdk-demo-1.8.0.111-1.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822347" comment="java-1.8.0-openjdk-demo-debug-1.8.0.111-1.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822348" comment="java-1.8.0-openjdk-devel-1.8.0.111-1.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822349" comment="java-1.8.0-openjdk-devel-debug-1.8.0.111-1.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822350" comment="java-1.8.0-openjdk-headless-1.8.0.111-1.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822351" comment="java-1.8.0-openjdk-headless-debug-1.8.0.111-1.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822352" comment="java-1.8.0-openjdk-javadoc-1.8.0.111-1.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822353" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.111-1.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822354" comment="java-1.8.0-openjdk-src-1.8.0.111-1.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822355" comment="java-1.8.0-openjdk-src-debug-1.8.0.111-1.b15.el7_2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822747" comment="java-1.6.0-openjdk-1.6.0.41-1.13.13.1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822748" comment="java-1.6.0-openjdk-demo-1.6.0.41-1.13.13.1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822749" comment="java-1.6.0-openjdk-devel-1.6.0.41-1.13.13.1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822750" comment="java-1.6.0-openjdk-javadoc-1.6.0.41-1.13.13.1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822751" comment="java-1.6.0-openjdk-src-1.6.0.41-1.13.13.1.el7_3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165597" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5597</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5597" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5597" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5597" ref_url="https://www.suse.com/security/cve/CVE-2016-5597" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002412.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3010-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002462.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2862-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KWKIXAIQNNYT4YXTWGPFKWK5EKFDLMZR/#KWKIXAIQNNYT4YXTWGPFKWK5EKFDLMZR" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2985-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HVS4QUY6Q3I4K6UUZQUJC42ZUQE7FKCL/#HVS4QUY6Q3I4K6UUZQUJC42ZUQE7FKCL" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u121, 7u111, 8u102; and Java SE Embedded 8u101 allows remote attackers to affect confidentiality via vectors related to Networking.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5597/">CVE-2016-5597 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5597">CVE-2016-5597 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1005528">SUSE bug 1005528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009280">SUSE bug 1009280</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822747" comment="java-1.6.0-openjdk-1.6.0.41-1.13.13.1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822748" comment="java-1.6.0-openjdk-demo-1.6.0.41-1.13.13.1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822749" comment="java-1.6.0-openjdk-devel-1.6.0.41-1.13.13.1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822750" comment="java-1.6.0-openjdk-javadoc-1.6.0.41-1.13.13.1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822751" comment="java-1.6.0-openjdk-src-1.6.0.41-1.13.13.1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822669" comment="java-1.7.0-openjdk-1.7.0.121-2.6.8.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822670" comment="java-1.7.0-openjdk-accessibility-1.7.0.121-2.6.8.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822671" comment="java-1.7.0-openjdk-demo-1.7.0.121-2.6.8.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822672" comment="java-1.7.0-openjdk-devel-1.7.0.121-2.6.8.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822673" comment="java-1.7.0-openjdk-headless-1.7.0.121-2.6.8.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822674" comment="java-1.7.0-openjdk-javadoc-1.7.0.121-2.6.8.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822675" comment="java-1.7.0-openjdk-src-1.7.0.121-2.6.8.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822342" comment="java-1.8.0-openjdk-1.8.0.111-1.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822343" comment="java-1.8.0-openjdk-accessibility-1.8.0.111-1.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822344" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.111-1.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822345" comment="java-1.8.0-openjdk-debug-1.8.0.111-1.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822346" comment="java-1.8.0-openjdk-demo-1.8.0.111-1.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822347" comment="java-1.8.0-openjdk-demo-debug-1.8.0.111-1.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822348" comment="java-1.8.0-openjdk-devel-1.8.0.111-1.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822349" comment="java-1.8.0-openjdk-devel-debug-1.8.0.111-1.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822350" comment="java-1.8.0-openjdk-headless-1.8.0.111-1.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822351" comment="java-1.8.0-openjdk-headless-debug-1.8.0.111-1.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822352" comment="java-1.8.0-openjdk-javadoc-1.8.0.111-1.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822353" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.111-1.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822354" comment="java-1.8.0-openjdk-src-1.8.0.111-1.b15.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822355" comment="java-1.8.0-openjdk-src-debug-1.8.0.111-1.b15.el7_2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822747" comment="java-1.6.0-openjdk-1.6.0.41-1.13.13.1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822748" comment="java-1.6.0-openjdk-demo-1.6.0.41-1.13.13.1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822749" comment="java-1.6.0-openjdk-devel-1.6.0.41-1.13.13.1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822750" comment="java-1.6.0-openjdk-javadoc-1.6.0.41-1.13.13.1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822751" comment="java-1.6.0-openjdk-src-1.6.0.41-1.13.13.1.el7_3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165612" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5612</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5612" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5612" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5612" ref_url="https://www.suse.com/security/cve/CVE-2016-5612" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:2746-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3CUYJAGC7JTKPQYLE2ZTEPBVQ3J4BFHO/#3CUYJAGC7JTKPQYLE2ZTEPBVQ3J4BFHO" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2769-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BOIVZNRI2WQ56MPKE6BVFPLBB4RKMOJF/#BOIVZNRI2WQ56MPKE6BVFPLBB4RKMOJF" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2788-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2XSIJ4CL46B7JEPC7XYAF6F24TA3GW4B/#2XSIJ4CL46B7JEPC7XYAF6F24TA3GW4B" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.50 and earlier, 5.6.31 and earlier, and 5.7.13 and earlier allows remote authenticated users to affect availability via vectors related to DML.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5612/">CVE-2016-5612 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5612">CVE-2016-5612 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1005561">SUSE bug 1005561</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822547" comment="mariadb-5.5.52-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822548" comment="mariadb-bench-5.5.52-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822549" comment="mariadb-devel-5.5.52-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822550" comment="mariadb-embedded-5.5.52-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822551" comment="mariadb-embedded-devel-5.5.52-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822552" comment="mariadb-libs-5.5.52-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822553" comment="mariadb-server-5.5.52-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822554" comment="mariadb-test-5.5.52-1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165624" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5624</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5624" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5624" ref_url="https://www.suse.com/security/cve/CVE-2016-5624" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2932-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2933-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002425.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3025-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QJSFC32WO5YWZA6552W5XZXTGD2XJXPA/#QJSFC32WO5YWZA6552W5XZXTGD2XJXPA" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3028-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QHAQ2AORXI3O4NFNDTK4VIKCWAM3IJEU/#QHAQ2AORXI3O4NFNDTK4VIKCWAM3IJEU" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.51 and earlier allows remote authenticated users to affect availability via vectors related to DML.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5624/">CVE-2016-5624 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5624">CVE-2016-5624 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1005564">SUSE bug 1005564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008318">SUSE bug 1008318</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822547" comment="mariadb-5.5.52-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822548" comment="mariadb-bench-5.5.52-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822549" comment="mariadb-devel-5.5.52-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822550" comment="mariadb-embedded-5.5.52-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822551" comment="mariadb-embedded-devel-5.5.52-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822552" comment="mariadb-libs-5.5.52-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822553" comment="mariadb-server-5.5.52-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822554" comment="mariadb-test-5.5.52-1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165626" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5626</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5626" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5626" ref_url="https://www.suse.com/security/cve/CVE-2016-5626" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2932-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2933-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002425.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2769-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BOIVZNRI2WQ56MPKE6BVFPLBB4RKMOJF/#BOIVZNRI2WQ56MPKE6BVFPLBB4RKMOJF" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2788-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2XSIJ4CL46B7JEPC7XYAF6F24TA3GW4B/#2XSIJ4CL46B7JEPC7XYAF6F24TA3GW4B" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3025-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QJSFC32WO5YWZA6552W5XZXTGD2XJXPA/#QJSFC32WO5YWZA6552W5XZXTGD2XJXPA" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3028-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QHAQ2AORXI3O4NFNDTK4VIKCWAM3IJEU/#QHAQ2AORXI3O4NFNDTK4VIKCWAM3IJEU" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.51 and earlier, 5.6.32 and earlier, and 5.7.14 and earlier allows remote authenticated users to affect availability via vectors related to GIS.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5626/">CVE-2016-5626 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5626">CVE-2016-5626 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1005566">SUSE bug 1005566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008318">SUSE bug 1008318</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822547" comment="mariadb-5.5.52-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822548" comment="mariadb-bench-5.5.52-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822549" comment="mariadb-devel-5.5.52-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822550" comment="mariadb-embedded-5.5.52-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822551" comment="mariadb-embedded-devel-5.5.52-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822552" comment="mariadb-libs-5.5.52-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822553" comment="mariadb-server-5.5.52-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822554" comment="mariadb-test-5.5.52-1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165629" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5629</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5629" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5629" ref_url="https://www.suse.com/security/cve/CVE-2016-5629" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2932-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2933-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002425.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2769-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BOIVZNRI2WQ56MPKE6BVFPLBB4RKMOJF/#BOIVZNRI2WQ56MPKE6BVFPLBB4RKMOJF" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2788-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2XSIJ4CL46B7JEPC7XYAF6F24TA3GW4B/#2XSIJ4CL46B7JEPC7XYAF6F24TA3GW4B" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3025-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QJSFC32WO5YWZA6552W5XZXTGD2XJXPA/#QJSFC32WO5YWZA6552W5XZXTGD2XJXPA" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3028-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QHAQ2AORXI3O4NFNDTK4VIKCWAM3IJEU/#QHAQ2AORXI3O4NFNDTK4VIKCWAM3IJEU" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.51 and earlier, 5.6.32 and earlier, and 5.7.14 and earlier allows remote administrators to affect availability via vectors related to Server: Federated.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5629/">CVE-2016-5629 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5629">CVE-2016-5629 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1005569">SUSE bug 1005569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008318">SUSE bug 1008318</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822547" comment="mariadb-5.5.52-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822548" comment="mariadb-bench-5.5.52-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822549" comment="mariadb-devel-5.5.52-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822550" comment="mariadb-embedded-5.5.52-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822551" comment="mariadb-embedded-devel-5.5.52-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822552" comment="mariadb-libs-5.5.52-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822553" comment="mariadb-server-5.5.52-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822554" comment="mariadb-test-5.5.52-1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165636" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5636</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5636" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5636" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5636" ref_url="https://www.suse.com/security/cve/CVE-2016-5636" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2653-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0086-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SRKGGFVSV7DDWCMAOSO6E3F66U2CF5XR/" source="SUSE-SU"/>
    <description>
    Integer overflow in the get_data function in zipimport.c in CPython (aka Python) before 2.7.12, 3.x before 3.4.5, and 3.5.x before 3.5.2 allows remote attackers to have unspecified impact via a negative data size value, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-05"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5636/">CVE-2016-5636 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5636">CVE-2016-5636 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1065451">SUSE bug 1065451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106262">SUSE bug 1106262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985177">SUSE bug 985177</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822491" comment="python-2.7.5-48.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822492" comment="python-debug-2.7.5-48.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822493" comment="python-devel-2.7.5-48.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822494" comment="python-libs-2.7.5-48.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822495" comment="python-test-2.7.5-48.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822496" comment="python-tools-2.7.5-48.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822497" comment="tkinter-2.7.5-48.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165652" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5652</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5652" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5652" ref_url="https://www.suse.com/security/cve/CVE-2016-5652" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003984.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3035-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KXYOOAKMFNUKYDB2XZOT63J2Z2V6LSVK/#KXYOOAKMFNUKYDB2XZOT63J2Z2V6LSVK" source="SUSE-SU"/>
    <description>
    An exploitable heap-based buffer overflow exists in the handling of TIFF images in LibTIFF's TIFF2PDF tool. A crafted TIFF document can lead to a heap-based buffer overflow resulting in remote code execution. Vulnerability can be triggered via a saved TIFF file delivered by other means.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5652/">CVE-2016-5652 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5652">CVE-2016-5652 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1007280">SUSE bug 1007280</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822802" comment="libtiff-4.0.3-27.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822803" comment="libtiff-devel-4.0.3-27.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822804" comment="libtiff-static-4.0.3-27.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822805" comment="libtiff-tools-4.0.3-27.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165766" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5766</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5766" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5766" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5766" ref_url="https://www.suse.com/security/cve/CVE-2016-5766" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2013-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003246.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1761-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WVYIN4WLN2OMBQHP3V3ZANP2UZOQYVBQ/#WVYIN4WLN2OMBQHP3V3ZANP2UZOQYVBQ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2337-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6BGY762F6BUJS54OWR46XT7AVJK5VJMZ/#6BGY762F6BUJS54OWR46XT7AVJK5VJMZ" source="SUSE-SU"/>
    <description>
    Integer overflow in the _gd2GetHeader function in gd_gd2.c in the GD Graphics Library (aka libgd) before 2.2.3, as used in PHP before 5.5.37, 5.6.x before 5.6.23, and 7.x before 7.0.8, allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via crafted chunk dimensions in an image.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5766/">CVE-2016-5766 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5766">CVE-2016-5766 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/986386">SUSE bug 986386</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828851" comment="gd-2.0.35-27.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828852" comment="gd-devel-2.0.35-27.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828853" comment="gd-progs-2.0.35-27.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822561" comment="php-5.4.16-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822562" comment="php-bcmath-5.4.16-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822563" comment="php-cli-5.4.16-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822564" comment="php-common-5.4.16-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822565" comment="php-dba-5.4.16-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822566" comment="php-devel-5.4.16-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822567" comment="php-embedded-5.4.16-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822568" comment="php-enchant-5.4.16-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822569" comment="php-fpm-5.4.16-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822570" comment="php-gd-5.4.16-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822571" comment="php-intl-5.4.16-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822572" comment="php-ldap-5.4.16-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822573" comment="php-mbstring-5.4.16-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822574" comment="php-mysql-5.4.16-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822575" comment="php-mysqlnd-5.4.16-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822576" comment="php-odbc-5.4.16-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822577" comment="php-pdo-5.4.16-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822578" comment="php-pgsql-5.4.16-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822579" comment="php-process-5.4.16-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822580" comment="php-pspell-5.4.16-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822581" comment="php-recode-5.4.16-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822582" comment="php-snmp-5.4.16-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822583" comment="php-soap-5.4.16-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822584" comment="php-xml-5.4.16-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822585" comment="php-xmlrpc-5.4.16-42.el7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828851" comment="gd-2.0.35-27.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828852" comment="gd-devel-2.0.35-27.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828853" comment="gd-progs-2.0.35-27.el7_9 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165767" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5767</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5767" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5767" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5767" ref_url="https://www.suse.com/security/cve/CVE-2016-5767" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2013-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002211.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1761-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WVYIN4WLN2OMBQHP3V3ZANP2UZOQYVBQ/#WVYIN4WLN2OMBQHP3V3ZANP2UZOQYVBQ" source="SUSE-SU"/>
    <description>
    Integer overflow in the gdImageCreate function in gd.c in the GD Graphics Library (aka libgd) before 2.0.34RC1, as used in PHP before 5.5.37, 5.6.x before 5.6.23, and 7.x before 7.0.8, allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted image dimensions.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5767/">CVE-2016-5767 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5767">CVE-2016-5767 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/986393">SUSE bug 986393</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822561" comment="php-5.4.16-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822562" comment="php-bcmath-5.4.16-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822563" comment="php-cli-5.4.16-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822564" comment="php-common-5.4.16-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822565" comment="php-dba-5.4.16-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822566" comment="php-devel-5.4.16-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822567" comment="php-embedded-5.4.16-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822568" comment="php-enchant-5.4.16-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822569" comment="php-fpm-5.4.16-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822570" comment="php-gd-5.4.16-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822571" comment="php-intl-5.4.16-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822572" comment="php-ldap-5.4.16-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822573" comment="php-mbstring-5.4.16-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822574" comment="php-mysql-5.4.16-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822575" comment="php-mysqlnd-5.4.16-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822576" comment="php-odbc-5.4.16-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822577" comment="php-pdo-5.4.16-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822578" comment="php-pgsql-5.4.16-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822579" comment="php-process-5.4.16-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822580" comment="php-pspell-5.4.16-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822581" comment="php-recode-5.4.16-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822582" comment="php-snmp-5.4.16-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822583" comment="php-soap-5.4.16-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822584" comment="php-xml-5.4.16-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822585" comment="php-xmlrpc-5.4.16-42.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165768" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5768</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5768" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5768" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5768" ref_url="https://www.suse.com/security/cve/CVE-2016-5768" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002163.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1761-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WVYIN4WLN2OMBQHP3V3ZANP2UZOQYVBQ/#WVYIN4WLN2OMBQHP3V3ZANP2UZOQYVBQ" source="SUSE-SU"/>
    <description>
    Double free vulnerability in the _php_mb_regex_ereg_replace_exec function in php_mbregex.c in the mbstring extension in PHP before 5.5.37, 5.6.x before 5.6.23, and 7.x before 7.0.8 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) by leveraging a callback exception.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-10"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-5768/">CVE-2016-5768 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5768">CVE-2016-5768 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/986246">SUSE bug 986246</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822561" comment="php-5.4.16-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822562" comment="php-bcmath-5.4.16-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822563" comment="php-cli-5.4.16-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822564" comment="php-common-5.4.16-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822565" comment="php-dba-5.4.16-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822566" comment="php-devel-5.4.16-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822567" comment="php-embedded-5.4.16-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822568" comment="php-enchant-5.4.16-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822569" comment="php-fpm-5.4.16-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822570" comment="php-gd-5.4.16-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822571" comment="php-intl-5.4.16-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822572" comment="php-ldap-5.4.16-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822573" comment="php-mbstring-5.4.16-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822574" comment="php-mysql-5.4.16-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822575" comment="php-mysqlnd-5.4.16-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822576" comment="php-odbc-5.4.16-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822577" comment="php-pdo-5.4.16-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822578" comment="php-pgsql-5.4.16-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822579" comment="php-process-5.4.16-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822580" comment="php-pspell-5.4.16-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822581" comment="php-recode-5.4.16-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822582" comment="php-snmp-5.4.16-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822583" comment="php-soap-5.4.16-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822584" comment="php-xml-5.4.16-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822585" comment="php-xmlrpc-5.4.16-42.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165824" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5824</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5824" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5824" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5824" ref_url="https://www.suse.com/security/cve/CVE-2016-5824" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1989-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005110.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0182-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RO4BDOELHRMIUQ3XXKYY53F5V3FX32S2/#RO4BDOELHRMIUQ3XXKYY53F5V3FX32S2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0249-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NSXP45BAXW5ILKJSQRXHTBUOBZUKLD2F/#NSXP45BAXW5ILKJSQRXHTBUOBZUKLD2F" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0251-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YTL5HAWTQVZCKKAVSVP4LCGEQTWZR73J/#YTL5HAWTQVZCKKAVSVP4LCGEQTWZR73J" source="SUSE-SU"/>
    <description>
    libical 1.0 allows remote attackers to cause a denial of service (use-after-free) via a crafted ics file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5824/">CVE-2016-5824 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5824">CVE-2016-5824 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1015964">SUSE bug 1015964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122983">SUSE bug 1122983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986631">SUSE bug 986631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986639">SUSE bug 986639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986642">SUSE bug 986642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986658">SUSE bug 986658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825532" comment="thunderbird-60.5.0-1.el7_6 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165828" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5828</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5828" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5828" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5828" ref_url="https://www.suse.com/security/cve/CVE-2016-5828" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1937-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002647.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2184-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NA2C2XZHCLKYOLPO7FG5N5MJ7TLHYLY2/#NA2C2XZHCLKYOLPO7FG5N5MJ7TLHYLY2" source="SUSE-SU"/>
    <description>
    The start_thread function in arch/powerpc/kernel/process.c in the Linux kernel through 4.6.3 on powerpc platforms mishandles transactional state, which allows local users to cause a denial of service (invalid process state or TM Bad Thing exception, and system crash) or possibly have unspecified other impact by starting and suspending a transaction before an exec system call.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5828/">CVE-2016-5828 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5828">CVE-2016-5828 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/986569">SUSE bug 986569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991065">SUSE bug 991065</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822375" comment="kernel-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822376" comment="kernel-abi-whitelists-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822377" comment="kernel-debug-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822380" comment="kernel-doc-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822381" comment="kernel-headers-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822382" comment="kernel-tools-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822383" comment="kernel-tools-libs-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822385" comment="perf-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822386" comment="python-perf-3.10.0-514.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165829" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5829</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5829" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5829" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5829" ref_url="https://www.suse.com/security/cve/CVE-2016-5829" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1937-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002233.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002647.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1798-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5FLLPQLWSS6KPU5LQ2LLJQIWQXEEE77W/#5FLLPQLWSS6KPU5LQ2LLJQIWQXEEE77W" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G3VWHAWQDEVZ37XRAAROFMJVDBBQ6YF5/#G3VWHAWQDEVZ37XRAAROFMJVDBBQ6YF5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2184-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NA2C2XZHCLKYOLPO7FG5N5MJ7TLHYLY2/#NA2C2XZHCLKYOLPO7FG5N5MJ7TLHYLY2" source="SUSE-SU"/>
    <description>
    Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux kernel through 4.6.3 allow local users to cause a denial of service or possibly have unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES ioctl call.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5829/">CVE-2016-5829 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5829">CVE-2016-5829 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1053919">SUSE bug 1053919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054127">SUSE bug 1054127</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115893">SUSE bug 1115893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986572">SUSE bug 986572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986573">SUSE bug 986573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991651">SUSE bug 991651</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822375" comment="kernel-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822376" comment="kernel-abi-whitelists-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822377" comment="kernel-debug-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822380" comment="kernel-doc-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822381" comment="kernel-headers-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822382" comment="kernel-tools-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822383" comment="kernel-tools-libs-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822385" comment="perf-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822386" comment="python-perf-3.10.0-514.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165844" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5844</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5844" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5844" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5844" ref_url="https://www.suse.com/security/cve/CVE-2016-5844" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002421.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the ISO parser in libarchive before 3.2.1 allows remote attackers to cause a denial of service (application crash) via a crafted ISO file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5844/">CVE-2016-5844 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5844">CVE-2016-5844 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/986566">SUSE bug 986566</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822282" comment="bsdcpio-3.1.2-10.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822283" comment="bsdtar-3.1.2-10.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822284" comment="libarchive-3.1.2-10.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822285" comment="libarchive-devel-3.1.2-10.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166136" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6136</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6136" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6136" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6136" ref_url="https://www.suse.com/security/cve/CVE-2016-6136" source="SUSE CVE"/>
    <description>
    Race condition in the audit_log_single_execve_arg function in kernel/auditsc.c in the Linux kernel through 4.7 allows local users to bypass intended character-set restrictions or disrupt system-call auditing by changing a certain string, aka a "double fetch" vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-6136/">CVE-2016-6136 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6136">CVE-2016-6136 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/988153">SUSE bug 988153</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822375" comment="kernel-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822376" comment="kernel-abi-whitelists-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822377" comment="kernel-debug-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822380" comment="kernel-doc-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822381" comment="kernel-headers-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822382" comment="kernel-tools-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822383" comment="kernel-tools-libs-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822385" comment="perf-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822386" comment="python-perf-3.10.0-514.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166198" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6198</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6198" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6198" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6198" ref_url="https://www.suse.com/security/cve/CVE-2016-6198" source="SUSE CVE"/>
    <description>
    The filesystem layer in the Linux kernel before 4.5.5 proceeds with post-rename operations after an OverlayFS file is renamed to a self-hardlink, which allows local users to cause a denial of service (system crash) via a rename system call, related to fs/namei.c and fs/open.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6198/">CVE-2016-6198 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6198">CVE-2016-6198 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/988708">SUSE bug 988708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822375" comment="kernel-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822376" comment="kernel-abi-whitelists-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822377" comment="kernel-debug-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822380" comment="kernel-doc-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822381" comment="kernel-headers-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822382" comment="kernel-tools-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822383" comment="kernel-tools-libs-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822385" comment="perf-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822386" comment="python-perf-3.10.0-514.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6210</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6210" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6210" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6210" ref_url="https://www.suse.com/security/cve/CVE-2016-6210" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002338.html" source="SUSE-SU"/>
    <description>
    sshd in OpenSSH before 7.3, when SHA256 or SHA512 are used for user password hashing, uses BLOWFISH hashing on a static password when the username does not exist, which allows remote attackers to enumerate users by leveraging the timing difference between responses when a large password is provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-6210/">CVE-2016-6210 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6210">CVE-2016-6210 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1001712">SUSE bug 1001712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010950">SUSE bug 1010950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105010">SUSE bug 1105010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138392">SUSE bug 1138392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989363">SUSE bug 989363</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823379" comment="openssh-7.4p1-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823380" comment="openssh-askpass-7.4p1-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823381" comment="openssh-cavs-7.4p1-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823382" comment="openssh-clients-7.4p1-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823383" comment="openssh-keycat-7.4p1-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823384" comment="openssh-ldap-7.4p1-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823385" comment="openssh-server-7.4p1-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823386" comment="openssh-server-sysvinit-7.4p1-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823387" comment="pam_ssh_agent_auth-0.10.3-1.11.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166213" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6213</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6213" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6213" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6213" ref_url="https://www.suse.com/security/cve/CVE-2016-6213" source="SUSE CVE"/>
    <description>
    fs/namespace.c in the Linux kernel before 4.9 does not restrict how many mounts may exist in a mount namespace, which allows local users to cause a denial of service (memory consumption and deadlock) via MS_BIND mount system calls, as demonstrated by a loop that triggers exponential growth in the number of mounts.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6213/">CVE-2016-6213 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6213">CVE-2016-6213 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/988964">SUSE bug 988964</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823168" comment="kernel-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823169" comment="kernel-abi-whitelists-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823170" comment="kernel-debug-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823173" comment="kernel-doc-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823174" comment="kernel-headers-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823175" comment="kernel-tools-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823176" comment="kernel-tools-libs-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823178" comment="perf-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823179" comment="python-perf-3.10.0-693.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166250" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6250</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6250" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6250" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6250" ref_url="https://www.suse.com/security/cve/CVE-2016-6250" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002421.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the ISO9660 writer in libarchive before 3.2.1 allows remote attackers to cause a denial of service (application crash) or execute arbitrary code via vectors related to verifying filename lengths when writing an ISO9660 archive, which trigger a buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6250/">CVE-2016-6250 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6250">CVE-2016-6250 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/989980">SUSE bug 989980</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822282" comment="bsdcpio-3.1.2-10.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822283" comment="bsdtar-3.1.2-10.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822284" comment="libarchive-3.1.2-10.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822285" comment="libarchive-devel-3.1.2-10.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166302" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6302</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6302" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6302" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6302" ref_url="https://www.suse.com/security/cve/CVE-2016-6302" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
		<reference ref_id="TID7016794" ref_url="https://www.suse.com/support/kb/doc/?id=7016794" source="SUSE-SU"/>
		<reference ref_id="TID7018311" ref_url="https://www.suse.com/support/kb/doc/?id=7018311" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2391-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/457PQSBNF5LPTML5PWFZ5WOFHAE6PCC6/#457PQSBNF5LPTML5PWFZ5WOFHAE6PCC6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2407-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UC3J55W76QZY2RGZ6NR6FKQWCAIVCF6L/#UC3J55W76QZY2RGZ6NR6FKQWCAIVCF6L" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2537-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3K4Z2X4Q5GYLAOESQ5O5R5ESW4LZENO6/#3K4Z2X4Q5GYLAOESQ5O5R5ESW4LZENO6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0458-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FBYBD5ZUSPVBWEEIVTKA25Q5QWELRG65/#FBYBD5ZUSPVBWEEIVTKA25Q5QWELRG65" source="SUSE-SU"/>
    <description>
    The tls_decrypt_ticket function in ssl/t1_lib.c in OpenSSL before 1.1.0 does not consider the HMAC size during validation of the ticket length, which allows remote attackers to cause a denial of service via a ticket that is too short.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6302/">CVE-2016-6302 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6302">CVE-2016-6302 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1004104">SUSE bug 1004104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994844">SUSE bug 994844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995324">SUSE bug 995324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999665">SUSE bug 999665</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822299" comment="openssl-1.0.1e-51.el7_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822300" comment="openssl-devel-1.0.1e-51.el7_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822301" comment="openssl-libs-1.0.1e-51.el7_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822302" comment="openssl-perl-1.0.1e-51.el7_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822303" comment="openssl-static-1.0.1e-51.el7_2.7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166304" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6304</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6304" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6304" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6304" ref_url="https://www.suse.com/security/cve/CVE-2016-6304" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2470-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="TID7016794" ref_url="https://www.suse.com/support/kb/doc/?id=7016794" source="SUSE-SU"/>
		<reference ref_id="TID7018311" ref_url="https://www.suse.com/support/kb/doc/?id=7018311" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2391-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/457PQSBNF5LPTML5PWFZ5WOFHAE6PCC6/#457PQSBNF5LPTML5PWFZ5WOFHAE6PCC6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2407-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UC3J55W76QZY2RGZ6NR6FKQWCAIVCF6L/#UC3J55W76QZY2RGZ6NR6FKQWCAIVCF6L" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2496-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZBUNI7MQOGTTK5V6ZEUBGZKAQMZP6XAR/#ZBUNI7MQOGTTK5V6ZEUBGZKAQMZP6XAR" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2537-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3K4Z2X4Q5GYLAOESQ5O5R5ESW4LZENO6/#3K4Z2X4Q5GYLAOESQ5O5R5ESW4LZENO6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2769-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BOIVZNRI2WQ56MPKE6BVFPLBB4RKMOJF/#BOIVZNRI2WQ56MPKE6BVFPLBB4RKMOJF" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2788-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2XSIJ4CL46B7JEPC7XYAF6F24TA3GW4B/#2XSIJ4CL46B7JEPC7XYAF6F24TA3GW4B" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0458-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FBYBD5ZUSPVBWEEIVTKA25Q5QWELRG65/#FBYBD5ZUSPVBWEEIVTKA25Q5QWELRG65" source="SUSE-SU"/>
    <description>
    Multiple memory leaks in t1_lib.c in OpenSSL before 1.0.1u, 1.0.2 before 1.0.2i, and 1.1.0 before 1.1.0a allow remote attackers to cause a denial of service (memory consumption) via large OCSP Status Request extensions.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6304/">CVE-2016-6304 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6304">CVE-2016-6304 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1001706">SUSE bug 1001706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003811">SUSE bug 1003811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1004104">SUSE bug 1004104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005579">SUSE bug 1005579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021375">SUSE bug 1021375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999665">SUSE bug 999665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999666">SUSE bug 999666</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822299" comment="openssl-1.0.1e-51.el7_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822300" comment="openssl-devel-1.0.1e-51.el7_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822301" comment="openssl-libs-1.0.1e-51.el7_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822302" comment="openssl-perl-1.0.1e-51.el7_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822303" comment="openssl-static-1.0.1e-51.el7_2.7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166306" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6306</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6306" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6306" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6306" ref_url="https://www.suse.com/security/cve/CVE-2016-6306" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2470-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="TID3426981" ref_url="https://www.suse.com/support/kb/doc/?id=3426981" source="SUSE-SU"/>
		<reference ref_id="TID7016794" ref_url="https://www.suse.com/support/kb/doc/?id=7016794" source="SUSE-SU"/>
		<reference ref_id="TID7018311" ref_url="https://www.suse.com/support/kb/doc/?id=7018311" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2391-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/457PQSBNF5LPTML5PWFZ5WOFHAE6PCC6/#457PQSBNF5LPTML5PWFZ5WOFHAE6PCC6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2407-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UC3J55W76QZY2RGZ6NR6FKQWCAIVCF6L/#UC3J55W76QZY2RGZ6NR6FKQWCAIVCF6L" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2496-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZBUNI7MQOGTTK5V6ZEUBGZKAQMZP6XAR/#ZBUNI7MQOGTTK5V6ZEUBGZKAQMZP6XAR" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2537-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3K4Z2X4Q5GYLAOESQ5O5R5ESW4LZENO6/#3K4Z2X4Q5GYLAOESQ5O5R5ESW4LZENO6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0458-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FBYBD5ZUSPVBWEEIVTKA25Q5QWELRG65/#FBYBD5ZUSPVBWEEIVTKA25Q5QWELRG65" source="SUSE-SU"/>
    <description>
    The certificate parser in OpenSSL before 1.0.1u and 1.0.2 before 1.0.2i might allow remote attackers to cause a denial of service (out-of-bounds read) via crafted certificate operations, related to s3_clnt.c and s3_srvr.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6306/">CVE-2016-6306 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6306">CVE-2016-6306 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1004104">SUSE bug 1004104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999665">SUSE bug 999665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999668">SUSE bug 999668</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822299" comment="openssl-1.0.1e-51.el7_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822300" comment="openssl-devel-1.0.1e-51.el7_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822301" comment="openssl-libs-1.0.1e-51.el7_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822302" comment="openssl-perl-1.0.1e-51.el7_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822303" comment="openssl-static-1.0.1e-51.el7_2.7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166313" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6313</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6313" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6313" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6313" ref_url="https://www.suse.com/security/cve/CVE-2016-6313" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
    <description>
    The mixing functions in the random number generator in Libgcrypt before 1.5.6, 1.6.x before 1.6.6, and 1.7.x before 1.7.3 and GnuPG before 1.4.21 make it easier for attackers to obtain the values of 160 bits by leveraging knowledge of the previous 4640 bits.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6313/">CVE-2016-6313 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6313">CVE-2016-6313 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1123792">SUSE bug 1123792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994157">SUSE bug 994157</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822676" comment="libgcrypt-1.5.3-13.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822677" comment="libgcrypt-devel-1.5.3-13.el7_3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166325" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6325</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6325" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6325" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6325" ref_url="https://www.suse.com/security/cve/CVE-2016-6325" source="SUSE CVE"/>
    <description>
    The Tomcat package on Red Hat Enterprise Linux (RHEL) 5 through 7, JBoss Web Server 3.0, and JBoss EWS 2 uses weak permissions for (1) /etc/sysconfig/tomcat and (2) /etc/tomcat/tomcat.conf, which allows local users to gain privileges by leveraging membership in the tomcat group.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6325/">CVE-2016-6325 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6325">CVE-2016-6325 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822320" comment="tomcat-7.0.54-8.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822321" comment="tomcat-admin-webapps-7.0.54-8.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822322" comment="tomcat-docs-webapp-7.0.54-8.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822323" comment="tomcat-el-2.2-api-7.0.54-8.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822324" comment="tomcat-javadoc-7.0.54-8.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822325" comment="tomcat-jsp-2.2-api-7.0.54-8.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822326" comment="tomcat-jsvc-7.0.54-8.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822327" comment="tomcat-lib-7.0.54-8.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822328" comment="tomcat-servlet-3.0-api-7.0.54-8.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822329" comment="tomcat-webapps-7.0.54-8.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166327" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6327</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6327" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6327" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6327" ref_url="https://www.suse.com/security/cve/CVE-2016-6327" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3304-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002647.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2625-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4S7UHJM6T55DAAXQ6V2UZD53B3N7CANL/#4S7UHJM6T55DAAXQ6V2UZD53B3N7CANL" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3021-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RNLBL6OKPBVGYFXWDCIZX6MURLH6ERPD/#RNLBL6OKPBVGYFXWDCIZX6MURLH6ERPD" source="SUSE-SU"/>
    <description>
    drivers/infiniband/ulp/srpt/ib_srpt.c in the Linux kernel before 4.5.1 allows local users to cause a denial of service (NULL pointer dereference and system crash) by using an ABORT_TASK command to abort a device write operation.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6327/">CVE-2016-6327 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6327">CVE-2016-6327 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/994748">SUSE bug 994748</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822375" comment="kernel-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822376" comment="kernel-abi-whitelists-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822377" comment="kernel-debug-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822380" comment="kernel-doc-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822381" comment="kernel-headers-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822382" comment="kernel-tools-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822383" comment="kernel-tools-libs-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822385" comment="perf-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822386" comment="python-perf-3.10.0-514.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166480" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6480</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6480" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6480" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6480" ref_url="https://www.suse.com/security/cve/CVE-2016-6480" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002233.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2674-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3304-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002647.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2290-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TVIOU3ZPOAQ2W3SQKZVQILGGHDJYFHOT/#TVIOU3ZPOAQ2W3SQKZVQILGGHDJYFHOT" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2625-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4S7UHJM6T55DAAXQ6V2UZD53B3N7CANL/#4S7UHJM6T55DAAXQ6V2UZD53B3N7CANL" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3021-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RNLBL6OKPBVGYFXWDCIZX6MURLH6ERPD/#RNLBL6OKPBVGYFXWDCIZX6MURLH6ERPD" source="SUSE-SU"/>
    <description>
    Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel through 4.7 allows local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a "double fetch" vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-6480/">CVE-2016-6480 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6480">CVE-2016-6480 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1004418">SUSE bug 1004418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991608">SUSE bug 991608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991667">SUSE bug 991667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992568">SUSE bug 992568</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822375" comment="kernel-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822376" comment="kernel-abi-whitelists-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822377" comment="kernel-debug-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822380" comment="kernel-doc-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822381" comment="kernel-headers-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822382" comment="kernel-tools-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822383" comment="kernel-tools-libs-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822385" comment="perf-3.10.0-514.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822386" comment="python-perf-3.10.0-514.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166489" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6489</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6489" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6489" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6489" ref_url="https://www.suse.com/security/cve/CVE-2016-6489" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002936.html" source="SUSE-SU"/>
    <description>
    The RSA and DSA decryption code in Nettle makes it easier for attackers to discover private keys via a cache side channel attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6489/">CVE-2016-6489 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6489">CVE-2016-6489 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/991464">SUSE bug 991464</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822480" comment="nettle-2.7.1-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822481" comment="nettle-devel-2.7.1-8.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166515" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6515</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6515" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6515" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6515" ref_url="https://www.suse.com/security/cve/CVE-2016-6515" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002338.html" source="SUSE-SU"/>
		<reference ref_id="TID7022102" ref_url="https://www.suse.com/support/kb/doc/?id=7022102" source="SUSE-SU"/>
    <description>
    The auth_password function in auth-passwd.c in sshd in OpenSSH before 7.3 does not limit password lengths for password authentication, which allows remote attackers to cause a denial of service (crypt CPU consumption) via a long string.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6515/">CVE-2016-6515 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6515">CVE-2016-6515 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1010950">SUSE bug 1010950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115893">SUSE bug 1115893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992533">SUSE bug 992533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823379" comment="openssh-7.4p1-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823380" comment="openssh-askpass-7.4p1-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823381" comment="openssh-cavs-7.4p1-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823382" comment="openssh-clients-7.4p1-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823383" comment="openssh-keycat-7.4p1-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823384" comment="openssh-ldap-7.4p1-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823385" comment="openssh-server-7.4p1-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823386" comment="openssh-server-sysvinit-7.4p1-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823387" comment="pam_ssh_agent_auth-0.10.3-1.11.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166662" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6662</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6662" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6662" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6662" ref_url="https://www.suse.com/security/cve/CVE-2016-6662" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2404-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002401.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2448-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NX7QAKGA2N5U7UR7GSPJ5K7R67ZNWL2M/#NX7QAKGA2N5U7UR7GSPJ5K7R67ZNWL2M" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2746-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3CUYJAGC7JTKPQYLE2ZTEPBVQ3J4BFHO/#3CUYJAGC7JTKPQYLE2ZTEPBVQ3J4BFHO" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2769-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BOIVZNRI2WQ56MPKE6BVFPLBB4RKMOJF/#BOIVZNRI2WQ56MPKE6BVFPLBB4RKMOJF" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2788-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2XSIJ4CL46B7JEPC7XYAF6F24TA3GW4B/#2XSIJ4CL46B7JEPC7XYAF6F24TA3GW4B" source="SUSE-SU"/>
    <description>
    Oracle MySQL through 5.5.52, 5.6.x through 5.6.33, and 5.7.x through 5.7.15; MariaDB before 5.5.51, 10.0.x before 10.0.27, and 10.1.x before 10.1.17; and Percona Server before 5.5.51-38.1, 5.6.x before 5.6.32-78.0, and 5.7.x before 5.7.14-7 allow local users to create arbitrary configurations and bypass certain protection mechanisms by setting general_log_file to a my.cnf configuration. NOTE: this can be leveraged to execute arbitrary code with root privileges by setting malloc_lib. NOTE: the affected MySQL version information is from Oracle's October 2016 CPU. Oracle has not commented on third-party claims that the issue was silently patched in MySQL 5.5.52, 5.6.33, and 5.7.15.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6662/">CVE-2016-6662 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6662">CVE-2016-6662 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1001367">SUSE bug 1001367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005580">SUSE bug 1005580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020873">SUSE bug 1020873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020884">SUSE bug 1020884</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021755">SUSE bug 1021755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998309">SUSE bug 998309</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822547" comment="mariadb-5.5.52-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822548" comment="mariadb-bench-5.5.52-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822549" comment="mariadb-devel-5.5.52-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822550" comment="mariadb-embedded-5.5.52-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822551" comment="mariadb-embedded-devel-5.5.52-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822552" comment="mariadb-libs-5.5.52-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822553" comment="mariadb-server-5.5.52-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822554" comment="mariadb-test-5.5.52-1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166663" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6663</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6663" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6663" ref_url="https://www.suse.com/security/cve/CVE-2016-6663" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2932-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2933-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002425.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3025-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QJSFC32WO5YWZA6552W5XZXTGD2XJXPA/#QJSFC32WO5YWZA6552W5XZXTGD2XJXPA" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3028-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QHAQ2AORXI3O4NFNDTK4VIKCWAM3IJEU/#QHAQ2AORXI3O4NFNDTK4VIKCWAM3IJEU" source="SUSE-SU"/>
    <description>
    Race condition in Oracle MySQL before 5.5.52, 5.6.x before 5.6.33, 5.7.x before 5.7.15, and 8.x before 8.0.1; MariaDB before 5.5.52, 10.0.x before 10.0.28, and 10.1.x before 10.1.18; Percona Server before 5.5.51-38.2, 5.6.x before 5.6.32-78-1, and 5.7.x before 5.7.14-8; and Percona XtraDB Cluster before 5.5.41-37.0, 5.6.x before 5.6.32-25.17, and 5.7.x before 5.7.14-26.17 allows local users with certain permissions to gain privileges by leveraging use of my_copystat by REPAIR TABLE to repair a MyISAM table.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-02"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6663/">CVE-2016-6663 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6663">CVE-2016-6663 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1001367">SUSE bug 1001367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008253">SUSE bug 1008253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008318">SUSE bug 1008318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021755">SUSE bug 1021755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998309">SUSE bug 998309</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822547" comment="mariadb-5.5.52-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822548" comment="mariadb-bench-5.5.52-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822549" comment="mariadb-devel-5.5.52-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822550" comment="mariadb-embedded-5.5.52-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822551" comment="mariadb-embedded-devel-5.5.52-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822552" comment="mariadb-libs-5.5.52-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822553" comment="mariadb-server-5.5.52-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822554" comment="mariadb-test-5.5.52-1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166664" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6664</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6664" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6664" ref_url="https://www.suse.com/security/cve/CVE-2016-6664" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002628.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002629.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0486-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RE2QKOYR5ADO6D733OETKCCHNESSLT6Q/#RE2QKOYR5ADO6D733OETKCCHNESSLT6Q" source="SUSE-SU"/>
    <description>
    mysqld_safe in Oracle MySQL through 5.5.51, 5.6.x through 5.6.32, and 5.7.x through 5.7.14; MariaDB; Percona Server before 5.5.51-38.2, 5.6.x before 5.6.32-78-1, and 5.7.x before 5.7.14-8; and Percona XtraDB Cluster before 5.5.41-37.0, 5.6.x before 5.6.32-25.17, and 5.7.x before 5.7.14-26.17, when using file-based logging, allows local users with access to the mysql account to gain root privileges via a symlink attack on error logs and possibly other files.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-6664/">CVE-2016-6664 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6664">CVE-2016-6664 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1008253">SUSE bug 1008253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020868">SUSE bug 1020868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020873">SUSE bug 1020873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998309">SUSE bug 998309</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823421" comment="mariadb-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823422" comment="mariadb-bench-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823423" comment="mariadb-devel-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823424" comment="mariadb-embedded-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823425" comment="mariadb-embedded-devel-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823426" comment="mariadb-libs-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823427" comment="mariadb-server-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823428" comment="mariadb-test-5.5.56-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166794" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6794</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6794" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6794" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6794" ref_url="https://www.suse.com/security/cve/CVE-2016-6794" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002971.html" source="SUSE-SU"/>
		<reference ref_id="TID7010166" ref_url="https://www.suse.com/support/kb/doc/?id=7010166" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3129-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SGMBZCOJXORZN3SH4O7AD4MHCKWUSZI2/#SGMBZCOJXORZN3SH4O7AD4MHCKWUSZI2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3144-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6ZNY6SBERRBLMIGYS4YSNYRKOJMNXY57/#6ZNY6SBERRBLMIGYS4YSNYRKOJMNXY57" source="SUSE-SU"/>
    <description>
    When a SecurityManager is configured, a web application's ability to read system properties should be controlled by the SecurityManager. In Apache Tomcat 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70, 6.0.0 to 6.0.45 the system property replacement feature for configuration files could be used by a malicious web application to bypass the SecurityManager and read system properties that should not be visible.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-30"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6794/">CVE-2016-6794 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6794">CVE-2016-6794 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1007857">SUSE bug 1007857</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823429" comment="tomcat-7.0.76-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823430" comment="tomcat-admin-webapps-7.0.76-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823431" comment="tomcat-docs-webapp-7.0.76-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823432" comment="tomcat-el-2.2-api-7.0.76-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823433" comment="tomcat-javadoc-7.0.76-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823434" comment="tomcat-jsp-2.2-api-7.0.76-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823435" comment="tomcat-jsvc-7.0.76-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823436" comment="tomcat-lib-7.0.76-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823437" comment="tomcat-servlet-3.0-api-7.0.76-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823438" comment="tomcat-webapps-7.0.76-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166796" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6796</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6796" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6796" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6796" ref_url="https://www.suse.com/security/cve/CVE-2016-6796" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002971.html" source="SUSE-SU"/>
		<reference ref_id="TID7010166" ref_url="https://www.suse.com/support/kb/doc/?id=7010166" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3129-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SGMBZCOJXORZN3SH4O7AD4MHCKWUSZI2/#SGMBZCOJXORZN3SH4O7AD4MHCKWUSZI2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3144-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6ZNY6SBERRBLMIGYS4YSNYRKOJMNXY57/#6ZNY6SBERRBLMIGYS4YSNYRKOJMNXY57" source="SUSE-SU"/>
    <description>
    A malicious web application running on Apache Tomcat 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70 and 6.0.0 to 6.0.45 was able to bypass a configured SecurityManager via manipulation of the configuration parameters for the JSP Servlet.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6796/">CVE-2016-6796 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6796">CVE-2016-6796 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1007858">SUSE bug 1007858</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823429" comment="tomcat-7.0.76-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823430" comment="tomcat-admin-webapps-7.0.76-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823431" comment="tomcat-docs-webapp-7.0.76-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823432" comment="tomcat-el-2.2-api-7.0.76-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823433" comment="tomcat-javadoc-7.0.76-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823434" comment="tomcat-jsp-2.2-api-7.0.76-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823435" comment="tomcat-jsvc-7.0.76-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823436" comment="tomcat-lib-7.0.76-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823437" comment="tomcat-servlet-3.0-api-7.0.76-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823438" comment="tomcat-webapps-7.0.76-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6797</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6797" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6797" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6797" ref_url="https://www.suse.com/security/cve/CVE-2016-6797" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002971.html" source="SUSE-SU"/>
		<reference ref_id="TID7010166" ref_url="https://www.suse.com/support/kb/doc/?id=7010166" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3129-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SGMBZCOJXORZN3SH4O7AD4MHCKWUSZI2/#SGMBZCOJXORZN3SH4O7AD4MHCKWUSZI2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3144-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6ZNY6SBERRBLMIGYS4YSNYRKOJMNXY57/#6ZNY6SBERRBLMIGYS4YSNYRKOJMNXY57" source="SUSE-SU"/>
    <description>
    The ResourceLinkFactory implementation in Apache Tomcat 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70 and 6.0.0 to 6.0.45 did not limit web application access to global JNDI resources to those resources explicitly linked to the web application. Therefore, it was possible for a web application to access any global JNDI resource whether an explicit ResourceLink had been configured or not.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6797/">CVE-2016-6797 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6797">CVE-2016-6797 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1007853">SUSE bug 1007853</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823429" comment="tomcat-7.0.76-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823430" comment="tomcat-admin-webapps-7.0.76-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823431" comment="tomcat-docs-webapp-7.0.76-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823432" comment="tomcat-el-2.2-api-7.0.76-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823433" comment="tomcat-javadoc-7.0.76-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823434" comment="tomcat-jsp-2.2-api-7.0.76-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823435" comment="tomcat-jsvc-7.0.76-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823436" comment="tomcat-lib-7.0.76-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823437" comment="tomcat-servlet-3.0-api-7.0.76-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823438" comment="tomcat-webapps-7.0.76-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6814</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6814" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6814" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6814" ref_url="https://www.suse.com/security/cve/CVE-2016-6814" source="SUSE CVE"/>
    <description>
    When an application with unsupported Codehaus versions of Groovy from 1.7.0 to 2.4.3, Apache Groovy 2.4.4 to 2.4.7 on classpath uses standard Java serialization mechanisms, e.g. to communicate between servers or to store local data, it was possible for an attacker to bake a special serialized object that will execute code directly when deserialized. All applications which rely on serialization and do not isolate the code which deserializes objects were subject to this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-02"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6814/">CVE-2016-6814 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6814">CVE-2016-6814 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823574" comment="groovy-1.8.9-8.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823575" comment="groovy-javadoc-1.8.9-8.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166816" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6816</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6816" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6816" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6816" ref_url="https://www.suse.com/security/cve/CVE-2016-6816" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002971.html" source="SUSE-SU"/>
		<reference ref_id="TID7010166" ref_url="https://www.suse.com/support/kb/doc/?id=7010166" source="SUSE-SU"/>
		<reference ref_id="TID7016795" ref_url="https://www.suse.com/support/kb/doc/?id=7016795" source="SUSE-SU"/>
		<reference ref_id="TID7018326" ref_url="https://www.suse.com/support/kb/doc/?id=7018326" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3129-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SGMBZCOJXORZN3SH4O7AD4MHCKWUSZI2/#SGMBZCOJXORZN3SH4O7AD4MHCKWUSZI2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3144-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6ZNY6SBERRBLMIGYS4YSNYRKOJMNXY57/#6ZNY6SBERRBLMIGYS4YSNYRKOJMNXY57" source="SUSE-SU"/>
    <description>
    The code in Apache Tomcat 9.0.0.M1 to 9.0.0.M11, 8.5.0 to 8.5.6, 8.0.0.RC1 to 8.0.38, 7.0.0 to 7.0.72, and 6.0.0 to 6.0.47 that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack and/or obtain sensitive information from requests other then their own.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-10-24"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6816/">CVE-2016-6816 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6816">CVE-2016-6816 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1011812">SUSE bug 1011812</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822919" comment="tomcat-7.0.69-11.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822920" comment="tomcat-admin-webapps-7.0.69-11.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822921" comment="tomcat-docs-webapp-7.0.69-11.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822922" comment="tomcat-el-2.2-api-7.0.69-11.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822923" comment="tomcat-javadoc-7.0.69-11.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822924" comment="tomcat-jsp-2.2-api-7.0.69-11.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822925" comment="tomcat-jsvc-7.0.69-11.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822926" comment="tomcat-lib-7.0.69-11.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822927" comment="tomcat-servlet-3.0-api-7.0.69-11.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822928" comment="tomcat-webapps-7.0.69-11.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166828" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6828</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6828" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6828" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6828" ref_url="https://www.suse.com/security/cve/CVE-2016-6828" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3304-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002652.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2290-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TVIOU3ZPOAQ2W3SQKZVQILGGHDJYFHOT/#TVIOU3ZPOAQ2W3SQKZVQILGGHDJYFHOT" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2625-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4S7UHJM6T55DAAXQ6V2UZD53B3N7CANL/#4S7UHJM6T55DAAXQ6V2UZD53B3N7CANL" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3021-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RNLBL6OKPBVGYFXWDCIZX6MURLH6ERPD/#RNLBL6OKPBVGYFXWDCIZX6MURLH6ERPD" source="SUSE-SU"/>
    <description>
    The tcp_check_send_head function in include/net/tcp.h in the Linux kernel before 4.7.5 does not properly maintain certain SACK state after a failed data copy, which allows local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted SACK option.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6828/">CVE-2016-6828 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6828">CVE-2016-6828 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1052256">SUSE bug 1052256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994296">SUSE bug 994296</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822770" comment="kernel-3.10.0-514.6.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822771" comment="kernel-abi-whitelists-3.10.0-514.6.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822772" comment="kernel-debug-3.10.0-514.6.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822775" comment="kernel-doc-3.10.0-514.6.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822776" comment="kernel-headers-3.10.0-514.6.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822777" comment="kernel-tools-3.10.0-514.6.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822778" comment="kernel-tools-libs-3.10.0-514.6.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822780" comment="perf-3.10.0-514.6.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822781" comment="python-perf-3.10.0-514.6.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166893" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6893</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6893" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6893" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6893" ref_url="https://www.suse.com/security/cve/CVE-2016-6893" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1638-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005519.html" source="SUSE-SU"/>
    <description>
    Cross-site request forgery (CSRF) vulnerability in the user options page in GNU Mailman 2.1.x before 2.1.23 allows remote attackers to hijack the authentication of arbitrary users for requests that modify an option, as demonstrated by gaining access to the credentials of a victim's account.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6893/">CVE-2016-6893 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6893">CVE-2016-6893 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/995352">SUSE bug 995352</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997205">SUSE bug 997205</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829454" comment="mailman-2.1.15-30.el7_9.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167030" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7030</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7030" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7030" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7030" ref_url="https://www.suse.com/security/cve/CVE-2016-7030" source="SUSE CVE"/>
    <description>
    FreeIPA uses a default password policy that locks an account after 5 unsuccessful authentication attempts, which allows remote attackers to cause a denial of service by locking out the account in which system services run on.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7030/">CVE-2016-7030 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7030">CVE-2016-7030 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1015556">SUSE bug 1015556</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822722" comment="ipa-admintools-4.4.0-14.el7_3.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822723" comment="ipa-client-4.4.0-14.el7_3.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822724" comment="ipa-client-common-4.4.0-14.el7_3.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822725" comment="ipa-common-4.4.0-14.el7_3.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822726" comment="ipa-python-compat-4.4.0-14.el7_3.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822727" comment="ipa-server-4.4.0-14.el7_3.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822728" comment="ipa-server-common-4.4.0-14.el7_3.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822729" comment="ipa-server-dns-4.4.0-14.el7_3.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822730" comment="ipa-server-trust-ad-4.4.0-14.el7_3.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822731" comment="python2-ipaclient-4.4.0-14.el7_3.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822732" comment="python2-ipalib-4.4.0-14.el7_3.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822733" comment="python2-ipaserver-4.4.0-14.el7_3.1.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167032" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7032</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7032" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7032" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7032" ref_url="https://www.suse.com/security/cve/CVE-2016-7032" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002420.html" source="SUSE-SU"/>
    <description>
    sudo_noexec.so in Sudo before 1.8.15 on Linux might allow local users to bypass intended noexec command restrictions via an application that calls the (1) system or (2) popen function.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7032/">CVE-2016-7032 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7032">CVE-2016-7032 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1007501">SUSE bug 1007501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007766">SUSE bug 1007766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011975">SUSE bug 1011975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011976">SUSE bug 1011976</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822713" comment="sudo-1.8.6p7-21.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822714" comment="sudo-devel-1.8.6p7-21.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167035" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7035</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7035" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7035" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7035" ref_url="https://www.suse.com/security/cve/CVE-2016-7035" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2974-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002489.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2965-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/A4CL3QXNX3T4CFZISMA6YM53WU2VV26G/#A4CL3QXNX3T4CFZISMA6YM53WU2VV26G" source="SUSE-SU"/>
    <description>
    An authorization flaw was found in Pacemaker before 1.1.16, where it did not properly guard its IPC interface. An attacker with an unprivileged account on a Pacemaker node could use this flaw to, for example, force the Local Resource Manager daemon to execute a script as root and thereby gain root access on the machine.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7035/">CVE-2016-7035 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7035">CVE-2016-7035 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1007433">SUSE bug 1007433</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822646" comment="pacemaker-1.1.15-11.el7_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822647" comment="pacemaker-cli-1.1.15-11.el7_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822648" comment="pacemaker-cluster-libs-1.1.15-11.el7_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822649" comment="pacemaker-cts-1.1.15-11.el7_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822650" comment="pacemaker-doc-1.1.15-11.el7_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822651" comment="pacemaker-libs-1.1.15-11.el7_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822652" comment="pacemaker-libs-devel-1.1.15-11.el7_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822653" comment="pacemaker-nagios-plugins-metadata-1.1.15-11.el7_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822654" comment="pacemaker-remote-1.1.15-11.el7_3.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167039" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7039</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7039" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7039" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7039" ref_url="https://www.suse.com/security/cve/CVE-2016-7039" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002564.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2583-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RQFL6VT6HOSDOVBCI7IGQVPVXDZ5ENNE/#RQFL6VT6HOSDOVBCI7IGQVPVXDZ5ENNE" source="SUSE-SU"/>
    <description>
    The IP stack in the Linux kernel through 4.8.2 allows remote attackers to cause a denial of service (stack consumption and panic) or possibly have unspecified other impact by triggering use of the GRO path for large crafted packets, as demonstrated by packets that contain only VLAN headers, a related issue to CVE-2016-8666.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7039/">CVE-2016-7039 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7039">CVE-2016-7039 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1001486">SUSE bug 1001486</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1001487">SUSE bug 1001487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003964">SUSE bug 1003964</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822330" comment="kernel-3.10.0-327.36.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822331" comment="kernel-abi-whitelists-3.10.0-327.36.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822332" comment="kernel-debug-3.10.0-327.36.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822335" comment="kernel-doc-3.10.0-327.36.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822336" comment="kernel-headers-3.10.0-327.36.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822337" comment="kernel-tools-3.10.0-327.36.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822338" comment="kernel-tools-libs-3.10.0-327.36.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822340" comment="perf-3.10.0-327.36.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822341" comment="python-perf-3.10.0-327.36.2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167042" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7042</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7042" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7042" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7042" ref_url="https://www.suse.com/security/cve/CVE-2016-7042" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3304-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002828.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3021-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RNLBL6OKPBVGYFXWDCIZX6MURLH6ERPD/#RNLBL6OKPBVGYFXWDCIZX6MURLH6ERPD" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3050-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QXEFFZRQPMWZP53PFRPS3ZPTNBTR7K6O/#QXEFFZRQPMWZP53PFRPS3ZPTNBTR7K6O" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TYANF56WB457ENVSY7PHYIW7M4H3WVH5/#TYANF56WB457ENVSY7PHYIW7M4H3WVH5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3061-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZJRJIBDQAMXP33FAT3LCBWJRGIKQYVEH/#ZJRJIBDQAMXP33FAT3LCBWJRGIKQYVEH" source="SUSE-SU"/>
    <description>
    The proc_keys_show function in security/keys/proc.c in the Linux kernel through 4.8.2, when the GNU Compiler Collection (gcc) stack protector is enabled, uses an incorrect buffer size for certain timeout data, which allows local users to cause a denial of service (stack memory corruption and panic) by reading the /proc/keys file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7042/">CVE-2016-7042 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7042">CVE-2016-7042 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1004517">SUSE bug 1004517</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823168" comment="kernel-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823169" comment="kernel-abi-whitelists-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823170" comment="kernel-debug-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823173" comment="kernel-doc-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823174" comment="kernel-headers-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823175" comment="kernel-tools-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823176" comment="kernel-tools-libs-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823178" comment="perf-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823179" comment="python-perf-3.10.0-693.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167050" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7050</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7050" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7050" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7050" ref_url="https://www.suse.com/security/cve/CVE-2016-7050" source="SUSE CVE"/>
    <description>
    SerializableProvider in RESTEasy in Red Hat Enterprise Linux Desktop 7, Red Hat Enterprise Linux HPC Node 7, Red Hat Enterprise Linux Server 7, and Red Hat Enterprise Linux Workstation 7 allows remote attackers to execute arbitrary code.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7050/">CVE-2016-7050 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7050">CVE-2016-7050 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822604" comment="resteasy-base-3.0.6-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822605" comment="resteasy-base-atom-provider-3.0.6-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822606" comment="resteasy-base-client-3.0.6-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822607" comment="resteasy-base-jackson-provider-3.0.6-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822608" comment="resteasy-base-javadoc-3.0.6-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822609" comment="resteasy-base-jaxb-provider-3.0.6-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822610" comment="resteasy-base-jaxrs-3.0.6-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822611" comment="resteasy-base-jaxrs-all-3.0.6-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822612" comment="resteasy-base-jaxrs-api-3.0.6-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822613" comment="resteasy-base-jettison-provider-3.0.6-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822614" comment="resteasy-base-providers-pom-3.0.6-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822615" comment="resteasy-base-resteasy-pom-3.0.6-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822616" comment="resteasy-base-tjws-3.0.6-4.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167076" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7076</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7076" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7076" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7076" ref_url="https://www.suse.com/security/cve/CVE-2016-7076" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002420.html" source="SUSE-SU"/>
    <description>
    sudo before version 1.8.18p1 is vulnerable to a bypass in the sudo noexec restriction if application run via sudo executed wordexp() C library function with a user supplied argument. A local user permitted to run such application via sudo with noexec restriction could possibly use this flaw to execute arbitrary commands with elevated privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7076/">CVE-2016-7076 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7076">CVE-2016-7076 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1007501">SUSE bug 1007501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011975">SUSE bug 1011975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011976">SUSE bug 1011976</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822713" comment="sudo-1.8.6p7-21.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822714" comment="sudo-devel-1.8.6p7-21.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167091" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7091</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7091" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7091" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7091" ref_url="https://www.suse.com/security/cve/CVE-2016-7091" source="SUSE CVE"/>
    <description>
    sudo: It was discovered that the default sudo configuration on Red Hat Enterprise Linux and possibly other Linux implementations preserves the value of INPUTRC which could lead to information disclosure. A local user with sudo access to a restricted program that uses readline could use this flaw to read content from specially formatted files with elevated privileges provided by sudo.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7091/">CVE-2016-7091 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7091">CVE-2016-7091 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/995726">SUSE bug 995726</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822541" comment="sudo-1.8.6p7-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822542" comment="sudo-devel-1.8.6p7-20.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167097" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7097</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7097" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7097" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7097" ref_url="https://www.suse.com/security/cve/CVE-2016-7097" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3304-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003073.html" source="SUSE-SU"/>
		<reference ref_id="TID7018489" ref_url="https://www.suse.com/support/kb/doc/?id=7018489" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3021-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RNLBL6OKPBVGYFXWDCIZX6MURLH6ERPD/#RNLBL6OKPBVGYFXWDCIZX6MURLH6ERPD" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TYANF56WB457ENVSY7PHYIW7M4H3WVH5/#TYANF56WB457ENVSY7PHYIW7M4H3WVH5" source="SUSE-SU"/>
    <description>
    The filesystem implementation in the Linux kernel through 4.8.2 preserves the setgid bit during a setxattr call, which allows local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7097/">CVE-2016-7097 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7097">CVE-2016-7097 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1021258">SUSE bug 1021258</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052256">SUSE bug 1052256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/870618">SUSE bug 870618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995968">SUSE bug 995968</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823168" comment="kernel-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823169" comment="kernel-abi-whitelists-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823170" comment="kernel-debug-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823173" comment="kernel-doc-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823174" comment="kernel-headers-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823175" comment="kernel-tools-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823176" comment="kernel-tools-libs-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823178" comment="perf-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823179" comment="python-perf-3.10.0-693.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167117" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7117</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7117" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7117" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7117" ref_url="https://www.suse.com/security/cve/CVE-2016-7117" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002668.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003182.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2625-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4S7UHJM6T55DAAXQ6V2UZD53B3N7CANL/#4S7UHJM6T55DAAXQ6V2UZD53B3N7CANL" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0456-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BIIWQN3DXKSG2W6OKPZAEUQIPS7IYZER/#BIIWQN3DXKSG2W6OKPZAEUQIPS7IYZER" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0458-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4NRW2RRQBPH6CB4X5XXCAI3A3XMYRHHZ/#4NRW2RRQBPH6CB4X5XXCAI3A3XMYRHHZ" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel before 4.5.2 allows remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-7117/">CVE-2016-7117 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7117">CVE-2016-7117 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1003077">SUSE bug 1003077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003253">SUSE bug 1003253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057478">SUSE bug 1057478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071943">SUSE bug 1071943</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822770" comment="kernel-3.10.0-514.6.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822771" comment="kernel-abi-whitelists-3.10.0-514.6.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822772" comment="kernel-debug-3.10.0-514.6.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822775" comment="kernel-doc-3.10.0-514.6.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822776" comment="kernel-headers-3.10.0-514.6.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822777" comment="kernel-tools-3.10.0-514.6.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822778" comment="kernel-tools-libs-3.10.0-514.6.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822780" comment="perf-3.10.0-514.6.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822781" comment="python-perf-3.10.0-514.6.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167141" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7141</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7141" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7141" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7141" ref_url="https://www.suse.com/security/cve/CVE-2016-7141" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002387.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003634.html" source="SUSE-SU"/>
    <description>
    curl and libcurl before 7.50.2, when built with NSS and the libnsspem.so library is available at runtime, allow remote attackers to hijack the authentication of a TLS connection by leveraging reuse of a previously loaded client certificate from file for a connection for which no certificate has been set, a different vulnerability than CVE-2016-5420.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-02"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7141/">CVE-2016-7141 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7141">CVE-2016-7141 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/991390">SUSE bug 991390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997420">SUSE bug 997420</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822387" comment="curl-7.29.0-35.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822388" comment="libcurl-7.29.0-35.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822389" comment="libcurl-devel-7.29.0-35.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167163" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7163</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7163" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7163" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7163" ref_url="https://www.suse.com/security/cve/CVE-2016-7163" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2186-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MLDN6OEG4RQSGHLC5NRWUQFK2IEF5WWP/#MLDN6OEG4RQSGHLC5NRWUQFK2IEF5WWP" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2567-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AL7JYPSOTOZ4UZQTE7T4Y3J7RCMV7M6M/#AL7JYPSOTOZ4UZQTE7T4Y3J7RCMV7M6M" source="SUSE-SU"/>
    <description>
    Integer overflow in the opj_pi_create_decode function in pi.c in OpenJPEG allows remote attackers to execute arbitrary code via a crafted JP2 file, which triggers an out-of-bounds read or write.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-7163/">CVE-2016-7163 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7163">CVE-2016-7163 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1007739">SUSE bug 1007739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007744">SUSE bug 1007744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997857">SUSE bug 997857</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822884" comment="openjpeg-1.5.1-16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822885" comment="openjpeg-devel-1.5.1-16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822886" comment="openjpeg-libs-1.5.1-16.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7166</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7166" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7166" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7166" ref_url="https://www.suse.com/security/cve/CVE-2016-7166" source="SUSE CVE"/>
    <description>
    libarchive before 3.2.0 does not limit the number of recursive decompressions, which allows remote attackers to cause a denial of service (memory consumption and application crash) via a crafted gzip file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7166/">CVE-2016-7166 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7166">CVE-2016-7166 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/998115">SUSE bug 998115</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822282" comment="bsdcpio-3.1.2-10.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822283" comment="bsdtar-3.1.2-10.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822284" comment="libarchive-3.1.2-10.el7_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822285" comment="libarchive-devel-3.1.2-10.el7_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167167" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7167</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7167" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7167" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7167" ref_url="https://www.suse.com/security/cve/CVE-2016-7167" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002387.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002391.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2768-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ISHPY4KAPUZXW4MWHUKGNB2IKJNOSNLI/#ISHPY4KAPUZXW4MWHUKGNB2IKJNOSNLI" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in the (1) curl_escape, (2) curl_easy_escape, (3) curl_unescape, and (4) curl_easy_unescape functions in libcurl before 7.50.3 allow attackers to have unspecified impact via a string of length 0xffffffff, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7167/">CVE-2016-7167 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7167">CVE-2016-7167 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/998760">SUSE bug 998760</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823376" comment="curl-7.29.0-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823377" comment="libcurl-7.29.0-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823378" comment="libcurl-devel-7.29.0-42.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167426" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7426</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7426" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7426" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7426" ref_url="https://www.suse.com/security/cve/CVE-2016-7426" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002589.html" source="SUSE-SU"/>
    <description>
    NTP before 4.2.8p9 rate limits responses received from the configured sources when rate limiting for all associations is enabled, which allows remote attackers to cause a denial of service (prevent responses from the sources) by sending responses with a spoofed source address.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-02"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7426/">CVE-2016-7426 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7426">CVE-2016-7426 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1011406">SUSE bug 1011406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011421">SUSE bug 1011421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012330">SUSE bug 1012330</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822807" comment="ntp-4.2.6p5-25.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822808" comment="ntp-doc-4.2.6p5-25.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822809" comment="ntp-perl-4.2.6p5-25.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822810" comment="ntpdate-4.2.6p5-25.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822811" comment="sntp-4.2.6p5-25.el7_3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167429" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7429</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7429" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7429" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7429" ref_url="https://www.suse.com/security/cve/CVE-2016-7429" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002589.html" source="SUSE-SU"/>
    <description>
    NTP before 4.2.8p9 changes the peer structure to the interface it receives the response from a source, which allows remote attackers to cause a denial of service (prevent communication with a source) by sending a response for a source to an interface the source does not use.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7429/">CVE-2016-7429 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7429">CVE-2016-7429 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1011404">SUSE bug 1011404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011421">SUSE bug 1011421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012330">SUSE bug 1012330</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822807" comment="ntp-4.2.6p5-25.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822808" comment="ntp-doc-4.2.6p5-25.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822809" comment="ntp-perl-4.2.6p5-25.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822810" comment="ntpdate-4.2.6p5-25.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822811" comment="sntp-4.2.6p5-25.el7_3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167433" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7433</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7433" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7433" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7433" ref_url="https://www.suse.com/security/cve/CVE-2016-7433" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002589.html" source="SUSE-SU"/>
    <description>
    NTP before 4.2.8p9 does not properly perform the initial sync calculations, which allows remote attackers to unspecified impact via unknown vectors, related to a "root distance that did not include the peer dispersion."
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7433/">CVE-2016-7433 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7433">CVE-2016-7433 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1011411">SUSE bug 1011411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011421">SUSE bug 1011421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012330">SUSE bug 1012330</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822807" comment="ntp-4.2.6p5-25.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822808" comment="ntp-doc-4.2.6p5-25.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822809" comment="ntp-perl-4.2.6p5-25.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822810" comment="ntpdate-4.2.6p5-25.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822811" comment="sntp-4.2.6p5-25.el7_3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167444" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7444</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7444" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7444" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7444" ref_url="https://www.suse.com/security/cve/CVE-2016-7444" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002614.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0386-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NEVLKMTWKZHIHXYGCHNEYH5ECARK6UQS/#NEVLKMTWKZHIHXYGCHNEYH5ECARK6UQS" source="SUSE-SU"/>
    <description>
    The gnutls_ocsp_resp_check_crt function in lib/x509/ocsp.c in GnuTLS before 3.4.15 and 3.5.x before 3.5.4 does not verify the serial length of an OCSP response, which might allow remote attackers to bypass an intended certificate validation mechanism via vectors involving trailing bytes left by gnutls_malloc.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7444/">CVE-2016-7444 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7444">CVE-2016-7444 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/999646">SUSE bug 999646</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823451" comment="gnutls-3.3.26-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823452" comment="gnutls-c++-3.3.26-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823453" comment="gnutls-dane-3.3.26-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823454" comment="gnutls-devel-3.3.26-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823455" comment="gnutls-utils-3.3.26-9.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167543" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7543</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7543" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7543" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7543" ref_url="https://www.suse.com/security/cve/CVE-2016-7543" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002410.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1398-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004706.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1419-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/V72YYZ3G5GYG3WCMLHREH5XCGR2EASCW/#V72YYZ3G5GYG3WCMLHREH5XCGR2EASCW" source="SUSE-SU"/>
    <description>
    Bash before 4.4 allows local users to execute arbitrary commands with root privileges via crafted SHELLOPTS and PS4 environment variables.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7543/">CVE-2016-7543 at SUSE</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7543">CVE-2016-7543 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1001299">SUSE bug 1001299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159416">SUSE bug 1159416</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823309" comment="bash-4.2.46-28.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823310" comment="bash-doc-4.2.46-28.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167545" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7545</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7545" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7545" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7545" ref_url="https://www.suse.com/security/cve/CVE-2016-7545" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0340-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002612.html" source="SUSE-SU"/>
    <description>
    SELinux policycoreutils allows local users to execute arbitrary commands outside of the sandbox via a crafted TIOCSTI ioctl call.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7545/">CVE-2016-7545 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7545">CVE-2016-7545 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1000998">SUSE bug 1000998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968375">SUSE bug 968375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968674">SUSE bug 968674</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822678" comment="policycoreutils-2.5-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822679" comment="policycoreutils-devel-2.5-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822680" comment="policycoreutils-gui-2.5-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822681" comment="policycoreutils-newrole-2.5-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822682" comment="policycoreutils-python-2.5-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822683" comment="policycoreutils-restorecond-2.5-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822684" comment="policycoreutils-sandbox-2.5-9.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167795" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7795</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7795" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7795" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7795" ref_url="https://www.suse.com/security/cve/CVE-2016-7795" source="SUSE CVE"/>
    <description>
    The manager_invoke_notify_message function in systemd 231 and earlier allows local users to cause a denial of service (assertion failure and PID 1 hang) via a zero-length message received over a notify socket.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7795/">CVE-2016-7795 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7795">CVE-2016-7795 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1001765">SUSE bug 1001765</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822636" comment="libgudev1-219-30.el7_3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822637" comment="libgudev1-devel-219-30.el7_3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822638" comment="systemd-219-30.el7_3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822639" comment="systemd-devel-219-30.el7_3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822640" comment="systemd-journal-gateway-219-30.el7_3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822641" comment="systemd-libs-219-30.el7_3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822642" comment="systemd-networkd-219-30.el7_3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822643" comment="systemd-python-219-30.el7_3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822644" comment="systemd-resolved-219-30.el7_3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822645" comment="systemd-sysv-219-30.el7_3.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7797</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7797" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7797" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7797" ref_url="https://www.suse.com/security/cve/CVE-2016-7797" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2974-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002489.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2965-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/A4CL3QXNX3T4CFZISMA6YM53WU2VV26G/#A4CL3QXNX3T4CFZISMA6YM53WU2VV26G" source="SUSE-SU"/>
    <description>
    Pacemaker before 1.1.15, when using pacemaker remote, might allow remote attackers to cause a denial of service (node disconnection) via an unauthenticated connection.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7797/">CVE-2016-7797 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7797">CVE-2016-7797 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1002767">SUSE bug 1002767</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822436" comment="pacemaker-1.1.15-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822437" comment="pacemaker-cli-1.1.15-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822438" comment="pacemaker-cluster-libs-1.1.15-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822439" comment="pacemaker-cts-1.1.15-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822440" comment="pacemaker-doc-1.1.15-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822441" comment="pacemaker-libs-1.1.15-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822442" comment="pacemaker-libs-devel-1.1.15-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822443" comment="pacemaker-nagios-plugins-metadata-1.1.15-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822444" comment="pacemaker-remote-1.1.15-11.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167910" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7910</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7910" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7910" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7910" ref_url="https://www.suse.com/security/cve/CVE-2016-7910" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002828.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3061-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZJRJIBDQAMXP33FAT3LCBWJRGIKQYVEH/#ZJRJIBDQAMXP33FAT3LCBWJRGIKQYVEH" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the disk_seqf_stop function in block/genhd.c in the Linux kernel before 4.7.1 allows local users to gain privileges by leveraging the execution of a certain stop operation even if the corresponding start operation had failed.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-7910/">CVE-2016-7910 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7910">CVE-2016-7910 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1010716">SUSE bug 1010716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115893">SUSE bug 1115893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196722">SUSE bug 1196722</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823048" comment="kernel-3.10.0-514.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823049" comment="kernel-abi-whitelists-3.10.0-514.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823050" comment="kernel-debug-3.10.0-514.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823053" comment="kernel-doc-3.10.0-514.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823054" comment="kernel-headers-3.10.0-514.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823055" comment="kernel-tools-3.10.0-514.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823056" comment="kernel-tools-libs-3.10.0-514.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823058" comment="perf-3.10.0-514.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823059" comment="python-perf-3.10.0-514.21.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167913" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7913</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7913" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7913" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7913" ref_url="https://www.suse.com/security/cve/CVE-2016-7913" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002647.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3050-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QXEFFZRQPMWZP53PFRPS3ZPTNBTR7K6O/#QXEFFZRQPMWZP53PFRPS3ZPTNBTR7K6O" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TYANF56WB457ENVSY7PHYIW7M4H3WVH5/#TYANF56WB457ENVSY7PHYIW7M4H3WVH5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3061-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZJRJIBDQAMXP33FAT3LCBWJRGIKQYVEH/#ZJRJIBDQAMXP33FAT3LCBWJRGIKQYVEH" source="SUSE-SU"/>
    <description>
    The xc2028_set_config function in drivers/media/tuners/tuner-xc2028.c in the Linux kernel before 4.6 allows local users to gain privileges or cause a denial of service (use-after-free) via vectors involving omission of the firmware name from a certain data structure.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-7913/">CVE-2016-7913 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7913">CVE-2016-7913 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1010478">SUSE bug 1010478</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824165" comment="kernel-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824166" comment="kernel-abi-whitelists-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824167" comment="kernel-debug-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824170" comment="kernel-doc-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824171" comment="kernel-headers-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824172" comment="kernel-tools-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824173" comment="kernel-tools-libs-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824175" comment="perf-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824176" comment="python-perf-3.10.0-862.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167922" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7922</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7922" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7922" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7922" ref_url="https://www.suse.com/security/cve/CVE-2016-7922" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
    <description>
    The AH parser in tcpdump before 4.9.0 has a buffer overflow in print-ah.c:ah_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7922/">CVE-2016-7922 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7922">CVE-2016-7922 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823301" comment="tcpdump-4.9.0-5.el7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167923" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7923</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7923" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7923" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7923" ref_url="https://www.suse.com/security/cve/CVE-2016-7923" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
    <description>
    The ARP parser in tcpdump before 4.9.0 has a buffer overflow in print-arp.c:arp_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7923/">CVE-2016-7923 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7923">CVE-2016-7923 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823301" comment="tcpdump-4.9.0-5.el7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167924" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7924</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7924" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7924" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7924" ref_url="https://www.suse.com/security/cve/CVE-2016-7924" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
    <description>
    The ATM parser in tcpdump before 4.9.0 has a buffer overflow in print-atm.c:oam_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7924/">CVE-2016-7924 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7924">CVE-2016-7924 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823301" comment="tcpdump-4.9.0-5.el7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167925" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7925</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7925" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7925" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7925" ref_url="https://www.suse.com/security/cve/CVE-2016-7925" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
    <description>
    The compressed SLIP parser in tcpdump before 4.9.0 has a buffer overflow in print-sl.c:sl_if_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7925/">CVE-2016-7925 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7925">CVE-2016-7925 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823301" comment="tcpdump-4.9.0-5.el7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167926" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7926</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7926" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7926" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7926" ref_url="https://www.suse.com/security/cve/CVE-2016-7926" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
    <description>
    The Ethernet parser in tcpdump before 4.9.0 has a buffer overflow in print-ether.c:ethertype_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7926/">CVE-2016-7926 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7926">CVE-2016-7926 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823301" comment="tcpdump-4.9.0-5.el7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167927" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7927</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7927" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7927" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7927" ref_url="https://www.suse.com/security/cve/CVE-2016-7927" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
    <description>
    The IEEE 802.11 parser in tcpdump before 4.9.0 has a buffer overflow in print-802_11.c:ieee802_11_radio_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7927/">CVE-2016-7927 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7927">CVE-2016-7927 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823301" comment="tcpdump-4.9.0-5.el7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167928" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7928</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7928" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7928" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7928" ref_url="https://www.suse.com/security/cve/CVE-2016-7928" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
    <description>
    The IPComp parser in tcpdump before 4.9.0 has a buffer overflow in print-ipcomp.c:ipcomp_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7928/">CVE-2016-7928 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7928">CVE-2016-7928 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823301" comment="tcpdump-4.9.0-5.el7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167929" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7929</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7929" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7929" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7929" ref_url="https://www.suse.com/security/cve/CVE-2016-7929" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
    <description>
    The Juniper PPPoE ATM parser in tcpdump before 4.9.0 has a buffer overflow in print-juniper.c:juniper_parse_header().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7929/">CVE-2016-7929 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7929">CVE-2016-7929 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823301" comment="tcpdump-4.9.0-5.el7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167930" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7930</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7930" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7930" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7930" ref_url="https://www.suse.com/security/cve/CVE-2016-7930" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
    <description>
    The LLC/SNAP parser in tcpdump before 4.9.0 has a buffer overflow in print-llc.c:llc_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7930/">CVE-2016-7930 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7930">CVE-2016-7930 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823301" comment="tcpdump-4.9.0-5.el7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167931" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7931</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7931" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7931" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7931" ref_url="https://www.suse.com/security/cve/CVE-2016-7931" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
    <description>
    The MPLS parser in tcpdump before 4.9.0 has a buffer overflow in print-mpls.c:mpls_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7931/">CVE-2016-7931 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7931">CVE-2016-7931 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823301" comment="tcpdump-4.9.0-5.el7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167932" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7932</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7932" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7932" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7932" ref_url="https://www.suse.com/security/cve/CVE-2016-7932" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
    <description>
    The PIM parser in tcpdump before 4.9.0 has a buffer overflow in print-pim.c:pimv2_check_checksum().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7932/">CVE-2016-7932 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7932">CVE-2016-7932 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823301" comment="tcpdump-4.9.0-5.el7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167933" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7933</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7933" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7933" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7933" ref_url="https://www.suse.com/security/cve/CVE-2016-7933" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
    <description>
    The PPP parser in tcpdump before 4.9.0 has a buffer overflow in print-ppp.c:ppp_hdlc_if_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7933/">CVE-2016-7933 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7933">CVE-2016-7933 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823301" comment="tcpdump-4.9.0-5.el7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167934" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7934</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7934" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7934" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7934" ref_url="https://www.suse.com/security/cve/CVE-2016-7934" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
    <description>
    The RTCP parser in tcpdump before 4.9.0 has a buffer overflow in print-udp.c:rtcp_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7934/">CVE-2016-7934 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7934">CVE-2016-7934 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823301" comment="tcpdump-4.9.0-5.el7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167935" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7935</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7935" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7935" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7935" ref_url="https://www.suse.com/security/cve/CVE-2016-7935" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
    <description>
    The RTP parser in tcpdump before 4.9.0 has a buffer overflow in print-udp.c:rtp_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7935/">CVE-2016-7935 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7935">CVE-2016-7935 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823301" comment="tcpdump-4.9.0-5.el7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167936" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7936</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7936" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7936" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7936" ref_url="https://www.suse.com/security/cve/CVE-2016-7936" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
    <description>
    The UDP parser in tcpdump before 4.9.0 has a buffer overflow in print-udp.c:udp_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7936/">CVE-2016-7936 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7936">CVE-2016-7936 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823301" comment="tcpdump-4.9.0-5.el7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167937" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7937</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7937" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7937" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7937" ref_url="https://www.suse.com/security/cve/CVE-2016-7937" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
    <description>
    The VAT parser in tcpdump before 4.9.0 has a buffer overflow in print-udp.c:vat_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7937/">CVE-2016-7937 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7937">CVE-2016-7937 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823301" comment="tcpdump-4.9.0-5.el7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167938" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7938</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7938" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7938" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7938" ref_url="https://www.suse.com/security/cve/CVE-2016-7938" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
    <description>
    The ZeroMQ parser in tcpdump before 4.9.0 has an integer overflow in print-zeromq.c:zmtp1_print_frame().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7938/">CVE-2016-7938 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7938">CVE-2016-7938 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823301" comment="tcpdump-4.9.0-5.el7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167939" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7939</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7939" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7939" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7939" ref_url="https://www.suse.com/security/cve/CVE-2016-7939" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
    <description>
    The GRE parser in tcpdump before 4.9.0 has a buffer overflow in print-gre.c, multiple functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7939/">CVE-2016-7939 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7939">CVE-2016-7939 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823301" comment="tcpdump-4.9.0-5.el7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167940" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7940</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7940" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7940" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7940" ref_url="https://www.suse.com/security/cve/CVE-2016-7940" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
    <description>
    The STP parser in tcpdump before 4.9.0 has a buffer overflow in print-stp.c, multiple functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7940/">CVE-2016-7940 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7940">CVE-2016-7940 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823301" comment="tcpdump-4.9.0-5.el7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167973" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7973</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7973" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7973" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7973" ref_url="https://www.suse.com/security/cve/CVE-2016-7973" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
    <description>
    The AppleTalk parser in tcpdump before 4.9.0 has a buffer overflow in print-atalk.c, multiple functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7973/">CVE-2016-7973 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7973">CVE-2016-7973 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823301" comment="tcpdump-4.9.0-5.el7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167974" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7974</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7974" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7974" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7974" ref_url="https://www.suse.com/security/cve/CVE-2016-7974" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
    <description>
    The IP parser in tcpdump before 4.9.0 has a buffer overflow in print-ip.c, multiple functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7974/">CVE-2016-7974 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7974">CVE-2016-7974 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823301" comment="tcpdump-4.9.0-5.el7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167975" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7975</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7975" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7975" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7975" ref_url="https://www.suse.com/security/cve/CVE-2016-7975" source="SUSE CVE"/>
		<reference ref_id="SUSE-RU-2018:3087-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2018-October/009539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
    <description>
    The TCP parser in tcpdump before 4.9.0 has a buffer overflow in print-tcp.c:tcp_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7975/">CVE-2016-7975 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7975">CVE-2016-7975 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823301" comment="tcpdump-4.9.0-5.el7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167977" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7977</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7977" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7977" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7977" ref_url="https://www.suse.com/security/cve/CVE-2016-7977" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002322.html" source="SUSE-SU"/>
    <description>
    Ghostscript before 9.21 might allow remote attackers to bypass the SAFER mode protection mechanism and consequently read arbitrary files via the use of the .libfile operator in a crafted postscript document.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7977/">CVE-2016-7977 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7977">CVE-2016-7977 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1001951">SUSE bug 1001951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1004237">SUSE bug 1004237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095610">SUSE bug 1095610</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822734" comment="ghostscript-9.07-20.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822735" comment="ghostscript-cups-9.07-20.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822736" comment="ghostscript-devel-9.07-20.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822737" comment="ghostscript-doc-9.07-20.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822738" comment="ghostscript-gtk-9.07-20.el7_3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167978" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7978</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7978" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7978" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7978" ref_url="https://www.suse.com/security/cve/CVE-2016-7978" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2492-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002321.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2574-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S7WKTZ4PISKGVT5P63DXCU4BCUX5WNAX/#S7WKTZ4PISKGVT5P63DXCU4BCUX5WNAX" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2648-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RY3QC46CHKONZZKJT4XEQOTQFY6IZCKR/#RY3QC46CHKONZZKJT4XEQOTQFY6IZCKR" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Ghostscript 9.20 might allow remote attackers to execute arbitrary code via vectors related to a reference leak in .setdevice.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7978/">CVE-2016-7978 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7978">CVE-2016-7978 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1001951">SUSE bug 1001951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1004237">SUSE bug 1004237</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822734" comment="ghostscript-9.07-20.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822735" comment="ghostscript-cups-9.07-20.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822736" comment="ghostscript-devel-9.07-20.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822737" comment="ghostscript-doc-9.07-20.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822738" comment="ghostscript-gtk-9.07-20.el7_3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167979" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7979</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7979" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7979" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7979" ref_url="https://www.suse.com/security/cve/CVE-2016-7979" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2492-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002322.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2574-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S7WKTZ4PISKGVT5P63DXCU4BCUX5WNAX/#S7WKTZ4PISKGVT5P63DXCU4BCUX5WNAX" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2648-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RY3QC46CHKONZZKJT4XEQOTQFY6IZCKR/#RY3QC46CHKONZZKJT4XEQOTQFY6IZCKR" source="SUSE-SU"/>
    <description>
    Ghostscript before 9.21 might allow remote attackers to bypass the SAFER mode protection mechanism and consequently execute arbitrary code by leveraging type confusion in .initialize_dsc_parser.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7979/">CVE-2016-7979 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7979">CVE-2016-7979 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1001951">SUSE bug 1001951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1004237">SUSE bug 1004237</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822734" comment="ghostscript-9.07-20.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822735" comment="ghostscript-cups-9.07-20.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822736" comment="ghostscript-devel-9.07-20.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822737" comment="ghostscript-doc-9.07-20.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822738" comment="ghostscript-gtk-9.07-20.el7_3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167983" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7983</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7983" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7983" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7983" ref_url="https://www.suse.com/security/cve/CVE-2016-7983" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
    <description>
    The BOOTP parser in tcpdump before 4.9.0 has a buffer overflow in print-bootp.c:bootp_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7983/">CVE-2016-7983 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7983">CVE-2016-7983 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823301" comment="tcpdump-4.9.0-5.el7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167984" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7984</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7984" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7984" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7984" ref_url="https://www.suse.com/security/cve/CVE-2016-7984" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
    <description>
    The TFTP parser in tcpdump before 4.9.0 has a buffer overflow in print-tftp.c:tftp_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7984/">CVE-2016-7984 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7984">CVE-2016-7984 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823301" comment="tcpdump-4.9.0-5.el7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167985" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7985</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7985" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7985" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7985" ref_url="https://www.suse.com/security/cve/CVE-2016-7985" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
    <description>
    The CALM FAST parser in tcpdump before 4.9.0 has a buffer overflow in print-calm-fast.c:calm_fast_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7985/">CVE-2016-7985 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7985">CVE-2016-7985 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823301" comment="tcpdump-4.9.0-5.el7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167986" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7986</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7986" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7986" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7986" ref_url="https://www.suse.com/security/cve/CVE-2016-7986" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
    <description>
    The GeoNetworking parser in tcpdump before 4.9.0 has a buffer overflow in print-geonet.c, multiple functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7986/">CVE-2016-7986 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7986">CVE-2016-7986 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823301" comment="tcpdump-4.9.0-5.el7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167992" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7992</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7992" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7992" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7992" ref_url="https://www.suse.com/security/cve/CVE-2016-7992" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
    <description>
    The Classical IP over ATM parser in tcpdump before 4.9.0 has a buffer overflow in print-cip.c:cip_if_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7992/">CVE-2016-7992 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7992">CVE-2016-7992 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823301" comment="tcpdump-4.9.0-5.el7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167993" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7993</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7993" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7993" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7993" ref_url="https://www.suse.com/security/cve/CVE-2016-7993" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
    <description>
    A bug in util-print.c:relts_print() in tcpdump before 4.9.0 could cause a buffer overflow in multiple protocol parsers (DNS, DVMRP, HSRP, IGMP, lightweight resolver protocol, PIM).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7993/">CVE-2016-7993 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7993">CVE-2016-7993 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823301" comment="tcpdump-4.9.0-5.el7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168283" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8283</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8283" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8283" ref_url="https://www.suse.com/security/cve/CVE-2016-8283" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2932-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2933-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002425.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2769-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BOIVZNRI2WQ56MPKE6BVFPLBB4RKMOJF/#BOIVZNRI2WQ56MPKE6BVFPLBB4RKMOJF" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2788-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2XSIJ4CL46B7JEPC7XYAF6F24TA3GW4B/#2XSIJ4CL46B7JEPC7XYAF6F24TA3GW4B" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3025-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QJSFC32WO5YWZA6552W5XZXTGD2XJXPA/#QJSFC32WO5YWZA6552W5XZXTGD2XJXPA" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3028-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QHAQ2AORXI3O4NFNDTK4VIKCWAM3IJEU/#QHAQ2AORXI3O4NFNDTK4VIKCWAM3IJEU" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.51 and earlier, 5.6.32 and earlier, and 5.7.14 and earlier allows remote authenticated users to affect availability via vectors related to Server: Types.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-8283/">CVE-2016-8283 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8283">CVE-2016-8283 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1005582">SUSE bug 1005582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008318">SUSE bug 1008318</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822547" comment="mariadb-5.5.52-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822548" comment="mariadb-bench-5.5.52-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822549" comment="mariadb-devel-5.5.52-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822550" comment="mariadb-embedded-5.5.52-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822551" comment="mariadb-embedded-devel-5.5.52-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822552" comment="mariadb-libs-5.5.52-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822553" comment="mariadb-server-5.5.52-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822554" comment="mariadb-test-5.5.52-1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168399" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8399</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8399" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8399" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8399" ref_url="https://www.suse.com/security/cve/CVE-2016-8399" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002828.html" source="SUSE-SU"/>
    <description>
    An elevation of privilege vulnerability in the kernel networking subsystem could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Moderate because it first requires compromising a privileged process and current compiler optimizations restrict access to the vulnerable code. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-31349935.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8399/">CVE-2016-8399 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8399">CVE-2016-8399 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1014746">SUSE bug 1014746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115893">SUSE bug 1115893</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823683" comment="kernel-3.10.0-693.5.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823684" comment="kernel-abi-whitelists-3.10.0-693.5.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823685" comment="kernel-debug-3.10.0-693.5.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823688" comment="kernel-doc-3.10.0-693.5.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823689" comment="kernel-headers-3.10.0-693.5.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823690" comment="kernel-tools-3.10.0-693.5.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823691" comment="kernel-tools-libs-3.10.0-693.5.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823693" comment="perf-3.10.0-693.5.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823694" comment="python-perf-3.10.0-693.5.2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168574" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8574</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8574" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8574" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8574" ref_url="https://www.suse.com/security/cve/CVE-2016-8574" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
    <description>
    The FRF.15 parser in tcpdump before 4.9.0 has a buffer overflow in print-fr.c:frf15_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8574/">CVE-2016-8574 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8574">CVE-2016-8574 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823301" comment="tcpdump-4.9.0-5.el7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168575" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8575</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8575" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8575" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8575" ref_url="https://www.suse.com/security/cve/CVE-2016-8575" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
    <description>
    The Q.933 parser in tcpdump before 4.9.0 has a buffer overflow in print-fr.c:q933_print(), a different vulnerability than CVE-2017-5482.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8575/">CVE-2016-8575 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8575">CVE-2016-8575 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823301" comment="tcpdump-4.9.0-5.el7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168602" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8602</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8602" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8602" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8602" ref_url="https://www.suse.com/security/cve/CVE-2016-8602" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2654-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002392.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2648-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RY3QC46CHKONZZKJT4XEQOTQFY6IZCKR/#RY3QC46CHKONZZKJT4XEQOTQFY6IZCKR" source="SUSE-SU"/>
    <description>
    The .sethalftone5 function in psi/zht2.c in Ghostscript before 9.21 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted Postscript document that calls .sethalftone5 with an empty operand stack.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8602/">CVE-2016-8602 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8602">CVE-2016-8602 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1001951">SUSE bug 1001951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1004237">SUSE bug 1004237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036453">SUSE bug 1036453</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822734" comment="ghostscript-9.07-20.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822735" comment="ghostscript-cups-9.07-20.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822736" comment="ghostscript-devel-9.07-20.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822737" comment="ghostscript-doc-9.07-20.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822738" comment="ghostscript-gtk-9.07-20.el7_3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168610" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8610</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8610" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8610" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8610" ref_url="https://www.suse.com/security/cve/CVE-2016-8610" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0304-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002642.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002676.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004873.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3864-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3964-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183964-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005586.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0386-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NEVLKMTWKZHIHXYGCHNEYH5ECARK6UQS/#NEVLKMTWKZHIHXYGCHNEYH5ECARK6UQS" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4104-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J4BMNRK7ZVDGHSZAJJ4O24DNPDEMLYIY/#J4BMNRK7ZVDGHSZAJJ4O24DNPDEMLYIY" source="SUSE-SU"/>
    <description>
    A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 through 1.0.2h, and 1.1.0 in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8610/">CVE-2016-8610 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8610">CVE-2016-8610 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1005878">SUSE bug 1005878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005879">SUSE bug 1005879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110018">SUSE bug 1110018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120592">SUSE bug 1120592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148697">SUSE bug 1148697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982575">SUSE bug 982575</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822835" comment="openssl-1.0.1e-60.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822836" comment="openssl-devel-1.0.1e-60.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822837" comment="openssl-libs-1.0.1e-60.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822838" comment="openssl-perl-1.0.1e-60.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822839" comment="openssl-static-1.0.1e-60.el7_3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168630" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8630</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8630" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8630" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8630" ref_url="https://www.suse.com/security/cve/CVE-2016-8630" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:3058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TYANF56WB457ENVSY7PHYIW7M4H3WVH5/#TYANF56WB457ENVSY7PHYIW7M4H3WVH5" source="SUSE-SU"/>
    <description>
    The x86_decode_insn function in arch/x86/kvm/emulate.c in the Linux kernel before 4.8.7, when KVM is enabled, allows local users to cause a denial of service (host OS crash) via a certain use of a ModR/M byte in an undefined instruction.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8630/">CVE-2016-8630 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8630">CVE-2016-8630 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1009222">SUSE bug 1009222</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822852" comment="kernel-3.10.0-514.10.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822853" comment="kernel-abi-whitelists-3.10.0-514.10.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822854" comment="kernel-debug-3.10.0-514.10.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822857" comment="kernel-doc-3.10.0-514.10.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822858" comment="kernel-headers-3.10.0-514.10.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822859" comment="kernel-tools-3.10.0-514.10.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822860" comment="kernel-tools-libs-3.10.0-514.10.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822862" comment="perf-3.10.0-514.10.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822863" comment="python-perf-3.10.0-514.10.2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168633" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8633</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8633" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8633" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8633" ref_url="https://www.suse.com/security/cve/CVE-2016-8633" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002828.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TYANF56WB457ENVSY7PHYIW7M4H3WVH5/#TYANF56WB457ENVSY7PHYIW7M4H3WVH5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3061-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZJRJIBDQAMXP33FAT3LCBWJRGIKQYVEH/#ZJRJIBDQAMXP33FAT3LCBWJRGIKQYVEH" source="SUSE-SU"/>
    <description>
    drivers/firewire/net.c in the Linux kernel before 4.8.7, in certain unusual hardware configurations, allows remote attackers to execute arbitrary code via crafted fragmented packets.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-8633/">CVE-2016-8633 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8633">CVE-2016-8633 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1008833">SUSE bug 1008833</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824165" comment="kernel-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824166" comment="kernel-abi-whitelists-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824167" comment="kernel-debug-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824170" comment="kernel-doc-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824171" comment="kernel-headers-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824172" comment="kernel-tools-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824173" comment="kernel-tools-libs-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824175" comment="perf-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824176" comment="python-perf-3.10.0-862.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168635" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8635</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8635" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8635" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8635" ref_url="https://www.suse.com/security/cve/CVE-2016-8635" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002858.html" source="SUSE-SU"/>
    <description>
    It was found that Diffie Hellman Client key exchange handling in NSS 3.21.x was vulnerable to small subgroup confinement attack. An attacker could use this flaw to recover private keys by confining the client DH key to small subgroup of the desired group.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8635/">CVE-2016-8635 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8635">CVE-2016-8635 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1015422">SUSE bug 1015422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015547">SUSE bug 1015547</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822685" comment="nss-3.21.3-2.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822686" comment="nss-devel-3.21.3-2.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822687" comment="nss-pkcs11-devel-3.21.3-2.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822688" comment="nss-sysinit-3.21.3-2.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822689" comment="nss-tools-3.21.3-2.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822690" comment="nss-util-3.21.3-1.1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822691" comment="nss-util-devel-3.21.3-1.1.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168638" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8638</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8638" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8638" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8638" ref_url="https://www.suse.com/security/cve/CVE-2016-8638" source="SUSE CVE"/>
    <description>
    A vulnerability in ipsilon 2.0 before 2.0.2, 1.2 before 1.2.1, 1.1 before 1.1.2, and 1.0 before 1.0.3 was found that allows attacker to log out active sessions of other users.  This issue is related to how it tracks sessions, and allows an unauthenticated attacker to view and terminate active sessions from other users. It is also called a "SAML2 multi-session vulnerability."
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-08"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8638/">CVE-2016-8638 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8638">CVE-2016-8638 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822693" comment="ipsilon-1.0.0-13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822694" comment="ipsilon-authform-1.0.0-13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822695" comment="ipsilon-authgssapi-1.0.0-13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822696" comment="ipsilon-authldap-1.0.0-13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822697" comment="ipsilon-base-1.0.0-13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822698" comment="ipsilon-client-1.0.0-13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822699" comment="ipsilon-filesystem-1.0.0-13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822700" comment="ipsilon-infosssd-1.0.0-13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822701" comment="ipsilon-persona-1.0.0-13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822702" comment="ipsilon-saml2-1.0.0-13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822703" comment="ipsilon-saml2-base-1.0.0-13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822704" comment="ipsilon-tools-ipa-1.0.0-13.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168645" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8645</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8645" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8645" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8645" ref_url="https://www.suse.com/security/cve/CVE-2016-8645" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002647.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0456-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BIIWQN3DXKSG2W6OKPZAEUQIPS7IYZER/#BIIWQN3DXKSG2W6OKPZAEUQIPS7IYZER" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0458-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4NRW2RRQBPH6CB4X5XXCAI3A3XMYRHHZ/#4NRW2RRQBPH6CB4X5XXCAI3A3XMYRHHZ" source="SUSE-SU"/>
    <description>
    The TCP stack in the Linux kernel before 4.8.10 mishandles skb truncation, which allows local users to cause a denial of service (system crash) via a crafted application that makes sendto system calls, related to net/ipv4/tcp_ipv4.c and net/ipv6/tcp_ipv6.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8645/">CVE-2016-8645 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8645">CVE-2016-8645 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1009969">SUSE bug 1009969</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823168" comment="kernel-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823169" comment="kernel-abi-whitelists-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823170" comment="kernel-debug-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823173" comment="kernel-doc-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823174" comment="kernel-headers-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823175" comment="kernel-tools-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823176" comment="kernel-tools-libs-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823178" comment="perf-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823179" comment="python-perf-3.10.0-693.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168646" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8646</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8646" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8646" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8646" ref_url="https://www.suse.com/security/cve/CVE-2016-8646" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002828.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TYANF56WB457ENVSY7PHYIW7M4H3WVH5/#TYANF56WB457ENVSY7PHYIW7M4H3WVH5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3061-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZJRJIBDQAMXP33FAT3LCBWJRGIKQYVEH/#ZJRJIBDQAMXP33FAT3LCBWJRGIKQYVEH" source="SUSE-SU"/>
    <description>
    The hash_accept function in crypto/algif_hash.c in the Linux kernel before 4.3.6 allows local users to cause a denial of service (OOPS) by attempting to trigger use of in-kernel hash algorithms for a socket that has received zero bytes of data.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8646/">CVE-2016-8646 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8646">CVE-2016-8646 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1010150">SUSE bug 1010150</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823048" comment="kernel-3.10.0-514.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823049" comment="kernel-abi-whitelists-3.10.0-514.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823050" comment="kernel-debug-3.10.0-514.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823053" comment="kernel-doc-3.10.0-514.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823054" comment="kernel-headers-3.10.0-514.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823055" comment="kernel-tools-3.10.0-514.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823056" comment="kernel-tools-libs-3.10.0-514.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823058" comment="perf-3.10.0-514.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823059" comment="python-perf-3.10.0-514.21.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168650" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8650</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8650" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8650" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8650" ref_url="https://www.suse.com/security/cve/CVE-2016-8650" source="SUSE CVE"/>
    <description>
    The mpi_powm function in lib/mpi/mpi-pow.c in the Linux kernel through 4.8.11 does not ensure that memory is allocated for limb data, which allows local users to cause a denial of service (stack memory corruption and panic) via an add_key system call for an RSA key with a zero exponent.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-8650/">CVE-2016-8650 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8650">CVE-2016-8650 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1011820">SUSE bug 1011820</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822907" comment="kernel-3.10.0-514.16.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822908" comment="kernel-abi-whitelists-3.10.0-514.16.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822909" comment="kernel-debug-3.10.0-514.16.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822912" comment="kernel-doc-3.10.0-514.16.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822913" comment="kernel-headers-3.10.0-514.16.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822914" comment="kernel-tools-3.10.0-514.16.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822915" comment="kernel-tools-libs-3.10.0-514.16.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822917" comment="perf-3.10.0-514.16.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822918" comment="python-perf-3.10.0-514.16.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168654" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8654</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8654" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8654" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8654" ref_url="https://www.suse.com/security/cve/CVE-2016-8654" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002547.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002785.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0101-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/E5AIGUH3IE6NTKRYNLDZK2X65PJYLKYD/#E5AIGUH3IE6NTKRYNLDZK2X65PJYLKYD" source="SUSE-SU"/>
    <description>
    A heap-buffer overflow vulnerability was found in QMFB code in JPC codec caused by buffer being allocated with too small size. jasper versions before 2.0.0 are affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-8654/">CVE-2016-8654 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8654">CVE-2016-8654 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1012530">SUSE bug 1012530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822979" comment="jasper-1.900.1-30.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822980" comment="jasper-devel-1.900.1-30.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822981" comment="jasper-libs-1.900.1-30.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822982" comment="jasper-utils-1.900.1-30.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168655" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8655</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8655" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8655" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8655" ref_url="https://www.suse.com/security/cve/CVE-2016-8655" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002502.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002514.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002626.html" source="SUSE-SU"/>
		<reference ref_id="TID7018348" ref_url="https://www.suse.com/support/kb/doc/?id=7018348" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3050-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QXEFFZRQPMWZP53PFRPS3ZPTNBTR7K6O/#QXEFFZRQPMWZP53PFRPS3ZPTNBTR7K6O" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TYANF56WB457ENVSY7PHYIW7M4H3WVH5/#TYANF56WB457ENVSY7PHYIW7M4H3WVH5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3061-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZJRJIBDQAMXP33FAT3LCBWJRGIKQYVEH/#ZJRJIBDQAMXP33FAT3LCBWJRGIKQYVEH" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3077-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H3CHJ7L3LE6B6DAFZGESPLJCDTT43DLE/#H3CHJ7L3LE6B6DAFZGESPLJCDTT43DLE" source="SUSE-SU"/>
    <description>
    Race condition in net/packet/af_packet.c in the Linux kernel through 4.8.12 allows local users to gain privileges or cause a denial of service (use-after-free) by leveraging the CAP_NET_RAW capability to change a socket version, related to the packet_set_ring and packet_setsockopt functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8655/">CVE-2016-8655 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8655">CVE-2016-8655 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1012754">SUSE bug 1012754</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012759">SUSE bug 1012759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013822">SUSE bug 1013822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052365">SUSE bug 1052365</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822852" comment="kernel-3.10.0-514.10.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822853" comment="kernel-abi-whitelists-3.10.0-514.10.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822854" comment="kernel-debug-3.10.0-514.10.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822857" comment="kernel-doc-3.10.0-514.10.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822858" comment="kernel-headers-3.10.0-514.10.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822859" comment="kernel-tools-3.10.0-514.10.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822860" comment="kernel-tools-libs-3.10.0-514.10.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822862" comment="perf-3.10.0-514.10.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822863" comment="python-perf-3.10.0-514.10.2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168690" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8690</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8690" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8690" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8690" ref_url="https://www.suse.com/security/cve/CVE-2016-8690" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002399.html" source="SUSE-SU"/>
    <description>
    The bmp_getdata function in libjasper/bmp/bmp_dec.c in JasPer before 1.900.5 allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted BMP image in an imginfo command.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8690/">CVE-2016-8690 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8690">CVE-2016-8690 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1005084">SUSE bug 1005084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007009">SUSE bug 1007009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822979" comment="jasper-1.900.1-30.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822980" comment="jasper-devel-1.900.1-30.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822981" comment="jasper-libs-1.900.1-30.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822982" comment="jasper-utils-1.900.1-30.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168691" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8691</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8691" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8691" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8691" ref_url="https://www.suse.com/security/cve/CVE-2016-8691" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002399.html" source="SUSE-SU"/>
    <description>
    The jpc_dec_process_siz function in libjasper/jpc/jpc_dec.c in JasPer before 1.900.4 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted XRsiz value in a BMP image to the imginfo command.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8691/">CVE-2016-8691 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8691">CVE-2016-8691 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1005090">SUSE bug 1005090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822979" comment="jasper-1.900.1-30.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822980" comment="jasper-devel-1.900.1-30.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822981" comment="jasper-libs-1.900.1-30.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822982" comment="jasper-utils-1.900.1-30.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168692" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8692</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8692" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8692" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8692" ref_url="https://www.suse.com/security/cve/CVE-2016-8692" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002399.html" source="SUSE-SU"/>
    <description>
    The jpc_dec_process_siz function in libjasper/jpc/jpc_dec.c in JasPer before 1.900.4 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted YRsiz value in a BMP image to the imginfo command.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8692/">CVE-2016-8692 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8692">CVE-2016-8692 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1005090">SUSE bug 1005090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822979" comment="jasper-1.900.1-30.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822980" comment="jasper-devel-1.900.1-30.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822981" comment="jasper-libs-1.900.1-30.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822982" comment="jasper-utils-1.900.1-30.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168693" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8693</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8693" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8693" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8693" ref_url="https://www.suse.com/security/cve/CVE-2016-8693" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002399.html" source="SUSE-SU"/>
    <description>
    Double free vulnerability in the mem_close function in jas_stream.c in JasPer before 1.900.10 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted BMP image to the imginfo command.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8693/">CVE-2016-8693 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8693">CVE-2016-8693 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1005242">SUSE bug 1005242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822979" comment="jasper-1.900.1-30.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822980" comment="jasper-devel-1.900.1-30.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822981" comment="jasper-libs-1.900.1-30.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822982" comment="jasper-utils-1.900.1-30.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168704" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8704</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8704" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8704" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8704" ref_url="https://www.suse.com/security/cve/CVE-2016-8704" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003838.html" source="SUSE-SU"/>
    <description>
    An integer overflow in the process_bin_append_prepend function in Memcached, which is responsible for processing multiple commands of Memcached binary protocol, can be abused to cause heap overflow and lead to remote code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8704/">CVE-2016-8704 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8704">CVE-2016-8704 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1007719">SUSE bug 1007719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007866">SUSE bug 1007866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007871">SUSE bug 1007871</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822705" comment="memcached-1.4.15-10.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822706" comment="memcached-devel-1.4.15-10.el7_3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168705" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8705</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8705" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8705" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8705" ref_url="https://www.suse.com/security/cve/CVE-2016-8705" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004166.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in process_bin_update function in Memcached, which is responsible for processing multiple commands of Memcached binary protocol, can be abused to cause heap overflow and lead to remote code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-8705/">CVE-2016-8705 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8705">CVE-2016-8705 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1007866">SUSE bug 1007866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007870">SUSE bug 1007870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056865">SUSE bug 1056865</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822705" comment="memcached-1.4.15-10.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822706" comment="memcached-devel-1.4.15-10.el7_3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168706" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8706</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8706" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8706" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8706" ref_url="https://www.suse.com/security/cve/CVE-2016-8706" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003838.html" source="SUSE-SU"/>
    <description>
    An integer overflow in process_bin_sasl_auth function in Memcached, which is responsible for authentication commands of Memcached binary protocol, can be abused to cause heap overflow and lead to remote code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8706/">CVE-2016-8706 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8706">CVE-2016-8706 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1007866">SUSE bug 1007866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007869">SUSE bug 1007869</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822705" comment="memcached-1.4.15-10.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822706" comment="memcached-devel-1.4.15-10.el7_3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168743" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8743</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8743" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8743" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8743" ref_url="https://www.suse.com/security/cve/CVE-2016-8743" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004509.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2815-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004718.html" source="SUSE-SU"/>
		<reference ref_id="TID7018735" ref_url="https://www.suse.com/support/kb/doc/?id=7018735" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2856-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MRDNYGOD2KSQCJBKQKHXPXBXE7DHNGDR/#MRDNYGOD2KSQCJBKQKHXPXBXE7DHNGDR" source="SUSE-SU"/>
    <description>
    Apache HTTP Server, in all releases prior to 2.2.32 and 2.4.25, was liberal in the whitespace accepted from requests and sent in response lines and headers. Accepting these different behaviors represented a security concern when httpd participates in any chain of proxies or interacts with back-end application servers, either through mod_proxy or using conventional CGI mechanisms, and may result in request smuggling, response splitting and cache pollution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8743/">CVE-2016-8743 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8743">CVE-2016-8743 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1016715">SUSE bug 1016715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033513">SUSE bug 1033513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086774">SUSE bug 1086774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104826">SUSE bug 1104826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930944">SUSE bug 930944</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822887" comment="httpd-2.4.6-45.el7_3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822888" comment="httpd-devel-2.4.6-45.el7_3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822889" comment="httpd-manual-2.4.6-45.el7_3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822890" comment="httpd-tools-2.4.6-45.el7_3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822891" comment="mod_ldap-2.4.6-45.el7_3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822892" comment="mod_proxy_html-2.4.6-45.el7_3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822893" comment="mod_session-2.4.6-45.el7_3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822894" comment="mod_ssl-2.4.6-45.el7_3.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168745" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8745</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8745" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8745" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8745" ref_url="https://www.suse.com/security/cve/CVE-2016-8745" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1292-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MLGX7NUX5TEU72KGVEH2VVPTMIVKAIMA/#MLGX7NUX5TEU72KGVEH2VVPTMIVKAIMA" source="SUSE-SU"/>
    <description>
    A bug in the error handling of the send file code for the NIO HTTP connector in Apache Tomcat 9.0.0.M1 to 9.0.0.M13, 8.5.0 to 8.5.8, 8.0.0.RC1 to 8.0.39, 7.0.0 to 7.0.73 and 6.0.16 to 6.0.48 resulted in the current Processor object being added to the Processor cache multiple times. This in turn meant that the same Processor could be used for concurrent requests. Sharing a Processor can result in information leakage between requests including, not not limited to, session ID and the response body. The bug was first noticed in 8.5.x onwards where it appears the refactoring of the Connector code for 8.5.x onwards made it more likely that the bug was observed. Initially it was thought that the 8.5.x refactoring introduced the bug but further investigation has shown that the bug is present in all currently supported Tomcat versions.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-10-24"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8745/">CVE-2016-8745 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8745">CVE-2016-8745 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1015119">SUSE bug 1015119</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822919" comment="tomcat-7.0.69-11.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822920" comment="tomcat-admin-webapps-7.0.69-11.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822921" comment="tomcat-docs-webapp-7.0.69-11.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822922" comment="tomcat-el-2.2-api-7.0.69-11.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822923" comment="tomcat-javadoc-7.0.69-11.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822924" comment="tomcat-jsp-2.2-api-7.0.69-11.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822925" comment="tomcat-jsvc-7.0.69-11.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822926" comment="tomcat-lib-7.0.69-11.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822927" comment="tomcat-servlet-3.0-api-7.0.69-11.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822928" comment="tomcat-webapps-7.0.69-11.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168864" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8864</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8864" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8864" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8864" ref_url="https://www.suse.com/security/cve/CVE-2016-8864" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2697-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002389.html" source="SUSE-SU"/>
		<reference ref_id="TID7018224" ref_url="https://www.suse.com/support/kb/doc/?id=7018224" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2738-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LVNAYQQDWLTKUW7FJQ734WIXNNGRKYXI/#LVNAYQQDWLTKUW7FJQ734WIXNNGRKYXI" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2739-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6ZYSNDTISQMTCJKM7XCF4XJT23GEJKEK/#6ZYSNDTISQMTCJKM7XCF4XJT23GEJKEK" source="SUSE-SU"/>
    <description>
    named in ISC BIND 9.x before 9.9.9-P4, 9.10.x before 9.10.4-P4, and 9.11.x before 9.11.0-P1 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a DNAME record in the answer section of a response to a recursive query, related to db.c and resolver.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8864/">CVE-2016-8864 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8864">CVE-2016-8864 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1007829">SUSE bug 1007829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018700">SUSE bug 1018700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018701">SUSE bug 1018701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018702">SUSE bug 1018702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020526">SUSE bug 1020526</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024130">SUSE bug 1024130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033466">SUSE bug 1033466</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822655" comment="bind-9.9.4-38.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822656" comment="bind-chroot-9.9.4-38.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822657" comment="bind-devel-9.9.4-38.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822658" comment="bind-libs-9.9.4-38.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822659" comment="bind-libs-lite-9.9.4-38.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822660" comment="bind-license-9.9.4-38.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822661" comment="bind-lite-devel-9.9.4-38.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822662" comment="bind-pkcs11-9.9.4-38.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822663" comment="bind-pkcs11-devel-9.9.4-38.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822664" comment="bind-pkcs11-libs-9.9.4-38.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822665" comment="bind-pkcs11-utils-9.9.4-38.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822666" comment="bind-sdb-9.9.4-38.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822667" comment="bind-sdb-chroot-9.9.4-38.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822668" comment="bind-utils-9.9.4-38.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168883" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8883</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8883" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8883" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8883" ref_url="https://www.suse.com/security/cve/CVE-2016-8883" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002399.html" source="SUSE-SU"/>
    <description>
    The jpc_dec_tiledecode function in jpc_dec.c in JasPer before 1.900.8 allows remote attackers to cause a denial of service (assertion failure) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8883/">CVE-2016-8883 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8883">CVE-2016-8883 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1006598">SUSE bug 1006598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822979" comment="jasper-1.900.1-30.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822980" comment="jasper-devel-1.900.1-30.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822981" comment="jasper-libs-1.900.1-30.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822982" comment="jasper-utils-1.900.1-30.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168884" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8884</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8884" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8884" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8884" ref_url="https://www.suse.com/security/cve/CVE-2016-8884" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002399.html" source="SUSE-SU"/>
    <description>
    The bmp_getdata function in libjasper/bmp/bmp_dec.c in JasPer 1.900.5 allows remote attackers to cause a denial of service (NULL pointer dereference) by calling the imginfo command with a crafted BMP image. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-8690.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8884/">CVE-2016-8884 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8884">CVE-2016-8884 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1005084">SUSE bug 1005084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007009">SUSE bug 1007009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822979" comment="jasper-1.900.1-30.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822980" comment="jasper-devel-1.900.1-30.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822981" comment="jasper-libs-1.900.1-30.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822982" comment="jasper-utils-1.900.1-30.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168885" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8885</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8885" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8885" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8885" ref_url="https://www.suse.com/security/cve/CVE-2016-8885" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002399.html" source="SUSE-SU"/>
    <description>
    The bmp_getdata function in libjasper/bmp/bmp_dec.c in JasPer before 1.900.9 allows remote attackers to cause a denial of service (NULL pointer dereference) by calling the imginfo command with a crafted BMP image.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8885/">CVE-2016-8885 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8885">CVE-2016-8885 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1005084">SUSE bug 1005084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007009">SUSE bug 1007009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822979" comment="jasper-1.900.1-30.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822980" comment="jasper-devel-1.900.1-30.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822981" comment="jasper-libs-1.900.1-30.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822982" comment="jasper-utils-1.900.1-30.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169064" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9064</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9064" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9064" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9064" ref_url="https://www.suse.com/security/cve/CVE-2016-9064" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002474.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2861-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZCR7QQVKUUZQ2Z6RNKLB2WOCJVSQUWUA/#ZCR7QQVKUUZQ2Z6RNKLB2WOCJVSQUWUA" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3011-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S5LAOL4JSUPVGNKECSFNO5CPDJG2CPKN/#S5LAOL4JSUPVGNKECSFNO5CPDJG2CPKN" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Add-on updates failed to verify that the add-on ID inside the signed package matched the ID of the add-on being updated. An attacker who could perform a man-in-the-middle attack on the user's connection to the update server and defeat the certificate pinning protection could provide a malicious signed add-on instead of a valid update. This vulnerability affects Firefox ESR &lt; 45.5 and Firefox &lt; 50.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9064/">CVE-2016-9064 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9064">CVE-2016-9064 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1009026">SUSE bug 1009026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010402">SUSE bug 1010402</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822692" comment="firefox-45.5.0-1.el7_3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169066" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9066</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9066" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9066" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9066" ref_url="https://www.suse.com/security/cve/CVE-2016-9066" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002474.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2861-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZCR7QQVKUUZQ2Z6RNKLB2WOCJVSQUWUA/#ZCR7QQVKUUZQ2Z6RNKLB2WOCJVSQUWUA" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3011-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S5LAOL4JSUPVGNKECSFNO5CPDJG2CPKN/#S5LAOL4JSUPVGNKECSFNO5CPDJG2CPKN" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3019-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TGREHQXPWYA3JLTHOF5UWISQWEQ7FXCL/#TGREHQXPWYA3JLTHOF5UWISQWEQ7FXCL" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A buffer overflow resulting in a potentially exploitable crash due to memory allocation issues when handling large amounts of incoming data. This vulnerability affects Thunderbird &lt; 45.5, Firefox ESR &lt; 45.5, and Firefox &lt; 50.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9066/">CVE-2016-9066 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9066">CVE-2016-9066 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1009026">SUSE bug 1009026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010404">SUSE bug 1010404</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822692" comment="firefox-45.5.0-1.el7_3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169079" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9079</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9079" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9079" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9079" ref_url="https://www.suse.com/security/cve/CVE-2016-9079" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002474.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2991-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YZLUVOJ3SKHBRYXR7XTWZFEXM6SOFKEM/#YZLUVOJ3SKHBRYXR7XTWZFEXM6SOFKEM" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2994-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XIYFPQUFVF5HBKI6H4SR6ORF2BBMAMAG/#XIYFPQUFVF5HBKI6H4SR6ORF2BBMAMAG" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3011-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S5LAOL4JSUPVGNKECSFNO5CPDJG2CPKN/#S5LAOL4JSUPVGNKECSFNO5CPDJG2CPKN" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3019-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TGREHQXPWYA3JLTHOF5UWISQWEQ7FXCL/#TGREHQXPWYA3JLTHOF5UWISQWEQ7FXCL" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability in SVG Animation has been discovered. An exploit built on this vulnerability has been discovered in the wild targeting Firefox and Tor Browser users on Windows. This vulnerability affects Firefox &lt; 50.0.2, Firefox ESR &lt; 45.5.1, and Thunderbird &lt; 45.5.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9079/">CVE-2016-9079 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9079">CVE-2016-9079 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1012964">SUSE bug 1012964</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822711" comment="firefox-45.5.1-1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822712" comment="thunderbird-45.5.1-1.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169083" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9083</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9083" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9083" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9083" ref_url="https://www.suse.com/security/cve/CVE-2016-9083" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002647.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3050-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QXEFFZRQPMWZP53PFRPS3ZPTNBTR7K6O/#QXEFFZRQPMWZP53PFRPS3ZPTNBTR7K6O" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TYANF56WB457ENVSY7PHYIW7M4H3WVH5/#TYANF56WB457ENVSY7PHYIW7M4H3WVH5" source="SUSE-SU"/>
    <description>
    drivers/vfio/pci/vfio_pci.c in the Linux kernel through 4.8.11 allows local users to bypass integer overflow checks, and cause a denial of service (memory corruption) or have unspecified other impact, by leveraging access to a vfio PCI device file for a VFIO_DEVICE_SET_IRQS ioctl call, aka a "state machine confusion bug."
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9083/">CVE-2016-9083 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9083">CVE-2016-9083 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1007197">SUSE bug 1007197</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822852" comment="kernel-3.10.0-514.10.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822853" comment="kernel-abi-whitelists-3.10.0-514.10.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822854" comment="kernel-debug-3.10.0-514.10.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822857" comment="kernel-doc-3.10.0-514.10.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822858" comment="kernel-headers-3.10.0-514.10.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822859" comment="kernel-tools-3.10.0-514.10.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822860" comment="kernel-tools-libs-3.10.0-514.10.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822862" comment="perf-3.10.0-514.10.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822863" comment="python-perf-3.10.0-514.10.2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169084" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9084</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9084" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9084" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9084" ref_url="https://www.suse.com/security/cve/CVE-2016-9084" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002647.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3050-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QXEFFZRQPMWZP53PFRPS3ZPTNBTR7K6O/#QXEFFZRQPMWZP53PFRPS3ZPTNBTR7K6O" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TYANF56WB457ENVSY7PHYIW7M4H3WVH5/#TYANF56WB457ENVSY7PHYIW7M4H3WVH5" source="SUSE-SU"/>
    <description>
    drivers/vfio/pci/vfio_pci_intrs.c in the Linux kernel through 4.8.11 misuses the kzalloc function, which allows local users to cause a denial of service (integer overflow) or have unspecified other impact by leveraging access to a vfio PCI device file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9084/">CVE-2016-9084 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9084">CVE-2016-9084 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1007197">SUSE bug 1007197</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822852" comment="kernel-3.10.0-514.10.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822853" comment="kernel-abi-whitelists-3.10.0-514.10.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822854" comment="kernel-debug-3.10.0-514.10.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822857" comment="kernel-doc-3.10.0-514.10.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822858" comment="kernel-headers-3.10.0-514.10.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822859" comment="kernel-tools-3.10.0-514.10.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822860" comment="kernel-tools-libs-3.10.0-514.10.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822862" comment="perf-3.10.0-514.10.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822863" comment="python-perf-3.10.0-514.10.2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169131" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9131</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9131" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9131" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9131" ref_url="https://www.suse.com/security/cve/CVE-2016-9131" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002556.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0182-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q46G53XWUACIIAVNHQ7QTRGJLG2MYHJE/#Q46G53XWUACIIAVNHQ7QTRGJLG2MYHJE" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0193-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FMK4WAPBFWL3NAYUSUCPTGPPLV75CMCG/#FMK4WAPBFWL3NAYUSUCPTGPPLV75CMCG" source="SUSE-SU"/>
    <description>
    named in ISC BIND 9.x before 9.9.9-P5, 9.10.x before 9.10.4-P5, and 9.11.x before 9.11.0-P2 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a malformed response to an RTYPE ANY query.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-04-22"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9131/">CVE-2016-9131 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9131">CVE-2016-9131 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1018699">SUSE bug 1018699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018700">SUSE bug 1018700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018701">SUSE bug 1018701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018702">SUSE bug 1018702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033466">SUSE bug 1033466</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822752" comment="bind-9.9.4-38.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822753" comment="bind-chroot-9.9.4-38.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822754" comment="bind-devel-9.9.4-38.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822755" comment="bind-libs-9.9.4-38.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822756" comment="bind-libs-lite-9.9.4-38.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822757" comment="bind-license-9.9.4-38.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822758" comment="bind-lite-devel-9.9.4-38.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822759" comment="bind-pkcs11-9.9.4-38.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822760" comment="bind-pkcs11-devel-9.9.4-38.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822761" comment="bind-pkcs11-libs-9.9.4-38.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822762" comment="bind-pkcs11-utils-9.9.4-38.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822763" comment="bind-sdb-9.9.4-38.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822764" comment="bind-sdb-chroot-9.9.4-38.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822765" comment="bind-utils-9.9.4-38.el7_3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169147" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9147</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9147" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9147" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9147" ref_url="https://www.suse.com/security/cve/CVE-2016-9147" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002556.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0182-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q46G53XWUACIIAVNHQ7QTRGJLG2MYHJE/#Q46G53XWUACIIAVNHQ7QTRGJLG2MYHJE" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0193-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FMK4WAPBFWL3NAYUSUCPTGPPLV75CMCG/#FMK4WAPBFWL3NAYUSUCPTGPPLV75CMCG" source="SUSE-SU"/>
    <description>
    named in ISC BIND 9.9.9-P4, 9.9.9-S6, 9.10.4-P4, and 9.11.0-P1 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a response containing an inconsistency among the DNSSEC-related RRsets.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9147/">CVE-2016-9147 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9147">CVE-2016-9147 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1018699">SUSE bug 1018699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018700">SUSE bug 1018700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018701">SUSE bug 1018701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018702">SUSE bug 1018702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033466">SUSE bug 1033466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081545">SUSE bug 1081545</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115893">SUSE bug 1115893</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822752" comment="bind-9.9.4-38.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822753" comment="bind-chroot-9.9.4-38.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822754" comment="bind-devel-9.9.4-38.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822755" comment="bind-libs-9.9.4-38.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822756" comment="bind-libs-lite-9.9.4-38.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822757" comment="bind-license-9.9.4-38.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822758" comment="bind-lite-devel-9.9.4-38.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822759" comment="bind-pkcs11-9.9.4-38.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822760" comment="bind-pkcs11-devel-9.9.4-38.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822761" comment="bind-pkcs11-libs-9.9.4-38.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822762" comment="bind-pkcs11-utils-9.9.4-38.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822763" comment="bind-sdb-9.9.4-38.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822764" comment="bind-sdb-chroot-9.9.4-38.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822765" comment="bind-utils-9.9.4-38.el7_3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169262" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9262</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9262" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9262" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9262" ref_url="https://www.suse.com/security/cve/CVE-2016-9262" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003697.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in the (1) jas_realloc function in base/jas_malloc.c and (2) mem_resize function in base/jas_stream.c in JasPer before 1.900.22 allow remote attackers to cause a denial of service via a crafted image, which triggers use after free vulnerabilities.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-09"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9262/">CVE-2016-9262 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9262">CVE-2016-9262 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1009994">SUSE bug 1009994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078851">SUSE bug 1078851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822979" comment="jasper-1.900.1-30.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822980" comment="jasper-devel-1.900.1-30.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822981" comment="jasper-libs-1.900.1-30.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822982" comment="jasper-utils-1.900.1-30.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169310" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9310</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9310" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9310" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9310" ref_url="https://www.suse.com/security/cve/CVE-2016-9310" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002589.html" source="SUSE-SU"/>
    <description>
    The control mode (mode 6) functionality in ntpd in NTP before 4.2.8p9 allows remote attackers to set or unset traps via a crafted control mode packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9310/">CVE-2016-9310 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9310">CVE-2016-9310 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1011377">SUSE bug 1011377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011421">SUSE bug 1011421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012330">SUSE bug 1012330</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822807" comment="ntp-4.2.6p5-25.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822808" comment="ntp-doc-4.2.6p5-25.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822809" comment="ntp-perl-4.2.6p5-25.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822810" comment="ntpdate-4.2.6p5-25.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822811" comment="sntp-4.2.6p5-25.el7_3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169311" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9311</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9311" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9311" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9311" ref_url="https://www.suse.com/security/cve/CVE-2016-9311" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002589.html" source="SUSE-SU"/>
    <description>
    ntpd in NTP before 4.2.8p9, when the trap service is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9311/">CVE-2016-9311 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9311">CVE-2016-9311 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1011377">SUSE bug 1011377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011421">SUSE bug 1011421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012330">SUSE bug 1012330</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822807" comment="ntp-4.2.6p5-25.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822808" comment="ntp-doc-4.2.6p5-25.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822809" comment="ntp-perl-4.2.6p5-25.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822810" comment="ntpdate-4.2.6p5-25.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822811" comment="sntp-4.2.6p5-25.el7_3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169387" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9387</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9387" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9387" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9387" ref_url="https://www.suse.com/security/cve/CVE-2016-9387" source="SUSE CVE"/>
    <description>
    Integer overflow in the jpc_dec_process_siz function in libjasper/jpc/jpc_dec.c in JasPer before 1.900.13 allows remote attackers to have unspecified impact via a crafted file, which triggers an assertion failure.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-08"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2016-9387/">CVE-2016-9387 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9387">CVE-2016-9387 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1010960">SUSE bug 1010960</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822979" comment="jasper-1.900.1-30.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822980" comment="jasper-devel-1.900.1-30.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822981" comment="jasper-libs-1.900.1-30.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822982" comment="jasper-utils-1.900.1-30.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169388" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9388</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9388" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9388" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9388" ref_url="https://www.suse.com/security/cve/CVE-2016-9388" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003697.html" source="SUSE-SU"/>
    <description>
    The ras_getcmap function in ras_dec.c in JasPer before 1.900.14 allows remote attackers to cause a denial of service (assertion failure) via a crafted image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9388/">CVE-2016-9388 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9388">CVE-2016-9388 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1010975">SUSE bug 1010975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078851">SUSE bug 1078851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822979" comment="jasper-1.900.1-30.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822980" comment="jasper-devel-1.900.1-30.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822981" comment="jasper-libs-1.900.1-30.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822982" comment="jasper-utils-1.900.1-30.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169389" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9389</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9389" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9389" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9389" ref_url="https://www.suse.com/security/cve/CVE-2016-9389" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003697.html" source="SUSE-SU"/>
    <description>
    The jpc_irct and jpc_iict functions in jpc_mct.c in JasPer before 1.900.14 allow remote attackers to cause a denial of service (assertion failure).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9389/">CVE-2016-9389 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9389">CVE-2016-9389 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1010968">SUSE bug 1010968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078851">SUSE bug 1078851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822979" comment="jasper-1.900.1-30.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822980" comment="jasper-devel-1.900.1-30.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822981" comment="jasper-libs-1.900.1-30.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822982" comment="jasper-utils-1.900.1-30.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169390" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9390</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9390" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9390" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9390" ref_url="https://www.suse.com/security/cve/CVE-2016-9390" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003697.html" source="SUSE-SU"/>
    <description>
    The jas_seq2d_create function in jas_seq.c in JasPer before 1.900.14 allows remote attackers to cause a denial of service (assertion failure) via a crafted image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9390/">CVE-2016-9390 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9390">CVE-2016-9390 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1010774">SUSE bug 1010774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078851">SUSE bug 1078851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822979" comment="jasper-1.900.1-30.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822980" comment="jasper-devel-1.900.1-30.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822981" comment="jasper-libs-1.900.1-30.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822982" comment="jasper-utils-1.900.1-30.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169391" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9391</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9391" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9391" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9391" ref_url="https://www.suse.com/security/cve/CVE-2016-9391" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003697.html" source="SUSE-SU"/>
    <description>
    The jpc_bitstream_getbits function in jpc_bs.c in JasPer before 2.0.10 allows remote attackers to cause a denial of service (assertion failure) via a very large integer.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9391/">CVE-2016-9391 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9391">CVE-2016-9391 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1010782">SUSE bug 1010782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078851">SUSE bug 1078851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822979" comment="jasper-1.900.1-30.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822980" comment="jasper-devel-1.900.1-30.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822981" comment="jasper-libs-1.900.1-30.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822982" comment="jasper-utils-1.900.1-30.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169392" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9392</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9392" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9392" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9392" ref_url="https://www.suse.com/security/cve/CVE-2016-9392" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003697.html" source="SUSE-SU"/>
    <description>
    The calcstepsizes function in jpc_dec.c in JasPer before 1.900.17 allows remote attackers to cause a denial of service (assertion failure) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9392/">CVE-2016-9392 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9392">CVE-2016-9392 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1010757">SUSE bug 1010757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822979" comment="jasper-1.900.1-30.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822980" comment="jasper-devel-1.900.1-30.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822981" comment="jasper-libs-1.900.1-30.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822982" comment="jasper-utils-1.900.1-30.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169393" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9393</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9393" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9393" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9393" ref_url="https://www.suse.com/security/cve/CVE-2016-9393" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003697.html" source="SUSE-SU"/>
    <description>
    The jpc_pi_nextrpcl function in jpc_t2cod.c in JasPer before 1.900.17 allows remote attackers to cause a denial of service (assertion failure) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9393/">CVE-2016-9393 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9393">CVE-2016-9393 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1010757">SUSE bug 1010757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010766">SUSE bug 1010766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078851">SUSE bug 1078851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822979" comment="jasper-1.900.1-30.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822980" comment="jasper-devel-1.900.1-30.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822981" comment="jasper-libs-1.900.1-30.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822982" comment="jasper-utils-1.900.1-30.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169394" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9394</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9394" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9394" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9394" ref_url="https://www.suse.com/security/cve/CVE-2016-9394" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003697.html" source="SUSE-SU"/>
    <description>
    The jas_seq2d_create function in jas_seq.c in JasPer before 1.900.17 allows remote attackers to cause a denial of service (assertion failure) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9394/">CVE-2016-9394 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9394">CVE-2016-9394 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1010756">SUSE bug 1010756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010757">SUSE bug 1010757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078851">SUSE bug 1078851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822979" comment="jasper-1.900.1-30.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822980" comment="jasper-devel-1.900.1-30.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822981" comment="jasper-libs-1.900.1-30.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822982" comment="jasper-utils-1.900.1-30.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169396" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9396</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9396" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9396" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9396" ref_url="https://www.suse.com/security/cve/CVE-2016-9396" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005977.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1315-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RSYQNAT5MUXEB4LAI5BKNEDXZIYSUKSW/#RSYQNAT5MUXEB4LAI5BKNEDXZIYSUKSW" source="SUSE-SU"/>
    <description>
    The JPC_NOMINALGAIN function in jpc/jpc_t1cod.c in JasPer through 2.0.12 allows remote attackers to cause a denial of service (JPC_COX_RFT assertion failure) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-08"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-9396/">CVE-2016-9396 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9396">CVE-2016-9396 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1010783">SUSE bug 1010783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021871">SUSE bug 1021871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082397">SUSE bug 1082397</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154883">SUSE bug 1154883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825326" comment="jasper-1.900.1-33.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825327" comment="jasper-devel-1.900.1-33.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825328" comment="jasper-libs-1.900.1-33.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825329" comment="jasper-utils-1.900.1-33.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169401" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9401</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9401" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9401" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9401" ref_url="https://www.suse.com/security/cve/CVE-2016-9401" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002891.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003289.html" source="SUSE-SU"/>
    <description>
    popd in bash might allow local users to bypass the restricted shell and cause a use-after-free via a crafted address.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-11"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9401/">CVE-2016-9401 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9401">CVE-2016-9401 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1010845">SUSE bug 1010845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044328">SUSE bug 1044328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123788">SUSE bug 1123788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159416">SUSE bug 1159416</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823309" comment="bash-4.2.46-28.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823310" comment="bash-doc-4.2.46-28.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169444" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9444</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9444" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9444" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9444" ref_url="https://www.suse.com/security/cve/CVE-2016-9444" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002556.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0182-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q46G53XWUACIIAVNHQ7QTRGJLG2MYHJE/#Q46G53XWUACIIAVNHQ7QTRGJLG2MYHJE" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0193-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FMK4WAPBFWL3NAYUSUCPTGPPLV75CMCG/#FMK4WAPBFWL3NAYUSUCPTGPPLV75CMCG" source="SUSE-SU"/>
    <description>
    named in ISC BIND 9.x before 9.9.9-P5, 9.10.x before 9.10.4-P5, and 9.11.x before 9.11.0-P2 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a crafted DS resource record in an answer.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9444/">CVE-2016-9444 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9444">CVE-2016-9444 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1018699">SUSE bug 1018699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018700">SUSE bug 1018700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018701">SUSE bug 1018701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018702">SUSE bug 1018702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033466">SUSE bug 1033466</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822752" comment="bind-9.9.4-38.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822753" comment="bind-chroot-9.9.4-38.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822754" comment="bind-devel-9.9.4-38.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822755" comment="bind-libs-9.9.4-38.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822756" comment="bind-libs-lite-9.9.4-38.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822757" comment="bind-license-9.9.4-38.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822758" comment="bind-lite-devel-9.9.4-38.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822759" comment="bind-pkcs11-9.9.4-38.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822760" comment="bind-pkcs11-devel-9.9.4-38.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822761" comment="bind-pkcs11-libs-9.9.4-38.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822762" comment="bind-pkcs11-utils-9.9.4-38.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822763" comment="bind-sdb-9.9.4-38.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822764" comment="bind-sdb-chroot-9.9.4-38.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822765" comment="bind-utils-9.9.4-38.el7_3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169445" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9445</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9445" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9445" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9445" ref_url="https://www.suse.com/security/cve/CVE-2016-9445" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002544.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002545.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3147-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LBVUYPHNXLJZYJMOP72E5SVVTNVEBIX7/#LBVUYPHNXLJZYJMOP72E5SVVTNVEBIX7" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3158-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EZSF4LZMCETNQ57FMUSPWA7CO7KF4A3X/#EZSF4LZMCETNQ57FMUSPWA7CO7KF4A3X" source="SUSE-SU"/>
    <description>
    Integer overflow in the vmnc decoder in the gstreamer allows remote attackers to cause a denial of service (crash) via large width and height values, which triggers a buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-04-21"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9445/">CVE-2016-9445 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9445">CVE-2016-9445 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1010829">SUSE bug 1010829</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822739" comment="gstreamer-plugins-bad-free-0.10.23-22.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822740" comment="gstreamer-plugins-bad-free-devel-0.10.23-22.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822741" comment="gstreamer-plugins-bad-free-devel-docs-0.10.23-22.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822745" comment="gstreamer1-plugins-bad-free-1.4.5-6.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822746" comment="gstreamer1-plugins-bad-free-devel-1.4.5-6.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169446" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9446</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9446" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9446" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9446" ref_url="https://www.suse.com/security/cve/CVE-2016-9446" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002544.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002545.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3147-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LBVUYPHNXLJZYJMOP72E5SVVTNVEBIX7/#LBVUYPHNXLJZYJMOP72E5SVVTNVEBIX7" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3158-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EZSF4LZMCETNQ57FMUSPWA7CO7KF4A3X/#EZSF4LZMCETNQ57FMUSPWA7CO7KF4A3X" source="SUSE-SU"/>
    <description>
    The vmnc decoder in the gstreamer does not initialize the render canvas, which allows remote attackers to obtain sensitive information as demonstrated by thumbnailing a simple 1 frame vmnc movie that does not draw to the allocated render canvas.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9446/">CVE-2016-9446 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9446">CVE-2016-9446 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1010829">SUSE bug 1010829</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823388" comment="clutter-gst2-2.0.18-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823389" comment="clutter-gst2-devel-2.0.18-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823390" comment="gnome-video-effects-0.4.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823391" comment="gstreamer-plugins-bad-free-0.10.23-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823392" comment="gstreamer-plugins-bad-free-devel-0.10.23-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823393" comment="gstreamer-plugins-bad-free-devel-docs-0.10.23-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823394" comment="gstreamer-plugins-good-0.10.31-13.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823395" comment="gstreamer-plugins-good-devel-docs-0.10.31-13.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823396" comment="gstreamer1-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823397" comment="gstreamer1-devel-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823398" comment="gstreamer1-devel-docs-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823399" comment="gstreamer1-plugins-bad-free-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823400" comment="gstreamer1-plugins-bad-free-devel-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823401" comment="gstreamer1-plugins-bad-free-gtk-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823402" comment="gstreamer1-plugins-base-1.10.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823403" comment="gstreamer1-plugins-base-devel-1.10.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823404" comment="gstreamer1-plugins-base-devel-docs-1.10.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823405" comment="gstreamer1-plugins-base-tools-1.10.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823406" comment="gstreamer1-plugins-good-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823407" comment="orc-0.4.26-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823408" comment="orc-compiler-0.4.26-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823409" comment="orc-devel-0.4.26-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823410" comment="orc-doc-0.4.26-1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169447" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9447</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9447" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9447" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9447" ref_url="https://www.suse.com/security/cve/CVE-2016-9447" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002544.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002545.html" source="SUSE-SU"/>
    <description>
    The ROM mappings in the NSF decoder in gstreamer 0.10.x allow remote attackers to cause a denial of service (out-of-bounds read or write) and possibly execute arbitrary code via a crafted NSF music file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9447/">CVE-2016-9447 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9447">CVE-2016-9447 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1010514">SUSE bug 1010514</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822739" comment="gstreamer-plugins-bad-free-0.10.23-22.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822740" comment="gstreamer-plugins-bad-free-devel-0.10.23-22.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822741" comment="gstreamer-plugins-bad-free-devel-docs-0.10.23-22.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169533" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9533</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9533" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9533" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9533" ref_url="https://www.suse.com/security/cve/CVE-2016-9533" source="SUSE CVE"/>
    <description>
    tif_pixarlog.c in libtiff 4.0.6 has out-of-bounds write vulnerabilities in heap allocated buffers. Reported as MSVR 35094, aka "PixarLog horizontalDifference heap-buffer-overflow."
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9533/">CVE-2016-9533 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9533">CVE-2016-9533 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1011849">SUSE bug 1011849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013308">SUSE bug 1013308</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822802" comment="libtiff-4.0.3-27.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822803" comment="libtiff-devel-4.0.3-27.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822804" comment="libtiff-static-4.0.3-27.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822805" comment="libtiff-tools-4.0.3-27.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169534" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9534</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9534" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9534" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9534" ref_url="https://www.suse.com/security/cve/CVE-2016-9534" source="SUSE CVE"/>
    <description>
    tif_write.c in libtiff 4.0.6 has an issue in the error code path of TIFFFlushData1() that didn't reset the tif_rawcc and tif_rawcp members. Reported as MSVR 35095, aka "TIFFFlushData1 heap-buffer-overflow."
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9534/">CVE-2016-9534 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9534">CVE-2016-9534 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1011847">SUSE bug 1011847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013308">SUSE bug 1013308</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822802" comment="libtiff-4.0.3-27.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822803" comment="libtiff-devel-4.0.3-27.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822804" comment="libtiff-static-4.0.3-27.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822805" comment="libtiff-tools-4.0.3-27.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169535" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9535</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9535" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9535" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9535" ref_url="https://www.suse.com/security/cve/CVE-2016-9535" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004228.html" source="SUSE-SU"/>
    <description>
    tif_predict.h and tif_predict.c in libtiff 4.0.6 have assertions that can lead to assertion failures in debug mode, or buffer overflows in release mode, when dealing with unusual tile size like YCbCr with subsampling. Reported as MSVR 35105, aka "Predictor heap-buffer-overflow."
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9535/">CVE-2016-9535 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9535">CVE-2016-9535 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1011846">SUSE bug 1011846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013308">SUSE bug 1013308</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822802" comment="libtiff-4.0.3-27.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822803" comment="libtiff-devel-4.0.3-27.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822804" comment="libtiff-static-4.0.3-27.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822805" comment="libtiff-tools-4.0.3-27.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169536" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9536</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9536" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9536" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9536" ref_url="https://www.suse.com/security/cve/CVE-2016-9536" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003984.html" source="SUSE-SU"/>
    <description>
    tools/tiff2pdf.c in libtiff 4.0.6 has out-of-bounds write vulnerabilities in heap allocated buffers in t2p_process_jpeg_strip(). Reported as MSVR 35098, aka "t2p_process_jpeg_strip heap-buffer-overflow."
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9536/">CVE-2016-9536 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9536">CVE-2016-9536 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1011845">SUSE bug 1011845</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822802" comment="libtiff-4.0.3-27.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822803" comment="libtiff-devel-4.0.3-27.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822804" comment="libtiff-static-4.0.3-27.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822805" comment="libtiff-tools-4.0.3-27.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169537" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9537</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9537" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9537" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9537" ref_url="https://www.suse.com/security/cve/CVE-2016-9537" source="SUSE CVE"/>
    <description>
    tools/tiffcrop.c in libtiff 4.0.6 has out-of-bounds write vulnerabilities in buffers. Reported as MSVR 35093, MSVR 35096, and MSVR 35097.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9537/">CVE-2016-9537 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9537">CVE-2016-9537 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1011842">SUSE bug 1011842</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822802" comment="libtiff-4.0.3-27.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822803" comment="libtiff-devel-4.0.3-27.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822804" comment="libtiff-static-4.0.3-27.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822805" comment="libtiff-tools-4.0.3-27.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169540" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9540</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9540" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9540" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9540" ref_url="https://www.suse.com/security/cve/CVE-2016-9540" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004228.html" source="SUSE-SU"/>
    <description>
    tools/tiffcp.c in libtiff 4.0.6 has an out-of-bounds write on tiled images with odd tile width versus image width. Reported as MSVR 35103, aka "cpStripToTile heap-buffer-overflow."
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9540/">CVE-2016-9540 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9540">CVE-2016-9540 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1011839">SUSE bug 1011839</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013308">SUSE bug 1013308</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822802" comment="libtiff-4.0.3-27.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822803" comment="libtiff-devel-4.0.3-27.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822804" comment="libtiff-static-4.0.3-27.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822805" comment="libtiff-tools-4.0.3-27.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9555</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9555" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9555" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9555" ref_url="https://www.suse.com/security/cve/CVE-2016-9555" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002502.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002514.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002828.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3050-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QXEFFZRQPMWZP53PFRPS3ZPTNBTR7K6O/#QXEFFZRQPMWZP53PFRPS3ZPTNBTR7K6O" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TYANF56WB457ENVSY7PHYIW7M4H3WVH5/#TYANF56WB457ENVSY7PHYIW7M4H3WVH5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3061-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZJRJIBDQAMXP33FAT3LCBWJRGIKQYVEH/#ZJRJIBDQAMXP33FAT3LCBWJRGIKQYVEH" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3077-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H3CHJ7L3LE6B6DAFZGESPLJCDTT43DLE/#H3CHJ7L3LE6B6DAFZGESPLJCDTT43DLE" source="SUSE-SU"/>
    <description>
    The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel before 4.8.8 lacks chunk-length checking for the first chunk, which allows remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9555/">CVE-2016-9555 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9555">CVE-2016-9555 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1011685">SUSE bug 1011685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012183">SUSE bug 1012183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115893">SUSE bug 1115893</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822770" comment="kernel-3.10.0-514.6.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822771" comment="kernel-abi-whitelists-3.10.0-514.6.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822772" comment="kernel-debug-3.10.0-514.6.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822775" comment="kernel-doc-3.10.0-514.6.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822776" comment="kernel-headers-3.10.0-514.6.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822777" comment="kernel-tools-3.10.0-514.6.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822778" comment="kernel-tools-libs-3.10.0-514.6.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822780" comment="perf-3.10.0-514.6.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822781" comment="python-perf-3.10.0-514.6.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169560" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9560</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9560" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9560" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9560" ref_url="https://www.suse.com/security/cve/CVE-2016-9560" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002547.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002785.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0101-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/E5AIGUH3IE6NTKRYNLDZK2X65PJYLKYD/#E5AIGUH3IE6NTKRYNLDZK2X65PJYLKYD" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the jpc_tsfb_getbands2 function in jpc_tsfb.c in JasPer before 1.900.30 allows remote attackers to have unspecified impact via a crafted image.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-04-22"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9560/">CVE-2016-9560 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9560">CVE-2016-9560 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1011830">SUSE bug 1011830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822979" comment="jasper-1.900.1-30.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822980" comment="jasper-devel-1.900.1-30.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822981" comment="jasper-libs-1.900.1-30.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822982" comment="jasper-utils-1.900.1-30.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169573" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9573</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9573" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9573" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9573" ref_url="https://www.suse.com/security/cve/CVE-2016-9573" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002525.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0155-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J6SIEQUDXXVF4DC2DY4ACIB3QXRQGPI3/#J6SIEQUDXXVF4DC2DY4ACIB3QXRQGPI3" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0185-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/E6ZE2UZVOA4T4L5QDQMTW7IXFMASF7KD/#E6ZE2UZVOA4T4L5QDQMTW7IXFMASF7KD" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0207-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZZJBGORAE6E4I3JJ42MFMKJSBJCBDLBU/#ZZJBGORAE6E4I3JJ42MFMKJSBJCBDLBU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2567-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AL7JYPSOTOZ4UZQTE7T4Y3J7RCMV7M6M/#AL7JYPSOTOZ4UZQTE7T4Y3J7RCMV7M6M" source="SUSE-SU"/>
    <description>
    An out-of-bounds read vulnerability was found in OpenJPEG 2.1.2, in the j2k_to_image tool. Converting a specially crafted JPEG2000 file to another format could cause the application to crash or, potentially, disclose some data from the heap.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9573/">CVE-2016-9573 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9573">CVE-2016-9573 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1007739">SUSE bug 1007739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007744">SUSE bug 1007744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014543">SUSE bug 1014543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015662">SUSE bug 1015662</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822884" comment="openjpeg-1.5.1-16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822885" comment="openjpeg-devel-1.5.1-16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822886" comment="openjpeg-libs-1.5.1-16.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169575" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9575</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9575" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9575" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9575" ref_url="https://www.suse.com/security/cve/CVE-2016-9575" source="SUSE CVE"/>
    <description>
    Ipa versions 4.2.x, 4.3.x before 4.3.3 and 4.4.x before 4.4.3 did not properly check the user's permissions while modifying certificate profiles in IdM's certprofile-mod command. An authenticated, unprivileged attacker could use this flaw to modify profiles to issue certificates with arbitrary naming or key usage information and subsequently use such certificates for other attacks.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9575/">CVE-2016-9575 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9575">CVE-2016-9575 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1015564">SUSE bug 1015564</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822722" comment="ipa-admintools-4.4.0-14.el7_3.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822723" comment="ipa-client-4.4.0-14.el7_3.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822724" comment="ipa-client-common-4.4.0-14.el7_3.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822725" comment="ipa-common-4.4.0-14.el7_3.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822726" comment="ipa-python-compat-4.4.0-14.el7_3.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822727" comment="ipa-server-4.4.0-14.el7_3.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822728" comment="ipa-server-common-4.4.0-14.el7_3.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822729" comment="ipa-server-dns-4.4.0-14.el7_3.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822730" comment="ipa-server-trust-ad-4.4.0-14.el7_3.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822731" comment="python2-ipaclient-4.4.0-14.el7_3.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822732" comment="python2-ipalib-4.4.0-14.el7_3.1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822733" comment="python2-ipaserver-4.4.0-14.el7_3.1.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169576" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9576</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9576" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9576" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9576" ref_url="https://www.suse.com/security/cve/CVE-2016-9576" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002509.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0227-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002586.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002595.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002601.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002828.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3085-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JTNH3ZL76WNBIKXNG2ME7JKJCLIOYAR6/#JTNH3ZL76WNBIKXNG2ME7JKJCLIOYAR6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3086-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MCAMGOIQSBX6EPI4U2WHTHC7TN4GATSH/#MCAMGOIQSBX6EPI4U2WHTHC7TN4GATSH" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3118-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IQEFNT522C2XD6C2QEESALPHMZXUC4TR/#IQEFNT522C2XD6C2QEESALPHMZXUC4TR" source="SUSE-SU"/>
    <description>
    The blk_rq_map_user_iov function in block/blk-map.c in the Linux kernel before 4.8.14 does not properly restrict the type of iterator, which allows local users to read or write to arbitrary kernel memory locations or cause a denial of service (use-after-free) by leveraging access to a /dev/sg device.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9576/">CVE-2016-9576 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9576">CVE-2016-9576 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1013604">SUSE bug 1013604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014271">SUSE bug 1014271</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017710">SUSE bug 1017710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019079">SUSE bug 1019079</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019668">SUSE bug 1019668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115893">SUSE bug 1115893</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823168" comment="kernel-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823169" comment="kernel-abi-whitelists-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823170" comment="kernel-debug-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823173" comment="kernel-doc-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823174" comment="kernel-headers-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823175" comment="kernel-tools-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823176" comment="kernel-tools-libs-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823178" comment="perf-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823179" comment="python-perf-3.10.0-693.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169577" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9577</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9577" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9577" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9577" ref_url="https://www.suse.com/security/cve/CVE-2016-9577" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0400-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002625.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0419-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ST4NVLSJLSGMX6BN6TF4KAWN4BTUYNHS/#ST4NVLSJLSGMX6BN6TF4KAWN4BTUYNHS" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0421-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XTVRBASNBPIPUZL2GUHD5QGZYQ62DZAX/#XTVRBASNBPIPUZL2GUHD5QGZYQ62DZAX" source="SUSE-SU"/>
    <description>
    A vulnerability was discovered in SPICE before 0.13.90 in the server's protocol handling. An authenticated attacker could send crafted messages to the SPICE server causing a heap overflow leading to a crash or possible code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-10"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9577/">CVE-2016-9577 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9577">CVE-2016-9577 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1023078">SUSE bug 1023078</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822812" comment="spice-server-0.12.4-20.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822813" comment="spice-server-devel-0.12.4-20.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169578" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9578</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9578" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9578" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9578" ref_url="https://www.suse.com/security/cve/CVE-2016-9578" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0400-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002625.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0419-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ST4NVLSJLSGMX6BN6TF4KAWN4BTUYNHS/#ST4NVLSJLSGMX6BN6TF4KAWN4BTUYNHS" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0421-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XTVRBASNBPIPUZL2GUHD5QGZYQ62DZAX/#XTVRBASNBPIPUZL2GUHD5QGZYQ62DZAX" source="SUSE-SU"/>
    <description>
    A vulnerability was discovered in SPICE before 0.13.90 in the server's protocol handling. An attacker able to connect to the SPICE server could send crafted messages which would cause the process to crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-07"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9578/">CVE-2016-9578 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9578">CVE-2016-9578 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1023078">SUSE bug 1023078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023079">SUSE bug 1023079</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822812" comment="spice-server-0.12.4-20.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822813" comment="spice-server-devel-0.12.4-20.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169583" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9583</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9583" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9583" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9583" ref_url="https://www.suse.com/security/cve/CVE-2016-9583" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002789.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds heap read vulnerability was found in the jpc_pi_nextpcrl() function of jasper before 2.0.6 when processing crafted input.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9583/">CVE-2016-9583 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9583">CVE-2016-9583 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1015400">SUSE bug 1015400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822979" comment="jasper-1.900.1-30.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822980" comment="jasper-devel-1.900.1-30.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822981" comment="jasper-libs-1.900.1-30.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822982" comment="jasper-utils-1.900.1-30.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169588" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9588</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9588" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9588" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9588" ref_url="https://www.suse.com/security/cve/CVE-2016-9588" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002903.html" source="SUSE-SU"/>
    <description>
    arch/x86/kvm/vmx.c in the Linux kernel through 4.9 mismanages the #BP and #OF exceptions, which allows guest OS users to cause a denial of service (guest OS crash) by declining to handle an exception thrown by an L2 guest.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-9588/">CVE-2016-9588 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9588">CVE-2016-9588 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1015703">SUSE bug 1015703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017512">SUSE bug 1017512</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823168" comment="kernel-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823169" comment="kernel-abi-whitelists-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823170" comment="kernel-debug-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823173" comment="kernel-doc-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823174" comment="kernel-headers-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823175" comment="kernel-tools-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823176" comment="kernel-tools-libs-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823178" comment="perf-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823179" comment="python-perf-3.10.0-693.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169591" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9591</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9591" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9591" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9591" ref_url="https://www.suse.com/security/cve/CVE-2016-9591" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002547.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002785.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0101-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/E5AIGUH3IE6NTKRYNLDZK2X65PJYLKYD/#E5AIGUH3IE6NTKRYNLDZK2X65PJYLKYD" source="SUSE-SU"/>
    <description>
    JasPer before version 2.0.12 is vulnerable to a use-after-free in the way it decodes certain JPEG 2000 image files resulting in a crash on the application using JasPer.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9591/">CVE-2016-9591 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9591">CVE-2016-9591 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1015993">SUSE bug 1015993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822979" comment="jasper-1.900.1-30.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822980" comment="jasper-devel-1.900.1-30.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822981" comment="jasper-libs-1.900.1-30.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822982" comment="jasper-utils-1.900.1-30.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169600" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9600</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9600" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9600" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9600" ref_url="https://www.suse.com/security/cve/CVE-2016-9600" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002789.html" source="SUSE-SU"/>
    <description>
    JasPer before version 2.0.10 is vulnerable to a null pointer dereference was found in the decoded creation of JPEG 2000 image files. A specially crafted file could cause an application using JasPer to crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9600/">CVE-2016-9600 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9600">CVE-2016-9600 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1018088">SUSE bug 1018088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822979" comment="jasper-1.900.1-30.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822980" comment="jasper-devel-1.900.1-30.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822981" comment="jasper-libs-1.900.1-30.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822982" comment="jasper-utils-1.900.1-30.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169603" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9603</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9603" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9603" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9603" ref_url="https://www.suse.com/security/cve/CVE-2016-9603" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2963-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003413.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1221-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y3SM4YGHLBBO6LNMEEBDE5RB6Z7CLMY2/#Y3SM4YGHLBBO6LNMEEBDE5RB6Z7CLMY2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1872-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7XMS3TZG4TGPXHU4UGQT3AV4WTRA3LLN/#7XMS3TZG4TGPXHU4UGQT3AV4WTRA3LLN" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2398-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IUHKBRFLKIRYEWIJATEEGVTNCRQTBC5S/#IUHKBRFLKIRYEWIJATEEGVTNCRQTBC5S" source="SUSE-SU"/>
    <description>
    A heap buffer overflow flaw was found in QEMU's Cirrus CLGD 54xx VGA emulator's VNC display driver support before 2.9; the issue could occur when a VNC client attempted to update its display after a VGA operation is performed by a guest. A privileged user/process inside a guest could use this flaw to crash the QEMU process or, potentially, execute arbitrary code on the host with privileges of the QEMU process.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9603/">CVE-2016-9603 at SUSE</cve>
	<cve impact="critical" cvss3="9.9/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9603">CVE-2016-9603 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1028655">SUSE bug 1028655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028656">SUSE bug 1028656</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822929" comment="qemu-img-1.5.3-126.el7_3.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822930" comment="qemu-kvm-1.5.3-126.el7_3.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822931" comment="qemu-kvm-common-1.5.3-126.el7_3.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822932" comment="qemu-kvm-tools-1.5.3-126.el7_3.6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169604" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9604</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9604" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9604" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9604" ref_url="https://www.suse.com/security/cve/CVE-2016-9604" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003367.html" source="SUSE-SU"/>
    <description>
    It was discovered in the Linux kernel before 4.11-rc8 that root can gain direct access to an internal keyring, such as '.dns_resolver' in RHEL-7 or '.builtin_trusted_keys' upstream, by joining it as its session keyring. This allows root to bypass module signature verification by adding a new public key of its own devising to the keyring.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-9604/">CVE-2016-9604 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9604">CVE-2016-9604 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1035576">SUSE bug 1035576</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823168" comment="kernel-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823169" comment="kernel-abi-whitelists-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823170" comment="kernel-debug-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823173" comment="kernel-doc-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823174" comment="kernel-headers-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823175" comment="kernel-tools-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823176" comment="kernel-tools-libs-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823178" comment="perf-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823179" comment="python-perf-3.10.0-693.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169634" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9634</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9634" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9634" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9634" ref_url="https://www.suse.com/security/cve/CVE-2016-9634" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0225-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002581.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0071-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MQPYIX7WQ6X25QRSAQYZA72ES6W2YRVP/#MQPYIX7WQ6X25QRSAQYZA72ES6W2YRVP" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0141-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NFIQYGYFLLWRIRFM6ULU3JHJMTRHD2OH/#NFIQYGYFLLWRIRFM6ULU3JHJMTRHD2OH" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0151-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JB6ZYZZOSOO4DXXV4JNL6WQHERRCQK54/#JB6ZYZZOSOO4DXXV4JNL6WQHERRCQK54" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0160-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CIWYE6E7VVP5MRT23FLBLJA5JXSJAYNH/#CIWYE6E7VVP5MRT23FLBLJA5JXSJAYNH" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0298-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/I2XNYXYKLFQLCU4JYVMEUJRKTAS4SUDF/#I2XNYXYKLFQLCU4JYVMEUJRKTAS4SUDF" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the flx_decode_delta_fli function in gst/flx/gstflxdec.c in the FLIC decoder in GStreamer before 1.10.2 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via the start_line parameter.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9634/">CVE-2016-9634 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9634">CVE-2016-9634 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1012102">SUSE bug 1012102</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012103">SUSE bug 1012103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012104">SUSE bug 1012104</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822742" comment="gstreamer-plugins-good-0.10.31-12.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822743" comment="gstreamer-plugins-good-devel-docs-0.10.31-12.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822744" comment="gstreamer1-plugins-good-1.4.5-3.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169635" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9635</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9635" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9635" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9635" ref_url="https://www.suse.com/security/cve/CVE-2016-9635" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0225-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002581.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0071-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MQPYIX7WQ6X25QRSAQYZA72ES6W2YRVP/#MQPYIX7WQ6X25QRSAQYZA72ES6W2YRVP" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0141-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NFIQYGYFLLWRIRFM6ULU3JHJMTRHD2OH/#NFIQYGYFLLWRIRFM6ULU3JHJMTRHD2OH" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0151-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JB6ZYZZOSOO4DXXV4JNL6WQHERRCQK54/#JB6ZYZZOSOO4DXXV4JNL6WQHERRCQK54" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0160-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CIWYE6E7VVP5MRT23FLBLJA5JXSJAYNH/#CIWYE6E7VVP5MRT23FLBLJA5JXSJAYNH" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0298-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/I2XNYXYKLFQLCU4JYVMEUJRKTAS4SUDF/#I2XNYXYKLFQLCU4JYVMEUJRKTAS4SUDF" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the flx_decode_delta_fli function in gst/flx/gstflxdec.c in the FLIC decoder in GStreamer before 1.10.2 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) by providing a 'skip count' that goes beyond initialized buffer.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9635/">CVE-2016-9635 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9635">CVE-2016-9635 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1012102">SUSE bug 1012102</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012103">SUSE bug 1012103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012104">SUSE bug 1012104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013653">SUSE bug 1013653</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822742" comment="gstreamer-plugins-good-0.10.31-12.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822743" comment="gstreamer-plugins-good-devel-docs-0.10.31-12.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822744" comment="gstreamer1-plugins-good-1.4.5-3.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169636" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9636</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9636" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9636" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9636" ref_url="https://www.suse.com/security/cve/CVE-2016-9636" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0225-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002581.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0071-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MQPYIX7WQ6X25QRSAQYZA72ES6W2YRVP/#MQPYIX7WQ6X25QRSAQYZA72ES6W2YRVP" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0141-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NFIQYGYFLLWRIRFM6ULU3JHJMTRHD2OH/#NFIQYGYFLLWRIRFM6ULU3JHJMTRHD2OH" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0151-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JB6ZYZZOSOO4DXXV4JNL6WQHERRCQK54/#JB6ZYZZOSOO4DXXV4JNL6WQHERRCQK54" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0160-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CIWYE6E7VVP5MRT23FLBLJA5JXSJAYNH/#CIWYE6E7VVP5MRT23FLBLJA5JXSJAYNH" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0298-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/I2XNYXYKLFQLCU4JYVMEUJRKTAS4SUDF/#I2XNYXYKLFQLCU4JYVMEUJRKTAS4SUDF" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the flx_decode_delta_fli function in gst/flx/gstflxdec.c in the FLIC decoder in GStreamer before 1.10.2 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) by providing a 'write count' that goes beyond the initialized buffer.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9636/">CVE-2016-9636 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9636">CVE-2016-9636 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1012102">SUSE bug 1012102</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012103">SUSE bug 1012103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012104">SUSE bug 1012104</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822742" comment="gstreamer-plugins-good-0.10.31-12.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822743" comment="gstreamer-plugins-good-devel-docs-0.10.31-12.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822744" comment="gstreamer1-plugins-good-1.4.5-3.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169675" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9675</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9675" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9675" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9675" ref_url="https://www.suse.com/security/cve/CVE-2016-9675" source="SUSE CVE"/>
    <description>
    openjpeg: A heap-based buffer overflow flaw was found in the patch for CVE-2013-6045. A crafted j2k image could cause the application to crash, or potentially execute arbitrary code.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9675/">CVE-2016-9675 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9675">CVE-2016-9675 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1012822">SUSE bug 1012822</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822884" comment="openjpeg-1.5.1-16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822885" comment="openjpeg-devel-1.5.1-16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822886" comment="openjpeg-libs-1.5.1-16.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169685" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9685</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9685" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9685" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9685" ref_url="https://www.suse.com/security/cve/CVE-2016-9685" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002828.html" source="SUSE-SU"/>
    <description>
    Multiple memory leaks in error paths in fs/xfs/xfs_attr_list.c in the Linux kernel before 4.5.1 allow local users to cause a denial of service (memory consumption) via crafted XFS filesystem operations.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9685/">CVE-2016-9685 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9685">CVE-2016-9685 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1012832">SUSE bug 1012832</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823168" comment="kernel-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823169" comment="kernel-abi-whitelists-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823170" comment="kernel-debug-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823173" comment="kernel-doc-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823174" comment="kernel-headers-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823175" comment="kernel-tools-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823176" comment="kernel-tools-libs-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823178" comment="perf-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823179" comment="python-perf-3.10.0-693.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169793" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9793</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9793" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9793" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9793" ref_url="https://www.suse.com/security/cve/CVE-2016-9793" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002828.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0456-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BIIWQN3DXKSG2W6OKPZAEUQIPS7IYZER/#BIIWQN3DXKSG2W6OKPZAEUQIPS7IYZER" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0458-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4NRW2RRQBPH6CB4X5XXCAI3A3XMYRHHZ/#4NRW2RRQBPH6CB4X5XXCAI3A3XMYRHHZ" source="SUSE-SU"/>
    <description>
    The sock_setsockopt function in net/core/sock.c in the Linux kernel before 4.8.14 mishandles negative values of sk_sndbuf and sk_rcvbuf, which allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system call with the (1) SO_SNDBUFFORCE or (2) SO_RCVBUFFORCE option.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9793/">CVE-2016-9793 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9793">CVE-2016-9793 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1013531">SUSE bug 1013531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013542">SUSE bug 1013542</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115893">SUSE bug 1115893</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822907" comment="kernel-3.10.0-514.16.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822908" comment="kernel-abi-whitelists-3.10.0-514.16.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822909" comment="kernel-debug-3.10.0-514.16.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822912" comment="kernel-doc-3.10.0-514.16.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822913" comment="kernel-headers-3.10.0-514.16.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822914" comment="kernel-tools-3.10.0-514.16.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822915" comment="kernel-tools-libs-3.10.0-514.16.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822917" comment="perf-3.10.0-514.16.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822918" comment="python-perf-3.10.0-514.16.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9806</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9806" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9806" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9806" ref_url="https://www.suse.com/security/cve/CVE-2016-9806" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002586.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002668.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0456-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BIIWQN3DXKSG2W6OKPZAEUQIPS7IYZER/#BIIWQN3DXKSG2W6OKPZAEUQIPS7IYZER" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0458-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4NRW2RRQBPH6CB4X5XXCAI3A3XMYRHHZ/#4NRW2RRQBPH6CB4X5XXCAI3A3XMYRHHZ" source="SUSE-SU"/>
    <description>
    Race condition in the netlink_dump function in net/netlink/af_netlink.c in the Linux kernel before 4.6.3 allows local users to cause a denial of service (double free) or possibly have unspecified other impact via a crafted application that makes sendmsg system calls, leading to a free operation associated with a new dump that started earlier than anticipated.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9806/">CVE-2016-9806 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9806">CVE-2016-9806 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1013540">SUSE bug 1013540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017589">SUSE bug 1017589</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823168" comment="kernel-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823169" comment="kernel-abi-whitelists-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823170" comment="kernel-debug-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823173" comment="kernel-doc-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823174" comment="kernel-headers-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823175" comment="kernel-tools-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823176" comment="kernel-tools-libs-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823178" comment="perf-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823179" comment="python-perf-3.10.0-693.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169807" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9807</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9807" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9807" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9807" ref_url="https://www.suse.com/security/cve/CVE-2016-9807" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0225-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002581.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0071-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MQPYIX7WQ6X25QRSAQYZA72ES6W2YRVP/#MQPYIX7WQ6X25QRSAQYZA72ES6W2YRVP" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0141-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NFIQYGYFLLWRIRFM6ULU3JHJMTRHD2OH/#NFIQYGYFLLWRIRFM6ULU3JHJMTRHD2OH" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0151-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JB6ZYZZOSOO4DXXV4JNL6WQHERRCQK54/#JB6ZYZZOSOO4DXXV4JNL6WQHERRCQK54" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0160-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CIWYE6E7VVP5MRT23FLBLJA5JXSJAYNH/#CIWYE6E7VVP5MRT23FLBLJA5JXSJAYNH" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0298-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/I2XNYXYKLFQLCU4JYVMEUJRKTAS4SUDF/#I2XNYXYKLFQLCU4JYVMEUJRKTAS4SUDF" source="SUSE-SU"/>
    <description>
    The flx_decode_chunks function in gst/flx/gstflxdec.c in GStreamer before 1.10.2 allows remote attackers to cause a denial of service (invalid memory read and crash) via a crafted FLIC file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9807/">CVE-2016-9807 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9807">CVE-2016-9807 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1013655">SUSE bug 1013655</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822742" comment="gstreamer-plugins-good-0.10.31-12.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822743" comment="gstreamer-plugins-good-devel-docs-0.10.31-12.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822744" comment="gstreamer1-plugins-good-1.4.5-3.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169808" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9808</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9808" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9808" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9808" ref_url="https://www.suse.com/security/cve/CVE-2016-9808" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0225-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002581.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0071-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MQPYIX7WQ6X25QRSAQYZA72ES6W2YRVP/#MQPYIX7WQ6X25QRSAQYZA72ES6W2YRVP" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0141-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NFIQYGYFLLWRIRFM6ULU3JHJMTRHD2OH/#NFIQYGYFLLWRIRFM6ULU3JHJMTRHD2OH" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0151-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JB6ZYZZOSOO4DXXV4JNL6WQHERRCQK54/#JB6ZYZZOSOO4DXXV4JNL6WQHERRCQK54" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0160-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CIWYE6E7VVP5MRT23FLBLJA5JXSJAYNH/#CIWYE6E7VVP5MRT23FLBLJA5JXSJAYNH" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0298-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/I2XNYXYKLFQLCU4JYVMEUJRKTAS4SUDF/#I2XNYXYKLFQLCU4JYVMEUJRKTAS4SUDF" source="SUSE-SU"/>
    <description>
    The FLIC decoder in GStreamer before 1.10.2 allows remote attackers to cause a denial of service (out-of-bounds write and crash) via a crafted series of skip and count pairs.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9808/">CVE-2016-9808 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9808">CVE-2016-9808 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1012102">SUSE bug 1012102</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012103">SUSE bug 1012103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012104">SUSE bug 1012104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013653">SUSE bug 1013653</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822742" comment="gstreamer-plugins-good-0.10.31-12.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822743" comment="gstreamer-plugins-good-devel-docs-0.10.31-12.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822744" comment="gstreamer1-plugins-good-1.4.5-3.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169809" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9809</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9809" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9809" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9809" ref_url="https://www.suse.com/security/cve/CVE-2016-9809" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002607.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002608.html" source="SUSE-SU"/>
    <description>
    Off-by-one error in the gst_h264_parse_set_caps function in GStreamer before 1.10.2 allows remote attackers to have unspecified impact via a crafted file, which triggers an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9809/">CVE-2016-9809 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9809">CVE-2016-9809 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1013659">SUSE bug 1013659</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822739" comment="gstreamer-plugins-bad-free-0.10.23-22.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822740" comment="gstreamer-plugins-bad-free-devel-0.10.23-22.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822741" comment="gstreamer-plugins-bad-free-devel-docs-0.10.23-22.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822745" comment="gstreamer1-plugins-bad-free-1.4.5-6.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822746" comment="gstreamer1-plugins-bad-free-devel-1.4.5-6.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169810" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9810</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9810" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9810" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9810" ref_url="https://www.suse.com/security/cve/CVE-2016-9810" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0225-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002581.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0071-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MQPYIX7WQ6X25QRSAQYZA72ES6W2YRVP/#MQPYIX7WQ6X25QRSAQYZA72ES6W2YRVP" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0141-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NFIQYGYFLLWRIRFM6ULU3JHJMTRHD2OH/#NFIQYGYFLLWRIRFM6ULU3JHJMTRHD2OH" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0151-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JB6ZYZZOSOO4DXXV4JNL6WQHERRCQK54/#JB6ZYZZOSOO4DXXV4JNL6WQHERRCQK54" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0160-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CIWYE6E7VVP5MRT23FLBLJA5JXSJAYNH/#CIWYE6E7VVP5MRT23FLBLJA5JXSJAYNH" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0298-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/I2XNYXYKLFQLCU4JYVMEUJRKTAS4SUDF/#I2XNYXYKLFQLCU4JYVMEUJRKTAS4SUDF" source="SUSE-SU"/>
    <description>
    The gst_decode_chain_free_internal function in the flxdex decoder in gst-plugins-good in GStreamer before 1.10.2 allows remote attackers to cause a denial of service (invalid memory read and crash) via an invalid file, which triggers an incorrect unref call.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9810/">CVE-2016-9810 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9810">CVE-2016-9810 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1013663">SUSE bug 1013663</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823388" comment="clutter-gst2-2.0.18-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823389" comment="clutter-gst2-devel-2.0.18-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823390" comment="gnome-video-effects-0.4.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823391" comment="gstreamer-plugins-bad-free-0.10.23-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823392" comment="gstreamer-plugins-bad-free-devel-0.10.23-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823393" comment="gstreamer-plugins-bad-free-devel-docs-0.10.23-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823394" comment="gstreamer-plugins-good-0.10.31-13.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823395" comment="gstreamer-plugins-good-devel-docs-0.10.31-13.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823396" comment="gstreamer1-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823397" comment="gstreamer1-devel-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823398" comment="gstreamer1-devel-docs-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823399" comment="gstreamer1-plugins-bad-free-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823400" comment="gstreamer1-plugins-bad-free-devel-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823401" comment="gstreamer1-plugins-bad-free-gtk-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823402" comment="gstreamer1-plugins-base-1.10.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823403" comment="gstreamer1-plugins-base-devel-1.10.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823404" comment="gstreamer1-plugins-base-devel-docs-1.10.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823405" comment="gstreamer1-plugins-base-tools-1.10.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823406" comment="gstreamer1-plugins-good-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823407" comment="orc-0.4.26-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823408" comment="orc-compiler-0.4.26-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823409" comment="orc-devel-0.4.26-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823410" comment="orc-doc-0.4.26-1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169811" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9811</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9811" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9811" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9811" ref_url="https://www.suse.com/security/cve/CVE-2016-9811" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002598.html" source="SUSE-SU"/>
    <description>
    The windows_icon_typefind function in gst-plugins-base in GStreamer before 1.10.2, when G_SLICE is set to always-malloc, allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted ico file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-04-23"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9811/">CVE-2016-9811 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9811">CVE-2016-9811 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1013669">SUSE bug 1013669</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823388" comment="clutter-gst2-2.0.18-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823389" comment="clutter-gst2-devel-2.0.18-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823390" comment="gnome-video-effects-0.4.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823391" comment="gstreamer-plugins-bad-free-0.10.23-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823392" comment="gstreamer-plugins-bad-free-devel-0.10.23-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823393" comment="gstreamer-plugins-bad-free-devel-docs-0.10.23-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823394" comment="gstreamer-plugins-good-0.10.31-13.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823395" comment="gstreamer-plugins-good-devel-docs-0.10.31-13.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823396" comment="gstreamer1-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823397" comment="gstreamer1-devel-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823398" comment="gstreamer1-devel-docs-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823399" comment="gstreamer1-plugins-bad-free-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823400" comment="gstreamer1-plugins-bad-free-devel-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823401" comment="gstreamer1-plugins-bad-free-gtk-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823402" comment="gstreamer1-plugins-base-1.10.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823403" comment="gstreamer1-plugins-base-devel-1.10.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823404" comment="gstreamer1-plugins-base-devel-docs-1.10.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823405" comment="gstreamer1-plugins-base-tools-1.10.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823406" comment="gstreamer1-plugins-good-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823407" comment="orc-0.4.26-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823408" comment="orc-compiler-0.4.26-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823409" comment="orc-devel-0.4.26-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823410" comment="orc-doc-0.4.26-1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169812" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9812</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9812" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9812" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9812" ref_url="https://www.suse.com/security/cve/CVE-2016-9812" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002533.html" source="SUSE-SU"/>
    <description>
    The gst_mpegts_section_new function in the mpegts decoder in GStreamer before 1.10.2 allows remote attackers to cause a denial of service (out-of-bounds read) via a too small section.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9812/">CVE-2016-9812 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9812">CVE-2016-9812 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1013678">SUSE bug 1013678</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822745" comment="gstreamer1-plugins-bad-free-1.4.5-6.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822746" comment="gstreamer1-plugins-bad-free-devel-1.4.5-6.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169813" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9813</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9813" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9813" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9813" ref_url="https://www.suse.com/security/cve/CVE-2016-9813" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002533.html" source="SUSE-SU"/>
    <description>
    The _parse_pat function in the mpegts parser in GStreamer before 1.10.2 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9813/">CVE-2016-9813 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9813">CVE-2016-9813 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1013680">SUSE bug 1013680</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822745" comment="gstreamer1-plugins-bad-free-1.4.5-6.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822746" comment="gstreamer1-plugins-bad-free-devel-1.4.5-6.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169840" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9840</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9840" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9840" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9840" ref_url="https://www.suse.com/security/cve/CVE-2016-9840" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:8395" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002506.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0004-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2989-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2018-January/007678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02536-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040943.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2998-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O4VIVCNLR3AUTND2OCCBDJPMRH2Y4HRC/#O4VIVCNLR3AUTND2OCCBDJPMRH2Y4HRC" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AP5LSLYIG36TN25VI6WAOVXYV7J3ACHW/#AP5LSLYIG36TN25VI6WAOVXYV7J3ACHW" source="SUSE-SU"/>
    <description>
    inftrees.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact by leveraging improper pointer arithmetic.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-18"/>
	<updated date="2025-12-18"/>
	<severity>Critical</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9840/">CVE-2016-9840 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9840">CVE-2016-9840 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1003579">SUSE bug 1003579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022633">SUSE bug 1022633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023215">SUSE bug 1023215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038505">SUSE bug 1038505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062104">SUSE bug 1062104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120866">SUSE bug 1120866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123150">SUSE bug 1123150</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127473">SUSE bug 1127473</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184301">SUSE bug 1184301</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985929" comment="minizip-1.2.7-21.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985930" comment="minizip-devel-1.2.7-21.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985931" comment="zlib-1.2.7-21.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985932" comment="zlib-devel-1.2.7-21.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985933" comment="zlib-static-1.2.7-21.el7_9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169893" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9893</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9893" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9893" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9893" ref_url="https://www.suse.com/security/cve/CVE-2016-9893" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002507.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002512.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3184-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BNKGQ3IWZFZLJ42G72F7GTG5VLTMLE3X/#BNKGQ3IWZFZLJ42G72F7GTG5VLTMLE3X" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3310-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VJVQBTEWJRRW7HTE5N7UGH7XI3O4OEKH/#VJVQBTEWJRRW7HTE5N7UGH7XI3O4OEKH" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Memory safety bugs were reported in Thunderbird 45.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox &lt; 50.1, Firefox ESR &lt; 45.6, and Thunderbird &lt; 45.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9893/">CVE-2016-9893 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9893">CVE-2016-9893 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1015422">SUSE bug 1015422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015527">SUSE bug 1015527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015528">SUSE bug 1015528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015529">SUSE bug 1015529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015530">SUSE bug 1015530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015531">SUSE bug 1015531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015533">SUSE bug 1015533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015534">SUSE bug 1015534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015535">SUSE bug 1015535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015536">SUSE bug 1015536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015537">SUSE bug 1015537</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015538">SUSE bug 1015538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015540">SUSE bug 1015540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015541">SUSE bug 1015541</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015542">SUSE bug 1015542</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822715" comment="firefox-45.6.0-1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822721" comment="thunderbird-45.6.0-1.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169895" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9895</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9895" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9895" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9895" ref_url="https://www.suse.com/security/cve/CVE-2016-9895" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002507.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002512.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3184-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BNKGQ3IWZFZLJ42G72F7GTG5VLTMLE3X/#BNKGQ3IWZFZLJ42G72F7GTG5VLTMLE3X" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3310-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VJVQBTEWJRRW7HTE5N7UGH7XI3O4OEKH/#VJVQBTEWJRRW7HTE5N7UGH7XI3O4OEKH" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Event handlers on "marquee" elements were executed despite a strict Content Security Policy (CSP) that disallowed inline JavaScript. This vulnerability affects Firefox &lt; 50.1, Firefox ESR &lt; 45.6, and Thunderbird &lt; 45.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9895/">CVE-2016-9895 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9895">CVE-2016-9895 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1015422">SUSE bug 1015422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015527">SUSE bug 1015527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015528">SUSE bug 1015528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015529">SUSE bug 1015529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015530">SUSE bug 1015530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015531">SUSE bug 1015531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015533">SUSE bug 1015533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015534">SUSE bug 1015534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015535">SUSE bug 1015535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015536">SUSE bug 1015536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015537">SUSE bug 1015537</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015538">SUSE bug 1015538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015540">SUSE bug 1015540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015541">SUSE bug 1015541</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015542">SUSE bug 1015542</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822715" comment="firefox-45.6.0-1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822721" comment="thunderbird-45.6.0-1.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169897" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9897</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9897" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9897" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9897" ref_url="https://www.suse.com/security/cve/CVE-2016-9897" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002507.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002512.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3184-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BNKGQ3IWZFZLJ42G72F7GTG5VLTMLE3X/#BNKGQ3IWZFZLJ42G72F7GTG5VLTMLE3X" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3310-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VJVQBTEWJRRW7HTE5N7UGH7XI3O4OEKH/#VJVQBTEWJRRW7HTE5N7UGH7XI3O4OEKH" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Memory corruption resulting in a potentially exploitable crash during WebGL functions using a vector constructor with a varying array within libGLES. This vulnerability affects Firefox &lt; 50.1, Firefox ESR &lt; 45.6, and Thunderbird &lt; 45.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9897/">CVE-2016-9897 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9897">CVE-2016-9897 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1015422">SUSE bug 1015422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015527">SUSE bug 1015527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015528">SUSE bug 1015528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015529">SUSE bug 1015529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015530">SUSE bug 1015530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015531">SUSE bug 1015531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015533">SUSE bug 1015533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015534">SUSE bug 1015534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015535">SUSE bug 1015535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015536">SUSE bug 1015536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015537">SUSE bug 1015537</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015538">SUSE bug 1015538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015540">SUSE bug 1015540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015541">SUSE bug 1015541</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015542">SUSE bug 1015542</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822715" comment="firefox-45.6.0-1.el7_3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169898" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9898</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9898" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9898" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9898" ref_url="https://www.suse.com/security/cve/CVE-2016-9898" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002507.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002512.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3184-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BNKGQ3IWZFZLJ42G72F7GTG5VLTMLE3X/#BNKGQ3IWZFZLJ42G72F7GTG5VLTMLE3X" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3310-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VJVQBTEWJRRW7HTE5N7UGH7XI3O4OEKH/#VJVQBTEWJRRW7HTE5N7UGH7XI3O4OEKH" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Use-after-free resulting in potentially exploitable crash when manipulating DOM subtrees in the Editor. This vulnerability affects Firefox &lt; 50.1, Firefox ESR &lt; 45.6, and Thunderbird &lt; 45.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9898/">CVE-2016-9898 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9898">CVE-2016-9898 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1015422">SUSE bug 1015422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015527">SUSE bug 1015527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015528">SUSE bug 1015528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015529">SUSE bug 1015529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015530">SUSE bug 1015530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015531">SUSE bug 1015531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015533">SUSE bug 1015533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015534">SUSE bug 1015534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015535">SUSE bug 1015535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015536">SUSE bug 1015536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015537">SUSE bug 1015537</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015538">SUSE bug 1015538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015540">SUSE bug 1015540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015541">SUSE bug 1015541</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015542">SUSE bug 1015542</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822715" comment="firefox-45.6.0-1.el7_3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169899" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9899</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9899" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9899" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9899" ref_url="https://www.suse.com/security/cve/CVE-2016-9899" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002507.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002512.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3184-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BNKGQ3IWZFZLJ42G72F7GTG5VLTMLE3X/#BNKGQ3IWZFZLJ42G72F7GTG5VLTMLE3X" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3310-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VJVQBTEWJRRW7HTE5N7UGH7XI3O4OEKH/#VJVQBTEWJRRW7HTE5N7UGH7XI3O4OEKH" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Use-after-free while manipulating DOM events and removing audio elements due to errors in the handling of node adoption. This vulnerability affects Firefox &lt; 50.1, Firefox ESR &lt; 45.6, and Thunderbird &lt; 45.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9899/">CVE-2016-9899 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9899">CVE-2016-9899 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1015422">SUSE bug 1015422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015527">SUSE bug 1015527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015528">SUSE bug 1015528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015529">SUSE bug 1015529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015530">SUSE bug 1015530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015531">SUSE bug 1015531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015533">SUSE bug 1015533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015534">SUSE bug 1015534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015535">SUSE bug 1015535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015536">SUSE bug 1015536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015537">SUSE bug 1015537</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015538">SUSE bug 1015538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015540">SUSE bug 1015540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015541">SUSE bug 1015541</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015542">SUSE bug 1015542</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822715" comment="firefox-45.6.0-1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822721" comment="thunderbird-45.6.0-1.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169900" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9900</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9900" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9900" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9900" ref_url="https://www.suse.com/security/cve/CVE-2016-9900" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002507.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002512.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3184-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BNKGQ3IWZFZLJ42G72F7GTG5VLTMLE3X/#BNKGQ3IWZFZLJ42G72F7GTG5VLTMLE3X" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3310-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VJVQBTEWJRRW7HTE5N7UGH7XI3O4OEKH/#VJVQBTEWJRRW7HTE5N7UGH7XI3O4OEKH" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    External resources that should be blocked when loaded by SVG images can bypass security restrictions through the use of "data:" URLs. This could allow for cross-domain data leakage. This vulnerability affects Firefox &lt; 50.1, Firefox ESR &lt; 45.6, and Thunderbird &lt; 45.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9900/">CVE-2016-9900 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9900">CVE-2016-9900 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1015422">SUSE bug 1015422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015527">SUSE bug 1015527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015528">SUSE bug 1015528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015529">SUSE bug 1015529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015530">SUSE bug 1015530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015531">SUSE bug 1015531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015533">SUSE bug 1015533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015534">SUSE bug 1015534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015535">SUSE bug 1015535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015536">SUSE bug 1015536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015537">SUSE bug 1015537</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015538">SUSE bug 1015538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015540">SUSE bug 1015540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015541">SUSE bug 1015541</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015542">SUSE bug 1015542</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822715" comment="firefox-45.6.0-1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822721" comment="thunderbird-45.6.0-1.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169901" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9901</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9901" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9901" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9901" ref_url="https://www.suse.com/security/cve/CVE-2016-9901" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002507.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002512.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3184-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BNKGQ3IWZFZLJ42G72F7GTG5VLTMLE3X/#BNKGQ3IWZFZLJ42G72F7GTG5VLTMLE3X" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3310-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VJVQBTEWJRRW7HTE5N7UGH7XI3O4OEKH/#VJVQBTEWJRRW7HTE5N7UGH7XI3O4OEKH" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    HTML tags received from the Pocket server will be processed without sanitization and any JavaScript code executed will be run in the "about:pocket-saved" (unprivileged) page, giving it access to Pocket's messaging API through HTML injection. This vulnerability affects Firefox ESR &lt; 45.6 and Firefox &lt; 50.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9901/">CVE-2016-9901 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9901">CVE-2016-9901 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1015422">SUSE bug 1015422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015527">SUSE bug 1015527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015528">SUSE bug 1015528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015529">SUSE bug 1015529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015530">SUSE bug 1015530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015531">SUSE bug 1015531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015533">SUSE bug 1015533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015534">SUSE bug 1015534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015535">SUSE bug 1015535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015536">SUSE bug 1015536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015537">SUSE bug 1015537</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015538">SUSE bug 1015538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015540">SUSE bug 1015540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015541">SUSE bug 1015541</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015542">SUSE bug 1015542</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822715" comment="firefox-45.6.0-1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822721" comment="thunderbird-45.6.0-1.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169902" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9902</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9902" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9902" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9902" ref_url="https://www.suse.com/security/cve/CVE-2016-9902" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002507.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002512.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3184-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BNKGQ3IWZFZLJ42G72F7GTG5VLTMLE3X/#BNKGQ3IWZFZLJ42G72F7GTG5VLTMLE3X" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3310-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VJVQBTEWJRRW7HTE5N7UGH7XI3O4OEKH/#VJVQBTEWJRRW7HTE5N7UGH7XI3O4OEKH" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    The Pocket toolbar button, once activated, listens for events fired from it's own pages but does not verify the origin of incoming events. This allows content from other origins to fire events and inject content and commands into the Pocket context. Note: this issue does not affect users with e10s enabled. This vulnerability affects Firefox ESR &lt; 45.6 and Firefox &lt; 50.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9902/">CVE-2016-9902 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9902">CVE-2016-9902 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1015422">SUSE bug 1015422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015527">SUSE bug 1015527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015528">SUSE bug 1015528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015529">SUSE bug 1015529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015530">SUSE bug 1015530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015531">SUSE bug 1015531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015533">SUSE bug 1015533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015534">SUSE bug 1015534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015535">SUSE bug 1015535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015536">SUSE bug 1015536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015537">SUSE bug 1015537</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015538">SUSE bug 1015538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015540">SUSE bug 1015540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015541">SUSE bug 1015541</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015542">SUSE bug 1015542</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822715" comment="firefox-45.6.0-1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822721" comment="thunderbird-45.6.0-1.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169904" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9904</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9904" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9904" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9904" ref_url="https://www.suse.com/security/cve/CVE-2016-9904" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002507.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002512.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3184-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BNKGQ3IWZFZLJ42G72F7GTG5VLTMLE3X/#BNKGQ3IWZFZLJ42G72F7GTG5VLTMLE3X" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3310-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VJVQBTEWJRRW7HTE5N7UGH7XI3O4OEKH/#VJVQBTEWJRRW7HTE5N7UGH7XI3O4OEKH" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    An attacker could use a JavaScript Map/Set timing attack to determine whether an atom is used by another compartment/zone in specific contexts. This could be used to leak information, such as usernames embedded in JavaScript code, across websites. This vulnerability affects Firefox &lt; 50.1, Firefox ESR &lt; 45.6, and Thunderbird &lt; 45.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9904/">CVE-2016-9904 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9904">CVE-2016-9904 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1015422">SUSE bug 1015422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015527">SUSE bug 1015527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015528">SUSE bug 1015528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015529">SUSE bug 1015529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015530">SUSE bug 1015530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015531">SUSE bug 1015531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015533">SUSE bug 1015533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015534">SUSE bug 1015534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015535">SUSE bug 1015535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015536">SUSE bug 1015536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015537">SUSE bug 1015537</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015538">SUSE bug 1015538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015540">SUSE bug 1015540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015541">SUSE bug 1015541</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015542">SUSE bug 1015542</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822715" comment="firefox-45.6.0-1.el7_3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169905" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9905</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9905" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9905" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9905" ref_url="https://www.suse.com/security/cve/CVE-2016-9905" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002507.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002512.html" source="SUSE-SU"/>
    <description>
    A potentially exploitable crash in "EnumerateSubDocuments" while adding or removing sub-documents. This vulnerability affects Firefox ESR &lt; 45.6 and Thunderbird &lt; 45.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9905/">CVE-2016-9905 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9905">CVE-2016-9905 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1015422">SUSE bug 1015422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015527">SUSE bug 1015527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015528">SUSE bug 1015528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015529">SUSE bug 1015529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015530">SUSE bug 1015530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015531">SUSE bug 1015531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015533">SUSE bug 1015533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015534">SUSE bug 1015534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015535">SUSE bug 1015535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015536">SUSE bug 1015536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015537">SUSE bug 1015537</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015538">SUSE bug 1015538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015540">SUSE bug 1015540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015541">SUSE bug 1015541</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015542">SUSE bug 1015542</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822715" comment="firefox-45.6.0-1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822721" comment="thunderbird-45.6.0-1.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20170393" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-0393</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-0393" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0393" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-0393" ref_url="https://www.suse.com/security/cve/CVE-2017-0393" source="SUSE CVE"/>
    <description>
    A denial of service vulnerability in libvpx in Mediaserver could enable a remote attacker to use a specially crafted file to cause a device hang or reboot. This issue is rated as High due to the possibility of remote denial of service. Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1. Android ID: A-30436808.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-0393/">CVE-2017-0393 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-0393">CVE-2017-0393 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828233" comment="libvpx-1.3.0-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828234" comment="libvpx-devel-1.3.0-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828235" comment="libvpx-utils-1.3.0-8.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20170553" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-0553</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-0553" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0553" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-0553" ref_url="https://www.suse.com/security/cve/CVE-2017-0553" source="SUSE CVE"/>
    <description>
    An elevation of privilege vulnerability in libnl could enable a local malicious application to execute arbitrary code within the context of the Wi-Fi service. This issue is rated as Moderate because it first requires compromising a privileged process and is mitigated by current platform configurations. Product: Android. Versions: 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1. Android ID: A-32342065. NOTE: this issue also exists in the upstream libnl before 3.3.0 library.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-0553/">CVE-2017-0553 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-0553">CVE-2017-0553 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823456" comment="NetworkManager-1.8.0-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823457" comment="NetworkManager-adsl-1.8.0-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823458" comment="NetworkManager-bluetooth-1.8.0-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823459" comment="NetworkManager-config-server-1.8.0-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823460" comment="NetworkManager-dispatcher-routing-rules-1.8.0-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823461" comment="NetworkManager-glib-1.8.0-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823462" comment="NetworkManager-glib-devel-1.8.0-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823463" comment="NetworkManager-libnm-1.8.0-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823464" comment="NetworkManager-libnm-devel-1.8.0-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823465" comment="NetworkManager-libreswan-1.2.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823466" comment="NetworkManager-libreswan-gnome-1.2.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823467" comment="NetworkManager-ppp-1.8.0-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823468" comment="NetworkManager-team-1.8.0-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823469" comment="NetworkManager-tui-1.8.0-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823470" comment="NetworkManager-wifi-1.8.0-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823471" comment="NetworkManager-wwan-1.8.0-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823472" comment="libnl3-3.2.28-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823473" comment="libnl3-cli-3.2.28-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823474" comment="libnl3-devel-3.2.28-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823475" comment="libnl3-doc-3.2.28-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823476" comment="libnm-gtk-1.8.0-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823477" comment="libnm-gtk-devel-1.8.0-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823478" comment="libnma-1.8.0-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823479" comment="libnma-devel-1.8.0-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823480" comment="network-manager-applet-1.8.0-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823481" comment="nm-connection-editor-1.8.0-3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20170861" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-0861</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-0861" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0861" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-0861" ref_url="https://www.suse.com/security/cve/CVE-2017-0861" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1227-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004055.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the snd_pcm_info function in the ALSA subsystem in the Linux kernel allows attackers to gain privileges via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-0861/">CVE-2017-0861 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-0861">CVE-2017-0861 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1088260">SUSE bug 1088260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088268">SUSE bug 1088268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091815">SUSE bug 1091815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115893">SUSE bug 1115893</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824786" comment="bpftool-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824787" comment="kernel-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824788" comment="kernel-abi-whitelists-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824789" comment="kernel-debug-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824792" comment="kernel-doc-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824793" comment="kernel-headers-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824794" comment="kernel-tools-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824795" comment="kernel-tools-libs-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824797" comment="perf-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824798" comment="python-perf-3.10.0-957.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20170898" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-0898</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-0898" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0898" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-0898" ref_url="https://www.suse.com/security/cve/CVE-2017-0898" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
    <description>
    Ruby before 2.4.2, 2.3.5, and 2.2.8 is vulnerable to a malicious format string which contains a precious specifier (*) with a huge minus value. Such situation can lead to a buffer overrun, resulting in a heap memory corruption or an information disclosure from the heap.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-0898/">CVE-2017-0898 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-0898">CVE-2017-0898 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1058755">SUSE bug 1058755</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824000" comment="ruby-2.0.0.648-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824001" comment="ruby-devel-2.0.0.648-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824002" comment="ruby-doc-2.0.0.648-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824003" comment="ruby-irb-2.0.0.648-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824004" comment="ruby-libs-2.0.0.648-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824005" comment="ruby-tcltk-2.0.0.648-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824006" comment="rubygem-bigdecimal-1.2.0-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824007" comment="rubygem-io-console-0.4.2-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824008" comment="rubygem-json-1.7.7-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824009" comment="rubygem-minitest-4.3.2-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824010" comment="rubygem-psych-2.0.0-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824011" comment="rubygem-rake-0.9.6-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824012" comment="rubygem-rdoc-4.0.0-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824013" comment="rubygems-2.0.14.1-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824014" comment="rubygems-devel-2.0.14.1-33.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20170899" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-0899</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-0899" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0899" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-0899" ref_url="https://www.suse.com/security/cve/CVE-2017-0899" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
    <description>
    RubyGems version 2.6.12 and earlier is vulnerable to maliciously crafted gem specifications that include terminal escape characters. Printing the gem specification would execute terminal escape sequences.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-0899/">CVE-2017-0899 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-0899">CVE-2017-0899 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1056286">SUSE bug 1056286</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824000" comment="ruby-2.0.0.648-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824001" comment="ruby-devel-2.0.0.648-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824002" comment="ruby-doc-2.0.0.648-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824003" comment="ruby-irb-2.0.0.648-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824004" comment="ruby-libs-2.0.0.648-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824005" comment="ruby-tcltk-2.0.0.648-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824006" comment="rubygem-bigdecimal-1.2.0-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824007" comment="rubygem-io-console-0.4.2-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824008" comment="rubygem-json-1.7.7-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824009" comment="rubygem-minitest-4.3.2-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824010" comment="rubygem-psych-2.0.0-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824011" comment="rubygem-rake-0.9.6-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824012" comment="rubygem-rdoc-4.0.0-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824013" comment="rubygems-2.0.14.1-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824014" comment="rubygems-devel-2.0.14.1-33.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20170900" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-0900</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-0900" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0900" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-0900" ref_url="https://www.suse.com/security/cve/CVE-2017-0900" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
    <description>
    RubyGems version 2.6.12 and earlier is vulnerable to maliciously crafted gem specifications to cause a denial of service attack against RubyGems clients who have issued a `query` command.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-0900/">CVE-2017-0900 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-0900">CVE-2017-0900 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1056286">SUSE bug 1056286</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824000" comment="ruby-2.0.0.648-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824001" comment="ruby-devel-2.0.0.648-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824002" comment="ruby-doc-2.0.0.648-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824003" comment="ruby-irb-2.0.0.648-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824004" comment="ruby-libs-2.0.0.648-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824005" comment="ruby-tcltk-2.0.0.648-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824006" comment="rubygem-bigdecimal-1.2.0-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824007" comment="rubygem-io-console-0.4.2-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824008" comment="rubygem-json-1.7.7-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824009" comment="rubygem-minitest-4.3.2-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824010" comment="rubygem-psych-2.0.0-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824011" comment="rubygem-rake-0.9.6-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824012" comment="rubygem-rdoc-4.0.0-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824013" comment="rubygems-2.0.14.1-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824014" comment="rubygems-devel-2.0.14.1-33.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20170901" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-0901</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-0901" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0901" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-0901" ref_url="https://www.suse.com/security/cve/CVE-2017-0901" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
    <description>
    RubyGems version 2.6.12 and earlier fails to validate specification names, allowing a maliciously crafted gem to potentially overwrite any file on the filesystem.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-0901/">CVE-2017-0901 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-0901">CVE-2017-0901 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1056286">SUSE bug 1056286</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824000" comment="ruby-2.0.0.648-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824001" comment="ruby-devel-2.0.0.648-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824002" comment="ruby-doc-2.0.0.648-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824003" comment="ruby-irb-2.0.0.648-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824004" comment="ruby-libs-2.0.0.648-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824005" comment="ruby-tcltk-2.0.0.648-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824006" comment="rubygem-bigdecimal-1.2.0-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824007" comment="rubygem-io-console-0.4.2-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824008" comment="rubygem-json-1.7.7-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824009" comment="rubygem-minitest-4.3.2-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824010" comment="rubygem-psych-2.0.0-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824011" comment="rubygem-rake-0.9.6-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824012" comment="rubygem-rdoc-4.0.0-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824013" comment="rubygems-2.0.14.1-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824014" comment="rubygems-devel-2.0.14.1-33.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20170902" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-0902</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-0902" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0902" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-0902" ref_url="https://www.suse.com/security/cve/CVE-2017-0902" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
    <description>
    RubyGems version 2.6.12 and earlier is vulnerable to a DNS hijacking vulnerability that allows a MITM attacker to force the RubyGems client to download and install gems from a server that the attacker controls.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-0902/">CVE-2017-0902 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-0902">CVE-2017-0902 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1056286">SUSE bug 1056286</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824000" comment="ruby-2.0.0.648-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824001" comment="ruby-devel-2.0.0.648-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824002" comment="ruby-doc-2.0.0.648-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824003" comment="ruby-irb-2.0.0.648-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824004" comment="ruby-libs-2.0.0.648-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824005" comment="ruby-tcltk-2.0.0.648-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824006" comment="rubygem-bigdecimal-1.2.0-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824007" comment="rubygem-io-console-0.4.2-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824008" comment="rubygem-json-1.7.7-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824009" comment="rubygem-minitest-4.3.2-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824010" comment="rubygem-psych-2.0.0-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824011" comment="rubygem-rake-0.9.6-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824012" comment="rubygem-rdoc-4.0.0-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824013" comment="rubygems-2.0.14.1-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824014" comment="rubygems-devel-2.0.14.1-33.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20170903" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-0903</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-0903" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0903" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-0903" ref_url="https://www.suse.com/security/cve/CVE-2017-0903" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
    <description>
    RubyGems versions between 2.0.0 and 2.6.13 are vulnerable to a possible remote code execution vulnerability. YAML deserialization of gem specifications can bypass class white lists. Specially crafted serialized objects can possibly be used to escalate to remote code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-0903/">CVE-2017-0903 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-0903">CVE-2017-0903 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1062452">SUSE bug 1062452</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824000" comment="ruby-2.0.0.648-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824001" comment="ruby-devel-2.0.0.648-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824002" comment="ruby-doc-2.0.0.648-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824003" comment="ruby-irb-2.0.0.648-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824004" comment="ruby-libs-2.0.0.648-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824005" comment="ruby-tcltk-2.0.0.648-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824006" comment="rubygem-bigdecimal-1.2.0-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824007" comment="rubygem-io-console-0.4.2-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824008" comment="rubygem-json-1.7.7-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824009" comment="rubygem-minitest-4.3.2-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824010" comment="rubygem-psych-2.0.0-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824011" comment="rubygem-rake-0.9.6-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824012" comment="rubygem-rdoc-4.0.0-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824013" comment="rubygems-2.0.14.1-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824014" comment="rubygems-devel-2.0.14.1-33.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000050" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000050</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000050" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000050" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000050" ref_url="https://www.suse.com/security/cve/CVE-2017-1000050" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003697.html" source="SUSE-SU"/>
    <description>
    JasPer 2.0.12 is vulnerable to a NULL pointer exception in the function jp2_encode which failed to check to see if the image contained at least one component resulting in a denial-of-service.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000050/">CVE-2017-1000050 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000050">CVE-2017-1000050 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1047958">SUSE bug 1047958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078851">SUSE bug 1078851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825326" comment="jasper-1.900.1-33.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825327" comment="jasper-devel-1.900.1-33.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825328" comment="jasper-libs-1.900.1-33.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825329" comment="jasper-utils-1.900.1-33.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000061" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000061</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000061" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000061" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000061" ref_url="https://www.suse.com/security/cve/CVE-2017-1000061" source="SUSE CVE"/>
    <description>
    xmlsec 1.2.23 and before is vulnerable to XML External Entity Expansion when parsing crafted input documents, resulting in possible information disclosure or denial of service
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000061/">CVE-2017-1000061 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000061">CVE-2017-1000061 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1010675">SUSE bug 1010675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082267">SUSE bug 1082267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118959">SUSE bug 1118959</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823580" comment="xmlsec1-1.2.20-7.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823581" comment="xmlsec1-devel-1.2.20-7.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823582" comment="xmlsec1-gcrypt-1.2.20-7.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823583" comment="xmlsec1-gcrypt-devel-1.2.20-7.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823584" comment="xmlsec1-gnutls-1.2.20-7.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823585" comment="xmlsec1-gnutls-devel-1.2.20-7.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823586" comment="xmlsec1-nss-1.2.20-7.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823587" comment="xmlsec1-nss-devel-1.2.20-7.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823588" comment="xmlsec1-openssl-1.2.20-7.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823589" comment="xmlsec1-openssl-devel-1.2.20-7.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000083" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000083</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000083" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000083" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000083" ref_url="https://www.suse.com/security/cve/CVE-2017-1000083" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003552.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1933-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OV2FZRKPS26G4GDCZLYI3IMEJMIYK65R/#OV2FZRKPS26G4GDCZLYI3IMEJMIYK65R" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3431-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6UIQEH7A3Z52EEDTZBQPXZSTVVVYYZ4C/#6UIQEH7A3Z52EEDTZBQPXZSTVVVYYZ4C" source="SUSE-SU"/>
    <description>
    backend/comics/comics-document.c (aka the comic book backend) in GNOME Evince before 3.24.1 allows remote attackers to execute arbitrary commands via a .cbt file that is a TAR archive containing a filename beginning with a "--" command-line option substring, as demonstrated by a --checkpoint-action=exec=bash at the beginning of the filename.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000083/">CVE-2017-1000083 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000083">CVE-2017-1000083 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1046856">SUSE bug 1046856</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823490" comment="evince-3.22.1-5.2.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823491" comment="evince-browser-plugin-3.22.1-5.2.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823492" comment="evince-devel-3.22.1-5.2.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823493" comment="evince-dvi-3.22.1-5.2.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823494" comment="evince-libs-3.22.1-5.2.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823495" comment="evince-nautilus-3.22.1-5.2.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000111" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000111</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000111" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000111" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000111" ref_url="https://www.suse.com/security/cve/CVE-2017-1000111" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2956-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003385.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2169-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S5W57DNUZVJT7O3VCW5IIFG273VXFPMF/#S5W57DNUZVJT7O3VCW5IIFG273VXFPMF" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2171-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LGI6QYI3WSJSQPRZJQFZKDW7QDTCDEN2/#LGI6QYI3WSJSQPRZJQFZKDW7QDTCDEN2" source="SUSE-SU"/>
    <description>
    Linux kernel: heap out-of-bounds in AF_PACKET sockets. This new issue is analogous to previously disclosed CVE-2016-8655. In both cases, a socket option that changes socket state may race with safety checks in packet_set_ring. Previously with PACKET_VERSION. This time with PACKET_RESERVE. The solution is similar: lock the socket for the update. This issue may be exploitable, we did not investigate further. As this issue affects PF_PACKET sockets, it requires CAP_NET_RAW in the process namespace. But note that with user namespaces enabled, any process can create a namespace in which it has CAP_NET_RAW.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000111/">CVE-2017-1000111 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000111">CVE-2017-1000111 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1052365">SUSE bug 1052365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052367">SUSE bug 1052367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823683" comment="kernel-3.10.0-693.5.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823684" comment="kernel-abi-whitelists-3.10.0-693.5.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823685" comment="kernel-debug-3.10.0-693.5.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823688" comment="kernel-doc-3.10.0-693.5.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823689" comment="kernel-headers-3.10.0-693.5.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823690" comment="kernel-tools-3.10.0-693.5.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823691" comment="kernel-tools-libs-3.10.0-693.5.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823693" comment="perf-3.10.0-693.5.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823694" comment="python-perf-3.10.0-693.5.2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000112" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000112</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000112" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000112" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000112" ref_url="https://www.suse.com/security/cve/CVE-2017-1000112" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003200.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2438-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2446-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2448-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2454-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2457-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003226.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003228.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003233.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003241.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003242.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003328.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003347.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2956-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003488.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2169-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S5W57DNUZVJT7O3VCW5IIFG273VXFPMF/#S5W57DNUZVJT7O3VCW5IIFG273VXFPMF" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2171-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LGI6QYI3WSJSQPRZJQFZKDW7QDTCDEN2/#LGI6QYI3WSJSQPRZJQFZKDW7QDTCDEN2" source="SUSE-SU"/>
    <description>
    Linux kernel: Exploitable memory corruption due to UFO to non-UFO path switch. When building a UFO packet with MSG_MORE __ip_append_data() calls ip_ufo_append_data() to append. However in between two send() calls, the append path can be switched from UFO to non-UFO one, which leads to a memory corruption. In case UFO packet lengths exceeds MTU, copy = maxfraglen - skb-&gt;len becomes negative on the non-UFO path and the branch to allocate new skb is taken. This triggers fragmentation and computation of fraggap = skb_prev-&gt;len - maxfraglen. Fraggap can exceed MTU, causing copy = datalen - transhdrlen - fraggap to become negative. Subsequently skb_copy_and_csum_bits() writes out-of-bounds. A similar issue is present in IPv6 code. The bug was introduced in e89e9cf539a2 ("[IPv4/IPv6]: UFO Scatter-gather approach") on Oct 18 2005.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000112/">CVE-2017-1000112 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000112">CVE-2017-1000112 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1052311">SUSE bug 1052311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052365">SUSE bug 1052365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052368">SUSE bug 1052368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072117">SUSE bug 1072117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072162">SUSE bug 1072162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115893">SUSE bug 1115893</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823683" comment="kernel-3.10.0-693.5.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823684" comment="kernel-abi-whitelists-3.10.0-693.5.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823685" comment="kernel-debug-3.10.0-693.5.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823688" comment="kernel-doc-3.10.0-693.5.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823689" comment="kernel-headers-3.10.0-693.5.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823690" comment="kernel-tools-3.10.0-693.5.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823691" comment="kernel-tools-libs-3.10.0-693.5.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823693" comment="perf-3.10.0-693.5.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823694" comment="python-perf-3.10.0-693.5.2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000115" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000115</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000115" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000115" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000115" ref_url="https://www.suse.com/security/cve/CVE-2017-1000115" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003156.html" source="SUSE-SU"/>
    <description>
    Mercurial prior to version 4.3 is vulnerable to a missing symlink check that can malicious repositories to modify files outside the repository
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000115/">CVE-2017-1000115 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000115">CVE-2017-1000115 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1053344">SUSE bug 1053344</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823576" comment="emacs-mercurial-2.6.2-8.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823577" comment="emacs-mercurial-el-2.6.2-8.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823578" comment="mercurial-2.6.2-8.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823579" comment="mercurial-hgk-2.6.2-8.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000116" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000116</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000116" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000116" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000116" ref_url="https://www.suse.com/security/cve/CVE-2017-1000116" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003156.html" source="SUSE-SU"/>
    <description>
    Mercurial prior to 4.3 did not adequately sanitize hostnames passed to ssh, leading to possible shell-injection attacks.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000116/">CVE-2017-1000116 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000116">CVE-2017-1000116 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1052481">SUSE bug 1052481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052696">SUSE bug 1052696</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052932">SUSE bug 1052932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053364">SUSE bug 1053364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054653">SUSE bug 1054653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066430">SUSE bug 1066430</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071709">SUSE bug 1071709</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823576" comment="emacs-mercurial-2.6.2-8.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823577" comment="emacs-mercurial-el-2.6.2-8.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823578" comment="mercurial-2.6.2-8.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823579" comment="mercurial-hgk-2.6.2-8.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000117" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000117</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000117" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000117" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000117" ref_url="https://www.suse.com/security/cve/CVE-2017-1000117" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2225-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0992-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006709.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2182-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/L3CKX77TSI7F2FHGGM2NTZKPPGANGBGD/#L3CKX77TSI7F2FHGGM2NTZKPPGANGBGD" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2331-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U7FJJRXZX3N6K3HQW4OOFD6LEHLIXZDP/#U7FJJRXZX3N6K3HQW4OOFD6LEHLIXZDP" source="SUSE-SU"/>
    <description>
    A malicious third-party can give a crafted "ssh://..." URL to an unsuspecting victim, and an attempt to visit the URL can result in any program that exists on the victim's machine being executed. Such a URL could be placed in the .gitmodules file of a malicious project, and an unsuspecting victim could be tricked into running "git clone --recurse-submodules" to trigger the vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000117/">CVE-2017-1000117 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000117">CVE-2017-1000117 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1052481">SUSE bug 1052481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052696">SUSE bug 1052696</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052932">SUSE bug 1052932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053364">SUSE bug 1053364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053600">SUSE bug 1053600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053919">SUSE bug 1053919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054653">SUSE bug 1054653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058214">SUSE bug 1058214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066430">SUSE bug 1066430</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071709">SUSE bug 1071709</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823558" comment="emacs-git-1.8.3.1-12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823559" comment="emacs-git-el-1.8.3.1-12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823560" comment="git-1.8.3.1-12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823561" comment="git-all-1.8.3.1-12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823562" comment="git-bzr-1.8.3.1-12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823563" comment="git-cvs-1.8.3.1-12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823564" comment="git-daemon-1.8.3.1-12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823565" comment="git-email-1.8.3.1-12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823566" comment="git-gui-1.8.3.1-12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823567" comment="git-hg-1.8.3.1-12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823568" comment="git-p4-1.8.3.1-12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823569" comment="git-svn-1.8.3.1-12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823570" comment="gitk-1.8.3.1-12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823571" comment="gitweb-1.8.3.1-12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823572" comment="perl-Git-1.8.3.1-12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823573" comment="perl-Git-SVN-1.8.3.1-12.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000250" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000250</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000250" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000250" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000250" ref_url="https://www.suse.com/security/cve/CVE-2017-1000250" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005161.html" source="SUSE-SU"/>
    <description>
    All versions of the SDP server in BlueZ 5.46 and earlier are vulnerable to an information disclosure vulnerability which allows remote attackers to obtain sensitive information from the bluetoothd process memory. This vulnerability lies in the processing of SDP search attribute requests.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-1000250/">CVE-2017-1000250 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000250">CVE-2017-1000250 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1057342">SUSE bug 1057342</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823613" comment="bluez-5.44-4.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823614" comment="bluez-cups-5.44-4.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823615" comment="bluez-hid2hci-5.44-4.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823616" comment="bluez-libs-5.44-4.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823617" comment="bluez-libs-devel-5.44-4.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000251" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000251</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000251" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000251" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000251" ref_url="https://www.suse.com/security/cve/CVE-2017-1000251" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2523-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003307.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003327.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2792-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003332.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003349.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2956-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003576.html" source="SUSE-SU"/>
		<reference ref_id="TID000019028" ref_url="https://www.suse.com/support/kb/doc/?id=000019028" source="SUSE-SU"/>
		<reference ref_id="TID7021383" ref_url="https://www.suse.com/support/kb/doc/?id=7021383" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2494-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YPGIUZYK74E5SKBIZ5WWZR73INQMGVZF/#YPGIUZYK74E5SKBIZ5WWZR73INQMGVZF" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2495-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NMSI4RCMJWBVGY3QK5XMZEO3O7WUFC4Q/#NMSI4RCMJWBVGY3QK5XMZEO3O7WUFC4Q" source="SUSE-SU"/>
    <description>
    The native Bluetooth stack in the Linux Kernel (BlueZ), starting at the Linux kernel version 2.6.32 and up to and including 4.13.1, are vulnerable to a stack overflow vulnerability in the processing of L2CAP configuration responses resulting in Remote code execution in kernel space.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000251/">CVE-2017-1000251 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000251">CVE-2017-1000251 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1057389">SUSE bug 1057389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057950">SUSE bug 1057950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070535">SUSE bug 1070535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072117">SUSE bug 1072117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072162">SUSE bug 1072162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120758">SUSE bug 1120758</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823601" comment="kernel-3.10.0-693.2.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823602" comment="kernel-abi-whitelists-3.10.0-693.2.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823603" comment="kernel-debug-3.10.0-693.2.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823606" comment="kernel-doc-3.10.0-693.2.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823607" comment="kernel-headers-3.10.0-693.2.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823608" comment="kernel-tools-3.10.0-693.2.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823609" comment="kernel-tools-libs-3.10.0-693.2.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823611" comment="perf-3.10.0-693.2.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823612" comment="python-perf-3.10.0-693.2.2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000252" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000252</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000252" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000252" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000252" ref_url="https://www.suse.com/security/cve/CVE-2017-1000252" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2956-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003385.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2739-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YAGLLWTW52CL2EANHYBSPEELC5M2ZW45/#YAGLLWTW52CL2EANHYBSPEELC5M2ZW45" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2741-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OEEY2PRTREONRYLJOOZKK5RRVRZM4Y7H/#OEEY2PRTREONRYLJOOZKK5RRVRZM4Y7H" source="SUSE-SU"/>
    <description>
    The KVM subsystem in the Linux kernel through 4.13.3 allows guest OS users to cause a denial of service (assertion failure, and hypervisor hang or crash) via an out-of bounds guest_irq value, related to arch/x86/kvm/vmx.c and virt/kvm/eventfd.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000252/">CVE-2017-1000252 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000252">CVE-2017-1000252 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1058038">SUSE bug 1058038</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824165" comment="kernel-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824166" comment="kernel-abi-whitelists-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824167" comment="kernel-debug-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824170" comment="kernel-doc-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824171" comment="kernel-headers-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824172" comment="kernel-tools-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824173" comment="kernel-tools-libs-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824175" comment="perf-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824176" comment="python-perf-3.10.0-862.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000257" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000257</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000257" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000257" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000257" ref_url="https://www.suse.com/security/cve/CVE-2017-1000257" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003359.html" source="SUSE-SU"/>
    <description>
    An IMAP FETCH response line indicates the size of the returned data, in number of bytes. When that response says the data is zero bytes, libcurl would pass on that (non-existing) data with a pointer and the size (zero) to the deliver-data function. libcurl's deliver-data function treats zero as a magic number and invokes strlen() on the data to figure out the length. The strlen() is called on a heap based buffer that might not be zero terminated so libcurl might read beyond the end of it into whatever memory lies after (or just crash) and then deliver that to the application as if it was actually downloaded.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000257/">CVE-2017-1000257 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000257">CVE-2017-1000257 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1063824">SUSE bug 1063824</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823779" comment="curl-7.29.0-42.el7_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823780" comment="libcurl-7.29.0-42.el7_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823781" comment="libcurl-devel-7.29.0-42.el7_4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000364" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000364</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000364" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000364" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000364" ref_url="https://www.suse.com/security/cve/CVE-2017-1000364" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1618-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1922-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1937-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1941-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1942-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1944-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003182.html" source="SUSE-SU"/>
		<reference ref_id="TID7020973" ref_url="https://www.suse.com/support/kb/doc/?id=7020973" source="SUSE-SU"/>
		<reference ref_id="TID7021086" ref_url="https://www.suse.com/support/kb/doc/?id=7021086" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1633-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/P2HNEQKNZE2RG4SRLNOORHC25EUGVNTP/#P2HNEQKNZE2RG4SRLNOORHC25EUGVNTP" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1685-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/422AWA5A23JMTSTJCFVCNVUC6EI6AEZI/#422AWA5A23JMTSTJCFVCNVUC6EI6AEZI" source="SUSE-SU"/>
    <description>
    An issue was discovered in the size of the stack guard page on Linux, specifically a 4k stack guard page is not sufficiently large and can be "jumped" over (the stack guard page is bypassed), this affects Linux Kernel versions 4.11.5 and earlier (the stackguard page was introduced in 2010).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000364/">CVE-2017-1000364 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000364">CVE-2017-1000364 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1039346">SUSE bug 1039346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039348">SUSE bug 1039348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042200">SUSE bug 1042200</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044985">SUSE bug 1044985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071943">SUSE bug 1071943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075506">SUSE bug 1075506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077345">SUSE bug 1077345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115893">SUSE bug 1115893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149726">SUSE bug 1149726</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823079" comment="kernel-3.10.0-514.21.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823080" comment="kernel-abi-whitelists-3.10.0-514.21.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823081" comment="kernel-debug-3.10.0-514.21.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823084" comment="kernel-doc-3.10.0-514.21.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823085" comment="kernel-headers-3.10.0-514.21.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823086" comment="kernel-tools-3.10.0-514.21.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823087" comment="kernel-tools-libs-3.10.0-514.21.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823089" comment="perf-3.10.0-514.21.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823090" comment="python-perf-3.10.0-514.21.2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000366" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000366</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000366" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000366" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000366" ref_url="https://www.suse.com/security/cve/CVE-2017-1000366" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003289.html" source="SUSE-SU"/>
		<reference ref_id="TID7020973" ref_url="https://www.suse.com/support/kb/doc/?id=7020973" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1629-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K3IQSSU3N5JKUH3TDRTL5Y2QKDCA2GMR/#K3IQSSU3N5JKUH3TDRTL5Y2QKDCA2GMR" source="SUSE-SU"/>
    <description>
    glibc contains a vulnerability that allows specially crafted LD_LIBRARY_PATH values to manipulate the heap/stack, causing them to alias, potentially resulting in arbitrary code execution. Please note that additional hardening changes have been made to glibc to prevent manipulation of stack and heap memory but these issues are not directly exploitable, as such they have not been given a CVE. This affects glibc 2.25 and earlier.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-02"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000366/">CVE-2017-1000366 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000366">CVE-2017-1000366 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1037551">SUSE bug 1037551</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039357">SUSE bug 1039357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063847">SUSE bug 1063847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071319">SUSE bug 1071319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123874">SUSE bug 1123874</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823072" comment="glibc-2.17-157.el7_3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823073" comment="glibc-common-2.17-157.el7_3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823074" comment="glibc-devel-2.17-157.el7_3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823075" comment="glibc-headers-2.17-157.el7_3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823076" comment="glibc-static-2.17-157.el7_3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823077" comment="glibc-utils-2.17-157.el7_3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823078" comment="nscd-2.17-157.el7_3.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000367" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000367</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000367" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000367" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000367" ref_url="https://www.suse.com/security/cve/CVE-2017-1000367" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1446-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002930.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1455-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UJCGSRMBKFPNZBU7GWKANVXCKVBZQDT6/#UJCGSRMBKFPNZBU7GWKANVXCKVBZQDT6" source="SUSE-SU"/>
    <description>
    Todd Miller's sudo version 1.8.20 and earlier is vulnerable to an input validation (embedded spaces) in the get_process_ttyname() function resulting in information disclosure and command execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000367/">CVE-2017-1000367 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000367">CVE-2017-1000367 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1007501">SUSE bug 1007501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039361">SUSE bug 1039361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042146">SUSE bug 1042146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077345">SUSE bug 1077345</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823065" comment="sudo-1.8.6p7-22.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823066" comment="sudo-devel-1.8.6p7-22.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000368" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000368</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000368" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000368" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000368" ref_url="https://www.suse.com/security/cve/CVE-2017-1000368" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003009.html" source="SUSE-SU"/>
		<reference ref_id="TID7021027" ref_url="https://www.suse.com/support/kb/doc/?id=7021027" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1697-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YLSRIXYTU37PFAVOYK3S37KQP6TUCUHA/#YLSRIXYTU37PFAVOYK3S37KQP6TUCUHA" source="SUSE-SU"/>
    <description>
    Todd Miller's sudo version 1.8.20p1 and earlier is vulnerable to an input validation (embedded newlines) in the get_process_ttyname() function resulting in information disclosure and command execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000368/">CVE-2017-1000368 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000368">CVE-2017-1000368 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1039361">SUSE bug 1039361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042146">SUSE bug 1042146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045986">SUSE bug 1045986</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823092" comment="sudo-1.8.6p7-23.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823093" comment="sudo-devel-1.8.6p7-23.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000380" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000380</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000380" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000380" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000380" ref_url="https://www.suse.com/security/cve/CVE-2017-1000380" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003367.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1633-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/P2HNEQKNZE2RG4SRLNOORHC25EUGVNTP/#P2HNEQKNZE2RG4SRLNOORHC25EUGVNTP" source="SUSE-SU"/>
    <description>
    sound/core/timer.c in the Linux kernel before 4.11.5 is vulnerable to a data race in the ALSA /dev/snd/timer driver resulting in local users being able to read information belonging to other users, i.e., uninitialized memory contents may be disclosed when a read and an ioctl happen at the same time.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-1000380/">CVE-2017-1000380 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000380">CVE-2017-1000380 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1044125">SUSE bug 1044125</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823785" comment="kernel-3.10.0-693.11.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823786" comment="kernel-abi-whitelists-3.10.0-693.11.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823787" comment="kernel-debug-3.10.0-693.11.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823790" comment="kernel-doc-3.10.0-693.11.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823791" comment="kernel-headers-3.10.0-693.11.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823792" comment="kernel-tools-3.10.0-693.11.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823793" comment="kernel-tools-libs-3.10.0-693.11.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823795" comment="perf-3.10.0-693.11.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823796" comment="python-perf-3.10.0-693.11.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000407" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000407</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000407" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000407" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000407" ref_url="https://www.suse.com/security/cve/CVE-2017-1000407" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3746-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13937-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005067.html" source="SUSE-SU"/>
    <description>
    The Linux Kernel 2.6.32 and later are affected by a denial of service, by flooding the diagnostic port 0x80 an exception can be triggered leading to a kernel panic.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000407/">CVE-2017-1000407 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000407">CVE-2017-1000407 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1071021">SUSE bug 1071021</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824165" comment="kernel-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824166" comment="kernel-abi-whitelists-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824167" comment="kernel-debug-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824170" comment="kernel-doc-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824171" comment="kernel-headers-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824172" comment="kernel-tools-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824173" comment="kernel-tools-libs-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824175" comment="perf-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824176" comment="python-perf-3.10.0-862.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000410" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000410</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000410" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000410" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000410" ref_url="https://www.suse.com/security/cve/CVE-2017-1000410" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3410-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003550.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003629.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3358-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4UYJRYWN3YIKVO45AOJQMXXWEWZ76QPX/#4UYJRYWN3YIKVO45AOJQMXXWEWZ76QPX" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3359-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KNOTZX2CMPWZWZ2GTPQ2RA6T3XMG2V5Y/#KNOTZX2CMPWZWZ2GTPQ2RA6T3XMG2V5Y" source="SUSE-SU"/>
    <description>
    The Linux kernel version 3.3-rc1 and later is affected by a vulnerability lies in the processing of incoming L2CAP commands - ConfigRequest, and ConfigResponse messages. This info leak is a result of uninitialized stack variables that may be returned to an attacker in their uninitialized state. By manipulating the code flows that precede the handling of these configuration messages, an attacker can also gain some control over which data will be held in the uninitialized stack variables. This can allow him to bypass KASLR, and stack canaries protection - as both pointers and stack canaries may be leaked in this manner. Combining this vulnerability (for example) with the previously disclosed RCE vulnerability in L2CAP configuration parsing (CVE-2017-1000251) may allow an attacker to exploit the RCE against kernels which were built with the above mitigations. These are the specifics of this vulnerability: In the function l2cap_parse_conf_rsp and in the function l2cap_parse_conf_req the following variable is declared without initialization: struct l2cap_conf_efs efs; In addition, when parsing input configuration parameters in both of these functions, the switch case for handling EFS elements may skip the memcpy call that will write to the efs variable: ... case L2CAP_CONF_EFS: if (olen == sizeof(efs)) memcpy(&amp;efs, (void *)val, olen); ... The olen in the above if is attacker controlled, and regardless of that if, in both of these functions the efs variable would eventually be added to the outgoing configuration request that is being built: l2cap_add_conf_opt(&amp;ptr, L2CAP_CONF_EFS, sizeof(efs), (unsigned long) &amp;efs); So by sending a configuration request, or response, that contains an L2CAP_CONF_EFS element, but with an element length that is not sizeof(efs) - the memcpy to the uninitialized efs variable can be avoided, and the uninitialized variable would be returned to the attacker (16 bytes).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.4/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-1000410/">CVE-2017-1000410 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000410">CVE-2017-1000410 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1070535">SUSE bug 1070535</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824165" comment="kernel-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824166" comment="kernel-abi-whitelists-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824167" comment="kernel-debug-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824170" comment="kernel-doc-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824171" comment="kernel-headers-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824172" comment="kernel-tools-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824173" comment="kernel-tools-libs-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824175" comment="perf-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824176" comment="python-perf-3.10.0-862.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000476" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000476</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000476" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000476" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000476" ref_url="https://www.suse.com/security/cve/CVE-2017-1000476" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003983.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.7-12 Q16, a CPU exhaustion vulnerability was found in the function ReadDDSInfo in coders/dds.c, which allows attackers to cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-1000476/">CVE-2017-1000476 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000476">CVE-2017-1000476 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1074610">SUSE bug 1074610</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827880" comment="ImageMagick-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827881" comment="ImageMagick-c++-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827882" comment="ImageMagick-c++-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827883" comment="ImageMagick-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827884" comment="ImageMagick-doc-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827885" comment="ImageMagick-perl-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827886" comment="autotrace-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827887" comment="autotrace-devel-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827888" comment="emacs-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827889" comment="emacs-common-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827890" comment="emacs-el-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827891" comment="emacs-filesystem-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827892" comment="emacs-nox-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827893" comment="emacs-terminal-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827894" comment="inkscape-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827895" comment="inkscape-docs-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827896" comment="inkscape-view-0.92.2-3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710053" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10053</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10053" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10053" ref_url="https://www.suse.com/security/cve/CVE-2017-10053" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2018-January/007678.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AP5LSLYIG36TN25VI6WAOVXYV7J3ACHW/#AP5LSLYIG36TN25VI6WAOVXYV7J3ACHW" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: 2D). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10053/">CVE-2017-10053 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10053">CVE-2017-10053 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1049305">SUSE bug 1049305</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823511" comment="java-1.7.0-openjdk-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823512" comment="java-1.7.0-openjdk-accessibility-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823513" comment="java-1.7.0-openjdk-demo-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823514" comment="java-1.7.0-openjdk-devel-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823515" comment="java-1.7.0-openjdk-headless-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823516" comment="java-1.7.0-openjdk-javadoc-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823517" comment="java-1.7.0-openjdk-src-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823140" comment="java-1.8.0-openjdk-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823141" comment="java-1.8.0-openjdk-accessibility-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823142" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823143" comment="java-1.8.0-openjdk-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823144" comment="java-1.8.0-openjdk-demo-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823145" comment="java-1.8.0-openjdk-demo-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823146" comment="java-1.8.0-openjdk-devel-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823147" comment="java-1.8.0-openjdk-devel-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823148" comment="java-1.8.0-openjdk-headless-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823149" comment="java-1.8.0-openjdk-headless-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823150" comment="java-1.8.0-openjdk-javadoc-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823151" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823152" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823153" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823154" comment="java-1.8.0-openjdk-src-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823155" comment="java-1.8.0-openjdk-src-debug-1.8.0.141-1.b16.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710067" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10067</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10067" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10067" ref_url="https://www.suse.com/security/cve/CVE-2017-10067" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2018-January/007678.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AP5LSLYIG36TN25VI6WAOVXYV7J3ACHW/#AP5LSLYIG36TN25VI6WAOVXYV7J3ACHW" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-30"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10067/">CVE-2017-10067 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10067">CVE-2017-10067 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1049306">SUSE bug 1049306</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823511" comment="java-1.7.0-openjdk-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823512" comment="java-1.7.0-openjdk-accessibility-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823513" comment="java-1.7.0-openjdk-demo-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823514" comment="java-1.7.0-openjdk-devel-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823515" comment="java-1.7.0-openjdk-headless-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823516" comment="java-1.7.0-openjdk-javadoc-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823517" comment="java-1.7.0-openjdk-src-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823140" comment="java-1.8.0-openjdk-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823141" comment="java-1.8.0-openjdk-accessibility-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823142" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823143" comment="java-1.8.0-openjdk-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823144" comment="java-1.8.0-openjdk-demo-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823145" comment="java-1.8.0-openjdk-demo-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823146" comment="java-1.8.0-openjdk-devel-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823147" comment="java-1.8.0-openjdk-devel-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823148" comment="java-1.8.0-openjdk-headless-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823149" comment="java-1.8.0-openjdk-headless-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823150" comment="java-1.8.0-openjdk-javadoc-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823151" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823152" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823153" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823154" comment="java-1.8.0-openjdk-src-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823155" comment="java-1.8.0-openjdk-src-debug-1.8.0.141-1.b16.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710074" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10074</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10074" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10074" ref_url="https://www.suse.com/security/cve/CVE-2017-10074" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2018-January/007678.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AP5LSLYIG36TN25VI6WAOVXYV7J3ACHW/#AP5LSLYIG36TN25VI6WAOVXYV7J3ACHW" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Hotspot). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-02"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10074/">CVE-2017-10074 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10074">CVE-2017-10074 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1049307">SUSE bug 1049307</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049333">SUSE bug 1049333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823511" comment="java-1.7.0-openjdk-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823512" comment="java-1.7.0-openjdk-accessibility-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823513" comment="java-1.7.0-openjdk-demo-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823514" comment="java-1.7.0-openjdk-devel-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823515" comment="java-1.7.0-openjdk-headless-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823516" comment="java-1.7.0-openjdk-javadoc-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823517" comment="java-1.7.0-openjdk-src-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823140" comment="java-1.8.0-openjdk-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823141" comment="java-1.8.0-openjdk-accessibility-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823142" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823143" comment="java-1.8.0-openjdk-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823144" comment="java-1.8.0-openjdk-demo-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823145" comment="java-1.8.0-openjdk-demo-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823146" comment="java-1.8.0-openjdk-devel-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823147" comment="java-1.8.0-openjdk-devel-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823148" comment="java-1.8.0-openjdk-headless-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823149" comment="java-1.8.0-openjdk-headless-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823150" comment="java-1.8.0-openjdk-javadoc-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823151" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823152" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823153" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823154" comment="java-1.8.0-openjdk-src-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823155" comment="java-1.8.0-openjdk-src-debug-1.8.0.141-1.b16.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710078" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10078</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10078" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10078" ref_url="https://www.suse.com/security/cve/CVE-2017-10078" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003159.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Scripting). The supported version that is affected is Java SE: 8u131. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE accessible data as well as unauthorized access to critical data or complete access to all Java SE accessible data. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-10078/">CVE-2017-10078 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10078">CVE-2017-10078 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1049308">SUSE bug 1049308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049333">SUSE bug 1049333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823140" comment="java-1.8.0-openjdk-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823141" comment="java-1.8.0-openjdk-accessibility-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823142" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823143" comment="java-1.8.0-openjdk-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823144" comment="java-1.8.0-openjdk-demo-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823145" comment="java-1.8.0-openjdk-demo-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823146" comment="java-1.8.0-openjdk-devel-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823147" comment="java-1.8.0-openjdk-devel-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823148" comment="java-1.8.0-openjdk-headless-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823149" comment="java-1.8.0-openjdk-headless-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823150" comment="java-1.8.0-openjdk-javadoc-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823151" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823152" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823153" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823154" comment="java-1.8.0-openjdk-src-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823155" comment="java-1.8.0-openjdk-src-debug-1.8.0.141-1.b16.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710081" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10081</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10081" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10081" ref_url="https://www.suse.com/security/cve/CVE-2017-10081" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2018-January/007678.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AP5LSLYIG36TN25VI6WAOVXYV7J3ACHW/#AP5LSLYIG36TN25VI6WAOVXYV7J3ACHW" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Hotspot). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-10081/">CVE-2017-10081 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10081">CVE-2017-10081 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1049309">SUSE bug 1049309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049333">SUSE bug 1049333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823511" comment="java-1.7.0-openjdk-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823512" comment="java-1.7.0-openjdk-accessibility-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823513" comment="java-1.7.0-openjdk-demo-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823514" comment="java-1.7.0-openjdk-devel-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823515" comment="java-1.7.0-openjdk-headless-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823516" comment="java-1.7.0-openjdk-javadoc-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823517" comment="java-1.7.0-openjdk-src-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823140" comment="java-1.8.0-openjdk-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823141" comment="java-1.8.0-openjdk-accessibility-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823142" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823143" comment="java-1.8.0-openjdk-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823144" comment="java-1.8.0-openjdk-demo-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823145" comment="java-1.8.0-openjdk-demo-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823146" comment="java-1.8.0-openjdk-devel-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823147" comment="java-1.8.0-openjdk-devel-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823148" comment="java-1.8.0-openjdk-headless-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823149" comment="java-1.8.0-openjdk-headless-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823150" comment="java-1.8.0-openjdk-javadoc-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823151" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823152" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823153" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823154" comment="java-1.8.0-openjdk-src-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823155" comment="java-1.8.0-openjdk-src-debug-1.8.0.141-1.b16.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710087" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10087</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10087" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10087" ref_url="https://www.suse.com/security/cve/CVE-2017-10087" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2018-January/007678.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AP5LSLYIG36TN25VI6WAOVXYV7J3ACHW/#AP5LSLYIG36TN25VI6WAOVXYV7J3ACHW" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10087/">CVE-2017-10087 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10087">CVE-2017-10087 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1049311">SUSE bug 1049311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049333">SUSE bug 1049333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823511" comment="java-1.7.0-openjdk-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823512" comment="java-1.7.0-openjdk-accessibility-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823513" comment="java-1.7.0-openjdk-demo-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823514" comment="java-1.7.0-openjdk-devel-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823515" comment="java-1.7.0-openjdk-headless-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823516" comment="java-1.7.0-openjdk-javadoc-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823517" comment="java-1.7.0-openjdk-src-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823140" comment="java-1.8.0-openjdk-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823141" comment="java-1.8.0-openjdk-accessibility-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823142" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823143" comment="java-1.8.0-openjdk-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823144" comment="java-1.8.0-openjdk-demo-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823145" comment="java-1.8.0-openjdk-demo-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823146" comment="java-1.8.0-openjdk-devel-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823147" comment="java-1.8.0-openjdk-devel-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823148" comment="java-1.8.0-openjdk-headless-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823149" comment="java-1.8.0-openjdk-headless-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823150" comment="java-1.8.0-openjdk-javadoc-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823151" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823152" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823153" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823154" comment="java-1.8.0-openjdk-src-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823155" comment="java-1.8.0-openjdk-src-debug-1.8.0.141-1.b16.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710089" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10089</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10089" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10089" ref_url="https://www.suse.com/security/cve/CVE-2017-10089" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2018-January/007678.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AP5LSLYIG36TN25VI6WAOVXYV7J3ACHW/#AP5LSLYIG36TN25VI6WAOVXYV7J3ACHW" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE component of Oracle Java SE (subcomponent: ImageIO). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10089/">CVE-2017-10089 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10089">CVE-2017-10089 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1049312">SUSE bug 1049312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049333">SUSE bug 1049333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823511" comment="java-1.7.0-openjdk-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823512" comment="java-1.7.0-openjdk-accessibility-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823513" comment="java-1.7.0-openjdk-demo-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823514" comment="java-1.7.0-openjdk-devel-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823515" comment="java-1.7.0-openjdk-headless-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823516" comment="java-1.7.0-openjdk-javadoc-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823517" comment="java-1.7.0-openjdk-src-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823140" comment="java-1.8.0-openjdk-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823141" comment="java-1.8.0-openjdk-accessibility-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823142" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823143" comment="java-1.8.0-openjdk-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823144" comment="java-1.8.0-openjdk-demo-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823145" comment="java-1.8.0-openjdk-demo-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823146" comment="java-1.8.0-openjdk-devel-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823147" comment="java-1.8.0-openjdk-devel-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823148" comment="java-1.8.0-openjdk-headless-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823149" comment="java-1.8.0-openjdk-headless-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823150" comment="java-1.8.0-openjdk-javadoc-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823151" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823152" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823153" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823154" comment="java-1.8.0-openjdk-src-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823155" comment="java-1.8.0-openjdk-src-debug-1.8.0.141-1.b16.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710090" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10090</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10090" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10090" ref_url="https://www.suse.com/security/cve/CVE-2017-10090" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2018-January/007678.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AP5LSLYIG36TN25VI6WAOVXYV7J3ACHW/#AP5LSLYIG36TN25VI6WAOVXYV7J3ACHW" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u141 and 8u131; Java SE Embedded: 8u131. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10090/">CVE-2017-10090 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10090">CVE-2017-10090 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1049313">SUSE bug 1049313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049333">SUSE bug 1049333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823511" comment="java-1.7.0-openjdk-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823512" comment="java-1.7.0-openjdk-accessibility-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823513" comment="java-1.7.0-openjdk-demo-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823514" comment="java-1.7.0-openjdk-devel-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823515" comment="java-1.7.0-openjdk-headless-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823516" comment="java-1.7.0-openjdk-javadoc-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823517" comment="java-1.7.0-openjdk-src-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823140" comment="java-1.8.0-openjdk-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823141" comment="java-1.8.0-openjdk-accessibility-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823142" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823143" comment="java-1.8.0-openjdk-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823144" comment="java-1.8.0-openjdk-demo-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823145" comment="java-1.8.0-openjdk-demo-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823146" comment="java-1.8.0-openjdk-devel-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823147" comment="java-1.8.0-openjdk-devel-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823148" comment="java-1.8.0-openjdk-headless-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823149" comment="java-1.8.0-openjdk-headless-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823150" comment="java-1.8.0-openjdk-javadoc-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823151" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823152" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823153" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823154" comment="java-1.8.0-openjdk-src-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823155" comment="java-1.8.0-openjdk-src-debug-1.8.0.141-1.b16.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710096" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10096</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10096" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10096" ref_url="https://www.suse.com/security/cve/CVE-2017-10096" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2018-January/007678.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AP5LSLYIG36TN25VI6WAOVXYV7J3ACHW/#AP5LSLYIG36TN25VI6WAOVXYV7J3ACHW" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JAXP). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10096/">CVE-2017-10096 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10096">CVE-2017-10096 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1049314">SUSE bug 1049314</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049333">SUSE bug 1049333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823511" comment="java-1.7.0-openjdk-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823512" comment="java-1.7.0-openjdk-accessibility-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823513" comment="java-1.7.0-openjdk-demo-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823514" comment="java-1.7.0-openjdk-devel-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823515" comment="java-1.7.0-openjdk-headless-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823516" comment="java-1.7.0-openjdk-javadoc-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823517" comment="java-1.7.0-openjdk-src-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823140" comment="java-1.8.0-openjdk-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823141" comment="java-1.8.0-openjdk-accessibility-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823142" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823143" comment="java-1.8.0-openjdk-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823144" comment="java-1.8.0-openjdk-demo-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823145" comment="java-1.8.0-openjdk-demo-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823146" comment="java-1.8.0-openjdk-devel-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823147" comment="java-1.8.0-openjdk-devel-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823148" comment="java-1.8.0-openjdk-headless-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823149" comment="java-1.8.0-openjdk-headless-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823150" comment="java-1.8.0-openjdk-javadoc-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823151" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823152" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823153" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823154" comment="java-1.8.0-openjdk-src-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823155" comment="java-1.8.0-openjdk-src-debug-1.8.0.141-1.b16.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710101" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10101</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10101" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10101" ref_url="https://www.suse.com/security/cve/CVE-2017-10101" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2018-January/007678.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AP5LSLYIG36TN25VI6WAOVXYV7J3ACHW/#AP5LSLYIG36TN25VI6WAOVXYV7J3ACHW" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JAXP). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10101/">CVE-2017-10101 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10101">CVE-2017-10101 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1049315">SUSE bug 1049315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049333">SUSE bug 1049333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823511" comment="java-1.7.0-openjdk-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823512" comment="java-1.7.0-openjdk-accessibility-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823513" comment="java-1.7.0-openjdk-demo-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823514" comment="java-1.7.0-openjdk-devel-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823515" comment="java-1.7.0-openjdk-headless-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823516" comment="java-1.7.0-openjdk-javadoc-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823517" comment="java-1.7.0-openjdk-src-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823140" comment="java-1.8.0-openjdk-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823141" comment="java-1.8.0-openjdk-accessibility-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823142" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823143" comment="java-1.8.0-openjdk-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823144" comment="java-1.8.0-openjdk-demo-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823145" comment="java-1.8.0-openjdk-demo-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823146" comment="java-1.8.0-openjdk-devel-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823147" comment="java-1.8.0-openjdk-devel-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823148" comment="java-1.8.0-openjdk-headless-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823149" comment="java-1.8.0-openjdk-headless-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823150" comment="java-1.8.0-openjdk-javadoc-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823151" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823152" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823153" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823154" comment="java-1.8.0-openjdk-src-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823155" comment="java-1.8.0-openjdk-src-debug-1.8.0.141-1.b16.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710102" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10102</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10102" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10102" ref_url="https://www.suse.com/security/cve/CVE-2017-10102" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2018-January/007678.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AP5LSLYIG36TN25VI6WAOVXYV7J3ACHW/#AP5LSLYIG36TN25VI6WAOVXYV7J3ACHW" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. While the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 9.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-01"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10102/">CVE-2017-10102 at SUSE</cve>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10102">CVE-2017-10102 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1049316">SUSE bug 1049316</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049333">SUSE bug 1049333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823511" comment="java-1.7.0-openjdk-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823512" comment="java-1.7.0-openjdk-accessibility-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823513" comment="java-1.7.0-openjdk-demo-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823514" comment="java-1.7.0-openjdk-devel-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823515" comment="java-1.7.0-openjdk-headless-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823516" comment="java-1.7.0-openjdk-javadoc-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823517" comment="java-1.7.0-openjdk-src-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823140" comment="java-1.8.0-openjdk-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823141" comment="java-1.8.0-openjdk-accessibility-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823142" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823143" comment="java-1.8.0-openjdk-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823144" comment="java-1.8.0-openjdk-demo-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823145" comment="java-1.8.0-openjdk-demo-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823146" comment="java-1.8.0-openjdk-devel-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823147" comment="java-1.8.0-openjdk-devel-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823148" comment="java-1.8.0-openjdk-headless-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823149" comment="java-1.8.0-openjdk-headless-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823150" comment="java-1.8.0-openjdk-javadoc-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823151" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823152" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823153" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823154" comment="java-1.8.0-openjdk-src-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823155" comment="java-1.8.0-openjdk-src-debug-1.8.0.141-1.b16.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710107" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10107</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10107" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10107" ref_url="https://www.suse.com/security/cve/CVE-2017-10107" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2018-January/007678.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AP5LSLYIG36TN25VI6WAOVXYV7J3ACHW/#AP5LSLYIG36TN25VI6WAOVXYV7J3ACHW" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10107/">CVE-2017-10107 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10107">CVE-2017-10107 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1049318">SUSE bug 1049318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049333">SUSE bug 1049333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823511" comment="java-1.7.0-openjdk-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823512" comment="java-1.7.0-openjdk-accessibility-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823513" comment="java-1.7.0-openjdk-demo-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823514" comment="java-1.7.0-openjdk-devel-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823515" comment="java-1.7.0-openjdk-headless-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823516" comment="java-1.7.0-openjdk-javadoc-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823517" comment="java-1.7.0-openjdk-src-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823140" comment="java-1.8.0-openjdk-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823141" comment="java-1.8.0-openjdk-accessibility-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823142" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823143" comment="java-1.8.0-openjdk-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823144" comment="java-1.8.0-openjdk-demo-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823145" comment="java-1.8.0-openjdk-demo-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823146" comment="java-1.8.0-openjdk-devel-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823147" comment="java-1.8.0-openjdk-devel-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823148" comment="java-1.8.0-openjdk-headless-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823149" comment="java-1.8.0-openjdk-headless-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823150" comment="java-1.8.0-openjdk-javadoc-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823151" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823152" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823153" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823154" comment="java-1.8.0-openjdk-src-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823155" comment="java-1.8.0-openjdk-src-debug-1.8.0.141-1.b16.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710108" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10108</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10108" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10108" ref_url="https://www.suse.com/security/cve/CVE-2017-10108" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2018-January/007678.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AP5LSLYIG36TN25VI6WAOVXYV7J3ACHW/#AP5LSLYIG36TN25VI6WAOVXYV7J3ACHW" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10108/">CVE-2017-10108 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10108">CVE-2017-10108 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1049319">SUSE bug 1049319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049333">SUSE bug 1049333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823511" comment="java-1.7.0-openjdk-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823512" comment="java-1.7.0-openjdk-accessibility-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823513" comment="java-1.7.0-openjdk-demo-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823514" comment="java-1.7.0-openjdk-devel-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823515" comment="java-1.7.0-openjdk-headless-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823516" comment="java-1.7.0-openjdk-javadoc-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823517" comment="java-1.7.0-openjdk-src-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823140" comment="java-1.8.0-openjdk-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823141" comment="java-1.8.0-openjdk-accessibility-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823142" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823143" comment="java-1.8.0-openjdk-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823144" comment="java-1.8.0-openjdk-demo-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823145" comment="java-1.8.0-openjdk-demo-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823146" comment="java-1.8.0-openjdk-devel-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823147" comment="java-1.8.0-openjdk-devel-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823148" comment="java-1.8.0-openjdk-headless-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823149" comment="java-1.8.0-openjdk-headless-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823150" comment="java-1.8.0-openjdk-javadoc-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823151" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823152" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823153" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823154" comment="java-1.8.0-openjdk-src-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823155" comment="java-1.8.0-openjdk-src-debug-1.8.0.141-1.b16.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710109" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10109</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10109" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10109" ref_url="https://www.suse.com/security/cve/CVE-2017-10109" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2018-January/007678.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AP5LSLYIG36TN25VI6WAOVXYV7J3ACHW/#AP5LSLYIG36TN25VI6WAOVXYV7J3ACHW" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10109/">CVE-2017-10109 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10109">CVE-2017-10109 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1049320">SUSE bug 1049320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049333">SUSE bug 1049333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823511" comment="java-1.7.0-openjdk-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823512" comment="java-1.7.0-openjdk-accessibility-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823513" comment="java-1.7.0-openjdk-demo-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823514" comment="java-1.7.0-openjdk-devel-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823515" comment="java-1.7.0-openjdk-headless-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823516" comment="java-1.7.0-openjdk-javadoc-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823517" comment="java-1.7.0-openjdk-src-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823140" comment="java-1.8.0-openjdk-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823141" comment="java-1.8.0-openjdk-accessibility-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823142" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823143" comment="java-1.8.0-openjdk-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823144" comment="java-1.8.0-openjdk-demo-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823145" comment="java-1.8.0-openjdk-demo-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823146" comment="java-1.8.0-openjdk-devel-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823147" comment="java-1.8.0-openjdk-devel-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823148" comment="java-1.8.0-openjdk-headless-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823149" comment="java-1.8.0-openjdk-headless-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823150" comment="java-1.8.0-openjdk-javadoc-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823151" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823152" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823153" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823154" comment="java-1.8.0-openjdk-src-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823155" comment="java-1.8.0-openjdk-src-debug-1.8.0.141-1.b16.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710110" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10110</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10110" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10110" ref_url="https://www.suse.com/security/cve/CVE-2017-10110" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2018-January/007678.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AP5LSLYIG36TN25VI6WAOVXYV7J3ACHW/#AP5LSLYIG36TN25VI6WAOVXYV7J3ACHW" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE component of Oracle Java SE (subcomponent: AWT). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10110/">CVE-2017-10110 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10110">CVE-2017-10110 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1049321">SUSE bug 1049321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049333">SUSE bug 1049333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823511" comment="java-1.7.0-openjdk-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823512" comment="java-1.7.0-openjdk-accessibility-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823513" comment="java-1.7.0-openjdk-demo-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823514" comment="java-1.7.0-openjdk-devel-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823515" comment="java-1.7.0-openjdk-headless-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823516" comment="java-1.7.0-openjdk-javadoc-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823517" comment="java-1.7.0-openjdk-src-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823140" comment="java-1.8.0-openjdk-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823141" comment="java-1.8.0-openjdk-accessibility-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823142" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823143" comment="java-1.8.0-openjdk-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823144" comment="java-1.8.0-openjdk-demo-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823145" comment="java-1.8.0-openjdk-demo-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823146" comment="java-1.8.0-openjdk-devel-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823147" comment="java-1.8.0-openjdk-devel-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823148" comment="java-1.8.0-openjdk-headless-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823149" comment="java-1.8.0-openjdk-headless-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823150" comment="java-1.8.0-openjdk-javadoc-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823151" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823152" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823153" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823154" comment="java-1.8.0-openjdk-src-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823155" comment="java-1.8.0-openjdk-src-debug-1.8.0.141-1.b16.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710111" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10111</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10111" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10111" ref_url="https://www.suse.com/security/cve/CVE-2017-10111" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2018-January/007678.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AP5LSLYIG36TN25VI6WAOVXYV7J3ACHW/#AP5LSLYIG36TN25VI6WAOVXYV7J3ACHW" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). The supported version that is affected is Java SE: 8u131; Java SE Embedded: 8u131. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10111/">CVE-2017-10111 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10111">CVE-2017-10111 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1049322">SUSE bug 1049322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049333">SUSE bug 1049333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823140" comment="java-1.8.0-openjdk-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823141" comment="java-1.8.0-openjdk-accessibility-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823142" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823143" comment="java-1.8.0-openjdk-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823144" comment="java-1.8.0-openjdk-demo-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823145" comment="java-1.8.0-openjdk-demo-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823146" comment="java-1.8.0-openjdk-devel-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823147" comment="java-1.8.0-openjdk-devel-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823148" comment="java-1.8.0-openjdk-headless-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823149" comment="java-1.8.0-openjdk-headless-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823150" comment="java-1.8.0-openjdk-javadoc-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823151" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823152" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823153" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823154" comment="java-1.8.0-openjdk-src-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823155" comment="java-1.8.0-openjdk-src-debug-1.8.0.141-1.b16.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710115" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10115</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10115" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10115" ref_url="https://www.suse.com/security/cve/CVE-2017-10115" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2018-January/007678.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AP5LSLYIG36TN25VI6WAOVXYV7J3ACHW/#AP5LSLYIG36TN25VI6WAOVXYV7J3ACHW" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JCE). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-10-10"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-10115/">CVE-2017-10115 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10115">CVE-2017-10115 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1020905">SUSE bug 1020905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049324">SUSE bug 1049324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049333">SUSE bug 1049333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823511" comment="java-1.7.0-openjdk-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823512" comment="java-1.7.0-openjdk-accessibility-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823513" comment="java-1.7.0-openjdk-demo-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823514" comment="java-1.7.0-openjdk-devel-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823515" comment="java-1.7.0-openjdk-headless-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823516" comment="java-1.7.0-openjdk-javadoc-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823517" comment="java-1.7.0-openjdk-src-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823140" comment="java-1.8.0-openjdk-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823141" comment="java-1.8.0-openjdk-accessibility-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823142" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823143" comment="java-1.8.0-openjdk-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823144" comment="java-1.8.0-openjdk-demo-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823145" comment="java-1.8.0-openjdk-demo-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823146" comment="java-1.8.0-openjdk-devel-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823147" comment="java-1.8.0-openjdk-devel-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823148" comment="java-1.8.0-openjdk-headless-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823149" comment="java-1.8.0-openjdk-headless-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823150" comment="java-1.8.0-openjdk-javadoc-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823151" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823152" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823153" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823154" comment="java-1.8.0-openjdk-src-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823155" comment="java-1.8.0-openjdk-src-debug-1.8.0.141-1.b16.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710116" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10116</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10116" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10116" ref_url="https://www.suse.com/security/cve/CVE-2017-10116" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2018-January/007678.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AP5LSLYIG36TN25VI6WAOVXYV7J3ACHW/#AP5LSLYIG36TN25VI6WAOVXYV7J3ACHW" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-30"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10116/">CVE-2017-10116 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10116">CVE-2017-10116 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1049325">SUSE bug 1049325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049333">SUSE bug 1049333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823511" comment="java-1.7.0-openjdk-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823512" comment="java-1.7.0-openjdk-accessibility-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823513" comment="java-1.7.0-openjdk-demo-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823514" comment="java-1.7.0-openjdk-devel-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823515" comment="java-1.7.0-openjdk-headless-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823516" comment="java-1.7.0-openjdk-javadoc-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823517" comment="java-1.7.0-openjdk-src-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823140" comment="java-1.8.0-openjdk-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823141" comment="java-1.8.0-openjdk-accessibility-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823142" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823143" comment="java-1.8.0-openjdk-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823144" comment="java-1.8.0-openjdk-demo-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823145" comment="java-1.8.0-openjdk-demo-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823146" comment="java-1.8.0-openjdk-devel-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823147" comment="java-1.8.0-openjdk-devel-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823148" comment="java-1.8.0-openjdk-headless-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823149" comment="java-1.8.0-openjdk-headless-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823150" comment="java-1.8.0-openjdk-javadoc-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823151" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823152" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823153" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823154" comment="java-1.8.0-openjdk-src-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823155" comment="java-1.8.0-openjdk-src-debug-1.8.0.141-1.b16.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710135" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10135</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10135" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10135" ref_url="https://www.suse.com/security/cve/CVE-2017-10135" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2018-January/007678.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AP5LSLYIG36TN25VI6WAOVXYV7J3ACHW/#AP5LSLYIG36TN25VI6WAOVXYV7J3ACHW" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JCE). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10135/">CVE-2017-10135 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10135">CVE-2017-10135 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1049328">SUSE bug 1049328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049333">SUSE bug 1049333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823511" comment="java-1.7.0-openjdk-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823512" comment="java-1.7.0-openjdk-accessibility-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823513" comment="java-1.7.0-openjdk-demo-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823514" comment="java-1.7.0-openjdk-devel-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823515" comment="java-1.7.0-openjdk-headless-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823516" comment="java-1.7.0-openjdk-javadoc-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823517" comment="java-1.7.0-openjdk-src-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823140" comment="java-1.8.0-openjdk-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823141" comment="java-1.8.0-openjdk-accessibility-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823142" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823143" comment="java-1.8.0-openjdk-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823144" comment="java-1.8.0-openjdk-demo-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823145" comment="java-1.8.0-openjdk-demo-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823146" comment="java-1.8.0-openjdk-devel-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823147" comment="java-1.8.0-openjdk-devel-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823148" comment="java-1.8.0-openjdk-headless-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823149" comment="java-1.8.0-openjdk-headless-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823150" comment="java-1.8.0-openjdk-javadoc-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823151" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823152" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823153" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823154" comment="java-1.8.0-openjdk-src-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823155" comment="java-1.8.0-openjdk-src-debug-1.8.0.141-1.b16.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710193" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10193</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10193" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10193" ref_url="https://www.suse.com/security/cve/CVE-2017-10193" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2018-January/007678.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AP5LSLYIG36TN25VI6WAOVXYV7J3ACHW/#AP5LSLYIG36TN25VI6WAOVXYV7J3ACHW" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10193/">CVE-2017-10193 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10193">CVE-2017-10193 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1049330">SUSE bug 1049330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049333">SUSE bug 1049333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823842" comment="java-1.7.0-openjdk-1.7.0.161-2.6.12.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823843" comment="java-1.7.0-openjdk-accessibility-1.7.0.161-2.6.12.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823844" comment="java-1.7.0-openjdk-demo-1.7.0.161-2.6.12.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823845" comment="java-1.7.0-openjdk-devel-1.7.0.161-2.6.12.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823846" comment="java-1.7.0-openjdk-headless-1.7.0.161-2.6.12.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823847" comment="java-1.7.0-openjdk-javadoc-1.7.0.161-2.6.12.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823848" comment="java-1.7.0-openjdk-src-1.7.0.161-2.6.12.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823140" comment="java-1.8.0-openjdk-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823141" comment="java-1.8.0-openjdk-accessibility-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823142" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823143" comment="java-1.8.0-openjdk-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823144" comment="java-1.8.0-openjdk-demo-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823145" comment="java-1.8.0-openjdk-demo-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823146" comment="java-1.8.0-openjdk-devel-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823147" comment="java-1.8.0-openjdk-devel-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823148" comment="java-1.8.0-openjdk-headless-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823149" comment="java-1.8.0-openjdk-headless-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823150" comment="java-1.8.0-openjdk-javadoc-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823151" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823152" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823153" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823154" comment="java-1.8.0-openjdk-src-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823155" comment="java-1.8.0-openjdk-src-debug-1.8.0.141-1.b16.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710198" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10198</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10198" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10198" ref_url="https://www.suse.com/security/cve/CVE-2017-10198" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2018-January/007678.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AP5LSLYIG36TN25VI6WAOVXYV7J3ACHW/#AP5LSLYIG36TN25VI6WAOVXYV7J3ACHW" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. While the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 6.8 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10198/">CVE-2017-10198 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10198">CVE-2017-10198 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1049331">SUSE bug 1049331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049333">SUSE bug 1049333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823842" comment="java-1.7.0-openjdk-1.7.0.161-2.6.12.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823843" comment="java-1.7.0-openjdk-accessibility-1.7.0.161-2.6.12.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823844" comment="java-1.7.0-openjdk-demo-1.7.0.161-2.6.12.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823845" comment="java-1.7.0-openjdk-devel-1.7.0.161-2.6.12.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823846" comment="java-1.7.0-openjdk-headless-1.7.0.161-2.6.12.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823847" comment="java-1.7.0-openjdk-javadoc-1.7.0.161-2.6.12.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823848" comment="java-1.7.0-openjdk-src-1.7.0.161-2.6.12.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823140" comment="java-1.8.0-openjdk-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823141" comment="java-1.8.0-openjdk-accessibility-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823142" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823143" comment="java-1.8.0-openjdk-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823144" comment="java-1.8.0-openjdk-demo-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823145" comment="java-1.8.0-openjdk-demo-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823146" comment="java-1.8.0-openjdk-devel-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823147" comment="java-1.8.0-openjdk-devel-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823148" comment="java-1.8.0-openjdk-headless-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823149" comment="java-1.8.0-openjdk-headless-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823150" comment="java-1.8.0-openjdk-javadoc-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823151" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823152" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823153" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823154" comment="java-1.8.0-openjdk-src-1.8.0.141-1.b16.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823155" comment="java-1.8.0-openjdk-src-debug-1.8.0.141-1.b16.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710243" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10243</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10243" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10243" ref_url="https://www.suse.com/security/cve/CVE-2017-10243" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2018-January/007678.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AP5LSLYIG36TN25VI6WAOVXYV7J3ACHW/#AP5LSLYIG36TN25VI6WAOVXYV7J3ACHW" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JAX-WS). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded, JRockit accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 6.5 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10243/">CVE-2017-10243 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10243">CVE-2017-10243 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1049332">SUSE bug 1049332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049333">SUSE bug 1049333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823511" comment="java-1.7.0-openjdk-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823512" comment="java-1.7.0-openjdk-accessibility-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823513" comment="java-1.7.0-openjdk-demo-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823514" comment="java-1.7.0-openjdk-devel-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823515" comment="java-1.7.0-openjdk-headless-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823516" comment="java-1.7.0-openjdk-javadoc-1.7.0.151-2.6.11.1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823517" comment="java-1.7.0-openjdk-src-1.7.0.151-2.6.11.1.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710268" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10268</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10268" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10268" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10268" ref_url="https://www.suse.com/security/cve/CVE-2017-10268" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003393.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004235.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2868-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Z7DVWELHOI3HIW2TCX7MRYG6JIMYW4R2/#Z7DVWELHOI3HIW2TCX7MRYG6JIMYW4R2" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Replication). Supported versions that are affected are 5.5.57 and earlier, 5.6.37 and earlier and 5.7.19 and earlier. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data. CVSS 3.0 Base Score 4.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10268/">CVE-2017-10268 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10268">CVE-2017-10268 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1064101">SUSE bug 1064101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064119">SUSE bug 1064119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076505">SUSE bug 1076505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076506">SUSE bug 1076506</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824516" comment="mariadb-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824517" comment="mariadb-bench-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824518" comment="mariadb-devel-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824519" comment="mariadb-embedded-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824520" comment="mariadb-embedded-devel-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824521" comment="mariadb-libs-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824522" comment="mariadb-server-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824523" comment="mariadb-test-5.5.60-1.el7_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710274" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10274</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10274" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10274" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10274" ref_url="https://www.suse.com/security/cve/CVE-2017-10274" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2989-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2018-January/007678.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2998-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O4VIVCNLR3AUTND2OCCBDJPMRH2Y4HRC/#O4VIVCNLR3AUTND2OCCBDJPMRH2Y4HRC" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AP5LSLYIG36TN25VI6WAOVXYV7J3ACHW/#AP5LSLYIG36TN25VI6WAOVXYV7J3ACHW" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Smart Card IO). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE accessible data as well as unauthorized access to critical data or complete access to all Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 6.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-10274/">CVE-2017-10274 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10274">CVE-2017-10274 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1064071">SUSE bug 1064071</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823842" comment="java-1.7.0-openjdk-1.7.0.161-2.6.12.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823843" comment="java-1.7.0-openjdk-accessibility-1.7.0.161-2.6.12.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823844" comment="java-1.7.0-openjdk-demo-1.7.0.161-2.6.12.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823845" comment="java-1.7.0-openjdk-devel-1.7.0.161-2.6.12.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823846" comment="java-1.7.0-openjdk-headless-1.7.0.161-2.6.12.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823847" comment="java-1.7.0-openjdk-javadoc-1.7.0.161-2.6.12.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823848" comment="java-1.7.0-openjdk-src-1.7.0.161-2.6.12.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823695" comment="java-1.8.0-openjdk-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823696" comment="java-1.8.0-openjdk-accessibility-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823697" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823698" comment="java-1.8.0-openjdk-debug-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823699" comment="java-1.8.0-openjdk-demo-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823700" comment="java-1.8.0-openjdk-demo-debug-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823701" comment="java-1.8.0-openjdk-devel-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823702" comment="java-1.8.0-openjdk-devel-debug-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823703" comment="java-1.8.0-openjdk-headless-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823704" comment="java-1.8.0-openjdk-headless-debug-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823705" comment="java-1.8.0-openjdk-javadoc-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823706" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823707" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823708" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823709" comment="java-1.8.0-openjdk-src-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823710" comment="java-1.8.0-openjdk-src-debug-1.8.0.151-1.b12.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710281" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10281</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10281" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10281" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10281" ref_url="https://www.suse.com/security/cve/CVE-2017-10281" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2989-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2018-January/007678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003584.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2998-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O4VIVCNLR3AUTND2OCCBDJPMRH2Y4HRC/#O4VIVCNLR3AUTND2OCCBDJPMRH2Y4HRC" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AP5LSLYIG36TN25VI6WAOVXYV7J3ACHW/#AP5LSLYIG36TN25VI6WAOVXYV7J3ACHW" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10281/">CVE-2017-10281 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10281">CVE-2017-10281 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1064072">SUSE bug 1064072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070162">SUSE bug 1070162</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823842" comment="java-1.7.0-openjdk-1.7.0.161-2.6.12.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823843" comment="java-1.7.0-openjdk-accessibility-1.7.0.161-2.6.12.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823844" comment="java-1.7.0-openjdk-demo-1.7.0.161-2.6.12.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823845" comment="java-1.7.0-openjdk-devel-1.7.0.161-2.6.12.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823846" comment="java-1.7.0-openjdk-headless-1.7.0.161-2.6.12.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823847" comment="java-1.7.0-openjdk-javadoc-1.7.0.161-2.6.12.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823848" comment="java-1.7.0-openjdk-src-1.7.0.161-2.6.12.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823695" comment="java-1.8.0-openjdk-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823696" comment="java-1.8.0-openjdk-accessibility-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823697" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823698" comment="java-1.8.0-openjdk-debug-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823699" comment="java-1.8.0-openjdk-demo-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823700" comment="java-1.8.0-openjdk-demo-debug-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823701" comment="java-1.8.0-openjdk-devel-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823702" comment="java-1.8.0-openjdk-devel-debug-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823703" comment="java-1.8.0-openjdk-headless-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823704" comment="java-1.8.0-openjdk-headless-debug-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823705" comment="java-1.8.0-openjdk-javadoc-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823706" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823707" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823708" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823709" comment="java-1.8.0-openjdk-src-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823710" comment="java-1.8.0-openjdk-src-debug-1.8.0.151-1.b12.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710285" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10285</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10285" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10285" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10285" ref_url="https://www.suse.com/security/cve/CVE-2017-10285" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2989-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2018-January/007678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003584.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2998-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O4VIVCNLR3AUTND2OCCBDJPMRH2Y4HRC/#O4VIVCNLR3AUTND2OCCBDJPMRH2Y4HRC" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AP5LSLYIG36TN25VI6WAOVXYV7J3ACHW/#AP5LSLYIG36TN25VI6WAOVXYV7J3ACHW" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-30"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10285/">CVE-2017-10285 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10285">CVE-2017-10285 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1064073">SUSE bug 1064073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070162">SUSE bug 1070162</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823842" comment="java-1.7.0-openjdk-1.7.0.161-2.6.12.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823843" comment="java-1.7.0-openjdk-accessibility-1.7.0.161-2.6.12.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823844" comment="java-1.7.0-openjdk-demo-1.7.0.161-2.6.12.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823845" comment="java-1.7.0-openjdk-devel-1.7.0.161-2.6.12.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823846" comment="java-1.7.0-openjdk-headless-1.7.0.161-2.6.12.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823847" comment="java-1.7.0-openjdk-javadoc-1.7.0.161-2.6.12.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823848" comment="java-1.7.0-openjdk-src-1.7.0.161-2.6.12.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823695" comment="java-1.8.0-openjdk-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823696" comment="java-1.8.0-openjdk-accessibility-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823697" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823698" comment="java-1.8.0-openjdk-debug-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823699" comment="java-1.8.0-openjdk-demo-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823700" comment="java-1.8.0-openjdk-demo-debug-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823701" comment="java-1.8.0-openjdk-devel-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823702" comment="java-1.8.0-openjdk-devel-debug-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823703" comment="java-1.8.0-openjdk-headless-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823704" comment="java-1.8.0-openjdk-headless-debug-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823705" comment="java-1.8.0-openjdk-javadoc-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823706" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823707" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823708" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823709" comment="java-1.8.0-openjdk-src-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823710" comment="java-1.8.0-openjdk-src-debug-1.8.0.151-1.b12.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710295" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10295</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10295" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10295" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10295" ref_url="https://www.suse.com/security/cve/CVE-2017-10295" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2989-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2018-January/007678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003584.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2998-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O4VIVCNLR3AUTND2OCCBDJPMRH2Y4HRC/#O4VIVCNLR3AUTND2OCCBDJPMRH2Y4HRC" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AP5LSLYIG36TN25VI6WAOVXYV7J3ACHW/#AP5LSLYIG36TN25VI6WAOVXYV7J3ACHW" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Java SE, Java SE Embedded, JRockit. While the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 4.0 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-07"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-10295/">CVE-2017-10295 at SUSE</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10295">CVE-2017-10295 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1064075">SUSE bug 1064075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070162">SUSE bug 1070162</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823842" comment="java-1.7.0-openjdk-1.7.0.161-2.6.12.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823843" comment="java-1.7.0-openjdk-accessibility-1.7.0.161-2.6.12.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823844" comment="java-1.7.0-openjdk-demo-1.7.0.161-2.6.12.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823845" comment="java-1.7.0-openjdk-devel-1.7.0.161-2.6.12.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823846" comment="java-1.7.0-openjdk-headless-1.7.0.161-2.6.12.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823847" comment="java-1.7.0-openjdk-javadoc-1.7.0.161-2.6.12.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823848" comment="java-1.7.0-openjdk-src-1.7.0.161-2.6.12.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823695" comment="java-1.8.0-openjdk-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823696" comment="java-1.8.0-openjdk-accessibility-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823697" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823698" comment="java-1.8.0-openjdk-debug-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823699" comment="java-1.8.0-openjdk-demo-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823700" comment="java-1.8.0-openjdk-demo-debug-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823701" comment="java-1.8.0-openjdk-devel-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823702" comment="java-1.8.0-openjdk-devel-debug-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823703" comment="java-1.8.0-openjdk-headless-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823704" comment="java-1.8.0-openjdk-headless-debug-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823705" comment="java-1.8.0-openjdk-javadoc-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823706" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823707" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823708" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823709" comment="java-1.8.0-openjdk-src-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823710" comment="java-1.8.0-openjdk-src-debug-1.8.0.151-1.b12.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710345" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10345</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10345" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10345" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10345" ref_url="https://www.suse.com/security/cve/CVE-2017-10345" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2989-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2018-January/007678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003584.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2998-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O4VIVCNLR3AUTND2OCCBDJPMRH2Y4HRC/#O4VIVCNLR3AUTND2OCCBDJPMRH2Y4HRC" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AP5LSLYIG36TN25VI6WAOVXYV7J3ACHW/#AP5LSLYIG36TN25VI6WAOVXYV7J3ACHW" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10345/">CVE-2017-10345 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10345">CVE-2017-10345 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1064077">SUSE bug 1064077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070162">SUSE bug 1070162</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823842" comment="java-1.7.0-openjdk-1.7.0.161-2.6.12.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823843" comment="java-1.7.0-openjdk-accessibility-1.7.0.161-2.6.12.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823844" comment="java-1.7.0-openjdk-demo-1.7.0.161-2.6.12.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823845" comment="java-1.7.0-openjdk-devel-1.7.0.161-2.6.12.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823846" comment="java-1.7.0-openjdk-headless-1.7.0.161-2.6.12.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823847" comment="java-1.7.0-openjdk-javadoc-1.7.0.161-2.6.12.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823848" comment="java-1.7.0-openjdk-src-1.7.0.161-2.6.12.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823695" comment="java-1.8.0-openjdk-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823696" comment="java-1.8.0-openjdk-accessibility-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823697" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823698" comment="java-1.8.0-openjdk-debug-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823699" comment="java-1.8.0-openjdk-demo-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823700" comment="java-1.8.0-openjdk-demo-debug-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823701" comment="java-1.8.0-openjdk-devel-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823702" comment="java-1.8.0-openjdk-devel-debug-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823703" comment="java-1.8.0-openjdk-headless-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823704" comment="java-1.8.0-openjdk-headless-debug-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823705" comment="java-1.8.0-openjdk-javadoc-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823706" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823707" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823708" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823709" comment="java-1.8.0-openjdk-src-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823710" comment="java-1.8.0-openjdk-src-debug-1.8.0.151-1.b12.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710346" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10346</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10346" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10346" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10346" ref_url="https://www.suse.com/security/cve/CVE-2017-10346" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2989-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2018-January/007678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003584.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2998-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O4VIVCNLR3AUTND2OCCBDJPMRH2Y4HRC/#O4VIVCNLR3AUTND2OCCBDJPMRH2Y4HRC" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AP5LSLYIG36TN25VI6WAOVXYV7J3ACHW/#AP5LSLYIG36TN25VI6WAOVXYV7J3ACHW" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Hotspot). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-30"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10346/">CVE-2017-10346 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10346">CVE-2017-10346 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1064078">SUSE bug 1064078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070162">SUSE bug 1070162</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823842" comment="java-1.7.0-openjdk-1.7.0.161-2.6.12.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823843" comment="java-1.7.0-openjdk-accessibility-1.7.0.161-2.6.12.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823844" comment="java-1.7.0-openjdk-demo-1.7.0.161-2.6.12.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823845" comment="java-1.7.0-openjdk-devel-1.7.0.161-2.6.12.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823846" comment="java-1.7.0-openjdk-headless-1.7.0.161-2.6.12.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823847" comment="java-1.7.0-openjdk-javadoc-1.7.0.161-2.6.12.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823848" comment="java-1.7.0-openjdk-src-1.7.0.161-2.6.12.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823695" comment="java-1.8.0-openjdk-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823696" comment="java-1.8.0-openjdk-accessibility-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823697" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823698" comment="java-1.8.0-openjdk-debug-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823699" comment="java-1.8.0-openjdk-demo-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823700" comment="java-1.8.0-openjdk-demo-debug-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823701" comment="java-1.8.0-openjdk-devel-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823702" comment="java-1.8.0-openjdk-devel-debug-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823703" comment="java-1.8.0-openjdk-headless-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823704" comment="java-1.8.0-openjdk-headless-debug-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823705" comment="java-1.8.0-openjdk-javadoc-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823706" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823707" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823708" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823709" comment="java-1.8.0-openjdk-src-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823710" comment="java-1.8.0-openjdk-src-debug-1.8.0.151-1.b12.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710347" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10347</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10347" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10347" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10347" ref_url="https://www.suse.com/security/cve/CVE-2017-10347" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2989-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2018-January/007678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003584.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2998-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O4VIVCNLR3AUTND2OCCBDJPMRH2Y4HRC/#O4VIVCNLR3AUTND2OCCBDJPMRH2Y4HRC" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AP5LSLYIG36TN25VI6WAOVXYV7J3ACHW/#AP5LSLYIG36TN25VI6WAOVXYV7J3ACHW" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, JRockit. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10347/">CVE-2017-10347 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10347">CVE-2017-10347 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1064079">SUSE bug 1064079</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070162">SUSE bug 1070162</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823842" comment="java-1.7.0-openjdk-1.7.0.161-2.6.12.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823843" comment="java-1.7.0-openjdk-accessibility-1.7.0.161-2.6.12.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823844" comment="java-1.7.0-openjdk-demo-1.7.0.161-2.6.12.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823845" comment="java-1.7.0-openjdk-devel-1.7.0.161-2.6.12.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823846" comment="java-1.7.0-openjdk-headless-1.7.0.161-2.6.12.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823847" comment="java-1.7.0-openjdk-javadoc-1.7.0.161-2.6.12.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823848" comment="java-1.7.0-openjdk-src-1.7.0.161-2.6.12.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823695" comment="java-1.8.0-openjdk-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823696" comment="java-1.8.0-openjdk-accessibility-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823697" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823698" comment="java-1.8.0-openjdk-debug-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823699" comment="java-1.8.0-openjdk-demo-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823700" comment="java-1.8.0-openjdk-demo-debug-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823701" comment="java-1.8.0-openjdk-devel-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823702" comment="java-1.8.0-openjdk-devel-debug-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823703" comment="java-1.8.0-openjdk-headless-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823704" comment="java-1.8.0-openjdk-headless-debug-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823705" comment="java-1.8.0-openjdk-javadoc-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823706" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823707" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823708" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823709" comment="java-1.8.0-openjdk-src-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823710" comment="java-1.8.0-openjdk-src-debug-1.8.0.151-1.b12.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710348" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10348</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10348" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10348" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10348" ref_url="https://www.suse.com/security/cve/CVE-2017-10348" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2989-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2018-January/007678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003584.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2998-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O4VIVCNLR3AUTND2OCCBDJPMRH2Y4HRC/#O4VIVCNLR3AUTND2OCCBDJPMRH2Y4HRC" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AP5LSLYIG36TN25VI6WAOVXYV7J3ACHW/#AP5LSLYIG36TN25VI6WAOVXYV7J3ACHW" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10348/">CVE-2017-10348 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10348">CVE-2017-10348 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1064080">SUSE bug 1064080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070162">SUSE bug 1070162</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823842" comment="java-1.7.0-openjdk-1.7.0.161-2.6.12.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823843" comment="java-1.7.0-openjdk-accessibility-1.7.0.161-2.6.12.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823844" comment="java-1.7.0-openjdk-demo-1.7.0.161-2.6.12.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823845" comment="java-1.7.0-openjdk-devel-1.7.0.161-2.6.12.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823846" comment="java-1.7.0-openjdk-headless-1.7.0.161-2.6.12.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823847" comment="java-1.7.0-openjdk-javadoc-1.7.0.161-2.6.12.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823848" comment="java-1.7.0-openjdk-src-1.7.0.161-2.6.12.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823695" comment="java-1.8.0-openjdk-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823696" comment="java-1.8.0-openjdk-accessibility-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823697" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823698" comment="java-1.8.0-openjdk-debug-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823699" comment="java-1.8.0-openjdk-demo-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823700" comment="java-1.8.0-openjdk-demo-debug-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823701" comment="java-1.8.0-openjdk-devel-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823702" comment="java-1.8.0-openjdk-devel-debug-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823703" comment="java-1.8.0-openjdk-headless-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823704" comment="java-1.8.0-openjdk-headless-debug-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823705" comment="java-1.8.0-openjdk-javadoc-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823706" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823707" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823708" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823709" comment="java-1.8.0-openjdk-src-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823710" comment="java-1.8.0-openjdk-src-debug-1.8.0.151-1.b12.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710349" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10349</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10349" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10349" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10349" ref_url="https://www.suse.com/security/cve/CVE-2017-10349" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2989-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2018-January/007678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003584.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2998-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O4VIVCNLR3AUTND2OCCBDJPMRH2Y4HRC/#O4VIVCNLR3AUTND2OCCBDJPMRH2Y4HRC" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AP5LSLYIG36TN25VI6WAOVXYV7J3ACHW/#AP5LSLYIG36TN25VI6WAOVXYV7J3ACHW" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JAXP). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10349/">CVE-2017-10349 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10349">CVE-2017-10349 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1064081">SUSE bug 1064081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070162">SUSE bug 1070162</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823842" comment="java-1.7.0-openjdk-1.7.0.161-2.6.12.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823843" comment="java-1.7.0-openjdk-accessibility-1.7.0.161-2.6.12.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823844" comment="java-1.7.0-openjdk-demo-1.7.0.161-2.6.12.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823845" comment="java-1.7.0-openjdk-devel-1.7.0.161-2.6.12.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823846" comment="java-1.7.0-openjdk-headless-1.7.0.161-2.6.12.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823847" comment="java-1.7.0-openjdk-javadoc-1.7.0.161-2.6.12.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823848" comment="java-1.7.0-openjdk-src-1.7.0.161-2.6.12.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823695" comment="java-1.8.0-openjdk-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823696" comment="java-1.8.0-openjdk-accessibility-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823697" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823698" comment="java-1.8.0-openjdk-debug-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823699" comment="java-1.8.0-openjdk-demo-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823700" comment="java-1.8.0-openjdk-demo-debug-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823701" comment="java-1.8.0-openjdk-devel-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823702" comment="java-1.8.0-openjdk-devel-debug-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823703" comment="java-1.8.0-openjdk-headless-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823704" comment="java-1.8.0-openjdk-headless-debug-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823705" comment="java-1.8.0-openjdk-javadoc-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823706" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823707" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823708" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823709" comment="java-1.8.0-openjdk-src-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823710" comment="java-1.8.0-openjdk-src-debug-1.8.0.151-1.b12.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710350" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10350</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10350" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10350" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10350" ref_url="https://www.suse.com/security/cve/CVE-2017-10350" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2989-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2018-January/007678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003584.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2998-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O4VIVCNLR3AUTND2OCCBDJPMRH2Y4HRC/#O4VIVCNLR3AUTND2OCCBDJPMRH2Y4HRC" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AP5LSLYIG36TN25VI6WAOVXYV7J3ACHW/#AP5LSLYIG36TN25VI6WAOVXYV7J3ACHW" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JAX-WS). Supported versions that are affected are Java SE: 7u151, 8u144 and 9; Java SE Embedded: 8u144. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10350/">CVE-2017-10350 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10350">CVE-2017-10350 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1064082">SUSE bug 1064082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070162">SUSE bug 1070162</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823842" comment="java-1.7.0-openjdk-1.7.0.161-2.6.12.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823843" comment="java-1.7.0-openjdk-accessibility-1.7.0.161-2.6.12.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823844" comment="java-1.7.0-openjdk-demo-1.7.0.161-2.6.12.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823845" comment="java-1.7.0-openjdk-devel-1.7.0.161-2.6.12.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823846" comment="java-1.7.0-openjdk-headless-1.7.0.161-2.6.12.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823847" comment="java-1.7.0-openjdk-javadoc-1.7.0.161-2.6.12.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823848" comment="java-1.7.0-openjdk-src-1.7.0.161-2.6.12.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823695" comment="java-1.8.0-openjdk-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823696" comment="java-1.8.0-openjdk-accessibility-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823697" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823698" comment="java-1.8.0-openjdk-debug-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823699" comment="java-1.8.0-openjdk-demo-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823700" comment="java-1.8.0-openjdk-demo-debug-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823701" comment="java-1.8.0-openjdk-devel-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823702" comment="java-1.8.0-openjdk-devel-debug-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823703" comment="java-1.8.0-openjdk-headless-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823704" comment="java-1.8.0-openjdk-headless-debug-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823705" comment="java-1.8.0-openjdk-javadoc-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823706" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823707" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823708" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823709" comment="java-1.8.0-openjdk-src-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823710" comment="java-1.8.0-openjdk-src-debug-1.8.0.151-1.b12.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710355" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10355</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10355" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10355" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10355" ref_url="https://www.suse.com/security/cve/CVE-2017-10355" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2989-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2018-January/007678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003584.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2998-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O4VIVCNLR3AUTND2OCCBDJPMRH2Y4HRC/#O4VIVCNLR3AUTND2OCCBDJPMRH2Y4HRC" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AP5LSLYIG36TN25VI6WAOVXYV7J3ACHW/#AP5LSLYIG36TN25VI6WAOVXYV7J3ACHW" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10355/">CVE-2017-10355 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10355">CVE-2017-10355 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1064083">SUSE bug 1064083</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070162">SUSE bug 1070162</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823842" comment="java-1.7.0-openjdk-1.7.0.161-2.6.12.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823843" comment="java-1.7.0-openjdk-accessibility-1.7.0.161-2.6.12.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823844" comment="java-1.7.0-openjdk-demo-1.7.0.161-2.6.12.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823845" comment="java-1.7.0-openjdk-devel-1.7.0.161-2.6.12.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823846" comment="java-1.7.0-openjdk-headless-1.7.0.161-2.6.12.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823847" comment="java-1.7.0-openjdk-javadoc-1.7.0.161-2.6.12.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823848" comment="java-1.7.0-openjdk-src-1.7.0.161-2.6.12.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823695" comment="java-1.8.0-openjdk-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823696" comment="java-1.8.0-openjdk-accessibility-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823697" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823698" comment="java-1.8.0-openjdk-debug-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823699" comment="java-1.8.0-openjdk-demo-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823700" comment="java-1.8.0-openjdk-demo-debug-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823701" comment="java-1.8.0-openjdk-devel-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823702" comment="java-1.8.0-openjdk-devel-debug-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823703" comment="java-1.8.0-openjdk-headless-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823704" comment="java-1.8.0-openjdk-headless-debug-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823705" comment="java-1.8.0-openjdk-javadoc-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823706" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823707" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823708" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823709" comment="java-1.8.0-openjdk-src-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823710" comment="java-1.8.0-openjdk-src-debug-1.8.0.151-1.b12.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710356" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10356</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10356" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10356" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10356" ref_url="https://www.suse.com/security/cve/CVE-2017-10356" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2989-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2018-January/007678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003584.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2998-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O4VIVCNLR3AUTND2OCCBDJPMRH2Y4HRC/#O4VIVCNLR3AUTND2OCCBDJPMRH2Y4HRC" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AP5LSLYIG36TN25VI6WAOVXYV7J3ACHW/#AP5LSLYIG36TN25VI6WAOVXYV7J3ACHW" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Java SE, Java SE Embedded, JRockit executes to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 6.2 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10356/">CVE-2017-10356 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10356">CVE-2017-10356 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1064084">SUSE bug 1064084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070162">SUSE bug 1070162</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823842" comment="java-1.7.0-openjdk-1.7.0.161-2.6.12.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823843" comment="java-1.7.0-openjdk-accessibility-1.7.0.161-2.6.12.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823844" comment="java-1.7.0-openjdk-demo-1.7.0.161-2.6.12.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823845" comment="java-1.7.0-openjdk-devel-1.7.0.161-2.6.12.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823846" comment="java-1.7.0-openjdk-headless-1.7.0.161-2.6.12.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823847" comment="java-1.7.0-openjdk-javadoc-1.7.0.161-2.6.12.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823848" comment="java-1.7.0-openjdk-src-1.7.0.161-2.6.12.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823695" comment="java-1.8.0-openjdk-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823696" comment="java-1.8.0-openjdk-accessibility-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823697" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823698" comment="java-1.8.0-openjdk-debug-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823699" comment="java-1.8.0-openjdk-demo-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823700" comment="java-1.8.0-openjdk-demo-debug-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823701" comment="java-1.8.0-openjdk-devel-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823702" comment="java-1.8.0-openjdk-devel-debug-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823703" comment="java-1.8.0-openjdk-headless-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823704" comment="java-1.8.0-openjdk-headless-debug-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823705" comment="java-1.8.0-openjdk-javadoc-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823706" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823707" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823708" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823709" comment="java-1.8.0-openjdk-src-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823710" comment="java-1.8.0-openjdk-src-debug-1.8.0.151-1.b12.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710357" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10357</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10357" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10357" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10357" ref_url="https://www.suse.com/security/cve/CVE-2017-10357" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2989-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2018-January/007678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003584.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2998-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O4VIVCNLR3AUTND2OCCBDJPMRH2Y4HRC/#O4VIVCNLR3AUTND2OCCBDJPMRH2Y4HRC" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AP5LSLYIG36TN25VI6WAOVXYV7J3ACHW/#AP5LSLYIG36TN25VI6WAOVXYV7J3ACHW" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10357/">CVE-2017-10357 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10357">CVE-2017-10357 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1064085">SUSE bug 1064085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070162">SUSE bug 1070162</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823842" comment="java-1.7.0-openjdk-1.7.0.161-2.6.12.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823843" comment="java-1.7.0-openjdk-accessibility-1.7.0.161-2.6.12.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823844" comment="java-1.7.0-openjdk-demo-1.7.0.161-2.6.12.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823845" comment="java-1.7.0-openjdk-devel-1.7.0.161-2.6.12.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823846" comment="java-1.7.0-openjdk-headless-1.7.0.161-2.6.12.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823847" comment="java-1.7.0-openjdk-javadoc-1.7.0.161-2.6.12.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823848" comment="java-1.7.0-openjdk-src-1.7.0.161-2.6.12.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823695" comment="java-1.8.0-openjdk-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823696" comment="java-1.8.0-openjdk-accessibility-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823697" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823698" comment="java-1.8.0-openjdk-debug-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823699" comment="java-1.8.0-openjdk-demo-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823700" comment="java-1.8.0-openjdk-demo-debug-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823701" comment="java-1.8.0-openjdk-devel-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823702" comment="java-1.8.0-openjdk-devel-debug-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823703" comment="java-1.8.0-openjdk-headless-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823704" comment="java-1.8.0-openjdk-headless-debug-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823705" comment="java-1.8.0-openjdk-javadoc-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823706" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823707" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823708" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823709" comment="java-1.8.0-openjdk-src-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823710" comment="java-1.8.0-openjdk-src-debug-1.8.0.151-1.b12.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710378" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10378</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10378" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10378" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10378" ref_url="https://www.suse.com/security/cve/CVE-2017-10378" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003393.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004235.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2868-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Z7DVWELHOI3HIW2TCX7MRYG6JIMYW4R2/#Z7DVWELHOI3HIW2TCX7MRYG6JIMYW4R2" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.57 and earlier, 5.6.37 and earlier and 5.7.11 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10378/">CVE-2017-10378 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10378">CVE-2017-10378 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1064115">SUSE bug 1064115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064119">SUSE bug 1064119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076505">SUSE bug 1076505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076506">SUSE bug 1076506</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824516" comment="mariadb-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824517" comment="mariadb-bench-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824518" comment="mariadb-devel-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824519" comment="mariadb-embedded-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824520" comment="mariadb-embedded-devel-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824521" comment="mariadb-libs-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824522" comment="mariadb-server-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824523" comment="mariadb-test-5.5.60-1.el7_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710379" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10379</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10379" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10379" ref_url="https://www.suse.com/security/cve/CVE-2017-10379" source="SUSE CVE"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003393.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004235.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2868-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Z7DVWELHOI3HIW2TCX7MRYG6JIMYW4R2/#Z7DVWELHOI3HIW2TCX7MRYG6JIMYW4R2" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client programs). Supported versions that are affected are 5.5.57 and earlier, 5.6.37 and earlier and 5.7.19 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data. CVSS 3.0 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10379/">CVE-2017-10379 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10379">CVE-2017-10379 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1064116">SUSE bug 1064116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064119">SUSE bug 1064119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076506">SUSE bug 1076506</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824516" comment="mariadb-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824517" comment="mariadb-bench-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824518" comment="mariadb-devel-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824519" comment="mariadb-embedded-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824520" comment="mariadb-embedded-devel-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824521" comment="mariadb-libs-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824522" comment="mariadb-server-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824523" comment="mariadb-test-5.5.60-1.el7_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710384" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10384</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10384" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10384" ref_url="https://www.suse.com/security/cve/CVE-2017-10384" source="SUSE CVE"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003393.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004235.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2868-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Z7DVWELHOI3HIW2TCX7MRYG6JIMYW4R2/#Z7DVWELHOI3HIW2TCX7MRYG6JIMYW4R2" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.57 and earlier 5.6.37 and earlier 5.7.19 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10384/">CVE-2017-10384 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10384">CVE-2017-10384 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1064117">SUSE bug 1064117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064119">SUSE bug 1064119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076506">SUSE bug 1076506</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824516" comment="mariadb-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824517" comment="mariadb-bench-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824518" comment="mariadb-devel-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824519" comment="mariadb-embedded-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824520" comment="mariadb-embedded-devel-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824521" comment="mariadb-libs-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824522" comment="mariadb-server-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824523" comment="mariadb-test-5.5.60-1.el7_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710388" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10388</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10388" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10388" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10388" ref_url="https://www.suse.com/security/cve/CVE-2017-10388" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2989-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2018-January/007678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003584.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2998-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O4VIVCNLR3AUTND2OCCBDJPMRH2Y4HRC/#O4VIVCNLR3AUTND2OCCBDJPMRH2Y4HRC" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AP5LSLYIG36TN25VI6WAOVXYV7J3ACHW/#AP5LSLYIG36TN25VI6WAOVXYV7J3ACHW" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144. Difficult to exploit vulnerability allows unauthenticated attacker with network access via Kerberos to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: Applies to the Java SE Kerberos client. CVSS 3.0 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-10388/">CVE-2017-10388 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10388">CVE-2017-10388 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1064086">SUSE bug 1064086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070162">SUSE bug 1070162</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823842" comment="java-1.7.0-openjdk-1.7.0.161-2.6.12.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823843" comment="java-1.7.0-openjdk-accessibility-1.7.0.161-2.6.12.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823844" comment="java-1.7.0-openjdk-demo-1.7.0.161-2.6.12.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823845" comment="java-1.7.0-openjdk-devel-1.7.0.161-2.6.12.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823846" comment="java-1.7.0-openjdk-headless-1.7.0.161-2.6.12.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823847" comment="java-1.7.0-openjdk-javadoc-1.7.0.161-2.6.12.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823848" comment="java-1.7.0-openjdk-src-1.7.0.161-2.6.12.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823695" comment="java-1.8.0-openjdk-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823696" comment="java-1.8.0-openjdk-accessibility-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823697" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823698" comment="java-1.8.0-openjdk-debug-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823699" comment="java-1.8.0-openjdk-demo-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823700" comment="java-1.8.0-openjdk-demo-debug-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823701" comment="java-1.8.0-openjdk-devel-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823702" comment="java-1.8.0-openjdk-devel-debug-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823703" comment="java-1.8.0-openjdk-headless-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823704" comment="java-1.8.0-openjdk-headless-debug-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823705" comment="java-1.8.0-openjdk-javadoc-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823706" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823707" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823708" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823709" comment="java-1.8.0-openjdk-src-1.8.0.151-1.b12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823710" comment="java-1.8.0-openjdk-src-debug-1.8.0.151-1.b12.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710661" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10661</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10661" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10661" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10661" ref_url="https://www.suse.com/security/cve/CVE-2017-10661" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003500.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003502.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003507.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003509.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003510.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3304-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003513.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003514.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003526.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3340-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003537.html" source="SUSE-SU"/>
    <description>
    Race condition in fs/timerfd.c in the Linux kernel before 4.10.15 allows local users to gain privileges or cause a denial of service (list corruption or use-after-free) via simultaneous file-descriptor operations that leverage improper might_cancel queueing.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10661/">CVE-2017-10661 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10661">CVE-2017-10661 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1053152">SUSE bug 1053152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053153">SUSE bug 1053153</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115893">SUSE bug 1115893</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824786" comment="bpftool-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824787" comment="kernel-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824788" comment="kernel-abi-whitelists-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824789" comment="kernel-debug-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824792" comment="kernel-doc-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824793" comment="kernel-headers-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824794" comment="kernel-tools-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824795" comment="kernel-tools-libs-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824797" comment="perf-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824798" comment="python-perf-3.10.0-957.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710664" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10664</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10664" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10664" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10664" ref_url="https://www.suse.com/security/cve/CVE-2017-10664" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2327-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003397.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2936-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2963-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003413.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2394-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NSCRDZ2SSU3A7UIHH6UDINU2CBUFGZHQ/#NSCRDZ2SSU3A7UIHH6UDINU2CBUFGZHQ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2398-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IUHKBRFLKIRYEWIJATEEGVTNCRQTBC5S/#IUHKBRFLKIRYEWIJATEEGVTNCRQTBC5S" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2513-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/A2KPRZOY7YYKVWPW2XDKEGFUKUFWPQ7K/#A2KPRZOY7YYKVWPW2XDKEGFUKUFWPQ7K" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2941-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NIVAYUS4Z3IDRS3LK2TACYUZB2ORNQTR/#NIVAYUS4Z3IDRS3LK2TACYUZB2ORNQTR" source="SUSE-SU"/>
    <description>
    qemu-nbd in QEMU (aka Quick Emulator) does not ignore SIGPIPE, which allows remote attackers to cause a denial of service (daemon crash) by disconnecting during a server-to-client reply attempt.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10664/">CVE-2017-10664 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10664">CVE-2017-10664 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1046636">SUSE bug 1046636</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046637">SUSE bug 1046637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823518" comment="qemu-img-1.5.3-141.el7_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823519" comment="qemu-kvm-1.5.3-141.el7_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823520" comment="qemu-kvm-common-1.5.3-141.el7_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823521" comment="qemu-kvm-tools-1.5.3-141.el7_4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710784" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10784</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10784" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10784" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10784" ref_url="https://www.suse.com/security/cve/CVE-2017-10784" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
    <description>
    The Basic authentication code in WEBrick library in Ruby before 2.2.8, 2.3.x before 2.3.5, and 2.4.x through 2.4.1 allows remote attackers to inject terminal emulator escape sequences into its log and possibly execute arbitrary commands via a crafted user name.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-10784/">CVE-2017-10784 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10784">CVE-2017-10784 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1058754">SUSE bug 1058754</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824000" comment="ruby-2.0.0.648-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824001" comment="ruby-devel-2.0.0.648-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824002" comment="ruby-doc-2.0.0.648-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824003" comment="ruby-irb-2.0.0.648-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824004" comment="ruby-libs-2.0.0.648-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824005" comment="ruby-tcltk-2.0.0.648-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824006" comment="rubygem-bigdecimal-1.2.0-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824007" comment="rubygem-io-console-0.4.2-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824008" comment="rubygem-json-1.7.7-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824009" comment="rubygem-minitest-4.3.2-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824010" comment="rubygem-psych-2.0.0-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824011" comment="rubygem-rake-0.9.6-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824012" comment="rubygem-rdoc-4.0.0-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824013" comment="rubygems-2.0.14.1-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824014" comment="rubygems-devel-2.0.14.1-33.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710978" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10978</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10978" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10978" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10978" ref_url="https://www.suse.com/security/cve/CVE-2017-10978" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003154.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2270-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5EM5VXMOJGRTEUTBNPTAVO5JFD2OF4ZQ/#5EM5VXMOJGRTEUTBNPTAVO5JFD2OF4ZQ" source="SUSE-SU"/>
    <description>
    An FR-GV-201 issue in FreeRADIUS 2.x before 2.2.10 and 3.x before 3.0.15 allows "Read / write overflow in make_secret()" and a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-21"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-10978/">CVE-2017-10978 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10978">CVE-2017-10978 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1049086">SUSE bug 1049086</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823496" comment="freeradius-3.0.13-8.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823497" comment="freeradius-devel-3.0.13-8.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823498" comment="freeradius-doc-3.0.13-8.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823499" comment="freeradius-krb5-3.0.13-8.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823500" comment="freeradius-ldap-3.0.13-8.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823501" comment="freeradius-mysql-3.0.13-8.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823502" comment="freeradius-perl-3.0.13-8.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823503" comment="freeradius-postgresql-3.0.13-8.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823504" comment="freeradius-python-3.0.13-8.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823505" comment="freeradius-sqlite-3.0.13-8.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823506" comment="freeradius-unixODBC-3.0.13-8.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823507" comment="freeradius-utils-3.0.13-8.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710983" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10983</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10983" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10983" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10983" ref_url="https://www.suse.com/security/cve/CVE-2017-10983" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003154.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2270-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5EM5VXMOJGRTEUTBNPTAVO5JFD2OF4ZQ/#5EM5VXMOJGRTEUTBNPTAVO5JFD2OF4ZQ" source="SUSE-SU"/>
    <description>
    An FR-GV-206 issue in FreeRADIUS 2.x before 2.2.10 and 3.x before 3.0.15 allows "DHCP - Read overflow when decoding option 63" and a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-30"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-10983/">CVE-2017-10983 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10983">CVE-2017-10983 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1049086">SUSE bug 1049086</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823496" comment="freeradius-3.0.13-8.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823497" comment="freeradius-devel-3.0.13-8.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823498" comment="freeradius-doc-3.0.13-8.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823499" comment="freeradius-krb5-3.0.13-8.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823500" comment="freeradius-ldap-3.0.13-8.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823501" comment="freeradius-mysql-3.0.13-8.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823502" comment="freeradius-perl-3.0.13-8.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823503" comment="freeradius-postgresql-3.0.13-8.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823504" comment="freeradius-python-3.0.13-8.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823505" comment="freeradius-sqlite-3.0.13-8.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823506" comment="freeradius-unixODBC-3.0.13-8.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823507" comment="freeradius-utils-3.0.13-8.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710984" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10984</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10984" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10984" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10984" ref_url="https://www.suse.com/security/cve/CVE-2017-10984" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003153.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2270-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5EM5VXMOJGRTEUTBNPTAVO5JFD2OF4ZQ/#5EM5VXMOJGRTEUTBNPTAVO5JFD2OF4ZQ" source="SUSE-SU"/>
    <description>
    An FR-GV-301 issue in FreeRADIUS 3.x before 3.0.15 allows "Write overflow in data2vp_wimax()" - this allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-22"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10984/">CVE-2017-10984 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10984">CVE-2017-10984 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1049086">SUSE bug 1049086</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823496" comment="freeradius-3.0.13-8.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823497" comment="freeradius-devel-3.0.13-8.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823498" comment="freeradius-doc-3.0.13-8.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823499" comment="freeradius-krb5-3.0.13-8.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823500" comment="freeradius-ldap-3.0.13-8.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823501" comment="freeradius-mysql-3.0.13-8.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823502" comment="freeradius-perl-3.0.13-8.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823503" comment="freeradius-postgresql-3.0.13-8.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823504" comment="freeradius-python-3.0.13-8.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823505" comment="freeradius-sqlite-3.0.13-8.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823506" comment="freeradius-unixODBC-3.0.13-8.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823507" comment="freeradius-utils-3.0.13-8.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710985" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10985</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10985" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10985" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10985" ref_url="https://www.suse.com/security/cve/CVE-2017-10985" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003153.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2270-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5EM5VXMOJGRTEUTBNPTAVO5JFD2OF4ZQ/#5EM5VXMOJGRTEUTBNPTAVO5JFD2OF4ZQ" source="SUSE-SU"/>
    <description>
    An FR-GV-302 issue in FreeRADIUS 3.x before 3.0.15 allows "Infinite loop and memory exhaustion with 'concat' attributes" and a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-10985/">CVE-2017-10985 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10985">CVE-2017-10985 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1049086">SUSE bug 1049086</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823496" comment="freeradius-3.0.13-8.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823497" comment="freeradius-devel-3.0.13-8.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823498" comment="freeradius-doc-3.0.13-8.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823499" comment="freeradius-krb5-3.0.13-8.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823500" comment="freeradius-ldap-3.0.13-8.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823501" comment="freeradius-mysql-3.0.13-8.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823502" comment="freeradius-perl-3.0.13-8.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823503" comment="freeradius-postgresql-3.0.13-8.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823504" comment="freeradius-python-3.0.13-8.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823505" comment="freeradius-sqlite-3.0.13-8.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823506" comment="freeradius-unixODBC-3.0.13-8.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823507" comment="freeradius-utils-3.0.13-8.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710986" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10986</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10986" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10986" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10986" ref_url="https://www.suse.com/security/cve/CVE-2017-10986" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003144.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2270-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5EM5VXMOJGRTEUTBNPTAVO5JFD2OF4ZQ/#5EM5VXMOJGRTEUTBNPTAVO5JFD2OF4ZQ" source="SUSE-SU"/>
    <description>
    An FR-GV-303 issue in FreeRADIUS 3.x before 3.0.15 allows "DHCP - Infinite read in dhcp_attr2vp()" and a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-10986/">CVE-2017-10986 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10986">CVE-2017-10986 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1049086">SUSE bug 1049086</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823496" comment="freeradius-3.0.13-8.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823497" comment="freeradius-devel-3.0.13-8.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823498" comment="freeradius-doc-3.0.13-8.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823499" comment="freeradius-krb5-3.0.13-8.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823500" comment="freeradius-ldap-3.0.13-8.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823501" comment="freeradius-mysql-3.0.13-8.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823502" comment="freeradius-perl-3.0.13-8.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823503" comment="freeradius-postgresql-3.0.13-8.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823504" comment="freeradius-python-3.0.13-8.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823505" comment="freeradius-sqlite-3.0.13-8.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823506" comment="freeradius-unixODBC-3.0.13-8.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823507" comment="freeradius-utils-3.0.13-8.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710987" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10987</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10987" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10987" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10987" ref_url="https://www.suse.com/security/cve/CVE-2017-10987" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003153.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2270-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5EM5VXMOJGRTEUTBNPTAVO5JFD2OF4ZQ/#5EM5VXMOJGRTEUTBNPTAVO5JFD2OF4ZQ" source="SUSE-SU"/>
    <description>
    An FR-GV-304 issue in FreeRADIUS 3.x before 3.0.15 allows "DHCP - Buffer over-read in fr_dhcp_decode_suboptions()" and a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-10987/">CVE-2017-10987 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10987">CVE-2017-10987 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1049086">SUSE bug 1049086</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823496" comment="freeradius-3.0.13-8.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823497" comment="freeradius-devel-3.0.13-8.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823498" comment="freeradius-doc-3.0.13-8.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823499" comment="freeradius-krb5-3.0.13-8.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823500" comment="freeradius-ldap-3.0.13-8.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823501" comment="freeradius-mysql-3.0.13-8.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823502" comment="freeradius-perl-3.0.13-8.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823503" comment="freeradius-postgresql-3.0.13-8.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823504" comment="freeradius-python-3.0.13-8.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823505" comment="freeradius-sqlite-3.0.13-8.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823506" comment="freeradius-unixODBC-3.0.13-8.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823507" comment="freeradius-utils-3.0.13-8.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11166</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11166" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11166" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11166" ref_url="https://www.suse.com/security/cve/CVE-2017-11166" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003769.html" source="SUSE-SU"/>
    <description>
    The ReadXWDImage function in coders\xwd.c in ImageMagick 7.0.5-6 has a memory leak vulnerability that can cause memory exhaustion via a crafted length (number of color-map entries) field in the header of an XWD file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11166/">CVE-2017-11166 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11166">CVE-2017-11166 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1048110">SUSE bug 1048110</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827880" comment="ImageMagick-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827881" comment="ImageMagick-c++-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827882" comment="ImageMagick-c++-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827883" comment="ImageMagick-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827884" comment="ImageMagick-doc-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827885" comment="ImageMagick-perl-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827886" comment="autotrace-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827887" comment="autotrace-devel-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827888" comment="emacs-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827889" comment="emacs-common-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827890" comment="emacs-el-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827891" comment="emacs-filesystem-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827892" comment="emacs-nox-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827893" comment="emacs-terminal-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827894" comment="inkscape-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827895" comment="inkscape-docs-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827896" comment="inkscape-view-0.92.2-3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711176" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11176</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11176" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11176" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11176" ref_url="https://www.suse.com/security/cve/CVE-2017-11176" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003367.html" source="SUSE-SU"/>
    <description>
    The mq_notify function in the Linux kernel through 4.11.9 does not set the sock pointer to NULL upon entry into the retry logic. During a user-space close of a Netlink socket, it allows attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-11176/">CVE-2017-11176 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11176">CVE-2017-11176 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1048275">SUSE bug 1048275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115893">SUSE bug 1115893</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823683" comment="kernel-3.10.0-693.5.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823684" comment="kernel-abi-whitelists-3.10.0-693.5.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823685" comment="kernel-debug-3.10.0-693.5.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823688" comment="kernel-doc-3.10.0-693.5.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823689" comment="kernel-headers-3.10.0-693.5.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823690" comment="kernel-tools-3.10.0-693.5.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823691" comment="kernel-tools-libs-3.10.0-693.5.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823693" comment="perf-3.10.0-693.5.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823694" comment="python-perf-3.10.0-693.5.2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711368" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11368</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11368" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11368" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11368" ref_url="https://www.suse.com/security/cve/CVE-2017-11368" source="SUSE CVE"/>
    <description>
    In MIT Kerberos 5 (aka krb5) 1.7 and later, an authenticated attacker can cause a KDC assertion failure by sending invalid S4U2Self or S4U2Proxy requests.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11368/">CVE-2017-11368 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11368">CVE-2017-11368 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1049819">SUSE bug 1049819</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824068" comment="krb5-devel-1.15.1-18.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824069" comment="krb5-libs-1.15.1-18.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824070" comment="krb5-pkinit-1.15.1-18.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824071" comment="krb5-server-1.15.1-18.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824072" comment="krb5-server-ldap-1.15.1-18.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824073" comment="krb5-workstation-1.15.1-18.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824074" comment="libkadm5-1.15.1-18.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711600" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11600</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11600" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11600" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11600" ref_url="https://www.suse.com/security/cve/CVE-2017-11600" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3410-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003550.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003629.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004468.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3358-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4UYJRYWN3YIKVO45AOJQMXXWEWZ76QPX/#4UYJRYWN3YIKVO45AOJQMXXWEWZ76QPX" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3359-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KNOTZX2CMPWZWZ2GTPQ2RA6T3XMG2V5Y/#KNOTZX2CMPWZWZ2GTPQ2RA6T3XMG2V5Y" source="SUSE-SU"/>
    <description>
    net/xfrm/xfrm_policy.c in the Linux kernel through 4.12.3, when CONFIG_XFRM_MIGRATE is enabled, does not ensure that the dir value of xfrm_userpolicy_id is XFRM_POLICY_MAX or less, which allows local users to cause a denial of service (out-of-bounds access) or possibly have unspecified other impact via an XFRM_MSG_MIGRATE xfrm Netlink message.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-11600/">CVE-2017-11600 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11600">CVE-2017-11600 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1050231">SUSE bug 1050231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096564">SUSE bug 1096564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115893">SUSE bug 1115893</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824381" comment="kernel-3.10.0-862.6.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824382" comment="kernel-abi-whitelists-3.10.0-862.6.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824383" comment="kernel-debug-3.10.0-862.6.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824386" comment="kernel-doc-3.10.0-862.6.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824387" comment="kernel-headers-3.10.0-862.6.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824388" comment="kernel-tools-3.10.0-862.6.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824389" comment="kernel-tools-libs-3.10.0-862.6.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824391" comment="perf-3.10.0-862.6.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824392" comment="python-perf-3.10.0-862.6.3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711671" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11671</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11671" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11671" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11671" ref_url="https://www.suse.com/security/cve/CVE-2017-11671" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003249.html" source="SUSE-SU"/>
    <description>
    Under certain circumstances, the ix86_expand_builtin function in i386.c in GNU Compiler Collection (GCC) version 4.6, 4.7, 4.8, 4.9, 5 before 5.5, and 6 before 6.4 will generate instruction sequences that clobber the status flag of the RDRAND and RDSEED intrinsics before it can be read, potentially causing failures of these instructions to go unreported. This could potentially lead to less randomness in random number generation.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-11671/">CVE-2017-11671 at SUSE</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11671">CVE-2017-11671 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1050947">SUSE bug 1050947</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824087" comment="cpp-4.8.5-28.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824088" comment="gcc-4.8.5-28.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824089" comment="gcc-c++-4.8.5-28.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824090" comment="gcc-gfortran-4.8.5-28.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824091" comment="gcc-gnat-4.8.5-28.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824092" comment="gcc-go-4.8.5-28.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824093" comment="gcc-objc-4.8.5-28.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824094" comment="gcc-objc++-4.8.5-28.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824095" comment="gcc-plugin-devel-4.8.5-28.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824096" comment="libasan-4.8.5-28.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824097" comment="libasan-static-4.8.5-28.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824098" comment="libatomic-4.8.5-28.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824099" comment="libatomic-static-4.8.5-28.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824100" comment="libgcc-4.8.5-28.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824101" comment="libgfortran-4.8.5-28.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824102" comment="libgfortran-static-4.8.5-28.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824103" comment="libgnat-4.8.5-28.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824104" comment="libgnat-devel-4.8.5-28.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824105" comment="libgnat-static-4.8.5-28.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824106" comment="libgo-4.8.5-28.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824107" comment="libgo-devel-4.8.5-28.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824108" comment="libgo-static-4.8.5-28.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824109" comment="libgomp-4.8.5-28.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824110" comment="libitm-4.8.5-28.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824111" comment="libitm-devel-4.8.5-28.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824112" comment="libitm-static-4.8.5-28.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824113" comment="libmudflap-4.8.5-28.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824114" comment="libmudflap-devel-4.8.5-28.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824115" comment="libmudflap-static-4.8.5-28.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824116" comment="libobjc-4.8.5-28.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824117" comment="libquadmath-4.8.5-28.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824118" comment="libquadmath-devel-4.8.5-28.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824119" comment="libquadmath-static-4.8.5-28.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824120" comment="libstdc++-4.8.5-28.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824121" comment="libstdc++-devel-4.8.5-28.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824122" comment="libstdc++-docs-4.8.5-28.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824123" comment="libstdc++-static-4.8.5-28.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824124" comment="libtsan-4.8.5-28.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824125" comment="libtsan-static-4.8.5-28.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712132" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12132</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12132" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12132" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12132" ref_url="https://www.suse.com/security/cve/CVE-2017-12132" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004372.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0494-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CRF5MPDADQ4YUE6MODU4JUS5YDCKTOEA/#CRF5MPDADQ4YUE6MODU4JUS5YDCKTOEA" source="SUSE-SU"/>
    <description>
    The DNS stub resolver in the GNU C Library (aka glibc or libc6) before version 2.26, when EDNS support is enabled, will solicit large UDP responses from name servers, potentially simplifying off-path DNS spoofing attacks due to IP fragmentation.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-12132/">CVE-2017-12132 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12132">CVE-2017-12132 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1051791">SUSE bug 1051791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123874">SUSE bug 1123874</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824075" comment="glibc-2.17-222.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824076" comment="glibc-common-2.17-222.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824077" comment="glibc-devel-2.17-222.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824078" comment="glibc-headers-2.17-222.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824079" comment="glibc-static-2.17-222.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824080" comment="glibc-utils-2.17-222.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824081" comment="nscd-2.17-222.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712150" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12150</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12150" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12150" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12150" ref_url="https://www.suse.com/security/cve/CVE-2017-12150" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2650-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2726-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003453.html" source="SUSE-SU"/>
    <description>
    It was found that samba before 4.4.16, 4.5.x before 4.5.14, and 4.6.x before 4.6.8 did not enforce "SMB signing" when certain configuration options were enabled. A remote attacker could launch a man-in-the-middle attack and retrieve information in plain-text.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-12150/">CVE-2017-12150 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12150">CVE-2017-12150 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1058622">SUSE bug 1058622</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823639" comment="ctdb-4.6.2-11.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823640" comment="ctdb-tests-4.6.2-11.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823641" comment="libsmbclient-4.6.2-11.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823642" comment="libsmbclient-devel-4.6.2-11.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823643" comment="libwbclient-4.6.2-11.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823644" comment="libwbclient-devel-4.6.2-11.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823645" comment="samba-4.6.2-11.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823646" comment="samba-client-4.6.2-11.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823647" comment="samba-client-libs-4.6.2-11.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823648" comment="samba-common-4.6.2-11.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823649" comment="samba-common-libs-4.6.2-11.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823650" comment="samba-common-tools-4.6.2-11.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823651" comment="samba-dc-4.6.2-11.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823652" comment="samba-dc-libs-4.6.2-11.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823653" comment="samba-devel-4.6.2-11.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823654" comment="samba-krb5-printing-4.6.2-11.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823655" comment="samba-libs-4.6.2-11.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823656" comment="samba-pidl-4.6.2-11.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823657" comment="samba-python-4.6.2-11.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823658" comment="samba-test-4.6.2-11.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823659" comment="samba-test-libs-4.6.2-11.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823660" comment="samba-vfs-glusterfs-4.6.2-11.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823661" comment="samba-winbind-4.6.2-11.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823662" comment="samba-winbind-clients-4.6.2-11.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823663" comment="samba-winbind-krb5-locator-4.6.2-11.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823664" comment="samba-winbind-modules-4.6.2-11.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712151" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12151</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12151" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12151" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12151" ref_url="https://www.suse.com/security/cve/CVE-2017-12151" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2650-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2726-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003453.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the way samba client before samba 4.4.16, samba 4.5.14 and samba 4.6.8 used encryption with the max protocol set as SMB3. The connection could lose the requirement for signing and encrypting to any DFS redirects, allowing an attacker to read or alter the contents of the connection via a man-in-the-middle attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-12151/">CVE-2017-12151 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12151">CVE-2017-12151 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1058565">SUSE bug 1058565</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823639" comment="ctdb-4.6.2-11.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823640" comment="ctdb-tests-4.6.2-11.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823641" comment="libsmbclient-4.6.2-11.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823642" comment="libsmbclient-devel-4.6.2-11.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823643" comment="libwbclient-4.6.2-11.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823644" comment="libwbclient-devel-4.6.2-11.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823645" comment="samba-4.6.2-11.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823646" comment="samba-client-4.6.2-11.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823647" comment="samba-client-libs-4.6.2-11.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823648" comment="samba-common-4.6.2-11.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823649" comment="samba-common-libs-4.6.2-11.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823650" comment="samba-common-tools-4.6.2-11.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823651" comment="samba-dc-4.6.2-11.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823652" comment="samba-dc-libs-4.6.2-11.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823653" comment="samba-devel-4.6.2-11.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823654" comment="samba-krb5-printing-4.6.2-11.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823655" comment="samba-libs-4.6.2-11.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823656" comment="samba-pidl-4.6.2-11.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823657" comment="samba-python-4.6.2-11.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823658" comment="samba-test-4.6.2-11.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823659" comment="samba-test-libs-4.6.2-11.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823660" comment="samba-vfs-glusterfs-4.6.2-11.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823661" comment="samba-winbind-4.6.2-11.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823662" comment="samba-winbind-clients-4.6.2-11.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823663" comment="samba-winbind-krb5-locator-4.6.2-11.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823664" comment="samba-winbind-modules-4.6.2-11.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712154" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12154</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12154" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12154" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12154" ref_url="https://www.suse.com/security/cve/CVE-2017-12154" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2956-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003385.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2739-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YAGLLWTW52CL2EANHYBSPEELC5M2ZW45/#YAGLLWTW52CL2EANHYBSPEELC5M2ZW45" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2741-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OEEY2PRTREONRYLJOOZKK5RRVRZM4Y7H/#OEEY2PRTREONRYLJOOZKK5RRVRZM4Y7H" source="SUSE-SU"/>
    <description>
    The prepare_vmcs02 function in arch/x86/kvm/vmx.c in the Linux kernel through 4.13.3 does not ensure that the "CR8-load exiting" and "CR8-store exiting" L0 vmcs02 controls exist in cases where L1 omits the "use TPR shadow" vmcs12 control, which allows KVM L2 guest OS users to obtain read and write access to the hardware CR8 register.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12154/">CVE-2017-12154 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12154">CVE-2017-12154 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1058038">SUSE bug 1058038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058507">SUSE bug 1058507</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824165" comment="kernel-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824166" comment="kernel-abi-whitelists-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824167" comment="kernel-debug-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824170" comment="kernel-doc-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824171" comment="kernel-headers-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824172" comment="kernel-tools-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824173" comment="kernel-tools-libs-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824175" comment="perf-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824176" comment="python-perf-3.10.0-862.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712163" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12163</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12163" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12163" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12163" ref_url="https://www.suse.com/security/cve/CVE-2017-12163" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2650-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2726-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003453.html" source="SUSE-SU"/>
    <description>
    An information leak flaw was found in the way SMB1 protocol was implemented by Samba before 4.4.16, 4.5.x before 4.5.14, and 4.6.x before 4.6.8. A malicious client could use this flaw to dump server memory contents to a file on the samba share or to a shared printer, though the exact area of server memory cannot be controlled by the attacker.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12163/">CVE-2017-12163 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.0/AV:A/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12163">CVE-2017-12163 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1058410">SUSE bug 1058410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058624">SUSE bug 1058624</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823639" comment="ctdb-4.6.2-11.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823640" comment="ctdb-tests-4.6.2-11.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823641" comment="libsmbclient-4.6.2-11.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823642" comment="libsmbclient-devel-4.6.2-11.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823643" comment="libwbclient-4.6.2-11.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823644" comment="libwbclient-devel-4.6.2-11.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823645" comment="samba-4.6.2-11.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823646" comment="samba-client-4.6.2-11.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823647" comment="samba-client-libs-4.6.2-11.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823648" comment="samba-common-4.6.2-11.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823649" comment="samba-common-libs-4.6.2-11.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823650" comment="samba-common-tools-4.6.2-11.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823651" comment="samba-dc-4.6.2-11.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823652" comment="samba-dc-libs-4.6.2-11.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823653" comment="samba-devel-4.6.2-11.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823654" comment="samba-krb5-printing-4.6.2-11.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823655" comment="samba-libs-4.6.2-11.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823656" comment="samba-pidl-4.6.2-11.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823657" comment="samba-python-4.6.2-11.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823658" comment="samba-test-4.6.2-11.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823659" comment="samba-test-libs-4.6.2-11.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823660" comment="samba-vfs-glusterfs-4.6.2-11.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823661" comment="samba-winbind-4.6.2-11.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823662" comment="samba-winbind-clients-4.6.2-11.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823663" comment="samba-winbind-krb5-locator-4.6.2-11.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823664" comment="samba-winbind-modules-4.6.2-11.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712172" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12172</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12172" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12172" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12172" ref_url="https://www.suse.com/security/cve/CVE-2017-12172" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003595.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003597.html" source="SUSE-SU"/>
    <description>
    PostgreSQL 10.x before 10.1, 9.6.x before 9.6.6, 9.5.x before 9.5.10, 9.4.x before 9.4.15, 9.3.x before 9.3.20, and 9.2.x before 9.2.24 runs under a non-root operating system account, and database superusers have effective ability to run arbitrary code under that system account. PostgreSQL provides a script for starting the database server during system boot. Packages of PostgreSQL for many operating systems provide their own, packager-authored startup implementations. Several implementations use a log file name that the database superuser can replace with a symbolic link. As root, they open(), chmod() and/or chown() this log file name. This often suffices for the database superuser to escalate to root privileges when root starts the server.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12172/">CVE-2017-12172 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12172">CVE-2017-12172 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1062538">SUSE bug 1062538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062722">SUSE bug 1062722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185814">SUSE bug 1185814</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823849" comment="postgresql-9.2.23-3.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823850" comment="postgresql-contrib-9.2.23-3.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823851" comment="postgresql-devel-9.2.23-3.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823852" comment="postgresql-docs-9.2.23-3.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823853" comment="postgresql-libs-9.2.23-3.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823854" comment="postgresql-plperl-9.2.23-3.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823855" comment="postgresql-plpython-9.2.23-3.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823856" comment="postgresql-pltcl-9.2.23-3.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823857" comment="postgresql-server-9.2.23-3.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823858" comment="postgresql-static-9.2.23-3.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823859" comment="postgresql-test-9.2.23-3.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823860" comment="postgresql-upgrade-9.2.23-3.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712173" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12173</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12173" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12173" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12173" ref_url="https://www.suse.com/security/cve/CVE-2017-12173" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2937-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003377.html" source="SUSE-SU"/>
    <description>
    It was found that sssd's sysdb_search_user_by_upn_res() function before 1.16.0 did not sanitize requests when querying its local cache and was vulnerable to injection. In a centralized login environment, if a password hash was locally cached for a given user, an authenticated attacker could use this flaw to retrieve it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12173/">CVE-2017-12173 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12173">CVE-2017-12173 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1061832">SUSE bug 1061832</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823802" comment="libipa_hbac-1.15.2-50.el7_4.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823803" comment="libipa_hbac-devel-1.15.2-50.el7_4.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823804" comment="libsss_autofs-1.15.2-50.el7_4.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823805" comment="libsss_certmap-1.15.2-50.el7_4.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823806" comment="libsss_certmap-devel-1.15.2-50.el7_4.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823807" comment="libsss_idmap-1.15.2-50.el7_4.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823808" comment="libsss_idmap-devel-1.15.2-50.el7_4.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823809" comment="libsss_nss_idmap-1.15.2-50.el7_4.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823810" comment="libsss_nss_idmap-devel-1.15.2-50.el7_4.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823811" comment="libsss_simpleifp-1.15.2-50.el7_4.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823812" comment="libsss_simpleifp-devel-1.15.2-50.el7_4.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823813" comment="libsss_sudo-1.15.2-50.el7_4.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823814" comment="python-libipa_hbac-1.15.2-50.el7_4.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823815" comment="python-libsss_nss_idmap-1.15.2-50.el7_4.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823816" comment="python-sss-1.15.2-50.el7_4.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823817" comment="python-sss-murmur-1.15.2-50.el7_4.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823818" comment="python-sssdconfig-1.15.2-50.el7_4.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823819" comment="sssd-1.15.2-50.el7_4.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823820" comment="sssd-ad-1.15.2-50.el7_4.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823821" comment="sssd-client-1.15.2-50.el7_4.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823822" comment="sssd-common-1.15.2-50.el7_4.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823823" comment="sssd-common-pac-1.15.2-50.el7_4.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823824" comment="sssd-dbus-1.15.2-50.el7_4.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823825" comment="sssd-ipa-1.15.2-50.el7_4.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823826" comment="sssd-kcm-1.15.2-50.el7_4.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823827" comment="sssd-krb5-1.15.2-50.el7_4.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823828" comment="sssd-krb5-common-1.15.2-50.el7_4.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823829" comment="sssd-ldap-1.15.2-50.el7_4.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823830" comment="sssd-libwbclient-1.15.2-50.el7_4.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823831" comment="sssd-libwbclient-devel-1.15.2-50.el7_4.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823832" comment="sssd-polkit-rules-1.15.2-50.el7_4.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823833" comment="sssd-proxy-1.15.2-50.el7_4.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823834" comment="sssd-tools-1.15.2-50.el7_4.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823835" comment="sssd-winbind-idmap-1.15.2-50.el7_4.8 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712188" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12188</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12188" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12188" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12188" ref_url="https://www.suse.com/security/cve/CVE-2017-12188" source="SUSE CVE"/>
    <description>
    arch/x86/kvm/mmu.c in the Linux kernel through 4.13.5, when nested virtualisation is used, does not properly traverse guest pagetable entries to resolve a guest virtual address, which allows L1 guest OS users to execute arbitrary code on the host OS or cause a denial of service (incorrect index during page walking, and host OS crash), aka an "MMU potential stack buffer overrun."
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.6/CVSS:3.0/AV:A/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12188/">CVE-2017-12188 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12188">CVE-2017-12188 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1062604">SUSE bug 1062604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096566">SUSE bug 1096566</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824015" comment="kernel-3.10.0-693.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824016" comment="kernel-abi-whitelists-3.10.0-693.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824017" comment="kernel-debug-3.10.0-693.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824020" comment="kernel-doc-3.10.0-693.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824021" comment="kernel-headers-3.10.0-693.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824022" comment="kernel-tools-3.10.0-693.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824023" comment="kernel-tools-libs-3.10.0-693.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824025" comment="perf-3.10.0-693.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824026" comment="python-perf-3.10.0-693.21.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712190" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12190</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12190" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12190" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12190" ref_url="https://www.suse.com/security/cve/CVE-2017-12190" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004055.html" source="SUSE-SU"/>
    <description>
    The bio_map_user_iov and bio_unmap_user functions in block/bio.c in the Linux kernel before 4.13.8 do unbalanced refcounting when a SCSI I/O vector has small consecutive buffers belonging to the same page. The bio_add_pc_page function merges them into one, but the page reference is never dropped. This causes a memory leak and possible system lockup (exploitable against the host OS by a guest OS user, if a SCSI disk is passed through to a virtual machine) due to an out-of-memory condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12190/">CVE-2017-12190 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12190">CVE-2017-12190 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1062568">SUSE bug 1062568</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091815">SUSE bug 1091815</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824165" comment="kernel-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824166" comment="kernel-abi-whitelists-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824167" comment="kernel-debug-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824170" comment="kernel-doc-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824171" comment="kernel-headers-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824172" comment="kernel-tools-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824173" comment="kernel-tools-libs-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824175" comment="perf-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824176" comment="python-perf-3.10.0-862.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712192" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12192</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12192" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12192" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12192" ref_url="https://www.suse.com/security/cve/CVE-2017-12192" source="SUSE CVE"/>
    <description>
    The keyctl_read_key function in security/keys/keyctl.c in the Key Management subcomponent in the Linux kernel before 4.13.5 does not properly consider that a key may be possessed but negatively instantiated, which allows local users to cause a denial of service (OOPS and system crash) via a crafted KEYCTL_READ operation.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12192/">CVE-2017-12192 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12192">CVE-2017-12192 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1062840">SUSE bug 1062840</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823952" comment="kernel-3.10.0-693.17.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823953" comment="kernel-abi-whitelists-3.10.0-693.17.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823954" comment="kernel-debug-3.10.0-693.17.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823957" comment="kernel-doc-3.10.0-693.17.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823958" comment="kernel-headers-3.10.0-693.17.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823959" comment="kernel-tools-3.10.0-693.17.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823960" comment="kernel-tools-libs-3.10.0-693.17.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823962" comment="perf-3.10.0-693.17.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823963" comment="python-perf-3.10.0-693.17.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712193" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12193</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12193" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12193" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12193" ref_url="https://www.suse.com/security/cve/CVE-2017-12193" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3410-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003550.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003629.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3358-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4UYJRYWN3YIKVO45AOJQMXXWEWZ76QPX/#4UYJRYWN3YIKVO45AOJQMXXWEWZ76QPX" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3359-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KNOTZX2CMPWZWZ2GTPQ2RA6T3XMG2V5Y/#KNOTZX2CMPWZWZ2GTPQ2RA6T3XMG2V5Y" source="SUSE-SU"/>
    <description>
    The assoc_array_insert_into_terminal_node function in lib/assoc_array.c in the Linux kernel before 4.13.11 mishandles node splitting, which allows local users to cause a denial of service (NULL pointer dereference and panic) via a crafted application, as demonstrated by the keyring key type, and key addition and link creation operations.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12193/">CVE-2017-12193 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12193">CVE-2017-12193 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1066192">SUSE bug 1066192</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823952" comment="kernel-3.10.0-693.17.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823953" comment="kernel-abi-whitelists-3.10.0-693.17.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823954" comment="kernel-debug-3.10.0-693.17.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823957" comment="kernel-doc-3.10.0-693.17.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823958" comment="kernel-headers-3.10.0-693.17.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823959" comment="kernel-tools-3.10.0-693.17.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823960" comment="kernel-tools-libs-3.10.0-693.17.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823962" comment="perf-3.10.0-693.17.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823963" comment="python-perf-3.10.0-693.17.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712613" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12613</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12613" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12613" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12613" ref_url="https://www.suse.com/security/cve/CVE-2017-12613" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004058.html" source="SUSE-SU"/>
    <description>
    When apr_time_exp*() or apr_os_exp_time*() functions are invoked with an invalid month field value in Apache Portable Runtime APR 1.6.2 and prior, out of bounds memory may be accessed in converting this value to an apr_time_exp_t value, potentially revealing the contents of a different static heap value or resulting in program termination, and may represent an information disclosure or denial of service vulnerability to applications which call these APR functions with unvalidated external input.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12613/">CVE-2017-12613 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12613">CVE-2017-12613 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1064982">SUSE bug 1064982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190072">SUSE bug 1190072</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823783" comment="apr-1.4.8-3.el7_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823784" comment="apr-devel-1.4.8-3.el7_4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712615" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12615</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12615" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12615" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12615" ref_url="https://www.suse.com/security/cve/CVE-2017-12615" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003405.html" source="SUSE-SU"/>
    <description>
    When running Apache Tomcat 7.0.0 to 7.0.79 on Windows with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12615/">CVE-2017-12615 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12615">CVE-2017-12615 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1059554">SUSE bug 1059554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180947">SUSE bug 1180947</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823712" comment="tomcat-7.0.76-3.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823713" comment="tomcat-admin-webapps-7.0.76-3.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823714" comment="tomcat-docs-webapp-7.0.76-3.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823715" comment="tomcat-el-2.2-api-7.0.76-3.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823716" comment="tomcat-javadoc-7.0.76-3.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823717" comment="tomcat-jsp-2.2-api-7.0.76-3.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823718" comment="tomcat-jsvc-7.0.76-3.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823719" comment="tomcat-lib-7.0.76-3.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823720" comment="tomcat-servlet-3.0-api-7.0.76-3.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823721" comment="tomcat-webapps-7.0.76-3.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712617" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12617</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12617" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12617" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12617" ref_url="https://www.suse.com/security/cve/CVE-2017-12617" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003401.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003405.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008669.html" source="SUSE-SU"/>
		<reference ref_id="TID7022154" ref_url="https://www.suse.com/support/kb/doc/?id=7022154" source="SUSE-SU"/>
		<reference ref_id="TID7022163" ref_url="https://www.suse.com/support/kb/doc/?id=7022163" source="SUSE-SU"/>
		<reference ref_id="TID7022269" ref_url="https://www.suse.com/support/kb/doc/?id=7022269" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3069-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BYU6XHQ5M6CAKKV2C7V5ALDR52LMF42Y/#BYU6XHQ5M6CAKKV2C7V5ALDR52LMF42Y" source="SUSE-SU"/>
    <description>
    When running Apache Tomcat versions 9.0.0.M1 to 9.0.0, 8.5.0 to 8.5.22, 8.0.0.RC1 to 8.0.46 and 7.0.0 to 7.0.81 with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default servlet to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12617/">CVE-2017-12617 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12617">CVE-2017-12617 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1059554">SUSE bug 1059554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062607">SUSE bug 1062607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180947">SUSE bug 1180947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189861">SUSE bug 1189861</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823712" comment="tomcat-7.0.76-3.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823713" comment="tomcat-admin-webapps-7.0.76-3.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823714" comment="tomcat-docs-webapp-7.0.76-3.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823715" comment="tomcat-el-2.2-api-7.0.76-3.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823716" comment="tomcat-javadoc-7.0.76-3.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823717" comment="tomcat-jsp-2.2-api-7.0.76-3.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823718" comment="tomcat-jsvc-7.0.76-3.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823719" comment="tomcat-lib-7.0.76-3.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823720" comment="tomcat-servlet-3.0-api-7.0.76-3.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823721" comment="tomcat-webapps-7.0.76-3.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712652" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12652</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12652" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12652" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12652" ref_url="https://www.suse.com/security/cve/CVE-2017-12652" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3060-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016340.html" source="SUSE-SU"/>
    <description>
    libpng before 1.6.32 does not properly check the length of chunks against the user limit.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12652/">CVE-2017-12652 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12652">CVE-2017-12652 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1141493">SUSE bug 1141493</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828254" comment="libpng-1.5.13-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828255" comment="libpng-devel-1.5.13-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828256" comment="libpng-static-1.5.13-8.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12805</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12805" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12805" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12805" ref_url="https://www.suse.com/security/cve/CVE-2017-12805" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005633.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1683-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R7HRSDXPTVPKGAJNZBJCGV43DVFXWCDB/#R7HRSDXPTVPKGAJNZBJCGV43DVFXWCDB" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.6-6, a memory exhaustion vulnerability was found in the function ReadTIFFImage, which allows attackers to cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12805/">CVE-2017-12805 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12805">CVE-2017-12805 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1135236">SUSE bug 1135236</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827880" comment="ImageMagick-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827881" comment="ImageMagick-c++-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827882" comment="ImageMagick-c++-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827883" comment="ImageMagick-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827884" comment="ImageMagick-doc-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827885" comment="ImageMagick-perl-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827886" comment="autotrace-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827887" comment="autotrace-devel-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827888" comment="emacs-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827889" comment="emacs-common-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827890" comment="emacs-el-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827891" comment="emacs-filesystem-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827892" comment="emacs-nox-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827893" comment="emacs-terminal-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827894" comment="inkscape-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827895" comment="inkscape-docs-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827896" comment="inkscape-view-0.92.2-3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12806</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12806" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12806" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12806" ref_url="https://www.suse.com/security/cve/CVE-2017-12806" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005633.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1683-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R7HRSDXPTVPKGAJNZBJCGV43DVFXWCDB/#R7HRSDXPTVPKGAJNZBJCGV43DVFXWCDB" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.6-6, a memory exhaustion vulnerability was found in the function format8BIM, which allows attackers to cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12806/">CVE-2017-12806 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12806">CVE-2017-12806 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1135232">SUSE bug 1135232</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827880" comment="ImageMagick-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827881" comment="ImageMagick-c++-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827882" comment="ImageMagick-c++-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827883" comment="ImageMagick-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827884" comment="ImageMagick-doc-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827885" comment="ImageMagick-perl-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827886" comment="autotrace-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827887" comment="autotrace-devel-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827888" comment="emacs-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827889" comment="emacs-common-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827890" comment="emacs-el-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827891" comment="emacs-filesystem-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827892" comment="emacs-nox-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827893" comment="emacs-terminal-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827894" comment="inkscape-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827895" comment="inkscape-docs-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827896" comment="inkscape-view-0.92.2-3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13077</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13077" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13077" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13077" ref_url="https://www.suse.com/security/cve/CVE-2017-13077" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011164.html" source="SUSE-SU"/>
		<reference ref_id="TID7022107" ref_url="https://www.suse.com/support/kb/doc/?id=7022107" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2053-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2R3VXKTYLLUYFBZQ2NNAI5NSZOBXISJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HDY6AZL2NYOKU57GM74M5JHC5SYA3IY/" source="SUSE-SU"/>
    <description>
    Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Pairwise Transient Key (PTK) Temporal Key (TK) during the four-way handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-29"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13077/">CVE-2017-13077 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13077">CVE-2017-13077 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1056061">SUSE bug 1056061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063479">SUSE bug 1063479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063963">SUSE bug 1063963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179588">SUSE bug 1179588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823682" comment="wpa_supplicant-2.6-5.el7_4.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713078" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13078</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13078" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13078" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13078" ref_url="https://www.suse.com/security/cve/CVE-2017-13078" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2752-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011164.html" source="SUSE-SU"/>
		<reference ref_id="TID7022107" ref_url="https://www.suse.com/support/kb/doc/?id=7022107" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2755-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R74YPATBIXZZY53VWIV4DR6ARJILTINT/#R74YPATBIXZZY53VWIV4DR6ARJILTINT" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2896-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FVO5LGM6MML3JRTJIGXKSVAE727P46NU/#FVO5LGM6MML3JRTJIGXKSVAE727P46NU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2053-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2R3VXKTYLLUYFBZQ2NNAI5NSZOBXISJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HDY6AZL2NYOKU57GM74M5JHC5SYA3IY/" source="SUSE-SU"/>
    <description>
    Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the four-way handshake, allowing an attacker within radio range to replay frames from access points to clients.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-27"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13078/">CVE-2017-13078 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13078">CVE-2017-13078 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1056061">SUSE bug 1056061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063479">SUSE bug 1063479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063667">SUSE bug 1063667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179588">SUSE bug 1179588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823682" comment="wpa_supplicant-2.6-5.el7_4.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713080" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13080</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13080" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13080" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13080" ref_url="https://www.suse.com/security/cve/CVE-2017-13080" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2752-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003410.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003423.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003428.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3136-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3151-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003454.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011164.html" source="SUSE-SU"/>
		<reference ref_id="TID7022107" ref_url="https://www.suse.com/support/kb/doc/?id=7022107" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2755-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R74YPATBIXZZY53VWIV4DR6ARJILTINT/#R74YPATBIXZZY53VWIV4DR6ARJILTINT" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2846-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BASVOF5IYBWFH4KY2PGMCRYCT2LROR66/#BASVOF5IYBWFH4KY2PGMCRYCT2LROR66" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2896-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FVO5LGM6MML3JRTJIGXKSVAE727P46NU/#FVO5LGM6MML3JRTJIGXKSVAE727P46NU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2905-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CPM3KJR2I4TDUD2FFWOSGMI4QVW7CONH/#CPM3KJR2I4TDUD2FFWOSGMI4QVW7CONH" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3144-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FCXOF5O57ARCW5HJNFHL54NEQVUPOHTM/#FCXOF5O57ARCW5HJNFHL54NEQVUPOHTM" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2053-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2R3VXKTYLLUYFBZQ2NNAI5NSZOBXISJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HDY6AZL2NYOKU57GM74M5JHC5SYA3IY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14770-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WU6USOH6Z5LBH65E37F7SXQ2ZCYMYO4C/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14775-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IDYBISXNIKR4JQNKOAZNM4IWBORGXDGT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14776-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VY6LKWXFA5DZKFFJWA52HJLZ3GJXUDB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14777-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K4CQIJEA5UAOBWUSUVTBHDHKQNBQURQG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14778-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/E3XCURBMJRRPRVU3EVKDNACDUEBSYOCK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14787-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FWMIURVH3RGSXYDDHGU2A5NU4OI3OLPB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14791-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7ILZHMVR4NNCE6NWCEPZ2BVWZXYSWRTS/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14796-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JRVYJFDMGL4ZFIAYJKJTQHRR5SPMPZJ2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14797-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RLB6EQ4PQFULA6326VPRQRWW66T32SST/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14800-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XIORKETHKWBJRRYF55G3J3DL3T7QGOEL/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14804-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EISBLM6MW64JFKX5G6QNSKXKI34QXKQ4/" source="SUSE-SU"/>
    <description>
    Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-30"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13080/">CVE-2017-13080 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13080">CVE-2017-13080 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1056061">SUSE bug 1056061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063479">SUSE bug 1063479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063667">SUSE bug 1063667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063671">SUSE bug 1063671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066295">SUSE bug 1066295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105108">SUSE bug 1105108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178872">SUSE bug 1178872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179588">SUSE bug 1179588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823682" comment="wpa_supplicant-2.6-5.el7_4.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713082" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13082</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13082" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13082" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13082" ref_url="https://www.suse.com/security/cve/CVE-2017-13082" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011164.html" source="SUSE-SU"/>
		<reference ref_id="TID7022107" ref_url="https://www.suse.com/support/kb/doc/?id=7022107" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0222-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q7B4Y5BPIVXIPXUAQX744IATOJBYNYP6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2053-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2R3VXKTYLLUYFBZQ2NNAI5NSZOBXISJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HDY6AZL2NYOKU57GM74M5JHC5SYA3IY/" source="SUSE-SU"/>
    <description>
    Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11r allows reinstallation of the Pairwise Transient Key (PTK) Temporal Key (TK) during the fast BSS transmission (FT) handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-27"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13082/">CVE-2017-13082 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13082">CVE-2017-13082 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1056061">SUSE bug 1056061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063479">SUSE bug 1063479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179588">SUSE bug 1179588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823682" comment="wpa_supplicant-2.6-5.el7_4.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713086" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13086</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13086" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13086" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13086" ref_url="https://www.suse.com/security/cve/CVE-2017-13086" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011164.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2053-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2R3VXKTYLLUYFBZQ2NNAI5NSZOBXISJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HDY6AZL2NYOKU57GM74M5JHC5SYA3IY/" source="SUSE-SU"/>
    <description>
    Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Tunneled Direct-Link Setup (TDLS) Peer Key (TPK) during the TDLS handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-26"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13086/">CVE-2017-13086 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13086">CVE-2017-13086 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1056061">SUSE bug 1056061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063479">SUSE bug 1063479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179588">SUSE bug 1179588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823682" comment="wpa_supplicant-2.6-5.el7_4.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713087" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13087</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13087" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13087" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13087" ref_url="https://www.suse.com/security/cve/CVE-2017-13087" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2752-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011164.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2755-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R74YPATBIXZZY53VWIV4DR6ARJILTINT/#R74YPATBIXZZY53VWIV4DR6ARJILTINT" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2896-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FVO5LGM6MML3JRTJIGXKSVAE727P46NU/#FVO5LGM6MML3JRTJIGXKSVAE727P46NU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2053-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2R3VXKTYLLUYFBZQ2NNAI5NSZOBXISJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HDY6AZL2NYOKU57GM74M5JHC5SYA3IY/" source="SUSE-SU"/>
    <description>
    Wi-Fi Protected Access (WPA and WPA2) that support 802.11v allows reinstallation of the Group Temporal Key (GTK) when processing a Wireless Network Management (WNM) Sleep Mode Response frame, allowing an attacker within radio range to replay frames from access points to clients.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-26"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13087/">CVE-2017-13087 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13087">CVE-2017-13087 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1056061">SUSE bug 1056061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063479">SUSE bug 1063479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179588">SUSE bug 1179588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823682" comment="wpa_supplicant-2.6-5.el7_4.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713088" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13088</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13088" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13088" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13088" ref_url="https://www.suse.com/security/cve/CVE-2017-13088" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2752-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011164.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2755-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R74YPATBIXZZY53VWIV4DR6ARJILTINT/#R74YPATBIXZZY53VWIV4DR6ARJILTINT" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2896-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FVO5LGM6MML3JRTJIGXKSVAE727P46NU/#FVO5LGM6MML3JRTJIGXKSVAE727P46NU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2053-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2R3VXKTYLLUYFBZQ2NNAI5NSZOBXISJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HDY6AZL2NYOKU57GM74M5JHC5SYA3IY/" source="SUSE-SU"/>
    <description>
    Wi-Fi Protected Access (WPA and WPA2) that support 802.11v allows reinstallation of the Integrity Group Temporal Key (IGTK) when processing a Wireless Network Management (WNM) Sleep Mode Response frame, allowing an attacker within radio range to replay frames from access points to clients.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-30"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13088/">CVE-2017-13088 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13088">CVE-2017-13088 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1056061">SUSE bug 1056061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063479">SUSE bug 1063479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179588">SUSE bug 1179588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823682" comment="wpa_supplicant-2.6-5.el7_4.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713089" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13089</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13089" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13089" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13089" ref_url="https://www.suse.com/security/cve/CVE-2017-13089" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2871-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003398.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2884-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RDPJ75RPZD3NGFW5ZTSBZHVJSCIPCDFJ/#RDPJ75RPZD3NGFW5ZTSBZHVJSCIPCDFJ" source="SUSE-SU"/>
    <description>
    The http.c:skip_short_body() function is called in some circumstances, such as when processing redirects. When the response is sent chunked in wget before 1.19.2, the chunk parser uses strtol() to read each chunk's length, but doesn't check that the chunk length is a non-negative number. The code then tries to skip the chunk in pieces of 512 bytes by using the MIN() macro, but ends up passing the negative chunk length to connect.c:fd_read(). As fd_read() takes an int argument, the high 32 bits of the chunk length are discarded, leaving fd_read() with a completely attacker controlled length argument.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-12-19"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-13089/">CVE-2017-13089 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13089">CVE-2017-13089 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1064715">SUSE bug 1064715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823711" comment="wget-1.14-15.el7_4.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713090" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13090</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13090" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13090" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13090" ref_url="https://www.suse.com/security/cve/CVE-2017-13090" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2871-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003398.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2884-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RDPJ75RPZD3NGFW5ZTSBZHVJSCIPCDFJ/#RDPJ75RPZD3NGFW5ZTSBZHVJSCIPCDFJ" source="SUSE-SU"/>
    <description>
    The retr.c:fd_read_body() function is called when processing OK responses. When the response is sent chunked in wget before 1.19.2, the chunk parser uses strtol() to read each chunk's length, but doesn't check that the chunk length is a non-negative number. The code then tries to read the chunk in pieces of 8192 bytes by using the MIN() macro, but ends up passing the negative chunk length to retr.c:fd_read(). As fd_read() takes an int argument, the high 32 bits of the chunk length are discarded, leaving fd_read() with a completely attacker controlled length argument. The attacker can corrupt malloc metadata after the allocated buffer.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-12-19"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-13090/">CVE-2017-13090 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13090">CVE-2017-13090 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1064716">SUSE bug 1064716</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823711" comment="wget-1.14-15.el7_4.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13166</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13166" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13166" ref_url="https://www.suse.com/security/cve/CVE-2017-13166" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0989-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0992-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0993-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0995-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1004-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1005-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1009-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1010-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1013-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1016-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003932.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1019-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1022-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1023-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1531-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1537-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004180.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0781-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IGSNRZOHBLG7CUS6RPT3LPE2GCEITYQD/#IGSNRZOHBLG7CUS6RPT3LPE2GCEITYQD" source="SUSE-SU"/>
    <description>
    An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-13166/">CVE-2017-13166 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13166">CVE-2017-13166 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1072865">SUSE bug 1072865</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074488">SUSE bug 1074488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085447">SUSE bug 1085447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091815">SUSE bug 1091815</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824165" comment="kernel-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824166" comment="kernel-abi-whitelists-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824167" comment="kernel-debug-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824170" comment="kernel-doc-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824171" comment="kernel-headers-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824172" comment="kernel-tools-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824173" comment="kernel-tools-libs-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824175" comment="perf-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824176" comment="python-perf-3.10.0-862.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713215" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13215</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13215" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13215" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13215" ref_url="https://www.suse.com/security/cve/CVE-2017-13215" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0437-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2018-February/007939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003854.html" source="SUSE-SU"/>
    <description>
    A elevation of privilege vulnerability in the Upstream kernel skcipher. Product: Android. Versions: Android kernel. Android ID: A-64386293. References: Upstream kernel.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-13215/">CVE-2017-13215 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13215">CVE-2017-13215 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1075908">SUSE bug 1075908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091815">SUSE bug 1091815</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824504" comment="kernel-3.10.0-862.11.6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824505" comment="kernel-abi-whitelists-3.10.0-862.11.6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824506" comment="kernel-debug-3.10.0-862.11.6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824509" comment="kernel-doc-3.10.0-862.11.6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824510" comment="kernel-headers-3.10.0-862.11.6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824511" comment="kernel-tools-3.10.0-862.11.6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824512" comment="kernel-tools-libs-3.10.0-862.11.6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824514" comment="perf-3.10.0-862.11.6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824515" comment="python-perf-3.10.0-862.11.6.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713672" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13672</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13672" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13672" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13672" ref_url="https://www.suse.com/security/cve/CVE-2017-13672" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2936-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2963-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13921-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201913921-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2938-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4ZOC5UWC4S23HZWTUSJDD66LGMVNU3L3/#4ZOC5UWC4S23HZWTUSJDD66LGMVNU3L3" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2941-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NIVAYUS4Z3IDRS3LK2TACYUZB2ORNQTR/#NIVAYUS4Z3IDRS3LK2TACYUZB2ORNQTR" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1074-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q6DNNFUZSZUOD36332LAYVERA7GHAXUC/#Q6DNNFUZSZUOD36332LAYVERA7GHAXUC" source="SUSE-SU"/>
    <description>
    QEMU (aka Quick Emulator), when built with the VGA display emulator support, allows local guest OS privileged users to cause a denial of service (out-of-bounds read and QEMU process crash) via vectors involving display update.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13672/">CVE-2017-13672 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13672">CVE-2017-13672 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1056334">SUSE bug 1056334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056336">SUSE bug 1056336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084604">SUSE bug 1084604</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824082" comment="qemu-img-1.5.3-156.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824083" comment="qemu-kvm-1.5.3-156.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824084" comment="qemu-kvm-common-1.5.3-156.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824085" comment="qemu-kvm-tools-1.5.3-156.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713711" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13711</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13711" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13711" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13711" ref_url="https://www.suse.com/security/cve/CVE-2017-13711" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003371.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2938-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4ZOC5UWC4S23HZWTUSJDD66LGMVNU3L3/#4ZOC5UWC4S23HZWTUSJDD66LGMVNU3L3" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the sofree function in slirp/socket.c in QEMU (aka Quick Emulator) allows attackers to cause a denial of service (QEMU instance crash) by leveraging failure to properly clear ifq_so from pending packets.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13711/">CVE-2017-13711 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13711">CVE-2017-13711 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1056291">SUSE bug 1056291</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824082" comment="qemu-img-1.5.3-156.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824083" comment="qemu-kvm-1.5.3-156.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824084" comment="qemu-kvm-common-1.5.3-156.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824085" comment="qemu-kvm-tools-1.5.3-156.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713738" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13738</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13738" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13738" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13738" ref_url="https://www.suse.com/security/cve/CVE-2017-13738" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003260.html" source="SUSE-SU"/>
    <description>
    There is an illegal address access in the _lou_getALine function in compileTranslationTable.c:346 in Liblouis 3.2.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13738/">CVE-2017-13738 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13738">CVE-2017-13738 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1056105">SUSE bug 1056105</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823722" comment="liblouis-2.5.2-11.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823723" comment="liblouis-devel-2.5.2-11.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823724" comment="liblouis-doc-2.5.2-11.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823725" comment="liblouis-python-2.5.2-11.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823726" comment="liblouis-utils-2.5.2-11.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713740" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13740</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13740" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13740" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13740" ref_url="https://www.suse.com/security/cve/CVE-2017-13740" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2590-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003262.html" source="SUSE-SU"/>
    <description>
    There is a stack-based buffer overflow in Liblouis 3.2.0, triggered in the function parseChars() in compileTranslationTable.c, that will lead to denial of service or possibly unspecified other impact.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13740/">CVE-2017-13740 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13740">CVE-2017-13740 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1056097">SUSE bug 1056097</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823722" comment="liblouis-2.5.2-11.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823723" comment="liblouis-devel-2.5.2-11.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823724" comment="liblouis-doc-2.5.2-11.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823725" comment="liblouis-python-2.5.2-11.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823726" comment="liblouis-utils-2.5.2-11.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713741" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13741</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13741" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13741" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13741" ref_url="https://www.suse.com/security/cve/CVE-2017-13741" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2590-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003262.html" source="SUSE-SU"/>
    <description>
    There is a use-after-free in the function compileBrailleIndicator() in compileTranslationTable.c in Liblouis 3.2.0 that will lead to a remote denial of service attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13741/">CVE-2017-13741 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13741">CVE-2017-13741 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1056095">SUSE bug 1056095</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823722" comment="liblouis-2.5.2-11.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823723" comment="liblouis-devel-2.5.2-11.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823724" comment="liblouis-doc-2.5.2-11.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823725" comment="liblouis-python-2.5.2-11.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823726" comment="liblouis-utils-2.5.2-11.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713742" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13742</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13742" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13742" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13742" ref_url="https://www.suse.com/security/cve/CVE-2017-13742" source="SUSE CVE"/>
    <description>
    There is a stack-based buffer overflow in Liblouis 3.2.0, triggered in the function includeFile() in compileTranslationTable.c, that will lead to a remote denial of service attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13742/">CVE-2017-13742 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13742">CVE-2017-13742 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1056093">SUSE bug 1056093</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823722" comment="liblouis-2.5.2-11.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823723" comment="liblouis-devel-2.5.2-11.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823724" comment="liblouis-doc-2.5.2-11.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823725" comment="liblouis-python-2.5.2-11.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823726" comment="liblouis-utils-2.5.2-11.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713743" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13743</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13743" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13743" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13743" ref_url="https://www.suse.com/security/cve/CVE-2017-13743" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2590-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003262.html" source="SUSE-SU"/>
    <description>
    There is a buffer overflow in Liblouis 3.2.0, triggered in the function _lou_showString() in utils.c, that will lead to a remote denial of service attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13743/">CVE-2017-13743 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13743">CVE-2017-13743 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1056090">SUSE bug 1056090</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823722" comment="liblouis-2.5.2-11.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823723" comment="liblouis-devel-2.5.2-11.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823724" comment="liblouis-doc-2.5.2-11.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823725" comment="liblouis-python-2.5.2-11.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823726" comment="liblouis-utils-2.5.2-11.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713744" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13744</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13744" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13744" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13744" ref_url="https://www.suse.com/security/cve/CVE-2017-13744" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003260.html" source="SUSE-SU"/>
    <description>
    There is an illegal address access in the function _lou_getALine() in compileTranslationTable.c:343 in Liblouis 3.2.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13744/">CVE-2017-13744 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13744">CVE-2017-13744 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1056088">SUSE bug 1056088</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823722" comment="liblouis-2.5.2-11.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823723" comment="liblouis-devel-2.5.2-11.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823724" comment="liblouis-doc-2.5.2-11.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823725" comment="liblouis-python-2.5.2-11.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823726" comment="liblouis-utils-2.5.2-11.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714033" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14033</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14033" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14033" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14033" ref_url="https://www.suse.com/security/cve/CVE-2017-14033" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
    <description>
    The decode method in the OpenSSL::ASN1 module in Ruby before 2.2.8, 2.3.x before 2.3.5, and 2.4.x through 2.4.1 allows attackers to cause a denial of service (interpreter crash) via a crafted string.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14033/">CVE-2017-14033 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14033">CVE-2017-14033 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1058757">SUSE bug 1058757</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824000" comment="ruby-2.0.0.648-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824001" comment="ruby-devel-2.0.0.648-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824002" comment="ruby-doc-2.0.0.648-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824003" comment="ruby-irb-2.0.0.648-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824004" comment="ruby-libs-2.0.0.648-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824005" comment="ruby-tcltk-2.0.0.648-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824006" comment="rubygem-bigdecimal-1.2.0-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824007" comment="rubygem-io-console-0.4.2-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824008" comment="rubygem-json-1.7.7-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824009" comment="rubygem-minitest-4.3.2-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824010" comment="rubygem-psych-2.0.0-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824011" comment="rubygem-rake-0.9.6-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824012" comment="rubygem-rdoc-4.0.0-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824013" comment="rubygems-2.0.14.1-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824014" comment="rubygems-devel-2.0.14.1-33.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714064" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14064</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14064" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14064" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14064" ref_url="https://www.suse.com/security/cve/CVE-2017-14064" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
    <description>
    Ruby through 2.2.7, 2.3.x through 2.3.4, and 2.4.x through 2.4.1 can expose arbitrary memory during a JSON.generate call. The issues lies in using strdup in ext/json/ext/generator/generator.c, which will stop after encountering a '\0' byte, returning a pointer to a string of length zero, which is not the length stored in space_len.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-14064/">CVE-2017-14064 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14064">CVE-2017-14064 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1056782">SUSE bug 1056782</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824000" comment="ruby-2.0.0.648-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824001" comment="ruby-devel-2.0.0.648-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824002" comment="ruby-doc-2.0.0.648-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824003" comment="ruby-irb-2.0.0.648-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824004" comment="ruby-libs-2.0.0.648-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824005" comment="ruby-tcltk-2.0.0.648-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824006" comment="rubygem-bigdecimal-1.2.0-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824007" comment="rubygem-io-console-0.4.2-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824008" comment="rubygem-json-1.7.7-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824009" comment="rubygem-minitest-4.3.2-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824010" comment="rubygem-psych-2.0.0-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824011" comment="rubygem-rake-0.9.6-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824012" comment="rubygem-rdoc-4.0.0-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824013" comment="rubygems-2.0.14.1-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824014" comment="rubygems-devel-2.0.14.1-33.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714106" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14106</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14106" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14106" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14106" ref_url="https://www.suse.com/security/cve/CVE-2017-14106" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2956-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003622.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2494-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YPGIUZYK74E5SKBIZ5WWZR73INQMGVZF/#YPGIUZYK74E5SKBIZ5WWZR73INQMGVZF" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2495-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NMSI4RCMJWBVGY3QK5XMZEO3O7WUFC4Q/#NMSI4RCMJWBVGY3QK5XMZEO3O7WUFC4Q" source="SUSE-SU"/>
    <description>
    The tcp_disconnect function in net/ipv4/tcp.c in the Linux kernel before 4.12 allows local users to cause a denial of service (__tcp_select_window divide-by-zero error and system crash) by triggering a disconnect within a certain tcp_recvmsg code path.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14106/">CVE-2017-14106 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14106">CVE-2017-14106 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1056982">SUSE bug 1056982</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823683" comment="kernel-3.10.0-693.5.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823684" comment="kernel-abi-whitelists-3.10.0-693.5.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823685" comment="kernel-debug-3.10.0-693.5.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823688" comment="kernel-doc-3.10.0-693.5.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823689" comment="kernel-headers-3.10.0-693.5.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823690" comment="kernel-tools-3.10.0-693.5.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823691" comment="kernel-tools-libs-3.10.0-693.5.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823693" comment="perf-3.10.0-693.5.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823694" comment="python-perf-3.10.0-693.5.2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714140" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14140</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14140" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14140" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14140" ref_url="https://www.suse.com/security/cve/CVE-2017-14140" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003576.html" source="SUSE-SU"/>
    <description>
    The move_pages system call in mm/migrate.c in the Linux kernel before 4.12.9 doesn't check the effective uid of the target process, enabling a local attacker to learn the memory layout of a setuid executable despite ASLR.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-14140/">CVE-2017-14140 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14140">CVE-2017-14140 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1057179">SUSE bug 1057179</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824165" comment="kernel-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824166" comment="kernel-abi-whitelists-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824167" comment="kernel-debug-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824170" comment="kernel-doc-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824171" comment="kernel-headers-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824172" comment="kernel-tools-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824173" comment="kernel-tools-libs-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824175" comment="perf-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824176" comment="python-perf-3.10.0-862.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714167" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14167</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14167" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14167" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14167" ref_url="https://www.suse.com/security/cve/CVE-2017-14167" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2936-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2963-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003413.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2938-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4ZOC5UWC4S23HZWTUSJDD66LGMVNU3L3/#4ZOC5UWC4S23HZWTUSJDD66LGMVNU3L3" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2941-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NIVAYUS4Z3IDRS3LK2TACYUZB2ORNQTR/#NIVAYUS4Z3IDRS3LK2TACYUZB2ORNQTR" source="SUSE-SU"/>
    <description>
    Integer overflow in the load_multiboot function in hw/i386/multiboot.c in QEMU (aka Quick Emulator) allows local guest OS users to execute arbitrary code on the host via crafted multiboot header address values, which trigger an out-of-bounds write.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14167/">CVE-2017-14167 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14167">CVE-2017-14167 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1057585">SUSE bug 1057585</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823797" comment="qemu-img-1.5.3-141.el7_4.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823798" comment="qemu-kvm-1.5.3-141.el7_4.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823799" comment="qemu-kvm-common-1.5.3-141.el7_4.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823800" comment="qemu-kvm-tools-1.5.3-141.el7_4.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714482" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14482</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14482" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14482" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14482" ref_url="https://www.suse.com/security/cve/CVE-2017-14482" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003250.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003251.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2535-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MD2D6DV2BDHGSAFTNJD6K3BWD2EHMFZF/#MD2D6DV2BDHGSAFTNJD6K3BWD2EHMFZF" source="SUSE-SU"/>
    <description>
    GNU Emacs before 25.3 allows remote attackers to execute arbitrary code via email with crafted "Content-Type: text/enriched" data containing an x-display XML element that specifies execution of shell commands, related to an unsafe text/enriched extension in lisp/textmodes/enriched.el, and unsafe Gnus support for enriched and richtext inline MIME objects in lisp/gnus/mm-view.el. In particular, an Emacs user can be instantly compromised by reading a crafted email message (or Usenet news article).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14482/">CVE-2017-14482 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14482">CVE-2017-14482 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1058425">SUSE bug 1058425</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823630" comment="emacs-24.3-20.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823631" comment="emacs-common-24.3-20.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823632" comment="emacs-el-24.3-20.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823633" comment="emacs-filesystem-24.3-20.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823634" comment="emacs-nox-24.3-20.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823635" comment="emacs-terminal-24.3-20.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714491" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14491</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14491" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14491" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14491" ref_url="https://www.suse.com/security/cve/CVE-2017-14491" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2618-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003271.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2633-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q2CDDY6KYX354D44NS4QG6YJZAXRHYXE/#Q2CDDY6KYX354D44NS4QG6YJZAXRHYXE" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DNS response.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14491/">CVE-2017-14491 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14491">CVE-2017-14491 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1060354">SUSE bug 1060354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060360">SUSE bug 1060360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060361">SUSE bug 1060361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060362">SUSE bug 1060362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060364">SUSE bug 1060364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063832">SUSE bug 1063832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143944">SUSE bug 1143944</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823671" comment="dnsmasq-2.76-2.el7_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823672" comment="dnsmasq-utils-2.76-2.el7_4.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714492" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14492</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14492" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14492" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14492" ref_url="https://www.suse.com/security/cve/CVE-2017-14492" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2618-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003271.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2633-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q2CDDY6KYX354D44NS4QG6YJZAXRHYXE/#Q2CDDY6KYX354D44NS4QG6YJZAXRHYXE" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted IPv6 router advertisement request.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14492/">CVE-2017-14492 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14492">CVE-2017-14492 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1060355">SUSE bug 1060355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060360">SUSE bug 1060360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060361">SUSE bug 1060361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060362">SUSE bug 1060362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060364">SUSE bug 1060364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063832">SUSE bug 1063832</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823671" comment="dnsmasq-2.76-2.el7_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823672" comment="dnsmasq-utils-2.76-2.el7_4.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714493" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14493</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14493" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14493" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14493" ref_url="https://www.suse.com/security/cve/CVE-2017-14493" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2618-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003271.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2633-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q2CDDY6KYX354D44NS4QG6YJZAXRHYXE/#Q2CDDY6KYX354D44NS4QG6YJZAXRHYXE" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DHCPv6 request.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14493/">CVE-2017-14493 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14493">CVE-2017-14493 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1060360">SUSE bug 1060360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060361">SUSE bug 1060361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060362">SUSE bug 1060362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060364">SUSE bug 1060364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063832">SUSE bug 1063832</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823671" comment="dnsmasq-2.76-2.el7_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823672" comment="dnsmasq-utils-2.76-2.el7_4.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14494</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14494" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14494" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14494" ref_url="https://www.suse.com/security/cve/CVE-2017-14494" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2618-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003271.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2633-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q2CDDY6KYX354D44NS4QG6YJZAXRHYXE/#Q2CDDY6KYX354D44NS4QG6YJZAXRHYXE" source="SUSE-SU"/>
    <description>
    dnsmasq before 2.78, when configured as a relay, allows remote attackers to obtain sensitive memory information via vectors involving handling DHCPv6 forwarded requests.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-14494/">CVE-2017-14494 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14494">CVE-2017-14494 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1060360">SUSE bug 1060360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060361">SUSE bug 1060361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060362">SUSE bug 1060362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060364">SUSE bug 1060364</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823671" comment="dnsmasq-2.76-2.el7_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823672" comment="dnsmasq-utils-2.76-2.el7_4.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714495" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14495</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14495" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14495" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14495" ref_url="https://www.suse.com/security/cve/CVE-2017-14495" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2618-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003271.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2633-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q2CDDY6KYX354D44NS4QG6YJZAXRHYXE/#Q2CDDY6KYX354D44NS4QG6YJZAXRHYXE" source="SUSE-SU"/>
    <description>
    Memory leak in dnsmasq before 2.78, when the --add-mac, --add-cpe-id or --add-subnet option is specified, allows remote attackers to cause a denial of service (memory consumption) via vectors involving DNS response creation.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14495/">CVE-2017-14495 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14495">CVE-2017-14495 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1060360">SUSE bug 1060360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060361">SUSE bug 1060361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060362">SUSE bug 1060362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060364">SUSE bug 1060364</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823671" comment="dnsmasq-2.76-2.el7_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823672" comment="dnsmasq-utils-2.76-2.el7_4.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714496" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14496</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14496" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14496" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14496" ref_url="https://www.suse.com/security/cve/CVE-2017-14496" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2618-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003271.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2633-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q2CDDY6KYX354D44NS4QG6YJZAXRHYXE/#Q2CDDY6KYX354D44NS4QG6YJZAXRHYXE" source="SUSE-SU"/>
    <description>
    Integer underflow in the add_pseudoheader function in dnsmasq before 2.78 , when the --add-mac, --add-cpe-id or --add-subnet option is specified, allows remote attackers to cause a denial of service via a crafted DNS request.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-14496/">CVE-2017-14496 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14496">CVE-2017-14496 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1060360">SUSE bug 1060360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060361">SUSE bug 1060361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060362">SUSE bug 1060362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060364">SUSE bug 1060364</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823671" comment="dnsmasq-2.76-2.el7_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823672" comment="dnsmasq-utils-2.76-2.el7_4.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714503" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14503</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14503" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14503" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14503" ref_url="https://www.suse.com/security/cve/CVE-2017-14503" source="SUSE CVE"/>
		<reference ref_id="SUSE-RU-2021:2757-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-August/019872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3640-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006190.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3690-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HTLGW6J5RQKKE5ORGOWIASW3TZSGF4M/#5HTLGW6J5RQKKE5ORGOWIASW3TZSGF4M" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3717-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J5TNCV4Q5BUNOUHUJSI2WXB6I3KJ7DZC/#J5TNCV4Q5BUNOUHUJSI2WXB6I3KJ7DZC" source="SUSE-SU"/>
    <description>
    libarchive 3.3.2 suffers from an out-of-bounds read within lha_read_data_none() in archive_read_support_format_lha.c when extracting a specially crafted lha archive, related to lha_crc16.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14503/">CVE-2017-14503 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14503">CVE-2017-14503 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1059100">SUSE bug 1059100</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826557" comment="bsdcpio-3.1.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826558" comment="bsdtar-3.1.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826559" comment="libarchive-3.1.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826560" comment="libarchive-devel-3.1.2-12.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714604" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14604</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14604" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14604" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14604" ref_url="https://www.suse.com/security/cve/CVE-2017-14604" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004307.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2210-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CPMUV6DUNWXFSUMAA655S6JQ3S4D5OHB/#CPMUV6DUNWXFSUMAA655S6JQ3S4D5OHB" source="SUSE-SU"/>
    <description>
    GNOME Nautilus before 3.23.90 allows attackers to spoof a file type by using the .desktop file extension, as demonstrated by an attack in which a .desktop file's Name field ends in .pdf but this file's Exec field launches a malicious "sh -c" command. In other words, Nautilus provides no UI indication that a file actually has the potentially unsafe .desktop extension; instead, the UI only shows the .pdf extension. One (slightly) mitigating factor is that an attack requires the .desktop file to have execute permission. The solution is to ask the user to confirm that the file is supposed to be treated as a .desktop file, and then remember the user's answer in the metadata::trusted field.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14604/">CVE-2017-14604 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14604">CVE-2017-14604 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1060031">SUSE bug 1060031</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823973" comment="nautilus-3.22.3-4.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823974" comment="nautilus-devel-3.22.3-4.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823975" comment="nautilus-extensions-3.22.3-4.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714746" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14746</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14746" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14746" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14746" ref_url="https://www.suse.com/security/cve/CVE-2017-14746" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003418.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004410.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3141-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WXOXB4QKB5Q5ZRWD57VVVVYHJBHUB6GN/#WXOXB4QKB5Q5ZRWD57VVVVYHJBHUB6GN" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Samba 4.x before 4.7.3 allows remote attackers to execute arbitrary code via a crafted SMB1 request.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14746/">CVE-2017-14746 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14746">CVE-2017-14746 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1060427">SUSE bug 1060427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069666">SUSE bug 1069666</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823753" comment="ctdb-4.6.2-12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823754" comment="ctdb-tests-4.6.2-12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823755" comment="libsmbclient-4.6.2-12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823756" comment="libsmbclient-devel-4.6.2-12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823757" comment="libwbclient-4.6.2-12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823758" comment="libwbclient-devel-4.6.2-12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823759" comment="samba-4.6.2-12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823760" comment="samba-client-4.6.2-12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823761" comment="samba-client-libs-4.6.2-12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823762" comment="samba-common-4.6.2-12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823763" comment="samba-common-libs-4.6.2-12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823764" comment="samba-common-tools-4.6.2-12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823765" comment="samba-dc-4.6.2-12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823766" comment="samba-dc-libs-4.6.2-12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823767" comment="samba-devel-4.6.2-12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823768" comment="samba-krb5-printing-4.6.2-12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823769" comment="samba-libs-4.6.2-12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823770" comment="samba-pidl-4.6.2-12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823771" comment="samba-python-4.6.2-12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823772" comment="samba-test-4.6.2-12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823773" comment="samba-test-libs-4.6.2-12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823774" comment="samba-vfs-glusterfs-4.6.2-12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823775" comment="samba-winbind-4.6.2-12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823776" comment="samba-winbind-clients-4.6.2-12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823777" comment="samba-winbind-krb5-locator-4.6.2-12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823778" comment="samba-winbind-modules-4.6.2-12.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715041" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15041</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15041" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15041" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15041" ref_url="https://www.suse.com/security/cve/CVE-2017-15041" source="SUSE CVE"/>
    <description>
    Go before 1.8.4 and 1.9.x before 1.9.1 allows "go get" remote command execution. Using custom domains, it is possible to arrange things so that example.com/pkg1 points to a Subversion repository but example.com/pkg1/pkg2 points to a Git repository. If the Subversion repository includes a Git checkout in its pkg2 directory and some other work is done to ensure the proper ordering of operations, "go get" can be tricked into reusing this Git checkout for the fetch of code from pkg2. If the Subversion repository's Git checkout has malicious commands in .git/hooks/, they will execute on the system running "go get."
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-04-24"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15041/">CVE-2017-15041 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15041">CVE-2017-15041 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1062085">SUSE bug 1062085</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824131" comment="golang-1.9.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824132" comment="golang-bin-1.9.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824133" comment="golang-docs-1.9.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824134" comment="golang-misc-1.9.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824135" comment="golang-src-1.9.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824136" comment="golang-tests-1.9.4-1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715042" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15042</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15042" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15042" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15042" ref_url="https://www.suse.com/security/cve/CVE-2017-15042" source="SUSE CVE"/>
    <description>
    An unintended cleartext issue exists in Go before 1.8.4 and 1.9.x before 1.9.1. RFC 4954 requires that, during SMTP, the PLAIN auth scheme must only be used on network connections secured with TLS. The original implementation of smtp.PlainAuth in Go 1.0 enforced this requirement, and it was documented to do so. In 2013, upstream issue #5184, this was changed so that the server may decide whether PLAIN is acceptable. The result is that if you set up a man-in-the-middle SMTP server that doesn't advertise STARTTLS and does advertise that PLAIN auth is OK, the smtp.PlainAuth implementation sends the username and password.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-26"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15042/">CVE-2017-15042 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15042">CVE-2017-15042 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1062087">SUSE bug 1062087</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824131" comment="golang-1.9.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824132" comment="golang-bin-1.9.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824133" comment="golang-docs-1.9.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824134" comment="golang-misc-1.9.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824135" comment="golang-src-1.9.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824136" comment="golang-tests-1.9.4-1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715097" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15097</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15097" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15097" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15097" ref_url="https://www.suse.com/security/cve/CVE-2017-15097" source="SUSE CVE"/>
    <description>
    Privilege escalation flaws were found in the Red Hat initialization scripts of PostgreSQL. An attacker with access to the postgres user account could use these flaws to obtain root access on the server machine.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15097/">CVE-2017-15097 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15097">CVE-2017-15097 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823849" comment="postgresql-9.2.23-3.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823850" comment="postgresql-contrib-9.2.23-3.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823851" comment="postgresql-devel-9.2.23-3.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823852" comment="postgresql-docs-9.2.23-3.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823853" comment="postgresql-libs-9.2.23-3.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823854" comment="postgresql-plperl-9.2.23-3.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823855" comment="postgresql-plpython-9.2.23-3.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823856" comment="postgresql-pltcl-9.2.23-3.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823857" comment="postgresql-server-9.2.23-3.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823858" comment="postgresql-static-9.2.23-3.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823859" comment="postgresql-test-9.2.23-3.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823860" comment="postgresql-upgrade-9.2.23-3.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715101" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15101</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15101" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15101" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15101" ref_url="https://www.suse.com/security/cve/CVE-2017-15101" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003411.html" source="SUSE-SU"/>
    <description>
    A missing patch for a stack-based buffer overflow in findTable() was found in Red Hat version of liblouis before 2.5.4. An attacker could cause a denial of service condition or potentially even arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15101/">CVE-2017-15101 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15101">CVE-2017-15101 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1067336">SUSE bug 1067336</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823837" comment="liblouis-2.5.2-12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823838" comment="liblouis-devel-2.5.2-12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823839" comment="liblouis-doc-2.5.2-12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823840" comment="liblouis-python-2.5.2-12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823841" comment="liblouis-utils-2.5.2-12.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715111" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15111</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15111" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15111" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15111" ref_url="https://www.suse.com/security/cve/CVE-2017-15111" source="SUSE CVE"/>
    <description>
    keycloak-httpd-client-install versions before 0.8 insecurely creates temporary file allowing local attackers to overwrite other files via symbolic link.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15111/">CVE-2017-15111 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15111">CVE-2017-15111 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826326" comment="keycloak-httpd-client-install-0.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826327" comment="python2-keycloak-httpd-client-install-0.8-1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715112" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15112</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15112" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15112" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15112" ref_url="https://www.suse.com/security/cve/CVE-2017-15112" source="SUSE CVE"/>
    <description>
    keycloak-httpd-client-install versions before 0.8 allow users to insecurely pass password through command line, leaking it via command history and process info to other local users.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15112/">CVE-2017-15112 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15112">CVE-2017-15112 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826326" comment="keycloak-httpd-client-install-0.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826327" comment="python2-keycloak-httpd-client-install-0.8-1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715116" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15116</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15116" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15116" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15116" ref_url="https://www.suse.com/security/cve/CVE-2017-15116" source="SUSE CVE"/>
    <description>
    The rngapi_reset function in crypto/rng.c in the Linux kernel before 4.2 allows attackers to cause a denial of service (NULL pointer dereference).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15116/">CVE-2017-15116 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15116">CVE-2017-15116 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1070613">SUSE bug 1070613</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824165" comment="kernel-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824166" comment="kernel-abi-whitelists-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824167" comment="kernel-debug-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824170" comment="kernel-doc-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824171" comment="kernel-headers-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824172" comment="kernel-tools-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824173" comment="kernel-tools-libs-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824175" comment="perf-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824176" comment="python-perf-3.10.0-862.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715121" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15121</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15121" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15121" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15121" ref_url="https://www.suse.com/security/cve/CVE-2017-15121" source="SUSE CVE"/>
    <description>
    A non-privileged user is able to mount a fuse filesystem on RHEL 6 or 7 and crash a system if an application punches a hole in a file that does not end aligned to a page boundary.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15121/">CVE-2017-15121 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15121">CVE-2017-15121 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1071726">SUSE bug 1071726</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824165" comment="kernel-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824166" comment="kernel-abi-whitelists-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824167" comment="kernel-debug-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824170" comment="kernel-doc-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824171" comment="kernel-headers-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824172" comment="kernel-tools-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824173" comment="kernel-tools-libs-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824175" comment="perf-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824176" comment="python-perf-3.10.0-862.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715124" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15124</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15124" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15124" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15124" ref_url="https://www.suse.com/security/cve/CVE-2017-15124" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003848.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0780-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R3FRDROY2UV4WMIXYKNDNPPBXQOBE6U7/#R3FRDROY2UV4WMIXYKNDNPPBXQOBE6U7" source="SUSE-SU"/>
    <description>
    VNC server implementation in Quick Emulator (QEMU) 2.11.0 and older was found to be vulnerable to an unbounded memory allocation issue, as it did not throttle the framebuffer updates sent to its client. If the client did not consume these updates, VNC server allocates growing memory to hold onto this data. A malicious remote VNC client could use this flaw to cause DoS to the server host.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15124/">CVE-2017-15124 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15124">CVE-2017-15124 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1073489">SUSE bug 1073489</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824082" comment="qemu-img-1.5.3-156.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824083" comment="qemu-kvm-1.5.3-156.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824084" comment="qemu-kvm-common-1.5.3-156.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824085" comment="qemu-kvm-tools-1.5.3-156.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715126" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15126</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15126" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15126" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15126" ref_url="https://www.suse.com/security/cve/CVE-2017-15126" source="SUSE CVE"/>
    <description>
    A use-after-free flaw was found in fs/userfaultfd.c in the Linux kernel before 4.13.6. The issue is related to the handling of fork failure when dealing with event messages. Failure to fork correctly can lead to a situation where a fork event will be removed from an already freed list of events with userfaultfd_ctx_put().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15126/">CVE-2017-15126 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15126">CVE-2017-15126 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1073108">SUSE bug 1073108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171522">SUSE bug 1171522</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824165" comment="kernel-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824166" comment="kernel-abi-whitelists-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824167" comment="kernel-debug-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824170" comment="kernel-doc-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824171" comment="kernel-headers-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824172" comment="kernel-tools-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824173" comment="kernel-tools-libs-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824175" comment="perf-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824176" comment="python-perf-3.10.0-862.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715127" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15127</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15127" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15127" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15127" ref_url="https://www.suse.com/security/cve/CVE-2017-15127" source="SUSE CVE"/>
    <description>
    A flaw was found in the hugetlb_mcopy_atomic_pte function in mm/hugetlb.c in the Linux kernel before 4.13. A superfluous implicit page unlock for VM_SHARED hugetlbfs mapping could trigger a local denial of service (BUG).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15127/">CVE-2017-15127 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15127">CVE-2017-15127 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1073113">SUSE bug 1073113</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824165" comment="kernel-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824166" comment="kernel-abi-whitelists-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824167" comment="kernel-debug-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824170" comment="kernel-doc-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824171" comment="kernel-headers-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824172" comment="kernel-tools-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824173" comment="kernel-tools-libs-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824175" comment="perf-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824176" comment="python-perf-3.10.0-862.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715129" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15129</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15129" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15129" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15129" ref_url="https://www.suse.com/security/cve/CVE-2017-15129" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003902.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0408-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TBPHSNBEYKQGP3AGWJUUS3K6HJEQZTZE/#TBPHSNBEYKQGP3AGWJUUS3K6HJEQZTZE" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability was found in network namespaces code affecting the Linux kernel before 4.14.11. The function get_net_ns_by_id() in net/core/net_namespace.c does not check for the net::count value after it has found a peer network in netns_ids idr, which could lead to double free and memory corruption. This vulnerability could allow an unprivileged local user to induce kernel memory corruption on the system, leading to a crash. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although it is thought to be unlikely.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-15129/">CVE-2017-15129 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15129">CVE-2017-15129 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1074839">SUSE bug 1074839</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824165" comment="kernel-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824166" comment="kernel-abi-whitelists-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824167" comment="kernel-debug-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824170" comment="kernel-doc-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824171" comment="kernel-headers-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824172" comment="kernel-tools-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824173" comment="kernel-tools-libs-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824175" comment="perf-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824176" comment="python-perf-3.10.0-862.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715131" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15131</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15131" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15131" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15131" ref_url="https://www.suse.com/security/cve/CVE-2017-15131" source="SUSE CVE"/>
    <description>
    It was found that system umask policy is not being honored when creating XDG user directories, since Xsession sources xdg-user-dirs.sh before setting umask policy. This only affects xdg-user-dirs before 0.15.5 as shipped with Red Hat Enterprise Linux.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15131/">CVE-2017-15131 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15131">CVE-2017-15131 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1075378">SUSE bug 1075378</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824086" comment="xdg-user-dirs-0.15-5.el7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715134" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15134</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15134" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15134" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15134" ref_url="https://www.suse.com/security/cve/CVE-2017-15134" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005641.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1397-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YAYQ2CHUAX2LL7XOLPLU4GKMFXDM252V/#YAYQ2CHUAX2LL7XOLPLU4GKMFXDM252V" source="SUSE-SU"/>
    <description>
    A stack buffer overflow flaw was found in the way 389-ds-base 1.3.6.x before 1.3.6.13, 1.3.7.x before 1.3.7.9, 1.4.x before 1.4.0.5 handled certain LDAP search filters. A remote, unauthenticated attacker could potentially use this flaw to make ns-slapd crash via a specially crafted LDAP request, thus resulting in denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15134/">CVE-2017-15134 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15134">CVE-2017-15134 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1007004">SUSE bug 1007004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076530">SUSE bug 1076530</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823969" comment="389-ds-base-1.3.6.1-26.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823970" comment="389-ds-base-devel-1.3.6.1-26.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823971" comment="389-ds-base-libs-1.3.6.1-26.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823972" comment="389-ds-base-snmp-1.3.6.1-26.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715135" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15135</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15135" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15135" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15135" ref_url="https://www.suse.com/security/cve/CVE-2017-15135" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005641.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1397-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YAYQ2CHUAX2LL7XOLPLU4GKMFXDM252V/#YAYQ2CHUAX2LL7XOLPLU4GKMFXDM252V" source="SUSE-SU"/>
    <description>
    It was found that 389-ds-base since 1.3.6.1 up to and including 1.4.0.3 did not always handle internal hash comparison operations correctly during the authentication process. A remote, unauthenticated attacker could potentially use this flaw to bypass the authentication process under very rare and specific circumstances.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15135/">CVE-2017-15135 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15135">CVE-2017-15135 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1007004">SUSE bug 1007004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076530">SUSE bug 1076530</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824052" comment="389-ds-base-1.3.6.1-28.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824053" comment="389-ds-base-devel-1.3.6.1-28.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824054" comment="389-ds-base-libs-1.3.6.1-28.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824055" comment="389-ds-base-snmp-1.3.6.1-28.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715265" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15265</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15265" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15265" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15265" ref_url="https://www.suse.com/security/cve/CVE-2017-15265" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3410-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003550.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003576.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2846-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BASVOF5IYBWFH4KY2PGMCRYCT2LROR66/#BASVOF5IYBWFH4KY2PGMCRYCT2LROR66" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2905-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CPM3KJR2I4TDUD2FFWOSGMI4QVW7CONH/#CPM3KJR2I4TDUD2FFWOSGMI4QVW7CONH" source="SUSE-SU"/>
    <description>
    Race condition in the ALSA subsystem in the Linux kernel before 4.13.8 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted /dev/snd/seq ioctl calls, related to sound/core/seq/seq_clientmgr.c and sound/core/seq/seq_ports.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15265/">CVE-2017-15265 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15265">CVE-2017-15265 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1062520">SUSE bug 1062520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115893">SUSE bug 1115893</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824165" comment="kernel-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824166" comment="kernel-abi-whitelists-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824167" comment="kernel-debug-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824170" comment="kernel-doc-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824171" comment="kernel-headers-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824172" comment="kernel-tools-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824173" comment="kernel-tools-libs-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824175" comment="perf-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824176" comment="python-perf-3.10.0-862.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715268" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15268</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15268" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15268" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15268" ref_url="https://www.suse.com/security/cve/CVE-2017-15268" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2936-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003376.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2938-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4ZOC5UWC4S23HZWTUSJDD66LGMVNU3L3/#4ZOC5UWC4S23HZWTUSJDD66LGMVNU3L3" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2941-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NIVAYUS4Z3IDRS3LK2TACYUZB2ORNQTR/#NIVAYUS4Z3IDRS3LK2TACYUZB2ORNQTR" source="SUSE-SU"/>
    <description>
    Qemu through 2.10.0 allows remote attackers to cause a memory leak by triggering slow data-channel read operations, related to io/channel-websock.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15268/">CVE-2017-15268 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15268">CVE-2017-15268 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1062942">SUSE bug 1062942</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824082" comment="qemu-img-1.5.3-156.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824083" comment="qemu-kvm-1.5.3-156.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824084" comment="qemu-kvm-common-1.5.3-156.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824085" comment="qemu-kvm-tools-1.5.3-156.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715275" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15275</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15275" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15275" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15275" ref_url="https://www.suse.com/security/cve/CVE-2017-15275" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003418.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004410.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3141-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WXOXB4QKB5Q5ZRWD57VVVVYHJBHUB6GN/#WXOXB4QKB5Q5ZRWD57VVVVYHJBHUB6GN" source="SUSE-SU"/>
    <description>
    Samba before 4.7.3 might allow remote attackers to obtain sensitive information by leveraging failure of the server to clear allocated heap memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-15275/">CVE-2017-15275 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15275">CVE-2017-15275 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1063008">SUSE bug 1063008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069666">SUSE bug 1069666</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823753" comment="ctdb-4.6.2-12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823754" comment="ctdb-tests-4.6.2-12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823755" comment="libsmbclient-4.6.2-12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823756" comment="libsmbclient-devel-4.6.2-12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823757" comment="libwbclient-4.6.2-12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823758" comment="libwbclient-devel-4.6.2-12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823759" comment="samba-4.6.2-12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823760" comment="samba-client-4.6.2-12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823761" comment="samba-client-libs-4.6.2-12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823762" comment="samba-common-4.6.2-12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823763" comment="samba-common-libs-4.6.2-12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823764" comment="samba-common-tools-4.6.2-12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823765" comment="samba-dc-4.6.2-12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823766" comment="samba-dc-libs-4.6.2-12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823767" comment="samba-devel-4.6.2-12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823768" comment="samba-krb5-printing-4.6.2-12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823769" comment="samba-libs-4.6.2-12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823770" comment="samba-pidl-4.6.2-12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823771" comment="samba-python-4.6.2-12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823772" comment="samba-test-4.6.2-12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823773" comment="samba-test-libs-4.6.2-12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823774" comment="samba-vfs-glusterfs-4.6.2-12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823775" comment="samba-winbind-4.6.2-12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823776" comment="samba-winbind-clients-4.6.2-12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823777" comment="samba-winbind-krb5-locator-4.6.2-12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823778" comment="samba-winbind-modules-4.6.2-12.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715289" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15289</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15289" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15289" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15289" ref_url="https://www.suse.com/security/cve/CVE-2017-15289" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2936-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2963-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003485.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2938-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4ZOC5UWC4S23HZWTUSJDD66LGMVNU3L3/#4ZOC5UWC4S23HZWTUSJDD66LGMVNU3L3" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2941-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NIVAYUS4Z3IDRS3LK2TACYUZB2ORNQTR/#NIVAYUS4Z3IDRS3LK2TACYUZB2ORNQTR" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3193-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J3HSEJH2QUAYG6EAQ24HYRIVSLEAZ45X/#J3HSEJH2QUAYG6EAQ24HYRIVSLEAZ45X" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3194-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JFR5FHHXVWZRZ6MMP3FXVOZO6Q3DVPIQ/#JFR5FHHXVWZRZ6MMP3FXVOZO6Q3DVPIQ" source="SUSE-SU"/>
    <description>
    The mode4and5 write functions in hw/display/cirrus_vga.c in Qemu allow local OS guest privileged users to cause a denial of service (out-of-bounds write access and Qemu process crash) via vectors related to dst calculation.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15289/">CVE-2017-15289 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15289">CVE-2017-15289 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1063122">SUSE bug 1063122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063123">SUSE bug 1063123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823797" comment="qemu-img-1.5.3-141.el7_4.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823798" comment="qemu-kvm-1.5.3-141.el7_4.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823799" comment="qemu-kvm-common-1.5.3-141.el7_4.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823800" comment="qemu-kvm-tools-1.5.3-141.el7_4.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715412" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15412</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15412" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15412" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15412" ref_url="https://www.suse.com/security/cve/CVE-2017-15412" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003716.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3244-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3I4IEK25JTXFCR3N5PE5JPBVRGDX5G7P/#3I4IEK25JTXFCR3N5PE5JPBVRGDX5G7P" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3245-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VA55NOXRJGNNMP5YTJMI3OWZ75GMEMB2/#VA55NOXRJGNNMP5YTJMI3OWZ75GMEMB2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14697-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U5YNW74OL2W7SH2XTAVN5TODNFIVFL3Y/" source="SUSE-SU"/>
    <description>
    Use after free in libxml2 before 2.9.5, as used in Google Chrome prior to 63.0.3239.84 and other products, allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-12-05"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15412/">CVE-2017-15412 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15412">CVE-2017-15412 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1071691">SUSE bug 1071691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077993">SUSE bug 1077993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123129">SUSE bug 1123129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827903" comment="libxml2-2.9.1-6.el7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827904" comment="libxml2-devel-2.9.1-6.el7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827905" comment="libxml2-python-2.9.1-6.el7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827906" comment="libxml2-static-2.9.1-6.el7.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715649" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15649</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15649" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15649" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15649" ref_url="https://www.suse.com/security/cve/CVE-2017-15649" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003410.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003423.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003428.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3136-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3151-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003454.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3307-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003807.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2846-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BASVOF5IYBWFH4KY2PGMCRYCT2LROR66/#BASVOF5IYBWFH4KY2PGMCRYCT2LROR66" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2905-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CPM3KJR2I4TDUD2FFWOSGMI4QVW7CONH/#CPM3KJR2I4TDUD2FFWOSGMI4QVW7CONH" source="SUSE-SU"/>
    <description>
    net/packet/af_packet.c in the Linux kernel before 4.13.6 allows local users to gain privileges via crafted system calls that trigger mishandling of packet_fanout data structures, because of a race condition (involving fanout_add and packet_do_bind) that leads to a use-after-free, a different vulnerability than CVE-2017-6346.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15649/">CVE-2017-15649 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15649">CVE-2017-15649 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1064388">SUSE bug 1064388</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064392">SUSE bug 1064392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823952" comment="kernel-3.10.0-693.17.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823953" comment="kernel-abi-whitelists-3.10.0-693.17.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823954" comment="kernel-debug-3.10.0-693.17.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823957" comment="kernel-doc-3.10.0-693.17.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823958" comment="kernel-headers-3.10.0-693.17.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823959" comment="kernel-tools-3.10.0-693.17.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823960" comment="kernel-tools-libs-3.10.0-693.17.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823962" comment="perf-3.10.0-693.17.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823963" comment="python-perf-3.10.0-693.17.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715670" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15670</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15670" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15670" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15670" ref_url="https://www.suse.com/security/cve/CVE-2017-15670" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2883-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004606.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0089-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JJS3XXDA4SHQTNPUFBZSZ5XHKSMTGGOF/#JJS3XXDA4SHQTNPUFBZSZ5XHKSMTGGOF" source="SUSE-SU"/>
    <description>
    The GNU C Library (aka glibc or libc6) before 2.27 contains an off-by-one error leading to a heap-based buffer overflow in the glob function in glob.c, related to the processing of home directories using the ~ operator followed by a long string.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15670/">CVE-2017-15670 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15670">CVE-2017-15670 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1064583">SUSE bug 1064583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110160">SUSE bug 1110160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123874">SUSE bug 1123874</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824075" comment="glibc-2.17-222.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824076" comment="glibc-common-2.17-222.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824077" comment="glibc-devel-2.17-222.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824078" comment="glibc-headers-2.17-222.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824079" comment="glibc-static-2.17-222.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824080" comment="glibc-utils-2.17-222.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824081" comment="nscd-2.17-222.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715705" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15705</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15705" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15705" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15705" ref_url="https://www.suse.com/security/cve/CVE-2017-15705" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2011-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192011-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1831-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWM23J3YFXDJ4Y2P4EH532AXFSDKVM3Q/#XWM23J3YFXDJ4Y2P4EH532AXFSDKVM3Q" source="SUSE-SU"/>
    <description>
    A denial of service vulnerability was identified that exists in Apache SpamAssassin before 3.4.2. The vulnerability arises with certain unclosed tags in emails that cause markup to be handled incorrectly leading to scan timeouts. In Apache SpamAssassin, using HTML::Parser, we setup an object and hook into the begin and end tag event handlers In both cases, the "open" event is immediately followed by a "close" event - even if the tag *does not* close in the HTML being parsed. Because of this, we are missing the "text" event to deal with the object normally. This can cause carefully crafted emails that might take more scan time than expected leading to a Denial of Service. The issue is possibly a bug or design decision in HTML::Parser that specifically impacts the way Apache SpamAssassin uses the module with poorly formed html. The exploit has been seen in the wild but not believed to have been purposefully part of a Denial of Service attempt. We are concerned that there may be attempts to abuse the vulnerability in the future.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15705/">CVE-2017-15705 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15705">CVE-2017-15705 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1108745">SUSE bug 1108745</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824591" comment="spamassassin-3.4.0-4.el7_5 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715710" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15710</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15710" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15710" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15710" ref_url="https://www.suse.com/security/cve/CVE-2017-15710" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1161-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004700.html" source="SUSE-SU"/>
    <description>
    In Apache httpd 2.0.23 to 2.0.65, 2.2.0 to 2.2.34, and 2.4.0 to 2.4.29, mod_authnz_ldap, if configured with AuthLDAPCharsetConfig, uses the Accept-Language header value to lookup the right charset encoding when verifying the user's credentials. If the header value is not present in the charset conversion table, a fallback mechanism is used to truncate it to a two characters value to allow a quick retry (for example, 'en-US' is truncated to 'en'). A header value of less than two characters forces an out of bound write of one NUL byte to a memory location that is not part of the string. In the worst case, quite unlikely, the process would crash which could be used as a Denial of Service attack. In the more likely case, this memory is already reserved for future use and the issue has no effect at all.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15710/">CVE-2017-15710 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15710">CVE-2017-15710 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1086776">SUSE bug 1086776</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827796" comment="httpd-2.4.6-93.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827797" comment="httpd-devel-2.4.6-93.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827798" comment="httpd-manual-2.4.6-93.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827799" comment="httpd-tools-2.4.6-93.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827800" comment="mod_ldap-2.4.6-93.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827801" comment="mod_proxy_html-2.4.6-93.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827802" comment="mod_session-2.4.6-93.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827803" comment="mod_ssl-2.4.6-93.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715715" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15715</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15715" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15715" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15715" ref_url="https://www.suse.com/security/cve/CVE-2017-15715" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1161-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004700.html" source="SUSE-SU"/>
    <description>
    In Apache httpd 2.4.0 to 2.4.29, the expression specified in &lt;FilesMatch&gt; could match '$' to a newline character in a malicious filename, rather than matching only the end of the filename. This could be exploited in environments where uploads of some files are are externally blocked, but only by matching the trailing portion of the filename.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15715/">CVE-2017-15715 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15715">CVE-2017-15715 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1086774">SUSE bug 1086774</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828309" comment="httpd-2.4.6-95.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828310" comment="httpd-devel-2.4.6-95.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828311" comment="httpd-manual-2.4.6-95.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828312" comment="httpd-tools-2.4.6-95.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828313" comment="mod_ldap-2.4.6-95.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828314" comment="mod_proxy_html-2.4.6-95.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828315" comment="mod_session-2.4.6-95.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828316" comment="mod_ssl-2.4.6-95.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715804" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15804</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15804" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15804" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15804" ref_url="https://www.suse.com/security/cve/CVE-2017-15804" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2883-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004606.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0089-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JJS3XXDA4SHQTNPUFBZSZ5XHKSMTGGOF/#JJS3XXDA4SHQTNPUFBZSZ5XHKSMTGGOF" source="SUSE-SU"/>
    <description>
    The glob function in glob.c in the GNU C Library (aka glibc or libc6) before 2.27 contains a buffer overflow during unescaping of user names with the ~ operator.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-15804/">CVE-2017-15804 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15804">CVE-2017-15804 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1064580">SUSE bug 1064580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110160">SUSE bug 1110160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123874">SUSE bug 1123874</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824075" comment="glibc-2.17-222.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824076" comment="glibc-common-2.17-222.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824077" comment="glibc-devel-2.17-222.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824078" comment="glibc-headers-2.17-222.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824079" comment="glibc-static-2.17-222.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824080" comment="glibc-utils-2.17-222.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824081" comment="nscd-2.17-222.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715906" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15906</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15906" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15906" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15906" ref_url="https://www.suse.com/security/cve/CVE-2017-15906" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004804.html" source="SUSE-SU"/>
    <description>
    The process_open function in sftp-server.c in OpenSSH before 7.6 does not properly prevent write operations in readonly mode, which allows attackers to create zero-length files.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-15906/">CVE-2017-15906 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15906">CVE-2017-15906 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1064285">SUSE bug 1064285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065000">SUSE bug 1065000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074115">SUSE bug 1074115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079488">SUSE bug 1079488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090163">SUSE bug 1090163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099316">SUSE bug 1099316</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138392">SUSE bug 1138392</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824144" comment="openssh-7.4p1-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824145" comment="openssh-askpass-7.4p1-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824146" comment="openssh-cavs-7.4p1-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824147" comment="openssh-clients-7.4p1-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824148" comment="openssh-keycat-7.4p1-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824149" comment="openssh-ldap-7.4p1-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824150" comment="openssh-server-7.4p1-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824151" comment="openssh-server-sysvinit-7.4p1-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824152" comment="pam_ssh_agent_auth-0.10.3-2.16.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16541</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16541" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16541" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16541" ref_url="https://www.suse.com/security/cve/CVE-2017-16541" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3591-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004918.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2674-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BM5IL3XEYSPZSNIUEK2GSPH74KS7Z77J/#BM5IL3XEYSPZSNIUEK2GSPH74KS7Z77J" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3051-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MTTZ6YPTQZTRHJWNCF4KNXDHV5N6Y2CU/#MTTZ6YPTQZTRHJWNCF4KNXDHV5N6Y2CU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3687-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BBHDVB7NPDAZXEW2BECURXKYFEGTTUL4/#BBHDVB7NPDAZXEW2BECURXKYFEGTTUL4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Tor Browser before 7.0.9 on macOS and Linux allows remote attackers to bypass the intended anonymity feature and discover a client IP address via vectors involving a crafted web site that leverages file:// mishandling in Firefox, aka TorMoil. NOTE: Tails is unaffected.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-16541/">CVE-2017-16541 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16541">CVE-2017-16541 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1066489">SUSE bug 1066489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107343">SUSE bug 1107343</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824555" comment="firefox-60.2.0-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825374" comment="thunderbird-60.2.1-4.el7_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716844" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16844</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16844" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16844" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16844" ref_url="https://www.suse.com/security/cve/CVE-2017-16844" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003618.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the loadbuf function in formisc.c in formail in procmail 3.22 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted e-mail message because of a hardcoded realloc size, a different vulnerability than CVE-2014-3618.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-16844/">CVE-2017-16844 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16844">CVE-2017-16844 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1068648">SUSE bug 1068648</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823782" comment="procmail-3.22-36.el7_4.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716939" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16939</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16939" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16939" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16939" ref_url="https://www.suse.com/security/cve/CVE-2017-16939" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3225-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003500.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003502.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003506.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003507.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003508.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003509.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003510.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3304-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003513.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003514.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3307-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003526.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3340-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003629.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003641.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003642.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003644.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003665.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003668.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003669.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003676.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0340-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005101.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3358-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4UYJRYWN3YIKVO45AOJQMXXWEWZ76QPX/#4UYJRYWN3YIKVO45AOJQMXXWEWZ76QPX" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3359-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KNOTZX2CMPWZWZ2GTPQ2RA6T3XMG2V5Y/#KNOTZX2CMPWZWZ2GTPQ2RA6T3XMG2V5Y" source="SUSE-SU"/>
    <description>
    The XFRM dump policy implementation in net/xfrm/xfrm_user.c in the Linux kernel before 4.13.11 allows local users to gain privileges or cause a denial of service (use-after-free) via a crafted SO_RCVBUF setsockopt system call in conjunction with XFRM_MSG_GETPOLICY Netlink messages.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-16939/">CVE-2017-16939 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16939">CVE-2017-16939 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1069702">SUSE bug 1069702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069708">SUSE bug 1069708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115893">SUSE bug 1115893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120260">SUSE bug 1120260</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824218" comment="kernel-3.10.0-862.2.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824219" comment="kernel-abi-whitelists-3.10.0-862.2.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824220" comment="kernel-debug-3.10.0-862.2.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824223" comment="kernel-doc-3.10.0-862.2.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824224" comment="kernel-headers-3.10.0-862.2.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824225" comment="kernel-tools-3.10.0-862.2.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824226" comment="kernel-tools-libs-3.10.0-862.2.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824228" comment="perf-3.10.0-862.2.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824229" comment="python-perf-3.10.0-862.2.3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716997" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16997</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16997" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16997" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16997" ref_url="https://www.suse.com/security/cve/CVE-2017-16997" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003592.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0089-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JJS3XXDA4SHQTNPUFBZSZ5XHKSMTGGOF/#JJS3XXDA4SHQTNPUFBZSZ5XHKSMTGGOF" source="SUSE-SU"/>
    <description>
    elf/dl-load.c in the GNU C Library (aka glibc or libc6) 2.19 through 2.26 mishandles RPATH and RUNPATH containing $ORIGIN for a privileged (setuid or AT_SECURE) program, which allows local users to gain privileges via a Trojan horse library in the current working directory, related to the fillin_rpath and decompose_rpath functions. This is associated with misinterpretion of an empty RPATH/RUNPATH token as the "./" directory. NOTE: this configuration of RPATH/RUNPATH for a privileged program is apparently very uncommon; most likely, no such program is shipped with any common Linux distribution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-16997/">CVE-2017-16997 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16997">CVE-2017-16997 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1073231">SUSE bug 1073231</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824800" comment="glibc-2.17-260.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824801" comment="glibc-common-2.17-260.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824802" comment="glibc-devel-2.17-260.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824803" comment="glibc-headers-2.17-260.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824804" comment="glibc-static-2.17-260.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824805" comment="glibc-utils-2.17-260.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824806" comment="nscd-2.17-260.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717405" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17405</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17405" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17405" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17405" ref_url="https://www.suse.com/security/cve/CVE-2017-17405" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
    <description>
    Ruby before 2.4.3 allows Net::FTP command injection. Net::FTP#get, getbinaryfile, gettextfile, put, putbinaryfile, and puttextfile use Kernel#open to open a local file. If the localfile argument starts with the "|" pipe character, the command following the pipe character is executed. The default value of localfile is File.basename(remotefile), so malicious FTP servers could cause arbitrary command execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17405/">CVE-2017-17405 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17405">CVE-2017-17405 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1073002">SUSE bug 1073002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078782">SUSE bug 1078782</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824000" comment="ruby-2.0.0.648-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824001" comment="ruby-devel-2.0.0.648-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824002" comment="ruby-doc-2.0.0.648-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824003" comment="ruby-irb-2.0.0.648-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824004" comment="ruby-libs-2.0.0.648-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824005" comment="ruby-tcltk-2.0.0.648-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824006" comment="rubygem-bigdecimal-1.2.0-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824007" comment="rubygem-io-console-0.4.2-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824008" comment="rubygem-json-1.7.7-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824009" comment="rubygem-minitest-4.3.2-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824010" comment="rubygem-psych-2.0.0-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824011" comment="rubygem-rake-0.9.6-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824012" comment="rubygem-rdoc-4.0.0-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824013" comment="rubygems-2.0.14.1-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824014" comment="rubygems-devel-2.0.14.1-33.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717448" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17448</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17448" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17448" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17448" ref_url="https://www.suse.com/security/cve/CVE-2017-17448" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3410-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003550.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003629.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3358-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4UYJRYWN3YIKVO45AOJQMXXWEWZ76QPX/#4UYJRYWN3YIKVO45AOJQMXXWEWZ76QPX" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3359-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KNOTZX2CMPWZWZ2GTPQ2RA6T3XMG2V5Y/#KNOTZX2CMPWZWZ2GTPQ2RA6T3XMG2V5Y" source="SUSE-SU"/>
    <description>
    net/netfilter/nfnetlink_cthelper.c in the Linux kernel through 4.14.4 does not require the CAP_NET_ADMIN capability for new, get, and del operations, which allows local users to bypass intended access restrictions because the nfnl_cthelper_list data structure is shared across all net namespaces.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.7/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17448/">CVE-2017-17448 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17448">CVE-2017-17448 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1071693">SUSE bug 1071693</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824165" comment="kernel-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824166" comment="kernel-abi-whitelists-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824167" comment="kernel-debug-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824170" comment="kernel-doc-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824171" comment="kernel-headers-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824172" comment="kernel-tools-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824173" comment="kernel-tools-libs-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824175" comment="perf-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824176" comment="python-perf-3.10.0-862.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717449" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17449</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17449" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17449" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17449" ref_url="https://www.suse.com/security/cve/CVE-2017-17449" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3410-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003550.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003629.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3358-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4UYJRYWN3YIKVO45AOJQMXXWEWZ76QPX/#4UYJRYWN3YIKVO45AOJQMXXWEWZ76QPX" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3359-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KNOTZX2CMPWZWZ2GTPQ2RA6T3XMG2V5Y/#KNOTZX2CMPWZWZ2GTPQ2RA6T3XMG2V5Y" source="SUSE-SU"/>
    <description>
    The __netlink_deliver_tap_skb function in net/netlink/af_netlink.c in the Linux kernel through 4.14.4, when CONFIG_NLMON is enabled, does not restrict observations of Netlink messages to a single net namespace, which allows local users to obtain sensitive information by leveraging the CAP_NET_ADMIN capability to sniff an nlmon interface for all Netlink activity on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-17449/">CVE-2017-17449 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17449">CVE-2017-17449 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1071694">SUSE bug 1071694</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824165" comment="kernel-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824166" comment="kernel-abi-whitelists-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824167" comment="kernel-debug-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824170" comment="kernel-doc-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824171" comment="kernel-headers-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824172" comment="kernel-tools-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824173" comment="kernel-tools-libs-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824175" comment="perf-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824176" comment="python-perf-3.10.0-862.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717558" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17558</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17558" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17558" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17558" ref_url="https://www.suse.com/security/cve/CVE-2017-17558" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003622.html" source="SUSE-SU"/>
    <description>
    The usb_destroy_configuration function in drivers/usb/core/config.c in the USB core subsystem in the Linux kernel through 4.14.5 does not consider the maximum number of configurations and interfaces before attempting to release resources, which allows local users to cause a denial of service (out-of-bounds write access) or possibly have unspecified other impact via a crafted USB device.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-17558/">CVE-2017-17558 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17558">CVE-2017-17558 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1072561">SUSE bug 1072561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824165" comment="kernel-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824166" comment="kernel-abi-whitelists-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824167" comment="kernel-debug-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824170" comment="kernel-doc-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824171" comment="kernel-headers-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824172" comment="kernel-tools-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824173" comment="kernel-tools-libs-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824175" comment="perf-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824176" comment="python-perf-3.10.0-862.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717724" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17724</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17724" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17724" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17724" ref_url="https://www.suse.com/security/cve/CVE-2017-17724" source="SUSE CVE"/>
    <description>
    In Exiv2 0.26, there is a heap-based buffer over-read in the Exiv2::IptcData::printStructure function in iptc.cpp, related to the "!= 0x1c" case. Remote attackers can exploit this vulnerability to cause a denial of service via a crafted TIFF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-21"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-17724/">CVE-2017-17724 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17724">CVE-2017-17724 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1080736">SUSE bug 1080736</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087892">SUSE bug 1087892</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826187" comment="exiv2-0.27.0-2.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826188" comment="exiv2-devel-0.27.0-2.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826189" comment="exiv2-doc-0.27.0-2.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826190" comment="exiv2-libs-0.27.0-2.el7_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717742" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17742</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17742" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17742" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17742" ref_url="https://www.suse.com/security/cve/CVE-2017-17742" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1771-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DDFTKHWDUNIX327O4WIHXU2TIVV47W3Z/#DDFTKHWDUNIX327O4WIHXU2TIVV47W3Z" source="SUSE-SU"/>
    <description>
    Ruby before 2.2.10, 2.3.x before 2.3.7, 2.4.x before 2.4.4, 2.5.x before 2.5.1, and 2.6.0-preview1 allows an HTTP Response Splitting attack. An attacker can inject a crafted key and value into an HTTP response for the HTTP server of WEBrick.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-17742/">CVE-2017-17742 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17742">CVE-2017-17742 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1087434">SUSE bug 1087434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136906">SUSE bug 1136906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152992">SUSE bug 1152992</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825992" comment="ruby-2.0.0.648-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825993" comment="ruby-devel-2.0.0.648-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825994" comment="ruby-doc-2.0.0.648-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825995" comment="ruby-irb-2.0.0.648-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825996" comment="ruby-libs-2.0.0.648-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825997" comment="ruby-tcltk-2.0.0.648-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825998" comment="rubygem-bigdecimal-1.2.0-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825999" comment="rubygem-io-console-0.4.2-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826000" comment="rubygem-json-1.7.7-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826001" comment="rubygem-minitest-4.3.2-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826002" comment="rubygem-psych-2.0.0-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826003" comment="rubygem-rake-0.9.6-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826004" comment="rubygem-rdoc-4.0.0-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826005" comment="rubygems-2.0.14.1-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826006" comment="rubygems-devel-2.0.14.1-36.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717790" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17790</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17790" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17790" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17790" ref_url="https://www.suse.com/security/cve/CVE-2017-17790" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
    <description>
    The lazy_initialize function in lib/resolv.rb in Ruby through 2.4.3 uses Kernel#open, which might allow Command Injection attacks, as demonstrated by a Resolv::Hosts::new argument beginning with a '|' character, a different vulnerability than CVE-2017-17405. NOTE: situations with untrusted input may be highly unlikely.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17790/">CVE-2017-17790 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17790">CVE-2017-17790 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1073002">SUSE bug 1073002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078782">SUSE bug 1078782</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824000" comment="ruby-2.0.0.648-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824001" comment="ruby-devel-2.0.0.648-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824002" comment="ruby-doc-2.0.0.648-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824003" comment="ruby-irb-2.0.0.648-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824004" comment="ruby-libs-2.0.0.648-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824005" comment="ruby-tcltk-2.0.0.648-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824006" comment="rubygem-bigdecimal-1.2.0-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824007" comment="rubygem-io-console-0.4.2-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824008" comment="rubygem-json-1.7.7-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824009" comment="rubygem-minitest-4.3.2-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824010" comment="rubygem-psych-2.0.0-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824011" comment="rubygem-rake-0.9.6-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824012" comment="rubygem-rdoc-4.0.0-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824013" comment="rubygems-2.0.14.1-33.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824014" comment="rubygems-devel-2.0.14.1-33.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17805</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17805" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17805" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17805" ref_url="https://www.suse.com/security/cve/CVE-2017-17805" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0010-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003629.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0437-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2018-February/007939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003750.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0022-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/47VWN6YQVTJIK4KOIPOKDOUQNRHO3UO6/#47VWN6YQVTJIK4KOIPOKDOUQNRHO3UO6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0023-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZHXQ2V7OTLSNQH4TTBOC6U6FWIKLIWB6/#ZHXQ2V7OTLSNQH4TTBOC6U6FWIKLIWB6" source="SUSE-SU"/>
    <description>
    The Salsa20 encryption algorithm in the Linux kernel before 4.14.8 does not correctly handle zero-length inputs, allowing a local attacker able to use the AF_ALG-based skcipher interface (CONFIG_CRYPTO_USER_API_SKCIPHER) to cause a denial of service (uninitialized-memory free and kernel crash) or have unspecified other impact by executing a crafted sequence of system calls that use the blkcipher_walk API. Both the generic implementation (crypto/salsa20_generic.c) and x86 implementation (arch/x86/crypto/salsa20_glue.c) of Salsa20 were vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-17805/">CVE-2017-17805 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17805">CVE-2017-17805 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1073792">SUSE bug 1073792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115893">SUSE bug 1115893</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824786" comment="bpftool-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824787" comment="kernel-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824788" comment="kernel-abi-whitelists-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824789" comment="kernel-debug-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824792" comment="kernel-doc-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824793" comment="kernel-headers-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824794" comment="kernel-tools-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824795" comment="kernel-tools-libs-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824797" comment="perf-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824798" comment="python-perf-3.10.0-957.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717807" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17807</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17807" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17807" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17807" ref_url="https://www.suse.com/security/cve/CVE-2017-17807" source="SUSE CVE"/>
    <description>
    The KEYS subsystem in the Linux kernel before 4.14.6 omitted an access-control check when adding a key to the current task's "default request-key keyring" via the request_key() system call, allowing a local user to use a sequence of crafted system calls to add keys to a keyring with only Search permission (not Write permission) to that keyring, related to construct_get_dest_keyring() in security/keys/request_key.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17807/">CVE-2017-17807 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17807">CVE-2017-17807 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1073860">SUSE bug 1073860</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826993" comment="bpftool-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826994" comment="kernel-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826995" comment="kernel-abi-whitelists-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826996" comment="kernel-debug-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826999" comment="kernel-doc-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827000" comment="kernel-headers-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827001" comment="kernel-tools-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827002" comment="kernel-tools-libs-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827004" comment="perf-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827005" comment="python-perf-3.10.0-1127.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717833" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17833</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17833" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17833" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17833" ref_url="https://www.suse.com/security/cve/CVE-2017-17833" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2779-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2991-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2991-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2991-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005372.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1958-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O4V5BRCDW43YWFK6V2VJPYO5ZOQFA5PS/#O4V5BRCDW43YWFK6V2VJPYO5ZOQFA5PS" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2813-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JFDI2R7CPOWCUKXCT45HEOUTKCF35ZPV/#JFDI2R7CPOWCUKXCT45HEOUTKCF35ZPV" source="SUSE-SU"/>
    <description>
    OpenSLP releases in the 1.0.2 and 1.1.0 code streams have a heap-related memory corruption issue which may manifest itself as a denial-of-service or a remote code-execution vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-17833/">CVE-2017-17833 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17833">CVE-2017-17833 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1090638">SUSE bug 1090638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099519">SUSE bug 1099519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824449" comment="openslp-2.0.0-7.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824450" comment="openslp-devel-2.0.0-7.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824451" comment="openslp-server-2.0.0-7.el7_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718017" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18017</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18017" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18017" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18017" ref_url="https://www.suse.com/security/cve/CVE-2017-18017" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003902.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0408-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TBPHSNBEYKQGP3AGWJUUS3K6HJEQZTZE/#TBPHSNBEYKQGP3AGWJUUS3K6HJEQZTZE" source="SUSE-SU"/>
    <description>
    The tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c in the Linux kernel before 4.11, and 4.9.x before 4.9.36, allows remote attackers to cause a denial of service (use-after-free and memory corruption) or possibly have unspecified other impact by leveraging the presence of xt_TCPMSS in an iptables action.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18017/">CVE-2017-18017 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18017">CVE-2017-18017 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1074488">SUSE bug 1074488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080255">SUSE bug 1080255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091815">SUSE bug 1091815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115893">SUSE bug 1115893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971126">SUSE bug 971126</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824165" comment="kernel-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824166" comment="kernel-abi-whitelists-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824167" comment="kernel-debug-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824170" comment="kernel-doc-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824171" comment="kernel-headers-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824172" comment="kernel-tools-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824173" comment="kernel-tools-libs-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824175" comment="perf-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824176" comment="python-perf-3.10.0-862.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718189" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18189</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18189" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18189" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18189" ref_url="https://www.suse.com/security/cve/CVE-2017-18189" source="SUSE CVE"/>
    <description>
    In the startread function in xa.c in Sound eXchange (SoX) through 14.4.2, a corrupt header specifying zero channels triggers an infinite loop with a resultant NULL pointer dereference, which may allow a remote attacker to cause a denial-of-service.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18189/">CVE-2017-18189 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18189">CVE-2017-18189 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1081146">SUSE bug 1081146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141667">SUSE bug 1141667</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826518" comment="sox-14.4.1-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826519" comment="sox-devel-14.4.1-7.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718190" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18190</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18190" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18190" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18190" ref_url="https://www.suse.com/security/cve/CVE-2017-18190" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003786.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0618-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DX7VDTCWG5QBCJGF6QCLE3A5GBJJHLPT/#DX7VDTCWG5QBCJGF6QCLE3A5GBJJHLPT" source="SUSE-SU"/>
    <description>
    A localhost.localdomain whitelist entry in valid_host() in scheduler/client.c in CUPS before 2.2.2 allows remote attackers to execute arbitrary IPP commands by sending POST requests to the CUPS daemon in conjunction with DNS rebinding. The localhost.localdomain name is often resolved via a DNS server (neither the OS nor the web browser is responsible for ensuring that localhost.localdomain is 127.0.0.1).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="critical" cvss3="9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18190/">CVE-2017-18190 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18190">CVE-2017-18190 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1081557">SUSE bug 1081557</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828116" comment="cups-1.6.3-51.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828117" comment="cups-client-1.6.3-51.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828118" comment="cups-devel-1.6.3-51.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828119" comment="cups-filesystem-1.6.3-51.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828120" comment="cups-ipptool-1.6.3-51.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828121" comment="cups-libs-1.6.3-51.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828122" comment="cups-lpd-1.6.3-51.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718198" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18198</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18198" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18198" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18198" ref_url="https://www.suse.com/security/cve/CVE-2017-18198" source="SUSE CVE"/>
    <description>
    print_iso9660_recurse in iso-info.c in GNU libcdio before 1.0.0 allows remote attackers to cause a denial of service (heap-based buffer over-read) or possibly have unspecified other impact via a crafted iso file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-05"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.9/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18198/">CVE-2017-18198 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18198">CVE-2017-18198 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1082819">SUSE bug 1082819</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825323" comment="libcdio-0.92-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825324" comment="libcdio-devel-0.92-3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718199" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18199</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18199" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18199" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18199" ref_url="https://www.suse.com/security/cve/CVE-2017-18199" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3023-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007617.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2294-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NTG4I2XJ2B4EJHSENAOJH5QZKGBWYR5A/#NTG4I2XJ2B4EJHSENAOJH5QZKGBWYR5A" source="SUSE-SU"/>
    <description>
    realloc_symlink in rock.c in GNU libcdio before 1.0.0 allows remote attackers to cause a denial of service (NULL Pointer Dereference) via a crafted iso file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18199/">CVE-2017-18199 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18199">CVE-2017-18199 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1082821">SUSE bug 1082821</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825323" comment="libcdio-0.92-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825324" comment="libcdio-devel-0.92-3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718201" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18201</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18201" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18201" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18201" ref_url="https://www.suse.com/security/cve/CVE-2017-18201" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0673-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003811.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004383.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2294-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NTG4I2XJ2B4EJHSENAOJH5QZKGBWYR5A/#NTG4I2XJ2B4EJHSENAOJH5QZKGBWYR5A" source="SUSE-SU"/>
    <description>
    An issue was discovered in GNU libcdio before 2.0.0. There is a double free in get_cdtext_generic() in lib/driver/_cdio_generic.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18201/">CVE-2017-18201 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18201">CVE-2017-18201 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1082877">SUSE bug 1082877</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825323" comment="libcdio-0.92-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825324" comment="libcdio-devel-0.92-3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718203" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18203</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18203" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18203" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18203" ref_url="https://www.suse.com/security/cve/CVE-2017-18203" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004055.html" source="SUSE-SU"/>
    <description>
    The dm_get_from_kobject function in drivers/md/dm.c in the Linux kernel before 4.14.3 allow local users to cause a denial of service (BUG) by leveraging a race condition with __dm_destroy during creation and removal of DM devices.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18203/">CVE-2017-18203 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18203">CVE-2017-18203 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1083242">SUSE bug 1083242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091815">SUSE bug 1091815</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824165" comment="kernel-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824166" comment="kernel-abi-whitelists-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824167" comment="kernel-debug-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824170" comment="kernel-doc-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824171" comment="kernel-headers-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824172" comment="kernel-tools-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824173" comment="kernel-tools-libs-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824175" comment="perf-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824176" comment="python-perf-3.10.0-862.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718205" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18205</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18205" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18205" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18205" ref_url="https://www.suse.com/security/cve/CVE-2017-18205" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010436.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1093-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GK62YTNMQ4SBUW42W4UTPSYBGUSFJAAP/#GK62YTNMQ4SBUW42W4UTPSYBGUSFJAAP" source="SUSE-SU"/>
    <description>
    In builtin.c in zsh before 5.4, when sh compatibility mode is used, there is a NULL pointer dereference during processing of the cd command with no argument if HOME is not set.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18205/">CVE-2017-18205 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18205">CVE-2017-18205 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1082998">SUSE bug 1082998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200039">SUSE bug 1200039</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824784" comment="zsh-5.0.2-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824785" comment="zsh-html-5.0.2-31.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718206" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18206</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18206" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18206" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18206" ref_url="https://www.suse.com/security/cve/CVE-2017-18206" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010436.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1093-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GK62YTNMQ4SBUW42W4UTPSYBGUSFJAAP/#GK62YTNMQ4SBUW42W4UTPSYBGUSFJAAP" source="SUSE-SU"/>
    <description>
    In utils.c in zsh before 5.4, symlink expansion had a buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18206/">CVE-2017-18206 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18206">CVE-2017-18206 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1083002">SUSE bug 1083002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215218">SUSE bug 1215218</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824784" comment="zsh-5.0.2-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824785" comment="zsh-html-5.0.2-31.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718208" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18208</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18208" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18208" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18208" ref_url="https://www.suse.com/security/cve/CVE-2017-18208" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0781-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IGSNRZOHBLG7CUS6RPT3LPE2GCEITYQD/#IGSNRZOHBLG7CUS6RPT3LPE2GCEITYQD" source="SUSE-SU"/>
    <description>
    The madvise_willneed function in mm/madvise.c in the Linux kernel before 4.14.4 allows local users to cause a denial of service (infinite loop) by triggering use of MADVISE_WILLNEED for a DAX mapping.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18208/">CVE-2017-18208 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18208">CVE-2017-18208 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1083494">SUSE bug 1083494</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091815">SUSE bug 1091815</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824786" comment="bpftool-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824787" comment="kernel-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824788" comment="kernel-abi-whitelists-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824789" comment="kernel-debug-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824792" comment="kernel-doc-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824793" comment="kernel-headers-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824794" comment="kernel-tools-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824795" comment="kernel-tools-libs-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824797" comment="perf-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824798" comment="python-perf-3.10.0-957.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718232" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18232</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18232" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18232" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18232" ref_url="https://www.suse.com/security/cve/CVE-2017-18232" source="SUSE CVE"/>
    <description>
    The Serial Attached SCSI (SAS) implementation in the Linux kernel through 4.15.9 mishandles a mutex within libsas, which allows local users to cause a denial of service (deadlock) by triggering certain error-handling code.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18232/">CVE-2017-18232 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18232">CVE-2017-18232 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1085413">SUSE bug 1085413</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824786" comment="bpftool-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824787" comment="kernel-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824788" comment="kernel-abi-whitelists-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824789" comment="kernel-debug-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824792" comment="kernel-doc-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824793" comment="kernel-headers-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824794" comment="kernel-tools-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824795" comment="kernel-tools-libs-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824797" comment="perf-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824798" comment="python-perf-3.10.0-957.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718233" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18233</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18233" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18233" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18233" ref_url="https://www.suse.com/security/cve/CVE-2017-18233" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004783.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2764-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RUKLWH6JS7I6W2VBPEDUF3ICKSAQLPST/#RUKLWH6JS7I6W2VBPEDUF3ICKSAQLPST" source="SUSE-SU"/>
    <description>
    An issue was discovered in Exempi before 2.4.4. Integer overflow in the Chunk class in XMPFiles/source/FormatSupport/RIFF.cpp allows remote attackers to cause a denial of service (infinite loop) via crafted XMP data in a .avi file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18233/">CVE-2017-18233 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18233">CVE-2017-18233 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1085584">SUSE bug 1085584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085585">SUSE bug 1085585</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826077" comment="exempi-2.2.0-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826078" comment="exempi-devel-2.2.0-9.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718234" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18234</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18234" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18234" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18234" ref_url="https://www.suse.com/security/cve/CVE-2017-18234" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004783.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Exempi before 2.4.3. It allows remote attackers to cause a denial of service (invalid memcpy with resultant use-after-free) or possibly have unspecified other impact via a .pdf file containing JPEG data, related to XMPFiles/source/FormatSupport/ReconcileTIFF.cpp, XMPFiles/source/FormatSupport/TIFF_MemoryReader.cpp, and XMPFiles/source/FormatSupport/TIFF_Support.hpp.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18234/">CVE-2017-18234 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18234">CVE-2017-18234 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1085585">SUSE bug 1085585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103718">SUSE bug 1103718</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826077" comment="exempi-2.2.0-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826078" comment="exempi-devel-2.2.0-9.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718236" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18236</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18236" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18236" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18236" ref_url="https://www.suse.com/security/cve/CVE-2017-18236" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004783.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2764-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RUKLWH6JS7I6W2VBPEDUF3ICKSAQLPST/#RUKLWH6JS7I6W2VBPEDUF3ICKSAQLPST" source="SUSE-SU"/>
    <description>
    An issue was discovered in Exempi before 2.4.4. The ASF_Support::ReadHeaderObject function in XMPFiles/source/FormatSupport/ASF_Support.cpp allows remote attackers to cause a denial of service (infinite loop) via a crafted .asf file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18236/">CVE-2017-18236 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18236">CVE-2017-18236 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1085585">SUSE bug 1085585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085589">SUSE bug 1085589</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826077" comment="exempi-2.2.0-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826078" comment="exempi-devel-2.2.0-9.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718238" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18238</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18238" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18238" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18238" ref_url="https://www.suse.com/security/cve/CVE-2017-18238" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004783.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2764-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RUKLWH6JS7I6W2VBPEDUF3ICKSAQLPST/#RUKLWH6JS7I6W2VBPEDUF3ICKSAQLPST" source="SUSE-SU"/>
    <description>
    An issue was discovered in Exempi before 2.4.4. The TradQT_Manager::ParseCachedBoxes function in XMPFiles/source/FormatSupport/QuickTime_Support.cpp allows remote attackers to cause a denial of service (infinite loop) via crafted XMP data in a .qt file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18238/">CVE-2017-18238 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18238">CVE-2017-18238 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1085583">SUSE bug 1085583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085585">SUSE bug 1085585</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826077" comment="exempi-2.2.0-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826078" comment="exempi-devel-2.2.0-9.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718251" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18251</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18251" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18251" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18251" ref_url="https://www.suse.com/security/cve/CVE-2017-18251" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003983.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in ImageMagick 7.0.7. A memory leak vulnerability was found in the function ReadPCDImage in coders/pcd.c, which allow remote attackers to cause a denial of service via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18251/">CVE-2017-18251 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18251">CVE-2017-18251 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1087037">SUSE bug 1087037</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827880" comment="ImageMagick-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827881" comment="ImageMagick-c++-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827882" comment="ImageMagick-c++-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827883" comment="ImageMagick-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827884" comment="ImageMagick-doc-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827885" comment="ImageMagick-perl-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827886" comment="autotrace-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827887" comment="autotrace-devel-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827888" comment="emacs-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827889" comment="emacs-common-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827890" comment="emacs-el-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827891" comment="emacs-filesystem-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827892" comment="emacs-nox-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827893" comment="emacs-terminal-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827894" comment="inkscape-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827895" comment="inkscape-docs-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827896" comment="inkscape-view-0.92.2-3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718252" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18252</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18252" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18252" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18252" ref_url="https://www.suse.com/security/cve/CVE-2017-18252" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003983.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in ImageMagick 7.0.7. The MogrifyImageList function in MagickWand/mogrify.c allows attackers to cause a denial of service (assertion failure and application exit in ReplaceImageInList) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18252/">CVE-2017-18252 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18252">CVE-2017-18252 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1087033">SUSE bug 1087033</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827880" comment="ImageMagick-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827881" comment="ImageMagick-c++-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827882" comment="ImageMagick-c++-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827883" comment="ImageMagick-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827884" comment="ImageMagick-doc-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827885" comment="ImageMagick-perl-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827886" comment="autotrace-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827887" comment="autotrace-devel-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827888" comment="emacs-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827889" comment="emacs-common-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827890" comment="emacs-el-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827891" comment="emacs-filesystem-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827892" comment="emacs-nox-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827893" comment="emacs-terminal-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827894" comment="inkscape-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827895" comment="inkscape-docs-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827896" comment="inkscape-view-0.92.2-3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718254" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18254</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18254" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18254" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18254" ref_url="https://www.suse.com/security/cve/CVE-2017-18254" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003983.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in ImageMagick 7.0.7. A memory leak vulnerability was found in the function WriteGIFImage in coders/gif.c, which allow remote attackers to cause a denial of service via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18254/">CVE-2017-18254 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18254">CVE-2017-18254 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1087027">SUSE bug 1087027</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827880" comment="ImageMagick-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827881" comment="ImageMagick-c++-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827882" comment="ImageMagick-c++-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827883" comment="ImageMagick-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827884" comment="ImageMagick-doc-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827885" comment="ImageMagick-perl-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827886" comment="autotrace-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827887" comment="autotrace-devel-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827888" comment="emacs-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827889" comment="emacs-common-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827890" comment="emacs-el-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827891" comment="emacs-filesystem-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827892" comment="emacs-nox-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827893" comment="emacs-terminal-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827894" comment="inkscape-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827895" comment="inkscape-docs-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827896" comment="inkscape-view-0.92.2-3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718258" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18258</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18258" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18258" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18258" ref_url="https://www.suse.com/security/cve/CVE-2017-18258" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004657.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3107-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ILYW2C6FGNAL4Q6R3GJ46OYV3767BZKV/#ILYW2C6FGNAL4Q6R3GJ46OYV3767BZKV" source="SUSE-SU"/>
    <description>
    The xz_head function in xzlib.c in libxml2 before 2.9.6 allows remote attackers to cause a denial of service (memory consumption) via a crafted LZMA file, because the decoder functionality does not restrict memory usage to what is required for a legitimate file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18258/">CVE-2017-18258 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18258">CVE-2017-18258 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1088279">SUSE bug 1088279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088601">SUSE bug 1088601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105166">SUSE bug 1105166</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827903" comment="libxml2-2.9.1-6.el7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827904" comment="libxml2-devel-2.9.1-6.el7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827905" comment="libxml2-python-2.9.1-6.el7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827906" comment="libxml2-static-2.9.1-6.el7.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718267" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18267</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18267" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18267" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18267" ref_url="https://www.suse.com/security/cve/CVE-2017-18267" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2906-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2907-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030446.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3854-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TS7QPSEQIBQO7BALZOE3TN7IO7IMHK3Y/" source="SUSE-SU"/>
    <description>
    The FoFiType1C::cvtGlyph function in fofi/FoFiType1C.cc in Poppler through 0.64.0 allows remote attackers to cause a denial of service (infinite recursion) via a crafted PDF file, as demonstrated by pdftops.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18267/">CVE-2017-18267 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18267">CVE-2017-18267 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1092945">SUSE bug 1092945</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824843" comment="PackageKit-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824844" comment="PackageKit-command-not-found-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824845" comment="PackageKit-cron-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824846" comment="PackageKit-glib-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824847" comment="PackageKit-glib-devel-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824848" comment="PackageKit-gstreamer-plugin-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824849" comment="PackageKit-gtk3-module-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824850" comment="PackageKit-yum-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824851" comment="PackageKit-yum-plugin-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824852" comment="accountsservice-0.6.50-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824853" comment="accountsservice-devel-0.6.50-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824854" comment="accountsservice-libs-0.6.50-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824855" comment="adwaita-cursor-theme-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824856" comment="adwaita-gtk2-theme-3.28-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824857" comment="adwaita-icon-theme-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824858" comment="adwaita-icon-theme-devel-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824859" comment="appstream-data-7-20180614.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824860" comment="at-spi2-atk-2.26.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824861" comment="at-spi2-atk-devel-2.26.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824862" comment="at-spi2-core-2.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824863" comment="at-spi2-core-devel-2.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824864" comment="atk-2.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824865" comment="atk-devel-2.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824866" comment="baobab-3.28.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824867" comment="bolt-0.4-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824868" comment="brasero-3.12.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824869" comment="brasero-devel-3.12.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824870" comment="brasero-libs-3.12.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824871" comment="brasero-nautilus-3.12.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824872" comment="cairo-1.15.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824873" comment="cairo-devel-1.15.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824874" comment="cairo-gobject-1.15.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824875" comment="cairo-gobject-devel-1.15.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824876" comment="cairo-tools-1.15.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824877" comment="cheese-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824878" comment="cheese-libs-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824879" comment="cheese-libs-devel-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824880" comment="clutter-gst3-3.0.26-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824881" comment="clutter-gst3-devel-3.0.26-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824882" comment="compat-exiv2-023-0.23-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824883" comment="compat-libical1-1.0.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824884" comment="control-center-3.28.1-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824885" comment="control-center-filesystem-3.28.1-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824886" comment="dconf-0.28.0-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824887" comment="dconf-devel-0.28.0-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824888" comment="dconf-editor-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824889" comment="devhelp-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824890" comment="devhelp-devel-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824891" comment="devhelp-libs-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824892" comment="ekiga-4.0.1-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824893" comment="empathy-3.12.13-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824894" comment="eog-3.28.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824895" comment="eog-devel-3.28.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824896" comment="evince-3.28.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824897" comment="evince-browser-plugin-3.28.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824898" comment="evince-devel-3.28.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824899" comment="evince-dvi-3.28.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824900" comment="evince-libs-3.28.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824901" comment="evince-nautilus-3.28.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824902" comment="evolution-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824903" comment="evolution-bogofilter-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824904" comment="evolution-data-server-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824905" comment="evolution-data-server-devel-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824906" comment="evolution-data-server-doc-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824907" comment="evolution-data-server-langpacks-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824908" comment="evolution-data-server-perl-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824909" comment="evolution-data-server-tests-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824910" comment="evolution-devel-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824911" comment="evolution-devel-docs-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824912" comment="evolution-ews-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824913" comment="evolution-ews-langpacks-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824914" comment="evolution-help-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824915" comment="evolution-langpacks-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824916" comment="evolution-mapi-3.28.3-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824917" comment="evolution-mapi-langpacks-3.28.3-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824918" comment="evolution-pst-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824919" comment="evolution-spamassassin-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824920" comment="evolution-tests-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824921" comment="file-roller-3.28.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824922" comment="file-roller-nautilus-3.28.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824923" comment="flatpak-1.0.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824924" comment="flatpak-builder-1.0.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824925" comment="flatpak-devel-1.0.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824926" comment="flatpak-libs-1.0.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824927" comment="folks-0.11.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824928" comment="folks-devel-0.11.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824929" comment="folks-tools-0.11.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824930" comment="fontconfig-2.13.0-4.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824931" comment="fontconfig-devel-2.13.0-4.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824932" comment="fontconfig-devel-doc-2.13.0-4.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824933" comment="freetype-2.8-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824934" comment="freetype-demos-2.8-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824935" comment="freetype-devel-2.8-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824936" comment="fribidi-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824937" comment="fribidi-devel-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824938" comment="fwupd-1.0.8-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824939" comment="fwupd-devel-1.0.8-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824940" comment="fwupdate-12-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824941" comment="fwupdate-devel-12-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824942" comment="fwupdate-efi-12-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824943" comment="fwupdate-libs-12-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824944" comment="gcr-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824945" comment="gcr-devel-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824946" comment="gdk-pixbuf2-2.36.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824947" comment="gdk-pixbuf2-devel-2.36.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824948" comment="gdk-pixbuf2-tests-2.36.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824949" comment="gdm-3.28.2-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824950" comment="gdm-devel-3.28.2-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824951" comment="gdm-pam-extensions-devel-3.28.2-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824952" comment="gedit-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824953" comment="gedit-devel-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824954" comment="gedit-plugin-bookmarks-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824955" comment="gedit-plugin-bracketcompletion-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824956" comment="gedit-plugin-charmap-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824957" comment="gedit-plugin-codecomment-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824958" comment="gedit-plugin-colorpicker-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824959" comment="gedit-plugin-colorschemer-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824960" comment="gedit-plugin-commander-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824961" comment="gedit-plugin-drawspaces-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824962" comment="gedit-plugin-findinfiles-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824963" comment="gedit-plugin-joinlines-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824964" comment="gedit-plugin-multiedit-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824965" comment="gedit-plugin-smartspaces-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824966" comment="gedit-plugin-synctex-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824967" comment="gedit-plugin-terminal-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824968" comment="gedit-plugin-textsize-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824969" comment="gedit-plugin-translate-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824970" comment="gedit-plugin-wordcompletion-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824971" comment="gedit-plugins-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824972" comment="gedit-plugins-data-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824973" comment="geoclue2-2.4.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824974" comment="geoclue2-demos-2.4.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824975" comment="geoclue2-devel-2.4.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824976" comment="geoclue2-libs-2.4.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824977" comment="geocode-glib-3.26.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824978" comment="geocode-glib-devel-3.26.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824979" comment="gjs-1.52.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824980" comment="gjs-devel-1.52.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824981" comment="gjs-tests-1.52.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824982" comment="glade-3.22.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824983" comment="glade-devel-3.22.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824984" comment="glade-libs-3.22.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824985" comment="glib-networking-2.56.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824986" comment="glib-networking-tests-2.56.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824987" comment="glib2-2.56.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824988" comment="glib2-devel-2.56.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824989" comment="glib2-doc-2.56.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824990" comment="glib2-fam-2.56.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824991" comment="glib2-static-2.56.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824992" comment="glib2-tests-2.56.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824993" comment="glibmm24-2.56.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824994" comment="glibmm24-devel-2.56.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824995" comment="glibmm24-doc-2.56.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824996" comment="gnome-backgrounds-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824997" comment="gnome-bluetooth-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824998" comment="gnome-bluetooth-libs-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824999" comment="gnome-bluetooth-libs-devel-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825000" comment="gnome-boxes-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825001" comment="gnome-calculator-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825002" comment="gnome-classic-session-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825003" comment="gnome-clocks-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825004" comment="gnome-color-manager-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825005" comment="gnome-contacts-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825006" comment="gnome-desktop3-3.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825007" comment="gnome-desktop3-devel-3.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825008" comment="gnome-desktop3-tests-3.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825009" comment="gnome-devel-docs-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825010" comment="gnome-dictionary-3.26.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825011" comment="gnome-disk-utility-3.28.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825012" comment="gnome-documents-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825013" comment="gnome-documents-libs-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825014" comment="gnome-font-viewer-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825015" comment="gnome-getting-started-docs-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825016" comment="gnome-getting-started-docs-cs-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825017" comment="gnome-getting-started-docs-de-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825018" comment="gnome-getting-started-docs-es-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825019" comment="gnome-getting-started-docs-fr-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825020" comment="gnome-getting-started-docs-gl-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825021" comment="gnome-getting-started-docs-hu-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825022" comment="gnome-getting-started-docs-it-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825023" comment="gnome-getting-started-docs-pl-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825024" comment="gnome-getting-started-docs-pt_BR-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825025" comment="gnome-getting-started-docs-ru-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825026" comment="gnome-initial-setup-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825027" comment="gnome-keyring-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825028" comment="gnome-keyring-pam-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825029" comment="gnome-online-accounts-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825030" comment="gnome-online-accounts-devel-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825031" comment="gnome-online-miners-3.26.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825032" comment="gnome-packagekit-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825033" comment="gnome-packagekit-common-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825034" comment="gnome-packagekit-installer-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825035" comment="gnome-packagekit-updater-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825036" comment="gnome-screenshot-3.26.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825037" comment="gnome-session-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825038" comment="gnome-session-custom-session-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825039" comment="gnome-session-wayland-session-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825040" comment="gnome-session-xsession-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825041" comment="gnome-settings-daemon-3.28.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825042" comment="gnome-settings-daemon-devel-3.28.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825043" comment="gnome-shell-3.28.3-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825044" comment="gnome-shell-extension-alternate-tab-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825045" comment="gnome-shell-extension-apps-menu-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825046" comment="gnome-shell-extension-auto-move-windows-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825047" comment="gnome-shell-extension-common-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825048" comment="gnome-shell-extension-dash-to-dock-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825049" comment="gnome-shell-extension-drive-menu-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825050" comment="gnome-shell-extension-launch-new-instance-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825051" comment="gnome-shell-extension-native-window-placement-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825052" comment="gnome-shell-extension-no-hot-corner-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825053" comment="gnome-shell-extension-panel-favorites-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825054" comment="gnome-shell-extension-places-menu-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825055" comment="gnome-shell-extension-screenshot-window-sizer-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825056" comment="gnome-shell-extension-systemMonitor-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825057" comment="gnome-shell-extension-top-icons-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825058" comment="gnome-shell-extension-updates-dialog-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825059" comment="gnome-shell-extension-user-theme-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825060" comment="gnome-shell-extension-window-list-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825061" comment="gnome-shell-extension-windowsNavigator-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825062" comment="gnome-shell-extension-workspace-indicator-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825063" comment="gnome-software-3.28.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825064" comment="gnome-software-devel-3.28.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825065" comment="gnome-software-editor-3.28.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825066" comment="gnome-system-monitor-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825067" comment="gnome-terminal-3.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825068" comment="gnome-terminal-nautilus-3.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825069" comment="gnome-themes-standard-3.28-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825070" comment="gnome-tweak-tool-3.28.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825071" comment="gnome-user-docs-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825072" comment="gnote-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825073" comment="gobject-introspection-1.56.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825074" comment="gobject-introspection-devel-1.56.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825075" comment="gom-0.3.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825076" comment="gom-devel-0.3.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825077" comment="google-noto-emoji-color-fonts-20180508-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825078" comment="google-noto-emoji-fonts-20180508-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825079" comment="grilo-0.3.6-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825080" comment="grilo-devel-0.3.6-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825081" comment="grilo-plugins-0.3.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825082" comment="gsettings-desktop-schemas-3.28.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825083" comment="gsettings-desktop-schemas-devel-3.28.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825084" comment="gspell-1.6.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825085" comment="gspell-devel-1.6.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825086" comment="gspell-doc-1.6.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825087" comment="gssdp-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825088" comment="gssdp-devel-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825089" comment="gssdp-docs-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825090" comment="gssdp-utils-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825091" comment="gstreamer1-plugins-base-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825092" comment="gstreamer1-plugins-base-devel-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825093" comment="gstreamer1-plugins-base-devel-docs-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825094" comment="gstreamer1-plugins-base-tools-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825095" comment="gtk-doc-1.28-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825096" comment="gtk-update-icon-cache-3.22.30-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825097" comment="gtk3-3.22.30-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825098" comment="gtk3-devel-3.22.30-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825099" comment="gtk3-devel-docs-3.22.30-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825100" comment="gtk3-immodule-xim-3.22.30-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825101" comment="gtk3-immodules-3.22.30-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825102" comment="gtk3-tests-3.22.30-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825103" comment="gtksourceview3-3.24.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825104" comment="gtksourceview3-devel-3.24.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825105" comment="gtksourceview3-tests-3.24.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825106" comment="gucharmap-10.0.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825107" comment="gucharmap-devel-10.0.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825108" comment="gucharmap-libs-10.0.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825109" comment="gupnp-1.0.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825110" comment="gupnp-devel-1.0.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825111" comment="gupnp-docs-1.0.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825112" comment="gupnp-igd-0.2.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825113" comment="gupnp-igd-devel-0.2.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825114" comment="gupnp-igd-python-0.2.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825115" comment="gvfs-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825116" comment="gvfs-afc-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825117" comment="gvfs-afp-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825118" comment="gvfs-archive-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825119" comment="gvfs-client-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825120" comment="gvfs-devel-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825121" comment="gvfs-fuse-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825122" comment="gvfs-goa-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825123" comment="gvfs-gphoto2-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825124" comment="gvfs-mtp-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825125" comment="gvfs-smb-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825126" comment="gvfs-tests-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825127" comment="harfbuzz-1.7.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825128" comment="harfbuzz-devel-1.7.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825129" comment="harfbuzz-icu-1.7.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825130" comment="json-glib-1.4.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825131" comment="json-glib-devel-1.4.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825132" comment="json-glib-tests-1.4.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825133" comment="libappstream-glib-0.7.8-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825134" comment="libappstream-glib-builder-0.7.8-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825135" comment="libappstream-glib-builder-devel-0.7.8-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825136" comment="libappstream-glib-devel-0.7.8-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825137" comment="libchamplain-0.12.16-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825138" comment="libchamplain-demos-0.12.16-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825139" comment="libchamplain-devel-0.12.16-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825140" comment="libchamplain-gtk-0.12.16-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825141" comment="libcroco-0.6.12-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825142" comment="libcroco-devel-0.6.12-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825143" comment="libgdata-0.17.9-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825144" comment="libgdata-devel-0.17.9-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825145" comment="libgee-0.20.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825146" comment="libgee-devel-0.20.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825147" comment="libgepub-0.6.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825148" comment="libgepub-devel-0.6.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825149" comment="libgexiv2-0.10.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825150" comment="libgexiv2-devel-0.10.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825151" comment="libgnomekbd-3.26.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825152" comment="libgnomekbd-devel-3.26.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825153" comment="libgovirt-0.3.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825154" comment="libgovirt-devel-0.3.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825155" comment="libgtop2-2.38.0-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825156" comment="libgtop2-devel-2.38.0-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825157" comment="libgweather-3.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825158" comment="libgweather-devel-3.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825159" comment="libgxps-0.3.0-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825160" comment="libgxps-devel-0.3.0-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825161" comment="libgxps-tools-0.3.0-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825162" comment="libical-3.0.3-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825163" comment="libical-devel-3.0.3-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825164" comment="libical-glib-3.0.3-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825165" comment="libical-glib-devel-3.0.3-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825166" comment="libical-glib-doc-3.0.3-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825167" comment="libjpeg-turbo-1.2.90-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825168" comment="libjpeg-turbo-devel-1.2.90-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825169" comment="libjpeg-turbo-static-1.2.90-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825170" comment="libjpeg-turbo-utils-1.2.90-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825171" comment="libmediaart-1.9.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825172" comment="libmediaart-devel-1.9.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825173" comment="libmediaart-tests-1.9.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825174" comment="libosinfo-1.1.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825175" comment="libosinfo-devel-1.1.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825176" comment="libosinfo-vala-1.1.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825177" comment="libpeas-1.22.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825178" comment="libpeas-devel-1.22.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825179" comment="libpeas-gtk-1.22.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825180" comment="libpeas-loader-python-1.22.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825181" comment="librsvg2-2.40.20-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825182" comment="librsvg2-devel-2.40.20-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825183" comment="librsvg2-tools-2.40.20-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825184" comment="libsecret-0.18.6-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825185" comment="libsecret-devel-0.18.6-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825186" comment="libsoup-2.62.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825187" comment="libsoup-devel-2.62.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825188" comment="libwayland-client-1.15.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825189" comment="libwayland-cursor-1.15.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825190" comment="libwayland-egl-1.15.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825191" comment="libwayland-server-1.15.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825192" comment="libwnck3-3.24.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825193" comment="libwnck3-devel-3.24.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825194" comment="mozjs52-52.9.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825195" comment="mozjs52-devel-52.9.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825196" comment="mutter-3.28.3-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825197" comment="mutter-devel-3.28.3-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825198" comment="nautilus-3.26.3.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825199" comment="nautilus-devel-3.26.3.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825200" comment="nautilus-extensions-3.26.3.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825201" comment="nautilus-sendto-3.8.6-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825202" comment="openchange-2.3-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825203" comment="openchange-client-2.3-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825204" comment="openchange-devel-2.3-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825205" comment="openchange-devel-docs-2.3-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825206" comment="osinfo-db-20180531-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825207" comment="pango-1.42.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825208" comment="pango-devel-1.42.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825209" comment="pango-tests-1.42.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825210" comment="poppler-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825211" comment="poppler-cpp-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825212" comment="poppler-cpp-devel-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825213" comment="poppler-demos-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825214" comment="poppler-devel-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825215" comment="poppler-glib-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825216" comment="poppler-glib-devel-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825217" comment="poppler-qt-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825218" comment="poppler-qt-devel-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825219" comment="poppler-utils-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825220" comment="python2-gexiv2-0.10.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825221" comment="python2-pyatspi-2.26.0-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825222" comment="rest-0.8.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825223" comment="rest-devel-0.8.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825224" comment="rhythmbox-3.4.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825225" comment="rhythmbox-devel-3.4.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825226" comment="seahorse-nautilus-3.11.92-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825227" comment="shotwell-0.28.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825228" comment="sushi-3.28.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825229" comment="totem-3.26.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825230" comment="totem-devel-3.26.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825231" comment="totem-nautilus-3.26.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825232" comment="totem-pl-parser-3.26.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825233" comment="totem-pl-parser-devel-3.26.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825234" comment="turbojpeg-1.2.90-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825235" comment="turbojpeg-devel-1.2.90-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825236" comment="upower-0.99.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825237" comment="upower-devel-0.99.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825238" comment="upower-devel-docs-0.99.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825239" comment="vala-0.40.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825240" comment="vala-devel-0.40.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825241" comment="vala-doc-0.40.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825242" comment="valadoc-0.40.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825243" comment="valadoc-devel-0.40.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825244" comment="vino-3.22.0-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825245" comment="vte-profile-0.52.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825246" comment="vte291-0.52.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825247" comment="vte291-devel-0.52.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825248" comment="wayland-devel-1.15.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825249" comment="wayland-doc-1.15.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825250" comment="wayland-protocols-devel-1.14-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825251" comment="webkitgtk4-2.20.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825252" comment="webkitgtk4-devel-2.20.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825253" comment="webkitgtk4-doc-2.20.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825254" comment="webkitgtk4-jsc-2.20.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825255" comment="webkitgtk4-jsc-devel-2.20.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825256" comment="webkitgtk4-plugin-process-gtk2-2.20.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825257" comment="xdg-desktop-portal-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825258" comment="xdg-desktop-portal-devel-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825259" comment="xdg-desktop-portal-gtk-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825260" comment="yelp-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825261" comment="yelp-devel-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825262" comment="yelp-libs-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825263" comment="yelp-tools-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825264" comment="yelp-xsl-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825265" comment="yelp-xsl-devel-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825266" comment="zenity-3.28.1-1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718271" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18271</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18271" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18271" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18271" ref_url="https://www.suse.com/security/cve/CVE-2017-18271" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004481.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1439-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VNFNNUMYJMGVNAHHZT3GGQ5BNPDFGCSG/#VNFNNUMYJMGVNAHHZT3GGQ5BNPDFGCSG" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1860-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U4T535MQXEFZP3FQMGJLWASIP2YK4CR6/#U4T535MQXEFZP3FQMGJLWASIP2YK4CR6" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.7-16 Q16 x86_64 2017-12-22, an infinite loop vulnerability was found in the function ReadMIFFImage in coders/miff.c, which allows attackers to cause a denial of service (CPU exhaustion) via a crafted MIFF image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18271/">CVE-2017-18271 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18271">CVE-2017-18271 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1094204">SUSE bug 1094204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827880" comment="ImageMagick-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827881" comment="ImageMagick-c++-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827882" comment="ImageMagick-c++-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827883" comment="ImageMagick-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827884" comment="ImageMagick-doc-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827885" comment="ImageMagick-perl-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827886" comment="autotrace-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827887" comment="autotrace-devel-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827888" comment="emacs-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827889" comment="emacs-common-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827890" comment="emacs-el-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827891" comment="emacs-filesystem-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827892" comment="emacs-nox-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827893" comment="emacs-terminal-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827894" comment="inkscape-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827895" comment="inkscape-docs-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827896" comment="inkscape-view-0.92.2-3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718273" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18273</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18273" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18273" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18273" ref_url="https://www.suse.com/security/cve/CVE-2017-18273" source="SUSE CVE"/>
    <description>
    In ImageMagick 7.0.7-16 Q16 x86_64 2017-12-22, an infinite loop vulnerability was found in the function ReadTXTImage in coders/txt.c, which allows attackers to cause a denial of service (CPU exhaustion) via a crafted image file that is mishandled in a GetImageIndexInList call.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-18273/">CVE-2017-18273 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18273">CVE-2017-18273 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827880" comment="ImageMagick-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827881" comment="ImageMagick-c++-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827882" comment="ImageMagick-c++-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827883" comment="ImageMagick-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827884" comment="ImageMagick-doc-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827885" comment="ImageMagick-perl-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827886" comment="autotrace-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827887" comment="autotrace-devel-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827888" comment="emacs-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827889" comment="emacs-common-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827890" comment="emacs-el-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827891" comment="emacs-filesystem-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827892" comment="emacs-nox-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827893" comment="emacs-terminal-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827894" comment="inkscape-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827895" comment="inkscape-docs-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827896" comment="inkscape-view-0.92.2-3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718344" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18344</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18344" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18344" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18344" ref_url="https://www.suse.com/security/cve/CVE-2017-18344" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2344-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015911.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XUUL7WMOXILGLIZMZLYLY5D73VOU36JN/#XUUL7WMOXILGLIZMZLYLY5D73VOU36JN" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2404-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DHR6QOZXXCNSV77C5MHVLBK4DBFOQPCN/#DHR6QOZXXCNSV77C5MHVLBK4DBFOQPCN" source="SUSE-SU"/>
    <description>
    The timer_create syscall implementation in kernel/time/posix-timers.c in the Linux kernel before 4.14.8 doesn't properly validate the sigevent-&gt;sigev_notify field, which leads to out-of-bounds access in the show_timer function (called when /proc/$PID/timers is read). This allows userspace applications to read arbitrary kernel memory (on a kernel built with CONFIG_POSIX_TIMERS and CONFIG_CHECKPOINT_RESTORE).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-18344/">CVE-2017-18344 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18344">CVE-2017-18344 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102851">SUSE bug 1102851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103203">SUSE bug 1103203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103580">SUSE bug 1103580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215674">SUSE bug 1215674</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824786" comment="bpftool-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824787" comment="kernel-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824788" comment="kernel-abi-whitelists-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824789" comment="kernel-debug-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824792" comment="kernel-doc-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824793" comment="kernel-headers-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824794" comment="kernel-tools-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824795" comment="kernel-tools-libs-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824797" comment="perf-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824798" comment="python-perf-3.10.0-957.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718551" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18551</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18551" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18551" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18551" ref_url="https://www.suse.com/security/cve/CVE-2017-18551" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4CEC37F4Q2EPQFGCPFIWQY5MJOYSR3WW/#4CEC37F4Q2EPQFGCPFIWQY5MJOYSR3WW" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VOAHRKDA7W6T2DPZV7YKHMSWYSGQCJCW/#VOAHRKDA7W6T2DPZV7YKHMSWYSGQCJCW" source="SUSE-SU"/>
    <description>
    An issue was discovered in drivers/i2c/i2c-core-smbus.c in the Linux kernel before 4.14.15. There is an out of bounds write in the function i2c_smbus_xfer_emulated.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-18551/">CVE-2017-18551 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18551">CVE-2017-18551 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1146163">SUSE bug 1146163</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828543" comment="bpftool-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828544" comment="kernel-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828545" comment="kernel-abi-whitelists-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828546" comment="kernel-debug-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828549" comment="kernel-doc-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828550" comment="kernel-headers-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828551" comment="kernel-tools-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828552" comment="kernel-tools-libs-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828554" comment="perf-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828555" comment="python-perf-3.10.0-1160.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718595" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18595</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18595" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18595" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18595" ref_url="https://www.suse.com/security/cve/CVE-2017-18595" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2706-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192706-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2307-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O7FGUFIPLWDXYK7VLKXBJND7NJWBBYU6/#O7FGUFIPLWDXYK7VLKXBJND7NJWBBYU6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2308-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C647ZGMUBEKKW7XKI4MVE7QEHYRLVUIX/#C647ZGMUBEKKW7XKI4MVE7QEHYRLVUIX" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 4.14.11. A double free may be caused by the function allocate_trace_buffer in the file kernel/trace/trace.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18595/">CVE-2017-18595 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18595">CVE-2017-18595 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1149555">SUSE bug 1149555</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827965" comment="bpftool-3.10.0-1127.8.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827966" comment="kernel-3.10.0-1127.8.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827967" comment="kernel-abi-whitelists-3.10.0-1127.8.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827968" comment="kernel-debug-3.10.0-1127.8.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827971" comment="kernel-doc-3.10.0-1127.8.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827972" comment="kernel-headers-3.10.0-1127.8.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827973" comment="kernel-tools-3.10.0-1127.8.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827974" comment="kernel-tools-libs-3.10.0-1127.8.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827976" comment="perf-3.10.0-1127.8.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827977" comment="python-perf-3.10.0-1127.8.2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718922" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18922</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18922" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18922" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18922" ref_url="https://www.suse.com/security/cve/CVE-2017-18922" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1922-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007241.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0960-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MGU2UORVOE54ROZM7L4AJ52OHI4TXPIE/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0978-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BHW55DN53AINCCLG5CRY5VTFMFBMAJWZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0988-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RH2MWYCQ3Y7WV6I2GEEBEI2J57NGY36J/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1025-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MRXTN4MBX2MAHYVC2KCQATTKYECU2TZT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1056-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MWRQ72I3AY52E4KTKKWCJGWKFGVHI5FP/" source="SUSE-SU"/>
    <description>
    It was discovered that websockets.c in LibVNCServer prior to 0.9.12 did not properly decode certain WebSocket frames. A malicious attacker could exploit this by sending specially crafted WebSocket frames to a server, causing a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18922/">CVE-2017-18922 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18922">CVE-2017-18922 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1173477">SUSE bug 1173477</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828095" comment="libvncserver-0.9.9-14.el7_8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828096" comment="libvncserver-devel-0.9.9-14.el7_8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172583" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2583</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2583" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2583" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2583" ref_url="https://www.suse.com/security/cve/CVE-2017-2583" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002668.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0456-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BIIWQN3DXKSG2W6OKPZAEUQIPS7IYZER/#BIIWQN3DXKSG2W6OKPZAEUQIPS7IYZER" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0906-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4LKB4K2PHJZ4HXCYAGRXG6YSPVEHMLTY/#4LKB4K2PHJZ4HXCYAGRXG6YSPVEHMLTY" source="SUSE-SU"/>
    <description>
    The load_segment_descriptor implementation in arch/x86/kvm/emulate.c in the Linux kernel before 4.9.5 improperly emulates a "MOV SS, NULL selector" instruction, which allows guest OS users to cause a denial of service (guest OS crash) or gain guest OS privileges via a crafted application.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2583/">CVE-2017-2583 at SUSE</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2583">CVE-2017-2583 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1020602">SUSE bug 1020602</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030573">SUSE bug 1030573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823110" comment="kernel-3.10.0-514.26.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823111" comment="kernel-abi-whitelists-3.10.0-514.26.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823112" comment="kernel-debug-3.10.0-514.26.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823115" comment="kernel-doc-3.10.0-514.26.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823116" comment="kernel-headers-3.10.0-514.26.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823117" comment="kernel-tools-3.10.0-514.26.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823118" comment="kernel-tools-libs-3.10.0-514.26.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823120" comment="perf-3.10.0-514.26.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823121" comment="python-perf-3.10.0-514.26.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172590" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2590</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2590" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2590" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2590" ref_url="https://www.suse.com/security/cve/CVE-2017-2590" source="SUSE CVE"/>
    <description>
    A vulnerability was found in ipa before 4.4. IdM's ca-del, ca-disable, and ca-enable commands did not properly check the user's permissions while modifying CAs in Dogtag. An authenticated, unauthorized attacker could use this flaw to delete, disable, or enable CAs causing various denial of service problems with certificate issuance, OCSP signing, and deletion of secret keys.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2590/">CVE-2017-2590 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2590">CVE-2017-2590 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822864" comment="ipa-admintools-4.4.0-14.el7_3.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822865" comment="ipa-client-4.4.0-14.el7_3.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822866" comment="ipa-client-common-4.4.0-14.el7_3.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822867" comment="ipa-common-4.4.0-14.el7_3.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822868" comment="ipa-python-compat-4.4.0-14.el7_3.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822869" comment="ipa-server-4.4.0-14.el7_3.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822870" comment="ipa-server-common-4.4.0-14.el7_3.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822871" comment="ipa-server-dns-4.4.0-14.el7_3.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822872" comment="ipa-server-trust-ad-4.4.0-14.el7_3.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822873" comment="python2-ipaclient-4.4.0-14.el7_3.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822874" comment="python2-ipalib-4.4.0-14.el7_3.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822875" comment="python2-ipaserver-4.4.0-14.el7_3.6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172596" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2596</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2596" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2596" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2596" ref_url="https://www.suse.com/security/cve/CVE-2017-2596" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002847.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0906-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4LKB4K2PHJZ4HXCYAGRXG6YSPVEHMLTY/#4LKB4K2PHJZ4HXCYAGRXG6YSPVEHMLTY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0907-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/53AU4WLWNJVGYTRR745YR4MG5H4LZMNQ/#53AU4WLWNJVGYTRR745YR4MG5H4LZMNQ" source="SUSE-SU"/>
    <description>
    The nested_vmx_check_vmptr function in arch/x86/kvm/vmx.c in the Linux kernel through 4.9.8 improperly emulates the VMXON instruction, which allows KVM L1 guest OS users to cause a denial of service (host OS memory consumption) by leveraging the mishandling of page references.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2596/">CVE-2017-2596 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2596">CVE-2017-2596 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1022785">SUSE bug 1022785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027179">SUSE bug 1027179</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823168" comment="kernel-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823169" comment="kernel-abi-whitelists-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823170" comment="kernel-debug-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823173" comment="kernel-doc-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823174" comment="kernel-headers-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823175" comment="kernel-tools-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823176" comment="kernel-tools-libs-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823178" comment="perf-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823179" comment="python-perf-3.10.0-693.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172615" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2615</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2615" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2615" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2615" ref_url="https://www.suse.com/security/cve/CVE-2017-2615" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002669.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0718-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003413.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0665-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DWMSK2BRJZ6JRNQHRA4GNXUADNVDRZNM/#DWMSK2BRJZ6JRNQHRA4GNXUADNVDRZNM" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0707-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2DRN3D32GFDYFBOUDVFPRJRWN6TYFZJ5/#2DRN3D32GFDYFBOUDVFPRJRWN6TYFZJ5" source="SUSE-SU"/>
    <description>
    Quick emulator (QEMU) built with the Cirrus CLGD 54xx VGA emulator support is vulnerable to an out-of-bounds access issue. It could occur while copying VGA data via bitblt copy in backward mode. A privileged user inside a guest could use this flaw to crash the QEMU process resulting in DoS or potentially execute arbitrary code on the host with privileges of QEMU process on the host.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2615/">CVE-2017-2615 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2615">CVE-2017-2615 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1023004">SUSE bug 1023004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822876" comment="qemu-img-1.5.3-126.el7_3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822877" comment="qemu-kvm-1.5.3-126.el7_3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822878" comment="qemu-kvm-common-1.5.3-126.el7_3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822879" comment="qemu-kvm-tools-1.5.3-126.el7_3.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172616" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2616</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2616" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2616" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2616" ref_url="https://www.suse.com/security/cve/CVE-2017-2616" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0866-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003867.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0589-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KSXOYBBQO2OYVFCV6VWE7MSURMGEULI2/#KSXOYBBQO2OYVFCV6VWE7MSURMGEULI2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0590-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GDHGCLBIGSCQTY2DNQTISCQPBFISPD32/#GDHGCLBIGSCQTY2DNQTISCQPBFISPD32" source="SUSE-SU"/>
    <description>
    A race condition was found in util-linux before 2.32.1 in the way su handled the management of child processes. A local authenticated attacker could use this flaw to kill other processes with root privileges under specific conditions.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2616/">CVE-2017-2616 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2616">CVE-2017-2616 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1023041">SUSE bug 1023041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123789">SUSE bug 1123789</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822895" comment="libblkid-2.23.2-33.el7_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822896" comment="libblkid-devel-2.23.2-33.el7_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822897" comment="libmount-2.23.2-33.el7_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822898" comment="libmount-devel-2.23.2-33.el7_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822899" comment="libuuid-2.23.2-33.el7_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822900" comment="libuuid-devel-2.23.2-33.el7_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822901" comment="util-linux-2.23.2-33.el7_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822902" comment="uuidd-2.23.2-33.el7_3.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172618" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2618</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2618" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2618" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2618" ref_url="https://www.suse.com/security/cve/CVE-2017-2618" source="SUSE CVE"/>
    <description>
    A flaw was found in the Linux kernel's handling of clearing SELinux attributes on /proc/pid/attr files before 4.9.10. An empty (null) write to this file can crash the system by causing the system to attempt to access unmapped kernel memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2618/">CVE-2017-2618 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2618">CVE-2017-2618 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253081">SUSE bug 1253081</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822907" comment="kernel-3.10.0-514.16.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822908" comment="kernel-abi-whitelists-3.10.0-514.16.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822909" comment="kernel-debug-3.10.0-514.16.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822912" comment="kernel-doc-3.10.0-514.16.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822913" comment="kernel-headers-3.10.0-514.16.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822914" comment="kernel-tools-3.10.0-514.16.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822915" comment="kernel-tools-libs-3.10.0-514.16.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822917" comment="perf-3.10.0-514.16.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822918" comment="python-perf-3.10.0-514.16.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172619" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2619</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2619" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2619" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2619" ref_url="https://www.suse.com/security/cve/CVE-2017-2619" source="SUSE CVE"/>
		<reference ref_id="SUSE-RU-2017:1217-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2017-May/006359.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2017:1218-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2017-May/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2017:1219-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2017-May/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002850.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0935-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MVW6OJCW5UOI4PDJ7273RNQ34PLV7UQS/#MVW6OJCW5UOI4PDJ7273RNQ34PLV7UQS" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0944-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CXBNHWDA4PBDC3UMVWEIBA2UPPWAY2N7/#CXBNHWDA4PBDC3UMVWEIBA2UPPWAY2N7" source="SUSE-SU"/>
    <description>
    Samba before versions 4.6.1, 4.5.7 and 4.4.11 are vulnerable to a malicious client using a symlink race to allow access to areas of the server file system not exported under the share definition.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2619/">CVE-2017-2619 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2619">CVE-2017-2619 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1027147">SUSE bug 1027147</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036283">SUSE bug 1036283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054017">SUSE bug 1054017</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822996" comment="ctdb-4.4.4-13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822997" comment="ctdb-tests-4.4.4-13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822998" comment="libsmbclient-4.4.4-13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822999" comment="libsmbclient-devel-4.4.4-13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823000" comment="libwbclient-4.4.4-13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823001" comment="libwbclient-devel-4.4.4-13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823002" comment="samba-4.4.4-13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823003" comment="samba-client-4.4.4-13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823004" comment="samba-client-libs-4.4.4-13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823005" comment="samba-common-4.4.4-13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823006" comment="samba-common-libs-4.4.4-13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823007" comment="samba-common-tools-4.4.4-13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823008" comment="samba-dc-4.4.4-13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823009" comment="samba-dc-libs-4.4.4-13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823010" comment="samba-devel-4.4.4-13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823011" comment="samba-krb5-printing-4.4.4-13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823012" comment="samba-libs-4.4.4-13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823013" comment="samba-pidl-4.4.4-13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823014" comment="samba-python-4.4.4-13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823015" comment="samba-test-4.4.4-13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823016" comment="samba-test-libs-4.4.4-13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823017" comment="samba-vfs-glusterfs-4.4.4-13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823018" comment="samba-winbind-4.4.4-13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823019" comment="samba-winbind-clients-4.4.4-13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823020" comment="samba-winbind-krb5-locator-4.4.4-13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823021" comment="samba-winbind-modules-4.4.4-13.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172620" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2620</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2620" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2620" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2620" ref_url="https://www.suse.com/security/cve/CVE-2017-2620" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002669.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0718-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003413.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0665-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DWMSK2BRJZ6JRNQHRA4GNXUADNVDRZNM/#DWMSK2BRJZ6JRNQHRA4GNXUADNVDRZNM" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0707-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2DRN3D32GFDYFBOUDVFPRJRWN6TYFZJ5/#2DRN3D32GFDYFBOUDVFPRJRWN6TYFZJ5" source="SUSE-SU"/>
    <description>
    Quick emulator (QEMU) before 2.8 built with the Cirrus CLGD 54xx VGA Emulator support is vulnerable to an out-of-bounds access issue. The issue could occur while copying VGA data in cirrus_bitblt_cputovideo. A privileged user inside guest could use this flaw to crash the QEMU process OR potentially execute arbitrary code on host with privileges of the QEMU process.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2620/">CVE-2017-2620 at SUSE</cve>
	<cve impact="critical" cvss3="9.9/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2620">CVE-2017-2620 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1024834">SUSE bug 1024834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024972">SUSE bug 1024972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822876" comment="qemu-img-1.5.3-126.el7_3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822877" comment="qemu-kvm-1.5.3-126.el7_3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822878" comment="qemu-kvm-common-1.5.3-126.el7_3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822879" comment="qemu-kvm-tools-1.5.3-126.el7_3.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172625" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2625</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2625" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2625" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2625" ref_url="https://www.suse.com/security/cve/CVE-2017-2625" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1868-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003696.html" source="SUSE-SU"/>
    <description>
    It was discovered that libXdmcp before 1.1.2 including used weak entropy to generate session keys. On a multi-user system using xdmcp, a local attacker could potentially use information available from the process list to brute force the key, allowing them to hijack other users' sessions.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2625/">CVE-2017-2625 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2625">CVE-2017-2625 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1025046">SUSE bug 1025046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025068">SUSE bug 1025068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025639">SUSE bug 1025639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123802">SUSE bug 1123802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/815650">SUSE bug 815650</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823207" comment="drm-utils-2.4.74-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823208" comment="libICE-1.0.9-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823209" comment="libICE-devel-1.0.9-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823210" comment="libX11-1.6.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823211" comment="libX11-common-1.6.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823212" comment="libX11-devel-1.6.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823213" comment="libXaw-1.0.13-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823214" comment="libXaw-devel-1.0.13-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823215" comment="libXcursor-1.1.14-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823216" comment="libXcursor-devel-1.1.14-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823217" comment="libXdmcp-1.1.2-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823218" comment="libXdmcp-devel-1.1.2-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823219" comment="libXfixes-5.0.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823220" comment="libXfixes-devel-5.0.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823221" comment="libXfont-1.5.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823222" comment="libXfont-devel-1.5.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823223" comment="libXfont2-2.0.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823224" comment="libXfont2-devel-2.0.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823225" comment="libXi-1.7.9-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823226" comment="libXi-devel-1.7.9-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823227" comment="libXpm-3.5.12-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823228" comment="libXpm-devel-3.5.12-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823229" comment="libXrandr-1.5.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823230" comment="libXrandr-devel-1.5.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823231" comment="libXrender-0.9.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823232" comment="libXrender-devel-0.9.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823233" comment="libXt-1.1.5-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823234" comment="libXt-devel-1.1.5-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823235" comment="libXtst-1.2.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823236" comment="libXtst-devel-1.2.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823237" comment="libXv-1.0.11-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823238" comment="libXv-devel-1.0.11-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823239" comment="libXvMC-1.0.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823240" comment="libXvMC-devel-1.0.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823241" comment="libXxf86vm-1.1.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823242" comment="libXxf86vm-devel-1.1.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823243" comment="libdrm-2.4.74-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823244" comment="libdrm-devel-2.4.74-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823245" comment="libepoxy-1.3.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823246" comment="libepoxy-devel-1.3.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823247" comment="libevdev-1.5.6-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823248" comment="libevdev-devel-1.5.6-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823249" comment="libevdev-utils-1.5.6-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823250" comment="libfontenc-1.1.3-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823251" comment="libfontenc-devel-1.1.3-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823252" comment="libinput-1.6.3-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823253" comment="libinput-devel-1.6.3-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823254" comment="libvdpau-1.1.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823255" comment="libvdpau-devel-1.1.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823256" comment="libvdpau-docs-1.1.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823257" comment="libwacom-0.24-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823258" comment="libwacom-data-0.24-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823259" comment="libwacom-devel-0.24-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823260" comment="libxcb-1.12-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823261" comment="libxcb-devel-1.12-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823262" comment="libxcb-doc-1.12-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823263" comment="libxkbcommon-0.7.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823264" comment="libxkbcommon-devel-0.7.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823265" comment="libxkbcommon-x11-0.7.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823266" comment="libxkbcommon-x11-devel-0.7.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823267" comment="libxkbfile-1.0.9-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823268" comment="libxkbfile-devel-1.0.9-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823269" comment="mesa-dri-drivers-17.0.1-6.20170307.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823270" comment="mesa-filesystem-17.0.1-6.20170307.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823271" comment="mesa-libEGL-17.0.1-6.20170307.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823272" comment="mesa-libEGL-devel-17.0.1-6.20170307.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823273" comment="mesa-libGL-17.0.1-6.20170307.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823274" comment="mesa-libGL-devel-17.0.1-6.20170307.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823275" comment="mesa-libGLES-17.0.1-6.20170307.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823276" comment="mesa-libGLES-devel-17.0.1-6.20170307.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823277" comment="mesa-libOSMesa-17.0.1-6.20170307.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823278" comment="mesa-libOSMesa-devel-17.0.1-6.20170307.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823279" comment="mesa-libgbm-17.0.1-6.20170307.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823280" comment="mesa-libgbm-devel-17.0.1-6.20170307.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823281" comment="mesa-libglapi-17.0.1-6.20170307.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823282" comment="mesa-libxatracker-17.0.1-6.20170307.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823283" comment="mesa-libxatracker-devel-17.0.1-6.20170307.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823284" comment="mesa-private-llvm-3.9.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823285" comment="mesa-private-llvm-devel-3.9.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823286" comment="mesa-vulkan-drivers-17.0.1-6.20170307.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823287" comment="vulkan-1.0.39.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823288" comment="vulkan-devel-1.0.39.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823289" comment="vulkan-filesystem-1.0.39.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823290" comment="xcb-proto-1.12-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823291" comment="xkeyboard-config-2.20-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823292" comment="xkeyboard-config-devel-2.20-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823293" comment="xorg-x11-proto-devel-7.7-20.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172626" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2626</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2626" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2626" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2626" ref_url="https://www.suse.com/security/cve/CVE-2017-2626" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003695.html" source="SUSE-SU"/>
    <description>
    It was discovered that libICE before 1.0.9-8 used a weak entropy to generate keys. A local attacker could potentially use this flaw for session hijacking using the information available from the process list.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.2/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-2626/">CVE-2017-2626 at SUSE</cve>
	<cve impact="medium" cvss3="5.2/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2626">CVE-2017-2626 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1025068">SUSE bug 1025068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025639">SUSE bug 1025639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048274">SUSE bug 1048274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123800">SUSE bug 1123800</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823207" comment="drm-utils-2.4.74-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823208" comment="libICE-1.0.9-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823209" comment="libICE-devel-1.0.9-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823210" comment="libX11-1.6.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823211" comment="libX11-common-1.6.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823212" comment="libX11-devel-1.6.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823213" comment="libXaw-1.0.13-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823214" comment="libXaw-devel-1.0.13-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823215" comment="libXcursor-1.1.14-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823216" comment="libXcursor-devel-1.1.14-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823217" comment="libXdmcp-1.1.2-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823218" comment="libXdmcp-devel-1.1.2-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823219" comment="libXfixes-5.0.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823220" comment="libXfixes-devel-5.0.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823221" comment="libXfont-1.5.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823222" comment="libXfont-devel-1.5.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823223" comment="libXfont2-2.0.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823224" comment="libXfont2-devel-2.0.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823225" comment="libXi-1.7.9-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823226" comment="libXi-devel-1.7.9-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823227" comment="libXpm-3.5.12-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823228" comment="libXpm-devel-3.5.12-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823229" comment="libXrandr-1.5.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823230" comment="libXrandr-devel-1.5.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823231" comment="libXrender-0.9.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823232" comment="libXrender-devel-0.9.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823233" comment="libXt-1.1.5-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823234" comment="libXt-devel-1.1.5-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823235" comment="libXtst-1.2.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823236" comment="libXtst-devel-1.2.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823237" comment="libXv-1.0.11-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823238" comment="libXv-devel-1.0.11-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823239" comment="libXvMC-1.0.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823240" comment="libXvMC-devel-1.0.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823241" comment="libXxf86vm-1.1.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823242" comment="libXxf86vm-devel-1.1.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823243" comment="libdrm-2.4.74-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823244" comment="libdrm-devel-2.4.74-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823245" comment="libepoxy-1.3.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823246" comment="libepoxy-devel-1.3.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823247" comment="libevdev-1.5.6-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823248" comment="libevdev-devel-1.5.6-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823249" comment="libevdev-utils-1.5.6-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823250" comment="libfontenc-1.1.3-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823251" comment="libfontenc-devel-1.1.3-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823252" comment="libinput-1.6.3-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823253" comment="libinput-devel-1.6.3-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823254" comment="libvdpau-1.1.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823255" comment="libvdpau-devel-1.1.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823256" comment="libvdpau-docs-1.1.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823257" comment="libwacom-0.24-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823258" comment="libwacom-data-0.24-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823259" comment="libwacom-devel-0.24-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823260" comment="libxcb-1.12-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823261" comment="libxcb-devel-1.12-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823262" comment="libxcb-doc-1.12-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823263" comment="libxkbcommon-0.7.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823264" comment="libxkbcommon-devel-0.7.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823265" comment="libxkbcommon-x11-0.7.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823266" comment="libxkbcommon-x11-devel-0.7.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823267" comment="libxkbfile-1.0.9-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823268" comment="libxkbfile-devel-1.0.9-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823269" comment="mesa-dri-drivers-17.0.1-6.20170307.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823270" comment="mesa-filesystem-17.0.1-6.20170307.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823271" comment="mesa-libEGL-17.0.1-6.20170307.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823272" comment="mesa-libEGL-devel-17.0.1-6.20170307.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823273" comment="mesa-libGL-17.0.1-6.20170307.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823274" comment="mesa-libGL-devel-17.0.1-6.20170307.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823275" comment="mesa-libGLES-17.0.1-6.20170307.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823276" comment="mesa-libGLES-devel-17.0.1-6.20170307.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823277" comment="mesa-libOSMesa-17.0.1-6.20170307.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823278" comment="mesa-libOSMesa-devel-17.0.1-6.20170307.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823279" comment="mesa-libgbm-17.0.1-6.20170307.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823280" comment="mesa-libgbm-devel-17.0.1-6.20170307.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823281" comment="mesa-libglapi-17.0.1-6.20170307.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823282" comment="mesa-libxatracker-17.0.1-6.20170307.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823283" comment="mesa-libxatracker-devel-17.0.1-6.20170307.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823284" comment="mesa-private-llvm-3.9.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823285" comment="mesa-private-llvm-devel-3.9.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823286" comment="mesa-vulkan-drivers-17.0.1-6.20170307.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823287" comment="vulkan-1.0.39.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823288" comment="vulkan-devel-1.0.39.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823289" comment="vulkan-filesystem-1.0.39.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823290" comment="xcb-proto-1.12-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823291" comment="xkeyboard-config-2.20-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823292" comment="xkeyboard-config-devel-2.20-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823293" comment="xorg-x11-proto-devel-7.7-20.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172633" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2633</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2633" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2633" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2633" ref_url="https://www.suse.com/security/cve/CVE-2017-2633" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0019-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003575.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds memory access issue was found in Quick Emulator (QEMU) before 1.7.2 in the VNC display driver. This flaw could occur while refreshing the VNC display surface area in the 'vnc_refresh_server_surface'. A user inside a guest could use this flaw to crash the QEMU process.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2633/">CVE-2017-2633 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2633">CVE-2017-2633 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1026612">SUSE bug 1026612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026636">SUSE bug 1026636</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074701">SUSE bug 1074701</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823194" comment="qemu-img-1.5.3-141.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823195" comment="qemu-kvm-1.5.3-141.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823196" comment="qemu-kvm-common-1.5.3-141.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823197" comment="qemu-kvm-tools-1.5.3-141.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172636" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2636</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2636" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2636" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2636" ref_url="https://www.suse.com/security/cve/CVE-2017-2636" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0865-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0866-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002779.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2099-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020152.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0906-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4LKB4K2PHJZ4HXCYAGRXG6YSPVEHMLTY/#4LKB4K2PHJZ4HXCYAGRXG6YSPVEHMLTY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0907-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/53AU4WLWNJVGYTRR745YR4MG5H4LZMNQ/#53AU4WLWNJVGYTRR745YR4MG5H4LZMNQ" source="SUSE-SU"/>
    <description>
    Race condition in drivers/tty/n_hdlc.c in the Linux kernel through 4.10.1 allows local users to gain privileges or cause a denial of service (double free) by setting the HDLC line discipline.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2636/">CVE-2017-2636 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2636">CVE-2017-2636 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1027565">SUSE bug 1027565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027575">SUSE bug 1027575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028372">SUSE bug 1028372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115893">SUSE bug 1115893</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822907" comment="kernel-3.10.0-514.16.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822908" comment="kernel-abi-whitelists-3.10.0-514.16.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822909" comment="kernel-debug-3.10.0-514.16.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822912" comment="kernel-doc-3.10.0-514.16.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822913" comment="kernel-headers-3.10.0-514.16.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822914" comment="kernel-tools-3.10.0-514.16.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822915" comment="kernel-tools-libs-3.10.0-514.16.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822917" comment="perf-3.10.0-514.16.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822918" comment="python-perf-3.10.0-514.16.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2640</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2640" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2640" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2640" ref_url="https://www.suse.com/security/cve/CVE-2017-2640" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004382.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0973-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZCXL5DA4TAJY6YJZSZNEUOCFNUSQHWI4/#ZCXL5DA4TAJY6YJZSZNEUOCFNUSQHWI4" source="SUSE-SU"/>
    <description>
    An out-of-bounds write flaw was found in the way Pidgin before 2.12.0 processed XML content. A malicious remote server could potentially use this flaw to crash Pidgin or execute arbitrary code in the context of the pidgin process.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2640/">CVE-2017-2640 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2640">CVE-2017-2640 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1028835">SUSE bug 1028835</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823185" comment="finch-2.10.11-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823186" comment="finch-devel-2.10.11-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823187" comment="libpurple-2.10.11-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823188" comment="libpurple-devel-2.10.11-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823189" comment="libpurple-perl-2.10.11-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823190" comment="libpurple-tcl-2.10.11-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823191" comment="pidgin-2.10.11-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823192" comment="pidgin-devel-2.10.11-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823193" comment="pidgin-perl-2.10.11-5.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172647" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2647</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2647" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2647" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2647" ref_url="https://www.suse.com/security/cve/CVE-2017-2647" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003367.html" source="SUSE-SU"/>
    <description>
    The KEYS subsystem in the Linux kernel before 3.18 allows local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) via vectors involving a NULL value for a certain match field, related to the keyring_search_iterator function in keyring.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2647/">CVE-2017-2647 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2647">CVE-2017-2647 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1030593">SUSE bug 1030593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115893">SUSE bug 1115893</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823168" comment="kernel-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823169" comment="kernel-abi-whitelists-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823170" comment="kernel-debug-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823173" comment="kernel-doc-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823174" comment="kernel-headers-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823175" comment="kernel-tools-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823176" comment="kernel-tools-libs-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823178" comment="perf-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823179" comment="python-perf-3.10.0-693.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172668" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2668</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2668" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2668" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2668" ref_url="https://www.suse.com/security/cve/CVE-2017-2668" source="SUSE CVE"/>
    <description>
    389-ds-base before versions 1.3.5.17 and 1.3.6.10 is vulnerable to an invalid pointer dereference in the way LDAP bind requests are handled. A remote unauthenticated attacker could use this flaw to make ns-slapd crash via a specially crafted LDAP bind request, resulting in denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2668/">CVE-2017-2668 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2668">CVE-2017-2668 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1069067">SUSE bug 1069067</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822903" comment="389-ds-base-1.3.5.10-20.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822904" comment="389-ds-base-devel-1.3.5.10-20.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822905" comment="389-ds-base-libs-1.3.5.10-20.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822906" comment="389-ds-base-snmp-1.3.5.10-20.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172671" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2671</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2671" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2671" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2671" ref_url="https://www.suse.com/security/cve/CVE-2017-2671" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002847.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003248.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1140-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y5XA3CLIM5GZTSS4UJWBZNQ4VSK43EYW/#Y5XA3CLIM5GZTSS4UJWBZNQ4VSK43EYW" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1215-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3ZY7NWS35KQP4O7EZNRNLOOYD4L775HU/#3ZY7NWS35KQP4O7EZNRNLOOYD4L775HU" source="SUSE-SU"/>
    <description>
    The ping_unhash function in net/ipv4/ping.c in the Linux kernel through 4.10.8 is too late in obtaining a certain lock and consequently cannot ensure that disconnect function calls are safe, which allows local users to cause a denial of service (panic) by leveraging access to the protocol value of IPPROTO_ICMP in a socket system call.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2671/">CVE-2017-2671 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2671">CVE-2017-2671 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1027179">SUSE bug 1027179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031003">SUSE bug 1031003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823168" comment="kernel-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823169" comment="kernel-abi-whitelists-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823170" comment="kernel-debug-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823173" comment="kernel-doc-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823174" comment="kernel-headers-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823175" comment="kernel-tools-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823176" comment="kernel-tools-libs-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823178" comment="perf-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823179" comment="python-perf-3.10.0-693.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172862" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2862</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2862" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2862" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2862" ref_url="https://www.suse.com/security/cve/CVE-2017-2862" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004484.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2393-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/52Z6P3A4GGKBXEE45R2FFMU5F5KDBIHJ/#52Z6P3A4GGKBXEE45R2FFMU5F5KDBIHJ" source="SUSE-SU"/>
    <description>
    An exploitable heap overflow vulnerability exists in the gdk_pixbuf__jpeg_image_load_increment functionality of Gdk-Pixbuf 2.36.6. A specially crafted jpeg file can cause a heap overflow resulting in remote code execution. An attacker can send a file or url to trigger this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-07"/>
	<updated date="2026-03-07"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2862/">CVE-2017-2862 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2862">CVE-2017-2862 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1048289">SUSE bug 1048289</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824843" comment="PackageKit-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824844" comment="PackageKit-command-not-found-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824845" comment="PackageKit-cron-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824846" comment="PackageKit-glib-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824847" comment="PackageKit-glib-devel-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824848" comment="PackageKit-gstreamer-plugin-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824849" comment="PackageKit-gtk3-module-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824850" comment="PackageKit-yum-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824851" comment="PackageKit-yum-plugin-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824852" comment="accountsservice-0.6.50-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824853" comment="accountsservice-devel-0.6.50-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824854" comment="accountsservice-libs-0.6.50-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824855" comment="adwaita-cursor-theme-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824856" comment="adwaita-gtk2-theme-3.28-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824857" comment="adwaita-icon-theme-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824858" comment="adwaita-icon-theme-devel-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824859" comment="appstream-data-7-20180614.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824860" comment="at-spi2-atk-2.26.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824861" comment="at-spi2-atk-devel-2.26.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824862" comment="at-spi2-core-2.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824863" comment="at-spi2-core-devel-2.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824864" comment="atk-2.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824865" comment="atk-devel-2.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824866" comment="baobab-3.28.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824867" comment="bolt-0.4-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824868" comment="brasero-3.12.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824869" comment="brasero-devel-3.12.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824870" comment="brasero-libs-3.12.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824871" comment="brasero-nautilus-3.12.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824872" comment="cairo-1.15.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824873" comment="cairo-devel-1.15.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824874" comment="cairo-gobject-1.15.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824875" comment="cairo-gobject-devel-1.15.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824876" comment="cairo-tools-1.15.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824877" comment="cheese-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824878" comment="cheese-libs-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824879" comment="cheese-libs-devel-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824880" comment="clutter-gst3-3.0.26-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824881" comment="clutter-gst3-devel-3.0.26-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824882" comment="compat-exiv2-023-0.23-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824883" comment="compat-libical1-1.0.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824884" comment="control-center-3.28.1-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824885" comment="control-center-filesystem-3.28.1-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824886" comment="dconf-0.28.0-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824887" comment="dconf-devel-0.28.0-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824888" comment="dconf-editor-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824889" comment="devhelp-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824890" comment="devhelp-devel-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824891" comment="devhelp-libs-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824892" comment="ekiga-4.0.1-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824893" comment="empathy-3.12.13-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824894" comment="eog-3.28.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824895" comment="eog-devel-3.28.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824896" comment="evince-3.28.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824897" comment="evince-browser-plugin-3.28.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824898" comment="evince-devel-3.28.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824899" comment="evince-dvi-3.28.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824900" comment="evince-libs-3.28.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824901" comment="evince-nautilus-3.28.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824902" comment="evolution-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824903" comment="evolution-bogofilter-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824904" comment="evolution-data-server-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824905" comment="evolution-data-server-devel-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824906" comment="evolution-data-server-doc-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824907" comment="evolution-data-server-langpacks-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824908" comment="evolution-data-server-perl-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824909" comment="evolution-data-server-tests-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824910" comment="evolution-devel-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824911" comment="evolution-devel-docs-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824912" comment="evolution-ews-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824913" comment="evolution-ews-langpacks-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824914" comment="evolution-help-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824915" comment="evolution-langpacks-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824916" comment="evolution-mapi-3.28.3-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824917" comment="evolution-mapi-langpacks-3.28.3-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824918" comment="evolution-pst-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824919" comment="evolution-spamassassin-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824920" comment="evolution-tests-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824921" comment="file-roller-3.28.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824922" comment="file-roller-nautilus-3.28.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824923" comment="flatpak-1.0.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824924" comment="flatpak-builder-1.0.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824925" comment="flatpak-devel-1.0.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824926" comment="flatpak-libs-1.0.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824927" comment="folks-0.11.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824928" comment="folks-devel-0.11.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824929" comment="folks-tools-0.11.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824930" comment="fontconfig-2.13.0-4.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824931" comment="fontconfig-devel-2.13.0-4.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824932" comment="fontconfig-devel-doc-2.13.0-4.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824933" comment="freetype-2.8-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824934" comment="freetype-demos-2.8-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824935" comment="freetype-devel-2.8-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824936" comment="fribidi-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824937" comment="fribidi-devel-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824938" comment="fwupd-1.0.8-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824939" comment="fwupd-devel-1.0.8-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824940" comment="fwupdate-12-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824941" comment="fwupdate-devel-12-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824942" comment="fwupdate-efi-12-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824943" comment="fwupdate-libs-12-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824944" comment="gcr-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824945" comment="gcr-devel-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824946" comment="gdk-pixbuf2-2.36.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824947" comment="gdk-pixbuf2-devel-2.36.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824948" comment="gdk-pixbuf2-tests-2.36.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824949" comment="gdm-3.28.2-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824950" comment="gdm-devel-3.28.2-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824951" comment="gdm-pam-extensions-devel-3.28.2-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824952" comment="gedit-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824953" comment="gedit-devel-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824954" comment="gedit-plugin-bookmarks-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824955" comment="gedit-plugin-bracketcompletion-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824956" comment="gedit-plugin-charmap-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824957" comment="gedit-plugin-codecomment-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824958" comment="gedit-plugin-colorpicker-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824959" comment="gedit-plugin-colorschemer-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824960" comment="gedit-plugin-commander-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824961" comment="gedit-plugin-drawspaces-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824962" comment="gedit-plugin-findinfiles-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824963" comment="gedit-plugin-joinlines-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824964" comment="gedit-plugin-multiedit-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824965" comment="gedit-plugin-smartspaces-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824966" comment="gedit-plugin-synctex-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824967" comment="gedit-plugin-terminal-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824968" comment="gedit-plugin-textsize-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824969" comment="gedit-plugin-translate-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824970" comment="gedit-plugin-wordcompletion-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824971" comment="gedit-plugins-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824972" comment="gedit-plugins-data-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824973" comment="geoclue2-2.4.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824974" comment="geoclue2-demos-2.4.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824975" comment="geoclue2-devel-2.4.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824976" comment="geoclue2-libs-2.4.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824977" comment="geocode-glib-3.26.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824978" comment="geocode-glib-devel-3.26.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824979" comment="gjs-1.52.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824980" comment="gjs-devel-1.52.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824981" comment="gjs-tests-1.52.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824982" comment="glade-3.22.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824983" comment="glade-devel-3.22.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824984" comment="glade-libs-3.22.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824985" comment="glib-networking-2.56.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824986" comment="glib-networking-tests-2.56.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824987" comment="glib2-2.56.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824988" comment="glib2-devel-2.56.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824989" comment="glib2-doc-2.56.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824990" comment="glib2-fam-2.56.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824991" comment="glib2-static-2.56.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824992" comment="glib2-tests-2.56.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824993" comment="glibmm24-2.56.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824994" comment="glibmm24-devel-2.56.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824995" comment="glibmm24-doc-2.56.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824996" comment="gnome-backgrounds-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824997" comment="gnome-bluetooth-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824998" comment="gnome-bluetooth-libs-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824999" comment="gnome-bluetooth-libs-devel-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825000" comment="gnome-boxes-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825001" comment="gnome-calculator-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825002" comment="gnome-classic-session-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825003" comment="gnome-clocks-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825004" comment="gnome-color-manager-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825005" comment="gnome-contacts-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825006" comment="gnome-desktop3-3.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825007" comment="gnome-desktop3-devel-3.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825008" comment="gnome-desktop3-tests-3.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825009" comment="gnome-devel-docs-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825010" comment="gnome-dictionary-3.26.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825011" comment="gnome-disk-utility-3.28.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825012" comment="gnome-documents-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825013" comment="gnome-documents-libs-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825014" comment="gnome-font-viewer-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825015" comment="gnome-getting-started-docs-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825016" comment="gnome-getting-started-docs-cs-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825017" comment="gnome-getting-started-docs-de-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825018" comment="gnome-getting-started-docs-es-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825019" comment="gnome-getting-started-docs-fr-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825020" comment="gnome-getting-started-docs-gl-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825021" comment="gnome-getting-started-docs-hu-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825022" comment="gnome-getting-started-docs-it-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825023" comment="gnome-getting-started-docs-pl-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825024" comment="gnome-getting-started-docs-pt_BR-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825025" comment="gnome-getting-started-docs-ru-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825026" comment="gnome-initial-setup-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825027" comment="gnome-keyring-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825028" comment="gnome-keyring-pam-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825029" comment="gnome-online-accounts-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825030" comment="gnome-online-accounts-devel-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825031" comment="gnome-online-miners-3.26.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825032" comment="gnome-packagekit-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825033" comment="gnome-packagekit-common-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825034" comment="gnome-packagekit-installer-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825035" comment="gnome-packagekit-updater-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825036" comment="gnome-screenshot-3.26.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825037" comment="gnome-session-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825038" comment="gnome-session-custom-session-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825039" comment="gnome-session-wayland-session-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825040" comment="gnome-session-xsession-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825041" comment="gnome-settings-daemon-3.28.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825042" comment="gnome-settings-daemon-devel-3.28.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825043" comment="gnome-shell-3.28.3-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825044" comment="gnome-shell-extension-alternate-tab-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825045" comment="gnome-shell-extension-apps-menu-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825046" comment="gnome-shell-extension-auto-move-windows-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825047" comment="gnome-shell-extension-common-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825048" comment="gnome-shell-extension-dash-to-dock-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825049" comment="gnome-shell-extension-drive-menu-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825050" comment="gnome-shell-extension-launch-new-instance-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825051" comment="gnome-shell-extension-native-window-placement-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825052" comment="gnome-shell-extension-no-hot-corner-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825053" comment="gnome-shell-extension-panel-favorites-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825054" comment="gnome-shell-extension-places-menu-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825055" comment="gnome-shell-extension-screenshot-window-sizer-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825056" comment="gnome-shell-extension-systemMonitor-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825057" comment="gnome-shell-extension-top-icons-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825058" comment="gnome-shell-extension-updates-dialog-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825059" comment="gnome-shell-extension-user-theme-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825060" comment="gnome-shell-extension-window-list-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825061" comment="gnome-shell-extension-windowsNavigator-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825062" comment="gnome-shell-extension-workspace-indicator-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825063" comment="gnome-software-3.28.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825064" comment="gnome-software-devel-3.28.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825065" comment="gnome-software-editor-3.28.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825066" comment="gnome-system-monitor-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825067" comment="gnome-terminal-3.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825068" comment="gnome-terminal-nautilus-3.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825069" comment="gnome-themes-standard-3.28-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825070" comment="gnome-tweak-tool-3.28.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825071" comment="gnome-user-docs-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825072" comment="gnote-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825073" comment="gobject-introspection-1.56.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825074" comment="gobject-introspection-devel-1.56.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825075" comment="gom-0.3.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825076" comment="gom-devel-0.3.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825077" comment="google-noto-emoji-color-fonts-20180508-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825078" comment="google-noto-emoji-fonts-20180508-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825079" comment="grilo-0.3.6-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825080" comment="grilo-devel-0.3.6-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825081" comment="grilo-plugins-0.3.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825082" comment="gsettings-desktop-schemas-3.28.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825083" comment="gsettings-desktop-schemas-devel-3.28.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825084" comment="gspell-1.6.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825085" comment="gspell-devel-1.6.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825086" comment="gspell-doc-1.6.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825087" comment="gssdp-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825088" comment="gssdp-devel-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825089" comment="gssdp-docs-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825090" comment="gssdp-utils-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825091" comment="gstreamer1-plugins-base-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825092" comment="gstreamer1-plugins-base-devel-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825093" comment="gstreamer1-plugins-base-devel-docs-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825094" comment="gstreamer1-plugins-base-tools-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825095" comment="gtk-doc-1.28-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825096" comment="gtk-update-icon-cache-3.22.30-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825097" comment="gtk3-3.22.30-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825098" comment="gtk3-devel-3.22.30-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825099" comment="gtk3-devel-docs-3.22.30-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825100" comment="gtk3-immodule-xim-3.22.30-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825101" comment="gtk3-immodules-3.22.30-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825102" comment="gtk3-tests-3.22.30-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825103" comment="gtksourceview3-3.24.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825104" comment="gtksourceview3-devel-3.24.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825105" comment="gtksourceview3-tests-3.24.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825106" comment="gucharmap-10.0.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825107" comment="gucharmap-devel-10.0.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825108" comment="gucharmap-libs-10.0.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825109" comment="gupnp-1.0.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825110" comment="gupnp-devel-1.0.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825111" comment="gupnp-docs-1.0.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825112" comment="gupnp-igd-0.2.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825113" comment="gupnp-igd-devel-0.2.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825114" comment="gupnp-igd-python-0.2.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825115" comment="gvfs-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825116" comment="gvfs-afc-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825117" comment="gvfs-afp-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825118" comment="gvfs-archive-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825119" comment="gvfs-client-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825120" comment="gvfs-devel-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825121" comment="gvfs-fuse-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825122" comment="gvfs-goa-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825123" comment="gvfs-gphoto2-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825124" comment="gvfs-mtp-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825125" comment="gvfs-smb-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825126" comment="gvfs-tests-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825127" comment="harfbuzz-1.7.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825128" comment="harfbuzz-devel-1.7.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825129" comment="harfbuzz-icu-1.7.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825130" comment="json-glib-1.4.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825131" comment="json-glib-devel-1.4.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825132" comment="json-glib-tests-1.4.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825133" comment="libappstream-glib-0.7.8-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825134" comment="libappstream-glib-builder-0.7.8-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825135" comment="libappstream-glib-builder-devel-0.7.8-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825136" comment="libappstream-glib-devel-0.7.8-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825137" comment="libchamplain-0.12.16-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825138" comment="libchamplain-demos-0.12.16-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825139" comment="libchamplain-devel-0.12.16-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825140" comment="libchamplain-gtk-0.12.16-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825141" comment="libcroco-0.6.12-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825142" comment="libcroco-devel-0.6.12-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825143" comment="libgdata-0.17.9-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825144" comment="libgdata-devel-0.17.9-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825145" comment="libgee-0.20.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825146" comment="libgee-devel-0.20.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825147" comment="libgepub-0.6.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825148" comment="libgepub-devel-0.6.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825149" comment="libgexiv2-0.10.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825150" comment="libgexiv2-devel-0.10.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825151" comment="libgnomekbd-3.26.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825152" comment="libgnomekbd-devel-3.26.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825153" comment="libgovirt-0.3.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825154" comment="libgovirt-devel-0.3.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825155" comment="libgtop2-2.38.0-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825156" comment="libgtop2-devel-2.38.0-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825157" comment="libgweather-3.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825158" comment="libgweather-devel-3.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825159" comment="libgxps-0.3.0-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825160" comment="libgxps-devel-0.3.0-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825161" comment="libgxps-tools-0.3.0-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825162" comment="libical-3.0.3-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825163" comment="libical-devel-3.0.3-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825164" comment="libical-glib-3.0.3-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825165" comment="libical-glib-devel-3.0.3-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825166" comment="libical-glib-doc-3.0.3-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825167" comment="libjpeg-turbo-1.2.90-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825168" comment="libjpeg-turbo-devel-1.2.90-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825169" comment="libjpeg-turbo-static-1.2.90-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825170" comment="libjpeg-turbo-utils-1.2.90-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825171" comment="libmediaart-1.9.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825172" comment="libmediaart-devel-1.9.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825173" comment="libmediaart-tests-1.9.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825174" comment="libosinfo-1.1.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825175" comment="libosinfo-devel-1.1.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825176" comment="libosinfo-vala-1.1.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825177" comment="libpeas-1.22.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825178" comment="libpeas-devel-1.22.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825179" comment="libpeas-gtk-1.22.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825180" comment="libpeas-loader-python-1.22.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825181" comment="librsvg2-2.40.20-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825182" comment="librsvg2-devel-2.40.20-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825183" comment="librsvg2-tools-2.40.20-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825184" comment="libsecret-0.18.6-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825185" comment="libsecret-devel-0.18.6-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825186" comment="libsoup-2.62.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825187" comment="libsoup-devel-2.62.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825188" comment="libwayland-client-1.15.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825189" comment="libwayland-cursor-1.15.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825190" comment="libwayland-egl-1.15.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825191" comment="libwayland-server-1.15.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825192" comment="libwnck3-3.24.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825193" comment="libwnck3-devel-3.24.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825194" comment="mozjs52-52.9.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825195" comment="mozjs52-devel-52.9.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825196" comment="mutter-3.28.3-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825197" comment="mutter-devel-3.28.3-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825198" comment="nautilus-3.26.3.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825199" comment="nautilus-devel-3.26.3.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825200" comment="nautilus-extensions-3.26.3.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825201" comment="nautilus-sendto-3.8.6-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825202" comment="openchange-2.3-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825203" comment="openchange-client-2.3-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825204" comment="openchange-devel-2.3-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825205" comment="openchange-devel-docs-2.3-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825206" comment="osinfo-db-20180531-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825207" comment="pango-1.42.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825208" comment="pango-devel-1.42.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825209" comment="pango-tests-1.42.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825210" comment="poppler-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825211" comment="poppler-cpp-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825212" comment="poppler-cpp-devel-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825213" comment="poppler-demos-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825214" comment="poppler-devel-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825215" comment="poppler-glib-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825216" comment="poppler-glib-devel-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825217" comment="poppler-qt-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825218" comment="poppler-qt-devel-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825219" comment="poppler-utils-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825220" comment="python2-gexiv2-0.10.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825221" comment="python2-pyatspi-2.26.0-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825222" comment="rest-0.8.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825223" comment="rest-devel-0.8.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825224" comment="rhythmbox-3.4.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825225" comment="rhythmbox-devel-3.4.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825226" comment="seahorse-nautilus-3.11.92-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825227" comment="shotwell-0.28.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825228" comment="sushi-3.28.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825229" comment="totem-3.26.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825230" comment="totem-devel-3.26.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825231" comment="totem-nautilus-3.26.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825232" comment="totem-pl-parser-3.26.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825233" comment="totem-pl-parser-devel-3.26.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825234" comment="turbojpeg-1.2.90-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825235" comment="turbojpeg-devel-1.2.90-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825236" comment="upower-0.99.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825237" comment="upower-devel-0.99.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825238" comment="upower-devel-docs-0.99.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825239" comment="vala-0.40.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825240" comment="vala-devel-0.40.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825241" comment="vala-doc-0.40.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825242" comment="valadoc-0.40.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825243" comment="valadoc-devel-0.40.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825244" comment="vino-3.22.0-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825245" comment="vte-profile-0.52.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825246" comment="vte291-0.52.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825247" comment="vte291-devel-0.52.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825248" comment="wayland-devel-1.15.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825249" comment="wayland-doc-1.15.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825250" comment="wayland-protocols-devel-1.14-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825251" comment="webkitgtk4-2.20.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825252" comment="webkitgtk4-devel-2.20.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825253" comment="webkitgtk4-doc-2.20.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825254" comment="webkitgtk4-jsc-2.20.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825255" comment="webkitgtk4-jsc-devel-2.20.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825256" comment="webkitgtk4-plugin-process-gtk2-2.20.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825257" comment="xdg-desktop-portal-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825258" comment="xdg-desktop-portal-devel-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825259" comment="xdg-desktop-portal-gtk-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825260" comment="yelp-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825261" comment="yelp-devel-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825262" comment="yelp-libs-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825263" comment="yelp-tools-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825264" comment="yelp-xsl-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825265" comment="yelp-xsl-devel-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825266" comment="zenity-3.28.1-1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172885" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2885</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2885" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2885" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2885" ref_url="https://www.suse.com/security/cve/CVE-2017-2885" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2204-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2153-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5J7SA55MR2FSSTPY72HXQSSZJVHNVAT3/#5J7SA55MR2FSSTPY72HXQSSZJVHNVAT3" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2296-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/A4YKLVRZQVVAHMZEMDU3TBR5XPZCHL6G/#A4YKLVRZQVVAHMZEMDU3TBR5XPZCHL6G" source="SUSE-SU"/>
    <description>
    An exploitable stack based buffer overflow vulnerability exists in the GNOME libsoup 2.58. A specially crafted HTTP request can cause a stack overflow resulting in remote code execution. An attacker can send a special HTTP request to the vulnerable server to trigger this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2885/">CVE-2017-2885 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2885">CVE-2017-2885 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1052916">SUSE bug 1052916</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823523" comment="libsoup-2.56.0-4.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823524" comment="libsoup-devel-2.56.0-4.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173135" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3135</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3135" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3135" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3135" ref_url="https://www.suse.com/security/cve/CVE-2017-3135" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0594-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002674.html" source="SUSE-SU"/>
    <description>
    Under some conditions when using both DNS64 and RPZ to rewrite query responses, query processing can resume in an inconsistent state leading to either an INSIST assertion failure or an attempt to read through a NULL pointer. Affects BIND 9.8.8, 9.9.3-S1 -&gt; 9.9.9-S7, 9.9.3 -&gt; 9.9.9-P5, 9.9.10b1, 9.10.0 -&gt; 9.10.4-P5, 9.10.5b1, 9.11.0 -&gt; 9.11.0-P2, 9.11.1b1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3135/">CVE-2017-3135 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3135">CVE-2017-3135 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1018700">SUSE bug 1018700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018701">SUSE bug 1018701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018702">SUSE bug 1018702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024130">SUSE bug 1024130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033466">SUSE bug 1033466</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822821" comment="bind-9.9.4-38.el7_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822822" comment="bind-chroot-9.9.4-38.el7_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822823" comment="bind-devel-9.9.4-38.el7_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822824" comment="bind-libs-9.9.4-38.el7_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822825" comment="bind-libs-lite-9.9.4-38.el7_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822826" comment="bind-license-9.9.4-38.el7_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822827" comment="bind-lite-devel-9.9.4-38.el7_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822828" comment="bind-pkcs11-9.9.4-38.el7_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822829" comment="bind-pkcs11-devel-9.9.4-38.el7_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822830" comment="bind-pkcs11-libs-9.9.4-38.el7_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822831" comment="bind-pkcs11-utils-9.9.4-38.el7_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822832" comment="bind-sdb-9.9.4-38.el7_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822833" comment="bind-sdb-chroot-9.9.4-38.el7_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822834" comment="bind-utils-9.9.4-38.el7_3.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173136" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3136</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3136" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3136" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3136" ref_url="https://www.suse.com/security/cve/CVE-2017-3136" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002796.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007552.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1063-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BXZIYU2BAM2OOY5PWMVH6AWDYLWHZXDW/#BXZIYU2BAM2OOY5PWMVH6AWDYLWHZXDW" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1699-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VUOYW2V65CJWOTYJHZKJDB23QXG7SODU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1701-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5DSIJXYG3NFNRGFIFTMKBYDE6QWREQSP/" source="SUSE-SU"/>
    <description>
    A query with a specific set of characteristics could cause a server using DNS64 to encounter an assertion failure and terminate. An attacker could deliberately construct a query, enabling denial-of-service against a server if it was configured to use the DNS64 feature and other preconditions were met. Affects BIND 9.8.0 -&gt; 9.8.8-P1, 9.9.0 -&gt; 9.9.9-P6, 9.9.10b1-&gt;9.9.10rc1, 9.10.0 -&gt; 9.10.4-P6, 9.10.5b1-&gt;9.10.5rc1, 9.11.0 -&gt; 9.11.0-P3, 9.11.1b1-&gt;9.11.1rc1, 9.9.3-S1 -&gt; 9.9.9-S8.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3136/">CVE-2017-3136 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3136">CVE-2017-3136 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1018700">SUSE bug 1018700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018701">SUSE bug 1018701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018702">SUSE bug 1018702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024130">SUSE bug 1024130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033461">SUSE bug 1033461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033466">SUSE bug 1033466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081545">SUSE bug 1081545</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822933" comment="bind-9.9.4-38.el7_3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822934" comment="bind-chroot-9.9.4-38.el7_3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822935" comment="bind-devel-9.9.4-38.el7_3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822936" comment="bind-libs-9.9.4-38.el7_3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822937" comment="bind-libs-lite-9.9.4-38.el7_3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822938" comment="bind-license-9.9.4-38.el7_3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822939" comment="bind-lite-devel-9.9.4-38.el7_3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822940" comment="bind-pkcs11-9.9.4-38.el7_3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822941" comment="bind-pkcs11-devel-9.9.4-38.el7_3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822942" comment="bind-pkcs11-libs-9.9.4-38.el7_3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822943" comment="bind-pkcs11-utils-9.9.4-38.el7_3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822944" comment="bind-sdb-9.9.4-38.el7_3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822945" comment="bind-sdb-chroot-9.9.4-38.el7_3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822946" comment="bind-utils-9.9.4-38.el7_3.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173137" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3137</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3137" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3137" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3137" ref_url="https://www.suse.com/security/cve/CVE-2017-3137" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002796.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002803.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1063-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BXZIYU2BAM2OOY5PWMVH6AWDYLWHZXDW/#BXZIYU2BAM2OOY5PWMVH6AWDYLWHZXDW" source="SUSE-SU"/>
    <description>
    Mistaken assumptions about the ordering of records in the answer section of a response containing CNAME or DNAME resource records could lead to a situation in which named would exit with an assertion failure when processing a response in which records occurred in an unusual order. Affects BIND 9.9.9-P6, 9.9.10b1-&gt;9.9.10rc1, 9.10.4-P6, 9.10.5b1-&gt;9.10.5rc1, 9.11.0-P3, 9.11.1b1-&gt;9.11.1rc1, and 9.9.9-S8.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3137/">CVE-2017-3137 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3137">CVE-2017-3137 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1018700">SUSE bug 1018700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018701">SUSE bug 1018701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018702">SUSE bug 1018702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024130">SUSE bug 1024130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033461">SUSE bug 1033461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033466">SUSE bug 1033466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033467">SUSE bug 1033467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034162">SUSE bug 1034162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076118">SUSE bug 1076118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081545">SUSE bug 1081545</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822933" comment="bind-9.9.4-38.el7_3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822934" comment="bind-chroot-9.9.4-38.el7_3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822935" comment="bind-devel-9.9.4-38.el7_3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822936" comment="bind-libs-9.9.4-38.el7_3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822937" comment="bind-libs-lite-9.9.4-38.el7_3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822938" comment="bind-license-9.9.4-38.el7_3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822939" comment="bind-lite-devel-9.9.4-38.el7_3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822940" comment="bind-pkcs11-9.9.4-38.el7_3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822941" comment="bind-pkcs11-devel-9.9.4-38.el7_3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822942" comment="bind-pkcs11-libs-9.9.4-38.el7_3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822943" comment="bind-pkcs11-utils-9.9.4-38.el7_3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822944" comment="bind-sdb-9.9.4-38.el7_3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822945" comment="bind-sdb-chroot-9.9.4-38.el7_3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822946" comment="bind-utils-9.9.4-38.el7_3.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173142" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3142</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3142" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3142" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3142" ref_url="https://www.suse.com/security/cve/CVE-2017-3142" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002999.html" source="SUSE-SU"/>
		<reference ref_id="TID7021041" ref_url="https://www.suse.com/support/kb/doc/?id=7021041" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1809-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6MIJPYCKZ2XKSJQFQUNCQY25BJEDJBUG/#6MIJPYCKZ2XKSJQFQUNCQY25BJEDJBUG" source="SUSE-SU"/>
    <description>
    An attacker who is able to send and receive messages to an authoritative DNS server and who has knowledge of a valid TSIG key name may be able to circumvent TSIG authentication of AXFR requests via a carefully constructed request packet. A server that relies solely on TSIG keys for protection with no other ACL protection could be manipulated into: providing an AXFR of a zone to an unauthorized recipient or accepting bogus NOTIFY packets. Affects BIND 9.4.0-&gt;9.8.8, 9.9.0-&gt;9.9.10-P1, 9.10.0-&gt;9.10.5-P1, 9.11.0-&gt;9.11.1-P1, 9.9.3-S1-&gt;9.9.10-S2, 9.10.5-S1-&gt;9.10.5-S2.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-12-19"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-3142/">CVE-2017-3142 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3142">CVE-2017-3142 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1024130">SUSE bug 1024130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046554">SUSE bug 1046554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046555">SUSE bug 1046555</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823122" comment="bind-9.9.4-50.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823123" comment="bind-chroot-9.9.4-50.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823124" comment="bind-devel-9.9.4-50.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823125" comment="bind-libs-9.9.4-50.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823126" comment="bind-libs-lite-9.9.4-50.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823127" comment="bind-license-9.9.4-50.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823128" comment="bind-lite-devel-9.9.4-50.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823129" comment="bind-pkcs11-9.9.4-50.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823130" comment="bind-pkcs11-devel-9.9.4-50.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823131" comment="bind-pkcs11-libs-9.9.4-50.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823132" comment="bind-pkcs11-utils-9.9.4-50.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823133" comment="bind-sdb-9.9.4-50.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823134" comment="bind-sdb-chroot-9.9.4-50.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823135" comment="bind-utils-9.9.4-50.el7_3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173143" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3143</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3143" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3143" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3143" ref_url="https://www.suse.com/security/cve/CVE-2017-3143" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002999.html" source="SUSE-SU"/>
		<reference ref_id="TID7021041" ref_url="https://www.suse.com/support/kb/doc/?id=7021041" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1809-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6MIJPYCKZ2XKSJQFQUNCQY25BJEDJBUG/#6MIJPYCKZ2XKSJQFQUNCQY25BJEDJBUG" source="SUSE-SU"/>
    <description>
    An attacker who is able to send and receive messages to an authoritative DNS server and who has knowledge of a valid TSIG key name for the zone and service being targeted may be able to manipulate BIND into accepting an unauthorized dynamic update. Affects BIND 9.4.0-&gt;9.8.8, 9.9.0-&gt;9.9.10-P1, 9.10.0-&gt;9.10.5-P1, 9.11.0-&gt;9.11.1-P1, 9.9.3-S1-&gt;9.9.10-S2, 9.10.5-S1-&gt;9.10.5-S2.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-12-19"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-3143/">CVE-2017-3143 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3143">CVE-2017-3143 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1024130">SUSE bug 1024130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046554">SUSE bug 1046554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046555">SUSE bug 1046555</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823122" comment="bind-9.9.4-50.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823123" comment="bind-chroot-9.9.4-50.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823124" comment="bind-devel-9.9.4-50.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823125" comment="bind-libs-9.9.4-50.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823126" comment="bind-libs-lite-9.9.4-50.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823127" comment="bind-license-9.9.4-50.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823128" comment="bind-lite-devel-9.9.4-50.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823129" comment="bind-pkcs11-9.9.4-50.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823130" comment="bind-pkcs11-devel-9.9.4-50.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823131" comment="bind-pkcs11-libs-9.9.4-50.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823132" comment="bind-pkcs11-utils-9.9.4-50.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823133" comment="bind-sdb-9.9.4-50.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823134" comment="bind-sdb-chroot-9.9.4-50.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823135" comment="bind-utils-9.9.4-50.el7_3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173144" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3144</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3144" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3144" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3144" ref_url="https://www.suse.com/security/cve/CVE-2017-3144" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003752.html" source="SUSE-SU"/>
    <description>
    A vulnerability stemming from failure to properly clean up closed OMAPI connections can lead to exhaustion of the pool of socket descriptors available to the DHCP server. Affects ISC DHCP 4.1.0 to 4.1-ESV-R15, 4.2.0 to 4.2.8, 4.3.0 to 4.3.6. Older versions may also be affected but are well beyond their end-of-life (EOL). Releases prior to 4.1.0 have not been tested.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-3144/">CVE-2017-3144 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3144">CVE-2017-3144 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1076118">SUSE bug 1076118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076119">SUSE bug 1076119</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823964" comment="dhclient-4.2.5-58.el7_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823965" comment="dhcp-4.2.5-58.el7_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823966" comment="dhcp-common-4.2.5-58.el7_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823967" comment="dhcp-devel-4.2.5-58.el7_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823968" comment="dhcp-libs-4.2.5-58.el7_4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173145" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3145</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3145" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3145" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3145" ref_url="https://www.suse.com/security/cve/CVE-2017-3145" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003707.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0323-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AUT7X243AFAGQTX2E4FVIVQLEWLAPYXN/#AUT7X243AFAGQTX2E4FVIVQLEWLAPYXN" source="SUSE-SU"/>
    <description>
    BIND was improperly sequencing cleanup operations on upstream recursion fetch contexts, leading in some cases to a use-after-free error that can trigger an assertion failure and crash in named. Affects BIND 9.0.0 to 9.8.x, 9.9.0 to 9.9.11, 9.10.0 to 9.10.6, 9.11.0 to 9.11.2, 9.9.3-S1 to 9.9.11-S1, 9.10.5-S1 to 9.10.6-S1, 9.12.0a1 to 9.12.0rc1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3145/">CVE-2017-3145 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3145">CVE-2017-3145 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1076118">SUSE bug 1076118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101131">SUSE bug 1101131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177790">SUSE bug 1177790</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823937" comment="bind-9.9.4-51.el7_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823938" comment="bind-chroot-9.9.4-51.el7_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823939" comment="bind-devel-9.9.4-51.el7_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823940" comment="bind-libs-9.9.4-51.el7_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823941" comment="bind-libs-lite-9.9.4-51.el7_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823942" comment="bind-license-9.9.4-51.el7_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823943" comment="bind-lite-devel-9.9.4-51.el7_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823944" comment="bind-pkcs11-9.9.4-51.el7_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823945" comment="bind-pkcs11-devel-9.9.4-51.el7_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823946" comment="bind-pkcs11-libs-9.9.4-51.el7_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823947" comment="bind-pkcs11-utils-9.9.4-51.el7_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823948" comment="bind-sdb-9.9.4-51.el7_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823949" comment="bind-sdb-chroot-9.9.4-51.el7_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823950" comment="bind-utils-9.9.4-51.el7_4.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173167" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3167</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3167" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3167" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3167" ref_url="https://www.suse.com/security/cve/CVE-2017-3167" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003365.html" source="SUSE-SU"/>
    <description>
    In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26, use of the ap_get_basic_auth_pw() by third-party modules outside of the authentication phase may lead to authentication requirements being bypassed.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-11-07"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-3167/">CVE-2017-3167 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3167">CVE-2017-3167 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1045065">SUSE bug 1045065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078450">SUSE bug 1078450</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823539" comment="httpd-2.4.6-67.el7_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823540" comment="httpd-devel-2.4.6-67.el7_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823541" comment="httpd-manual-2.4.6-67.el7_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823542" comment="httpd-tools-2.4.6-67.el7_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823543" comment="mod_ldap-2.4.6-67.el7_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823544" comment="mod_proxy_html-2.4.6-67.el7_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823545" comment="mod_session-2.4.6-67.el7_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823546" comment="mod_ssl-2.4.6-67.el7_4.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173169" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3169</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3169" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3169" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3169" ref_url="https://www.suse.com/security/cve/CVE-2017-3169" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003365.html" source="SUSE-SU"/>
    <description>
    In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26, mod_ssl may dereference a NULL pointer when third-party modules call ap_hook_process_connection() during an HTTP request to an HTTPS port.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-3169/">CVE-2017-3169 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3169">CVE-2017-3169 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1045062">SUSE bug 1045062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078450">SUSE bug 1078450</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823539" comment="httpd-2.4.6-67.el7_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823540" comment="httpd-devel-2.4.6-67.el7_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823541" comment="httpd-manual-2.4.6-67.el7_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823542" comment="httpd-tools-2.4.6-67.el7_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823543" comment="mod_ldap-2.4.6-67.el7_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823544" comment="mod_proxy_html-2.4.6-67.el7_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823545" comment="mod_session-2.4.6-67.el7_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823546" comment="mod_ssl-2.4.6-67.el7_4.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173231" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3231</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3231" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3231" ref_url="https://www.suse.com/security/cve/CVE-2017-3231" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002613.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002641.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002651.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0374-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CFQXMIUEYAAFEMNGA4VAINBTGFZC5IIJ/#CFQXMIUEYAAFEMNGA4VAINBTGFZC5IIJ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0513-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5MQTL4UZJTP3OTMSAPDFWKNC6HVTCMS6/#5MQTL4UZJTP3OTMSAPDFWKNC6HVTCMS6" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS v3.0 Base Score 4.3 (Confidentiality impacts).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3231/">CVE-2017-3231 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3231">CVE-2017-3231 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1020905">SUSE bug 1020905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024218">SUSE bug 1024218</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822814" comment="java-1.7.0-openjdk-1.7.0.131-2.6.9.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822815" comment="java-1.7.0-openjdk-accessibility-1.7.0.131-2.6.9.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822816" comment="java-1.7.0-openjdk-demo-1.7.0.131-2.6.9.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822817" comment="java-1.7.0-openjdk-devel-1.7.0.131-2.6.9.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822818" comment="java-1.7.0-openjdk-headless-1.7.0.131-2.6.9.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822819" comment="java-1.7.0-openjdk-javadoc-1.7.0.131-2.6.9.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822820" comment="java-1.7.0-openjdk-src-1.7.0.131-2.6.9.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822782" comment="java-1.8.0-openjdk-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822783" comment="java-1.8.0-openjdk-accessibility-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822784" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822785" comment="java-1.8.0-openjdk-debug-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822786" comment="java-1.8.0-openjdk-demo-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822787" comment="java-1.8.0-openjdk-demo-debug-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822788" comment="java-1.8.0-openjdk-devel-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822789" comment="java-1.8.0-openjdk-devel-debug-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822790" comment="java-1.8.0-openjdk-headless-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822791" comment="java-1.8.0-openjdk-headless-debug-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822792" comment="java-1.8.0-openjdk-javadoc-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822793" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822794" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822795" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822796" comment="java-1.8.0-openjdk-src-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822797" comment="java-1.8.0-openjdk-src-debug-1.8.0.121-0.b13.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173238" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3238</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3238" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3238" ref_url="https://www.suse.com/security/cve/CVE-2017-3238" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002628.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002629.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0479-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/P3A5PKAGB46Y2TQHJTZLZYDCRD3VWTST/#P3A5PKAGB46Y2TQHJTZLZYDCRD3VWTST" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0486-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RE2QKOYR5ADO6D733OETKCCHNESSLT6Q/#RE2QKOYR5ADO6D733OETKCCHNESSLT6Q" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0618-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RQZTLPJMRRA3NZ4APLJA5UYFJJH44POI/#RQZTLPJMRRA3NZ4APLJA5UYFJJH44POI" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS v3.0 Base Score 6.5 (Availability impacts).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3238/">CVE-2017-3238 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3238">CVE-2017-3238 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1020868">SUSE bug 1020868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020882">SUSE bug 1020882</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823421" comment="mariadb-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823422" comment="mariadb-bench-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823423" comment="mariadb-devel-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823424" comment="mariadb-embedded-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823425" comment="mariadb-embedded-devel-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823426" comment="mariadb-libs-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823427" comment="mariadb-server-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823428" comment="mariadb-test-5.5.56-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173241" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3241</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3241" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3241" ref_url="https://www.suse.com/security/cve/CVE-2017-3241" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002613.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002641.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002651.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0374-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CFQXMIUEYAAFEMNGA4VAINBTGFZC5IIJ/#CFQXMIUEYAAFEMNGA4VAINBTGFZC5IIJ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0513-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5MQTL4UZJTP3OTMSAPDFWKNC6HVTCMS6/#5MQTL4UZJTP3OTMSAPDFWKNC6HVTCMS6" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111; JRockit: R28.3.12. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. While the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS v3.0 Base Score 9.0 (Confidentiality, Integrity and Availability impacts).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3241/">CVE-2017-3241 at SUSE</cve>
	<cve impact="critical" cvss3="9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3241">CVE-2017-3241 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1020905">SUSE bug 1020905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024218">SUSE bug 1024218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163365">SUSE bug 1163365</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822814" comment="java-1.7.0-openjdk-1.7.0.131-2.6.9.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822815" comment="java-1.7.0-openjdk-accessibility-1.7.0.131-2.6.9.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822816" comment="java-1.7.0-openjdk-demo-1.7.0.131-2.6.9.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822817" comment="java-1.7.0-openjdk-devel-1.7.0.131-2.6.9.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822818" comment="java-1.7.0-openjdk-headless-1.7.0.131-2.6.9.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822819" comment="java-1.7.0-openjdk-javadoc-1.7.0.131-2.6.9.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822820" comment="java-1.7.0-openjdk-src-1.7.0.131-2.6.9.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822782" comment="java-1.8.0-openjdk-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822783" comment="java-1.8.0-openjdk-accessibility-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822784" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822785" comment="java-1.8.0-openjdk-debug-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822786" comment="java-1.8.0-openjdk-demo-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822787" comment="java-1.8.0-openjdk-demo-debug-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822788" comment="java-1.8.0-openjdk-devel-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822789" comment="java-1.8.0-openjdk-devel-debug-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822790" comment="java-1.8.0-openjdk-headless-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822791" comment="java-1.8.0-openjdk-headless-debug-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822792" comment="java-1.8.0-openjdk-javadoc-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822793" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822794" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822795" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822796" comment="java-1.8.0-openjdk-src-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822797" comment="java-1.8.0-openjdk-src-debug-1.8.0.121-0.b13.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173243" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3243</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3243" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3243" ref_url="https://www.suse.com/security/cve/CVE-2017-3243" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002628.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002629.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0486-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RE2QKOYR5ADO6D733OETKCCHNESSLT6Q/#RE2QKOYR5ADO6D733OETKCCHNESSLT6Q" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Charsets). Supported versions that are affected are 5.5.53 and earlier. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS v3.0 Base Score 4.4 (Availability impacts).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3243/">CVE-2017-3243 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3243">CVE-2017-3243 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1020868">SUSE bug 1020868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020891">SUSE bug 1020891</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823421" comment="mariadb-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823422" comment="mariadb-bench-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823423" comment="mariadb-devel-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823424" comment="mariadb-embedded-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823425" comment="mariadb-embedded-devel-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823426" comment="mariadb-libs-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823427" comment="mariadb-server-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823428" comment="mariadb-test-5.5.56-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173244" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3244</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3244" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3244" ref_url="https://www.suse.com/security/cve/CVE-2017-3244" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002628.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002629.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0479-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/P3A5PKAGB46Y2TQHJTZLZYDCRD3VWTST/#P3A5PKAGB46Y2TQHJTZLZYDCRD3VWTST" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0486-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RE2QKOYR5ADO6D733OETKCCHNESSLT6Q/#RE2QKOYR5ADO6D733OETKCCHNESSLT6Q" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0618-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RQZTLPJMRRA3NZ4APLJA5UYFJJH44POI/#RQZTLPJMRRA3NZ4APLJA5UYFJJH44POI" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DML). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS v3.0 Base Score 6.5 (Availability impacts).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3244/">CVE-2017-3244 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3244">CVE-2017-3244 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1020868">SUSE bug 1020868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020877">SUSE bug 1020877</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823421" comment="mariadb-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823422" comment="mariadb-bench-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823423" comment="mariadb-devel-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823424" comment="mariadb-embedded-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823425" comment="mariadb-embedded-devel-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823426" comment="mariadb-libs-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823427" comment="mariadb-server-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823428" comment="mariadb-test-5.5.56-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173252" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3252</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3252" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3252" ref_url="https://www.suse.com/security/cve/CVE-2017-3252" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002613.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002641.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002651.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0374-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CFQXMIUEYAAFEMNGA4VAINBTGFZC5IIJ/#CFQXMIUEYAAFEMNGA4VAINBTGFZC5IIJ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0513-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5MQTL4UZJTP3OTMSAPDFWKNC6HVTCMS6/#5MQTL4UZJTP3OTMSAPDFWKNC6HVTCMS6" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JAAS). Supported versions that are affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111; JRockit: R28.3.12. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, JRockit accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS v3.0 Base Score 5.8 (Integrity impacts).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3252/">CVE-2017-3252 at SUSE</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3252">CVE-2017-3252 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1020905">SUSE bug 1020905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024218">SUSE bug 1024218</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822814" comment="java-1.7.0-openjdk-1.7.0.131-2.6.9.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822815" comment="java-1.7.0-openjdk-accessibility-1.7.0.131-2.6.9.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822816" comment="java-1.7.0-openjdk-demo-1.7.0.131-2.6.9.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822817" comment="java-1.7.0-openjdk-devel-1.7.0.131-2.6.9.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822818" comment="java-1.7.0-openjdk-headless-1.7.0.131-2.6.9.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822819" comment="java-1.7.0-openjdk-javadoc-1.7.0.131-2.6.9.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822820" comment="java-1.7.0-openjdk-src-1.7.0.131-2.6.9.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822782" comment="java-1.8.0-openjdk-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822783" comment="java-1.8.0-openjdk-accessibility-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822784" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822785" comment="java-1.8.0-openjdk-debug-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822786" comment="java-1.8.0-openjdk-demo-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822787" comment="java-1.8.0-openjdk-demo-debug-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822788" comment="java-1.8.0-openjdk-devel-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822789" comment="java-1.8.0-openjdk-devel-debug-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822790" comment="java-1.8.0-openjdk-headless-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822791" comment="java-1.8.0-openjdk-headless-debug-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822792" comment="java-1.8.0-openjdk-javadoc-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822793" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822794" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822795" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822796" comment="java-1.8.0-openjdk-src-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822797" comment="java-1.8.0-openjdk-src-debug-1.8.0.121-0.b13.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173253" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3253</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3253" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3253" ref_url="https://www.suse.com/security/cve/CVE-2017-3253" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002613.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002641.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002651.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0374-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CFQXMIUEYAAFEMNGA4VAINBTGFZC5IIJ/#CFQXMIUEYAAFEMNGA4VAINBTGFZC5IIJ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0513-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5MQTL4UZJTP3OTMSAPDFWKNC6HVTCMS6/#5MQTL4UZJTP3OTMSAPDFWKNC6HVTCMS6" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: 2D). Supported versions that are affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111; JRockit: R28.3.12. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS v3.0 Base Score 7.5 (Availability impacts).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3253/">CVE-2017-3253 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3253">CVE-2017-3253 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1020905">SUSE bug 1020905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024218">SUSE bug 1024218</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822814" comment="java-1.7.0-openjdk-1.7.0.131-2.6.9.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822815" comment="java-1.7.0-openjdk-accessibility-1.7.0.131-2.6.9.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822816" comment="java-1.7.0-openjdk-demo-1.7.0.131-2.6.9.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822817" comment="java-1.7.0-openjdk-devel-1.7.0.131-2.6.9.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822818" comment="java-1.7.0-openjdk-headless-1.7.0.131-2.6.9.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822819" comment="java-1.7.0-openjdk-javadoc-1.7.0.131-2.6.9.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822820" comment="java-1.7.0-openjdk-src-1.7.0.131-2.6.9.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822782" comment="java-1.8.0-openjdk-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822783" comment="java-1.8.0-openjdk-accessibility-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822784" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822785" comment="java-1.8.0-openjdk-debug-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822786" comment="java-1.8.0-openjdk-demo-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822787" comment="java-1.8.0-openjdk-demo-debug-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822788" comment="java-1.8.0-openjdk-devel-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822789" comment="java-1.8.0-openjdk-devel-debug-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822790" comment="java-1.8.0-openjdk-headless-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822791" comment="java-1.8.0-openjdk-headless-debug-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822792" comment="java-1.8.0-openjdk-javadoc-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822793" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822794" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822795" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822796" comment="java-1.8.0-openjdk-src-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822797" comment="java-1.8.0-openjdk-src-debug-1.8.0.121-0.b13.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173258" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3258</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3258" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3258" ref_url="https://www.suse.com/security/cve/CVE-2017-3258" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002628.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002629.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0479-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/P3A5PKAGB46Y2TQHJTZLZYDCRD3VWTST/#P3A5PKAGB46Y2TQHJTZLZYDCRD3VWTST" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0486-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RE2QKOYR5ADO6D733OETKCCHNESSLT6Q/#RE2QKOYR5ADO6D733OETKCCHNESSLT6Q" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0618-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RQZTLPJMRRA3NZ4APLJA5UYFJJH44POI/#RQZTLPJMRRA3NZ4APLJA5UYFJJH44POI" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS v3.0 Base Score 6.5 (Availability impacts).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3258/">CVE-2017-3258 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3258">CVE-2017-3258 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1020868">SUSE bug 1020868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020875">SUSE bug 1020875</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823421" comment="mariadb-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823422" comment="mariadb-bench-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823423" comment="mariadb-devel-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823424" comment="mariadb-embedded-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823425" comment="mariadb-embedded-devel-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823426" comment="mariadb-libs-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823427" comment="mariadb-server-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823428" comment="mariadb-test-5.5.56-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173261" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3261</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3261" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3261" ref_url="https://www.suse.com/security/cve/CVE-2017-3261" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002613.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002641.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002651.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0374-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CFQXMIUEYAAFEMNGA4VAINBTGFZC5IIJ/#CFQXMIUEYAAFEMNGA4VAINBTGFZC5IIJ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0513-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5MQTL4UZJTP3OTMSAPDFWKNC6HVTCMS6/#5MQTL4UZJTP3OTMSAPDFWKNC6HVTCMS6" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS v3.0 Base Score 4.3 (Confidentiality impacts).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3261/">CVE-2017-3261 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3261">CVE-2017-3261 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1020905">SUSE bug 1020905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024218">SUSE bug 1024218</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822814" comment="java-1.7.0-openjdk-1.7.0.131-2.6.9.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822815" comment="java-1.7.0-openjdk-accessibility-1.7.0.131-2.6.9.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822816" comment="java-1.7.0-openjdk-demo-1.7.0.131-2.6.9.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822817" comment="java-1.7.0-openjdk-devel-1.7.0.131-2.6.9.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822818" comment="java-1.7.0-openjdk-headless-1.7.0.131-2.6.9.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822819" comment="java-1.7.0-openjdk-javadoc-1.7.0.131-2.6.9.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822820" comment="java-1.7.0-openjdk-src-1.7.0.131-2.6.9.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822782" comment="java-1.8.0-openjdk-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822783" comment="java-1.8.0-openjdk-accessibility-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822784" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822785" comment="java-1.8.0-openjdk-debug-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822786" comment="java-1.8.0-openjdk-demo-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822787" comment="java-1.8.0-openjdk-demo-debug-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822788" comment="java-1.8.0-openjdk-devel-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822789" comment="java-1.8.0-openjdk-devel-debug-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822790" comment="java-1.8.0-openjdk-headless-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822791" comment="java-1.8.0-openjdk-headless-debug-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822792" comment="java-1.8.0-openjdk-javadoc-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822793" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822794" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822795" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822796" comment="java-1.8.0-openjdk-src-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822797" comment="java-1.8.0-openjdk-src-debug-1.8.0.121-0.b13.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173265" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3265</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3265" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3265" ref_url="https://www.suse.com/security/cve/CVE-2017-3265" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002628.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002629.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0479-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/P3A5PKAGB46Y2TQHJTZLZYDCRD3VWTST/#P3A5PKAGB46Y2TQHJTZLZYDCRD3VWTST" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0486-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RE2QKOYR5ADO6D733OETKCCHNESSLT6Q/#RE2QKOYR5ADO6D733OETKCCHNESSLT6Q" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0618-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RQZTLPJMRRA3NZ4APLJA5UYFJJH44POI/#RQZTLPJMRRA3NZ4APLJA5UYFJJH44POI" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Packaging). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS v3.0 Base Score 5.6 (Confidentiality and Availability impacts).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3265/">CVE-2017-3265 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3265">CVE-2017-3265 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1020868">SUSE bug 1020868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020885">SUSE bug 1020885</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823421" comment="mariadb-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823422" comment="mariadb-bench-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823423" comment="mariadb-devel-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823424" comment="mariadb-embedded-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823425" comment="mariadb-embedded-devel-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823426" comment="mariadb-libs-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823427" comment="mariadb-server-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823428" comment="mariadb-test-5.5.56-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173272" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3272</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3272" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3272" ref_url="https://www.suse.com/security/cve/CVE-2017-3272" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002613.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002641.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002651.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0374-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CFQXMIUEYAAFEMNGA4VAINBTGFZC5IIJ/#CFQXMIUEYAAFEMNGA4VAINBTGFZC5IIJ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0513-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5MQTL4UZJTP3OTMSAPDFWKNC6HVTCMS6/#5MQTL4UZJTP3OTMSAPDFWKNC6HVTCMS6" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS v3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3272/">CVE-2017-3272 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3272">CVE-2017-3272 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1020905">SUSE bug 1020905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024218">SUSE bug 1024218</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822814" comment="java-1.7.0-openjdk-1.7.0.131-2.6.9.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822815" comment="java-1.7.0-openjdk-accessibility-1.7.0.131-2.6.9.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822816" comment="java-1.7.0-openjdk-demo-1.7.0.131-2.6.9.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822817" comment="java-1.7.0-openjdk-devel-1.7.0.131-2.6.9.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822818" comment="java-1.7.0-openjdk-headless-1.7.0.131-2.6.9.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822819" comment="java-1.7.0-openjdk-javadoc-1.7.0.131-2.6.9.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822820" comment="java-1.7.0-openjdk-src-1.7.0.131-2.6.9.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822782" comment="java-1.8.0-openjdk-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822783" comment="java-1.8.0-openjdk-accessibility-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822784" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822785" comment="java-1.8.0-openjdk-debug-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822786" comment="java-1.8.0-openjdk-demo-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822787" comment="java-1.8.0-openjdk-demo-debug-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822788" comment="java-1.8.0-openjdk-devel-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822789" comment="java-1.8.0-openjdk-devel-debug-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822790" comment="java-1.8.0-openjdk-headless-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822791" comment="java-1.8.0-openjdk-headless-debug-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822792" comment="java-1.8.0-openjdk-javadoc-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822793" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822794" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822795" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822796" comment="java-1.8.0-openjdk-src-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822797" comment="java-1.8.0-openjdk-src-debug-1.8.0.121-0.b13.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173289" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3289</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3289" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3289" ref_url="https://www.suse.com/security/cve/CVE-2017-3289" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002613.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002641.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1400-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002920.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0374-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CFQXMIUEYAAFEMNGA4VAINBTGFZC5IIJ/#CFQXMIUEYAAFEMNGA4VAINBTGFZC5IIJ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0513-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5MQTL4UZJTP3OTMSAPDFWKNC6HVTCMS6/#5MQTL4UZJTP3OTMSAPDFWKNC6HVTCMS6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1429-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HFM22GVFR6J3ZBDLMDODA72UFLWFLIOI/#HFM22GVFR6J3ZBDLMDODA72UFLWFLIOI" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Hotspot). Supported versions that are affected are Java SE: 7u121 and 8u112; Java SE Embedded: 8u111. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS v3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3289/">CVE-2017-3289 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3289">CVE-2017-3289 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1020905">SUSE bug 1020905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024218">SUSE bug 1024218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163365">SUSE bug 1163365</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822814" comment="java-1.7.0-openjdk-1.7.0.131-2.6.9.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822815" comment="java-1.7.0-openjdk-accessibility-1.7.0.131-2.6.9.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822816" comment="java-1.7.0-openjdk-demo-1.7.0.131-2.6.9.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822817" comment="java-1.7.0-openjdk-devel-1.7.0.131-2.6.9.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822818" comment="java-1.7.0-openjdk-headless-1.7.0.131-2.6.9.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822819" comment="java-1.7.0-openjdk-javadoc-1.7.0.131-2.6.9.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822820" comment="java-1.7.0-openjdk-src-1.7.0.131-2.6.9.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822782" comment="java-1.8.0-openjdk-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822783" comment="java-1.8.0-openjdk-accessibility-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822784" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822785" comment="java-1.8.0-openjdk-debug-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822786" comment="java-1.8.0-openjdk-demo-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822787" comment="java-1.8.0-openjdk-demo-debug-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822788" comment="java-1.8.0-openjdk-devel-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822789" comment="java-1.8.0-openjdk-devel-debug-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822790" comment="java-1.8.0-openjdk-headless-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822791" comment="java-1.8.0-openjdk-headless-debug-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822792" comment="java-1.8.0-openjdk-javadoc-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822793" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822794" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822795" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822796" comment="java-1.8.0-openjdk-src-1.8.0.121-0.b13.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822797" comment="java-1.8.0-openjdk-src-debug-1.8.0.121-0.b13.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173291" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3291</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3291" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3291" ref_url="https://www.suse.com/security/cve/CVE-2017-3291" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002628.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002629.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0479-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/P3A5PKAGB46Y2TQHJTZLZYDCRD3VWTST/#P3A5PKAGB46Y2TQHJTZLZYDCRD3VWTST" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0486-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RE2QKOYR5ADO6D733OETKCCHNESSLT6Q/#RE2QKOYR5ADO6D733OETKCCHNESSLT6Q" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0618-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RQZTLPJMRRA3NZ4APLJA5UYFJJH44POI/#RQZTLPJMRRA3NZ4APLJA5UYFJJH44POI" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Packaging). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Server. CVSS v3.0 Base Score 6.3 (Confidentiality, Integrity and Availability impacts).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3291/">CVE-2017-3291 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3291">CVE-2017-3291 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1020868">SUSE bug 1020868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020884">SUSE bug 1020884</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998309">SUSE bug 998309</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823421" comment="mariadb-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823422" comment="mariadb-bench-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823423" comment="mariadb-devel-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823424" comment="mariadb-embedded-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823425" comment="mariadb-embedded-devel-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823426" comment="mariadb-libs-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823427" comment="mariadb-server-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823428" comment="mariadb-test-5.5.56-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173302" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3302</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3302" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3302" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3302" ref_url="https://www.suse.com/security/cve/CVE-2017-3302" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002889.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004235.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1209-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4MXHGL63TEX2VH3HM5WVIJGPF526Z4P5/#4MXHGL63TEX2VH3HM5WVIJGPF526Z4P5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1475-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/P2J62OYFQTCRUUJX4ZKXU325YL7JZOAK/#P2J62OYFQTCRUUJX4ZKXU325YL7JZOAK" source="SUSE-SU"/>
    <description>
    Crash in libmysqlclient.so in Oracle MySQL before 5.6.21 and 5.7.x before 5.7.5 and MariaDB through 5.5.54, 10.0.x through 10.0.29, 10.1.x through 10.1.21, and 10.2.x through 10.2.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3302/">CVE-2017-3302 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3302">CVE-2017-3302 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1022428">SUSE bug 1022428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034850">SUSE bug 1034850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034911">SUSE bug 1034911</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823421" comment="mariadb-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823422" comment="mariadb-bench-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823423" comment="mariadb-devel-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823424" comment="mariadb-embedded-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823425" comment="mariadb-embedded-devel-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823426" comment="mariadb-libs-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823427" comment="mariadb-server-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823428" comment="mariadb-test-5.5.56-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173308" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3308</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3308" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3308" ref_url="https://www.suse.com/security/cve/CVE-2017-3308" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004235.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1209-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4MXHGL63TEX2VH3HM5WVIJGPF526Z4P5/#4MXHGL63TEX2VH3HM5WVIJGPF526Z4P5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2119-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NMBXNXHIYXVKRXD4APJIAQT2DVHIHSG4/#NMBXNXHIYXVKRXD4APJIAQT2DVHIHSG4" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DML). Supported versions that are affected are 5.5.54 and earlier, 5.6.35 and earlier and 5.7.17 and earlier. Easily "exploitable" vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. While the vulnerability is in MySQL Server, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 7.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-02-21"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3308/">CVE-2017-3308 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3308">CVE-2017-3308 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1034850">SUSE bug 1034850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048715">SUSE bug 1048715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823421" comment="mariadb-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823422" comment="mariadb-bench-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823423" comment="mariadb-devel-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823424" comment="mariadb-embedded-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823425" comment="mariadb-embedded-devel-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823426" comment="mariadb-libs-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823427" comment="mariadb-server-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823428" comment="mariadb-test-5.5.56-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173309" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3309</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3309" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3309" ref_url="https://www.suse.com/security/cve/CVE-2017-3309" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004235.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1209-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4MXHGL63TEX2VH3HM5WVIJGPF526Z4P5/#4MXHGL63TEX2VH3HM5WVIJGPF526Z4P5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2119-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NMBXNXHIYXVKRXD4APJIAQT2DVHIHSG4/#NMBXNXHIYXVKRXD4APJIAQT2DVHIHSG4" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.54 and earlier, 5.6.35 and earlier and 5.7.17 and earlier. Easily "exploitable" vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. While the vulnerability is in MySQL Server, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 7.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-02-23"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3309/">CVE-2017-3309 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3309">CVE-2017-3309 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1034850">SUSE bug 1034850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048715">SUSE bug 1048715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823421" comment="mariadb-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823422" comment="mariadb-bench-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823423" comment="mariadb-devel-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823424" comment="mariadb-embedded-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823425" comment="mariadb-embedded-devel-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823426" comment="mariadb-libs-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823427" comment="mariadb-server-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823428" comment="mariadb-test-5.5.56-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173312" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3312</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3312" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3312" ref_url="https://www.suse.com/security/cve/CVE-2017-3312" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002628.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002629.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0479-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/P3A5PKAGB46Y2TQHJTZLZYDCRD3VWTST/#P3A5PKAGB46Y2TQHJTZLZYDCRD3VWTST" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0486-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RE2QKOYR5ADO6D733OETKCCHNESSLT6Q/#RE2QKOYR5ADO6D733OETKCCHNESSLT6Q" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0618-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RQZTLPJMRRA3NZ4APLJA5UYFJJH44POI/#RQZTLPJMRRA3NZ4APLJA5UYFJJH44POI" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Packaging). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Server. CVSS v3.0 Base Score 6.7 (Confidentiality, Integrity and Availability impacts).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-3312/">CVE-2017-3312 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3312">CVE-2017-3312 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1020868">SUSE bug 1020868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020873">SUSE bug 1020873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998309">SUSE bug 998309</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823421" comment="mariadb-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823422" comment="mariadb-bench-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823423" comment="mariadb-devel-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823424" comment="mariadb-embedded-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823425" comment="mariadb-embedded-devel-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823426" comment="mariadb-libs-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823427" comment="mariadb-server-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823428" comment="mariadb-test-5.5.56-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173313" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3313</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3313" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3313" ref_url="https://www.suse.com/security/cve/CVE-2017-3313" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002889.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004235.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0479-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/P3A5PKAGB46Y2TQHJTZLZYDCRD3VWTST/#P3A5PKAGB46Y2TQHJTZLZYDCRD3VWTST" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0618-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RQZTLPJMRRA3NZ4APLJA5UYFJJH44POI/#RQZTLPJMRRA3NZ4APLJA5UYFJJH44POI" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1475-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/P2J62OYFQTCRUUJX4ZKXU325YL7JZOAK/#P2J62OYFQTCRUUJX4ZKXU325YL7JZOAK" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: MyISAM). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data. CVSS v3.0 Base Score 4.7 (Confidentiality impacts).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3313/">CVE-2017-3313 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3313">CVE-2017-3313 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1020868">SUSE bug 1020868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020890">SUSE bug 1020890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034911">SUSE bug 1034911</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823421" comment="mariadb-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823422" comment="mariadb-bench-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823423" comment="mariadb-devel-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823424" comment="mariadb-embedded-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823425" comment="mariadb-embedded-devel-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823426" comment="mariadb-libs-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823427" comment="mariadb-server-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823428" comment="mariadb-test-5.5.56-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173317" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3317</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3317" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3317" ref_url="https://www.suse.com/security/cve/CVE-2017-3317" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002628.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002629.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0479-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/P3A5PKAGB46Y2TQHJTZLZYDCRD3VWTST/#P3A5PKAGB46Y2TQHJTZLZYDCRD3VWTST" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0486-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RE2QKOYR5ADO6D733OETKCCHNESSLT6Q/#RE2QKOYR5ADO6D733OETKCCHNESSLT6Q" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0618-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RQZTLPJMRRA3NZ4APLJA5UYFJJH44POI/#RQZTLPJMRRA3NZ4APLJA5UYFJJH44POI" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Logging). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS v3.0 Base Score 4.0 (Availability impacts).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3317/">CVE-2017-3317 at SUSE</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3317">CVE-2017-3317 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1020868">SUSE bug 1020868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020894">SUSE bug 1020894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823421" comment="mariadb-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823422" comment="mariadb-bench-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823423" comment="mariadb-devel-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823424" comment="mariadb-embedded-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823425" comment="mariadb-embedded-devel-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823426" comment="mariadb-libs-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823427" comment="mariadb-server-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823428" comment="mariadb-test-5.5.56-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173318" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3318</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3318" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3318" ref_url="https://www.suse.com/security/cve/CVE-2017-3318" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002628.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002629.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0479-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/P3A5PKAGB46Y2TQHJTZLZYDCRD3VWTST/#P3A5PKAGB46Y2TQHJTZLZYDCRD3VWTST" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0486-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RE2QKOYR5ADO6D733OETKCCHNESSLT6Q/#RE2QKOYR5ADO6D733OETKCCHNESSLT6Q" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0618-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RQZTLPJMRRA3NZ4APLJA5UYFJJH44POI/#RQZTLPJMRRA3NZ4APLJA5UYFJJH44POI" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Error Handling). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data. CVSS v3.0 Base Score 4.0 (Confidentiality impacts).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-3318/">CVE-2017-3318 at SUSE</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3318">CVE-2017-3318 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1020868">SUSE bug 1020868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020896">SUSE bug 1020896</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823421" comment="mariadb-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823422" comment="mariadb-bench-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823423" comment="mariadb-devel-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823424" comment="mariadb-embedded-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823425" comment="mariadb-embedded-devel-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823426" comment="mariadb-libs-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823427" comment="mariadb-server-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823428" comment="mariadb-test-5.5.56-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173453" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3453</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3453" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3453" ref_url="https://www.suse.com/security/cve/CVE-2017-3453" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004235.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1209-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4MXHGL63TEX2VH3HM5WVIJGPF526Z4P5/#4MXHGL63TEX2VH3HM5WVIJGPF526Z4P5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2119-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NMBXNXHIYXVKRXD4APJIAQT2DVHIHSG4/#NMBXNXHIYXVKRXD4APJIAQT2DVHIHSG4" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.54 and earlier, 5.6.35 and earlier and 5.7.17 and earlier. Easily "exploitable" vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-02-22"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3453/">CVE-2017-3453 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3453">CVE-2017-3453 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1034850">SUSE bug 1034850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048715">SUSE bug 1048715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823421" comment="mariadb-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823422" comment="mariadb-bench-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823423" comment="mariadb-devel-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823424" comment="mariadb-embedded-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823425" comment="mariadb-embedded-devel-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823426" comment="mariadb-libs-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823427" comment="mariadb-server-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823428" comment="mariadb-test-5.5.56-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173456" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3456</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3456" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3456" ref_url="https://www.suse.com/security/cve/CVE-2017-3456" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004235.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1209-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4MXHGL63TEX2VH3HM5WVIJGPF526Z4P5/#4MXHGL63TEX2VH3HM5WVIJGPF526Z4P5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2119-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NMBXNXHIYXVKRXD4APJIAQT2DVHIHSG4/#NMBXNXHIYXVKRXD4APJIAQT2DVHIHSG4" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DML). Supported versions that are affected are 5.5.54 and earlier, 5.6.35 and earlier and 5.7.17 and earlier. Easily "exploitable" vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-02-21"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3456/">CVE-2017-3456 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3456">CVE-2017-3456 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1034850">SUSE bug 1034850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048715">SUSE bug 1048715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823421" comment="mariadb-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823422" comment="mariadb-bench-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823423" comment="mariadb-devel-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823424" comment="mariadb-embedded-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823425" comment="mariadb-embedded-devel-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823426" comment="mariadb-libs-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823427" comment="mariadb-server-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823428" comment="mariadb-test-5.5.56-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173464" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3464</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3464" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3464" ref_url="https://www.suse.com/security/cve/CVE-2017-3464" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004235.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1209-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4MXHGL63TEX2VH3HM5WVIJGPF526Z4P5/#4MXHGL63TEX2VH3HM5WVIJGPF526Z4P5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2119-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NMBXNXHIYXVKRXD4APJIAQT2DVHIHSG4/#NMBXNXHIYXVKRXD4APJIAQT2DVHIHSG4" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.54 and earlier, 5.6.35 and earlier and 5.7.17 and earlier. Easily "exploitable" vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-02-28"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3464/">CVE-2017-3464 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3464">CVE-2017-3464 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1034850">SUSE bug 1034850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048715">SUSE bug 1048715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823421" comment="mariadb-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823422" comment="mariadb-bench-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823423" comment="mariadb-devel-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823424" comment="mariadb-embedded-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823425" comment="mariadb-embedded-devel-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823426" comment="mariadb-libs-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823427" comment="mariadb-server-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823428" comment="mariadb-test-5.5.56-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173509" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3509</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3509" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3509" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3509" ref_url="https://www.suse.com/security/cve/CVE-2017-3509" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1400-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1445-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002928.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1429-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HFM22GVFR6J3ZBDLMDODA72UFLWFLIOI/#HFM22GVFR6J3ZBDLMDODA72UFLWFLIOI" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1507-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U35H3NDHZFD3PZ72ZDJYGQLRD3OST4AJ/#U35H3NDHZFD3PZ72ZDJYGQLRD3OST4AJ" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u141, 7u131 and 8u121; Java SE Embedded: 8u121. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3509/">CVE-2017-3509 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3509">CVE-2017-3509 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1034849">SUSE bug 1034849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038505">SUSE bug 1038505</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822972" comment="java-1.7.0-openjdk-1.7.0.141-2.6.10.1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822973" comment="java-1.7.0-openjdk-accessibility-1.7.0.141-2.6.10.1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822974" comment="java-1.7.0-openjdk-demo-1.7.0.141-2.6.10.1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822975" comment="java-1.7.0-openjdk-devel-1.7.0.141-2.6.10.1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822976" comment="java-1.7.0-openjdk-headless-1.7.0.141-2.6.10.1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822977" comment="java-1.7.0-openjdk-javadoc-1.7.0.141-2.6.10.1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822978" comment="java-1.7.0-openjdk-src-1.7.0.141-2.6.10.1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822955" comment="java-1.8.0-openjdk-1.8.0.131-2.b11.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822956" comment="java-1.8.0-openjdk-accessibility-1.8.0.131-2.b11.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822957" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.131-2.b11.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822958" comment="java-1.8.0-openjdk-debug-1.8.0.131-2.b11.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822959" comment="java-1.8.0-openjdk-demo-1.8.0.131-2.b11.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822960" comment="java-1.8.0-openjdk-demo-debug-1.8.0.131-2.b11.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822961" comment="java-1.8.0-openjdk-devel-1.8.0.131-2.b11.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822962" comment="java-1.8.0-openjdk-devel-debug-1.8.0.131-2.b11.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822963" comment="java-1.8.0-openjdk-headless-1.8.0.131-2.b11.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822964" comment="java-1.8.0-openjdk-headless-debug-1.8.0.131-2.b11.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822965" comment="java-1.8.0-openjdk-javadoc-1.8.0.131-2.b11.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822966" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.131-2.b11.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822967" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.131-2.b11.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822968" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.131-2.b11.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822969" comment="java-1.8.0-openjdk-src-1.8.0.131-2.b11.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822970" comment="java-1.8.0-openjdk-src-debug-1.8.0.131-2.b11.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3511</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3511" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3511" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3511" ref_url="https://www.suse.com/security/cve/CVE-2017-3511" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1400-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1445-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002928.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1429-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HFM22GVFR6J3ZBDLMDODA72UFLWFLIOI/#HFM22GVFR6J3ZBDLMDODA72UFLWFLIOI" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1507-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U35H3NDHZFD3PZ72ZDJYGQLRD3OST4AJ/#U35H3NDHZFD3PZ72ZDJYGQLRD3OST4AJ" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JCE). Supported versions that are affected are Java SE: 7u131 and 8u121; Java SE Embedded: 8u121; JRockit: R28.3.13. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Java SE, Java SE Embedded, JRockit executes to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 7.7 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3511/">CVE-2017-3511 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3511">CVE-2017-3511 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1034849">SUSE bug 1034849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038505">SUSE bug 1038505</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822972" comment="java-1.7.0-openjdk-1.7.0.141-2.6.10.1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822973" comment="java-1.7.0-openjdk-accessibility-1.7.0.141-2.6.10.1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822974" comment="java-1.7.0-openjdk-demo-1.7.0.141-2.6.10.1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822975" comment="java-1.7.0-openjdk-devel-1.7.0.141-2.6.10.1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822976" comment="java-1.7.0-openjdk-headless-1.7.0.141-2.6.10.1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822977" comment="java-1.7.0-openjdk-javadoc-1.7.0.141-2.6.10.1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822978" comment="java-1.7.0-openjdk-src-1.7.0.141-2.6.10.1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822955" comment="java-1.8.0-openjdk-1.8.0.131-2.b11.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822956" comment="java-1.8.0-openjdk-accessibility-1.8.0.131-2.b11.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822957" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.131-2.b11.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822958" comment="java-1.8.0-openjdk-debug-1.8.0.131-2.b11.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822959" comment="java-1.8.0-openjdk-demo-1.8.0.131-2.b11.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822960" comment="java-1.8.0-openjdk-demo-debug-1.8.0.131-2.b11.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822961" comment="java-1.8.0-openjdk-devel-1.8.0.131-2.b11.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822962" comment="java-1.8.0-openjdk-devel-debug-1.8.0.131-2.b11.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822963" comment="java-1.8.0-openjdk-headless-1.8.0.131-2.b11.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822964" comment="java-1.8.0-openjdk-headless-debug-1.8.0.131-2.b11.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822965" comment="java-1.8.0-openjdk-javadoc-1.8.0.131-2.b11.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822966" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.131-2.b11.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822967" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.131-2.b11.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822968" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.131-2.b11.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822969" comment="java-1.8.0-openjdk-src-1.8.0.131-2.b11.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822970" comment="java-1.8.0-openjdk-src-debug-1.8.0.131-2.b11.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173526" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3526</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3526" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3526" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3526" ref_url="https://www.suse.com/security/cve/CVE-2017-3526" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1400-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1445-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002928.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1429-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HFM22GVFR6J3ZBDLMDODA72UFLWFLIOI/#HFM22GVFR6J3ZBDLMDODA72UFLWFLIOI" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1507-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U35H3NDHZFD3PZ72ZDJYGQLRD3OST4AJ/#U35H3NDHZFD3PZ72ZDJYGQLRD3OST4AJ" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JAXP). Supported versions that are affected are Java SE: 6u141, 7u131 and 8u121; Java SE Embedded: 8u121; JRockit: R28.3.13. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3526/">CVE-2017-3526 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3526">CVE-2017-3526 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1034849">SUSE bug 1034849</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822972" comment="java-1.7.0-openjdk-1.7.0.141-2.6.10.1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822973" comment="java-1.7.0-openjdk-accessibility-1.7.0.141-2.6.10.1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822974" comment="java-1.7.0-openjdk-demo-1.7.0.141-2.6.10.1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822975" comment="java-1.7.0-openjdk-devel-1.7.0.141-2.6.10.1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822976" comment="java-1.7.0-openjdk-headless-1.7.0.141-2.6.10.1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822977" comment="java-1.7.0-openjdk-javadoc-1.7.0.141-2.6.10.1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822978" comment="java-1.7.0-openjdk-src-1.7.0.141-2.6.10.1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822955" comment="java-1.8.0-openjdk-1.8.0.131-2.b11.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822956" comment="java-1.8.0-openjdk-accessibility-1.8.0.131-2.b11.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822957" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.131-2.b11.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822958" comment="java-1.8.0-openjdk-debug-1.8.0.131-2.b11.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822959" comment="java-1.8.0-openjdk-demo-1.8.0.131-2.b11.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822960" comment="java-1.8.0-openjdk-demo-debug-1.8.0.131-2.b11.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822961" comment="java-1.8.0-openjdk-devel-1.8.0.131-2.b11.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822962" comment="java-1.8.0-openjdk-devel-debug-1.8.0.131-2.b11.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822963" comment="java-1.8.0-openjdk-headless-1.8.0.131-2.b11.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822964" comment="java-1.8.0-openjdk-headless-debug-1.8.0.131-2.b11.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822965" comment="java-1.8.0-openjdk-javadoc-1.8.0.131-2.b11.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822966" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.131-2.b11.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822967" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.131-2.b11.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822968" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.131-2.b11.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822969" comment="java-1.8.0-openjdk-src-1.8.0.131-2.b11.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822970" comment="java-1.8.0-openjdk-src-debug-1.8.0.131-2.b11.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173533" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3533</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3533" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3533" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3533" ref_url="https://www.suse.com/security/cve/CVE-2017-3533" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1400-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1445-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002928.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1429-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HFM22GVFR6J3ZBDLMDODA72UFLWFLIOI/#HFM22GVFR6J3ZBDLMDODA72UFLWFLIOI" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1507-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U35H3NDHZFD3PZ72ZDJYGQLRD3OST4AJ/#U35H3NDHZFD3PZ72ZDJYGQLRD3OST4AJ" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u141, 7u131 and 8u121; Java SE Embedded: 8u121; JRockit: R28.3.13. Difficult to exploit vulnerability allows unauthenticated attacker with network access via FTP to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded, JRockit accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3533/">CVE-2017-3533 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3533">CVE-2017-3533 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1034849">SUSE bug 1034849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038505">SUSE bug 1038505</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822972" comment="java-1.7.0-openjdk-1.7.0.141-2.6.10.1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822973" comment="java-1.7.0-openjdk-accessibility-1.7.0.141-2.6.10.1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822974" comment="java-1.7.0-openjdk-demo-1.7.0.141-2.6.10.1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822975" comment="java-1.7.0-openjdk-devel-1.7.0.141-2.6.10.1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822976" comment="java-1.7.0-openjdk-headless-1.7.0.141-2.6.10.1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822977" comment="java-1.7.0-openjdk-javadoc-1.7.0.141-2.6.10.1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822978" comment="java-1.7.0-openjdk-src-1.7.0.141-2.6.10.1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822955" comment="java-1.8.0-openjdk-1.8.0.131-2.b11.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822956" comment="java-1.8.0-openjdk-accessibility-1.8.0.131-2.b11.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822957" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.131-2.b11.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822958" comment="java-1.8.0-openjdk-debug-1.8.0.131-2.b11.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822959" comment="java-1.8.0-openjdk-demo-1.8.0.131-2.b11.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822960" comment="java-1.8.0-openjdk-demo-debug-1.8.0.131-2.b11.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822961" comment="java-1.8.0-openjdk-devel-1.8.0.131-2.b11.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822962" comment="java-1.8.0-openjdk-devel-debug-1.8.0.131-2.b11.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822963" comment="java-1.8.0-openjdk-headless-1.8.0.131-2.b11.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822964" comment="java-1.8.0-openjdk-headless-debug-1.8.0.131-2.b11.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822965" comment="java-1.8.0-openjdk-javadoc-1.8.0.131-2.b11.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822966" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.131-2.b11.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822967" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.131-2.b11.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822968" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.131-2.b11.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822969" comment="java-1.8.0-openjdk-src-1.8.0.131-2.b11.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822970" comment="java-1.8.0-openjdk-src-debug-1.8.0.131-2.b11.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173539" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3539</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3539" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3539" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3539" ref_url="https://www.suse.com/security/cve/CVE-2017-3539" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1400-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1445-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002928.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1429-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HFM22GVFR6J3ZBDLMDODA72UFLWFLIOI/#HFM22GVFR6J3ZBDLMDODA72UFLWFLIOI" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1507-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U35H3NDHZFD3PZ72ZDJYGQLRD3OST4AJ/#U35H3NDHZFD3PZ72ZDJYGQLRD3OST4AJ" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u141, 7u131 and 8u121; Java SE Embedded: 8u121. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-02-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3539/">CVE-2017-3539 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3539">CVE-2017-3539 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1005522">SUSE bug 1005522</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034849">SUSE bug 1034849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038505">SUSE bug 1038505</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822972" comment="java-1.7.0-openjdk-1.7.0.141-2.6.10.1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822973" comment="java-1.7.0-openjdk-accessibility-1.7.0.141-2.6.10.1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822974" comment="java-1.7.0-openjdk-demo-1.7.0.141-2.6.10.1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822975" comment="java-1.7.0-openjdk-devel-1.7.0.141-2.6.10.1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822976" comment="java-1.7.0-openjdk-headless-1.7.0.141-2.6.10.1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822977" comment="java-1.7.0-openjdk-javadoc-1.7.0.141-2.6.10.1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822978" comment="java-1.7.0-openjdk-src-1.7.0.141-2.6.10.1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822955" comment="java-1.8.0-openjdk-1.8.0.131-2.b11.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822956" comment="java-1.8.0-openjdk-accessibility-1.8.0.131-2.b11.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822957" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.131-2.b11.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822958" comment="java-1.8.0-openjdk-debug-1.8.0.131-2.b11.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822959" comment="java-1.8.0-openjdk-demo-1.8.0.131-2.b11.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822960" comment="java-1.8.0-openjdk-demo-debug-1.8.0.131-2.b11.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822961" comment="java-1.8.0-openjdk-devel-1.8.0.131-2.b11.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822962" comment="java-1.8.0-openjdk-devel-debug-1.8.0.131-2.b11.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822963" comment="java-1.8.0-openjdk-headless-1.8.0.131-2.b11.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822964" comment="java-1.8.0-openjdk-headless-debug-1.8.0.131-2.b11.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822965" comment="java-1.8.0-openjdk-javadoc-1.8.0.131-2.b11.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822966" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.131-2.b11.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822967" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.131-2.b11.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822968" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.131-2.b11.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822969" comment="java-1.8.0-openjdk-src-1.8.0.131-2.b11.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822970" comment="java-1.8.0-openjdk-src-debug-1.8.0.131-2.b11.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173544" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3544</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3544" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3544" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3544" ref_url="https://www.suse.com/security/cve/CVE-2017-3544" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1400-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1445-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002928.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1429-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HFM22GVFR6J3ZBDLMDODA72UFLWFLIOI/#HFM22GVFR6J3ZBDLMDODA72UFLWFLIOI" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1507-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U35H3NDHZFD3PZ72ZDJYGQLRD3OST4AJ/#U35H3NDHZFD3PZ72ZDJYGQLRD3OST4AJ" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u141, 7u131 and 8u121; Java SE Embedded: 8u121; JRockit: R28.3.13. Difficult to exploit vulnerability allows unauthenticated attacker with network access via SMTP to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded, JRockit accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3544/">CVE-2017-3544 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3544">CVE-2017-3544 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1034849">SUSE bug 1034849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038505">SUSE bug 1038505</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822972" comment="java-1.7.0-openjdk-1.7.0.141-2.6.10.1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822973" comment="java-1.7.0-openjdk-accessibility-1.7.0.141-2.6.10.1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822974" comment="java-1.7.0-openjdk-demo-1.7.0.141-2.6.10.1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822975" comment="java-1.7.0-openjdk-devel-1.7.0.141-2.6.10.1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822976" comment="java-1.7.0-openjdk-headless-1.7.0.141-2.6.10.1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822977" comment="java-1.7.0-openjdk-javadoc-1.7.0.141-2.6.10.1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822978" comment="java-1.7.0-openjdk-src-1.7.0.141-2.6.10.1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822955" comment="java-1.8.0-openjdk-1.8.0.131-2.b11.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822956" comment="java-1.8.0-openjdk-accessibility-1.8.0.131-2.b11.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822957" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.131-2.b11.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822958" comment="java-1.8.0-openjdk-debug-1.8.0.131-2.b11.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822959" comment="java-1.8.0-openjdk-demo-1.8.0.131-2.b11.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822960" comment="java-1.8.0-openjdk-demo-debug-1.8.0.131-2.b11.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822961" comment="java-1.8.0-openjdk-devel-1.8.0.131-2.b11.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822962" comment="java-1.8.0-openjdk-devel-debug-1.8.0.131-2.b11.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822963" comment="java-1.8.0-openjdk-headless-1.8.0.131-2.b11.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822964" comment="java-1.8.0-openjdk-headless-debug-1.8.0.131-2.b11.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822965" comment="java-1.8.0-openjdk-javadoc-1.8.0.131-2.b11.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822966" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.131-2.b11.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822967" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.131-2.b11.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822968" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.131-2.b11.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822969" comment="java-1.8.0-openjdk-src-1.8.0.131-2.b11.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822970" comment="java-1.8.0-openjdk-src-debug-1.8.0.131-2.b11.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173600" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3600</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3600" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3600" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3600" ref_url="https://www.suse.com/security/cve/CVE-2017-3600" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002833.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1209-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4MXHGL63TEX2VH3HM5WVIJGPF526Z4P5/#4MXHGL63TEX2VH3HM5WVIJGPF526Z4P5" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client mysqldump). Supported versions that are affected are 5.5.54 and earlier, 5.6.35 and earlier and 5.7.17 and earlier. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in takeover of MySQL Server. Note: CVE-2017-3600 is equivalent to CVE-2016-5483. CVSS 3.0 Base Score 6.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-02-24"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3600/">CVE-2017-3600 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3600">CVE-2017-3600 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1029014">SUSE bug 1029014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034850">SUSE bug 1034850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048715">SUSE bug 1048715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823421" comment="mariadb-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823422" comment="mariadb-bench-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823423" comment="mariadb-devel-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823424" comment="mariadb-embedded-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823425" comment="mariadb-embedded-devel-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823426" comment="mariadb-libs-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823427" comment="mariadb-server-5.5.56-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823428" comment="mariadb-test-5.5.56-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173636" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3636</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3636" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3636" ref_url="https://www.suse.com/security/cve/CVE-2017-3636" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003596.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004235.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client programs). Supported versions that are affected are 5.5.56 and earlier and 5.6.36 and earlier. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data as well as unauthorized read access to a subset of MySQL Server accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.0 Base Score 5.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-3636/">CVE-2017-3636 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3636">CVE-2017-3636 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1049399">SUSE bug 1049399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049422">SUSE bug 1049422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054591">SUSE bug 1054591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076506">SUSE bug 1076506</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824516" comment="mariadb-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824517" comment="mariadb-bench-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824518" comment="mariadb-devel-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824519" comment="mariadb-embedded-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824520" comment="mariadb-embedded-devel-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824521" comment="mariadb-libs-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824522" comment="mariadb-server-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824523" comment="mariadb-test-5.5.60-1.el7_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173641" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3641</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3641" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3641" ref_url="https://www.suse.com/security/cve/CVE-2017-3641" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003596.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004235.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DML). Supported versions that are affected are 5.5.56 and earlier, 5.6.36 and earlier and 5.7.18 and earlier. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3641/">CVE-2017-3641 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3641">CVE-2017-3641 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1049404">SUSE bug 1049404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049422">SUSE bug 1049422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054591">SUSE bug 1054591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076506">SUSE bug 1076506</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824516" comment="mariadb-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824517" comment="mariadb-bench-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824518" comment="mariadb-devel-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824519" comment="mariadb-embedded-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824520" comment="mariadb-embedded-devel-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824521" comment="mariadb-libs-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824522" comment="mariadb-server-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824523" comment="mariadb-test-5.5.60-1.el7_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173651" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3651</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3651" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3651" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3651" ref_url="https://www.suse.com/security/cve/CVE-2017-3651" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003166.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client mysqldump). Supported versions that are affected are 5.5.56 and earlier, 5.6.36 and earlier and 5.7.18 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-3651/">CVE-2017-3651 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3651">CVE-2017-3651 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1049415">SUSE bug 1049415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049422">SUSE bug 1049422</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824516" comment="mariadb-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824517" comment="mariadb-bench-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824518" comment="mariadb-devel-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824519" comment="mariadb-embedded-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824520" comment="mariadb-embedded-devel-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824521" comment="mariadb-libs-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824522" comment="mariadb-server-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824523" comment="mariadb-test-5.5.60-1.el7_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173653" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3653</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3653" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3653" ref_url="https://www.suse.com/security/cve/CVE-2017-3653" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003596.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004235.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.56 and earlier, 5.6.36 and earlier and 5.7.18 and earlier. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-3653/">CVE-2017-3653 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3653">CVE-2017-3653 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1049417">SUSE bug 1049417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049422">SUSE bug 1049422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054591">SUSE bug 1054591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076506">SUSE bug 1076506</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824516" comment="mariadb-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824517" comment="mariadb-bench-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824518" comment="mariadb-devel-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824519" comment="mariadb-embedded-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824520" comment="mariadb-embedded-devel-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824521" comment="mariadb-libs-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824522" comment="mariadb-server-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824523" comment="mariadb-test-5.5.60-1.el7_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173731" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3731</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3731" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3731" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3731" ref_url="https://www.suse.com/security/cve/CVE-2017-3731" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002642.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003599.html" source="SUSE-SU"/>
		<reference ref_id="TID7016794" ref_url="https://www.suse.com/support/kb/doc/?id=7016794" source="SUSE-SU"/>
		<reference ref_id="TID7021518" ref_url="https://www.suse.com/support/kb/doc/?id=7021518" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2868-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Z7DVWELHOI3HIW2TCX7MRYG6JIMYW4R2/#Z7DVWELHOI3HIW2TCX7MRYG6JIMYW4R2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0458-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FBYBD5ZUSPVBWEEIVTKA25Q5QWELRG65/#FBYBD5ZUSPVBWEEIVTKA25Q5QWELRG65" source="SUSE-SU"/>
    <description>
    If an SSL/TLS server or client is running on a 32-bit host, and a specific cipher is being used, then a truncated packet can cause that server or client to perform an out-of-bounds read, usually resulting in a crash. For OpenSSL 1.1.0, the crash can be triggered when using CHACHA20/POLY1305; users should upgrade to 1.1.0d. For Openssl 1.0.2, the crash can be triggered when using RC4-MD5; users who have not disabled that algorithm should update to 1.0.2k.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-12-19"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3731/">CVE-2017-3731 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3731">CVE-2017-3731 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1021641">SUSE bug 1021641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022085">SUSE bug 1022085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064118">SUSE bug 1064118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064119">SUSE bug 1064119</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822835" comment="openssl-1.0.1e-60.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822836" comment="openssl-devel-1.0.1e-60.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822837" comment="openssl-libs-1.0.1e-60.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822838" comment="openssl-perl-1.0.1e-60.el7_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822839" comment="openssl-static-1.0.1e-60.el7_3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173735" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3735</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3735" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3735" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3735" ref_url="https://www.suse.com/security/cve/CVE-2017-3735" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2968-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2981-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003391.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003558.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="TID7022367" ref_url="https://www.suse.com/support/kb/doc/?id=7022367" source="SUSE-SU"/>
    <description>
    While parsing an IPAddressFamily extension in an X.509 certificate, it is possible to do a one-byte overread. This would result in an incorrect text display of the certificate. This bug has been present since 2006 and is present in all versions of OpenSSL before 1.0.2m and 1.1.0g.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-10-13"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-3735/">CVE-2017-3735 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3735">CVE-2017-3735 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1056058">SUSE bug 1056058</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825305" comment="openssl-1.0.2k-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825306" comment="openssl-devel-1.0.2k-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825307" comment="openssl-libs-1.0.2k-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825308" comment="openssl-perl-1.0.2k-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825309" comment="openssl-static-1.0.2k-16.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173736" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3736</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3736" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3736" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3736" ref_url="https://www.suse.com/security/cve/CVE-2017-3736" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003558.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2839-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="TID7016794" ref_url="https://www.suse.com/support/kb/doc/?id=7016794" source="SUSE-SU"/>
		<reference ref_id="TID7022367" ref_url="https://www.suse.com/support/kb/doc/?id=7022367" source="SUSE-SU"/>
    <description>
    There is a carry propagating bug in the x86_64 Montgomery squaring procedure in OpenSSL before 1.0.2m and 1.1.0 before 1.1.0g. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH are considered just feasible (although very difficult) because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be very significant and likely only accessible to a limited number of attackers. An attacker would additionally need online access to an unpatched system using the target private key in a scenario with persistent DH parameters and a private key that is shared between multiple clients. This only affects processors that support the BMI1, BMI2 and ADX extensions like Intel Broadwell (5th generation) and later or AMD Ryzen.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-3736/">CVE-2017-3736 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3736">CVE-2017-3736 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1066242">SUSE bug 1066242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071906">SUSE bug 1071906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076369">SUSE bug 1076369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957814">SUSE bug 957814</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824153" comment="openssl-1.0.2k-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824154" comment="openssl-devel-1.0.2k-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824155" comment="openssl-libs-1.0.2k-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824156" comment="openssl-perl-1.0.2k-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824157" comment="openssl-static-1.0.2k-12.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173737" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3737</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3737" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3737" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3737" ref_url="https://www.suse.com/security/cve/CVE-2017-3737" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003580.html" source="SUSE-SU"/>
		<reference ref_id="TID7022464" ref_url="https://www.suse.com/support/kb/doc/?id=7022464" source="SUSE-SU"/>
		<reference ref_id="TID7022626" ref_url="https://www.suse.com/support/kb/doc/?id=7022626" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3345-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CNPINS5VCZAZPCBVAYYEBEHQT2KH26D4/#CNPINS5VCZAZPCBVAYYEBEHQT2KH26D4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0223-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N63QDAZ62SQMYAFGJFRXU5HS26COSGB4/#N63QDAZ62SQMYAFGJFRXU5HS26COSGB4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1057-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MLFP43VCYBFTSZUBC5JVSDITYRWTNN5C/#MLFP43VCYBFTSZUBC5JVSDITYRWTNN5C" source="SUSE-SU"/>
    <description>
    OpenSSL 1.0.2 (starting from version 1.0.2b) introduced an "error state" mechanism. The intent was that if a fatal error occurred during a handshake then OpenSSL would move into the error state and would immediately fail if you attempted to continue the handshake. This works as designed for the explicit handshake functions (SSL_do_handshake(), SSL_accept() and SSL_connect()), however due to a bug it does not work correctly if SSL_read() or SSL_write() is called directly. In that scenario, if the handshake fails then a fatal error will be returned in the initial function call. If SSL_read()/SSL_write() is subsequently called by the application for the same SSL object then it will succeed and the data is passed without being decrypted/encrypted directly from the SSL/TLS record layer. In order to exploit this issue an application bug would have to be present that resulted in a call to SSL_read()/SSL_write() being issued after having already received a fatal error. OpenSSL version 1.0.2b-1.0.2m are affected. Fixed in OpenSSL 1.0.2n. OpenSSL 1.1.0 is not affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-3737/">CVE-2017-3737 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3737">CVE-2017-3737 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1071905">SUSE bug 1071905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072322">SUSE bug 1072322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076369">SUSE bug 1076369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089987">SUSE bug 1089987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089997">SUSE bug 1089997</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824153" comment="openssl-1.0.2k-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824154" comment="openssl-devel-1.0.2k-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824155" comment="openssl-libs-1.0.2k-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824156" comment="openssl-perl-1.0.2k-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824157" comment="openssl-static-1.0.2k-12.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173738" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3738</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3738" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3738" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3738" ref_url="https://www.suse.com/security/cve/CVE-2017-3738" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003558.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="TID7022464" ref_url="https://www.suse.com/support/kb/doc/?id=7022464" source="SUSE-SU"/>
		<reference ref_id="TID7022627" ref_url="https://www.suse.com/support/kb/doc/?id=7022627" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3345-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CNPINS5VCZAZPCBVAYYEBEHQT2KH26D4/#CNPINS5VCZAZPCBVAYYEBEHQT2KH26D4" source="SUSE-SU"/>
    <description>
    There is an overflow bug in the AVX2 Montgomery multiplication procedure used in exponentiation with 1024-bit moduli. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH1024 are considered just feasible, because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be significant. However, for an attack on TLS to be meaningful, the server would have to share the DH1024 private key among multiple clients, which is no longer an option since CVE-2016-0701. This only affects processors that support the AVX2 but not ADX extensions like Intel Haswell (4th generation). Note: The impact from this issue is similar to CVE-2017-3736, CVE-2017-3732 and CVE-2015-3193. OpenSSL version 1.0.2-1.0.2m and 1.1.0-1.1.0g are affected. Fixed in OpenSSL 1.0.2n. Due to the low severity of this issue we are not issuing a new release of OpenSSL 1.1.0 at this time. The fix will be included in OpenSSL 1.1.0h when it becomes available. The fix is also available in commit e502cc86d in the OpenSSL git repository.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-3738/">CVE-2017-3738 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3738">CVE-2017-3738 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1071906">SUSE bug 1071906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097757">SUSE bug 1097757</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824153" comment="openssl-1.0.2k-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824154" comment="openssl-devel-1.0.2k-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824155" comment="openssl-libs-1.0.2k-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824156" comment="openssl-perl-1.0.2k-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824157" comment="openssl-static-1.0.2k-12.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175202" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5202</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5202" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5202" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5202" ref_url="https://www.suse.com/security/cve/CVE-2017-5202" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
    <description>
    The ISO CLNS parser in tcpdump before 4.9.0 has a buffer overflow in print-isoclns.c:clnp_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5202/">CVE-2017-5202 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5202">CVE-2017-5202 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823301" comment="tcpdump-4.9.0-5.el7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175203" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5203</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5203" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5203" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5203" ref_url="https://www.suse.com/security/cve/CVE-2017-5203" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
    <description>
    The BOOTP parser in tcpdump before 4.9.0 has a buffer overflow in print-bootp.c:bootp_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5203/">CVE-2017-5203 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5203">CVE-2017-5203 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823301" comment="tcpdump-4.9.0-5.el7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175204" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5204</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5204" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5204" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5204" ref_url="https://www.suse.com/security/cve/CVE-2017-5204" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
    <description>
    The IPv6 parser in tcpdump before 4.9.0 has a buffer overflow in print-ip6.c:ip6_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5204/">CVE-2017-5204 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5204">CVE-2017-5204 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823301" comment="tcpdump-4.9.0-5.el7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175205" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5205</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5205" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5205" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5205" ref_url="https://www.suse.com/security/cve/CVE-2017-5205" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
    <description>
    The ISAKMP parser in tcpdump before 4.9.0 has a buffer overflow in print-isakmp.c:ikev2_e_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5205/">CVE-2017-5205 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5205">CVE-2017-5205 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823301" comment="tcpdump-4.9.0-5.el7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175208" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5208</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5208" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5208" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5208" ref_url="https://www.suse.com/security/cve/CVE-2017-5208" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2017:0166-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/43AV7TVWE5TEAZEF4VL2OPAKI3B564TM/#43AV7TVWE5TEAZEF4VL2OPAKI3B564TM" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0167-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q6W3JC3NP3PVXZUS3QQRSICYSQDVNGJC/#Q6W3JC3NP3PVXZUS3QQRSICYSQDVNGJC" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0168-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ESIGLL537OOY4OV5U3JI43MQUW3SWD5C/#ESIGLL537OOY4OV5U3JI43MQUW3SWD5C" source="SUSE-SU"/>
    <description>
    Integer overflow in the wrestool program in icoutils before 0.31.1 allows remote attackers to cause a denial of service (memory corruption) via a crafted executable, which triggers a denial of service (application crash) or the possibility of execution of arbitrary code.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5208/">CVE-2017-5208 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5208">CVE-2017-5208 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1018756">SUSE bug 1018756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019328">SUSE bug 1019328</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822883" comment="icoutils-0.31.3-1.el7_3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175332" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5332</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5332" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5332" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5332" ref_url="https://www.suse.com/security/cve/CVE-2017-5332" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2017:0166-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/43AV7TVWE5TEAZEF4VL2OPAKI3B564TM/#43AV7TVWE5TEAZEF4VL2OPAKI3B564TM" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0167-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q6W3JC3NP3PVXZUS3QQRSICYSQDVNGJC/#Q6W3JC3NP3PVXZUS3QQRSICYSQDVNGJC" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0168-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ESIGLL537OOY4OV5U3JI43MQUW3SWD5C/#ESIGLL537OOY4OV5U3JI43MQUW3SWD5C" source="SUSE-SU"/>
    <description>
    The extract_group_icon_cursor_resource in wrestool/extract.c in icoutils before 0.31.1 can access unallocated memory, which allows local users to cause a denial of service (process crash) and execute arbitrary code via a crafted executable.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5332/">CVE-2017-5332 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5332">CVE-2017-5332 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1018756">SUSE bug 1018756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019328">SUSE bug 1019328</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822883" comment="icoutils-0.31.3-1.el7_3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175333" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5333</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5333" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5333" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5333" ref_url="https://www.suse.com/security/cve/CVE-2017-5333" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2017:0166-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/43AV7TVWE5TEAZEF4VL2OPAKI3B564TM/#43AV7TVWE5TEAZEF4VL2OPAKI3B564TM" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0167-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q6W3JC3NP3PVXZUS3QQRSICYSQDVNGJC/#Q6W3JC3NP3PVXZUS3QQRSICYSQDVNGJC" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0168-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ESIGLL537OOY4OV5U3JI43MQUW3SWD5C/#ESIGLL537OOY4OV5U3JI43MQUW3SWD5C" source="SUSE-SU"/>
    <description>
    Integer overflow in the extract_group_icon_cursor_resource function in b/wrestool/extract.c in icoutils before 0.31.1 allows local users to cause a denial of service (process crash) or execute arbitrary code via a crafted executable file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5333/">CVE-2017-5333 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5333">CVE-2017-5333 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1018756">SUSE bug 1018756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019328">SUSE bug 1019328</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822883" comment="icoutils-0.31.3-1.el7_3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175334" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5334</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5334" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5334" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5334" ref_url="https://www.suse.com/security/cve/CVE-2017-5334" source="SUSE CVE"/>
    <description>
    Double free vulnerability in the gnutls_x509_ext_import_proxy function in GnuTLS before 3.3.26 and 3.5.x before 3.5.8 allows remote attackers to have unspecified impact via crafted policy language information in an X.509 certificate with a Proxy Certificate Information extension.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5334/">CVE-2017-5334 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5334">CVE-2017-5334 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1018831">SUSE bug 1018831</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823451" comment="gnutls-3.3.26-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823452" comment="gnutls-c++-3.3.26-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823453" comment="gnutls-dane-3.3.26-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823454" comment="gnutls-devel-3.3.26-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823455" comment="gnutls-utils-3.3.26-9.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175335" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5335</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5335" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5335" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5335" ref_url="https://www.suse.com/security/cve/CVE-2017-5335" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0304-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002614.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0386-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NEVLKMTWKZHIHXYGCHNEYH5ECARK6UQS/#NEVLKMTWKZHIHXYGCHNEYH5ECARK6UQS" source="SUSE-SU"/>
    <description>
    The stream reading functions in lib/opencdk/read-packet.c in GnuTLS before 3.3.26 and 3.5.x before 3.5.8 allow remote attackers to cause a denial of service (out-of-memory error and crash) via a crafted OpenPGP certificate.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5335/">CVE-2017-5335 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5335">CVE-2017-5335 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1018832">SUSE bug 1018832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021057">SUSE bug 1021057</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823451" comment="gnutls-3.3.26-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823452" comment="gnutls-c++-3.3.26-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823453" comment="gnutls-dane-3.3.26-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823454" comment="gnutls-devel-3.3.26-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823455" comment="gnutls-utils-3.3.26-9.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175336" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5336</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5336" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5336" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5336" ref_url="https://www.suse.com/security/cve/CVE-2017-5336" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0304-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002614.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0386-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NEVLKMTWKZHIHXYGCHNEYH5ECARK6UQS/#NEVLKMTWKZHIHXYGCHNEYH5ECARK6UQS" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the cdk_pk_get_keyid function in lib/opencdk/pubkey.c in GnuTLS before 3.3.26 and 3.5.x before 3.5.8 allows remote attackers to have unspecified impact via a crafted OpenPGP certificate.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5336/">CVE-2017-5336 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5336">CVE-2017-5336 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1018832">SUSE bug 1018832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021057">SUSE bug 1021057</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823451" comment="gnutls-3.3.26-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823452" comment="gnutls-c++-3.3.26-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823453" comment="gnutls-dane-3.3.26-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823454" comment="gnutls-devel-3.3.26-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823455" comment="gnutls-utils-3.3.26-9.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175337" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5337</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5337" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5337" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5337" ref_url="https://www.suse.com/security/cve/CVE-2017-5337" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0304-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002614.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0386-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NEVLKMTWKZHIHXYGCHNEYH5ECARK6UQS/#NEVLKMTWKZHIHXYGCHNEYH5ECARK6UQS" source="SUSE-SU"/>
    <description>
    Multiple heap-based buffer overflows in the read_attribute function in GnuTLS before 3.3.26 and 3.5.x before 3.5.8 allow remote attackers to have unspecified impact via a crafted OpenPGP certificate.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5337/">CVE-2017-5337 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5337">CVE-2017-5337 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1018832">SUSE bug 1018832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021057">SUSE bug 1021057</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823451" comment="gnutls-3.3.26-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823452" comment="gnutls-c++-3.3.26-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823453" comment="gnutls-dane-3.3.26-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823454" comment="gnutls-devel-3.3.26-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823455" comment="gnutls-utils-3.3.26-9.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175341" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5341</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5341" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5341" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5341" ref_url="https://www.suse.com/security/cve/CVE-2017-5341" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
    <description>
    The OTV parser in tcpdump before 4.9.0 has a buffer overflow in print-otv.c:otv_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5341/">CVE-2017-5341 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5341">CVE-2017-5341 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823301" comment="tcpdump-4.9.0-5.el7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175342" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5342</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5342" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5342" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5342" ref_url="https://www.suse.com/security/cve/CVE-2017-5342" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
    <description>
    In tcpdump before 4.9.0, a bug in multiple protocol parsers (Geneve, GRE, NSH, OTV, VXLAN and VXLAN GPE) could cause a buffer overflow in print-ether.c:ether_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5342/">CVE-2017-5342 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5342">CVE-2017-5342 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823301" comment="tcpdump-4.9.0-5.el7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175373" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5373</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5373" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5373" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5373" ref_url="https://www.suse.com/security/cve/CVE-2017-5373" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0427-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002633.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0358-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/I3L7XKNFX6M5HVPAVU56HJZIPPOL63YB/#I3L7XKNFX6M5HVPAVU56HJZIPPOL63YB" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Memory safety bugs were reported in Firefox 50.1 and Firefox ESR 45.6. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird &lt; 45.7, Firefox ESR &lt; 45.7, and Firefox &lt; 51.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5373/">CVE-2017-5373 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5373">CVE-2017-5373 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1021824">SUSE bug 1021824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021991">SUSE bug 1021991</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822801" comment="firefox-45.7.0-1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822806" comment="thunderbird-45.7.0-1.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175375" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5375</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5375" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5375" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5375" ref_url="https://www.suse.com/security/cve/CVE-2017-5375" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0427-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002633.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0358-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/I3L7XKNFX6M5HVPAVU56HJZIPPOL63YB/#I3L7XKNFX6M5HVPAVU56HJZIPPOL63YB" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    JIT code allocation can allow for a bypass of ASLR and DEP protections leading to potential memory corruption attacks. This vulnerability affects Thunderbird &lt; 45.7, Firefox ESR &lt; 45.7, and Firefox &lt; 51.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5375/">CVE-2017-5375 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5375">CVE-2017-5375 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1021814">SUSE bug 1021814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021991">SUSE bug 1021991</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822801" comment="firefox-45.7.0-1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822806" comment="thunderbird-45.7.0-1.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175376" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5376</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5376" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5376" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5376" ref_url="https://www.suse.com/security/cve/CVE-2017-5376" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0427-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002633.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0358-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/I3L7XKNFX6M5HVPAVU56HJZIPPOL63YB/#I3L7XKNFX6M5HVPAVU56HJZIPPOL63YB" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Use-after-free while manipulating XSL in XSLT documents. This vulnerability affects Thunderbird &lt; 45.7, Firefox ESR &lt; 45.7, and Firefox &lt; 51.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5376/">CVE-2017-5376 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5376">CVE-2017-5376 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1021817">SUSE bug 1021817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021991">SUSE bug 1021991</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822801" comment="firefox-45.7.0-1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822806" comment="thunderbird-45.7.0-1.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175378" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5378</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5378" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5378" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5378" ref_url="https://www.suse.com/security/cve/CVE-2017-5378" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0427-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002633.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0358-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/I3L7XKNFX6M5HVPAVU56HJZIPPOL63YB/#I3L7XKNFX6M5HVPAVU56HJZIPPOL63YB" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Hashed codes of JavaScript objects are shared between pages. This allows for pointer leaks because an object's address can be discovered through hash codes, and also allows for data leakage of an object's content using these hash codes. This vulnerability affects Thunderbird &lt; 45.7, Firefox ESR &lt; 45.7, and Firefox &lt; 51.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5378/">CVE-2017-5378 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5378">CVE-2017-5378 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1021818">SUSE bug 1021818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021991">SUSE bug 1021991</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822801" comment="firefox-45.7.0-1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822806" comment="thunderbird-45.7.0-1.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175380" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5380</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5380" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5380" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5380" ref_url="https://www.suse.com/security/cve/CVE-2017-5380" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0427-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002633.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0358-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/I3L7XKNFX6M5HVPAVU56HJZIPPOL63YB/#I3L7XKNFX6M5HVPAVU56HJZIPPOL63YB" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A potential use-after-free found through fuzzing during DOM manipulation of SVG content. This vulnerability affects Thunderbird &lt; 45.7, Firefox ESR &lt; 45.7, and Firefox &lt; 51.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5380/">CVE-2017-5380 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5380">CVE-2017-5380 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1021819">SUSE bug 1021819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021991">SUSE bug 1021991</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822801" comment="firefox-45.7.0-1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822806" comment="thunderbird-45.7.0-1.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175383" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5383</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5383" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5383" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5383" ref_url="https://www.suse.com/security/cve/CVE-2017-5383" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0427-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002633.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0358-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/I3L7XKNFX6M5HVPAVU56HJZIPPOL63YB/#I3L7XKNFX6M5HVPAVU56HJZIPPOL63YB" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    URLs containing certain unicode glyphs for alternative hyphens and quotes do not properly trigger punycode display, allowing for domain name spoofing attacks in the location bar. This vulnerability affects Thunderbird &lt; 45.7, Firefox ESR &lt; 45.7, and Firefox &lt; 51.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5383/">CVE-2017-5383 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5383">CVE-2017-5383 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1021822">SUSE bug 1021822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021991">SUSE bug 1021991</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822801" comment="firefox-45.7.0-1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822806" comment="thunderbird-45.7.0-1.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175386" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5386</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5386" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5386" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5386" ref_url="https://www.suse.com/security/cve/CVE-2017-5386" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0427-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002633.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0358-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/I3L7XKNFX6M5HVPAVU56HJZIPPOL63YB/#I3L7XKNFX6M5HVPAVU56HJZIPPOL63YB" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    WebExtension scripts can use the "data:" protocol to affect pages loaded by other web extensions using this protocol, leading to potential data disclosure or privilege escalation in affected extensions. This vulnerability affects Firefox ESR &lt; 45.7 and Firefox &lt; 51.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-11-28"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5386/">CVE-2017-5386 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5386">CVE-2017-5386 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1021823">SUSE bug 1021823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021991">SUSE bug 1021991</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822801" comment="firefox-45.7.0-1.el7_3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175390" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5390</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5390" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5390" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5390" ref_url="https://www.suse.com/security/cve/CVE-2017-5390" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0427-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002633.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0358-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/I3L7XKNFX6M5HVPAVU56HJZIPPOL63YB/#I3L7XKNFX6M5HVPAVU56HJZIPPOL63YB" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    The JSON viewer in the Developer Tools uses insecure methods to create a communication channel for copying and viewing JSON or HTTP headers data, allowing for potential privilege escalation. This vulnerability affects Thunderbird &lt; 45.7, Firefox ESR &lt; 45.7, and Firefox &lt; 51.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5390/">CVE-2017-5390 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5390">CVE-2017-5390 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1021820">SUSE bug 1021820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021991">SUSE bug 1021991</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822801" comment="firefox-45.7.0-1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822806" comment="thunderbird-45.7.0-1.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175396" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5396</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5396" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5396" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5396" ref_url="https://www.suse.com/security/cve/CVE-2017-5396" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0427-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002633.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0358-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/I3L7XKNFX6M5HVPAVU56HJZIPPOL63YB/#I3L7XKNFX6M5HVPAVU56HJZIPPOL63YB" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability in the Media Decoder when working with media files when some events are fired after the media elements are freed from memory. This vulnerability affects Thunderbird &lt; 45.7, Firefox ESR &lt; 45.7, and Firefox &lt; 51.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5396/">CVE-2017-5396 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5396">CVE-2017-5396 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1021821">SUSE bug 1021821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021991">SUSE bug 1021991</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822801" comment="firefox-45.7.0-1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822806" comment="thunderbird-45.7.0-1.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175398" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5398</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5398" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5398" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5398" ref_url="https://www.suse.com/security/cve/CVE-2017-5398" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002712.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0690-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EPD5QH6OLZEJRT6C27GNQN64CCACII57/#EPD5QH6OLZEJRT6C27GNQN64CCACII57" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Memory safety bugs were reported in Thunderbird 45.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox &lt; 52, Firefox ESR &lt; 45.8, Thunderbird &lt; 52, and Thunderbird &lt; 45.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5398/">CVE-2017-5398 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5398">CVE-2017-5398 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1028391">SUSE bug 1028391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028393">SUSE bug 1028393</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822880" comment="firefox-52.0-4.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822881" comment="thunderbird-45.8.0-1.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175400" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5400</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5400" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5400" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5400" ref_url="https://www.suse.com/security/cve/CVE-2017-5400" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002712.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0690-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EPD5QH6OLZEJRT6C27GNQN64CCACII57/#EPD5QH6OLZEJRT6C27GNQN64CCACII57" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    JIT-spray targeting asm.js combined with a heap spray allows for a bypass of ASLR and DEP protections leading to potential memory corruption attacks. This vulnerability affects Firefox &lt; 52, Firefox ESR &lt; 45.8, Thunderbird &lt; 52, and Thunderbird &lt; 45.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5400/">CVE-2017-5400 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5400">CVE-2017-5400 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1028391">SUSE bug 1028391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028393">SUSE bug 1028393</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822880" comment="firefox-52.0-4.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822881" comment="thunderbird-45.8.0-1.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175401" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5401</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5401" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5401" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5401" ref_url="https://www.suse.com/security/cve/CVE-2017-5401" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002712.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0690-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EPD5QH6OLZEJRT6C27GNQN64CCACII57/#EPD5QH6OLZEJRT6C27GNQN64CCACII57" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A crash triggerable by web content in which an "ErrorResult" references unassigned memory due to a logic error. The resulting crash may be exploitable. This vulnerability affects Firefox &lt; 52, Firefox ESR &lt; 45.8, Thunderbird &lt; 52, and Thunderbird &lt; 45.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5401/">CVE-2017-5401 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5401">CVE-2017-5401 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1028391">SUSE bug 1028391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028393">SUSE bug 1028393</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822880" comment="firefox-52.0-4.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822881" comment="thunderbird-45.8.0-1.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175402" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5402</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5402" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5402" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5402" ref_url="https://www.suse.com/security/cve/CVE-2017-5402" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002712.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0690-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EPD5QH6OLZEJRT6C27GNQN64CCACII57/#EPD5QH6OLZEJRT6C27GNQN64CCACII57" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A use-after-free can occur when events are fired for a "FontFace" object after the object has been already been destroyed while working with fonts. This results in a potentially exploitable crash. This vulnerability affects Firefox &lt; 52, Firefox ESR &lt; 45.8, Thunderbird &lt; 52, and Thunderbird &lt; 45.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5402/">CVE-2017-5402 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5402">CVE-2017-5402 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1028391">SUSE bug 1028391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028393">SUSE bug 1028393</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822880" comment="firefox-52.0-4.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822881" comment="thunderbird-45.8.0-1.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175404" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5404</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5404" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5404" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5404" ref_url="https://www.suse.com/security/cve/CVE-2017-5404" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002712.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0690-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EPD5QH6OLZEJRT6C27GNQN64CCACII57/#EPD5QH6OLZEJRT6C27GNQN64CCACII57" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A use-after-free error can occur when manipulating ranges in selections with one node inside a native anonymous tree and one node outside of it. This results in a potentially exploitable crash. This vulnerability affects Firefox &lt; 52, Firefox ESR &lt; 45.8, Thunderbird &lt; 52, and Thunderbird &lt; 45.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5404/">CVE-2017-5404 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5404">CVE-2017-5404 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1028391">SUSE bug 1028391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028393">SUSE bug 1028393</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822880" comment="firefox-52.0-4.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822881" comment="thunderbird-45.8.0-1.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175405" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5405</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5405" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5405" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5405" ref_url="https://www.suse.com/security/cve/CVE-2017-5405" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002712.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0690-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EPD5QH6OLZEJRT6C27GNQN64CCACII57/#EPD5QH6OLZEJRT6C27GNQN64CCACII57" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Certain response codes in FTP connections can result in the use of uninitialized values for ports in FTP operations. This vulnerability affects Firefox &lt; 52, Firefox ESR &lt; 45.8, Thunderbird &lt; 52, and Thunderbird &lt; 45.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5405/">CVE-2017-5405 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5405">CVE-2017-5405 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1028391">SUSE bug 1028391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028393">SUSE bug 1028393</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822880" comment="firefox-52.0-4.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822881" comment="thunderbird-45.8.0-1.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175407" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5407</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5407" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5407" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5407" ref_url="https://www.suse.com/security/cve/CVE-2017-5407" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002712.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0690-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EPD5QH6OLZEJRT6C27GNQN64CCACII57/#EPD5QH6OLZEJRT6C27GNQN64CCACII57" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Using SVG filters that don't use the fixed point math implementation on a target iframe, a malicious page can extract pixel values from a targeted user. This can be used to extract history information and read text values across domains. This violates same-origin policy and leads to information disclosure. This vulnerability affects Firefox &lt; 52, Firefox ESR &lt; 45.8, Thunderbird &lt; 52, and Thunderbird &lt; 45.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5407/">CVE-2017-5407 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5407">CVE-2017-5407 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1028391">SUSE bug 1028391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028393">SUSE bug 1028393</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822880" comment="firefox-52.0-4.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822881" comment="thunderbird-45.8.0-1.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175408" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5408</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5408" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5408" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5408" ref_url="https://www.suse.com/security/cve/CVE-2017-5408" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002712.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0690-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EPD5QH6OLZEJRT6C27GNQN64CCACII57/#EPD5QH6OLZEJRT6C27GNQN64CCACII57" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Video files loaded video captions cross-origin without checking for the presence of CORS headers permitting such cross-origin use, leading to potential information disclosure for video captions. This vulnerability affects Firefox &lt; 52, Firefox ESR &lt; 45.8, Thunderbird &lt; 52, and Thunderbird &lt; 45.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5408/">CVE-2017-5408 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5408">CVE-2017-5408 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1028391">SUSE bug 1028391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028393">SUSE bug 1028393</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822880" comment="firefox-52.0-4.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822881" comment="thunderbird-45.8.0-1.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175410" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5410</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5410" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5410" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5410" ref_url="https://www.suse.com/security/cve/CVE-2017-5410" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002712.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0690-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EPD5QH6OLZEJRT6C27GNQN64CCACII57/#EPD5QH6OLZEJRT6C27GNQN64CCACII57" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Memory corruption resulting in a potentially exploitable crash during garbage collection of JavaScript due errors in how incremental sweeping is managed for memory cleanup. This vulnerability affects Firefox &lt; 52, Firefox ESR &lt; 45.8, Thunderbird &lt; 52, and Thunderbird &lt; 45.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5410/">CVE-2017-5410 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5410">CVE-2017-5410 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1028391">SUSE bug 1028391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028393">SUSE bug 1028393</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822880" comment="firefox-52.0-4.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822881" comment="thunderbird-45.8.0-1.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175428" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5428</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5428" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5428" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5428" ref_url="https://www.suse.com/security/cve/CVE-2017-5428" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2017:0765-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/77LA5G5YK7B6CC53RUZPCBHXTDNCG7BL/#77LA5G5YK7B6CC53RUZPCBHXTDNCG7BL" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    An integer overflow in "createImageBitmap()" was reported through the Pwn2Own contest. The fix for this vulnerability disables the experimental extensions to the "createImageBitmap" API. This function runs in the content sandbox, requiring a second vulnerability to compromise a user's computer. This vulnerability affects Firefox ESR &lt; 52.0.1 and Firefox &lt; 52.0.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5428/">CVE-2017-5428 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5428">CVE-2017-5428 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1029822">SUSE bug 1029822</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822882" comment="firefox-52.0-5.el7_3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175429" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5429</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5429" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5429" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5429" ref_url="https://www.suse.com/security/cve/CVE-2017-5429" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003150.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1099-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GGQ6EK4LVSCHUUNN5IDFDRN7KIIDNXAI/#GGQ6EK4LVSCHUUNN5IDFDRN7KIIDNXAI" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Memory safety bugs were reported in Firefox 52, Firefox ESR 45.8, Firefox ESR 52, and Thunderbird 52. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 45.9, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5429/">CVE-2017-5429 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5429">CVE-2017-5429 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822954" comment="firefox-52.1.0-2.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822971" comment="thunderbird-52.1.0-1.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175430" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5430</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5430" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5430" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5430" ref_url="https://www.suse.com/security/cve/CVE-2017-5430" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003150.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Memory safety bugs were reported in Firefox 52, Firefox ESR 52, and Thunderbird 52. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5430/">CVE-2017-5430 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5430">CVE-2017-5430 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822954" comment="firefox-52.1.0-2.el7_3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175432" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5432</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5432" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5432" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5432" ref_url="https://www.suse.com/security/cve/CVE-2017-5432" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003150.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability occurs during certain text input selection resulting in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 45.9, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5432/">CVE-2017-5432 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5432">CVE-2017-5432 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822954" comment="firefox-52.1.0-2.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822971" comment="thunderbird-52.1.0-1.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175433" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5433</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5433" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5433" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5433" ref_url="https://www.suse.com/security/cve/CVE-2017-5433" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003150.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability in SMIL animation functions occurs when pointers to animation elements in an array are dropped from the animation controller while still in use. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 45.9, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5433/">CVE-2017-5433 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5433">CVE-2017-5433 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822954" comment="firefox-52.1.0-2.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822971" comment="thunderbird-52.1.0-1.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175434" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5434</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5434" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5434" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5434" ref_url="https://www.suse.com/security/cve/CVE-2017-5434" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003150.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability occurs when redirecting focus handling which results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 45.9, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5434/">CVE-2017-5434 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5434">CVE-2017-5434 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822954" comment="firefox-52.1.0-2.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822971" comment="thunderbird-52.1.0-1.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175435" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5435</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5435" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5435" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5435" ref_url="https://www.suse.com/security/cve/CVE-2017-5435" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003150.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability occurs during transaction processing in the editor during design mode interactions. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 45.9, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5435/">CVE-2017-5435 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5435">CVE-2017-5435 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822954" comment="firefox-52.1.0-2.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822971" comment="thunderbird-52.1.0-1.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175436" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5436</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5436" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5436" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5436" ref_url="https://www.suse.com/security/cve/CVE-2017-5436" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003150.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1273-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FAXP4GXQ7BQG2KR6KYJQQKZPWG5CWE4P/#FAXP4GXQ7BQG2KR6KYJQQKZPWG5CWE4P" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    An out-of-bounds write in the Graphite 2 library triggered with a maliciously crafted Graphite font. This results in a potentially exploitable crash. This issue was fixed in the Graphite 2 library as well as Mozilla products. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 45.9, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5436/">CVE-2017-5436 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5436">CVE-2017-5436 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035204">SUSE bug 1035204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822954" comment="firefox-52.1.0-2.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822971" comment="thunderbird-52.1.0-1.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175437" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5437</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5437" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5437" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5437" ref_url="https://www.suse.com/security/cve/CVE-2017-5437" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002858.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2016-10195, CVE-2016-10196, CVE-2016-10197.  Reason: This candidate is a duplicate of CVE-2016-10195, CVE-2016-10196, and CVE-2016-10197.  Notes: All CVE users should reference CVE-2016-10195, CVE-2016-10196, and/or CVE-2016-10197 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-09"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5437/">CVE-2017-5437 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2017-5437">CVE-2017-5437 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822954" comment="firefox-52.1.0-2.el7_3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175438" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5438</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5438" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5438" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5438" ref_url="https://www.suse.com/security/cve/CVE-2017-5438" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003150.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability during XSLT processing due to the result handler being held by a freed handler during handling. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 45.9, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5438/">CVE-2017-5438 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5438">CVE-2017-5438 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822954" comment="firefox-52.1.0-2.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822971" comment="thunderbird-52.1.0-1.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175439" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5439</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5439" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5439" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5439" ref_url="https://www.suse.com/security/cve/CVE-2017-5439" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003150.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability during XSLT processing due to poor handling of template parameters. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 45.9, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5439/">CVE-2017-5439 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5439">CVE-2017-5439 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822954" comment="firefox-52.1.0-2.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822971" comment="thunderbird-52.1.0-1.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175440" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5440</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5440" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5440" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5440" ref_url="https://www.suse.com/security/cve/CVE-2017-5440" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003150.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability during XSLT processing due to a failure to propagate error conditions during matching while evaluating context, leading to objects being used when they no longer exist. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 45.9, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5440/">CVE-2017-5440 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5440">CVE-2017-5440 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822954" comment="firefox-52.1.0-2.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822971" comment="thunderbird-52.1.0-1.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175441" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5441</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5441" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5441" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5441" ref_url="https://www.suse.com/security/cve/CVE-2017-5441" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003150.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability when holding a selection during scroll events. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 45.9, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5441/">CVE-2017-5441 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5441">CVE-2017-5441 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822954" comment="firefox-52.1.0-2.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822971" comment="thunderbird-52.1.0-1.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175442" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5442</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5442" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5442" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5442" ref_url="https://www.suse.com/security/cve/CVE-2017-5442" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003150.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability during changes in style when manipulating DOM elements. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 45.9, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5442/">CVE-2017-5442 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5442">CVE-2017-5442 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822954" comment="firefox-52.1.0-2.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822971" comment="thunderbird-52.1.0-1.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175443" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5443</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5443" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5443" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5443" ref_url="https://www.suse.com/security/cve/CVE-2017-5443" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003150.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1099-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GGQ6EK4LVSCHUUNN5IDFDRN7KIIDNXAI/#GGQ6EK4LVSCHUUNN5IDFDRN7KIIDNXAI" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    An out-of-bounds write vulnerability while decoding improperly formed BinHex format archives. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 45.9, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5443/">CVE-2017-5443 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5443">CVE-2017-5443 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822954" comment="firefox-52.1.0-2.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822971" comment="thunderbird-52.1.0-1.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175444" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5444</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5444" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5444" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5444" ref_url="https://www.suse.com/security/cve/CVE-2017-5444" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003150.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1099-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GGQ6EK4LVSCHUUNN5IDFDRN7KIIDNXAI/#GGQ6EK4LVSCHUUNN5IDFDRN7KIIDNXAI" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A buffer overflow vulnerability while parsing "application/http-index-format" format content when the header contains improperly formatted data. This allows for an out-of-bounds read of data from memory. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 45.9, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5444/">CVE-2017-5444 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5444">CVE-2017-5444 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822954" comment="firefox-52.1.0-2.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822971" comment="thunderbird-52.1.0-1.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175445" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5445</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5445" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5445" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5445" ref_url="https://www.suse.com/security/cve/CVE-2017-5445" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003150.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A vulnerability while parsing "application/http-index-format" format content where uninitialized values are used to create an array. This could allow the reading of uninitialized memory into the arrays affected. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 45.9, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5445/">CVE-2017-5445 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5445">CVE-2017-5445 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822954" comment="firefox-52.1.0-2.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822971" comment="thunderbird-52.1.0-1.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175446" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5446</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5446" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5446" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5446" ref_url="https://www.suse.com/security/cve/CVE-2017-5446" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003150.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1099-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GGQ6EK4LVSCHUUNN5IDFDRN7KIIDNXAI/#GGQ6EK4LVSCHUUNN5IDFDRN7KIIDNXAI" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    An out-of-bounds read when an HTTP/2 connection to a servers sends "DATA" frames with incorrect data content. This leads to a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 45.9, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5446/">CVE-2017-5446 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5446">CVE-2017-5446 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822954" comment="firefox-52.1.0-2.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822971" comment="thunderbird-52.1.0-1.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175447" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5447</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5447" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5447" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5447" ref_url="https://www.suse.com/security/cve/CVE-2017-5447" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003150.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1099-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GGQ6EK4LVSCHUUNN5IDFDRN7KIIDNXAI/#GGQ6EK4LVSCHUUNN5IDFDRN7KIIDNXAI" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    An out-of-bounds read during the processing of glyph widths during text layout. This results in a potentially exploitable crash and could allow an attacker to read otherwise inaccessible memory. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 45.9, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5447/">CVE-2017-5447 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5447">CVE-2017-5447 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822954" comment="firefox-52.1.0-2.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822971" comment="thunderbird-52.1.0-1.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175448" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5448</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5448" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5448" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5448" ref_url="https://www.suse.com/security/cve/CVE-2017-5448" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003150.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1099-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GGQ6EK4LVSCHUUNN5IDFDRN7KIIDNXAI/#GGQ6EK4LVSCHUUNN5IDFDRN7KIIDNXAI" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    An out-of-bounds write in "ClearKeyDecryptor" while decrypting some Clearkey-encrypted media content. The "ClearKeyDecryptor" code runs within the Gecko Media Plugin (GMP) sandbox. If a second mechanism is found to escape the sandbox, this vulnerability allows for the writing of arbitrary data within memory, resulting in a potentially exploitable crash. This vulnerability affects Firefox ESR &lt; 45.9, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5448/">CVE-2017-5448 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5448">CVE-2017-5448 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822954" comment="firefox-52.1.0-2.el7_3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175449" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5449</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5449" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5449" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5449" ref_url="https://www.suse.com/security/cve/CVE-2017-5449" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003150.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1099-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GGQ6EK4LVSCHUUNN5IDFDRN7KIIDNXAI/#GGQ6EK4LVSCHUUNN5IDFDRN7KIIDNXAI" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A possibly exploitable crash triggered during layout and manipulation of bidirectional unicode text in concert with CSS animations. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5449/">CVE-2017-5449 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5449">CVE-2017-5449 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822954" comment="firefox-52.1.0-2.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822971" comment="thunderbird-52.1.0-1.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175451" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5451</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5451" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5451" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5451" ref_url="https://www.suse.com/security/cve/CVE-2017-5451" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003150.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A mechanism to spoof the addressbar through the user interaction on the addressbar and the "onblur" event. The event could be used by script to affect text display to make the loaded site appear to be different from the one actually loaded within the addressbar. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5451/">CVE-2017-5451 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5451">CVE-2017-5451 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822954" comment="firefox-52.1.0-2.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822971" comment="thunderbird-52.1.0-1.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175454" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5454</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5454" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5454" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5454" ref_url="https://www.suse.com/security/cve/CVE-2017-5454" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003150.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A mechanism to bypass file system access protections in the sandbox to use the file picker to access different files than those selected in the file picker through the use of relative paths. This allows for read only access to the local file system. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5454/">CVE-2017-5454 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5454">CVE-2017-5454 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822954" comment="firefox-52.1.0-2.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822971" comment="thunderbird-52.1.0-1.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175455" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5455</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5455" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5455" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5455" ref_url="https://www.suse.com/security/cve/CVE-2017-5455" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003150.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    The internal feed reader APIs that crossed the sandbox barrier allowed for a sandbox escape and escalation of privilege if combined with another vulnerability that resulted in remote code execution inside the sandboxed process. This vulnerability affects Firefox ESR &lt; 52.1 and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5455/">CVE-2017-5455 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5455">CVE-2017-5455 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822954" comment="firefox-52.1.0-2.el7_3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175456" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5456</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5456" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5456" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5456" ref_url="https://www.suse.com/security/cve/CVE-2017-5456" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003150.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A mechanism to bypass file system access protections in the sandbox using the file system request constructor through an IPC message. This allows for read and write access to the local file system. This vulnerability affects Firefox ESR &lt; 52.1 and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5456/">CVE-2017-5456 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5456">CVE-2017-5456 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822954" comment="firefox-52.1.0-2.el7_3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175459" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5459</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5459" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5459" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5459" ref_url="https://www.suse.com/security/cve/CVE-2017-5459" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003150.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A buffer overflow in WebGL triggerable by web content, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 45.9, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5459/">CVE-2017-5459 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5459">CVE-2017-5459 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822954" comment="firefox-52.1.0-2.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822971" comment="thunderbird-52.1.0-1.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175460" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5460</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5460" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5460" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5460" ref_url="https://www.suse.com/security/cve/CVE-2017-5460" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003150.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1099-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GGQ6EK4LVSCHUUNN5IDFDRN7KIIDNXAI/#GGQ6EK4LVSCHUUNN5IDFDRN7KIIDNXAI" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability in frame selection triggered by a combination of malicious script content and key presses by a user. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 45.9, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5460/">CVE-2017-5460 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5460">CVE-2017-5460 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822954" comment="firefox-52.1.0-2.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822971" comment="thunderbird-52.1.0-1.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175461" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5461</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5461" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5461" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5461" ref_url="https://www.suse.com/security/cve/CVE-2017-5461" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003150.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1099-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GGQ6EK4LVSCHUUNN5IDFDRN7KIIDNXAI/#GGQ6EK4LVSCHUUNN5IDFDRN7KIIDNXAI" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Mozilla Network Security Services (NSS) before 3.21.4, 3.22.x through 3.28.x before 3.28.4, 3.29.x before 3.29.5, and 3.30.x before 3.30.1 allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact by leveraging incorrect base64 operations.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5461/">CVE-2017-5461 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5461">CVE-2017-5461 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822947" comment="nss-3.28.4-1.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822948" comment="nss-devel-3.28.4-1.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822949" comment="nss-pkcs11-devel-3.28.4-1.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822950" comment="nss-sysinit-3.28.4-1.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822951" comment="nss-tools-3.28.4-1.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822952" comment="nss-util-3.28.4-1.0.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822953" comment="nss-util-devel-3.28.4-1.0.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175464" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5464</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5464" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5464" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5464" ref_url="https://www.suse.com/security/cve/CVE-2017-5464" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003150.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1099-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GGQ6EK4LVSCHUUNN5IDFDRN7KIIDNXAI/#GGQ6EK4LVSCHUUNN5IDFDRN7KIIDNXAI" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    During DOM manipulations of the accessibility tree through script, the DOM tree can become out of sync with the accessibility tree, leading to memory corruption and a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 45.9, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5464/">CVE-2017-5464 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5464">CVE-2017-5464 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822954" comment="firefox-52.1.0-2.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822971" comment="thunderbird-52.1.0-1.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175465" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5465</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5465" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5465" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5465" ref_url="https://www.suse.com/security/cve/CVE-2017-5465" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003150.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1099-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GGQ6EK4LVSCHUUNN5IDFDRN7KIIDNXAI/#GGQ6EK4LVSCHUUNN5IDFDRN7KIIDNXAI" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    An out-of-bounds read while processing SVG content in "ConvolvePixel". This results in a crash and also allows for otherwise inaccessible memory being copied into SVG graphic content, which could then displayed. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 45.9, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5465/">CVE-2017-5465 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5465">CVE-2017-5465 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822954" comment="firefox-52.1.0-2.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822971" comment="thunderbird-52.1.0-1.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175466" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5466</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5466" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5466" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5466" ref_url="https://www.suse.com/security/cve/CVE-2017-5466" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003150.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1099-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GGQ6EK4LVSCHUUNN5IDFDRN7KIIDNXAI/#GGQ6EK4LVSCHUUNN5IDFDRN7KIIDNXAI" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    If a page is loaded from an original site through a hyperlink and contains a redirect to a "data:text/html" URL, triggering a reload will run the reloaded "data:text/html" page with its origin set incorrectly. This allows for a cross-site scripting (XSS) attack. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5466/">CVE-2017-5466 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5466">CVE-2017-5466 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822954" comment="firefox-52.1.0-2.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822971" comment="thunderbird-52.1.0-1.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175467" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5467</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5467" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5467" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5467" ref_url="https://www.suse.com/security/cve/CVE-2017-5467" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003150.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1099-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GGQ6EK4LVSCHUUNN5IDFDRN7KIIDNXAI/#GGQ6EK4LVSCHUUNN5IDFDRN7KIIDNXAI" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A potential memory corruption and crash when using Skia content when drawing content outside of the bounds of a clipping region. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5467/">CVE-2017-5467 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5467">CVE-2017-5467 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822954" comment="firefox-52.1.0-2.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822971" comment="thunderbird-52.1.0-1.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175469" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5469</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5469" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5469" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5469" ref_url="https://www.suse.com/security/cve/CVE-2017-5469" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003150.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Fixed potential buffer overflows in generated Firefox code due to CVE-2016-6354 issue in Flex. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 45.9, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5469/">CVE-2017-5469 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5469">CVE-2017-5469 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822954" comment="firefox-52.1.0-2.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822971" comment="thunderbird-52.1.0-1.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175470" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5470</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5470" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5470" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5470" ref_url="https://www.suse.com/security/cve/CVE-2017-5470" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003150.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1620-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K6OIAMV5WWMMRZDYBFOTBIXVUYEDMZQI/#K6OIAMV5WWMMRZDYBFOTBIXVUYEDMZQI" source="SUSE-SU"/>
    <description>
    Memory safety bugs were reported in Firefox 53 and Firefox ESR 52.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox &lt; 54, Firefox ESR &lt; 52.2, and Thunderbird &lt; 52.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-5470/">CVE-2017-5470 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5470">CVE-2017-5470 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1043960">SUSE bug 1043960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044239">SUSE bug 1044239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044240">SUSE bug 1044240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044241">SUSE bug 1044241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044242">SUSE bug 1044242</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823071" comment="firefox-52.2.0-1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823091" comment="thunderbird-52.2.0-1.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175472" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5472</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5472" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5472" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5472" ref_url="https://www.suse.com/security/cve/CVE-2017-5472" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003150.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1620-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K6OIAMV5WWMMRZDYBFOTBIXVUYEDMZQI/#K6OIAMV5WWMMRZDYBFOTBIXVUYEDMZQI" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability with the frameloader during tree reconstruction while regenerating CSS layout when attempting to use a node in the tree that no longer exists. This results in a potentially exploitable crash. This vulnerability affects Firefox &lt; 54, Firefox ESR &lt; 52.2, and Thunderbird &lt; 52.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-5472/">CVE-2017-5472 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5472">CVE-2017-5472 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1043960">SUSE bug 1043960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044239">SUSE bug 1044239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044240">SUSE bug 1044240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044241">SUSE bug 1044241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044242">SUSE bug 1044242</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823071" comment="firefox-52.2.0-1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823091" comment="thunderbird-52.2.0-1.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175482" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5482</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5482" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5482" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5482" ref_url="https://www.suse.com/security/cve/CVE-2017-5482" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
    <description>
    The Q.933 parser in tcpdump before 4.9.0 has a buffer overflow in print-fr.c:q933_print(), a different vulnerability than CVE-2016-8575.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5482/">CVE-2017-5482 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5482">CVE-2017-5482 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823301" comment="tcpdump-4.9.0-5.el7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175483" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5483</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5483" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5483" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5483" ref_url="https://www.suse.com/security/cve/CVE-2017-5483" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
    <description>
    The SNMP parser in tcpdump before 4.9.0 has a buffer overflow in print-snmp.c:asn1_parse().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5483/">CVE-2017-5483 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5483">CVE-2017-5483 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823301" comment="tcpdump-4.9.0-5.el7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5484</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5484" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5484" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5484" ref_url="https://www.suse.com/security/cve/CVE-2017-5484" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
    <description>
    The ATM parser in tcpdump before 4.9.0 has a buffer overflow in print-atm.c:sig_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5484/">CVE-2017-5484 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5484">CVE-2017-5484 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823301" comment="tcpdump-4.9.0-5.el7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175485" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5485</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5485" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5485" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5485" ref_url="https://www.suse.com/security/cve/CVE-2017-5485" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
    <description>
    The ISO CLNS parser in tcpdump before 4.9.0 has a buffer overflow in addrtoname.c:lookup_nsap().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5485/">CVE-2017-5485 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5485">CVE-2017-5485 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823301" comment="tcpdump-4.9.0-5.el7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175486" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5486</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5486" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5486" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5486" ref_url="https://www.suse.com/security/cve/CVE-2017-5486" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
    <description>
    The ISO CLNS parser in tcpdump before 4.9.0 has a buffer overflow in print-isoclns.c:clnp_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5486/">CVE-2017-5486 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5486">CVE-2017-5486 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823301" comment="tcpdump-4.9.0-5.el7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175581" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5581</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5581" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5581" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5581" ref_url="https://www.suse.com/security/cve/CVE-2017-5581" source="SUSE CVE"/>
    <description>
    Buffer overflow in the ModifiablePixelBuffer::fillRect function in TigerVNC before 1.7.1 allows remote servers to execute arbitrary code via an RRE message with subrectangle outside framebuffer boundaries.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5581/">CVE-2017-5581 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5581">CVE-2017-5581 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1019274">SUSE bug 1019274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021302">SUSE bug 1021302</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823349" comment="fltk-1.3.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823350" comment="fltk-devel-1.3.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823351" comment="fltk-fluid-1.3.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823352" comment="fltk-static-1.3.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823353" comment="tigervnc-1.8.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823354" comment="tigervnc-icons-1.8.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823355" comment="tigervnc-license-1.8.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823356" comment="tigervnc-server-1.8.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823357" comment="tigervnc-server-applet-1.8.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823358" comment="tigervnc-server-minimal-1.8.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823359" comment="tigervnc-server-module-1.8.0-1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175645" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5645</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5645" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5645" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5645" ref_url="https://www.suse.com/security/cve/CVE-2017-5645" source="SUSE CVE"/>
    <description>
    In Apache Log4j 2.x before 2.8.2, when using the TCP socket server or UDP socket server to receive serialized log events from another application, a specially crafted binary payload can be sent that, when deserialized, can execute arbitrary code.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5645/">CVE-2017-5645 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5645">CVE-2017-5645 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1034569">SUSE bug 1034569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159646">SUSE bug 1159646</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823508" comment="log4j-1.2.17-16.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823509" comment="log4j-javadoc-1.2.17-16.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823510" comment="log4j-manual-1.2.17-16.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175647" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5647</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5647" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5647" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5647" ref_url="https://www.suse.com/security/cve/CVE-2017-5647" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002971.html" source="SUSE-SU"/>
		<reference ref_id="TID7016795" ref_url="https://www.suse.com/support/kb/doc/?id=7016795" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1292-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MLGX7NUX5TEU72KGVEH2VVPTMIVKAIMA/#MLGX7NUX5TEU72KGVEH2VVPTMIVKAIMA" source="SUSE-SU"/>
    <description>
    A bug in the handling of the pipelined requests in Apache Tomcat 9.0.0.M1 to 9.0.0.M18, 8.5.0 to 8.5.12, 8.0.0.RC1 to 8.0.42, 7.0.0 to 7.0.76, and 6.0.0 to 6.0.52, when send file was used, results in the pipelined request being lost when send file processing of the previous request completed. This could result in responses appearing to be sent for the wrong request. For example, a user agent that sent requests A, B and C could see the correct response for request A, the response for request C for request B and no response for request C.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5647/">CVE-2017-5647 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5647">CVE-2017-5647 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1033448">SUSE bug 1033448</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823712" comment="tomcat-7.0.76-3.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823713" comment="tomcat-admin-webapps-7.0.76-3.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823714" comment="tomcat-docs-webapp-7.0.76-3.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823715" comment="tomcat-el-2.2-api-7.0.76-3.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823716" comment="tomcat-javadoc-7.0.76-3.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823717" comment="tomcat-jsp-2.2-api-7.0.76-3.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823718" comment="tomcat-jsvc-7.0.76-3.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823719" comment="tomcat-lib-7.0.76-3.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823720" comment="tomcat-servlet-3.0-api-7.0.76-3.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823721" comment="tomcat-webapps-7.0.76-3.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175648" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5648</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5648" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5648" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5648" ref_url="https://www.suse.com/security/cve/CVE-2017-5648" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002971.html" source="SUSE-SU"/>
		<reference ref_id="TID7016795" ref_url="https://www.suse.com/support/kb/doc/?id=7016795" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1292-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MLGX7NUX5TEU72KGVEH2VVPTMIVKAIMA/#MLGX7NUX5TEU72KGVEH2VVPTMIVKAIMA" source="SUSE-SU"/>
    <description>
    While investigating bug 60718, it was noticed that some calls to application listeners in Apache Tomcat 9.0.0.M1 to 9.0.0.M17, 8.5.0 to 8.5.11, 8.0.0.RC1 to 8.0.41, and 7.0.0 to 7.0.75 did not use the appropriate facade object. When running an untrusted application under a SecurityManager, it was therefore possible for that untrusted application to retain a reference to the request or response object and thereby access and/or modify information associated with another web application.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5648/">CVE-2017-5648 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5648">CVE-2017-5648 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1033447">SUSE bug 1033447</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823158" comment="tomcat-7.0.69-12.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823159" comment="tomcat-admin-webapps-7.0.69-12.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823160" comment="tomcat-docs-webapp-7.0.69-12.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823161" comment="tomcat-el-2.2-api-7.0.69-12.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823162" comment="tomcat-javadoc-7.0.69-12.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823163" comment="tomcat-jsp-2.2-api-7.0.69-12.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823164" comment="tomcat-jsvc-7.0.69-12.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823165" comment="tomcat-lib-7.0.69-12.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823166" comment="tomcat-servlet-3.0-api-7.0.69-12.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823167" comment="tomcat-webapps-7.0.69-12.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175664" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5664</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5664" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5664" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5664" ref_url="https://www.suse.com/security/cve/CVE-2017-5664" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003401.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003405.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004231.html" source="SUSE-SU"/>
		<reference ref_id="TID7016795" ref_url="https://www.suse.com/support/kb/doc/?id=7016795" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3069-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BYU6XHQ5M6CAKKV2C7V5ALDR52LMF42Y/#BYU6XHQ5M6CAKKV2C7V5ALDR52LMF42Y" source="SUSE-SU"/>
    <description>
    The error page mechanism of the Java Servlet Specification requires that, when an error occurs and an error page is configured for the error that occurred, the original request and response are forwarded to the error page. This means that the request is presented to the error page with the original HTTP method. If the error page is a static file, expected behaviour is to serve content of the file as if processing a GET request, regardless of the actual HTTP method. The Default Servlet in Apache Tomcat 9.0.0.M1 to 9.0.0.M20, 8.5.0 to 8.5.14, 8.0.0.RC1 to 8.0.43 and 7.0.0 to 7.0.77 did not do this. Depending on the original request this could lead to unexpected and undesirable results for static error pages including, if the DefaultServlet is configured to permit writes, the replacement or removal of the custom error page. Notes for other user provided error pages: (1) Unless explicitly coded otherwise, JSPs ignore the HTTP method. JSPs used as error pages must must ensure that they handle any error dispatch as a GET request, regardless of the actual method. (2) By default, the response generated by a Servlet does depend on the HTTP method. Custom Servlets used as error pages must ensure that they handle any error dispatch as a GET request, regardless of the actual method.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-5664/">CVE-2017-5664 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5664">CVE-2017-5664 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1042910">SUSE bug 1042910</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823158" comment="tomcat-7.0.69-12.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823159" comment="tomcat-admin-webapps-7.0.69-12.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823160" comment="tomcat-docs-webapp-7.0.69-12.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823161" comment="tomcat-el-2.2-api-7.0.69-12.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823162" comment="tomcat-javadoc-7.0.69-12.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823163" comment="tomcat-jsp-2.2-api-7.0.69-12.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823164" comment="tomcat-jsvc-7.0.69-12.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823165" comment="tomcat-lib-7.0.69-12.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823166" comment="tomcat-servlet-3.0-api-7.0.69-12.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823167" comment="tomcat-webapps-7.0.69-12.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175715" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5715</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5715" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715" source="SUSE CVE"/>
		<reference ref_id="SUSE-RU-2018:0779-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2018-March/008124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2018:0821-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2018-March/008142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003560.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003561.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0009-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0010-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0019-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003586.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003601.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0131-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VVUXCLQ7WIXJFNYSB6YFSFQV3AE3BKOZ/#VVUXCLQ7WIXJFNYSB6YFSFQV3AE3BKOZ" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003629.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0437-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2018-February/007939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0552-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0552-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0638-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003818.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0757-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1363-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1567-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1571-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1699-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004357.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2631-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005270.html" source="SUSE-SU"/>
		<reference ref_id="TID000019122" ref_url="https://www.suse.com/support/kb/doc/?id=000019122" source="SUSE-SU"/>
		<reference ref_id="TID7022512" ref_url="https://www.suse.com/support/kb/doc/?id=7022512" source="SUSE-SU"/>
		<reference ref_id="TID7022514" ref_url="https://www.suse.com/support/kb/doc/?id=7022514" source="SUSE-SU"/>
		<reference ref_id="TID7022531" ref_url="https://www.suse.com/support/kb/doc/?id=7022531" source="SUSE-SU"/>
		<reference ref_id="TID7022541" ref_url="https://www.suse.com/support/kb/doc/?id=7022541" source="SUSE-SU"/>
		<reference ref_id="TID7022548" ref_url="https://www.suse.com/support/kb/doc/?id=7022548" source="SUSE-SU"/>
		<reference ref_id="TID7022568" ref_url="https://www.suse.com/support/kb/doc/?id=7022568" source="SUSE-SU"/>
		<reference ref_id="TID7022569" ref_url="https://www.suse.com/support/kb/doc/?id=7022569" source="SUSE-SU"/>
		<reference ref_id="TID7022571" ref_url="https://www.suse.com/support/kb/doc/?id=7022571" source="SUSE-SU"/>
		<reference ref_id="TID7022572" ref_url="https://www.suse.com/support/kb/doc/?id=7022572" source="SUSE-SU"/>
		<reference ref_id="TID7022578" ref_url="https://www.suse.com/support/kb/doc/?id=7022578" source="SUSE-SU"/>
		<reference ref_id="TID7022579" ref_url="https://www.suse.com/support/kb/doc/?id=7022579" source="SUSE-SU"/>
		<reference ref_id="TID7022982" ref_url="https://www.suse.com/support/kb/doc/?id=7022982" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU--1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XQI57KB27Y3J7MHI7FNPSD5V2PXGUQOD/#XQI57KB27Y3J7MHI7FNPSD5V2PXGUQOD" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0013-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOLD6T3YHL77L4FUBHAF3IBMTUEP7B4J/#JOLD6T3YHL77L4FUBHAF3IBMTUEP7B4J" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0022-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/47VWN6YQVTJIK4KOIPOKDOUQNRHO3UO6/#47VWN6YQVTJIK4KOIPOKDOUQNRHO3UO6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0023-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZHXQ2V7OTLSNQH4TTBOC6U6FWIKLIWB6/#ZHXQ2V7OTLSNQH4TTBOC6U6FWIKLIWB6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0026-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6TPEZRAWPYRUJAPGQBIZBXVHVDV7BDDV/#6TPEZRAWPYRUJAPGQBIZBXVHVDV7BDDV" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0030-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6Y2GA4ROXJPMDU2ENWE2UM6KW5I2Z7ZD/#6Y2GA4ROXJPMDU2ENWE2UM6KW5I2Z7ZD" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/357MDHGAKQDD2S36TCURMQXS5BKF7A2Z/#357MDHGAKQDD2S36TCURMQXS5BKF7A2Z" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EHTY26WCAT6QTEEB7JAO7N53HEOONACI/#EHTY26WCAT6QTEEB7JAO7N53HEOONACI" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0187-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QNM34X4DJVBP4PEGQLR7XSG5ZZXAJTG2/#QNM34X4DJVBP4PEGQLR7XSG5ZZXAJTG2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WVOVBKQUBBNJEMQZQRUPUMHFN6AWLXDU/#WVOVBKQUBBNJEMQZQRUPUMHFN6AWLXDU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0408-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TBPHSNBEYKQGP3AGWJUUS3K6HJEQZTZE/#TBPHSNBEYKQGP3AGWJUUS3K6HJEQZTZE" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0459-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UDH4GC26SHCV4RBWDLH6XECWQIIC5KVX/#UDH4GC26SHCV4RBWDLH6XECWQIIC5KVX" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0710-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3WIL5NAJJPNZF3LRWF5OLMJ6WO4I6RD6/#3WIL5NAJJPNZF3LRWF5OLMJ6WO4I6RD6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0745-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4XJY2NLMZ4HUGOBISN5XO74V52VOBRY4/#4XJY2NLMZ4HUGOBISN5XO74V52VOBRY4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0780-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R3FRDROY2UV4WMIXYKNDNPPBXQOBE6U7/#R3FRDROY2UV4WMIXYKNDNPPBXQOBE6U7" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0939-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GNPLPRYR75LWWU4CR5O6E4YST3PJLYAF/#GNPLPRYR75LWWU4CR5O6E4YST3PJLYAF" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1502-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R2K5LXDBYZTKPSPZMCP37K7L2YS4NJ7W/#R2K5LXDBYZTKPSPZMCP37K7L2YS4NJ7W" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1623-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XUSB6PC7DAOIGXD55U5BIXS3XLAJSCAD/#XUSB6PC7DAOIGXD55U5BIXS3XLAJSCAD" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1631-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4VWJ3BB6JSQI7JH45Z34DX4JRL5GT6T4/#4VWJ3BB6JSQI7JH45Z34DX4JRL5GT6T4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2119-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WKPTBMLW6CO7OGF3LPNC4LMQ2SS7VXKC/#WKPTBMLW6CO7OGF3LPNC4LMQ2SS7VXKC" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2237-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TNNLUIWCTPW2UQNGH6RVS4HTZYS3BBWK/#TNNLUIWCTPW2UQNGH6RVS4HTZYS3BBWK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2524-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O6Y2Q53SARM33ZNDBTJD7HGXN4LJY3W3/#O6Y2Q53SARM33ZNDBTJD7HGXN4LJY3W3" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14770-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WU6USOH6Z5LBH65E37F7SXQ2ZCYMYO4C/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14775-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IDYBISXNIKR4JQNKOAZNM4IWBORGXDGT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14776-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VY6LKWXFA5DZKFFJWA52HJLZ3GJXUDB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14777-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K4CQIJEA5UAOBWUSUVTBHDHKQNBQURQG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14778-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/E3XCURBMJRRPRVU3EVKDNACDUEBSYOCK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14787-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FWMIURVH3RGSXYDDHGU2A5NU4OI3OLPB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14791-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7ILZHMVR4NNCE6NWCEPZ2BVWZXYSWRTS/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14796-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JRVYJFDMGL4ZFIAYJKJTQHRR5SPMPZJ2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14797-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RLB6EQ4PQFULA6326VPRQRWW66T32SST/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14800-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XIORKETHKWBJRRYF55G3J3DL3T7QGOEL/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14804-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EISBLM6MW64JFKX5G6QNSKXKI34QXKQ4/" source="SUSE-SU"/>
    <description>
    Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074562">SUSE bug 1074562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074578">SUSE bug 1074578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074701">SUSE bug 1074701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074741">SUSE bug 1074741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074919">SUSE bug 1074919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075006">SUSE bug 1075006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075007">SUSE bug 1075007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075262">SUSE bug 1075262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075419">SUSE bug 1075419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076115">SUSE bug 1076115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076372">SUSE bug 1076372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076606">SUSE bug 1076606</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078353">SUSE bug 1078353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080039">SUSE bug 1080039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087887">SUSE bug 1087887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087939">SUSE bug 1087939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088147">SUSE bug 1088147</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089055">SUSE bug 1089055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091815">SUSE bug 1091815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095735">SUSE bug 1095735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102517">SUSE bug 1102517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105108">SUSE bug 1105108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126516">SUSE bug 1126516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173489">SUSE bug 1173489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201457">SUSE bug 1201457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201877">SUSE bug 1201877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203236">SUSE bug 1203236</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823903" comment="iwl100-firmware-39.31.5.1-58.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823904" comment="iwl1000-firmware-39.31.5.1-58.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823905" comment="iwl105-firmware-18.168.6.1-58.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823906" comment="iwl135-firmware-18.168.6.1-58.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823907" comment="iwl2000-firmware-18.168.6.1-58.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823908" comment="iwl2030-firmware-18.168.6.1-58.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823909" comment="iwl3160-firmware-22.0.7.0-58.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823910" comment="iwl3945-firmware-15.32.2.9-58.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823911" comment="iwl4965-firmware-228.61.2.24-58.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823912" comment="iwl5000-firmware-8.83.5.1_1-58.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823913" comment="iwl5150-firmware-8.24.2.2-58.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823914" comment="iwl6000-firmware-9.221.4.1-58.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823915" comment="iwl6000g2a-firmware-17.168.5.3-58.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823916" comment="iwl6000g2b-firmware-17.168.5.2-58.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823917" comment="iwl6050-firmware-41.28.5.1-58.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823918" comment="iwl7260-firmware-22.0.7.0-58.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823919" comment="iwl7265-firmware-22.0.7.0-58.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823861" comment="kernel-3.10.0-693.11.6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823862" comment="kernel-abi-whitelists-3.10.0-693.11.6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823863" comment="kernel-debug-3.10.0-693.11.6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823866" comment="kernel-doc-3.10.0-693.11.6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823867" comment="kernel-headers-3.10.0-693.11.6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823868" comment="kernel-tools-3.10.0-693.11.6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823869" comment="kernel-tools-libs-3.10.0-693.11.6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823896" comment="libvirt-admin-3.2.0-14.el7_4.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823897" comment="libvirt-daemon-lxc-3.2.0-14.el7_4.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823898" comment="libvirt-lock-sanlock-3.2.0-14.el7_4.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823899" comment="libvirt-login-shell-3.2.0-14.el7_4.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823900" comment="libvirt-nss-3.2.0-14.el7_4.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823920" comment="linux-firmware-20170606-58.gitc990aae.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823902" comment="microcode_ctl-2.1-22.5.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823871" comment="perf-3.10.0-693.11.6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823872" comment="python-perf-3.10.0-693.11.6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823892" comment="qemu-img-1.5.3-141.el7_4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823893" comment="qemu-kvm-1.5.3-141.el7_4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823894" comment="qemu-kvm-common-1.5.3-141.el7_4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823895" comment="qemu-kvm-tools-1.5.3-141.el7_4.6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175731" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5731</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5731" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5731" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5731" ref_url="https://www.suse.com/security/cve/CVE-2017-5731" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:4155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004989.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4240-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JPZORSTLPA2LHXFITF73X42HP5R6Q6ZF/#JPZORSTLPA2LHXFITF73X42HP5R6Q6ZF" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4254-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IU5LKCPVWU234CM7DGXXXCLPBTLJ6SNH/#IU5LKCPVWU234CM7DGXXXCLPBTLJ6SNH" source="SUSE-SU"/>
    <description>
    Bounds checking in Tianocompress before November 7, 2017 may allow an authenticated user to potentially enable an escalation of privilege via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5731/">CVE-2017-5731 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5731">CVE-2017-5731 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1115917">SUSE bug 1115917</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826217" comment="OVMF-20180508-6.gitee3198e672e2.el7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175732" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5732</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5732" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5732" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5732" ref_url="https://www.suse.com/security/cve/CVE-2017-5732" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:4155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004989.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4240-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JPZORSTLPA2LHXFITF73X42HP5R6Q6ZF/#JPZORSTLPA2LHXFITF73X42HP5R6Q6ZF" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4254-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IU5LKCPVWU234CM7DGXXXCLPBTLJ6SNH/#IU5LKCPVWU234CM7DGXXXCLPBTLJ6SNH" source="SUSE-SU"/>
    <description>
    DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2017. Notes: none
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-09"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5732/">CVE-2017-5732 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2017-5732">CVE-2017-5732 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1115917">SUSE bug 1115917</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826217" comment="OVMF-20180508-6.gitee3198e672e2.el7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175733" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5733</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5733" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5733" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5733" ref_url="https://www.suse.com/security/cve/CVE-2017-5733" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:4155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004989.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4240-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JPZORSTLPA2LHXFITF73X42HP5R6Q6ZF/#JPZORSTLPA2LHXFITF73X42HP5R6Q6ZF" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4254-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IU5LKCPVWU234CM7DGXXXCLPBTLJ6SNH/#IU5LKCPVWU234CM7DGXXXCLPBTLJ6SNH" source="SUSE-SU"/>
    <description>
    DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2017. Notes: none
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-09"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5733/">CVE-2017-5733 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2017-5733">CVE-2017-5733 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1115917">SUSE bug 1115917</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826217" comment="OVMF-20180508-6.gitee3198e672e2.el7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175734" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5734</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5734" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5734" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5734" ref_url="https://www.suse.com/security/cve/CVE-2017-5734" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:4155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004989.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4240-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JPZORSTLPA2LHXFITF73X42HP5R6Q6ZF/#JPZORSTLPA2LHXFITF73X42HP5R6Q6ZF" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4254-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IU5LKCPVWU234CM7DGXXXCLPBTLJ6SNH/#IU5LKCPVWU234CM7DGXXXCLPBTLJ6SNH" source="SUSE-SU"/>
    <description>
    DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-09"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5734/">CVE-2017-5734 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2017-5734">CVE-2017-5734 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1115917">SUSE bug 1115917</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826217" comment="OVMF-20180508-6.gitee3198e672e2.el7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175735" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5735</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5735" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5735" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5735" ref_url="https://www.suse.com/security/cve/CVE-2017-5735" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:4155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004989.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4240-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JPZORSTLPA2LHXFITF73X42HP5R6Q6ZF/#JPZORSTLPA2LHXFITF73X42HP5R6Q6ZF" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4254-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IU5LKCPVWU234CM7DGXXXCLPBTLJ6SNH/#IU5LKCPVWU234CM7DGXXXCLPBTLJ6SNH" source="SUSE-SU"/>
    <description>
    DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2017. Notes: none
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-09"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5735/">CVE-2017-5735 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2017-5735">CVE-2017-5735 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1115917">SUSE bug 1115917</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826217" comment="OVMF-20180508-6.gitee3198e672e2.el7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175753" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5753</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5753" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5753" ref_url="https://www.suse.com/security/cve/CVE-2017-5753" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003560.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0010-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003601.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0131-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VVUXCLQ7WIXJFNYSB6YFSFQV3AE3BKOZ/#VVUXCLQ7WIXJFNYSB6YFSFQV3AE3BKOZ" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003629.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0552-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0552-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0638-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1699-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1800-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1801-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1802-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1803-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1811-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1848-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1892-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1897-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1992-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2232-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2506-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02099-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1293-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039011.html" source="SUSE-SU"/>
		<reference ref_id="TID000019122" ref_url="https://www.suse.com/support/kb/doc/?id=000019122" source="SUSE-SU"/>
		<reference ref_id="TID000019229" ref_url="https://www.suse.com/support/kb/doc/?id=000019229" source="SUSE-SU"/>
		<reference ref_id="TID7022512" ref_url="https://www.suse.com/support/kb/doc/?id=7022512" source="SUSE-SU"/>
		<reference ref_id="TID7022514" ref_url="https://www.suse.com/support/kb/doc/?id=7022514" source="SUSE-SU"/>
		<reference ref_id="TID7022531" ref_url="https://www.suse.com/support/kb/doc/?id=7022531" source="SUSE-SU"/>
		<reference ref_id="TID7022541" ref_url="https://www.suse.com/support/kb/doc/?id=7022541" source="SUSE-SU"/>
		<reference ref_id="TID7022548" ref_url="https://www.suse.com/support/kb/doc/?id=7022548" source="SUSE-SU"/>
		<reference ref_id="TID7022568" ref_url="https://www.suse.com/support/kb/doc/?id=7022568" source="SUSE-SU"/>
		<reference ref_id="TID7022569" ref_url="https://www.suse.com/support/kb/doc/?id=7022569" source="SUSE-SU"/>
		<reference ref_id="TID7022571" ref_url="https://www.suse.com/support/kb/doc/?id=7022571" source="SUSE-SU"/>
		<reference ref_id="TID7022572" ref_url="https://www.suse.com/support/kb/doc/?id=7022572" source="SUSE-SU"/>
		<reference ref_id="TID7022578" ref_url="https://www.suse.com/support/kb/doc/?id=7022578" source="SUSE-SU"/>
		<reference ref_id="TID7022579" ref_url="https://www.suse.com/support/kb/doc/?id=7022579" source="SUSE-SU"/>
		<reference ref_id="TID7023075" ref_url="https://www.suse.com/support/kb/doc/?id=7023075" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0022-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/47VWN6YQVTJIK4KOIPOKDOUQNRHO3UO6/#47VWN6YQVTJIK4KOIPOKDOUQNRHO3UO6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0023-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZHXQ2V7OTLSNQH4TTBOC6U6FWIKLIWB6/#ZHXQ2V7OTLSNQH4TTBOC6U6FWIKLIWB6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WVOVBKQUBBNJEMQZQRUPUMHFN6AWLXDU/#WVOVBKQUBBNJEMQZQRUPUMHFN6AWLXDU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0459-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UDH4GC26SHCV4RBWDLH6XECWQIIC5KVX/#UDH4GC26SHCV4RBWDLH6XECWQIIC5KVX" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1623-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XUSB6PC7DAOIGXD55U5BIXS3XLAJSCAD/#XUSB6PC7DAOIGXD55U5BIXS3XLAJSCAD" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2119-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WKPTBMLW6CO7OGF3LPNC4LMQ2SS7VXKC/#WKPTBMLW6CO7OGF3LPNC4LMQ2SS7VXKC" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1212-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5IDOTKMILRKOFD2ODQXJF3OOEYZ3EMR5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2861-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5MOJKTUHVZFZADZQ6EYELCLEJ5BD766Q/" source="SUSE-SU"/>
    <description>
    Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5753/">CVE-2017-5753 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5753">CVE-2017-5753 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074562">SUSE bug 1074562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074578">SUSE bug 1074578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074701">SUSE bug 1074701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075006">SUSE bug 1075006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075419">SUSE bug 1075419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075748">SUSE bug 1075748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080039">SUSE bug 1080039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087084">SUSE bug 1087084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087939">SUSE bug 1087939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089055">SUSE bug 1089055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136865">SUSE bug 1136865</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201877">SUSE bug 1201877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209547">SUSE bug 1209547</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823861" comment="kernel-3.10.0-693.11.6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823862" comment="kernel-abi-whitelists-3.10.0-693.11.6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823863" comment="kernel-debug-3.10.0-693.11.6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823866" comment="kernel-doc-3.10.0-693.11.6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823867" comment="kernel-headers-3.10.0-693.11.6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823868" comment="kernel-tools-3.10.0-693.11.6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823869" comment="kernel-tools-libs-3.10.0-693.11.6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823871" comment="perf-3.10.0-693.11.6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823872" comment="python-perf-3.10.0-693.11.6.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175754" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5754</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5754" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5754" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5754" ref_url="https://www.suse.com/security/cve/CVE-2017-5754" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003560.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0010-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003629.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0552-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0552-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0638-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1699-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0634-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013982.html" source="SUSE-SU"/>
		<reference ref_id="TID000019122" ref_url="https://www.suse.com/support/kb/doc/?id=000019122" source="SUSE-SU"/>
		<reference ref_id="TID7022512" ref_url="https://www.suse.com/support/kb/doc/?id=7022512" source="SUSE-SU"/>
		<reference ref_id="TID7022514" ref_url="https://www.suse.com/support/kb/doc/?id=7022514" source="SUSE-SU"/>
		<reference ref_id="TID7022531" ref_url="https://www.suse.com/support/kb/doc/?id=7022531" source="SUSE-SU"/>
		<reference ref_id="TID7022541" ref_url="https://www.suse.com/support/kb/doc/?id=7022541" source="SUSE-SU"/>
		<reference ref_id="TID7022548" ref_url="https://www.suse.com/support/kb/doc/?id=7022548" source="SUSE-SU"/>
		<reference ref_id="TID7022568" ref_url="https://www.suse.com/support/kb/doc/?id=7022568" source="SUSE-SU"/>
		<reference ref_id="TID7022569" ref_url="https://www.suse.com/support/kb/doc/?id=7022569" source="SUSE-SU"/>
		<reference ref_id="TID7022571" ref_url="https://www.suse.com/support/kb/doc/?id=7022571" source="SUSE-SU"/>
		<reference ref_id="TID7022572" ref_url="https://www.suse.com/support/kb/doc/?id=7022572" source="SUSE-SU"/>
		<reference ref_id="TID7022578" ref_url="https://www.suse.com/support/kb/doc/?id=7022578" source="SUSE-SU"/>
		<reference ref_id="TID7022579" ref_url="https://www.suse.com/support/kb/doc/?id=7022579" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0022-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/47VWN6YQVTJIK4KOIPOKDOUQNRHO3UO6/#47VWN6YQVTJIK4KOIPOKDOUQNRHO3UO6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0023-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZHXQ2V7OTLSNQH4TTBOC6U6FWIKLIWB6/#ZHXQ2V7OTLSNQH4TTBOC6U6FWIKLIWB6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WVOVBKQUBBNJEMQZQRUPUMHFN6AWLXDU/#WVOVBKQUBBNJEMQZQRUPUMHFN6AWLXDU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0459-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UDH4GC26SHCV4RBWDLH6XECWQIIC5KVX/#UDH4GC26SHCV4RBWDLH6XECWQIIC5KVX" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1623-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XUSB6PC7DAOIGXD55U5BIXS3XLAJSCAD/#XUSB6PC7DAOIGXD55U5BIXS3XLAJSCAD" source="SUSE-SU"/>
    <description>
    Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5754/">CVE-2017-5754 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5754">CVE-2017-5754 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074562">SUSE bug 1074562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074578">SUSE bug 1074578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074701">SUSE bug 1074701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075006">SUSE bug 1075006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075008">SUSE bug 1075008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087939">SUSE bug 1087939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089055">SUSE bug 1089055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115045">SUSE bug 1115045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136865">SUSE bug 1136865</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201877">SUSE bug 1201877</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823861" comment="kernel-3.10.0-693.11.6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823862" comment="kernel-abi-whitelists-3.10.0-693.11.6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823863" comment="kernel-debug-3.10.0-693.11.6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823866" comment="kernel-doc-3.10.0-693.11.6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823867" comment="kernel-headers-3.10.0-693.11.6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823868" comment="kernel-tools-3.10.0-693.11.6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823869" comment="kernel-tools-libs-3.10.0-693.11.6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823871" comment="perf-3.10.0-693.11.6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823872" comment="python-perf-3.10.0-693.11.6.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175837" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5837</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5837" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5837" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5837" ref_url="https://www.suse.com/security/cve/CVE-2017-5837" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002798.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002807.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005542.html" source="SUSE-SU"/>
    <description>
    The gst_riff_create_audio_caps function in gst-libs/gst/riff/riff-media.c in gst-plugins-base in GStreamer before 1.10.3 allows remote attackers to cause a denial of service (floating point exception and crash) via a crafted video file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5837/">CVE-2017-5837 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5837">CVE-2017-5837 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1023259">SUSE bug 1023259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024076">SUSE bug 1024076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024079">SUSE bug 1024079</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823388" comment="clutter-gst2-2.0.18-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823389" comment="clutter-gst2-devel-2.0.18-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823390" comment="gnome-video-effects-0.4.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823391" comment="gstreamer-plugins-bad-free-0.10.23-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823392" comment="gstreamer-plugins-bad-free-devel-0.10.23-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823393" comment="gstreamer-plugins-bad-free-devel-docs-0.10.23-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823394" comment="gstreamer-plugins-good-0.10.31-13.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823395" comment="gstreamer-plugins-good-devel-docs-0.10.31-13.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823396" comment="gstreamer1-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823397" comment="gstreamer1-devel-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823398" comment="gstreamer1-devel-docs-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823399" comment="gstreamer1-plugins-bad-free-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823400" comment="gstreamer1-plugins-bad-free-devel-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823401" comment="gstreamer1-plugins-bad-free-gtk-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823402" comment="gstreamer1-plugins-base-1.10.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823403" comment="gstreamer1-plugins-base-devel-1.10.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823404" comment="gstreamer1-plugins-base-devel-docs-1.10.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823405" comment="gstreamer1-plugins-base-tools-1.10.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823406" comment="gstreamer1-plugins-good-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823407" comment="orc-0.4.26-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823408" comment="orc-compiler-0.4.26-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823409" comment="orc-devel-0.4.26-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823410" comment="orc-doc-0.4.26-1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175838" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5838</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5838" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5838" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5838" ref_url="https://www.suse.com/security/cve/CVE-2017-5838" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0966-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002792.html" source="SUSE-SU"/>
    <description>
    The gst_date_time_new_from_iso8601_string function in gst/gstdatetime.c in GStreamer before 1.10.3 allows remote attackers to cause a denial of service (out-of-bounds heap read) via a malformed datetime string.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5838/">CVE-2017-5838 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5838">CVE-2017-5838 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1023259">SUSE bug 1023259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024051">SUSE bug 1024051</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823388" comment="clutter-gst2-2.0.18-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823389" comment="clutter-gst2-devel-2.0.18-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823390" comment="gnome-video-effects-0.4.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823391" comment="gstreamer-plugins-bad-free-0.10.23-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823392" comment="gstreamer-plugins-bad-free-devel-0.10.23-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823393" comment="gstreamer-plugins-bad-free-devel-docs-0.10.23-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823394" comment="gstreamer-plugins-good-0.10.31-13.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823395" comment="gstreamer-plugins-good-devel-docs-0.10.31-13.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823396" comment="gstreamer1-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823397" comment="gstreamer1-devel-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823398" comment="gstreamer1-devel-docs-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823399" comment="gstreamer1-plugins-bad-free-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823400" comment="gstreamer1-plugins-bad-free-devel-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823401" comment="gstreamer1-plugins-bad-free-gtk-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823402" comment="gstreamer1-plugins-base-1.10.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823403" comment="gstreamer1-plugins-base-devel-1.10.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823404" comment="gstreamer1-plugins-base-devel-docs-1.10.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823405" comment="gstreamer1-plugins-base-tools-1.10.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823406" comment="gstreamer1-plugins-good-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823407" comment="orc-0.4.26-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823408" comment="orc-compiler-0.4.26-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823409" comment="orc-devel-0.4.26-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823410" comment="orc-doc-0.4.26-1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175839" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5839</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5839" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5839" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5839" ref_url="https://www.suse.com/security/cve/CVE-2017-5839" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002807.html" source="SUSE-SU"/>
    <description>
    The gst_riff_create_audio_caps function in gst-libs/gst/riff/riff-media.c in gst-plugins-base in GStreamer before 1.10.3 does not properly limit recursion, which allows remote attackers to cause a denial of service (stack overflow and crash) via vectors involving nested WAVEFORMATEX.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5839/">CVE-2017-5839 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5839">CVE-2017-5839 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1023259">SUSE bug 1023259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024047">SUSE bug 1024047</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823388" comment="clutter-gst2-2.0.18-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823389" comment="clutter-gst2-devel-2.0.18-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823390" comment="gnome-video-effects-0.4.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823391" comment="gstreamer-plugins-bad-free-0.10.23-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823392" comment="gstreamer-plugins-bad-free-devel-0.10.23-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823393" comment="gstreamer-plugins-bad-free-devel-docs-0.10.23-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823394" comment="gstreamer-plugins-good-0.10.31-13.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823395" comment="gstreamer-plugins-good-devel-docs-0.10.31-13.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823396" comment="gstreamer1-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823397" comment="gstreamer1-devel-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823398" comment="gstreamer1-devel-docs-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823399" comment="gstreamer1-plugins-bad-free-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823400" comment="gstreamer1-plugins-bad-free-devel-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823401" comment="gstreamer1-plugins-bad-free-gtk-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823402" comment="gstreamer1-plugins-base-1.10.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823403" comment="gstreamer1-plugins-base-devel-1.10.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823404" comment="gstreamer1-plugins-base-devel-docs-1.10.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823405" comment="gstreamer1-plugins-base-tools-1.10.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823406" comment="gstreamer1-plugins-good-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823407" comment="orc-0.4.26-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823408" comment="orc-compiler-0.4.26-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823409" comment="orc-devel-0.4.26-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823410" comment="orc-doc-0.4.26-1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175840" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5840</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5840" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5840" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5840" ref_url="https://www.suse.com/security/cve/CVE-2017-5840" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1004-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1010-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002801.html" source="SUSE-SU"/>
    <description>
    The qtdemux_parse_samples function in gst/isomp4/qtdemux.c in gst-plugins-good in GStreamer before 1.10.3 allows remote attackers to cause a denial of service (out-of-bounds heap read) via vectors involving the current stts index.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5840/">CVE-2017-5840 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5840">CVE-2017-5840 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1023259">SUSE bug 1023259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024034">SUSE bug 1024034</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823388" comment="clutter-gst2-2.0.18-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823389" comment="clutter-gst2-devel-2.0.18-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823390" comment="gnome-video-effects-0.4.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823391" comment="gstreamer-plugins-bad-free-0.10.23-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823392" comment="gstreamer-plugins-bad-free-devel-0.10.23-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823393" comment="gstreamer-plugins-bad-free-devel-docs-0.10.23-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823394" comment="gstreamer-plugins-good-0.10.31-13.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823395" comment="gstreamer-plugins-good-devel-docs-0.10.31-13.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823396" comment="gstreamer1-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823397" comment="gstreamer1-devel-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823398" comment="gstreamer1-devel-docs-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823399" comment="gstreamer1-plugins-bad-free-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823400" comment="gstreamer1-plugins-bad-free-devel-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823401" comment="gstreamer1-plugins-bad-free-gtk-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823402" comment="gstreamer1-plugins-base-1.10.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823403" comment="gstreamer1-plugins-base-devel-1.10.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823404" comment="gstreamer1-plugins-base-devel-docs-1.10.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823405" comment="gstreamer1-plugins-base-tools-1.10.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823406" comment="gstreamer1-plugins-good-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823407" comment="orc-0.4.26-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823408" comment="orc-compiler-0.4.26-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823409" comment="orc-devel-0.4.26-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823410" comment="orc-doc-0.4.26-1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175841" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5841</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5841" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5841" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5841" ref_url="https://www.suse.com/security/cve/CVE-2017-5841" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1010-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002801.html" source="SUSE-SU"/>
    <description>
    The gst_avi_demux_parse_ncdt function in gst/avi/gstavidemux.c in gst-plugins-good in GStreamer before 1.10.3 allows remote attackers to cause a denial of service (out-of-bounds heap read) via vectors involving ncdt tags.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5841/">CVE-2017-5841 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5841">CVE-2017-5841 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1023259">SUSE bug 1023259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024030">SUSE bug 1024030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024062">SUSE bug 1024062</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823388" comment="clutter-gst2-2.0.18-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823389" comment="clutter-gst2-devel-2.0.18-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823390" comment="gnome-video-effects-0.4.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823391" comment="gstreamer-plugins-bad-free-0.10.23-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823392" comment="gstreamer-plugins-bad-free-devel-0.10.23-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823393" comment="gstreamer-plugins-bad-free-devel-docs-0.10.23-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823394" comment="gstreamer-plugins-good-0.10.31-13.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823395" comment="gstreamer-plugins-good-devel-docs-0.10.31-13.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823396" comment="gstreamer1-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823397" comment="gstreamer1-devel-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823398" comment="gstreamer1-devel-docs-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823399" comment="gstreamer1-plugins-bad-free-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823400" comment="gstreamer1-plugins-bad-free-devel-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823401" comment="gstreamer1-plugins-bad-free-gtk-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823402" comment="gstreamer1-plugins-base-1.10.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823403" comment="gstreamer1-plugins-base-devel-1.10.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823404" comment="gstreamer1-plugins-base-devel-docs-1.10.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823405" comment="gstreamer1-plugins-base-tools-1.10.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823406" comment="gstreamer1-plugins-good-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823407" comment="orc-0.4.26-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823408" comment="orc-compiler-0.4.26-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823409" comment="orc-devel-0.4.26-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823410" comment="orc-doc-0.4.26-1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175842" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5842</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5842" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5842" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5842" ref_url="https://www.suse.com/security/cve/CVE-2017-5842" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002807.html" source="SUSE-SU"/>
    <description>
    The html_context_handle_element function in gst/subparse/samiparse.c in gst-plugins-base in GStreamer before 1.10.3 allows remote attackers to cause a denial of service (out-of-bounds write) via a crafted SMI file, as demonstrated by OneNote_Manager.smi.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5842/">CVE-2017-5842 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5842">CVE-2017-5842 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1023259">SUSE bug 1023259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024041">SUSE bug 1024041</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823388" comment="clutter-gst2-2.0.18-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823389" comment="clutter-gst2-devel-2.0.18-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823390" comment="gnome-video-effects-0.4.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823391" comment="gstreamer-plugins-bad-free-0.10.23-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823392" comment="gstreamer-plugins-bad-free-devel-0.10.23-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823393" comment="gstreamer-plugins-bad-free-devel-docs-0.10.23-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823394" comment="gstreamer-plugins-good-0.10.31-13.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823395" comment="gstreamer-plugins-good-devel-docs-0.10.31-13.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823396" comment="gstreamer1-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823397" comment="gstreamer1-devel-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823398" comment="gstreamer1-devel-docs-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823399" comment="gstreamer1-plugins-bad-free-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823400" comment="gstreamer1-plugins-bad-free-devel-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823401" comment="gstreamer1-plugins-bad-free-gtk-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823402" comment="gstreamer1-plugins-base-1.10.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823403" comment="gstreamer1-plugins-base-devel-1.10.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823404" comment="gstreamer1-plugins-base-devel-docs-1.10.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823405" comment="gstreamer1-plugins-base-tools-1.10.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823406" comment="gstreamer1-plugins-good-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823407" comment="orc-0.4.26-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823408" comment="orc-compiler-0.4.26-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823409" comment="orc-devel-0.4.26-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823410" comment="orc-doc-0.4.26-1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175843" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5843</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5843" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5843" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5843" ref_url="https://www.suse.com/security/cve/CVE-2017-5843" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002790.html" source="SUSE-SU"/>
    <description>
    Multiple use-after-free vulnerabilities in the (1) gst_mini_object_unref, (2) gst_tag_list_unref, and (3) gst_mxf_demux_update_essence_tracks functions in GStreamer before 1.10.3 allow remote attackers to cause a denial of service (crash) via vectors involving stream tags, as demonstrated by 02785736.mxf.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5843/">CVE-2017-5843 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5843">CVE-2017-5843 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1023259">SUSE bug 1023259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024044">SUSE bug 1024044</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823388" comment="clutter-gst2-2.0.18-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823389" comment="clutter-gst2-devel-2.0.18-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823390" comment="gnome-video-effects-0.4.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823391" comment="gstreamer-plugins-bad-free-0.10.23-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823392" comment="gstreamer-plugins-bad-free-devel-0.10.23-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823393" comment="gstreamer-plugins-bad-free-devel-docs-0.10.23-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823394" comment="gstreamer-plugins-good-0.10.31-13.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823395" comment="gstreamer-plugins-good-devel-docs-0.10.31-13.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823396" comment="gstreamer1-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823397" comment="gstreamer1-devel-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823398" comment="gstreamer1-devel-docs-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823399" comment="gstreamer1-plugins-bad-free-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823400" comment="gstreamer1-plugins-bad-free-devel-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823401" comment="gstreamer1-plugins-bad-free-gtk-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823402" comment="gstreamer1-plugins-base-1.10.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823403" comment="gstreamer1-plugins-base-devel-1.10.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823404" comment="gstreamer1-plugins-base-devel-docs-1.10.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823405" comment="gstreamer1-plugins-base-tools-1.10.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823406" comment="gstreamer1-plugins-good-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823407" comment="orc-0.4.26-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823408" comment="orc-compiler-0.4.26-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823409" comment="orc-devel-0.4.26-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823410" comment="orc-doc-0.4.26-1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175844" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5844</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5844" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5844" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5844" ref_url="https://www.suse.com/security/cve/CVE-2017-5844" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002798.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002807.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005542.html" source="SUSE-SU"/>
    <description>
    The gst_riff_create_audio_caps function in gst-libs/gst/riff/riff-media.c in gst-plugins-base in GStreamer before 1.10.3 allows remote attackers to cause a denial of service (floating point exception and crash) via a crafted ASF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5844/">CVE-2017-5844 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5844">CVE-2017-5844 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1023259">SUSE bug 1023259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024079">SUSE bug 1024079</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823388" comment="clutter-gst2-2.0.18-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823389" comment="clutter-gst2-devel-2.0.18-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823390" comment="gnome-video-effects-0.4.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823391" comment="gstreamer-plugins-bad-free-0.10.23-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823392" comment="gstreamer-plugins-bad-free-devel-0.10.23-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823393" comment="gstreamer-plugins-bad-free-devel-docs-0.10.23-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823394" comment="gstreamer-plugins-good-0.10.31-13.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823395" comment="gstreamer-plugins-good-devel-docs-0.10.31-13.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823396" comment="gstreamer1-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823397" comment="gstreamer1-devel-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823398" comment="gstreamer1-devel-docs-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823399" comment="gstreamer1-plugins-bad-free-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823400" comment="gstreamer1-plugins-bad-free-devel-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823401" comment="gstreamer1-plugins-bad-free-gtk-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823402" comment="gstreamer1-plugins-base-1.10.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823403" comment="gstreamer1-plugins-base-devel-1.10.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823404" comment="gstreamer1-plugins-base-devel-docs-1.10.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823405" comment="gstreamer1-plugins-base-tools-1.10.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823406" comment="gstreamer1-plugins-good-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823407" comment="orc-0.4.26-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823408" comment="orc-compiler-0.4.26-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823409" comment="orc-devel-0.4.26-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823410" comment="orc-doc-0.4.26-1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175845" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5845</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5845" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5845" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5845" ref_url="https://www.suse.com/security/cve/CVE-2017-5845" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1010-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002801.html" source="SUSE-SU"/>
    <description>
    The gst_avi_demux_parse_ncdt function in gst/avi/gstavidemux.c in gst-plugins-good in GStreamer before 1.10.3 allows remote attackers to cause a denial of service (invalid memory read and crash) via a ncdt sub-tag that "goes behind" the surrounding tag.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5845/">CVE-2017-5845 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5845">CVE-2017-5845 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1023259">SUSE bug 1023259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024062">SUSE bug 1024062</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823388" comment="clutter-gst2-2.0.18-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823389" comment="clutter-gst2-devel-2.0.18-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823390" comment="gnome-video-effects-0.4.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823391" comment="gstreamer-plugins-bad-free-0.10.23-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823392" comment="gstreamer-plugins-bad-free-devel-0.10.23-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823393" comment="gstreamer-plugins-bad-free-devel-docs-0.10.23-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823394" comment="gstreamer-plugins-good-0.10.31-13.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823395" comment="gstreamer-plugins-good-devel-docs-0.10.31-13.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823396" comment="gstreamer1-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823397" comment="gstreamer1-devel-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823398" comment="gstreamer1-devel-docs-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823399" comment="gstreamer1-plugins-bad-free-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823400" comment="gstreamer1-plugins-bad-free-devel-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823401" comment="gstreamer1-plugins-bad-free-gtk-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823402" comment="gstreamer1-plugins-base-1.10.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823403" comment="gstreamer1-plugins-base-devel-1.10.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823404" comment="gstreamer1-plugins-base-devel-docs-1.10.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823405" comment="gstreamer1-plugins-base-tools-1.10.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823406" comment="gstreamer1-plugins-good-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823407" comment="orc-0.4.26-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823408" comment="orc-compiler-0.4.26-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823409" comment="orc-devel-0.4.26-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823410" comment="orc-doc-0.4.26-1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175848" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5848</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5848" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5848" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5848" ref_url="https://www.suse.com/security/cve/CVE-2017-5848" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002790.html" source="SUSE-SU"/>
    <description>
    The gst_ps_demux_parse_psm function in gst/mpegdemux/gstmpegdemux.c in gst-plugins-bad in GStreamer allows remote attackers to cause a denial of service (invalid memory read and crash) via vectors involving PSM parsing.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5848/">CVE-2017-5848 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5848">CVE-2017-5848 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1023259">SUSE bug 1023259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024068">SUSE bug 1024068</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823388" comment="clutter-gst2-2.0.18-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823389" comment="clutter-gst2-devel-2.0.18-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823390" comment="gnome-video-effects-0.4.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823391" comment="gstreamer-plugins-bad-free-0.10.23-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823392" comment="gstreamer-plugins-bad-free-devel-0.10.23-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823393" comment="gstreamer-plugins-bad-free-devel-docs-0.10.23-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823394" comment="gstreamer-plugins-good-0.10.31-13.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823395" comment="gstreamer-plugins-good-devel-docs-0.10.31-13.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823396" comment="gstreamer1-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823397" comment="gstreamer1-devel-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823398" comment="gstreamer1-devel-docs-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823399" comment="gstreamer1-plugins-bad-free-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823400" comment="gstreamer1-plugins-bad-free-devel-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823401" comment="gstreamer1-plugins-bad-free-gtk-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823402" comment="gstreamer1-plugins-base-1.10.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823403" comment="gstreamer1-plugins-base-devel-1.10.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823404" comment="gstreamer1-plugins-base-devel-docs-1.10.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823405" comment="gstreamer1-plugins-base-tools-1.10.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823406" comment="gstreamer1-plugins-good-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823407" comment="orc-0.4.26-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823408" comment="orc-compiler-0.4.26-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823409" comment="orc-devel-0.4.26-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823410" comment="orc-doc-0.4.26-1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175884" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5884</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5884" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5884" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5884" ref_url="https://www.suse.com/security/cve/CVE-2017-5884" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009456.html" source="SUSE-SU"/>
    <description>
    gtk-vnc before 0.7.0 does not properly check boundaries of subrectangle-containing tiles, which allows remote servers to execute arbitrary code via the src x, y coordinates in a crafted (1) rre, (2) hextile, or (3) copyrect tile.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-07"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-5884/">CVE-2017-5884 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5884">CVE-2017-5884 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1024266">SUSE bug 1024266</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823439" comment="gtk-vnc-0.7.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823440" comment="gtk-vnc-devel-0.7.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823441" comment="gtk-vnc-python-0.7.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823442" comment="gtk-vnc2-0.7.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823443" comment="gtk-vnc2-devel-0.7.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823444" comment="gvnc-0.7.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823445" comment="gvnc-devel-0.7.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823446" comment="gvnc-tools-0.7.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823447" comment="gvncpulse-0.7.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823448" comment="gvncpulse-devel-0.7.0-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175885" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5885</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5885" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5885" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5885" ref_url="https://www.suse.com/security/cve/CVE-2017-5885" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009456.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in the (1) vnc_connection_server_message and (2) vnc_color_map_set functions in gtk-vnc before 0.7.0 allow remote servers to cause a denial of service (crash) or possibly execute arbitrary code via vectors involving SetColorMapEntries, which triggers a buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-08"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-5885/">CVE-2017-5885 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5885">CVE-2017-5885 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1024268">SUSE bug 1024268</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823439" comment="gtk-vnc-0.7.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823440" comment="gtk-vnc-devel-0.7.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823441" comment="gtk-vnc-python-0.7.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823442" comment="gtk-vnc2-0.7.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823443" comment="gtk-vnc2-devel-0.7.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823444" comment="gvnc-0.7.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823445" comment="gvnc-devel-0.7.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823446" comment="gvnc-tools-0.7.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823447" comment="gvncpulse-0.7.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823448" comment="gvncpulse-devel-0.7.0-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175898" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5898</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5898" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5898" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5898" ref_url="https://www.suse.com/security/cve/CVE-2017-5898" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002669.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003814.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0707-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2DRN3D32GFDYFBOUDVFPRJRWN6TYFZJ5/#2DRN3D32GFDYFBOUDVFPRJRWN6TYFZJ5" source="SUSE-SU"/>
    <description>
    Integer overflow in the emulated_apdu_from_guest function in usb/dev-smartcard-reader.c in Quick Emulator (Qemu), when built with the CCID Card device emulator support, allows local users to cause a denial of service (application crash) via a large Application Protocol Data Units (APDU) unit.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-09-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5898/">CVE-2017-5898 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5898">CVE-2017-5898 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1023907">SUSE bug 1023907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024307">SUSE bug 1024307</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823194" comment="qemu-img-1.5.3-141.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823195" comment="qemu-kvm-1.5.3-141.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823196" comment="qemu-kvm-common-1.5.3-141.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823197" comment="qemu-kvm-tools-1.5.3-141.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175970" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5970</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5970" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5970" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5970" ref_url="https://www.suse.com/security/cve/CVE-2017-5970" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002668.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003248.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0541-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZCJVE2MEOOWP5HQROHL5VZ3DQ4SFBZYN/#ZCJVE2MEOOWP5HQROHL5VZ3DQ4SFBZYN" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0547-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PD5NFVFX6KVORZDNEZTHBV46E5OFTT6H/#PD5NFVFX6KVORZDNEZTHBV46E5OFTT6H" source="SUSE-SU"/>
    <description>
    The ipv4_pktinfo_prepare function in net/ipv4/ip_sockglue.c in the Linux kernel through 4.9.9 allows attackers to cause a denial of service (system crash) via (1) an application that makes crafted system calls or possibly (2) IPv4 traffic with invalid IP options.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5970/">CVE-2017-5970 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5970">CVE-2017-5970 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1024938">SUSE bug 1024938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025013">SUSE bug 1025013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115893">SUSE bug 1115893</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823168" comment="kernel-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823169" comment="kernel-abi-whitelists-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823170" comment="kernel-debug-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823173" comment="kernel-doc-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823174" comment="kernel-headers-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823175" comment="kernel-tools-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823176" comment="kernel-tools-libs-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823178" comment="perf-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823179" comment="python-perf-3.10.0-693.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175986" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5986</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5986" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5986" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5986" ref_url="https://www.suse.com/security/cve/CVE-2017-5986" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002668.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003248.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0541-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZCJVE2MEOOWP5HQROHL5VZ3DQ4SFBZYN/#ZCJVE2MEOOWP5HQROHL5VZ3DQ4SFBZYN" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0547-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PD5NFVFX6KVORZDNEZTHBV46E5OFTT6H/#PD5NFVFX6KVORZDNEZTHBV46E5OFTT6H" source="SUSE-SU"/>
    <description>
    Race condition in the sctp_wait_for_sndbuf function in net/sctp/socket.c in the Linux kernel before 4.9.11 allows local users to cause a denial of service (assertion failure and panic) via a multithreaded application that peels off an association in a certain buffer-full state.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5986/">CVE-2017-5986 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5986">CVE-2017-5986 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1025235">SUSE bug 1025235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027066">SUSE bug 1027066</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823048" comment="kernel-3.10.0-514.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823049" comment="kernel-abi-whitelists-3.10.0-514.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823050" comment="kernel-debug-3.10.0-514.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823053" comment="kernel-doc-3.10.0-514.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823054" comment="kernel-headers-3.10.0-514.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823055" comment="kernel-tools-3.10.0-514.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823056" comment="kernel-tools-libs-3.10.0-514.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823058" comment="perf-3.10.0-514.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823059" comment="python-perf-3.10.0-514.21.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176001" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6001</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6001" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6001" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6001" ref_url="https://www.suse.com/security/cve/CVE-2017-6001" source="SUSE CVE"/>
    <description>
    Race condition in kernel/events/core.c in the Linux kernel before 4.9.7 allows local users to gain privileges via a crafted application that makes concurrent perf_event_open system calls for moving a software group into a hardware context.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-6786.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6001/">CVE-2017-6001 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6001">CVE-2017-6001 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1015160">SUSE bug 1015160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025626">SUSE bug 1025626</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823168" comment="kernel-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823169" comment="kernel-abi-whitelists-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823170" comment="kernel-debug-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823173" comment="kernel-doc-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823174" comment="kernel-headers-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823175" comment="kernel-tools-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823176" comment="kernel-tools-libs-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823178" comment="perf-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823179" comment="python-perf-3.10.0-693.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176009" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6009</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6009" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6009" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6009" ref_url="https://www.suse.com/security/cve/CVE-2017-6009" source="SUSE CVE"/>
    <description>
    An issue was discovered in icoutils 0.31.1. A buffer overflow was observed in the "decode_ne_resource_id" function in the "restable.c" source file. This is happening because the "len" parameter for memcpy is not checked for size and thus becomes a negative integer in the process, resulting in a failed memcpy. This affects wrestool.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6009/">CVE-2017-6009 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6009">CVE-2017-6009 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1025703">SUSE bug 1025703</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822883" comment="icoutils-0.31.3-1.el7_3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176010" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6010</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6010" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6010" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6010" ref_url="https://www.suse.com/security/cve/CVE-2017-6010" source="SUSE CVE"/>
    <description>
    An issue was discovered in icoutils 0.31.1. A buffer overflow was observed in the "extract_icons" function in the "extract.c" source file. This issue can be triggered by processing a corrupted ico file and will result in an icotool crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6010/">CVE-2017-6010 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6010">CVE-2017-6010 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1025700">SUSE bug 1025700</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822883" comment="icoutils-0.31.3-1.el7_3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176011" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6011</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6011" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6011" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6011" ref_url="https://www.suse.com/security/cve/CVE-2017-6011" source="SUSE CVE"/>
    <description>
    An issue was discovered in icoutils 0.31.1. An out-of-bounds read leading to a buffer overflow was observed in the "simple_vec" function in the "extract.c" source file. This affects icotool.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6011/">CVE-2017-6011 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6011">CVE-2017-6011 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1025700">SUSE bug 1025700</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822883" comment="icoutils-0.31.3-1.el7_3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176059" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6059</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6059" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6059" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6059" ref_url="https://www.suse.com/security/cve/CVE-2017-6059" source="SUSE CVE"/>
    <description>
    Mod_auth_openidc.c in the Ping Identity OpenID Connect authentication module for Apache (aka mod_auth_openidc) before 2.14 allows remote attackers to spoof page content via a malicious URL provided to the user, which triggers an invalid request.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6059/">CVE-2017-6059 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6059">CVE-2017-6059 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826209" comment="mod_auth_openidc-1.8.8-5.el7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176074" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6074</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6074" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6074" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6074" ref_url="https://www.suse.com/security/cve/CVE-2017-6074" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002847.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003248.html" source="SUSE-SU"/>
		<reference ref_id="TID7018645" ref_url="https://www.suse.com/support/kb/doc/?id=7018645" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0541-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZCJVE2MEOOWP5HQROHL5VZ3DQ4SFBZYN/#ZCJVE2MEOOWP5HQROHL5VZ3DQ4SFBZYN" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0547-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PD5NFVFX6KVORZDNEZTHBV46E5OFTT6H/#PD5NFVFX6KVORZDNEZTHBV46E5OFTT6H" source="SUSE-SU"/>
    <description>
    The dccp_rcv_state_process function in net/dccp/input.c in the Linux kernel through 4.9.11 mishandles DCCP_PKT_REQUEST packet data structures in the LISTEN state, which allows local users to obtain root privileges or cause a denial of service (double free) via an application that makes an IPV6_RECVPKTINFO setsockopt system call.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-6074/">CVE-2017-6074 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6074">CVE-2017-6074 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1026024">SUSE bug 1026024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072204">SUSE bug 1072204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822840" comment="kernel-3.10.0-514.6.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822841" comment="kernel-abi-whitelists-3.10.0-514.6.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822842" comment="kernel-debug-3.10.0-514.6.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822845" comment="kernel-doc-3.10.0-514.6.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822846" comment="kernel-headers-3.10.0-514.6.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822847" comment="kernel-tools-3.10.0-514.6.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822848" comment="kernel-tools-libs-3.10.0-514.6.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822850" comment="perf-3.10.0-514.6.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822851" comment="python-perf-3.10.0-514.6.2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176214" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6214</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6214" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6214" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6214" ref_url="https://www.suse.com/security/cve/CVE-2017-6214" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002847.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003248.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0906-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4LKB4K2PHJZ4HXCYAGRXG6YSPVEHMLTY/#4LKB4K2PHJZ4HXCYAGRXG6YSPVEHMLTY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0907-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/53AU4WLWNJVGYTRR745YR4MG5H4LZMNQ/#53AU4WLWNJVGYTRR745YR4MG5H4LZMNQ" source="SUSE-SU"/>
    <description>
    The tcp_splice_read function in net/ipv4/tcp.c in the Linux kernel before 4.9.11 allows remote attackers to cause a denial of service (infinite loop and soft lockup) via vectors involving a TCP packet with the URG flag.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6214/">CVE-2017-6214 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6214">CVE-2017-6214 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1026722">SUSE bug 1026722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027179">SUSE bug 1027179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115893">SUSE bug 1115893</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823110" comment="kernel-3.10.0-514.26.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823111" comment="kernel-abi-whitelists-3.10.0-514.26.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823112" comment="kernel-debug-3.10.0-514.26.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823115" comment="kernel-doc-3.10.0-514.26.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823116" comment="kernel-headers-3.10.0-514.26.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823117" comment="kernel-tools-3.10.0-514.26.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823118" comment="kernel-tools-libs-3.10.0-514.26.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823120" comment="perf-3.10.0-514.26.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823121" comment="python-perf-3.10.0-514.26.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176413" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6413</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6413" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6413" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6413" ref_url="https://www.suse.com/security/cve/CVE-2017-6413" source="SUSE CVE"/>
    <description>
    The "OpenID Connect Relying Party and OAuth 2.0 Resource Server" (aka mod_auth_openidc) module before 2.1.6 for the Apache HTTP Server does not skip OIDC_CLAIM_ and OIDCAuthNHeader headers in an "AuthType oauth20" configuration, which allows remote attackers to bypass authentication via crafted HTTP traffic.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6413/">CVE-2017-6413 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6413">CVE-2017-6413 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826209" comment="mod_auth_openidc-1.8.8-5.el7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176462" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6462</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6462" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6462" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6462" ref_url="https://www.suse.com/security/cve/CVE-2017-6462" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002811.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002813.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the legacy Datum Programmable Time Server (DPTS) refclock driver in NTP before 4.2.8p10 and 4.3.x before 4.3.94 allows local users to have unspecified impact via a crafted /dev/datum device.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6462/">CVE-2017-6462 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6462">CVE-2017-6462 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1030050">SUSE bug 1030050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038049">SUSE bug 1038049</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044525">SUSE bug 1044525</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824126" comment="ntp-4.2.6p5-28.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824127" comment="ntp-doc-4.2.6p5-28.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824128" comment="ntp-perl-4.2.6p5-28.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824129" comment="ntpdate-4.2.6p5-28.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824130" comment="sntp-4.2.6p5-28.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176463" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6463</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6463" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6463" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6463" ref_url="https://www.suse.com/security/cve/CVE-2017-6463" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002811.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002813.html" source="SUSE-SU"/>
    <description>
    NTP before 4.2.8p10 and 4.3.x before 4.3.94 allows remote authenticated users to cause a denial of service (daemon crash) via an invalid setting in a :config directive, related to the unpeer option.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6463/">CVE-2017-6463 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6463">CVE-2017-6463 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1030050">SUSE bug 1030050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038049">SUSE bug 1038049</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044525">SUSE bug 1044525</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824126" comment="ntp-4.2.6p5-28.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824127" comment="ntp-doc-4.2.6p5-28.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824128" comment="ntp-perl-4.2.6p5-28.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824129" comment="ntpdate-4.2.6p5-28.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824130" comment="sntp-4.2.6p5-28.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176464" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6464</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6464" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6464" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6464" ref_url="https://www.suse.com/security/cve/CVE-2017-6464" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002811.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002813.html" source="SUSE-SU"/>
    <description>
    NTP before 4.2.8p10 and 4.3.x before 4.3.94 allows remote attackers to cause a denial of service (ntpd crash) via a malformed mode configuration directive.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6464/">CVE-2017-6464 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6464">CVE-2017-6464 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1030050">SUSE bug 1030050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038049">SUSE bug 1038049</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044525">SUSE bug 1044525</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824126" comment="ntp-4.2.6p5-28.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824127" comment="ntp-doc-4.2.6p5-28.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824128" comment="ntp-perl-4.2.6p5-28.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824129" comment="ntpdate-4.2.6p5-28.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824130" comment="sntp-4.2.6p5-28.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176519" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6519</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6519" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6519" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6519" ref_url="https://www.suse.com/security/cve/CVE-2017-6519" source="SUSE CVE"/>
    <description>
    avahi-daemon in Avahi through 0.6.32 and 0.7 inadvertently responds to IPv6 unicast queries with source addresses that are not on-link, which allows remote attackers to cause a denial of service (traffic amplification) and may cause information leakage by obtaining potentially sensitive  information from the responding device via port-5353 UDP packets.  NOTE: this may overlap CVE-2015-2809.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-6519/">CVE-2017-6519 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6519">CVE-2017-6519 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1037001">SUSE bug 1037001</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827855" comment="avahi-0.6.31-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827856" comment="avahi-autoipd-0.6.31-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827857" comment="avahi-compat-howl-0.6.31-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827858" comment="avahi-compat-howl-devel-0.6.31-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827859" comment="avahi-compat-libdns_sd-0.6.31-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827860" comment="avahi-compat-libdns_sd-devel-0.6.31-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827861" comment="avahi-devel-0.6.31-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827862" comment="avahi-dnsconfd-0.6.31-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827863" comment="avahi-glib-0.6.31-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827864" comment="avahi-glib-devel-0.6.31-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827865" comment="avahi-gobject-0.6.31-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827866" comment="avahi-gobject-devel-0.6.31-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827867" comment="avahi-libs-0.6.31-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827868" comment="avahi-qt3-0.6.31-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827869" comment="avahi-qt3-devel-0.6.31-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827870" comment="avahi-qt4-0.6.31-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827871" comment="avahi-qt4-devel-0.6.31-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827872" comment="avahi-tools-0.6.31-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827873" comment="avahi-ui-0.6.31-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827874" comment="avahi-ui-devel-0.6.31-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827875" comment="avahi-ui-gtk3-0.6.31-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827876" comment="avahi-ui-tools-0.6.31-20.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176951" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6951</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6951" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6951" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6951" ref_url="https://www.suse.com/security/cve/CVE-2017-6951" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003367.html" source="SUSE-SU"/>
    <description>
    The keyring_search_aux function in security/keys/keyring.c in the Linux kernel through 3.14.79 allows local users to cause a denial of service (NULL pointer dereference and OOPS) via a request_key system call for the "dead" type.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6951/">CVE-2017-6951 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6951">CVE-2017-6951 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1029850">SUSE bug 1029850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030593">SUSE bug 1030593</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823168" comment="kernel-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823169" comment="kernel-abi-whitelists-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823170" comment="kernel-debug-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823173" comment="kernel-doc-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823174" comment="kernel-headers-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823175" comment="kernel-tools-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823176" comment="kernel-tools-libs-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823178" comment="perf-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823179" comment="python-perf-3.10.0-693.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177184" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7184</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7184" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7184" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7184" ref_url="https://www.suse.com/security/cve/CVE-2017-7184" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0865-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0866-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0868-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0874-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002763.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0877-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002765.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0883-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0884-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0885-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002773.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002774.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002776.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003248.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0906-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4LKB4K2PHJZ4HXCYAGRXG6YSPVEHMLTY/#4LKB4K2PHJZ4HXCYAGRXG6YSPVEHMLTY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0907-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/53AU4WLWNJVGYTRR745YR4MG5H4LZMNQ/#53AU4WLWNJVGYTRR745YR4MG5H4LZMNQ" source="SUSE-SU"/>
    <description>
    The xfrm_replay_verify_len function in net/xfrm/xfrm_user.c in the Linux kernel through 4.10.6 does not validate certain size data after an XFRM_MSG_NEWAE update, which allows local users to obtain root privileges or cause a denial of service (heap-based out-of-bounds access) by leveraging the CAP_NET_ADMIN capability, as demonstrated during a Pwn2Own competition at CanSecWest 2017 for the Ubuntu 16.10 linux-image-* package 4.8.0.41.52.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7184/">CVE-2017-7184 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7184">CVE-2017-7184 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1030573">SUSE bug 1030573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030575">SUSE bug 1030575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115893">SUSE bug 1115893</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823683" comment="kernel-3.10.0-693.5.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823684" comment="kernel-abi-whitelists-3.10.0-693.5.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823685" comment="kernel-debug-3.10.0-693.5.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823688" comment="kernel-doc-3.10.0-693.5.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823689" comment="kernel-headers-3.10.0-693.5.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823690" comment="kernel-tools-3.10.0-693.5.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823691" comment="kernel-tools-libs-3.10.0-693.5.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823693" comment="perf-3.10.0-693.5.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823694" comment="python-perf-3.10.0-693.5.2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177187" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7187</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7187" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7187" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7187" ref_url="https://www.suse.com/security/cve/CVE-2017-7187" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002847.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003248.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1140-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y5XA3CLIM5GZTSS4UJWBZNQ4VSK43EYW/#Y5XA3CLIM5GZTSS4UJWBZNQ4VSK43EYW" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1215-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3ZY7NWS35KQP4O7EZNRNLOOYD4L775HU/#3ZY7NWS35KQP4O7EZNRNLOOYD4L775HU" source="SUSE-SU"/>
    <description>
    The sg_ioctl function in drivers/scsi/sg.c in the Linux kernel through 4.10.4 allows local users to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a large command size in an SG_NEXT_CMD_LEN ioctl call, leading to out-of-bounds write access in the sg_write function.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7187/">CVE-2017-7187 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7187">CVE-2017-7187 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1027179">SUSE bug 1027179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030213">SUSE bug 1030213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115893">SUSE bug 1115893</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823168" comment="kernel-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823169" comment="kernel-abi-whitelists-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823170" comment="kernel-debug-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823173" comment="kernel-doc-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823174" comment="kernel-headers-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823175" comment="kernel-tools-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823176" comment="kernel-tools-libs-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823178" comment="perf-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823179" comment="python-perf-3.10.0-693.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177207" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7207</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7207" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7207" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7207" ref_url="https://www.suse.com/security/cve/CVE-2017-7207" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1404-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003973.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1203-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q4RDKDCBAZW4Q2SPPKJEMB3SNZBXD6RO/#Q4RDKDCBAZW4Q2SPPKJEMB3SNZBXD6RO" source="SUSE-SU"/>
    <description>
    The mem_get_bits_rectangle function in Artifex Software, Inc. Ghostscript 9.20 allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted PostScript document.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7207/">CVE-2017-7207 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7207">CVE-2017-7207 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1030263">SUSE bug 1030263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036453">SUSE bug 1036453</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823416" comment="ghostscript-9.07-28.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823417" comment="ghostscript-cups-9.07-28.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823418" comment="ghostscript-devel-9.07-28.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823419" comment="ghostscript-doc-9.07-28.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823420" comment="ghostscript-gtk-9.07-28.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177294" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7294</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7294" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7294" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7294" ref_url="https://www.suse.com/security/cve/CVE-2017-7294" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002818.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002847.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003248.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1140-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y5XA3CLIM5GZTSS4UJWBZNQ4VSK43EYW/#Y5XA3CLIM5GZTSS4UJWBZNQ4VSK43EYW" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1215-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3ZY7NWS35KQP4O7EZNRNLOOYD4L775HU/#3ZY7NWS35KQP4O7EZNRNLOOYD4L775HU" source="SUSE-SU"/>
    <description>
    The vmw_surface_define_ioctl function in drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel through 4.10.6 does not validate addition of certain levels data, which allows local users to trigger an integer overflow and out-of-bounds write, and cause a denial of service (system hang or crash) or possibly gain privileges, via a crafted ioctl call for a /dev/dri/renderD* device.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-7294/">CVE-2017-7294 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7294">CVE-2017-7294 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1027179">SUSE bug 1027179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031440">SUSE bug 1031440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031481">SUSE bug 1031481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115893">SUSE bug 1115893</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824165" comment="kernel-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824166" comment="kernel-abi-whitelists-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824167" comment="kernel-debug-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824170" comment="kernel-doc-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824171" comment="kernel-headers-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824172" comment="kernel-tools-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824173" comment="kernel-tools-libs-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824175" comment="perf-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824176" comment="python-perf-3.10.0-862.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177308" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7308</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7308" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7308" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7308" ref_url="https://www.suse.com/security/cve/CVE-2017-7308" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002818.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002847.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002873.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002879.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003248.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1140-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y5XA3CLIM5GZTSS4UJWBZNQ4VSK43EYW/#Y5XA3CLIM5GZTSS4UJWBZNQ4VSK43EYW" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1215-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3ZY7NWS35KQP4O7EZNRNLOOYD4L775HU/#3ZY7NWS35KQP4O7EZNRNLOOYD4L775HU" source="SUSE-SU"/>
    <description>
    The packet_set_ring function in net/packet/af_packet.c in the Linux kernel through 4.10.6 does not properly validate certain block-size data, which allows local users to cause a denial of service (integer signedness error and out-of-bounds write), or gain privileges (if the CAP_NET_RAW capability is held), via crafted system calls.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7308/">CVE-2017-7308 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7308">CVE-2017-7308 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1027179">SUSE bug 1027179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031579">SUSE bug 1031579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031660">SUSE bug 1031660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115893">SUSE bug 1115893</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823048" comment="kernel-3.10.0-514.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823049" comment="kernel-abi-whitelists-3.10.0-514.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823050" comment="kernel-debug-3.10.0-514.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823053" comment="kernel-doc-3.10.0-514.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823054" comment="kernel-headers-3.10.0-514.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823055" comment="kernel-tools-3.10.0-514.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823056" comment="kernel-tools-libs-3.10.0-514.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823058" comment="perf-3.10.0-514.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823059" comment="python-perf-3.10.0-514.21.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177392" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7392</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7392" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7392" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7392" ref_url="https://www.suse.com/security/cve/CVE-2017-7392" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002825.html" source="SUSE-SU"/>
    <description>
    In TigerVNC 1.7.1 (SSecurityVeNCrypt.cxx SSecurityVeNCrypt::SSecurityVeNCrypt), an unauthenticated client can cause a small memory leak in the server.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7392/">CVE-2017-7392 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7392">CVE-2017-7392 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1031886">SUSE bug 1031886</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823349" comment="fltk-1.3.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823350" comment="fltk-devel-1.3.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823351" comment="fltk-fluid-1.3.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823352" comment="fltk-static-1.3.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823353" comment="tigervnc-1.8.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823354" comment="tigervnc-icons-1.8.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823355" comment="tigervnc-license-1.8.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823356" comment="tigervnc-server-1.8.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823357" comment="tigervnc-server-applet-1.8.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823358" comment="tigervnc-server-minimal-1.8.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823359" comment="tigervnc-server-module-1.8.0-1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177393" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7393</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7393" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7393" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7393" ref_url="https://www.suse.com/security/cve/CVE-2017-7393" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002825.html" source="SUSE-SU"/>
    <description>
    In TigerVNC 1.7.1 (VNCSConnectionST.cxx VNCSConnectionST::fence), an authenticated client can cause a double free, leading to denial of service or potentially code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7393/">CVE-2017-7393 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7393">CVE-2017-7393 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1031875">SUSE bug 1031875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031879">SUSE bug 1031879</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823349" comment="fltk-1.3.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823350" comment="fltk-devel-1.3.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823351" comment="fltk-fluid-1.3.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823352" comment="fltk-static-1.3.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823353" comment="tigervnc-1.8.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823354" comment="tigervnc-icons-1.8.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823355" comment="tigervnc-license-1.8.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823356" comment="tigervnc-server-1.8.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823357" comment="tigervnc-server-applet-1.8.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823358" comment="tigervnc-server-minimal-1.8.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823359" comment="tigervnc-server-module-1.8.0-1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177394" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7394</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7394" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7394" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7394" ref_url="https://www.suse.com/security/cve/CVE-2017-7394" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002825.html" source="SUSE-SU"/>
    <description>
    In TigerVNC 1.7.1 (SSecurityPlain.cxx SSecurityPlain::processMsg), unauthenticated users can crash the server by sending long usernames.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7394/">CVE-2017-7394 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7394">CVE-2017-7394 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1031879">SUSE bug 1031879</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823349" comment="fltk-1.3.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823350" comment="fltk-devel-1.3.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823351" comment="fltk-fluid-1.3.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823352" comment="fltk-static-1.3.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823353" comment="tigervnc-1.8.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823354" comment="tigervnc-icons-1.8.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823355" comment="tigervnc-license-1.8.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823356" comment="tigervnc-server-1.8.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823357" comment="tigervnc-server-applet-1.8.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823358" comment="tigervnc-server-minimal-1.8.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823359" comment="tigervnc-server-module-1.8.0-1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177395" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7395</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7395" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7395" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7395" ref_url="https://www.suse.com/security/cve/CVE-2017-7395" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002825.html" source="SUSE-SU"/>
    <description>
    In TigerVNC 1.7.1 (SMsgReader.cxx SMsgReader::readClientCutText), by causing an integer overflow, an authenticated client can crash the server.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7395/">CVE-2017-7395 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7395">CVE-2017-7395 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1031877">SUSE bug 1031877</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823349" comment="fltk-1.3.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823350" comment="fltk-devel-1.3.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823351" comment="fltk-fluid-1.3.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823352" comment="fltk-static-1.3.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823353" comment="tigervnc-1.8.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823354" comment="tigervnc-icons-1.8.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823355" comment="tigervnc-license-1.8.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823356" comment="tigervnc-server-1.8.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823357" comment="tigervnc-server-applet-1.8.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823358" comment="tigervnc-server-minimal-1.8.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823359" comment="tigervnc-server-module-1.8.0-1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177396" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7396</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7396" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7396" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7396" ref_url="https://www.suse.com/security/cve/CVE-2017-7396" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002825.html" source="SUSE-SU"/>
    <description>
    In TigerVNC 1.7.1 (CConnection.cxx CConnection::CConnection), an unauthenticated client can cause a small memory leak in the server.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7396/">CVE-2017-7396 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7396">CVE-2017-7396 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1031886">SUSE bug 1031886</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823349" comment="fltk-1.3.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823350" comment="fltk-devel-1.3.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823351" comment="fltk-fluid-1.3.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823352" comment="fltk-static-1.3.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823353" comment="tigervnc-1.8.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823354" comment="tigervnc-icons-1.8.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823355" comment="tigervnc-license-1.8.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823356" comment="tigervnc-server-1.8.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823357" comment="tigervnc-server-applet-1.8.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823358" comment="tigervnc-server-minimal-1.8.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823359" comment="tigervnc-server-module-1.8.0-1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177472" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7472</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7472" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7472" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7472" ref_url="https://www.suse.com/security/cve/CVE-2017-7472" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005476.html" source="SUSE-SU"/>
    <description>
    The KEYS subsystem in the Linux kernel before 4.10.13 allows local users to cause a denial of service (memory consumption) via a series of KEY_REQKEY_DEFL_THREAD_KEYRING keyctl_set_reqkey_keyring calls.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7472/">CVE-2017-7472 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7472">CVE-2017-7472 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1034862">SUSE bug 1034862</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823952" comment="kernel-3.10.0-693.17.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823953" comment="kernel-abi-whitelists-3.10.0-693.17.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823954" comment="kernel-debug-3.10.0-693.17.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823957" comment="kernel-doc-3.10.0-693.17.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823958" comment="kernel-headers-3.10.0-693.17.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823959" comment="kernel-tools-3.10.0-693.17.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823960" comment="kernel-tools-libs-3.10.0-693.17.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823962" comment="perf-3.10.0-693.17.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823963" comment="python-perf-3.10.0-693.17.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177477" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7477</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7477" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7477" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7477" ref_url="https://www.suse.com/security/cve/CVE-2017-7477" source="SUSE CVE"/>
    <description>
    Heap-based buffer overflow in drivers/net/macsec.c in the MACsec module in the Linux kernel through 4.10.12 allows attackers to cause a denial of service or possibly have unspecified other impact by leveraging the use of a MAX_SKB_FRAGS+1 size in conjunction with the NETIF_F_FRAGLIST feature, leading to an error in the skb_to_sgvec function.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7477/">CVE-2017-7477 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7477">CVE-2017-7477 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1035823">SUSE bug 1035823</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823110" comment="kernel-3.10.0-514.26.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823111" comment="kernel-abi-whitelists-3.10.0-514.26.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823112" comment="kernel-debug-3.10.0-514.26.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823115" comment="kernel-doc-3.10.0-514.26.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823116" comment="kernel-headers-3.10.0-514.26.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823117" comment="kernel-tools-3.10.0-514.26.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823118" comment="kernel-tools-libs-3.10.0-514.26.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823120" comment="perf-3.10.0-514.26.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823121" comment="python-perf-3.10.0-514.26.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7484</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7484" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7484" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7484" ref_url="https://www.suse.com/security/cve/CVE-2017-7484" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003010.html" source="SUSE-SU"/>
    <description>
    It was found that some selectivity estimation functions in PostgreSQL before 9.2.21, 9.3.x before 9.3.17, 9.4.x before 9.4.12, 9.5.x before 9.5.7, and 9.6.x before 9.6.3 did not check user privileges before providing information from pg_statistic, possibly leaking information. An unprivileged attacker could use this flaw to steal some information from tables they are otherwise not allowed to access.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7484/">CVE-2017-7484 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7484">CVE-2017-7484 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1037603">SUSE bug 1037603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051015">SUSE bug 1051015</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823337" comment="postgresql-9.2.21-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823338" comment="postgresql-contrib-9.2.21-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823339" comment="postgresql-devel-9.2.21-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823340" comment="postgresql-docs-9.2.21-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823341" comment="postgresql-libs-9.2.21-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823342" comment="postgresql-plperl-9.2.21-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823343" comment="postgresql-plpython-9.2.21-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823344" comment="postgresql-pltcl-9.2.21-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823345" comment="postgresql-server-9.2.21-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823346" comment="postgresql-static-9.2.21-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823347" comment="postgresql-test-9.2.21-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823348" comment="postgresql-upgrade-9.2.21-1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177486" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7486</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7486" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7486" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7486" ref_url="https://www.suse.com/security/cve/CVE-2017-7486" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003010.html" source="SUSE-SU"/>
    <description>
    PostgreSQL versions 8.4 - 9.6 are vulnerable to information leak in pg_user_mappings view which discloses foreign server passwords to any user having USAGE privilege on the associated foreign server.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7486/">CVE-2017-7486 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7486">CVE-2017-7486 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1037624">SUSE bug 1037624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051015">SUSE bug 1051015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051685">SUSE bug 1051685</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823337" comment="postgresql-9.2.21-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823338" comment="postgresql-contrib-9.2.21-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823339" comment="postgresql-devel-9.2.21-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823340" comment="postgresql-docs-9.2.21-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823341" comment="postgresql-libs-9.2.21-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823342" comment="postgresql-plperl-9.2.21-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823343" comment="postgresql-plpython-9.2.21-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823344" comment="postgresql-pltcl-9.2.21-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823345" comment="postgresql-server-9.2.21-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823346" comment="postgresql-static-9.2.21-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823347" comment="postgresql-test-9.2.21-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823348" comment="postgresql-upgrade-9.2.21-1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177488" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7488</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7488" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7488" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7488" ref_url="https://www.suse.com/security/cve/CVE-2017-7488" source="SUSE CVE"/>
    <description>
    Authconfig version 6.2.8 is vulnerable to an Information exposure while using SSSD to authenticate against remote server resulting in the leak of information about existing usernames.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7488/">CVE-2017-7488 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7488">CVE-2017-7488 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823449" comment="authconfig-6.2.8-30.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823450" comment="authconfig-gtk-6.2.8-30.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7494</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7494" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7494" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7494" ref_url="https://www.suse.com/security/cve/CVE-2017-7494" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1400-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002920.html" source="SUSE-SU"/>
		<reference ref_id="TID7014420" ref_url="https://www.suse.com/support/kb/doc/?id=7014420" source="SUSE-SU"/>
		<reference ref_id="TID7017947" ref_url="https://www.suse.com/support/kb/doc/?id=7017947" source="SUSE-SU"/>
		<reference ref_id="TID7019508" ref_url="https://www.suse.com/support/kb/doc/?id=7019508" source="SUSE-SU"/>
		<reference ref_id="TID7021068" ref_url="https://www.suse.com/support/kb/doc/?id=7021068" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1401-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PZMYSIIJRYOZQFBTHTCI7RALXT3NGNYN/#PZMYSIIJRYOZQFBTHTCI7RALXT3NGNYN" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1415-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IKW5ZXKMNC6BW76JIOIKEM3WR4C2PJOB/#IKW5ZXKMNC6BW76JIOIKEM3WR4C2PJOB" source="SUSE-SU"/>
    <description>
    Samba since version 3.5.0 and before 4.6.4, 4.5.10 and 4.4.14 is vulnerable to remote code execution vulnerability, allowing a malicious client to upload a shared library to a writable share, and then cause the server to load and execute it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7494/">CVE-2017-7494 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7494">CVE-2017-7494 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1038231">SUSE bug 1038231</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823022" comment="ctdb-4.4.4-14.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823023" comment="ctdb-tests-4.4.4-14.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823024" comment="libsmbclient-4.4.4-14.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823025" comment="libsmbclient-devel-4.4.4-14.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823026" comment="libwbclient-4.4.4-14.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823027" comment="libwbclient-devel-4.4.4-14.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823028" comment="samba-4.4.4-14.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823029" comment="samba-client-4.4.4-14.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823030" comment="samba-client-libs-4.4.4-14.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823031" comment="samba-common-4.4.4-14.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823032" comment="samba-common-libs-4.4.4-14.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823033" comment="samba-common-tools-4.4.4-14.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823034" comment="samba-dc-4.4.4-14.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823035" comment="samba-dc-libs-4.4.4-14.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823036" comment="samba-devel-4.4.4-14.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823037" comment="samba-krb5-printing-4.4.4-14.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823038" comment="samba-libs-4.4.4-14.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823039" comment="samba-pidl-4.4.4-14.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823040" comment="samba-python-4.4.4-14.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823041" comment="samba-test-4.4.4-14.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823042" comment="samba-test-libs-4.4.4-14.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823043" comment="samba-vfs-glusterfs-4.4.4-14.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823044" comment="samba-winbind-4.4.4-14.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823045" comment="samba-winbind-clients-4.4.4-14.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823046" comment="samba-winbind-krb5-locator-4.4.4-14.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823047" comment="samba-winbind-modules-4.4.4-14.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177502" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7502</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7502" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7502" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7502" ref_url="https://www.suse.com/security/cve/CVE-2017-7502" source="SUSE CVE"/>
    <description>
    Null pointer dereference vulnerability in NSS since 3.24.0 was found when server receives empty SSLv2 messages resulting into denial of service by remote attacker.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7502/">CVE-2017-7502 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7502">CVE-2017-7502 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1041603">SUSE bug 1041603</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823060" comment="nss-3.28.4-1.2.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823061" comment="nss-devel-3.28.4-1.2.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823062" comment="nss-pkcs11-devel-3.28.4-1.2.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823063" comment="nss-sysinit-3.28.4-1.2.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823064" comment="nss-tools-3.28.4-1.2.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177506" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7506</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7506" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7506" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7506" ref_url="https://www.suse.com/security/cve/CVE-2017-7506" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2552-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003257.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1843-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YM3WCLNCV4V4XHV7NKDPE6HQZKUYPFLW/#YM3WCLNCV4V4XHV7NKDPE6HQZKUYPFLW" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2604-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VMHO7G3VMF2PVMOPV4TS45MAKTEHU2LJ/#VMHO7G3VMF2PVMOPV4TS45MAKTEHU2LJ" source="SUSE-SU"/>
    <description>
    spice versions though 0.13 are vulnerable to out-of-bounds memory access when processing specially crafted messages from authenticated attacker to the spice server resulting into crash and/or server memory leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-7506/">CVE-2017-7506 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7506">CVE-2017-7506 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1046779">SUSE bug 1046779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047730">SUSE bug 1047730</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823525" comment="spice-server-0.12.8-2.el7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823526" comment="spice-server-devel-0.12.8-2.el7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177507" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7507</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7507" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7507" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7507" ref_url="https://www.suse.com/security/cve/CVE-2017-7507" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003024.html" source="SUSE-SU"/>
    <description>
    GnuTLS version 3.5.12 and earlier is vulnerable to a NULL pointer dereference while decoding a status response TLS extension with valid contents. This could lead to a crash of the GnuTLS server application.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7507/">CVE-2017-7507 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7507">CVE-2017-7507 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1043398">SUSE bug 1043398</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823451" comment="gnutls-3.3.26-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823452" comment="gnutls-c++-3.3.26-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823453" comment="gnutls-dane-3.3.26-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823454" comment="gnutls-devel-3.3.26-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823455" comment="gnutls-utils-3.3.26-9.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177518" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7518</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7518" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7518" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7518" ref_url="https://www.suse.com/security/cve/CVE-2017-7518" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2956-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003385.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1825-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KW47RCHHHHDDR7LCVS6ZII5VWGZMWXVK/#KW47RCHHHHDDR7LCVS6ZII5VWGZMWXVK" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel before version 4.12 in the way the KVM module processed the trap flag(TF) bit in EFLAGS during emulation of the syscall instruction, which leads to a debug exception(#DB) being raised in the guest stack. A user/process inside a guest could use this flaw to potentially escalate their privileges inside the guest. Linux guests are not affected by this.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7518/">CVE-2017-7518 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7518">CVE-2017-7518 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1045922">SUSE bug 1045922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824015" comment="kernel-3.10.0-693.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824016" comment="kernel-abi-whitelists-3.10.0-693.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824017" comment="kernel-debug-3.10.0-693.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824020" comment="kernel-doc-3.10.0-693.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824021" comment="kernel-headers-3.10.0-693.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824022" comment="kernel-tools-3.10.0-693.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824023" comment="kernel-tools-libs-3.10.0-693.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824025" comment="perf-3.10.0-693.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824026" comment="python-perf-3.10.0-693.21.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177533" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7533</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7533" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7533" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7533" ref_url="https://www.suse.com/security/cve/CVE-2017-7533" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2042-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003108.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2099-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2956-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003385.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JUR4JGJYESLTC7RDIOY2YLFJ2BM6INRK/#JUR4JGJYESLTC7RDIOY2YLFJ2BM6INRK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2112-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CYYVH5QN4AXO6QRCXNNNBJTZ5ITWPYYI/#CYYVH5QN4AXO6QRCXNNNBJTZ5ITWPYYI" source="SUSE-SU"/>
    <description>
    Race condition in the fsnotify implementation in the Linux kernel through 4.12.4 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted application that leverages simultaneous execution of the inotify_handle_event and vfs_rename functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7533/">CVE-2017-7533 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7533">CVE-2017-7533 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1049483">SUSE bug 1049483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050677">SUSE bug 1050677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050751">SUSE bug 1050751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053919">SUSE bug 1053919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823527" comment="kernel-3.10.0-693.1.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823528" comment="kernel-abi-whitelists-3.10.0-693.1.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823529" comment="kernel-debug-3.10.0-693.1.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823532" comment="kernel-doc-3.10.0-693.1.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823533" comment="kernel-headers-3.10.0-693.1.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823534" comment="kernel-tools-3.10.0-693.1.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823535" comment="kernel-tools-libs-3.10.0-693.1.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823537" comment="perf-3.10.0-693.1.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823538" comment="python-perf-3.10.0-693.1.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177537" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7537</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7537" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7537" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7537" ref_url="https://www.suse.com/security/cve/CVE-2017-7537" source="SUSE CVE"/>
    <description>
    It was found that a mock CMC authentication plugin with a hardcoded secret was accidentally enabled by default in the pki-core package before 10.6.4. An attacker could potentially use this flaw to bypass the regular authentication process and trick the CA server into issuing certificates.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7537/">CVE-2017-7537 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7537">CVE-2017-7537 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823482" comment="pki-base-10.4.1-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823483" comment="pki-base-java-10.4.1-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823484" comment="pki-ca-10.4.1-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823485" comment="pki-javadoc-10.4.1-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823486" comment="pki-kra-10.4.1-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823487" comment="pki-server-10.4.1-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823488" comment="pki-symkey-10.4.1-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823489" comment="pki-tools-10.4.1-11.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7541</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7541" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7541" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7541" ref_url="https://www.suse.com/security/cve/CVE-2017-7541" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2956-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003385.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JUR4JGJYESLTC7RDIOY2YLFJ2BM6INRK/#JUR4JGJYESLTC7RDIOY2YLFJ2BM6INRK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2112-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CYYVH5QN4AXO6QRCXNNNBJTZ5ITWPYYI/#CYYVH5QN4AXO6QRCXNNNBJTZ5ITWPYYI" source="SUSE-SU"/>
    <description>
    The brcmf_cfg80211_mgmt_tx function in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux kernel before 4.12.3 allows local users to cause a denial of service (buffer overflow and system crash) or possibly gain privileges via a crafted NL80211_CMD_FRAME Netlink packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7541/">CVE-2017-7541 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7541">CVE-2017-7541 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1049645">SUSE bug 1049645</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823683" comment="kernel-3.10.0-693.5.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823684" comment="kernel-abi-whitelists-3.10.0-693.5.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823685" comment="kernel-debug-3.10.0-693.5.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823688" comment="kernel-doc-3.10.0-693.5.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823689" comment="kernel-headers-3.10.0-693.5.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823690" comment="kernel-tools-3.10.0-693.5.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823691" comment="kernel-tools-libs-3.10.0-693.5.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823693" comment="perf-3.10.0-693.5.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823694" comment="python-perf-3.10.0-693.5.2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177542" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7542</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7542" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7542" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7542" ref_url="https://www.suse.com/security/cve/CVE-2017-7542" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2956-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003385.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JUR4JGJYESLTC7RDIOY2YLFJ2BM6INRK/#JUR4JGJYESLTC7RDIOY2YLFJ2BM6INRK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2112-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CYYVH5QN4AXO6QRCXNNNBJTZ5ITWPYYI/#CYYVH5QN4AXO6QRCXNNNBJTZ5ITWPYYI" source="SUSE-SU"/>
    <description>
    The ip6_find_1stfragopt function in net/ipv6/output_core.c in the Linux kernel through 4.12.3 allows local users to cause a denial of service (integer overflow and infinite loop) by leveraging the ability to open a raw socket.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7542/">CVE-2017-7542 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7542">CVE-2017-7542 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1049882">SUSE bug 1049882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061936">SUSE bug 1061936</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823683" comment="kernel-3.10.0-693.5.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823684" comment="kernel-abi-whitelists-3.10.0-693.5.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823685" comment="kernel-debug-3.10.0-693.5.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823688" comment="kernel-doc-3.10.0-693.5.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823689" comment="kernel-headers-3.10.0-693.5.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823690" comment="kernel-tools-3.10.0-693.5.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823691" comment="kernel-tools-libs-3.10.0-693.5.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823693" comment="perf-3.10.0-693.5.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823694" comment="python-perf-3.10.0-693.5.2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177546" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7546</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7546" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7546" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7546" ref_url="https://www.suse.com/security/cve/CVE-2017-7546" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2356-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003188.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2306-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7FH5WC5Y3VRGIOZ537X7IEOALECXWO63/#7FH5WC5Y3VRGIOZ537X7IEOALECXWO63" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2391-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H5EFKEJDINR22D5Q4FO3R2BBKY6H7ETV/#H5EFKEJDINR22D5Q4FO3R2BBKY6H7ETV" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2392-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H5CFMQTMOF6G23UIT4HI3IG3ZKHCIQ2N/#H5CFMQTMOF6G23UIT4HI3IG3ZKHCIQ2N" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0529-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TYBFSUDWFOVYYUDTUW6UU725UCACZWEW/#TYBFSUDWFOVYYUDTUW6UU725UCACZWEW" source="SUSE-SU"/>
    <description>
    PostgreSQL versions before 9.2.22, 9.3.18, 9.4.13, 9.5.8 and 9.6.4 are vulnerable to incorrect authentication flaw allowing remote attackers to gain access to database accounts with an empty password.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7546/">CVE-2017-7546 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7546">CVE-2017-7546 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1051684">SUSE bug 1051684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054365">SUSE bug 1054365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140876">SUSE bug 1140876</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823618" comment="postgresql-9.2.23-1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823619" comment="postgresql-contrib-9.2.23-1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823620" comment="postgresql-devel-9.2.23-1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823621" comment="postgresql-docs-9.2.23-1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823622" comment="postgresql-libs-9.2.23-1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823623" comment="postgresql-plperl-9.2.23-1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823624" comment="postgresql-plpython-9.2.23-1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823625" comment="postgresql-pltcl-9.2.23-1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823626" comment="postgresql-server-9.2.23-1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823627" comment="postgresql-static-9.2.23-1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823628" comment="postgresql-test-9.2.23-1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823629" comment="postgresql-upgrade-9.2.23-1.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7547</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7547" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7547" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7547" ref_url="https://www.suse.com/security/cve/CVE-2017-7547" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2356-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003188.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2306-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7FH5WC5Y3VRGIOZ537X7IEOALECXWO63/#7FH5WC5Y3VRGIOZ537X7IEOALECXWO63" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2391-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H5EFKEJDINR22D5Q4FO3R2BBKY6H7ETV/#H5EFKEJDINR22D5Q4FO3R2BBKY6H7ETV" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2392-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H5CFMQTMOF6G23UIT4HI3IG3ZKHCIQ2N/#H5CFMQTMOF6G23UIT4HI3IG3ZKHCIQ2N" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0529-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TYBFSUDWFOVYYUDTUW6UU725UCACZWEW/#TYBFSUDWFOVYYUDTUW6UU725UCACZWEW" source="SUSE-SU"/>
    <description>
    PostgreSQL versions before 9.2.22, 9.3.18, 9.4.13, 9.5.8 and 9.6.4 are vulnerable to authorization flaw allowing remote authenticated attackers to retrieve passwords from the user mappings defined by the foreign server owners without actually having the privileges to do so.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7547/">CVE-2017-7547 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7547">CVE-2017-7547 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1051685">SUSE bug 1051685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054365">SUSE bug 1054365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140876">SUSE bug 1140876</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823618" comment="postgresql-9.2.23-1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823619" comment="postgresql-contrib-9.2.23-1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823620" comment="postgresql-devel-9.2.23-1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823621" comment="postgresql-docs-9.2.23-1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823622" comment="postgresql-libs-9.2.23-1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823623" comment="postgresql-plperl-9.2.23-1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823624" comment="postgresql-plpython-9.2.23-1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823625" comment="postgresql-pltcl-9.2.23-1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823626" comment="postgresql-server-9.2.23-1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823627" comment="postgresql-static-9.2.23-1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823628" comment="postgresql-test-9.2.23-1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823629" comment="postgresql-upgrade-9.2.23-1.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7555</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7555" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7555" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7555" ref_url="https://www.suse.com/security/cve/CVE-2017-7555" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0650-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0653-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003801.html" source="SUSE-SU"/>
    <description>
    Augeas versions up to and including 1.8.0 are vulnerable to heap-based buffer overflow due to improper handling of escaped strings. Attacker could send crafted strings that would cause the application using augeas to copy past the end of a buffer, leading to a crash or possible code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7555/">CVE-2017-7555 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7555">CVE-2017-7555 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1054171">SUSE bug 1054171</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823636" comment="augeas-1.4.0-2.el7_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823637" comment="augeas-devel-1.4.0-2.el7_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823638" comment="augeas-libs-1.4.0-2.el7_4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177558" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7558</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7558" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7558" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7558" ref_url="https://www.suse.com/security/cve/CVE-2017-7558" source="SUSE CVE"/>
    <description>
    A kernel data leak due to an out-of-bound read was found in the Linux kernel in inet_diag_msg_sctp{,l}addr_fill() and sctp_get_sctp_info() functions present since version 4.7-rc1 through version 4.13. A data leak happens when these functions fill in sockaddr data structures used to export socket's diagnostic information. As a result, up to 100 bytes of the slab data could be leaked to a userspace.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7558/">CVE-2017-7558 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7558">CVE-2017-7558 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1053919">SUSE bug 1053919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055300">SUSE bug 1055300</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823683" comment="kernel-3.10.0-693.5.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823684" comment="kernel-abi-whitelists-3.10.0-693.5.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823685" comment="kernel-debug-3.10.0-693.5.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823688" comment="kernel-doc-3.10.0-693.5.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823689" comment="kernel-headers-3.10.0-693.5.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823690" comment="kernel-tools-3.10.0-693.5.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823691" comment="kernel-tools-libs-3.10.0-693.5.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823693" comment="perf-3.10.0-693.5.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823694" comment="python-perf-3.10.0-693.5.2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177562" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7562</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7562" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7562" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7562" ref_url="https://www.suse.com/security/cve/CVE-2017-7562" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1425-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004088.html" source="SUSE-SU"/>
    <description>
    An authentication bypass flaw was found in the way krb5's certauth interface before 1.16.1 handled the validation of client certificates. A remote attacker able to communicate with the KDC could potentially use this flaw to impersonate arbitrary principals under rare and erroneous circumstances.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-7562/">CVE-2017-7562 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7562">CVE-2017-7562 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1055851">SUSE bug 1055851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056995">SUSE bug 1056995</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824068" comment="krb5-devel-1.15.1-18.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824069" comment="krb5-libs-1.15.1-18.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824070" comment="krb5-pkinit-1.15.1-18.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824071" comment="krb5-server-1.15.1-18.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824072" comment="krb5-server-ldap-1.15.1-18.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824073" comment="krb5-workstation-1.15.1-18.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824074" comment="libkadm5-1.15.1-18.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177616" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7616</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7616" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7616" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7616" ref_url="https://www.suse.com/security/cve/CVE-2017-7616" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003248.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1140-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y5XA3CLIM5GZTSS4UJWBZNQ4VSK43EYW/#Y5XA3CLIM5GZTSS4UJWBZNQ4VSK43EYW" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1215-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3ZY7NWS35KQP4O7EZNRNLOOYD4L775HU/#3ZY7NWS35KQP4O7EZNRNLOOYD4L775HU" source="SUSE-SU"/>
    <description>
    Incorrect error handling in the set_mempolicy and mbind compat syscalls in mm/mempolicy.c in the Linux kernel through 4.10.9 allows local users to obtain sensitive information from uninitialized stack data by triggering failure of a certain bitmap operation.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7616/">CVE-2017-7616 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7616">CVE-2017-7616 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1033336">SUSE bug 1033336</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823168" comment="kernel-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823169" comment="kernel-abi-whitelists-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823170" comment="kernel-debug-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823173" comment="kernel-doc-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823174" comment="kernel-headers-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823175" comment="kernel-tools-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823176" comment="kernel-tools-libs-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823178" comment="perf-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823179" comment="python-perf-3.10.0-693.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177645" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7645</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7645" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7645" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7645" ref_url="https://www.suse.com/security/cve/CVE-2017-7645" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2099-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003233.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003312.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1513-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OJPCJK74NZCBK4RODZ6N44CRQEQUWPUA/#OJPCJK74NZCBK4RODZ6N44CRQEQUWPUA" source="SUSE-SU"/>
    <description>
    The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel through 4.10.11 allows remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7645/">CVE-2017-7645 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7645">CVE-2017-7645 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1034670">SUSE bug 1034670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036741">SUSE bug 1036741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046191">SUSE bug 1046191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823110" comment="kernel-3.10.0-514.26.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823111" comment="kernel-abi-whitelists-3.10.0-514.26.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823112" comment="kernel-debug-3.10.0-514.26.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823115" comment="kernel-doc-3.10.0-514.26.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823116" comment="kernel-headers-3.10.0-514.26.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823117" comment="kernel-tools-3.10.0-514.26.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823118" comment="kernel-tools-libs-3.10.0-514.26.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823120" comment="perf-3.10.0-514.26.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823121" comment="python-perf-3.10.0-514.26.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177668" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7668</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7668" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7668" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7668" ref_url="https://www.suse.com/security/cve/CVE-2017-7668" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003365.html" source="SUSE-SU"/>
    <description>
    The HTTP strict parsing changes added in Apache httpd 2.2.32 and 2.4.24 introduced a bug in token list parsing, which allows ap_find_token() to search past the end of its input string. By maliciously crafting a sequence of request headers, an attacker may be able to cause a segmentation fault, or to force ap_find_token() to return an incorrect value.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7668/">CVE-2017-7668 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7668">CVE-2017-7668 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1045061">SUSE bug 1045061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078450">SUSE bug 1078450</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823539" comment="httpd-2.4.6-67.el7_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823540" comment="httpd-devel-2.4.6-67.el7_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823541" comment="httpd-manual-2.4.6-67.el7_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823542" comment="httpd-tools-2.4.6-67.el7_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823543" comment="mod_ldap-2.4.6-67.el7_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823544" comment="mod_proxy_html-2.4.6-67.el7_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823545" comment="mod_session-2.4.6-67.el7_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823546" comment="mod_ssl-2.4.6-67.el7_4.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177674" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7674</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7674" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7674" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7674" ref_url="https://www.suse.com/security/cve/CVE-2017-7674" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003401.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003405.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003493.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3069-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BYU6XHQ5M6CAKKV2C7V5ALDR52LMF42Y/#BYU6XHQ5M6CAKKV2C7V5ALDR52LMF42Y" source="SUSE-SU"/>
    <description>
    The CORS Filter in Apache Tomcat 9.0.0.M1 to 9.0.0.M21, 8.5.0 to 8.5.15, 8.0.0.RC1 to 8.0.44 and 7.0.41 to 7.0.78 did not add an HTTP Vary header indicating that the response varies depending on Origin. This permitted client and server side cache poisoning in some circumstances.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7674/">CVE-2017-7674 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7674">CVE-2017-7674 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1053352">SUSE bug 1053352</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823712" comment="tomcat-7.0.76-3.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823713" comment="tomcat-admin-webapps-7.0.76-3.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823714" comment="tomcat-docs-webapp-7.0.76-3.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823715" comment="tomcat-el-2.2-api-7.0.76-3.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823716" comment="tomcat-javadoc-7.0.76-3.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823717" comment="tomcat-jsp-2.2-api-7.0.76-3.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823718" comment="tomcat-jsvc-7.0.76-3.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823719" comment="tomcat-lib-7.0.76-3.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823720" comment="tomcat-servlet-3.0-api-7.0.76-3.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823721" comment="tomcat-webapps-7.0.76-3.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177679" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7679</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7679" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7679" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7679" ref_url="https://www.suse.com/security/cve/CVE-2017-7679" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003365.html" source="SUSE-SU"/>
    <description>
    In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26, mod_mime can read one byte past the end of a buffer when sending a malicious Content-Type response header.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7679/">CVE-2017-7679 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7679">CVE-2017-7679 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1045060">SUSE bug 1045060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057861">SUSE bug 1057861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078450">SUSE bug 1078450</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823539" comment="httpd-2.4.6-67.el7_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823540" comment="httpd-devel-2.4.6-67.el7_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823541" comment="httpd-manual-2.4.6-67.el7_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823542" comment="httpd-tools-2.4.6-67.el7_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823543" comment="mod_ldap-2.4.6-67.el7_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823544" comment="mod_proxy_html-2.4.6-67.el7_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823545" comment="mod_session-2.4.6-67.el7_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823546" comment="mod_ssl-2.4.6-67.el7_4.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177718" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7718</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7718" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7718" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7718" ref_url="https://www.suse.com/security/cve/CVE-2017-7718" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002839.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2963-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003413.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1221-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y3SM4YGHLBBO6LNMEEBDE5RB6Z7CLMY2/#Y3SM4YGHLBBO6LNMEEBDE5RB6Z7CLMY2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1872-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7XMS3TZG4TGPXHU4UGQT3AV4WTRA3LLN/#7XMS3TZG4TGPXHU4UGQT3AV4WTRA3LLN" source="SUSE-SU"/>
    <description>
    hw/display/cirrus_vga_rop.h in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (out-of-bounds read and QEMU process crash) via vectors related to copying VGA data via the cirrus_bitblt_rop_fwd_transp_ and cirrus_bitblt_rop_fwd_ functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-09-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7718/">CVE-2017-7718 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7718">CVE-2017-7718 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1034908">SUSE bug 1034908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034994">SUSE bug 1034994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823067" comment="qemu-img-1.5.3-126.el7_3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823068" comment="qemu-kvm-1.5.3-126.el7_3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823069" comment="qemu-kvm-common-1.5.3-126.el7_3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823070" comment="qemu-kvm-tools-1.5.3-126.el7_3.9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177749" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7749</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7749" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7749" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7749" ref_url="https://www.suse.com/security/cve/CVE-2017-7749" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003150.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1620-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K6OIAMV5WWMMRZDYBFOTBIXVUYEDMZQI/#K6OIAMV5WWMMRZDYBFOTBIXVUYEDMZQI" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability when using an incorrect URL during the reloading of a docshell. This results in a potentially exploitable crash. This vulnerability affects Firefox &lt; 54, Firefox ESR &lt; 52.2, and Thunderbird &lt; 52.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7749/">CVE-2017-7749 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7749">CVE-2017-7749 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1043960">SUSE bug 1043960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044239">SUSE bug 1044239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044240">SUSE bug 1044240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044241">SUSE bug 1044241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044242">SUSE bug 1044242</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823071" comment="firefox-52.2.0-1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823091" comment="thunderbird-52.2.0-1.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177750" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7750</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7750" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7750" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7750" ref_url="https://www.suse.com/security/cve/CVE-2017-7750" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003150.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1620-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K6OIAMV5WWMMRZDYBFOTBIXVUYEDMZQI/#K6OIAMV5WWMMRZDYBFOTBIXVUYEDMZQI" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability during video control operations when a "&lt;track&gt;" element holds a reference to an older window if that window has been replaced in the DOM. This results in a potentially exploitable crash. This vulnerability affects Firefox &lt; 54, Firefox ESR &lt; 52.2, and Thunderbird &lt; 52.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7750/">CVE-2017-7750 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7750">CVE-2017-7750 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1043960">SUSE bug 1043960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044239">SUSE bug 1044239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044240">SUSE bug 1044240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044241">SUSE bug 1044241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044242">SUSE bug 1044242</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823071" comment="firefox-52.2.0-1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823091" comment="thunderbird-52.2.0-1.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177751" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7751</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7751" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7751" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7751" ref_url="https://www.suse.com/security/cve/CVE-2017-7751" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003150.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1620-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K6OIAMV5WWMMRZDYBFOTBIXVUYEDMZQI/#K6OIAMV5WWMMRZDYBFOTBIXVUYEDMZQI" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability with content viewer listeners that results in a potentially exploitable crash. This vulnerability affects Firefox &lt; 54, Firefox ESR &lt; 52.2, and Thunderbird &lt; 52.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7751/">CVE-2017-7751 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7751">CVE-2017-7751 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1043960">SUSE bug 1043960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044239">SUSE bug 1044239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044240">SUSE bug 1044240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044241">SUSE bug 1044241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044242">SUSE bug 1044242</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823071" comment="firefox-52.2.0-1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823091" comment="thunderbird-52.2.0-1.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177752" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7752</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7752" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7752" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7752" ref_url="https://www.suse.com/security/cve/CVE-2017-7752" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003150.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1620-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K6OIAMV5WWMMRZDYBFOTBIXVUYEDMZQI/#K6OIAMV5WWMMRZDYBFOTBIXVUYEDMZQI" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability during specific user interactions with the input method editor (IME) in some languages due to how events are handled. This results in a potentially exploitable crash but would require specific user interaction to trigger. This vulnerability affects Firefox &lt; 54, Firefox ESR &lt; 52.2, and Thunderbird &lt; 52.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7752/">CVE-2017-7752 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7752">CVE-2017-7752 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1043960">SUSE bug 1043960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044239">SUSE bug 1044239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044240">SUSE bug 1044240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044241">SUSE bug 1044241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044242">SUSE bug 1044242</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823071" comment="firefox-52.2.0-1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823091" comment="thunderbird-52.2.0-1.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177753" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7753</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7753" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7753" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7753" ref_url="https://www.suse.com/security/cve/CVE-2017-7753" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003261.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2151-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3SQR643E2Y2QAE5DFDYOHYQAVVK2XRPW/#3SQR643E2Y2QAE5DFDYOHYQAVVK2XRPW" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2209-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IJOETQICPAUKQMIRZDYIIRKRSWKSIMF5/#IJOETQICPAUKQMIRZDYIIRKRSWKSIMF5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    An out-of-bounds read occurs when applying style rules to pseudo-elements, such as ::first-line, using cached style data. This vulnerability affects Thunderbird &lt; 52.3, Firefox ESR &lt; 52.3, and Firefox &lt; 55.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7753/">CVE-2017-7753 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7753">CVE-2017-7753 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1052829">SUSE bug 1052829</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823522" comment="firefox-52.3.0-2.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823590" comment="thunderbird-52.3.0-1.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177754" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7754</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7754" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7754" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7754" ref_url="https://www.suse.com/security/cve/CVE-2017-7754" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003150.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1620-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K6OIAMV5WWMMRZDYBFOTBIXVUYEDMZQI/#K6OIAMV5WWMMRZDYBFOTBIXVUYEDMZQI" source="SUSE-SU"/>
    <description>
    An out-of-bounds read in WebGL with a maliciously crafted "ImageInfo" object during WebGL operations. This vulnerability affects Firefox &lt; 54, Firefox ESR &lt; 52.2, and Thunderbird &lt; 52.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7754/">CVE-2017-7754 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7754">CVE-2017-7754 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1043960">SUSE bug 1043960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044239">SUSE bug 1044239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044240">SUSE bug 1044240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044241">SUSE bug 1044241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044242">SUSE bug 1044242</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823071" comment="firefox-52.2.0-1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823091" comment="thunderbird-52.2.0-1.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177756" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7756</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7756" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7756" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7756" ref_url="https://www.suse.com/security/cve/CVE-2017-7756" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003150.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1620-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K6OIAMV5WWMMRZDYBFOTBIXVUYEDMZQI/#K6OIAMV5WWMMRZDYBFOTBIXVUYEDMZQI" source="SUSE-SU"/>
    <description>
    A use-after-free and use-after-scope vulnerability when logging errors from headers for XML HTTP Requests (XHR). This could result in a potentially exploitable crash. This vulnerability affects Firefox &lt; 54, Firefox ESR &lt; 52.2, and Thunderbird &lt; 52.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7756/">CVE-2017-7756 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7756">CVE-2017-7756 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1043960">SUSE bug 1043960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044239">SUSE bug 1044239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044240">SUSE bug 1044240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044241">SUSE bug 1044241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044242">SUSE bug 1044242</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823071" comment="firefox-52.2.0-1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823091" comment="thunderbird-52.2.0-1.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177757" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7757</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7757" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7757" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7757" ref_url="https://www.suse.com/security/cve/CVE-2017-7757" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003150.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1620-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K6OIAMV5WWMMRZDYBFOTBIXVUYEDMZQI/#K6OIAMV5WWMMRZDYBFOTBIXVUYEDMZQI" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability in IndexedDB when one of its objects is destroyed in memory while a method on it is still being executed. This results in a potentially exploitable crash. This vulnerability affects Firefox &lt; 54, Firefox ESR &lt; 52.2, and Thunderbird &lt; 52.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7757/">CVE-2017-7757 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7757">CVE-2017-7757 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1043960">SUSE bug 1043960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044239">SUSE bug 1044239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044240">SUSE bug 1044240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044241">SUSE bug 1044241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044242">SUSE bug 1044242</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823071" comment="firefox-52.2.0-1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823091" comment="thunderbird-52.2.0-1.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177758" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7758</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7758" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7758" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7758" ref_url="https://www.suse.com/security/cve/CVE-2017-7758" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003150.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1620-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K6OIAMV5WWMMRZDYBFOTBIXVUYEDMZQI/#K6OIAMV5WWMMRZDYBFOTBIXVUYEDMZQI" source="SUSE-SU"/>
    <description>
    An out-of-bounds read vulnerability with the Opus encoder when the number of channels in an audio stream changes while the encoder is in use. This vulnerability affects Firefox &lt; 54, Firefox ESR &lt; 52.2, and Thunderbird &lt; 52.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7758/">CVE-2017-7758 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7758">CVE-2017-7758 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1043960">SUSE bug 1043960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044239">SUSE bug 1044239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044240">SUSE bug 1044240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044241">SUSE bug 1044241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044242">SUSE bug 1044242</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823071" comment="firefox-52.2.0-1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823091" comment="thunderbird-52.2.0-1.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177762" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7762</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7762" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7762" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7762" ref_url="https://www.suse.com/security/cve/CVE-2017-7762" source="SUSE CVE"/>
    <description>
    When entered directly, Reader Mode did not strip the username and password section of URLs displayed in the addressbar. This can be used for spoofing the domain of the current page. This vulnerability affects Firefox &lt; 54.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7762/">CVE-2017-7762 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7762">CVE-2017-7762 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1043960">SUSE bug 1043960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044239">SUSE bug 1044239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044240">SUSE bug 1044240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044241">SUSE bug 1044241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044242">SUSE bug 1044242</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824439" comment="firefox-60.1.0-4.el7_5 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177764" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7764</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7764" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7764" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7764" ref_url="https://www.suse.com/security/cve/CVE-2017-7764" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003150.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1620-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K6OIAMV5WWMMRZDYBFOTBIXVUYEDMZQI/#K6OIAMV5WWMMRZDYBFOTBIXVUYEDMZQI" source="SUSE-SU"/>
    <description>
    Characters from the "Canadian Syllabics" unicode block can be mixed with characters from other unicode blocks in the addressbar instead of being rendered as their raw "punycode" form, allowing for domain name spoofing attacks through character confusion. The current Unicode standard allows characters from "Aspirational Use Scripts" such as Canadian Syllabics to be mixed with Latin characters in the "moderately restrictive" IDN profile. We have changed Firefox behavior to match the upcoming Unicode version 10.0 which removes this category and treats them as "Limited Use Scripts.". This vulnerability affects Firefox &lt; 54, Firefox ESR &lt; 52.2, and Thunderbird &lt; 52.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7764/">CVE-2017-7764 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7764">CVE-2017-7764 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1043960">SUSE bug 1043960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044239">SUSE bug 1044239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044240">SUSE bug 1044240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044241">SUSE bug 1044241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044242">SUSE bug 1044242</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823071" comment="firefox-52.2.0-1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823091" comment="thunderbird-52.2.0-1.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177771" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7771</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7771" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7771" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7771" ref_url="https://www.suse.com/security/cve/CVE-2017-7771" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2017:1620-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K6OIAMV5WWMMRZDYBFOTBIXVUYEDMZQI/#K6OIAMV5WWMMRZDYBFOTBIXVUYEDMZQI" source="SUSE-SU"/>
    <description>
    Out-of-bounds read in Graphite2 Library in Firefox before 54 in graphite2::Pass::readPass function.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7771/">CVE-2017-7771 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7771">CVE-2017-7771 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1043960">SUSE bug 1043960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044239">SUSE bug 1044239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044240">SUSE bug 1044240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044241">SUSE bug 1044241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044242">SUSE bug 1044242</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823071" comment="firefox-52.2.0-1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823156" comment="graphite2-1.3.10-1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823157" comment="graphite2-devel-1.3.10-1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823091" comment="thunderbird-52.2.0-1.el7_3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823156" comment="graphite2-1.3.10-1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823157" comment="graphite2-devel-1.3.10-1.el7_3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177772" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7772</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7772" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7772" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7772" ref_url="https://www.suse.com/security/cve/CVE-2017-7772" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2017:1620-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K6OIAMV5WWMMRZDYBFOTBIXVUYEDMZQI/#K6OIAMV5WWMMRZDYBFOTBIXVUYEDMZQI" source="SUSE-SU"/>
    <description>
    Heap-based Buffer Overflow in Graphite2 library in Firefox before 54 in lz4::decompress function.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7772/">CVE-2017-7772 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7772">CVE-2017-7772 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1043960">SUSE bug 1043960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044239">SUSE bug 1044239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044240">SUSE bug 1044240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044241">SUSE bug 1044241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044242">SUSE bug 1044242</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823071" comment="firefox-52.2.0-1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823156" comment="graphite2-1.3.10-1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823157" comment="graphite2-devel-1.3.10-1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823091" comment="thunderbird-52.2.0-1.el7_3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823156" comment="graphite2-1.3.10-1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823157" comment="graphite2-devel-1.3.10-1.el7_3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177773" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7773</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7773" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7773" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7773" ref_url="https://www.suse.com/security/cve/CVE-2017-7773" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2017:1620-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K6OIAMV5WWMMRZDYBFOTBIXVUYEDMZQI/#K6OIAMV5WWMMRZDYBFOTBIXVUYEDMZQI" source="SUSE-SU"/>
    <description>
    Heap-based Buffer Overflow write in Graphite2 library in Firefox before 54 in lz4::decompress src/Decompressor.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7773/">CVE-2017-7773 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7773">CVE-2017-7773 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1043960">SUSE bug 1043960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044239">SUSE bug 1044239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044240">SUSE bug 1044240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044241">SUSE bug 1044241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044242">SUSE bug 1044242</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823071" comment="firefox-52.2.0-1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823156" comment="graphite2-1.3.10-1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823157" comment="graphite2-devel-1.3.10-1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823091" comment="thunderbird-52.2.0-1.el7_3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823156" comment="graphite2-1.3.10-1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823157" comment="graphite2-devel-1.3.10-1.el7_3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177774" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7774</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7774" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7774" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7774" ref_url="https://www.suse.com/security/cve/CVE-2017-7774" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2017:1620-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K6OIAMV5WWMMRZDYBFOTBIXVUYEDMZQI/#K6OIAMV5WWMMRZDYBFOTBIXVUYEDMZQI" source="SUSE-SU"/>
    <description>
    Out-of-bounds read in Graphite2 Library in Firefox before 54 in graphite2::Silf::readGraphite function.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7774/">CVE-2017-7774 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7774">CVE-2017-7774 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1043960">SUSE bug 1043960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044239">SUSE bug 1044239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044240">SUSE bug 1044240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044241">SUSE bug 1044241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044242">SUSE bug 1044242</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823071" comment="firefox-52.2.0-1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823156" comment="graphite2-1.3.10-1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823157" comment="graphite2-devel-1.3.10-1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823091" comment="thunderbird-52.2.0-1.el7_3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823156" comment="graphite2-1.3.10-1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823157" comment="graphite2-devel-1.3.10-1.el7_3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177775" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7775</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7775" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7775" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7775" ref_url="https://www.suse.com/security/cve/CVE-2017-7775" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2017:1620-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K6OIAMV5WWMMRZDYBFOTBIXVUYEDMZQI/#K6OIAMV5WWMMRZDYBFOTBIXVUYEDMZQI" source="SUSE-SU"/>
    <description>
    DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-09"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7775/">CVE-2017-7775 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2017-7775">CVE-2017-7775 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1043960">SUSE bug 1043960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044239">SUSE bug 1044239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044240">SUSE bug 1044240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044241">SUSE bug 1044241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044242">SUSE bug 1044242</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823071" comment="firefox-52.2.0-1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823156" comment="graphite2-1.3.10-1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823157" comment="graphite2-devel-1.3.10-1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823091" comment="thunderbird-52.2.0-1.el7_3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823156" comment="graphite2-1.3.10-1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823157" comment="graphite2-devel-1.3.10-1.el7_3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177776" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7776</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7776" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7776" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7776" ref_url="https://www.suse.com/security/cve/CVE-2017-7776" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2017:1620-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K6OIAMV5WWMMRZDYBFOTBIXVUYEDMZQI/#K6OIAMV5WWMMRZDYBFOTBIXVUYEDMZQI" source="SUSE-SU"/>
    <description>
    Heap-based Buffer Overflow read in Graphite2 library in Firefox before 54 in graphite2::Silf::getClassGlyph.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7776/">CVE-2017-7776 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7776">CVE-2017-7776 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1043960">SUSE bug 1043960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044239">SUSE bug 1044239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044240">SUSE bug 1044240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044241">SUSE bug 1044241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044242">SUSE bug 1044242</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823071" comment="firefox-52.2.0-1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823156" comment="graphite2-1.3.10-1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823157" comment="graphite2-devel-1.3.10-1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823091" comment="thunderbird-52.2.0-1.el7_3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823156" comment="graphite2-1.3.10-1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823157" comment="graphite2-devel-1.3.10-1.el7_3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177777" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7777</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7777" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7777" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7777" ref_url="https://www.suse.com/security/cve/CVE-2017-7777" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2017:1620-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K6OIAMV5WWMMRZDYBFOTBIXVUYEDMZQI/#K6OIAMV5WWMMRZDYBFOTBIXVUYEDMZQI" source="SUSE-SU"/>
    <description>
    Use of uninitialized memory in Graphite2 library in Firefox before 54 in graphite2::GlyphCache::Loader::read_glyph function.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7777/">CVE-2017-7777 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7777">CVE-2017-7777 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1043960">SUSE bug 1043960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044239">SUSE bug 1044239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044240">SUSE bug 1044240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044241">SUSE bug 1044241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044242">SUSE bug 1044242</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823071" comment="firefox-52.2.0-1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823156" comment="graphite2-1.3.10-1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823157" comment="graphite2-devel-1.3.10-1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823091" comment="thunderbird-52.2.0-1.el7_3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823156" comment="graphite2-1.3.10-1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823157" comment="graphite2-devel-1.3.10-1.el7_3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177778" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7778</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7778" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7778" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7778" ref_url="https://www.suse.com/security/cve/CVE-2017-7778" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003150.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1620-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K6OIAMV5WWMMRZDYBFOTBIXVUYEDMZQI/#K6OIAMV5WWMMRZDYBFOTBIXVUYEDMZQI" source="SUSE-SU"/>
    <description>
    A number of security vulnerabilities in the Graphite 2 library including out-of-bounds reads, buffer overflow reads and writes, and the use of uninitialized memory. These issues were addressed in Graphite 2 version 1.3.10. This vulnerability affects Firefox &lt; 54, Firefox ESR &lt; 52.2, and Thunderbird &lt; 52.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7778/">CVE-2017-7778 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7778">CVE-2017-7778 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1043960">SUSE bug 1043960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044239">SUSE bug 1044239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044240">SUSE bug 1044240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044241">SUSE bug 1044241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044242">SUSE bug 1044242</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823071" comment="firefox-52.2.0-1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823156" comment="graphite2-1.3.10-1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823157" comment="graphite2-devel-1.3.10-1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823091" comment="thunderbird-52.2.0-1.el7_3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823156" comment="graphite2-1.3.10-1.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823157" comment="graphite2-devel-1.3.10-1.el7_3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177779" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7779</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7779" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7779" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7779" ref_url="https://www.suse.com/security/cve/CVE-2017-7779" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003261.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2151-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3SQR643E2Y2QAE5DFDYOHYQAVVK2XRPW/#3SQR643E2Y2QAE5DFDYOHYQAVVK2XRPW" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2209-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IJOETQICPAUKQMIRZDYIIRKRSWKSIMF5/#IJOETQICPAUKQMIRZDYIIRKRSWKSIMF5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Memory safety bugs were reported in Firefox 54, Firefox ESR 52.2, and Thunderbird 52.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird &lt; 52.3, Firefox ESR &lt; 52.3, and Firefox &lt; 55.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7779/">CVE-2017-7779 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7779">CVE-2017-7779 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1052829">SUSE bug 1052829</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823522" comment="firefox-52.3.0-2.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823590" comment="thunderbird-52.3.0-1.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177784" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7784</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7784" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7784" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7784" ref_url="https://www.suse.com/security/cve/CVE-2017-7784" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003261.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2151-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3SQR643E2Y2QAE5DFDYOHYQAVVK2XRPW/#3SQR643E2Y2QAE5DFDYOHYQAVVK2XRPW" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2209-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IJOETQICPAUKQMIRZDYIIRKRSWKSIMF5/#IJOETQICPAUKQMIRZDYIIRKRSWKSIMF5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability can occur when reading an image observer during frame reconstruction after the observer has been freed. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.3, Firefox ESR &lt; 52.3, and Firefox &lt; 55.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7784/">CVE-2017-7784 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7784">CVE-2017-7784 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1052829">SUSE bug 1052829</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823522" comment="firefox-52.3.0-2.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823590" comment="thunderbird-52.3.0-1.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177785" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7785</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7785" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7785" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7785" ref_url="https://www.suse.com/security/cve/CVE-2017-7785" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003261.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2151-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3SQR643E2Y2QAE5DFDYOHYQAVVK2XRPW/#3SQR643E2Y2QAE5DFDYOHYQAVVK2XRPW" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2209-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IJOETQICPAUKQMIRZDYIIRKRSWKSIMF5/#IJOETQICPAUKQMIRZDYIIRKRSWKSIMF5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A buffer overflow can occur when manipulating Accessible Rich Internet Applications (ARIA) attributes within the DOM. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.3, Firefox ESR &lt; 52.3, and Firefox &lt; 55.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7785/">CVE-2017-7785 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7785">CVE-2017-7785 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1052829">SUSE bug 1052829</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823522" comment="firefox-52.3.0-2.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823590" comment="thunderbird-52.3.0-1.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177786" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7786</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7786" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7786" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7786" ref_url="https://www.suse.com/security/cve/CVE-2017-7786" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003261.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2151-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3SQR643E2Y2QAE5DFDYOHYQAVVK2XRPW/#3SQR643E2Y2QAE5DFDYOHYQAVVK2XRPW" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2209-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IJOETQICPAUKQMIRZDYIIRKRSWKSIMF5/#IJOETQICPAUKQMIRZDYIIRKRSWKSIMF5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A buffer overflow can occur when the image renderer attempts to paint non-displayable SVG elements. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.3, Firefox ESR &lt; 52.3, and Firefox &lt; 55.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7786/">CVE-2017-7786 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7786">CVE-2017-7786 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1052829">SUSE bug 1052829</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823522" comment="firefox-52.3.0-2.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823590" comment="thunderbird-52.3.0-1.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177787" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7787</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7787" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7787" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7787" ref_url="https://www.suse.com/security/cve/CVE-2017-7787" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003261.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2151-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3SQR643E2Y2QAE5DFDYOHYQAVVK2XRPW/#3SQR643E2Y2QAE5DFDYOHYQAVVK2XRPW" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2209-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IJOETQICPAUKQMIRZDYIIRKRSWKSIMF5/#IJOETQICPAUKQMIRZDYIIRKRSWKSIMF5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Same-origin policy protections can be bypassed on pages with embedded iframes during page reloads, allowing the iframes to access content on the top level page, leading to information disclosure. This vulnerability affects Thunderbird &lt; 52.3, Firefox ESR &lt; 52.3, and Firefox &lt; 55.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7787/">CVE-2017-7787 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7787">CVE-2017-7787 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1052829">SUSE bug 1052829</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823522" comment="firefox-52.3.0-2.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823590" comment="thunderbird-52.3.0-1.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177791" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7791</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7791" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7791" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7791" ref_url="https://www.suse.com/security/cve/CVE-2017-7791" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003261.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2151-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3SQR643E2Y2QAE5DFDYOHYQAVVK2XRPW/#3SQR643E2Y2QAE5DFDYOHYQAVVK2XRPW" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2209-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IJOETQICPAUKQMIRZDYIIRKRSWKSIMF5/#IJOETQICPAUKQMIRZDYIIRKRSWKSIMF5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    On pages containing an iframe, the "data:" protocol can be used to create a modal alert that will render over arbitrary domains following page navigation, spoofing of the origin of the modal alert from the iframe content. This vulnerability affects Thunderbird &lt; 52.3, Firefox ESR &lt; 52.3, and Firefox &lt; 55.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7791/">CVE-2017-7791 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7791">CVE-2017-7791 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1052829">SUSE bug 1052829</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823522" comment="firefox-52.3.0-2.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823590" comment="thunderbird-52.3.0-1.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177792" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7792</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7792" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7792" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7792" ref_url="https://www.suse.com/security/cve/CVE-2017-7792" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003261.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2151-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3SQR643E2Y2QAE5DFDYOHYQAVVK2XRPW/#3SQR643E2Y2QAE5DFDYOHYQAVVK2XRPW" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2209-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IJOETQICPAUKQMIRZDYIIRKRSWKSIMF5/#IJOETQICPAUKQMIRZDYIIRKRSWKSIMF5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A buffer overflow will occur when viewing a certificate in the certificate manager if the certificate has an extremely long object identifier (OID). This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.3, Firefox ESR &lt; 52.3, and Firefox &lt; 55.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7792/">CVE-2017-7792 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7792">CVE-2017-7792 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1052829">SUSE bug 1052829</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823522" comment="firefox-52.3.0-2.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823590" comment="thunderbird-52.3.0-1.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177793" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7793</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7793" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7793" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7793" ref_url="https://www.suse.com/security/cve/CVE-2017-7793" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2872-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003396.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2615-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VT2JHEKQZT2BFO2QF6QVP6E2D3BRGHGF/#VT2JHEKQZT2BFO2QF6QVP6E2D3BRGHGF" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2707-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NPYZCFGKLGK6D3GZBBQ4Z3PJ26NCKUFR/#NPYZCFGKLGK6D3GZBBQ4Z3PJ26NCKUFR" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2710-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LDCHQXU3UZNGY4UDTM7XLWWMHJTBW6JU/#LDCHQXU3UZNGY4UDTM7XLWWMHJTBW6JU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability can occur in the Fetch API when the worker or the associated window are freed when still in use, resulting in a potentially exploitable crash. This vulnerability affects Firefox &lt; 56, Firefox ESR &lt; 52.4, and Thunderbird &lt; 52.4.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7793/">CVE-2017-7793 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7793">CVE-2017-7793 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1060445">SUSE bug 1060445</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823665" comment="firefox-52.4.0-1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823681" comment="thunderbird-52.4.0-2.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177798" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7798</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7798" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7798" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7798" ref_url="https://www.suse.com/security/cve/CVE-2017-7798" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003261.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2151-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3SQR643E2Y2QAE5DFDYOHYQAVVK2XRPW/#3SQR643E2Y2QAE5DFDYOHYQAVVK2XRPW" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2209-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IJOETQICPAUKQMIRZDYIIRKRSWKSIMF5/#IJOETQICPAUKQMIRZDYIIRKRSWKSIMF5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    The Developer Tools feature suffers from a XUL injection vulnerability due to improper sanitization of the web page source code. In the worst case, this could allow arbitrary code execution when opening a malicious page with the style editor tool. This vulnerability affects Firefox ESR &lt; 52.3 and Firefox &lt; 55.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7798/">CVE-2017-7798 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7798">CVE-2017-7798 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1052829">SUSE bug 1052829</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823522" comment="firefox-52.3.0-2.el7_4 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7800</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7800" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7800" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7800" ref_url="https://www.suse.com/security/cve/CVE-2017-7800" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003261.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2151-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3SQR643E2Y2QAE5DFDYOHYQAVVK2XRPW/#3SQR643E2Y2QAE5DFDYOHYQAVVK2XRPW" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2209-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IJOETQICPAUKQMIRZDYIIRKRSWKSIMF5/#IJOETQICPAUKQMIRZDYIIRKRSWKSIMF5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability can occur in WebSockets when the object holding the connection is freed before the disconnection operation is finished. This results in an exploitable crash. This vulnerability affects Thunderbird &lt; 52.3, Firefox ESR &lt; 52.3, and Firefox &lt; 55.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7800/">CVE-2017-7800 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7800">CVE-2017-7800 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1052829">SUSE bug 1052829</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823522" comment="firefox-52.3.0-2.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823590" comment="thunderbird-52.3.0-1.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177801" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7801</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7801" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7801" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7801" ref_url="https://www.suse.com/security/cve/CVE-2017-7801" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003261.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2151-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3SQR643E2Y2QAE5DFDYOHYQAVVK2XRPW/#3SQR643E2Y2QAE5DFDYOHYQAVVK2XRPW" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2209-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IJOETQICPAUKQMIRZDYIIRKRSWKSIMF5/#IJOETQICPAUKQMIRZDYIIRKRSWKSIMF5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability can occur while re-computing layout for a "marquee" element during window resizing where the updated style object is freed while still in use. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.3, Firefox ESR &lt; 52.3, and Firefox &lt; 55.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7801/">CVE-2017-7801 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7801">CVE-2017-7801 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1052829">SUSE bug 1052829</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823522" comment="firefox-52.3.0-2.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823590" comment="thunderbird-52.3.0-1.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177802" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7802</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7802" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7802" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7802" ref_url="https://www.suse.com/security/cve/CVE-2017-7802" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003261.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2151-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3SQR643E2Y2QAE5DFDYOHYQAVVK2XRPW/#3SQR643E2Y2QAE5DFDYOHYQAVVK2XRPW" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2209-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IJOETQICPAUKQMIRZDYIIRKRSWKSIMF5/#IJOETQICPAUKQMIRZDYIIRKRSWKSIMF5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability can occur when manipulating the DOM during the resize event of an image element. If these elements have been freed due to a lack of strong references, a potentially exploitable crash may occur when the freed elements are accessed. This vulnerability affects Thunderbird &lt; 52.3, Firefox ESR &lt; 52.3, and Firefox &lt; 55.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7802/">CVE-2017-7802 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7802">CVE-2017-7802 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1052829">SUSE bug 1052829</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823522" comment="firefox-52.3.0-2.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823590" comment="thunderbird-52.3.0-1.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177803" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7803</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7803" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7803" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7803" ref_url="https://www.suse.com/security/cve/CVE-2017-7803" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003261.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2151-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3SQR643E2Y2QAE5DFDYOHYQAVVK2XRPW/#3SQR643E2Y2QAE5DFDYOHYQAVVK2XRPW" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2209-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IJOETQICPAUKQMIRZDYIIRKRSWKSIMF5/#IJOETQICPAUKQMIRZDYIIRKRSWKSIMF5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    When a page's content security policy (CSP) header contains a "sandbox" directive, other directives are ignored. This results in the incorrect enforcement of CSP. This vulnerability affects Thunderbird &lt; 52.3, Firefox ESR &lt; 52.3, and Firefox &lt; 55.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7803/">CVE-2017-7803 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7803">CVE-2017-7803 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1052829">SUSE bug 1052829</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823522" comment="firefox-52.3.0-2.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823590" comment="thunderbird-52.3.0-1.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7805</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7805" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7805" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7805" ref_url="https://www.suse.com/security/cve/CVE-2017-7805" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2872-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003396.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2615-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VT2JHEKQZT2BFO2QF6QVP6E2D3BRGHGF/#VT2JHEKQZT2BFO2QF6QVP6E2D3BRGHGF" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2707-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NPYZCFGKLGK6D3GZBBQ4Z3PJ26NCKUFR/#NPYZCFGKLGK6D3GZBBQ4Z3PJ26NCKUFR" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2710-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LDCHQXU3UZNGY4UDTM7XLWWMHJTBW6JU/#LDCHQXU3UZNGY4UDTM7XLWWMHJTBW6JU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    During TLS 1.2 exchanges, handshake hashes are generated which point to a message buffer. This saved data is used for later messages but in some cases, the handshake transcript can exceed the space available in the current buffer, causing the allocation of a new buffer. This leaves a pointer pointing to the old, freed buffer, resulting in a use-after-free when handshake hashes are then calculated afterwards. This can result in a potentially exploitable crash. This vulnerability affects Firefox &lt; 56, Firefox ESR &lt; 52.4, and Thunderbird &lt; 52.4.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7805/">CVE-2017-7805 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7805">CVE-2017-7805 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1060445">SUSE bug 1060445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061005">SUSE bug 1061005</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823666" comment="nss-3.28.4-12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823667" comment="nss-devel-3.28.4-12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823668" comment="nss-pkcs11-devel-3.28.4-12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823669" comment="nss-sysinit-3.28.4-12.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823670" comment="nss-tools-3.28.4-12.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177807" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7807</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7807" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7807" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7807" ref_url="https://www.suse.com/security/cve/CVE-2017-7807" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003261.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2151-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3SQR643E2Y2QAE5DFDYOHYQAVVK2XRPW/#3SQR643E2Y2QAE5DFDYOHYQAVVK2XRPW" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2209-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IJOETQICPAUKQMIRZDYIIRKRSWKSIMF5/#IJOETQICPAUKQMIRZDYIIRKRSWKSIMF5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A mechanism that uses AppCache to hijack a URL in a domain using fallback by serving the files from a sub-path on the domain. This has been addressed by requiring fallback files be inside the manifest directory. This vulnerability affects Thunderbird &lt; 52.3, Firefox ESR &lt; 52.3, and Firefox &lt; 55.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7807/">CVE-2017-7807 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7807">CVE-2017-7807 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1052829">SUSE bug 1052829</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823522" comment="firefox-52.3.0-2.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823590" comment="thunderbird-52.3.0-1.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177809" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7809</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7809" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7809" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7809" ref_url="https://www.suse.com/security/cve/CVE-2017-7809" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability can occur when an editor DOM node is deleted prematurely during tree traversal while still bound to the document. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.3, Firefox ESR &lt; 52.3, and Firefox &lt; 55.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7809/">CVE-2017-7809 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7809">CVE-2017-7809 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1052829">SUSE bug 1052829</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823522" comment="firefox-52.3.0-2.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823590" comment="thunderbird-52.3.0-1.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177810" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7810</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7810" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7810" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7810" ref_url="https://www.suse.com/security/cve/CVE-2017-7810" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2872-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003396.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2615-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VT2JHEKQZT2BFO2QF6QVP6E2D3BRGHGF/#VT2JHEKQZT2BFO2QF6QVP6E2D3BRGHGF" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2707-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NPYZCFGKLGK6D3GZBBQ4Z3PJ26NCKUFR/#NPYZCFGKLGK6D3GZBBQ4Z3PJ26NCKUFR" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2710-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LDCHQXU3UZNGY4UDTM7XLWWMHJTBW6JU/#LDCHQXU3UZNGY4UDTM7XLWWMHJTBW6JU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Memory safety bugs were reported in Firefox 55 and Firefox ESR 52.3. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox &lt; 56, Firefox ESR &lt; 52.4, and Thunderbird &lt; 52.4.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7810/">CVE-2017-7810 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7810">CVE-2017-7810 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1060445">SUSE bug 1060445</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823665" comment="firefox-52.4.0-1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823681" comment="thunderbird-52.4.0-2.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7814</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7814" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7814" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7814" ref_url="https://www.suse.com/security/cve/CVE-2017-7814" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2872-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003396.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2615-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VT2JHEKQZT2BFO2QF6QVP6E2D3BRGHGF/#VT2JHEKQZT2BFO2QF6QVP6E2D3BRGHGF" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2707-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NPYZCFGKLGK6D3GZBBQ4Z3PJ26NCKUFR/#NPYZCFGKLGK6D3GZBBQ4Z3PJ26NCKUFR" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2710-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LDCHQXU3UZNGY4UDTM7XLWWMHJTBW6JU/#LDCHQXU3UZNGY4UDTM7XLWWMHJTBW6JU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    File downloads encoded with "blob:" and "data:" URL elements bypassed normal file download checks though the Phishing and Malware Protection feature and its block lists of suspicious sites and files. This would allow malicious sites to lure users into downloading executables that would otherwise be detected as suspicious. This vulnerability affects Firefox &lt; 56, Firefox ESR &lt; 52.4, and Thunderbird &lt; 52.4.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7814/">CVE-2017-7814 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7814">CVE-2017-7814 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1060445">SUSE bug 1060445</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823665" comment="firefox-52.4.0-1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823681" comment="thunderbird-52.4.0-2.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177818" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7818</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7818" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7818" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7818" ref_url="https://www.suse.com/security/cve/CVE-2017-7818" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2872-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003396.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2615-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VT2JHEKQZT2BFO2QF6QVP6E2D3BRGHGF/#VT2JHEKQZT2BFO2QF6QVP6E2D3BRGHGF" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2707-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NPYZCFGKLGK6D3GZBBQ4Z3PJ26NCKUFR/#NPYZCFGKLGK6D3GZBBQ4Z3PJ26NCKUFR" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2710-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LDCHQXU3UZNGY4UDTM7XLWWMHJTBW6JU/#LDCHQXU3UZNGY4UDTM7XLWWMHJTBW6JU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability can occur when manipulating arrays of Accessible Rich Internet Applications (ARIA) elements within containers through the DOM. This results in a potentially exploitable crash. This vulnerability affects Firefox &lt; 56, Firefox ESR &lt; 52.4, and Thunderbird &lt; 52.4.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7818/">CVE-2017-7818 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7818">CVE-2017-7818 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1060445">SUSE bug 1060445</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823665" comment="firefox-52.4.0-1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823681" comment="thunderbird-52.4.0-2.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177819" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7819</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7819" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7819" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7819" ref_url="https://www.suse.com/security/cve/CVE-2017-7819" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2872-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003396.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2615-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VT2JHEKQZT2BFO2QF6QVP6E2D3BRGHGF/#VT2JHEKQZT2BFO2QF6QVP6E2D3BRGHGF" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2707-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NPYZCFGKLGK6D3GZBBQ4Z3PJ26NCKUFR/#NPYZCFGKLGK6D3GZBBQ4Z3PJ26NCKUFR" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2710-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LDCHQXU3UZNGY4UDTM7XLWWMHJTBW6JU/#LDCHQXU3UZNGY4UDTM7XLWWMHJTBW6JU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability can occur in design mode when image objects are resized if objects referenced during the resizing have been freed from memory. This results in a potentially exploitable crash. This vulnerability affects Firefox &lt; 56, Firefox ESR &lt; 52.4, and Thunderbird &lt; 52.4.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7819/">CVE-2017-7819 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7819">CVE-2017-7819 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1060445">SUSE bug 1060445</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823665" comment="firefox-52.4.0-1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823681" comment="thunderbird-52.4.0-2.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177823" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7823</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7823" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7823" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7823" ref_url="https://www.suse.com/security/cve/CVE-2017-7823" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2872-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003396.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2615-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VT2JHEKQZT2BFO2QF6QVP6E2D3BRGHGF/#VT2JHEKQZT2BFO2QF6QVP6E2D3BRGHGF" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2707-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NPYZCFGKLGK6D3GZBBQ4Z3PJ26NCKUFR/#NPYZCFGKLGK6D3GZBBQ4Z3PJ26NCKUFR" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2710-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LDCHQXU3UZNGY4UDTM7XLWWMHJTBW6JU/#LDCHQXU3UZNGY4UDTM7XLWWMHJTBW6JU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    The content security policy (CSP) "sandbox" directive did not create a unique origin for the document, causing it to behave as if the "allow-same-origin" keyword were always specified. This could allow a Cross-Site Scripting (XSS) attack to be launched from unsafe content. This vulnerability affects Firefox &lt; 56, Firefox ESR &lt; 52.4, and Thunderbird &lt; 52.4.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7823/">CVE-2017-7823 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7823">CVE-2017-7823 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1060445">SUSE bug 1060445</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823665" comment="firefox-52.4.0-1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823681" comment="thunderbird-52.4.0-2.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177824" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7824</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7824" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7824" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7824" ref_url="https://www.suse.com/security/cve/CVE-2017-7824" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2872-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003396.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2615-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VT2JHEKQZT2BFO2QF6QVP6E2D3BRGHGF/#VT2JHEKQZT2BFO2QF6QVP6E2D3BRGHGF" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2707-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NPYZCFGKLGK6D3GZBBQ4Z3PJ26NCKUFR/#NPYZCFGKLGK6D3GZBBQ4Z3PJ26NCKUFR" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2710-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LDCHQXU3UZNGY4UDTM7XLWWMHJTBW6JU/#LDCHQXU3UZNGY4UDTM7XLWWMHJTBW6JU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A buffer overflow occurs when drawing and validating elements with the ANGLE graphics library, used for WebGL content. This is due to an incorrect value being passed within the library during checks and results in a potentially exploitable crash. This vulnerability affects Firefox &lt; 56, Firefox ESR &lt; 52.4, and Thunderbird &lt; 52.4.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7824/">CVE-2017-7824 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7824">CVE-2017-7824 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1060445">SUSE bug 1060445</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823665" comment="firefox-52.4.0-1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823681" comment="thunderbird-52.4.0-2.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177826" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7826</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7826" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7826" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7826" ref_url="https://www.suse.com/security/cve/CVE-2017-7826" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003479.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3027-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/P5MI3YKRU4RWFY25QJESDAHVKBRP5PUW/#P5MI3YKRU4RWFY25QJESDAHVKBRP5PUW" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Memory safety bugs were reported in Firefox 56 and Firefox ESR 52.4. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox &lt; 57, Firefox ESR &lt; 52.5, and Thunderbird &lt; 52.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-11-30"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7826/">CVE-2017-7826 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7826">CVE-2017-7826 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1068101">SUSE bug 1068101</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823752" comment="firefox-52.5.0-1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823801" comment="thunderbird-52.5.0-1.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177828" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7828</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7828" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7828" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7828" ref_url="https://www.suse.com/security/cve/CVE-2017-7828" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003479.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3027-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/P5MI3YKRU4RWFY25QJESDAHVKBRP5PUW/#P5MI3YKRU4RWFY25QJESDAHVKBRP5PUW" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability can occur when flushing and resizing layout because the "PressShell" object has been freed while still in use. This results in a potentially exploitable crash during these operations. This vulnerability affects Firefox &lt; 57, Firefox ESR &lt; 52.5, and Thunderbird &lt; 52.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-11-30"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7828/">CVE-2017-7828 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7828">CVE-2017-7828 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1068101">SUSE bug 1068101</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823752" comment="firefox-52.5.0-1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823801" comment="thunderbird-52.5.0-1.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177829" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7829</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7829" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7829" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7829" ref_url="https://www.suse.com/security/cve/CVE-2017-7829" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2017:3433-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y37ZBDTQYH6U74CLMVTFTTZQHZYSKJPC/#Y37ZBDTQYH6U74CLMVTFTTZQHZYSKJPC" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3434-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AP5ZAGU2HEQMTGXGL2VCNWZVK7AJTIMO/#AP5ZAGU2HEQMTGXGL2VCNWZVK7AJTIMO" source="SUSE-SU"/>
    <description>
    It is possible to spoof the sender's email address and display an arbitrary sender address to the email recipient. The real sender's address is not displayed if preceded by a null character in the display string. This vulnerability affects Thunderbird &lt; 52.5.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7829/">CVE-2017-7829 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7829">CVE-2017-7829 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1071236">SUSE bug 1071236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074046">SUSE bug 1074046</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823901" comment="thunderbird-52.5.2-1.el7_4 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177830" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7830</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7830" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7830" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7830" ref_url="https://www.suse.com/security/cve/CVE-2017-7830" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003479.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3027-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/P5MI3YKRU4RWFY25QJESDAHVKBRP5PUW/#P5MI3YKRU4RWFY25QJESDAHVKBRP5PUW" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    The Resource Timing API incorrectly revealed navigations in cross-origin iframes. This is a same-origin policy violation and could allow for data theft of URLs loaded by users. This vulnerability affects Firefox &lt; 57, Firefox ESR &lt; 52.5, and Thunderbird &lt; 52.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-11-29"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7830/">CVE-2017-7830 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7830">CVE-2017-7830 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1068101">SUSE bug 1068101</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823752" comment="firefox-52.5.0-1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823801" comment="thunderbird-52.5.0-1.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177843" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7843</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7843" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7843" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7843" ref_url="https://www.suse.com/security/cve/CVE-2017-7843" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    When Private Browsing mode is used, it is possible for a web worker to write persistent data to IndexedDB and fingerprint a user uniquely. IndexedDB should not be available in Private Browsing mode and this stored data will persist across multiple private browsing mode sessions because it is not cleared when exiting. This vulnerability affects Firefox ESR &lt; 52.5.2 and Firefox &lt; 57.0.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7843/">CVE-2017-7843 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7843">CVE-2017-7843 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1072034">SUSE bug 1072034</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823836" comment="firefox-52.5.1-1.el7_4 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177846" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7846</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7846" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7846" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7846" ref_url="https://www.suse.com/security/cve/CVE-2017-7846" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2017:3433-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y37ZBDTQYH6U74CLMVTFTTZQHZYSKJPC/#Y37ZBDTQYH6U74CLMVTFTTZQHZYSKJPC" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3434-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AP5ZAGU2HEQMTGXGL2VCNWZVK7AJTIMO/#AP5ZAGU2HEQMTGXGL2VCNWZVK7AJTIMO" source="SUSE-SU"/>
    <description>
    It is possible to execute JavaScript in the parsed RSS feed when RSS feed is viewed as a website, e.g. via "View -&gt; Feed article -&gt; Website" or in the standard format of "View -&gt; Feed article -&gt; default format". This vulnerability affects Thunderbird &lt; 52.5.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7846/">CVE-2017-7846 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7846">CVE-2017-7846 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1074043">SUSE bug 1074043</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823901" comment="thunderbird-52.5.2-1.el7_4 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177847" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7847</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7847" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7847" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7847" ref_url="https://www.suse.com/security/cve/CVE-2017-7847" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2017:3433-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y37ZBDTQYH6U74CLMVTFTTZQHZYSKJPC/#Y37ZBDTQYH6U74CLMVTFTTZQHZYSKJPC" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3434-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AP5ZAGU2HEQMTGXGL2VCNWZVK7AJTIMO/#AP5ZAGU2HEQMTGXGL2VCNWZVK7AJTIMO" source="SUSE-SU"/>
    <description>
    Crafted CSS in an RSS feed can leak and reveal local path strings, which may contain user name. This vulnerability affects Thunderbird &lt; 52.5.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7847/">CVE-2017-7847 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7847">CVE-2017-7847 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1074044">SUSE bug 1074044</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823901" comment="thunderbird-52.5.2-1.el7_4 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177848" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7848</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7848" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7848" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7848" ref_url="https://www.suse.com/security/cve/CVE-2017-7848" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2017:3433-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y37ZBDTQYH6U74CLMVTFTTZQHZYSKJPC/#Y37ZBDTQYH6U74CLMVTFTTZQHZYSKJPC" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3434-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AP5ZAGU2HEQMTGXGL2VCNWZVK7AJTIMO/#AP5ZAGU2HEQMTGXGL2VCNWZVK7AJTIMO" source="SUSE-SU"/>
    <description>
    RSS fields can inject new lines into the created email structure, modifying the message body. This vulnerability affects Thunderbird &lt; 52.5.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7848/">CVE-2017-7848 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7848">CVE-2017-7848 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1074045">SUSE bug 1074045</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823901" comment="thunderbird-52.5.2-1.el7_4 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177869" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7869</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7869" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7869" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7869" ref_url="https://www.suse.com/security/cve/CVE-2017-7869" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003036.html" source="SUSE-SU"/>
    <description>
    GnuTLS before 2017-02-20 has an out-of-bounds write caused by an integer overflow and heap-based buffer overflow related to the cdk_pkt_read function in opencdk/read-packet.c. This issue (which is a subset of the vendor's GNUTLS-SA-2017-3 report) is fixed in 3.5.10.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7869/">CVE-2017-7869 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7869">CVE-2017-7869 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1034173">SUSE bug 1034173</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038337">SUSE bug 1038337</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049210">SUSE bug 1049210</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149679">SUSE bug 1149679</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823451" comment="gnutls-3.3.26-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823452" comment="gnutls-c++-3.3.26-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823453" comment="gnutls-dane-3.3.26-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823454" comment="gnutls-devel-3.3.26-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823455" comment="gnutls-utils-3.3.26-9.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177889" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7889</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7889" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7889" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7889" ref_url="https://www.suse.com/security/cve/CVE-2017-7889" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003367.html" source="SUSE-SU"/>
    <description>
    The mm subsystem in the Linux kernel through 3.2 does not properly enforce the CONFIG_STRICT_DEVMEM protection mechanism, which allows local users to read or write to kernel memory locations in the first megabyte (and bypass slab-allocation access restrictions) via an application that opens the /dev/mem file, related to arch/x86/mm/init.c and drivers/char/mem.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7889/">CVE-2017-7889 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7889">CVE-2017-7889 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1034405">SUSE bug 1034405</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823168" comment="kernel-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823169" comment="kernel-abi-whitelists-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823170" comment="kernel-debug-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823173" comment="kernel-doc-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823174" comment="kernel-headers-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823175" comment="kernel-tools-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823176" comment="kernel-tools-libs-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823178" comment="perf-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823179" comment="python-perf-3.10.0-693.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177890" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7890</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7890" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7890" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7890" ref_url="https://www.suse.com/security/cve/CVE-2017-7890" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006586.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2337-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6BGY762F6BUJS54OWR46XT7AVJK5VJMZ/#6BGY762F6BUJS54OWR46XT7AVJK5VJMZ" source="SUSE-SU"/>
    <description>
    The GIF decoding function gdImageCreateFromGifCtx in gd_gif_in.c in the GD Graphics Library (aka libgd), as used in PHP before 5.6.31 and 7.x before 7.1.7, does not zero colorMap arrays before use. A specially crafted GIF image could use the uninitialized tables to read ~700 bytes from the top of the stack, potentially disclosing sensitive information.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7890/">CVE-2017-7890 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7890">CVE-2017-7890 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1050241">SUSE bug 1050241</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824027" comment="php-5.4.16-43.el7_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824028" comment="php-bcmath-5.4.16-43.el7_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824029" comment="php-cli-5.4.16-43.el7_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824030" comment="php-common-5.4.16-43.el7_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824031" comment="php-dba-5.4.16-43.el7_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824032" comment="php-devel-5.4.16-43.el7_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824033" comment="php-embedded-5.4.16-43.el7_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824034" comment="php-enchant-5.4.16-43.el7_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824035" comment="php-fpm-5.4.16-43.el7_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824036" comment="php-gd-5.4.16-43.el7_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824037" comment="php-intl-5.4.16-43.el7_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824038" comment="php-ldap-5.4.16-43.el7_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824039" comment="php-mbstring-5.4.16-43.el7_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824040" comment="php-mysql-5.4.16-43.el7_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824041" comment="php-mysqlnd-5.4.16-43.el7_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824042" comment="php-odbc-5.4.16-43.el7_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824043" comment="php-pdo-5.4.16-43.el7_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824044" comment="php-pgsql-5.4.16-43.el7_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824045" comment="php-process-5.4.16-43.el7_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824046" comment="php-pspell-5.4.16-43.el7_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824047" comment="php-recode-5.4.16-43.el7_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824048" comment="php-snmp-5.4.16-43.el7_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824049" comment="php-soap-5.4.16-43.el7_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824050" comment="php-xml-5.4.16-43.el7_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824051" comment="php-xmlrpc-5.4.16-43.el7_4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177895" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7895</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7895" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7895" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7895" ref_url="https://www.suse.com/security/cve/CVE-2017-7895" source="SUSE CVE"/>
    <description>
    The NFSv2 and NFSv3 server implementations in the Linux kernel through 4.10.13 lack certain checks for the end of a buffer, which allows remote attackers to trigger pointer-arithmetic errors or possibly have unspecified other impact via crafted requests, related to fs/nfsd/nfs3xdr.c and fs/nfsd/nfsxdr.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7895/">CVE-2017-7895 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7895">CVE-2017-7895 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1034670">SUSE bug 1034670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036741">SUSE bug 1036741</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823110" comment="kernel-3.10.0-514.26.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823111" comment="kernel-abi-whitelists-3.10.0-514.26.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823112" comment="kernel-debug-3.10.0-514.26.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823115" comment="kernel-doc-3.10.0-514.26.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823116" comment="kernel-headers-3.10.0-514.26.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823117" comment="kernel-tools-3.10.0-514.26.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823118" comment="kernel-tools-libs-3.10.0-514.26.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823120" comment="perf-3.10.0-514.26.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823121" comment="python-perf-3.10.0-514.26.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177980" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7980</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7980" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7980" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7980" ref_url="https://www.suse.com/security/cve/CVE-2017-7980" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002839.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2963-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003413.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1872-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7XMS3TZG4TGPXHU4UGQT3AV4WTRA3LLN/#7XMS3TZG4TGPXHU4UGQT3AV4WTRA3LLN" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in Cirrus CLGD 54xx VGA Emulator in Quick Emulator (Qemu) 2.8 and earlier allows local guest OS users to execute arbitrary code or cause a denial of service (crash) via vectors related to a VNC client updating its display after a VGA operation.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7980/">CVE-2017-7980 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7980">CVE-2017-7980 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1035406">SUSE bug 1035406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035483">SUSE bug 1035483</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823067" comment="qemu-img-1.5.3-126.el7_3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823068" comment="qemu-kvm-1.5.3-126.el7_3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823069" comment="qemu-kvm-common-1.5.3-126.el7_3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823070" comment="qemu-kvm-tools-1.5.3-126.el7_3.9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178291" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8291</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8291" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8291" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8291" ref_url="https://www.suse.com/security/cve/CVE-2017-8291" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1404-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002921.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1203-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q4RDKDCBAZW4Q2SPPKJEMB3SNZBXD6RO/#Q4RDKDCBAZW4Q2SPPKJEMB3SNZBXD6RO" source="SUSE-SU"/>
    <description>
    Artifex Ghostscript through 2017-04-26 allows -dSAFER bypass and remote command execution via .rsdparams type confusion with a "/OutputFile (%pipe%" substring in a crafted .eps document that is an input to the gs program, as exploited in the wild in April 2017.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-30"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8291/">CVE-2017-8291 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8291">CVE-2017-8291 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1036453">SUSE bug 1036453</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822983" comment="ghostscript-9.07-20.el7_3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822984" comment="ghostscript-cups-9.07-20.el7_3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822985" comment="ghostscript-devel-9.07-20.el7_3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822986" comment="ghostscript-doc-9.07-20.el7_3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822987" comment="ghostscript-gtk-9.07-20.el7_3.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178386" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8386</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8386" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8386" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8386" ref_url="https://www.suse.com/security/cve/CVE-2017-8386" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1432-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0992-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006709.html" source="SUSE-SU"/>
    <description>
    git-shell in git before 2.4.12, 2.5.x before 2.5.6, 2.6.x before 2.6.7, 2.7.x before 2.7.5, 2.8.x before 2.8.5, 2.9.x before 2.9.4, 2.10.x before 2.10.3, 2.11.x before 2.11.2, and 2.12.x before 2.12.3 might allow remote authenticated users to gain privileges via a repository name that starts with a - (dash) character.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8386/">CVE-2017-8386 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8386">CVE-2017-8386 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1038395">SUSE bug 1038395</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823360" comment="emacs-git-1.8.3.1-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823361" comment="emacs-git-el-1.8.3.1-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823362" comment="git-1.8.3.1-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823363" comment="git-all-1.8.3.1-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823364" comment="git-bzr-1.8.3.1-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823365" comment="git-cvs-1.8.3.1-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823366" comment="git-daemon-1.8.3.1-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823367" comment="git-email-1.8.3.1-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823368" comment="git-gui-1.8.3.1-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823369" comment="git-hg-1.8.3.1-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823370" comment="git-p4-1.8.3.1-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823371" comment="git-svn-1.8.3.1-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823372" comment="gitk-1.8.3.1-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823373" comment="gitweb-1.8.3.1-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823374" comment="perl-Git-1.8.3.1-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823375" comment="perl-Git-SVN-1.8.3.1-11.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178422" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8422</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8422" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8422" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8422" ref_url="https://www.suse.com/security/cve/CVE-2017-8422" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1335-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002894.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1254-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OXWF5MZST53JVOUBYO7BZCE4XWZDCW4W/#OXWF5MZST53JVOUBYO7BZCE4XWZDCW4W" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1272-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/33KAK55QRSQ35AXMIM7ZB7B3VAJ3M553/#33KAK55QRSQ35AXMIM7ZB7B3VAJ3M553" source="SUSE-SU"/>
    <description>
    KDE kdelibs before 4.14.32 and KAuth before 5.34 allow local users to gain root privileges by spoofing a callerID and leveraging a privileged helper app.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8422/">CVE-2017-8422 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8422">CVE-2017-8422 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1033300">SUSE bug 1033300</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036244">SUSE bug 1036244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1041511">SUSE bug 1041511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/749065">SUSE bug 749065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/869959">SUSE bug 869959</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822991" comment="kdelibs-4.14.8-6.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822992" comment="kdelibs-apidocs-4.14.8-6.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822993" comment="kdelibs-common-4.14.8-6.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822994" comment="kdelibs-devel-4.14.8-6.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822995" comment="kdelibs-ktexteditor-4.14.8-6.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178779" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8779</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8779" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8779" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8779" ref_url="https://www.suse.com/security/cve/CVE-2017-8779" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002932.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1381-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KIGUM3WEFSDH5FSKVZN2GRB55FUVCJ7C/#KIGUM3WEFSDH5FSKVZN2GRB55FUVCJ7C" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1412-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2LTC4KPRY3SGGIAA5UD2P43DC5YVUZQ3/#2LTC4KPRY3SGGIAA5UD2P43DC5YVUZQ3" source="SUSE-SU"/>
    <description>
    rpcbind through 0.2.4, LIBTIRPC through 1.0.1 and 1.0.2-rc through 1.0.2-rc3, and NTIRPC through 1.4.3 do not consider the maximum RPC data size during memory allocation for XDR strings, which allows remote attackers to cause a denial of service (memory consumption with no subsequent free) via a crafted UDP packet to port 111, aka rpcbomb.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-8779/">CVE-2017-8779 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8779">CVE-2017-8779 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1037559">SUSE bug 1037559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037930">SUSE bug 1037930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101814">SUSE bug 1101814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/798028">SUSE bug 798028</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009822989" comment="libtirpc-0.2.4-0.8.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822990" comment="libtirpc-devel-0.2.4-0.8.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009822988" comment="rpcbind-0.2.0-38.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8797</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8797" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8797" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8797" ref_url="https://www.suse.com/security/cve/CVE-2017-8797" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003101.html" source="SUSE-SU"/>
    <description>
    The NFSv4 server in the Linux kernel before 4.11.3 does not properly validate the layout type when processing the NFSv4 pNFS GETDEVICEINFO or LAYOUTGET operand in a UDP packet from a remote attacker. This type value is uninitialized upon encountering certain error conditions. This value is used as an array index for dereferencing, which leads to an OOPS and eventually a DoS of knfsd and a soft-lockup of the whole system.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-8797/">CVE-2017-8797 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8797">CVE-2017-8797 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1046202">SUSE bug 1046202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046206">SUSE bug 1046206</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823168" comment="kernel-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823169" comment="kernel-abi-whitelists-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823170" comment="kernel-debug-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823173" comment="kernel-doc-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823174" comment="kernel-headers-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823175" comment="kernel-tools-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823176" comment="kernel-tools-libs-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823178" comment="perf-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823179" comment="python-perf-3.10.0-693.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178824" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8824</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8824" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8824" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8824" ref_url="https://www.suse.com/security/cve/CVE-2017-8824" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3410-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003550.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003629.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3358-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4UYJRYWN3YIKVO45AOJQMXXWEWZ76QPX/#4UYJRYWN3YIKVO45AOJQMXXWEWZ76QPX" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3359-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KNOTZX2CMPWZWZ2GTPQ2RA6T3XMG2V5Y/#KNOTZX2CMPWZWZ2GTPQ2RA6T3XMG2V5Y" source="SUSE-SU"/>
    <description>
    The dccp_disconnect function in net/dccp/proto.c in the Linux kernel through 4.14.3 allows local users to gain privileges or cause a denial of service (use-after-free) via an AF_UNSPEC connect system call during the DCCP_LISTEN state.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-8824/">CVE-2017-8824 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8824">CVE-2017-8824 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1070771">SUSE bug 1070771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076734">SUSE bug 1076734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092904">SUSE bug 1092904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115893">SUSE bug 1115893</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824165" comment="kernel-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824166" comment="kernel-abi-whitelists-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824167" comment="kernel-debug-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824170" comment="kernel-doc-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824171" comment="kernel-headers-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824172" comment="kernel-tools-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824173" comment="kernel-tools-libs-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824175" comment="perf-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824176" comment="python-perf-3.10.0-862.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178890" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8890</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8890" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8890" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8890" ref_url="https://www.suse.com/security/cve/CVE-2017-8890" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003108.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2446-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2448-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003328.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003367.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1513-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OJPCJK74NZCBK4RODZ6N44CRQEQUWPUA/#OJPCJK74NZCBK4RODZ6N44CRQEQUWPUA" source="SUSE-SU"/>
    <description>
    The inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c in the Linux kernel through 4.10.15 allows attackers to cause a denial of service (double free) or possibly have unspecified other impact by leveraging use of the accept system call.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-8890/">CVE-2017-8890 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8890">CVE-2017-8890 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1038544">SUSE bug 1038544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038564">SUSE bug 1038564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039883">SUSE bug 1039883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039885">SUSE bug 1039885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040069">SUSE bug 1040069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042364">SUSE bug 1042364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051906">SUSE bug 1051906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115893">SUSE bug 1115893</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823168" comment="kernel-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823169" comment="kernel-abi-whitelists-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823170" comment="kernel-debug-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823173" comment="kernel-doc-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823174" comment="kernel-headers-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823175" comment="kernel-tools-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823176" comment="kernel-tools-libs-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823178" comment="perf-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823179" comment="python-perf-3.10.0-693.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178932" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8932</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8932" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8932" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8932" ref_url="https://www.suse.com/security/cve/CVE-2017-8932" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2017:1965-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2017-July/006805.html" source="SUSE-SU"/>
    <description>
    A bug in the standard library ScalarMult implementation of curve P-256 for amd64 architectures in Go before 1.7.6 and 1.8.x before 1.8.2 causes incorrect results to be generated for specific input points. An adaptive attack can be mounted to progressively extract the scalar input to ScalarMult by submitting crafted points and observing failures to the derive correct output. This leads to a full key recovery attack against static ECDH, as used in popular JWT libraries.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8932/">CVE-2017-8932 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8932">CVE-2017-8932 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1040618">SUSE bug 1040618</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823198" comment="golang-1.8.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823199" comment="golang-bin-1.8.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823200" comment="golang-docs-1.8.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823201" comment="golang-misc-1.8.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823202" comment="golang-src-1.8.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823203" comment="golang-tests-1.8.3-1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179074" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9074</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9074" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9074" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9074" ref_url="https://www.suse.com/security/cve/CVE-2017-9074" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003367.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1513-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OJPCJK74NZCBK4RODZ6N44CRQEQUWPUA/#OJPCJK74NZCBK4RODZ6N44CRQEQUWPUA" source="SUSE-SU"/>
    <description>
    The IPv6 fragmentation implementation in the Linux kernel through 4.11.1 does not consider that the nexthdr field may be associated with an invalid option, which allows local users to cause a denial of service (out-of-bounds read and BUG) or possibly have unspecified other impact via crafted socket and send system calls.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9074/">CVE-2017-9074 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9074">CVE-2017-9074 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1039882">SUSE bug 1039882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115893">SUSE bug 1115893</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823168" comment="kernel-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823169" comment="kernel-abi-whitelists-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823170" comment="kernel-debug-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823173" comment="kernel-doc-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823174" comment="kernel-headers-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823175" comment="kernel-tools-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823176" comment="kernel-tools-libs-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823178" comment="perf-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823179" comment="python-perf-3.10.0-693.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179075" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9075</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9075" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9075" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9075" ref_url="https://www.suse.com/security/cve/CVE-2017-9075" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003367.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1513-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OJPCJK74NZCBK4RODZ6N44CRQEQUWPUA/#OJPCJK74NZCBK4RODZ6N44CRQEQUWPUA" source="SUSE-SU"/>
    <description>
    The sctp_v6_create_accept_sk function in net/sctp/ipv6.c in the Linux kernel through 4.11.1 mishandles inheritance, which allows local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9075/">CVE-2017-9075 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9075">CVE-2017-9075 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1038544">SUSE bug 1038544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039883">SUSE bug 1039883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051906">SUSE bug 1051906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115893">SUSE bug 1115893</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823168" comment="kernel-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823169" comment="kernel-abi-whitelists-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823170" comment="kernel-debug-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823173" comment="kernel-doc-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823174" comment="kernel-headers-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823175" comment="kernel-tools-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823176" comment="kernel-tools-libs-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823178" comment="perf-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823179" comment="python-perf-3.10.0-693.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179076" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9076</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9076" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9076" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9076" ref_url="https://www.suse.com/security/cve/CVE-2017-9076" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003367.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1513-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OJPCJK74NZCBK4RODZ6N44CRQEQUWPUA/#OJPCJK74NZCBK4RODZ6N44CRQEQUWPUA" source="SUSE-SU"/>
    <description>
    The dccp_v6_request_recv_sock function in net/dccp/ipv6.c in the Linux kernel through 4.11.1 mishandles inheritance, which allows local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9076/">CVE-2017-9076 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9076">CVE-2017-9076 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1038544">SUSE bug 1038544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039885">SUSE bug 1039885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040069">SUSE bug 1040069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051906">SUSE bug 1051906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115893">SUSE bug 1115893</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823168" comment="kernel-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823169" comment="kernel-abi-whitelists-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823170" comment="kernel-debug-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823173" comment="kernel-doc-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823174" comment="kernel-headers-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823175" comment="kernel-tools-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823176" comment="kernel-tools-libs-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823178" comment="perf-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823179" comment="python-perf-3.10.0-693.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9077</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9077" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9077" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9077" ref_url="https://www.suse.com/security/cve/CVE-2017-9077" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003367.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1513-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OJPCJK74NZCBK4RODZ6N44CRQEQUWPUA/#OJPCJK74NZCBK4RODZ6N44CRQEQUWPUA" source="SUSE-SU"/>
    <description>
    The tcp_v6_syn_recv_sock function in net/ipv6/tcp_ipv6.c in the Linux kernel through 4.11.1 mishandles inheritance, which allows local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9077/">CVE-2017-9077 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9077">CVE-2017-9077 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1038544">SUSE bug 1038544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040069">SUSE bug 1040069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042364">SUSE bug 1042364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115893">SUSE bug 1115893</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823168" comment="kernel-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823169" comment="kernel-abi-whitelists-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823170" comment="kernel-debug-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823173" comment="kernel-doc-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823174" comment="kernel-headers-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823175" comment="kernel-tools-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823176" comment="kernel-tools-libs-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823178" comment="perf-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823179" comment="python-perf-3.10.0-693.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179148" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9148</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9148" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9148" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9148" ref_url="https://www.suse.com/security/cve/CVE-2017-9148" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003008.html" source="SUSE-SU"/>
    <description>
    The TLS session cache in FreeRADIUS 2.1.1 through 2.1.7, 3.0.x before 3.0.14, 3.1.x before 2017-02-04, and 4.0.x before 2017-02-04 fails to reliably prevent resumption of an unauthenticated session, which allows remote attackers (such as malicious 802.1X supplicants) to bypass authentication via PEAP or TTLS.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-9148/">CVE-2017-9148 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9148">CVE-2017-9148 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1041445">SUSE bug 1041445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046141">SUSE bug 1046141</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823098" comment="freeradius-3.0.4-8.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823099" comment="freeradius-devel-3.0.4-8.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823100" comment="freeradius-doc-3.0.4-8.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823101" comment="freeradius-krb5-3.0.4-8.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823102" comment="freeradius-ldap-3.0.4-8.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823103" comment="freeradius-mysql-3.0.4-8.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823104" comment="freeradius-perl-3.0.4-8.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823105" comment="freeradius-postgresql-3.0.4-8.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823106" comment="freeradius-python-3.0.4-8.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823107" comment="freeradius-sqlite-3.0.4-8.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823108" comment="freeradius-unixODBC-3.0.4-8.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823109" comment="freeradius-utils-3.0.4-8.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179242" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9242</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9242" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9242" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9242" ref_url="https://www.suse.com/security/cve/CVE-2017-9242" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003108.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2099-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2446-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2448-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003233.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003328.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003367.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1633-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/P2HNEQKNZE2RG4SRLNOORHC25EUGVNTP/#P2HNEQKNZE2RG4SRLNOORHC25EUGVNTP" source="SUSE-SU"/>
    <description>
    The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel through 4.11.3 is too late in checking whether an overwrite of an skb data structure may occur, which allows local users to cause a denial of service (system crash) via crafted system calls.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9242/">CVE-2017-9242 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9242">CVE-2017-9242 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1041431">SUSE bug 1041431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042892">SUSE bug 1042892</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823168" comment="kernel-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823169" comment="kernel-abi-whitelists-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823170" comment="kernel-debug-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823173" comment="kernel-doc-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823174" comment="kernel-headers-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823175" comment="kernel-tools-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823176" comment="kernel-tools-libs-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823178" comment="perf-3.10.0-693.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823179" comment="python-perf-3.10.0-693.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179287" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9287</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9287" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9287" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9287" ref_url="https://www.suse.com/security/cve/CVE-2017-9287" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1567-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0931-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005325.html" source="SUSE-SU"/>
    <description>
    servers/slapd/back-mdb/search.c in OpenLDAP through 2.4.44 is prone to a double free vulnerability. A user with access to search the directory can crash slapd by issuing a search including the Paged Results control with a page size of 0.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9287/">CVE-2017-9287 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9287">CVE-2017-9287 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1041764">SUSE bug 1041764</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823180" comment="openldap-2.4.44-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823181" comment="openldap-clients-2.4.44-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823182" comment="openldap-devel-2.4.44-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823183" comment="openldap-servers-2.4.44-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823184" comment="openldap-servers-sql-2.4.44-5.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179461" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9461</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9461" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9461" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9461" ref_url="https://www.suse.com/security/cve/CVE-2017-9461" source="SUSE CVE"/>
    <description>
    smbd in Samba before 4.4.10 and 4.5.x before 4.5.6 has a denial of service vulnerability (fd_open_atomic infinite loop with high CPU usage and memory consumption) due to wrongly handling dangling symlinks.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-9461/">CVE-2017-9461 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9461">CVE-2017-9461 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823311" comment="ctdb-4.6.2-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823312" comment="ctdb-tests-4.6.2-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823313" comment="libsmbclient-4.6.2-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823314" comment="libsmbclient-devel-4.6.2-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823315" comment="libwbclient-4.6.2-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823316" comment="libwbclient-devel-4.6.2-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823317" comment="samba-4.6.2-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823318" comment="samba-client-4.6.2-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823319" comment="samba-client-libs-4.6.2-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823320" comment="samba-common-4.6.2-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823321" comment="samba-common-libs-4.6.2-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823322" comment="samba-common-tools-4.6.2-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823323" comment="samba-dc-4.6.2-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823324" comment="samba-dc-libs-4.6.2-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823325" comment="samba-devel-4.6.2-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823326" comment="samba-krb5-printing-4.6.2-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823327" comment="samba-libs-4.6.2-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823328" comment="samba-pidl-4.6.2-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823329" comment="samba-python-4.6.2-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823330" comment="samba-test-4.6.2-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823331" comment="samba-test-libs-4.6.2-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823332" comment="samba-vfs-glusterfs-4.6.2-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823333" comment="samba-winbind-4.6.2-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823334" comment="samba-winbind-clients-4.6.2-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823335" comment="samba-winbind-krb5-locator-4.6.2-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823336" comment="samba-winbind-modules-4.6.2-8.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179462" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9462</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9462" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9462" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9462" ref_url="https://www.suse.com/security/cve/CVE-2017-9462" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002954.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PWJ7DZ5LQCUBZLVGLWL356CAZTRYEZHD/#PWJ7DZ5LQCUBZLVGLWL356CAZTRYEZHD" source="SUSE-SU"/>
    <description>
    In Mercurial before 4.1.3, "hg serve --stdio" allows remote authenticated users to launch the Python debugger, and consequently execute arbitrary code, by using --debugger as a repository name.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-04-24"/>
	<severity>Important</severity>
	<cve impact="critical" cvss3="9/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9462/">CVE-2017-9462 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9462">CVE-2017-9462 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1043063">SUSE bug 1043063</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823094" comment="emacs-mercurial-2.6.2-7.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823095" comment="emacs-mercurial-el-2.6.2-7.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823096" comment="mercurial-2.6.2-7.el7_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823097" comment="mercurial-hgk-2.6.2-7.el7_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179524" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9524</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9524" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9524" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9524" ref_url="https://www.suse.com/security/cve/CVE-2017-9524" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2936-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003376.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2941-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NIVAYUS4Z3IDRS3LK2TACYUZB2ORNQTR/#NIVAYUS4Z3IDRS3LK2TACYUZB2ORNQTR" source="SUSE-SU"/>
    <description>
    The qemu-nbd server in QEMU (aka Quick Emulator), when built with the Network Block Device (NBD) Server support, allows remote attackers to cause a denial of service (segmentation fault and server crash) by leveraging failure to ensure that all initialization occurs before talking to a client in the nbd_negotiate function.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9524/">CVE-2017-9524 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9524">CVE-2017-9524 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1043808">SUSE bug 1043808</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823136" comment="qemu-img-1.5.3-126.el7_3.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823137" comment="qemu-kvm-1.5.3-126.el7_3.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823138" comment="qemu-kvm-common-1.5.3-126.el7_3.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823139" comment="qemu-kvm-tools-1.5.3-126.el7_3.10 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179725" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9725</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9725" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9725" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9725" ref_url="https://www.suse.com/security/cve/CVE-2017-9725" source="SUSE CVE"/>
    <description>
    In all Qualcomm products with Android releases from CAF using the Linux kernel, during DMA allocation, due to wrong data type of size, allocation size gets truncated which makes allocation succeed when it should fail.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9725/">CVE-2017-9725 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9725">CVE-2017-9725 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1057481">SUSE bug 1057481</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824165" comment="kernel-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824166" comment="kernel-abi-whitelists-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824167" comment="kernel-debug-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824170" comment="kernel-doc-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824171" comment="kernel-headers-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824172" comment="kernel-tools-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824173" comment="kernel-tools-libs-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824175" comment="perf-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824176" comment="python-perf-3.10.0-862.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179775" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9775</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9775" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9775" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9775" ref_url="https://www.suse.com/security/cve/CVE-2017-9775" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003076.html" source="SUSE-SU"/>
    <description>
    Stack buffer overflow in GfxState.cc in pdftocairo in Poppler before 0.56 allows remote attackers to cause a denial of service (application crash) via a crafted PDF document.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9775/">CVE-2017-9775 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9775">CVE-2017-9775 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1045719">SUSE bug 1045719</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823591" comment="poppler-0.26.5-17.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823592" comment="poppler-cpp-0.26.5-17.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823593" comment="poppler-cpp-devel-0.26.5-17.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823594" comment="poppler-demos-0.26.5-17.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823595" comment="poppler-devel-0.26.5-17.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823596" comment="poppler-glib-0.26.5-17.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823597" comment="poppler-glib-devel-0.26.5-17.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823598" comment="poppler-qt-0.26.5-17.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823599" comment="poppler-qt-devel-0.26.5-17.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823600" comment="poppler-utils-0.26.5-17.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179776" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9776</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9776" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9776" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9776" ref_url="https://www.suse.com/security/cve/CVE-2017-9776" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003076.html" source="SUSE-SU"/>
    <description>
    Integer overflow leading to Heap buffer overflow in JBIG2Stream.cc in pdftocairo in Poppler before 0.56 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted PDF document.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9776/">CVE-2017-9776 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9776">CVE-2017-9776 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1045721">SUSE bug 1045721</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823591" comment="poppler-0.26.5-17.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823592" comment="poppler-cpp-0.26.5-17.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823593" comment="poppler-cpp-devel-0.26.5-17.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823594" comment="poppler-demos-0.26.5-17.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823595" comment="poppler-devel-0.26.5-17.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823596" comment="poppler-glib-0.26.5-17.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823597" comment="poppler-glib-devel-0.26.5-17.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823598" comment="poppler-qt-0.26.5-17.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823599" comment="poppler-qt-devel-0.26.5-17.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823600" comment="poppler-utils-0.26.5-17.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179788" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9788</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9788" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9788" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9788" ref_url="https://www.suse.com/security/cve/CVE-2017-9788" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003305.html" source="SUSE-SU"/>
    <description>
    In Apache httpd before 2.2.34 and 2.4.x before 2.4.27, the value placeholder in [Proxy-]Authorization headers of type 'Digest' was not initialized or reset before or between successive key=value assignments by mod_auth_digest. Providing an initial key with no '=' assignment could reflect the stale value of uninitialized pool memory used by the prior request, leading to leakage of potentially confidential information, and a segfault in other cases resulting in denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9788/">CVE-2017-9788 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9788">CVE-2017-9788 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1048576">SUSE bug 1048576</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823539" comment="httpd-2.4.6-67.el7_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823540" comment="httpd-devel-2.4.6-67.el7_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823541" comment="httpd-manual-2.4.6-67.el7_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823542" comment="httpd-tools-2.4.6-67.el7_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823543" comment="mod_ldap-2.4.6-67.el7_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823544" comment="mod_proxy_html-2.4.6-67.el7_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823545" comment="mod_session-2.4.6-67.el7_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823546" comment="mod_ssl-2.4.6-67.el7_4.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179798" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9798</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9798" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9798" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9798" ref_url="https://www.suse.com/security/cve/CVE-2017-9798" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2718-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003365.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1057-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MLFP43VCYBFTSZUBC5JVSDITYRWTNN5C/#MLFP43VCYBFTSZUBC5JVSDITYRWTNN5C" source="SUSE-SU"/>
    <description>
    Apache httpd allows remote attackers to read secret data from process memory if the Limit directive can be set in a user's .htaccess file, or if httpd.conf has certain misconfigurations, aka Optionsbleed. This affects the Apache HTTP Server through 2.2.34 and 2.4.x through 2.4.27. The attacker sends an unauthenticated OPTIONS HTTP request when attempting to read secret data. This is a use-after-free issue and thus secret data is not always sent, and the specific data depends on many factors including configuration. Exploitation with .htaccess can be blocked with a patch to the ap_limit_section function in server/core.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-9798/">CVE-2017-9798 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9798">CVE-2017-9798 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1058058">SUSE bug 1058058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060757">SUSE bug 1060757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077582">SUSE bug 1077582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078450">SUSE bug 1078450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089997">SUSE bug 1089997</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823673" comment="httpd-2.4.6-67.el7_4.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823674" comment="httpd-devel-2.4.6-67.el7_4.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823675" comment="httpd-manual-2.4.6-67.el7_4.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823676" comment="httpd-tools-2.4.6-67.el7_4.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823677" comment="mod_ldap-2.4.6-67.el7_4.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823678" comment="mod_proxy_html-2.4.6-67.el7_4.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823679" comment="mod_session-2.4.6-67.el7_4.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823680" comment="mod_ssl-2.4.6-67.el7_4.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9800</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9800" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9800" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9800" ref_url="https://www.suse.com/security/cve/CVE-2017-9800" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003142.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2183-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7JJZFNODLL6KFHVKVQMBII26AFD7JBJV/#7JJZFNODLL6KFHVKVQMBII26AFD7JBJV" source="SUSE-SU"/>
    <description>
    A maliciously constructed svn+ssh:// URL would cause Subversion clients before 1.8.19, 1.9.x before 1.9.7, and 1.10.0.x through 1.10.0-alpha3 to run an arbitrary shell command. Such a URL could be generated by a malicious server, by a malicious user committing to a honest server (to attack another user of that server's repositories), or by a proxy server. The vulnerability affects all clients, including those that use file://, http://, and plain (untunneled) svn://.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9800/">CVE-2017-9800 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9800">CVE-2017-9800 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1051362">SUSE bug 1051362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052481">SUSE bug 1052481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052696">SUSE bug 1052696</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052932">SUSE bug 1052932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053364">SUSE bug 1053364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054653">SUSE bug 1054653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066430">SUSE bug 1066430</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071709">SUSE bug 1071709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128150">SUSE bug 1128150</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823547" comment="mod_dav_svn-1.7.14-11.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823548" comment="subversion-1.7.14-11.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823549" comment="subversion-devel-1.7.14-11.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823550" comment="subversion-gnome-1.7.14-11.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823551" comment="subversion-javahl-1.7.14-11.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823552" comment="subversion-kde-1.7.14-11.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823553" comment="subversion-libs-1.7.14-11.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823554" comment="subversion-perl-1.7.14-11.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823555" comment="subversion-python-1.7.14-11.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823556" comment="subversion-ruby-1.7.14-11.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823557" comment="subversion-tools-1.7.14-11.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20180494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-0494</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-0494" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0494" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-0494" ref_url="https://www.suse.com/security/cve/CVE-2018-0494" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1383-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JZ7PSI37UDFAMGTQGYPPP7GUZQC63NK5/#JZ7PSI37UDFAMGTQGYPPP7GUZQC63NK5" source="SUSE-SU"/>
    <description>
    GNU Wget before 1.19.5 is prone to a cookie injection vulnerability in the resp_new function in http.c via a \r\n sequence in a continuation line.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-0494/">CVE-2018-0494 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0494">CVE-2018-0494 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1092061">SUSE bug 1092061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123797">SUSE bug 1123797</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159418">SUSE bug 1159418</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824638" comment="wget-1.14-18.el7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20180495" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-0495</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-0495" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0495" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-0495" ref_url="https://www.suse.com/security/cve/CVE-2018-0495" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1993-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2452-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4236-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005339.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2122-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K44EEDKDT6DYRZD3RRBBFW356RIIETXT/#K44EEDKDT6DYRZD3RRBBFW356RIIETXT" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2178-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6TJA2LGC65AB5GZVV7A5YTA2H6TGRDAX/#6TJA2LGC65AB5GZVV7A5YTA2H6TGRDAX" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4283-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PVOHMMYUB4EBVJNCM6KS54JBQFLRIHPI/#PVOHMMYUB4EBVJNCM6KS54JBQFLRIHPI" source="SUSE-SU"/>
    <description>
    Libgcrypt before 1.7.10 and 1.8.x before 1.8.3 allows a memory-cache side-channel attack on ECDSA signatures that can be mitigated through the use of blinding during the signing process in the _gcry_ecc_ecdsa_sign function in cipher/ecc-ecdsa.c, aka the Return Of the Hidden Number Problem or ROHNP. To discover an ECDSA key, the attacker needs access to either the local machine or a different virtual machine on the same physical host.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0495/">CVE-2018-0495 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0495">CVE-2018-0495 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1097410">SUSE bug 1097410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121207">SUSE bug 1121207</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826490" comment="nspr-4.21.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826491" comment="nspr-devel-4.21.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826492" comment="nss-3.44.0-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826493" comment="nss-devel-3.44.0-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826494" comment="nss-pkcs11-devel-3.44.0-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826495" comment="nss-softokn-3.44.0-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826496" comment="nss-softokn-devel-3.44.0-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826497" comment="nss-softokn-freebl-3.44.0-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826498" comment="nss-softokn-freebl-devel-3.44.0-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826499" comment="nss-sysinit-3.44.0-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826500" comment="nss-tools-3.44.0-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826501" comment="nss-util-3.44.0-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826502" comment="nss-util-devel-3.44.0-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825305" comment="openssl-1.0.2k-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825306" comment="openssl-devel-1.0.2k-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825307" comment="openssl-libs-1.0.2k-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825308" comment="openssl-perl-1.0.2k-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825309" comment="openssl-static-1.0.2k-16.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20180618" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-0618</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-0618" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0618" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-0618" ref_url="https://www.suse.com/security/cve/CVE-2018-0618" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:4296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1858-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BLJ6WNZJTV3KSXHIBKKHHAOJJEBHPWY4/#BLJ6WNZJTV3KSXHIBKKHHAOJJEBHPWY4" source="SUSE-SU"/>
    <description>
    Cross-site scripting vulnerability in Mailman 2.1.26 and earlier allows remote authenticated attackers to inject arbitrary web script or HTML via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-0618/">CVE-2018-0618 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0618">CVE-2018-0618 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1099510">SUSE bug 1099510</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827656" comment="mailman-2.1.15-30.el7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20180732" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-0732</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-0732" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0732" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-0732" ref_url="https://www.suse.com/security/cve/CVE-2018-0732" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1887-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1968-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2534-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20182534-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2956-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2965-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005586.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1906-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LXQB6RHQJIVOORGSWZAD6OVXFA3RULPE/#LXQB6RHQJIVOORGSWZAD6OVXFA3RULPE" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2117-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/F3ZAGM4A5HVGKFQM74NZZFR6YOSMVC6H/#F3ZAGM4A5HVGKFQM74NZZFR6YOSMVC6H" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2129-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UWGYNDKJ6PICOJ32FEKD76F4JXFJEKHI/#UWGYNDKJ6PICOJ32FEKD76F4JXFJEKHI" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2667-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FCDZ7GLSL23WT22IQU4KISWM7XBY5UO2/#FCDZ7GLSL23WT22IQU4KISWM7XBY5UO2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2695-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WVNVGC7M6N7O4J65Z6CCM5OGFL4GWFDZ/#WVNVGC7M6N7O4J65Z6CCM5OGFL4GWFDZ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2816-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LYUIV6EYNJ3355RPQTTDUGSOYYXRGIJA/#LYUIV6EYNJ3355RPQTTDUGSOYYXRGIJA" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2855-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/L6GR7U6TGFSNVTN2OORBDADTDNGZTYEM/#L6GR7U6TGFSNVTN2OORBDADTDNGZTYEM" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3013-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5K3CSNKQ5KLBKFPD3CPU2B7TX2ESVCUN/#5K3CSNKQ5KLBKFPD3CPU2B7TX2ESVCUN" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3015-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KFC7X2UNSP2WXTALHPX2AM5EANDJNTDI/#KFC7X2UNSP2WXTALHPX2AM5EANDJNTDI" source="SUSE-SU"/>
    <description>
    During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-02-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-0732/">CVE-2018-0732 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0732">CVE-2018-0732 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1077628">SUSE bug 1077628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087102">SUSE bug 1087102</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097158">SUSE bug 1097158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099502">SUSE bug 1099502</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106692">SUSE bug 1106692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108542">SUSE bug 1108542</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110163">SUSE bug 1110163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112097">SUSE bug 1112097</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122198">SUSE bug 1122198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148697">SUSE bug 1148697</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825305" comment="openssl-1.0.2k-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825306" comment="openssl-devel-1.0.2k-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825307" comment="openssl-libs-1.0.2k-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825308" comment="openssl-perl-1.0.2k-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825309" comment="openssl-static-1.0.2k-16.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20180734" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-0734</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-0734" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0734" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-0734" ref_url="https://www.suse.com/security/cve/CVE-2018-0734" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3863-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004873.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3864-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3866-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3945-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183945-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3964-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183964-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3989-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005586.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3890-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O5DLYYXYOD3Y2CTWTWBAIZE2CVLVVOGR/#O5DLYYXYOD3Y2CTWTWBAIZE2CVLVVOGR" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3903-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/33ZHM3NJ5DWLZFFD5BEPGTEBVQR7TL5H/#33ZHM3NJ5DWLZFFD5BEPGTEBVQR7TL5H" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4050-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RP4YGFIZ2DT67O24SFMUGKHPDZE2YQ6E/#RP4YGFIZ2DT67O24SFMUGKHPDZE2YQ6E" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4104-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J4BMNRK7ZVDGHSZAJJ4O24DNPDEMLYIY/#J4BMNRK7ZVDGHSZAJJ4O24DNPDEMLYIY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0084-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TSUMEMN7UGDKZYOYYDERMMDEYTAE4KOD/#TSUMEMN7UGDKZYOYYDERMMDEYTAE4KOD" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0088-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MCR24YF2JL7BUZULCM3J6PO547A2FBEH/#MCR24YF2JL7BUZULCM3J6PO547A2FBEH" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0138-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TTCAAVZAMA2OKJYY5RKTV5VCZWZ5Z2EN/#TTCAAVZAMA2OKJYY5RKTV5VCZWZ5Z2EN" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0234-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TEDLOHSLOHZ36RTEAODDXPLT3YMQBGBI/#TEDLOHSLOHZ36RTEAODDXPLT3YMQBGBI" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1547-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YLQFCLW7556SZJCWGWKR74FS7FGGTK7J/#YLQFCLW7556SZJCWGWKR74FS7FGGTK7J" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1814-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RTRWENR4KO4H3XNPBQUVKRGCPIDNAWUN/#RTRWENR4KO4H3XNPBQUVKRGCPIDNAWUN" source="SUSE-SU"/>
    <description>
    The OpenSSL DSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.1a (Affected 1.1.1). Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed in OpenSSL 1.0.2q (Affected 1.0.2-1.0.2p).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0734/">CVE-2018-0734 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0734">CVE-2018-0734 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1113534">SUSE bug 1113534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113652">SUSE bug 1113652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113742">SUSE bug 1113742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122198">SUSE bug 1122198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122212">SUSE bug 1122212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148697">SUSE bug 1148697</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826561" comment="openssl-1.0.2k-19.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826562" comment="openssl-devel-1.0.2k-19.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826563" comment="openssl-libs-1.0.2k-19.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826564" comment="openssl-perl-1.0.2k-19.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826565" comment="openssl-static-1.0.2k-19.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20180737" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-0737</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-0737" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0737" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-0737" ref_url="https://www.suse.com/security/cve/CVE-2018-0737" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2492-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2928-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2965-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004873.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3864-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005586.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2695-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WVNVGC7M6N7O4J65Z6CCM5OGFL4GWFDZ/#WVNVGC7M6N7O4J65Z6CCM5OGFL4GWFDZ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2957-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/P274BXIHSGDJS6M2S4OFQ5HJMFD2PM55/#P274BXIHSGDJS6M2S4OFQ5HJMFD2PM55" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3015-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KFC7X2UNSP2WXTALHPX2AM5EANDJNTDI/#KFC7X2UNSP2WXTALHPX2AM5EANDJNTDI" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0152-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HIAYIHJLDAY2NLW33V5MTK3K22WFL3KN/#HIAYIHJLDAY2NLW33V5MTK3K22WFL3KN" source="SUSE-SU"/>
    <description>
    The OpenSSL RSA Key generation algorithm has been shown to be vulnerable to a cache timing side channel attack. An attacker with sufficient access to mount cache timing attacks during the RSA key generation process could recover the private key. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2b-1.0.2o).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0737/">CVE-2018-0737 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0737">CVE-2018-0737 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1089039">SUSE bug 1089039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089041">SUSE bug 1089041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089044">SUSE bug 1089044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089045">SUSE bug 1089045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108542">SUSE bug 1108542</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123780">SUSE bug 1123780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825305" comment="openssl-1.0.2k-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825306" comment="openssl-devel-1.0.2k-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825307" comment="openssl-libs-1.0.2k-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825308" comment="openssl-perl-1.0.2k-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825309" comment="openssl-static-1.0.2k-16.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20180739" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-0739</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-0739" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0739" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-0739" ref_url="https://www.suse.com/security/cve/CVE-2018-0739" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003897.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2534-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20182534-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006535.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1057-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MLFP43VCYBFTSZUBC5JVSDITYRWTNN5C/#MLFP43VCYBFTSZUBC5JVSDITYRWTNN5C" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2208-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TB7QFJY4AJ4QZ5FMCLM4J6VZVT363YSH/#TB7QFJY4AJ4QZ5FMCLM4J6VZVT363YSH" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2238-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TKPQ3YXL5ZVJM4OCSADUC6JYCCIR6EIR/#TKPQ3YXL5ZVJM4OCSADUC6JYCCIR6EIR" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2293-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UNBLNDQ3K45QI6KFSQ2UZSBOVQ6QHQQB/#UNBLNDQ3K45QI6KFSQ2UZSBOVQ6QHQQB" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2524-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O6Y2Q53SARM33ZNDBTJD7HGXN4LJY3W3/#O6Y2Q53SARM33ZNDBTJD7HGXN4LJY3W3" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2695-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WVNVGC7M6N7O4J65Z6CCM5OGFL4GWFDZ/#WVNVGC7M6N7O4J65Z6CCM5OGFL4GWFDZ" source="SUSE-SU"/>
    <description>
    Constructed ASN.1 types with a recursive definition (such as can be found in PKCS7) could eventually exceed the stack given malicious input with excessive recursion. This could result in a Denial Of Service attack. There are no such structures used within SSL/TLS that come from untrusted sources so this is considered safe. Fixed in OpenSSL 1.1.0h (Affected 1.1.0-1.1.0g). Fixed in OpenSSL 1.0.2o (Affected 1.0.2b-1.0.2n).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-02-22"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-0739/">CVE-2018-0739 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0739">CVE-2018-0739 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1087102">SUSE bug 1087102</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089997">SUSE bug 1089997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094291">SUSE bug 1094291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108542">SUSE bug 1108542</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824799" comment="OVMF-20180508-3.gitee3198e672e2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825305" comment="openssl-1.0.2k-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825306" comment="openssl-devel-1.0.2k-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825307" comment="openssl-libs-1.0.2k-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825308" comment="openssl-perl-1.0.2k-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825309" comment="openssl-static-1.0.2k-16.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000001" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000001</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000001" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000001" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000001" ref_url="https://www.suse.com/security/cve/CVE-2018-1000001" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0075-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004372.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0089-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JJS3XXDA4SHQTNPUFBZSZ5XHKSMTGGOF/#JJS3XXDA4SHQTNPUFBZSZ5XHKSMTGGOF" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0494-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CRF5MPDADQ4YUE6MODU4JUS5YDCKTOEA/#CRF5MPDADQ4YUE6MODU4JUS5YDCKTOEA" source="SUSE-SU"/>
    <description>
    In glibc 2.26 and earlier there is confusion in the usage of getcwd() by realpath() which can be used to write before the destination buffer leading to a buffer underflow and potential code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1000001/">CVE-2018-1000001 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000001">CVE-2018-1000001 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1074293">SUSE bug 1074293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099047">SUSE bug 1099047</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123874">SUSE bug 1123874</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824075" comment="glibc-2.17-222.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824076" comment="glibc-common-2.17-222.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824077" comment="glibc-devel-2.17-222.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824078" comment="glibc-headers-2.17-222.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824079" comment="glibc-static-2.17-222.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824080" comment="glibc-utils-2.17-222.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824081" comment="nscd-2.17-222.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000004" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000004</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000004" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000004" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000004" ref_url="https://www.suse.com/security/cve/CVE-2018-1000004" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0437-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2018-February/007939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0989-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0992-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0993-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0995-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1004-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1005-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1009-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1010-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1013-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1019-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1022-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1023-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003949.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0408-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TBPHSNBEYKQGP3AGWJUUS3K6HJEQZTZE/#TBPHSNBEYKQGP3AGWJUUS3K6HJEQZTZE" source="SUSE-SU"/>
    <description>
    In the Linux kernel 4.12, 3.10, 2.6 and possibly earlier versions a race condition vulnerability exists in the sound system, this can lead to a deadlock and denial of service condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000004/">CVE-2018-1000004 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000004">CVE-2018-1000004 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1076017">SUSE bug 1076017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091815">SUSE bug 1091815</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824165" comment="kernel-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824166" comment="kernel-abi-whitelists-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824167" comment="kernel-debug-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824170" comment="kernel-doc-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824171" comment="kernel-headers-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824172" comment="kernel-tools-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824173" comment="kernel-tools-libs-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824175" comment="perf-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824176" comment="python-perf-3.10.0-862.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000007" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000007</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000007" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000007" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000007" ref_url="https://www.suse.com/security/cve/CVE-2018-1000007" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003634.html" source="SUSE-SU"/>
    <description>
    libcurl 7.1 through 7.57.0 might accidentally leak authentication data to third parties. When asked to send custom headers in its HTTP requests, libcurl will send that set of headers first to the host in the initial URL but also, if asked to follow redirects and a 30X HTTP response code is returned, to the host mentioned in URL in the `Location:` response header value. Sending the same set of headers to subsequent hosts is in particular a problem for applications that pass on custom `Authorization:` headers, as this header often contains privacy sensitive information or data that could allow others to impersonate the libcurl-using client's request.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000007/">CVE-2018-1000007 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000007">CVE-2018-1000007 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1077001">SUSE bug 1077001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145903">SUSE bug 1145903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185551">SUSE bug 1185551</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192797">SUSE bug 1192797</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198766">SUSE bug 1198766</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825267" comment="curl-7.29.0-51.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825268" comment="libcurl-7.29.0-51.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825269" comment="libcurl-devel-7.29.0-51.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825270" comment="nss-pem-1.0.3-5.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000024" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000024</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000024" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000024" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000024" ref_url="https://www.suse.com/security/cve/CVE-2018-1000024" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0636-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0752-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003826.html" source="SUSE-SU"/>
    <description>
    The Squid Software Foundation Squid HTTP Caching Proxy version 3.0 to 3.5.27, 4.0 to 4.0.22 contains a Incorrect Pointer Handling vulnerability in ESI Response Processing that can result in Denial of Service for all clients using the proxy.. This attack appear to be exploitable via Remote server delivers an HTTP response payload containing valid but unusual ESI syntax.. This vulnerability appears to have been fixed in 4.0.23 and later.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000024/">CVE-2018-1000024 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000024">CVE-2018-1000024 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1077003">SUSE bug 1077003</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827678" comment="squid-3.5.20-15.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827679" comment="squid-migration-script-3.5.20-15.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827680" comment="squid-sysvinit-3.5.20-15.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000026" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000026</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000026" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000026" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000026" ref_url="https://www.suse.com/security/cve/CVE-2018-1000026" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2962-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20182962-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004645.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0781-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IGSNRZOHBLG7CUS6RPT3LPE2GCEITYQD/#IGSNRZOHBLG7CUS6RPT3LPE2GCEITYQD" source="SUSE-SU"/>
    <description>
    Linux Linux kernel version at least v4.8 onwards, probably well before contains a Insufficient input validation vulnerability in bnx2x network card driver that can result in DoS: Network card firmware assertion takes card off-line. This attack appear to be exploitable via An attacker on a must pass a very large, specially crafted packet to the bnx2x card. This can be done from an untrusted guest VM..
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.7/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000026/">CVE-2018-1000026 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000026">CVE-2018-1000026 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1079384">SUSE bug 1079384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096723">SUSE bug 1096723</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824786" comment="bpftool-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824787" comment="kernel-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824788" comment="kernel-abi-whitelists-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824789" comment="kernel-debug-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824792" comment="kernel-doc-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824793" comment="kernel-headers-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824794" comment="kernel-tools-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824795" comment="kernel-tools-libs-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824797" comment="perf-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824798" comment="python-perf-3.10.0-957.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000027" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000027</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000027" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000027" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000027" ref_url="https://www.suse.com/security/cve/CVE-2018-1000027" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0636-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0752-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003826.html" source="SUSE-SU"/>
    <description>
    The Squid Software Foundation Squid HTTP Caching Proxy version prior to version 4.0.23 contains a NULL Pointer Dereference vulnerability in HTTP Response X-Forwarded-For header processing that can result in Denial of Service to all clients of the proxy. This attack appear to be exploitable via Remote HTTP server responding with an X-Forwarded-For header to certain types of HTTP request. This vulnerability appears to have been fixed in 4.0.23 and later.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000027/">CVE-2018-1000027 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000027">CVE-2018-1000027 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1077006">SUSE bug 1077006</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827678" comment="squid-3.5.20-15.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827679" comment="squid-migration-script-3.5.20-15.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827680" comment="squid-sysvinit-3.5.20-15.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000073" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000073</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000073" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000073" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000073" ref_url="https://www.suse.com/security/cve/CVE-2018-1000073" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1771-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DDFTKHWDUNIX327O4WIHXU2TIVV47W3Z/#DDFTKHWDUNIX327O4WIHXU2TIVV47W3Z" source="SUSE-SU"/>
    <description>
    RubyGems version Ruby 2.2 series: 2.2.9 and earlier, Ruby 2.3 series: 2.3.6 and earlier, Ruby 2.4 series: 2.4.3 and earlier, Ruby 2.5 series: 2.5.0 and earlier, prior to trunk revision 62422 contains a Directory Traversal vulnerability in install_location function of package.rb that can result in path traversal when writing to a symlinked basedir outside of the root. This vulnerability appears to have been fixed in 2.7.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000073/">CVE-2018-1000073 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000073">CVE-2018-1000073 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1082007">SUSE bug 1082007</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825992" comment="ruby-2.0.0.648-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825993" comment="ruby-devel-2.0.0.648-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825994" comment="ruby-doc-2.0.0.648-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825995" comment="ruby-irb-2.0.0.648-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825996" comment="ruby-libs-2.0.0.648-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825997" comment="ruby-tcltk-2.0.0.648-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825998" comment="rubygem-bigdecimal-1.2.0-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825999" comment="rubygem-io-console-0.4.2-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826000" comment="rubygem-json-1.7.7-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826001" comment="rubygem-minitest-4.3.2-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826002" comment="rubygem-psych-2.0.0-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826003" comment="rubygem-rake-0.9.6-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826004" comment="rubygem-rdoc-4.0.0-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826005" comment="rubygems-2.0.14.1-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826006" comment="rubygems-devel-2.0.14.1-36.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000074" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000074</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000074" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000074" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000074" ref_url="https://www.suse.com/security/cve/CVE-2018-1000074" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1771-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DDFTKHWDUNIX327O4WIHXU2TIVV47W3Z/#DDFTKHWDUNIX327O4WIHXU2TIVV47W3Z" source="SUSE-SU"/>
    <description>
    RubyGems version Ruby 2.2 series: 2.2.9 and earlier, Ruby 2.3 series: 2.3.6 and earlier, Ruby 2.4 series: 2.4.3 and earlier, Ruby 2.5 series: 2.5.0 and earlier, prior to trunk revision 62422 contains a Deserialization of Untrusted Data vulnerability in owner command that can result in code execution. This attack appear to be exploitable via victim must run the `gem owner` command on a gem with a specially crafted YAML file. This vulnerability appears to have been fixed in 2.7.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000074/">CVE-2018-1000074 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000074">CVE-2018-1000074 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1082008">SUSE bug 1082008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175764">SUSE bug 1175764</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825992" comment="ruby-2.0.0.648-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825993" comment="ruby-devel-2.0.0.648-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825994" comment="ruby-doc-2.0.0.648-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825995" comment="ruby-irb-2.0.0.648-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825996" comment="ruby-libs-2.0.0.648-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825997" comment="ruby-tcltk-2.0.0.648-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825998" comment="rubygem-bigdecimal-1.2.0-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825999" comment="rubygem-io-console-0.4.2-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826000" comment="rubygem-json-1.7.7-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826001" comment="rubygem-minitest-4.3.2-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826002" comment="rubygem-psych-2.0.0-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826003" comment="rubygem-rake-0.9.6-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826004" comment="rubygem-rdoc-4.0.0-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826005" comment="rubygems-2.0.14.1-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826006" comment="rubygems-devel-2.0.14.1-36.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000075" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000075</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000075" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000075" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000075" ref_url="https://www.suse.com/security/cve/CVE-2018-1000075" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1771-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DDFTKHWDUNIX327O4WIHXU2TIVV47W3Z/#DDFTKHWDUNIX327O4WIHXU2TIVV47W3Z" source="SUSE-SU"/>
    <description>
    RubyGems version Ruby 2.2 series: 2.2.9 and earlier, Ruby 2.3 series: 2.3.6 and earlier, Ruby 2.4 series: 2.4.3 and earlier, Ruby 2.5 series: 2.5.0 and earlier, prior to trunk revision 62422 contains a infinite loop caused by negative size vulnerability in ruby gem package tar header that can result in a negative size could cause an infinite loop.. This vulnerability appears to have been fixed in 2.7.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000075/">CVE-2018-1000075 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000075">CVE-2018-1000075 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1082014">SUSE bug 1082014</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825992" comment="ruby-2.0.0.648-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825993" comment="ruby-devel-2.0.0.648-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825994" comment="ruby-doc-2.0.0.648-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825995" comment="ruby-irb-2.0.0.648-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825996" comment="ruby-libs-2.0.0.648-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825997" comment="ruby-tcltk-2.0.0.648-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825998" comment="rubygem-bigdecimal-1.2.0-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825999" comment="rubygem-io-console-0.4.2-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826000" comment="rubygem-json-1.7.7-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826001" comment="rubygem-minitest-4.3.2-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826002" comment="rubygem-psych-2.0.0-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826003" comment="rubygem-rake-0.9.6-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826004" comment="rubygem-rdoc-4.0.0-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826005" comment="rubygems-2.0.14.1-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826006" comment="rubygems-devel-2.0.14.1-36.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000076" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000076</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000076" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000076" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000076" ref_url="https://www.suse.com/security/cve/CVE-2018-1000076" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1771-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DDFTKHWDUNIX327O4WIHXU2TIVV47W3Z/#DDFTKHWDUNIX327O4WIHXU2TIVV47W3Z" source="SUSE-SU"/>
    <description>
    RubyGems version Ruby 2.2 series: 2.2.9 and earlier, Ruby 2.3 series: 2.3.6 and earlier, Ruby 2.4 series: 2.4.3 and earlier, Ruby 2.5 series: 2.5.0 and earlier, prior to trunk revision 62422 contains a Improper Verification of Cryptographic Signature vulnerability in package.rb that can result in a mis-signed gem could be installed, as the tarball would contain multiple gem signatures.. This vulnerability appears to have been fixed in 2.7.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000076/">CVE-2018-1000076 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000076">CVE-2018-1000076 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1082009">SUSE bug 1082009</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825992" comment="ruby-2.0.0.648-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825993" comment="ruby-devel-2.0.0.648-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825994" comment="ruby-doc-2.0.0.648-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825995" comment="ruby-irb-2.0.0.648-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825996" comment="ruby-libs-2.0.0.648-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825997" comment="ruby-tcltk-2.0.0.648-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825998" comment="rubygem-bigdecimal-1.2.0-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825999" comment="rubygem-io-console-0.4.2-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826000" comment="rubygem-json-1.7.7-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826001" comment="rubygem-minitest-4.3.2-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826002" comment="rubygem-psych-2.0.0-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826003" comment="rubygem-rake-0.9.6-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826004" comment="rubygem-rdoc-4.0.0-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826005" comment="rubygems-2.0.14.1-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826006" comment="rubygems-devel-2.0.14.1-36.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000077</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000077" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000077" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000077" ref_url="https://www.suse.com/security/cve/CVE-2018-1000077" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1771-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DDFTKHWDUNIX327O4WIHXU2TIVV47W3Z/#DDFTKHWDUNIX327O4WIHXU2TIVV47W3Z" source="SUSE-SU"/>
    <description>
    RubyGems version Ruby 2.2 series: 2.2.9 and earlier, Ruby 2.3 series: 2.3.6 and earlier, Ruby 2.4 series: 2.4.3 and earlier, Ruby 2.5 series: 2.5.0 and earlier, prior to trunk revision 62422 contains a Improper Input Validation vulnerability in ruby gems specification homepage attribute that can result in a malicious gem could set an invalid homepage URL. This vulnerability appears to have been fixed in 2.7.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000077/">CVE-2018-1000077 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000077">CVE-2018-1000077 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1082010">SUSE bug 1082010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183937">SUSE bug 1183937</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825992" comment="ruby-2.0.0.648-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825993" comment="ruby-devel-2.0.0.648-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825994" comment="ruby-doc-2.0.0.648-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825995" comment="ruby-irb-2.0.0.648-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825996" comment="ruby-libs-2.0.0.648-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825997" comment="ruby-tcltk-2.0.0.648-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825998" comment="rubygem-bigdecimal-1.2.0-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825999" comment="rubygem-io-console-0.4.2-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826000" comment="rubygem-json-1.7.7-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826001" comment="rubygem-minitest-4.3.2-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826002" comment="rubygem-psych-2.0.0-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826003" comment="rubygem-rake-0.9.6-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826004" comment="rubygem-rdoc-4.0.0-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826005" comment="rubygems-2.0.14.1-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826006" comment="rubygems-devel-2.0.14.1-36.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000078" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000078</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000078" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000078" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000078" ref_url="https://www.suse.com/security/cve/CVE-2018-1000078" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1771-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DDFTKHWDUNIX327O4WIHXU2TIVV47W3Z/#DDFTKHWDUNIX327O4WIHXU2TIVV47W3Z" source="SUSE-SU"/>
    <description>
    RubyGems version Ruby 2.2 series: 2.2.9 and earlier, Ruby 2.3 series: 2.3.6 and earlier, Ruby 2.4 series: 2.4.3 and earlier, Ruby 2.5 series: 2.5.0 and earlier, prior to trunk revision 62422 contains a Cross Site Scripting (XSS) vulnerability in gem server display of homepage attribute that can result in XSS. This attack appear to be exploitable via the victim must browse to a malicious gem on a vulnerable gem server. This vulnerability appears to have been fixed in 2.7.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000078/">CVE-2018-1000078 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000078">CVE-2018-1000078 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1082011">SUSE bug 1082011</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825992" comment="ruby-2.0.0.648-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825993" comment="ruby-devel-2.0.0.648-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825994" comment="ruby-doc-2.0.0.648-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825995" comment="ruby-irb-2.0.0.648-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825996" comment="ruby-libs-2.0.0.648-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825997" comment="ruby-tcltk-2.0.0.648-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825998" comment="rubygem-bigdecimal-1.2.0-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825999" comment="rubygem-io-console-0.4.2-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826000" comment="rubygem-json-1.7.7-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826001" comment="rubygem-minitest-4.3.2-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826002" comment="rubygem-psych-2.0.0-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826003" comment="rubygem-rake-0.9.6-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826004" comment="rubygem-rdoc-4.0.0-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826005" comment="rubygems-2.0.14.1-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826006" comment="rubygems-devel-2.0.14.1-36.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000079" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000079</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000079" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000079" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000079" ref_url="https://www.suse.com/security/cve/CVE-2018-1000079" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1771-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DDFTKHWDUNIX327O4WIHXU2TIVV47W3Z/#DDFTKHWDUNIX327O4WIHXU2TIVV47W3Z" source="SUSE-SU"/>
    <description>
    RubyGems version Ruby 2.2 series: 2.2.9 and earlier, Ruby 2.3 series: 2.3.6 and earlier, Ruby 2.4 series: 2.4.3 and earlier, Ruby 2.5 series: 2.5.0 and earlier, prior to trunk revision 62422 contains a Directory Traversal vulnerability in gem installation that can result in the gem could write to arbitrary filesystem locations during installation. This attack appear to be exploitable via the victim must install a malicious gem. This vulnerability appears to have been fixed in 2.7.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000079/">CVE-2018-1000079 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000079">CVE-2018-1000079 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1082058">SUSE bug 1082058</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825992" comment="ruby-2.0.0.648-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825993" comment="ruby-devel-2.0.0.648-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825994" comment="ruby-doc-2.0.0.648-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825995" comment="ruby-irb-2.0.0.648-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825996" comment="ruby-libs-2.0.0.648-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825997" comment="ruby-tcltk-2.0.0.648-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825998" comment="rubygem-bigdecimal-1.2.0-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825999" comment="rubygem-io-console-0.4.2-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826000" comment="rubygem-json-1.7.7-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826001" comment="rubygem-minitest-4.3.2-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826002" comment="rubygem-psych-2.0.0-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826003" comment="rubygem-rake-0.9.6-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826004" comment="rubygem-rdoc-4.0.0-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826005" comment="rubygems-2.0.14.1-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826006" comment="rubygems-devel-2.0.14.1-36.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000119" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000119</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000119" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000119" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000119" ref_url="https://www.suse.com/security/cve/CVE-2018-1000119" source="SUSE CVE"/>
    <description>
    Sinatra rack-protection versions 1.5.4 and 2.0.0.rc3 and earlier contains a timing attack vulnerability in the CSRF token checking that can result in signatures can be exposed. This attack appear to be exploitable via network connectivity to the ruby application. This vulnerability appears to have been fixed in 1.5.5 and 2.0.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1000119/">CVE-2018-1000119 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000119">CVE-2018-1000119 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1084436">SUSE bug 1084436</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824163" comment="pcs-0.9.162-5.el7_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824164" comment="pcs-snmp-0.9.162-5.el7_5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000120" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000120</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000120" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000120" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000120" ref_url="https://www.suse.com/security/cve/CVE-2018-1000120" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0769-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20180769-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004533.html" source="SUSE-SU"/>
    <description>
    A buffer overflow exists in curl 7.12.3 to and including curl 7.58.0 in the FTP URL handling that allows an attacker to cause a denial of service or worse.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000120/">CVE-2018-1000120 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000120">CVE-2018-1000120 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1084521">SUSE bug 1084521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101811">SUSE bug 1101811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112526">SUSE bug 1112526</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825267" comment="curl-7.29.0-51.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825268" comment="libcurl-7.29.0-51.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825269" comment="libcurl-devel-7.29.0-51.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825270" comment="nss-pem-1.0.3-5.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000121" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000121</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000121" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000121" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000121" ref_url="https://www.suse.com/security/cve/CVE-2018-1000121" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0769-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20180769-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004059.html" source="SUSE-SU"/>
    <description>
    A NULL pointer dereference exists in curl 7.21.0 to and including curl 7.58.0 in the LDAP code that allows an attacker to cause a denial of service
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000121/">CVE-2018-1000121 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000121">CVE-2018-1000121 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1084524">SUSE bug 1084524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085215">SUSE bug 1085215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101811">SUSE bug 1101811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112526">SUSE bug 1112526</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825267" comment="curl-7.29.0-51.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825268" comment="libcurl-7.29.0-51.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825269" comment="libcurl-devel-7.29.0-51.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825270" comment="nss-pem-1.0.3-5.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000122" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000122</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000122" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000122" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000122" ref_url="https://www.suse.com/security/cve/CVE-2018-1000122" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0769-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20180769-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004059.html" source="SUSE-SU"/>
    <description>
    A buffer over-read exists in curl 7.20.0 to and including curl 7.58.0 in the RTSP+RTP handling code that allows an attacker to cause a denial of service or information leakage
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000122/">CVE-2018-1000122 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000122">CVE-2018-1000122 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1084532">SUSE bug 1084532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101811">SUSE bug 1101811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112526">SUSE bug 1112526</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825267" comment="curl-7.29.0-51.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825268" comment="libcurl-7.29.0-51.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825269" comment="libcurl-devel-7.29.0-51.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825270" comment="nss-pem-1.0.3-5.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000132" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000132</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000132" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000132" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000132" ref_url="https://www.suse.com/security/cve/CVE-2018-1000132" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0933-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003889.html" source="SUSE-SU"/>
    <description>
    Mercurial version 4.5 and earlier contains a Incorrect Access Control (CWE-285) vulnerability in Protocol server that can result in Unauthorized data access. This attack appear to be exploitable via network connectivity. This vulnerability appears to have been fixed in 4.5.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000132/">CVE-2018-1000132 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000132">CVE-2018-1000132 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1085211">SUSE bug 1085211</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826506" comment="emacs-mercurial-2.6.2-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826507" comment="emacs-mercurial-el-2.6.2-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826508" comment="mercurial-2.6.2-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826509" comment="mercurial-hgk-2.6.2-10.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000140" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000140</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000140" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000140" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000140" ref_url="https://www.suse.com/security/cve/CVE-2018-1000140" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011210.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0829-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SQYLWH2QTPH6LJOLA4Z6ZLAVWS3HLIZM/#SQYLWH2QTPH6LJOLA4Z6ZLAVWS3HLIZM" source="SUSE-SU"/>
    <description>
    rsyslog librelp version 1.2.14 and earlier contains a Buffer Overflow vulnerability in the checking of x509 certificates from a peer that can result in Remote code execution. This attack appear to be exploitable a remote attacker that can connect to rsyslog and trigger a stack buffer overflow by sending a specially crafted x509 certificate.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000140/">CVE-2018-1000140 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000140">CVE-2018-1000140 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1086730">SUSE bug 1086730</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824200" comment="librelp-1.2.12-1.el7_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824201" comment="librelp-devel-1.2.12-1.el7_5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000156" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000156</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000156" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000156" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000156" ref_url="https://www.suse.com/security/cve/CVE-2018-1000156" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003975.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1137-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HPS723LCT5FI65CKXGSHVIQ3APKKN2RY/#HPS723LCT5FI65CKXGSHVIQ3APKKN2RY" source="SUSE-SU"/>
    <description>
    GNU Patch version 2.7.6 contains an input validation vulnerability when processing patch files, specifically the EDITOR_PROGRAM invocation (using ed) can result in code execution. This attack appear to be exploitable via a patch file processed via the patch utility. This is similar to FreeBSD's CVE-2015-1418 however although they share a common ancestry the code bases have diverged over time.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000156/">CVE-2018-1000156 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000156">CVE-2018-1000156 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1088420">SUSE bug 1088420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093615">SUSE bug 1093615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101128">SUSE bug 1101128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142513">SUSE bug 1142513</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824199" comment="patch-2.7.1-10.el7_5 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000199" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000199</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000199" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000199" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000199" ref_url="https://www.suse.com/security/cve/CVE-2018-1000199" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1225-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1227-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1366-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1855-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1754-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1758-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1418-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EN4KK2FGUDUKZAKRD5IRYD6AZQXJA3AU/#EN4KK2FGUDUKZAKRD5IRYD6AZQXJA3AU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0801-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BOYMLRUHWMVAOFIPZH7KANUUUY2YYNL3/" source="SUSE-SU"/>
    <description>
    The Linux Kernel version 3.18 contains a dangerous feature vulnerability in modify_user_hw_breakpoint() that can result in crash and possibly memory corruption. This attack appear to be exploitable via local code execution and the ability to use ptrace. This vulnerability appears to have been fixed in git commit f67b15037a7a50c57f72e69a6d59941ad90a0f0f.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000199/">CVE-2018-1000199 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000199">CVE-2018-1000199 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1089895">SUSE bug 1089895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090036">SUSE bug 1090036</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824218" comment="kernel-3.10.0-862.2.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824219" comment="kernel-abi-whitelists-3.10.0-862.2.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824220" comment="kernel-debug-3.10.0-862.2.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824223" comment="kernel-doc-3.10.0-862.2.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824224" comment="kernel-headers-3.10.0-862.2.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824225" comment="kernel-tools-3.10.0-862.2.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824226" comment="kernel-tools-libs-3.10.0-862.2.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824228" comment="perf-3.10.0-862.2.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824229" comment="python-perf-3.10.0-862.2.3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000301" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000301</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000301" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000301" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000301" ref_url="https://www.suse.com/security/cve/CVE-2018-1000301" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1327-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004103.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1344-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XQUQ2RWEOSUAYE6KMGHTJS7RY3DDJCSG/#XQUQ2RWEOSUAYE6KMGHTJS7RY3DDJCSG" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1624-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QE6IUT3RKAYXEWTTPV4NHUSZSOUHXI7C/#QE6IUT3RKAYXEWTTPV4NHUSZSOUHXI7C" source="SUSE-SU"/>
    <description>
    curl version curl 7.20.0 to and including curl 7.59.0 contains a CWE-126: Buffer Over-read vulnerability in denial of service that can result in curl can be tricked into reading data beyond the end of a heap based buffer used to store downloaded RTSP content.. This vulnerability appears to have been fixed in curl &lt; 7.20.0 and curl &gt;= 7.60.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1000301/">CVE-2018-1000301 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000301">CVE-2018-1000301 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1092098">SUSE bug 1092098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122464">SUSE bug 1122464</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825267" comment="curl-7.29.0-51.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825268" comment="libcurl-7.29.0-51.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825269" comment="libcurl-devel-7.29.0-51.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825270" comment="nss-pem-1.0.3-5.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000801" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000801</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000801" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000801" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000801" ref_url="https://www.suse.com/security/cve/CVE-2018-1000801" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2018:2727-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YNTJPFJDKD2LMS4NCBRAY4WT47LXSWYY/#YNTJPFJDKD2LMS4NCBRAY4WT47LXSWYY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2733-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EEZRGGOSNTONB4QUMBPKMKMTGERE233D/#EEZRGGOSNTONB4QUMBPKMKMTGERE233D" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2733-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BA2J7TZVEOO43UEWXQFEAO4SWUJP74GI/#BA2J7TZVEOO43UEWXQFEAO4SWUJP74GI" source="SUSE-SU"/>
    <description>
    okular version 18.08 and earlier contains a Directory Traversal vulnerability in function "unpackDocumentArchive(...)" in "core/document.cpp" that can result in Arbitrary file creation on the user workstation. This attack appear to be exploitable via he victim must open a specially crafted Okular archive. This issue appears to have been corrected in version 18.08.1
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1000801/">CVE-2018-1000801 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000801">CVE-2018-1000801 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1107591">SUSE bug 1107591</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827848" comment="okular-4.10.5-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827849" comment="okular-devel-4.10.5-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827850" comment="okular-libs-4.10.5-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827851" comment="okular-part-4.10.5-8.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000805</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000805" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000805" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000805" ref_url="https://www.suse.com/security/cve/CVE-2018-1000805" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0396-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190396-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012669.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0129-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GCEUJWPR53LIOAKYNV75JBMHWGAAK6SW/#GCEUJWPR53LIOAKYNV75JBMHWGAAK6SW" source="SUSE-SU"/>
    <description>
    Paramiko version 2.4.1, 2.3.2, 2.2.3, 2.1.5, 2.0.8, 1.18.5, 1.17.6 contains a Incorrect Access Control vulnerability in SSH server that can result in RCE. This attack appear to be exploitable via network connectivity.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000805/">CVE-2018-1000805 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000805">CVE-2018-1000805 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1111151">SUSE bug 1111151</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825338" comment="python-paramiko-2.1.1-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825339" comment="python-paramiko-doc-2.1.1-9.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000852" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000852</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000852" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000852" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000852" ref_url="https://www.suse.com/security/cve/CVE-2018-1000852" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0539-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007279.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0096-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6546GTVQBRKCKXCHRB6SE5TC4ANON353/#6546GTVQBRKCKXCHRB6SE5TC4ANON353" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0325-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MIETP2PR4Q4SATLCVO5M3PMEMOFCHU4C/#MIETP2PR4Q4SATLCVO5M3PMEMOFCHU4C" source="SUSE-SU"/>
    <description>
    FreeRDP FreeRDP 2.0.0-rc3 released version before commit 205c612820dac644d665b5bb1cdf437dc5ca01e3 contains a Other/Unknown vulnerability in channels/drdynvc/client/drdynvc_main.c, drdynvc_process_capability_request that can result in The RDP server can read the client's memory.. This attack appear to be exploitable via RDPClient must connect the rdp server with echo option. This vulnerability appears to have been fixed in after commit 205c612820dac644d665b5bb1cdf437dc5ca01e3.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000852/">CVE-2018-1000852 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000852">CVE-2018-1000852 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1117963">SUSE bug 1117963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120507">SUSE bug 1120507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131873">SUSE bug 1131873</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826387" comment="freerdp-2.0.0-1.rc4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826388" comment="freerdp-devel-2.0.0-1.rc4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826389" comment="freerdp-libs-2.0.0-1.rc4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826390" comment="libwinpr-2.0.0-1.rc4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826391" comment="libwinpr-devel-2.0.0-1.rc4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826392" comment="vinagre-3.22.0-12.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000876" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000876</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000876" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000876" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000876" ref_url="https://www.suse.com/security/cve/CVE-2018-1000876" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2650-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192650-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2780-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192780-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2415-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Z3JUZNUB5MLFYPANGJ7Z7AR432VRY6KN/#Z3JUZNUB5MLFYPANGJ7Z7AR432VRY6KN" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2432-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SWUEZJ7AYL2LKLBXPYPMQQS6C42W3MB6/#SWUEZJ7AYL2LKLBXPYPMQQS6C42W3MB6" source="SUSE-SU"/>
    <description>
    binutils version 2.32 and earlier contains a Integer Overflow vulnerability in objdump, bfd_get_dynamic_reloc_upper_bound,bfd_canonicalize_dynamic_reloc that can result in Integer overflow trigger heap overflow. Successful exploitation allows execution of arbitrary code.. This attack appear to be exploitable via Local. This vulnerability appears to have been fixed in after commit 3a551c7a1b80fca579461774860574eabfd7f18f.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000876/">CVE-2018-1000876 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000876">CVE-2018-1000876 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1120640">SUSE bug 1120640</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826113" comment="binutils-2.27-41.base.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826114" comment="binutils-devel-2.27-41.base.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000877" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000877</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000877" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000877" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000877" ref_url="https://www.suse.com/security/cve/CVE-2018-1000877" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006196.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1196-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TIJ7ZTUCNAB4P5RGZHQDF4OC3WRSBWO4/#TIJ7ZTUCNAB4P5RGZHQDF4OC3WRSBWO4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2615-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U6XQ3DWFEKK5LGAFI7F4YVSON52JVUJE/#U6XQ3DWFEKK5LGAFI7F4YVSON52JVUJE" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2632-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BCNN5SKOY4P2IA35RL7MCURKXTITD75T/#BCNN5SKOY4P2IA35RL7MCURKXTITD75T" source="SUSE-SU"/>
    <description>
    libarchive version commit 416694915449219d505531b1096384f3237dd6cc onwards (release v3.1.0 onwards) contains a CWE-415: Double Free vulnerability in RAR decoder - libarchive/archive_read_support_format_rar.c, parse_codes(), realloc(rar-&gt;lzss.window, new_size) with new_size = 0 that can result in Crash/DoS. This attack appear to be exploitable via the victim must open a specially crafted RAR archive.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-02"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000877/">CVE-2018-1000877 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000877">CVE-2018-1000877 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1120653">SUSE bug 1120653</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826557" comment="bsdcpio-3.1.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826558" comment="bsdtar-3.1.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826559" comment="libarchive-3.1.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826560" comment="libarchive-devel-3.1.2-12.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000878" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000878</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000878" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000878" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000878" ref_url="https://www.suse.com/security/cve/CVE-2018-1000878" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006196.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1196-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TIJ7ZTUCNAB4P5RGZHQDF4OC3WRSBWO4/#TIJ7ZTUCNAB4P5RGZHQDF4OC3WRSBWO4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2615-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U6XQ3DWFEKK5LGAFI7F4YVSON52JVUJE/#U6XQ3DWFEKK5LGAFI7F4YVSON52JVUJE" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2632-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BCNN5SKOY4P2IA35RL7MCURKXTITD75T/#BCNN5SKOY4P2IA35RL7MCURKXTITD75T" source="SUSE-SU"/>
    <description>
    libarchive version commit 416694915449219d505531b1096384f3237dd6cc onwards (release v3.1.0 onwards) contains a CWE-416: Use After Free vulnerability in RAR decoder - libarchive/archive_read_support_format_rar.c that can result in Crash/DoS - it is unknown if RCE is possible. This attack appear to be exploitable via the victim must open a specially crafted RAR archive.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000878/">CVE-2018-1000878 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000878">CVE-2018-1000878 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1120654">SUSE bug 1120654</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826557" comment="bsdcpio-3.1.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826558" comment="bsdtar-3.1.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826559" comment="libarchive-3.1.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826560" comment="libarchive-devel-3.1.2-12.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181002200" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1002200</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1002200" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1002200" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1002200" ref_url="https://www.suse.com/security/cve/CVE-2018-1002200" source="SUSE CVE"/>
    <description>
    plexus-archiver before 3.6.0 is vulnerable to directory traversal, allowing attackers to write to arbitrary files via a ../ (dot dot slash) in an archive entry that is mishandled during extraction. This vulnerability is also known as 'Zip-Slip'.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1002200/">CVE-2018-1002200 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1002200">CVE-2018-1002200 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824351" comment="plexus-archiver-2.4.2-5.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824352" comment="plexus-archiver-javadoc-2.4.2-5.el7_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810177" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10177</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10177" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10177" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10177" ref_url="https://www.suse.com/security/cve/CVE-2018-10177" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003983.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.7-28, there is an infinite loop in the ReadOneMNGImage function of the coders/png.c file. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted mng file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10177/">CVE-2018-10177 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10177">CVE-2018-10177 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1089781">SUSE bug 1089781</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827880" comment="ImageMagick-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827881" comment="ImageMagick-c++-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827882" comment="ImageMagick-c++-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827883" comment="ImageMagick-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827884" comment="ImageMagick-doc-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827885" comment="ImageMagick-perl-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827886" comment="autotrace-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827887" comment="autotrace-devel-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827888" comment="emacs-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827889" comment="emacs-common-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827890" comment="emacs-el-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827891" comment="emacs-filesystem-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827892" comment="emacs-nox-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827893" comment="emacs-terminal-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827894" comment="inkscape-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827895" comment="inkscape-docs-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827896" comment="inkscape-view-0.92.2-3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810194" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10194</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10194" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10194" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10194" ref_url="https://www.suse.com/security/cve/CVE-2018-10194" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1884-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004242.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1348-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7FBB67BVAR4ODDXGR3OXXRLOGWJABPZL/#7FBB67BVAR4ODDXGR3OXXRLOGWJABPZL" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1909-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KHDS76KJKM3EKHDSEYEM4C7LRICS5KYO/#KHDS76KJKM3EKHDSEYEM4C7LRICS5KYO" source="SUSE-SU"/>
    <description>
    The set_text_distance function in devices/vector/gdevpdts.c in the pdfwrite component in Artifex Ghostscript through 9.22 does not prevent overflows in text-positioning calculation, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted PDF document.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10194/">CVE-2018-10194 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10194">CVE-2018-10194 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1090099">SUSE bug 1090099</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824592" comment="ghostscript-9.07-29.el7_5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824593" comment="ghostscript-cups-9.07-29.el7_5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824594" comment="ghostscript-devel-9.07-29.el7_5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824595" comment="ghostscript-doc-9.07-29.el7_5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824596" comment="ghostscript-gtk-9.07-29.el7_5.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810322" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10322</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10322" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10322" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10322" ref_url="https://www.suse.com/security/cve/CVE-2018-10322" source="SUSE CVE"/>
    <description>
    The xfs_dinode_verify function in fs/xfs/libxfs/xfs_inode_buf.c in the Linux kernel through 4.16.3 allows local users to cause a denial of service (xfs_ilock_attr_map_shared invalid pointer dereference) via a crafted xfs image.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10322/">CVE-2018-10322 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10322">CVE-2018-10322 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090749">SUSE bug 1090749</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824786" comment="bpftool-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824787" comment="kernel-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824788" comment="kernel-abi-whitelists-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824789" comment="kernel-debug-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824792" comment="kernel-doc-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824793" comment="kernel-headers-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824794" comment="kernel-tools-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824795" comment="kernel-tools-libs-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824797" comment="perf-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824798" comment="python-perf-3.10.0-957.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810360" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10360</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10360" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10360" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10360" ref_url="https://www.suse.com/security/cve/CVE-2018-10360" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0571-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190571-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005284.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2694-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/62HXM6XXIXDOG7DWM2B5W4CSRO6NAY7P/#62HXM6XXIXDOG7DWM2B5W4CSRO6NAY7P" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0345-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UQQSJOBQTS7ZNXZRM4RJ7J2R4FX7TI6L/#UQQSJOBQTS7ZNXZRM4RJ7J2R4FX7TI6L" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1197-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/P23RB42Q226QTD5TC654YQ2P3E7EXSET/#P23RB42Q226QTD5TC654YQ2P3E7EXSET" source="SUSE-SU"/>
    <description>
    The do_core_note function in readelf.c in libmagic.a in file 5.33 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted ELF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10360/">CVE-2018-10360 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10360">CVE-2018-10360 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1096974">SUSE bug 1096974</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096984">SUSE bug 1096984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126118">SUSE bug 1126118</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827084" comment="file-5.11-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827085" comment="file-devel-5.11-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827086" comment="file-libs-5.11-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827087" comment="file-static-5.11-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827088" comment="python-magic-5.11-36.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810372" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10372</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10372" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10372" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10372" ref_url="https://www.suse.com/security/cve/CVE-2018-10372" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5QAJYH6VBFTH2NVELAX7K26MYZ6HLGQC/#5QAJYH6VBFTH2NVELAX7K26MYZ6HLGQC" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3323-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/23PRARCAWIOXVBWHEZY2G57LFWSFL7G4/#23PRARCAWIOXVBWHEZY2G57LFWSFL7G4" source="SUSE-SU"/>
    <description>
    process_cu_tu_index in dwarf.c in GNU Binutils 2.30 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted binary file, as demonstrated by readelf.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10372/">CVE-2018-10372 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10372">CVE-2018-10372 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1091015">SUSE bug 1091015</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824624" comment="binutils-2.27-34.base.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824625" comment="binutils-devel-2.27-34.base.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810373" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10373</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10373" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10373" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10373" ref_url="https://www.suse.com/security/cve/CVE-2018-10373" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5QAJYH6VBFTH2NVELAX7K26MYZ6HLGQC/#5QAJYH6VBFTH2NVELAX7K26MYZ6HLGQC" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3323-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/23PRARCAWIOXVBWHEZY2G57LFWSFL7G4/#23PRARCAWIOXVBWHEZY2G57LFWSFL7G4" source="SUSE-SU"/>
    <description>
    concat_filename in dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted binary file, as demonstrated by nm-new.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10373/">CVE-2018-10373 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10373">CVE-2018-10373 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1090997">SUSE bug 1090997</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824624" comment="binutils-2.27-34.base.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824625" comment="binutils-devel-2.27-34.base.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181049" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1049</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1049" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1049" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1049" ref_url="https://www.suse.com/security/cve/CVE-2018-1049" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003686.html" source="SUSE-SU"/>
    <description>
    In systemd prior to 234 a race condition exists between .mount and .automount units such that automount requests from kernel may not be serviced by systemd resulting in kernel holding the mountpoint and any processes that try to use said mount will hang. A race condition like this may lead to denial of service, until mount points are unmounted.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1049/">CVE-2018-1049 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1049">CVE-2018-1049 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1076308">SUSE bug 1076308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140475">SUSE bug 1140475</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823976" comment="libgudev1-219-42.el7_4.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823977" comment="libgudev1-devel-219-42.el7_4.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823978" comment="systemd-219-42.el7_4.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823979" comment="systemd-devel-219-42.el7_4.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823980" comment="systemd-journal-gateway-219-42.el7_4.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823981" comment="systemd-libs-219-42.el7_4.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823982" comment="systemd-networkd-219-42.el7_4.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823983" comment="systemd-python-219-42.el7_4.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823984" comment="systemd-resolved-219-42.el7_4.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823985" comment="systemd-sysv-219-42.el7_4.7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181050" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1050</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1050" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1050" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1050" ref_url="https://www.suse.com/security/cve/CVE-2018-1050" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0754-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0774-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20180774-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004410.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004423.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2339-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004699.html" source="SUSE-SU"/>
    <description>
    All versions of Samba from 4.0.0 onwards are vulnerable to a denial of service attack when the RPC spoolss service is configured to be run as an external daemon. Missing input sanitization checks on some of the input parameters to spoolss RPC calls could cause the print spooler service to crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1050/">CVE-2018-1050 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1050">CVE-2018-1050 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1081741">SUSE bug 1081741</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824639" comment="ctdb-4.8.3-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824640" comment="ctdb-tests-4.8.3-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824641" comment="libsmbclient-4.8.3-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824642" comment="libsmbclient-devel-4.8.3-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824643" comment="libwbclient-4.8.3-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824644" comment="libwbclient-devel-4.8.3-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824645" comment="samba-4.8.3-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824646" comment="samba-client-4.8.3-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824647" comment="samba-client-libs-4.8.3-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824648" comment="samba-common-4.8.3-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824649" comment="samba-common-libs-4.8.3-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824650" comment="samba-common-tools-4.8.3-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824651" comment="samba-dc-4.8.3-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824652" comment="samba-dc-libs-4.8.3-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824653" comment="samba-devel-4.8.3-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824654" comment="samba-krb5-printing-4.8.3-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824655" comment="samba-libs-4.8.3-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824656" comment="samba-pidl-4.8.3-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824657" comment="samba-python-4.8.3-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824658" comment="samba-python-test-4.8.3-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824659" comment="samba-test-4.8.3-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824660" comment="samba-test-libs-4.8.3-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824661" comment="samba-vfs-glusterfs-4.8.3-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824662" comment="samba-winbind-4.8.3-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824663" comment="samba-winbind-clients-4.8.3-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824664" comment="samba-winbind-krb5-locator-4.8.3-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824665" comment="samba-winbind-modules-4.8.3-4.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810534" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10534</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10534" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10534" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10534" ref_url="https://www.suse.com/security/cve/CVE-2018-10534" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5QAJYH6VBFTH2NVELAX7K26MYZ6HLGQC/#5QAJYH6VBFTH2NVELAX7K26MYZ6HLGQC" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3323-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/23PRARCAWIOXVBWHEZY2G57LFWSFL7G4/#23PRARCAWIOXVBWHEZY2G57LFWSFL7G4" source="SUSE-SU"/>
    <description>
    The _bfd_XX_bfd_copy_private_bfd_data_common function in peXXigen.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, processes a negative Data Directory size with an unbounded loop that increases the value of (external_IMAGE_DEBUG_DIRECTORY) *edd so that the address exceeds its own memory region, resulting in an out-of-bounds memory write, as demonstrated by objcopy copying private info with _bfd_pex64_bfd_copy_private_bfd_data_common in pex64igen.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-10534/">CVE-2018-10534 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10534">CVE-2018-10534 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1091368">SUSE bug 1091368</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824624" comment="binutils-2.27-34.base.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824625" comment="binutils-devel-2.27-34.base.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810535" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10535</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10535" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10535" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10535" ref_url="https://www.suse.com/security/cve/CVE-2018-10535" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5QAJYH6VBFTH2NVELAX7K26MYZ6HLGQC/#5QAJYH6VBFTH2NVELAX7K26MYZ6HLGQC" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3323-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/23PRARCAWIOXVBWHEZY2G57LFWSFL7G4/#23PRARCAWIOXVBWHEZY2G57LFWSFL7G4" source="SUSE-SU"/>
    <description>
    The ignore_section_sym function in elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, does not validate the output_section pointer in the case of a symtab entry with a "SECTION" type that has a "0" value, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted file, as demonstrated by objcopy.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10535/">CVE-2018-10535 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10535">CVE-2018-10535 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1091365">SUSE bug 1091365</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824624" comment="binutils-2.27-34.base.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824625" comment="binutils-devel-2.27-34.base.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181054" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1054</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1054" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1054" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1054" ref_url="https://www.suse.com/security/cve/CVE-2018-1054" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005817.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds memory read flaw was found in the way 389-ds-base handled certain LDAP search filters, affecting all versions including 1.4.x. A remote, unauthenticated attacker could potentially use this flaw to make ns-slapd crash via a specially crafted LDAP request, thus resulting in denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1054/">CVE-2018-1054 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1054">CVE-2018-1054 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1083689">SUSE bug 1083689</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824052" comment="389-ds-base-1.3.6.1-28.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824053" comment="389-ds-base-devel-1.3.6.1-28.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824054" comment="389-ds-base-libs-1.3.6.1-28.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824055" comment="389-ds-base-snmp-1.3.6.1-28.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10547</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10547" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10547" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10547" ref_url="https://www.suse.com/security/cve/CVE-2018-10547" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1207-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GEHIPPN3U7QSWY74SLR7G4WNSP4FX7VK/#GEHIPPN3U7QSWY74SLR7G4WNSP4FX7VK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1317-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IMJK5ARGPJNG5QB4BR3N5E6PVOSV7VK6/#IMJK5ARGPJNG5QB4BR3N5E6PVOSV7VK6" source="SUSE-SU"/>
    <description>
    An issue was discovered in ext/phar/phar_object.c in PHP before 5.6.36, 7.0.x before 7.0.30, 7.1.x before 7.1.17, and 7.2.x before 7.2.5. There is Reflected XSS on the PHAR 403 and 404 error pages via request data of a request for a .phar file. NOTE: this vulnerability exists because of an incomplete fix for CVE-2018-5712.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-10547/">CVE-2018-10547 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10547">CVE-2018-10547 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1091362">SUSE bug 1091362</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827765" comment="php-5.4.16-48.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827766" comment="php-bcmath-5.4.16-48.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827767" comment="php-cli-5.4.16-48.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827768" comment="php-common-5.4.16-48.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827769" comment="php-dba-5.4.16-48.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827770" comment="php-devel-5.4.16-48.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827771" comment="php-embedded-5.4.16-48.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827772" comment="php-enchant-5.4.16-48.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827773" comment="php-fpm-5.4.16-48.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827774" comment="php-gd-5.4.16-48.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827775" comment="php-intl-5.4.16-48.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827776" comment="php-ldap-5.4.16-48.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827777" comment="php-mbstring-5.4.16-48.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827778" comment="php-mysql-5.4.16-48.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827779" comment="php-mysqlnd-5.4.16-48.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827780" comment="php-odbc-5.4.16-48.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827781" comment="php-pdo-5.4.16-48.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827782" comment="php-pgsql-5.4.16-48.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827783" comment="php-process-5.4.16-48.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827784" comment="php-pspell-5.4.16-48.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827785" comment="php-recode-5.4.16-48.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827786" comment="php-snmp-5.4.16-48.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827787" comment="php-soap-5.4.16-48.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827788" comment="php-xml-5.4.16-48.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827789" comment="php-xmlrpc-5.4.16-48.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181059" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1059</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1059" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1059" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1059" ref_url="https://www.suse.com/security/cve/CVE-2018-1059" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1492-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004108.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004895.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1560-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UUE7ILWEPBCHNHWNOMWNN57N7ABY2PRI/#UUE7ILWEPBCHNHWNOMWNN57N7ABY2PRI" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4003-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H3E2ZFYD7IJAO4BHVCTNFEAWLELD3PCR/#H3E2ZFYD7IJAO4BHVCTNFEAWLELD3PCR" source="SUSE-SU"/>
    <description>
    The DPDK vhost-user interface does not check to verify that all the requested guest physical range is mapped and contiguous when performing Guest Physical Addresses to Host Virtual Addresses translations. This may lead to a malicious guest exposing vhost-user backend process memory. All versions before 18.02.1 are vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1059/">CVE-2018-1059 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1059">CVE-2018-1059 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1089638">SUSE bug 1089638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090647">SUSE bug 1090647</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824435" comment="dpdk-17.11-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824436" comment="dpdk-devel-17.11-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824437" comment="dpdk-doc-17.11-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824438" comment="dpdk-tools-17.11-11.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181060" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1060</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1060" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1060" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1060" ref_url="https://www.suse.com/security/cve/CVE-2018-1060" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004809.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3554-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006445.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2712-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/URI4S557IJSAG6F3UQBDKUCBGZZNBQS3/#URI4S557IJSAG6F3UQBDKUCBGZZNBQS3" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3703-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4LNVZL3CCUTH3EA4JE5RUYTAG3EMAZ7D/#4LNVZL3CCUTH3EA4JE5RUYTAG3EMAZ7D" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0086-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SRKGGFVSV7DDWCMAOSO6E3F66U2CF5XR/" source="SUSE-SU"/>
    <description>
    python before versions 2.7.15, 3.4.9, 3.5.6rc1, 3.6.5rc1 and 3.7.0 is vulnerable to catastrophic backtracking in pop3lib's apop() method. An attacker could use this flaw to cause denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1060/">CVE-2018-1060 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1060">CVE-2018-1060 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1088009">SUSE bug 1088009</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824626" comment="python-2.7.5-76.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824627" comment="python-debug-2.7.5-76.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824628" comment="python-devel-2.7.5-76.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824629" comment="python-libs-2.7.5-76.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824630" comment="python-test-2.7.5-76.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824631" comment="python-tools-2.7.5-76.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824632" comment="tkinter-2.7.5-76.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181061" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1061</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1061" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1061" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1061" ref_url="https://www.suse.com/security/cve/CVE-2018-1061" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004809.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3554-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2712-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/URI4S557IJSAG6F3UQBDKUCBGZZNBQS3/#URI4S557IJSAG6F3UQBDKUCBGZZNBQS3" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3703-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4LNVZL3CCUTH3EA4JE5RUYTAG3EMAZ7D/#4LNVZL3CCUTH3EA4JE5RUYTAG3EMAZ7D" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0086-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SRKGGFVSV7DDWCMAOSO6E3F66U2CF5XR/" source="SUSE-SU"/>
    <description>
    python before versions 2.7.15, 3.4.9, 3.5.6rc1, 3.6.5rc1 and 3.7.0 is vulnerable to catastrophic backtracking in the difflib.IS_LINE_JUNK method.  An attacker could use this flaw to cause denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-24"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1061/">CVE-2018-1061 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1061">CVE-2018-1061 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1088004">SUSE bug 1088004</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824626" comment="python-2.7.5-76.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824627" comment="python-debug-2.7.5-76.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824628" comment="python-devel-2.7.5-76.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824629" comment="python-libs-2.7.5-76.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824630" comment="python-test-2.7.5-76.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824631" comment="python-tools-2.7.5-76.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824632" comment="tkinter-2.7.5-76.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181063" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1063</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1063" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1063" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1063" ref_url="https://www.suse.com/security/cve/CVE-2018-1063" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003888.html" source="SUSE-SU"/>
    <description>
    Context relabeling of filesystems is vulnerable to symbolic link attack, allowing a local, unprivileged malicious entity to change the SELinux context of an arbitrary file to a context with few restrictions. This only happens when the relabeling process is done, usually when taking SELinux state from disabled to enable (permissive or enforcing). The issue was found in policycoreutils 2.5-11.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1063/">CVE-2018-1063 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1063">CVE-2018-1063 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1083624">SUSE bug 1083624</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824137" comment="policycoreutils-2.5-22.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824138" comment="policycoreutils-devel-2.5-22.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824139" comment="policycoreutils-gui-2.5-22.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824140" comment="policycoreutils-newrole-2.5-22.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824141" comment="policycoreutils-python-2.5-22.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824142" comment="policycoreutils-restorecond-2.5-22.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824143" comment="policycoreutils-sandbox-2.5-22.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181064" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1064</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1064" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1064" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1064" ref_url="https://www.suse.com/security/cve/CVE-2018-1064" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004357.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0939-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GNPLPRYR75LWWU4CR5O6E4YST3PJLYAF/#GNPLPRYR75LWWU4CR5O6E4YST3PJLYAF" source="SUSE-SU"/>
    <description>
    libvirt version before 4.2.0-rc1 is vulnerable to a resource exhaustion as a result of an incomplete fix for CVE-2018-5748 that affects QEMU monitor but now also triggered via QEMU guest agent.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1064/">CVE-2018-1064 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1064">CVE-2018-1064 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1076500">SUSE bug 1076500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083625">SUSE bug 1083625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087887">SUSE bug 1087887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088147">SUSE bug 1088147</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824234" comment="libvirt-3.9.0-14.el7_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824235" comment="libvirt-admin-3.9.0-14.el7_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824236" comment="libvirt-client-3.9.0-14.el7_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824237" comment="libvirt-daemon-3.9.0-14.el7_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824238" comment="libvirt-daemon-config-network-3.9.0-14.el7_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824239" comment="libvirt-daemon-config-nwfilter-3.9.0-14.el7_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824240" comment="libvirt-daemon-driver-interface-3.9.0-14.el7_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824241" comment="libvirt-daemon-driver-lxc-3.9.0-14.el7_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824242" comment="libvirt-daemon-driver-network-3.9.0-14.el7_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824243" comment="libvirt-daemon-driver-nodedev-3.9.0-14.el7_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824244" comment="libvirt-daemon-driver-nwfilter-3.9.0-14.el7_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824245" comment="libvirt-daemon-driver-qemu-3.9.0-14.el7_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824246" comment="libvirt-daemon-driver-secret-3.9.0-14.el7_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824247" comment="libvirt-daemon-driver-storage-3.9.0-14.el7_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824248" comment="libvirt-daemon-driver-storage-core-3.9.0-14.el7_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824249" comment="libvirt-daemon-driver-storage-disk-3.9.0-14.el7_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824250" comment="libvirt-daemon-driver-storage-gluster-3.9.0-14.el7_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824251" comment="libvirt-daemon-driver-storage-iscsi-3.9.0-14.el7_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824252" comment="libvirt-daemon-driver-storage-logical-3.9.0-14.el7_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824253" comment="libvirt-daemon-driver-storage-mpath-3.9.0-14.el7_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824254" comment="libvirt-daemon-driver-storage-rbd-3.9.0-14.el7_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824255" comment="libvirt-daemon-driver-storage-scsi-3.9.0-14.el7_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824256" comment="libvirt-daemon-kvm-3.9.0-14.el7_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824257" comment="libvirt-daemon-lxc-3.9.0-14.el7_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824258" comment="libvirt-devel-3.9.0-14.el7_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824259" comment="libvirt-docs-3.9.0-14.el7_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824260" comment="libvirt-libs-3.9.0-14.el7_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824261" comment="libvirt-lock-sanlock-3.9.0-14.el7_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824262" comment="libvirt-login-shell-3.9.0-14.el7_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824263" comment="libvirt-nss-3.9.0-14.el7_5.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810675" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10675</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10675" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10675" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10675" ref_url="https://www.suse.com/security/cve/CVE-2018-10675" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004230.html" source="SUSE-SU"/>
    <description>
    The do_get_mempolicy function in mm/mempolicy.c in the Linux kernel before 4.12.9 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted system calls.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10675/">CVE-2018-10675 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10675">CVE-2018-10675 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091755">SUSE bug 1091755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115893">SUSE bug 1115893</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824504" comment="kernel-3.10.0-862.11.6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824505" comment="kernel-abi-whitelists-3.10.0-862.11.6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824506" comment="kernel-debug-3.10.0-862.11.6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824509" comment="kernel-doc-3.10.0-862.11.6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824510" comment="kernel-headers-3.10.0-862.11.6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824511" comment="kernel-tools-3.10.0-862.11.6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824512" comment="kernel-tools-libs-3.10.0-862.11.6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824514" comment="perf-3.10.0-862.11.6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824515" comment="python-perf-3.10.0-862.11.6.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181068" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1068</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1068" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1068" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1068" ref_url="https://www.suse.com/security/cve/CVE-2018-1068" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0989-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0992-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0993-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0995-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1004-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1005-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1009-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1010-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1013-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1016-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003932.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1019-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1022-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1023-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2366-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004537.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0781-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IGSNRZOHBLG7CUS6RPT3LPE2GCEITYQD/#IGSNRZOHBLG7CUS6RPT3LPE2GCEITYQD" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux 4.x kernel's implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1068/">CVE-2018-1068 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1068">CVE-2018-1068 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1085107">SUSE bug 1085107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085114">SUSE bug 1085114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123903">SUSE bug 1123903</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824218" comment="kernel-3.10.0-862.2.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824219" comment="kernel-abi-whitelists-3.10.0-862.2.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824220" comment="kernel-debug-3.10.0-862.2.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824223" comment="kernel-doc-3.10.0-862.2.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824224" comment="kernel-headers-3.10.0-862.2.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824225" comment="kernel-tools-3.10.0-862.2.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824226" comment="kernel-tools-libs-3.10.0-862.2.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824228" comment="perf-3.10.0-862.2.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824229" comment="python-perf-3.10.0-862.2.3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810689" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10689</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10689" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10689" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10689" ref_url="https://www.suse.com/security/cve/CVE-2018-10689" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005319.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1224-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4XVUCFZTA5I7REF7NZOJBBPLIGSBAHNW/#4XVUCFZTA5I7REF7NZOJBBPLIGSBAHNW" source="SUSE-SU"/>
    <description>
    blktrace (aka Block IO Tracing) 1.2.0, as used with the Linux kernel and Android, has a buffer overflow in the dev_map_read function in btt/devmap.c because the device and devno arrays are too small, as demonstrated by an invalid free when using the btt program with a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-10689/">CVE-2018-10689 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10689">CVE-2018-10689 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1091942">SUSE bug 1091942</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826394" comment="blktrace-1.0.5-9.el7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181071" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1071</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1071" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1071" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1071" ref_url="https://www.suse.com/security/cve/CVE-2018-1071" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1874-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010436.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1093-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GK62YTNMQ4SBUW42W4UTPSYBGUSFJAAP/#GK62YTNMQ4SBUW42W4UTPSYBGUSFJAAP" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1893-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OB6JXDU5MUN4VZ3IDSNYQUBWMMTHOMZZ/#OB6JXDU5MUN4VZ3IDSNYQUBWMMTHOMZZ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2966-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DFJC4KYTKTX2DE4QRHBI7MDML2BWODJ5/#DFJC4KYTKTX2DE4QRHBI7MDML2BWODJ5" source="SUSE-SU"/>
    <description>
    zsh through version 5.4.2 is vulnerable to a stack-based buffer overflow in the exec.c:hashcmd() function. A local attacker could exploit this to cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1071/">CVE-2018-1071 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1071">CVE-2018-1071 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1084656">SUSE bug 1084656</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200039">SUSE bug 1200039</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824784" comment="zsh-5.0.2-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824785" comment="zsh-html-5.0.2-31.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810733" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10733</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10733" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10733" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10733" ref_url="https://www.suse.com/security/cve/CVE-2018-10733" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006986.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1120-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7YS67O4IB7JDIOPDYSMM36CGHSVECNBF/#7YS67O4IB7JDIOPDYSMM36CGHSVECNBF" source="SUSE-SU"/>
    <description>
    There is a heap-based buffer over-read in the function ft_font_face_hash of gxps-fonts.c in libgxps through 0.3.0. A crafted input will lead to a remote denial of service attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-10733/">CVE-2018-10733 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10733">CVE-2018-10733 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1092125">SUSE bug 1092125</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824843" comment="PackageKit-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824844" comment="PackageKit-command-not-found-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824845" comment="PackageKit-cron-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824846" comment="PackageKit-glib-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824847" comment="PackageKit-glib-devel-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824848" comment="PackageKit-gstreamer-plugin-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824849" comment="PackageKit-gtk3-module-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824850" comment="PackageKit-yum-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824851" comment="PackageKit-yum-plugin-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824852" comment="accountsservice-0.6.50-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824853" comment="accountsservice-devel-0.6.50-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824854" comment="accountsservice-libs-0.6.50-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824855" comment="adwaita-cursor-theme-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824856" comment="adwaita-gtk2-theme-3.28-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824857" comment="adwaita-icon-theme-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824858" comment="adwaita-icon-theme-devel-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824859" comment="appstream-data-7-20180614.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824860" comment="at-spi2-atk-2.26.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824861" comment="at-spi2-atk-devel-2.26.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824862" comment="at-spi2-core-2.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824863" comment="at-spi2-core-devel-2.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824864" comment="atk-2.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824865" comment="atk-devel-2.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824866" comment="baobab-3.28.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824867" comment="bolt-0.4-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824868" comment="brasero-3.12.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824869" comment="brasero-devel-3.12.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824870" comment="brasero-libs-3.12.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824871" comment="brasero-nautilus-3.12.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824872" comment="cairo-1.15.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824873" comment="cairo-devel-1.15.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824874" comment="cairo-gobject-1.15.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824875" comment="cairo-gobject-devel-1.15.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824876" comment="cairo-tools-1.15.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824877" comment="cheese-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824878" comment="cheese-libs-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824879" comment="cheese-libs-devel-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824880" comment="clutter-gst3-3.0.26-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824881" comment="clutter-gst3-devel-3.0.26-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824882" comment="compat-exiv2-023-0.23-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824883" comment="compat-libical1-1.0.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824884" comment="control-center-3.28.1-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824885" comment="control-center-filesystem-3.28.1-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824886" comment="dconf-0.28.0-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824887" comment="dconf-devel-0.28.0-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824888" comment="dconf-editor-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824889" comment="devhelp-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824890" comment="devhelp-devel-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824891" comment="devhelp-libs-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824892" comment="ekiga-4.0.1-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824893" comment="empathy-3.12.13-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824894" comment="eog-3.28.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824895" comment="eog-devel-3.28.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824896" comment="evince-3.28.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824897" comment="evince-browser-plugin-3.28.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824898" comment="evince-devel-3.28.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824899" comment="evince-dvi-3.28.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824900" comment="evince-libs-3.28.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824901" comment="evince-nautilus-3.28.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824902" comment="evolution-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824903" comment="evolution-bogofilter-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824904" comment="evolution-data-server-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824905" comment="evolution-data-server-devel-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824906" comment="evolution-data-server-doc-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824907" comment="evolution-data-server-langpacks-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824908" comment="evolution-data-server-perl-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824909" comment="evolution-data-server-tests-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824910" comment="evolution-devel-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824911" comment="evolution-devel-docs-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824912" comment="evolution-ews-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824913" comment="evolution-ews-langpacks-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824914" comment="evolution-help-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824915" comment="evolution-langpacks-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824916" comment="evolution-mapi-3.28.3-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824917" comment="evolution-mapi-langpacks-3.28.3-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824918" comment="evolution-pst-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824919" comment="evolution-spamassassin-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824920" comment="evolution-tests-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824921" comment="file-roller-3.28.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824922" comment="file-roller-nautilus-3.28.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824923" comment="flatpak-1.0.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824924" comment="flatpak-builder-1.0.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824925" comment="flatpak-devel-1.0.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824926" comment="flatpak-libs-1.0.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824927" comment="folks-0.11.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824928" comment="folks-devel-0.11.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824929" comment="folks-tools-0.11.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824930" comment="fontconfig-2.13.0-4.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824931" comment="fontconfig-devel-2.13.0-4.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824932" comment="fontconfig-devel-doc-2.13.0-4.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824933" comment="freetype-2.8-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824934" comment="freetype-demos-2.8-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824935" comment="freetype-devel-2.8-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824936" comment="fribidi-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824937" comment="fribidi-devel-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824938" comment="fwupd-1.0.8-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824939" comment="fwupd-devel-1.0.8-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824940" comment="fwupdate-12-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824941" comment="fwupdate-devel-12-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824942" comment="fwupdate-efi-12-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824943" comment="fwupdate-libs-12-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824944" comment="gcr-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824945" comment="gcr-devel-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824946" comment="gdk-pixbuf2-2.36.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824947" comment="gdk-pixbuf2-devel-2.36.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824948" comment="gdk-pixbuf2-tests-2.36.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824949" comment="gdm-3.28.2-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824950" comment="gdm-devel-3.28.2-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824951" comment="gdm-pam-extensions-devel-3.28.2-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824952" comment="gedit-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824953" comment="gedit-devel-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824954" comment="gedit-plugin-bookmarks-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824955" comment="gedit-plugin-bracketcompletion-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824956" comment="gedit-plugin-charmap-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824957" comment="gedit-plugin-codecomment-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824958" comment="gedit-plugin-colorpicker-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824959" comment="gedit-plugin-colorschemer-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824960" comment="gedit-plugin-commander-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824961" comment="gedit-plugin-drawspaces-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824962" comment="gedit-plugin-findinfiles-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824963" comment="gedit-plugin-joinlines-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824964" comment="gedit-plugin-multiedit-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824965" comment="gedit-plugin-smartspaces-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824966" comment="gedit-plugin-synctex-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824967" comment="gedit-plugin-terminal-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824968" comment="gedit-plugin-textsize-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824969" comment="gedit-plugin-translate-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824970" comment="gedit-plugin-wordcompletion-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824971" comment="gedit-plugins-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824972" comment="gedit-plugins-data-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824973" comment="geoclue2-2.4.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824974" comment="geoclue2-demos-2.4.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824975" comment="geoclue2-devel-2.4.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824976" comment="geoclue2-libs-2.4.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824977" comment="geocode-glib-3.26.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824978" comment="geocode-glib-devel-3.26.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824979" comment="gjs-1.52.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824980" comment="gjs-devel-1.52.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824981" comment="gjs-tests-1.52.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824982" comment="glade-3.22.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824983" comment="glade-devel-3.22.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824984" comment="glade-libs-3.22.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824985" comment="glib-networking-2.56.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824986" comment="glib-networking-tests-2.56.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824987" comment="glib2-2.56.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824988" comment="glib2-devel-2.56.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824989" comment="glib2-doc-2.56.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824990" comment="glib2-fam-2.56.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824991" comment="glib2-static-2.56.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824992" comment="glib2-tests-2.56.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824993" comment="glibmm24-2.56.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824994" comment="glibmm24-devel-2.56.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824995" comment="glibmm24-doc-2.56.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824996" comment="gnome-backgrounds-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824997" comment="gnome-bluetooth-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824998" comment="gnome-bluetooth-libs-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824999" comment="gnome-bluetooth-libs-devel-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825000" comment="gnome-boxes-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825001" comment="gnome-calculator-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825002" comment="gnome-classic-session-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825003" comment="gnome-clocks-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825004" comment="gnome-color-manager-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825005" comment="gnome-contacts-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825006" comment="gnome-desktop3-3.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825007" comment="gnome-desktop3-devel-3.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825008" comment="gnome-desktop3-tests-3.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825009" comment="gnome-devel-docs-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825010" comment="gnome-dictionary-3.26.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825011" comment="gnome-disk-utility-3.28.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825012" comment="gnome-documents-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825013" comment="gnome-documents-libs-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825014" comment="gnome-font-viewer-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825015" comment="gnome-getting-started-docs-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825016" comment="gnome-getting-started-docs-cs-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825017" comment="gnome-getting-started-docs-de-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825018" comment="gnome-getting-started-docs-es-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825019" comment="gnome-getting-started-docs-fr-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825020" comment="gnome-getting-started-docs-gl-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825021" comment="gnome-getting-started-docs-hu-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825022" comment="gnome-getting-started-docs-it-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825023" comment="gnome-getting-started-docs-pl-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825024" comment="gnome-getting-started-docs-pt_BR-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825025" comment="gnome-getting-started-docs-ru-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825026" comment="gnome-initial-setup-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825027" comment="gnome-keyring-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825028" comment="gnome-keyring-pam-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825029" comment="gnome-online-accounts-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825030" comment="gnome-online-accounts-devel-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825031" comment="gnome-online-miners-3.26.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825032" comment="gnome-packagekit-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825033" comment="gnome-packagekit-common-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825034" comment="gnome-packagekit-installer-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825035" comment="gnome-packagekit-updater-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825036" comment="gnome-screenshot-3.26.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825037" comment="gnome-session-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825038" comment="gnome-session-custom-session-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825039" comment="gnome-session-wayland-session-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825040" comment="gnome-session-xsession-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825041" comment="gnome-settings-daemon-3.28.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825042" comment="gnome-settings-daemon-devel-3.28.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825043" comment="gnome-shell-3.28.3-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825044" comment="gnome-shell-extension-alternate-tab-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825045" comment="gnome-shell-extension-apps-menu-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825046" comment="gnome-shell-extension-auto-move-windows-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825047" comment="gnome-shell-extension-common-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825048" comment="gnome-shell-extension-dash-to-dock-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825049" comment="gnome-shell-extension-drive-menu-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825050" comment="gnome-shell-extension-launch-new-instance-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825051" comment="gnome-shell-extension-native-window-placement-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825052" comment="gnome-shell-extension-no-hot-corner-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825053" comment="gnome-shell-extension-panel-favorites-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825054" comment="gnome-shell-extension-places-menu-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825055" comment="gnome-shell-extension-screenshot-window-sizer-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825056" comment="gnome-shell-extension-systemMonitor-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825057" comment="gnome-shell-extension-top-icons-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825058" comment="gnome-shell-extension-updates-dialog-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825059" comment="gnome-shell-extension-user-theme-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825060" comment="gnome-shell-extension-window-list-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825061" comment="gnome-shell-extension-windowsNavigator-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825062" comment="gnome-shell-extension-workspace-indicator-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825063" comment="gnome-software-3.28.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825064" comment="gnome-software-devel-3.28.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825065" comment="gnome-software-editor-3.28.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825066" comment="gnome-system-monitor-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825067" comment="gnome-terminal-3.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825068" comment="gnome-terminal-nautilus-3.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825069" comment="gnome-themes-standard-3.28-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825070" comment="gnome-tweak-tool-3.28.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825071" comment="gnome-user-docs-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825072" comment="gnote-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825073" comment="gobject-introspection-1.56.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825074" comment="gobject-introspection-devel-1.56.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825075" comment="gom-0.3.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825076" comment="gom-devel-0.3.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825077" comment="google-noto-emoji-color-fonts-20180508-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825078" comment="google-noto-emoji-fonts-20180508-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825079" comment="grilo-0.3.6-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825080" comment="grilo-devel-0.3.6-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825081" comment="grilo-plugins-0.3.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825082" comment="gsettings-desktop-schemas-3.28.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825083" comment="gsettings-desktop-schemas-devel-3.28.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825084" comment="gspell-1.6.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825085" comment="gspell-devel-1.6.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825086" comment="gspell-doc-1.6.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825087" comment="gssdp-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825088" comment="gssdp-devel-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825089" comment="gssdp-docs-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825090" comment="gssdp-utils-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825091" comment="gstreamer1-plugins-base-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825092" comment="gstreamer1-plugins-base-devel-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825093" comment="gstreamer1-plugins-base-devel-docs-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825094" comment="gstreamer1-plugins-base-tools-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825095" comment="gtk-doc-1.28-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825096" comment="gtk-update-icon-cache-3.22.30-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825097" comment="gtk3-3.22.30-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825098" comment="gtk3-devel-3.22.30-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825099" comment="gtk3-devel-docs-3.22.30-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825100" comment="gtk3-immodule-xim-3.22.30-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825101" comment="gtk3-immodules-3.22.30-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825102" comment="gtk3-tests-3.22.30-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825103" comment="gtksourceview3-3.24.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825104" comment="gtksourceview3-devel-3.24.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825105" comment="gtksourceview3-tests-3.24.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825106" comment="gucharmap-10.0.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825107" comment="gucharmap-devel-10.0.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825108" comment="gucharmap-libs-10.0.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825109" comment="gupnp-1.0.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825110" comment="gupnp-devel-1.0.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825111" comment="gupnp-docs-1.0.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825112" comment="gupnp-igd-0.2.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825113" comment="gupnp-igd-devel-0.2.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825114" comment="gupnp-igd-python-0.2.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825115" comment="gvfs-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825116" comment="gvfs-afc-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825117" comment="gvfs-afp-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825118" comment="gvfs-archive-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825119" comment="gvfs-client-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825120" comment="gvfs-devel-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825121" comment="gvfs-fuse-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825122" comment="gvfs-goa-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825123" comment="gvfs-gphoto2-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825124" comment="gvfs-mtp-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825125" comment="gvfs-smb-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825126" comment="gvfs-tests-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825127" comment="harfbuzz-1.7.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825128" comment="harfbuzz-devel-1.7.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825129" comment="harfbuzz-icu-1.7.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825130" comment="json-glib-1.4.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825131" comment="json-glib-devel-1.4.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825132" comment="json-glib-tests-1.4.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825133" comment="libappstream-glib-0.7.8-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825134" comment="libappstream-glib-builder-0.7.8-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825135" comment="libappstream-glib-builder-devel-0.7.8-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825136" comment="libappstream-glib-devel-0.7.8-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825137" comment="libchamplain-0.12.16-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825138" comment="libchamplain-demos-0.12.16-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825139" comment="libchamplain-devel-0.12.16-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825140" comment="libchamplain-gtk-0.12.16-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825141" comment="libcroco-0.6.12-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825142" comment="libcroco-devel-0.6.12-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825143" comment="libgdata-0.17.9-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825144" comment="libgdata-devel-0.17.9-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825145" comment="libgee-0.20.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825146" comment="libgee-devel-0.20.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825147" comment="libgepub-0.6.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825148" comment="libgepub-devel-0.6.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825149" comment="libgexiv2-0.10.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825150" comment="libgexiv2-devel-0.10.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825151" comment="libgnomekbd-3.26.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825152" comment="libgnomekbd-devel-3.26.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825153" comment="libgovirt-0.3.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825154" comment="libgovirt-devel-0.3.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825155" comment="libgtop2-2.38.0-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825156" comment="libgtop2-devel-2.38.0-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825157" comment="libgweather-3.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825158" comment="libgweather-devel-3.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825159" comment="libgxps-0.3.0-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825160" comment="libgxps-devel-0.3.0-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825161" comment="libgxps-tools-0.3.0-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825162" comment="libical-3.0.3-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825163" comment="libical-devel-3.0.3-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825164" comment="libical-glib-3.0.3-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825165" comment="libical-glib-devel-3.0.3-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825166" comment="libical-glib-doc-3.0.3-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825167" comment="libjpeg-turbo-1.2.90-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825168" comment="libjpeg-turbo-devel-1.2.90-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825169" comment="libjpeg-turbo-static-1.2.90-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825170" comment="libjpeg-turbo-utils-1.2.90-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825171" comment="libmediaart-1.9.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825172" comment="libmediaart-devel-1.9.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825173" comment="libmediaart-tests-1.9.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825174" comment="libosinfo-1.1.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825175" comment="libosinfo-devel-1.1.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825176" comment="libosinfo-vala-1.1.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825177" comment="libpeas-1.22.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825178" comment="libpeas-devel-1.22.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825179" comment="libpeas-gtk-1.22.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825180" comment="libpeas-loader-python-1.22.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825181" comment="librsvg2-2.40.20-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825182" comment="librsvg2-devel-2.40.20-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825183" comment="librsvg2-tools-2.40.20-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825184" comment="libsecret-0.18.6-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825185" comment="libsecret-devel-0.18.6-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825186" comment="libsoup-2.62.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825187" comment="libsoup-devel-2.62.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825188" comment="libwayland-client-1.15.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825189" comment="libwayland-cursor-1.15.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825190" comment="libwayland-egl-1.15.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825191" comment="libwayland-server-1.15.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825192" comment="libwnck3-3.24.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825193" comment="libwnck3-devel-3.24.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825194" comment="mozjs52-52.9.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825195" comment="mozjs52-devel-52.9.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825196" comment="mutter-3.28.3-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825197" comment="mutter-devel-3.28.3-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825198" comment="nautilus-3.26.3.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825199" comment="nautilus-devel-3.26.3.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825200" comment="nautilus-extensions-3.26.3.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825201" comment="nautilus-sendto-3.8.6-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825202" comment="openchange-2.3-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825203" comment="openchange-client-2.3-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825204" comment="openchange-devel-2.3-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825205" comment="openchange-devel-docs-2.3-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825206" comment="osinfo-db-20180531-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825207" comment="pango-1.42.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825208" comment="pango-devel-1.42.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825209" comment="pango-tests-1.42.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825210" comment="poppler-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825211" comment="poppler-cpp-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825212" comment="poppler-cpp-devel-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825213" comment="poppler-demos-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825214" comment="poppler-devel-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825215" comment="poppler-glib-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825216" comment="poppler-glib-devel-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825217" comment="poppler-qt-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825218" comment="poppler-qt-devel-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825219" comment="poppler-utils-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825220" comment="python2-gexiv2-0.10.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825221" comment="python2-pyatspi-2.26.0-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825222" comment="rest-0.8.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825223" comment="rest-devel-0.8.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825224" comment="rhythmbox-3.4.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825225" comment="rhythmbox-devel-3.4.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825226" comment="seahorse-nautilus-3.11.92-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825227" comment="shotwell-0.28.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825228" comment="sushi-3.28.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825229" comment="totem-3.26.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825230" comment="totem-devel-3.26.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825231" comment="totem-nautilus-3.26.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825232" comment="totem-pl-parser-3.26.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825233" comment="totem-pl-parser-devel-3.26.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825234" comment="turbojpeg-1.2.90-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825235" comment="turbojpeg-devel-1.2.90-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825236" comment="upower-0.99.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825237" comment="upower-devel-0.99.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825238" comment="upower-devel-docs-0.99.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825239" comment="vala-0.40.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825240" comment="vala-devel-0.40.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825241" comment="vala-doc-0.40.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825242" comment="valadoc-0.40.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825243" comment="valadoc-devel-0.40.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825244" comment="vino-3.22.0-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825245" comment="vte-profile-0.52.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825246" comment="vte291-0.52.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825247" comment="vte291-devel-0.52.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825248" comment="wayland-devel-1.15.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825249" comment="wayland-doc-1.15.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825250" comment="wayland-protocols-devel-1.14-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825251" comment="webkitgtk4-2.20.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825252" comment="webkitgtk4-devel-2.20.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825253" comment="webkitgtk4-doc-2.20.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825254" comment="webkitgtk4-jsc-2.20.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825255" comment="webkitgtk4-jsc-devel-2.20.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825256" comment="webkitgtk4-plugin-process-gtk2-2.20.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825257" comment="xdg-desktop-portal-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825258" comment="xdg-desktop-portal-devel-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825259" comment="xdg-desktop-portal-gtk-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825260" comment="yelp-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825261" comment="yelp-devel-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825262" comment="yelp-libs-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825263" comment="yelp-tools-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825264" comment="yelp-xsl-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825265" comment="yelp-xsl-devel-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825266" comment="zenity-3.28.1-1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810767" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10767</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10767" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10767" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10767" ref_url="https://www.suse.com/security/cve/CVE-2018-10767" source="SUSE CVE"/>
    <description>
    There is a stack-based buffer over-read in calling GLib in the function gxps_images_guess_content_type of gxps-images.c in libgxps through 0.3.0 because it does not reject negative return values from a g_input_stream_read call. A crafted input will lead to a remote denial of service attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-05-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-10767/">CVE-2018-10767 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10767">CVE-2018-10767 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1092123">SUSE bug 1092123</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824843" comment="PackageKit-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824844" comment="PackageKit-command-not-found-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824845" comment="PackageKit-cron-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824846" comment="PackageKit-glib-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824847" comment="PackageKit-glib-devel-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824848" comment="PackageKit-gstreamer-plugin-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824849" comment="PackageKit-gtk3-module-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824850" comment="PackageKit-yum-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824851" comment="PackageKit-yum-plugin-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824852" comment="accountsservice-0.6.50-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824853" comment="accountsservice-devel-0.6.50-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824854" comment="accountsservice-libs-0.6.50-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824855" comment="adwaita-cursor-theme-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824856" comment="adwaita-gtk2-theme-3.28-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824857" comment="adwaita-icon-theme-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824858" comment="adwaita-icon-theme-devel-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824859" comment="appstream-data-7-20180614.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824860" comment="at-spi2-atk-2.26.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824861" comment="at-spi2-atk-devel-2.26.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824862" comment="at-spi2-core-2.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824863" comment="at-spi2-core-devel-2.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824864" comment="atk-2.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824865" comment="atk-devel-2.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824866" comment="baobab-3.28.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824867" comment="bolt-0.4-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824868" comment="brasero-3.12.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824869" comment="brasero-devel-3.12.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824870" comment="brasero-libs-3.12.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824871" comment="brasero-nautilus-3.12.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824872" comment="cairo-1.15.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824873" comment="cairo-devel-1.15.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824874" comment="cairo-gobject-1.15.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824875" comment="cairo-gobject-devel-1.15.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824876" comment="cairo-tools-1.15.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824877" comment="cheese-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824878" comment="cheese-libs-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824879" comment="cheese-libs-devel-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824880" comment="clutter-gst3-3.0.26-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824881" comment="clutter-gst3-devel-3.0.26-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824882" comment="compat-exiv2-023-0.23-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824883" comment="compat-libical1-1.0.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824884" comment="control-center-3.28.1-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824885" comment="control-center-filesystem-3.28.1-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824886" comment="dconf-0.28.0-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824887" comment="dconf-devel-0.28.0-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824888" comment="dconf-editor-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824889" comment="devhelp-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824890" comment="devhelp-devel-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824891" comment="devhelp-libs-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824892" comment="ekiga-4.0.1-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824893" comment="empathy-3.12.13-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824894" comment="eog-3.28.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824895" comment="eog-devel-3.28.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824896" comment="evince-3.28.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824897" comment="evince-browser-plugin-3.28.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824898" comment="evince-devel-3.28.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824899" comment="evince-dvi-3.28.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824900" comment="evince-libs-3.28.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824901" comment="evince-nautilus-3.28.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824902" comment="evolution-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824903" comment="evolution-bogofilter-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824904" comment="evolution-data-server-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824905" comment="evolution-data-server-devel-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824906" comment="evolution-data-server-doc-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824907" comment="evolution-data-server-langpacks-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824908" comment="evolution-data-server-perl-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824909" comment="evolution-data-server-tests-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824910" comment="evolution-devel-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824911" comment="evolution-devel-docs-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824912" comment="evolution-ews-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824913" comment="evolution-ews-langpacks-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824914" comment="evolution-help-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824915" comment="evolution-langpacks-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824916" comment="evolution-mapi-3.28.3-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824917" comment="evolution-mapi-langpacks-3.28.3-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824918" comment="evolution-pst-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824919" comment="evolution-spamassassin-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824920" comment="evolution-tests-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824921" comment="file-roller-3.28.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824922" comment="file-roller-nautilus-3.28.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824923" comment="flatpak-1.0.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824924" comment="flatpak-builder-1.0.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824925" comment="flatpak-devel-1.0.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824926" comment="flatpak-libs-1.0.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824927" comment="folks-0.11.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824928" comment="folks-devel-0.11.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824929" comment="folks-tools-0.11.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824930" comment="fontconfig-2.13.0-4.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824931" comment="fontconfig-devel-2.13.0-4.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824932" comment="fontconfig-devel-doc-2.13.0-4.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824933" comment="freetype-2.8-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824934" comment="freetype-demos-2.8-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824935" comment="freetype-devel-2.8-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824936" comment="fribidi-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824937" comment="fribidi-devel-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824938" comment="fwupd-1.0.8-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824939" comment="fwupd-devel-1.0.8-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824940" comment="fwupdate-12-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824941" comment="fwupdate-devel-12-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824942" comment="fwupdate-efi-12-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824943" comment="fwupdate-libs-12-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824944" comment="gcr-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824945" comment="gcr-devel-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824946" comment="gdk-pixbuf2-2.36.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824947" comment="gdk-pixbuf2-devel-2.36.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824948" comment="gdk-pixbuf2-tests-2.36.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824949" comment="gdm-3.28.2-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824950" comment="gdm-devel-3.28.2-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824951" comment="gdm-pam-extensions-devel-3.28.2-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824952" comment="gedit-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824953" comment="gedit-devel-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824954" comment="gedit-plugin-bookmarks-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824955" comment="gedit-plugin-bracketcompletion-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824956" comment="gedit-plugin-charmap-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824957" comment="gedit-plugin-codecomment-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824958" comment="gedit-plugin-colorpicker-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824959" comment="gedit-plugin-colorschemer-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824960" comment="gedit-plugin-commander-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824961" comment="gedit-plugin-drawspaces-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824962" comment="gedit-plugin-findinfiles-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824963" comment="gedit-plugin-joinlines-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824964" comment="gedit-plugin-multiedit-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824965" comment="gedit-plugin-smartspaces-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824966" comment="gedit-plugin-synctex-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824967" comment="gedit-plugin-terminal-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824968" comment="gedit-plugin-textsize-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824969" comment="gedit-plugin-translate-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824970" comment="gedit-plugin-wordcompletion-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824971" comment="gedit-plugins-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824972" comment="gedit-plugins-data-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824973" comment="geoclue2-2.4.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824974" comment="geoclue2-demos-2.4.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824975" comment="geoclue2-devel-2.4.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824976" comment="geoclue2-libs-2.4.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824977" comment="geocode-glib-3.26.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824978" comment="geocode-glib-devel-3.26.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824979" comment="gjs-1.52.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824980" comment="gjs-devel-1.52.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824981" comment="gjs-tests-1.52.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824982" comment="glade-3.22.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824983" comment="glade-devel-3.22.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824984" comment="glade-libs-3.22.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824985" comment="glib-networking-2.56.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824986" comment="glib-networking-tests-2.56.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824987" comment="glib2-2.56.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824988" comment="glib2-devel-2.56.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824989" comment="glib2-doc-2.56.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824990" comment="glib2-fam-2.56.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824991" comment="glib2-static-2.56.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824992" comment="glib2-tests-2.56.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824993" comment="glibmm24-2.56.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824994" comment="glibmm24-devel-2.56.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824995" comment="glibmm24-doc-2.56.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824996" comment="gnome-backgrounds-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824997" comment="gnome-bluetooth-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824998" comment="gnome-bluetooth-libs-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824999" comment="gnome-bluetooth-libs-devel-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825000" comment="gnome-boxes-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825001" comment="gnome-calculator-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825002" comment="gnome-classic-session-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825003" comment="gnome-clocks-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825004" comment="gnome-color-manager-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825005" comment="gnome-contacts-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825006" comment="gnome-desktop3-3.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825007" comment="gnome-desktop3-devel-3.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825008" comment="gnome-desktop3-tests-3.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825009" comment="gnome-devel-docs-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825010" comment="gnome-dictionary-3.26.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825011" comment="gnome-disk-utility-3.28.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825012" comment="gnome-documents-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825013" comment="gnome-documents-libs-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825014" comment="gnome-font-viewer-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825015" comment="gnome-getting-started-docs-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825016" comment="gnome-getting-started-docs-cs-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825017" comment="gnome-getting-started-docs-de-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825018" comment="gnome-getting-started-docs-es-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825019" comment="gnome-getting-started-docs-fr-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825020" comment="gnome-getting-started-docs-gl-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825021" comment="gnome-getting-started-docs-hu-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825022" comment="gnome-getting-started-docs-it-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825023" comment="gnome-getting-started-docs-pl-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825024" comment="gnome-getting-started-docs-pt_BR-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825025" comment="gnome-getting-started-docs-ru-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825026" comment="gnome-initial-setup-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825027" comment="gnome-keyring-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825028" comment="gnome-keyring-pam-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825029" comment="gnome-online-accounts-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825030" comment="gnome-online-accounts-devel-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825031" comment="gnome-online-miners-3.26.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825032" comment="gnome-packagekit-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825033" comment="gnome-packagekit-common-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825034" comment="gnome-packagekit-installer-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825035" comment="gnome-packagekit-updater-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825036" comment="gnome-screenshot-3.26.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825037" comment="gnome-session-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825038" comment="gnome-session-custom-session-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825039" comment="gnome-session-wayland-session-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825040" comment="gnome-session-xsession-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825041" comment="gnome-settings-daemon-3.28.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825042" comment="gnome-settings-daemon-devel-3.28.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825043" comment="gnome-shell-3.28.3-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825044" comment="gnome-shell-extension-alternate-tab-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825045" comment="gnome-shell-extension-apps-menu-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825046" comment="gnome-shell-extension-auto-move-windows-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825047" comment="gnome-shell-extension-common-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825048" comment="gnome-shell-extension-dash-to-dock-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825049" comment="gnome-shell-extension-drive-menu-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825050" comment="gnome-shell-extension-launch-new-instance-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825051" comment="gnome-shell-extension-native-window-placement-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825052" comment="gnome-shell-extension-no-hot-corner-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825053" comment="gnome-shell-extension-panel-favorites-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825054" comment="gnome-shell-extension-places-menu-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825055" comment="gnome-shell-extension-screenshot-window-sizer-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825056" comment="gnome-shell-extension-systemMonitor-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825057" comment="gnome-shell-extension-top-icons-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825058" comment="gnome-shell-extension-updates-dialog-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825059" comment="gnome-shell-extension-user-theme-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825060" comment="gnome-shell-extension-window-list-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825061" comment="gnome-shell-extension-windowsNavigator-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825062" comment="gnome-shell-extension-workspace-indicator-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825063" comment="gnome-software-3.28.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825064" comment="gnome-software-devel-3.28.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825065" comment="gnome-software-editor-3.28.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825066" comment="gnome-system-monitor-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825067" comment="gnome-terminal-3.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825068" comment="gnome-terminal-nautilus-3.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825069" comment="gnome-themes-standard-3.28-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825070" comment="gnome-tweak-tool-3.28.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825071" comment="gnome-user-docs-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825072" comment="gnote-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825073" comment="gobject-introspection-1.56.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825074" comment="gobject-introspection-devel-1.56.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825075" comment="gom-0.3.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825076" comment="gom-devel-0.3.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825077" comment="google-noto-emoji-color-fonts-20180508-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825078" comment="google-noto-emoji-fonts-20180508-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825079" comment="grilo-0.3.6-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825080" comment="grilo-devel-0.3.6-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825081" comment="grilo-plugins-0.3.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825082" comment="gsettings-desktop-schemas-3.28.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825083" comment="gsettings-desktop-schemas-devel-3.28.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825084" comment="gspell-1.6.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825085" comment="gspell-devel-1.6.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825086" comment="gspell-doc-1.6.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825087" comment="gssdp-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825088" comment="gssdp-devel-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825089" comment="gssdp-docs-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825090" comment="gssdp-utils-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825091" comment="gstreamer1-plugins-base-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825092" comment="gstreamer1-plugins-base-devel-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825093" comment="gstreamer1-plugins-base-devel-docs-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825094" comment="gstreamer1-plugins-base-tools-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825095" comment="gtk-doc-1.28-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825096" comment="gtk-update-icon-cache-3.22.30-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825097" comment="gtk3-3.22.30-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825098" comment="gtk3-devel-3.22.30-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825099" comment="gtk3-devel-docs-3.22.30-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825100" comment="gtk3-immodule-xim-3.22.30-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825101" comment="gtk3-immodules-3.22.30-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825102" comment="gtk3-tests-3.22.30-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825103" comment="gtksourceview3-3.24.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825104" comment="gtksourceview3-devel-3.24.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825105" comment="gtksourceview3-tests-3.24.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825106" comment="gucharmap-10.0.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825107" comment="gucharmap-devel-10.0.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825108" comment="gucharmap-libs-10.0.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825109" comment="gupnp-1.0.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825110" comment="gupnp-devel-1.0.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825111" comment="gupnp-docs-1.0.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825112" comment="gupnp-igd-0.2.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825113" comment="gupnp-igd-devel-0.2.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825114" comment="gupnp-igd-python-0.2.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825115" comment="gvfs-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825116" comment="gvfs-afc-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825117" comment="gvfs-afp-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825118" comment="gvfs-archive-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825119" comment="gvfs-client-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825120" comment="gvfs-devel-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825121" comment="gvfs-fuse-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825122" comment="gvfs-goa-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825123" comment="gvfs-gphoto2-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825124" comment="gvfs-mtp-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825125" comment="gvfs-smb-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825126" comment="gvfs-tests-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825127" comment="harfbuzz-1.7.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825128" comment="harfbuzz-devel-1.7.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825129" comment="harfbuzz-icu-1.7.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825130" comment="json-glib-1.4.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825131" comment="json-glib-devel-1.4.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825132" comment="json-glib-tests-1.4.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825133" comment="libappstream-glib-0.7.8-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825134" comment="libappstream-glib-builder-0.7.8-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825135" comment="libappstream-glib-builder-devel-0.7.8-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825136" comment="libappstream-glib-devel-0.7.8-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825137" comment="libchamplain-0.12.16-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825138" comment="libchamplain-demos-0.12.16-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825139" comment="libchamplain-devel-0.12.16-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825140" comment="libchamplain-gtk-0.12.16-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825141" comment="libcroco-0.6.12-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825142" comment="libcroco-devel-0.6.12-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825143" comment="libgdata-0.17.9-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825144" comment="libgdata-devel-0.17.9-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825145" comment="libgee-0.20.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825146" comment="libgee-devel-0.20.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825147" comment="libgepub-0.6.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825148" comment="libgepub-devel-0.6.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825149" comment="libgexiv2-0.10.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825150" comment="libgexiv2-devel-0.10.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825151" comment="libgnomekbd-3.26.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825152" comment="libgnomekbd-devel-3.26.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825153" comment="libgovirt-0.3.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825154" comment="libgovirt-devel-0.3.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825155" comment="libgtop2-2.38.0-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825156" comment="libgtop2-devel-2.38.0-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825157" comment="libgweather-3.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825158" comment="libgweather-devel-3.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825159" comment="libgxps-0.3.0-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825160" comment="libgxps-devel-0.3.0-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825161" comment="libgxps-tools-0.3.0-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825162" comment="libical-3.0.3-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825163" comment="libical-devel-3.0.3-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825164" comment="libical-glib-3.0.3-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825165" comment="libical-glib-devel-3.0.3-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825166" comment="libical-glib-doc-3.0.3-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825167" comment="libjpeg-turbo-1.2.90-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825168" comment="libjpeg-turbo-devel-1.2.90-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825169" comment="libjpeg-turbo-static-1.2.90-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825170" comment="libjpeg-turbo-utils-1.2.90-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825171" comment="libmediaart-1.9.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825172" comment="libmediaart-devel-1.9.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825173" comment="libmediaart-tests-1.9.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825174" comment="libosinfo-1.1.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825175" comment="libosinfo-devel-1.1.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825176" comment="libosinfo-vala-1.1.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825177" comment="libpeas-1.22.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825178" comment="libpeas-devel-1.22.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825179" comment="libpeas-gtk-1.22.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825180" comment="libpeas-loader-python-1.22.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825181" comment="librsvg2-2.40.20-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825182" comment="librsvg2-devel-2.40.20-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825183" comment="librsvg2-tools-2.40.20-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825184" comment="libsecret-0.18.6-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825185" comment="libsecret-devel-0.18.6-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825186" comment="libsoup-2.62.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825187" comment="libsoup-devel-2.62.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825188" comment="libwayland-client-1.15.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825189" comment="libwayland-cursor-1.15.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825190" comment="libwayland-egl-1.15.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825191" comment="libwayland-server-1.15.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825192" comment="libwnck3-3.24.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825193" comment="libwnck3-devel-3.24.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825194" comment="mozjs52-52.9.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825195" comment="mozjs52-devel-52.9.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825196" comment="mutter-3.28.3-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825197" comment="mutter-devel-3.28.3-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825198" comment="nautilus-3.26.3.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825199" comment="nautilus-devel-3.26.3.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825200" comment="nautilus-extensions-3.26.3.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825201" comment="nautilus-sendto-3.8.6-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825202" comment="openchange-2.3-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825203" comment="openchange-client-2.3-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825204" comment="openchange-devel-2.3-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825205" comment="openchange-devel-docs-2.3-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825206" comment="osinfo-db-20180531-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825207" comment="pango-1.42.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825208" comment="pango-devel-1.42.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825209" comment="pango-tests-1.42.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825210" comment="poppler-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825211" comment="poppler-cpp-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825212" comment="poppler-cpp-devel-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825213" comment="poppler-demos-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825214" comment="poppler-devel-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825215" comment="poppler-glib-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825216" comment="poppler-glib-devel-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825217" comment="poppler-qt-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825218" comment="poppler-qt-devel-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825219" comment="poppler-utils-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825220" comment="python2-gexiv2-0.10.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825221" comment="python2-pyatspi-2.26.0-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825222" comment="rest-0.8.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825223" comment="rest-devel-0.8.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825224" comment="rhythmbox-3.4.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825225" comment="rhythmbox-devel-3.4.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825226" comment="seahorse-nautilus-3.11.92-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825227" comment="shotwell-0.28.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825228" comment="sushi-3.28.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825229" comment="totem-3.26.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825230" comment="totem-devel-3.26.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825231" comment="totem-nautilus-3.26.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825232" comment="totem-pl-parser-3.26.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825233" comment="totem-pl-parser-devel-3.26.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825234" comment="turbojpeg-1.2.90-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825235" comment="turbojpeg-devel-1.2.90-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825236" comment="upower-0.99.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825237" comment="upower-devel-0.99.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825238" comment="upower-devel-docs-0.99.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825239" comment="vala-0.40.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825240" comment="vala-devel-0.40.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825241" comment="vala-doc-0.40.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825242" comment="valadoc-0.40.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825243" comment="valadoc-devel-0.40.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825244" comment="vino-3.22.0-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825245" comment="vte-profile-0.52.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825246" comment="vte291-0.52.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825247" comment="vte291-devel-0.52.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825248" comment="wayland-devel-1.15.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825249" comment="wayland-doc-1.15.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825250" comment="wayland-protocols-devel-1.14-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825251" comment="webkitgtk4-2.20.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825252" comment="webkitgtk4-devel-2.20.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825253" comment="webkitgtk4-doc-2.20.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825254" comment="webkitgtk4-jsc-2.20.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825255" comment="webkitgtk4-jsc-devel-2.20.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825256" comment="webkitgtk4-plugin-process-gtk2-2.20.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825257" comment="xdg-desktop-portal-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825258" comment="xdg-desktop-portal-devel-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825259" comment="xdg-desktop-portal-gtk-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825260" comment="yelp-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825261" comment="yelp-devel-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825262" comment="yelp-libs-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825263" comment="yelp-tools-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825264" comment="yelp-xsl-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825265" comment="yelp-xsl-devel-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825266" comment="zenity-3.28.1-1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810768" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10768</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10768" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10768" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10768" ref_url="https://www.suse.com/security/cve/CVE-2018-10768" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006944.html" source="SUSE-SU"/>
    <description>
    There is a NULL pointer dereference in the AnnotPath::getCoordsLength function in Annot.h in an Ubuntu package for Poppler 0.24.5. A crafted input will lead to a remote denial of service attack. Later Ubuntu packages such as for Poppler 0.41.0 are not affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10768/">CVE-2018-10768 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10768">CVE-2018-10768 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1092105">SUSE bug 1092105</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824843" comment="PackageKit-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824844" comment="PackageKit-command-not-found-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824845" comment="PackageKit-cron-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824846" comment="PackageKit-glib-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824847" comment="PackageKit-glib-devel-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824848" comment="PackageKit-gstreamer-plugin-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824849" comment="PackageKit-gtk3-module-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824850" comment="PackageKit-yum-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824851" comment="PackageKit-yum-plugin-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824852" comment="accountsservice-0.6.50-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824853" comment="accountsservice-devel-0.6.50-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824854" comment="accountsservice-libs-0.6.50-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824855" comment="adwaita-cursor-theme-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824856" comment="adwaita-gtk2-theme-3.28-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824857" comment="adwaita-icon-theme-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824858" comment="adwaita-icon-theme-devel-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824859" comment="appstream-data-7-20180614.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824860" comment="at-spi2-atk-2.26.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824861" comment="at-spi2-atk-devel-2.26.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824862" comment="at-spi2-core-2.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824863" comment="at-spi2-core-devel-2.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824864" comment="atk-2.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824865" comment="atk-devel-2.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824866" comment="baobab-3.28.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824867" comment="bolt-0.4-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824868" comment="brasero-3.12.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824869" comment="brasero-devel-3.12.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824870" comment="brasero-libs-3.12.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824871" comment="brasero-nautilus-3.12.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824872" comment="cairo-1.15.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824873" comment="cairo-devel-1.15.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824874" comment="cairo-gobject-1.15.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824875" comment="cairo-gobject-devel-1.15.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824876" comment="cairo-tools-1.15.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824877" comment="cheese-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824878" comment="cheese-libs-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824879" comment="cheese-libs-devel-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824880" comment="clutter-gst3-3.0.26-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824881" comment="clutter-gst3-devel-3.0.26-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824882" comment="compat-exiv2-023-0.23-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824883" comment="compat-libical1-1.0.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824884" comment="control-center-3.28.1-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824885" comment="control-center-filesystem-3.28.1-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824886" comment="dconf-0.28.0-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824887" comment="dconf-devel-0.28.0-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824888" comment="dconf-editor-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824889" comment="devhelp-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824890" comment="devhelp-devel-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824891" comment="devhelp-libs-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824892" comment="ekiga-4.0.1-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824893" comment="empathy-3.12.13-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824894" comment="eog-3.28.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824895" comment="eog-devel-3.28.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824896" comment="evince-3.28.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824897" comment="evince-browser-plugin-3.28.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824898" comment="evince-devel-3.28.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824899" comment="evince-dvi-3.28.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824900" comment="evince-libs-3.28.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824901" comment="evince-nautilus-3.28.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824902" comment="evolution-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824903" comment="evolution-bogofilter-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824904" comment="evolution-data-server-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824905" comment="evolution-data-server-devel-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824906" comment="evolution-data-server-doc-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824907" comment="evolution-data-server-langpacks-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824908" comment="evolution-data-server-perl-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824909" comment="evolution-data-server-tests-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824910" comment="evolution-devel-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824911" comment="evolution-devel-docs-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824912" comment="evolution-ews-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824913" comment="evolution-ews-langpacks-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824914" comment="evolution-help-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824915" comment="evolution-langpacks-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824916" comment="evolution-mapi-3.28.3-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824917" comment="evolution-mapi-langpacks-3.28.3-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824918" comment="evolution-pst-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824919" comment="evolution-spamassassin-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824920" comment="evolution-tests-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824921" comment="file-roller-3.28.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824922" comment="file-roller-nautilus-3.28.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824923" comment="flatpak-1.0.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824924" comment="flatpak-builder-1.0.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824925" comment="flatpak-devel-1.0.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824926" comment="flatpak-libs-1.0.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824927" comment="folks-0.11.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824928" comment="folks-devel-0.11.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824929" comment="folks-tools-0.11.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824930" comment="fontconfig-2.13.0-4.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824931" comment="fontconfig-devel-2.13.0-4.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824932" comment="fontconfig-devel-doc-2.13.0-4.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824933" comment="freetype-2.8-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824934" comment="freetype-demos-2.8-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824935" comment="freetype-devel-2.8-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824936" comment="fribidi-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824937" comment="fribidi-devel-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824938" comment="fwupd-1.0.8-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824939" comment="fwupd-devel-1.0.8-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824940" comment="fwupdate-12-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824941" comment="fwupdate-devel-12-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824942" comment="fwupdate-efi-12-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824943" comment="fwupdate-libs-12-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824944" comment="gcr-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824945" comment="gcr-devel-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824946" comment="gdk-pixbuf2-2.36.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824947" comment="gdk-pixbuf2-devel-2.36.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824948" comment="gdk-pixbuf2-tests-2.36.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824949" comment="gdm-3.28.2-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824950" comment="gdm-devel-3.28.2-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824951" comment="gdm-pam-extensions-devel-3.28.2-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824952" comment="gedit-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824953" comment="gedit-devel-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824954" comment="gedit-plugin-bookmarks-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824955" comment="gedit-plugin-bracketcompletion-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824956" comment="gedit-plugin-charmap-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824957" comment="gedit-plugin-codecomment-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824958" comment="gedit-plugin-colorpicker-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824959" comment="gedit-plugin-colorschemer-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824960" comment="gedit-plugin-commander-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824961" comment="gedit-plugin-drawspaces-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824962" comment="gedit-plugin-findinfiles-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824963" comment="gedit-plugin-joinlines-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824964" comment="gedit-plugin-multiedit-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824965" comment="gedit-plugin-smartspaces-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824966" comment="gedit-plugin-synctex-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824967" comment="gedit-plugin-terminal-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824968" comment="gedit-plugin-textsize-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824969" comment="gedit-plugin-translate-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824970" comment="gedit-plugin-wordcompletion-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824971" comment="gedit-plugins-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824972" comment="gedit-plugins-data-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824973" comment="geoclue2-2.4.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824974" comment="geoclue2-demos-2.4.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824975" comment="geoclue2-devel-2.4.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824976" comment="geoclue2-libs-2.4.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824977" comment="geocode-glib-3.26.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824978" comment="geocode-glib-devel-3.26.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824979" comment="gjs-1.52.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824980" comment="gjs-devel-1.52.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824981" comment="gjs-tests-1.52.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824982" comment="glade-3.22.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824983" comment="glade-devel-3.22.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824984" comment="glade-libs-3.22.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824985" comment="glib-networking-2.56.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824986" comment="glib-networking-tests-2.56.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824987" comment="glib2-2.56.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824988" comment="glib2-devel-2.56.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824989" comment="glib2-doc-2.56.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824990" comment="glib2-fam-2.56.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824991" comment="glib2-static-2.56.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824992" comment="glib2-tests-2.56.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824993" comment="glibmm24-2.56.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824994" comment="glibmm24-devel-2.56.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824995" comment="glibmm24-doc-2.56.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824996" comment="gnome-backgrounds-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824997" comment="gnome-bluetooth-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824998" comment="gnome-bluetooth-libs-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824999" comment="gnome-bluetooth-libs-devel-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825000" comment="gnome-boxes-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825001" comment="gnome-calculator-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825002" comment="gnome-classic-session-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825003" comment="gnome-clocks-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825004" comment="gnome-color-manager-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825005" comment="gnome-contacts-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825006" comment="gnome-desktop3-3.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825007" comment="gnome-desktop3-devel-3.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825008" comment="gnome-desktop3-tests-3.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825009" comment="gnome-devel-docs-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825010" comment="gnome-dictionary-3.26.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825011" comment="gnome-disk-utility-3.28.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825012" comment="gnome-documents-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825013" comment="gnome-documents-libs-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825014" comment="gnome-font-viewer-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825015" comment="gnome-getting-started-docs-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825016" comment="gnome-getting-started-docs-cs-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825017" comment="gnome-getting-started-docs-de-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825018" comment="gnome-getting-started-docs-es-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825019" comment="gnome-getting-started-docs-fr-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825020" comment="gnome-getting-started-docs-gl-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825021" comment="gnome-getting-started-docs-hu-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825022" comment="gnome-getting-started-docs-it-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825023" comment="gnome-getting-started-docs-pl-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825024" comment="gnome-getting-started-docs-pt_BR-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825025" comment="gnome-getting-started-docs-ru-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825026" comment="gnome-initial-setup-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825027" comment="gnome-keyring-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825028" comment="gnome-keyring-pam-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825029" comment="gnome-online-accounts-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825030" comment="gnome-online-accounts-devel-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825031" comment="gnome-online-miners-3.26.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825032" comment="gnome-packagekit-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825033" comment="gnome-packagekit-common-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825034" comment="gnome-packagekit-installer-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825035" comment="gnome-packagekit-updater-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825036" comment="gnome-screenshot-3.26.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825037" comment="gnome-session-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825038" comment="gnome-session-custom-session-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825039" comment="gnome-session-wayland-session-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825040" comment="gnome-session-xsession-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825041" comment="gnome-settings-daemon-3.28.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825042" comment="gnome-settings-daemon-devel-3.28.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825043" comment="gnome-shell-3.28.3-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825044" comment="gnome-shell-extension-alternate-tab-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825045" comment="gnome-shell-extension-apps-menu-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825046" comment="gnome-shell-extension-auto-move-windows-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825047" comment="gnome-shell-extension-common-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825048" comment="gnome-shell-extension-dash-to-dock-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825049" comment="gnome-shell-extension-drive-menu-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825050" comment="gnome-shell-extension-launch-new-instance-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825051" comment="gnome-shell-extension-native-window-placement-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825052" comment="gnome-shell-extension-no-hot-corner-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825053" comment="gnome-shell-extension-panel-favorites-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825054" comment="gnome-shell-extension-places-menu-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825055" comment="gnome-shell-extension-screenshot-window-sizer-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825056" comment="gnome-shell-extension-systemMonitor-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825057" comment="gnome-shell-extension-top-icons-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825058" comment="gnome-shell-extension-updates-dialog-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825059" comment="gnome-shell-extension-user-theme-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825060" comment="gnome-shell-extension-window-list-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825061" comment="gnome-shell-extension-windowsNavigator-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825062" comment="gnome-shell-extension-workspace-indicator-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825063" comment="gnome-software-3.28.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825064" comment="gnome-software-devel-3.28.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825065" comment="gnome-software-editor-3.28.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825066" comment="gnome-system-monitor-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825067" comment="gnome-terminal-3.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825068" comment="gnome-terminal-nautilus-3.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825069" comment="gnome-themes-standard-3.28-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825070" comment="gnome-tweak-tool-3.28.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825071" comment="gnome-user-docs-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825072" comment="gnote-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825073" comment="gobject-introspection-1.56.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825074" comment="gobject-introspection-devel-1.56.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825075" comment="gom-0.3.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825076" comment="gom-devel-0.3.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825077" comment="google-noto-emoji-color-fonts-20180508-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825078" comment="google-noto-emoji-fonts-20180508-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825079" comment="grilo-0.3.6-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825080" comment="grilo-devel-0.3.6-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825081" comment="grilo-plugins-0.3.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825082" comment="gsettings-desktop-schemas-3.28.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825083" comment="gsettings-desktop-schemas-devel-3.28.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825084" comment="gspell-1.6.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825085" comment="gspell-devel-1.6.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825086" comment="gspell-doc-1.6.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825087" comment="gssdp-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825088" comment="gssdp-devel-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825089" comment="gssdp-docs-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825090" comment="gssdp-utils-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825091" comment="gstreamer1-plugins-base-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825092" comment="gstreamer1-plugins-base-devel-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825093" comment="gstreamer1-plugins-base-devel-docs-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825094" comment="gstreamer1-plugins-base-tools-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825095" comment="gtk-doc-1.28-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825096" comment="gtk-update-icon-cache-3.22.30-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825097" comment="gtk3-3.22.30-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825098" comment="gtk3-devel-3.22.30-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825099" comment="gtk3-devel-docs-3.22.30-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825100" comment="gtk3-immodule-xim-3.22.30-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825101" comment="gtk3-immodules-3.22.30-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825102" comment="gtk3-tests-3.22.30-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825103" comment="gtksourceview3-3.24.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825104" comment="gtksourceview3-devel-3.24.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825105" comment="gtksourceview3-tests-3.24.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825106" comment="gucharmap-10.0.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825107" comment="gucharmap-devel-10.0.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825108" comment="gucharmap-libs-10.0.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825109" comment="gupnp-1.0.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825110" comment="gupnp-devel-1.0.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825111" comment="gupnp-docs-1.0.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825112" comment="gupnp-igd-0.2.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825113" comment="gupnp-igd-devel-0.2.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825114" comment="gupnp-igd-python-0.2.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825115" comment="gvfs-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825116" comment="gvfs-afc-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825117" comment="gvfs-afp-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825118" comment="gvfs-archive-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825119" comment="gvfs-client-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825120" comment="gvfs-devel-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825121" comment="gvfs-fuse-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825122" comment="gvfs-goa-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825123" comment="gvfs-gphoto2-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825124" comment="gvfs-mtp-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825125" comment="gvfs-smb-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825126" comment="gvfs-tests-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825127" comment="harfbuzz-1.7.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825128" comment="harfbuzz-devel-1.7.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825129" comment="harfbuzz-icu-1.7.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825130" comment="json-glib-1.4.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825131" comment="json-glib-devel-1.4.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825132" comment="json-glib-tests-1.4.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825133" comment="libappstream-glib-0.7.8-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825134" comment="libappstream-glib-builder-0.7.8-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825135" comment="libappstream-glib-builder-devel-0.7.8-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825136" comment="libappstream-glib-devel-0.7.8-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825137" comment="libchamplain-0.12.16-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825138" comment="libchamplain-demos-0.12.16-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825139" comment="libchamplain-devel-0.12.16-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825140" comment="libchamplain-gtk-0.12.16-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825141" comment="libcroco-0.6.12-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825142" comment="libcroco-devel-0.6.12-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825143" comment="libgdata-0.17.9-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825144" comment="libgdata-devel-0.17.9-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825145" comment="libgee-0.20.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825146" comment="libgee-devel-0.20.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825147" comment="libgepub-0.6.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825148" comment="libgepub-devel-0.6.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825149" comment="libgexiv2-0.10.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825150" comment="libgexiv2-devel-0.10.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825151" comment="libgnomekbd-3.26.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825152" comment="libgnomekbd-devel-3.26.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825153" comment="libgovirt-0.3.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825154" comment="libgovirt-devel-0.3.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825155" comment="libgtop2-2.38.0-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825156" comment="libgtop2-devel-2.38.0-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825157" comment="libgweather-3.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825158" comment="libgweather-devel-3.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825159" comment="libgxps-0.3.0-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825160" comment="libgxps-devel-0.3.0-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825161" comment="libgxps-tools-0.3.0-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825162" comment="libical-3.0.3-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825163" comment="libical-devel-3.0.3-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825164" comment="libical-glib-3.0.3-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825165" comment="libical-glib-devel-3.0.3-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825166" comment="libical-glib-doc-3.0.3-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825167" comment="libjpeg-turbo-1.2.90-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825168" comment="libjpeg-turbo-devel-1.2.90-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825169" comment="libjpeg-turbo-static-1.2.90-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825170" comment="libjpeg-turbo-utils-1.2.90-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825171" comment="libmediaart-1.9.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825172" comment="libmediaart-devel-1.9.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825173" comment="libmediaart-tests-1.9.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825174" comment="libosinfo-1.1.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825175" comment="libosinfo-devel-1.1.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825176" comment="libosinfo-vala-1.1.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825177" comment="libpeas-1.22.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825178" comment="libpeas-devel-1.22.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825179" comment="libpeas-gtk-1.22.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825180" comment="libpeas-loader-python-1.22.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825181" comment="librsvg2-2.40.20-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825182" comment="librsvg2-devel-2.40.20-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825183" comment="librsvg2-tools-2.40.20-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825184" comment="libsecret-0.18.6-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825185" comment="libsecret-devel-0.18.6-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825186" comment="libsoup-2.62.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825187" comment="libsoup-devel-2.62.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825188" comment="libwayland-client-1.15.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825189" comment="libwayland-cursor-1.15.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825190" comment="libwayland-egl-1.15.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825191" comment="libwayland-server-1.15.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825192" comment="libwnck3-3.24.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825193" comment="libwnck3-devel-3.24.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825194" comment="mozjs52-52.9.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825195" comment="mozjs52-devel-52.9.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825196" comment="mutter-3.28.3-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825197" comment="mutter-devel-3.28.3-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825198" comment="nautilus-3.26.3.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825199" comment="nautilus-devel-3.26.3.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825200" comment="nautilus-extensions-3.26.3.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825201" comment="nautilus-sendto-3.8.6-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825202" comment="openchange-2.3-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825203" comment="openchange-client-2.3-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825204" comment="openchange-devel-2.3-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825205" comment="openchange-devel-docs-2.3-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825206" comment="osinfo-db-20180531-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825207" comment="pango-1.42.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825208" comment="pango-devel-1.42.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825209" comment="pango-tests-1.42.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825210" comment="poppler-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825211" comment="poppler-cpp-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825212" comment="poppler-cpp-devel-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825213" comment="poppler-demos-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825214" comment="poppler-devel-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825215" comment="poppler-glib-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825216" comment="poppler-glib-devel-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825217" comment="poppler-qt-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825218" comment="poppler-qt-devel-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825219" comment="poppler-utils-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825220" comment="python2-gexiv2-0.10.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825221" comment="python2-pyatspi-2.26.0-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825222" comment="rest-0.8.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825223" comment="rest-devel-0.8.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825224" comment="rhythmbox-3.4.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825225" comment="rhythmbox-devel-3.4.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825226" comment="seahorse-nautilus-3.11.92-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825227" comment="shotwell-0.28.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825228" comment="sushi-3.28.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825229" comment="totem-3.26.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825230" comment="totem-devel-3.26.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825231" comment="totem-nautilus-3.26.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825232" comment="totem-pl-parser-3.26.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825233" comment="totem-pl-parser-devel-3.26.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825234" comment="turbojpeg-1.2.90-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825235" comment="turbojpeg-devel-1.2.90-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825236" comment="upower-0.99.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825237" comment="upower-devel-0.99.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825238" comment="upower-devel-docs-0.99.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825239" comment="vala-0.40.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825240" comment="vala-devel-0.40.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825241" comment="vala-doc-0.40.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825242" comment="valadoc-0.40.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825243" comment="valadoc-devel-0.40.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825244" comment="vino-3.22.0-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825245" comment="vte-profile-0.52.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825246" comment="vte291-0.52.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825247" comment="vte291-devel-0.52.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825248" comment="wayland-devel-1.15.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825249" comment="wayland-doc-1.15.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825250" comment="wayland-protocols-devel-1.14-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825251" comment="webkitgtk4-2.20.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825252" comment="webkitgtk4-devel-2.20.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825253" comment="webkitgtk4-doc-2.20.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825254" comment="webkitgtk4-jsc-2.20.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825255" comment="webkitgtk4-jsc-devel-2.20.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825256" comment="webkitgtk4-plugin-process-gtk2-2.20.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825257" comment="xdg-desktop-portal-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825258" comment="xdg-desktop-portal-devel-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825259" comment="xdg-desktop-portal-gtk-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825260" comment="yelp-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825261" comment="yelp-devel-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825262" comment="yelp-libs-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825263" comment="yelp-tools-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825264" comment="yelp-xsl-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825265" comment="yelp-xsl-devel-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825266" comment="zenity-3.28.1-1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810772" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10772</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10772" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10772" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10772" ref_url="https://www.suse.com/security/cve/CVE-2018-10772" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:3598-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-October/025597.html" source="SUSE-SU"/>
    <description>
    The tEXtToDataBuf function in pngimage.cpp in Exiv2 through 0.26 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10772/">CVE-2018-10772 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10772">CVE-2018-10772 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1092096">SUSE bug 1092096</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826187" comment="exiv2-0.27.0-2.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826188" comment="exiv2-devel-0.27.0-2.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826189" comment="exiv2-doc-0.27.0-2.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826190" comment="exiv2-libs-0.27.0-2.el7_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810779" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10779</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10779" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10779" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10779" ref_url="https://www.suse.com/security/cve/CVE-2018-10779" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2676-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004543.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004765.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2880-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WQK3EOIOJJMBCKNIDSDHFPFLIFE7IJVC/#WQK3EOIOJJMBCKNIDSDHFPFLIFE7IJVC" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3370-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CYUUEPG22TSAWJA2E3MTYDIOYMBOGTFO/#CYUUEPG22TSAWJA2E3MTYDIOYMBOGTFO" source="SUSE-SU"/>
    <description>
    TIFFWriteScanline in tif_write.c in LibTIFF 3.8.2 has a heap-based buffer over-read, as demonstrated by bmp2tiff.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10779/">CVE-2018-10779 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10779">CVE-2018-10779 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1092480">SUSE bug 1092480</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826088" comment="libtiff-4.0.3-32.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826089" comment="libtiff-devel-4.0.3-32.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826090" comment="libtiff-static-4.0.3-32.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826091" comment="libtiff-tools-4.0.3-32.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181079" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1079</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1079" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1079" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1079" ref_url="https://www.suse.com/security/cve/CVE-2018-1079" source="SUSE CVE"/>
    <description>
    pcs before version 0.9.164 and 0.10 is vulnerable to a privilege escalation via authorized user malicious REST call. The REST interface of the pcsd service did not properly sanitize the file name from the /remote/put_file query. If the /etc/booth directory exists, an authenticated attacker with write permissions could create or overwrite arbitrary files with arbitrary data outside of the /etc/booth directory, in the context of the pcsd process.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1079/">CVE-2018-1079 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1079">CVE-2018-1079 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824163" comment="pcs-0.9.162-5.el7_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824164" comment="pcs-snmp-0.9.162-5.el7_5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181080" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1080</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1080" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1080" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1080" ref_url="https://www.suse.com/security/cve/CVE-2018-1080" source="SUSE CVE"/>
    <description>
    Dogtag PKI, through version 10.6.1, has a vulnerability in AAclAuthz.java that, under certain configurations, causes the application of ACL allow and deny rules to be reversed. If a server is configured to process allow rules before deny rules (authz.evaluateOrder=allow,deny), then allow rules will deny access and deny rules will grant access. This may result in an escalation of privileges or have other unintended consequences.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1080/">CVE-2018-1080 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1080">CVE-2018-1080 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824393" comment="pki-base-10.5.1-13.1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824394" comment="pki-base-java-10.5.1-13.1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824395" comment="pki-ca-10.5.1-13.1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824396" comment="pki-javadoc-10.5.1-13.1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824397" comment="pki-kra-10.5.1-13.1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824398" comment="pki-server-10.5.1-13.1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824399" comment="pki-symkey-10.5.1-13.1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824400" comment="pki-tools-10.5.1-13.1.el7_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810804" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10804</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10804" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10804" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10804" ref_url="https://www.suse.com/security/cve/CVE-2018-10804" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004234.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1860-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U4T535MQXEFZP3FQMGJLWASIP2YK4CR6/#U4T535MQXEFZP3FQMGJLWASIP2YK4CR6" source="SUSE-SU"/>
    <description>
    ImageMagick version 7.0.7-28 contains a memory leak in WriteTIFFImage in coders/tiff.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10804/">CVE-2018-10804 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10804">CVE-2018-10804 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1095813">SUSE bug 1095813</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827880" comment="ImageMagick-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827881" comment="ImageMagick-c++-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827882" comment="ImageMagick-c++-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827883" comment="ImageMagick-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827884" comment="ImageMagick-doc-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827885" comment="ImageMagick-perl-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827886" comment="autotrace-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827887" comment="autotrace-devel-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827888" comment="emacs-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827889" comment="emacs-common-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827890" comment="emacs-el-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827891" comment="emacs-filesystem-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827892" comment="emacs-nox-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827893" comment="emacs-terminal-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827894" comment="inkscape-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827895" comment="inkscape-docs-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827896" comment="inkscape-view-0.92.2-3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10805</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10805" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10805" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10805" ref_url="https://www.suse.com/security/cve/CVE-2018-10805" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004481.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1860-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U4T535MQXEFZP3FQMGJLWASIP2YK4CR6/#U4T535MQXEFZP3FQMGJLWASIP2YK4CR6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1862-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LKHKOB5PJWYA7NZGYIQWMCFV66FN55VK/#LKHKOB5PJWYA7NZGYIQWMCFV66FN55VK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2123-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6P52BTZ75AS657P3Z3TKTCWLBMLHKSFG/#6P52BTZ75AS657P3Z3TKTCWLBMLHKSFG" source="SUSE-SU"/>
    <description>
    ImageMagick version 7.0.7-28 contains a memory leak in ReadYCBCRImage in coders/ycbcr.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10805/">CVE-2018-10805 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10805">CVE-2018-10805 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1095812">SUSE bug 1095812</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827880" comment="ImageMagick-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827881" comment="ImageMagick-c++-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827882" comment="ImageMagick-c++-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827883" comment="ImageMagick-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827884" comment="ImageMagick-doc-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827885" comment="ImageMagick-perl-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827886" comment="autotrace-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827887" comment="autotrace-devel-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827888" comment="emacs-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827889" comment="emacs-common-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827890" comment="emacs-el-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827891" comment="emacs-filesystem-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827892" comment="emacs-nox-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827893" comment="emacs-terminal-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827894" comment="inkscape-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827895" comment="inkscape-docs-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827896" comment="inkscape-view-0.92.2-3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181083" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1083</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1083" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1083" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1083" ref_url="https://www.suse.com/security/cve/CVE-2018-1083" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1874-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010436.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1093-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GK62YTNMQ4SBUW42W4UTPSYBGUSFJAAP/#GK62YTNMQ4SBUW42W4UTPSYBGUSFJAAP" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1893-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OB6JXDU5MUN4VZ3IDSNYQUBWMMTHOMZZ/#OB6JXDU5MUN4VZ3IDSNYQUBWMMTHOMZZ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2966-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DFJC4KYTKTX2DE4QRHBI7MDML2BWODJ5/#DFJC4KYTKTX2DE4QRHBI7MDML2BWODJ5" source="SUSE-SU"/>
    <description>
    Zsh before version 5.4.2-test-1 is vulnerable to a buffer overflow in the shell autocomplete functionality. A local unprivileged user can create a specially crafted directory path which leads to code execution in the context of the user who tries to use autocomplete to traverse the before mentioned path. If the user affected is privileged, this leads to privilege escalation.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1083/">CVE-2018-1083 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1083">CVE-2018-1083 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1087026">SUSE bug 1087026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189668">SUSE bug 1189668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200209">SUSE bug 1200209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824784" comment="zsh-5.0.2-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824785" comment="zsh-html-5.0.2-31.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181084" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1084</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1084" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1084" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1084" ref_url="https://www.suse.com/security/cve/CVE-2018-1084" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003972.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XDGC7HHRO4FCXMAGV5FOELUVOVZMSQHW/#XDGC7HHRO4FCXMAGV5FOELUVOVZMSQHW" source="SUSE-SU"/>
    <description>
    corosync before version 2.4.4 is vulnerable to an integer overflow in exec/totemcrypto.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1084/">CVE-2018-1084 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1084">CVE-2018-1084 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1089346">SUSE bug 1089346</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824178" comment="corosync-2.4.3-2.el7_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824179" comment="corosync-qdevice-2.4.3-2.el7_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824180" comment="corosync-qnetd-2.4.3-2.el7_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824181" comment="corosynclib-2.4.3-2.el7_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824182" comment="corosynclib-devel-2.4.3-2.el7_5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810844" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10844</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10844" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10844" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10844" ref_url="https://www.suse.com/security/cve/CVE-2018-10844" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2825-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004620.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2854-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EW7SZ23TQUSIVG5WG54FNTONTHBQEPOK/#EW7SZ23TQUSIVG5WG54FNTONTHBQEPOK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2958-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PM2RODSJY6POW76EMB2Z566OVHYLGHMO/#PM2RODSJY6POW76EMB2Z566OVHYLGHMO" source="SUSE-SU"/>
    <description>
    It was found that the GnuTLS implementation of HMAC-SHA-256 was vulnerable to a Lucky thirteen style attack. Remote attackers could use this flaw to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data using crafted packets.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10844/">CVE-2018-10844 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10844">CVE-2018-10844 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1105437">SUSE bug 1105437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105459">SUSE bug 1105459</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824633" comment="gnutls-3.3.29-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824634" comment="gnutls-c++-3.3.29-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824635" comment="gnutls-dane-3.3.29-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824636" comment="gnutls-devel-3.3.29-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824637" comment="gnutls-utils-3.3.29-8.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810845" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10845</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10845" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10845" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10845" ref_url="https://www.suse.com/security/cve/CVE-2018-10845" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2825-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004620.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2854-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EW7SZ23TQUSIVG5WG54FNTONTHBQEPOK/#EW7SZ23TQUSIVG5WG54FNTONTHBQEPOK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2958-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PM2RODSJY6POW76EMB2Z566OVHYLGHMO/#PM2RODSJY6POW76EMB2Z566OVHYLGHMO" source="SUSE-SU"/>
    <description>
    It was found that the GnuTLS implementation of HMAC-SHA-384 was vulnerable to a Lucky thirteen style attack. Remote attackers could use this flaw to conduct distinguishing attacks and plain text recovery attacks via statistical analysis of timing data using crafted packets.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10845/">CVE-2018-10845 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10845">CVE-2018-10845 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1105437">SUSE bug 1105437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105459">SUSE bug 1105459</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824633" comment="gnutls-3.3.29-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824634" comment="gnutls-c++-3.3.29-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824635" comment="gnutls-dane-3.3.29-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824636" comment="gnutls-devel-3.3.29-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824637" comment="gnutls-utils-3.3.29-8.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810846" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10846</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10846" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10846" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10846" ref_url="https://www.suse.com/security/cve/CVE-2018-10846" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2825-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005483.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2854-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EW7SZ23TQUSIVG5WG54FNTONTHBQEPOK/#EW7SZ23TQUSIVG5WG54FNTONTHBQEPOK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2958-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PM2RODSJY6POW76EMB2Z566OVHYLGHMO/#PM2RODSJY6POW76EMB2Z566OVHYLGHMO" source="SUSE-SU"/>
    <description>
    A cache-based side channel in GnuTLS implementation that leads to plain text recovery in cross-VM attack setting was found. An attacker could use a combination of "Just in Time" Prime+probe attack in combination with Lucky-13 attack to recover plain text using crafted packets.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10846/">CVE-2018-10846 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10846">CVE-2018-10846 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1105460">SUSE bug 1105460</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824633" comment="gnutls-3.3.29-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824634" comment="gnutls-c++-3.3.29-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824635" comment="gnutls-dane-3.3.29-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824636" comment="gnutls-devel-3.3.29-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824637" comment="gnutls-utils-3.3.29-8.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810850" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10850</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10850" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10850" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10850" ref_url="https://www.suse.com/security/cve/CVE-2018-10850" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005641.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1397-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YAYQ2CHUAX2LL7XOLPLU4GKMFXDM252V/#YAYQ2CHUAX2LL7XOLPLU4GKMFXDM252V" source="SUSE-SU"/>
    <description>
    389-ds-base before versions 1.4.0.10, 1.3.8.3 is vulnerable to a race condition in the way 389-ds-base handles persistent search, resulting in a crash if the server is under load. An anonymous attacker could use this flaw to trigger a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10850/">CVE-2018-10850 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10850">CVE-2018-10850 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1096368">SUSE bug 1096368</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824576" comment="389-ds-base-1.3.7.5-28.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824577" comment="389-ds-base-devel-1.3.7.5-28.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824578" comment="389-ds-base-libs-1.3.7.5-28.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824579" comment="389-ds-base-snmp-1.3.7.5-28.el7_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810852" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10852</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10852" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10852" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10852" ref_url="https://www.suse.com/security/cve/CVE-2018-10852" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0556-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190556-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2289-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RTQC4546PXLIRWJ4OAFIUIISRQUJKFQP/#RTQC4546PXLIRWJ4OAFIUIISRQUJKFQP" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0051-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/26VADUJXE3DZHT3CQI46VXDIG54H34WZ/#26VADUJXE3DZHT3CQI46VXDIG54H34WZ" source="SUSE-SU"/>
    <description>
    The UNIX pipe which sudo uses to contact SSSD and read the available sudo rules from SSSD has too wide permissions, which means that anyone who can send a message using the same raw protocol that sudo and SSSD use can read the sudo rules available for any user. This affects versions of SSSD before 1.16.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10852/">CVE-2018-10852 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10852">CVE-2018-10852 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1098377">SUSE bug 1098377</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825271" comment="libipa_hbac-1.16.2-13.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825272" comment="libipa_hbac-devel-1.16.2-13.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825273" comment="libsss_autofs-1.16.2-13.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825274" comment="libsss_certmap-1.16.2-13.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825275" comment="libsss_certmap-devel-1.16.2-13.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825276" comment="libsss_idmap-1.16.2-13.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825277" comment="libsss_idmap-devel-1.16.2-13.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825278" comment="libsss_nss_idmap-1.16.2-13.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825279" comment="libsss_nss_idmap-devel-1.16.2-13.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825280" comment="libsss_simpleifp-1.16.2-13.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825281" comment="libsss_simpleifp-devel-1.16.2-13.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825282" comment="libsss_sudo-1.16.2-13.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825283" comment="python-libipa_hbac-1.16.2-13.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825284" comment="python-libsss_nss_idmap-1.16.2-13.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825285" comment="python-sss-1.16.2-13.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825286" comment="python-sss-murmur-1.16.2-13.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825287" comment="python-sssdconfig-1.16.2-13.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825288" comment="sssd-1.16.2-13.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825289" comment="sssd-ad-1.16.2-13.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825290" comment="sssd-client-1.16.2-13.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825291" comment="sssd-common-1.16.2-13.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825292" comment="sssd-common-pac-1.16.2-13.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825293" comment="sssd-dbus-1.16.2-13.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825294" comment="sssd-ipa-1.16.2-13.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825295" comment="sssd-kcm-1.16.2-13.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825296" comment="sssd-krb5-1.16.2-13.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825297" comment="sssd-krb5-common-1.16.2-13.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825298" comment="sssd-ldap-1.16.2-13.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825299" comment="sssd-libwbclient-1.16.2-13.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825300" comment="sssd-libwbclient-devel-1.16.2-13.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825301" comment="sssd-polkit-rules-1.16.2-13.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825302" comment="sssd-proxy-1.16.2-13.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825303" comment="sssd-tools-1.16.2-13.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825304" comment="sssd-winbind-idmap-1.16.2-13.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810853" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10853</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10853" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10853" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10853" ref_url="https://www.suse.com/security/cve/CVE-2018-10853" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2341-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004428.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2356-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2363-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2539-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004550.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2908-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2933-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005456.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2407-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6QZ6OW67VR3KFGN3MO3RPGU6G64AJTPB/#6QZ6OW67VR3KFGN3MO3RPGU6G64AJTPB" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1407-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UMXCAWC5QTZVSPZOYUW3E3GVJJUKCQ2S/#UMXCAWC5QTZVSPZOYUW3E3GVJJUKCQ2S" source="SUSE-SU"/>
    <description>
    A flaw was found in the way Linux kernel KVM hypervisor before 4.18 emulated instructions such as sgdt/sidt/fxsave/fxrstor. It did not check current privilege(CPL) level while emulating unprivileged instructions. An unprivileged guest user/process could use this flaw to potentially escalate privileges inside guest.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10853/">CVE-2018-10853 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10853">CVE-2018-10853 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1097104">SUSE bug 1097104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097108">SUSE bug 1097108</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826007" comment="bpftool-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826008" comment="kernel-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826009" comment="kernel-abi-whitelists-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826010" comment="kernel-debug-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826013" comment="kernel-doc-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826014" comment="kernel-headers-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826015" comment="kernel-tools-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826016" comment="kernel-tools-libs-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826018" comment="perf-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826019" comment="python-perf-3.10.0-1062.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810858" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10858</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10858" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10858" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10858" ref_url="https://www.suse.com/security/cve/CVE-2018-10858" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2320-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004410.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2329-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004423.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2339-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004699.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2396-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VNMX6HFMDGH5UXRVJW3DDLART5NZSEKU/#VNMX6HFMDGH5UXRVJW3DDLART5NZSEKU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2400-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7Q2J25MRHVVEQM6ECQFZF6NXUHM27TV5/#7Q2J25MRHVVEQM6ECQFZF6NXUHM27TV5" source="SUSE-SU"/>
    <description>
    A heap-buffer overflow was found in the way samba clients processed extra long filename in a directory listing. A malicious samba server could use this flaw to cause arbitrary code execution on a samba client. Samba versions before 4.6.16, 4.7.9 and 4.8.4 are vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-10858/">CVE-2018-10858 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10858">CVE-2018-10858 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1103411">SUSE bug 1103411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110943">SUSE bug 1110943</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824639" comment="ctdb-4.8.3-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824640" comment="ctdb-tests-4.8.3-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824641" comment="libsmbclient-4.8.3-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824642" comment="libsmbclient-devel-4.8.3-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824643" comment="libwbclient-4.8.3-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824644" comment="libwbclient-devel-4.8.3-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824645" comment="samba-4.8.3-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824646" comment="samba-client-4.8.3-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824647" comment="samba-client-libs-4.8.3-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824648" comment="samba-common-4.8.3-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824649" comment="samba-common-libs-4.8.3-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824650" comment="samba-common-tools-4.8.3-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824651" comment="samba-dc-4.8.3-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824652" comment="samba-dc-libs-4.8.3-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824653" comment="samba-devel-4.8.3-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824654" comment="samba-krb5-printing-4.8.3-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824655" comment="samba-libs-4.8.3-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824656" comment="samba-pidl-4.8.3-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824657" comment="samba-python-4.8.3-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824658" comment="samba-python-test-4.8.3-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824659" comment="samba-test-4.8.3-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824660" comment="samba-test-libs-4.8.3-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824661" comment="samba-vfs-glusterfs-4.8.3-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824662" comment="samba-winbind-4.8.3-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824663" comment="samba-winbind-clients-4.8.3-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824664" comment="samba-winbind-krb5-locator-4.8.3-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824665" comment="samba-winbind-modules-4.8.3-4.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181086" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1086</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1086" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1086" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1086" ref_url="https://www.suse.com/security/cve/CVE-2018-1086" source="SUSE CVE"/>
    <description>
    pcs before versions 0.9.164 and 0.10 is vulnerable to a debug parameter removal bypass. REST interface of the pcsd service did not properly remove the pcs debug argument from the /run_pcs query, possibly disclosing sensitive information. A remote attacker with a valid token could use this flaw to elevate their privilege.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1086/">CVE-2018-1086 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1086">CVE-2018-1086 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824163" comment="pcs-0.9.162-5.el7_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824164" comment="pcs-snmp-0.9.162-5.el7_5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181087" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1087</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1087" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1087" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1087" ref_url="https://www.suse.com/security/cve/CVE-2018-1087" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1173-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1523-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1636-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004180.html" source="SUSE-SU"/>
		<reference ref_id="TID000019188" ref_url="https://www.suse.com/support/kb/doc/?id=000019188" source="SUSE-SU"/>
		<reference ref_id="TID7022916" ref_url="https://www.suse.com/support/kb/doc/?id=7022916" source="SUSE-SU"/>
    <description>
    kernel KVM before versions kernel 4.16, kernel 4.16-rc7, kernel 4.17-rc1, kernel 4.17-rc2 and kernel 4.17-rc3 is vulnerable to a flaw in the way the Linux kernel's KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1087/">CVE-2018-1087 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1087">CVE-2018-1087 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1087088">SUSE bug 1087088</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824218" comment="kernel-3.10.0-862.2.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824219" comment="kernel-abi-whitelists-3.10.0-862.2.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824220" comment="kernel-debug-3.10.0-862.2.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824223" comment="kernel-doc-3.10.0-862.2.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824224" comment="kernel-headers-3.10.0-862.2.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824225" comment="kernel-tools-3.10.0-862.2.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824226" comment="kernel-tools-libs-3.10.0-862.2.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824228" comment="perf-3.10.0-862.2.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824229" comment="python-perf-3.10.0-862.2.3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810873" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10873</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10873" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10873" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10873" ref_url="https://www.suse.com/security/cve/CVE-2018-10873" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2593-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004526.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2594-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2709-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004559.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008077.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2598-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NN4TGDZ6XZE2VU5NTTD2UPNONLWDWLMK/#NN4TGDZ6XZE2VU5NTTD2UPNONLWDWLMK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2601-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JLHVRNTHG65PKJDWJUIORGTFSTNE6Z37/#JLHVRNTHG65PKJDWJUIORGTFSTNE6Z37" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2602-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SLWISO43IR4PCYBCZV4TYAOG65GRLIJX/#SLWISO43IR4PCYBCZV4TYAOG65GRLIJX" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2730-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IGRTJ3FFVE7QZSUA5INY6X2YU6DZARXJ/#IGRTJ3FFVE7QZSUA5INY6X2YU6DZARXJ" source="SUSE-SU"/>
    <description>
    A vulnerability was discovered in SPICE before version 0.14.1 where the generated code used for demarshalling messages lacked sufficient bounds checks. A malicious client or server, after authentication, could send specially crafted messages to its peer which would result in a crash or, potentially, other impacts.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10873/">CVE-2018-10873 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10873">CVE-2018-10873 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1104448">SUSE bug 1104448</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824556" comment="spice-glib-0.34-3.el7_5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824557" comment="spice-glib-devel-0.34-3.el7_5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824558" comment="spice-gtk-tools-0.34-3.el7_5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824559" comment="spice-gtk3-0.34-3.el7_5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824560" comment="spice-gtk3-devel-0.34-3.el7_5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824561" comment="spice-gtk3-vala-0.34-3.el7_5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824562" comment="spice-server-0.14.0-2.el7_5.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824563" comment="spice-server-devel-0.14.0-2.el7_5.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810878" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10878</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10878" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10878" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10878" ref_url="https://www.suse.com/security/cve/CVE-2018-10878" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2908-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004660.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2404-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DHR6QOZXXCNSV77C5MHVLBK4DBFOQPCN/#DHR6QOZXXCNSV77C5MHVLBK4DBFOQPCN" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2407-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6QZ6OW67VR3KFGN3MO3RPGU6G64AJTPB/#6QZ6OW67VR3KFGN3MO3RPGU6G64AJTPB" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause an out-of-bounds write and a denial of service or unspecified other impact is possible by mounting and operating a crafted ext4 filesystem image.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10878/">CVE-2018-10878 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10878">CVE-2018-10878 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099813">SUSE bug 1099813</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824786" comment="bpftool-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824787" comment="kernel-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824788" comment="kernel-abi-whitelists-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824789" comment="kernel-debug-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824792" comment="kernel-doc-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824793" comment="kernel-headers-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824794" comment="kernel-tools-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824795" comment="kernel-tools-libs-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824797" comment="perf-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824798" comment="python-perf-3.10.0-957.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810879" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10879</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10879" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10879" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10879" ref_url="https://www.suse.com/security/cve/CVE-2018-10879" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2908-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004660.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2404-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DHR6QOZXXCNSV77C5MHVLBK4DBFOQPCN/#DHR6QOZXXCNSV77C5MHVLBK4DBFOQPCN" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2407-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6QZ6OW67VR3KFGN3MO3RPGU6G64AJTPB/#6QZ6OW67VR3KFGN3MO3RPGU6G64AJTPB" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause a use-after-free in ext4_xattr_set_entry function and a denial of service or unspecified other impact may occur by renaming a file in a crafted ext4 filesystem image.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10879/">CVE-2018-10879 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10879">CVE-2018-10879 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099844">SUSE bug 1099844</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824786" comment="bpftool-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824787" comment="kernel-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824788" comment="kernel-abi-whitelists-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824789" comment="kernel-debug-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824792" comment="kernel-doc-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824793" comment="kernel-headers-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824794" comment="kernel-tools-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824795" comment="kernel-tools-libs-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824797" comment="perf-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824798" comment="python-perf-3.10.0-957.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810881" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10881</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10881" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10881" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10881" ref_url="https://www.suse.com/security/cve/CVE-2018-10881" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2908-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004660.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2404-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DHR6QOZXXCNSV77C5MHVLBK4DBFOQPCN/#DHR6QOZXXCNSV77C5MHVLBK4DBFOQPCN" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2407-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6QZ6OW67VR3KFGN3MO3RPGU6G64AJTPB/#6QZ6OW67VR3KFGN3MO3RPGU6G64AJTPB" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause an out-of-bound access in ext4_get_group_info function, a denial of service, and a system crash by mounting and operating on a crafted ext4 filesystem image.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10881/">CVE-2018-10881 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10881">CVE-2018-10881 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099864">SUSE bug 1099864</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824786" comment="bpftool-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824787" comment="kernel-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824788" comment="kernel-abi-whitelists-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824789" comment="kernel-debug-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824792" comment="kernel-doc-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824793" comment="kernel-headers-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824794" comment="kernel-tools-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824795" comment="kernel-tools-libs-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824797" comment="perf-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824798" comment="python-perf-3.10.0-957.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810883" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10883</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10883" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10883" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10883" ref_url="https://www.suse.com/security/cve/CVE-2018-10883" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2908-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004660.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2404-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DHR6QOZXXCNSV77C5MHVLBK4DBFOQPCN/#DHR6QOZXXCNSV77C5MHVLBK4DBFOQPCN" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2407-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6QZ6OW67VR3KFGN3MO3RPGU6G64AJTPB/#6QZ6OW67VR3KFGN3MO3RPGU6G64AJTPB" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause an out-of-bounds write in jbd2_journal_dirty_metadata(), a denial of service, and a system crash by mounting and operating on a crafted ext4 filesystem image.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10883/">CVE-2018-10883 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10883">CVE-2018-10883 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099863">SUSE bug 1099863</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824786" comment="bpftool-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824787" comment="kernel-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824788" comment="kernel-abi-whitelists-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824789" comment="kernel-debug-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824792" comment="kernel-doc-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824793" comment="kernel-headers-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824794" comment="kernel-tools-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824795" comment="kernel-tools-libs-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824797" comment="perf-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824798" comment="python-perf-3.10.0-957.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181089" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1089</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1089" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1089" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1089" ref_url="https://www.suse.com/security/cve/CVE-2018-1089" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005817.html" source="SUSE-SU"/>
    <description>
    389-ds-base before versions 1.4.0.9, 1.3.8.1, 1.3.6.15 did not properly handle long search filters with characters needing escapes, possibly leading to buffer overflows. A remote, unauthenticated attacker could potentially use this flaw to make ns-slapd crash via a specially crafted LDAP request, thus resulting in denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1089/">CVE-2018-1089 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1089">CVE-2018-1089 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1092187">SUSE bug 1092187</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824230" comment="389-ds-base-1.3.7.5-21.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824231" comment="389-ds-base-devel-1.3.7.5-21.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824232" comment="389-ds-base-libs-1.3.7.5-21.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824233" comment="389-ds-base-snmp-1.3.7.5-21.el7_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810893" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10893</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10893" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10893" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10893" ref_url="https://www.suse.com/security/cve/CVE-2018-10893" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2593-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004526.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2594-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2709-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004559.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008077.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2598-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NN4TGDZ6XZE2VU5NTTD2UPNONLWDWLMK/#NN4TGDZ6XZE2VU5NTTD2UPNONLWDWLMK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2601-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JLHVRNTHG65PKJDWJUIORGTFSTNE6Z37/#JLHVRNTHG65PKJDWJUIORGTFSTNE6Z37" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2602-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SLWISO43IR4PCYBCZV4TYAOG65GRLIJX/#SLWISO43IR4PCYBCZV4TYAOG65GRLIJX" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2730-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IGRTJ3FFVE7QZSUA5INY6X2YU6DZARXJ/#IGRTJ3FFVE7QZSUA5INY6X2YU6DZARXJ" source="SUSE-SU"/>
    <description>
    Multiple integer overflow and buffer overflow issues were discovered in spice-client's handling of LZ compressed frames. A malicious server could cause the client to crash or, potentially, execute arbitrary code.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2018-10893/">CVE-2018-10893 at SUSE</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10893">CVE-2018-10893 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1101295">SUSE bug 1101295</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826480" comment="libgovirt-0.3.4-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826481" comment="libgovirt-devel-0.3.4-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826482" comment="spice-glib-0.35-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826483" comment="spice-glib-devel-0.35-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826484" comment="spice-gtk-tools-0.35-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826485" comment="spice-gtk3-0.35-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826486" comment="spice-gtk3-devel-0.35-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826487" comment="spice-gtk3-vala-0.35-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826488" comment="spice-vdagent-0.14.0-18.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826489" comment="virt-viewer-5.0-15.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810896" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10896</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10896" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10896" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10896" ref_url="https://www.suse.com/security/cve/CVE-2018-10896" source="SUSE CVE"/>
    <description>
    The default cloud-init configuration, in cloud-init 0.6.2 and newer, included "ssh_deletekeys: 0", disabling cloud-init's deletion of ssh host keys. In some environments, this could lead to instances created by cloning a golden master or template system, sharing ssh host keys, and being able to impersonate one another or conduct man-in-the-middle attacks.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-10896/">CVE-2018-10896 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10896">CVE-2018-10896 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828253" comment="cloud-init-19.4-7.el7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810897" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10897</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10897" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10897" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10897" ref_url="https://www.suse.com/security/cve/CVE-2018-10897" source="SUSE CVE"/>
    <description>
    A directory traversal issue was found in reposync, a part of yum-utils, where reposync fails to sanitize paths in remote repository configuration files. If an attacker controls a repository, they may be able to copy files outside of the destination directory on the targeted system via path traversal. If reposync is running with heightened privileges on a targeted system, this flaw could potentially result in system compromise via the overwriting of critical system files. Version 1.1.31 and older are believed to be affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10897/">CVE-2018-10897 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10897">CVE-2018-10897 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1100972">SUSE bug 1100972</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824469" comment="yum-NetworkManager-dispatcher-1.1.31-46.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824470" comment="yum-plugin-aliases-1.1.31-46.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824471" comment="yum-plugin-auto-update-debug-info-1.1.31-46.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824472" comment="yum-plugin-changelog-1.1.31-46.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824473" comment="yum-plugin-copr-1.1.31-46.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824474" comment="yum-plugin-fastestmirror-1.1.31-46.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824475" comment="yum-plugin-filter-data-1.1.31-46.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824476" comment="yum-plugin-fs-snapshot-1.1.31-46.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824477" comment="yum-plugin-keys-1.1.31-46.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824478" comment="yum-plugin-list-data-1.1.31-46.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824479" comment="yum-plugin-local-1.1.31-46.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824480" comment="yum-plugin-merge-conf-1.1.31-46.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824481" comment="yum-plugin-ovl-1.1.31-46.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824482" comment="yum-plugin-post-transaction-actions-1.1.31-46.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824483" comment="yum-plugin-pre-transaction-actions-1.1.31-46.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824484" comment="yum-plugin-priorities-1.1.31-46.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824485" comment="yum-plugin-protectbase-1.1.31-46.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824486" comment="yum-plugin-ps-1.1.31-46.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824487" comment="yum-plugin-remove-with-leaves-1.1.31-46.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824488" comment="yum-plugin-rpm-warm-cache-1.1.31-46.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824489" comment="yum-plugin-show-leaves-1.1.31-46.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824490" comment="yum-plugin-tmprepo-1.1.31-46.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824491" comment="yum-plugin-tsflags-1.1.31-46.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824492" comment="yum-plugin-upgrade-helper-1.1.31-46.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824493" comment="yum-plugin-verify-1.1.31-46.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824494" comment="yum-plugin-versionlock-1.1.31-46.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824495" comment="yum-updateonboot-1.1.31-46.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824496" comment="yum-utils-1.1.31-46.el7_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810902" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10902</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10902" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10902" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10902" ref_url="https://www.suse.com/security/cve/CVE-2018-10902" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2539-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2908-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004628.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004629.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2962-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20182962-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2963-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20182963-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008323.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2738-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DX32XKZSPY6HCHEGEFNDB2BQLAVU6T6E/#DX32XKZSPY6HCHEGEFNDB2BQLAVU6T6E" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3071-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6GTFT5RXJ7J2RAR6KEKOT74XNNP3FJVH/#6GTFT5RXJ7J2RAR6KEKOT74XNNP3FJVH" source="SUSE-SU"/>
    <description>
    It was found that the raw midi kernel driver does not protect against concurrent access which leads to a double realloc (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status() which are part of snd_rawmidi_ioctl() handler in rawmidi.c file. A malicious local attacker could possibly use this for privilege escalation.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10902/">CVE-2018-10902 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10902">CVE-2018-10902 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1105322">SUSE bug 1105322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105323">SUSE bug 1105323</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824786" comment="bpftool-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824787" comment="kernel-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824788" comment="kernel-abi-whitelists-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824789" comment="kernel-debug-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824792" comment="kernel-doc-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824793" comment="kernel-headers-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824794" comment="kernel-tools-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824795" comment="kernel-tools-libs-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824797" comment="perf-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824798" comment="python-perf-3.10.0-957.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810906" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10906</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10906" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10906" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10906" ref_url="https://www.suse.com/security/cve/CVE-2018-10906" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005097.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3325-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CV4QA4RIYV6SXL7NQV4IVAQEAXHGGGBK/#CV4QA4RIYV6SXL7NQV4IVAQEAXHGGGBK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3326-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EEMSCCDMFN6MQD6URFAAISE43AMO4MMU/#EEMSCCDMFN6MQD6URFAAISE43AMO4MMU" source="SUSE-SU"/>
    <description>
    In fuse before versions 2.9.8 and 3.x before 3.2.5, fusermount is vulnerable to a restriction bypass when SELinux is active. This allows non-root users to mount a FUSE file system with the 'allow_other' mount option regardless of whether 'user_allow_other' is set in the fuse configuration. An attacker may use this flaw to mount a FUSE file system, accessible by other users, and trick them into accessing files on that file system, possibly causing Denial of Service or other unspecified effects.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-10906/">CVE-2018-10906 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10906">CVE-2018-10906 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1101797">SUSE bug 1101797</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127346">SUSE bug 1127346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127350">SUSE bug 1127350</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825330" comment="fuse-2.9.2-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825331" comment="fuse-devel-2.9.2-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825332" comment="fuse-libs-2.9.2-11.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181091" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1091</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1091" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1091" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1091" ref_url="https://www.suse.com/security/cve/CVE-2018-1091" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005474.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0972-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GBNXEAMDIJUJNM3SGWQXJLMMRXTV5O25/#GBNXEAMDIJUJNM3SGWQXJLMMRXTV5O25" source="SUSE-SU"/>
    <description>
    In the flush_tmregs_to_thread function in arch/powerpc/kernel/ptrace.c in the Linux kernel before 4.13.5, a guest kernel crash can be triggered from unprivileged userspace during a core dump on a POWER host due to a missing processor feature check and an erroneous use of transactional memory (TM) instructions in the core dump path, leading to a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-07"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1091/">CVE-2018-1091 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1091">CVE-2018-1091 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1087231">SUSE bug 1087231</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824218" comment="kernel-3.10.0-862.2.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824219" comment="kernel-abi-whitelists-3.10.0-862.2.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824220" comment="kernel-debug-3.10.0-862.2.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824223" comment="kernel-doc-3.10.0-862.2.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824224" comment="kernel-headers-3.10.0-862.2.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824225" comment="kernel-tools-3.10.0-862.2.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824226" comment="kernel-tools-libs-3.10.0-862.2.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824228" comment="perf-3.10.0-862.2.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824229" comment="python-perf-3.10.0-862.2.3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810910" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10910</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10910" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10910" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10910" ref_url="https://www.suse.com/security/cve/CVE-2018-10910" source="SUSE CVE"/>
    <description>
    A bug in Bluez may allow for the Bluetooth Discoverable state being set to on when no Bluetooth agent is registered with the system. This situation could lead to the unauthorized pairing of certain Bluetooth devices without any form of authentication. Versions before bluez 5.51 are vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10910/">CVE-2018-10910 at SUSE</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10910">CVE-2018-10910 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1102238">SUSE bug 1102238</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827760" comment="bluez-5.44-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827761" comment="bluez-cups-5.44-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827762" comment="bluez-hid2hci-5.44-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827763" comment="bluez-libs-5.44-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827764" comment="bluez-libs-devel-5.44-6.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810911" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10911</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10911" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10911" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10911" ref_url="https://www.suse.com/security/cve/CVE-2018-10911" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0079-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RYXEJNKIYS5SFNFG2L23KRFS2ESTUJVD/" source="SUSE-SU"/>
    <description>
    A flaw was found in the way dic_unserialize function of glusterfs does not handle negative key length values. An attacker could use this flaw to read memory from other locations into the stored dict value.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10911/">CVE-2018-10911 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10911">CVE-2018-10911 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1105776">SUSE bug 1105776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107020">SUSE bug 1107020</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825313" comment="glusterfs-3.12.2-18.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825314" comment="glusterfs-api-3.12.2-18.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825315" comment="glusterfs-api-devel-3.12.2-18.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825316" comment="glusterfs-cli-3.12.2-18.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825317" comment="glusterfs-client-xlators-3.12.2-18.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825318" comment="glusterfs-devel-3.12.2-18.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825319" comment="glusterfs-fuse-3.12.2-18.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825320" comment="glusterfs-libs-3.12.2-18.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825321" comment="glusterfs-rdma-3.12.2-18.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825322" comment="python2-gluster-3.12.2-18.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810915" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10915</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10915" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10915" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10915" ref_url="https://www.suse.com/security/cve/CVE-2018-10915" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004778.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004887.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2599-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FMUSF5EIYQG4R4YEQJKAIWCIYE5OMWOA/#FMUSF5EIYQG4R4YEQJKAIWCIYE5OMWOA" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3449-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TW5LDOJKYF6FOXQZXQHBYYML4OA6VZ55/#TW5LDOJKYF6FOXQZXQHBYYML4OA6VZ55" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4007-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HHGWR7F6EZXI76G5U6HBD6NLQWO4CCLH/#HHGWR7F6EZXI76G5U6HBD6NLQWO4CCLH" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1227-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RPLLEO7T4JPO4J5JMG2O4ZTONMNDEL64/" source="SUSE-SU"/>
    <description>
    A vulnerability was found in libpq, the default PostgreSQL client library where libpq failed to properly reset its internal state between connections. If an affected version of libpq was used with "host" or "hostaddr" connection parameters from untrusted input, attackers could bypass client-side connection security features, obtain access to higher privileged connections or potentially cause other impact through SQL injection, by causing the PQescape() functions to malfunction. Postgresql versions before 10.5, 9.6.10, 9.5.14, 9.4.19, and 9.3.24 are affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10915/">CVE-2018-10915 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10915">CVE-2018-10915 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1104199">SUSE bug 1104199</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140876">SUSE bug 1140876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185814">SUSE bug 1185814</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824529" comment="postgresql-9.2.24-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824530" comment="postgresql-contrib-9.2.24-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824531" comment="postgresql-devel-9.2.24-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824532" comment="postgresql-docs-9.2.24-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824533" comment="postgresql-libs-9.2.24-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824534" comment="postgresql-plperl-9.2.24-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824535" comment="postgresql-plpython-9.2.24-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824536" comment="postgresql-pltcl-9.2.24-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824537" comment="postgresql-server-9.2.24-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824538" comment="postgresql-static-9.2.24-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824539" comment="postgresql-test-9.2.24-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824540" comment="postgresql-upgrade-9.2.24-1.el7_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810916" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10916</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10916" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10916" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10916" ref_url="https://www.suse.com/security/cve/CVE-2018-10916" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0642-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190642-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0643-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190643-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/F5FJ7FPTQKOW7OZUV3B6327DJFZ5BZUT/#F5FJ7FPTQKOW7OZUV3B6327DJFZ5BZUT" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZZFM7KI5WN2TTJGW46TEIEVSEIISQ7N3/#ZZFM7KI5WN2TTJGW46TEIEVSEIISQ7N3" source="SUSE-SU"/>
    <description>
    It has been discovered that lftp up to and including version 4.8.3 does not properly sanitize remote file names, leading to a loss of integrity on the local system when reverse mirroring is used. A remote attacker may trick a user to use reverse mirroring on an attacker controlled FTP server, resulting in the removal of all files in the current working directory of the victim's system.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-10916/">CVE-2018-10916 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10916">CVE-2018-10916 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1103367">SUSE bug 1103367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827641" comment="lftp-4.4.8-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827642" comment="lftp-scripts-4.4.8-12.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181092" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1092</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1092" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1092" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1092" ref_url="https://www.suse.com/security/cve/CVE-2018-1092" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1855-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004334.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1773-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ID6PAFCJG4KPF2AULGBYPBQUFIOCIVYC/#ID6PAFCJG4KPF2AULGBYPBQUFIOCIVYC" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2119-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WKPTBMLW6CO7OGF3LPNC4LMQ2SS7VXKC/#WKPTBMLW6CO7OGF3LPNC4LMQ2SS7VXKC" source="SUSE-SU"/>
    <description>
    The ext4_iget function in fs/ext4/inode.c in the Linux kernel through 4.15.15 mishandles the case of a root directory with a zero i_links_count, which allows attackers to cause a denial of service (ext4_process_freed_data NULL pointer dereference and OOPS) via a crafted ext4 image.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1092/">CVE-2018-1092 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1092">CVE-2018-1092 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1087012">SUSE bug 1087012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824786" comment="bpftool-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824787" comment="kernel-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824788" comment="kernel-abi-whitelists-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824789" comment="kernel-debug-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824792" comment="kernel-doc-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824793" comment="kernel-headers-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824794" comment="kernel-tools-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824795" comment="kernel-tools-libs-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824797" comment="perf-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824798" comment="python-perf-3.10.0-957.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810935" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10935</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10935" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10935" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10935" ref_url="https://www.suse.com/security/cve/CVE-2018-10935" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005641.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005817.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1397-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YAYQ2CHUAX2LL7XOLPLU4GKMFXDM252V/#YAYQ2CHUAX2LL7XOLPLU4GKMFXDM252V" source="SUSE-SU"/>
    <description>
    A flaw was found in the 389 Directory Server that allows users to cause a crash in the LDAP server using ldapsearch with server side sort.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10935/">CVE-2018-10935 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10935">CVE-2018-10935 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1105606">SUSE bug 1105606</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824576" comment="389-ds-base-1.3.7.5-28.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824577" comment="389-ds-base-devel-1.3.7.5-28.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824578" comment="389-ds-base-libs-1.3.7.5-28.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824579" comment="389-ds-base-snmp-1.3.7.5-28.el7_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181094" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1094</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1094" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1094" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1094" ref_url="https://www.suse.com/security/cve/CVE-2018-1094" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1855-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004334.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1773-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ID6PAFCJG4KPF2AULGBYPBQUFIOCIVYC/#ID6PAFCJG4KPF2AULGBYPBQUFIOCIVYC" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2119-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WKPTBMLW6CO7OGF3LPNC4LMQ2SS7VXKC/#WKPTBMLW6CO7OGF3LPNC4LMQ2SS7VXKC" source="SUSE-SU"/>
    <description>
    The ext4_fill_super function in fs/ext4/super.c in the Linux kernel through 4.15.15 does not always initialize the crc32c checksum driver, which allows attackers to cause a denial of service (ext4_xattr_inode_hash NULL pointer dereference and system crash) via a crafted ext4 image.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1094/">CVE-2018-1094 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1094">CVE-2018-1094 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1087007">SUSE bug 1087007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824786" comment="bpftool-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824787" comment="kernel-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824788" comment="kernel-abi-whitelists-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824789" comment="kernel-debug-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824792" comment="kernel-doc-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824793" comment="kernel-headers-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824794" comment="kernel-tools-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824795" comment="kernel-tools-libs-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824797" comment="perf-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824798" comment="python-perf-3.10.0-957.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810940" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10940</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10940" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10940" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10940" ref_url="https://www.suse.com/security/cve/CVE-2018-10940" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2908-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2980-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2981-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2738-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DX32XKZSPY6HCHEGEFNDB2BQLAVU6T6E/#DX32XKZSPY6HCHEGEFNDB2BQLAVU6T6E" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3071-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6GTFT5RXJ7J2RAR6KEKOT74XNNP3FJVH/#6GTFT5RXJ7J2RAR6KEKOT74XNNP3FJVH" source="SUSE-SU"/>
    <description>
    The cdrom_ioctl_media_changed function in drivers/cdrom/cdrom.c in the Linux kernel before 4.16.6 allows local attackers to use a incorrect bounds check in the CDROM driver CDROM_MEDIA_CHANGED ioctl to read out kernel memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10940/">CVE-2018-10940 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10940">CVE-2018-10940 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092903">SUSE bug 1092903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107689">SUSE bug 1107689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113751">SUSE bug 1113751</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824786" comment="bpftool-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824787" comment="kernel-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824788" comment="kernel-abi-whitelists-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824789" comment="kernel-debug-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824792" comment="kernel-doc-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824793" comment="kernel-headers-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824794" comment="kernel-tools-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824795" comment="kernel-tools-libs-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824797" comment="perf-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824798" comment="python-perf-3.10.0-957.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810958" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10958</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10958" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10958" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10958" ref_url="https://www.suse.com/security/cve/CVE-2018-10958" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3882-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004960.html" source="SUSE-SU"/>
    <description>
    In types.cpp in Exiv2 0.26, a large size value may lead to a SIGABRT during an attempt at memory allocation for an Exiv2::Internal::PngChunk::zlibUncompress call.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10958/">CVE-2018-10958 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10958">CVE-2018-10958 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1092952">SUSE bug 1092952</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826187" comment="exiv2-0.27.0-2.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826188" comment="exiv2-devel-0.27.0-2.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826189" comment="exiv2-doc-0.27.0-2.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826190" comment="exiv2-libs-0.27.0-2.el7_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810963" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10963</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10963" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10963" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10963" ref_url="https://www.suse.com/security/cve/CVE-2018-10963" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004247.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1834-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/35GXTTHY6R26WIDWDJILDL4B3SUNHWM4/#35GXTTHY6R26WIDWDJILDL4B3SUNHWM4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1956-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CTUJZNZSO5HMXSWVLJFQFQYC3N3ZFG6U/#CTUJZNZSO5HMXSWVLJFQFQYC3N3ZFG6U" source="SUSE-SU"/>
    <description>
    The TIFFWriteDirectorySec() function in tif_dirwrite.c in LibTIFF through 4.0.9 allows remote attackers to cause a denial of service (assertion failure and application crash) via a crafted file, a different vulnerability than CVE-2017-13726.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-10963/">CVE-2018-10963 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10963">CVE-2018-10963 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1092949">SUSE bug 1092949</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826088" comment="libtiff-4.0.3-32.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826089" comment="libtiff-devel-4.0.3-32.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826090" comment="libtiff-static-4.0.3-32.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826091" comment="libtiff-tools-4.0.3-32.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810998" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10998</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10998" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10998" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10998" ref_url="https://www.suse.com/security/cve/CVE-2018-10998" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3882-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004960.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Exiv2 0.26. readMetadata in jp2image.cpp allows remote attackers to cause a denial of service (SIGABRT) by triggering an incorrect Safe::add call.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-10998/">CVE-2018-10998 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10998">CVE-2018-10998 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1093095">SUSE bug 1093095</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826187" comment="exiv2-0.27.0-2.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826188" comment="exiv2-devel-0.27.0-2.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826189" comment="exiv2-doc-0.27.0-2.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826190" comment="exiv2-libs-0.27.0-2.el7_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181100" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1100</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1100" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1100" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1100" ref_url="https://www.suse.com/security/cve/CVE-2018-1100" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1874-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010368.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1893-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OB6JXDU5MUN4VZ3IDSNYQUBWMMTHOMZZ/#OB6JXDU5MUN4VZ3IDSNYQUBWMMTHOMZZ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2966-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DFJC4KYTKTX2DE4QRHBI7MDML2BWODJ5/#DFJC4KYTKTX2DE4QRHBI7MDML2BWODJ5" source="SUSE-SU"/>
    <description>
    zsh through version 5.4.2 is vulnerable to a stack-based buffer overflow in the utils.c:checkmailpath function. A local attacker could exploit this to execute arbitrary code in the context of another user.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1100/">CVE-2018-1100 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1100">CVE-2018-1100 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1089030">SUSE bug 1089030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189668">SUSE bug 1189668</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824784" comment="zsh-5.0.2-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824785" comment="zsh-html-5.0.2-31.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811037" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11037</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-11037" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11037" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-11037" ref_url="https://www.suse.com/security/cve/CVE-2018-11037" source="SUSE CVE"/>
    <description>
    In Exiv2 0.26, the Exiv2::PngImage::printStructure function in pngimage.cpp allows remote attackers to cause an information leak via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-11037/">CVE-2018-11037 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11037">CVE-2018-11037 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1093475">SUSE bug 1093475</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826187" comment="exiv2-0.27.0-2.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826188" comment="exiv2-devel-0.27.0-2.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826189" comment="exiv2-doc-0.27.0-2.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826190" comment="exiv2-libs-0.27.0-2.el7_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181106" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1106</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1106" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1106" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1106" ref_url="https://www.suse.com/security/cve/CVE-2018-1106" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003953.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1049-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7EI7O6GXQHKMSNZNTOZVFR67R7HUQILL/#7EI7O6GXQHKMSNZNTOZVFR67R7HUQILL" source="SUSE-SU"/>
    <description>
    An authentication bypass flaw has been found in PackageKit before 1.1.10 that allows users without administrator privileges to install signed packages. A local attacker can use this vulnerability to install vulnerable packages to further compromise a system.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1106/">CVE-2018-1106 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1106">CVE-2018-1106 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1086936">SUSE bug 1086936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123722">SUSE bug 1123722</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824202" comment="PackageKit-1.1.5-2.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824203" comment="PackageKit-command-not-found-1.1.5-2.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824204" comment="PackageKit-cron-1.1.5-2.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824205" comment="PackageKit-glib-1.1.5-2.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824206" comment="PackageKit-glib-devel-1.1.5-2.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824207" comment="PackageKit-gstreamer-plugin-1.1.5-2.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824208" comment="PackageKit-gtk3-module-1.1.5-2.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824209" comment="PackageKit-yum-1.1.5-2.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824210" comment="PackageKit-yum-plugin-1.1.5-2.el7_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181111" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1111</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1111" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1111" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1111" ref_url="https://www.suse.com/security/cve/CVE-2018-1111" source="SUSE CVE"/>
    <description>
    DHCP packages in Red Hat Enterprise Linux 6 and 7, Fedora 28, and earlier are vulnerable to a command injection flaw in the NetworkManager integration script included in the DHCP client. A malicious DHCP server, or an attacker on the local network able to spoof DHCP responses, could use this flaw to execute arbitrary commands with root privileges on systems using NetworkManager and configured to obtain network configuration using the DHCP protocol.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1111/">CVE-2018-1111 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1111">CVE-2018-1111 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1093364">SUSE bug 1093364</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824269" comment="dhclient-4.2.5-68.el7_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824270" comment="dhcp-4.2.5-68.el7_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824271" comment="dhcp-common-4.2.5-68.el7_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824272" comment="dhcp-devel-4.2.5-68.el7_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824273" comment="dhcp-libs-4.2.5-68.el7_5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181113" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1113</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1113" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1113" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1113" ref_url="https://www.suse.com/security/cve/CVE-2018-1113" source="SUSE CVE"/>
    <description>
    setup before version 2.11.4-1.fc28 in Fedora and Red Hat Enterprise Linux added /sbin/nologin and /usr/sbin/nologin to /etc/shells. This violates security assumptions made by pam_shells and some daemons which allow access based on a user's shell being listed in /etc/shells. Under some circumstances, users which had their shell changed to /sbin/nologin could still access the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1113/">CVE-2018-1113 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1113">CVE-2018-1113 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825325" comment="setup-2.8.71-10.el7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181116" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1116</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1116" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1116" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1116" ref_url="https://www.suse.com/security/cve/CVE-2018-1116" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004366.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2021-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NKRVL4VCE46UQRET33VY55MQRRKZBR6P/#NKRVL4VCE46UQRET33VY55MQRRKZBR6P" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2284-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMM2JDBUU52UWSZTR6XQXTVNT2QEJ7CH/#GMM2JDBUU52UWSZTR6XQXTVNT2QEJ7CH" source="SUSE-SU"/>
    <description>
    A flaw was found in polkit before version 0.116. The implementation of the polkit_backend_interactive_authority_check_authorization function in polkitd allows to test for authentication and trigger authentication of unrelated processes owned by other users. This may result in a local DoS and information disclosure.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1116/">CVE-2018-1116 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1116">CVE-2018-1116 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1099031">SUSE bug 1099031</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827819" comment="polkit-0.112-26.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827820" comment="polkit-devel-0.112-26.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827821" comment="polkit-docs-0.112-26.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181118" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1118</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1118" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1118" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1118" ref_url="https://www.suse.com/security/cve/CVE-2018-1118" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004377.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2119-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WKPTBMLW6CO7OGF3LPNC4LMQ2SS7VXKC/#WKPTBMLW6CO7OGF3LPNC4LMQ2SS7VXKC" source="SUSE-SU"/>
    <description>
    Linux kernel vhost since version 4.8 does not properly initialize memory in messages passed between virtual guests and the host operating system in the vhost/vhost.c:vhost_new_msg() function. This can allow local privileged users to read some kernel memory contents when reading from the /dev/vhost-net device file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-1118/">CVE-2018-1118 at SUSE</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1118">CVE-2018-1118 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092472">SUSE bug 1092472</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824786" comment="bpftool-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824787" comment="kernel-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824788" comment="kernel-abi-whitelists-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824789" comment="kernel-debug-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824792" comment="kernel-doc-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824793" comment="kernel-headers-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824794" comment="kernel-tools-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824795" comment="kernel-tools-libs-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824797" comment="perf-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824798" comment="python-perf-3.10.0-957.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181120" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1120</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1120" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1120" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1120" ref_url="https://www.suse.com/security/cve/CVE-2018-1120" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005474.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2119-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WKPTBMLW6CO7OGF3LPNC4LMQ2SS7VXKC/#WKPTBMLW6CO7OGF3LPNC4LMQ2SS7VXKC" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0140-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YC36SIOXVJQS57WNCR7J2V2OWLPWEMTW/#YC36SIOXVJQS57WNCR7J2V2OWLPWEMTW" source="SUSE-SU"/>
    <description>
    A flaw was found affecting the Linux kernel before version 4.17. By mmap()ing a FUSE-backed file onto a process's memory containing command line arguments (or environment strings), an attacker can cause utilities from psutils or procps (such as ps, w) or any other program which makes a read() call to the /proc/&lt;pid&gt;/cmdline (or /proc/&lt;pid&gt;/environ) files to block indefinitely (denial of service) or for some controlled time (as a synchronization primitive for other attacks).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1120/">CVE-2018-1120 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1120">CVE-2018-1120 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092100">SUSE bug 1092100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093158">SUSE bug 1093158</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824786" comment="bpftool-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824787" comment="kernel-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824788" comment="kernel-abi-whitelists-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824789" comment="kernel-debug-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824792" comment="kernel-doc-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824793" comment="kernel-headers-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824794" comment="kernel-tools-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824795" comment="kernel-tools-libs-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824797" comment="perf-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824798" comment="python-perf-3.10.0-957.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811212" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11212</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-11212" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11212" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-11212" ref_url="https://www.suse.com/security/cve/CVE-2018-11212" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0585-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190585-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13978-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2291-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192291-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2371-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192371-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0161-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ORCDRSEWQ6BJYEU2ZLJO4T4GEPU43V5Y/#ORCDRSEWQ6BJYEU2ZLJO4T4GEPU43V5Y" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0346-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FDKUXCDPLO7SR6NRODPJR2SF7OTNKJWB/#FDKUXCDPLO7SR6NRODPJR2SF7OTNKJWB" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1439-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SRTWOMLHK3HQNCIFSWBLQE7M6MCMULOE/#SRTWOMLHK3HQNCIFSWBLQE7M6MCMULOE" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FB3JSJFJ65CTYO56ZD763FBI6DRQHHVR/#FB3JSJFJ65CTYO56ZD763FBI6DRQHHVR" source="SUSE-SU"/>
    <description>
    An issue was discovered in libjpeg 9a and 9d. The alloc_sarray function in jmemmgr.c allows remote attackers to cause a denial of service (divide-by-zero error) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11212/">CVE-2018-11212 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11212">CVE-2018-11212 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1122299">SUSE bug 1122299</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826082" comment="libjpeg-turbo-1.2.90-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826083" comment="libjpeg-turbo-devel-1.2.90-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826084" comment="libjpeg-turbo-static-1.2.90-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826085" comment="libjpeg-turbo-utils-1.2.90-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826086" comment="turbojpeg-1.2.90-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826087" comment="turbojpeg-devel-1.2.90-8.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811213" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11213</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-11213" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11213" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-11213" ref_url="https://www.suse.com/security/cve/CVE-2018-11213" source="SUSE CVE"/>
    <description>
    An issue was discovered in libjpeg 9a. The get_text_gray_row function in rdppm.c allows remote attackers to cause a denial of service (Segmentation fault) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-11213/">CVE-2018-11213 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11213">CVE-2018-11213 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1160884">SUSE bug 1160884</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826082" comment="libjpeg-turbo-1.2.90-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826083" comment="libjpeg-turbo-devel-1.2.90-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826084" comment="libjpeg-turbo-static-1.2.90-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826085" comment="libjpeg-turbo-utils-1.2.90-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826086" comment="turbojpeg-1.2.90-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826087" comment="turbojpeg-devel-1.2.90-8.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811214" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11214</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-11214" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11214" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-11214" ref_url="https://www.suse.com/security/cve/CVE-2018-11214" source="SUSE CVE"/>
    <description>
    An issue was discovered in libjpeg 9a. The get_text_rgb_row function in rdppm.c allows remote attackers to cause a denial of service (Segmentation fault) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-11214/">CVE-2018-11214 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11214">CVE-2018-11214 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1160884">SUSE bug 1160884</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826082" comment="libjpeg-turbo-1.2.90-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826083" comment="libjpeg-turbo-devel-1.2.90-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826084" comment="libjpeg-turbo-static-1.2.90-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826085" comment="libjpeg-turbo-utils-1.2.90-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826086" comment="turbojpeg-1.2.90-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826087" comment="turbojpeg-devel-1.2.90-8.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181122" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1122</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1122" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1122" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1122" ref_url="https://www.suse.com/security/cve/CVE-2018-1122" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2042-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2451-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004889.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0450-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1848-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N43O4OHYE34GEVGUD4JAK4ZIQ3EIBOGK/#N43O4OHYE34GEVGUD4JAK4ZIQ3EIBOGK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0291-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TLAKWPMUVFZH3K3L6EPO2RZSBDIG5SER/#TLAKWPMUVFZH3K3L6EPO2RZSBDIG5SER" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2376-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4EP32ED5GDRC2L3UFTOK2NPRC2TNQRPB/#4EP32ED5GDRC2L3UFTOK2NPRC2TNQRPB" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2379-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/373YKSXQ2VINMOOBAFFGM6KATT7DSMIN/#373YKSXQ2VINMOOBAFFGM6KATT7DSMIN" source="SUSE-SU"/>
    <description>
    procps-ng before version 3.3.15 is vulnerable to a local privilege escalation in top. If a user runs top with HOME unset in an attacker-controlled directory, the attacker could achieve privilege escalation by exploiting one of several vulnerabilities in the config_file() function.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1122/">CVE-2018-1122 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1122">CVE-2018-1122 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092100">SUSE bug 1092100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093158">SUSE bug 1093158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123135">SUSE bug 1123135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128955">SUSE bug 1128955</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826456" comment="procps-ng-3.3.10-26.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826457" comment="procps-ng-devel-3.3.10-26.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826458" comment="procps-ng-i18n-3.3.10-26.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811235" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11235</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-11235" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11235" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-11235" ref_url="https://www.suse.com/security/cve/CVE-2018-11235" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1566-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004790.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006748.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1553-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/D2W622QUQFMMOZ4PPNFQWTWYBX66TTHS/#D2W622QUQFMMOZ4PPNFQWTWYBX66TTHS" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2502-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7ZVB4Z276UW762BECMDH25V7JHRY2HYT/#7ZVB4Z276UW762BECMDH25V7JHRY2HYT" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3519-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NUFRZU5GUINZCAU5ELF3BG5JBOA5FABH/#NUFRZU5GUINZCAU5ELF3BG5JBOA5FABH" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0598-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VP5YOKSRLMTVAPQKPHEDGCOIZL5JKJW5/" source="SUSE-SU"/>
    <description>
    In Git before 2.13.7, 2.14.x before 2.14.4, 2.15.x before 2.15.2, 2.16.x before 2.16.4, and 2.17.x before 2.17.1, remote code execution can occur. With a crafted .gitmodules file, a malicious project can execute an arbitrary script on a machine that runs "git clone --recurse-submodules" because submodule "names" are obtained from this file, and then appended to $GIT_DIR/modules, leading to directory traversal with "../" in a name. Finally, post-checkout hooks from a submodule are executed, bypassing the intended design in which hooks are not obtained from a remote server.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-11235/">CVE-2018-11235 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11235">CVE-2018-11235 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1095219">SUSE bug 1095219</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824365" comment="emacs-git-1.8.3.1-14.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824366" comment="emacs-git-el-1.8.3.1-14.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824367" comment="git-1.8.3.1-14.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824368" comment="git-all-1.8.3.1-14.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824369" comment="git-bzr-1.8.3.1-14.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824370" comment="git-cvs-1.8.3.1-14.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824371" comment="git-daemon-1.8.3.1-14.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824372" comment="git-email-1.8.3.1-14.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824373" comment="git-gui-1.8.3.1-14.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824374" comment="git-hg-1.8.3.1-14.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824375" comment="git-p4-1.8.3.1-14.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824376" comment="git-svn-1.8.3.1-14.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824377" comment="gitk-1.8.3.1-14.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824378" comment="gitweb-1.8.3.1-14.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824379" comment="perl-Git-1.8.3.1-14.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824380" comment="perl-Git-SVN-1.8.3.1-14.el7_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811236" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11236</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-11236" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11236" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-11236" ref_url="https://www.suse.com/security/cve/CVE-2018-11236" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1562-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1991-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004403.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1600-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WTX4RJFPF6A65XH45RH3EXZ3MWBNZ5IP/#WTX4RJFPF6A65XH45RH3EXZ3MWBNZ5IP" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2159-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IBCZUVKRWW62LDC7GGU5YGWFE2BZBTLR/#IBCZUVKRWW62LDC7GGU5YGWFE2BZBTLR" source="SUSE-SU"/>
    <description>
    stdlib/canonicalize.c in the GNU C Library (aka glibc or libc6) 2.27 and earlier, when processing very long pathname arguments to the realpath function, could encounter an integer overflow on 32-bit architectures, leading to a stack-based buffer overflow and, potentially, arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-11236/">CVE-2018-11236 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11236">CVE-2018-11236 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1094161">SUSE bug 1094161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110160">SUSE bug 1110160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118435">SUSE bug 1118435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123874">SUSE bug 1123874</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824800" comment="glibc-2.17-260.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824801" comment="glibc-common-2.17-260.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824802" comment="glibc-devel-2.17-260.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824803" comment="glibc-headers-2.17-260.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824804" comment="glibc-static-2.17-260.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824805" comment="glibc-utils-2.17-260.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824806" comment="nscd-2.17-260.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811237" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11237</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-11237" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11237" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-11237" ref_url="https://www.suse.com/security/cve/CVE-2018-11237" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1562-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1991-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004285.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1600-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WTX4RJFPF6A65XH45RH3EXZ3MWBNZ5IP/#WTX4RJFPF6A65XH45RH3EXZ3MWBNZ5IP" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1633-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OHOOP727H2MRWXQHAGEJ3C3JVSYLEQS4/#OHOOP727H2MRWXQHAGEJ3C3JVSYLEQS4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2159-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IBCZUVKRWW62LDC7GGU5YGWFE2BZBTLR/#IBCZUVKRWW62LDC7GGU5YGWFE2BZBTLR" source="SUSE-SU"/>
    <description>
    An AVX-512-optimized implementation of the mempcpy function in the GNU C Library (aka glibc or libc6) 2.27 and earlier may write data beyond the target buffer, leading to a buffer overflow in __mempcpy_avx512_no_vzeroupper.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11237/">CVE-2018-11237 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11237">CVE-2018-11237 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1092877">SUSE bug 1092877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094154">SUSE bug 1094154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118435">SUSE bug 1118435</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824800" comment="glibc-2.17-260.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824801" comment="glibc-common-2.17-260.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824802" comment="glibc-devel-2.17-260.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824803" comment="glibc-headers-2.17-260.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824804" comment="glibc-static-2.17-260.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824805" comment="glibc-utils-2.17-260.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824806" comment="nscd-2.17-260.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181124" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1124</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1124" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1124" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1124" ref_url="https://www.suse.com/security/cve/CVE-2018-1124" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2042-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2451-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004889.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0450-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1848-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N43O4OHYE34GEVGUD4JAK4ZIQ3EIBOGK/#N43O4OHYE34GEVGUD4JAK4ZIQ3EIBOGK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0291-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TLAKWPMUVFZH3K3L6EPO2RZSBDIG5SER/#TLAKWPMUVFZH3K3L6EPO2RZSBDIG5SER" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2376-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4EP32ED5GDRC2L3UFTOK2NPRC2TNQRPB/#4EP32ED5GDRC2L3UFTOK2NPRC2TNQRPB" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2379-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/373YKSXQ2VINMOOBAFFGM6KATT7DSMIN/#373YKSXQ2VINMOOBAFFGM6KATT7DSMIN" source="SUSE-SU"/>
    <description>
    procps-ng before version 3.3.15 is vulnerable to multiple integer overflows leading to a heap corruption in file2strvec function. This allows a privilege escalation for a local attacker who can create entries in procfs by starting processes, which could result in crashes or arbitrary code execution in proc utilities run by other users.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1124/">CVE-2018-1124 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1124">CVE-2018-1124 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092100">SUSE bug 1092100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093158">SUSE bug 1093158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123135">SUSE bug 1123135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128955">SUSE bug 1128955</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824343" comment="procps-ng-3.3.10-17.el7_5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824344" comment="procps-ng-devel-3.3.10-17.el7_5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824345" comment="procps-ng-i18n-3.3.10-17.el7_5.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181126" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1126</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1126" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1126" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1126" ref_url="https://www.suse.com/security/cve/CVE-2018-1126" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2042-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2451-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004889.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0450-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1848-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N43O4OHYE34GEVGUD4JAK4ZIQ3EIBOGK/#N43O4OHYE34GEVGUD4JAK4ZIQ3EIBOGK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0291-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TLAKWPMUVFZH3K3L6EPO2RZSBDIG5SER/#TLAKWPMUVFZH3K3L6EPO2RZSBDIG5SER" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2376-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4EP32ED5GDRC2L3UFTOK2NPRC2TNQRPB/#4EP32ED5GDRC2L3UFTOK2NPRC2TNQRPB" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2379-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/373YKSXQ2VINMOOBAFFGM6KATT7DSMIN/#373YKSXQ2VINMOOBAFFGM6KATT7DSMIN" source="SUSE-SU"/>
    <description>
    procps-ng before version 3.3.15 is vulnerable to an incorrect integer size in proc/alloc.* leading to truncation/integer overflow issues. This flaw is related to CVE-2018-1124.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1126/">CVE-2018-1126 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1126">CVE-2018-1126 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092100">SUSE bug 1092100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093158">SUSE bug 1093158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123135">SUSE bug 1123135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128955">SUSE bug 1128955</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824343" comment="procps-ng-3.3.10-17.el7_5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824344" comment="procps-ng-devel-3.3.10-17.el7_5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824345" comment="procps-ng-i18n-3.3.10-17.el7_5.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181130" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1130</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1130" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1130" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1130" ref_url="https://www.suse.com/security/cve/CVE-2018-1130" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1366-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1855-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2366-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004537.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1418-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EN4KK2FGUDUKZAKRD5IRYD6AZQXJA3AU/#EN4KK2FGUDUKZAKRD5IRYD6AZQXJA3AU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2119-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WKPTBMLW6CO7OGF3LPNC4LMQ2SS7VXKC/#WKPTBMLW6CO7OGF3LPNC4LMQ2SS7VXKC" source="SUSE-SU"/>
    <description>
    Linux kernel before version 4.16-rc7 is vulnerable to a null pointer dereference in dccp_write_xmit() function in net/dccp/output.c in that allows a local user to cause a denial of service by a number of certain crafted system calls.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1130/">CVE-2018-1130 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1130">CVE-2018-1130 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1092904">SUSE bug 1092904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824786" comment="bpftool-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824787" comment="kernel-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824788" comment="kernel-abi-whitelists-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824789" comment="kernel-debug-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824792" comment="kernel-doc-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824793" comment="kernel-headers-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824794" comment="kernel-tools-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824795" comment="kernel-tools-libs-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824797" comment="perf-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824798" comment="python-perf-3.10.0-957.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811362" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11362</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-11362" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11362" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-11362" ref_url="https://www.suse.com/security/cve/CVE-2018-11362" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1428-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SSHEBXV5YLKGKJZ2N43GDU5WM57BSG4U/#SSHEBXV5YLKGKJZ2N43GDU5WM57BSG4U" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5IUFGOOBYOJSD6ELATYP2KAV4TMLYPWB/" source="SUSE-SU"/>
    <description>
    In Wireshark 2.6.0, 2.4.0 to 2.4.6, and 2.2.0 to 2.2.14, the LDSS dissector could crash. This was addressed in epan/dissectors/packet-ldss.c by avoiding a buffer over-read upon encountering a missing '\0' character.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11362/">CVE-2018-11362 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11362">CVE-2018-11362 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1094301">SUSE bug 1094301</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827643" comment="wireshark-1.10.14-24.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827644" comment="wireshark-devel-1.10.14-24.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827645" comment="wireshark-gnome-1.10.14-24.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1139</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1139" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1139" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1139" ref_url="https://www.suse.com/security/cve/CVE-2018-1139" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004407.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2400-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7Q2J25MRHVVEQM6ECQFZF6NXUHM27TV5/#7Q2J25MRHVVEQM6ECQFZF6NXUHM27TV5" source="SUSE-SU"/>
    <description>
    A flaw was found in the way samba before 4.7.9 and 4.8.4 allowed the use of weak NTLMv1 authentication even when NTLMv1 was explicitly disabled. A man-in-the-middle attacker could use this flaw to read the credential and other details passed between the samba server and client.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1139/">CVE-2018-1139 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1139">CVE-2018-1139 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1095048">SUSE bug 1095048</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824639" comment="ctdb-4.8.3-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824640" comment="ctdb-tests-4.8.3-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824641" comment="libsmbclient-4.8.3-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824642" comment="libsmbclient-devel-4.8.3-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824643" comment="libwbclient-4.8.3-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824644" comment="libwbclient-devel-4.8.3-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824645" comment="samba-4.8.3-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824646" comment="samba-client-4.8.3-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824647" comment="samba-client-libs-4.8.3-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824648" comment="samba-common-4.8.3-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824649" comment="samba-common-libs-4.8.3-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824650" comment="samba-common-tools-4.8.3-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824651" comment="samba-dc-4.8.3-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824652" comment="samba-dc-libs-4.8.3-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824653" comment="samba-devel-4.8.3-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824654" comment="samba-krb5-printing-4.8.3-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824655" comment="samba-libs-4.8.3-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824656" comment="samba-pidl-4.8.3-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824657" comment="samba-python-4.8.3-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824658" comment="samba-python-test-4.8.3-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824659" comment="samba-test-4.8.3-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824660" comment="samba-test-libs-4.8.3-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824661" comment="samba-vfs-glusterfs-4.8.3-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824662" comment="samba-winbind-4.8.3-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824663" comment="samba-winbind-clients-4.8.3-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824664" comment="samba-winbind-krb5-locator-4.8.3-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824665" comment="samba-winbind-modules-4.8.3-4.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811439" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11439</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-11439" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11439" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-11439" ref_url="https://www.suse.com/security/cve/CVE-2018-11439" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1374-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2968-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007596.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1686-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/A25DJDFAYQ2ZC7HMSEUEKROKQLPKD2UX/#A25DJDFAYQ2ZC7HMSEUEKROKQLPKD2UX" source="SUSE-SU"/>
    <description>
    The TagLib::Ogg::FLAC::File::scan function in oggflacfile.cpp in TagLib 1.11.1 allows remote attackers to cause information disclosure (heap-based buffer over-read) via a crafted audio file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11439/">CVE-2018-11439 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11439">CVE-2018-11439 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1096180">SUSE bug 1096180</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827852" comment="taglib-1.8-8.20130218git.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827853" comment="taglib-devel-1.8-8.20130218git.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827854" comment="taglib-doc-1.8-8.20130218git.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811645" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11645</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-11645" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11645" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-11645" ref_url="https://www.suse.com/security/cve/CVE-2018-11645" source="SUSE CVE"/>
    <description>
    psi/zfile.c in Artifex Ghostscript before 9.21rc1 permits the status command even if -dSAFER is used, which might allow remote attackers to determine the existence and size of arbitrary files, a similar issue to CVE-2016-7977.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-11645/">CVE-2018-11645 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11645">CVE-2018-11645 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1095610">SUSE bug 1095610</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826512" comment="ghostscript-9.25-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826513" comment="ghostscript-cups-9.25-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826514" comment="ghostscript-doc-9.25-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826515" comment="ghostscript-gtk-9.25-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826516" comment="libgs-9.25-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826517" comment="libgs-devel-9.25-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811656" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11656</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-11656" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11656" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-11656" ref_url="https://www.suse.com/security/cve/CVE-2018-11656" source="SUSE CVE"/>
    <description>
    In ImageMagick 7.0.7-20 Q16 x86_64, a memory leak vulnerability was found in the function ReadDCMImage in coders/dcm.c, which allows attackers to cause a denial of service via a crafted DCM image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11656/">CVE-2018-11656 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11656">CVE-2018-11656 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1095726">SUSE bug 1095726</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827880" comment="ImageMagick-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827881" comment="ImageMagick-c++-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827882" comment="ImageMagick-c++-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827883" comment="ImageMagick-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827884" comment="ImageMagick-doc-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827885" comment="ImageMagick-perl-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827886" comment="autotrace-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827887" comment="autotrace-devel-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827888" comment="emacs-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827889" comment="emacs-common-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827890" comment="emacs-el-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827891" comment="emacs-filesystem-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827892" comment="emacs-nox-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827893" comment="emacs-terminal-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827894" comment="inkscape-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827895" comment="inkscape-docs-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827896" comment="inkscape-view-0.92.2-3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811712" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11712</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-11712" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11712" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-11712" ref_url="https://www.suse.com/security/cve/CVE-2018-11712" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004781.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3473-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BDAK2MVOAPTEET4XJ6HHZXTMPNQCVMAW/#BDAK2MVOAPTEET4XJ6HHZXTMPNQCVMAW" source="SUSE-SU"/>
    <description>
    WebCore/platform/network/soup/SocketStreamHandleImplSoup.cpp in the libsoup network backend of WebKit, as used in WebKitGTK+ versions 2.20.0 and 2.20.1, failed to perform TLS certificate verification for WebSocket connections.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-07"/>
	<updated date="2026-03-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-11712/">CVE-2018-11712 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11712">CVE-2018-11712 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1096061">SUSE bug 1096061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097693">SUSE bug 1097693</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824843" comment="PackageKit-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824844" comment="PackageKit-command-not-found-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824845" comment="PackageKit-cron-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824846" comment="PackageKit-glib-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824847" comment="PackageKit-glib-devel-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824848" comment="PackageKit-gstreamer-plugin-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824849" comment="PackageKit-gtk3-module-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824850" comment="PackageKit-yum-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824851" comment="PackageKit-yum-plugin-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824852" comment="accountsservice-0.6.50-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824853" comment="accountsservice-devel-0.6.50-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824854" comment="accountsservice-libs-0.6.50-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824855" comment="adwaita-cursor-theme-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824856" comment="adwaita-gtk2-theme-3.28-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824857" comment="adwaita-icon-theme-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824858" comment="adwaita-icon-theme-devel-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824859" comment="appstream-data-7-20180614.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824860" comment="at-spi2-atk-2.26.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824861" comment="at-spi2-atk-devel-2.26.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824862" comment="at-spi2-core-2.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824863" comment="at-spi2-core-devel-2.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824864" comment="atk-2.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824865" comment="atk-devel-2.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824866" comment="baobab-3.28.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824867" comment="bolt-0.4-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824868" comment="brasero-3.12.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824869" comment="brasero-devel-3.12.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824870" comment="brasero-libs-3.12.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824871" comment="brasero-nautilus-3.12.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824872" comment="cairo-1.15.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824873" comment="cairo-devel-1.15.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824874" comment="cairo-gobject-1.15.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824875" comment="cairo-gobject-devel-1.15.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824876" comment="cairo-tools-1.15.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824877" comment="cheese-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824878" comment="cheese-libs-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824879" comment="cheese-libs-devel-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824880" comment="clutter-gst3-3.0.26-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824881" comment="clutter-gst3-devel-3.0.26-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824882" comment="compat-exiv2-023-0.23-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824883" comment="compat-libical1-1.0.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824884" comment="control-center-3.28.1-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824885" comment="control-center-filesystem-3.28.1-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824886" comment="dconf-0.28.0-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824887" comment="dconf-devel-0.28.0-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824888" comment="dconf-editor-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824889" comment="devhelp-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824890" comment="devhelp-devel-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824891" comment="devhelp-libs-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824892" comment="ekiga-4.0.1-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824893" comment="empathy-3.12.13-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824894" comment="eog-3.28.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824895" comment="eog-devel-3.28.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824896" comment="evince-3.28.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824897" comment="evince-browser-plugin-3.28.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824898" comment="evince-devel-3.28.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824899" comment="evince-dvi-3.28.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824900" comment="evince-libs-3.28.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824901" comment="evince-nautilus-3.28.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824902" comment="evolution-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824903" comment="evolution-bogofilter-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824904" comment="evolution-data-server-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824905" comment="evolution-data-server-devel-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824906" comment="evolution-data-server-doc-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824907" comment="evolution-data-server-langpacks-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824908" comment="evolution-data-server-perl-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824909" comment="evolution-data-server-tests-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824910" comment="evolution-devel-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824911" comment="evolution-devel-docs-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824912" comment="evolution-ews-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824913" comment="evolution-ews-langpacks-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824914" comment="evolution-help-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824915" comment="evolution-langpacks-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824916" comment="evolution-mapi-3.28.3-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824917" comment="evolution-mapi-langpacks-3.28.3-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824918" comment="evolution-pst-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824919" comment="evolution-spamassassin-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824920" comment="evolution-tests-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824921" comment="file-roller-3.28.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824922" comment="file-roller-nautilus-3.28.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824923" comment="flatpak-1.0.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824924" comment="flatpak-builder-1.0.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824925" comment="flatpak-devel-1.0.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824926" comment="flatpak-libs-1.0.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824927" comment="folks-0.11.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824928" comment="folks-devel-0.11.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824929" comment="folks-tools-0.11.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824930" comment="fontconfig-2.13.0-4.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824931" comment="fontconfig-devel-2.13.0-4.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824932" comment="fontconfig-devel-doc-2.13.0-4.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824933" comment="freetype-2.8-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824934" comment="freetype-demos-2.8-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824935" comment="freetype-devel-2.8-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824936" comment="fribidi-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824937" comment="fribidi-devel-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824938" comment="fwupd-1.0.8-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824939" comment="fwupd-devel-1.0.8-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824940" comment="fwupdate-12-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824941" comment="fwupdate-devel-12-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824942" comment="fwupdate-efi-12-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824943" comment="fwupdate-libs-12-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824944" comment="gcr-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824945" comment="gcr-devel-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824946" comment="gdk-pixbuf2-2.36.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824947" comment="gdk-pixbuf2-devel-2.36.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824948" comment="gdk-pixbuf2-tests-2.36.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824949" comment="gdm-3.28.2-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824950" comment="gdm-devel-3.28.2-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824951" comment="gdm-pam-extensions-devel-3.28.2-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824952" comment="gedit-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824953" comment="gedit-devel-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824954" comment="gedit-plugin-bookmarks-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824955" comment="gedit-plugin-bracketcompletion-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824956" comment="gedit-plugin-charmap-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824957" comment="gedit-plugin-codecomment-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824958" comment="gedit-plugin-colorpicker-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824959" comment="gedit-plugin-colorschemer-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824960" comment="gedit-plugin-commander-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824961" comment="gedit-plugin-drawspaces-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824962" comment="gedit-plugin-findinfiles-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824963" comment="gedit-plugin-joinlines-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824964" comment="gedit-plugin-multiedit-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824965" comment="gedit-plugin-smartspaces-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824966" comment="gedit-plugin-synctex-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824967" comment="gedit-plugin-terminal-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824968" comment="gedit-plugin-textsize-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824969" comment="gedit-plugin-translate-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824970" comment="gedit-plugin-wordcompletion-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824971" comment="gedit-plugins-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824972" comment="gedit-plugins-data-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824973" comment="geoclue2-2.4.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824974" comment="geoclue2-demos-2.4.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824975" comment="geoclue2-devel-2.4.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824976" comment="geoclue2-libs-2.4.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824977" comment="geocode-glib-3.26.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824978" comment="geocode-glib-devel-3.26.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824979" comment="gjs-1.52.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824980" comment="gjs-devel-1.52.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824981" comment="gjs-tests-1.52.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824982" comment="glade-3.22.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824983" comment="glade-devel-3.22.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824984" comment="glade-libs-3.22.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824985" comment="glib-networking-2.56.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824986" comment="glib-networking-tests-2.56.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824987" comment="glib2-2.56.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824988" comment="glib2-devel-2.56.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824989" comment="glib2-doc-2.56.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824990" comment="glib2-fam-2.56.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824991" comment="glib2-static-2.56.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824992" comment="glib2-tests-2.56.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824993" comment="glibmm24-2.56.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824994" comment="glibmm24-devel-2.56.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824995" comment="glibmm24-doc-2.56.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824996" comment="gnome-backgrounds-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824997" comment="gnome-bluetooth-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824998" comment="gnome-bluetooth-libs-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824999" comment="gnome-bluetooth-libs-devel-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825000" comment="gnome-boxes-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825001" comment="gnome-calculator-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825002" comment="gnome-classic-session-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825003" comment="gnome-clocks-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825004" comment="gnome-color-manager-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825005" comment="gnome-contacts-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825006" comment="gnome-desktop3-3.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825007" comment="gnome-desktop3-devel-3.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825008" comment="gnome-desktop3-tests-3.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825009" comment="gnome-devel-docs-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825010" comment="gnome-dictionary-3.26.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825011" comment="gnome-disk-utility-3.28.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825012" comment="gnome-documents-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825013" comment="gnome-documents-libs-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825014" comment="gnome-font-viewer-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825015" comment="gnome-getting-started-docs-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825016" comment="gnome-getting-started-docs-cs-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825017" comment="gnome-getting-started-docs-de-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825018" comment="gnome-getting-started-docs-es-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825019" comment="gnome-getting-started-docs-fr-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825020" comment="gnome-getting-started-docs-gl-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825021" comment="gnome-getting-started-docs-hu-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825022" comment="gnome-getting-started-docs-it-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825023" comment="gnome-getting-started-docs-pl-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825024" comment="gnome-getting-started-docs-pt_BR-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825025" comment="gnome-getting-started-docs-ru-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825026" comment="gnome-initial-setup-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825027" comment="gnome-keyring-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825028" comment="gnome-keyring-pam-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825029" comment="gnome-online-accounts-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825030" comment="gnome-online-accounts-devel-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825031" comment="gnome-online-miners-3.26.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825032" comment="gnome-packagekit-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825033" comment="gnome-packagekit-common-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825034" comment="gnome-packagekit-installer-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825035" comment="gnome-packagekit-updater-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825036" comment="gnome-screenshot-3.26.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825037" comment="gnome-session-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825038" comment="gnome-session-custom-session-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825039" comment="gnome-session-wayland-session-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825040" comment="gnome-session-xsession-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825041" comment="gnome-settings-daemon-3.28.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825042" comment="gnome-settings-daemon-devel-3.28.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825043" comment="gnome-shell-3.28.3-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825044" comment="gnome-shell-extension-alternate-tab-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825045" comment="gnome-shell-extension-apps-menu-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825046" comment="gnome-shell-extension-auto-move-windows-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825047" comment="gnome-shell-extension-common-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825048" comment="gnome-shell-extension-dash-to-dock-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825049" comment="gnome-shell-extension-drive-menu-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825050" comment="gnome-shell-extension-launch-new-instance-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825051" comment="gnome-shell-extension-native-window-placement-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825052" comment="gnome-shell-extension-no-hot-corner-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825053" comment="gnome-shell-extension-panel-favorites-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825054" comment="gnome-shell-extension-places-menu-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825055" comment="gnome-shell-extension-screenshot-window-sizer-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825056" comment="gnome-shell-extension-systemMonitor-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825057" comment="gnome-shell-extension-top-icons-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825058" comment="gnome-shell-extension-updates-dialog-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825059" comment="gnome-shell-extension-user-theme-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825060" comment="gnome-shell-extension-window-list-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825061" comment="gnome-shell-extension-windowsNavigator-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825062" comment="gnome-shell-extension-workspace-indicator-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825063" comment="gnome-software-3.28.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825064" comment="gnome-software-devel-3.28.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825065" comment="gnome-software-editor-3.28.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825066" comment="gnome-system-monitor-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825067" comment="gnome-terminal-3.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825068" comment="gnome-terminal-nautilus-3.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825069" comment="gnome-themes-standard-3.28-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825070" comment="gnome-tweak-tool-3.28.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825071" comment="gnome-user-docs-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825072" comment="gnote-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825073" comment="gobject-introspection-1.56.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825074" comment="gobject-introspection-devel-1.56.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825075" comment="gom-0.3.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825076" comment="gom-devel-0.3.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825077" comment="google-noto-emoji-color-fonts-20180508-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825078" comment="google-noto-emoji-fonts-20180508-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825079" comment="grilo-0.3.6-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825080" comment="grilo-devel-0.3.6-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825081" comment="grilo-plugins-0.3.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825082" comment="gsettings-desktop-schemas-3.28.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825083" comment="gsettings-desktop-schemas-devel-3.28.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825084" comment="gspell-1.6.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825085" comment="gspell-devel-1.6.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825086" comment="gspell-doc-1.6.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825087" comment="gssdp-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825088" comment="gssdp-devel-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825089" comment="gssdp-docs-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825090" comment="gssdp-utils-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825091" comment="gstreamer1-plugins-base-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825092" comment="gstreamer1-plugins-base-devel-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825093" comment="gstreamer1-plugins-base-devel-docs-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825094" comment="gstreamer1-plugins-base-tools-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825095" comment="gtk-doc-1.28-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825096" comment="gtk-update-icon-cache-3.22.30-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825097" comment="gtk3-3.22.30-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825098" comment="gtk3-devel-3.22.30-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825099" comment="gtk3-devel-docs-3.22.30-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825100" comment="gtk3-immodule-xim-3.22.30-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825101" comment="gtk3-immodules-3.22.30-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825102" comment="gtk3-tests-3.22.30-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825103" comment="gtksourceview3-3.24.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825104" comment="gtksourceview3-devel-3.24.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825105" comment="gtksourceview3-tests-3.24.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825106" comment="gucharmap-10.0.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825107" comment="gucharmap-devel-10.0.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825108" comment="gucharmap-libs-10.0.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825109" comment="gupnp-1.0.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825110" comment="gupnp-devel-1.0.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825111" comment="gupnp-docs-1.0.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825112" comment="gupnp-igd-0.2.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825113" comment="gupnp-igd-devel-0.2.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825114" comment="gupnp-igd-python-0.2.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825115" comment="gvfs-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825116" comment="gvfs-afc-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825117" comment="gvfs-afp-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825118" comment="gvfs-archive-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825119" comment="gvfs-client-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825120" comment="gvfs-devel-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825121" comment="gvfs-fuse-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825122" comment="gvfs-goa-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825123" comment="gvfs-gphoto2-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825124" comment="gvfs-mtp-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825125" comment="gvfs-smb-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825126" comment="gvfs-tests-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825127" comment="harfbuzz-1.7.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825128" comment="harfbuzz-devel-1.7.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825129" comment="harfbuzz-icu-1.7.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825130" comment="json-glib-1.4.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825131" comment="json-glib-devel-1.4.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825132" comment="json-glib-tests-1.4.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825133" comment="libappstream-glib-0.7.8-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825134" comment="libappstream-glib-builder-0.7.8-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825135" comment="libappstream-glib-builder-devel-0.7.8-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825136" comment="libappstream-glib-devel-0.7.8-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825137" comment="libchamplain-0.12.16-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825138" comment="libchamplain-demos-0.12.16-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825139" comment="libchamplain-devel-0.12.16-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825140" comment="libchamplain-gtk-0.12.16-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825141" comment="libcroco-0.6.12-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825142" comment="libcroco-devel-0.6.12-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825143" comment="libgdata-0.17.9-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825144" comment="libgdata-devel-0.17.9-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825145" comment="libgee-0.20.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825146" comment="libgee-devel-0.20.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825147" comment="libgepub-0.6.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825148" comment="libgepub-devel-0.6.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825149" comment="libgexiv2-0.10.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825150" comment="libgexiv2-devel-0.10.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825151" comment="libgnomekbd-3.26.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825152" comment="libgnomekbd-devel-3.26.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825153" comment="libgovirt-0.3.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825154" comment="libgovirt-devel-0.3.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825155" comment="libgtop2-2.38.0-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825156" comment="libgtop2-devel-2.38.0-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825157" comment="libgweather-3.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825158" comment="libgweather-devel-3.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825159" comment="libgxps-0.3.0-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825160" comment="libgxps-devel-0.3.0-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825161" comment="libgxps-tools-0.3.0-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825162" comment="libical-3.0.3-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825163" comment="libical-devel-3.0.3-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825164" comment="libical-glib-3.0.3-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825165" comment="libical-glib-devel-3.0.3-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825166" comment="libical-glib-doc-3.0.3-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825167" comment="libjpeg-turbo-1.2.90-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825168" comment="libjpeg-turbo-devel-1.2.90-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825169" comment="libjpeg-turbo-static-1.2.90-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825170" comment="libjpeg-turbo-utils-1.2.90-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825171" comment="libmediaart-1.9.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825172" comment="libmediaart-devel-1.9.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825173" comment="libmediaart-tests-1.9.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825174" comment="libosinfo-1.1.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825175" comment="libosinfo-devel-1.1.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825176" comment="libosinfo-vala-1.1.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825177" comment="libpeas-1.22.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825178" comment="libpeas-devel-1.22.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825179" comment="libpeas-gtk-1.22.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825180" comment="libpeas-loader-python-1.22.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825181" comment="librsvg2-2.40.20-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825182" comment="librsvg2-devel-2.40.20-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825183" comment="librsvg2-tools-2.40.20-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825184" comment="libsecret-0.18.6-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825185" comment="libsecret-devel-0.18.6-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825186" comment="libsoup-2.62.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825187" comment="libsoup-devel-2.62.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825188" comment="libwayland-client-1.15.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825189" comment="libwayland-cursor-1.15.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825190" comment="libwayland-egl-1.15.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825191" comment="libwayland-server-1.15.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825192" comment="libwnck3-3.24.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825193" comment="libwnck3-devel-3.24.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825194" comment="mozjs52-52.9.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825195" comment="mozjs52-devel-52.9.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825196" comment="mutter-3.28.3-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825197" comment="mutter-devel-3.28.3-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825198" comment="nautilus-3.26.3.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825199" comment="nautilus-devel-3.26.3.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825200" comment="nautilus-extensions-3.26.3.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825201" comment="nautilus-sendto-3.8.6-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825202" comment="openchange-2.3-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825203" comment="openchange-client-2.3-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825204" comment="openchange-devel-2.3-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825205" comment="openchange-devel-docs-2.3-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825206" comment="osinfo-db-20180531-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825207" comment="pango-1.42.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825208" comment="pango-devel-1.42.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825209" comment="pango-tests-1.42.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825210" comment="poppler-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825211" comment="poppler-cpp-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825212" comment="poppler-cpp-devel-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825213" comment="poppler-demos-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825214" comment="poppler-devel-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825215" comment="poppler-glib-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825216" comment="poppler-glib-devel-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825217" comment="poppler-qt-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825218" comment="poppler-qt-devel-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825219" comment="poppler-utils-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825220" comment="python2-gexiv2-0.10.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825221" comment="python2-pyatspi-2.26.0-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825222" comment="rest-0.8.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825223" comment="rest-devel-0.8.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825224" comment="rhythmbox-3.4.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825225" comment="rhythmbox-devel-3.4.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825226" comment="seahorse-nautilus-3.11.92-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825227" comment="shotwell-0.28.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825228" comment="sushi-3.28.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825229" comment="totem-3.26.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825230" comment="totem-devel-3.26.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825231" comment="totem-nautilus-3.26.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825232" comment="totem-pl-parser-3.26.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825233" comment="totem-pl-parser-devel-3.26.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825234" comment="turbojpeg-1.2.90-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825235" comment="turbojpeg-devel-1.2.90-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825236" comment="upower-0.99.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825237" comment="upower-devel-0.99.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825238" comment="upower-devel-docs-0.99.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825239" comment="vala-0.40.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825240" comment="vala-devel-0.40.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825241" comment="vala-doc-0.40.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825242" comment="valadoc-0.40.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825243" comment="valadoc-devel-0.40.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825244" comment="vino-3.22.0-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825245" comment="vte-profile-0.52.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825246" comment="vte291-0.52.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825247" comment="vte291-devel-0.52.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825248" comment="wayland-devel-1.15.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825249" comment="wayland-doc-1.15.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825250" comment="wayland-protocols-devel-1.14-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825251" comment="webkitgtk4-2.20.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825252" comment="webkitgtk4-devel-2.20.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825253" comment="webkitgtk4-doc-2.20.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825254" comment="webkitgtk4-jsc-2.20.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825255" comment="webkitgtk4-jsc-devel-2.20.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825256" comment="webkitgtk4-plugin-process-gtk2-2.20.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825257" comment="xdg-desktop-portal-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825258" comment="xdg-desktop-portal-devel-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825259" comment="xdg-desktop-portal-gtk-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825260" comment="yelp-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825261" comment="yelp-devel-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825262" comment="yelp-libs-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825263" comment="yelp-tools-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825264" comment="yelp-xsl-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825265" comment="yelp-xsl-devel-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825266" comment="zenity-3.28.1-1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811713" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11713</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-11713" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11713" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-11713" ref_url="https://www.suse.com/security/cve/CVE-2018-11713" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3473-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BDAK2MVOAPTEET4XJ6HHZXTMPNQCVMAW/#BDAK2MVOAPTEET4XJ6HHZXTMPNQCVMAW" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0081-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N3LMCXDRCX64PDIK6OOJOXY7AAXP7POU/#N3LMCXDRCX64PDIK6OOJOXY7AAXP7POU" source="SUSE-SU"/>
    <description>
    WebCore/platform/network/soup/SocketStreamHandleImplSoup.cpp in the libsoup network backend of WebKit, as used in WebKitGTK+ prior to version 2.20.0 or without libsoup 2.62.0, unexpectedly failed to use system proxy settings for WebSocket connections. As a result, users could be deanonymized by crafted web sites via a WebSocket connection.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-07"/>
	<updated date="2026-03-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-11713/">CVE-2018-11713 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11713">CVE-2018-11713 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1096060">SUSE bug 1096060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097693">SUSE bug 1097693</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824843" comment="PackageKit-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824844" comment="PackageKit-command-not-found-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824845" comment="PackageKit-cron-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824846" comment="PackageKit-glib-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824847" comment="PackageKit-glib-devel-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824848" comment="PackageKit-gstreamer-plugin-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824849" comment="PackageKit-gtk3-module-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824850" comment="PackageKit-yum-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824851" comment="PackageKit-yum-plugin-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824852" comment="accountsservice-0.6.50-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824853" comment="accountsservice-devel-0.6.50-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824854" comment="accountsservice-libs-0.6.50-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824855" comment="adwaita-cursor-theme-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824856" comment="adwaita-gtk2-theme-3.28-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824857" comment="adwaita-icon-theme-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824858" comment="adwaita-icon-theme-devel-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824859" comment="appstream-data-7-20180614.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824860" comment="at-spi2-atk-2.26.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824861" comment="at-spi2-atk-devel-2.26.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824862" comment="at-spi2-core-2.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824863" comment="at-spi2-core-devel-2.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824864" comment="atk-2.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824865" comment="atk-devel-2.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824866" comment="baobab-3.28.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824867" comment="bolt-0.4-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824868" comment="brasero-3.12.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824869" comment="brasero-devel-3.12.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824870" comment="brasero-libs-3.12.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824871" comment="brasero-nautilus-3.12.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824872" comment="cairo-1.15.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824873" comment="cairo-devel-1.15.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824874" comment="cairo-gobject-1.15.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824875" comment="cairo-gobject-devel-1.15.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824876" comment="cairo-tools-1.15.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824877" comment="cheese-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824878" comment="cheese-libs-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824879" comment="cheese-libs-devel-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824880" comment="clutter-gst3-3.0.26-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824881" comment="clutter-gst3-devel-3.0.26-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824882" comment="compat-exiv2-023-0.23-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824883" comment="compat-libical1-1.0.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824884" comment="control-center-3.28.1-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824885" comment="control-center-filesystem-3.28.1-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824886" comment="dconf-0.28.0-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824887" comment="dconf-devel-0.28.0-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824888" comment="dconf-editor-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824889" comment="devhelp-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824890" comment="devhelp-devel-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824891" comment="devhelp-libs-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824892" comment="ekiga-4.0.1-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824893" comment="empathy-3.12.13-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824894" comment="eog-3.28.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824895" comment="eog-devel-3.28.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824896" comment="evince-3.28.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824897" comment="evince-browser-plugin-3.28.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824898" comment="evince-devel-3.28.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824899" comment="evince-dvi-3.28.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824900" comment="evince-libs-3.28.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824901" comment="evince-nautilus-3.28.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824902" comment="evolution-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824903" comment="evolution-bogofilter-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824904" comment="evolution-data-server-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824905" comment="evolution-data-server-devel-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824906" comment="evolution-data-server-doc-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824907" comment="evolution-data-server-langpacks-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824908" comment="evolution-data-server-perl-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824909" comment="evolution-data-server-tests-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824910" comment="evolution-devel-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824911" comment="evolution-devel-docs-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824912" comment="evolution-ews-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824913" comment="evolution-ews-langpacks-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824914" comment="evolution-help-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824915" comment="evolution-langpacks-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824916" comment="evolution-mapi-3.28.3-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824917" comment="evolution-mapi-langpacks-3.28.3-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824918" comment="evolution-pst-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824919" comment="evolution-spamassassin-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824920" comment="evolution-tests-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824921" comment="file-roller-3.28.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824922" comment="file-roller-nautilus-3.28.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824923" comment="flatpak-1.0.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824924" comment="flatpak-builder-1.0.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824925" comment="flatpak-devel-1.0.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824926" comment="flatpak-libs-1.0.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824927" comment="folks-0.11.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824928" comment="folks-devel-0.11.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824929" comment="folks-tools-0.11.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824930" comment="fontconfig-2.13.0-4.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824931" comment="fontconfig-devel-2.13.0-4.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824932" comment="fontconfig-devel-doc-2.13.0-4.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824933" comment="freetype-2.8-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824934" comment="freetype-demos-2.8-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824935" comment="freetype-devel-2.8-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824936" comment="fribidi-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824937" comment="fribidi-devel-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824938" comment="fwupd-1.0.8-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824939" comment="fwupd-devel-1.0.8-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824940" comment="fwupdate-12-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824941" comment="fwupdate-devel-12-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824942" comment="fwupdate-efi-12-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824943" comment="fwupdate-libs-12-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824944" comment="gcr-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824945" comment="gcr-devel-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824946" comment="gdk-pixbuf2-2.36.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824947" comment="gdk-pixbuf2-devel-2.36.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824948" comment="gdk-pixbuf2-tests-2.36.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824949" comment="gdm-3.28.2-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824950" comment="gdm-devel-3.28.2-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824951" comment="gdm-pam-extensions-devel-3.28.2-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824952" comment="gedit-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824953" comment="gedit-devel-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824954" comment="gedit-plugin-bookmarks-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824955" comment="gedit-plugin-bracketcompletion-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824956" comment="gedit-plugin-charmap-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824957" comment="gedit-plugin-codecomment-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824958" comment="gedit-plugin-colorpicker-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824959" comment="gedit-plugin-colorschemer-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824960" comment="gedit-plugin-commander-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824961" comment="gedit-plugin-drawspaces-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824962" comment="gedit-plugin-findinfiles-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824963" comment="gedit-plugin-joinlines-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824964" comment="gedit-plugin-multiedit-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824965" comment="gedit-plugin-smartspaces-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824966" comment="gedit-plugin-synctex-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824967" comment="gedit-plugin-terminal-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824968" comment="gedit-plugin-textsize-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824969" comment="gedit-plugin-translate-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824970" comment="gedit-plugin-wordcompletion-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824971" comment="gedit-plugins-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824972" comment="gedit-plugins-data-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824973" comment="geoclue2-2.4.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824974" comment="geoclue2-demos-2.4.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824975" comment="geoclue2-devel-2.4.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824976" comment="geoclue2-libs-2.4.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824977" comment="geocode-glib-3.26.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824978" comment="geocode-glib-devel-3.26.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824979" comment="gjs-1.52.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824980" comment="gjs-devel-1.52.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824981" comment="gjs-tests-1.52.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824982" comment="glade-3.22.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824983" comment="glade-devel-3.22.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824984" comment="glade-libs-3.22.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824985" comment="glib-networking-2.56.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824986" comment="glib-networking-tests-2.56.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824987" comment="glib2-2.56.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824988" comment="glib2-devel-2.56.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824989" comment="glib2-doc-2.56.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824990" comment="glib2-fam-2.56.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824991" comment="glib2-static-2.56.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824992" comment="glib2-tests-2.56.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824993" comment="glibmm24-2.56.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824994" comment="glibmm24-devel-2.56.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824995" comment="glibmm24-doc-2.56.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824996" comment="gnome-backgrounds-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824997" comment="gnome-bluetooth-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824998" comment="gnome-bluetooth-libs-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824999" comment="gnome-bluetooth-libs-devel-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825000" comment="gnome-boxes-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825001" comment="gnome-calculator-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825002" comment="gnome-classic-session-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825003" comment="gnome-clocks-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825004" comment="gnome-color-manager-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825005" comment="gnome-contacts-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825006" comment="gnome-desktop3-3.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825007" comment="gnome-desktop3-devel-3.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825008" comment="gnome-desktop3-tests-3.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825009" comment="gnome-devel-docs-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825010" comment="gnome-dictionary-3.26.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825011" comment="gnome-disk-utility-3.28.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825012" comment="gnome-documents-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825013" comment="gnome-documents-libs-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825014" comment="gnome-font-viewer-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825015" comment="gnome-getting-started-docs-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825016" comment="gnome-getting-started-docs-cs-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825017" comment="gnome-getting-started-docs-de-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825018" comment="gnome-getting-started-docs-es-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825019" comment="gnome-getting-started-docs-fr-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825020" comment="gnome-getting-started-docs-gl-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825021" comment="gnome-getting-started-docs-hu-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825022" comment="gnome-getting-started-docs-it-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825023" comment="gnome-getting-started-docs-pl-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825024" comment="gnome-getting-started-docs-pt_BR-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825025" comment="gnome-getting-started-docs-ru-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825026" comment="gnome-initial-setup-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825027" comment="gnome-keyring-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825028" comment="gnome-keyring-pam-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825029" comment="gnome-online-accounts-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825030" comment="gnome-online-accounts-devel-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825031" comment="gnome-online-miners-3.26.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825032" comment="gnome-packagekit-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825033" comment="gnome-packagekit-common-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825034" comment="gnome-packagekit-installer-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825035" comment="gnome-packagekit-updater-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825036" comment="gnome-screenshot-3.26.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825037" comment="gnome-session-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825038" comment="gnome-session-custom-session-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825039" comment="gnome-session-wayland-session-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825040" comment="gnome-session-xsession-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825041" comment="gnome-settings-daemon-3.28.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825042" comment="gnome-settings-daemon-devel-3.28.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825043" comment="gnome-shell-3.28.3-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825044" comment="gnome-shell-extension-alternate-tab-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825045" comment="gnome-shell-extension-apps-menu-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825046" comment="gnome-shell-extension-auto-move-windows-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825047" comment="gnome-shell-extension-common-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825048" comment="gnome-shell-extension-dash-to-dock-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825049" comment="gnome-shell-extension-drive-menu-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825050" comment="gnome-shell-extension-launch-new-instance-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825051" comment="gnome-shell-extension-native-window-placement-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825052" comment="gnome-shell-extension-no-hot-corner-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825053" comment="gnome-shell-extension-panel-favorites-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825054" comment="gnome-shell-extension-places-menu-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825055" comment="gnome-shell-extension-screenshot-window-sizer-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825056" comment="gnome-shell-extension-systemMonitor-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825057" comment="gnome-shell-extension-top-icons-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825058" comment="gnome-shell-extension-updates-dialog-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825059" comment="gnome-shell-extension-user-theme-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825060" comment="gnome-shell-extension-window-list-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825061" comment="gnome-shell-extension-windowsNavigator-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825062" comment="gnome-shell-extension-workspace-indicator-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825063" comment="gnome-software-3.28.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825064" comment="gnome-software-devel-3.28.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825065" comment="gnome-software-editor-3.28.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825066" comment="gnome-system-monitor-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825067" comment="gnome-terminal-3.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825068" comment="gnome-terminal-nautilus-3.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825069" comment="gnome-themes-standard-3.28-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825070" comment="gnome-tweak-tool-3.28.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825071" comment="gnome-user-docs-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825072" comment="gnote-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825073" comment="gobject-introspection-1.56.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825074" comment="gobject-introspection-devel-1.56.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825075" comment="gom-0.3.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825076" comment="gom-devel-0.3.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825077" comment="google-noto-emoji-color-fonts-20180508-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825078" comment="google-noto-emoji-fonts-20180508-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825079" comment="grilo-0.3.6-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825080" comment="grilo-devel-0.3.6-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825081" comment="grilo-plugins-0.3.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825082" comment="gsettings-desktop-schemas-3.28.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825083" comment="gsettings-desktop-schemas-devel-3.28.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825084" comment="gspell-1.6.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825085" comment="gspell-devel-1.6.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825086" comment="gspell-doc-1.6.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825087" comment="gssdp-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825088" comment="gssdp-devel-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825089" comment="gssdp-docs-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825090" comment="gssdp-utils-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825091" comment="gstreamer1-plugins-base-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825092" comment="gstreamer1-plugins-base-devel-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825093" comment="gstreamer1-plugins-base-devel-docs-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825094" comment="gstreamer1-plugins-base-tools-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825095" comment="gtk-doc-1.28-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825096" comment="gtk-update-icon-cache-3.22.30-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825097" comment="gtk3-3.22.30-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825098" comment="gtk3-devel-3.22.30-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825099" comment="gtk3-devel-docs-3.22.30-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825100" comment="gtk3-immodule-xim-3.22.30-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825101" comment="gtk3-immodules-3.22.30-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825102" comment="gtk3-tests-3.22.30-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825103" comment="gtksourceview3-3.24.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825104" comment="gtksourceview3-devel-3.24.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825105" comment="gtksourceview3-tests-3.24.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825106" comment="gucharmap-10.0.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825107" comment="gucharmap-devel-10.0.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825108" comment="gucharmap-libs-10.0.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825109" comment="gupnp-1.0.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825110" comment="gupnp-devel-1.0.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825111" comment="gupnp-docs-1.0.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825112" comment="gupnp-igd-0.2.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825113" comment="gupnp-igd-devel-0.2.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825114" comment="gupnp-igd-python-0.2.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825115" comment="gvfs-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825116" comment="gvfs-afc-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825117" comment="gvfs-afp-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825118" comment="gvfs-archive-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825119" comment="gvfs-client-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825120" comment="gvfs-devel-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825121" comment="gvfs-fuse-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825122" comment="gvfs-goa-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825123" comment="gvfs-gphoto2-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825124" comment="gvfs-mtp-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825125" comment="gvfs-smb-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825126" comment="gvfs-tests-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825127" comment="harfbuzz-1.7.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825128" comment="harfbuzz-devel-1.7.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825129" comment="harfbuzz-icu-1.7.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825130" comment="json-glib-1.4.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825131" comment="json-glib-devel-1.4.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825132" comment="json-glib-tests-1.4.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825133" comment="libappstream-glib-0.7.8-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825134" comment="libappstream-glib-builder-0.7.8-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825135" comment="libappstream-glib-builder-devel-0.7.8-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825136" comment="libappstream-glib-devel-0.7.8-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825137" comment="libchamplain-0.12.16-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825138" comment="libchamplain-demos-0.12.16-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825139" comment="libchamplain-devel-0.12.16-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825140" comment="libchamplain-gtk-0.12.16-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825141" comment="libcroco-0.6.12-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825142" comment="libcroco-devel-0.6.12-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825143" comment="libgdata-0.17.9-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825144" comment="libgdata-devel-0.17.9-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825145" comment="libgee-0.20.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825146" comment="libgee-devel-0.20.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825147" comment="libgepub-0.6.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825148" comment="libgepub-devel-0.6.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825149" comment="libgexiv2-0.10.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825150" comment="libgexiv2-devel-0.10.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825151" comment="libgnomekbd-3.26.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825152" comment="libgnomekbd-devel-3.26.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825153" comment="libgovirt-0.3.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825154" comment="libgovirt-devel-0.3.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825155" comment="libgtop2-2.38.0-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825156" comment="libgtop2-devel-2.38.0-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825157" comment="libgweather-3.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825158" comment="libgweather-devel-3.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825159" comment="libgxps-0.3.0-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825160" comment="libgxps-devel-0.3.0-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825161" comment="libgxps-tools-0.3.0-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825162" comment="libical-3.0.3-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825163" comment="libical-devel-3.0.3-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825164" comment="libical-glib-3.0.3-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825165" comment="libical-glib-devel-3.0.3-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825166" comment="libical-glib-doc-3.0.3-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825167" comment="libjpeg-turbo-1.2.90-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825168" comment="libjpeg-turbo-devel-1.2.90-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825169" comment="libjpeg-turbo-static-1.2.90-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825170" comment="libjpeg-turbo-utils-1.2.90-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825171" comment="libmediaart-1.9.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825172" comment="libmediaart-devel-1.9.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825173" comment="libmediaart-tests-1.9.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825174" comment="libosinfo-1.1.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825175" comment="libosinfo-devel-1.1.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825176" comment="libosinfo-vala-1.1.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825177" comment="libpeas-1.22.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825178" comment="libpeas-devel-1.22.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825179" comment="libpeas-gtk-1.22.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825180" comment="libpeas-loader-python-1.22.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825181" comment="librsvg2-2.40.20-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825182" comment="librsvg2-devel-2.40.20-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825183" comment="librsvg2-tools-2.40.20-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825184" comment="libsecret-0.18.6-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825185" comment="libsecret-devel-0.18.6-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825186" comment="libsoup-2.62.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825187" comment="libsoup-devel-2.62.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825188" comment="libwayland-client-1.15.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825189" comment="libwayland-cursor-1.15.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825190" comment="libwayland-egl-1.15.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825191" comment="libwayland-server-1.15.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825192" comment="libwnck3-3.24.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825193" comment="libwnck3-devel-3.24.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825194" comment="mozjs52-52.9.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825195" comment="mozjs52-devel-52.9.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825196" comment="mutter-3.28.3-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825197" comment="mutter-devel-3.28.3-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825198" comment="nautilus-3.26.3.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825199" comment="nautilus-devel-3.26.3.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825200" comment="nautilus-extensions-3.26.3.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825201" comment="nautilus-sendto-3.8.6-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825202" comment="openchange-2.3-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825203" comment="openchange-client-2.3-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825204" comment="openchange-devel-2.3-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825205" comment="openchange-devel-docs-2.3-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825206" comment="osinfo-db-20180531-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825207" comment="pango-1.42.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825208" comment="pango-devel-1.42.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825209" comment="pango-tests-1.42.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825210" comment="poppler-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825211" comment="poppler-cpp-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825212" comment="poppler-cpp-devel-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825213" comment="poppler-demos-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825214" comment="poppler-devel-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825215" comment="poppler-glib-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825216" comment="poppler-glib-devel-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825217" comment="poppler-qt-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825218" comment="poppler-qt-devel-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825219" comment="poppler-utils-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825220" comment="python2-gexiv2-0.10.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825221" comment="python2-pyatspi-2.26.0-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825222" comment="rest-0.8.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825223" comment="rest-devel-0.8.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825224" comment="rhythmbox-3.4.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825225" comment="rhythmbox-devel-3.4.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825226" comment="seahorse-nautilus-3.11.92-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825227" comment="shotwell-0.28.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825228" comment="sushi-3.28.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825229" comment="totem-3.26.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825230" comment="totem-devel-3.26.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825231" comment="totem-nautilus-3.26.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825232" comment="totem-pl-parser-3.26.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825233" comment="totem-pl-parser-devel-3.26.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825234" comment="turbojpeg-1.2.90-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825235" comment="turbojpeg-devel-1.2.90-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825236" comment="upower-0.99.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825237" comment="upower-devel-0.99.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825238" comment="upower-devel-docs-0.99.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825239" comment="vala-0.40.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825240" comment="vala-devel-0.40.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825241" comment="vala-doc-0.40.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825242" comment="valadoc-0.40.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825243" comment="valadoc-devel-0.40.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825244" comment="vino-3.22.0-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825245" comment="vte-profile-0.52.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825246" comment="vte291-0.52.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825247" comment="vte291-devel-0.52.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825248" comment="wayland-devel-1.15.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825249" comment="wayland-doc-1.15.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825250" comment="wayland-protocols-devel-1.14-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825251" comment="webkitgtk4-2.20.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825252" comment="webkitgtk4-devel-2.20.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825253" comment="webkitgtk4-doc-2.20.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825254" comment="webkitgtk4-jsc-2.20.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825255" comment="webkitgtk4-jsc-devel-2.20.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825256" comment="webkitgtk4-plugin-process-gtk2-2.20.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825257" comment="xdg-desktop-portal-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825258" comment="xdg-desktop-portal-devel-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825259" comment="xdg-desktop-portal-gtk-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825260" comment="yelp-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825261" comment="yelp-devel-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825262" comment="yelp-libs-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825263" comment="yelp-tools-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825264" comment="yelp-xsl-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825265" comment="yelp-xsl-devel-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825266" comment="zenity-3.28.1-1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811781" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11781</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-11781" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11781" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-11781" ref_url="https://www.suse.com/security/cve/CVE-2018-11781" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2011-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192011-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1831-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWM23J3YFXDJ4Y2P4EH532AXFSDKVM3Q/#XWM23J3YFXDJ4Y2P4EH532AXFSDKVM3Q" source="SUSE-SU"/>
    <description>
    Apache SpamAssassin 3.4.2 fixes a local user code injection in the meta rule syntax.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-11781/">CVE-2018-11781 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11781">CVE-2018-11781 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1108748">SUSE bug 1108748</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824591" comment="spamassassin-3.4.0-4.el7_5 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811782" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11782</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-11782" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11782" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-11782" ref_url="https://www.suse.com/security/cve/CVE-2018-11782" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005765.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1910-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CLPCV7QU2V3PHTNTKUCOLUKHDLGGHMF5/#CLPCV7QU2V3PHTNTKUCOLUKHDLGGHMF5" source="SUSE-SU"/>
    <description>
    In Apache Subversion versions up to and including 1.9.10, 1.10.4, 1.12.0, Subversion's svnserve server process may exit when a well-formed read-only request produces a particular answer. This can lead to disruption for users of the server.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-11782/">CVE-2018-11782 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11782">CVE-2018-11782 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1142743">SUSE bug 1142743</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828322" comment="mod_dav_svn-1.7.14-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828323" comment="subversion-1.7.14-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828324" comment="subversion-devel-1.7.14-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828325" comment="subversion-gnome-1.7.14-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828326" comment="subversion-javahl-1.7.14-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828327" comment="subversion-kde-1.7.14-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828328" comment="subversion-libs-1.7.14-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828329" comment="subversion-perl-1.7.14-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828330" comment="subversion-python-1.7.14-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828331" comment="subversion-ruby-1.7.14-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828332" comment="subversion-tools-1.7.14-16.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811784" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11784</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-11784" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11784" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-11784" ref_url="https://www.suse.com/security/cve/CVE-2018-11784" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004786.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3968-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183968-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3453-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/V73SOKQOTFSQJ2PHWKK3DRCRNSMIOVB6/#V73SOKQOTFSQJ2PHWKK3DRCRNSMIOVB6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4042-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DWOLQKEDL75IFE2CFE4WMEE7XBZISJON/#DWOLQKEDL75IFE2CFE4WMEE7XBZISJON" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0084-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TSUMEMN7UGDKZYOYYDERMMDEYTAE4KOD/#TSUMEMN7UGDKZYOYYDERMMDEYTAE4KOD" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1547-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YLQFCLW7556SZJCWGWKR74FS7FGGTK7J/#YLQFCLW7556SZJCWGWKR74FS7FGGTK7J" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1814-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RTRWENR4KO4H3XNPBQUVKRGCPIDNAWUN/#RTRWENR4KO4H3XNPBQUVKRGCPIDNAWUN" source="SUSE-SU"/>
    <description>
    When the default servlet in Apache Tomcat versions 9.0.0.M1 to 9.0.11, 8.5.0 to 8.5.33 and 7.0.23 to 7.0.90 returned a redirect to a directory (e.g. redirecting to '/foo/' when the user requested '/foo') a specially crafted URL could be used to cause the redirect to be generated to any URI of the attackers choice.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-11784/">CVE-2018-11784 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11784">CVE-2018-11784 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1110850">SUSE bug 1110850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122212">SUSE bug 1122212</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825592" comment="tomcat-7.0.76-9.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825593" comment="tomcat-admin-webapps-7.0.76-9.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825594" comment="tomcat-docs-webapp-7.0.76-9.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825595" comment="tomcat-el-2.2-api-7.0.76-9.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825596" comment="tomcat-javadoc-7.0.76-9.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825597" comment="tomcat-jsp-2.2-api-7.0.76-9.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825598" comment="tomcat-jsvc-7.0.76-9.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825599" comment="tomcat-lib-7.0.76-9.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825600" comment="tomcat-servlet-3.0-api-7.0.76-9.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825601" comment="tomcat-webapps-7.0.76-9.el7_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11806</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-11806" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11806" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-11806" ref_url="https://www.suse.com/security/cve/CVE-2018-11806" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2081-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2340-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2650-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004631.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2973-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2211-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VZ33BMB7LZHYUFUTHA35O66BLP6RK4N/#5VZ33BMB7LZHYUFUTHA35O66BLP6RK4N" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2402-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LV572SEMHY7W2BLBGHICX7YQUWOEXYOY/#LV572SEMHY7W2BLBGHICX7YQUWOEXYOY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3709-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6QVAQ44FSYXJBEKJIEYZNJJDZMVYSMAC/#6QVAQ44FSYXJBEKJIEYZNJJDZMVYSMAC" source="SUSE-SU"/>
    <description>
    m_cat in slirp/mbuf.c in Qemu has a heap-based buffer overflow via incoming fragmented datagrams.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11806/">CVE-2018-11806 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11806">CVE-2018-11806 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1096223">SUSE bug 1096223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096224">SUSE bug 1096224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824524" comment="qemu-img-1.5.3-156.el7_5.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824525" comment="qemu-kvm-1.5.3-156.el7_5.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824526" comment="qemu-kvm-common-1.5.3-156.el7_5.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824527" comment="qemu-kvm-tools-1.5.3-156.el7_5.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811813" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11813</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-11813" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11813" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-11813" ref_url="https://www.suse.com/security/cve/CVE-2018-11813" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005415.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1118-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7PGXD27E76CECHHIGW57SLEC6FXMAF5N/#7PGXD27E76CECHHIGW57SLEC6FXMAF5N" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1343-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HFGEL7BLY3XLORUPMBTMJE2RLV52VT2R/#HFGEL7BLY3XLORUPMBTMJE2RLV52VT2R" source="SUSE-SU"/>
    <description>
    libjpeg 9c has a large loop because read_pixel in rdtarga.c mishandles EOF.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11813/">CVE-2018-11813 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11813">CVE-2018-11813 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1096209">SUSE bug 1096209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172994">SUSE bug 1172994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172995">SUSE bug 1172995</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826082" comment="libjpeg-turbo-1.2.90-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826083" comment="libjpeg-turbo-devel-1.2.90-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826084" comment="libjpeg-turbo-static-1.2.90-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826085" comment="libjpeg-turbo-utils-1.2.90-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826086" comment="turbojpeg-1.2.90-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826087" comment="turbojpeg-devel-1.2.90-8.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812015" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12015</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12015" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12015" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12015" ref_url="https://www.suse.com/security/cve/CVE-2018-12015" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1972-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1992-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004474.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2010-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YOSXMG2B4DT5GCC7FQYU2KBMKHK3AQFZ/#YOSXMG2B4DT5GCC7FQYU2KBMKHK3AQFZ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2011-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOBXL4LVFRCGH2TAYIAFJOANZ35Y5OPY/#ZOBXL4LVFRCGH2TAYIAFJOANZ35Y5OPY" source="SUSE-SU"/>
    <description>
    In Perl through 5.26.2, the Archive::Tar module allows remote attackers to bypass a directory-traversal protection mechanism, and overwrite arbitrary files, via an archive file containing a symlink and a regular file with the same name.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12015/">CVE-2018-12015 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12015">CVE-2018-12015 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1096718">SUSE bug 1096718</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099497">SUSE bug 1099497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099507">SUSE bug 1099507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106717">SUSE bug 1106717</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826159" comment="perl-Archive-Tar-1.92-3.el7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812020" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12020</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12020" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12020" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12020" ref_url="https://www.suse.com/security/cve/CVE-2018-12020" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1698-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004384.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1706-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/P4JGHTRKE5HZ6SALKB3UKOBD2PEIBLCP/#P4JGHTRKE5HZ6SALKB3UKOBD2PEIBLCP" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1708-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MMHJU2LXXGSQKQZECK6R6IZXLOPGIU7R/#MMHJU2LXXGSQKQZECK6R6IZXLOPGIU7R" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1722-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BADS6EXC4GPMVQ6Q64ZRGEFK36QLBJBW/#BADS6EXC4GPMVQ6Q64ZRGEFK36QLBJBW" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1724-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XID436D7VNVU3GZHK24YKSUJP37XAITX/#XID436D7VNVU3GZHK24YKSUJP37XAITX" source="SUSE-SU"/>
    <description>
    mainproc.c in GnuPG before 2.2.8 mishandles the original filename during decryption and verification actions, which allows remote attackers to spoof the output that GnuPG sends on file descriptor 2 to other programs that use the "--status-fd 2" option. For example, the OpenPGP data might represent an original filename that contains line feed characters in conjunction with GOODSIG or VALIDSIG status codes.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12020/">CVE-2018-12020 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12020">CVE-2018-12020 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1096745">SUSE bug 1096745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101134">SUSE bug 1101134</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824447" comment="gnupg2-2.0.22-5.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824448" comment="gnupg2-smime-2.0.22-5.el7_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812121" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12121</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12121" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12121" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12121" ref_url="https://www.suse.com/security/cve/CVE-2018-12121" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0088-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MCR24YF2JL7BUZULCM3J6PO547A2FBEH/#MCR24YF2JL7BUZULCM3J6PO547A2FBEH" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0089-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WVHUGID7T2P6NHDOVMAVMRSCBS4GN25L/#WVHUGID7T2P6NHDOVMAVMRSCBS4GN25L" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0234-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TEDLOHSLOHZ36RTEAODDXPLT3YMQBGBI/#TEDLOHSLOHZ36RTEAODDXPLT3YMQBGBI" source="SUSE-SU"/>
    <description>
    Node.js: All versions prior to Node.js 6.15.0, 8.14.0, 10.14.0 and 11.3.0: Denial of Service with large HTTP headers: By using a combination of many requests with maximum sized headers (almost 80 KB per connection), and carefully timed completion of the headers, it is possible to cause the HTTP server to abort from heap allocation failure. Attack potential is mitigated by the use of a load balancer or other proxy layer.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-10-12"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12121/">CVE-2018-12121 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12121">CVE-2018-12121 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1117626">SUSE bug 1117626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127532">SUSE bug 1127532</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826503" comment="http-parser-2.7.1-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826504" comment="http-parser-devel-2.7.1-8.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812126" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12126</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12126" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12126" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126" source="SUSE CVE"/>
		<reference ref_id="MDS-BLOG-SUSE" ref_url="https://www.suse.com/c/suse-addresses-microarchitectural-data-sampling-vulnerabilities/" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2019:2715-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2019-October/012780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2019:2767-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2019-October/012836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1356-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005510.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1547-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<reference ref_id="TID000019406" ref_url="https://www.suse.com/support/kb/doc/?id=000019406" source="SUSE-SU"/>
		<reference ref_id="TID000019455" ref_url="https://www.suse.com/support/kb/doc/?id=000019455" source="SUSE-SU"/>
		<reference ref_id="TID7023736" ref_url="https://www.suse.com/support/kb/doc/?id=7023736" source="SUSE-SU"/>
		<reference ref_id="TID7023881" ref_url="https://www.suse.com/support/kb/doc/?id=7023881" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1402-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/33MA77JSUFVKUR6Z5BDK3Q5WJV5TLMGX/#33MA77JSUFVKUR6Z5BDK3Q5WJV5TLMGX" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1403-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VXQE4RWMS56TBCJGRYUPTRMOPKA4W36G/#VXQE4RWMS56TBCJGRYUPTRMOPKA4W36G" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1404-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZZ2FZBVA3Q7VOUC5KRK2EODJSBYJDCKH/#ZZ2FZBVA3Q7VOUC5KRK2EODJSBYJDCKH" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1405-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QGG5FDRTW3N4DP7WJX4MDPGAOAXLSD6M/#QGG5FDRTW3N4DP7WJX4MDPGAOAXLSD6M" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1407-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UMXCAWC5QTZVSPZOYUW3E3GVJJUKCQ2S/#UMXCAWC5QTZVSPZOYUW3E3GVJJUKCQ2S" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1408-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZSE72NMUCLWUM5YDC3SFM4F3IBT36O4H/#ZSE72NMUCLWUM5YDC3SFM4F3IBT36O4H" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1419-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MBTX5PVRT77LNABRQZJWPEB5R2XII2HZ/#MBTX5PVRT77LNABRQZJWPEB5R2XII2HZ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1420-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PHUAEI2S4AOFDWOX4LHSXMP4KM5BJRWS/#PHUAEI2S4AOFDWOX4LHSXMP4KM5BJRWS" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1468-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7TYDM6JT7REGY5GWV2QCHLGWEXWMFQXU/#7TYDM6JT7REGY5GWV2QCHLGWEXWMFQXU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1505-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EXK6FJ36C5QT4K2AAY7SESWBHLXITKIA/#EXK6FJ36C5QT4K2AAY7SESWBHLXITKIA" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1805-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YSPWDEAWE7P6Q74P7Y3X6GN4DTSDOX2P/#YSPWDEAWE7P6Q74P7Y3X6GN4DTSDOX2P" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1806-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C57DILLST76FNAJLKX2HCZ5LXACTE6OS/#C57DILLST76FNAJLKX2HCZ5LXACTE6OS" source="SUSE-SU"/>
    <description>
    Microarchitectural Store Buffer Data Sampling (MSBDS): Store buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12126">CVE-2018-12126 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1103186">SUSE bug 1103186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111331">SUSE bug 1111331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132686">SUSE bug 1132686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135409">SUSE bug 1135409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135524">SUSE bug 1135524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137916">SUSE bug 1137916</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138534">SUSE bug 1138534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141977">SUSE bug 1141977</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149725">SUSE bug 1149725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149726">SUSE bug 1149726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149729">SUSE bug 1149729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201877">SUSE bug 1201877</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825722" comment="bpftool-3.10.0-957.12.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825723" comment="kernel-3.10.0-957.12.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825724" comment="kernel-abi-whitelists-3.10.0-957.12.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825725" comment="kernel-debug-3.10.0-957.12.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825728" comment="kernel-doc-3.10.0-957.12.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825729" comment="kernel-headers-3.10.0-957.12.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825730" comment="kernel-tools-3.10.0-957.12.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825731" comment="kernel-tools-libs-3.10.0-957.12.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825735" comment="libvirt-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825736" comment="libvirt-admin-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825737" comment="libvirt-bash-completion-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825738" comment="libvirt-client-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825739" comment="libvirt-daemon-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825740" comment="libvirt-daemon-config-network-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825741" comment="libvirt-daemon-config-nwfilter-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825742" comment="libvirt-daemon-driver-interface-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825743" comment="libvirt-daemon-driver-lxc-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825744" comment="libvirt-daemon-driver-network-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825745" comment="libvirt-daemon-driver-nodedev-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825746" comment="libvirt-daemon-driver-nwfilter-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825747" comment="libvirt-daemon-driver-qemu-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825748" comment="libvirt-daemon-driver-secret-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825749" comment="libvirt-daemon-driver-storage-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825750" comment="libvirt-daemon-driver-storage-core-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825751" comment="libvirt-daemon-driver-storage-disk-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825752" comment="libvirt-daemon-driver-storage-gluster-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825753" comment="libvirt-daemon-driver-storage-iscsi-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825754" comment="libvirt-daemon-driver-storage-logical-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825755" comment="libvirt-daemon-driver-storage-mpath-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825756" comment="libvirt-daemon-driver-storage-rbd-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825757" comment="libvirt-daemon-driver-storage-scsi-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825758" comment="libvirt-daemon-kvm-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825759" comment="libvirt-daemon-lxc-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825760" comment="libvirt-devel-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825761" comment="libvirt-docs-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825762" comment="libvirt-libs-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825763" comment="libvirt-lock-sanlock-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825764" comment="libvirt-login-shell-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825765" comment="libvirt-nss-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825733" comment="perf-3.10.0-957.12.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825734" comment="python-perf-3.10.0-957.12.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825766" comment="qemu-img-1.5.3-160.el7_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825767" comment="qemu-kvm-1.5.3-160.el7_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825768" comment="qemu-kvm-common-1.5.3-160.el7_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825769" comment="qemu-kvm-tools-1.5.3-160.el7_6.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812127" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12127</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12127" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12127" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127" source="SUSE CVE"/>
		<reference ref_id="MDS-BLOG-SUSE" ref_url="https://www.suse.com/c/suse-addresses-microarchitectural-data-sampling-vulnerabilities/" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2019:2715-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2019-October/012780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2019:2767-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2019-October/012836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1356-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005510.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1547-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<reference ref_id="TID000019406" ref_url="https://www.suse.com/support/kb/doc/?id=000019406" source="SUSE-SU"/>
		<reference ref_id="TID000019455" ref_url="https://www.suse.com/support/kb/doc/?id=000019455" source="SUSE-SU"/>
		<reference ref_id="TID7023736" ref_url="https://www.suse.com/support/kb/doc/?id=7023736" source="SUSE-SU"/>
		<reference ref_id="TID7023881" ref_url="https://www.suse.com/support/kb/doc/?id=7023881" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1402-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/33MA77JSUFVKUR6Z5BDK3Q5WJV5TLMGX/#33MA77JSUFVKUR6Z5BDK3Q5WJV5TLMGX" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1403-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VXQE4RWMS56TBCJGRYUPTRMOPKA4W36G/#VXQE4RWMS56TBCJGRYUPTRMOPKA4W36G" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1404-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZZ2FZBVA3Q7VOUC5KRK2EODJSBYJDCKH/#ZZ2FZBVA3Q7VOUC5KRK2EODJSBYJDCKH" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1405-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QGG5FDRTW3N4DP7WJX4MDPGAOAXLSD6M/#QGG5FDRTW3N4DP7WJX4MDPGAOAXLSD6M" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1407-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UMXCAWC5QTZVSPZOYUW3E3GVJJUKCQ2S/#UMXCAWC5QTZVSPZOYUW3E3GVJJUKCQ2S" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1408-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZSE72NMUCLWUM5YDC3SFM4F3IBT36O4H/#ZSE72NMUCLWUM5YDC3SFM4F3IBT36O4H" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1419-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MBTX5PVRT77LNABRQZJWPEB5R2XII2HZ/#MBTX5PVRT77LNABRQZJWPEB5R2XII2HZ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1420-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PHUAEI2S4AOFDWOX4LHSXMP4KM5BJRWS/#PHUAEI2S4AOFDWOX4LHSXMP4KM5BJRWS" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1468-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7TYDM6JT7REGY5GWV2QCHLGWEXWMFQXU/#7TYDM6JT7REGY5GWV2QCHLGWEXWMFQXU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1505-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EXK6FJ36C5QT4K2AAY7SESWBHLXITKIA/#EXK6FJ36C5QT4K2AAY7SESWBHLXITKIA" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1805-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YSPWDEAWE7P6Q74P7Y3X6GN4DTSDOX2P/#YSPWDEAWE7P6Q74P7Y3X6GN4DTSDOX2P" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1806-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C57DILLST76FNAJLKX2HCZ5LXACTE6OS/#C57DILLST76FNAJLKX2HCZ5LXACTE6OS" source="SUSE-SU"/>
    <description>
    Microarchitectural Load Port Data Sampling (MLPDS): Load ports on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12127">CVE-2018-12127 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1103186">SUSE bug 1103186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111331">SUSE bug 1111331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132686">SUSE bug 1132686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135409">SUSE bug 1135409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138534">SUSE bug 1138534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141977">SUSE bug 1141977</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201877">SUSE bug 1201877</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825722" comment="bpftool-3.10.0-957.12.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825723" comment="kernel-3.10.0-957.12.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825724" comment="kernel-abi-whitelists-3.10.0-957.12.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825725" comment="kernel-debug-3.10.0-957.12.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825728" comment="kernel-doc-3.10.0-957.12.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825729" comment="kernel-headers-3.10.0-957.12.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825730" comment="kernel-tools-3.10.0-957.12.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825731" comment="kernel-tools-libs-3.10.0-957.12.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825735" comment="libvirt-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825736" comment="libvirt-admin-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825737" comment="libvirt-bash-completion-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825738" comment="libvirt-client-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825739" comment="libvirt-daemon-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825740" comment="libvirt-daemon-config-network-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825741" comment="libvirt-daemon-config-nwfilter-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825742" comment="libvirt-daemon-driver-interface-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825743" comment="libvirt-daemon-driver-lxc-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825744" comment="libvirt-daemon-driver-network-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825745" comment="libvirt-daemon-driver-nodedev-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825746" comment="libvirt-daemon-driver-nwfilter-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825747" comment="libvirt-daemon-driver-qemu-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825748" comment="libvirt-daemon-driver-secret-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825749" comment="libvirt-daemon-driver-storage-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825750" comment="libvirt-daemon-driver-storage-core-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825751" comment="libvirt-daemon-driver-storage-disk-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825752" comment="libvirt-daemon-driver-storage-gluster-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825753" comment="libvirt-daemon-driver-storage-iscsi-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825754" comment="libvirt-daemon-driver-storage-logical-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825755" comment="libvirt-daemon-driver-storage-mpath-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825756" comment="libvirt-daemon-driver-storage-rbd-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825757" comment="libvirt-daemon-driver-storage-scsi-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825758" comment="libvirt-daemon-kvm-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825759" comment="libvirt-daemon-lxc-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825760" comment="libvirt-devel-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825761" comment="libvirt-docs-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825762" comment="libvirt-libs-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825763" comment="libvirt-lock-sanlock-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825764" comment="libvirt-login-shell-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825765" comment="libvirt-nss-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825733" comment="perf-3.10.0-957.12.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825734" comment="python-perf-3.10.0-957.12.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825766" comment="qemu-img-1.5.3-160.el7_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825767" comment="qemu-kvm-1.5.3-160.el7_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825768" comment="qemu-kvm-common-1.5.3-160.el7_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825769" comment="qemu-kvm-tools-1.5.3-160.el7_6.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812130" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12130</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12130" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12130" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130" source="SUSE CVE"/>
		<reference ref_id="MDS-BLOG-SUSE" ref_url="https://www.suse.com/c/suse-addresses-microarchitectural-data-sampling-vulnerabilities/" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2019:2715-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2019-October/012780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2019:2767-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2019-October/012836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1356-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005510.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1547-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<reference ref_id="TID000019406" ref_url="https://www.suse.com/support/kb/doc/?id=000019406" source="SUSE-SU"/>
		<reference ref_id="TID000019455" ref_url="https://www.suse.com/support/kb/doc/?id=000019455" source="SUSE-SU"/>
		<reference ref_id="TID7023736" ref_url="https://www.suse.com/support/kb/doc/?id=7023736" source="SUSE-SU"/>
		<reference ref_id="TID7023881" ref_url="https://www.suse.com/support/kb/doc/?id=7023881" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1402-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/33MA77JSUFVKUR6Z5BDK3Q5WJV5TLMGX/#33MA77JSUFVKUR6Z5BDK3Q5WJV5TLMGX" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1403-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VXQE4RWMS56TBCJGRYUPTRMOPKA4W36G/#VXQE4RWMS56TBCJGRYUPTRMOPKA4W36G" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1404-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZZ2FZBVA3Q7VOUC5KRK2EODJSBYJDCKH/#ZZ2FZBVA3Q7VOUC5KRK2EODJSBYJDCKH" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1405-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QGG5FDRTW3N4DP7WJX4MDPGAOAXLSD6M/#QGG5FDRTW3N4DP7WJX4MDPGAOAXLSD6M" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1407-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UMXCAWC5QTZVSPZOYUW3E3GVJJUKCQ2S/#UMXCAWC5QTZVSPZOYUW3E3GVJJUKCQ2S" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1408-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZSE72NMUCLWUM5YDC3SFM4F3IBT36O4H/#ZSE72NMUCLWUM5YDC3SFM4F3IBT36O4H" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1419-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MBTX5PVRT77LNABRQZJWPEB5R2XII2HZ/#MBTX5PVRT77LNABRQZJWPEB5R2XII2HZ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1420-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PHUAEI2S4AOFDWOX4LHSXMP4KM5BJRWS/#PHUAEI2S4AOFDWOX4LHSXMP4KM5BJRWS" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1468-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7TYDM6JT7REGY5GWV2QCHLGWEXWMFQXU/#7TYDM6JT7REGY5GWV2QCHLGWEXWMFQXU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1505-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EXK6FJ36C5QT4K2AAY7SESWBHLXITKIA/#EXK6FJ36C5QT4K2AAY7SESWBHLXITKIA" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1805-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YSPWDEAWE7P6Q74P7Y3X6GN4DTSDOX2P/#YSPWDEAWE7P6Q74P7Y3X6GN4DTSDOX2P" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1806-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C57DILLST76FNAJLKX2HCZ5LXACTE6OS/#C57DILLST76FNAJLKX2HCZ5LXACTE6OS" source="SUSE-SU"/>
    <description>
    Microarchitectural Fill Buffer Data Sampling (MFBDS): Fill buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12130">CVE-2018-12130 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1103186">SUSE bug 1103186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111331">SUSE bug 1111331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132686">SUSE bug 1132686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135409">SUSE bug 1135409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137916">SUSE bug 1137916</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138534">SUSE bug 1138534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141977">SUSE bug 1141977</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201877">SUSE bug 1201877</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825722" comment="bpftool-3.10.0-957.12.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825723" comment="kernel-3.10.0-957.12.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825724" comment="kernel-abi-whitelists-3.10.0-957.12.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825725" comment="kernel-debug-3.10.0-957.12.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825728" comment="kernel-doc-3.10.0-957.12.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825729" comment="kernel-headers-3.10.0-957.12.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825730" comment="kernel-tools-3.10.0-957.12.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825731" comment="kernel-tools-libs-3.10.0-957.12.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825735" comment="libvirt-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825736" comment="libvirt-admin-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825737" comment="libvirt-bash-completion-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825738" comment="libvirt-client-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825739" comment="libvirt-daemon-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825740" comment="libvirt-daemon-config-network-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825741" comment="libvirt-daemon-config-nwfilter-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825742" comment="libvirt-daemon-driver-interface-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825743" comment="libvirt-daemon-driver-lxc-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825744" comment="libvirt-daemon-driver-network-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825745" comment="libvirt-daemon-driver-nodedev-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825746" comment="libvirt-daemon-driver-nwfilter-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825747" comment="libvirt-daemon-driver-qemu-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825748" comment="libvirt-daemon-driver-secret-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825749" comment="libvirt-daemon-driver-storage-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825750" comment="libvirt-daemon-driver-storage-core-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825751" comment="libvirt-daemon-driver-storage-disk-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825752" comment="libvirt-daemon-driver-storage-gluster-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825753" comment="libvirt-daemon-driver-storage-iscsi-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825754" comment="libvirt-daemon-driver-storage-logical-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825755" comment="libvirt-daemon-driver-storage-mpath-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825756" comment="libvirt-daemon-driver-storage-rbd-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825757" comment="libvirt-daemon-driver-storage-scsi-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825758" comment="libvirt-daemon-kvm-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825759" comment="libvirt-daemon-lxc-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825760" comment="libvirt-devel-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825761" comment="libvirt-docs-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825762" comment="libvirt-libs-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825763" comment="libvirt-lock-sanlock-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825764" comment="libvirt-login-shell-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825765" comment="libvirt-nss-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825733" comment="perf-3.10.0-957.12.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825734" comment="python-perf-3.10.0-957.12.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825766" comment="qemu-img-1.5.3-160.el7_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825767" comment="qemu-kvm-1.5.3-160.el7_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825768" comment="qemu-kvm-common-1.5.3-160.el7_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825769" comment="qemu-kvm-tools-1.5.3-160.el7_6.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12180</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12180" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12180" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12180" ref_url="https://www.suse.com/security/cve/CVE-2018-12180" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005183.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0348-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XVUY536UPLK2DNFUFIBL26BWAFW2E4DE/#XVUY536UPLK2DNFUFIBL26BWAFW2E4DE" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1083-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RBHHJFWMTAGCQFDWWVONGJIFVT7IEDVF/#RBHHJFWMTAGCQFDWWVONGJIFVT7IEDVF" source="SUSE-SU"/>
    <description>
    Buffer overflow in BlockIo service for EDK II may allow an unauthenticated user to potentially enable escalation of privilege, information disclosure and/or denial of service via network access.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12180/">CVE-2018-12180 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12180">CVE-2018-12180 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1127820">SUSE bug 1127820</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825686" comment="OVMF-20180508-3.gitee3198e672e2.el7_6.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812181" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12181</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12181" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12181" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12181" ref_url="https://www.suse.com/security/cve/CVE-2018-12181" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005268.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1139-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/I3AAA6OMP6KUQFDOFDNEHGL4FTEWD5S7/#I3AAA6OMP6KUQFDOFDNEHGL4FTEWD5S7" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1172-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J6MT2HJ5QHVTLG5DOK6Y647K5FXKIIDP/#J6MT2HJ5QHVTLG5DOK6Y647K5FXKIIDP" source="SUSE-SU"/>
    <description>
    Stack overflow in corrupted bmp for EDK II may allow unprivileged user to potentially enable denial of service or elevation of privilege via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12181/">CVE-2018-12181 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12181">CVE-2018-12181 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1128503">SUSE bug 1128503</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826217" comment="OVMF-20180508-6.gitee3198e672e2.el7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812207" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12207</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12207" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12207" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12207" ref_url="https://www.suse.com/security/cve/CVE-2018-12207" source="SUSE CVE"/>
		<reference ref_id="SUSE-BLOG-TAA-IFU" ref_url="https://www.suse.com/c/suse-addresses-transactional-asynchronous-abort-and-machine-check-error-on-page-size-changes-issues/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2946-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192946-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2947-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192947-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2953-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192953-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2955-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192955-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2956-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2961-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192961-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3340-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007221.html" source="SUSE-SU"/>
		<reference ref_id="TID000019411" ref_url="https://www.suse.com/support/kb/doc/?id=000019411" source="SUSE-SU"/>
		<reference ref_id="TID7023735" ref_url="https://www.suse.com/support/kb/doc/?id=7023735" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2494-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/E37URKMMJAKXS5WM65BEKIVDDLOSR6PW/#E37URKMMJAKXS5WM65BEKIVDDLOSR6PW" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2503-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GT2JTOAOVM6XT2DFUS6CAXI4NAAVMRVR/#GT2JTOAOVM6XT2DFUS6CAXI4NAAVMRVR" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2505-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YGK33QVVCMOM3HRWRJ6FPIFV2JBB4XDB/#YGK33QVVCMOM3HRWRJ6FPIFV2JBB4XDB" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2506-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R6YJ2KCZGK5VBSLWES67ERVZEO724CJC/#R6YJ2KCZGK5VBSLWES67ERVZEO724CJC" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2507-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/45LLGKHM3X6KQJN67OZHE3KEGCRBVGEJ/#45LLGKHM3X6KQJN67OZHE3KEGCRBVGEJ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2510-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KGVFZGJMBR53343ITOTWO7YW2JVKGHDT/#KGVFZGJMBR53343ITOTWO7YW2JVKGHDT" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2710-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VPOZE7PRHYWJK54T4PNLQG6ZIUGENA75/#VPOZE7PRHYWJK54T4PNLQG6ZIUGENA75" source="SUSE-SU"/>
    <description>
    Improper invalidation for page table updates by a virtual guest operating system for multiple Intel(R) Processors may allow an authenticated user to potentially enable denial of service of the host system via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12207/">CVE-2018-12207 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12207">CVE-2018-12207 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1117665">SUSE bug 1117665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139073">SUSE bug 1139073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152505">SUSE bug 1152505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155812">SUSE bug 1155812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155817">SUSE bug 1155817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155945">SUSE bug 1155945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201877">SUSE bug 1201877</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826733" comment="bpftool-3.10.0-1062.4.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826734" comment="kernel-3.10.0-1062.4.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826735" comment="kernel-abi-whitelists-3.10.0-1062.4.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826736" comment="kernel-debug-3.10.0-1062.4.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826739" comment="kernel-doc-3.10.0-1062.4.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826740" comment="kernel-headers-3.10.0-1062.4.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826741" comment="kernel-tools-3.10.0-1062.4.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826742" comment="kernel-tools-libs-3.10.0-1062.4.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826744" comment="perf-3.10.0-1062.4.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826745" comment="python-perf-3.10.0-1062.4.2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812264" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12264</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12264" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12264" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12264" ref_url="https://www.suse.com/security/cve/CVE-2018-12264" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006676.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3306-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LDUEPY2LCBKGOCGYTU622SVI6AZ2LF7X/#LDUEPY2LCBKGOCGYTU622SVI6AZ2LF7X" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0482-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U7X32HSPSOKHILGP4IPOOWMROAKSPGIY/" source="SUSE-SU"/>
    <description>
    Exiv2 0.26 has integer overflows in LoaderTiff::getData() in preview.cpp, leading to an out-of-bounds read in Exiv2::ValueType::setDataArea in value.hpp.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12264/">CVE-2018-12264 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12264">CVE-2018-12264 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1097600">SUSE bug 1097600</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826187" comment="exiv2-0.27.0-2.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826188" comment="exiv2-devel-0.27.0-2.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826189" comment="exiv2-doc-0.27.0-2.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826190" comment="exiv2-libs-0.27.0-2.el7_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812265" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12265</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12265" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12265" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12265" ref_url="https://www.suse.com/security/cve/CVE-2018-12265" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006676.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3306-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LDUEPY2LCBKGOCGYTU622SVI6AZ2LF7X/#LDUEPY2LCBKGOCGYTU622SVI6AZ2LF7X" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0482-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U7X32HSPSOKHILGP4IPOOWMROAKSPGIY/" source="SUSE-SU"/>
    <description>
    Exiv2 0.26 has an integer overflow in the LoaderExifJpeg class in preview.cpp, leading to an out-of-bounds read in Exiv2::MemIo::read in basicio.cpp.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12265/">CVE-2018-12265 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12265">CVE-2018-12265 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1097599">SUSE bug 1097599</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826187" comment="exiv2-0.27.0-2.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826188" comment="exiv2-devel-0.27.0-2.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826189" comment="exiv2-doc-0.27.0-2.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826190" comment="exiv2-libs-0.27.0-2.el7_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812327" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12327</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12327" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12327" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12327" ref_url="https://www.suse.com/security/cve/CVE-2018-12327" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3342-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005391.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004774.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3356-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004776.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004780.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3438-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PKRVYWV7ADTXKBWHHSHJ7INWYVOGYUE6/#PKRVYWV7ADTXKBWHHSHJ7INWYVOGYUE6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3452-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IOENUUGH5TTMZO64I6VI3H3WSEJ666LX/#IOENUUGH5TTMZO64I6VI3H3WSEJ666LX" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in ntpq and ntpdc of NTP version 4.2.8p11 allows an attacker to achieve code execution or escalate to higher privileges via a long string as the argument for an IPv4 or IPv6 command-line parameter. NOTE: It is unclear whether there are any common situations in which ntpq or ntpdc is used with a command line from an untrusted source.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12327/">CVE-2018-12327 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12327">CVE-2018-12327 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1098531">SUSE bug 1098531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107887">SUSE bug 1107887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111552">SUSE bug 1111552</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111853">SUSE bug 1111853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155513">SUSE bug 1155513</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826115" comment="ntp-4.2.6p5-29.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826116" comment="ntp-doc-4.2.6p5-29.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826117" comment="ntp-perl-4.2.6p5-29.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826118" comment="ntpdate-4.2.6p5-29.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826119" comment="sntp-4.2.6p5-29.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812359" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12359</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12359" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12359" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12359" ref_url="https://www.suse.com/security/cve/CVE-2018-12359" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004685.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004744.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1833-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RJT5QZI4AEZFZZAERFU4PCCU23J33X2Q/#RJT5QZI4AEZFZZAERFU4PCCU23J33X2Q" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1905-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NSDGXV6BYAYITPPHPUOJNEJUIM4AZXG7/#NSDGXV6BYAYITPPHPUOJNEJUIM4AZXG7" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1907-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2PTHFVR36FU2ABANH7SNYHEYYHW4B7CG/#2PTHFVR36FU2ABANH7SNYHEYYHW4B7CG" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2330-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NFZYHL4CEEO4DFGADLJSGPBS23HBMR45/#NFZYHL4CEEO4DFGADLJSGPBS23HBMR45" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2658-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y6J6RQFF6FJF5ANMYWEAOTUWGLGJPBHL/#Y6J6RQFF6FJF5ANMYWEAOTUWGLGJPBHL" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2807-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GLUOSK2EJUPHGOY64OTIF2JORV62RASV/#GLUOSK2EJUPHGOY64OTIF2JORV62RASV" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3051-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MTTZ6YPTQZTRHJWNCF4KNXDHV5N6Y2CU/#MTTZ6YPTQZTRHJWNCF4KNXDHV5N6Y2CU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3687-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BBHDVB7NPDAZXEW2BECURXKYFEGTTUL4/#BBHDVB7NPDAZXEW2BECURXKYFEGTTUL4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A buffer overflow can occur when rendering canvas content while adjusting the height and width of the canvas element dynamically, causing data to be written outside of the currently computed boundaries. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 60, Thunderbird &lt; 52.9, Firefox ESR &lt; 60.1, Firefox ESR &lt; 52.9, and Firefox &lt; 61.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12359/">CVE-2018-12359 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12359">CVE-2018-12359 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1098998">SUSE bug 1098998</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824439" comment="firefox-60.1.0-4.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824468" comment="thunderbird-52.9.1-1.el7_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812360" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12360</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12360" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12360" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12360" ref_url="https://www.suse.com/security/cve/CVE-2018-12360" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004685.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004744.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1833-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RJT5QZI4AEZFZZAERFU4PCCU23J33X2Q/#RJT5QZI4AEZFZZAERFU4PCCU23J33X2Q" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1905-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NSDGXV6BYAYITPPHPUOJNEJUIM4AZXG7/#NSDGXV6BYAYITPPHPUOJNEJUIM4AZXG7" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1907-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2PTHFVR36FU2ABANH7SNYHEYYHW4B7CG/#2PTHFVR36FU2ABANH7SNYHEYYHW4B7CG" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2330-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NFZYHL4CEEO4DFGADLJSGPBS23HBMR45/#NFZYHL4CEEO4DFGADLJSGPBS23HBMR45" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2658-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y6J6RQFF6FJF5ANMYWEAOTUWGLGJPBHL/#Y6J6RQFF6FJF5ANMYWEAOTUWGLGJPBHL" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2807-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GLUOSK2EJUPHGOY64OTIF2JORV62RASV/#GLUOSK2EJUPHGOY64OTIF2JORV62RASV" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3051-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MTTZ6YPTQZTRHJWNCF4KNXDHV5N6Y2CU/#MTTZ6YPTQZTRHJWNCF4KNXDHV5N6Y2CU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3687-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BBHDVB7NPDAZXEW2BECURXKYFEGTTUL4/#BBHDVB7NPDAZXEW2BECURXKYFEGTTUL4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability can occur when deleting an input element during a mutation event handler triggered by focusing that element. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 60, Thunderbird &lt; 52.9, Firefox ESR &lt; 60.1, Firefox ESR &lt; 52.9, and Firefox &lt; 61.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12360/">CVE-2018-12360 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12360">CVE-2018-12360 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1098998">SUSE bug 1098998</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824439" comment="firefox-60.1.0-4.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824468" comment="thunderbird-52.9.1-1.el7_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812362" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12362</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12362" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12362" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12362" ref_url="https://www.suse.com/security/cve/CVE-2018-12362" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004685.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004744.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1833-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RJT5QZI4AEZFZZAERFU4PCCU23J33X2Q/#RJT5QZI4AEZFZZAERFU4PCCU23J33X2Q" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1905-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NSDGXV6BYAYITPPHPUOJNEJUIM4AZXG7/#NSDGXV6BYAYITPPHPUOJNEJUIM4AZXG7" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1907-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2PTHFVR36FU2ABANH7SNYHEYYHW4B7CG/#2PTHFVR36FU2ABANH7SNYHEYYHW4B7CG" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2330-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NFZYHL4CEEO4DFGADLJSGPBS23HBMR45/#NFZYHL4CEEO4DFGADLJSGPBS23HBMR45" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2658-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y6J6RQFF6FJF5ANMYWEAOTUWGLGJPBHL/#Y6J6RQFF6FJF5ANMYWEAOTUWGLGJPBHL" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2807-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GLUOSK2EJUPHGOY64OTIF2JORV62RASV/#GLUOSK2EJUPHGOY64OTIF2JORV62RASV" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3051-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MTTZ6YPTQZTRHJWNCF4KNXDHV5N6Y2CU/#MTTZ6YPTQZTRHJWNCF4KNXDHV5N6Y2CU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3687-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BBHDVB7NPDAZXEW2BECURXKYFEGTTUL4/#BBHDVB7NPDAZXEW2BECURXKYFEGTTUL4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    An integer overflow can occur during graphics operations done by the Supplemental Streaming SIMD Extensions 3 (SSSE3) scaler, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 60, Thunderbird &lt; 52.9, Firefox ESR &lt; 60.1, Firefox ESR &lt; 52.9, and Firefox &lt; 61.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12362/">CVE-2018-12362 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12362">CVE-2018-12362 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1098998">SUSE bug 1098998</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824439" comment="firefox-60.1.0-4.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824468" comment="thunderbird-52.9.1-1.el7_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812363" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12363</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12363" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12363" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12363" ref_url="https://www.suse.com/security/cve/CVE-2018-12363" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004685.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004744.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1833-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RJT5QZI4AEZFZZAERFU4PCCU23J33X2Q/#RJT5QZI4AEZFZZAERFU4PCCU23J33X2Q" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1905-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NSDGXV6BYAYITPPHPUOJNEJUIM4AZXG7/#NSDGXV6BYAYITPPHPUOJNEJUIM4AZXG7" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1907-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2PTHFVR36FU2ABANH7SNYHEYYHW4B7CG/#2PTHFVR36FU2ABANH7SNYHEYYHW4B7CG" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2330-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NFZYHL4CEEO4DFGADLJSGPBS23HBMR45/#NFZYHL4CEEO4DFGADLJSGPBS23HBMR45" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2658-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y6J6RQFF6FJF5ANMYWEAOTUWGLGJPBHL/#Y6J6RQFF6FJF5ANMYWEAOTUWGLGJPBHL" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2807-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GLUOSK2EJUPHGOY64OTIF2JORV62RASV/#GLUOSK2EJUPHGOY64OTIF2JORV62RASV" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3051-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MTTZ6YPTQZTRHJWNCF4KNXDHV5N6Y2CU/#MTTZ6YPTQZTRHJWNCF4KNXDHV5N6Y2CU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3687-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BBHDVB7NPDAZXEW2BECURXKYFEGTTUL4/#BBHDVB7NPDAZXEW2BECURXKYFEGTTUL4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability can occur when script uses mutation events to move DOM nodes between documents, resulting in the old document that held the node being freed but the node still having a pointer referencing it. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 60, Thunderbird &lt; 52.9, Firefox ESR &lt; 60.1, Firefox ESR &lt; 52.9, and Firefox &lt; 61.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12363/">CVE-2018-12363 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12363">CVE-2018-12363 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1098998">SUSE bug 1098998</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824439" comment="firefox-60.1.0-4.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824468" comment="thunderbird-52.9.1-1.el7_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812364" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12364</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12364" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12364" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12364" ref_url="https://www.suse.com/security/cve/CVE-2018-12364" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004685.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004744.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1833-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RJT5QZI4AEZFZZAERFU4PCCU23J33X2Q/#RJT5QZI4AEZFZZAERFU4PCCU23J33X2Q" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1905-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NSDGXV6BYAYITPPHPUOJNEJUIM4AZXG7/#NSDGXV6BYAYITPPHPUOJNEJUIM4AZXG7" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1907-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2PTHFVR36FU2ABANH7SNYHEYYHW4B7CG/#2PTHFVR36FU2ABANH7SNYHEYYHW4B7CG" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2330-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NFZYHL4CEEO4DFGADLJSGPBS23HBMR45/#NFZYHL4CEEO4DFGADLJSGPBS23HBMR45" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2658-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y6J6RQFF6FJF5ANMYWEAOTUWGLGJPBHL/#Y6J6RQFF6FJF5ANMYWEAOTUWGLGJPBHL" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2807-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GLUOSK2EJUPHGOY64OTIF2JORV62RASV/#GLUOSK2EJUPHGOY64OTIF2JORV62RASV" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3051-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MTTZ6YPTQZTRHJWNCF4KNXDHV5N6Y2CU/#MTTZ6YPTQZTRHJWNCF4KNXDHV5N6Y2CU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3687-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BBHDVB7NPDAZXEW2BECURXKYFEGTTUL4/#BBHDVB7NPDAZXEW2BECURXKYFEGTTUL4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    NPAPI plugins, such as Adobe Flash, can send non-simple cross-origin requests, bypassing CORS by making a same-origin POST that does a 307 redirect to the target site. This allows for a malicious site to engage in cross-site request forgery (CSRF) attacks. This vulnerability affects Thunderbird &lt; 60, Thunderbird &lt; 52.9, Firefox ESR &lt; 60.1, Firefox ESR &lt; 52.9, and Firefox &lt; 61.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12364/">CVE-2018-12364 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12364">CVE-2018-12364 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1098998">SUSE bug 1098998</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824439" comment="firefox-60.1.0-4.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824468" comment="thunderbird-52.9.1-1.el7_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812365" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12365</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12365" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12365" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12365" ref_url="https://www.suse.com/security/cve/CVE-2018-12365" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004685.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004744.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1833-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RJT5QZI4AEZFZZAERFU4PCCU23J33X2Q/#RJT5QZI4AEZFZZAERFU4PCCU23J33X2Q" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1905-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NSDGXV6BYAYITPPHPUOJNEJUIM4AZXG7/#NSDGXV6BYAYITPPHPUOJNEJUIM4AZXG7" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1907-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2PTHFVR36FU2ABANH7SNYHEYYHW4B7CG/#2PTHFVR36FU2ABANH7SNYHEYYHW4B7CG" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2330-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NFZYHL4CEEO4DFGADLJSGPBS23HBMR45/#NFZYHL4CEEO4DFGADLJSGPBS23HBMR45" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2658-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y6J6RQFF6FJF5ANMYWEAOTUWGLGJPBHL/#Y6J6RQFF6FJF5ANMYWEAOTUWGLGJPBHL" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2807-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GLUOSK2EJUPHGOY64OTIF2JORV62RASV/#GLUOSK2EJUPHGOY64OTIF2JORV62RASV" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3051-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MTTZ6YPTQZTRHJWNCF4KNXDHV5N6Y2CU/#MTTZ6YPTQZTRHJWNCF4KNXDHV5N6Y2CU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3687-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BBHDVB7NPDAZXEW2BECURXKYFEGTTUL4/#BBHDVB7NPDAZXEW2BECURXKYFEGTTUL4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A compromised IPC child process can escape the content sandbox and list the names of arbitrary files on the file system without user consent or interaction. This could result in exposure of private local files. This vulnerability affects Thunderbird &lt; 60, Thunderbird &lt; 52.9, Firefox ESR &lt; 60.1, Firefox ESR &lt; 52.9, and Firefox &lt; 61.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12365/">CVE-2018-12365 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12365">CVE-2018-12365 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1098998">SUSE bug 1098998</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824439" comment="firefox-60.1.0-4.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824468" comment="thunderbird-52.9.1-1.el7_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812366" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12366</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12366" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12366" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12366" ref_url="https://www.suse.com/security/cve/CVE-2018-12366" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004685.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004744.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1833-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RJT5QZI4AEZFZZAERFU4PCCU23J33X2Q/#RJT5QZI4AEZFZZAERFU4PCCU23J33X2Q" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1905-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NSDGXV6BYAYITPPHPUOJNEJUIM4AZXG7/#NSDGXV6BYAYITPPHPUOJNEJUIM4AZXG7" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1907-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2PTHFVR36FU2ABANH7SNYHEYYHW4B7CG/#2PTHFVR36FU2ABANH7SNYHEYYHW4B7CG" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2330-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NFZYHL4CEEO4DFGADLJSGPBS23HBMR45/#NFZYHL4CEEO4DFGADLJSGPBS23HBMR45" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2658-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y6J6RQFF6FJF5ANMYWEAOTUWGLGJPBHL/#Y6J6RQFF6FJF5ANMYWEAOTUWGLGJPBHL" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2807-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GLUOSK2EJUPHGOY64OTIF2JORV62RASV/#GLUOSK2EJUPHGOY64OTIF2JORV62RASV" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3051-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MTTZ6YPTQZTRHJWNCF4KNXDHV5N6Y2CU/#MTTZ6YPTQZTRHJWNCF4KNXDHV5N6Y2CU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3687-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BBHDVB7NPDAZXEW2BECURXKYFEGTTUL4/#BBHDVB7NPDAZXEW2BECURXKYFEGTTUL4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    An invalid grid size during QCMS (color profile) transformations can result in the out-of-bounds read interpreted as a float value. This could leak private data into the output. This vulnerability affects Thunderbird &lt; 60, Thunderbird &lt; 52.9, Firefox ESR &lt; 60.1, Firefox ESR &lt; 52.9, and Firefox &lt; 61.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12366/">CVE-2018-12366 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12366">CVE-2018-12366 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1098998">SUSE bug 1098998</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824439" comment="firefox-60.1.0-4.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824468" comment="thunderbird-52.9.1-1.el7_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812372" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12372</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12372" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12372" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12372" ref_url="https://www.suse.com/security/cve/CVE-2018-12372" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004369.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1905-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NSDGXV6BYAYITPPHPUOJNEJUIM4AZXG7/#NSDGXV6BYAYITPPHPUOJNEJUIM4AZXG7" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1907-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2PTHFVR36FU2ABANH7SNYHEYYHW4B7CG/#2PTHFVR36FU2ABANH7SNYHEYYHW4B7CG" source="SUSE-SU"/>
    <description>
    Decrypted S/MIME parts, when included in HTML crafted for an attack, can leak plaintext when included in a a HTML reply/forward. This vulnerability affects Thunderbird &lt; 52.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12372/">CVE-2018-12372 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12372">CVE-2018-12372 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1100082">SUSE bug 1100082</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824468" comment="thunderbird-52.9.1-1.el7_5 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812373" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12373</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12373" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12373" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12373" ref_url="https://www.suse.com/security/cve/CVE-2018-12373" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004369.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1905-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NSDGXV6BYAYITPPHPUOJNEJUIM4AZXG7/#NSDGXV6BYAYITPPHPUOJNEJUIM4AZXG7" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1907-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2PTHFVR36FU2ABANH7SNYHEYYHW4B7CG/#2PTHFVR36FU2ABANH7SNYHEYYHW4B7CG" source="SUSE-SU"/>
    <description>
    dDecrypted S/MIME parts hidden with CSS or the plaintext HTML tag can leak plaintext when included in a HTML reply/forward. This vulnerability affects Thunderbird &lt; 52.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12373/">CVE-2018-12373 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12373">CVE-2018-12373 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1100079">SUSE bug 1100079</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824468" comment="thunderbird-52.9.1-1.el7_5 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812374" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12374</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12374" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12374" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12374" ref_url="https://www.suse.com/security/cve/CVE-2018-12374" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004369.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1905-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NSDGXV6BYAYITPPHPUOJNEJUIM4AZXG7/#NSDGXV6BYAYITPPHPUOJNEJUIM4AZXG7" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1907-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2PTHFVR36FU2ABANH7SNYHEYYHW4B7CG/#2PTHFVR36FU2ABANH7SNYHEYYHW4B7CG" source="SUSE-SU"/>
    <description>
    Plaintext of decrypted emails can leak through by user submitting an embedded form by pressing enter key within a text input field. This vulnerability affects Thunderbird &lt; 52.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12374/">CVE-2018-12374 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12374">CVE-2018-12374 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1100081">SUSE bug 1100081</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824468" comment="thunderbird-52.9.1-1.el7_5 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812376" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12376</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12376" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12376" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12376" ref_url="https://www.suse.com/security/cve/CVE-2018-12376" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3591-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004918.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2674-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BM5IL3XEYSPZSNIUEK2GSPH74KS7Z77J/#BM5IL3XEYSPZSNIUEK2GSPH74KS7Z77J" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3051-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MTTZ6YPTQZTRHJWNCF4KNXDHV5N6Y2CU/#MTTZ6YPTQZTRHJWNCF4KNXDHV5N6Y2CU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3687-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BBHDVB7NPDAZXEW2BECURXKYFEGTTUL4/#BBHDVB7NPDAZXEW2BECURXKYFEGTTUL4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Memory safety bugs present in Firefox 61 and Firefox ESR 60.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox &lt; 62, Firefox ESR &lt; 60.2, and Thunderbird &lt; 60.2.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-11-27"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2018-12376/">CVE-2018-12376 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12376">CVE-2018-12376 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1107343">SUSE bug 1107343</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824555" comment="firefox-60.2.0-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825374" comment="thunderbird-60.2.1-4.el7_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812377" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12377</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12377" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12377" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12377" ref_url="https://www.suse.com/security/cve/CVE-2018-12377" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3591-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004918.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2674-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BM5IL3XEYSPZSNIUEK2GSPH74KS7Z77J/#BM5IL3XEYSPZSNIUEK2GSPH74KS7Z77J" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3051-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MTTZ6YPTQZTRHJWNCF4KNXDHV5N6Y2CU/#MTTZ6YPTQZTRHJWNCF4KNXDHV5N6Y2CU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3687-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BBHDVB7NPDAZXEW2BECURXKYFEGTTUL4/#BBHDVB7NPDAZXEW2BECURXKYFEGTTUL4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability can occur when refresh driver timers are refreshed in some circumstances during shutdown when the timer is deleted while still in use. This results in a potentially exploitable crash. This vulnerability affects Firefox &lt; 62, Firefox ESR &lt; 60.2, and Thunderbird &lt; 60.2.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-11-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12377/">CVE-2018-12377 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12377">CVE-2018-12377 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1107343">SUSE bug 1107343</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824555" comment="firefox-60.2.0-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825374" comment="thunderbird-60.2.1-4.el7_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812378" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12378</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12378" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12378" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12378" ref_url="https://www.suse.com/security/cve/CVE-2018-12378" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3591-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004918.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2674-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BM5IL3XEYSPZSNIUEK2GSPH74KS7Z77J/#BM5IL3XEYSPZSNIUEK2GSPH74KS7Z77J" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3051-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MTTZ6YPTQZTRHJWNCF4KNXDHV5N6Y2CU/#MTTZ6YPTQZTRHJWNCF4KNXDHV5N6Y2CU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3687-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BBHDVB7NPDAZXEW2BECURXKYFEGTTUL4/#BBHDVB7NPDAZXEW2BECURXKYFEGTTUL4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability can occur when an IndexedDB index is deleted while still in use by JavaScript code that is providing payload values to be stored. This results in a potentially exploitable crash. This vulnerability affects Firefox &lt; 62, Firefox ESR &lt; 60.2, and Thunderbird &lt; 60.2.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-11-27"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12378/">CVE-2018-12378 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12378">CVE-2018-12378 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1107343">SUSE bug 1107343</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824555" comment="firefox-60.2.0-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825374" comment="thunderbird-60.2.1-4.el7_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812379" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12379</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12379" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12379" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12379" ref_url="https://www.suse.com/security/cve/CVE-2018-12379" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3591-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004918.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    When the Mozilla Updater opens a MAR format file which contains a very long item filename, an out-of-bounds write can be triggered, leading to a potentially exploitable crash. This requires running the Mozilla Updater manually on the local system with the malicious MAR file in order to occur. This vulnerability affects Firefox &lt; 62, Firefox ESR &lt; 60.2, and Thunderbird &lt; 60.2.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-12-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12379/">CVE-2018-12379 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12379">CVE-2018-12379 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1107343">SUSE bug 1107343</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824555" comment="firefox-60.2.0-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825374" comment="thunderbird-60.2.1-4.el7_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812383" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12383</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12383" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12383" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12383" ref_url="https://www.suse.com/security/cve/CVE-2018-12383" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3591-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004918.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2817-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7T7NT74JOS2WWPKYBWAJ5H5TOMRV6Q2M/#7T7NT74JOS2WWPKYBWAJ5H5TOMRV6Q2M" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3051-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MTTZ6YPTQZTRHJWNCF4KNXDHV5N6Y2CU/#MTTZ6YPTQZTRHJWNCF4KNXDHV5N6Y2CU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3687-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BBHDVB7NPDAZXEW2BECURXKYFEGTTUL4/#BBHDVB7NPDAZXEW2BECURXKYFEGTTUL4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    If a user saved passwords before Firefox 58 and then later set a master password, an unencrypted copy of these passwords is still accessible. This is because the older stored password file was not deleted when the data was copied to a new format starting in Firefox 58. The new master password is added only on the new file. This could allow the exposure of stored password data outside of user expectations. This vulnerability affects Firefox &lt; 62, Firefox ESR &lt; 60.2.1, and Thunderbird &lt; 60.2.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-11-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-12383/">CVE-2018-12383 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12383">CVE-2018-12383 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1107343">SUSE bug 1107343</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824589" comment="firefox-60.2.1-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825374" comment="thunderbird-60.2.1-4.el7_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812384" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12384</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12384" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12384" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12384" ref_url="https://www.suse.com/security/cve/CVE-2018-12384" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4236-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005339.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4117-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZVVV5W3TKACNO7E6UUTICT7MG33NV5XN/#ZVVV5W3TKACNO7E6UUTICT7MG33NV5XN" source="SUSE-SU"/>
    <description>
    When handling a SSLv2-compatible ClientHello request, the server doesn't generate a new random value but sends an all-zero value instead. This results in full malleability of the ClientHello for SSLv2 used for TLS 1.2 in all versions prior to NSS 3.39. This does not impact TLS 1.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12384/">CVE-2018-12384 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12384">CVE-2018-12384 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1106873">SUSE bug 1106873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119105">SUSE bug 1119105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121207">SUSE bug 1121207</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824584" comment="nss-3.36.0-7.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824585" comment="nss-devel-3.36.0-7.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824586" comment="nss-pkcs11-devel-3.36.0-7.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824587" comment="nss-sysinit-3.36.0-7.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824588" comment="nss-tools-3.36.0-7.el7_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812385" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12385</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12385" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12385" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12385" ref_url="https://www.suse.com/security/cve/CVE-2018-12385" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3591-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004918.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2817-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7T7NT74JOS2WWPKYBWAJ5H5TOMRV6Q2M/#7T7NT74JOS2WWPKYBWAJ5H5TOMRV6Q2M" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3051-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MTTZ6YPTQZTRHJWNCF4KNXDHV5N6Y2CU/#MTTZ6YPTQZTRHJWNCF4KNXDHV5N6Y2CU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3687-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BBHDVB7NPDAZXEW2BECURXKYFEGTTUL4/#BBHDVB7NPDAZXEW2BECURXKYFEGTTUL4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A potentially exploitable crash in TransportSecurityInfo used for SSL can be triggered by data stored in the local cache in the user profile directory. This issue is only exploitable in combination with another vulnerability allowing an attacker to write data into the local cache or from locally installed malware. This issue also triggers a non-exploitable startup crash for users switching between the Nightly and Release versions of Firefox if the same profile is used. This vulnerability affects Thunderbird &lt; 60.2.1, Firefox ESR &lt; 60.2.1, and Firefox &lt; 62.0.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12385/">CVE-2018-12385 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12385">CVE-2018-12385 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1109363">SUSE bug 1109363</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824589" comment="firefox-60.2.1-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825374" comment="thunderbird-60.2.1-4.el7_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812386" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12386</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12386" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12386" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12386" ref_url="https://www.suse.com/security/cve/CVE-2018-12386" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3591-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004918.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2996-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UXVIUQVGN7ZZZ7EDAH6BVYDQAAP5PK2I/#UXVIUQVGN7ZZZ7EDAH6BVYDQAAP5PK2I" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A vulnerability in register allocation in JavaScript can lead to type confusion, allowing for an arbitrary read and write. This leads to remote code execution inside the sandboxed content process when triggered. This vulnerability affects Firefox ESR &lt; 60.2.2 and Firefox &lt; 62.0.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12386/">CVE-2018-12386 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12386">CVE-2018-12386 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1110506">SUSE bug 1110506</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824590" comment="firefox-60.2.2-1.el7_5 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812387" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12387</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12387" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12387" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12387" ref_url="https://www.suse.com/security/cve/CVE-2018-12387" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3591-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004918.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2996-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UXVIUQVGN7ZZZ7EDAH6BVYDQAAP5PK2I/#UXVIUQVGN7ZZZ7EDAH6BVYDQAAP5PK2I" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A vulnerability where the JavaScript JIT compiler inlines Array.prototype.push with multiple arguments that results in the stack pointer being off by 8 bytes after a bailout. This leaks a memory address to the calling function which can be used as part of an exploit inside the sandboxed content process. This vulnerability affects Firefox ESR &lt; 60.2.2 and Firefox &lt; 62.0.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12387/">CVE-2018-12387 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12387">CVE-2018-12387 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1110507">SUSE bug 1110507</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824590" comment="firefox-60.2.2-1.el7_5 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812389" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12389</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12389" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12389" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12389" ref_url="https://www.suse.com/security/cve/CVE-2018-12389" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3749-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004932.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3749-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004851.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3435-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6XWFDMMUX6LYLR2LQK7LLT5MIKC725ZG/#6XWFDMMUX6LYLR2LQK7LLT5MIKC725ZG" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3646-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FPINHQY7NFMKT5TTJF67AU65GLGNNPAN/#FPINHQY7NFMKT5TTJF67AU65GLGNNPAN" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3687-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BBHDVB7NPDAZXEW2BECURXKYFEGTTUL4/#BBHDVB7NPDAZXEW2BECURXKYFEGTTUL4" source="SUSE-SU"/>
    <description>
    Mozilla developers and community members reported memory safety bugs present in Firefox ESR 60.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox ESR &lt; 60.3 and Thunderbird &lt; 60.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-12389/">CVE-2018-12389 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12389">CVE-2018-12389 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1112852">SUSE bug 1112852</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824623" comment="firefox-60.3.0-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825391" comment="thunderbird-60.3.0-1.el7_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812390" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12390</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12390" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12390" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12390" ref_url="https://www.suse.com/security/cve/CVE-2018-12390" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3749-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004932.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3749-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004851.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3435-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6XWFDMMUX6LYLR2LQK7LLT5MIKC725ZG/#6XWFDMMUX6LYLR2LQK7LLT5MIKC725ZG" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3646-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FPINHQY7NFMKT5TTJF67AU65GLGNNPAN/#FPINHQY7NFMKT5TTJF67AU65GLGNNPAN" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3687-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BBHDVB7NPDAZXEW2BECURXKYFEGTTUL4/#BBHDVB7NPDAZXEW2BECURXKYFEGTTUL4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Mozilla developers and community members reported memory safety bugs present in Firefox 62 and Firefox ESR 60.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox &lt; 63, Firefox ESR &lt; 60.3, and Thunderbird &lt; 60.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12390/">CVE-2018-12390 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12390">CVE-2018-12390 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1112852">SUSE bug 1112852</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824623" comment="firefox-60.3.0-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825391" comment="thunderbird-60.3.0-1.el7_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812392" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12392</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12392" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12392" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12392" ref_url="https://www.suse.com/security/cve/CVE-2018-12392" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3749-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004932.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3749-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004851.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3435-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6XWFDMMUX6LYLR2LQK7LLT5MIKC725ZG/#6XWFDMMUX6LYLR2LQK7LLT5MIKC725ZG" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3646-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FPINHQY7NFMKT5TTJF67AU65GLGNNPAN/#FPINHQY7NFMKT5TTJF67AU65GLGNNPAN" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3687-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BBHDVB7NPDAZXEW2BECURXKYFEGTTUL4/#BBHDVB7NPDAZXEW2BECURXKYFEGTTUL4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    When manipulating user events in nested loops while opening a document through script, it is possible to trigger a potentially exploitable crash due to poor event handling. This vulnerability affects Firefox &lt; 63, Firefox ESR &lt; 60.3, and Thunderbird &lt; 60.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12392/">CVE-2018-12392 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12392">CVE-2018-12392 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1112852">SUSE bug 1112852</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824623" comment="firefox-60.3.0-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825391" comment="thunderbird-60.3.0-1.el7_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812393" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12393</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12393" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12393" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12393" ref_url="https://www.suse.com/security/cve/CVE-2018-12393" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3749-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004932.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3749-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004851.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3435-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6XWFDMMUX6LYLR2LQK7LLT5MIKC725ZG/#6XWFDMMUX6LYLR2LQK7LLT5MIKC725ZG" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3646-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FPINHQY7NFMKT5TTJF67AU65GLGNNPAN/#FPINHQY7NFMKT5TTJF67AU65GLGNNPAN" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3687-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BBHDVB7NPDAZXEW2BECURXKYFEGTTUL4/#BBHDVB7NPDAZXEW2BECURXKYFEGTTUL4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A potential vulnerability was found in 32-bit builds where an integer overflow during the conversion of scripts to an internal UTF-16 representation could result in allocating a buffer too small for the conversion. This leads to a possible out-of-bounds write. *Note: 64-bit builds are not vulnerable to this issue.*. This vulnerability affects Firefox &lt; 63, Firefox ESR &lt; 60.3, and Thunderbird &lt; 60.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12393/">CVE-2018-12393 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12393">CVE-2018-12393 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1112852">SUSE bug 1112852</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824623" comment="firefox-60.3.0-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825391" comment="thunderbird-60.3.0-1.el7_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812395" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12395</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12395" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12395" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12395" ref_url="https://www.suse.com/security/cve/CVE-2018-12395" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3749-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004932.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3749-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005382.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3435-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6XWFDMMUX6LYLR2LQK7LLT5MIKC725ZG/#6XWFDMMUX6LYLR2LQK7LLT5MIKC725ZG" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    By rewriting the Host: request headers using the webRequest API, a WebExtension can bypass domain restrictions through domain fronting. This would allow access to domains that share a host that are otherwise restricted. This vulnerability affects Firefox ESR &lt; 60.3 and Firefox &lt; 63.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12395/">CVE-2018-12395 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12395">CVE-2018-12395 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1112852">SUSE bug 1112852</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824623" comment="firefox-60.3.0-1.el7_5 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812396" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12396</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12396" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12396" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12396" ref_url="https://www.suse.com/security/cve/CVE-2018-12396" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3749-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004932.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3749-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005382.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3435-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6XWFDMMUX6LYLR2LQK7LLT5MIKC725ZG/#6XWFDMMUX6LYLR2LQK7LLT5MIKC725ZG" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A vulnerability where a WebExtension can run content scripts in disallowed contexts following navigation or other events. This allows for potential privilege escalation by the WebExtension on sites where content scripts should not be run. This vulnerability affects Firefox ESR &lt; 60.3 and Firefox &lt; 63.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12396/">CVE-2018-12396 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12396">CVE-2018-12396 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1112852">SUSE bug 1112852</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824623" comment="firefox-60.3.0-1.el7_5 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812397" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12397</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12397" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12397" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12397" ref_url="https://www.suse.com/security/cve/CVE-2018-12397" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3749-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004932.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3749-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005382.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3435-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6XWFDMMUX6LYLR2LQK7LLT5MIKC725ZG/#6XWFDMMUX6LYLR2LQK7LLT5MIKC725ZG" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A WebExtension can request access to local files without the warning prompt stating that the extension will "Access your data for all websites" being displayed to the user. This allows extensions to run content scripts in local pages without permission warnings when a local file is opened. This vulnerability affects Firefox ESR &lt; 60.3 and Firefox &lt; 63.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12397/">CVE-2018-12397 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12397">CVE-2018-12397 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1112852">SUSE bug 1112852</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824623" comment="firefox-60.3.0-1.el7_5 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812404" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12404</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12404" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12404" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12404" ref_url="https://www.suse.com/security/cve/CVE-2018-12404" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4236-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4117-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZVVV5W3TKACNO7E6UUTICT7MG33NV5XN/#ZVVV5W3TKACNO7E6UUTICT7MG33NV5XN" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0183-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/55UMHGS7YZ5AZ4K7HNYIQ73VCFF6QA4L/#55UMHGS7YZ5AZ4K7HNYIQ73VCFF6QA4L" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1758-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3XSXZIQWRQRVOR3YE3OFV7LENA3NBVZC/#3XSXZIQWRQRVOR3YE3OFV7LENA3NBVZC" source="SUSE-SU"/>
    <description>
    A cached side channel attack during handshakes using RSA encryption could allow for the decryption of encrypted content. This is a variant of the Adaptive Chosen Ciphertext attack (AKA Bleichenbacher attack) and affects all NSS versions prior to NSS 3.41.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12404/">CVE-2018-12404 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12404">CVE-2018-12404 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1119069">SUSE bug 1119069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119105">SUSE bug 1119105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121207">SUSE bug 1121207</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826490" comment="nspr-4.21.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826491" comment="nspr-devel-4.21.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826492" comment="nss-3.44.0-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826493" comment="nss-devel-3.44.0-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826494" comment="nss-pkcs11-devel-3.44.0-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826495" comment="nss-softokn-3.44.0-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826496" comment="nss-softokn-devel-3.44.0-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826497" comment="nss-softokn-freebl-3.44.0-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826498" comment="nss-softokn-freebl-devel-3.44.0-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826499" comment="nss-sysinit-3.44.0-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826500" comment="nss-tools-3.44.0-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826501" comment="nss-util-3.44.0-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826502" comment="nss-util-devel-3.44.0-3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812405" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12405</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12405" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12405" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12405" ref_url="https://www.suse.com/security/cve/CVE-2018-12405" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4236-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005110.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4112-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S3YCLFCCALAS3NJ2LSEQJAPI4D7TKP2L/#S3YCLFCCALAS3NJ2LSEQJAPI4D7TKP2L" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0182-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RO4BDOELHRMIUQ3XXKYY53F5V3FX32S2/#RO4BDOELHRMIUQ3XXKYY53F5V3FX32S2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0249-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NSXP45BAXW5ILKJSQRXHTBUOBZUKLD2F/#NSXP45BAXW5ILKJSQRXHTBUOBZUKLD2F" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0251-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YTL5HAWTQVZCKKAVSVP4LCGEQTWZR73J/#YTL5HAWTQVZCKKAVSVP4LCGEQTWZR73J" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Mozilla developers and community members reported memory safety bugs present in Firefox 63 and Firefox ESR 60.3. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird &lt; 60.4, Firefox ESR &lt; 60.4, and Firefox &lt; 64.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-10-23"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12405/">CVE-2018-12405 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12405">CVE-2018-12405 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1112111">SUSE bug 1112111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119105">SUSE bug 1119105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121207">SUSE bug 1121207</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825446" comment="firefox-60.4.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825483" comment="thunderbird-60.4.0-1.el7_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812599" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12599</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12599" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12599" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12599" ref_url="https://www.suse.com/security/cve/CVE-2018-12599" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004682.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2123-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6P52BTZ75AS657P3Z3TKTCWLBMLHKSFG/#6P52BTZ75AS657P3Z3TKTCWLBMLHKSFG" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3225-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MEKTGR47JQCA6R3L3CU527ZEPL6HUEAK/#MEKTGR47JQCA6R3L3CU527ZEPL6HUEAK" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.8-3 Q16, ReadBMPImage and WriteBMPImage in coders/bmp.c allow attackers to cause an out of bounds write via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12599/">CVE-2018-12599 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12599">CVE-2018-12599 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1098546">SUSE bug 1098546</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117463">SUSE bug 1117463</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827880" comment="ImageMagick-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827881" comment="ImageMagick-c++-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827882" comment="ImageMagick-c++-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827883" comment="ImageMagick-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827884" comment="ImageMagick-doc-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827885" comment="ImageMagick-perl-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827886" comment="autotrace-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827887" comment="autotrace-devel-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827888" comment="emacs-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827889" comment="emacs-common-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827890" comment="emacs-el-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827891" comment="emacs-filesystem-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827892" comment="emacs-nox-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827893" comment="emacs-terminal-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827894" comment="inkscape-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827895" comment="inkscape-docs-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827896" comment="inkscape-view-0.92.2-3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812600" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12600</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12600" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12600" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12600" ref_url="https://www.suse.com/security/cve/CVE-2018-12600" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004682.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2123-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6P52BTZ75AS657P3Z3TKTCWLBMLHKSFG/#6P52BTZ75AS657P3Z3TKTCWLBMLHKSFG" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3225-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MEKTGR47JQCA6R3L3CU527ZEPL6HUEAK/#MEKTGR47JQCA6R3L3CU527ZEPL6HUEAK" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.8-3 Q16, ReadDIBImage and WriteDIBImage in coders/dib.c allow attackers to cause an out of bounds write via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12600/">CVE-2018-12600 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12600">CVE-2018-12600 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1098545">SUSE bug 1098545</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098546">SUSE bug 1098546</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117463">SUSE bug 1117463</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827880" comment="ImageMagick-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827881" comment="ImageMagick-c++-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827882" comment="ImageMagick-c++-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827883" comment="ImageMagick-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827884" comment="ImageMagick-doc-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827885" comment="ImageMagick-perl-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827886" comment="autotrace-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827887" comment="autotrace-devel-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827888" comment="emacs-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827889" comment="emacs-common-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827890" comment="emacs-el-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827891" comment="emacs-filesystem-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827892" comment="emacs-nox-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827893" comment="emacs-terminal-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827894" comment="inkscape-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827895" comment="inkscape-docs-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827896" comment="inkscape-view-0.92.2-3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812641" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12641</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12641" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12641" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12641" ref_url="https://www.suse.com/security/cve/CVE-2018-12641" source="SUSE CVE"/>
    <description>
    An issue was discovered in arm_pt in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.30. Stack Exhaustion occurs in the C++ demangling functions provided by libiberty, and there are recursive stack frames: demangle_arm_hp_template, demangle_class_name, demangle_fund_type, do_type, do_arg, demangle_args, and demangle_nested_args. This can occur during execution of nm-new.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12641/">CVE-2018-12641 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12641">CVE-2018-12641 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1098937">SUSE bug 1098937</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826113" comment="binutils-2.27-41.base.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826114" comment="binutils-devel-2.27-41.base.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812697" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12697</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12697" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12697" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12697" ref_url="https://www.suse.com/security/cve/CVE-2018-12697" source="SUSE CVE"/>
    <description>
    A NULL pointer dereference (aka SEGV on unknown address 0x000000000000) was discovered in work_stuff_copy_to_from in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.30. This can occur during execution of objdump.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12697/">CVE-2018-12697 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12697">CVE-2018-12697 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1098940">SUSE bug 1098940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826113" comment="binutils-2.27-41.base.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826114" comment="binutils-devel-2.27-41.base.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181283" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1283</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1283" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1283" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1283" ref_url="https://www.suse.com/security/cve/CVE-2018-1283" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1161-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004700.html" source="SUSE-SU"/>
    <description>
    In Apache httpd 2.4.0 to 2.4.29, when mod_session is configured to forward its session data to CGI applications (SessionEnv on, not the default), a remote user may influence their content by using a "Session" header. This comes from the "HTTP_SESSION" variable name used by mod_session to forward its data to CGIs, since the prefix "HTTP_" is also used by the Apache HTTP Server to pass HTTP header fields, per CGI specifications.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1283/">CVE-2018-1283 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1283">CVE-2018-1283 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1086814">SUSE bug 1086814</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828309" comment="httpd-2.4.6-95.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828310" comment="httpd-devel-2.4.6-95.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828311" comment="httpd-manual-2.4.6-95.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828312" comment="httpd-tools-2.4.6-95.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828313" comment="mod_ldap-2.4.6-95.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828314" comment="mod_proxy_html-2.4.6-95.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828315" comment="mod_session-2.4.6-95.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828316" comment="mod_ssl-2.4.6-95.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812900" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12900</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12900" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12900" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12900" ref_url="https://www.suse.com/security/cve/CVE-2018-12900" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3911-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004897.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3947-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FDE3XHXSQNVGZ67OMWBZEZCQBUKMTXUY/#FDE3XHXSQNVGZ67OMWBZEZCQBUKMTXUY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3948-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JR24U4ERZMMBPMBHBJ2MXTAUUKLLK3LK/#JR24U4ERZMMBPMBHBJ2MXTAUUKLLK3LK" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the cpSeparateBufToContigBuf function in tiffcp.c in LibTIFF 3.9.3, 3.9.4, 3.9.5, 3.9.6, 3.9.7, 4.0.0beta7, 4.0.0alpha4, 4.0.0alpha5, 4.0.0alpha6, 4.0.0, 4.0.1, 4.0.2, 4.0.3, 4.0.4, 4.0.4beta, 4.0.5, 4.0.6, 4.0.7, 4.0.8 and 4.0.9 allows remote attackers to cause a denial of service (crash) or possibly have unspecified other impact via a crafted TIFF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12900/">CVE-2018-12900 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12900">CVE-2018-12900 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1099257">SUSE bug 1099257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125113">SUSE bug 1125113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150480">SUSE bug 1150480</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826088" comment="libtiff-4.0.3-32.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826089" comment="libtiff-devel-4.0.3-32.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826090" comment="libtiff-static-4.0.3-32.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826091" comment="libtiff-tools-4.0.3-32.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812910" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12910</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12910" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12910" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12910" ref_url="https://www.suse.com/security/cve/CVE-2018-12910" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2204-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2296-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/A4YKLVRZQVVAHMZEMDU3TBR5XPZCHL6G/#A4YKLVRZQVVAHMZEMDU3TBR5XPZCHL6G" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1310-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K3XIYK2GSVRPULJ3BR7IQUKJRNLK6ZIW/#K3XIYK2GSVRPULJ3BR7IQUKJRNLK6ZIW" source="SUSE-SU"/>
    <description>
    The get_cookies function in soup-cookie-jar.c in libsoup 2.63.2 allows attackers to have unspecified impact via an empty hostname.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12910/">CVE-2018-12910 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12910">CVE-2018-12910 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1100097">SUSE bug 1100097</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824843" comment="PackageKit-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824844" comment="PackageKit-command-not-found-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824845" comment="PackageKit-cron-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824846" comment="PackageKit-glib-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824847" comment="PackageKit-glib-devel-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824848" comment="PackageKit-gstreamer-plugin-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824849" comment="PackageKit-gtk3-module-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824850" comment="PackageKit-yum-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824851" comment="PackageKit-yum-plugin-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824852" comment="accountsservice-0.6.50-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824853" comment="accountsservice-devel-0.6.50-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824854" comment="accountsservice-libs-0.6.50-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824855" comment="adwaita-cursor-theme-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824856" comment="adwaita-gtk2-theme-3.28-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824857" comment="adwaita-icon-theme-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824858" comment="adwaita-icon-theme-devel-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824859" comment="appstream-data-7-20180614.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824860" comment="at-spi2-atk-2.26.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824861" comment="at-spi2-atk-devel-2.26.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824862" comment="at-spi2-core-2.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824863" comment="at-spi2-core-devel-2.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824864" comment="atk-2.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824865" comment="atk-devel-2.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824866" comment="baobab-3.28.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824867" comment="bolt-0.4-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824868" comment="brasero-3.12.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824869" comment="brasero-devel-3.12.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824870" comment="brasero-libs-3.12.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824871" comment="brasero-nautilus-3.12.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824872" comment="cairo-1.15.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824873" comment="cairo-devel-1.15.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824874" comment="cairo-gobject-1.15.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824875" comment="cairo-gobject-devel-1.15.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824876" comment="cairo-tools-1.15.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824877" comment="cheese-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824878" comment="cheese-libs-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824879" comment="cheese-libs-devel-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824880" comment="clutter-gst3-3.0.26-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824881" comment="clutter-gst3-devel-3.0.26-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824882" comment="compat-exiv2-023-0.23-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824883" comment="compat-libical1-1.0.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824884" comment="control-center-3.28.1-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824885" comment="control-center-filesystem-3.28.1-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824886" comment="dconf-0.28.0-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824887" comment="dconf-devel-0.28.0-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824888" comment="dconf-editor-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824889" comment="devhelp-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824890" comment="devhelp-devel-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824891" comment="devhelp-libs-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824892" comment="ekiga-4.0.1-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824893" comment="empathy-3.12.13-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824894" comment="eog-3.28.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824895" comment="eog-devel-3.28.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824896" comment="evince-3.28.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824897" comment="evince-browser-plugin-3.28.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824898" comment="evince-devel-3.28.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824899" comment="evince-dvi-3.28.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824900" comment="evince-libs-3.28.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824901" comment="evince-nautilus-3.28.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824902" comment="evolution-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824903" comment="evolution-bogofilter-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824904" comment="evolution-data-server-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824905" comment="evolution-data-server-devel-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824906" comment="evolution-data-server-doc-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824907" comment="evolution-data-server-langpacks-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824908" comment="evolution-data-server-perl-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824909" comment="evolution-data-server-tests-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824910" comment="evolution-devel-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824911" comment="evolution-devel-docs-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824912" comment="evolution-ews-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824913" comment="evolution-ews-langpacks-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824914" comment="evolution-help-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824915" comment="evolution-langpacks-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824916" comment="evolution-mapi-3.28.3-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824917" comment="evolution-mapi-langpacks-3.28.3-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824918" comment="evolution-pst-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824919" comment="evolution-spamassassin-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824920" comment="evolution-tests-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824921" comment="file-roller-3.28.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824922" comment="file-roller-nautilus-3.28.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824923" comment="flatpak-1.0.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824924" comment="flatpak-builder-1.0.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824925" comment="flatpak-devel-1.0.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824926" comment="flatpak-libs-1.0.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824927" comment="folks-0.11.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824928" comment="folks-devel-0.11.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824929" comment="folks-tools-0.11.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824930" comment="fontconfig-2.13.0-4.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824931" comment="fontconfig-devel-2.13.0-4.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824932" comment="fontconfig-devel-doc-2.13.0-4.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824933" comment="freetype-2.8-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824934" comment="freetype-demos-2.8-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824935" comment="freetype-devel-2.8-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824936" comment="fribidi-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824937" comment="fribidi-devel-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824938" comment="fwupd-1.0.8-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824939" comment="fwupd-devel-1.0.8-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824940" comment="fwupdate-12-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824941" comment="fwupdate-devel-12-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824942" comment="fwupdate-efi-12-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824943" comment="fwupdate-libs-12-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824944" comment="gcr-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824945" comment="gcr-devel-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824946" comment="gdk-pixbuf2-2.36.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824947" comment="gdk-pixbuf2-devel-2.36.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824948" comment="gdk-pixbuf2-tests-2.36.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824949" comment="gdm-3.28.2-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824950" comment="gdm-devel-3.28.2-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824951" comment="gdm-pam-extensions-devel-3.28.2-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824952" comment="gedit-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824953" comment="gedit-devel-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824954" comment="gedit-plugin-bookmarks-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824955" comment="gedit-plugin-bracketcompletion-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824956" comment="gedit-plugin-charmap-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824957" comment="gedit-plugin-codecomment-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824958" comment="gedit-plugin-colorpicker-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824959" comment="gedit-plugin-colorschemer-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824960" comment="gedit-plugin-commander-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824961" comment="gedit-plugin-drawspaces-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824962" comment="gedit-plugin-findinfiles-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824963" comment="gedit-plugin-joinlines-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824964" comment="gedit-plugin-multiedit-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824965" comment="gedit-plugin-smartspaces-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824966" comment="gedit-plugin-synctex-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824967" comment="gedit-plugin-terminal-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824968" comment="gedit-plugin-textsize-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824969" comment="gedit-plugin-translate-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824970" comment="gedit-plugin-wordcompletion-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824971" comment="gedit-plugins-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824972" comment="gedit-plugins-data-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824973" comment="geoclue2-2.4.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824974" comment="geoclue2-demos-2.4.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824975" comment="geoclue2-devel-2.4.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824976" comment="geoclue2-libs-2.4.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824977" comment="geocode-glib-3.26.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824978" comment="geocode-glib-devel-3.26.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824979" comment="gjs-1.52.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824980" comment="gjs-devel-1.52.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824981" comment="gjs-tests-1.52.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824982" comment="glade-3.22.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824983" comment="glade-devel-3.22.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824984" comment="glade-libs-3.22.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824985" comment="glib-networking-2.56.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824986" comment="glib-networking-tests-2.56.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824987" comment="glib2-2.56.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824988" comment="glib2-devel-2.56.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824989" comment="glib2-doc-2.56.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824990" comment="glib2-fam-2.56.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824991" comment="glib2-static-2.56.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824992" comment="glib2-tests-2.56.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824993" comment="glibmm24-2.56.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824994" comment="glibmm24-devel-2.56.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824995" comment="glibmm24-doc-2.56.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824996" comment="gnome-backgrounds-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824997" comment="gnome-bluetooth-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824998" comment="gnome-bluetooth-libs-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824999" comment="gnome-bluetooth-libs-devel-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825000" comment="gnome-boxes-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825001" comment="gnome-calculator-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825002" comment="gnome-classic-session-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825003" comment="gnome-clocks-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825004" comment="gnome-color-manager-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825005" comment="gnome-contacts-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825006" comment="gnome-desktop3-3.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825007" comment="gnome-desktop3-devel-3.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825008" comment="gnome-desktop3-tests-3.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825009" comment="gnome-devel-docs-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825010" comment="gnome-dictionary-3.26.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825011" comment="gnome-disk-utility-3.28.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825012" comment="gnome-documents-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825013" comment="gnome-documents-libs-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825014" comment="gnome-font-viewer-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825015" comment="gnome-getting-started-docs-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825016" comment="gnome-getting-started-docs-cs-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825017" comment="gnome-getting-started-docs-de-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825018" comment="gnome-getting-started-docs-es-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825019" comment="gnome-getting-started-docs-fr-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825020" comment="gnome-getting-started-docs-gl-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825021" comment="gnome-getting-started-docs-hu-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825022" comment="gnome-getting-started-docs-it-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825023" comment="gnome-getting-started-docs-pl-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825024" comment="gnome-getting-started-docs-pt_BR-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825025" comment="gnome-getting-started-docs-ru-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825026" comment="gnome-initial-setup-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825027" comment="gnome-keyring-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825028" comment="gnome-keyring-pam-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825029" comment="gnome-online-accounts-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825030" comment="gnome-online-accounts-devel-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825031" comment="gnome-online-miners-3.26.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825032" comment="gnome-packagekit-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825033" comment="gnome-packagekit-common-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825034" comment="gnome-packagekit-installer-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825035" comment="gnome-packagekit-updater-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825036" comment="gnome-screenshot-3.26.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825037" comment="gnome-session-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825038" comment="gnome-session-custom-session-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825039" comment="gnome-session-wayland-session-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825040" comment="gnome-session-xsession-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825041" comment="gnome-settings-daemon-3.28.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825042" comment="gnome-settings-daemon-devel-3.28.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825043" comment="gnome-shell-3.28.3-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825044" comment="gnome-shell-extension-alternate-tab-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825045" comment="gnome-shell-extension-apps-menu-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825046" comment="gnome-shell-extension-auto-move-windows-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825047" comment="gnome-shell-extension-common-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825048" comment="gnome-shell-extension-dash-to-dock-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825049" comment="gnome-shell-extension-drive-menu-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825050" comment="gnome-shell-extension-launch-new-instance-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825051" comment="gnome-shell-extension-native-window-placement-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825052" comment="gnome-shell-extension-no-hot-corner-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825053" comment="gnome-shell-extension-panel-favorites-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825054" comment="gnome-shell-extension-places-menu-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825055" comment="gnome-shell-extension-screenshot-window-sizer-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825056" comment="gnome-shell-extension-systemMonitor-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825057" comment="gnome-shell-extension-top-icons-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825058" comment="gnome-shell-extension-updates-dialog-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825059" comment="gnome-shell-extension-user-theme-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825060" comment="gnome-shell-extension-window-list-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825061" comment="gnome-shell-extension-windowsNavigator-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825062" comment="gnome-shell-extension-workspace-indicator-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825063" comment="gnome-software-3.28.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825064" comment="gnome-software-devel-3.28.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825065" comment="gnome-software-editor-3.28.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825066" comment="gnome-system-monitor-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825067" comment="gnome-terminal-3.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825068" comment="gnome-terminal-nautilus-3.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825069" comment="gnome-themes-standard-3.28-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825070" comment="gnome-tweak-tool-3.28.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825071" comment="gnome-user-docs-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825072" comment="gnote-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825073" comment="gobject-introspection-1.56.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825074" comment="gobject-introspection-devel-1.56.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825075" comment="gom-0.3.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825076" comment="gom-devel-0.3.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825077" comment="google-noto-emoji-color-fonts-20180508-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825078" comment="google-noto-emoji-fonts-20180508-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825079" comment="grilo-0.3.6-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825080" comment="grilo-devel-0.3.6-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825081" comment="grilo-plugins-0.3.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825082" comment="gsettings-desktop-schemas-3.28.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825083" comment="gsettings-desktop-schemas-devel-3.28.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825084" comment="gspell-1.6.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825085" comment="gspell-devel-1.6.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825086" comment="gspell-doc-1.6.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825087" comment="gssdp-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825088" comment="gssdp-devel-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825089" comment="gssdp-docs-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825090" comment="gssdp-utils-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825091" comment="gstreamer1-plugins-base-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825092" comment="gstreamer1-plugins-base-devel-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825093" comment="gstreamer1-plugins-base-devel-docs-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825094" comment="gstreamer1-plugins-base-tools-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825095" comment="gtk-doc-1.28-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825096" comment="gtk-update-icon-cache-3.22.30-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825097" comment="gtk3-3.22.30-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825098" comment="gtk3-devel-3.22.30-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825099" comment="gtk3-devel-docs-3.22.30-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825100" comment="gtk3-immodule-xim-3.22.30-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825101" comment="gtk3-immodules-3.22.30-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825102" comment="gtk3-tests-3.22.30-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825103" comment="gtksourceview3-3.24.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825104" comment="gtksourceview3-devel-3.24.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825105" comment="gtksourceview3-tests-3.24.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825106" comment="gucharmap-10.0.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825107" comment="gucharmap-devel-10.0.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825108" comment="gucharmap-libs-10.0.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825109" comment="gupnp-1.0.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825110" comment="gupnp-devel-1.0.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825111" comment="gupnp-docs-1.0.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825112" comment="gupnp-igd-0.2.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825113" comment="gupnp-igd-devel-0.2.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825114" comment="gupnp-igd-python-0.2.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825115" comment="gvfs-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825116" comment="gvfs-afc-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825117" comment="gvfs-afp-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825118" comment="gvfs-archive-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825119" comment="gvfs-client-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825120" comment="gvfs-devel-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825121" comment="gvfs-fuse-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825122" comment="gvfs-goa-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825123" comment="gvfs-gphoto2-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825124" comment="gvfs-mtp-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825125" comment="gvfs-smb-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825126" comment="gvfs-tests-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825127" comment="harfbuzz-1.7.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825128" comment="harfbuzz-devel-1.7.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825129" comment="harfbuzz-icu-1.7.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825130" comment="json-glib-1.4.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825131" comment="json-glib-devel-1.4.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825132" comment="json-glib-tests-1.4.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825133" comment="libappstream-glib-0.7.8-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825134" comment="libappstream-glib-builder-0.7.8-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825135" comment="libappstream-glib-builder-devel-0.7.8-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825136" comment="libappstream-glib-devel-0.7.8-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825137" comment="libchamplain-0.12.16-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825138" comment="libchamplain-demos-0.12.16-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825139" comment="libchamplain-devel-0.12.16-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825140" comment="libchamplain-gtk-0.12.16-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825141" comment="libcroco-0.6.12-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825142" comment="libcroco-devel-0.6.12-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825143" comment="libgdata-0.17.9-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825144" comment="libgdata-devel-0.17.9-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825145" comment="libgee-0.20.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825146" comment="libgee-devel-0.20.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825147" comment="libgepub-0.6.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825148" comment="libgepub-devel-0.6.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825149" comment="libgexiv2-0.10.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825150" comment="libgexiv2-devel-0.10.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825151" comment="libgnomekbd-3.26.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825152" comment="libgnomekbd-devel-3.26.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825153" comment="libgovirt-0.3.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825154" comment="libgovirt-devel-0.3.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825155" comment="libgtop2-2.38.0-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825156" comment="libgtop2-devel-2.38.0-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825157" comment="libgweather-3.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825158" comment="libgweather-devel-3.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825159" comment="libgxps-0.3.0-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825160" comment="libgxps-devel-0.3.0-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825161" comment="libgxps-tools-0.3.0-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825162" comment="libical-3.0.3-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825163" comment="libical-devel-3.0.3-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825164" comment="libical-glib-3.0.3-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825165" comment="libical-glib-devel-3.0.3-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825166" comment="libical-glib-doc-3.0.3-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825167" comment="libjpeg-turbo-1.2.90-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825168" comment="libjpeg-turbo-devel-1.2.90-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825169" comment="libjpeg-turbo-static-1.2.90-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825170" comment="libjpeg-turbo-utils-1.2.90-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825171" comment="libmediaart-1.9.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825172" comment="libmediaart-devel-1.9.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825173" comment="libmediaart-tests-1.9.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825174" comment="libosinfo-1.1.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825175" comment="libosinfo-devel-1.1.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825176" comment="libosinfo-vala-1.1.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825177" comment="libpeas-1.22.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825178" comment="libpeas-devel-1.22.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825179" comment="libpeas-gtk-1.22.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825180" comment="libpeas-loader-python-1.22.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825181" comment="librsvg2-2.40.20-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825182" comment="librsvg2-devel-2.40.20-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825183" comment="librsvg2-tools-2.40.20-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825184" comment="libsecret-0.18.6-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825185" comment="libsecret-devel-0.18.6-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825186" comment="libsoup-2.62.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825187" comment="libsoup-devel-2.62.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825188" comment="libwayland-client-1.15.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825189" comment="libwayland-cursor-1.15.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825190" comment="libwayland-egl-1.15.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825191" comment="libwayland-server-1.15.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825192" comment="libwnck3-3.24.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825193" comment="libwnck3-devel-3.24.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825194" comment="mozjs52-52.9.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825195" comment="mozjs52-devel-52.9.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825196" comment="mutter-3.28.3-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825197" comment="mutter-devel-3.28.3-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825198" comment="nautilus-3.26.3.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825199" comment="nautilus-devel-3.26.3.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825200" comment="nautilus-extensions-3.26.3.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825201" comment="nautilus-sendto-3.8.6-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825202" comment="openchange-2.3-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825203" comment="openchange-client-2.3-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825204" comment="openchange-devel-2.3-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825205" comment="openchange-devel-docs-2.3-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825206" comment="osinfo-db-20180531-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825207" comment="pango-1.42.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825208" comment="pango-devel-1.42.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825209" comment="pango-tests-1.42.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825210" comment="poppler-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825211" comment="poppler-cpp-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825212" comment="poppler-cpp-devel-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825213" comment="poppler-demos-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825214" comment="poppler-devel-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825215" comment="poppler-glib-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825216" comment="poppler-glib-devel-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825217" comment="poppler-qt-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825218" comment="poppler-qt-devel-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825219" comment="poppler-utils-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825220" comment="python2-gexiv2-0.10.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825221" comment="python2-pyatspi-2.26.0-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825222" comment="rest-0.8.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825223" comment="rest-devel-0.8.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825224" comment="rhythmbox-3.4.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825225" comment="rhythmbox-devel-3.4.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825226" comment="seahorse-nautilus-3.11.92-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825227" comment="shotwell-0.28.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825228" comment="sushi-3.28.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825229" comment="totem-3.26.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825230" comment="totem-devel-3.26.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825231" comment="totem-nautilus-3.26.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825232" comment="totem-pl-parser-3.26.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825233" comment="totem-pl-parser-devel-3.26.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825234" comment="turbojpeg-1.2.90-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825235" comment="turbojpeg-devel-1.2.90-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825236" comment="upower-0.99.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825237" comment="upower-devel-0.99.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825238" comment="upower-devel-docs-0.99.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825239" comment="vala-0.40.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825240" comment="vala-devel-0.40.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825241" comment="vala-doc-0.40.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825242" comment="valadoc-0.40.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825243" comment="valadoc-devel-0.40.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825244" comment="vino-3.22.0-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825245" comment="vte-profile-0.52.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825246" comment="vte291-0.52.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825247" comment="vte291-devel-0.52.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825248" comment="wayland-devel-1.15.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825249" comment="wayland-doc-1.15.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825250" comment="wayland-protocols-devel-1.14-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825251" comment="webkitgtk4-2.20.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825252" comment="webkitgtk4-devel-2.20.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825253" comment="webkitgtk4-doc-2.20.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825254" comment="webkitgtk4-jsc-2.20.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825255" comment="webkitgtk4-jsc-devel-2.20.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825256" comment="webkitgtk4-plugin-process-gtk2-2.20.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825257" comment="xdg-desktop-portal-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825258" comment="xdg-desktop-portal-devel-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825259" comment="xdg-desktop-portal-gtk-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825260" comment="yelp-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825261" comment="yelp-devel-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825262" comment="yelp-libs-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825263" comment="yelp-tools-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825264" comment="yelp-xsl-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825265" comment="yelp-xsl-devel-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825266" comment="zenity-3.28.1-1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181301" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1301</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1301" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1301" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1301" ref_url="https://www.suse.com/security/cve/CVE-2018-1301" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1161-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004700.html" source="SUSE-SU"/>
    <description>
    A specially crafted request could have crashed the Apache HTTP Server prior to version 2.4.30, due to an out of bound access after a size limit is reached by reading the HTTP header. This vulnerability is considered very hard if not impossible to trigger in non-debug mode (both log and build level), so it is classified as low risk for common server usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1301/">CVE-2018-1301 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1301">CVE-2018-1301 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1086817">SUSE bug 1086817</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827796" comment="httpd-2.4.6-93.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827797" comment="httpd-devel-2.4.6-93.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827798" comment="httpd-manual-2.4.6-93.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827799" comment="httpd-tools-2.4.6-93.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827800" comment="mod_ldap-2.4.6-93.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827801" comment="mod_proxy_html-2.4.6-93.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827802" comment="mod_session-2.4.6-93.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827803" comment="mod_ssl-2.4.6-93.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181303" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1303</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1303" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1303" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1303" ref_url="https://www.suse.com/security/cve/CVE-2018-1303" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1161-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004700.html" source="SUSE-SU"/>
    <description>
    A specially crafted HTTP request header could have crashed the Apache HTTP Server prior to version 2.4.30 due to an out of bound read while preparing data to be cached in shared memory. It could be used as a Denial of Service attack against users of mod_cache_socache. The vulnerability is considered as low risk since mod_cache_socache is not widely used, mod_cache_disk is not concerned by this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1303/">CVE-2018-1303 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1303">CVE-2018-1303 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1086813">SUSE bug 1086813</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828309" comment="httpd-2.4.6-95.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828310" comment="httpd-devel-2.4.6-95.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828311" comment="httpd-manual-2.4.6-95.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828312" comment="httpd-tools-2.4.6-95.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828313" comment="mod_ldap-2.4.6-95.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828314" comment="mod_proxy_html-2.4.6-95.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828315" comment="mod_session-2.4.6-95.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828316" comment="mod_ssl-2.4.6-95.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201813033" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-13033</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-13033" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13033" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-13033" ref_url="https://www.suse.com/security/cve/CVE-2018-13033" source="SUSE CVE"/>
    <description>
    The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (excessive memory allocation and application crash) via a crafted ELF file, as demonstrated by _bfd_elf_parse_attributes in elf-attrs.c and bfd_malloc in libbfd.c. This can occur during execution of nm.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-08"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-13033/">CVE-2018-13033 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-13033">CVE-2018-13033 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1099929">SUSE bug 1099929</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824624" comment="binutils-2.27-34.base.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824625" comment="binutils-devel-2.27-34.base.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181304" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1304</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1304" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1304" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1304" ref_url="https://www.suse.com/security/cve/CVE-2018-1304" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004782.html" source="SUSE-SU"/>
    <description>
    The URL pattern of "" (the empty string) which exactly maps to the context root was not correctly handled in Apache Tomcat 9.0.0.M1 to 9.0.4, 8.5.0 to 8.5.27, 8.0.0.RC1 to 8.0.49 and 7.0.0 to 7.0.84 when used as part of a security constraint definition. This caused the constraint to be ignored. It was, therefore, possible for unauthorised users to gain access to web application resources that should have been protected. Only security constraints with a URL pattern of the empty string were affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-1304/">CVE-2018-1304 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1304">CVE-2018-1304 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1082480">SUSE bug 1082480</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826470" comment="tomcat-7.0.76-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826471" comment="tomcat-admin-webapps-7.0.76-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826472" comment="tomcat-docs-webapp-7.0.76-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826473" comment="tomcat-el-2.2-api-7.0.76-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826474" comment="tomcat-javadoc-7.0.76-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826475" comment="tomcat-jsp-2.2-api-7.0.76-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826476" comment="tomcat-jsvc-7.0.76-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826477" comment="tomcat-lib-7.0.76-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826478" comment="tomcat-servlet-3.0-api-7.0.76-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826479" comment="tomcat-webapps-7.0.76-9.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181305" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1305</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1305" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1305" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1305" ref_url="https://www.suse.com/security/cve/CVE-2018-1305" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004782.html" source="SUSE-SU"/>
    <description>
    Security constraints defined by annotations of Servlets in Apache Tomcat 9.0.0.M1 to 9.0.4, 8.5.0 to 8.5.27, 8.0.0.RC1 to 8.0.49 and 7.0.0 to 7.0.84 were only applied once a Servlet had been loaded. Because security constraints defined in this way apply to the URL pattern and any URLs below that point, it was possible - depending on the order Servlets were loaded - for some security constraints not to be applied. This could have exposed resources to users who were not authorised to access them.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-1305/">CVE-2018-1305 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1305">CVE-2018-1305 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1082481">SUSE bug 1082481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112097">SUSE bug 1112097</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826470" comment="tomcat-7.0.76-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826471" comment="tomcat-admin-webapps-7.0.76-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826472" comment="tomcat-docs-webapp-7.0.76-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826473" comment="tomcat-el-2.2-api-7.0.76-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826474" comment="tomcat-javadoc-7.0.76-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826475" comment="tomcat-jsp-2.2-api-7.0.76-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826476" comment="tomcat-jsvc-7.0.76-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826477" comment="tomcat-lib-7.0.76-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826478" comment="tomcat-servlet-3.0-api-7.0.76-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826479" comment="tomcat-webapps-7.0.76-9.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201813053" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-13053</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-13053" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13053" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-13053" ref_url="https://www.suse.com/security/cve/CVE-2018-13053" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2344-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2366-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004537.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2118-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HY4T7FGRNW6MVQE44HNUSIL7M4Y3P4WI/#HY4T7FGRNW6MVQE44HNUSIL7M4Y3P4WI" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2119-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WKPTBMLW6CO7OGF3LPNC4LMQ2SS7VXKC/#WKPTBMLW6CO7OGF3LPNC4LMQ2SS7VXKC" source="SUSE-SU"/>
    <description>
    The alarm_timer_nsleep function in kernel/time/alarmtimer.c in the Linux kernel through 4.17.3 has an integer overflow via a large relative timeout because ktime_add_safe is not used.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-13053/">CVE-2018-13053 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-13053">CVE-2018-13053 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1099924">SUSE bug 1099924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115893">SUSE bug 1115893</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826007" comment="bpftool-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826008" comment="kernel-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826009" comment="kernel-abi-whitelists-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826010" comment="kernel-debug-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826013" comment="kernel-doc-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826014" comment="kernel-headers-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826015" comment="kernel-tools-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826016" comment="kernel-tools-libs-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826018" comment="perf-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826019" comment="python-perf-3.10.0-1062.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201813093" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-13093</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-13093" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13093" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-13093" ref_url="https://www.suse.com/security/cve/CVE-2018-13093" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2908-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2980-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2981-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2738-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DX32XKZSPY6HCHEGEFNDB2BQLAVU6T6E/#DX32XKZSPY6HCHEGEFNDB2BQLAVU6T6E" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3071-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6GTFT5RXJ7J2RAR6KEKOT74XNNP3FJVH/#6GTFT5RXJ7J2RAR6KEKOT74XNNP3FJVH" source="SUSE-SU"/>
    <description>
    An issue was discovered in fs/xfs/xfs_icache.c in the Linux kernel through 4.17.3. There is a NULL pointer dereference and panic in lookup_slow() on a NULL inode-&gt;i_ops pointer when doing pathwalks on a corrupted xfs image. This occurs because of a lack of proper validation that cached inodes are free during allocation.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-13093/">CVE-2018-13093 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-13093">CVE-2018-13093 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1100001">SUSE bug 1100001</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826007" comment="bpftool-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826008" comment="kernel-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826009" comment="kernel-abi-whitelists-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826010" comment="kernel-debug-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826013" comment="kernel-doc-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826014" comment="kernel-headers-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826015" comment="kernel-tools-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826016" comment="kernel-tools-libs-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826018" comment="perf-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826019" comment="python-perf-3.10.0-1062.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201813094" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-13094</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-13094" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13094" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-13094" ref_url="https://www.suse.com/security/cve/CVE-2018-13094" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2980-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2981-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004660.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2738-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DX32XKZSPY6HCHEGEFNDB2BQLAVU6T6E/#DX32XKZSPY6HCHEGEFNDB2BQLAVU6T6E" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3071-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6GTFT5RXJ7J2RAR6KEKOT74XNNP3FJVH/#6GTFT5RXJ7J2RAR6KEKOT74XNNP3FJVH" source="SUSE-SU"/>
    <description>
    An issue was discovered in fs/xfs/libxfs/xfs_attr_leaf.c in the Linux kernel through 4.17.3. An OOPS may occur for a corrupted xfs image after xfs_da_shrink_inode() is called with a NULL bp.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-13094/">CVE-2018-13094 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-13094">CVE-2018-13094 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100000">SUSE bug 1100000</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826007" comment="bpftool-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826008" comment="kernel-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826009" comment="kernel-abi-whitelists-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826010" comment="kernel-debug-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826013" comment="kernel-doc-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826014" comment="kernel-headers-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826015" comment="kernel-tools-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826016" comment="kernel-tools-libs-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826018" comment="perf-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826019" comment="python-perf-3.10.0-1062.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201813095" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-13095</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-13095" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13095" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-13095" ref_url="https://www.suse.com/security/cve/CVE-2018-13095" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2980-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2981-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2738-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DX32XKZSPY6HCHEGEFNDB2BQLAVU6T6E/#DX32XKZSPY6HCHEGEFNDB2BQLAVU6T6E" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3071-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6GTFT5RXJ7J2RAR6KEKOT74XNNP3FJVH/#6GTFT5RXJ7J2RAR6KEKOT74XNNP3FJVH" source="SUSE-SU"/>
    <description>
    An issue was discovered in fs/xfs/libxfs/xfs_inode_buf.c in the Linux kernel through 4.17.3. A denial of service (memory corruption and BUG) can occur for a corrupted xfs image upon encountering an inode that is in extent format, but has more extents than fit in the inode fork.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-13095/">CVE-2018-13095 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-13095">CVE-2018-13095 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1099999">SUSE bug 1099999</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826007" comment="bpftool-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826008" comment="kernel-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826009" comment="kernel-abi-whitelists-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826010" comment="kernel-debug-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826013" comment="kernel-doc-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826014" comment="kernel-headers-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826015" comment="kernel-tools-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826016" comment="kernel-tools-libs-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826018" comment="perf-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826019" comment="python-perf-3.10.0-1062.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181311" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1311</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1311" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1311" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1311" ref_url="https://www.suse.com/security/cve/CVE-2018-1311" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2944-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-September/020051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2958-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017839.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017852.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1231-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GBRNNZMHWDSWWFESWQDTSNE4Q5NETCUO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2958-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BGBVRVIJEOW5LG3NVS52NA3VNX37UM7D/" source="SUSE-SU"/>
    <description>
    The Apache Xerces-C 3.0.0 to 3.2.3 XML parser contains a use-after-free error triggered during the scanning of external DTDs. This flaw has not been addressed in the maintained version of the library and has no current mitigation other than to disable DTD processing. This can be accomplished via the DOM using a standard parser feature, or via SAX using the XERCES_DISABLE_DTD environment variable.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1311/">CVE-2018-1311 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1311">CVE-2018-1311 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1159552">SUSE bug 1159552</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221037">SUSE bug 1221037</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826929" comment="xerces-c-3.1.1-10.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826930" comment="xerces-c-devel-3.1.1-10.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826931" comment="xerces-c-doc-3.1.1-10.el7_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181312" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1312</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1312" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1312" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1312" ref_url="https://www.suse.com/security/cve/CVE-2018-1312" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1161-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004700.html" source="SUSE-SU"/>
    <description>
    In Apache httpd 2.2.0 to 2.4.29, when generating an HTTP Digest authentication challenge, the nonce sent to prevent reply attacks was not correctly generated using a pseudo-random seed. In a cluster of servers using a common Digest authentication configuration, HTTP requests could be replayed across servers by an attacker without detection.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-1312/">CVE-2018-1312 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1312">CVE-2018-1312 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1086775">SUSE bug 1086775</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825959" comment="httpd-2.4.6-89.el7_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825960" comment="httpd-devel-2.4.6-89.el7_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825961" comment="httpd-manual-2.4.6-89.el7_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825962" comment="httpd-tools-2.4.6-89.el7_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825963" comment="mod_ldap-2.4.6-89.el7_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825964" comment="mod_proxy_html-2.4.6-89.el7_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825965" comment="mod_session-2.4.6-89.el7_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825966" comment="mod_ssl-2.4.6-89.el7_6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201813139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-13139</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-13139" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13139" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-13139" ref_url="https://www.suse.com/security/cve/CVE-2018-13139" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009301.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2209-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DBM22ZMW2TQWGHZIEDKP3WFHGWOL5OW6/#DBM22ZMW2TQWGHZIEDKP3WFHGWOL5OW6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2214-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/742HY7DYQGK7GKG3SXN6VYH5JXWSTIDU/#742HY7DYQGK7GKG3SXN6VYH5JXWSTIDU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1166-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VGFWRIIXBFCLA7GINXJUPUD7YVYB5UKO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2764-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y7PPP2MGW6YG46U25HVAXKQBMB2PV4XV/" source="SUSE-SU"/>
    <description>
    A stack-based buffer overflow in psf_memset in common.c in libsndfile 1.0.28 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted audio file. The vulnerability can be triggered by the executable sndfile-deinterleave.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-07"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-13139/">CVE-2018-13139 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-13139">CVE-2018-13139 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1100167">SUSE bug 1100167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116993">SUSE bug 1116993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211493">SUSE bug 1211493</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827898" comment="libsndfile-1.0.25-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827899" comment="libsndfile-devel-1.0.25-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827900" comment="libsndfile-utils-1.0.25-11.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201813153" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-13153</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-13153" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13153" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-13153" ref_url="https://www.suse.com/security/cve/CVE-2018-13153" source="SUSE CVE"/>
    <description>
    In ImageMagick 7.0.8-4, there is a memory leak in the XMagickCommand function in MagickCore/animate.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-13153/">CVE-2018-13153 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-13153">CVE-2018-13153 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1100175">SUSE bug 1100175</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827880" comment="ImageMagick-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827881" comment="ImageMagick-c++-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827882" comment="ImageMagick-c++-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827883" comment="ImageMagick-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827884" comment="ImageMagick-doc-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827885" comment="ImageMagick-perl-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827886" comment="autotrace-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827887" comment="autotrace-devel-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827888" comment="emacs-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827889" comment="emacs-common-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827890" comment="emacs-el-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827891" comment="emacs-filesystem-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827892" comment="emacs-nox-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827893" comment="emacs-terminal-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827894" comment="inkscape-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827895" comment="inkscape-docs-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827896" comment="inkscape-view-0.92.2-3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201813259" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-13259</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-13259" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13259" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-13259" ref_url="https://www.suse.com/security/cve/CVE-2018-13259" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010436.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2741-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZDU5FTA53SU6KG6AQCG72UYMSNJXWLWS/#ZDU5FTA53SU6KG6AQCG72UYMSNJXWLWS" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2966-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DFJC4KYTKTX2DE4QRHBI7MDML2BWODJ5/#DFJC4KYTKTX2DE4QRHBI7MDML2BWODJ5" source="SUSE-SU"/>
    <description>
    An issue was discovered in zsh before 5.6. Shebang lines exceeding 64 characters were truncated, potentially leading to an execve call to a program name that is a substring of the intended one.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-13259/">CVE-2018-13259 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-13259">CVE-2018-13259 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1107294">SUSE bug 1107294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194009">SUSE bug 1194009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194012">SUSE bug 1194012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200039">SUSE bug 1200039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200209">SUSE bug 1200209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825970" comment="zsh-5.0.2-33.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825971" comment="zsh-html-5.0.2-33.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201813346" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-13346</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-13346" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13346" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-13346" ref_url="https://www.suse.com/security/cve/CVE-2018-13346" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004292.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2023-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UAGZE54DSVDO555WE6BUYTT5NBTYOJFR/#UAGZE54DSVDO555WE6BUYTT5NBTYOJFR" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2132-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BOE7AWGGQVN6HYN2JICLS3SDVXHEOVMQ/#BOE7AWGGQVN6HYN2JICLS3SDVXHEOVMQ" source="SUSE-SU"/>
    <description>
    The mpatch_apply function in mpatch.c in Mercurial before 4.6.1 incorrectly proceeds in cases where the fragment start is past the end of the original data, aka OVE-20180430-0004.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-13346/">CVE-2018-13346 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-13346">CVE-2018-13346 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1100354">SUSE bug 1100354</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826506" comment="emacs-mercurial-2.6.2-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826507" comment="emacs-mercurial-el-2.6.2-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826508" comment="mercurial-2.6.2-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826509" comment="mercurial-hgk-2.6.2-10.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201813347" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-13347</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-13347" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13347" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-13347" ref_url="https://www.suse.com/security/cve/CVE-2018-13347" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004292.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2023-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UAGZE54DSVDO555WE6BUYTT5NBTYOJFR/#UAGZE54DSVDO555WE6BUYTT5NBTYOJFR" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2132-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BOE7AWGGQVN6HYN2JICLS3SDVXHEOVMQ/#BOE7AWGGQVN6HYN2JICLS3SDVXHEOVMQ" source="SUSE-SU"/>
    <description>
    mpatch.c in Mercurial before 4.6.1 mishandles integer addition and subtraction, aka OVE-20180430-0002.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-13347/">CVE-2018-13347 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-13347">CVE-2018-13347 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1100355">SUSE bug 1100355</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826506" comment="emacs-mercurial-2.6.2-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826507" comment="emacs-mercurial-el-2.6.2-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826508" comment="mercurial-2.6.2-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826509" comment="mercurial-hgk-2.6.2-10.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181336" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1336</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1336" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1336" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1336" ref_url="https://www.suse.com/security/cve/CVE-2018-1336" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3011-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183011-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3011-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004782.html" source="SUSE-SU"/>
		<reference ref_id="TID7016795" ref_url="https://www.suse.com/support/kb/doc/?id=7016795" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2740-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4L3QCD32DJXD32NB6KQT36REOW2EGGO2/#4L3QCD32DJXD32NB6KQT36REOW2EGGO2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3054-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/A3JYKL6TLYHL72D4OCQVELQ2QTE3SOTH/#A3JYKL6TLYHL72D4OCQVELQ2QTE3SOTH" source="SUSE-SU"/>
    <description>
    An improper handing of overflow in the UTF-8 decoder with supplementary characters can lead to an infinite loop in the decoder causing a Denial of Service. Versions Affected: Apache Tomcat 9.0.0.M9 to 9.0.7, 8.5.0 to 8.5.30, 8.0.0.RC1 to 8.0.51, and 7.0.28 to 7.0.86.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-02-26"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1336/">CVE-2018-1336 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1336">CVE-2018-1336 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1102400">SUSE bug 1102400</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824597" comment="tomcat-7.0.76-8.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824598" comment="tomcat-admin-webapps-7.0.76-8.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824599" comment="tomcat-docs-webapp-7.0.76-8.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824600" comment="tomcat-el-2.2-api-7.0.76-8.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824601" comment="tomcat-javadoc-7.0.76-8.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824602" comment="tomcat-jsp-2.2-api-7.0.76-8.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824603" comment="tomcat-jsvc-7.0.76-8.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824604" comment="tomcat-lib-7.0.76-8.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824605" comment="tomcat-servlet-3.0-api-7.0.76-8.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824606" comment="tomcat-webapps-7.0.76-8.el7_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201813405" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-13405</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-13405" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13405" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-13405" ref_url="https://www.suse.com/security/cve/CVE-2018-13405" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2344-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3748-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-November/020791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2118-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HY4T7FGRNW6MVQE44HNUSIL7M4Y3P4WI/#HY4T7FGRNW6MVQE44HNUSIL7M4Y3P4WI" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2119-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WKPTBMLW6CO7OGF3LPNC4LMQ2SS7VXKC/#WKPTBMLW6CO7OGF3LPNC4LMQ2SS7VXKC" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1460-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MLGTNISZMAYBWA26GZHGZYQYWHM3VSZI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1477-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J325P6NPH7BF7P7B3LO6FGQNCTFNGKEW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
    <description>
    The inode_init_owner function in fs/inode.c in the Linux kernel through 3.16 allows local users to create files with an unintended group ownership, in a scenario where a directory is SGID to a certain group and is writable by a user who is not a member of that group. Here, the non-member can trigger creation of a plain file whose group ownership is that group. The intended behavior was that the non-member can trigger creation of a directory (but not a plain file) whose group ownership is that group. The non-member can escalate privileges by making the plain file executable and SGID.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-13405/">CVE-2018-13405 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-13405">CVE-2018-13405 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100416">SUSE bug 1100416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129735">SUSE bug 1129735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195161">SUSE bug 1195161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198702">SUSE bug 1198702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824786" comment="bpftool-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824787" comment="kernel-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824788" comment="kernel-abi-whitelists-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824789" comment="kernel-debug-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824792" comment="kernel-doc-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824793" comment="kernel-headers-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824794" comment="kernel-tools-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824795" comment="kernel-tools-libs-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824797" comment="perf-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824798" comment="python-perf-3.10.0-957.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201813440" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-13440</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-13440" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13440" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-13440" ref_url="https://www.suse.com/security/cve/CVE-2018-13440" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005332.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006938.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1260-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/I65IYYVVSYADJTGUNGUGAGZLB5AE2BX4/#I65IYYVVSYADJTGUNGUGAGZLB5AE2BX4" source="SUSE-SU"/>
    <description>
    The audiofile Audio File Library 0.3.6 has a NULL pointer dereference bug in ModuleState::setup in modules/ModuleState.cpp, which allows an attacker to cause a denial of service via a crafted caf file, as demonstrated by sfconvert.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-13440/">CVE-2018-13440 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-13440">CVE-2018-13440 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1100523">SUSE bug 1100523</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828236" comment="audiofile-0.3.6-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828237" comment="audiofile-devel-0.3.6-9.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201813796" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-13796</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-13796" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13796" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-13796" ref_url="https://www.suse.com/security/cve/CVE-2018-13796" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:4296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2309-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VN2A3BD452KHQFYSCTBQT2YGIYESJB7J/#VN2A3BD452KHQFYSCTBQT2YGIYESJB7J" source="SUSE-SU"/>
    <description>
    An issue was discovered in GNU Mailman before 2.1.28. A crafted URL can cause arbitrary text to be displayed on a web page from a trusted site.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-13796/">CVE-2018-13796 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-13796">CVE-2018-13796 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1101288">SUSE bug 1101288</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827656" comment="mailman-2.1.15-30.el7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201813988" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-13988</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-13988" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13988" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-13988" ref_url="https://www.suse.com/security/cve/CVE-2018-13988" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2906-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2907-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030446.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3854-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TS7QPSEQIBQO7BALZOE3TN7IO7IMHK3Y/" source="SUSE-SU"/>
    <description>
    Poppler through 0.62 contains an out of bounds read vulnerability due to an incorrect memory access that is not mapped in its memory space, as demonstrated by pdfunite. This can result in memory corruption and denial of service. This may be exploitable when a victim opens a specially crafted PDF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-13988/">CVE-2018-13988 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-13988">CVE-2018-13988 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1102531">SUSE bug 1102531</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824843" comment="PackageKit-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824844" comment="PackageKit-command-not-found-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824845" comment="PackageKit-cron-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824846" comment="PackageKit-glib-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824847" comment="PackageKit-glib-devel-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824848" comment="PackageKit-gstreamer-plugin-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824849" comment="PackageKit-gtk3-module-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824850" comment="PackageKit-yum-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824851" comment="PackageKit-yum-plugin-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824852" comment="accountsservice-0.6.50-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824853" comment="accountsservice-devel-0.6.50-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824854" comment="accountsservice-libs-0.6.50-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824855" comment="adwaita-cursor-theme-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824856" comment="adwaita-gtk2-theme-3.28-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824857" comment="adwaita-icon-theme-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824858" comment="adwaita-icon-theme-devel-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824859" comment="appstream-data-7-20180614.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824860" comment="at-spi2-atk-2.26.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824861" comment="at-spi2-atk-devel-2.26.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824862" comment="at-spi2-core-2.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824863" comment="at-spi2-core-devel-2.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824864" comment="atk-2.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824865" comment="atk-devel-2.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824866" comment="baobab-3.28.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824867" comment="bolt-0.4-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824868" comment="brasero-3.12.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824869" comment="brasero-devel-3.12.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824870" comment="brasero-libs-3.12.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824871" comment="brasero-nautilus-3.12.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824872" comment="cairo-1.15.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824873" comment="cairo-devel-1.15.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824874" comment="cairo-gobject-1.15.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824875" comment="cairo-gobject-devel-1.15.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824876" comment="cairo-tools-1.15.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824877" comment="cheese-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824878" comment="cheese-libs-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824879" comment="cheese-libs-devel-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824880" comment="clutter-gst3-3.0.26-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824881" comment="clutter-gst3-devel-3.0.26-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824882" comment="compat-exiv2-023-0.23-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824883" comment="compat-libical1-1.0.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824884" comment="control-center-3.28.1-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824885" comment="control-center-filesystem-3.28.1-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824886" comment="dconf-0.28.0-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824887" comment="dconf-devel-0.28.0-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824888" comment="dconf-editor-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824889" comment="devhelp-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824890" comment="devhelp-devel-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824891" comment="devhelp-libs-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824892" comment="ekiga-4.0.1-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824893" comment="empathy-3.12.13-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824894" comment="eog-3.28.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824895" comment="eog-devel-3.28.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824896" comment="evince-3.28.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824897" comment="evince-browser-plugin-3.28.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824898" comment="evince-devel-3.28.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824899" comment="evince-dvi-3.28.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824900" comment="evince-libs-3.28.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824901" comment="evince-nautilus-3.28.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824902" comment="evolution-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824903" comment="evolution-bogofilter-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824904" comment="evolution-data-server-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824905" comment="evolution-data-server-devel-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824906" comment="evolution-data-server-doc-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824907" comment="evolution-data-server-langpacks-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824908" comment="evolution-data-server-perl-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824909" comment="evolution-data-server-tests-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824910" comment="evolution-devel-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824911" comment="evolution-devel-docs-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824912" comment="evolution-ews-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824913" comment="evolution-ews-langpacks-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824914" comment="evolution-help-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824915" comment="evolution-langpacks-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824916" comment="evolution-mapi-3.28.3-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824917" comment="evolution-mapi-langpacks-3.28.3-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824918" comment="evolution-pst-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824919" comment="evolution-spamassassin-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824920" comment="evolution-tests-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824921" comment="file-roller-3.28.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824922" comment="file-roller-nautilus-3.28.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824923" comment="flatpak-1.0.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824924" comment="flatpak-builder-1.0.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824925" comment="flatpak-devel-1.0.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824926" comment="flatpak-libs-1.0.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824927" comment="folks-0.11.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824928" comment="folks-devel-0.11.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824929" comment="folks-tools-0.11.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824930" comment="fontconfig-2.13.0-4.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824931" comment="fontconfig-devel-2.13.0-4.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824932" comment="fontconfig-devel-doc-2.13.0-4.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824933" comment="freetype-2.8-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824934" comment="freetype-demos-2.8-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824935" comment="freetype-devel-2.8-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824936" comment="fribidi-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824937" comment="fribidi-devel-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824938" comment="fwupd-1.0.8-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824939" comment="fwupd-devel-1.0.8-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824940" comment="fwupdate-12-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824941" comment="fwupdate-devel-12-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824942" comment="fwupdate-efi-12-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824943" comment="fwupdate-libs-12-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824944" comment="gcr-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824945" comment="gcr-devel-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824946" comment="gdk-pixbuf2-2.36.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824947" comment="gdk-pixbuf2-devel-2.36.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824948" comment="gdk-pixbuf2-tests-2.36.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824949" comment="gdm-3.28.2-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824950" comment="gdm-devel-3.28.2-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824951" comment="gdm-pam-extensions-devel-3.28.2-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824952" comment="gedit-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824953" comment="gedit-devel-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824954" comment="gedit-plugin-bookmarks-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824955" comment="gedit-plugin-bracketcompletion-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824956" comment="gedit-plugin-charmap-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824957" comment="gedit-plugin-codecomment-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824958" comment="gedit-plugin-colorpicker-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824959" comment="gedit-plugin-colorschemer-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824960" comment="gedit-plugin-commander-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824961" comment="gedit-plugin-drawspaces-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824962" comment="gedit-plugin-findinfiles-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824963" comment="gedit-plugin-joinlines-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824964" comment="gedit-plugin-multiedit-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824965" comment="gedit-plugin-smartspaces-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824966" comment="gedit-plugin-synctex-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824967" comment="gedit-plugin-terminal-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824968" comment="gedit-plugin-textsize-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824969" comment="gedit-plugin-translate-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824970" comment="gedit-plugin-wordcompletion-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824971" comment="gedit-plugins-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824972" comment="gedit-plugins-data-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824973" comment="geoclue2-2.4.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824974" comment="geoclue2-demos-2.4.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824975" comment="geoclue2-devel-2.4.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824976" comment="geoclue2-libs-2.4.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824977" comment="geocode-glib-3.26.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824978" comment="geocode-glib-devel-3.26.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824979" comment="gjs-1.52.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824980" comment="gjs-devel-1.52.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824981" comment="gjs-tests-1.52.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824982" comment="glade-3.22.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824983" comment="glade-devel-3.22.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824984" comment="glade-libs-3.22.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824985" comment="glib-networking-2.56.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824986" comment="glib-networking-tests-2.56.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824987" comment="glib2-2.56.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824988" comment="glib2-devel-2.56.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824989" comment="glib2-doc-2.56.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824990" comment="glib2-fam-2.56.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824991" comment="glib2-static-2.56.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824992" comment="glib2-tests-2.56.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824993" comment="glibmm24-2.56.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824994" comment="glibmm24-devel-2.56.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824995" comment="glibmm24-doc-2.56.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824996" comment="gnome-backgrounds-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824997" comment="gnome-bluetooth-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824998" comment="gnome-bluetooth-libs-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824999" comment="gnome-bluetooth-libs-devel-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825000" comment="gnome-boxes-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825001" comment="gnome-calculator-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825002" comment="gnome-classic-session-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825003" comment="gnome-clocks-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825004" comment="gnome-color-manager-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825005" comment="gnome-contacts-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825006" comment="gnome-desktop3-3.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825007" comment="gnome-desktop3-devel-3.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825008" comment="gnome-desktop3-tests-3.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825009" comment="gnome-devel-docs-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825010" comment="gnome-dictionary-3.26.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825011" comment="gnome-disk-utility-3.28.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825012" comment="gnome-documents-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825013" comment="gnome-documents-libs-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825014" comment="gnome-font-viewer-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825015" comment="gnome-getting-started-docs-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825016" comment="gnome-getting-started-docs-cs-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825017" comment="gnome-getting-started-docs-de-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825018" comment="gnome-getting-started-docs-es-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825019" comment="gnome-getting-started-docs-fr-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825020" comment="gnome-getting-started-docs-gl-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825021" comment="gnome-getting-started-docs-hu-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825022" comment="gnome-getting-started-docs-it-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825023" comment="gnome-getting-started-docs-pl-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825024" comment="gnome-getting-started-docs-pt_BR-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825025" comment="gnome-getting-started-docs-ru-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825026" comment="gnome-initial-setup-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825027" comment="gnome-keyring-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825028" comment="gnome-keyring-pam-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825029" comment="gnome-online-accounts-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825030" comment="gnome-online-accounts-devel-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825031" comment="gnome-online-miners-3.26.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825032" comment="gnome-packagekit-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825033" comment="gnome-packagekit-common-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825034" comment="gnome-packagekit-installer-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825035" comment="gnome-packagekit-updater-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825036" comment="gnome-screenshot-3.26.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825037" comment="gnome-session-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825038" comment="gnome-session-custom-session-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825039" comment="gnome-session-wayland-session-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825040" comment="gnome-session-xsession-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825041" comment="gnome-settings-daemon-3.28.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825042" comment="gnome-settings-daemon-devel-3.28.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825043" comment="gnome-shell-3.28.3-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825044" comment="gnome-shell-extension-alternate-tab-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825045" comment="gnome-shell-extension-apps-menu-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825046" comment="gnome-shell-extension-auto-move-windows-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825047" comment="gnome-shell-extension-common-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825048" comment="gnome-shell-extension-dash-to-dock-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825049" comment="gnome-shell-extension-drive-menu-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825050" comment="gnome-shell-extension-launch-new-instance-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825051" comment="gnome-shell-extension-native-window-placement-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825052" comment="gnome-shell-extension-no-hot-corner-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825053" comment="gnome-shell-extension-panel-favorites-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825054" comment="gnome-shell-extension-places-menu-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825055" comment="gnome-shell-extension-screenshot-window-sizer-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825056" comment="gnome-shell-extension-systemMonitor-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825057" comment="gnome-shell-extension-top-icons-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825058" comment="gnome-shell-extension-updates-dialog-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825059" comment="gnome-shell-extension-user-theme-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825060" comment="gnome-shell-extension-window-list-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825061" comment="gnome-shell-extension-windowsNavigator-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825062" comment="gnome-shell-extension-workspace-indicator-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825063" comment="gnome-software-3.28.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825064" comment="gnome-software-devel-3.28.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825065" comment="gnome-software-editor-3.28.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825066" comment="gnome-system-monitor-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825067" comment="gnome-terminal-3.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825068" comment="gnome-terminal-nautilus-3.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825069" comment="gnome-themes-standard-3.28-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825070" comment="gnome-tweak-tool-3.28.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825071" comment="gnome-user-docs-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825072" comment="gnote-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825073" comment="gobject-introspection-1.56.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825074" comment="gobject-introspection-devel-1.56.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825075" comment="gom-0.3.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825076" comment="gom-devel-0.3.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825077" comment="google-noto-emoji-color-fonts-20180508-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825078" comment="google-noto-emoji-fonts-20180508-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825079" comment="grilo-0.3.6-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825080" comment="grilo-devel-0.3.6-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825081" comment="grilo-plugins-0.3.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825082" comment="gsettings-desktop-schemas-3.28.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825083" comment="gsettings-desktop-schemas-devel-3.28.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825084" comment="gspell-1.6.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825085" comment="gspell-devel-1.6.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825086" comment="gspell-doc-1.6.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825087" comment="gssdp-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825088" comment="gssdp-devel-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825089" comment="gssdp-docs-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825090" comment="gssdp-utils-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825091" comment="gstreamer1-plugins-base-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825092" comment="gstreamer1-plugins-base-devel-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825093" comment="gstreamer1-plugins-base-devel-docs-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825094" comment="gstreamer1-plugins-base-tools-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825095" comment="gtk-doc-1.28-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825096" comment="gtk-update-icon-cache-3.22.30-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825097" comment="gtk3-3.22.30-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825098" comment="gtk3-devel-3.22.30-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825099" comment="gtk3-devel-docs-3.22.30-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825100" comment="gtk3-immodule-xim-3.22.30-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825101" comment="gtk3-immodules-3.22.30-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825102" comment="gtk3-tests-3.22.30-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825103" comment="gtksourceview3-3.24.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825104" comment="gtksourceview3-devel-3.24.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825105" comment="gtksourceview3-tests-3.24.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825106" comment="gucharmap-10.0.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825107" comment="gucharmap-devel-10.0.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825108" comment="gucharmap-libs-10.0.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825109" comment="gupnp-1.0.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825110" comment="gupnp-devel-1.0.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825111" comment="gupnp-docs-1.0.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825112" comment="gupnp-igd-0.2.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825113" comment="gupnp-igd-devel-0.2.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825114" comment="gupnp-igd-python-0.2.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825115" comment="gvfs-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825116" comment="gvfs-afc-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825117" comment="gvfs-afp-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825118" comment="gvfs-archive-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825119" comment="gvfs-client-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825120" comment="gvfs-devel-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825121" comment="gvfs-fuse-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825122" comment="gvfs-goa-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825123" comment="gvfs-gphoto2-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825124" comment="gvfs-mtp-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825125" comment="gvfs-smb-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825126" comment="gvfs-tests-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825127" comment="harfbuzz-1.7.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825128" comment="harfbuzz-devel-1.7.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825129" comment="harfbuzz-icu-1.7.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825130" comment="json-glib-1.4.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825131" comment="json-glib-devel-1.4.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825132" comment="json-glib-tests-1.4.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825133" comment="libappstream-glib-0.7.8-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825134" comment="libappstream-glib-builder-0.7.8-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825135" comment="libappstream-glib-builder-devel-0.7.8-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825136" comment="libappstream-glib-devel-0.7.8-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825137" comment="libchamplain-0.12.16-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825138" comment="libchamplain-demos-0.12.16-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825139" comment="libchamplain-devel-0.12.16-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825140" comment="libchamplain-gtk-0.12.16-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825141" comment="libcroco-0.6.12-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825142" comment="libcroco-devel-0.6.12-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825143" comment="libgdata-0.17.9-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825144" comment="libgdata-devel-0.17.9-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825145" comment="libgee-0.20.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825146" comment="libgee-devel-0.20.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825147" comment="libgepub-0.6.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825148" comment="libgepub-devel-0.6.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825149" comment="libgexiv2-0.10.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825150" comment="libgexiv2-devel-0.10.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825151" comment="libgnomekbd-3.26.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825152" comment="libgnomekbd-devel-3.26.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825153" comment="libgovirt-0.3.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825154" comment="libgovirt-devel-0.3.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825155" comment="libgtop2-2.38.0-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825156" comment="libgtop2-devel-2.38.0-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825157" comment="libgweather-3.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825158" comment="libgweather-devel-3.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825159" comment="libgxps-0.3.0-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825160" comment="libgxps-devel-0.3.0-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825161" comment="libgxps-tools-0.3.0-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825162" comment="libical-3.0.3-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825163" comment="libical-devel-3.0.3-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825164" comment="libical-glib-3.0.3-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825165" comment="libical-glib-devel-3.0.3-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825166" comment="libical-glib-doc-3.0.3-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825167" comment="libjpeg-turbo-1.2.90-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825168" comment="libjpeg-turbo-devel-1.2.90-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825169" comment="libjpeg-turbo-static-1.2.90-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825170" comment="libjpeg-turbo-utils-1.2.90-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825171" comment="libmediaart-1.9.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825172" comment="libmediaart-devel-1.9.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825173" comment="libmediaart-tests-1.9.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825174" comment="libosinfo-1.1.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825175" comment="libosinfo-devel-1.1.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825176" comment="libosinfo-vala-1.1.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825177" comment="libpeas-1.22.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825178" comment="libpeas-devel-1.22.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825179" comment="libpeas-gtk-1.22.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825180" comment="libpeas-loader-python-1.22.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825181" comment="librsvg2-2.40.20-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825182" comment="librsvg2-devel-2.40.20-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825183" comment="librsvg2-tools-2.40.20-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825184" comment="libsecret-0.18.6-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825185" comment="libsecret-devel-0.18.6-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825186" comment="libsoup-2.62.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825187" comment="libsoup-devel-2.62.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825188" comment="libwayland-client-1.15.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825189" comment="libwayland-cursor-1.15.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825190" comment="libwayland-egl-1.15.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825191" comment="libwayland-server-1.15.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825192" comment="libwnck3-3.24.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825193" comment="libwnck3-devel-3.24.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825194" comment="mozjs52-52.9.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825195" comment="mozjs52-devel-52.9.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825196" comment="mutter-3.28.3-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825197" comment="mutter-devel-3.28.3-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825198" comment="nautilus-3.26.3.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825199" comment="nautilus-devel-3.26.3.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825200" comment="nautilus-extensions-3.26.3.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825201" comment="nautilus-sendto-3.8.6-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825202" comment="openchange-2.3-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825203" comment="openchange-client-2.3-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825204" comment="openchange-devel-2.3-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825205" comment="openchange-devel-docs-2.3-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825206" comment="osinfo-db-20180531-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825207" comment="pango-1.42.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825208" comment="pango-devel-1.42.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825209" comment="pango-tests-1.42.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825210" comment="poppler-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825211" comment="poppler-cpp-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825212" comment="poppler-cpp-devel-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825213" comment="poppler-demos-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825214" comment="poppler-devel-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825215" comment="poppler-glib-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825216" comment="poppler-glib-devel-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825217" comment="poppler-qt-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825218" comment="poppler-qt-devel-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825219" comment="poppler-utils-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825220" comment="python2-gexiv2-0.10.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825221" comment="python2-pyatspi-2.26.0-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825222" comment="rest-0.8.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825223" comment="rest-devel-0.8.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825224" comment="rhythmbox-3.4.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825225" comment="rhythmbox-devel-3.4.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825226" comment="seahorse-nautilus-3.11.92-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825227" comment="shotwell-0.28.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825228" comment="sushi-3.28.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825229" comment="totem-3.26.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825230" comment="totem-devel-3.26.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825231" comment="totem-nautilus-3.26.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825232" comment="totem-pl-parser-3.26.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825233" comment="totem-pl-parser-devel-3.26.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825234" comment="turbojpeg-1.2.90-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825235" comment="turbojpeg-devel-1.2.90-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825236" comment="upower-0.99.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825237" comment="upower-devel-0.99.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825238" comment="upower-devel-docs-0.99.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825239" comment="vala-0.40.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825240" comment="vala-devel-0.40.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825241" comment="vala-doc-0.40.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825242" comment="valadoc-0.40.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825243" comment="valadoc-devel-0.40.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825244" comment="vino-3.22.0-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825245" comment="vte-profile-0.52.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825246" comment="vte291-0.52.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825247" comment="vte291-devel-0.52.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825248" comment="wayland-devel-1.15.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825249" comment="wayland-doc-1.15.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825250" comment="wayland-protocols-devel-1.14-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825251" comment="webkitgtk4-2.20.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825252" comment="webkitgtk4-devel-2.20.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825253" comment="webkitgtk4-doc-2.20.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825254" comment="webkitgtk4-jsc-2.20.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825255" comment="webkitgtk4-jsc-devel-2.20.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825256" comment="webkitgtk4-plugin-process-gtk2-2.20.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825257" comment="xdg-desktop-portal-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825258" comment="xdg-desktop-portal-devel-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825259" comment="xdg-desktop-portal-gtk-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825260" comment="yelp-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825261" comment="yelp-devel-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825262" comment="yelp-libs-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825263" comment="yelp-tools-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825264" comment="yelp-xsl-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825265" comment="yelp-xsl-devel-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825266" comment="zenity-3.28.1-1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814036" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14036</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14036" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14036" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14036" ref_url="https://www.suse.com/security/cve/CVE-2018-14036" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2778-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192778-1.html" source="SUSE-SU"/>
    <description>
    Directory Traversal with ../ sequences occurs in AccountsService before 0.6.50 because of an insufficient path check in user_change_icon_file_authorized_cb() in user.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-07"/>
	<updated date="2026-03-07"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-14036/">CVE-2018-14036 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14036">CVE-2018-14036 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1099699">SUSE bug 1099699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101332">SUSE bug 1101332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112694">SUSE bug 1112694</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824843" comment="PackageKit-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824844" comment="PackageKit-command-not-found-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824845" comment="PackageKit-cron-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824846" comment="PackageKit-glib-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824847" comment="PackageKit-glib-devel-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824848" comment="PackageKit-gstreamer-plugin-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824849" comment="PackageKit-gtk3-module-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824850" comment="PackageKit-yum-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824851" comment="PackageKit-yum-plugin-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824852" comment="accountsservice-0.6.50-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824853" comment="accountsservice-devel-0.6.50-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824854" comment="accountsservice-libs-0.6.50-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824855" comment="adwaita-cursor-theme-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824856" comment="adwaita-gtk2-theme-3.28-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824857" comment="adwaita-icon-theme-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824858" comment="adwaita-icon-theme-devel-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824859" comment="appstream-data-7-20180614.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824860" comment="at-spi2-atk-2.26.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824861" comment="at-spi2-atk-devel-2.26.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824862" comment="at-spi2-core-2.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824863" comment="at-spi2-core-devel-2.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824864" comment="atk-2.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824865" comment="atk-devel-2.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824866" comment="baobab-3.28.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824867" comment="bolt-0.4-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824868" comment="brasero-3.12.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824869" comment="brasero-devel-3.12.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824870" comment="brasero-libs-3.12.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824871" comment="brasero-nautilus-3.12.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824872" comment="cairo-1.15.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824873" comment="cairo-devel-1.15.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824874" comment="cairo-gobject-1.15.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824875" comment="cairo-gobject-devel-1.15.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824876" comment="cairo-tools-1.15.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824877" comment="cheese-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824878" comment="cheese-libs-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824879" comment="cheese-libs-devel-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824880" comment="clutter-gst3-3.0.26-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824881" comment="clutter-gst3-devel-3.0.26-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824882" comment="compat-exiv2-023-0.23-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824883" comment="compat-libical1-1.0.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824884" comment="control-center-3.28.1-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824885" comment="control-center-filesystem-3.28.1-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824886" comment="dconf-0.28.0-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824887" comment="dconf-devel-0.28.0-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824888" comment="dconf-editor-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824889" comment="devhelp-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824890" comment="devhelp-devel-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824891" comment="devhelp-libs-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824892" comment="ekiga-4.0.1-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824893" comment="empathy-3.12.13-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824894" comment="eog-3.28.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824895" comment="eog-devel-3.28.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824896" comment="evince-3.28.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824897" comment="evince-browser-plugin-3.28.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824898" comment="evince-devel-3.28.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824899" comment="evince-dvi-3.28.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824900" comment="evince-libs-3.28.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824901" comment="evince-nautilus-3.28.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824902" comment="evolution-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824903" comment="evolution-bogofilter-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824904" comment="evolution-data-server-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824905" comment="evolution-data-server-devel-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824906" comment="evolution-data-server-doc-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824907" comment="evolution-data-server-langpacks-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824908" comment="evolution-data-server-perl-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824909" comment="evolution-data-server-tests-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824910" comment="evolution-devel-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824911" comment="evolution-devel-docs-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824912" comment="evolution-ews-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824913" comment="evolution-ews-langpacks-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824914" comment="evolution-help-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824915" comment="evolution-langpacks-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824916" comment="evolution-mapi-3.28.3-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824917" comment="evolution-mapi-langpacks-3.28.3-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824918" comment="evolution-pst-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824919" comment="evolution-spamassassin-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824920" comment="evolution-tests-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824921" comment="file-roller-3.28.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824922" comment="file-roller-nautilus-3.28.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824923" comment="flatpak-1.0.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824924" comment="flatpak-builder-1.0.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824925" comment="flatpak-devel-1.0.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824926" comment="flatpak-libs-1.0.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824927" comment="folks-0.11.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824928" comment="folks-devel-0.11.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824929" comment="folks-tools-0.11.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824930" comment="fontconfig-2.13.0-4.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824931" comment="fontconfig-devel-2.13.0-4.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824932" comment="fontconfig-devel-doc-2.13.0-4.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824933" comment="freetype-2.8-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824934" comment="freetype-demos-2.8-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824935" comment="freetype-devel-2.8-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824936" comment="fribidi-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824937" comment="fribidi-devel-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824938" comment="fwupd-1.0.8-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824939" comment="fwupd-devel-1.0.8-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824940" comment="fwupdate-12-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824941" comment="fwupdate-devel-12-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824942" comment="fwupdate-efi-12-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824943" comment="fwupdate-libs-12-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824944" comment="gcr-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824945" comment="gcr-devel-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824946" comment="gdk-pixbuf2-2.36.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824947" comment="gdk-pixbuf2-devel-2.36.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824948" comment="gdk-pixbuf2-tests-2.36.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824949" comment="gdm-3.28.2-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824950" comment="gdm-devel-3.28.2-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824951" comment="gdm-pam-extensions-devel-3.28.2-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824952" comment="gedit-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824953" comment="gedit-devel-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824954" comment="gedit-plugin-bookmarks-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824955" comment="gedit-plugin-bracketcompletion-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824956" comment="gedit-plugin-charmap-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824957" comment="gedit-plugin-codecomment-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824958" comment="gedit-plugin-colorpicker-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824959" comment="gedit-plugin-colorschemer-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824960" comment="gedit-plugin-commander-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824961" comment="gedit-plugin-drawspaces-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824962" comment="gedit-plugin-findinfiles-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824963" comment="gedit-plugin-joinlines-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824964" comment="gedit-plugin-multiedit-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824965" comment="gedit-plugin-smartspaces-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824966" comment="gedit-plugin-synctex-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824967" comment="gedit-plugin-terminal-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824968" comment="gedit-plugin-textsize-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824969" comment="gedit-plugin-translate-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824970" comment="gedit-plugin-wordcompletion-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824971" comment="gedit-plugins-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824972" comment="gedit-plugins-data-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824973" comment="geoclue2-2.4.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824974" comment="geoclue2-demos-2.4.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824975" comment="geoclue2-devel-2.4.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824976" comment="geoclue2-libs-2.4.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824977" comment="geocode-glib-3.26.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824978" comment="geocode-glib-devel-3.26.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824979" comment="gjs-1.52.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824980" comment="gjs-devel-1.52.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824981" comment="gjs-tests-1.52.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824982" comment="glade-3.22.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824983" comment="glade-devel-3.22.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824984" comment="glade-libs-3.22.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824985" comment="glib-networking-2.56.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824986" comment="glib-networking-tests-2.56.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824987" comment="glib2-2.56.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824988" comment="glib2-devel-2.56.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824989" comment="glib2-doc-2.56.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824990" comment="glib2-fam-2.56.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824991" comment="glib2-static-2.56.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824992" comment="glib2-tests-2.56.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824993" comment="glibmm24-2.56.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824994" comment="glibmm24-devel-2.56.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824995" comment="glibmm24-doc-2.56.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824996" comment="gnome-backgrounds-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824997" comment="gnome-bluetooth-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824998" comment="gnome-bluetooth-libs-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824999" comment="gnome-bluetooth-libs-devel-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825000" comment="gnome-boxes-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825001" comment="gnome-calculator-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825002" comment="gnome-classic-session-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825003" comment="gnome-clocks-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825004" comment="gnome-color-manager-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825005" comment="gnome-contacts-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825006" comment="gnome-desktop3-3.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825007" comment="gnome-desktop3-devel-3.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825008" comment="gnome-desktop3-tests-3.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825009" comment="gnome-devel-docs-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825010" comment="gnome-dictionary-3.26.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825011" comment="gnome-disk-utility-3.28.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825012" comment="gnome-documents-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825013" comment="gnome-documents-libs-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825014" comment="gnome-font-viewer-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825015" comment="gnome-getting-started-docs-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825016" comment="gnome-getting-started-docs-cs-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825017" comment="gnome-getting-started-docs-de-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825018" comment="gnome-getting-started-docs-es-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825019" comment="gnome-getting-started-docs-fr-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825020" comment="gnome-getting-started-docs-gl-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825021" comment="gnome-getting-started-docs-hu-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825022" comment="gnome-getting-started-docs-it-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825023" comment="gnome-getting-started-docs-pl-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825024" comment="gnome-getting-started-docs-pt_BR-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825025" comment="gnome-getting-started-docs-ru-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825026" comment="gnome-initial-setup-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825027" comment="gnome-keyring-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825028" comment="gnome-keyring-pam-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825029" comment="gnome-online-accounts-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825030" comment="gnome-online-accounts-devel-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825031" comment="gnome-online-miners-3.26.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825032" comment="gnome-packagekit-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825033" comment="gnome-packagekit-common-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825034" comment="gnome-packagekit-installer-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825035" comment="gnome-packagekit-updater-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825036" comment="gnome-screenshot-3.26.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825037" comment="gnome-session-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825038" comment="gnome-session-custom-session-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825039" comment="gnome-session-wayland-session-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825040" comment="gnome-session-xsession-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825041" comment="gnome-settings-daemon-3.28.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825042" comment="gnome-settings-daemon-devel-3.28.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825043" comment="gnome-shell-3.28.3-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825044" comment="gnome-shell-extension-alternate-tab-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825045" comment="gnome-shell-extension-apps-menu-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825046" comment="gnome-shell-extension-auto-move-windows-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825047" comment="gnome-shell-extension-common-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825048" comment="gnome-shell-extension-dash-to-dock-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825049" comment="gnome-shell-extension-drive-menu-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825050" comment="gnome-shell-extension-launch-new-instance-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825051" comment="gnome-shell-extension-native-window-placement-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825052" comment="gnome-shell-extension-no-hot-corner-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825053" comment="gnome-shell-extension-panel-favorites-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825054" comment="gnome-shell-extension-places-menu-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825055" comment="gnome-shell-extension-screenshot-window-sizer-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825056" comment="gnome-shell-extension-systemMonitor-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825057" comment="gnome-shell-extension-top-icons-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825058" comment="gnome-shell-extension-updates-dialog-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825059" comment="gnome-shell-extension-user-theme-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825060" comment="gnome-shell-extension-window-list-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825061" comment="gnome-shell-extension-windowsNavigator-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825062" comment="gnome-shell-extension-workspace-indicator-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825063" comment="gnome-software-3.28.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825064" comment="gnome-software-devel-3.28.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825065" comment="gnome-software-editor-3.28.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825066" comment="gnome-system-monitor-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825067" comment="gnome-terminal-3.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825068" comment="gnome-terminal-nautilus-3.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825069" comment="gnome-themes-standard-3.28-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825070" comment="gnome-tweak-tool-3.28.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825071" comment="gnome-user-docs-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825072" comment="gnote-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825073" comment="gobject-introspection-1.56.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825074" comment="gobject-introspection-devel-1.56.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825075" comment="gom-0.3.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825076" comment="gom-devel-0.3.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825077" comment="google-noto-emoji-color-fonts-20180508-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825078" comment="google-noto-emoji-fonts-20180508-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825079" comment="grilo-0.3.6-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825080" comment="grilo-devel-0.3.6-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825081" comment="grilo-plugins-0.3.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825082" comment="gsettings-desktop-schemas-3.28.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825083" comment="gsettings-desktop-schemas-devel-3.28.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825084" comment="gspell-1.6.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825085" comment="gspell-devel-1.6.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825086" comment="gspell-doc-1.6.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825087" comment="gssdp-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825088" comment="gssdp-devel-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825089" comment="gssdp-docs-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825090" comment="gssdp-utils-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825091" comment="gstreamer1-plugins-base-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825092" comment="gstreamer1-plugins-base-devel-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825093" comment="gstreamer1-plugins-base-devel-docs-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825094" comment="gstreamer1-plugins-base-tools-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825095" comment="gtk-doc-1.28-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825096" comment="gtk-update-icon-cache-3.22.30-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825097" comment="gtk3-3.22.30-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825098" comment="gtk3-devel-3.22.30-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825099" comment="gtk3-devel-docs-3.22.30-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825100" comment="gtk3-immodule-xim-3.22.30-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825101" comment="gtk3-immodules-3.22.30-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825102" comment="gtk3-tests-3.22.30-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825103" comment="gtksourceview3-3.24.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825104" comment="gtksourceview3-devel-3.24.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825105" comment="gtksourceview3-tests-3.24.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825106" comment="gucharmap-10.0.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825107" comment="gucharmap-devel-10.0.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825108" comment="gucharmap-libs-10.0.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825109" comment="gupnp-1.0.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825110" comment="gupnp-devel-1.0.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825111" comment="gupnp-docs-1.0.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825112" comment="gupnp-igd-0.2.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825113" comment="gupnp-igd-devel-0.2.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825114" comment="gupnp-igd-python-0.2.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825115" comment="gvfs-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825116" comment="gvfs-afc-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825117" comment="gvfs-afp-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825118" comment="gvfs-archive-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825119" comment="gvfs-client-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825120" comment="gvfs-devel-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825121" comment="gvfs-fuse-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825122" comment="gvfs-goa-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825123" comment="gvfs-gphoto2-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825124" comment="gvfs-mtp-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825125" comment="gvfs-smb-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825126" comment="gvfs-tests-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825127" comment="harfbuzz-1.7.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825128" comment="harfbuzz-devel-1.7.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825129" comment="harfbuzz-icu-1.7.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825130" comment="json-glib-1.4.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825131" comment="json-glib-devel-1.4.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825132" comment="json-glib-tests-1.4.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825133" comment="libappstream-glib-0.7.8-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825134" comment="libappstream-glib-builder-0.7.8-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825135" comment="libappstream-glib-builder-devel-0.7.8-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825136" comment="libappstream-glib-devel-0.7.8-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825137" comment="libchamplain-0.12.16-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825138" comment="libchamplain-demos-0.12.16-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825139" comment="libchamplain-devel-0.12.16-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825140" comment="libchamplain-gtk-0.12.16-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825141" comment="libcroco-0.6.12-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825142" comment="libcroco-devel-0.6.12-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825143" comment="libgdata-0.17.9-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825144" comment="libgdata-devel-0.17.9-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825145" comment="libgee-0.20.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825146" comment="libgee-devel-0.20.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825147" comment="libgepub-0.6.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825148" comment="libgepub-devel-0.6.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825149" comment="libgexiv2-0.10.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825150" comment="libgexiv2-devel-0.10.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825151" comment="libgnomekbd-3.26.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825152" comment="libgnomekbd-devel-3.26.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825153" comment="libgovirt-0.3.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825154" comment="libgovirt-devel-0.3.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825155" comment="libgtop2-2.38.0-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825156" comment="libgtop2-devel-2.38.0-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825157" comment="libgweather-3.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825158" comment="libgweather-devel-3.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825159" comment="libgxps-0.3.0-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825160" comment="libgxps-devel-0.3.0-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825161" comment="libgxps-tools-0.3.0-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825162" comment="libical-3.0.3-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825163" comment="libical-devel-3.0.3-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825164" comment="libical-glib-3.0.3-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825165" comment="libical-glib-devel-3.0.3-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825166" comment="libical-glib-doc-3.0.3-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825167" comment="libjpeg-turbo-1.2.90-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825168" comment="libjpeg-turbo-devel-1.2.90-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825169" comment="libjpeg-turbo-static-1.2.90-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825170" comment="libjpeg-turbo-utils-1.2.90-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825171" comment="libmediaart-1.9.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825172" comment="libmediaart-devel-1.9.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825173" comment="libmediaart-tests-1.9.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825174" comment="libosinfo-1.1.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825175" comment="libosinfo-devel-1.1.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825176" comment="libosinfo-vala-1.1.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825177" comment="libpeas-1.22.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825178" comment="libpeas-devel-1.22.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825179" comment="libpeas-gtk-1.22.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825180" comment="libpeas-loader-python-1.22.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825181" comment="librsvg2-2.40.20-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825182" comment="librsvg2-devel-2.40.20-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825183" comment="librsvg2-tools-2.40.20-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825184" comment="libsecret-0.18.6-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825185" comment="libsecret-devel-0.18.6-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825186" comment="libsoup-2.62.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825187" comment="libsoup-devel-2.62.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825188" comment="libwayland-client-1.15.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825189" comment="libwayland-cursor-1.15.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825190" comment="libwayland-egl-1.15.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825191" comment="libwayland-server-1.15.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825192" comment="libwnck3-3.24.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825193" comment="libwnck3-devel-3.24.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825194" comment="mozjs52-52.9.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825195" comment="mozjs52-devel-52.9.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825196" comment="mutter-3.28.3-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825197" comment="mutter-devel-3.28.3-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825198" comment="nautilus-3.26.3.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825199" comment="nautilus-devel-3.26.3.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825200" comment="nautilus-extensions-3.26.3.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825201" comment="nautilus-sendto-3.8.6-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825202" comment="openchange-2.3-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825203" comment="openchange-client-2.3-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825204" comment="openchange-devel-2.3-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825205" comment="openchange-devel-docs-2.3-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825206" comment="osinfo-db-20180531-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825207" comment="pango-1.42.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825208" comment="pango-devel-1.42.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825209" comment="pango-tests-1.42.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825210" comment="poppler-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825211" comment="poppler-cpp-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825212" comment="poppler-cpp-devel-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825213" comment="poppler-demos-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825214" comment="poppler-devel-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825215" comment="poppler-glib-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825216" comment="poppler-glib-devel-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825217" comment="poppler-qt-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825218" comment="poppler-qt-devel-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825219" comment="poppler-utils-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825220" comment="python2-gexiv2-0.10.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825221" comment="python2-pyatspi-2.26.0-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825222" comment="rest-0.8.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825223" comment="rest-devel-0.8.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825224" comment="rhythmbox-3.4.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825225" comment="rhythmbox-devel-3.4.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825226" comment="seahorse-nautilus-3.11.92-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825227" comment="shotwell-0.28.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825228" comment="sushi-3.28.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825229" comment="totem-3.26.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825230" comment="totem-devel-3.26.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825231" comment="totem-nautilus-3.26.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825232" comment="totem-pl-parser-3.26.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825233" comment="totem-pl-parser-devel-3.26.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825234" comment="turbojpeg-1.2.90-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825235" comment="turbojpeg-devel-1.2.90-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825236" comment="upower-0.99.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825237" comment="upower-devel-0.99.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825238" comment="upower-devel-docs-0.99.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825239" comment="vala-0.40.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825240" comment="vala-devel-0.40.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825241" comment="vala-doc-0.40.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825242" comment="valadoc-0.40.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825243" comment="valadoc-devel-0.40.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825244" comment="vino-3.22.0-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825245" comment="vte-profile-0.52.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825246" comment="vte291-0.52.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825247" comment="vte291-devel-0.52.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825248" comment="wayland-devel-1.15.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825249" comment="wayland-doc-1.15.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825250" comment="wayland-protocols-devel-1.14-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825251" comment="webkitgtk4-2.20.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825252" comment="webkitgtk4-devel-2.20.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825253" comment="webkitgtk4-doc-2.20.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825254" comment="webkitgtk4-jsc-2.20.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825255" comment="webkitgtk4-jsc-devel-2.20.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825256" comment="webkitgtk4-plugin-process-gtk2-2.20.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825257" comment="xdg-desktop-portal-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825258" comment="xdg-desktop-portal-devel-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825259" comment="xdg-desktop-portal-gtk-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825260" comment="yelp-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825261" comment="yelp-devel-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825262" comment="yelp-libs-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825263" comment="yelp-tools-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825264" comment="yelp-xsl-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825265" comment="yelp-xsl-devel-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825266" comment="zenity-3.28.1-1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814040" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14040</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14040" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14040" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14040" ref_url="https://www.suse.com/security/cve/CVE-2018-14040" source="SUSE CVE"/>
    <description>
    In Bootstrap before 4.1.2, XSS is possible in the collapse data-parent attribute.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-14040/">CVE-2018-14040 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14040">CVE-2018-14040 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828282" comment="ipa-client-4.6.8-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828283" comment="ipa-client-common-4.6.8-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828284" comment="ipa-common-4.6.8-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828285" comment="ipa-python-compat-4.6.8-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828286" comment="ipa-server-4.6.8-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828287" comment="ipa-server-common-4.6.8-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828288" comment="ipa-server-dns-4.6.8-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828289" comment="ipa-server-trust-ad-4.6.8-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828290" comment="python2-ipaclient-4.6.8-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828291" comment="python2-ipalib-4.6.8-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828292" comment="python2-ipaserver-4.6.8-5.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814042" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14042</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14042" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14042" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14042" ref_url="https://www.suse.com/security/cve/CVE-2018-14042" source="SUSE CVE"/>
    <description>
    In Bootstrap before 4.1.2, XSS is possible in the data-container property of tooltip.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-14042/">CVE-2018-14042 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14042">CVE-2018-14042 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828282" comment="ipa-client-4.6.8-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828283" comment="ipa-client-common-4.6.8-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828284" comment="ipa-common-4.6.8-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828285" comment="ipa-python-compat-4.6.8-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828286" comment="ipa-server-4.6.8-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828287" comment="ipa-server-common-4.6.8-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828288" comment="ipa-server-dns-4.6.8-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828289" comment="ipa-server-trust-ad-4.6.8-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828290" comment="python2-ipaclient-4.6.8-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828291" comment="python2-ipalib-4.6.8-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828292" comment="python2-ipaserver-4.6.8-5.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814046" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14046</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14046" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14046" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14046" ref_url="https://www.suse.com/security/cve/CVE-2018-14046" source="SUSE CVE"/>
    <description>
    Exiv2 0.26 has a heap-based buffer over-read in WebPImage::decodeChunks in webpimage.cpp.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14046/">CVE-2018-14046 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14046">CVE-2018-14046 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1101339">SUSE bug 1101339</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826187" comment="exiv2-0.27.0-2.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826188" comment="exiv2-devel-0.27.0-2.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826189" comment="exiv2-doc-0.27.0-2.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826190" comment="exiv2-libs-0.27.0-2.el7_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814340" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14340</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14340" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14340" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14340" ref_url="https://www.suse.com/security/cve/CVE-2018-14340" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2184-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FDE43GVAAM6RSXIQ4F7WKKUYN5F4NXFY/#FDE43GVAAM6RSXIQ4F7WKKUYN5F4NXFY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2188-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BFWB6T6PLE6CEXZYXGEJKPQBTXXUNLEK/#BFWB6T6PLE6CEXZYXGEJKPQBTXXUNLEK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5IUFGOOBYOJSD6ELATYP2KAV4TMLYPWB/" source="SUSE-SU"/>
    <description>
    In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, dissectors that support zlib decompression could crash. This was addressed in epan/tvbuff_zlib.c by rejecting negative lengths to avoid a buffer over-read.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14340/">CVE-2018-14340 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14340">CVE-2018-14340 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1101804">SUSE bug 1101804</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827643" comment="wireshark-1.10.14-24.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827644" comment="wireshark-devel-1.10.14-24.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827645" comment="wireshark-gnome-1.10.14-24.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814341" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14341</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14341" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14341" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14341" ref_url="https://www.suse.com/security/cve/CVE-2018-14341" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2184-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FDE43GVAAM6RSXIQ4F7WKKUYN5F4NXFY/#FDE43GVAAM6RSXIQ4F7WKKUYN5F4NXFY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2188-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BFWB6T6PLE6CEXZYXGEJKPQBTXXUNLEK/#BFWB6T6PLE6CEXZYXGEJKPQBTXXUNLEK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5IUFGOOBYOJSD6ELATYP2KAV4TMLYPWB/" source="SUSE-SU"/>
    <description>
    In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the DICOM dissector could go into a large or infinite loop. This was addressed in epan/dissectors/packet-dcm.c by preventing an offset overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14341/">CVE-2018-14341 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14341">CVE-2018-14341 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1101776">SUSE bug 1101776</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827643" comment="wireshark-1.10.14-24.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827644" comment="wireshark-devel-1.10.14-24.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827645" comment="wireshark-gnome-1.10.14-24.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814348" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14348</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14348" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14348" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14348" ref_url="https://www.suse.com/security/cve/CVE-2018-14348" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004358.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004359.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004482.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2241-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IQOOELM4QJ2K3WKCMW3KW6VBC6QTWF45/#IQOOELM4QJ2K3WKCMW3KW6VBC6QTWF45" source="SUSE-SU"/>
    <description>
    libcgroup up to and including 0.41 creates /var/log/cgred with mode 0666 regardless of the configured umask, leading to disclosure of information.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-14348/">CVE-2018-14348 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14348">CVE-2018-14348 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1100365">SUSE bug 1100365</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826073" comment="libcgroup-0.41-21.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826074" comment="libcgroup-devel-0.41-21.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826075" comment="libcgroup-pam-0.41-21.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826076" comment="libcgroup-tools-0.41-21.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814354" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14354</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14354" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14354" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14354" ref_url="https://www.suse.com/security/cve/CVE-2018-14354" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004327.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2403-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005432.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2212-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DOKOW6TLEFRIONJPNWZYWW7NMBLV3AWF/#DOKOW6TLEFRIONJPNWZYWW7NMBLV3AWF" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0052-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DZCWXEAUIOLHKNGMVSJPJWM4CB2WNKOV/#DZCWXEAUIOLHKNGMVSJPJWM4CB2WNKOV" source="SUSE-SU"/>
    <description>
    An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. They allow remote IMAP servers to execute arbitrary commands via backquote characters, related to the mailboxes command associated with a manual subscription or unsubscription.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14354/">CVE-2018-14354 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14354">CVE-2018-14354 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1101428">SUSE bug 1101428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101578">SUSE bug 1101578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101581">SUSE bug 1101581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101589">SUSE bug 1101589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101593">SUSE bug 1101593</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824528" comment="mutt-1.5.21-28.el7_5 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814355" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14355</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14355" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14355" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14355" ref_url="https://www.suse.com/security/cve/CVE-2018-14355" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004327.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2403-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005432.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2212-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DOKOW6TLEFRIONJPNWZYWW7NMBLV3AWF/#DOKOW6TLEFRIONJPNWZYWW7NMBLV3AWF" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0052-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DZCWXEAUIOLHKNGMVSJPJWM4CB2WNKOV/#DZCWXEAUIOLHKNGMVSJPJWM4CB2WNKOV" source="SUSE-SU"/>
    <description>
    An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/util.c mishandles ".." directory traversal in a mailbox name.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-14355/">CVE-2018-14355 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14355">CVE-2018-14355 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1101428">SUSE bug 1101428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101577">SUSE bug 1101577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101593">SUSE bug 1101593</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827804" comment="mutt-1.5.21-29.el7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814357" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14357</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14357" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14357" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14357" ref_url="https://www.suse.com/security/cve/CVE-2018-14357" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004327.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2403-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005432.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2212-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DOKOW6TLEFRIONJPNWZYWW7NMBLV3AWF/#DOKOW6TLEFRIONJPNWZYWW7NMBLV3AWF" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0052-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DZCWXEAUIOLHKNGMVSJPJWM4CB2WNKOV/#DZCWXEAUIOLHKNGMVSJPJWM4CB2WNKOV" source="SUSE-SU"/>
    <description>
    An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. They allow remote IMAP servers to execute arbitrary commands via backquote characters, related to the mailboxes command associated with an automatic subscription.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14357/">CVE-2018-14357 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14357">CVE-2018-14357 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1101428">SUSE bug 1101428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101573">SUSE bug 1101573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101581">SUSE bug 1101581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101589">SUSE bug 1101589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101593">SUSE bug 1101593</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824528" comment="mutt-1.5.21-28.el7_5 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814362" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14362</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14362" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14362" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14362" ref_url="https://www.suse.com/security/cve/CVE-2018-14362" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004327.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2403-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005432.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2212-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DOKOW6TLEFRIONJPNWZYWW7NMBLV3AWF/#DOKOW6TLEFRIONJPNWZYWW7NMBLV3AWF" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0052-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DZCWXEAUIOLHKNGMVSJPJWM4CB2WNKOV/#DZCWXEAUIOLHKNGMVSJPJWM4CB2WNKOV" source="SUSE-SU"/>
    <description>
    An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. pop.c does not forbid characters that may have unsafe interaction with message-cache pathnames, as demonstrated by a '/' character.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14362/">CVE-2018-14362 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14362">CVE-2018-14362 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1101428">SUSE bug 1101428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101567">SUSE bug 1101567</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101589">SUSE bug 1101589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101593">SUSE bug 1101593</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824528" comment="mutt-1.5.21-28.el7_5 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814368" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14368</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14368" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14368" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14368" ref_url="https://www.suse.com/security/cve/CVE-2018-14368" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2184-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FDE43GVAAM6RSXIQ4F7WKKUYN5F4NXFY/#FDE43GVAAM6RSXIQ4F7WKKUYN5F4NXFY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2188-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BFWB6T6PLE6CEXZYXGEJKPQBTXXUNLEK/#BFWB6T6PLE6CEXZYXGEJKPQBTXXUNLEK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5IUFGOOBYOJSD6ELATYP2KAV4TMLYPWB/" source="SUSE-SU"/>
    <description>
    In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the Bazaar protocol dissector could go into an infinite loop. This was addressed in epan/dissectors/packet-bzr.c by properly handling items that are too long.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14368/">CVE-2018-14368 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14368">CVE-2018-14368 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1101794">SUSE bug 1101794</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827643" comment="wireshark-1.10.14-24.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827644" comment="wireshark-devel-1.10.14-24.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827645" comment="wireshark-gnome-1.10.14-24.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814404" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14404</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14404" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14404" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14404" ref_url="https://www.suse.com/security/cve/CVE-2018-14404" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005217.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3107-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ILYW2C6FGNAL4Q6R3GJ46OYV3767BZKV/#ILYW2C6FGNAL4Q6R3GJ46OYV3767BZKV" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UGBO6EGVEWKLMPKEC5PS3Y7CFCSPFUUM/#UGBO6EGVEWKLMPKEC5PS3Y7CFCSPFUUM" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0185-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AV7P2XPVE2GW6NK2J7LPNFK4M3HRKL2B/#AV7P2XPVE2GW6NK2J7LPNFK4M3HRKL2B" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14697-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U5YNW74OL2W7SH2XTAVN5TODNFIVFL3Y/" source="SUSE-SU"/>
    <description>
    A NULL pointer dereference vulnerability exists in the xpath.c:xmlXPathCompOpEval() function of libxml2 through 2.9.8 when parsing an invalid XPath expression in the XPATH_OP_AND or XPATH_OP_OR case. Applications processing untrusted XSL format inputs with the use of the libxml2 library may be vulnerable to a denial of service attack due to a crash of the application.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14404/">CVE-2018-14404 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14404">CVE-2018-14404 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1102046">SUSE bug 1102046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148896">SUSE bug 1148896</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827903" comment="libxml2-2.9.1-6.el7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827904" comment="libxml2-devel-2.9.1-6.el7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827905" comment="libxml2-python-2.9.1-6.el7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827906" comment="libxml2-static-2.9.1-6.el7.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814434" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14434</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14434" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14434" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14434" ref_url="https://www.suse.com/security/cve/CVE-2018-14434" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004574.html" source="SUSE-SU"/>
		<reference ref_id="TID000019384" ref_url="https://www.suse.com/support/kb/doc/?id=000019384" source="SUSE-SU"/>
		<reference ref_id="TID7023657" ref_url="https://www.suse.com/support/kb/doc/?id=7023657" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2503-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6ZR5F2IFVDRYBJKBF5F7HDHFXFDSFZKO/#6ZR5F2IFVDRYBJKBF5F7HDHFXFDSFZKO" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2811-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BFQX2ZUGKCV3KGTCVGA4YRADO2MVEBCS/#BFQX2ZUGKCV3KGTCVGA4YRADO2MVEBCS" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-4 has a memory leak for a colormap in WriteMPCImage in coders/mpc.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14434/">CVE-2018-14434 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14434">CVE-2018-14434 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1102003">SUSE bug 1102003</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827880" comment="ImageMagick-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827881" comment="ImageMagick-c++-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827882" comment="ImageMagick-c++-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827883" comment="ImageMagick-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827884" comment="ImageMagick-doc-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827885" comment="ImageMagick-perl-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827886" comment="autotrace-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827887" comment="autotrace-devel-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827888" comment="emacs-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827889" comment="emacs-common-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827890" comment="emacs-el-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827891" comment="emacs-filesystem-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827892" comment="emacs-nox-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827893" comment="emacs-terminal-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827894" comment="inkscape-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827895" comment="inkscape-docs-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827896" comment="inkscape-view-0.92.2-3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814435" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14435</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14435" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14435" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14435" ref_url="https://www.suse.com/security/cve/CVE-2018-14435" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004574.html" source="SUSE-SU"/>
		<reference ref_id="TID000019384" ref_url="https://www.suse.com/support/kb/doc/?id=000019384" source="SUSE-SU"/>
		<reference ref_id="TID7023657" ref_url="https://www.suse.com/support/kb/doc/?id=7023657" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2439-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AZ2UGW6JDN3NTCQDAJXVGOTPD6BWIXP3/#AZ2UGW6JDN3NTCQDAJXVGOTPD6BWIXP3" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2503-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6ZR5F2IFVDRYBJKBF5F7HDHFXFDSFZKO/#6ZR5F2IFVDRYBJKBF5F7HDHFXFDSFZKO" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2811-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BFQX2ZUGKCV3KGTCVGA4YRADO2MVEBCS/#BFQX2ZUGKCV3KGTCVGA4YRADO2MVEBCS" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-4 has a memory leak in DecodeImage in coders/pcd.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14435/">CVE-2018-14435 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14435">CVE-2018-14435 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1102007">SUSE bug 1102007</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827880" comment="ImageMagick-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827881" comment="ImageMagick-c++-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827882" comment="ImageMagick-c++-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827883" comment="ImageMagick-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827884" comment="ImageMagick-doc-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827885" comment="ImageMagick-perl-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827886" comment="autotrace-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827887" comment="autotrace-devel-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827888" comment="emacs-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827889" comment="emacs-common-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827890" comment="emacs-el-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827891" comment="emacs-filesystem-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827892" comment="emacs-nox-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827893" comment="emacs-terminal-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827894" comment="inkscape-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827895" comment="inkscape-docs-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827896" comment="inkscape-view-0.92.2-3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814436" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14436</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14436" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14436" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14436" ref_url="https://www.suse.com/security/cve/CVE-2018-14436" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004574.html" source="SUSE-SU"/>
		<reference ref_id="TID000019384" ref_url="https://www.suse.com/support/kb/doc/?id=000019384" source="SUSE-SU"/>
		<reference ref_id="TID7023657" ref_url="https://www.suse.com/support/kb/doc/?id=7023657" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2503-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6ZR5F2IFVDRYBJKBF5F7HDHFXFDSFZKO/#6ZR5F2IFVDRYBJKBF5F7HDHFXFDSFZKO" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2811-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BFQX2ZUGKCV3KGTCVGA4YRADO2MVEBCS/#BFQX2ZUGKCV3KGTCVGA4YRADO2MVEBCS" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-4 has a memory leak in ReadMIFFImage in coders/miff.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14436/">CVE-2018-14436 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14436">CVE-2018-14436 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1102005">SUSE bug 1102005</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827880" comment="ImageMagick-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827881" comment="ImageMagick-c++-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827882" comment="ImageMagick-c++-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827883" comment="ImageMagick-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827884" comment="ImageMagick-doc-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827885" comment="ImageMagick-perl-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827886" comment="autotrace-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827887" comment="autotrace-devel-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827888" comment="emacs-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827889" comment="emacs-common-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827890" comment="emacs-el-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827891" comment="emacs-filesystem-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827892" comment="emacs-nox-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827893" comment="emacs-terminal-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827894" comment="inkscape-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827895" comment="inkscape-docs-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827896" comment="inkscape-view-0.92.2-3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814437" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14437</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14437" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14437" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14437" ref_url="https://www.suse.com/security/cve/CVE-2018-14437" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004574.html" source="SUSE-SU"/>
		<reference ref_id="TID000019384" ref_url="https://www.suse.com/support/kb/doc/?id=000019384" source="SUSE-SU"/>
		<reference ref_id="TID7023657" ref_url="https://www.suse.com/support/kb/doc/?id=7023657" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2503-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6ZR5F2IFVDRYBJKBF5F7HDHFXFDSFZKO/#6ZR5F2IFVDRYBJKBF5F7HDHFXFDSFZKO" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2811-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BFQX2ZUGKCV3KGTCVGA4YRADO2MVEBCS/#BFQX2ZUGKCV3KGTCVGA4YRADO2MVEBCS" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-4 has a memory leak in parse8BIM in coders/meta.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14437/">CVE-2018-14437 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14437">CVE-2018-14437 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1102004">SUSE bug 1102004</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827880" comment="ImageMagick-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827881" comment="ImageMagick-c++-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827882" comment="ImageMagick-c++-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827883" comment="ImageMagick-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827884" comment="ImageMagick-doc-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827885" comment="ImageMagick-perl-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827886" comment="autotrace-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827887" comment="autotrace-devel-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827888" comment="emacs-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827889" comment="emacs-common-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827890" comment="emacs-el-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827891" comment="emacs-filesystem-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827892" comment="emacs-nox-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827893" comment="emacs-terminal-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827894" comment="inkscape-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827895" comment="inkscape-docs-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827896" comment="inkscape-view-0.92.2-3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814498" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14498</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14498" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14498" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14498" ref_url="https://www.suse.com/security/cve/CVE-2018-14498" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005518.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1118-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7PGXD27E76CECHHIGW57SLEC6FXMAF5N/#7PGXD27E76CECHHIGW57SLEC6FXMAF5N" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1343-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HFGEL7BLY3XLORUPMBTMJE2RLV52VT2R/#HFGEL7BLY3XLORUPMBTMJE2RLV52VT2R" source="SUSE-SU"/>
    <description>
    get_8bit_row in rdbmp.c in libjpeg-turbo through 1.5.90 and MozJPEG through 3.3.1 allows attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted 8-bit BMP in which one or more of the color indices is out of range for the number of palette entries.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14498/">CVE-2018-14498 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14498">CVE-2018-14498 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1128712">SUSE bug 1128712</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826082" comment="libjpeg-turbo-1.2.90-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826083" comment="libjpeg-turbo-devel-1.2.90-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826084" comment="libjpeg-turbo-static-1.2.90-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826085" comment="libjpeg-turbo-utils-1.2.90-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826086" comment="turbojpeg-1.2.90-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826087" comment="turbojpeg-devel-1.2.90-8.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814526" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14526</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14526" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14526" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14526" ref_url="https://www.suse.com/security/cve/CVE-2018-14526" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004798.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011164.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3527-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DJYNKWT24TFOMWG4OBIHWFRWGYPNPMWO/#DJYNKWT24TFOMWG4OBIHWFRWGYPNPMWO" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3539-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YBRTICRXU3VADRFXWSGI5DNTPREEIAQO/#YBRTICRXU3VADRFXWSGI5DNTPREEIAQO" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1345-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AZTEOGAXEUPEEYYEF67IEO4UST36N2UI/#AZTEOGAXEUPEEYYEF67IEO4UST36N2UI" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2053-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2R3VXKTYLLUYFBZQ2NNAI5NSZOBXISJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HDY6AZL2NYOKU57GM74M5JHC5SYA3IY/" source="SUSE-SU"/>
    <description>
    An issue was discovered in rsn_supp/wpa.c in wpa_supplicant 2.0 through 2.6. Under certain conditions, the integrity of EAPOL-Key messages is not checked, leading to a decryption oracle. An attacker within range of the Access Point and client can abuse the vulnerability to recover sensitive information.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-14526/">CVE-2018-14526 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14526">CVE-2018-14526 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1104205">SUSE bug 1104205</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824807" comment="wpa_supplicant-2.6-12.el7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814567" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14567</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14567" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14567" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14567" ref_url="https://www.suse.com/security/cve/CVE-2018-14567" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004657.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3107-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ILYW2C6FGNAL4Q6R3GJ46OYV3767BZKV/#ILYW2C6FGNAL4Q6R3GJ46OYV3767BZKV" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UGBO6EGVEWKLMPKEC5PS3Y7CFCSPFUUM/#UGBO6EGVEWKLMPKEC5PS3Y7CFCSPFUUM" source="SUSE-SU"/>
    <description>
    libxml2 2.9.8, if --with-lzma is used, allows remote attackers to cause a denial of service (infinite loop) via a crafted XML file that triggers LZMA_MEMLIMIT_ERROR, as demonstrated by xmllint, a different vulnerability than CVE-2015-8035 and CVE-2018-9251.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14567/">CVE-2018-14567 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14567">CVE-2018-14567 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1088279">SUSE bug 1088279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088601">SUSE bug 1088601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105166">SUSE bug 1105166</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827903" comment="libxml2-2.9.1-6.el7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827904" comment="libxml2-devel-2.9.1-6.el7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827905" comment="libxml2-python-2.9.1-6.el7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827906" comment="libxml2-static-2.9.1-6.el7.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814598" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14598</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14598" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14598" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14598" ref_url="https://www.suse.com/security/cve/CVE-2018-14598" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2934-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004665.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2567-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GHRDEUUWF54UMJT7EQU25GDSW3ZBOSVT/#GHRDEUUWF54UMJT7EQU25GDSW3ZBOSVT" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3012-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FW5YN6WXKHOT2P6C6HMB3TWLCEPTJMLG/#FW5YN6WXKHOT2P6C6HMB3TWLCEPTJMLG" source="SUSE-SU"/>
    <description>
    An issue was discovered in XListExtensions in ListExt.c in libX11 through 1.6.5. A malicious server can send a reply in which the first string overflows, causing a variable to be set to NULL that will be freed later on, leading to DoS (segmentation fault).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14598/">CVE-2018-14598 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14598">CVE-2018-14598 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1102073">SUSE bug 1102073</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826124" comment="gdm-3.28.2-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826125" comment="gdm-devel-3.28.2-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826126" comment="gdm-pam-extensions-devel-3.28.2-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826127" comment="libX11-1.6.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826128" comment="libX11-common-1.6.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826129" comment="libX11-devel-1.6.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826130" comment="libxkbcommon-0.7.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826131" comment="libxkbcommon-devel-0.7.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826132" comment="libxkbcommon-x11-0.7.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826133" comment="libxkbcommon-x11-devel-0.7.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826134" comment="mesa-libGLw-8.0.0-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826135" comment="mesa-libGLw-devel-8.0.0-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826136" comment="xorg-x11-drv-ati-19.0.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826137" comment="xorg-x11-drv-vesa-2.4.0-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826138" comment="xorg-x11-drv-wacom-0.36.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826139" comment="xorg-x11-drv-wacom-devel-0.36.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826140" comment="xorg-x11-server-Xdmx-1.20.4-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826141" comment="xorg-x11-server-Xephyr-1.20.4-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826142" comment="xorg-x11-server-Xnest-1.20.4-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826143" comment="xorg-x11-server-Xorg-1.20.4-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826144" comment="xorg-x11-server-Xvfb-1.20.4-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826145" comment="xorg-x11-server-Xwayland-1.20.4-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826146" comment="xorg-x11-server-common-1.20.4-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826147" comment="xorg-x11-server-devel-1.20.4-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826148" comment="xorg-x11-server-source-1.20.4-7.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814599" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14599</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14599" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14599" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14599" ref_url="https://www.suse.com/security/cve/CVE-2018-14599" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2934-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004665.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2567-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GHRDEUUWF54UMJT7EQU25GDSW3ZBOSVT/#GHRDEUUWF54UMJT7EQU25GDSW3ZBOSVT" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3012-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FW5YN6WXKHOT2P6C6HMB3TWLCEPTJMLG/#FW5YN6WXKHOT2P6C6HMB3TWLCEPTJMLG" source="SUSE-SU"/>
    <description>
    An issue was discovered in libX11 through 1.6.5. The function XListExtensions in ListExt.c is vulnerable to an off-by-one error caused by malicious server responses, leading to DoS or possibly unspecified other impact.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14599/">CVE-2018-14599 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14599">CVE-2018-14599 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1102062">SUSE bug 1102062</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826124" comment="gdm-3.28.2-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826125" comment="gdm-devel-3.28.2-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826126" comment="gdm-pam-extensions-devel-3.28.2-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826127" comment="libX11-1.6.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826128" comment="libX11-common-1.6.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826129" comment="libX11-devel-1.6.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826130" comment="libxkbcommon-0.7.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826131" comment="libxkbcommon-devel-0.7.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826132" comment="libxkbcommon-x11-0.7.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826133" comment="libxkbcommon-x11-devel-0.7.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826134" comment="mesa-libGLw-8.0.0-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826135" comment="mesa-libGLw-devel-8.0.0-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826136" comment="xorg-x11-drv-ati-19.0.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826137" comment="xorg-x11-drv-vesa-2.4.0-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826138" comment="xorg-x11-drv-wacom-0.36.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826139" comment="xorg-x11-drv-wacom-devel-0.36.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826140" comment="xorg-x11-server-Xdmx-1.20.4-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826141" comment="xorg-x11-server-Xephyr-1.20.4-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826142" comment="xorg-x11-server-Xnest-1.20.4-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826143" comment="xorg-x11-server-Xorg-1.20.4-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826144" comment="xorg-x11-server-Xvfb-1.20.4-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826145" comment="xorg-x11-server-Xwayland-1.20.4-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826146" comment="xorg-x11-server-common-1.20.4-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826147" comment="xorg-x11-server-devel-1.20.4-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826148" comment="xorg-x11-server-source-1.20.4-7.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814600" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14600</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14600" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14600" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14600" ref_url="https://www.suse.com/security/cve/CVE-2018-14600" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2934-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004665.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2567-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GHRDEUUWF54UMJT7EQU25GDSW3ZBOSVT/#GHRDEUUWF54UMJT7EQU25GDSW3ZBOSVT" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3012-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FW5YN6WXKHOT2P6C6HMB3TWLCEPTJMLG/#FW5YN6WXKHOT2P6C6HMB3TWLCEPTJMLG" source="SUSE-SU"/>
    <description>
    An issue was discovered in libX11 through 1.6.5. The function XListExtensions in ListExt.c interprets a variable as signed instead of unsigned, resulting in an out-of-bounds write (of up to 128 bytes), leading to DoS or remote code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14600/">CVE-2018-14600 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14600">CVE-2018-14600 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1102068">SUSE bug 1102068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178417">SUSE bug 1178417</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826124" comment="gdm-3.28.2-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826125" comment="gdm-devel-3.28.2-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826126" comment="gdm-pam-extensions-devel-3.28.2-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826127" comment="libX11-1.6.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826128" comment="libX11-common-1.6.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826129" comment="libX11-devel-1.6.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826130" comment="libxkbcommon-0.7.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826131" comment="libxkbcommon-devel-0.7.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826132" comment="libxkbcommon-x11-0.7.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826133" comment="libxkbcommon-x11-devel-0.7.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826134" comment="mesa-libGLw-8.0.0-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826135" comment="mesa-libGLw-devel-8.0.0-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826136" comment="xorg-x11-drv-ati-19.0.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826137" comment="xorg-x11-drv-vesa-2.4.0-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826138" comment="xorg-x11-drv-wacom-0.36.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826139" comment="xorg-x11-drv-wacom-devel-0.36.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826140" comment="xorg-x11-server-Xdmx-1.20.4-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826141" comment="xorg-x11-server-Xephyr-1.20.4-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826142" comment="xorg-x11-server-Xnest-1.20.4-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826143" comment="xorg-x11-server-Xorg-1.20.4-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826144" comment="xorg-x11-server-Xvfb-1.20.4-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826145" comment="xorg-x11-server-Xwayland-1.20.4-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826146" comment="xorg-x11-server-common-1.20.4-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826147" comment="xorg-x11-server-devel-1.20.4-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826148" comment="xorg-x11-server-source-1.20.4-7.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814618" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14618</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14618" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14618" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14618" ref_url="https://www.suse.com/security/cve/CVE-2018-14618" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004560.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004561.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004563.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2731-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HRFQXLE5AY4NMDJEONTG7SYX74GUB3KS/#HRFQXLE5AY4NMDJEONTG7SYX74GUB3KS" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2736-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LZSFXUQU7XFILG7OTCDROZBOI3XKWZ2C/#LZSFXUQU7XFILG7OTCDROZBOI3XKWZ2C" source="SUSE-SU"/>
    <description>
    curl before version 7.61.1 is vulnerable to a buffer overrun in the NTLM authentication code. The internal function Curl_ntlm_core_mk_nt_hash multiplies the length of the password by two (SUM) to figure out how large temporary storage area to allocate from the heap. The length value is then subsequently used to iterate over the password and generate output into the allocated storage buffer. On systems with a 32 bit size_t, the math to calculate SUM triggers an integer overflow when the password length exceeds 2GB (2^31 bytes). This integer overflow usually causes a very small buffer to actually get allocated instead of the intended very huge one, making the use of that buffer end up in a heap buffer overflow. (This bug is almost identical to CVE-2017-8816.)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14618/">CVE-2018-14618 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14618">CVE-2018-14618 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1106019">SUSE bug 1106019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112758">SUSE bug 1112758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122464">SUSE bug 1122464</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825945" comment="curl-7.29.0-51.el7_6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825946" comment="libcurl-7.29.0-51.el7_6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825947" comment="libcurl-devel-7.29.0-51.el7_6.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814624" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14624</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14624" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14624" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14624" ref_url="https://www.suse.com/security/cve/CVE-2018-14624" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005641.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1397-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YAYQ2CHUAX2LL7XOLPLU4GKMFXDM252V/#YAYQ2CHUAX2LL7XOLPLU4GKMFXDM252V" source="SUSE-SU"/>
    <description>
    A vulnerability was discovered in 389-ds-base through versions 1.3.7.10, 1.3.8.8 and 1.4.0.16. The lock controlling the error log was not correctly used when re-opening the log file in log__error_emergency(). An attacker could send a flood of modifications to a very large DN, which would cause slapd to crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14624/">CVE-2018-14624 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14624">CVE-2018-14624 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1106699">SUSE bug 1106699</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824576" comment="389-ds-base-1.3.7.5-28.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824577" comment="389-ds-base-devel-1.3.7.5-28.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824578" comment="389-ds-base-libs-1.3.7.5-28.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824579" comment="389-ds-base-snmp-1.3.7.5-28.el7_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814625" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14625</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14625" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14625" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14625" ref_url="https://www.suse.com/security/cve/CVE-2018-14625" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0065-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HZOAR52RMMAMPTGY2TTSFPEKREAVGPNY/#HZOAR52RMMAMPTGY2TTSFPEKREAVGPNY" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux Kernel where an attacker may be able to have an uncontrolled read to kernel-memory from within a vm guest. A race condition between connect() and close() function may allow an attacker using the AF_VSOCK protocol to gather a 4 byte information leak or possibly intercept or corrupt AF_VSOCK messages destined to other clients.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-14625/">CVE-2018-14625 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14625">CVE-2018-14625 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1106615">SUSE bug 1106615</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826007" comment="bpftool-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826008" comment="kernel-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826009" comment="kernel-abi-whitelists-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826010" comment="kernel-debug-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826013" comment="kernel-doc-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826014" comment="kernel-headers-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826015" comment="kernel-tools-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826016" comment="kernel-tools-libs-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826018" comment="perf-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826019" comment="python-perf-3.10.0-1062.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814633" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14633</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14633" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14633" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14633" ref_url="https://www.suse.com/security/cve/CVE-2018-14633" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004796.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3618-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3689-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3746-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005476.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3071-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6GTFT5RXJ7J2RAR6KEKOT74XNNP3FJVH/#6GTFT5RXJ7J2RAR6KEKOT74XNNP3FJVH" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3202-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/56FCVMOU7EZPSBZAXDQQHKB5N5YI7KX7/#56FCVMOU7EZPSBZAXDQQHKB5N5YI7KX7" source="SUSE-SU"/>
    <description>
    A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in the Linux kernel in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target's code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely. Kernel versions 4.18.x, 4.14.x and 3.10.x are believed to be vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14633/">CVE-2018-14633 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14633">CVE-2018-14633 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1107829">SUSE bug 1107829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107832">SUSE bug 1107832</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825397" comment="bpftool-3.10.0-957.1.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825398" comment="kernel-3.10.0-957.1.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825399" comment="kernel-abi-whitelists-3.10.0-957.1.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825400" comment="kernel-debug-3.10.0-957.1.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825403" comment="kernel-doc-3.10.0-957.1.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825404" comment="kernel-headers-3.10.0-957.1.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825405" comment="kernel-tools-3.10.0-957.1.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825406" comment="kernel-tools-libs-3.10.0-957.1.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825408" comment="perf-3.10.0-957.1.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825409" comment="python-perf-3.10.0-957.1.3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814634" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14634</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14634" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14634" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14634" ref_url="https://www.suse.com/security/cve/CVE-2018-14634" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2908-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004742.html" source="SUSE-SU"/>
    <description>
    An integer overflow flaw was found in the Linux kernel's create_elf_tables() function. An unprivileged local user with access to SUID (or otherwise privileged) binary could use this flaw to escalate their privileges on the system. Kernel versions 2.6.x, 3.10.x and 4.14.x are believed to be vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14634/">CVE-2018-14634 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14634">CVE-2018-14634 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1108912">SUSE bug 1108912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108963">SUSE bug 1108963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115893">SUSE bug 1115893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120323">SUSE bug 1120323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122265">SUSE bug 1122265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188063">SUSE bug 1188063</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824564" comment="kernel-3.10.0-862.14.4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824565" comment="kernel-abi-whitelists-3.10.0-862.14.4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824566" comment="kernel-debug-3.10.0-862.14.4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824569" comment="kernel-doc-3.10.0-862.14.4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824570" comment="kernel-headers-3.10.0-862.14.4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824571" comment="kernel-tools-3.10.0-862.14.4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824572" comment="kernel-tools-libs-3.10.0-862.14.4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824574" comment="perf-3.10.0-862.14.4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824575" comment="python-perf-3.10.0-862.14.4.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814638" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14638</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14638" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14638" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14638" ref_url="https://www.suse.com/security/cve/CVE-2018-14638" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005817.html" source="SUSE-SU"/>
    <description>
    A flaw was found in 389-ds-base before version 1.3.8.4-13. The process ns-slapd crashes in delete_passwdPolicy function when persistent search connections are terminated unexpectedly leading to remote denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14638/">CVE-2018-14638 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14638">CVE-2018-14638 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1108674">SUSE bug 1108674</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824576" comment="389-ds-base-1.3.7.5-28.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824577" comment="389-ds-base-devel-1.3.7.5-28.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824578" comment="389-ds-base-libs-1.3.7.5-28.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824579" comment="389-ds-base-snmp-1.3.7.5-28.el7_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814646" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14646</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14646" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14646" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14646" ref_url="https://www.suse.com/security/cve/CVE-2018-14646" source="SUSE CVE"/>
    <description>
    The Linux kernel before 4.15-rc8 was found to be vulnerable to a NULL pointer dereference bug in the __netlink_ns_capable() function in the net/netlink/af_netlink.c file. A local attacker could exploit this when a net namespace with a netnsid is assigned to cause a kernel panic and a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-14646/">CVE-2018-14646 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14646">CVE-2018-14646 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1117290">SUSE bug 1117290</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825397" comment="bpftool-3.10.0-957.1.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825398" comment="kernel-3.10.0-957.1.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825399" comment="kernel-abi-whitelists-3.10.0-957.1.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825400" comment="kernel-debug-3.10.0-957.1.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825403" comment="kernel-doc-3.10.0-957.1.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825404" comment="kernel-headers-3.10.0-957.1.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825405" comment="kernel-tools-3.10.0-957.1.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825406" comment="kernel-tools-libs-3.10.0-957.1.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825408" comment="perf-3.10.0-957.1.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825409" comment="python-perf-3.10.0-957.1.3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814647" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14647</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14647" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14647" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14647" ref_url="https://www.suse.com/security/cve/CVE-2018-14647" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0482-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2053-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007449.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0292-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IXW4Q5XXH3FLRADKBIW4D7ORQVXQFZS5/#IXW4Q5XXH3FLRADKBIW4D7ORQVXQFZS5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0086-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SRKGGFVSV7DDWCMAOSO6E3F66U2CF5XR/" source="SUSE-SU"/>
    <description>
    Python's elementtree C accelerator failed to initialise Expat's hash salt during initialization. This could make it easy to conduct denial of service attacks against Expat by constructing an XML document that would cause pathological hash collisions in Expat's internal data structures, consuming large amounts CPU and RAM. The vulnerability exists in Python versions 3.7.0, 3.6.0 through 3.6.6, 3.5.0 through 3.5.6, 3.4.0 through 3.4.9, 2.7.0 through 2.7.15.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14647/">CVE-2018-14647 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14647">CVE-2018-14647 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1109847">SUSE bug 1109847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826020" comment="python-2.7.5-86.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826021" comment="python-debug-2.7.5-86.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826022" comment="python-devel-2.7.5-86.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826023" comment="python-libs-2.7.5-86.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826024" comment="python-test-2.7.5-86.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826025" comment="python-tools-2.7.5-86.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826026" comment="tkinter-2.7.5-86.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814648" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14648</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14648" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14648" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14648" ref_url="https://www.suse.com/security/cve/CVE-2018-14648" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005817.html" source="SUSE-SU"/>
    <description>
    A flaw was found in 389 Directory Server. A specially crafted search query could lead to excessive CPU consumption in the do_search() function. An unauthenticated attacker could use this flaw to provoke a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14648/">CVE-2018-14648 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14648">CVE-2018-14648 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1109609">SUSE bug 1109609</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824839" comment="389-ds-base-1.3.8.4-15.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824840" comment="389-ds-base-devel-1.3.8.4-15.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824841" comment="389-ds-base-libs-1.3.8.4-15.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824842" comment="389-ds-base-snmp-1.3.8.4-15.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814650" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14650</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14650" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14650" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14650" ref_url="https://www.suse.com/security/cve/CVE-2018-14650" source="SUSE CVE"/>
    <description>
    It was discovered that sos-collector does not properly set the default permissions of newly created files, making all files created by the tool readable by any local user. A local attacker may use this flaw by waiting for a legit user to run sos-collector and steal the collected data in the /var/tmp directory.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-14650/">CVE-2018-14650 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14650">CVE-2018-14650 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825410" comment="sos-collector-1.5-3.el7_6 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814665" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14665</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14665" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14665" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14665" ref_url="https://www.suse.com/security/cve/CVE-2018-14665" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3680-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004838.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3800-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/365GSZK5TDQXGWCZPQUWCLLL4MVCA6JT/#365GSZK5TDQXGWCZPQUWCLLL4MVCA6JT" source="SUSE-SU"/>
    <description>
    A flaw was found in xorg-x11-server before 1.20.3. An incorrect permission check for -modulepath and -logfile options when starting Xorg. X server allows unprivileged users with the ability to log in to the system via physical console to escalate their privileges and run arbitrary code under root privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14665/">CVE-2018-14665 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14665">CVE-2018-14665 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1111697">SUSE bug 1111697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112020">SUSE bug 1112020</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825365" comment="xorg-x11-server-Xdmx-1.20.1-5.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825366" comment="xorg-x11-server-Xephyr-1.20.1-5.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825367" comment="xorg-x11-server-Xnest-1.20.1-5.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825368" comment="xorg-x11-server-Xorg-1.20.1-5.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825369" comment="xorg-x11-server-Xvfb-1.20.1-5.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825370" comment="xorg-x11-server-Xwayland-1.20.1-5.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825371" comment="xorg-x11-server-common-1.20.1-5.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825372" comment="xorg-x11-server-devel-1.20.1-5.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825373" comment="xorg-x11-server-source-1.20.1-5.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814679" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14679</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14679" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14679" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14679" ref_url="https://www.suse.com/security/cve/CVE-2018-14679" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004412.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2323-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020256.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2406-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RSGOFLU5EABBIUAWNFKDCLZP43TISZSZ/#RSGOFLU5EABBIUAWNFKDCLZP43TISZSZ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1200-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CB3MRNYWFKRQUSWOFW43J2YAPXGFTDWP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2802-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2ZGPJK567IBN35AOF3QFMOJCRA2NANSF/" source="SUSE-SU"/>
    <description>
    An issue was discovered in mspack/chmd.c in libmspack before 0.7alpha. There is an off-by-one error in the CHM PMGI/PMGL chunk number validity checks, which could lead to denial of service (uninitialized data dereference and application crash).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-24"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14679/">CVE-2018-14679 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14679">CVE-2018-14679 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1102922">SUSE bug 1102922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103032">SUSE bug 1103032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103040">SUSE bug 1103040</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825333" comment="libmspack-0.5-0.6.alpha.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825334" comment="libmspack-devel-0.5-0.6.alpha.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814680" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14680</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14680" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14680" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14680" ref_url="https://www.suse.com/security/cve/CVE-2018-14680" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3436-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004791.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3315-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AOWJYQIO7AZB7B2VLPGPKAT4MC2SAJOQ/#AOWJYQIO7AZB7B2VLPGPKAT4MC2SAJOQ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3505-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TTPTOQ375E7C5RL7DUFQTOCZFKO6JRX6/#TTPTOQ375E7C5RL7DUFQTOCZFKO6JRX6" source="SUSE-SU"/>
    <description>
    An issue was discovered in mspack/chmd.c in libmspack before 0.7alpha. It does not reject blank CHM filenames.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-23"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14680/">CVE-2018-14680 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14680">CVE-2018-14680 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1102922">SUSE bug 1102922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103032">SUSE bug 1103032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103040">SUSE bug 1103040</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825333" comment="libmspack-0.5-0.6.alpha.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825334" comment="libmspack-devel-0.5-0.6.alpha.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814681" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14681</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14681" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14681" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14681" ref_url="https://www.suse.com/security/cve/CVE-2018-14681" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3436-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009322.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3315-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AOWJYQIO7AZB7B2VLPGPKAT4MC2SAJOQ/#AOWJYQIO7AZB7B2VLPGPKAT4MC2SAJOQ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3505-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TTPTOQ375E7C5RL7DUFQTOCZFKO6JRX6/#TTPTOQ375E7C5RL7DUFQTOCZFKO6JRX6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1200-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CB3MRNYWFKRQUSWOFW43J2YAPXGFTDWP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2802-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2ZGPJK567IBN35AOF3QFMOJCRA2NANSF/" source="SUSE-SU"/>
    <description>
    An issue was discovered in kwajd_read_headers in mspack/kwajd.c in libmspack before 0.7alpha. Bad KWAJ file header extensions could cause a one or two byte overwrite.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-23"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14681/">CVE-2018-14681 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14681">CVE-2018-14681 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1102922">SUSE bug 1102922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103032">SUSE bug 1103032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103040">SUSE bug 1103040</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825333" comment="libmspack-0.5-0.6.alpha.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825334" comment="libmspack-devel-0.5-0.6.alpha.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814682" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14682</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14682" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14682" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14682" ref_url="https://www.suse.com/security/cve/CVE-2018-14682" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3436-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009322.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3315-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AOWJYQIO7AZB7B2VLPGPKAT4MC2SAJOQ/#AOWJYQIO7AZB7B2VLPGPKAT4MC2SAJOQ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3505-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TTPTOQ375E7C5RL7DUFQTOCZFKO6JRX6/#TTPTOQ375E7C5RL7DUFQTOCZFKO6JRX6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1200-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CB3MRNYWFKRQUSWOFW43J2YAPXGFTDWP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2802-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2ZGPJK567IBN35AOF3QFMOJCRA2NANSF/" source="SUSE-SU"/>
    <description>
    An issue was discovered in mspack/chmd.c in libmspack before 0.7alpha. There is an off-by-one error in the TOLOWER() macro for CHM decompression.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-24"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14682/">CVE-2018-14682 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14682">CVE-2018-14682 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1102922">SUSE bug 1102922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103032">SUSE bug 1103032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103040">SUSE bug 1103040</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825333" comment="libmspack-0.5-0.6.alpha.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825334" comment="libmspack-devel-0.5-0.6.alpha.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814734" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14734</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14734" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14734" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14734" ref_url="https://www.suse.com/security/cve/CVE-2018-14734" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2344-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005556.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2404-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DHR6QOZXXCNSV77C5MHVLBK4DBFOQPCN/#DHR6QOZXXCNSV77C5MHVLBK4DBFOQPCN" source="SUSE-SU"/>
    <description>
    drivers/infiniband/core/ucma.c in the Linux kernel through 4.17.11 allows ucma_leave_multicast to access a certain data structure after a cleanup step in ucma_process_join, which allows attackers to cause a denial of service (use-after-free).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14734/">CVE-2018-14734 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14734">CVE-2018-14734 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1103119">SUSE bug 1103119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131390">SUSE bug 1131390</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826007" comment="bpftool-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826008" comment="kernel-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826009" comment="kernel-abi-whitelists-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826010" comment="kernel-debug-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826013" comment="kernel-doc-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826014" comment="kernel-headers-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826015" comment="kernel-tools-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826016" comment="kernel-tools-libs-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826018" comment="perf-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826019" comment="python-perf-3.10.0-1062.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201815127" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-15127</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-15127" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15127" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-15127" ref_url="https://www.suse.com/security/cve/CVE-2018-15127" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0060-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0045-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NXN72GRQHMH5Z525P3ALZZ6JR36IXX7R/#NXN72GRQHMH5Z525P3ALZZ6JR36IXX7R" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0053-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JTHKEDNEFXZVR4ENXDXILQ6VQAFX3VBZ/#JTHKEDNEFXZVR4ENXDXILQ6VQAFX3VBZ" source="SUSE-SU"/>
    <description>
    LibVNC before commit 502821828ed00b4a2c4bef90683d0fd88ce495de contains heap out-of-bound write vulnerability in server code of file transfer extension that can result remote code execution
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-15127/">CVE-2018-15127 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15127">CVE-2018-15127 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1120117">SUSE bug 1120117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123828">SUSE bug 1123828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123832">SUSE bug 1123832</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825463" comment="libvncserver-0.9.9-13.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825464" comment="libvncserver-devel-0.9.9-13.el7_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201815473" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-15473</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-15473" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15473" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-15473" ref_url="https://www.suse.com/security/cve/CVE-2018-15473" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3776-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004888.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3801-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6HZHFCN3FMXHZZCFLYMHDIVHKIO3LKEQ/#6HZHFCN3FMXHZZCFLYMHDIVHKIO3LKEQ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3946-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NNXHYJR7DWW55Y3BV7I673HSN7OUZUKI/#NNXHYJR7DWW55Y3BV7I673HSN7OUZUKI" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1383-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HMNIMCAHIBHI4ABCI2JE3E6E2SYDAP2T/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1390-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/F33WEA5KQR7XFYMXJPGRCG4IZX75GFRO/" source="SUSE-SU"/>
    <description>
    OpenSSH through 7.7 is prone to a user enumeration vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-15473/">CVE-2018-15473 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15473">CVE-2018-15473 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1105010">SUSE bug 1105010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106163">SUSE bug 1106163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123133">SUSE bug 1123133</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138392">SUSE bug 1138392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205621">SUSE bug 1205621</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826365" comment="openssh-7.4p1-21.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826366" comment="openssh-askpass-7.4p1-21.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826367" comment="openssh-cavs-7.4p1-21.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826368" comment="openssh-clients-7.4p1-21.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826369" comment="openssh-keycat-7.4p1-21.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826370" comment="openssh-ldap-7.4p1-21.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826371" comment="openssh-server-7.4p1-21.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826372" comment="openssh-server-sysvinit-7.4p1-21.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826373" comment="pam_ssh_agent_auth-0.10.3-2.21.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201815518" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-15518</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-15518" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15518" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-15518" ref_url="https://www.suse.com/security/cve/CVE-2018-15518" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:4179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4210-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006715.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4261-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UBLMWNY73GOQMMNSWQSLSEICCCPUY6YZ/#UBLMWNY73GOQMMNSWQSLSEICCCPUY6YZ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0265-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PBSTGLBQYTXKIKAQ7SXDRS2NMVOY6J4K/#PBSTGLBQYTXKIKAQ7SXDRS2NMVOY6J4K" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1452-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KJKFQBI7CGD7FQDCE2V7CAQ2LKSPRQMR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IBKN6GS4GIBUYBLNFX4U4AW663FIHH5B/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1501-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3UNEB57TTFWJ3LAAGGQ4W5TXUQOAXYRV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1530-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FJLSHDERE4UB4726XQUI46NKCGT7AQKA/" source="SUSE-SU"/>
    <description>
    QXmlStream in Qt 5.x before 5.11.3 has a double-free or corruption during parsing of a specially crafted illegal XML document.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15518/">CVE-2018-15518 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15518">CVE-2018-15518 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1118595">SUSE bug 1118595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826222" comment="qt5-assistant-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826223" comment="qt5-designer-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826224" comment="qt5-doctools-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826225" comment="qt5-linguist-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826226" comment="qt5-qdbusviewer-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826227" comment="qt5-qt3d-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826228" comment="qt5-qt3d-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826229" comment="qt5-qt3d-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826230" comment="qt5-qt3d-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826231" comment="qt5-qtbase-5.9.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826232" comment="qt5-qtbase-common-5.9.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826233" comment="qt5-qtbase-devel-5.9.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826234" comment="qt5-qtbase-doc-5.9.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826235" comment="qt5-qtbase-examples-5.9.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826236" comment="qt5-qtbase-gui-5.9.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826237" comment="qt5-qtbase-mysql-5.9.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826238" comment="qt5-qtbase-odbc-5.9.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826239" comment="qt5-qtbase-postgresql-5.9.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826240" comment="qt5-qtbase-static-5.9.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826241" comment="qt5-qtcanvas3d-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826242" comment="qt5-qtcanvas3d-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826243" comment="qt5-qtcanvas3d-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826244" comment="qt5-qtconnectivity-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826245" comment="qt5-qtconnectivity-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826246" comment="qt5-qtconnectivity-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826247" comment="qt5-qtconnectivity-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826248" comment="qt5-qtdeclarative-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826249" comment="qt5-qtdeclarative-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826250" comment="qt5-qtdeclarative-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826251" comment="qt5-qtdeclarative-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826252" comment="qt5-qtdeclarative-static-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826253" comment="qt5-qtdoc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826254" comment="qt5-qtgraphicaleffects-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826255" comment="qt5-qtgraphicaleffects-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826256" comment="qt5-qtimageformats-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826257" comment="qt5-qtimageformats-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826258" comment="qt5-qtlocation-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826259" comment="qt5-qtlocation-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826260" comment="qt5-qtlocation-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826261" comment="qt5-qtlocation-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826262" comment="qt5-qtmultimedia-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826263" comment="qt5-qtmultimedia-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826264" comment="qt5-qtmultimedia-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826265" comment="qt5-qtmultimedia-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826266" comment="qt5-qtquickcontrols-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826267" comment="qt5-qtquickcontrols-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826268" comment="qt5-qtquickcontrols-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826269" comment="qt5-qtquickcontrols2-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826270" comment="qt5-qtquickcontrols2-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826271" comment="qt5-qtquickcontrols2-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826272" comment="qt5-qtquickcontrols2-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826273" comment="qt5-qtscript-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826274" comment="qt5-qtscript-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826275" comment="qt5-qtscript-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826276" comment="qt5-qtscript-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826277" comment="qt5-qtsensors-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826278" comment="qt5-qtsensors-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826279" comment="qt5-qtsensors-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826280" comment="qt5-qtsensors-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826281" comment="qt5-qtserialbus-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826282" comment="qt5-qtserialbus-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826283" comment="qt5-qtserialbus-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826284" comment="qt5-qtserialbus-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826285" comment="qt5-qtserialport-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826286" comment="qt5-qtserialport-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826287" comment="qt5-qtserialport-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826288" comment="qt5-qtserialport-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826289" comment="qt5-qtsvg-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826290" comment="qt5-qtsvg-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826291" comment="qt5-qtsvg-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826292" comment="qt5-qtsvg-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826293" comment="qt5-qttools-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826294" comment="qt5-qttools-common-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826295" comment="qt5-qttools-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826296" comment="qt5-qttools-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826297" comment="qt5-qttools-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826298" comment="qt5-qttools-libs-designer-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826299" comment="qt5-qttools-libs-designercomponents-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826300" comment="qt5-qttools-libs-help-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826301" comment="qt5-qttools-static-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826302" comment="qt5-qttranslations-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826303" comment="qt5-qtwayland-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826304" comment="qt5-qtwayland-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826305" comment="qt5-qtwayland-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826306" comment="qt5-qtwayland-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826307" comment="qt5-qtwebchannel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826308" comment="qt5-qtwebchannel-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826309" comment="qt5-qtwebchannel-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826310" comment="qt5-qtwebchannel-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826311" comment="qt5-qtwebsockets-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826312" comment="qt5-qtwebsockets-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826313" comment="qt5-qtwebsockets-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826314" comment="qt5-qtwebsockets-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826315" comment="qt5-qtx11extras-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826316" comment="qt5-qtx11extras-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826317" comment="qt5-qtx11extras-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826318" comment="qt5-qtxmlpatterns-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826319" comment="qt5-qtxmlpatterns-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826320" comment="qt5-qtxmlpatterns-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826321" comment="qt5-qtxmlpatterns-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826322" comment="qt5-rpm-macros-5.9.7-2.el7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827834" comment="qt-4.8.7-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827835" comment="qt-assistant-4.8.7-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827836" comment="qt-config-4.8.7-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827837" comment="qt-demos-4.8.7-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827838" comment="qt-devel-4.8.7-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827839" comment="qt-devel-private-4.8.7-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827840" comment="qt-doc-4.8.7-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827841" comment="qt-examples-4.8.7-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827842" comment="qt-mysql-4.8.7-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827843" comment="qt-odbc-4.8.7-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827844" comment="qt-postgresql-4.8.7-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827845" comment="qt-qdbusviewer-4.8.7-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827846" comment="qt-qvfb-4.8.7-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827847" comment="qt-x11-4.8.7-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826222" comment="qt5-assistant-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826223" comment="qt5-designer-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826224" comment="qt5-doctools-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826225" comment="qt5-linguist-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826226" comment="qt5-qdbusviewer-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826227" comment="qt5-qt3d-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826228" comment="qt5-qt3d-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826229" comment="qt5-qt3d-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826230" comment="qt5-qt3d-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826231" comment="qt5-qtbase-5.9.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826232" comment="qt5-qtbase-common-5.9.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826233" comment="qt5-qtbase-devel-5.9.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826234" comment="qt5-qtbase-doc-5.9.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826235" comment="qt5-qtbase-examples-5.9.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826236" comment="qt5-qtbase-gui-5.9.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826237" comment="qt5-qtbase-mysql-5.9.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826238" comment="qt5-qtbase-odbc-5.9.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826239" comment="qt5-qtbase-postgresql-5.9.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826240" comment="qt5-qtbase-static-5.9.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826241" comment="qt5-qtcanvas3d-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826242" comment="qt5-qtcanvas3d-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826243" comment="qt5-qtcanvas3d-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826244" comment="qt5-qtconnectivity-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826245" comment="qt5-qtconnectivity-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826246" comment="qt5-qtconnectivity-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826247" comment="qt5-qtconnectivity-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826248" comment="qt5-qtdeclarative-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826249" comment="qt5-qtdeclarative-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826250" comment="qt5-qtdeclarative-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826251" comment="qt5-qtdeclarative-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826252" comment="qt5-qtdeclarative-static-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826253" comment="qt5-qtdoc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826254" comment="qt5-qtgraphicaleffects-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826255" comment="qt5-qtgraphicaleffects-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826256" comment="qt5-qtimageformats-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826257" comment="qt5-qtimageformats-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826258" comment="qt5-qtlocation-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826259" comment="qt5-qtlocation-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826260" comment="qt5-qtlocation-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826261" comment="qt5-qtlocation-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826262" comment="qt5-qtmultimedia-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826263" comment="qt5-qtmultimedia-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826264" comment="qt5-qtmultimedia-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826265" comment="qt5-qtmultimedia-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826266" comment="qt5-qtquickcontrols-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826267" comment="qt5-qtquickcontrols-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826268" comment="qt5-qtquickcontrols-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826269" comment="qt5-qtquickcontrols2-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826270" comment="qt5-qtquickcontrols2-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826271" comment="qt5-qtquickcontrols2-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826272" comment="qt5-qtquickcontrols2-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826273" comment="qt5-qtscript-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826274" comment="qt5-qtscript-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826275" comment="qt5-qtscript-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826276" comment="qt5-qtscript-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826277" comment="qt5-qtsensors-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826278" comment="qt5-qtsensors-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826279" comment="qt5-qtsensors-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826280" comment="qt5-qtsensors-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826281" comment="qt5-qtserialbus-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826282" comment="qt5-qtserialbus-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826283" comment="qt5-qtserialbus-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826284" comment="qt5-qtserialbus-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826285" comment="qt5-qtserialport-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826286" comment="qt5-qtserialport-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826287" comment="qt5-qtserialport-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826288" comment="qt5-qtserialport-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826289" comment="qt5-qtsvg-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826290" comment="qt5-qtsvg-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826291" comment="qt5-qtsvg-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826292" comment="qt5-qtsvg-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826293" comment="qt5-qttools-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826294" comment="qt5-qttools-common-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826295" comment="qt5-qttools-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826296" comment="qt5-qttools-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826297" comment="qt5-qttools-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826298" comment="qt5-qttools-libs-designer-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826299" comment="qt5-qttools-libs-designercomponents-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826300" comment="qt5-qttools-libs-help-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826301" comment="qt5-qttools-static-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826302" comment="qt5-qttranslations-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826303" comment="qt5-qtwayland-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826304" comment="qt5-qtwayland-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826305" comment="qt5-qtwayland-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826306" comment="qt5-qtwayland-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826307" comment="qt5-qtwebchannel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826308" comment="qt5-qtwebchannel-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826309" comment="qt5-qtwebchannel-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826310" comment="qt5-qtwebchannel-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826311" comment="qt5-qtwebsockets-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826312" comment="qt5-qtwebsockets-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826313" comment="qt5-qtwebsockets-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826314" comment="qt5-qtwebsockets-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826315" comment="qt5-qtx11extras-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826316" comment="qt5-qtx11extras-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826317" comment="qt5-qtx11extras-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826318" comment="qt5-qtxmlpatterns-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826319" comment="qt5-qtxmlpatterns-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826320" comment="qt5-qtxmlpatterns-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826321" comment="qt5-qtxmlpatterns-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826322" comment="qt5-rpm-macros-5.9.7-2.el7 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201815587" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-15587</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-15587" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15587" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-15587" ref_url="https://www.suse.com/security/cve/CVE-2018-15587" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1266-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1391-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006126.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1431-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GPHP3BRDK4H46JQSF2JHYPK2UXFEMRAL/#GPHP3BRDK4H46JQSF2JHYPK2UXFEMRAL" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1453-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5OH7TG7BHCJCHTSURET5EIU7LPS66JIR/#5OH7TG7BHCJCHTSURET5EIU7LPS66JIR" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1528-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AJUKJ5DYKLVWMY7N2JIFE5CFQX5IJE4J/#AJUKJ5DYKLVWMY7N2JIFE5CFQX5IJE4J" source="SUSE-SU"/>
    <description>
    GNOME Evolution through 3.28.2 is prone to OpenPGP signatures being spoofed for arbitrary messages using a specially crafted email that contains a valid signature from the entity to be impersonated as an attachment.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-15587/">CVE-2018-15587 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15587">CVE-2018-15587 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1125230">SUSE bug 1125230</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827697" comment="atk-2.28.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827698" comment="atk-devel-2.28.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827699" comment="evolution-3.28.5-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827700" comment="evolution-bogofilter-3.28.5-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827701" comment="evolution-data-server-3.28.5-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827702" comment="evolution-data-server-devel-3.28.5-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827703" comment="evolution-data-server-doc-3.28.5-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827704" comment="evolution-data-server-langpacks-3.28.5-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827705" comment="evolution-data-server-perl-3.28.5-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827706" comment="evolution-data-server-tests-3.28.5-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827707" comment="evolution-devel-3.28.5-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827708" comment="evolution-devel-docs-3.28.5-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827709" comment="evolution-ews-3.28.5-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827710" comment="evolution-ews-langpacks-3.28.5-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827711" comment="evolution-help-3.28.5-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827712" comment="evolution-langpacks-3.28.5-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827713" comment="evolution-pst-3.28.5-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827714" comment="evolution-spamassassin-3.28.5-8.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201815594" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-15594</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-15594" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15594" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-15594" ref_url="https://www.suse.com/security/cve/CVE-2018-15594" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005456.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1407-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UMXCAWC5QTZVSPZOYUW3E3GVJJUKCQ2S/#UMXCAWC5QTZVSPZOYUW3E3GVJJUKCQ2S" source="SUSE-SU"/>
    <description>
    arch/x86/kernel/paravirt.c in the Linux kernel before 4.18.1 mishandles certain indirect calls, which makes it easier for attackers to conduct Spectre-v2 attacks against paravirtual guests.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-15594/">CVE-2018-15594 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15594">CVE-2018-15594 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1105348">SUSE bug 1105348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133319">SUSE bug 1133319</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826007" comment="bpftool-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826008" comment="kernel-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826009" comment="kernel-abi-whitelists-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826010" comment="kernel-debug-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826013" comment="kernel-doc-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826014" comment="kernel-headers-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826015" comment="kernel-tools-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826016" comment="kernel-tools-libs-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826018" comment="perf-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826019" comment="python-perf-3.10.0-1062.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201815607" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-15607</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-15607" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15607" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-15607" ref_url="https://www.suse.com/security/cve/CVE-2018-15607" source="SUSE CVE"/>
    <description>
    In ImageMagick 7.0.8-11 Q16, a tiny input file 0x50 0x36 0x36 0x36 0x36 0x4c 0x36 0x38 0x36 0x36 0x36 0x36 0x36 0x36 0x1f 0x35 0x50 0x00 can result in a hang of several minutes during which CPU and memory resources are consumed until ultimately an attempted large memory allocation fails. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-15607/">CVE-2018-15607 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15607">CVE-2018-15607 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1105594">SUSE bug 1105594</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827880" comment="ImageMagick-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827881" comment="ImageMagick-c++-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827882" comment="ImageMagick-c++-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827883" comment="ImageMagick-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827884" comment="ImageMagick-doc-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827885" comment="ImageMagick-perl-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827886" comment="autotrace-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827887" comment="autotrace-devel-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827888" comment="emacs-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827889" comment="emacs-common-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827890" comment="emacs-el-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827891" comment="emacs-filesystem-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827892" comment="emacs-nox-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827893" comment="emacs-terminal-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827894" comment="inkscape-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827895" comment="inkscape-docs-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827896" comment="inkscape-view-0.92.2-3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201815686" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-15686</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-15686" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15686" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-15686" ref_url="https://www.suse.com/security/cve/CVE-2018-15686" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3767-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0054-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0054-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005328.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3695-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FG3I7LRZT4K74SL3UV2BRO73WXQKMXH7/#FG3I7LRZT4K74SL3UV2BRO73WXQKMXH7" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3803-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PM6YQLR7Q7WL5FEISVHM4JT3SFODW2IO/#PM6YQLR7Q7WL5FEISVHM4JT3SFODW2IO" source="SUSE-SU"/>
    <description>
    A vulnerability in unit_deserialize of systemd allows an attacker to supply arbitrary state across systemd re-execution via NotifyAccess. This can be used to improperly influence systemd execution and possibly lead to root privilege escalation. Affected releases are systemd versions up to and including 239.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15686/">CVE-2018-15686 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15686">CVE-2018-15686 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1113665">SUSE bug 1113665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120323">SUSE bug 1120323</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826149" comment="libgudev1-219-67.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826150" comment="libgudev1-devel-219-67.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826151" comment="systemd-219-67.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826152" comment="systemd-devel-219-67.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826153" comment="systemd-journal-gateway-219-67.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826154" comment="systemd-libs-219-67.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826155" comment="systemd-networkd-219-67.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826156" comment="systemd-python-219-67.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826157" comment="systemd-resolved-219-67.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826158" comment="systemd-sysv-219-67.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201815688" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-15688</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-15688" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15688" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-15688" ref_url="https://www.suse.com/security/cve/CVE-2018-15688" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3767-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004941.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3695-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FG3I7LRZT4K74SL3UV2BRO73WXQKMXH7/#FG3I7LRZT4K74SL3UV2BRO73WXQKMXH7" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3803-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PM6YQLR7Q7WL5FEISVHM4JT3SFODW2IO/#PM6YQLR7Q7WL5FEISVHM4JT3SFODW2IO" source="SUSE-SU"/>
    <description>
    A buffer overflow vulnerability in the dhcp6 client of systemd allows a malicious dhcp6 server to overwrite heap memory in systemd-networkd. Affected releases are systemd: versions up to and including 239.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-15688/">CVE-2018-15688 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15688">CVE-2018-15688 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1113632">SUSE bug 1113632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113668">SUSE bug 1113668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113669">SUSE bug 1113669</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825411" comment="NetworkManager-1.12.0-8.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825412" comment="NetworkManager-adsl-1.12.0-8.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825413" comment="NetworkManager-bluetooth-1.12.0-8.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825414" comment="NetworkManager-config-server-1.12.0-8.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825415" comment="NetworkManager-dispatcher-routing-rules-1.12.0-8.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825416" comment="NetworkManager-glib-1.12.0-8.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825417" comment="NetworkManager-glib-devel-1.12.0-8.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825418" comment="NetworkManager-libnm-1.12.0-8.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825419" comment="NetworkManager-libnm-devel-1.12.0-8.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825420" comment="NetworkManager-ovs-1.12.0-8.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825421" comment="NetworkManager-ppp-1.12.0-8.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825422" comment="NetworkManager-team-1.12.0-8.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825423" comment="NetworkManager-tui-1.12.0-8.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825424" comment="NetworkManager-wifi-1.12.0-8.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825425" comment="NetworkManager-wwan-1.12.0-8.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825453" comment="libgudev1-219-62.el7_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825454" comment="libgudev1-devel-219-62.el7_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825455" comment="systemd-219-62.el7_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825456" comment="systemd-devel-219-62.el7_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825457" comment="systemd-journal-gateway-219-62.el7_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825458" comment="systemd-libs-219-62.el7_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825459" comment="systemd-networkd-219-62.el7_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825460" comment="systemd-python-219-62.el7_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825461" comment="systemd-resolved-219-62.el7_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825462" comment="systemd-sysv-219-62.el7_6.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201815746" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-15746</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-15746" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15746" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-15746" ref_url="https://www.suse.com/security/cve/CVE-2018-15746" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004891.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3973-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183973-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3973-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005395.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3975-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183975-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3987-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4004-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FR4H7KPNHTMLWXKKW2DKOKA3SBOOKPWK/#FR4H7KPNHTMLWXKKW2DKOKA3SBOOKPWK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4147-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HJEWX3HJ455MJTYETI53ORG4PI73K72X/#HJEWX3HJ455MJTYETI53ORG4PI73K72X" source="SUSE-SU"/>
    <description>
    qemu-seccomp.c in QEMU might allow local OS guest users to cause a denial of service (guest crash) by leveraging mishandling of the seccomp policy for threads other than the main thread.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15746/">CVE-2018-15746 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15746">CVE-2018-15746 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1106222">SUSE bug 1106222</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828261" comment="qemu-img-1.5.3-175.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828262" comment="qemu-kvm-1.5.3-175.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828263" comment="qemu-kvm-common-1.5.3-175.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828264" comment="qemu-kvm-tools-1.5.3-175.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201815853" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-15853</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-15853" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15853" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-15853" ref_url="https://www.suse.com/security/cve/CVE-2018-15853" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3802-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QD7OXDVEE6GG73NXAXXSDS7BU4AU7ZPN/#QD7OXDVEE6GG73NXAXXSDS7BU4AU7ZPN" source="SUSE-SU"/>
    <description>
    Endless recursion exists in xkbcomp/expr.c in xkbcommon and libxkbcommon before 0.8.1, which could be used by local attackers to crash xkbcommon users by supplying a crafted keymap file that triggers boolean negation.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-02-04"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15853/">CVE-2018-15853 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15853">CVE-2018-15853 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1105832">SUSE bug 1105832</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826124" comment="gdm-3.28.2-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826125" comment="gdm-devel-3.28.2-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826126" comment="gdm-pam-extensions-devel-3.28.2-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826127" comment="libX11-1.6.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826128" comment="libX11-common-1.6.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826129" comment="libX11-devel-1.6.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826130" comment="libxkbcommon-0.7.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826131" comment="libxkbcommon-devel-0.7.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826132" comment="libxkbcommon-x11-0.7.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826133" comment="libxkbcommon-x11-devel-0.7.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826134" comment="mesa-libGLw-8.0.0-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826135" comment="mesa-libGLw-devel-8.0.0-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826136" comment="xorg-x11-drv-ati-19.0.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826137" comment="xorg-x11-drv-vesa-2.4.0-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826138" comment="xorg-x11-drv-wacom-0.36.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826139" comment="xorg-x11-drv-wacom-devel-0.36.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826140" comment="xorg-x11-server-Xdmx-1.20.4-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826141" comment="xorg-x11-server-Xephyr-1.20.4-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826142" comment="xorg-x11-server-Xnest-1.20.4-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826143" comment="xorg-x11-server-Xorg-1.20.4-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826144" comment="xorg-x11-server-Xvfb-1.20.4-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826145" comment="xorg-x11-server-Xwayland-1.20.4-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826146" comment="xorg-x11-server-common-1.20.4-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826147" comment="xorg-x11-server-devel-1.20.4-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826148" comment="xorg-x11-server-source-1.20.4-7.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201815854" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-15854</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-15854" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15854" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-15854" ref_url="https://www.suse.com/security/cve/CVE-2018-15854" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017591.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3802-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QD7OXDVEE6GG73NXAXXSDS7BU4AU7ZPN/#QD7OXDVEE6GG73NXAXXSDS7BU4AU7ZPN" source="SUSE-SU"/>
    <description>
    Unchecked NULL pointer usage in xkbcommon before 0.8.1 could be used by local attackers to crash (NULL pointer dereference) the xkbcommon parser by supplying a crafted keymap file, because geometry tokens were desupported incorrectly.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15854/">CVE-2018-15854 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15854">CVE-2018-15854 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1105832">SUSE bug 1105832</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826124" comment="gdm-3.28.2-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826125" comment="gdm-devel-3.28.2-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826126" comment="gdm-pam-extensions-devel-3.28.2-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826127" comment="libX11-1.6.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826128" comment="libX11-common-1.6.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826129" comment="libX11-devel-1.6.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826130" comment="libxkbcommon-0.7.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826131" comment="libxkbcommon-devel-0.7.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826132" comment="libxkbcommon-x11-0.7.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826133" comment="libxkbcommon-x11-devel-0.7.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826134" comment="mesa-libGLw-8.0.0-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826135" comment="mesa-libGLw-devel-8.0.0-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826136" comment="xorg-x11-drv-ati-19.0.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826137" comment="xorg-x11-drv-vesa-2.4.0-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826138" comment="xorg-x11-drv-wacom-0.36.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826139" comment="xorg-x11-drv-wacom-devel-0.36.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826140" comment="xorg-x11-server-Xdmx-1.20.4-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826141" comment="xorg-x11-server-Xephyr-1.20.4-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826142" comment="xorg-x11-server-Xnest-1.20.4-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826143" comment="xorg-x11-server-Xorg-1.20.4-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826144" comment="xorg-x11-server-Xvfb-1.20.4-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826145" comment="xorg-x11-server-Xwayland-1.20.4-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826146" comment="xorg-x11-server-common-1.20.4-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826147" comment="xorg-x11-server-devel-1.20.4-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826148" comment="xorg-x11-server-source-1.20.4-7.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201815855" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-15855</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-15855" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15855" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-15855" ref_url="https://www.suse.com/security/cve/CVE-2018-15855" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017591.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3802-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QD7OXDVEE6GG73NXAXXSDS7BU4AU7ZPN/#QD7OXDVEE6GG73NXAXXSDS7BU4AU7ZPN" source="SUSE-SU"/>
    <description>
    Unchecked NULL pointer usage in xkbcommon before 0.8.1 could be used by local attackers to crash (NULL pointer dereference) the xkbcommon parser by supplying a crafted keymap file, because the XkbFile for an xkb_geometry section was mishandled.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15855/">CVE-2018-15855 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15855">CVE-2018-15855 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1105832">SUSE bug 1105832</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826124" comment="gdm-3.28.2-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826125" comment="gdm-devel-3.28.2-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826126" comment="gdm-pam-extensions-devel-3.28.2-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826127" comment="libX11-1.6.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826128" comment="libX11-common-1.6.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826129" comment="libX11-devel-1.6.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826130" comment="libxkbcommon-0.7.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826131" comment="libxkbcommon-devel-0.7.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826132" comment="libxkbcommon-x11-0.7.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826133" comment="libxkbcommon-x11-devel-0.7.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826134" comment="mesa-libGLw-8.0.0-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826135" comment="mesa-libGLw-devel-8.0.0-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826136" comment="xorg-x11-drv-ati-19.0.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826137" comment="xorg-x11-drv-vesa-2.4.0-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826138" comment="xorg-x11-drv-wacom-0.36.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826139" comment="xorg-x11-drv-wacom-devel-0.36.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826140" comment="xorg-x11-server-Xdmx-1.20.4-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826141" comment="xorg-x11-server-Xephyr-1.20.4-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826142" comment="xorg-x11-server-Xnest-1.20.4-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826143" comment="xorg-x11-server-Xorg-1.20.4-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826144" comment="xorg-x11-server-Xvfb-1.20.4-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826145" comment="xorg-x11-server-Xwayland-1.20.4-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826146" comment="xorg-x11-server-common-1.20.4-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826147" comment="xorg-x11-server-devel-1.20.4-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826148" comment="xorg-x11-server-source-1.20.4-7.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201815856" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-15856</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-15856" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15856" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-15856" ref_url="https://www.suse.com/security/cve/CVE-2018-15856" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017591.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3802-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QD7OXDVEE6GG73NXAXXSDS7BU4AU7ZPN/#QD7OXDVEE6GG73NXAXXSDS7BU4AU7ZPN" source="SUSE-SU"/>
    <description>
    An infinite loop when reaching EOL unexpectedly in compose/parser.c (aka the keymap parser) in xkbcommon before 0.8.1 could be used by local attackers to cause a denial of service during parsing of crafted keymap files.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15856/">CVE-2018-15856 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15856">CVE-2018-15856 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1105832">SUSE bug 1105832</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826124" comment="gdm-3.28.2-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826125" comment="gdm-devel-3.28.2-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826126" comment="gdm-pam-extensions-devel-3.28.2-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826127" comment="libX11-1.6.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826128" comment="libX11-common-1.6.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826129" comment="libX11-devel-1.6.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826130" comment="libxkbcommon-0.7.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826131" comment="libxkbcommon-devel-0.7.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826132" comment="libxkbcommon-x11-0.7.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826133" comment="libxkbcommon-x11-devel-0.7.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826134" comment="mesa-libGLw-8.0.0-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826135" comment="mesa-libGLw-devel-8.0.0-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826136" comment="xorg-x11-drv-ati-19.0.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826137" comment="xorg-x11-drv-vesa-2.4.0-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826138" comment="xorg-x11-drv-wacom-0.36.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826139" comment="xorg-x11-drv-wacom-devel-0.36.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826140" comment="xorg-x11-server-Xdmx-1.20.4-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826141" comment="xorg-x11-server-Xephyr-1.20.4-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826142" comment="xorg-x11-server-Xnest-1.20.4-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826143" comment="xorg-x11-server-Xorg-1.20.4-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826144" comment="xorg-x11-server-Xvfb-1.20.4-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826145" comment="xorg-x11-server-Xwayland-1.20.4-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826146" comment="xorg-x11-server-common-1.20.4-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826147" comment="xorg-x11-server-devel-1.20.4-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826148" comment="xorg-x11-server-source-1.20.4-7.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201815857" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-15857</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-15857" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15857" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-15857" ref_url="https://www.suse.com/security/cve/CVE-2018-15857" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017591.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3802-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QD7OXDVEE6GG73NXAXXSDS7BU4AU7ZPN/#QD7OXDVEE6GG73NXAXXSDS7BU4AU7ZPN" source="SUSE-SU"/>
    <description>
    An invalid free in ExprAppendMultiKeysymList in xkbcomp/ast-build.c in xkbcommon before 0.8.1 could be used by local attackers to crash xkbcommon keymap parsers or possibly have unspecified other impact by supplying a crafted keymap file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15857/">CVE-2018-15857 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15857">CVE-2018-15857 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1105832">SUSE bug 1105832</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826124" comment="gdm-3.28.2-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826125" comment="gdm-devel-3.28.2-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826126" comment="gdm-pam-extensions-devel-3.28.2-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826127" comment="libX11-1.6.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826128" comment="libX11-common-1.6.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826129" comment="libX11-devel-1.6.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826130" comment="libxkbcommon-0.7.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826131" comment="libxkbcommon-devel-0.7.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826132" comment="libxkbcommon-x11-0.7.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826133" comment="libxkbcommon-x11-devel-0.7.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826134" comment="mesa-libGLw-8.0.0-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826135" comment="mesa-libGLw-devel-8.0.0-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826136" comment="xorg-x11-drv-ati-19.0.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826137" comment="xorg-x11-drv-vesa-2.4.0-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826138" comment="xorg-x11-drv-wacom-0.36.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826139" comment="xorg-x11-drv-wacom-devel-0.36.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826140" comment="xorg-x11-server-Xdmx-1.20.4-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826141" comment="xorg-x11-server-Xephyr-1.20.4-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826142" comment="xorg-x11-server-Xnest-1.20.4-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826143" comment="xorg-x11-server-Xorg-1.20.4-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826144" comment="xorg-x11-server-Xvfb-1.20.4-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826145" comment="xorg-x11-server-Xwayland-1.20.4-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826146" comment="xorg-x11-server-common-1.20.4-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826147" comment="xorg-x11-server-devel-1.20.4-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826148" comment="xorg-x11-server-source-1.20.4-7.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201815859" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-15859</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-15859" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15859" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-15859" ref_url="https://www.suse.com/security/cve/CVE-2018-15859" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3802-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QD7OXDVEE6GG73NXAXXSDS7BU4AU7ZPN/#QD7OXDVEE6GG73NXAXXSDS7BU4AU7ZPN" source="SUSE-SU"/>
    <description>
    Unchecked NULL pointer usage when parsing invalid atoms in ExprResolveLhs in xkbcomp/expr.c in xkbcommon before 0.8.2 could be used by local attackers to crash (NULL pointer dereference) the xkbcommon parser by supplying a crafted keymap file, because lookup failures are mishandled.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-02-04"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15859/">CVE-2018-15859 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15859">CVE-2018-15859 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1105832">SUSE bug 1105832</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826124" comment="gdm-3.28.2-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826125" comment="gdm-devel-3.28.2-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826126" comment="gdm-pam-extensions-devel-3.28.2-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826127" comment="libX11-1.6.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826128" comment="libX11-common-1.6.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826129" comment="libX11-devel-1.6.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826130" comment="libxkbcommon-0.7.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826131" comment="libxkbcommon-devel-0.7.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826132" comment="libxkbcommon-x11-0.7.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826133" comment="libxkbcommon-x11-devel-0.7.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826134" comment="mesa-libGLw-8.0.0-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826135" comment="mesa-libGLw-devel-8.0.0-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826136" comment="xorg-x11-drv-ati-19.0.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826137" comment="xorg-x11-drv-vesa-2.4.0-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826138" comment="xorg-x11-drv-wacom-0.36.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826139" comment="xorg-x11-drv-wacom-devel-0.36.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826140" comment="xorg-x11-server-Xdmx-1.20.4-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826141" comment="xorg-x11-server-Xephyr-1.20.4-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826142" comment="xorg-x11-server-Xnest-1.20.4-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826143" comment="xorg-x11-server-Xorg-1.20.4-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826144" comment="xorg-x11-server-Xvfb-1.20.4-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826145" comment="xorg-x11-server-Xwayland-1.20.4-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826146" comment="xorg-x11-server-common-1.20.4-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826147" comment="xorg-x11-server-devel-1.20.4-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826148" comment="xorg-x11-server-source-1.20.4-7.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201815861" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-15861</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-15861" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15861" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-15861" ref_url="https://www.suse.com/security/cve/CVE-2018-15861" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3802-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QD7OXDVEE6GG73NXAXXSDS7BU4AU7ZPN/#QD7OXDVEE6GG73NXAXXSDS7BU4AU7ZPN" source="SUSE-SU"/>
    <description>
    Unchecked NULL pointer usage in ExprResolveLhs in xkbcomp/expr.c in xkbcommon before 0.8.2 could be used by local attackers to crash (NULL pointer dereference) the xkbcommon parser by supplying a crafted keymap file that triggers an xkb_intern_atom failure.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-02-04"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15861/">CVE-2018-15861 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15861">CVE-2018-15861 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1105832">SUSE bug 1105832</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826124" comment="gdm-3.28.2-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826125" comment="gdm-devel-3.28.2-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826126" comment="gdm-pam-extensions-devel-3.28.2-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826127" comment="libX11-1.6.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826128" comment="libX11-common-1.6.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826129" comment="libX11-devel-1.6.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826130" comment="libxkbcommon-0.7.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826131" comment="libxkbcommon-devel-0.7.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826132" comment="libxkbcommon-x11-0.7.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826133" comment="libxkbcommon-x11-devel-0.7.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826134" comment="mesa-libGLw-8.0.0-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826135" comment="mesa-libGLw-devel-8.0.0-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826136" comment="xorg-x11-drv-ati-19.0.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826137" comment="xorg-x11-drv-vesa-2.4.0-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826138" comment="xorg-x11-drv-wacom-0.36.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826139" comment="xorg-x11-drv-wacom-devel-0.36.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826140" comment="xorg-x11-server-Xdmx-1.20.4-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826141" comment="xorg-x11-server-Xephyr-1.20.4-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826142" comment="xorg-x11-server-Xnest-1.20.4-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826143" comment="xorg-x11-server-Xorg-1.20.4-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826144" comment="xorg-x11-server-Xvfb-1.20.4-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826145" comment="xorg-x11-server-Xwayland-1.20.4-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826146" comment="xorg-x11-server-common-1.20.4-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826147" comment="xorg-x11-server-devel-1.20.4-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826148" comment="xorg-x11-server-source-1.20.4-7.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201815862" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-15862</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-15862" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15862" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-15862" ref_url="https://www.suse.com/security/cve/CVE-2018-15862" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017591.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3802-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QD7OXDVEE6GG73NXAXXSDS7BU4AU7ZPN/#QD7OXDVEE6GG73NXAXXSDS7BU4AU7ZPN" source="SUSE-SU"/>
    <description>
    Unchecked NULL pointer usage in LookupModMask in xkbcomp/expr.c in xkbcommon before 0.8.2 could be used by local attackers to crash (NULL pointer dereference) the xkbcommon parser by supplying a crafted keymap file with invalid virtual modifiers.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15862/">CVE-2018-15862 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15862">CVE-2018-15862 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1105832">SUSE bug 1105832</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826124" comment="gdm-3.28.2-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826125" comment="gdm-devel-3.28.2-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826126" comment="gdm-pam-extensions-devel-3.28.2-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826127" comment="libX11-1.6.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826128" comment="libX11-common-1.6.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826129" comment="libX11-devel-1.6.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826130" comment="libxkbcommon-0.7.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826131" comment="libxkbcommon-devel-0.7.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826132" comment="libxkbcommon-x11-0.7.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826133" comment="libxkbcommon-x11-devel-0.7.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826134" comment="mesa-libGLw-8.0.0-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826135" comment="mesa-libGLw-devel-8.0.0-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826136" comment="xorg-x11-drv-ati-19.0.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826137" comment="xorg-x11-drv-vesa-2.4.0-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826138" comment="xorg-x11-drv-wacom-0.36.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826139" comment="xorg-x11-drv-wacom-devel-0.36.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826140" comment="xorg-x11-server-Xdmx-1.20.4-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826141" comment="xorg-x11-server-Xephyr-1.20.4-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826142" comment="xorg-x11-server-Xnest-1.20.4-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826143" comment="xorg-x11-server-Xorg-1.20.4-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826144" comment="xorg-x11-server-Xvfb-1.20.4-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826145" comment="xorg-x11-server-Xwayland-1.20.4-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826146" comment="xorg-x11-server-common-1.20.4-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826147" comment="xorg-x11-server-devel-1.20.4-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826148" comment="xorg-x11-server-source-1.20.4-7.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201815863" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-15863</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-15863" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15863" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-15863" ref_url="https://www.suse.com/security/cve/CVE-2018-15863" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3802-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QD7OXDVEE6GG73NXAXXSDS7BU4AU7ZPN/#QD7OXDVEE6GG73NXAXXSDS7BU4AU7ZPN" source="SUSE-SU"/>
    <description>
    Unchecked NULL pointer usage in ResolveStateAndPredicate in xkbcomp/compat.c in xkbcommon before 0.8.2 could be used by local attackers to crash (NULL pointer dereference) the xkbcommon parser by supplying a crafted keymap file with a no-op modmask expression.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-02-04"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15863/">CVE-2018-15863 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15863">CVE-2018-15863 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1105832">SUSE bug 1105832</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826124" comment="gdm-3.28.2-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826125" comment="gdm-devel-3.28.2-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826126" comment="gdm-pam-extensions-devel-3.28.2-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826127" comment="libX11-1.6.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826128" comment="libX11-common-1.6.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826129" comment="libX11-devel-1.6.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826130" comment="libxkbcommon-0.7.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826131" comment="libxkbcommon-devel-0.7.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826132" comment="libxkbcommon-x11-0.7.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826133" comment="libxkbcommon-x11-devel-0.7.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826134" comment="mesa-libGLw-8.0.0-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826135" comment="mesa-libGLw-devel-8.0.0-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826136" comment="xorg-x11-drv-ati-19.0.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826137" comment="xorg-x11-drv-vesa-2.4.0-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826138" comment="xorg-x11-drv-wacom-0.36.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826139" comment="xorg-x11-drv-wacom-devel-0.36.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826140" comment="xorg-x11-server-Xdmx-1.20.4-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826141" comment="xorg-x11-server-Xephyr-1.20.4-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826142" comment="xorg-x11-server-Xnest-1.20.4-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826143" comment="xorg-x11-server-Xorg-1.20.4-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826144" comment="xorg-x11-server-Xvfb-1.20.4-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826145" comment="xorg-x11-server-Xwayland-1.20.4-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826146" comment="xorg-x11-server-common-1.20.4-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826147" comment="xorg-x11-server-devel-1.20.4-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826148" comment="xorg-x11-server-source-1.20.4-7.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201815864" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-15864</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-15864" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15864" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-15864" ref_url="https://www.suse.com/security/cve/CVE-2018-15864" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017591.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3802-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QD7OXDVEE6GG73NXAXXSDS7BU4AU7ZPN/#QD7OXDVEE6GG73NXAXXSDS7BU4AU7ZPN" source="SUSE-SU"/>
    <description>
    Unchecked NULL pointer usage in resolve_keysym in xkbcomp/parser.y in xkbcommon before 0.8.2 could be used by local attackers to crash (NULL pointer dereference) the xkbcommon parser by supplying a crafted keymap file, because a map access attempt can occur for a map that was never created.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15864/">CVE-2018-15864 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15864">CVE-2018-15864 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1105832">SUSE bug 1105832</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826124" comment="gdm-3.28.2-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826125" comment="gdm-devel-3.28.2-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826126" comment="gdm-pam-extensions-devel-3.28.2-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826127" comment="libX11-1.6.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826128" comment="libX11-common-1.6.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826129" comment="libX11-devel-1.6.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826130" comment="libxkbcommon-0.7.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826131" comment="libxkbcommon-devel-0.7.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826132" comment="libxkbcommon-x11-0.7.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826133" comment="libxkbcommon-x11-devel-0.7.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826134" comment="mesa-libGLw-8.0.0-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826135" comment="mesa-libGLw-devel-8.0.0-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826136" comment="xorg-x11-drv-ati-19.0.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826137" comment="xorg-x11-drv-vesa-2.4.0-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826138" comment="xorg-x11-drv-wacom-0.36.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826139" comment="xorg-x11-drv-wacom-devel-0.36.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826140" comment="xorg-x11-server-Xdmx-1.20.4-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826141" comment="xorg-x11-server-Xephyr-1.20.4-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826142" comment="xorg-x11-server-Xnest-1.20.4-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826143" comment="xorg-x11-server-Xorg-1.20.4-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826144" comment="xorg-x11-server-Xvfb-1.20.4-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826145" comment="xorg-x11-server-Xwayland-1.20.4-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826146" comment="xorg-x11-server-common-1.20.4-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826147" comment="xorg-x11-server-devel-1.20.4-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826148" comment="xorg-x11-server-source-1.20.4-7.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201815908" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-15908</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-15908" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15908" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-15908" ref_url="https://www.suse.com/security/cve/CVE-2018-15908" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2975-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2975-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004633.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3036-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O62FBJOZYB7M7RACN47LPZMGLKILJJ4M/#O62FBJOZYB7M7RACN47LPZMGLKILJJ4M" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3038-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RZO3C5RVQVCQ7F4PEFN7IKCUAQU2JSUU/#RZO3C5RVQVCQ7F4PEFN7IKCUAQU2JSUU" source="SUSE-SU"/>
    <description>
    In Artifex Ghostscript 9.23 before 2018-08-23, attackers are able to supply malicious PostScript files to bypass .tempfile restrictions and write files.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-25"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15908/">CVE-2018-15908 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15908">CVE-2018-15908 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1105464">SUSE bug 1105464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106171">SUSE bug 1106171</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825392" comment="ghostscript-9.07-31.el7_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825393" comment="ghostscript-cups-9.07-31.el7_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825394" comment="ghostscript-devel-9.07-31.el7_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825395" comment="ghostscript-doc-9.07-31.el7_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825396" comment="ghostscript-gtk-9.07-31.el7_6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201815909" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-15909</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-15909" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15909" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-15909" ref_url="https://www.suse.com/security/cve/CVE-2018-15909" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2975-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2975-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004633.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3036-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O62FBJOZYB7M7RACN47LPZMGLKILJJ4M/#O62FBJOZYB7M7RACN47LPZMGLKILJJ4M" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3038-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RZO3C5RVQVCQ7F4PEFN7IKCUAQU2JSUU/#RZO3C5RVQVCQ7F4PEFN7IKCUAQU2JSUU" source="SUSE-SU"/>
    <description>
    In Artifex Ghostscript 9.23 before 2018-08-24, a type confusion using the .shfill operator could be used by attackers able to supply crafted PostScript files to crash the interpreter or potentially execute code.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-24"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15909/">CVE-2018-15909 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15909">CVE-2018-15909 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1105464">SUSE bug 1105464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106172">SUSE bug 1106172</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825392" comment="ghostscript-9.07-31.el7_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825393" comment="ghostscript-cups-9.07-31.el7_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825394" comment="ghostscript-devel-9.07-31.el7_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825395" comment="ghostscript-doc-9.07-31.el7_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825396" comment="ghostscript-gtk-9.07-31.el7_6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201815910" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-15910</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-15910" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15910" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-15910" ref_url="https://www.suse.com/security/cve/CVE-2018-15910" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2975-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2975-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004767.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3036-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O62FBJOZYB7M7RACN47LPZMGLKILJJ4M/#O62FBJOZYB7M7RACN47LPZMGLKILJJ4M" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3038-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RZO3C5RVQVCQ7F4PEFN7IKCUAQU2JSUU/#RZO3C5RVQVCQ7F4PEFN7IKCUAQU2JSUU" source="SUSE-SU"/>
    <description>
    In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the LockDistillerParams parameter to crash the interpreter or execute code.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-24"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15910/">CVE-2018-15910 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15910">CVE-2018-15910 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1105464">SUSE bug 1105464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106173">SUSE bug 1106173</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824592" comment="ghostscript-9.07-29.el7_5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824593" comment="ghostscript-cups-9.07-29.el7_5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824594" comment="ghostscript-devel-9.07-29.el7_5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824595" comment="ghostscript-doc-9.07-29.el7_5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824596" comment="ghostscript-gtk-9.07-29.el7_5.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201815911" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-15911</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-15911" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15911" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-15911" ref_url="https://www.suse.com/security/cve/CVE-2018-15911" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2975-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2975-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004633.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3036-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O62FBJOZYB7M7RACN47LPZMGLKILJJ4M/#O62FBJOZYB7M7RACN47LPZMGLKILJJ4M" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3038-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RZO3C5RVQVCQ7F4PEFN7IKCUAQU2JSUU/#RZO3C5RVQVCQ7F4PEFN7IKCUAQU2JSUU" source="SUSE-SU"/>
    <description>
    In Artifex Ghostscript 9.23 before 2018-08-24, attackers able to supply crafted PostScript could use uninitialized memory access in the aesdecode operator to crash the interpreter or potentially execute code.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-23"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15911/">CVE-2018-15911 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15911">CVE-2018-15911 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1105464">SUSE bug 1105464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106195">SUSE bug 1106195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108027">SUSE bug 1108027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109105">SUSE bug 1109105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111479">SUSE bug 1111479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111480">SUSE bug 1111480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112229">SUSE bug 1112229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117022">SUSE bug 1117022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118455">SUSE bug 1118455</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825447" comment="ghostscript-9.07-31.el7_6.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825448" comment="ghostscript-cups-9.07-31.el7_6.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825449" comment="ghostscript-devel-9.07-31.el7_6.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825450" comment="ghostscript-doc-9.07-31.el7_6.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825451" comment="ghostscript-gtk-9.07-31.el7_6.6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816057" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16057</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16057" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16057" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16057" ref_url="https://www.suse.com/security/cve/CVE-2018-16057" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2587-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HT3OHAGSZFOPNNTSTVQ5EWXEJVDTP4CE/#HT3OHAGSZFOPNNTSTVQ5EWXEJVDTP4CE" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2628-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MVWUYPNRZPZPQ3S4XIE67OUSBUE6HXUC/#MVWUYPNRZPZPQ3S4XIE67OUSBUE6HXUC" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5IUFGOOBYOJSD6ELATYP2KAV4TMLYPWB/" source="SUSE-SU"/>
    <description>
    In Wireshark 2.6.0 to 2.6.2, 2.4.0 to 2.4.8, and 2.2.0 to 2.2.16, the Radiotap dissector could crash. This was addressed in epan/dissectors/packet-ieee80211-radiotap-iter.c by validating iterator operations.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-16057/">CVE-2018-16057 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16057">CVE-2018-16057 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1106514">SUSE bug 1106514</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827643" comment="wireshark-1.10.14-24.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827644" comment="wireshark-devel-1.10.14-24.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827645" comment="wireshark-gnome-1.10.14-24.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816062" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16062</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16062" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16062" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16062" ref_url="https://www.suse.com/security/cve/CVE-2018-16062" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2614-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1590-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Z5JKL6B32NFBYAZ26H2YW75ZH2O62BBE/#Z5JKL6B32NFBYAZ26H2YW75ZH2O62BBE" source="SUSE-SU"/>
    <description>
    dwarf_getaranges in dwarf_getaranges.c in libdw in elfutils before 2018-08-18 allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16062/">CVE-2018-16062 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16062">CVE-2018-16062 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1106390">SUSE bug 1106390</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826462" comment="elfutils-0.176-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826463" comment="elfutils-default-yama-scope-0.176-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826464" comment="elfutils-devel-0.176-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826465" comment="elfutils-devel-static-0.176-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826466" comment="elfutils-libelf-0.176-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826467" comment="elfutils-libelf-devel-0.176-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826468" comment="elfutils-libelf-devel-static-0.176-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826469" comment="elfutils-libs-0.176-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816328" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16328</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16328" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16328" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16328" ref_url="https://www.suse.com/security/cve/CVE-2018-16328" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004634.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3014-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/B7J5V7SPYWREMJM3QGRDXBWTZNH4UBWR/#B7J5V7SPYWREMJM3QGRDXBWTZNH4UBWR" source="SUSE-SU"/>
    <description>
    In ImageMagick before 7.0.8-8, a NULL pointer dereference exists in the CheckEventLogging function in MagickCore/log.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16328/">CVE-2018-16328 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16328">CVE-2018-16328 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1106857">SUSE bug 1106857</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827880" comment="ImageMagick-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827881" comment="ImageMagick-c++-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827882" comment="ImageMagick-c++-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827883" comment="ImageMagick-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827884" comment="ImageMagick-doc-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827885" comment="ImageMagick-perl-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827886" comment="autotrace-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827887" comment="autotrace-devel-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827888" comment="emacs-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827889" comment="emacs-common-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827890" comment="emacs-el-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827891" comment="emacs-filesystem-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827892" comment="emacs-nox-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827893" comment="emacs-terminal-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827894" comment="inkscape-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827895" comment="inkscape-docs-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827896" comment="inkscape-view-0.92.2-3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816391" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16391</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16391" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16391" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16391" ref_url="https://www.suse.com/security/cve/CVE-2018-16391" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3622-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3622-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3629-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183629-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3701-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W53W3WI62JBDOR262OVGATHJMMGDQ7QS/#W53W3WI62JBDOR262OVGATHJMMGDQ7QS" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3716-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IN5FH6UV3HZ2KKFGV3VSQLHDGZFFIU3X/#IN5FH6UV3HZ2KKFGV3VSQLHDGZFFIU3X" source="SUSE-SU"/>
    <description>
    Several buffer overflows when handling responses from a Muscle Card in muscle_list_files in libopensc/card-muscle.c in OpenSC before 0.19.0-rc1 could be used by attackers able to supply crafted smartcards to cause a denial of service (application crash) or possibly have unspecified other impact.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16391/">CVE-2018-16391 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16391">CVE-2018-16391 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1106998">SUSE bug 1106998</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826386" comment="opensc-0.19.0-3.el7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816392" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16392</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16392" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16392" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16392" ref_url="https://www.suse.com/security/cve/CVE-2018-16392" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3622-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3622-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3629-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183629-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3701-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W53W3WI62JBDOR262OVGATHJMMGDQ7QS/#W53W3WI62JBDOR262OVGATHJMMGDQ7QS" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3716-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IN5FH6UV3HZ2KKFGV3VSQLHDGZFFIU3X/#IN5FH6UV3HZ2KKFGV3VSQLHDGZFFIU3X" source="SUSE-SU"/>
    <description>
    Several buffer overflows when handling responses from a TCOS Card in tcos_select_file in libopensc/card-tcos.c in OpenSC before 0.19.0-rc1 could be used by attackers able to supply crafted smartcards to cause a denial of service (application crash) or possibly have unspecified other impact.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16392/">CVE-2018-16392 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16392">CVE-2018-16392 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1106999">SUSE bug 1106999</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826386" comment="opensc-0.19.0-3.el7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816393" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16393</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16393" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16393" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16393" ref_url="https://www.suse.com/security/cve/CVE-2018-16393" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3622-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3622-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3629-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183629-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3701-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W53W3WI62JBDOR262OVGATHJMMGDQ7QS/#W53W3WI62JBDOR262OVGATHJMMGDQ7QS" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3716-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IN5FH6UV3HZ2KKFGV3VSQLHDGZFFIU3X/#IN5FH6UV3HZ2KKFGV3VSQLHDGZFFIU3X" source="SUSE-SU"/>
    <description>
    Several buffer overflows when handling responses from a Gemsafe V1 Smartcard in gemsafe_get_cert_len in libopensc/pkcs15-gemsafeV1.c in OpenSC before 0.19.0-rc1 could be used by attackers able to supply crafted smartcards to cause a denial of service (application crash) or possibly have unspecified other impact.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16393/">CVE-2018-16393 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16393">CVE-2018-16393 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1108318">SUSE bug 1108318</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826386" comment="opensc-0.19.0-3.el7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816395" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16395</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16395" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16395" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16395" ref_url="https://www.suse.com/security/cve/CVE-2018-16395" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:15034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012115.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1771-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DDFTKHWDUNIX327O4WIHXU2TIVV47W3Z/#DDFTKHWDUNIX327O4WIHXU2TIVV47W3Z" source="SUSE-SU"/>
    <description>
    An issue was discovered in the OpenSSL library in Ruby before 2.3.8, 2.4.x before 2.4.5, 2.5.x before 2.5.2, and 2.6.x before 2.6.0-preview3. When two OpenSSL::X509::Name objects are compared using ==, depending on the ordering, non-equal objects may return true. When the first argument is one character longer than the second, or the second argument contains a character that is one less than a character in the same position of the first argument, the result of == will be true. This could be leveraged to create an illegitimate certificate that may be accepted as legitimate and then used in signing or encryption operations.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-16395/">CVE-2018-16395 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16395">CVE-2018-16395 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1112530">SUSE bug 1112530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136906">SUSE bug 1136906</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825426" comment="ruby-2.0.0.648-34.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825427" comment="ruby-devel-2.0.0.648-34.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825428" comment="ruby-doc-2.0.0.648-34.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825429" comment="ruby-irb-2.0.0.648-34.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825430" comment="ruby-libs-2.0.0.648-34.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825431" comment="ruby-tcltk-2.0.0.648-34.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825432" comment="rubygem-bigdecimal-1.2.0-34.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825433" comment="rubygem-io-console-0.4.2-34.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825434" comment="rubygem-json-1.7.7-34.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825435" comment="rubygem-minitest-4.3.2-34.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825436" comment="rubygem-psych-2.0.0-34.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825437" comment="rubygem-rake-0.9.6-34.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825438" comment="rubygem-rdoc-4.0.0-34.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825439" comment="rubygems-2.0.14.1-34.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825440" comment="rubygems-devel-2.0.14.1-34.el7_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816396" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16396</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16396" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16396" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16396" ref_url="https://www.suse.com/security/cve/CVE-2018-16396" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1771-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DDFTKHWDUNIX327O4WIHXU2TIVV47W3Z/#DDFTKHWDUNIX327O4WIHXU2TIVV47W3Z" source="SUSE-SU"/>
    <description>
    An issue was discovered in Ruby before 2.3.8, 2.4.x before 2.4.5, 2.5.x before 2.5.2, and 2.6.x before 2.6.0-preview3. It does not taint strings that result from unpacking tainted strings with some formats.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16396/">CVE-2018-16396 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16396">CVE-2018-16396 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1112532">SUSE bug 1112532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136906">SUSE bug 1136906</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825992" comment="ruby-2.0.0.648-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825993" comment="ruby-devel-2.0.0.648-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825994" comment="ruby-doc-2.0.0.648-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825995" comment="ruby-irb-2.0.0.648-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825996" comment="ruby-libs-2.0.0.648-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825997" comment="ruby-tcltk-2.0.0.648-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825998" comment="rubygem-bigdecimal-1.2.0-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825999" comment="rubygem-io-console-0.4.2-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826000" comment="rubygem-json-1.7.7-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826001" comment="rubygem-minitest-4.3.2-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826002" comment="rubygem-psych-2.0.0-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826003" comment="rubygem-rake-0.9.6-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826004" comment="rubygem-rdoc-4.0.0-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826005" comment="rubygems-2.0.14.1-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826006" comment="rubygems-devel-2.0.14.1-36.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816402" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16402</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16402" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16402" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16402" ref_url="https://www.suse.com/security/cve/CVE-2018-16402" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2614-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1590-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Z5JKL6B32NFBYAZ26H2YW75ZH2O62BBE/#Z5JKL6B32NFBYAZ26H2YW75ZH2O62BBE" source="SUSE-SU"/>
    <description>
    libelf/elf_end.c in elfutils 0.173 allows remote attackers to cause a denial of service (double free and application crash) or possibly have unspecified other impact because it tries to decompress twice.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16402/">CVE-2018-16402 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16402">CVE-2018-16402 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1107066">SUSE bug 1107066</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826462" comment="elfutils-0.176-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826463" comment="elfutils-default-yama-scope-0.176-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826464" comment="elfutils-devel-0.176-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826465" comment="elfutils-devel-static-0.176-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826466" comment="elfutils-libelf-0.176-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826467" comment="elfutils-libelf-devel-0.176-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826468" comment="elfutils-libelf-devel-static-0.176-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826469" comment="elfutils-libs-0.176-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816403" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16403</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16403" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16403" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16403" ref_url="https://www.suse.com/security/cve/CVE-2018-16403" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2614-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1590-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Z5JKL6B32NFBYAZ26H2YW75ZH2O62BBE/#Z5JKL6B32NFBYAZ26H2YW75ZH2O62BBE" source="SUSE-SU"/>
    <description>
    libdw in elfutils 0.173 checks the end of the attributes list incorrectly in dwarf_getabbrev in dwarf_getabbrev.c and dwarf_hasattr in dwarf_hasattr.c, leading to a heap-based buffer over-read and an application crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16403/">CVE-2018-16403 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16403">CVE-2018-16403 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1107067">SUSE bug 1107067</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826462" comment="elfutils-0.176-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826463" comment="elfutils-default-yama-scope-0.176-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826464" comment="elfutils-devel-0.176-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826465" comment="elfutils-devel-static-0.176-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826466" comment="elfutils-libelf-0.176-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826467" comment="elfutils-libelf-devel-0.176-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826468" comment="elfutils-libelf-devel-static-0.176-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826469" comment="elfutils-libs-0.176-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816418" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16418</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16418" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16418" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16418" ref_url="https://www.suse.com/security/cve/CVE-2018-16418" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3622-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3622-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3629-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183629-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3701-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W53W3WI62JBDOR262OVGATHJMMGDQ7QS/#W53W3WI62JBDOR262OVGATHJMMGDQ7QS" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3716-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IN5FH6UV3HZ2KKFGV3VSQLHDGZFFIU3X/#IN5FH6UV3HZ2KKFGV3VSQLHDGZFFIU3X" source="SUSE-SU"/>
    <description>
    A buffer overflow when handling string concatenation in util_acl_to_str in tools/util.c in OpenSC before 0.19.0-rc1 could be used by attackers able to supply crafted smartcards to cause a denial of service (application crash) or possibly have unspecified other impact.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16418/">CVE-2018-16418 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16418">CVE-2018-16418 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1107039">SUSE bug 1107039</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826386" comment="opensc-0.19.0-3.el7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816419" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16419</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16419" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16419" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16419" ref_url="https://www.suse.com/security/cve/CVE-2018-16419" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3622-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3622-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3629-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183629-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3701-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W53W3WI62JBDOR262OVGATHJMMGDQ7QS/#W53W3WI62JBDOR262OVGATHJMMGDQ7QS" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3716-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IN5FH6UV3HZ2KKFGV3VSQLHDGZFFIU3X/#IN5FH6UV3HZ2KKFGV3VSQLHDGZFFIU3X" source="SUSE-SU"/>
    <description>
    Several buffer overflows when handling responses from a Cryptoflex card in read_public_key in tools/cryptoflex-tool.c in OpenSC before 0.19.0-rc1 could be used by attackers able to supply crafted smartcards to cause a denial of service (application crash) or possibly have unspecified other impact.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16419/">CVE-2018-16419 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16419">CVE-2018-16419 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1107107">SUSE bug 1107107</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826386" comment="opensc-0.19.0-3.el7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816420" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16420</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16420" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16420" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16420" ref_url="https://www.suse.com/security/cve/CVE-2018-16420" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3622-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3622-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3629-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183629-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3701-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W53W3WI62JBDOR262OVGATHJMMGDQ7QS/#W53W3WI62JBDOR262OVGATHJMMGDQ7QS" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3716-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IN5FH6UV3HZ2KKFGV3VSQLHDGZFFIU3X/#IN5FH6UV3HZ2KKFGV3VSQLHDGZFFIU3X" source="SUSE-SU"/>
    <description>
    Several buffer overflows when handling responses from an ePass 2003 Card in decrypt_response in libopensc/card-epass2003.c in OpenSC before 0.19.0-rc1 could be used by attackers able to supply crafted smartcards to cause a denial of service (application crash) or possibly have unspecified other impact.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16420/">CVE-2018-16420 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16420">CVE-2018-16420 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1107097">SUSE bug 1107097</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826386" comment="opensc-0.19.0-3.el7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816421" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16421</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16421" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16421" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16421" ref_url="https://www.suse.com/security/cve/CVE-2018-16421" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3629-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183629-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3716-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IN5FH6UV3HZ2KKFGV3VSQLHDGZFFIU3X/#IN5FH6UV3HZ2KKFGV3VSQLHDGZFFIU3X" source="SUSE-SU"/>
    <description>
    Several buffer overflows when handling responses from a CAC Card in cac_get_serial_nr_from_CUID in libopensc/card-cac.c in OpenSC before 0.19.0-rc1 could be used by attackers able to supply crafted smartcards to cause a denial of service (application crash) or possibly have unspecified other impact.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16421/">CVE-2018-16421 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16421">CVE-2018-16421 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1107049">SUSE bug 1107049</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826386" comment="opensc-0.19.0-3.el7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816422" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16422</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16422" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16422" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16422" ref_url="https://www.suse.com/security/cve/CVE-2018-16422" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3622-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3622-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3629-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183629-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3701-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W53W3WI62JBDOR262OVGATHJMMGDQ7QS/#W53W3WI62JBDOR262OVGATHJMMGDQ7QS" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3716-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IN5FH6UV3HZ2KKFGV3VSQLHDGZFFIU3X/#IN5FH6UV3HZ2KKFGV3VSQLHDGZFFIU3X" source="SUSE-SU"/>
    <description>
    A single byte buffer overflow when handling responses from an esteid Card in sc_pkcs15emu_esteid_init in libopensc/pkcs15-esteid.c in OpenSC before 0.19.0-rc1 could be used by attackers able to supply crafted smartcards to cause a denial of service (application crash) or possibly have unspecified other impact.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16422/">CVE-2018-16422 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16422">CVE-2018-16422 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1107038">SUSE bug 1107038</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826386" comment="opensc-0.19.0-3.el7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816423" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16423</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16423" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16423" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16423" ref_url="https://www.suse.com/security/cve/CVE-2018-16423" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3622-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3622-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3629-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183629-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3701-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W53W3WI62JBDOR262OVGATHJMMGDQ7QS/#W53W3WI62JBDOR262OVGATHJMMGDQ7QS" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3716-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IN5FH6UV3HZ2KKFGV3VSQLHDGZFFIU3X/#IN5FH6UV3HZ2KKFGV3VSQLHDGZFFIU3X" source="SUSE-SU"/>
    <description>
    A double free when handling responses from a smartcard in sc_file_set_sec_attr in libopensc/sc.c in OpenSC before 0.19.0-rc1 could be used by attackers able to supply crafted smartcards to cause a denial of service (application crash) or possibly have unspecified other impact.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16423/">CVE-2018-16423 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16423">CVE-2018-16423 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1107037">SUSE bug 1107037</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826386" comment="opensc-0.19.0-3.el7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816426" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16426</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16426" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16426" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16426" ref_url="https://www.suse.com/security/cve/CVE-2018-16426" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3622-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3622-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3629-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183629-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3701-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W53W3WI62JBDOR262OVGATHJMMGDQ7QS/#W53W3WI62JBDOR262OVGATHJMMGDQ7QS" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3716-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IN5FH6UV3HZ2KKFGV3VSQLHDGZFFIU3X/#IN5FH6UV3HZ2KKFGV3VSQLHDGZFFIU3X" source="SUSE-SU"/>
    <description>
    Endless recursion when handling responses from an IAS-ECC card in iasecc_select_file in libopensc/card-iasecc.c in OpenSC before 0.19.0-rc1 could be used by attackers able to supply crafted smartcards to hang or crash the opensc library using programs.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16426/">CVE-2018-16426 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16426">CVE-2018-16426 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1107034">SUSE bug 1107034</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826386" comment="opensc-0.19.0-3.el7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816427" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16427</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16427" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16427" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16427" ref_url="https://www.suse.com/security/cve/CVE-2018-16427" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3622-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3622-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3629-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183629-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3701-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W53W3WI62JBDOR262OVGATHJMMGDQ7QS/#W53W3WI62JBDOR262OVGATHJMMGDQ7QS" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3716-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IN5FH6UV3HZ2KKFGV3VSQLHDGZFFIU3X/#IN5FH6UV3HZ2KKFGV3VSQLHDGZFFIU3X" source="SUSE-SU"/>
    <description>
    Various out of bounds reads when handling responses in OpenSC before 0.19.0-rc1 could be used by attackers able to supply crafted smartcards to potentially crash the opensc library using programs.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16427/">CVE-2018-16427 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16427">CVE-2018-16427 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1107033">SUSE bug 1107033</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826386" comment="opensc-0.19.0-3.el7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816509" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16509</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16509" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16509" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16509" ref_url="https://www.suse.com/security/cve/CVE-2018-16509" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2975-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2975-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004767.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3036-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O62FBJOZYB7M7RACN47LPZMGLKILJJ4M/#O62FBJOZYB7M7RACN47LPZMGLKILJJ4M" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3038-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RZO3C5RVQVCQ7F4PEFN7IKCUAQU2JSUU/#RZO3C5RVQVCQ7F4PEFN7IKCUAQU2JSUU" source="SUSE-SU"/>
    <description>
    An issue was discovered in Artifex Ghostscript before 9.24. Incorrect "restoration of privilege" checking during handling of /invalidaccess exceptions could be used by attackers able to supply crafted PostScript to execute code using the "pipe" instruction.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-24"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16509/">CVE-2018-16509 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16509">CVE-2018-16509 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1107410">SUSE bug 1107410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108027">SUSE bug 1108027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118318">SUSE bug 1118318</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824592" comment="ghostscript-9.07-29.el7_5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824593" comment="ghostscript-cups-9.07-29.el7_5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824594" comment="ghostscript-devel-9.07-29.el7_5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824595" comment="ghostscript-doc-9.07-29.el7_5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824596" comment="ghostscript-gtk-9.07-29.el7_5.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16511</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16511" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16511" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16511" ref_url="https://www.suse.com/security/cve/CVE-2018-16511" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2975-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2975-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004767.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3036-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O62FBJOZYB7M7RACN47LPZMGLKILJJ4M/#O62FBJOZYB7M7RACN47LPZMGLKILJJ4M" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3038-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RZO3C5RVQVCQ7F4PEFN7IKCUAQU2JSUU/#RZO3C5RVQVCQ7F4PEFN7IKCUAQU2JSUU" source="SUSE-SU"/>
    <description>
    An issue was discovered in Artifex Ghostscript before 9.24. A type confusion in "ztype" could be used by remote attackers able to supply crafted PostScript to crash the interpreter or possibly have unspecified other impact.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-26"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-16511/">CVE-2018-16511 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16511">CVE-2018-16511 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1107426">SUSE bug 1107426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111479">SUSE bug 1111479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112229">SUSE bug 1112229</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825392" comment="ghostscript-9.07-31.el7_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825393" comment="ghostscript-cups-9.07-31.el7_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825394" comment="ghostscript-devel-9.07-31.el7_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825395" comment="ghostscript-doc-9.07-31.el7_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825396" comment="ghostscript-gtk-9.07-31.el7_6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816539" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16539</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16539" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16539" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16539" ref_url="https://www.suse.com/security/cve/CVE-2018-16539" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2975-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2975-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004633.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3036-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O62FBJOZYB7M7RACN47LPZMGLKILJJ4M/#O62FBJOZYB7M7RACN47LPZMGLKILJJ4M" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3038-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RZO3C5RVQVCQ7F4PEFN7IKCUAQU2JSUU/#RZO3C5RVQVCQ7F4PEFN7IKCUAQU2JSUU" source="SUSE-SU"/>
    <description>
    In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect access checking in temp file handling to disclose contents of files on the system otherwise not readable.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16539/">CVE-2018-16539 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16539">CVE-2018-16539 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1107422">SUSE bug 1107422</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825392" comment="ghostscript-9.07-31.el7_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825393" comment="ghostscript-cups-9.07-31.el7_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825394" comment="ghostscript-devel-9.07-31.el7_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825395" comment="ghostscript-doc-9.07-31.el7_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825396" comment="ghostscript-gtk-9.07-31.el7_6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816540" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16540</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16540" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16540" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16540" ref_url="https://www.suse.com/security/cve/CVE-2018-16540" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2975-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2975-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004767.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3036-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O62FBJOZYB7M7RACN47LPZMGLKILJJ4M/#O62FBJOZYB7M7RACN47LPZMGLKILJJ4M" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3038-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RZO3C5RVQVCQ7F4PEFN7IKCUAQU2JSUU/#RZO3C5RVQVCQ7F4PEFN7IKCUAQU2JSUU" source="SUSE-SU"/>
    <description>
    In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files to the builtin PDF14 converter could use a use-after-free in copydevice handling to crash the interpreter or possibly have unspecified other impact.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-23"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16540/">CVE-2018-16540 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16540">CVE-2018-16540 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1107420">SUSE bug 1107420</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825522" comment="ghostscript-9.07-31.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825523" comment="ghostscript-cups-9.07-31.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825524" comment="ghostscript-devel-9.07-31.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825525" comment="ghostscript-doc-9.07-31.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825526" comment="ghostscript-gtk-9.07-31.el7_6.9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16541</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16541" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16541" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16541" ref_url="https://www.suse.com/security/cve/CVE-2018-16541" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2975-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2975-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004767.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3036-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O62FBJOZYB7M7RACN47LPZMGLKILJJ4M/#O62FBJOZYB7M7RACN47LPZMGLKILJJ4M" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3038-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RZO3C5RVQVCQ7F4PEFN7IKCUAQU2JSUU/#RZO3C5RVQVCQ7F4PEFN7IKCUAQU2JSUU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3051-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MTTZ6YPTQZTRHJWNCF4KNXDHV5N6Y2CU/#MTTZ6YPTQZTRHJWNCF4KNXDHV5N6Y2CU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3687-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BBHDVB7NPDAZXEW2BECURXKYFEGTTUL4/#BBHDVB7NPDAZXEW2BECURXKYFEGTTUL4" source="SUSE-SU"/>
    <description>
    In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect free logic in pagedevice replacement to crash the interpreter.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-25"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16541/">CVE-2018-16541 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16541">CVE-2018-16541 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1107421">SUSE bug 1107421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108027">SUSE bug 1108027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109105">SUSE bug 1109105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111479">SUSE bug 1111479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111480">SUSE bug 1111480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112229">SUSE bug 1112229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117022">SUSE bug 1117022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118455">SUSE bug 1118455</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825447" comment="ghostscript-9.07-31.el7_6.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825448" comment="ghostscript-cups-9.07-31.el7_6.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825449" comment="ghostscript-devel-9.07-31.el7_6.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825450" comment="ghostscript-doc-9.07-31.el7_6.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825451" comment="ghostscript-gtk-9.07-31.el7_6.6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816542" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16542</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16542" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16542" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16542" ref_url="https://www.suse.com/security/cve/CVE-2018-16542" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2975-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2975-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004767.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3036-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O62FBJOZYB7M7RACN47LPZMGLKILJJ4M/#O62FBJOZYB7M7RACN47LPZMGLKILJJ4M" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3038-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RZO3C5RVQVCQ7F4PEFN7IKCUAQU2JSUU/#RZO3C5RVQVCQ7F4PEFN7IKCUAQU2JSUU" source="SUSE-SU"/>
    <description>
    In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use insufficient interpreter stack-size checking during error handling to crash the interpreter.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-23"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16542/">CVE-2018-16542 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16542">CVE-2018-16542 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1107413">SUSE bug 1107413</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824592" comment="ghostscript-9.07-29.el7_5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824593" comment="ghostscript-cups-9.07-29.el7_5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824594" comment="ghostscript-devel-9.07-29.el7_5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824595" comment="ghostscript-doc-9.07-29.el7_5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824596" comment="ghostscript-gtk-9.07-29.el7_5.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816548" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16548</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16548" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16548" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16548" ref_url="https://www.suse.com/security/cve/CVE-2018-16548" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2750-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3341-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006273.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2394-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3IVY4O7V3JM7FYW6NLXS5OLHHPZLKGDP/#3IVY4O7V3JM7FYW6NLXS5OLHHPZLKGDP" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2396-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/E562ZTKCTSQIFPO6LIBH6UUXQRLAAD5H/#E562ZTKCTSQIFPO6LIBH6UUXQRLAAD5H" source="SUSE-SU"/>
    <description>
    An issue was discovered in ZZIPlib through 0.13.69. There is a memory leak triggered in the function __zzip_parse_root_directory in zip.c, which will lead to a denial of service attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16548/">CVE-2018-16548 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16548">CVE-2018-16548 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1107424">SUSE bug 1107424</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826459" comment="zziplib-0.13.62-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826460" comment="zziplib-devel-0.13.62-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826461" comment="zziplib-utils-0.13.62-11.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16640</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16640" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16640" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16640" ref_url="https://www.suse.com/security/cve/CVE-2018-16640" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004752.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3014-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/B7J5V7SPYWREMJM3QGRDXBWTZNH4UBWR/#B7J5V7SPYWREMJM3QGRDXBWTZNH4UBWR" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3203-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DWALNR6YTA7BKXUG6EHURMI5SS2EW2SE/#DWALNR6YTA7BKXUG6EHURMI5SS2EW2SE" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-5 has a memory leak vulnerability in the function ReadOneJNGImage in coders/png.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-07"/>
	<updated date="2026-03-07"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16640/">CVE-2018-16640 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16640">CVE-2018-16640 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1107619">SUSE bug 1107619</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827880" comment="ImageMagick-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827881" comment="ImageMagick-c++-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827882" comment="ImageMagick-c++-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827883" comment="ImageMagick-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827884" comment="ImageMagick-doc-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827885" comment="ImageMagick-perl-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827886" comment="autotrace-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827887" comment="autotrace-devel-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827888" comment="emacs-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827889" comment="emacs-common-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827890" comment="emacs-el-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827891" comment="emacs-filesystem-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827892" comment="emacs-nox-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827893" comment="emacs-terminal-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827894" comment="inkscape-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827895" comment="inkscape-docs-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827896" comment="inkscape-view-0.92.2-3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816642" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16642</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16642" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16642" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16642" ref_url="https://www.suse.com/security/cve/CVE-2018-16642" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004773.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3014-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/B7J5V7SPYWREMJM3QGRDXBWTZNH4UBWR/#B7J5V7SPYWREMJM3QGRDXBWTZNH4UBWR" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3203-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DWALNR6YTA7BKXUG6EHURMI5SS2EW2SE/#DWALNR6YTA7BKXUG6EHURMI5SS2EW2SE" source="SUSE-SU"/>
    <description>
    The function InsertRow in coders/cut.c in ImageMagick 7.0.7-37 allows remote attackers to cause a denial of service via a crafted image file due to an out-of-bounds write.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-07"/>
	<updated date="2026-03-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16642/">CVE-2018-16642 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16642">CVE-2018-16642 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1107616">SUSE bug 1107616</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827880" comment="ImageMagick-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827881" comment="ImageMagick-c++-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827882" comment="ImageMagick-c++-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827883" comment="ImageMagick-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827884" comment="ImageMagick-doc-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827885" comment="ImageMagick-perl-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827886" comment="autotrace-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827887" comment="autotrace-devel-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827888" comment="emacs-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827889" comment="emacs-common-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827890" comment="emacs-el-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827891" comment="emacs-filesystem-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827892" comment="emacs-nox-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827893" comment="emacs-terminal-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827894" comment="inkscape-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827895" comment="inkscape-docs-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827896" comment="inkscape-view-0.92.2-3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816643" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16643</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16643" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16643" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16643" ref_url="https://www.suse.com/security/cve/CVE-2018-16643" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004773.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3014-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/B7J5V7SPYWREMJM3QGRDXBWTZNH4UBWR/#B7J5V7SPYWREMJM3QGRDXBWTZNH4UBWR" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3203-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DWALNR6YTA7BKXUG6EHURMI5SS2EW2SE/#DWALNR6YTA7BKXUG6EHURMI5SS2EW2SE" source="SUSE-SU"/>
    <description>
    The functions ReadDCMImage in coders/dcm.c, ReadPWPImage in coders/pwp.c, ReadCALSImage in coders/cals.c, and ReadPICTImage in coders/pict.c in ImageMagick 7.0.8-4 do not check the return value of the fputc function, which allows remote attackers to cause a denial of service via a crafted image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-07"/>
	<updated date="2026-03-07"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16643/">CVE-2018-16643 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16643">CVE-2018-16643 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1107612">SUSE bug 1107612</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827880" comment="ImageMagick-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827881" comment="ImageMagick-c++-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827882" comment="ImageMagick-c++-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827883" comment="ImageMagick-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827884" comment="ImageMagick-doc-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827885" comment="ImageMagick-perl-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827886" comment="autotrace-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827887" comment="autotrace-devel-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827888" comment="emacs-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827889" comment="emacs-common-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827890" comment="emacs-el-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827891" comment="emacs-filesystem-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827892" comment="emacs-nox-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827893" comment="emacs-terminal-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827894" comment="inkscape-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827895" comment="inkscape-docs-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827896" comment="inkscape-view-0.92.2-3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816644" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16644</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16644" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16644" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16644" ref_url="https://www.suse.com/security/cve/CVE-2018-16644" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004773.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1033-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005375.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2742-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4MRPGO4YLINCR7NKEF33ROYE4SECA6HN/#4MRPGO4YLINCR7NKEF33ROYE4SECA6HN" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2742-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6S6TLVHCVXA5IYEAJSTX2NVNRHWMO75R/#6S6TLVHCVXA5IYEAJSTX2NVNRHWMO75R" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3014-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/B7J5V7SPYWREMJM3QGRDXBWTZNH4UBWR/#B7J5V7SPYWREMJM3QGRDXBWTZNH4UBWR" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3203-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DWALNR6YTA7BKXUG6EHURMI5SS2EW2SE/#DWALNR6YTA7BKXUG6EHURMI5SS2EW2SE" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3524-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UMS7MQ6FC3FOVAR3O445OWKIDWKK5225/#UMS7MQ6FC3FOVAR3O445OWKIDWKK5225" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1320-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2XHJ2AOYGREC65MN6FYXWNZTOX3EBKGA/#2XHJ2AOYGREC65MN6FYXWNZTOX3EBKGA" source="SUSE-SU"/>
    <description>
    There is a missing check for length in the functions ReadDCMImage of coders/dcm.c and ReadPICTImage of coders/pict.c in ImageMagick 7.0.8-11, which allows remote attackers to cause a denial of service via a crafted image.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-07"/>
	<updated date="2026-03-07"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16644/">CVE-2018-16644 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16644">CVE-2018-16644 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1107609">SUSE bug 1107609</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107612">SUSE bug 1107612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117463">SUSE bug 1117463</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827880" comment="ImageMagick-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827881" comment="ImageMagick-c++-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827882" comment="ImageMagick-c++-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827883" comment="ImageMagick-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827884" comment="ImageMagick-doc-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827885" comment="ImageMagick-perl-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827886" comment="autotrace-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827887" comment="autotrace-devel-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827888" comment="emacs-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827889" comment="emacs-common-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827890" comment="emacs-el-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827891" comment="emacs-filesystem-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827892" comment="emacs-nox-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827893" comment="emacs-terminal-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827894" comment="inkscape-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827895" comment="inkscape-docs-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827896" comment="inkscape-view-0.92.2-3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816645" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16645</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16645" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16645" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16645" ref_url="https://www.suse.com/security/cve/CVE-2018-16645" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004773.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2742-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4MRPGO4YLINCR7NKEF33ROYE4SECA6HN/#4MRPGO4YLINCR7NKEF33ROYE4SECA6HN" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2742-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6S6TLVHCVXA5IYEAJSTX2NVNRHWMO75R/#6S6TLVHCVXA5IYEAJSTX2NVNRHWMO75R" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3014-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/B7J5V7SPYWREMJM3QGRDXBWTZNH4UBWR/#B7J5V7SPYWREMJM3QGRDXBWTZNH4UBWR" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3203-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DWALNR6YTA7BKXUG6EHURMI5SS2EW2SE/#DWALNR6YTA7BKXUG6EHURMI5SS2EW2SE" source="SUSE-SU"/>
    <description>
    There is an excessive memory allocation issue in the functions ReadBMPImage of coders/bmp.c and ReadDIBImage of coders/dib.c in ImageMagick 7.0.8-11, which allows remote attackers to cause a denial of service via a crafted image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-07"/>
	<updated date="2026-03-07"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16645/">CVE-2018-16645 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16645">CVE-2018-16645 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1107604">SUSE bug 1107604</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827880" comment="ImageMagick-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827881" comment="ImageMagick-c++-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827882" comment="ImageMagick-c++-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827883" comment="ImageMagick-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827884" comment="ImageMagick-doc-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827885" comment="ImageMagick-perl-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827886" comment="autotrace-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827887" comment="autotrace-devel-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827888" comment="emacs-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827889" comment="emacs-common-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827890" comment="emacs-el-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827891" comment="emacs-filesystem-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827892" comment="emacs-nox-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827893" comment="emacs-terminal-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827894" comment="inkscape-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827895" comment="inkscape-docs-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827896" comment="inkscape-view-0.92.2-3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816646" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16646</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16646" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16646" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16646" ref_url="https://www.suse.com/security/cve/CVE-2018-16646" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2906-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2907-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030446.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3854-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TS7QPSEQIBQO7BALZOE3TN7IO7IMHK3Y/" source="SUSE-SU"/>
    <description>
    In Poppler 0.68.0, the Parser::getObj() function in Parser.cc may cause infinite recursion via a crafted file. A remote attacker can leverage this for a DoS attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16646/">CVE-2018-16646 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16646">CVE-2018-16646 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1107597">SUSE bug 1107597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140882">SUSE bug 1140882</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825972" comment="evince-3.28.2-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825973" comment="evince-browser-plugin-3.28.2-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825974" comment="evince-devel-3.28.2-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825975" comment="evince-dvi-3.28.2-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825976" comment="evince-libs-3.28.2-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825977" comment="evince-nautilus-3.28.2-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825978" comment="okular-4.10.5-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825979" comment="okular-devel-4.10.5-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825980" comment="okular-libs-4.10.5-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825981" comment="okular-part-4.10.5-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825982" comment="poppler-0.26.5-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825983" comment="poppler-cpp-0.26.5-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825984" comment="poppler-cpp-devel-0.26.5-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825985" comment="poppler-demos-0.26.5-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825986" comment="poppler-devel-0.26.5-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825987" comment="poppler-glib-0.26.5-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825988" comment="poppler-glib-devel-0.26.5-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825989" comment="poppler-qt-0.26.5-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825990" comment="poppler-qt-devel-0.26.5-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825991" comment="poppler-utils-0.26.5-38.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816658" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16658</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16658" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16658" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16658" ref_url="https://www.suse.com/security/cve/CVE-2018-16658" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2908-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2980-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2981-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2738-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DX32XKZSPY6HCHEGEFNDB2BQLAVU6T6E/#DX32XKZSPY6HCHEGEFNDB2BQLAVU6T6E" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3071-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6GTFT5RXJ7J2RAR6KEKOT74XNNP3FJVH/#6GTFT5RXJ7J2RAR6KEKOT74XNNP3FJVH" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 4.18.6. An information leak in cdrom_ioctl_drive_status in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16658/">CVE-2018-16658 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16658">CVE-2018-16658 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1092903">SUSE bug 1092903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107689">SUSE bug 1107689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113751">SUSE bug 1113751</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826007" comment="bpftool-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826008" comment="kernel-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826009" comment="kernel-abi-whitelists-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826010" comment="kernel-debug-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826013" comment="kernel-doc-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826014" comment="kernel-headers-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826015" comment="kernel-tools-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826016" comment="kernel-tools-libs-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826018" comment="perf-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826019" comment="python-perf-3.10.0-1062.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816749" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16749</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16749" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16749" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16749" ref_url="https://www.suse.com/security/cve/CVE-2018-16749" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004773.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2833-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/655ELB54ZHUCSRZMD3OLQNCY742BYX2U/#655ELB54ZHUCSRZMD3OLQNCY742BYX2U" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3203-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DWALNR6YTA7BKXUG6EHURMI5SS2EW2SE/#DWALNR6YTA7BKXUG6EHURMI5SS2EW2SE" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.7-29 and earlier, a missing NULL check in ReadOneJNGImage in coders/png.c allows an attacker to cause a denial of service (WriteBlob assertion failure and application exit) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16749/">CVE-2018-16749 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16749">CVE-2018-16749 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1108282">SUSE bug 1108282</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827880" comment="ImageMagick-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827881" comment="ImageMagick-c++-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827882" comment="ImageMagick-c++-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827883" comment="ImageMagick-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827884" comment="ImageMagick-doc-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827885" comment="ImageMagick-perl-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827886" comment="autotrace-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827887" comment="autotrace-devel-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827888" comment="emacs-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827889" comment="emacs-common-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827890" comment="emacs-el-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827891" comment="emacs-filesystem-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827892" comment="emacs-nox-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827893" comment="emacs-terminal-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827894" comment="inkscape-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827895" comment="inkscape-docs-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827896" comment="inkscape-view-0.92.2-3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816750" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16750</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16750" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16750" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16750" ref_url="https://www.suse.com/security/cve/CVE-2018-16750" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004773.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2833-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/655ELB54ZHUCSRZMD3OLQNCY742BYX2U/#655ELB54ZHUCSRZMD3OLQNCY742BYX2U" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3203-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DWALNR6YTA7BKXUG6EHURMI5SS2EW2SE/#DWALNR6YTA7BKXUG6EHURMI5SS2EW2SE" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.7-29 and earlier, a memory leak in the formatIPTCfromBuffer function in coders/meta.c was found.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16750/">CVE-2018-16750 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16750">CVE-2018-16750 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1108283">SUSE bug 1108283</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827880" comment="ImageMagick-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827881" comment="ImageMagick-c++-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827882" comment="ImageMagick-c++-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827883" comment="ImageMagick-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827884" comment="ImageMagick-doc-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827885" comment="ImageMagick-perl-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827886" comment="autotrace-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827887" comment="autotrace-devel-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827888" comment="emacs-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827889" comment="emacs-common-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827890" comment="emacs-el-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827891" comment="emacs-filesystem-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827892" comment="emacs-nox-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827893" comment="emacs-terminal-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827894" comment="inkscape-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827895" comment="inkscape-docs-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827896" comment="inkscape-view-0.92.2-3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816802" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16802</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16802" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16802" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16802" ref_url="https://www.suse.com/security/cve/CVE-2018-16802" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2975-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2975-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004633.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3036-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O62FBJOZYB7M7RACN47LPZMGLKILJJ4M/#O62FBJOZYB7M7RACN47LPZMGLKILJJ4M" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3038-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RZO3C5RVQVCQ7F4PEFN7IKCUAQU2JSUU/#RZO3C5RVQVCQ7F4PEFN7IKCUAQU2JSUU" source="SUSE-SU"/>
    <description>
    An issue was discovered in Artifex Ghostscript before 9.25. Incorrect "restoration of privilege" checking when running out of stack during exception handling could be used by attackers able to supply crafted PostScript to execute code using the "pipe" instruction. This is due to an incomplete fix for CVE-2018-16509.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-24"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16802/">CVE-2018-16802 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16802">CVE-2018-16802 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1107410">SUSE bug 1107410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108027">SUSE bug 1108027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109105">SUSE bug 1109105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111479">SUSE bug 1111479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111480">SUSE bug 1111480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112229">SUSE bug 1112229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117022">SUSE bug 1117022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117327">SUSE bug 1117327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118455">SUSE bug 1118455</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825447" comment="ghostscript-9.07-31.el7_6.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825448" comment="ghostscript-cups-9.07-31.el7_6.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825449" comment="ghostscript-devel-9.07-31.el7_6.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825450" comment="ghostscript-doc-9.07-31.el7_6.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825451" comment="ghostscript-gtk-9.07-31.el7_6.6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816838" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16838</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16838" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16838" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16838" ref_url="https://www.suse.com/security/cve/CVE-2018-16838" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005550.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005552.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1576-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WJEOEIGQIHRQVZ77D2I32OS3TJTM6VXD/#WJEOEIGQIHRQVZ77D2I32OS3TJTM6VXD" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1589-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LTMPMQK3HWS2LUXEMT7VPOZ2KIKKAUAZ/#LTMPMQK3HWS2LUXEMT7VPOZ2KIKKAUAZ" source="SUSE-SU"/>
    <description>
    A flaw was found in sssd Group Policy Objects implementation. When the GPO is not readable by SSSD due to a too strict permission settings on the server side, SSSD will allow all authenticated users to login instead of denying access.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16838/">CVE-2018-16838 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16838">CVE-2018-16838 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1124194">SUSE bug 1124194</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826413" comment="libipa_hbac-1.16.4-21.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826414" comment="libipa_hbac-devel-1.16.4-21.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826415" comment="libsss_autofs-1.16.4-21.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826416" comment="libsss_certmap-1.16.4-21.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826417" comment="libsss_certmap-devel-1.16.4-21.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826418" comment="libsss_idmap-1.16.4-21.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826419" comment="libsss_idmap-devel-1.16.4-21.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826420" comment="libsss_nss_idmap-1.16.4-21.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826421" comment="libsss_nss_idmap-devel-1.16.4-21.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826422" comment="libsss_simpleifp-1.16.4-21.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826423" comment="libsss_simpleifp-devel-1.16.4-21.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826424" comment="libsss_sudo-1.16.4-21.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826425" comment="python-libipa_hbac-1.16.4-21.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826426" comment="python-libsss_nss_idmap-1.16.4-21.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826427" comment="python-sss-1.16.4-21.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826428" comment="python-sss-murmur-1.16.4-21.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826429" comment="python-sssdconfig-1.16.4-21.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826430" comment="sssd-1.16.4-21.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826431" comment="sssd-ad-1.16.4-21.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826432" comment="sssd-client-1.16.4-21.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826433" comment="sssd-common-1.16.4-21.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826434" comment="sssd-common-pac-1.16.4-21.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826435" comment="sssd-dbus-1.16.4-21.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826436" comment="sssd-ipa-1.16.4-21.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826437" comment="sssd-kcm-1.16.4-21.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826438" comment="sssd-krb5-1.16.4-21.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826439" comment="sssd-krb5-common-1.16.4-21.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826440" comment="sssd-ldap-1.16.4-21.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826441" comment="sssd-libwbclient-1.16.4-21.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826442" comment="sssd-libwbclient-devel-1.16.4-21.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826443" comment="sssd-polkit-rules-1.16.4-21.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826444" comment="sssd-proxy-1.16.4-21.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826445" comment="sssd-tools-1.16.4-21.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826446" comment="sssd-winbind-idmap-1.16.4-21.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816842" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16842</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16842" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16842" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16842" ref_url="https://www.suse.com/security/cve/CVE-2018-16842" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3681-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004839.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005111.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3699-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/X6JWJNEIXWEQUGGAQRLV7YWFAU5EA6NJ/#X6JWJNEIXWEQUGGAQRLV7YWFAU5EA6NJ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3706-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3EVOC42Y4MFWBXEDJEMG3E5CFJF7HFMD/#3EVOC42Y4MFWBXEDJEMG3E5CFJF7HFMD" source="SUSE-SU"/>
    <description>
    Curl versions 7.14.1 through 7.61.1 are vulnerable to a heap-based buffer over-read in the tool_msgs.c:voutf() function that may result in information exposure and denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16842/">CVE-2018-16842 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16842">CVE-2018-16842 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1113660">SUSE bug 1113660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122464">SUSE bug 1122464</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826453" comment="curl-7.29.0-54.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826454" comment="libcurl-7.29.0-54.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826455" comment="libcurl-devel-7.29.0-54.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816863" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16863</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16863" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16863" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16863" ref_url="https://www.suse.com/security/cve/CVE-2018-16863" source="SUSE CVE"/>
    <description>
    It was found that RHSA-2018:2918 did not fully fix CVE-2018-16509. An attacker could possibly exploit another variant of the flaw and bypass the -dSAFER protection to, for example, execute arbitrary shell commands via a specially crafted PostScript document. This only affects ghostscript 9.07 as shipped with Red Hat Enterprise Linux 7.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16863/">CVE-2018-16863 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16863">CVE-2018-16863 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1118318">SUSE bug 1118318</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825441" comment="ghostscript-9.07-31.el7_6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825442" comment="ghostscript-cups-9.07-31.el7_6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825443" comment="ghostscript-devel-9.07-31.el7_6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825444" comment="ghostscript-doc-9.07-31.el7_6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825445" comment="ghostscript-gtk-9.07-31.el7_6.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816864" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16864</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16864" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16864" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16864" ref_url="https://www.suse.com/security/cve/CVE-2018-16864" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0054-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0054-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005328.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005054.html" source="SUSE-SU"/>
		<reference ref_id="SYSTEM-DOWN-BLOG" ref_url="https://www.suse.com/c/stack-clashing-systemd-aka-system-down/" source="SUSE-SU"/>
		<reference ref_id="TID000019368" ref_url="https://www.suse.com/support/kb/doc/?id=000019368" source="SUSE-SU"/>
		<reference ref_id="TID7023611" ref_url="https://www.suse.com/support/kb/doc/?id=7023611" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0097-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FUEAX66J6UOEYRBZGH3WL34NYPZVPEVW/#FUEAX66J6UOEYRBZGH3WL34NYPZVPEVW" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0098-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KDEM25CHZWMRDGDYZ23LBZGMPWA63D2Y/#KDEM25CHZWMRDGDYZ23LBZGMPWA63D2Y" source="SUSE-SU"/>
    <description>
    An allocation of memory without limits, that could result in the stack clashing with another memory region, was discovered in systemd-journald when a program with long command line arguments calls syslog. A local attacker may use this flaw to crash systemd-journald or escalate his privileges. Versions through v240 are vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16864/">CVE-2018-16864 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16864">CVE-2018-16864 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1108912">SUSE bug 1108912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120323">SUSE bug 1120323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122265">SUSE bug 1122265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188063">SUSE bug 1188063</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825453" comment="libgudev1-219-62.el7_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825454" comment="libgudev1-devel-219-62.el7_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825455" comment="systemd-219-62.el7_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825456" comment="systemd-devel-219-62.el7_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825457" comment="systemd-journal-gateway-219-62.el7_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825458" comment="systemd-libs-219-62.el7_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825459" comment="systemd-networkd-219-62.el7_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825460" comment="systemd-python-219-62.el7_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825461" comment="systemd-resolved-219-62.el7_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825462" comment="systemd-sysv-219-62.el7_6.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816865" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16865</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16865" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16865" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16865" ref_url="https://www.suse.com/security/cve/CVE-2018-16865" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0054-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0054-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005328.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005054.html" source="SUSE-SU"/>
		<reference ref_id="SYSTEM-DOWN-BLOG" ref_url="https://www.suse.com/c/stack-clashing-systemd-aka-system-down/" source="SUSE-SU"/>
		<reference ref_id="TID000019368" ref_url="https://www.suse.com/support/kb/doc/?id=000019368" source="SUSE-SU"/>
		<reference ref_id="TID7023611" ref_url="https://www.suse.com/support/kb/doc/?id=7023611" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0097-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FUEAX66J6UOEYRBZGH3WL34NYPZVPEVW/#FUEAX66J6UOEYRBZGH3WL34NYPZVPEVW" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0098-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KDEM25CHZWMRDGDYZ23LBZGMPWA63D2Y/#KDEM25CHZWMRDGDYZ23LBZGMPWA63D2Y" source="SUSE-SU"/>
    <description>
    An allocation of memory without limits, that could result in the stack clashing with another memory region, was discovered in systemd-journald when many entries are sent to the journal socket. A local attacker, or a remote one if systemd-journal-remote is used, may use this flaw to crash systemd-journald or execute code with journald privileges. Versions through v240 are vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16865/">CVE-2018-16865 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16865">CVE-2018-16865 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1108912">SUSE bug 1108912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120323">SUSE bug 1120323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122265">SUSE bug 1122265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188063">SUSE bug 1188063</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825453" comment="libgudev1-219-62.el7_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825454" comment="libgudev1-devel-219-62.el7_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825455" comment="systemd-219-62.el7_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825456" comment="systemd-devel-219-62.el7_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825457" comment="systemd-journal-gateway-219-62.el7_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825458" comment="systemd-libs-219-62.el7_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825459" comment="systemd-networkd-219-62.el7_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825460" comment="systemd-python-219-62.el7_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825461" comment="systemd-resolved-219-62.el7_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825462" comment="systemd-sysv-219-62.el7_6.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816866" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16866</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16866" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16866" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16866" ref_url="https://www.suse.com/security/cve/CVE-2018-16866" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005054.html" source="SUSE-SU"/>
		<reference ref_id="TID000019368" ref_url="https://www.suse.com/support/kb/doc/?id=000019368" source="SUSE-SU"/>
		<reference ref_id="TID7023611" ref_url="https://www.suse.com/support/kb/doc/?id=7023611" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0097-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FUEAX66J6UOEYRBZGH3WL34NYPZVPEVW/#FUEAX66J6UOEYRBZGH3WL34NYPZVPEVW" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0098-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KDEM25CHZWMRDGDYZ23LBZGMPWA63D2Y/#KDEM25CHZWMRDGDYZ23LBZGMPWA63D2Y" source="SUSE-SU"/>
    <description>
    An out of bounds read was discovered in systemd-journald in the way it parses log messages that terminate with a colon ':'. A local attacker can use this flaw to disclose process memory data. Versions from v221 to v239 are vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16866/">CVE-2018-16866 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16866">CVE-2018-16866 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1108912">SUSE bug 1108912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120323">SUSE bug 1120323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122265">SUSE bug 1122265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126183">SUSE bug 1126183</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826149" comment="libgudev1-219-67.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826150" comment="libgudev1-devel-219-67.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826151" comment="systemd-219-67.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826152" comment="systemd-devel-219-67.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826153" comment="systemd-journal-gateway-219-67.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826154" comment="systemd-libs-219-67.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826155" comment="systemd-networkd-219-67.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826156" comment="systemd-python-219-67.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826157" comment="systemd-resolved-219-67.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826158" comment="systemd-sysv-219-67.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816871" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16871</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16871" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16871" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16871" ref_url="https://www.suse.com/security/cve/CVE-2018-16871" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1851-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20191851-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006225.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006236.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1716-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HJXAHNWJ4IAQN4V6E2PEXAAFMQPYBBPT/#HJXAHNWJ4IAQN4V6E2PEXAAFMQPYBBPT" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1757-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PJTYGHQOYDY2SFDAAFYO3E3URRCWKEUQ/#PJTYGHQOYDY2SFDAAFYO3E3URRCWKEUQ" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel's NFS implementation, all versions 3.x and all versions 4.x up to 4.20. An attacker, who is able to mount an exported NFS filesystem, is able to trigger a null pointer dereference by using an invalid NFS sequence. This can panic the machine and deny access to the NFS server. Any outstanding disk writes to the NFS server will be lost.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16871/">CVE-2018-16871 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16871">CVE-2018-16871 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1137103">SUSE bug 1137103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156320">SUSE bug 1156320</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825932" comment="bpftool-3.10.0-957.27.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825933" comment="kernel-3.10.0-957.27.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825934" comment="kernel-abi-whitelists-3.10.0-957.27.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825935" comment="kernel-debug-3.10.0-957.27.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825938" comment="kernel-doc-3.10.0-957.27.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825939" comment="kernel-headers-3.10.0-957.27.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825940" comment="kernel-tools-3.10.0-957.27.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825941" comment="kernel-tools-libs-3.10.0-957.27.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825943" comment="perf-3.10.0-957.27.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825944" comment="python-perf-3.10.0-957.27.2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816881" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16881</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16881" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16881" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16881" ref_url="https://www.suse.com/security/cve/CVE-2018-16881" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0209-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190209-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0154-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ELFGKXOC5S3USLKN53TV3Z6SCB2G2ABA/#ELFGKXOC5S3USLKN53TV3Z6SCB2G2ABA" source="SUSE-SU"/>
    <description>
    A denial of service vulnerability was found in rsyslog in the imptcp module. An attacker could send a specially crafted message to the imptcp socket, which would cause rsyslog to crash. Versions before 8.27.0 are vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16881/">CVE-2018-16881 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16881">CVE-2018-16881 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1123164">SUSE bug 1123164</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826191" comment="rsyslog-8.24.0-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826192" comment="rsyslog-crypto-8.24.0-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826193" comment="rsyslog-doc-8.24.0-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826194" comment="rsyslog-elasticsearch-8.24.0-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826195" comment="rsyslog-gnutls-8.24.0-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826196" comment="rsyslog-gssapi-8.24.0-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826197" comment="rsyslog-kafka-8.24.0-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826198" comment="rsyslog-libdbi-8.24.0-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826199" comment="rsyslog-mmaudit-8.24.0-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826200" comment="rsyslog-mmjsonparse-8.24.0-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826201" comment="rsyslog-mmkubernetes-8.24.0-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826202" comment="rsyslog-mmnormalize-8.24.0-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826203" comment="rsyslog-mmsnmptrapd-8.24.0-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826204" comment="rsyslog-mysql-8.24.0-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826205" comment="rsyslog-pgsql-8.24.0-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826206" comment="rsyslog-relp-8.24.0-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826207" comment="rsyslog-snmp-8.24.0-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826208" comment="rsyslog-udpspoof-8.24.0-38.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816884" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16884</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16884" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16884" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16884" ref_url="https://www.suse.com/security/cve/CVE-2018-16884" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0356-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005476.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0065-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HZOAR52RMMAMPTGY2TTSFPEKREAVGPNY/#HZOAR52RMMAMPTGY2TTSFPEKREAVGPNY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0140-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YC36SIOXVJQS57WNCR7J2V2OWLPWEMTW/#YC36SIOXVJQS57WNCR7J2V2OWLPWEMTW" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel's NFS41+ subsystem. NFS41+ shares mounted in different network namespaces at the same time can make bc_svc_process() use wrong back-channel IDs and cause a use-after-free vulnerability. Thus a malicious container user can cause a host kernel memory corruption and a system panic. Due to the nature of the flaw, privilege escalation cannot be fully ruled out.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16884/">CVE-2018-16884 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16884">CVE-2018-16884 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1119946">SUSE bug 1119946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119947">SUSE bug 1119947</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825932" comment="bpftool-3.10.0-957.27.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825933" comment="kernel-3.10.0-957.27.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825934" comment="kernel-abi-whitelists-3.10.0-957.27.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825935" comment="kernel-debug-3.10.0-957.27.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825938" comment="kernel-doc-3.10.0-957.27.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825939" comment="kernel-headers-3.10.0-957.27.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825940" comment="kernel-tools-3.10.0-957.27.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825941" comment="kernel-tools-libs-3.10.0-957.27.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825943" comment="perf-3.10.0-957.27.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825944" comment="python-perf-3.10.0-957.27.2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816885" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16885</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16885" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16885" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16885" ref_url="https://www.suse.com/security/cve/CVE-2018-16885" source="SUSE CVE"/>
    <description>
    A flaw was found in the Linux kernel that allows the userspace to call memcpy_fromiovecend() and similar functions with a zero offset and buffer length which causes the read beyond the buffer boundaries, in certain cases causing a memory access fault and a system halt by accessing invalid memory address. This issue only affects kernel version 3.10.x as shipped with Red Hat Enterprise Linux 7.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-16885/">CVE-2018-16885 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16885">CVE-2018-16885 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1120258">SUSE bug 1120258</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826007" comment="bpftool-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826008" comment="kernel-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826009" comment="kernel-abi-whitelists-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826010" comment="kernel-debug-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826013" comment="kernel-doc-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826014" comment="kernel-headers-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826015" comment="kernel-tools-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826016" comment="kernel-tools-libs-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826018" comment="perf-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826019" comment="python-perf-3.10.0-1062.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816888" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16888</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16888" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16888" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16888" ref_url="https://www.suse.com/security/cve/CVE-2018-16888" source="SUSE CVE"/>
    <description>
    It was discovered systemd does not correctly check the content of PIDFile files before using it to kill processes. When a service is run from an unprivileged user (e.g. User field set in the service file), a local attacker who is able to write to the PIDFile of the mentioned service may use this flaw to trick systemd into killing other services and/or privileged processes. Versions before v237 are vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16888/">CVE-2018-16888 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16888">CVE-2018-16888 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1065951">SUSE bug 1065951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120625">SUSE bug 1120625</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826149" comment="libgudev1-219-67.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826150" comment="libgudev1-devel-219-67.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826151" comment="systemd-219-67.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826152" comment="systemd-devel-219-67.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826153" comment="systemd-journal-gateway-219-67.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826154" comment="systemd-libs-219-67.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826155" comment="systemd-networkd-219-67.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826156" comment="systemd-python-219-67.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826157" comment="systemd-resolved-219-67.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826158" comment="systemd-sysv-219-67.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201817095" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-17095</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-17095" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17095" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-17095" ref_url="https://www.suse.com/security/cve/CVE-2018-17095" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3588-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004942.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3537-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/35KO6HI42QO7Z7ZKZ3WSMTLBOQ2ZFL5O/#35KO6HI42QO7Z7ZKZ3WSMTLBOQ2ZFL5O" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3694-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EAVALJNVZVIIZ35QM7YTTZY6CEYO2FPY/#EAVALJNVZVIIZ35QM7YTTZY6CEYO2FPY" source="SUSE-SU"/>
    <description>
    An issue has been discovered in mpruett Audio File Library (aka audiofile) 0.3.6, 0.3.5, 0.3.4, 0.3.3, 0.3.2, 0.3.1, 0.3.0. A heap-based buffer overflow in Expand3To4Module::run has occurred when running sfconvert.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-17095/">CVE-2018-17095 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17095">CVE-2018-17095 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1111586">SUSE bug 1111586</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828236" comment="audiofile-0.3.6-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828237" comment="audiofile-devel-0.3.6-9.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201817100" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-17100</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-17100" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17100" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-17100" ref_url="https://www.suse.com/security/cve/CVE-2018-17100" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004765.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004784.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3370-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CYUUEPG22TSAWJA2E3MTYDIOYMBOGTFO/#CYUUEPG22TSAWJA2E3MTYDIOYMBOGTFO" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3371-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OPK2HIGZNAT4XBMBVLJUQHUQNP466RN4/#OPK2HIGZNAT4XBMBVLJUQHUQNP466RN4" source="SUSE-SU"/>
    <description>
    An issue was discovered in LibTIFF 4.0.9. There is a int32 overflow in multiply_ms in tools/ppm2tiff.c, which can cause a denial of service (crash) or possibly have unspecified other impact via a crafted image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17100/">CVE-2018-17100 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17100">CVE-2018-17100 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1108637">SUSE bug 1108637</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826088" comment="libtiff-4.0.3-32.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826089" comment="libtiff-devel-4.0.3-32.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826090" comment="libtiff-static-4.0.3-32.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826091" comment="libtiff-tools-4.0.3-32.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201817101" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-17101</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-17101" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17101" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-17101" ref_url="https://www.suse.com/security/cve/CVE-2018-17101" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004765.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004784.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3370-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CYUUEPG22TSAWJA2E3MTYDIOYMBOGTFO/#CYUUEPG22TSAWJA2E3MTYDIOYMBOGTFO" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3371-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OPK2HIGZNAT4XBMBVLJUQHUQNP466RN4/#OPK2HIGZNAT4XBMBVLJUQHUQNP466RN4" source="SUSE-SU"/>
    <description>
    An issue was discovered in LibTIFF 4.0.9. There are two out-of-bounds writes in cpTags in tools/tiff2bw.c and tools/pal2rgb.c, which can cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-17101/">CVE-2018-17101 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17101">CVE-2018-17101 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1108627">SUSE bug 1108627</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826088" comment="libtiff-4.0.3-32.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826089" comment="libtiff-devel-4.0.3-32.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826090" comment="libtiff-static-4.0.3-32.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826091" comment="libtiff-tools-4.0.3-32.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201817183" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-17183</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-17183" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17183" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-17183" ref_url="https://www.suse.com/security/cve/CVE-2018-17183" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2975-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2975-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4090-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005397.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3036-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O62FBJOZYB7M7RACN47LPZMGLKILJJ4M/#O62FBJOZYB7M7RACN47LPZMGLKILJJ4M" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3038-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RZO3C5RVQVCQ7F4PEFN7IKCUAQU2JSUU/#RZO3C5RVQVCQ7F4PEFN7IKCUAQU2JSUU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4138-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IKPDTPFKZMWYPOQQ2SEC3KLVSQTZPWTM/#IKPDTPFKZMWYPOQQ2SEC3KLVSQTZPWTM" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4140-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FEQIV6F4O3W6JCQITIJZSZBPFO5SVG6O/#FEQIV6F4O3W6JCQITIJZSZBPFO5SVG6O" source="SUSE-SU"/>
    <description>
    Artifex Ghostscript before 9.25 allowed a user-writable error exception table, which could be used by remote attackers able to supply crafted PostScript to potentially overwrite or replace error handlers to inject code.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-25"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17183/">CVE-2018-17183 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17183">CVE-2018-17183 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1108027">SUSE bug 1108027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109105">SUSE bug 1109105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111479">SUSE bug 1111479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111480">SUSE bug 1111480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112229">SUSE bug 1112229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117022">SUSE bug 1117022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117331">SUSE bug 1117331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118455">SUSE bug 1118455</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825447" comment="ghostscript-9.07-31.el7_6.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825448" comment="ghostscript-cups-9.07-31.el7_6.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825449" comment="ghostscript-devel-9.07-31.el7_6.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825450" comment="ghostscript-doc-9.07-31.el7_6.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825451" comment="ghostscript-gtk-9.07-31.el7_6.6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201817199" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-17199</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-17199" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17199" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-17199" ref_url="https://www.suse.com/security/cve/CVE-2018-17199" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0888-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005303.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0296-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AROOBQ53ZDZ2TV5OILN4IH6WGBD27OJ6/#AROOBQ53ZDZ2TV5OILN4IH6WGBD27OJ6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0305-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/34DA5LH5SZ6A7HIAEAFTWETZONM4ZGF5/#34DA5LH5SZ6A7HIAEAFTWETZONM4ZGF5" source="SUSE-SU"/>
    <description>
    In Apache HTTP Server 2.4 release 2.4.37 and prior, mod_session checks the session expiry time before decoding the session. This causes session expiry time to be ignored for mod_session_cookie sessions since the expiry time is loaded when the session is decoded.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17199/">CVE-2018-17199 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17199">CVE-2018-17199 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1122838">SUSE bug 1122838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122839">SUSE bug 1122839</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827796" comment="httpd-2.4.6-93.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827797" comment="httpd-devel-2.4.6-93.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827798" comment="httpd-manual-2.4.6-93.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827799" comment="httpd-tools-2.4.6-93.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827800" comment="mod_ldap-2.4.6-93.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827801" comment="mod_proxy_html-2.4.6-93.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827802" comment="mod_session-2.4.6-93.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827803" comment="mod_ssl-2.4.6-93.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201817282" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-17282</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-17282" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17282" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-17282" ref_url="https://www.suse.com/security/cve/CVE-2018-17282" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006676.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0482-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U7X32HSPSOKHILGP4IPOOWMROAKSPGIY/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Exiv2 v0.26. The function Exiv2::DataValue::copy in value.cpp has a NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17282/">CVE-2018-17282 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17282">CVE-2018-17282 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1109299">SUSE bug 1109299</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826187" comment="exiv2-0.27.0-2.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826188" comment="exiv2-devel-0.27.0-2.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826189" comment="exiv2-doc-0.27.0-2.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826190" comment="exiv2-libs-0.27.0-2.el7_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201817336" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-17336</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-17336" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17336" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-17336" ref_url="https://www.suse.com/security/cve/CVE-2018-17336" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004755.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3372-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IDDMYVY5KEL5Q7SERN3IMOOME3NBTT2K/#IDDMYVY5KEL5Q7SERN3IMOOME3NBTT2K" source="SUSE-SU"/>
    <description>
    UDisks 2.8.0 has a format string vulnerability in udisks_log in udiskslogging.c, allowing attackers to obtain sensitive information (stack contents), cause a denial of service (memory corruption), or possibly have unspecified other impact via a malformed filesystem label, as demonstrated by %d or %n substrings.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-17336/">CVE-2018-17336 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17336">CVE-2018-17336 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1109406">SUSE bug 1109406</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826447" comment="libudisks2-2.7.3-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826448" comment="libudisks2-devel-2.7.3-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826449" comment="udisks2-2.7.3-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826450" comment="udisks2-iscsi-2.7.3-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826451" comment="udisks2-lsm-2.7.3-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826452" comment="udisks2-lvm2-2.7.3-9.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201817407" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-17407</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-17407" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17407" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-17407" ref_url="https://www.suse.com/security/cve/CVE-2018-17407" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3033-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3033-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004669.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2998-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WN236DQVDPENPWLAO4C6F3WWG4CVU73I/#WN236DQVDPENPWLAO4C6F3WWG4CVU73I" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3213-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7DVQAUMVZ5HMYTMMHOGKLOZXNNHIIOWW/#7DVQAUMVZ5HMYTMMHOGKLOZXNNHIIOWW" source="SUSE-SU"/>
    <description>
    An issue was discovered in t1_check_unusual_charstring functions in writet1.c files in TeX Live before 2018-09-21. A buffer overflow in the handling of Type 1 fonts allows arbitrary code execution when a malicious font is loaded by one of the vulnerable tools: pdflatex, pdftex, dvips, or luatex.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17407/">CVE-2018-17407 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17407">CVE-2018-17407 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1109673">SUSE bug 1109673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125938">SUSE bug 1125938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827092" comment="texlive-2012-45.20130427_r30134.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827093" comment="texlive-adjustbox-svn26555.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827094" comment="texlive-adjustbox-doc-svn26555.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827095" comment="texlive-ae-svn15878.1.4-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827096" comment="texlive-ae-doc-svn15878.1.4-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827097" comment="texlive-algorithms-svn15878.0.1-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827098" comment="texlive-algorithms-doc-svn15878.0.1-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827099" comment="texlive-amscls-svn29207.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827100" comment="texlive-amscls-doc-svn29207.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827101" comment="texlive-amsfonts-svn29208.3.04-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827102" comment="texlive-amsfonts-doc-svn29208.3.04-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827103" comment="texlive-amsmath-svn29327.2.14-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827104" comment="texlive-amsmath-doc-svn29327.2.14-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827105" comment="texlive-anysize-svn15878.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827106" comment="texlive-anysize-doc-svn15878.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827107" comment="texlive-appendix-svn15878.1.2b-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827108" comment="texlive-appendix-doc-svn15878.1.2b-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827109" comment="texlive-arabxetex-svn17470.v1.1.4-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827110" comment="texlive-arabxetex-doc-svn17470.v1.1.4-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827111" comment="texlive-arphic-svn15878.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827112" comment="texlive-arphic-doc-svn15878.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827113" comment="texlive-attachfile-svn21866.v1.5b-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827114" comment="texlive-attachfile-doc-svn21866.v1.5b-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827115" comment="texlive-avantgar-svn28614.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827116" comment="texlive-babel-svn24756.3.8m-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827117" comment="texlive-babel-doc-svn24756.3.8m-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827118" comment="texlive-babelbib-svn25245.1.31-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827119" comment="texlive-babelbib-doc-svn25245.1.31-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827120" comment="texlive-base-2012-45.20130427_r30134.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827121" comment="texlive-beamer-svn29349.3.26-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827122" comment="texlive-beamer-doc-svn29349.3.26-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827123" comment="texlive-bera-svn20031.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827124" comment="texlive-bera-doc-svn20031.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827125" comment="texlive-beton-svn15878.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827126" comment="texlive-beton-doc-svn15878.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827127" comment="texlive-bibtex-svn26689.0.99d-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827128" comment="texlive-bibtex-bin-svn26509.0-45.20130427_r30134.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827129" comment="texlive-bibtex-doc-svn26689.0.99d-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827130" comment="texlive-bibtopic-svn15878.1.1a-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827131" comment="texlive-bibtopic-doc-svn15878.1.1a-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827132" comment="texlive-bidi-svn29650.12.2-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827133" comment="texlive-bidi-doc-svn29650.12.2-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827134" comment="texlive-bigfoot-svn15878.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827135" comment="texlive-bigfoot-doc-svn15878.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827136" comment="texlive-bookman-svn28614.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827137" comment="texlive-booktabs-svn15878.1.61803-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827138" comment="texlive-booktabs-doc-svn15878.1.61803-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827139" comment="texlive-breakurl-svn15878.1.30-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827140" comment="texlive-breakurl-doc-svn15878.1.30-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827141" comment="texlive-caption-svn29026.3.3__2013_02_03_-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827142" comment="texlive-caption-doc-svn29026.3.3__2013_02_03_-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827143" comment="texlive-carlisle-svn18258.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827144" comment="texlive-carlisle-doc-svn18258.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827145" comment="texlive-changebar-svn29349.3.5c-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827146" comment="texlive-changebar-doc-svn29349.3.5c-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827147" comment="texlive-changepage-svn15878.1.0c-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827148" comment="texlive-changepage-doc-svn15878.1.0c-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827149" comment="texlive-charter-svn15878.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827150" comment="texlive-charter-doc-svn15878.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827151" comment="texlive-chngcntr-svn17157.1.0a-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827152" comment="texlive-chngcntr-doc-svn17157.1.0a-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827153" comment="texlive-cite-svn19955.5.3-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827154" comment="texlive-cite-doc-svn19955.5.3-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827155" comment="texlive-cjk-svn26296.4.8.3-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827156" comment="texlive-cjk-doc-svn26296.4.8.3-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827157" comment="texlive-cm-svn29581.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827158" comment="texlive-cm-doc-svn29581.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827159" comment="texlive-cm-lgc-svn28250.0.5-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827160" comment="texlive-cm-lgc-doc-svn28250.0.5-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827161" comment="texlive-cm-super-svn15878.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827162" comment="texlive-cm-super-doc-svn15878.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827163" comment="texlive-cmap-svn26568.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827164" comment="texlive-cmap-doc-svn26568.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827165" comment="texlive-cmextra-svn14075.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827166" comment="texlive-cns-svn15878.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827167" comment="texlive-cns-doc-svn15878.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827168" comment="texlive-collectbox-svn26557.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827169" comment="texlive-collectbox-doc-svn26557.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827170" comment="texlive-collection-basic-svn26314.0-45.20130427_r30134.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827171" comment="texlive-collection-documentation-base-svn17091.0-45.20130427_r30134.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827172" comment="texlive-collection-fontsrecommended-svn28082.0-45.20130427_r30134.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827173" comment="texlive-collection-htmlxml-svn28251.0-45.20130427_r30134.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827174" comment="texlive-collection-latex-svn25030.0-45.20130427_r30134.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827175" comment="texlive-collection-latexrecommended-svn25795.0-45.20130427_r30134.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827176" comment="texlive-collection-xetex-svn29634.0-45.20130427_r30134.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827177" comment="texlive-colortbl-svn25394.v1.0a-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827178" comment="texlive-colortbl-doc-svn25394.v1.0a-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827179" comment="texlive-courier-svn28614.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827180" comment="texlive-crop-svn15878.1.5-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827181" comment="texlive-crop-doc-svn15878.1.5-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827182" comment="texlive-csquotes-svn24393.5.1d-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827183" comment="texlive-csquotes-doc-svn24393.5.1d-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827184" comment="texlive-ctable-svn26694.1.23-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827185" comment="texlive-ctable-doc-svn26694.1.23-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827186" comment="texlive-currfile-svn29012.0.7b-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827187" comment="texlive-currfile-doc-svn29012.0.7b-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827188" comment="texlive-datetime-svn19834.2.58-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827189" comment="texlive-datetime-doc-svn19834.2.58-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827190" comment="texlive-dvipdfm-svn26689.0.13.2d-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827191" comment="texlive-dvipdfm-bin-svn13663.0-45.20130427_r30134.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827192" comment="texlive-dvipdfm-doc-svn26689.0.13.2d-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827193" comment="texlive-dvipdfmx-svn26765.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827194" comment="texlive-dvipdfmx-bin-svn26509.0-45.20130427_r30134.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827195" comment="texlive-dvipdfmx-def-svn15878.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827196" comment="texlive-dvipdfmx-doc-svn26765.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827197" comment="texlive-dvipng-svn26689.1.14-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827198" comment="texlive-dvipng-bin-svn26509.0-45.20130427_r30134.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827199" comment="texlive-dvipng-doc-svn26689.1.14-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827200" comment="texlive-dvips-svn29585.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827201" comment="texlive-dvips-bin-svn26509.0-45.20130427_r30134.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827202" comment="texlive-dvips-doc-svn29585.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827203" comment="texlive-ec-svn25033.1.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827204" comment="texlive-ec-doc-svn25033.1.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827205" comment="texlive-eepic-svn15878.1.1e-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827206" comment="texlive-eepic-doc-svn15878.1.1e-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827207" comment="texlive-enctex-svn28602.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827208" comment="texlive-enctex-doc-svn28602.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827209" comment="texlive-enumitem-svn24146.3.5.2-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827210" comment="texlive-enumitem-doc-svn24146.3.5.2-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827211" comment="texlive-epsf-svn21461.2.7.4-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827212" comment="texlive-epsf-doc-svn21461.2.7.4-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827213" comment="texlive-epstopdf-svn26577.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827214" comment="texlive-epstopdf-bin-svn18336.0-45.20130427_r30134.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827215" comment="texlive-epstopdf-doc-svn26577.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827216" comment="texlive-eso-pic-svn21515.2.0c-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827217" comment="texlive-eso-pic-doc-svn21515.2.0c-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827218" comment="texlive-etex-svn22198.2.1-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827219" comment="texlive-etex-doc-svn22198.2.1-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827220" comment="texlive-etex-pkg-svn15878.2.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827221" comment="texlive-etex-pkg-doc-svn15878.2.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827222" comment="texlive-etoolbox-svn20922.2.1-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827223" comment="texlive-etoolbox-doc-svn20922.2.1-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827224" comment="texlive-euenc-svn19795.0.1h-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827225" comment="texlive-euenc-doc-svn19795.0.1h-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827226" comment="texlive-euler-svn17261.2.5-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827227" comment="texlive-euler-doc-svn17261.2.5-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827228" comment="texlive-euro-svn22191.1.1-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827229" comment="texlive-euro-doc-svn22191.1.1-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827230" comment="texlive-eurosym-svn17265.1.4_subrfix-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827231" comment="texlive-eurosym-doc-svn17265.1.4_subrfix-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827232" comment="texlive-extsizes-svn17263.1.4a-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827233" comment="texlive-extsizes-doc-svn17263.1.4a-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827234" comment="texlive-fancybox-svn18304.1.4-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827235" comment="texlive-fancybox-doc-svn18304.1.4-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827236" comment="texlive-fancyhdr-svn15878.3.1-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827237" comment="texlive-fancyhdr-doc-svn15878.3.1-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827238" comment="texlive-fancyref-svn15878.0.9c-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827239" comment="texlive-fancyref-doc-svn15878.0.9c-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827240" comment="texlive-fancyvrb-svn18492.2.8-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827241" comment="texlive-fancyvrb-doc-svn18492.2.8-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827242" comment="texlive-filecontents-svn24250.1.3-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827243" comment="texlive-filecontents-doc-svn24250.1.3-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827244" comment="texlive-filehook-svn24280.0.5d-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827245" comment="texlive-filehook-doc-svn24280.0.5d-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827246" comment="texlive-fix2col-svn17133.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827247" comment="texlive-fix2col-doc-svn17133.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827248" comment="texlive-fixlatvian-svn21631.1a-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827249" comment="texlive-fixlatvian-doc-svn21631.1a-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827250" comment="texlive-float-svn15878.1.3d-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827251" comment="texlive-float-doc-svn15878.1.3d-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827252" comment="texlive-fmtcount-svn28068.2.02-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827253" comment="texlive-fmtcount-doc-svn28068.2.02-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827254" comment="texlive-fncychap-svn20710.v1.34-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827255" comment="texlive-fncychap-doc-svn20710.v1.34-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827256" comment="texlive-fontbook-svn23608.0.2-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827257" comment="texlive-fontbook-doc-svn23608.0.2-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827258" comment="texlive-fontspec-svn29412.v2.3a-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827259" comment="texlive-fontspec-doc-svn29412.v2.3a-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827260" comment="texlive-fontware-svn26689.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827261" comment="texlive-fontware-bin-svn26509.0-45.20130427_r30134.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827262" comment="texlive-fontwrap-svn15878.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827263" comment="texlive-fontwrap-doc-svn15878.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827264" comment="texlive-footmisc-svn23330.5.5b-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827265" comment="texlive-footmisc-doc-svn23330.5.5b-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827266" comment="texlive-fp-svn15878.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827267" comment="texlive-fp-doc-svn15878.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827268" comment="texlive-fpl-svn15878.1.002-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827269" comment="texlive-fpl-doc-svn15878.1.002-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827270" comment="texlive-framed-svn26789.0.96-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827271" comment="texlive-framed-doc-svn26789.0.96-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827272" comment="texlive-garuda-c90-svn15878.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827273" comment="texlive-geometry-svn19716.5.6-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827274" comment="texlive-geometry-doc-svn19716.5.6-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827275" comment="texlive-glyphlist-svn28576.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827276" comment="texlive-graphics-svn25405.1.0o-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827277" comment="texlive-graphics-doc-svn25405.1.0o-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827278" comment="texlive-gsftopk-svn26689.1.19.2-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827279" comment="texlive-gsftopk-bin-svn26509.0-45.20130427_r30134.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827280" comment="texlive-helvetic-svn28614.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827281" comment="texlive-hyperref-svn28213.6.83m-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827282" comment="texlive-hyperref-doc-svn28213.6.83m-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827283" comment="texlive-hyph-utf8-svn29641.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827284" comment="texlive-hyph-utf8-doc-svn29641.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827285" comment="texlive-hyphen-base-svn29197.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827286" comment="texlive-hyphenat-svn15878.2.3c-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827287" comment="texlive-hyphenat-doc-svn15878.2.3c-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827288" comment="texlive-ifetex-svn24853.1.2-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827289" comment="texlive-ifetex-doc-svn24853.1.2-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827290" comment="texlive-ifluatex-svn26725.1.3-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827291" comment="texlive-ifluatex-doc-svn26725.1.3-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827292" comment="texlive-ifmtarg-svn19363.1.2a-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827293" comment="texlive-ifmtarg-doc-svn19363.1.2a-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827294" comment="texlive-ifoddpage-svn23979.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827295" comment="texlive-ifoddpage-doc-svn23979.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827296" comment="texlive-iftex-svn29654.0.2-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827297" comment="texlive-iftex-doc-svn29654.0.2-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827298" comment="texlive-ifxetex-svn19685.0.5-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827299" comment="texlive-ifxetex-doc-svn19685.0.5-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827300" comment="texlive-index-svn24099.4.1beta-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827301" comment="texlive-index-doc-svn24099.4.1beta-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827302" comment="texlive-jadetex-svn23409.3.13-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827303" comment="texlive-jadetex-bin-svn3006.0-45.20130427_r30134.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827304" comment="texlive-jadetex-doc-svn23409.3.13-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827305" comment="texlive-jknapltx-svn19440.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827306" comment="texlive-jknapltx-doc-svn19440.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827307" comment="texlive-kastrup-svn15878.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827308" comment="texlive-kastrup-doc-svn15878.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827309" comment="texlive-kerkis-svn15878.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827310" comment="texlive-kerkis-doc-svn15878.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827311" comment="texlive-koma-script-svn27255.3.11b-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827312" comment="texlive-kpathsea-svn28792.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827313" comment="texlive-kpathsea-bin-svn27347.0-45.20130427_r30134.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827314" comment="texlive-kpathsea-doc-svn28792.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827315" comment="texlive-kpathsea-lib-2012-45.20130427_r30134.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827316" comment="texlive-kpathsea-lib-devel-2012-45.20130427_r30134.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827317" comment="texlive-l3experimental-svn29361.SVN_4467-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827318" comment="texlive-l3experimental-doc-svn29361.SVN_4467-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827319" comment="texlive-l3kernel-svn29409.SVN_4469-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827320" comment="texlive-l3kernel-doc-svn29409.SVN_4469-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827321" comment="texlive-l3packages-svn29361.SVN_4467-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827322" comment="texlive-l3packages-doc-svn29361.SVN_4467-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827323" comment="texlive-lastpage-svn28985.1.2l-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827324" comment="texlive-lastpage-doc-svn28985.1.2l-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827325" comment="texlive-latex-svn27907.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827326" comment="texlive-latex-bin-svn26689.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827327" comment="texlive-latex-bin-bin-svn14050.0-45.20130427_r30134.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827328" comment="texlive-latex-doc-svn27907.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827329" comment="texlive-latex-fonts-svn28888.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827330" comment="texlive-latex-fonts-doc-svn28888.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827331" comment="texlive-latexconfig-svn28991.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827332" comment="texlive-lettrine-svn29391.1.64-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827333" comment="texlive-lettrine-doc-svn29391.1.64-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827334" comment="texlive-listings-svn15878.1.4-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827335" comment="texlive-listings-doc-svn15878.1.4-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827336" comment="texlive-lm-svn28119.2.004-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827337" comment="texlive-lm-doc-svn28119.2.004-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827338" comment="texlive-lm-math-svn29044.1.958-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827339" comment="texlive-lm-math-doc-svn29044.1.958-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827340" comment="texlive-ltxmisc-svn21927.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827341" comment="texlive-lua-alt-getopt-svn29349.0.7.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827342" comment="texlive-lua-alt-getopt-doc-svn29349.0.7.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827343" comment="texlive-lualatex-math-svn29346.1.2-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827344" comment="texlive-lualatex-math-doc-svn29346.1.2-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827345" comment="texlive-luaotfload-svn26718.1.26-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827346" comment="texlive-luaotfload-bin-svn18579.0-45.20130427_r30134.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827347" comment="texlive-luaotfload-doc-svn26718.1.26-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827348" comment="texlive-luatex-svn26689.0.70.1-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827349" comment="texlive-luatex-bin-svn26912.0-45.20130427_r30134.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827350" comment="texlive-luatex-doc-svn26689.0.70.1-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827351" comment="texlive-luatexbase-svn22560.0.31-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827352" comment="texlive-luatexbase-doc-svn22560.0.31-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827353" comment="texlive-makecmds-svn15878.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827354" comment="texlive-makecmds-doc-svn15878.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827355" comment="texlive-makeindex-svn26689.2.12-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827356" comment="texlive-makeindex-bin-svn26509.0-45.20130427_r30134.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827357" comment="texlive-makeindex-doc-svn26689.2.12-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827358" comment="texlive-marginnote-svn25880.v1.1i-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827359" comment="texlive-marginnote-doc-svn25880.v1.1i-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827360" comment="texlive-marvosym-svn29349.2.2a-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827361" comment="texlive-marvosym-doc-svn29349.2.2a-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827362" comment="texlive-mathpazo-svn15878.1.003-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827363" comment="texlive-mathpazo-doc-svn15878.1.003-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827364" comment="texlive-mathspec-svn15878.0.2-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827365" comment="texlive-mathspec-doc-svn15878.0.2-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827366" comment="texlive-mdwtools-svn15878.1.05.4-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827367" comment="texlive-mdwtools-doc-svn15878.1.05.4-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827368" comment="texlive-memoir-svn21638.3.6j_patch_6.0g-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827369" comment="texlive-memoir-doc-svn21638.3.6j_patch_6.0g-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827370" comment="texlive-metafont-svn26689.2.718281-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827371" comment="texlive-metafont-bin-svn26912.0-45.20130427_r30134.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827372" comment="texlive-metalogo-svn18611.0.12-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827373" comment="texlive-metalogo-doc-svn18611.0.12-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827374" comment="texlive-metapost-svn26689.1.212-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827375" comment="texlive-metapost-bin-svn26509.0-45.20130427_r30134.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827376" comment="texlive-metapost-doc-svn26689.1.212-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827377" comment="texlive-metapost-examples-doc-svn15878.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827378" comment="texlive-mflogo-svn17487.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827379" comment="texlive-mflogo-doc-svn17487.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827380" comment="texlive-mfnfss-svn19410.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827381" comment="texlive-mfnfss-doc-svn19410.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827382" comment="texlive-mfware-svn26689.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827383" comment="texlive-mfware-bin-svn26509.0-45.20130427_r30134.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827384" comment="texlive-mh-svn29420.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827385" comment="texlive-mh-doc-svn29420.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827386" comment="texlive-microtype-svn29392.2.5-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827387" comment="texlive-microtype-doc-svn29392.2.5-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827388" comment="texlive-misc-svn24955.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827389" comment="texlive-mnsymbol-svn18651.1.4-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827390" comment="texlive-mnsymbol-doc-svn18651.1.4-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827391" comment="texlive-mparhack-svn15878.1.4-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827392" comment="texlive-mparhack-doc-svn15878.1.4-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827393" comment="texlive-mptopdf-svn26689.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827394" comment="texlive-mptopdf-bin-svn18674.0-45.20130427_r30134.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827395" comment="texlive-ms-svn24467.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827396" comment="texlive-ms-doc-svn24467.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827397" comment="texlive-multido-svn18302.1.42-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827398" comment="texlive-multido-doc-svn18302.1.42-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827399" comment="texlive-multirow-svn17256.1.6-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827400" comment="texlive-multirow-doc-svn17256.1.6-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827401" comment="texlive-natbib-svn20668.8.31b-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827402" comment="texlive-natbib-doc-svn20668.8.31b-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827403" comment="texlive-ncctools-svn15878.3.5-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827404" comment="texlive-ncctools-doc-svn15878.3.5-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827405" comment="texlive-ncntrsbk-svn28614.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827406" comment="texlive-norasi-c90-svn15878.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827407" comment="texlive-ntgclass-svn15878.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827408" comment="texlive-ntgclass-doc-svn15878.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827409" comment="texlive-oberdiek-svn26725.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827410" comment="texlive-oberdiek-doc-svn26725.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827411" comment="texlive-overpic-svn19712.0.53-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827412" comment="texlive-overpic-doc-svn19712.0.53-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827413" comment="texlive-palatino-svn28614.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827414" comment="texlive-paralist-svn15878.2.3b-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827415" comment="texlive-paralist-doc-svn15878.2.3b-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827416" comment="texlive-parallel-svn15878.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827417" comment="texlive-parallel-doc-svn15878.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827418" comment="texlive-parskip-svn19963.2.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827419" comment="texlive-parskip-doc-svn19963.2.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827420" comment="texlive-passivetex-svn15878.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827421" comment="texlive-pdfpages-svn27574.0.4t-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827422" comment="texlive-pdfpages-doc-svn27574.0.4t-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827423" comment="texlive-pdftex-svn29585.1.40.11-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827424" comment="texlive-pdftex-bin-svn27321.0-45.20130427_r30134.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827425" comment="texlive-pdftex-def-svn22653.0.06d-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827426" comment="texlive-pdftex-doc-svn29585.1.40.11-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827427" comment="texlive-pgf-svn22614.2.10-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827428" comment="texlive-pgf-doc-svn22614.2.10-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827429" comment="texlive-philokalia-svn18651.1.1-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827430" comment="texlive-philokalia-doc-svn18651.1.1-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827431" comment="texlive-placeins-svn19848.2.2-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827432" comment="texlive-placeins-doc-svn19848.2.2-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827433" comment="texlive-plain-svn26647.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827434" comment="texlive-polyglossia-svn26163.v1.2.1-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827435" comment="texlive-polyglossia-doc-svn26163.v1.2.1-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827436" comment="texlive-powerdot-svn25656.1.4i-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827437" comment="texlive-powerdot-doc-svn25656.1.4i-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827438" comment="texlive-preprint-svn16085.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827439" comment="texlive-preprint-doc-svn16085.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827440" comment="texlive-psfrag-svn15878.3.04-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827441" comment="texlive-psfrag-doc-svn15878.3.04-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827442" comment="texlive-pslatex-svn16416.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827443" comment="texlive-psnfss-svn23394.9.2a-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827444" comment="texlive-psnfss-doc-svn23394.9.2a-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827445" comment="texlive-pspicture-svn15878.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827446" comment="texlive-pspicture-doc-svn15878.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827447" comment="texlive-pst-3d-svn17257.1.10-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827448" comment="texlive-pst-3d-doc-svn17257.1.10-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827449" comment="texlive-pst-blur-svn15878.2.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827450" comment="texlive-pst-blur-doc-svn15878.2.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827451" comment="texlive-pst-coil-svn24020.1.06-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827452" comment="texlive-pst-coil-doc-svn24020.1.06-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827453" comment="texlive-pst-eps-svn15878.1.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827454" comment="texlive-pst-eps-doc-svn15878.1.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827455" comment="texlive-pst-fill-svn15878.1.01-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827456" comment="texlive-pst-fill-doc-svn15878.1.01-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827457" comment="texlive-pst-grad-svn15878.1.06-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827458" comment="texlive-pst-grad-doc-svn15878.1.06-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827459" comment="texlive-pst-math-svn20176.0.61-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827460" comment="texlive-pst-math-doc-svn20176.0.61-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827461" comment="texlive-pst-node-svn27799.1.25-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827462" comment="texlive-pst-node-doc-svn27799.1.25-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827463" comment="texlive-pst-plot-svn28729.1.44-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827464" comment="texlive-pst-plot-doc-svn28729.1.44-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827465" comment="texlive-pst-slpe-svn24391.1.31-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827466" comment="texlive-pst-slpe-doc-svn24391.1.31-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827467" comment="texlive-pst-text-svn15878.1.00-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827468" comment="texlive-pst-text-doc-svn15878.1.00-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827469" comment="texlive-pst-tree-svn24142.1.12-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827470" comment="texlive-pst-tree-doc-svn24142.1.12-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827471" comment="texlive-pstricks-svn29678.2.39-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827472" comment="texlive-pstricks-add-svn28750.3.59-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827473" comment="texlive-pstricks-add-doc-svn28750.3.59-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827474" comment="texlive-pstricks-doc-svn29678.2.39-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827475" comment="texlive-ptext-svn28124.1-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827476" comment="texlive-ptext-doc-svn28124.1-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827477" comment="texlive-pxfonts-svn15878.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827478" comment="texlive-pxfonts-doc-svn15878.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827479" comment="texlive-qstest-svn15878.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827480" comment="texlive-qstest-doc-svn15878.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827481" comment="texlive-rcs-svn15878.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827482" comment="texlive-rcs-doc-svn15878.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827483" comment="texlive-realscripts-svn29423.0.3b-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827484" comment="texlive-realscripts-doc-svn29423.0.3b-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827485" comment="texlive-rotating-svn16832.2.16b-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827486" comment="texlive-rotating-doc-svn16832.2.16b-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827487" comment="texlive-rsfs-svn15878.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827488" comment="texlive-rsfs-doc-svn15878.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827489" comment="texlive-sansmath-svn17997.1.1-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827490" comment="texlive-sansmath-doc-svn17997.1.1-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827491" comment="texlive-sauerj-svn15878.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827492" comment="texlive-sauerj-doc-svn15878.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827493" comment="texlive-scheme-basic-svn25923.0-45.20130427_r30134.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827494" comment="texlive-section-svn20180.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827495" comment="texlive-section-doc-svn20180.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827496" comment="texlive-sectsty-svn15878.2.0.2-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827497" comment="texlive-sectsty-doc-svn15878.2.0.2-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827498" comment="texlive-seminar-svn18322.1.5-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827499" comment="texlive-seminar-doc-svn18322.1.5-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827500" comment="texlive-sepnum-svn20186.2.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827501" comment="texlive-sepnum-doc-svn20186.2.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827502" comment="texlive-setspace-svn24881.6.7a-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827503" comment="texlive-setspace-doc-svn24881.6.7a-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827504" comment="texlive-showexpl-svn27790.v0.3j-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827505" comment="texlive-showexpl-doc-svn27790.v0.3j-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827506" comment="texlive-soul-svn15878.2.4-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827507" comment="texlive-soul-doc-svn15878.2.4-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827508" comment="texlive-stmaryrd-svn22027.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827509" comment="texlive-stmaryrd-doc-svn22027.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827510" comment="texlive-subfig-svn15878.1.3-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827511" comment="texlive-subfig-doc-svn15878.1.3-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827512" comment="texlive-subfigure-svn15878.2.1.5-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827513" comment="texlive-subfigure-doc-svn15878.2.1.5-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827514" comment="texlive-svn-prov-svn18017.3.1862-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827515" comment="texlive-svn-prov-doc-svn18017.3.1862-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827516" comment="texlive-symbol-svn28614.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827517" comment="texlive-t2-svn29349.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827518" comment="texlive-t2-doc-svn29349.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827519" comment="texlive-tetex-svn29585.3.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827520" comment="texlive-tetex-bin-svn27344.0-45.20130427_r30134.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827521" comment="texlive-tetex-doc-svn29585.3.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827522" comment="texlive-tex-svn26689.3.1415926-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827523" comment="texlive-tex-bin-svn26912.0-45.20130427_r30134.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827524" comment="texlive-tex-gyre-svn18651.2.004-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827525" comment="texlive-tex-gyre-doc-svn18651.2.004-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827526" comment="texlive-tex-gyre-math-svn29045.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827527" comment="texlive-tex-gyre-math-doc-svn29045.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827528" comment="texlive-tex4ht-svn29474.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827529" comment="texlive-tex4ht-bin-svn26509.0-45.20130427_r30134.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827530" comment="texlive-tex4ht-doc-svn29474.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827531" comment="texlive-texconfig-svn29349.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827532" comment="texlive-texconfig-bin-svn27344.0-45.20130427_r30134.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827533" comment="texlive-texlive.infra-svn28217.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827534" comment="texlive-texlive.infra-bin-svn22566.0-45.20130427_r30134.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827535" comment="texlive-texlive.infra-doc-svn28217.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827536" comment="texlive-textcase-svn15878.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827537" comment="texlive-textcase-doc-svn15878.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827538" comment="texlive-textpos-svn28261.1.7h-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827539" comment="texlive-textpos-doc-svn28261.1.7h-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827540" comment="texlive-thailatex-svn29349.0.5.1-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827541" comment="texlive-thailatex-doc-svn29349.0.5.1-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827542" comment="texlive-threeparttable-svn17383.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827543" comment="texlive-threeparttable-doc-svn17383.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827544" comment="texlive-thumbpdf-svn26689.3.15-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827545" comment="texlive-thumbpdf-bin-svn6898.0-45.20130427_r30134.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827546" comment="texlive-thumbpdf-doc-svn26689.3.15-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827547" comment="texlive-times-svn28614.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827548" comment="texlive-tipa-svn29349.1.3-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827549" comment="texlive-tipa-doc-svn29349.1.3-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827550" comment="texlive-titlesec-svn24852.2.10.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827551" comment="texlive-titlesec-doc-svn24852.2.10.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827552" comment="texlive-titling-svn15878.2.1d-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827553" comment="texlive-titling-doc-svn15878.2.1d-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827554" comment="texlive-tocloft-svn20084.2.3e-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827555" comment="texlive-tocloft-doc-svn20084.2.3e-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827556" comment="texlive-tools-svn26263.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827557" comment="texlive-tools-doc-svn26263.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827558" comment="texlive-txfonts-svn15878.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827559" comment="texlive-txfonts-doc-svn15878.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827560" comment="texlive-type1cm-svn21820.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827561" comment="texlive-type1cm-doc-svn21820.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827562" comment="texlive-typehtml-svn17134.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827563" comment="texlive-typehtml-doc-svn17134.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827564" comment="texlive-ucharclasses-svn27820.2.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827565" comment="texlive-ucharclasses-doc-svn27820.2.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827566" comment="texlive-ucs-svn27549.2.1-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827567" comment="texlive-ucs-doc-svn27549.2.1-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827568" comment="texlive-uhc-svn16791.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827569" comment="texlive-uhc-doc-svn16791.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827570" comment="texlive-ulem-svn26785.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827571" comment="texlive-ulem-doc-svn26785.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827572" comment="texlive-underscore-svn18261.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827573" comment="texlive-underscore-doc-svn18261.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827574" comment="texlive-unicode-math-svn29413.0.7d-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827575" comment="texlive-unicode-math-doc-svn29413.0.7d-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827576" comment="texlive-unisugar-svn22357.0.92-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827577" comment="texlive-unisugar-doc-svn22357.0.92-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827578" comment="texlive-url-svn16864.3.2-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827579" comment="texlive-url-doc-svn16864.3.2-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827580" comment="texlive-utopia-svn15878.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827581" comment="texlive-utopia-doc-svn15878.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827582" comment="texlive-varwidth-svn24104.0.92-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827583" comment="texlive-varwidth-doc-svn24104.0.92-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827584" comment="texlive-wadalab-svn22576.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827585" comment="texlive-wadalab-doc-svn22576.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827586" comment="texlive-was-svn21439.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827587" comment="texlive-was-doc-svn21439.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827588" comment="texlive-wasy-svn15878.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827589" comment="texlive-wasy-doc-svn15878.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827590" comment="texlive-wasysym-svn15878.2.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827591" comment="texlive-wasysym-doc-svn15878.2.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827592" comment="texlive-wrapfig-svn22048.3.6-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827593" comment="texlive-wrapfig-doc-svn22048.3.6-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827594" comment="texlive-xcolor-svn15878.2.11-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827595" comment="texlive-xcolor-doc-svn15878.2.11-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827596" comment="texlive-xdvi-svn26689.22.85-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827597" comment="texlive-xdvi-bin-svn26509.0-45.20130427_r30134.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827598" comment="texlive-xecjk-svn28816.3.1.2-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827599" comment="texlive-xecjk-doc-svn28816.3.1.2-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827600" comment="texlive-xecolor-svn29660.0.1-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827601" comment="texlive-xecolor-doc-svn29660.0.1-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827602" comment="texlive-xecyr-svn20221.1.1-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827603" comment="texlive-xecyr-doc-svn20221.1.1-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827604" comment="texlive-xeindex-svn16760.0.2-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827605" comment="texlive-xeindex-doc-svn16760.0.2-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827606" comment="texlive-xepersian-svn29661.12.1-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827607" comment="texlive-xepersian-doc-svn29661.12.1-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827608" comment="texlive-xesearch-svn16041.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827609" comment="texlive-xesearch-doc-svn16041.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827610" comment="texlive-xetex-svn26330.0.9997.5-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827611" comment="texlive-xetex-bin-svn26912.0-45.20130427_r30134.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827612" comment="texlive-xetex-def-svn29154.0.95-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827613" comment="texlive-xetex-doc-svn26330.0.9997.5-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827614" comment="texlive-xetex-itrans-svn24105.4.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827615" comment="texlive-xetex-itrans-doc-svn24105.4.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827616" comment="texlive-xetex-pstricks-svn17055.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827617" comment="texlive-xetex-pstricks-doc-svn17055.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827618" comment="texlive-xetex-tibetan-svn28847.0.1-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827619" comment="texlive-xetex-tibetan-doc-svn28847.0.1-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827620" comment="texlive-xetexconfig-svn28819.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827621" comment="texlive-xetexfontinfo-svn15878.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827622" comment="texlive-xetexfontinfo-doc-svn15878.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827623" comment="texlive-xifthen-svn15878.1.3-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827624" comment="texlive-xifthen-doc-svn15878.1.3-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827625" comment="texlive-xkeyval-svn27995.2.6a-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827626" comment="texlive-xkeyval-doc-svn27995.2.6a-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827627" comment="texlive-xltxtra-svn19809.0.5e-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827628" comment="texlive-xltxtra-doc-svn19809.0.5e-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827629" comment="texlive-xmltex-svn28273.0.8-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827630" comment="texlive-xmltex-bin-svn3006.0-45.20130427_r30134.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827631" comment="texlive-xmltex-doc-svn28273.0.8-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827632" comment="texlive-xstring-svn29258.1.7a-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827633" comment="texlive-xstring-doc-svn29258.1.7a-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827634" comment="texlive-xtab-svn23347.2.3f-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827635" comment="texlive-xtab-doc-svn23347.2.3f-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827636" comment="texlive-xunicode-svn23897.0.981-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827637" comment="texlive-xunicode-doc-svn23897.0.981-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827638" comment="texlive-zapfchan-svn28614.0-45.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827639" comment="texlive-zapfding-svn28614.0-45.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201817456" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-17456</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-17456" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17456" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-17456" ref_url="https://www.suse.com/security/cve/CVE-2018-17456" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4009-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4088-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005387.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4088-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006748.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3109-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZR44CNJGOKKFEO4SXVKGQBOPVKZVRDE3/#ZR44CNJGOKKFEO4SXVKGQBOPVKZVRDE3" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3178-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WYQ7JIK4C5HAEU5QJKL5YANVSNWHHJ23/#WYQ7JIK4C5HAEU5QJKL5YANVSNWHHJ23" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4051-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6RWYY74HISLBBJEI2Q4XHRDOP36V3BGU/#6RWYY74HISLBBJEI2Q4XHRDOP36V3BGU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0598-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VP5YOKSRLMTVAPQKPHEDGCOIZL5JKJW5/" source="SUSE-SU"/>
    <description>
    Git before 2.14.5, 2.15.x before 2.15.3, 2.16.x before 2.16.5, 2.17.x before 2.17.2, 2.18.x before 2.18.1, and 2.19.x before 2.19.1 allows remote code execution during processing of a recursive "git clone" of a superproject if a .gitmodules file has a URL field beginning with a '-' character.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17456/">CVE-2018-17456 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17456">CVE-2018-17456 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1110949">SUSE bug 1110949</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825347" comment="emacs-git-1.8.3.1-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825348" comment="emacs-git-el-1.8.3.1-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825349" comment="git-1.8.3.1-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825350" comment="git-all-1.8.3.1-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825351" comment="git-bzr-1.8.3.1-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825352" comment="git-cvs-1.8.3.1-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825353" comment="git-daemon-1.8.3.1-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825354" comment="git-email-1.8.3.1-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825355" comment="git-gnome-keyring-1.8.3.1-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825356" comment="git-gui-1.8.3.1-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825357" comment="git-hg-1.8.3.1-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825358" comment="git-instaweb-1.8.3.1-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825359" comment="git-p4-1.8.3.1-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825360" comment="git-svn-1.8.3.1-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825361" comment="gitk-1.8.3.1-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825362" comment="gitweb-1.8.3.1-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825363" comment="perl-Git-1.8.3.1-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825364" comment="perl-Git-SVN-1.8.3.1-20.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201817466" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-17466</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-17466" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17466" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-17466" ref_url="https://www.suse.com/security/cve/CVE-2018-17466" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4236-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005110.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3273-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/57DIC7MT5TDKIPFGBEOMWMTCZ4AT4ABG/#57DIC7MT5TDKIPFGBEOMWMTCZ4AT4ABG" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3396-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MI5XSRZ7LXDRWWEBFM2UEY2UN2UZHPHA/#MI5XSRZ7LXDRWWEBFM2UEY2UN2UZHPHA" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3835-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QUMMQ2BSESALCKVYTBVE6TKYA2UTXO3I/#QUMMQ2BSESALCKVYTBVE6TKYA2UTXO3I" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4112-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S3YCLFCCALAS3NJ2LSEQJAPI4D7TKP2L/#S3YCLFCCALAS3NJ2LSEQJAPI4D7TKP2L" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0182-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RO4BDOELHRMIUQ3XXKYY53F5V3FX32S2/#RO4BDOELHRMIUQ3XXKYY53F5V3FX32S2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0249-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NSXP45BAXW5ILKJSQRXHTBUOBZUKLD2F/#NSXP45BAXW5ILKJSQRXHTBUOBZUKLD2F" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0251-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YTL5HAWTQVZCKKAVSVP4LCGEQTWZR73J/#YTL5HAWTQVZCKKAVSVP4LCGEQTWZR73J" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Incorrect texture handling in Angle in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-10-24"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17466/">CVE-2018-17466 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17466">CVE-2018-17466 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1112111">SUSE bug 1112111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119105">SUSE bug 1119105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121207">SUSE bug 1121207</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825446" comment="firefox-60.4.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825483" comment="thunderbird-60.4.0-1.el7_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201817581" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-17581</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-17581" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17581" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-17581" ref_url="https://www.suse.com/security/cve/CVE-2018-17581" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013143.html" source="SUSE-SU"/>
    <description>
    CiffDirectory::readDirectory() at crwimage_int.cpp in Exiv2 0.26 has excessive stack consumption due to a recursive function, leading to Denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17581/">CVE-2018-17581 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17581">CVE-2018-17581 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1110282">SUSE bug 1110282</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826187" comment="exiv2-0.27.0-2.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826188" comment="exiv2-devel-0.27.0-2.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826189" comment="exiv2-doc-0.27.0-2.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826190" comment="exiv2-libs-0.27.0-2.el7_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201817828" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-17828</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-17828" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17828" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-17828" ref_url="https://www.suse.com/security/cve/CVE-2018-17828" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20838" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002225.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004779.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3314-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AB3NO6UCV5TP3C5VK5AV766YZU4N35BX/#AB3NO6UCV5TP3C5VK5AV766YZU4N35BX" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3446-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BA6PLGK6CGXYQB5JIUQQPPYUSNTEPRRE/#BA6PLGK6CGXYQB5JIUQQPPYUSNTEPRRE" source="SUSE-SU"/>
    <description>
    Directory traversal vulnerability in ZZIPlib 0.13.69 allows attackers to overwrite arbitrary files via a .. (dot dot) in a zip file, because of the function unzzip_cat in the bins/unzzipcat-mem.c file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-11-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-17828/">CVE-2018-17828 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17828">CVE-2018-17828 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1110687">SUSE bug 1110687</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827877" comment="zziplib-0.13.62-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827878" comment="zziplib-devel-0.13.62-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827879" comment="zziplib-utils-0.13.62-12.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201817961" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-17961</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-17961" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17961" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-17961" ref_url="https://www.suse.com/security/cve/CVE-2018-17961" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:4087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4090-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005397.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4138-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IKPDTPFKZMWYPOQQ2SEC3KLVSQTZPWTM/#IKPDTPFKZMWYPOQQ2SEC3KLVSQTZPWTM" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4140-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FEQIV6F4O3W6JCQITIJZSZBPFO5SVG6O/#FEQIV6F4O3W6JCQITIJZSZBPFO5SVG6O" source="SUSE-SU"/>
    <description>
    Artifex Ghostscript 9.25 and earlier allows attackers to bypass a sandbox protection mechanism via vectors involving errorhandler setup. NOTE: this issue exists because of an incomplete fix for CVE-2018-17183.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-17961/">CVE-2018-17961 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17961">CVE-2018-17961 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1108027">SUSE bug 1108027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109105">SUSE bug 1109105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111479">SUSE bug 1111479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111480">SUSE bug 1111480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112229">SUSE bug 1112229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117022">SUSE bug 1117022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117331">SUSE bug 1117331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118455">SUSE bug 1118455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129180">SUSE bug 1129180</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825447" comment="ghostscript-9.07-31.el7_6.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825448" comment="ghostscript-cups-9.07-31.el7_6.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825449" comment="ghostscript-devel-9.07-31.el7_6.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825450" comment="ghostscript-doc-9.07-31.el7_6.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825451" comment="ghostscript-gtk-9.07-31.el7_6.6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201817966" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-17966</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-17966" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17966" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-17966" ref_url="https://www.suse.com/security/cve/CVE-2018-17966" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004773.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004847.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3225-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MEKTGR47JQCA6R3L3CU527ZEPL6HUEAK/#MEKTGR47JQCA6R3L3CU527ZEPL6HUEAK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3797-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SQJQFI5HNRL4THMZTMSEOZHPAFZOZTPW/#SQJQFI5HNRL4THMZTMSEOZHPAFZOZTPW" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.7-28 has a memory leak vulnerability in WritePDBImage in coders/pdb.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-07"/>
	<updated date="2026-03-07"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17966/">CVE-2018-17966 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17966">CVE-2018-17966 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1110746">SUSE bug 1110746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117463">SUSE bug 1117463</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827880" comment="ImageMagick-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827881" comment="ImageMagick-c++-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827882" comment="ImageMagick-c++-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827883" comment="ImageMagick-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827884" comment="ImageMagick-doc-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827885" comment="ImageMagick-perl-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827886" comment="autotrace-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827887" comment="autotrace-devel-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827888" comment="emacs-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827889" comment="emacs-common-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827890" comment="emacs-el-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827891" comment="emacs-filesystem-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827892" comment="emacs-nox-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827893" comment="emacs-terminal-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827894" comment="inkscape-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827895" comment="inkscape-docs-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827896" comment="inkscape-view-0.92.2-3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201817967" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-17967</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-17967" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17967" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-17967" ref_url="https://www.suse.com/security/cve/CVE-2018-17967" source="SUSE CVE"/>
    <description>
    ImageMagick 7.0.7-28 has a memory leak vulnerability in ReadBGRImage in coders/bgr.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-07"/>
	<updated date="2026-03-07"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17967/">CVE-2018-17967 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17967">CVE-2018-17967 at NVD</cve>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827880" comment="ImageMagick-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827881" comment="ImageMagick-c++-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827882" comment="ImageMagick-c++-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827883" comment="ImageMagick-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827884" comment="ImageMagick-doc-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827885" comment="ImageMagick-perl-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827886" comment="autotrace-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827887" comment="autotrace-devel-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827888" comment="emacs-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827889" comment="emacs-common-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827890" comment="emacs-el-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827891" comment="emacs-filesystem-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827892" comment="emacs-nox-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827893" comment="emacs-terminal-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827894" comment="inkscape-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827895" comment="inkscape-docs-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827896" comment="inkscape-view-0.92.2-3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201817972" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-17972</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-17972" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17972" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-17972" ref_url="https://www.suse.com/security/cve/CVE-2018-17972" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005630.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1407-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UMXCAWC5QTZVSPZOYUW3E3GVJJUKCQ2S/#UMXCAWC5QTZVSPZOYUW3E3GVJJUKCQ2S" source="SUSE-SU"/>
    <description>
    An issue was discovered in the proc_pid_stack function in fs/proc/base.c in the Linux kernel through 4.18.11. It does not ensure that only root may inspect the kernel stack of an arbitrary task, allowing a local attacker to exploit racy stack unwinding and leak kernel task stack contents.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-17972/">CVE-2018-17972 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17972">CVE-2018-17972 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1110785">SUSE bug 1110785</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825602" comment="bpftool-3.10.0-957.10.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825603" comment="kernel-3.10.0-957.10.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825604" comment="kernel-abi-whitelists-3.10.0-957.10.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825605" comment="kernel-debug-3.10.0-957.10.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825608" comment="kernel-doc-3.10.0-957.10.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825609" comment="kernel-headers-3.10.0-957.10.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825610" comment="kernel-tools-3.10.0-957.10.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825611" comment="kernel-tools-libs-3.10.0-957.10.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825613" comment="perf-3.10.0-957.10.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825614" comment="python-perf-3.10.0-957.10.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818016" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18016</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18016" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18016" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18016" ref_url="https://www.suse.com/security/cve/CVE-2018-18016" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004773.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004847.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3225-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MEKTGR47JQCA6R3L3CU527ZEPL6HUEAK/#MEKTGR47JQCA6R3L3CU527ZEPL6HUEAK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3797-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SQJQFI5HNRL4THMZTMSEOZHPAFZOZTPW/#SQJQFI5HNRL4THMZTMSEOZHPAFZOZTPW" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.7-28 has a memory leak vulnerability in WritePCXImage in coders/pcx.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-07"/>
	<updated date="2026-03-07"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18016/">CVE-2018-18016 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18016">CVE-2018-18016 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1111072">SUSE bug 1111072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117463">SUSE bug 1117463</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827880" comment="ImageMagick-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827881" comment="ImageMagick-c++-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827882" comment="ImageMagick-c++-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827883" comment="ImageMagick-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827884" comment="ImageMagick-doc-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827885" comment="ImageMagick-perl-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827886" comment="autotrace-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827887" comment="autotrace-devel-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827888" comment="emacs-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827889" comment="emacs-common-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827890" comment="emacs-el-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827891" comment="emacs-filesystem-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827892" comment="emacs-nox-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827893" comment="emacs-terminal-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827894" comment="inkscape-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827895" comment="inkscape-docs-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827896" comment="inkscape-view-0.92.2-3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818024" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18024</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18024" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18024" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18024" ref_url="https://www.suse.com/security/cve/CVE-2018-18024" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004773.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004847.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3204-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KGEMRE3HZCQQL656SYNBW4EPTVSQK4BY/#KGEMRE3HZCQQL656SYNBW4EPTVSQK4BY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3225-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MEKTGR47JQCA6R3L3CU527ZEPL6HUEAK/#MEKTGR47JQCA6R3L3CU527ZEPL6HUEAK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3797-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SQJQFI5HNRL4THMZTMSEOZHPAFZOZTPW/#SQJQFI5HNRL4THMZTMSEOZHPAFZOZTPW" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.8-13 Q16, there is an infinite loop in the ReadBMPImage function of the coders/bmp.c file. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted bmp file.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-07"/>
	<updated date="2026-03-07"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18024/">CVE-2018-18024 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18024">CVE-2018-18024 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1111069">SUSE bug 1111069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117463">SUSE bug 1117463</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827880" comment="ImageMagick-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827881" comment="ImageMagick-c++-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827882" comment="ImageMagick-c++-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827883" comment="ImageMagick-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827884" comment="ImageMagick-doc-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827885" comment="ImageMagick-perl-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827886" comment="autotrace-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827887" comment="autotrace-devel-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827888" comment="emacs-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827889" comment="emacs-common-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827890" comment="emacs-el-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827891" comment="emacs-filesystem-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827892" comment="emacs-nox-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827893" comment="emacs-terminal-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827894" comment="inkscape-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827895" comment="inkscape-docs-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827896" comment="inkscape-view-0.92.2-3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818066" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18066</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18066" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18066" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18066" ref_url="https://www.suse.com/security/cve/CVE-2018-18066" source="SUSE CVE"/>
    <description>
    snmp_oid_compare in snmplib/snmp_api.c in Net-SNMP before 5.8 has a NULL Pointer Exception bug that can be used by an unauthenticated attacker to remotely cause the instance to crash via a crafted UDP packet, resulting in Denial of Service.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-18066/">CVE-2018-18066 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18066">CVE-2018-18066 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1111123">SUSE bug 1111123</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827715" comment="net-snmp-5.7.2-47.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827716" comment="net-snmp-agent-libs-5.7.2-47.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827717" comment="net-snmp-devel-5.7.2-47.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827718" comment="net-snmp-gui-5.7.2-47.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827719" comment="net-snmp-libs-5.7.2-47.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827720" comment="net-snmp-perl-5.7.2-47.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827721" comment="net-snmp-python-5.7.2-47.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827722" comment="net-snmp-sysvinit-5.7.2-47.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827723" comment="net-snmp-utils-5.7.2-47.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818073" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18073</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18073" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18073" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18073" ref_url="https://www.suse.com/security/cve/CVE-2018-18073" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:4087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4090-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005397.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4138-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IKPDTPFKZMWYPOQQ2SEC3KLVSQTZPWTM/#IKPDTPFKZMWYPOQQ2SEC3KLVSQTZPWTM" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4140-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FEQIV6F4O3W6JCQITIJZSZBPFO5SVG6O/#FEQIV6F4O3W6JCQITIJZSZBPFO5SVG6O" source="SUSE-SU"/>
    <description>
    Artifex Ghostscript allows attackers to bypass a sandbox protection mechanism by leveraging exposure of system operators in the saved execution stack in an error object.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18073/">CVE-2018-18073 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18073">CVE-2018-18073 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1108027">SUSE bug 1108027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109105">SUSE bug 1109105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111479">SUSE bug 1111479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111480">SUSE bug 1111480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112229">SUSE bug 1112229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117022">SUSE bug 1117022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117331">SUSE bug 1117331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118455">SUSE bug 1118455</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825447" comment="ghostscript-9.07-31.el7_6.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825448" comment="ghostscript-cups-9.07-31.el7_6.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825449" comment="ghostscript-devel-9.07-31.el7_6.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825450" comment="ghostscript-doc-9.07-31.el7_6.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825451" comment="ghostscript-gtk-9.07-31.el7_6.6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818074" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18074</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18074" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18074" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18074" ref_url="https://www.suse.com/security/cve/CVE-2018-18074" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0444-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0447-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0450-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0452-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0456-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1487-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005773.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006561.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1792-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1448-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011137.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1754-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MP4YZMRNZWWKOM2PEZWI5CN25N5QCYGS/#MP4YZMRNZWWKOM2PEZWI5CN25N5QCYGS" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/pipermail/neuvector-updates/2023-November/000021.html" source="SUSE-SU"/>
    <description>
    The Requests package before 2.20.0 for Python sends an HTTP Authorization header to an http URI upon receiving a same-hostname https-to-http redirect, which makes it easier for remote attackers to discover credentials by sniffing the network.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18074/">CVE-2018-18074 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18074">CVE-2018-18074 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1111622">SUSE bug 1111622</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826028" comment="python-requests-2.6.0-5.el7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818281" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18281</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18281" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18281" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18281" ref_url="https://www.suse.com/security/cve/CVE-2018-18281" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3689-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3746-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13937-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3817-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EIAU4CLGWP7ZUAYRFQJAICKZ5P6PSBBK/#EIAU4CLGWP7ZUAYRFQJAICKZ5P6PSBBK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4133-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LKTFN5VIPRLJHPXOD5A4BXZDX2ZUZHY5/#LKTFN5VIPRLJHPXOD5A4BXZDX2ZUZHY5" source="SUSE-SU"/>
    <description>
    Since Linux kernel version 3.2, the mremap() syscall performs TLB flushes after dropping pagetable locks. If a syscall such as ftruncate() removes entries from the pagetables of a task that is in the middle of mremap(), a stale TLB entry can remain for a short time that permits access to a physical page after it has been released back to the page allocator and reused. This is fixed in the following kernel versions: 4.9.135, 4.14.78, 4.18.16, 4.19.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18281/">CVE-2018-18281 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18281">CVE-2018-18281 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1113769">SUSE bug 1113769</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826007" comment="bpftool-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826008" comment="kernel-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826009" comment="kernel-abi-whitelists-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826010" comment="kernel-debug-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826013" comment="kernel-doc-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826014" comment="kernel-headers-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826015" comment="kernel-tools-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826016" comment="kernel-tools-libs-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826018" comment="perf-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826019" comment="python-perf-3.10.0-1062.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818284" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18284</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18284" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18284" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18284" ref_url="https://www.suse.com/security/cve/CVE-2018-18284" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:4087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4090-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005397.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4138-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IKPDTPFKZMWYPOQQ2SEC3KLVSQTZPWTM/#IKPDTPFKZMWYPOQQ2SEC3KLVSQTZPWTM" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4140-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FEQIV6F4O3W6JCQITIJZSZBPFO5SVG6O/#FEQIV6F4O3W6JCQITIJZSZBPFO5SVG6O" source="SUSE-SU"/>
    <description>
    Artifex Ghostscript 9.25 and earlier allows attackers to bypass a sandbox protection mechanism via vectors involving the 1Policy operator.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-24"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-18284/">CVE-2018-18284 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18284">CVE-2018-18284 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1108027">SUSE bug 1108027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109105">SUSE bug 1109105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111479">SUSE bug 1111479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111480">SUSE bug 1111480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112229">SUSE bug 1112229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117022">SUSE bug 1117022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117331">SUSE bug 1117331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118455">SUSE bug 1118455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144621">SUSE bug 1144621</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825447" comment="ghostscript-9.07-31.el7_6.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825448" comment="ghostscript-cups-9.07-31.el7_6.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825449" comment="ghostscript-devel-9.07-31.el7_6.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825450" comment="ghostscript-doc-9.07-31.el7_6.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825451" comment="ghostscript-gtk-9.07-31.el7_6.6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818310" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18310</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18310" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18310" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18310" ref_url="https://www.suse.com/security/cve/CVE-2018-18310" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2614-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1590-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Z5JKL6B32NFBYAZ26H2YW75ZH2O62BBE/#Z5JKL6B32NFBYAZ26H2YW75ZH2O62BBE" source="SUSE-SU"/>
    <description>
    An invalid memory address dereference was discovered in dwfl_segment_report_module.c in libdwfl in elfutils through v0.174. The vulnerability allows attackers to cause a denial of service (application crash) with a crafted ELF file, as demonstrated by consider_notes.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18310/">CVE-2018-18310 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18310">CVE-2018-18310 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1111973">SUSE bug 1111973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826462" comment="elfutils-0.176-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826463" comment="elfutils-default-yama-scope-0.176-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826464" comment="elfutils-devel-0.176-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826465" comment="elfutils-devel-static-0.176-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826466" comment="elfutils-libelf-0.176-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826467" comment="elfutils-libelf-devel-0.176-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826468" comment="elfutils-libelf-devel-static-0.176-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826469" comment="elfutils-libs-0.176-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818311" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18311</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18311" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18311" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18311" ref_url="https://www.suse.com/security/cve/CVE-2018-18311" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:25-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2264-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192264-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4258-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/45XO6QPP5W6VXRMAEFMRBMHH2ATI7TMZ/#45XO6QPP5W6VXRMAEFMRBMHH2ATI7TMZ" source="SUSE-SU"/>
    <description>
    Perl before 5.26.3 and 5.28.x before 5.28.1 has a buffer overflow via a crafted regular expression that triggers invalid write operations.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18311/">CVE-2018-18311 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18311">CVE-2018-18311 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1114674">SUSE bug 1114674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132018">SUSE bug 1132018</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825465" comment="perl-5.16.3-294.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825466" comment="perl-CPAN-1.9800-294.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825467" comment="perl-ExtUtils-CBuilder-0.28.2.6-294.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825468" comment="perl-ExtUtils-Embed-1.30-294.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825469" comment="perl-ExtUtils-Install-1.58-294.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825470" comment="perl-IO-Zlib-1.10-294.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825471" comment="perl-Locale-Maketext-Simple-0.21-294.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825472" comment="perl-Module-CoreList-2.76.02-294.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825473" comment="perl-Module-Loaded-0.08-294.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825474" comment="perl-Object-Accessor-0.42-294.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825475" comment="perl-Package-Constants-0.02-294.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825476" comment="perl-Pod-Escapes-1.04-294.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825477" comment="perl-Time-Piece-1.20.1-294.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825478" comment="perl-core-5.16.3-294.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825479" comment="perl-devel-5.16.3-294.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825480" comment="perl-libs-5.16.3-294.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825481" comment="perl-macros-5.16.3-294.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825482" comment="perl-tests-5.16.3-294.el7_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818356" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18356</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18356" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18356" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18356" ref_url="https://www.suse.com/security/cve/CVE-2018-18356" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005294.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4056-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/77FPDEO74ADXIQWICBUTMRZ62KFKNUSQ/#77FPDEO74ADXIQWICBUTMRZ62KFKNUSQ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4142-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K7WIKJO7MZOYYHJWQ7C3XXPK23MP2YND/#K7WIKJO7MZOYYHJWQ7C3XXPK23MP2YND" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4143-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PWE5NUKJ4YIN5BIHKKSD55F2QU6JUG46/#PWE5NUKJ4YIN5BIHKKSD55F2QU6JUG46" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0202-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/76BHXWZR6NIF34CVLAJSPKLDIVI6QUYR/#76BHXWZR6NIF34CVLAJSPKLDIVI6QUYR" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0248-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XMFECNQD7OR7OS7QMHOXX2IJDRTXXZP5/#XMFECNQD7OR7OS7QMHOXX2IJDRTXXZP5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0249-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NSXP45BAXW5ILKJSQRXHTBUOBZUKLD2F/#NSXP45BAXW5ILKJSQRXHTBUOBZUKLD2F" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0250-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XYPZEBWIK7AMOD476T3MOZLNOKSPBHWB/#XYPZEBWIK7AMOD476T3MOZLNOKSPBHWB" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0251-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YTL5HAWTQVZCKKAVSVP4LCGEQTWZR73J/#YTL5HAWTQVZCKKAVSVP4LCGEQTWZR73J" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1162-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AL5AUD2CY37ZNSQZPBX6C3K32ZVWBIIH/#AL5AUD2CY37ZNSQZPBX6C3K32ZVWBIIH" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    An integer overflow in path handling lead to a use after free in Skia in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-24"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18356/">CVE-2018-18356 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18356">CVE-2018-18356 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1118529">SUSE bug 1118529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125330">SUSE bug 1125330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125396">SUSE bug 1125396</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825543" comment="firefox-60.5.1-1.el7_6 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818384" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18384</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18384" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18384" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18384" ref_url="https://www.suse.com/security/cve/CVE-2018-18384" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0707-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1117-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6HNVQQPPRQ5M2FBHS267R3I6SNXVU4PA/#6HNVQQPPRQ5M2FBHS267R3I6SNXVU4PA" source="SUSE-SU"/>
    <description>
    Info-ZIP UnZip 6.0 has a buffer overflow in list.c, when a ZIP archive has a crafted relationship between the compressed-size value and the uncompressed-size value, because a buffer size is 10 and is supposed to be 12.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18384/">CVE-2018-18384 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18384">CVE-2018-18384 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1110194">SUSE bug 1110194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148898">SUSE bug 1148898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153715">SUSE bug 1153715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826393" comment="unzip-6.0-20.el7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818397" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18397</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18397" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18397" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18397" ref_url="https://www.suse.com/security/cve/CVE-2018-18397" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0065-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HZOAR52RMMAMPTGY2TTSFPEKREAVGPNY/#HZOAR52RMMAMPTGY2TTSFPEKREAVGPNY" source="SUSE-SU"/>
    <description>
    The userfaultfd implementation in the Linux kernel before 4.19.7 mishandles access control for certain UFFDIO_ ioctl calls, as demonstrated by allowing local users to write data into holes in a tmpfs file (if the user has read-only access to that file, and that file contains holes), related to fs/userfaultfd.c and mm/userfaultfd.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-18397/">CVE-2018-18397 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18397">CVE-2018-18397 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1117656">SUSE bug 1117656</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171522">SUSE bug 1171522</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825484" comment="bpftool-3.10.0-957.5.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825485" comment="kernel-3.10.0-957.5.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825486" comment="kernel-abi-whitelists-3.10.0-957.5.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825487" comment="kernel-debug-3.10.0-957.5.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825490" comment="kernel-doc-3.10.0-957.5.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825491" comment="kernel-headers-3.10.0-957.5.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825492" comment="kernel-tools-3.10.0-957.5.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825493" comment="kernel-tools-libs-3.10.0-957.5.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825495" comment="perf-3.10.0-957.5.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825496" comment="python-perf-3.10.0-957.5.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818445" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18445</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18445" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18445" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18445" ref_url="https://www.suse.com/security/cve/CVE-2018-18445" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004818.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3593-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3934-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004953.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3658-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YZV3GBMJXSBYN27LLQCORJGJKRRDRFHN/#YZV3GBMJXSBYN27LLQCORJGJKRRDRFHN" source="SUSE-SU"/>
    <description>
    In the Linux kernel 4.14.x, 4.15.x, 4.16.x, 4.17.x, and 4.18.x before 4.18.13, faulty computation of numeric bounds in the BPF verifier permits out-of-bounds memory accesses because adjust_scalar_min_max_vals in kernel/bpf/verifier.c mishandles 32-bit right shifts.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18445/">CVE-2018-18445 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18445">CVE-2018-18445 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1112372">SUSE bug 1112372</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825602" comment="bpftool-3.10.0-957.10.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825603" comment="kernel-3.10.0-957.10.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825604" comment="kernel-abi-whitelists-3.10.0-957.10.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825605" comment="kernel-debug-3.10.0-957.10.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825608" comment="kernel-doc-3.10.0-957.10.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825609" comment="kernel-headers-3.10.0-957.10.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825610" comment="kernel-tools-3.10.0-957.10.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825611" comment="kernel-tools-libs-3.10.0-957.10.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825613" comment="perf-3.10.0-957.10.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825614" comment="python-perf-3.10.0-957.10.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818492" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18492</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18492" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18492" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18492" ref_url="https://www.suse.com/security/cve/CVE-2018-18492" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4236-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005110.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4112-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S3YCLFCCALAS3NJ2LSEQJAPI4D7TKP2L/#S3YCLFCCALAS3NJ2LSEQJAPI4D7TKP2L" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0182-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RO4BDOELHRMIUQ3XXKYY53F5V3FX32S2/#RO4BDOELHRMIUQ3XXKYY53F5V3FX32S2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0249-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NSXP45BAXW5ILKJSQRXHTBUOBZUKLD2F/#NSXP45BAXW5ILKJSQRXHTBUOBZUKLD2F" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0251-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YTL5HAWTQVZCKKAVSVP4LCGEQTWZR73J/#YTL5HAWTQVZCKKAVSVP4LCGEQTWZR73J" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability can occur after deleting a selection element due to a weak reference to the select element in the options collection. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 60.4, Firefox ESR &lt; 60.4, and Firefox &lt; 64.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-10-25"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18492/">CVE-2018-18492 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18492">CVE-2018-18492 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1112111">SUSE bug 1112111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119105">SUSE bug 1119105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121207">SUSE bug 1121207</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825446" comment="firefox-60.4.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825483" comment="thunderbird-60.4.0-1.el7_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818493" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18493</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18493" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18493" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18493" ref_url="https://www.suse.com/security/cve/CVE-2018-18493" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4236-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005110.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4112-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S3YCLFCCALAS3NJ2LSEQJAPI4D7TKP2L/#S3YCLFCCALAS3NJ2LSEQJAPI4D7TKP2L" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0182-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RO4BDOELHRMIUQ3XXKYY53F5V3FX32S2/#RO4BDOELHRMIUQ3XXKYY53F5V3FX32S2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0249-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NSXP45BAXW5ILKJSQRXHTBUOBZUKLD2F/#NSXP45BAXW5ILKJSQRXHTBUOBZUKLD2F" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0251-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YTL5HAWTQVZCKKAVSVP4LCGEQTWZR73J/#YTL5HAWTQVZCKKAVSVP4LCGEQTWZR73J" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A buffer overflow can occur in the Skia library during buffer offset calculations with hardware accelerated canvas 2D actions due to the use of 32-bit calculations instead of 64-bit. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 60.4, Firefox ESR &lt; 60.4, and Firefox &lt; 64.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-10-22"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18493/">CVE-2018-18493 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18493">CVE-2018-18493 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1112111">SUSE bug 1112111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119105">SUSE bug 1119105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121207">SUSE bug 1121207</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825446" comment="firefox-60.4.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825483" comment="thunderbird-60.4.0-1.el7_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18494</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18494" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18494" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18494" ref_url="https://www.suse.com/security/cve/CVE-2018-18494" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4236-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005110.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4112-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S3YCLFCCALAS3NJ2LSEQJAPI4D7TKP2L/#S3YCLFCCALAS3NJ2LSEQJAPI4D7TKP2L" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0182-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RO4BDOELHRMIUQ3XXKYY53F5V3FX32S2/#RO4BDOELHRMIUQ3XXKYY53F5V3FX32S2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0249-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NSXP45BAXW5ILKJSQRXHTBUOBZUKLD2F/#NSXP45BAXW5ILKJSQRXHTBUOBZUKLD2F" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0251-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YTL5HAWTQVZCKKAVSVP4LCGEQTWZR73J/#YTL5HAWTQVZCKKAVSVP4LCGEQTWZR73J" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A same-origin policy violation allowing the theft of cross-origin URL entries when using the Javascript location property to cause a redirection to another site using performance.getEntries(). This is a same-origin policy violation and could allow for data theft. This vulnerability affects Thunderbird &lt; 60.4, Firefox ESR &lt; 60.4, and Firefox &lt; 64.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-10-23"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18494/">CVE-2018-18494 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18494">CVE-2018-18494 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1112111">SUSE bug 1112111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119105">SUSE bug 1119105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121207">SUSE bug 1121207</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825446" comment="firefox-60.4.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825483" comment="thunderbird-60.4.0-1.el7_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818498" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18498</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18498" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18498" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18498" ref_url="https://www.suse.com/security/cve/CVE-2018-18498" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4236-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005110.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4112-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S3YCLFCCALAS3NJ2LSEQJAPI4D7TKP2L/#S3YCLFCCALAS3NJ2LSEQJAPI4D7TKP2L" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0182-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RO4BDOELHRMIUQ3XXKYY53F5V3FX32S2/#RO4BDOELHRMIUQ3XXKYY53F5V3FX32S2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0249-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NSXP45BAXW5ILKJSQRXHTBUOBZUKLD2F/#NSXP45BAXW5ILKJSQRXHTBUOBZUKLD2F" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0251-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YTL5HAWTQVZCKKAVSVP4LCGEQTWZR73J/#YTL5HAWTQVZCKKAVSVP4LCGEQTWZR73J" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A potential vulnerability leading to an integer overflow can occur during buffer size calculations for images when a raw value is used instead of the checked value. This leads to a possible out-of-bounds write. This vulnerability affects Thunderbird &lt; 60.4, Firefox ESR &lt; 60.4, and Firefox &lt; 64.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-10-23"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18498/">CVE-2018-18498 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18498">CVE-2018-18498 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1112111">SUSE bug 1112111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119105">SUSE bug 1119105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121207">SUSE bug 1121207</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825446" comment="firefox-60.4.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825483" comment="thunderbird-60.4.0-1.el7_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818500" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18500</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18500" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18500" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18500" ref_url="https://www.suse.com/security/cve/CVE-2018-18500" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005108.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0336-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005110.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0132-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OWRMCVMFUQAET2SE7IUYHIVUEQKIBNAH/#OWRMCVMFUQAET2SE7IUYHIVUEQKIBNAH" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0133-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NZ6U5EHVSJCSHPBLTP6DKFWMEBFAYU2T/#NZ6U5EHVSJCSHPBLTP6DKFWMEBFAYU2T" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0182-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RO4BDOELHRMIUQ3XXKYY53F5V3FX32S2/#RO4BDOELHRMIUQ3XXKYY53F5V3FX32S2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0249-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NSXP45BAXW5ILKJSQRXHTBUOBZUKLD2F/#NSXP45BAXW5ILKJSQRXHTBUOBZUKLD2F" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0251-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YTL5HAWTQVZCKKAVSVP4LCGEQTWZR73J/#YTL5HAWTQVZCKKAVSVP4LCGEQTWZR73J" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1758-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3XSXZIQWRQRVOR3YE3OFV7LENA3NBVZC/#3XSXZIQWRQRVOR3YE3OFV7LENA3NBVZC" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability can occur while parsing an HTML5 stream in concert with custom HTML elements. This results in the stream parser object being freed while still in use, leading to a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 60.5, Firefox ESR &lt; 60.5, and Firefox &lt; 65.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-12-04"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18500/">CVE-2018-18500 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18500">CVE-2018-18500 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1122983">SUSE bug 1122983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986639">SUSE bug 986639</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825521" comment="firefox-60.5.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825532" comment="thunderbird-60.5.0-1.el7_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818501" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18501</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18501" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18501" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18501" ref_url="https://www.suse.com/security/cve/CVE-2018-18501" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005108.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0336-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005110.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0132-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OWRMCVMFUQAET2SE7IUYHIVUEQKIBNAH/#OWRMCVMFUQAET2SE7IUYHIVUEQKIBNAH" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0133-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NZ6U5EHVSJCSHPBLTP6DKFWMEBFAYU2T/#NZ6U5EHVSJCSHPBLTP6DKFWMEBFAYU2T" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0182-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RO4BDOELHRMIUQ3XXKYY53F5V3FX32S2/#RO4BDOELHRMIUQ3XXKYY53F5V3FX32S2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0249-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NSXP45BAXW5ILKJSQRXHTBUOBZUKLD2F/#NSXP45BAXW5ILKJSQRXHTBUOBZUKLD2F" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0251-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YTL5HAWTQVZCKKAVSVP4LCGEQTWZR73J/#YTL5HAWTQVZCKKAVSVP4LCGEQTWZR73J" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1758-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3XSXZIQWRQRVOR3YE3OFV7LENA3NBVZC/#3XSXZIQWRQRVOR3YE3OFV7LENA3NBVZC" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Mozilla developers and community members reported memory safety bugs present in Firefox 64 and Firefox ESR 60.4. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird &lt; 60.5, Firefox ESR &lt; 60.5, and Firefox &lt; 65.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-11-29"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18501/">CVE-2018-18501 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18501">CVE-2018-18501 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1122983">SUSE bug 1122983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986639">SUSE bug 986639</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825521" comment="firefox-60.5.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825532" comment="thunderbird-60.5.0-1.el7_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818505" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18505</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18505" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18505" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18505" ref_url="https://www.suse.com/security/cve/CVE-2018-18505" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005108.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0336-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005110.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0132-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OWRMCVMFUQAET2SE7IUYHIVUEQKIBNAH/#OWRMCVMFUQAET2SE7IUYHIVUEQKIBNAH" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0133-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NZ6U5EHVSJCSHPBLTP6DKFWMEBFAYU2T/#NZ6U5EHVSJCSHPBLTP6DKFWMEBFAYU2T" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0182-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RO4BDOELHRMIUQ3XXKYY53F5V3FX32S2/#RO4BDOELHRMIUQ3XXKYY53F5V3FX32S2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0249-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NSXP45BAXW5ILKJSQRXHTBUOBZUKLD2F/#NSXP45BAXW5ILKJSQRXHTBUOBZUKLD2F" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0251-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YTL5HAWTQVZCKKAVSVP4LCGEQTWZR73J/#YTL5HAWTQVZCKKAVSVP4LCGEQTWZR73J" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1758-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3XSXZIQWRQRVOR3YE3OFV7LENA3NBVZC/#3XSXZIQWRQRVOR3YE3OFV7LENA3NBVZC" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    An earlier fix for an Inter-process Communication (IPC) vulnerability, CVE-2011-3079, added authentication to communication between IPC endpoints and server parents during IPC process creation. This authentication is insufficient for channels created after the IPC process is started, leading to the authentication not being correctly applied to later channels. This could allow for a sandbox escape through IPC channels due to lack of message validation in the listener process. This vulnerability affects Thunderbird &lt; 60.5, Firefox ESR &lt; 60.5, and Firefox &lt; 65.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-12-04"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18505/">CVE-2018-18505 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18505">CVE-2018-18505 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1122983">SUSE bug 1122983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986639">SUSE bug 986639</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825521" comment="firefox-60.5.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825532" comment="thunderbird-60.5.0-1.el7_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818506" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18506</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18506" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18506" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18506" ref_url="https://www.suse.com/security/cve/CVE-2018-18506" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005294.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1056-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5V5IPNU6QQQSKJSTVJVL4JZQI4XWEO36/#5V5IPNU6QQQSKJSTVJVL4JZQI4XWEO36" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1077-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/F7O4DXUZQKWNDOD7CALQE6TV52NTY7NL/#F7O4DXUZQKWNDOD7CALQE6TV52NTY7NL" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1126-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GSODLL2FRT4TZVOPDYQGDUHJR25R63RL/#GSODLL2FRT4TZVOPDYQGDUHJR25R63RL" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1162-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AL5AUD2CY37ZNSQZPBX6C3K32ZVWBIIH/#AL5AUD2CY37ZNSQZPBX6C3K32ZVWBIIH" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    When proxy auto-detection is enabled, if a web server serves a Proxy Auto-Configuration (PAC) file or if a PAC file is loaded locally, this PAC file can specify that requests to the localhost are to be sent through the proxy to another server. This behavior is disallowed by default when a proxy is manually configured, but when enabled could allow for attacks on services and tools that bind to the localhost for networked behavior if they are accessed through browsing. This vulnerability affects Firefox &lt; 65.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-11-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-18506/">CVE-2018-18506 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18506">CVE-2018-18506 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1122983">SUSE bug 1122983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129821">SUSE bug 1129821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986639">SUSE bug 986639</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825616" comment="firefox-60.6.0-3.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825633" comment="thunderbird-60.6.1-1.el7_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18511</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18511" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18511" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18511" ref_url="https://www.suse.com/security/cve/CVE-2018-18511" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005544.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1484-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CTZNURZG4U3I3C6SR6N64PNF5AQ2VWNR/#CTZNURZG4U3I3C6SR6N64PNF5AQ2VWNR" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1534-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YRJRSOQJ2HUXLMXMB5IAGC7CGYVG6MJ7/#YRJRSOQJ2HUXLMXMB5IAGC7CGYVG6MJ7" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1664-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZFVBHHF6WMJDJB73NZDWFFGS6D23TB67/#ZFVBHHF6WMJDJB73NZDWFFGS6D23TB67" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Cross-origin images can be read from a canvas element in violation of the same-origin policy using the transferFromImageBitmap method. *Note: This only affects Firefox 65. Previous versions are unaffected.*. This vulnerability affects Firefox &lt; 65.0.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18511/">CVE-2018-18511 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18511">CVE-2018-18511 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1125330">SUSE bug 1125330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125396">SUSE bug 1125396</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135824">SUSE bug 1135824</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825817" comment="firefox-60.7.0-1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825832" comment="thunderbird-60.7.0-1.el7_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818520" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18520</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18520" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18520" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18520" ref_url="https://www.suse.com/security/cve/CVE-2018-18520" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2614-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1590-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Z5JKL6B32NFBYAZ26H2YW75ZH2O62BBE/#Z5JKL6B32NFBYAZ26H2YW75ZH2O62BBE" source="SUSE-SU"/>
    <description>
    An Invalid Memory Address Dereference exists in the function elf_end in libelf in elfutils through v0.174. Although eu-size is intended to support ar files inside ar files, handle_ar in size.c closes the outer ar file before handling all inner entries. The vulnerability allows attackers to cause a denial of service (application crash) with a crafted ELF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18520/">CVE-2018-18520 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18520">CVE-2018-18520 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1112726">SUSE bug 1112726</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826462" comment="elfutils-0.176-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826463" comment="elfutils-default-yama-scope-0.176-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826464" comment="elfutils-devel-0.176-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826465" comment="elfutils-devel-static-0.176-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826466" comment="elfutils-libelf-0.176-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826467" comment="elfutils-libelf-devel-0.176-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826468" comment="elfutils-libelf-devel-static-0.176-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826469" comment="elfutils-libs-0.176-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818521" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18521</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18521" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18521" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18521" ref_url="https://www.suse.com/security/cve/CVE-2018-18521" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2614-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1590-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Z5JKL6B32NFBYAZ26H2YW75ZH2O62BBE/#Z5JKL6B32NFBYAZ26H2YW75ZH2O62BBE" source="SUSE-SU"/>
    <description>
    Divide-by-zero vulnerabilities in the function arlib_add_symbols() in arlib.c in elfutils 0.174 allow remote attackers to cause a denial of service (application crash) with a crafted ELF file, as demonstrated by eu-ranlib, because a zero sh_entsize is mishandled.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18521/">CVE-2018-18521 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18521">CVE-2018-18521 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1112723">SUSE bug 1112723</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826462" comment="elfutils-0.176-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826463" comment="elfutils-default-yama-scope-0.176-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826464" comment="elfutils-devel-0.176-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826465" comment="elfutils-devel-static-0.176-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826466" comment="elfutils-libelf-0.176-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826467" comment="elfutils-libelf-devel-0.176-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826468" comment="elfutils-libelf-devel-static-0.176-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826469" comment="elfutils-libs-0.176-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818544" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18544</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18544" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18544" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18544" ref_url="https://www.suse.com/security/cve/CVE-2018-18544" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:4023-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0739-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13993-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005256.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3824-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T3IWFQOERZLHPUILJOIAWLUGHS42GYJM/#T3IWFQOERZLHPUILJOIAWLUGHS42GYJM" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3827-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOX76PPT7A6RPPZ4VY4GLXQT4NZ4LT34/#XOX76PPT7A6RPPZ4VY4GLXQT4NZ4LT34" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3839-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6VAXS3YGGUD3B57NQ6CS22NTPSDJDCPN/#6VAXS3YGGUD3B57NQ6CS22NTPSDJDCPN" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4054-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HM4TBCYDNVZBXSVIFB755X5NIGNFBCA6/#HM4TBCYDNVZBXSVIFB755X5NIGNFBCA6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1141-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LKV3XYLWNGPVANCMRIU3RYCDYWNHSAZA/#LKV3XYLWNGPVANCMRIU3RYCDYWNHSAZA" source="SUSE-SU"/>
    <description>
    There is a memory leak in the function WriteMSLImage of coders/msl.c in ImageMagick 7.0.8-13 Q16, and the function ProcessMSLScript of coders/msl.c in GraphicsMagick before 1.3.31.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18544/">CVE-2018-18544 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18544">CVE-2018-18544 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1113064">SUSE bug 1113064</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827880" comment="ImageMagick-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827881" comment="ImageMagick-c++-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827882" comment="ImageMagick-c++-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827883" comment="ImageMagick-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827884" comment="ImageMagick-doc-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827885" comment="ImageMagick-perl-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827886" comment="autotrace-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827887" comment="autotrace-devel-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827888" comment="emacs-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827889" comment="emacs-common-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827890" comment="emacs-el-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827891" comment="emacs-filesystem-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827892" comment="emacs-nox-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827893" comment="emacs-terminal-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827894" comment="inkscape-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827895" comment="inkscape-docs-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827896" comment="inkscape-view-0.92.2-3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818557" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18557</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18557" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18557" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18557" ref_url="https://www.suse.com/security/cve/CVE-2018-18557" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3911-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004897.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3947-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FDE3XHXSQNVGZ67OMWBZEZCQBUKMTXUY/#FDE3XHXSQNVGZ67OMWBZEZCQBUKMTXUY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3948-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JR24U4ERZMMBPMBHBJ2MXTAUUKLLK3LK/#JR24U4ERZMMBPMBHBJ2MXTAUUKLLK3LK" source="SUSE-SU"/>
    <description>
    LibTIFF 3.9.3, 3.9.4, 3.9.5, 3.9.6, 3.9.7, 4.0.0alpha4, 4.0.0alpha5, 4.0.0alpha6, 4.0.0beta7, 4.0.0, 4.0.1, 4.0.2, 4.0.3, 4.0.4, 4.0.4beta, 4.0.5, 4.0.6, 4.0.7, 4.0.8 and 4.0.9 (with JBIG enabled) decodes arbitrarily-sized JBIG into a buffer, ignoring the buffer size, which leads to a tif_jbig.c JBIGDecode out-of-bounds write.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18557/">CVE-2018-18557 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18557">CVE-2018-18557 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1113094">SUSE bug 1113094</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826088" comment="libtiff-4.0.3-32.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826089" comment="libtiff-devel-4.0.3-32.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826090" comment="libtiff-static-4.0.3-32.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826091" comment="libtiff-tools-4.0.3-32.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818559" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18559</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18559" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18559" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18559" ref_url="https://www.suse.com/security/cve/CVE-2018-18559" source="SUSE CVE"/>
    <description>
    In the Linux kernel through 4.19, a use-after-free can occur due to a race condition between fanout_add from setsockopt and bind on an AF_PACKET socket. This issue exists because of the 15fe076edea787807a7cdc168df832544b58eba6 incomplete fix for a race condition. The code mishandles a certain multithreaded case involving a packet_do_bind unregister action followed by a packet_notifier register action. Later, packet_release operates on only one of the two applicable linked lists. The attacker can achieve Program Counter control.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18559/">CVE-2018-18559 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18559">CVE-2018-18559 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1112859">SUSE bug 1112859</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112921">SUSE bug 1112921</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825484" comment="bpftool-3.10.0-957.5.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825485" comment="kernel-3.10.0-957.5.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825486" comment="kernel-abi-whitelists-3.10.0-957.5.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825487" comment="kernel-debug-3.10.0-957.5.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825490" comment="kernel-doc-3.10.0-957.5.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825491" comment="kernel-headers-3.10.0-957.5.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825492" comment="kernel-tools-3.10.0-957.5.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825493" comment="kernel-tools-libs-3.10.0-957.5.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825495" comment="perf-3.10.0-957.5.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825496" comment="python-perf-3.10.0-957.5.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818584" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18584</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18584" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18584" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18584" ref_url="https://www.suse.com/security/cve/CVE-2018-18584" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13992-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007450.html" source="SUSE-SU"/>
    <description>
    In mspack/cab.h in libmspack before 0.8alpha and cabextract before 1.8, the CAB block input buffer is one byte too small for the maximal Quantum block, leading to an out-of-bounds write.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-18584/">CVE-2018-18584 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18584">CVE-2018-18584 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1113038">SUSE bug 1113038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113039">SUSE bug 1113039</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826079" comment="libmspack-0.5-0.7.alpha.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826080" comment="libmspack-devel-0.5-0.7.alpha.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818585" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18585</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18585" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18585" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18585" ref_url="https://www.suse.com/security/cve/CVE-2018-18585" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13992-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007450.html" source="SUSE-SU"/>
    <description>
    chmd_read_headers in mspack/chmd.c in libmspack before 0.8alpha accepts a filename that has '\0' as its first or second character (such as the "/\0" name).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-18585/">CVE-2018-18585 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18585">CVE-2018-18585 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1113038">SUSE bug 1113038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113039">SUSE bug 1113039</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826079" comment="libmspack-0.5-0.7.alpha.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826080" comment="libmspack-devel-0.5-0.7.alpha.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818661" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18661</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18661" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18661" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18661" ref_url="https://www.suse.com/security/cve/CVE-2018-18661" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3911-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004897.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3947-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FDE3XHXSQNVGZ67OMWBZEZCQBUKMTXUY/#FDE3XHXSQNVGZ67OMWBZEZCQBUKMTXUY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3948-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JR24U4ERZMMBPMBHBJ2MXTAUUKLLK3LK/#JR24U4ERZMMBPMBHBJ2MXTAUUKLLK3LK" source="SUSE-SU"/>
    <description>
    An issue was discovered in LibTIFF 4.0.9. There is a NULL pointer dereference in the function LZWDecode in the file tif_lzw.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18661/">CVE-2018-18661 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18661">CVE-2018-18661 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1113672">SUSE bug 1113672</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826088" comment="libtiff-4.0.3-32.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826089" comment="libtiff-devel-4.0.3-32.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826090" comment="libtiff-static-4.0.3-32.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826091" comment="libtiff-tools-4.0.3-32.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818751" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18751</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18751" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18751" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18751" ref_url="https://www.suse.com/security/cve/CVE-2018-18751" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009904.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1270-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JVQPRDUDYB6AZBSEMQV2LQS3SOCYDDH4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1278-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WRBK5ICGNNHUDYUGZ77D52LO6MVEHXEJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1385-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RLHFK26OHKQS4FLZJVNXTH3I2YQAMAR5/" source="SUSE-SU"/>
    <description>
    An issue was discovered in GNU gettext 0.19.8. There is a double free in default_add_message in read-catalog.c, related to an invalid free in po_gram_parse in po-gram-gen.y, as demonstrated by lt-msgfmt.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18751/">CVE-2018-18751 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18751">CVE-2018-18751 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1113719">SUSE bug 1113719</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827822" comment="emacs-gettext-0.19.8.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827823" comment="gettext-0.19.8.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827824" comment="gettext-common-devel-0.19.8.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827825" comment="gettext-devel-0.19.8.1-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827826" comment="gettext-libs-0.19.8.1-3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818897" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18897</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18897" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18897" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18897" ref_url="https://www.suse.com/security/cve/CVE-2018-18897" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2906-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2907-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030446.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3854-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TS7QPSEQIBQO7BALZOE3TN7IO7IMHK3Y/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Poppler 0.71.0. There is a memory leak in GfxColorSpace::setDisplayProfile in GfxState.cc, as demonstrated by pdftocairo.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18897/">CVE-2018-18897 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18897">CVE-2018-18897 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1114966">SUSE bug 1114966</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825972" comment="evince-3.28.2-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825973" comment="evince-browser-plugin-3.28.2-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825974" comment="evince-devel-3.28.2-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825975" comment="evince-dvi-3.28.2-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825976" comment="evince-libs-3.28.2-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825977" comment="evince-nautilus-3.28.2-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825978" comment="okular-4.10.5-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825979" comment="okular-devel-4.10.5-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825980" comment="okular-libs-4.10.5-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825981" comment="okular-part-4.10.5-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825982" comment="poppler-0.26.5-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825983" comment="poppler-cpp-0.26.5-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825984" comment="poppler-cpp-devel-0.26.5-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825985" comment="poppler-demos-0.26.5-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825986" comment="poppler-devel-0.26.5-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825987" comment="poppler-glib-0.26.5-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825988" comment="poppler-glib-devel-0.26.5-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825989" comment="poppler-qt-0.26.5-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825990" comment="poppler-qt-devel-0.26.5-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825991" comment="poppler-utils-0.26.5-38.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818915" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18915</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18915" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18915" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18915" ref_url="https://www.suse.com/security/cve/CVE-2018-18915" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:3598-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-October/025597.html" source="SUSE-SU"/>
    <description>
    There is an infinite loop in the Exiv2::Image::printIFDStructure function of image.cpp in Exiv2 0.27-RC1. A crafted input will lead to a remote denial of service attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18915/">CVE-2018-18915 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18915">CVE-2018-18915 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1114690">SUSE bug 1114690</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826187" comment="exiv2-0.27.0-2.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826188" comment="exiv2-devel-0.27.0-2.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826189" comment="exiv2-doc-0.27.0-2.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826190" comment="exiv2-libs-0.27.0-2.el7_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819044" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19044</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19044" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19044" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19044" ref_url="https://www.suse.com/security/cve/CVE-2018-19044" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006642.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4212-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LPNDDXN6G3SVZDGT6Z4UW6FOCL26FNJG/#LPNDDXN6G3SVZDGT6Z4UW6FOCL26FNJG" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4213-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GR44ODUUJXCGBNRL6GBNQ65ENNLDYGJI/#GR44ODUUJXCGBNRL6GBNQ65ENNLDYGJI" source="SUSE-SU"/>
    <description>
    keepalived 2.0.8 didn't check for pathnames with symlinks when writing data to a temporary file upon a call to PrintData or PrintStats. This allowed local users to overwrite arbitrary files if fs.protected_symlinks is set to 0, as demonstrated by a symlink from /tmp/keepalived.data or /tmp/keepalived.stats to /etc/passwd.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19044/">CVE-2018-19044 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19044">CVE-2018-19044 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1015141">SUSE bug 1015141</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826520" comment="keepalived-1.3.5-16.el7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819058" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19058</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19058" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19058" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19058" ref_url="https://www.suse.com/security/cve/CVE-2018-19058" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2906-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2907-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030446.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3854-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TS7QPSEQIBQO7BALZOE3TN7IO7IMHK3Y/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Poppler 0.71.0. There is a reachable abort in Object.h, will lead to denial of service because EmbFile::save2 in FileSpec.cc lacks a stream check before saving an embedded file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19058/">CVE-2018-19058 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19058">CVE-2018-19058 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1115187">SUSE bug 1115187</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825972" comment="evince-3.28.2-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825973" comment="evince-browser-plugin-3.28.2-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825974" comment="evince-devel-3.28.2-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825975" comment="evince-dvi-3.28.2-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825976" comment="evince-libs-3.28.2-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825977" comment="evince-nautilus-3.28.2-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825978" comment="okular-4.10.5-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825979" comment="okular-devel-4.10.5-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825980" comment="okular-libs-4.10.5-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825981" comment="okular-part-4.10.5-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825982" comment="poppler-0.26.5-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825983" comment="poppler-cpp-0.26.5-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825984" comment="poppler-cpp-devel-0.26.5-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825985" comment="poppler-demos-0.26.5-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825986" comment="poppler-devel-0.26.5-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825987" comment="poppler-glib-0.26.5-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825988" comment="poppler-glib-devel-0.26.5-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825989" comment="poppler-qt-0.26.5-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825990" comment="poppler-qt-devel-0.26.5-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825991" comment="poppler-utils-0.26.5-38.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819059" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19059</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19059" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19059" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19059" ref_url="https://www.suse.com/security/cve/CVE-2018-19059" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2906-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2907-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030446.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3854-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TS7QPSEQIBQO7BALZOE3TN7IO7IMHK3Y/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Poppler 0.71.0. There is a out-of-bounds read in EmbFile::save2 in FileSpec.cc, will lead to denial of service, as demonstrated by utils/pdfdetach.cc not validating embedded files before save attempts.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19059/">CVE-2018-19059 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19059">CVE-2018-19059 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1115186">SUSE bug 1115186</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825972" comment="evince-3.28.2-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825973" comment="evince-browser-plugin-3.28.2-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825974" comment="evince-devel-3.28.2-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825975" comment="evince-dvi-3.28.2-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825976" comment="evince-libs-3.28.2-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825977" comment="evince-nautilus-3.28.2-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825978" comment="okular-4.10.5-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825979" comment="okular-devel-4.10.5-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825980" comment="okular-libs-4.10.5-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825981" comment="okular-part-4.10.5-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825982" comment="poppler-0.26.5-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825983" comment="poppler-cpp-0.26.5-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825984" comment="poppler-cpp-devel-0.26.5-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825985" comment="poppler-demos-0.26.5-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825986" comment="poppler-devel-0.26.5-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825987" comment="poppler-glib-0.26.5-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825988" comment="poppler-glib-devel-0.26.5-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825989" comment="poppler-qt-0.26.5-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825990" comment="poppler-qt-devel-0.26.5-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825991" comment="poppler-utils-0.26.5-38.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819060" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19060</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19060" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19060" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19060" ref_url="https://www.suse.com/security/cve/CVE-2018-19060" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2906-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2907-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030446.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3854-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TS7QPSEQIBQO7BALZOE3TN7IO7IMHK3Y/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Poppler 0.71.0. There is a NULL pointer dereference in goo/GooString.h, will lead to denial of service, as demonstrated by utils/pdfdetach.cc not validating a filename of an embedded file before constructing a save path.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19060/">CVE-2018-19060 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19060">CVE-2018-19060 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1115185">SUSE bug 1115185</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825972" comment="evince-3.28.2-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825973" comment="evince-browser-plugin-3.28.2-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825974" comment="evince-devel-3.28.2-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825975" comment="evince-dvi-3.28.2-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825976" comment="evince-libs-3.28.2-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825977" comment="evince-nautilus-3.28.2-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825978" comment="okular-4.10.5-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825979" comment="okular-devel-4.10.5-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825980" comment="okular-libs-4.10.5-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825981" comment="okular-part-4.10.5-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825982" comment="poppler-0.26.5-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825983" comment="poppler-cpp-0.26.5-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825984" comment="poppler-cpp-devel-0.26.5-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825985" comment="poppler-demos-0.26.5-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825986" comment="poppler-devel-0.26.5-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825987" comment="poppler-glib-0.26.5-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825988" comment="poppler-glib-devel-0.26.5-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825989" comment="poppler-qt-0.26.5-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825990" comment="poppler-qt-devel-0.26.5-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825991" comment="poppler-utils-0.26.5-38.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819107" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19107</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19107" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19107" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19107" ref_url="https://www.suse.com/security/cve/CVE-2018-19107" source="SUSE CVE"/>
    <description>
    In Exiv2 0.26, Exiv2::IptcParser::decode in iptc.cpp (called from psdimage.cpp in the PSD image reader) may suffer from a denial of service (heap-based buffer over-read) caused by an integer overflow via a crafted PSD image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19107/">CVE-2018-19107 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19107">CVE-2018-19107 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1115374">SUSE bug 1115374</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826187" comment="exiv2-0.27.0-2.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826188" comment="exiv2-devel-0.27.0-2.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826189" comment="exiv2-doc-0.27.0-2.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826190" comment="exiv2-libs-0.27.0-2.el7_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819108" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19108</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19108" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19108" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19108" ref_url="https://www.suse.com/security/cve/CVE-2018-19108" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006676.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0482-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U7X32HSPSOKHILGP4IPOOWMROAKSPGIY/" source="SUSE-SU"/>
    <description>
    In Exiv2 0.26, Exiv2::PsdImage::readMetadata in psdimage.cpp in the PSD image reader may suffer from a denial of service (infinite loop) caused by an integer overflow via a crafted PSD image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19108/">CVE-2018-19108 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19108">CVE-2018-19108 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1115364">SUSE bug 1115364</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826187" comment="exiv2-0.27.0-2.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826188" comment="exiv2-devel-0.27.0-2.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826189" comment="exiv2-doc-0.27.0-2.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826190" comment="exiv2-libs-0.27.0-2.el7_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819115" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19115</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19115" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19115" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19115" ref_url="https://www.suse.com/security/cve/CVE-2018-19115" source="SUSE CVE"/>
    <description>
    keepalived before 2.0.7 has a heap-based buffer overflow when parsing HTTP status codes resulting in DoS or possibly unspecified other impact, because extract_status_code in lib/html.c has no validation of the status code and instead writes an unlimited amount of data to the heap.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19115/">CVE-2018-19115 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19115">CVE-2018-19115 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1015141">SUSE bug 1015141</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825452" comment="keepalived-1.3.5-8.el7_6 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819134" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19134</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19134" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19134" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19134" ref_url="https://www.suse.com/security/cve/CVE-2018-19134" source="SUSE CVE"/>
    <description>
    In Artifex Ghostscript through 9.25, the setpattern operator did not properly validate certain types. A specially crafted PostScript document could exploit this to crash Ghostscript or, possibly, execute arbitrary code in the context of the Ghostscript process. This is a type confusion issue because of failure to check whether the Implementation of a pattern dictionary was a structure type.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-19134/">CVE-2018-19134 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19134">CVE-2018-19134 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1108027">SUSE bug 1108027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109105">SUSE bug 1109105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111479">SUSE bug 1111479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111480">SUSE bug 1111480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112229">SUSE bug 1112229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117022">SUSE bug 1117022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118455">SUSE bug 1118455</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825447" comment="ghostscript-9.07-31.el7_6.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825448" comment="ghostscript-cups-9.07-31.el7_6.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825449" comment="ghostscript-devel-9.07-31.el7_6.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825450" comment="ghostscript-doc-9.07-31.el7_6.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825451" comment="ghostscript-gtk-9.07-31.el7_6.6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819149" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19149</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19149" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19149" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19149" ref_url="https://www.suse.com/security/cve/CVE-2018-19149" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2906-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2907-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030446.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3854-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TS7QPSEQIBQO7BALZOE3TN7IO7IMHK3Y/" source="SUSE-SU"/>
    <description>
    Poppler before 0.70.0 has a NULL pointer dereference in _poppler_attachment_new when called from poppler_annot_file_attachment_get_attachment.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19149/">CVE-2018-19149 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19149">CVE-2018-19149 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1115626">SUSE bug 1115626</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825972" comment="evince-3.28.2-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825973" comment="evince-browser-plugin-3.28.2-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825974" comment="evince-devel-3.28.2-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825975" comment="evince-dvi-3.28.2-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825976" comment="evince-libs-3.28.2-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825977" comment="evince-nautilus-3.28.2-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825978" comment="okular-4.10.5-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825979" comment="okular-devel-4.10.5-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825980" comment="okular-libs-4.10.5-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825981" comment="okular-part-4.10.5-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825982" comment="poppler-0.26.5-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825983" comment="poppler-cpp-0.26.5-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825984" comment="poppler-cpp-devel-0.26.5-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825985" comment="poppler-demos-0.26.5-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825986" comment="poppler-devel-0.26.5-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825987" comment="poppler-glib-0.26.5-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825988" comment="poppler-glib-devel-0.26.5-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825989" comment="poppler-qt-0.26.5-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825990" comment="poppler-qt-devel-0.26.5-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825991" comment="poppler-utils-0.26.5-38.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819198" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19198</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19198" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19198" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19198" ref_url="https://www.suse.com/security/cve/CVE-2018-19198" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005077.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0165-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DKZ2NZQRNUAKKDGMLSBN4JO4TSGD4AQC/#DKZ2NZQRNUAKKDGMLSBN4JO4TSGD4AQC" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0171-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N2HDQPAE2BYVHUDZFAEARC2MXGC7KBVR/#N2HDQPAE2BYVHUDZFAEARC2MXGC7KBVR" source="SUSE-SU"/>
    <description>
    An issue was discovered in uriparser before 0.9.0. UriQuery.c allows an out-of-bounds write via a uriComposeQuery* or uriComposeQueryEx* function because the '&amp;' character is mishandled in certain contexts.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-19198/">CVE-2018-19198 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19198">CVE-2018-19198 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1115722">SUSE bug 1115722</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826510" comment="uriparser-0.7.5-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826511" comment="uriparser-devel-0.7.5-10.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819199" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19199</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19199" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19199" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19199" ref_url="https://www.suse.com/security/cve/CVE-2018-19199" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005077.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0165-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DKZ2NZQRNUAKKDGMLSBN4JO4TSGD4AQC/#DKZ2NZQRNUAKKDGMLSBN4JO4TSGD4AQC" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0171-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N2HDQPAE2BYVHUDZFAEARC2MXGC7KBVR/#N2HDQPAE2BYVHUDZFAEARC2MXGC7KBVR" source="SUSE-SU"/>
    <description>
    An issue was discovered in uriparser before 0.9.0. UriQuery.c allows an integer overflow via a uriComposeQuery* or uriComposeQueryEx* function because of an unchecked multiplication.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-19199/">CVE-2018-19199 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19199">CVE-2018-19199 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1115723">SUSE bug 1115723</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826510" comment="uriparser-0.7.5-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826511" comment="uriparser-devel-0.7.5-10.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819208" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19208</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19208" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19208" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19208" ref_url="https://www.suse.com/security/cve/CVE-2018-19208" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3812-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004879.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3842-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q2RDRQ6RFZFNVC6LW22VBXV2U6H6YSKY/#Q2RDRQ6RFZFNVC6LW22VBXV2U6H6YSKY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3886-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EKTTCD3W3CF2REGDDRAIPMMWCCO5VCB7/#EKTTCD3W3CF2REGDDRAIPMMWCCO5VCB7" source="SUSE-SU"/>
    <description>
    In libwpd 0.10.2, there is a NULL pointer dereference in the function WP6ContentListener::defineTable in WP6ContentListener.cpp that will lead to a denial of service attack. This is related to WPXTable.h.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19208/">CVE-2018-19208 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19208">CVE-2018-19208 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1115713">SUSE bug 1115713</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826218" comment="libwpd-0.10.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826219" comment="libwpd-devel-0.10.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826220" comment="libwpd-doc-0.10.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826221" comment="libwpd-tools-0.10.0-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819409" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19409</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19409" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19409" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19409" ref_url="https://www.suse.com/security/cve/CVE-2018-19409" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:4087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4090-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005397.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4138-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IKPDTPFKZMWYPOQQ2SEC3KLVSQTZPWTM/#IKPDTPFKZMWYPOQQ2SEC3KLVSQTZPWTM" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4140-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FEQIV6F4O3W6JCQITIJZSZBPFO5SVG6O/#FEQIV6F4O3W6JCQITIJZSZBPFO5SVG6O" source="SUSE-SU"/>
    <description>
    An issue was discovered in Artifex Ghostscript before 9.26. LockSafetyParams is not checked correctly if another device is used.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-25"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19409/">CVE-2018-19409 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19409">CVE-2018-19409 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1108027">SUSE bug 1108027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109105">SUSE bug 1109105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111479">SUSE bug 1111479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111480">SUSE bug 1111480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112229">SUSE bug 1112229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117022">SUSE bug 1117022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117331">SUSE bug 1117331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118455">SUSE bug 1118455</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825447" comment="ghostscript-9.07-31.el7_6.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825448" comment="ghostscript-cups-9.07-31.el7_6.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825449" comment="ghostscript-devel-9.07-31.el7_6.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825450" comment="ghostscript-doc-9.07-31.el7_6.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825451" comment="ghostscript-gtk-9.07-31.el7_6.6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819475" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19475</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19475" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19475" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19475" ref_url="https://www.suse.com/security/cve/CVE-2018-19475" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:4087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4090-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005397.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4138-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IKPDTPFKZMWYPOQQ2SEC3KLVSQTZPWTM/#IKPDTPFKZMWYPOQQ2SEC3KLVSQTZPWTM" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4140-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FEQIV6F4O3W6JCQITIJZSZBPFO5SVG6O/#FEQIV6F4O3W6JCQITIJZSZBPFO5SVG6O" source="SUSE-SU"/>
    <description>
    psi/zdevice2.c in Artifex Ghostscript before 9.26 allows remote attackers to bypass intended access restrictions because available stack space is not checked when the device remains the same.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-23"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19475/">CVE-2018-19475 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19475">CVE-2018-19475 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1117327">SUSE bug 1117327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117331">SUSE bug 1117331</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825522" comment="ghostscript-9.07-31.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825523" comment="ghostscript-cups-9.07-31.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825524" comment="ghostscript-devel-9.07-31.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825525" comment="ghostscript-doc-9.07-31.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825526" comment="ghostscript-gtk-9.07-31.el7_6.9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819476" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19476</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19476" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19476" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19476" ref_url="https://www.suse.com/security/cve/CVE-2018-19476" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:4087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4090-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005397.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4138-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IKPDTPFKZMWYPOQQ2SEC3KLVSQTZPWTM/#IKPDTPFKZMWYPOQQ2SEC3KLVSQTZPWTM" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4140-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FEQIV6F4O3W6JCQITIJZSZBPFO5SVG6O/#FEQIV6F4O3W6JCQITIJZSZBPFO5SVG6O" source="SUSE-SU"/>
    <description>
    psi/zicc.c in Artifex Ghostscript before 9.26 allows remote attackers to bypass intended access restrictions because of a setcolorspace type confusion.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-23"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19476/">CVE-2018-19476 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19476">CVE-2018-19476 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1117313">SUSE bug 1117313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117331">SUSE bug 1117331</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825522" comment="ghostscript-9.07-31.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825523" comment="ghostscript-cups-9.07-31.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825524" comment="ghostscript-devel-9.07-31.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825525" comment="ghostscript-doc-9.07-31.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825526" comment="ghostscript-gtk-9.07-31.el7_6.9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819477" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19477</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19477" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19477" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19477" ref_url="https://www.suse.com/security/cve/CVE-2018-19477" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:4087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4090-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005397.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4138-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IKPDTPFKZMWYPOQQ2SEC3KLVSQTZPWTM/#IKPDTPFKZMWYPOQQ2SEC3KLVSQTZPWTM" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4140-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FEQIV6F4O3W6JCQITIJZSZBPFO5SVG6O/#FEQIV6F4O3W6JCQITIJZSZBPFO5SVG6O" source="SUSE-SU"/>
    <description>
    psi/zfjbig2.c in Artifex Ghostscript before 9.26 allows remote attackers to bypass intended access restrictions because of a JBIG2Decode type confusion.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-25"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19477/">CVE-2018-19477 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19477">CVE-2018-19477 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1117274">SUSE bug 1117274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117331">SUSE bug 1117331</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825522" comment="ghostscript-9.07-31.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825523" comment="ghostscript-cups-9.07-31.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825524" comment="ghostscript-devel-9.07-31.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825525" comment="ghostscript-doc-9.07-31.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825526" comment="ghostscript-gtk-9.07-31.el7_6.9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819519" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19519</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19519" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19519" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19519" ref_url="https://www.suse.com/security/cve/CVE-2018-19519" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004969.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4144-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YYWPUTD3TCGXG2MCCLKFK4KSIZ6DKBGS/#YYWPUTD3TCGXG2MCCLKFK4KSIZ6DKBGS" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4252-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WPOOMNDFIUCI672CREHR5WB3QWYJ3QFN/#WPOOMNDFIUCI672CREHR5WB3QWYJ3QFN" source="SUSE-SU"/>
    <description>
    In tcpdump 4.9.2, a stack-based buffer over-read exists in the print_prefix function of print-hncp.c via crafted packet data because of missing initialization.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19519/">CVE-2018-19519 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19519">CVE-2018-19519 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1117267">SUSE bug 1117267</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826768" comment="tcpdump-4.9.2-4.el7_7.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819535" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19535</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19535" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19535" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19535" ref_url="https://www.suse.com/security/cve/CVE-2018-19535" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016679.html" source="SUSE-SU"/>
    <description>
    In Exiv2 0.26 and previous versions, PngChunk::readRawProfile in pngchunk_int.cpp may cause a denial of service (application crash due to a heap-based buffer over-read) via a crafted PNG file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.5/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-19535/">CVE-2018-19535 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19535">CVE-2018-19535 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1117291">SUSE bug 1117291</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826187" comment="exiv2-0.27.0-2.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826188" comment="exiv2-devel-0.27.0-2.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826189" comment="exiv2-doc-0.27.0-2.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826190" comment="exiv2-libs-0.27.0-2.el7_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819607" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19607</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19607" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19607" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19607" ref_url="https://www.suse.com/security/cve/CVE-2018-19607" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006676.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0482-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U7X32HSPSOKHILGP4IPOOWMROAKSPGIY/" source="SUSE-SU"/>
    <description>
    Exiv2::isoSpeed in easyaccess.cpp in Exiv2 v0.27-RC2 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19607/">CVE-2018-19607 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19607">CVE-2018-19607 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1117513">SUSE bug 1117513</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826187" comment="exiv2-0.27.0-2.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826188" comment="exiv2-devel-0.27.0-2.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826189" comment="exiv2-doc-0.27.0-2.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826190" comment="exiv2-libs-0.27.0-2.el7_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819622" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19622</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19622" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19622" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19622" ref_url="https://www.suse.com/security/cve/CVE-2018-19622" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:4295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4307-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MLJKZLR5K3BBXBSHV3BVQQBMLW3BO2TV/#MLJKZLR5K3BBXBSHV3BVQQBMLW3BO2TV" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5IUFGOOBYOJSD6ELATYP2KAV4TMLYPWB/" source="SUSE-SU"/>
    <description>
    In Wireshark 2.6.0 to 2.6.4 and 2.4.0 to 2.4.10, the MMSE dissector could go into an infinite loop. This was addressed in epan/dissectors/packet-mmse.c by preventing length overflows.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19622/">CVE-2018-19622 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19622">CVE-2018-19622 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1117740">SUSE bug 1117740</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827643" comment="wireshark-1.10.14-24.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827644" comment="wireshark-devel-1.10.14-24.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827645" comment="wireshark-gnome-1.10.14-24.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819662" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19662</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19662" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19662" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19662" ref_url="https://www.suse.com/security/cve/CVE-2018-19662" source="SUSE CVE"/>
    <description>
    An issue was discovered in libsndfile 1.0.28. There is a buffer over-read in the function i2alaw_array in alaw.c that will lead to a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-19662/">CVE-2018-19662 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19662">CVE-2018-19662 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1117925">SUSE bug 1117925</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828279" comment="libsndfile-1.0.25-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828280" comment="libsndfile-devel-1.0.25-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828281" comment="libsndfile-utils-1.0.25-12.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819788" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19788</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19788" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19788" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19788" ref_url="https://www.suse.com/security/cve/CVE-2018-19788" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0019-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0019-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005371.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4282-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/A3CLHCXM7O3XLNRJSUWUZY6CXXN6U4L3/#A3CLHCXM7O3XLNRJSUWUZY6CXXN6U4L3" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0010-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6OKC663KCCSTWAYHTLR6YG6QB4LCIPIQ/#6OKC663KCCSTWAYHTLR6YG6QB4LCIPIQ" source="SUSE-SU"/>
    <description>
    A flaw was found in PolicyKit (aka polkit) 0.115 that allows a user with a uid greater than INT_MAX to successfully execute any systemctl command.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19788/">CVE-2018-19788 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19788">CVE-2018-19788 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1118274">SUSE bug 1118274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118277">SUSE bug 1118277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119056">SUSE bug 1119056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826070" comment="polkit-0.112-22.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826071" comment="polkit-devel-0.112-22.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826072" comment="polkit-docs-0.112-22.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819869" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19869</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19869" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19869" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19869" ref_url="https://www.suse.com/security/cve/CVE-2018-19869" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007560.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1116-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5B7TBFCZQG3OYUHPZYGMO7KSHHSS5QBA/#5B7TBFCZQG3OYUHPZYGMO7KSHHSS5QBA" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1452-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KJKFQBI7CGD7FQDCE2V7CAQ2LKSPRQMR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IBKN6GS4GIBUYBLNFX4U4AW663FIHH5B/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1501-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3UNEB57TTFWJ3LAAGGQ4W5TXUQOAXYRV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1530-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FJLSHDERE4UB4726XQUI46NKCGT7AQKA/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Qt before 5.11.3. A malformed SVG image causes a segmentation fault in qsvghandler.cpp.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19869/">CVE-2018-19869 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19869">CVE-2018-19869 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1118599">SUSE bug 1118599</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826222" comment="qt5-assistant-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826223" comment="qt5-designer-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826224" comment="qt5-doctools-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826225" comment="qt5-linguist-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826226" comment="qt5-qdbusviewer-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826227" comment="qt5-qt3d-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826228" comment="qt5-qt3d-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826229" comment="qt5-qt3d-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826230" comment="qt5-qt3d-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826231" comment="qt5-qtbase-5.9.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826232" comment="qt5-qtbase-common-5.9.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826233" comment="qt5-qtbase-devel-5.9.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826234" comment="qt5-qtbase-doc-5.9.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826235" comment="qt5-qtbase-examples-5.9.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826236" comment="qt5-qtbase-gui-5.9.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826237" comment="qt5-qtbase-mysql-5.9.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826238" comment="qt5-qtbase-odbc-5.9.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826239" comment="qt5-qtbase-postgresql-5.9.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826240" comment="qt5-qtbase-static-5.9.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826241" comment="qt5-qtcanvas3d-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826242" comment="qt5-qtcanvas3d-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826243" comment="qt5-qtcanvas3d-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826244" comment="qt5-qtconnectivity-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826245" comment="qt5-qtconnectivity-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826246" comment="qt5-qtconnectivity-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826247" comment="qt5-qtconnectivity-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826248" comment="qt5-qtdeclarative-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826249" comment="qt5-qtdeclarative-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826250" comment="qt5-qtdeclarative-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826251" comment="qt5-qtdeclarative-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826252" comment="qt5-qtdeclarative-static-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826253" comment="qt5-qtdoc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826254" comment="qt5-qtgraphicaleffects-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826255" comment="qt5-qtgraphicaleffects-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826256" comment="qt5-qtimageformats-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826257" comment="qt5-qtimageformats-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826258" comment="qt5-qtlocation-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826259" comment="qt5-qtlocation-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826260" comment="qt5-qtlocation-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826261" comment="qt5-qtlocation-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826262" comment="qt5-qtmultimedia-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826263" comment="qt5-qtmultimedia-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826264" comment="qt5-qtmultimedia-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826265" comment="qt5-qtmultimedia-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826266" comment="qt5-qtquickcontrols-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826267" comment="qt5-qtquickcontrols-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826268" comment="qt5-qtquickcontrols-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826269" comment="qt5-qtquickcontrols2-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826270" comment="qt5-qtquickcontrols2-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826271" comment="qt5-qtquickcontrols2-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826272" comment="qt5-qtquickcontrols2-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826273" comment="qt5-qtscript-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826274" comment="qt5-qtscript-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826275" comment="qt5-qtscript-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826276" comment="qt5-qtscript-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826277" comment="qt5-qtsensors-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826278" comment="qt5-qtsensors-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826279" comment="qt5-qtsensors-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826280" comment="qt5-qtsensors-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826281" comment="qt5-qtserialbus-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826282" comment="qt5-qtserialbus-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826283" comment="qt5-qtserialbus-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826284" comment="qt5-qtserialbus-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826285" comment="qt5-qtserialport-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826286" comment="qt5-qtserialport-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826287" comment="qt5-qtserialport-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826288" comment="qt5-qtserialport-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826289" comment="qt5-qtsvg-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826290" comment="qt5-qtsvg-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826291" comment="qt5-qtsvg-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826292" comment="qt5-qtsvg-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826293" comment="qt5-qttools-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826294" comment="qt5-qttools-common-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826295" comment="qt5-qttools-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826296" comment="qt5-qttools-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826297" comment="qt5-qttools-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826298" comment="qt5-qttools-libs-designer-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826299" comment="qt5-qttools-libs-designercomponents-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826300" comment="qt5-qttools-libs-help-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826301" comment="qt5-qttools-static-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826302" comment="qt5-qttranslations-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826303" comment="qt5-qtwayland-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826304" comment="qt5-qtwayland-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826305" comment="qt5-qtwayland-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826306" comment="qt5-qtwayland-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826307" comment="qt5-qtwebchannel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826308" comment="qt5-qtwebchannel-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826309" comment="qt5-qtwebchannel-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826310" comment="qt5-qtwebchannel-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826311" comment="qt5-qtwebsockets-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826312" comment="qt5-qtwebsockets-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826313" comment="qt5-qtwebsockets-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826314" comment="qt5-qtwebsockets-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826315" comment="qt5-qtx11extras-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826316" comment="qt5-qtx11extras-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826317" comment="qt5-qtx11extras-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826318" comment="qt5-qtxmlpatterns-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826319" comment="qt5-qtxmlpatterns-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826320" comment="qt5-qtxmlpatterns-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826321" comment="qt5-qtxmlpatterns-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826322" comment="qt5-rpm-macros-5.9.7-2.el7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827834" comment="qt-4.8.7-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827835" comment="qt-assistant-4.8.7-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827836" comment="qt-config-4.8.7-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827837" comment="qt-demos-4.8.7-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827838" comment="qt-devel-4.8.7-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827839" comment="qt-devel-private-4.8.7-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827840" comment="qt-doc-4.8.7-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827841" comment="qt-examples-4.8.7-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827842" comment="qt-mysql-4.8.7-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827843" comment="qt-odbc-4.8.7-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827844" comment="qt-postgresql-4.8.7-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827845" comment="qt-qdbusviewer-4.8.7-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827846" comment="qt-qvfb-4.8.7-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827847" comment="qt-x11-4.8.7-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826222" comment="qt5-assistant-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826223" comment="qt5-designer-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826224" comment="qt5-doctools-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826225" comment="qt5-linguist-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826226" comment="qt5-qdbusviewer-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826227" comment="qt5-qt3d-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826228" comment="qt5-qt3d-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826229" comment="qt5-qt3d-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826230" comment="qt5-qt3d-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826231" comment="qt5-qtbase-5.9.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826232" comment="qt5-qtbase-common-5.9.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826233" comment="qt5-qtbase-devel-5.9.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826234" comment="qt5-qtbase-doc-5.9.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826235" comment="qt5-qtbase-examples-5.9.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826236" comment="qt5-qtbase-gui-5.9.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826237" comment="qt5-qtbase-mysql-5.9.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826238" comment="qt5-qtbase-odbc-5.9.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826239" comment="qt5-qtbase-postgresql-5.9.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826240" comment="qt5-qtbase-static-5.9.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826241" comment="qt5-qtcanvas3d-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826242" comment="qt5-qtcanvas3d-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826243" comment="qt5-qtcanvas3d-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826244" comment="qt5-qtconnectivity-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826245" comment="qt5-qtconnectivity-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826246" comment="qt5-qtconnectivity-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826247" comment="qt5-qtconnectivity-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826248" comment="qt5-qtdeclarative-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826249" comment="qt5-qtdeclarative-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826250" comment="qt5-qtdeclarative-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826251" comment="qt5-qtdeclarative-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826252" comment="qt5-qtdeclarative-static-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826253" comment="qt5-qtdoc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826254" comment="qt5-qtgraphicaleffects-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826255" comment="qt5-qtgraphicaleffects-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826256" comment="qt5-qtimageformats-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826257" comment="qt5-qtimageformats-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826258" comment="qt5-qtlocation-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826259" comment="qt5-qtlocation-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826260" comment="qt5-qtlocation-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826261" comment="qt5-qtlocation-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826262" comment="qt5-qtmultimedia-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826263" comment="qt5-qtmultimedia-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826264" comment="qt5-qtmultimedia-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826265" comment="qt5-qtmultimedia-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826266" comment="qt5-qtquickcontrols-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826267" comment="qt5-qtquickcontrols-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826268" comment="qt5-qtquickcontrols-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826269" comment="qt5-qtquickcontrols2-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826270" comment="qt5-qtquickcontrols2-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826271" comment="qt5-qtquickcontrols2-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826272" comment="qt5-qtquickcontrols2-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826273" comment="qt5-qtscript-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826274" comment="qt5-qtscript-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826275" comment="qt5-qtscript-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826276" comment="qt5-qtscript-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826277" comment="qt5-qtsensors-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826278" comment="qt5-qtsensors-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826279" comment="qt5-qtsensors-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826280" comment="qt5-qtsensors-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826281" comment="qt5-qtserialbus-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826282" comment="qt5-qtserialbus-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826283" comment="qt5-qtserialbus-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826284" comment="qt5-qtserialbus-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826285" comment="qt5-qtserialport-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826286" comment="qt5-qtserialport-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826287" comment="qt5-qtserialport-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826288" comment="qt5-qtserialport-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826289" comment="qt5-qtsvg-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826290" comment="qt5-qtsvg-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826291" comment="qt5-qtsvg-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826292" comment="qt5-qtsvg-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826293" comment="qt5-qttools-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826294" comment="qt5-qttools-common-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826295" comment="qt5-qttools-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826296" comment="qt5-qttools-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826297" comment="qt5-qttools-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826298" comment="qt5-qttools-libs-designer-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826299" comment="qt5-qttools-libs-designercomponents-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826300" comment="qt5-qttools-libs-help-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826301" comment="qt5-qttools-static-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826302" comment="qt5-qttranslations-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826303" comment="qt5-qtwayland-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826304" comment="qt5-qtwayland-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826305" comment="qt5-qtwayland-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826306" comment="qt5-qtwayland-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826307" comment="qt5-qtwebchannel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826308" comment="qt5-qtwebchannel-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826309" comment="qt5-qtwebchannel-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826310" comment="qt5-qtwebchannel-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826311" comment="qt5-qtwebsockets-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826312" comment="qt5-qtwebsockets-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826313" comment="qt5-qtwebsockets-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826314" comment="qt5-qtwebsockets-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826315" comment="qt5-qtx11extras-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826316" comment="qt5-qtx11extras-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826317" comment="qt5-qtx11extras-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826318" comment="qt5-qtxmlpatterns-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826319" comment="qt5-qtxmlpatterns-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826320" comment="qt5-qtxmlpatterns-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826321" comment="qt5-qtxmlpatterns-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826322" comment="qt5-rpm-macros-5.9.7-2.el7 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819870" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19870</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19870" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19870" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19870" ref_url="https://www.suse.com/security/cve/CVE-2018-19870" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006447.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1239-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/F6JOXIGNCPFOMQC4FYZBZOXZ6TI5K35Z/#F6JOXIGNCPFOMQC4FYZBZOXZ6TI5K35Z" source="SUSE-SU"/>
    <description>
    An issue was discovered in Qt before 5.11.3. A malformed GIF image causes a NULL pointer dereference in QGifHandler resulting in a segmentation fault.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19870/">CVE-2018-19870 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19870">CVE-2018-19870 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1118597">SUSE bug 1118597</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826222" comment="qt5-assistant-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826223" comment="qt5-designer-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826224" comment="qt5-doctools-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826225" comment="qt5-linguist-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826226" comment="qt5-qdbusviewer-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826227" comment="qt5-qt3d-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826228" comment="qt5-qt3d-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826229" comment="qt5-qt3d-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826230" comment="qt5-qt3d-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826231" comment="qt5-qtbase-5.9.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826232" comment="qt5-qtbase-common-5.9.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826233" comment="qt5-qtbase-devel-5.9.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826234" comment="qt5-qtbase-doc-5.9.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826235" comment="qt5-qtbase-examples-5.9.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826236" comment="qt5-qtbase-gui-5.9.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826237" comment="qt5-qtbase-mysql-5.9.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826238" comment="qt5-qtbase-odbc-5.9.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826239" comment="qt5-qtbase-postgresql-5.9.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826240" comment="qt5-qtbase-static-5.9.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826241" comment="qt5-qtcanvas3d-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826242" comment="qt5-qtcanvas3d-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826243" comment="qt5-qtcanvas3d-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826244" comment="qt5-qtconnectivity-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826245" comment="qt5-qtconnectivity-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826246" comment="qt5-qtconnectivity-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826247" comment="qt5-qtconnectivity-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826248" comment="qt5-qtdeclarative-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826249" comment="qt5-qtdeclarative-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826250" comment="qt5-qtdeclarative-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826251" comment="qt5-qtdeclarative-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826252" comment="qt5-qtdeclarative-static-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826253" comment="qt5-qtdoc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826254" comment="qt5-qtgraphicaleffects-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826255" comment="qt5-qtgraphicaleffects-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826256" comment="qt5-qtimageformats-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826257" comment="qt5-qtimageformats-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826258" comment="qt5-qtlocation-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826259" comment="qt5-qtlocation-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826260" comment="qt5-qtlocation-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826261" comment="qt5-qtlocation-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826262" comment="qt5-qtmultimedia-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826263" comment="qt5-qtmultimedia-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826264" comment="qt5-qtmultimedia-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826265" comment="qt5-qtmultimedia-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826266" comment="qt5-qtquickcontrols-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826267" comment="qt5-qtquickcontrols-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826268" comment="qt5-qtquickcontrols-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826269" comment="qt5-qtquickcontrols2-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826270" comment="qt5-qtquickcontrols2-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826271" comment="qt5-qtquickcontrols2-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826272" comment="qt5-qtquickcontrols2-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826273" comment="qt5-qtscript-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826274" comment="qt5-qtscript-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826275" comment="qt5-qtscript-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826276" comment="qt5-qtscript-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826277" comment="qt5-qtsensors-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826278" comment="qt5-qtsensors-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826279" comment="qt5-qtsensors-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826280" comment="qt5-qtsensors-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826281" comment="qt5-qtserialbus-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826282" comment="qt5-qtserialbus-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826283" comment="qt5-qtserialbus-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826284" comment="qt5-qtserialbus-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826285" comment="qt5-qtserialport-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826286" comment="qt5-qtserialport-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826287" comment="qt5-qtserialport-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826288" comment="qt5-qtserialport-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826289" comment="qt5-qtsvg-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826290" comment="qt5-qtsvg-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826291" comment="qt5-qtsvg-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826292" comment="qt5-qtsvg-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826293" comment="qt5-qttools-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826294" comment="qt5-qttools-common-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826295" comment="qt5-qttools-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826296" comment="qt5-qttools-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826297" comment="qt5-qttools-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826298" comment="qt5-qttools-libs-designer-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826299" comment="qt5-qttools-libs-designercomponents-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826300" comment="qt5-qttools-libs-help-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826301" comment="qt5-qttools-static-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826302" comment="qt5-qttranslations-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826303" comment="qt5-qtwayland-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826304" comment="qt5-qtwayland-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826305" comment="qt5-qtwayland-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826306" comment="qt5-qtwayland-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826307" comment="qt5-qtwebchannel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826308" comment="qt5-qtwebchannel-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826309" comment="qt5-qtwebchannel-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826310" comment="qt5-qtwebchannel-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826311" comment="qt5-qtwebsockets-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826312" comment="qt5-qtwebsockets-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826313" comment="qt5-qtwebsockets-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826314" comment="qt5-qtwebsockets-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826315" comment="qt5-qtx11extras-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826316" comment="qt5-qtx11extras-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826317" comment="qt5-qtx11extras-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826318" comment="qt5-qtxmlpatterns-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826319" comment="qt5-qtxmlpatterns-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826320" comment="qt5-qtxmlpatterns-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826321" comment="qt5-qtxmlpatterns-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826322" comment="qt5-rpm-macros-5.9.7-2.el7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827834" comment="qt-4.8.7-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827835" comment="qt-assistant-4.8.7-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827836" comment="qt-config-4.8.7-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827837" comment="qt-demos-4.8.7-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827838" comment="qt-devel-4.8.7-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827839" comment="qt-devel-private-4.8.7-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827840" comment="qt-doc-4.8.7-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827841" comment="qt-examples-4.8.7-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827842" comment="qt-mysql-4.8.7-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827843" comment="qt-odbc-4.8.7-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827844" comment="qt-postgresql-4.8.7-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827845" comment="qt-qdbusviewer-4.8.7-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827846" comment="qt-qvfb-4.8.7-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827847" comment="qt-x11-4.8.7-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826222" comment="qt5-assistant-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826223" comment="qt5-designer-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826224" comment="qt5-doctools-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826225" comment="qt5-linguist-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826226" comment="qt5-qdbusviewer-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826227" comment="qt5-qt3d-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826228" comment="qt5-qt3d-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826229" comment="qt5-qt3d-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826230" comment="qt5-qt3d-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826231" comment="qt5-qtbase-5.9.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826232" comment="qt5-qtbase-common-5.9.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826233" comment="qt5-qtbase-devel-5.9.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826234" comment="qt5-qtbase-doc-5.9.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826235" comment="qt5-qtbase-examples-5.9.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826236" comment="qt5-qtbase-gui-5.9.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826237" comment="qt5-qtbase-mysql-5.9.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826238" comment="qt5-qtbase-odbc-5.9.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826239" comment="qt5-qtbase-postgresql-5.9.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826240" comment="qt5-qtbase-static-5.9.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826241" comment="qt5-qtcanvas3d-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826242" comment="qt5-qtcanvas3d-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826243" comment="qt5-qtcanvas3d-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826244" comment="qt5-qtconnectivity-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826245" comment="qt5-qtconnectivity-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826246" comment="qt5-qtconnectivity-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826247" comment="qt5-qtconnectivity-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826248" comment="qt5-qtdeclarative-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826249" comment="qt5-qtdeclarative-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826250" comment="qt5-qtdeclarative-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826251" comment="qt5-qtdeclarative-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826252" comment="qt5-qtdeclarative-static-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826253" comment="qt5-qtdoc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826254" comment="qt5-qtgraphicaleffects-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826255" comment="qt5-qtgraphicaleffects-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826256" comment="qt5-qtimageformats-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826257" comment="qt5-qtimageformats-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826258" comment="qt5-qtlocation-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826259" comment="qt5-qtlocation-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826260" comment="qt5-qtlocation-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826261" comment="qt5-qtlocation-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826262" comment="qt5-qtmultimedia-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826263" comment="qt5-qtmultimedia-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826264" comment="qt5-qtmultimedia-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826265" comment="qt5-qtmultimedia-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826266" comment="qt5-qtquickcontrols-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826267" comment="qt5-qtquickcontrols-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826268" comment="qt5-qtquickcontrols-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826269" comment="qt5-qtquickcontrols2-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826270" comment="qt5-qtquickcontrols2-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826271" comment="qt5-qtquickcontrols2-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826272" comment="qt5-qtquickcontrols2-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826273" comment="qt5-qtscript-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826274" comment="qt5-qtscript-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826275" comment="qt5-qtscript-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826276" comment="qt5-qtscript-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826277" comment="qt5-qtsensors-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826278" comment="qt5-qtsensors-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826279" comment="qt5-qtsensors-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826280" comment="qt5-qtsensors-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826281" comment="qt5-qtserialbus-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826282" comment="qt5-qtserialbus-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826283" comment="qt5-qtserialbus-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826284" comment="qt5-qtserialbus-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826285" comment="qt5-qtserialport-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826286" comment="qt5-qtserialport-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826287" comment="qt5-qtserialport-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826288" comment="qt5-qtserialport-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826289" comment="qt5-qtsvg-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826290" comment="qt5-qtsvg-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826291" comment="qt5-qtsvg-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826292" comment="qt5-qtsvg-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826293" comment="qt5-qttools-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826294" comment="qt5-qttools-common-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826295" comment="qt5-qttools-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826296" comment="qt5-qttools-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826297" comment="qt5-qttools-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826298" comment="qt5-qttools-libs-designer-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826299" comment="qt5-qttools-libs-designercomponents-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826300" comment="qt5-qttools-libs-help-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826301" comment="qt5-qttools-static-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826302" comment="qt5-qttranslations-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826303" comment="qt5-qtwayland-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826304" comment="qt5-qtwayland-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826305" comment="qt5-qtwayland-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826306" comment="qt5-qtwayland-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826307" comment="qt5-qtwebchannel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826308" comment="qt5-qtwebchannel-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826309" comment="qt5-qtwebchannel-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826310" comment="qt5-qtwebchannel-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826311" comment="qt5-qtwebsockets-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826312" comment="qt5-qtwebsockets-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826313" comment="qt5-qtwebsockets-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826314" comment="qt5-qtwebsockets-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826315" comment="qt5-qtx11extras-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826316" comment="qt5-qtx11extras-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826317" comment="qt5-qtx11extras-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826318" comment="qt5-qtxmlpatterns-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826319" comment="qt5-qtxmlpatterns-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826320" comment="qt5-qtxmlpatterns-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826321" comment="qt5-qtxmlpatterns-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826322" comment="qt5-rpm-macros-5.9.7-2.el7 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819871" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19871</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19871" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19871" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19871" ref_url="https://www.suse.com/security/cve/CVE-2018-19871" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007559.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1115-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QOSQDWR5EZYI4RBQCGEVGHDB7AKZJYW2/#QOSQDWR5EZYI4RBQCGEVGHDB7AKZJYW2" source="SUSE-SU"/>
    <description>
    An issue was discovered in Qt before 5.11.3. There is QTgaFile Uncontrolled Resource Consumption.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19871/">CVE-2018-19871 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19871">CVE-2018-19871 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1118598">SUSE bug 1118598</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826222" comment="qt5-assistant-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826223" comment="qt5-designer-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826224" comment="qt5-doctools-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826225" comment="qt5-linguist-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826226" comment="qt5-qdbusviewer-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826227" comment="qt5-qt3d-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826228" comment="qt5-qt3d-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826229" comment="qt5-qt3d-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826230" comment="qt5-qt3d-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826231" comment="qt5-qtbase-5.9.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826232" comment="qt5-qtbase-common-5.9.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826233" comment="qt5-qtbase-devel-5.9.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826234" comment="qt5-qtbase-doc-5.9.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826235" comment="qt5-qtbase-examples-5.9.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826236" comment="qt5-qtbase-gui-5.9.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826237" comment="qt5-qtbase-mysql-5.9.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826238" comment="qt5-qtbase-odbc-5.9.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826239" comment="qt5-qtbase-postgresql-5.9.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826240" comment="qt5-qtbase-static-5.9.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826241" comment="qt5-qtcanvas3d-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826242" comment="qt5-qtcanvas3d-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826243" comment="qt5-qtcanvas3d-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826244" comment="qt5-qtconnectivity-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826245" comment="qt5-qtconnectivity-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826246" comment="qt5-qtconnectivity-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826247" comment="qt5-qtconnectivity-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826248" comment="qt5-qtdeclarative-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826249" comment="qt5-qtdeclarative-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826250" comment="qt5-qtdeclarative-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826251" comment="qt5-qtdeclarative-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826252" comment="qt5-qtdeclarative-static-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826253" comment="qt5-qtdoc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826254" comment="qt5-qtgraphicaleffects-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826255" comment="qt5-qtgraphicaleffects-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826256" comment="qt5-qtimageformats-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826257" comment="qt5-qtimageformats-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826258" comment="qt5-qtlocation-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826259" comment="qt5-qtlocation-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826260" comment="qt5-qtlocation-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826261" comment="qt5-qtlocation-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826262" comment="qt5-qtmultimedia-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826263" comment="qt5-qtmultimedia-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826264" comment="qt5-qtmultimedia-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826265" comment="qt5-qtmultimedia-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826266" comment="qt5-qtquickcontrols-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826267" comment="qt5-qtquickcontrols-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826268" comment="qt5-qtquickcontrols-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826269" comment="qt5-qtquickcontrols2-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826270" comment="qt5-qtquickcontrols2-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826271" comment="qt5-qtquickcontrols2-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826272" comment="qt5-qtquickcontrols2-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826273" comment="qt5-qtscript-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826274" comment="qt5-qtscript-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826275" comment="qt5-qtscript-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826276" comment="qt5-qtscript-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826277" comment="qt5-qtsensors-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826278" comment="qt5-qtsensors-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826279" comment="qt5-qtsensors-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826280" comment="qt5-qtsensors-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826281" comment="qt5-qtserialbus-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826282" comment="qt5-qtserialbus-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826283" comment="qt5-qtserialbus-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826284" comment="qt5-qtserialbus-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826285" comment="qt5-qtserialport-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826286" comment="qt5-qtserialport-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826287" comment="qt5-qtserialport-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826288" comment="qt5-qtserialport-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826289" comment="qt5-qtsvg-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826290" comment="qt5-qtsvg-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826291" comment="qt5-qtsvg-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826292" comment="qt5-qtsvg-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826293" comment="qt5-qttools-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826294" comment="qt5-qttools-common-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826295" comment="qt5-qttools-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826296" comment="qt5-qttools-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826297" comment="qt5-qttools-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826298" comment="qt5-qttools-libs-designer-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826299" comment="qt5-qttools-libs-designercomponents-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826300" comment="qt5-qttools-libs-help-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826301" comment="qt5-qttools-static-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826302" comment="qt5-qttranslations-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826303" comment="qt5-qtwayland-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826304" comment="qt5-qtwayland-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826305" comment="qt5-qtwayland-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826306" comment="qt5-qtwayland-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826307" comment="qt5-qtwebchannel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826308" comment="qt5-qtwebchannel-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826309" comment="qt5-qtwebchannel-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826310" comment="qt5-qtwebchannel-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826311" comment="qt5-qtwebsockets-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826312" comment="qt5-qtwebsockets-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826313" comment="qt5-qtwebsockets-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826314" comment="qt5-qtwebsockets-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826315" comment="qt5-qtx11extras-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826316" comment="qt5-qtx11extras-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826317" comment="qt5-qtx11extras-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826318" comment="qt5-qtxmlpatterns-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826319" comment="qt5-qtxmlpatterns-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826320" comment="qt5-qtxmlpatterns-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826321" comment="qt5-qtxmlpatterns-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826322" comment="qt5-rpm-macros-5.9.7-2.el7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827834" comment="qt-4.8.7-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827835" comment="qt-assistant-4.8.7-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827836" comment="qt-config-4.8.7-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827837" comment="qt-demos-4.8.7-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827838" comment="qt-devel-4.8.7-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827839" comment="qt-devel-private-4.8.7-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827840" comment="qt-doc-4.8.7-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827841" comment="qt-examples-4.8.7-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827842" comment="qt-mysql-4.8.7-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827843" comment="qt-odbc-4.8.7-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827844" comment="qt-postgresql-4.8.7-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827845" comment="qt-qdbusviewer-4.8.7-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827846" comment="qt-qvfb-4.8.7-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827847" comment="qt-x11-4.8.7-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826222" comment="qt5-assistant-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826223" comment="qt5-designer-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826224" comment="qt5-doctools-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826225" comment="qt5-linguist-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826226" comment="qt5-qdbusviewer-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826227" comment="qt5-qt3d-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826228" comment="qt5-qt3d-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826229" comment="qt5-qt3d-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826230" comment="qt5-qt3d-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826231" comment="qt5-qtbase-5.9.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826232" comment="qt5-qtbase-common-5.9.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826233" comment="qt5-qtbase-devel-5.9.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826234" comment="qt5-qtbase-doc-5.9.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826235" comment="qt5-qtbase-examples-5.9.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826236" comment="qt5-qtbase-gui-5.9.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826237" comment="qt5-qtbase-mysql-5.9.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826238" comment="qt5-qtbase-odbc-5.9.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826239" comment="qt5-qtbase-postgresql-5.9.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826240" comment="qt5-qtbase-static-5.9.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826241" comment="qt5-qtcanvas3d-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826242" comment="qt5-qtcanvas3d-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826243" comment="qt5-qtcanvas3d-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826244" comment="qt5-qtconnectivity-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826245" comment="qt5-qtconnectivity-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826246" comment="qt5-qtconnectivity-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826247" comment="qt5-qtconnectivity-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826248" comment="qt5-qtdeclarative-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826249" comment="qt5-qtdeclarative-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826250" comment="qt5-qtdeclarative-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826251" comment="qt5-qtdeclarative-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826252" comment="qt5-qtdeclarative-static-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826253" comment="qt5-qtdoc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826254" comment="qt5-qtgraphicaleffects-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826255" comment="qt5-qtgraphicaleffects-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826256" comment="qt5-qtimageformats-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826257" comment="qt5-qtimageformats-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826258" comment="qt5-qtlocation-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826259" comment="qt5-qtlocation-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826260" comment="qt5-qtlocation-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826261" comment="qt5-qtlocation-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826262" comment="qt5-qtmultimedia-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826263" comment="qt5-qtmultimedia-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826264" comment="qt5-qtmultimedia-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826265" comment="qt5-qtmultimedia-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826266" comment="qt5-qtquickcontrols-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826267" comment="qt5-qtquickcontrols-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826268" comment="qt5-qtquickcontrols-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826269" comment="qt5-qtquickcontrols2-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826270" comment="qt5-qtquickcontrols2-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826271" comment="qt5-qtquickcontrols2-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826272" comment="qt5-qtquickcontrols2-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826273" comment="qt5-qtscript-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826274" comment="qt5-qtscript-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826275" comment="qt5-qtscript-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826276" comment="qt5-qtscript-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826277" comment="qt5-qtsensors-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826278" comment="qt5-qtsensors-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826279" comment="qt5-qtsensors-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826280" comment="qt5-qtsensors-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826281" comment="qt5-qtserialbus-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826282" comment="qt5-qtserialbus-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826283" comment="qt5-qtserialbus-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826284" comment="qt5-qtserialbus-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826285" comment="qt5-qtserialport-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826286" comment="qt5-qtserialport-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826287" comment="qt5-qtserialport-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826288" comment="qt5-qtserialport-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826289" comment="qt5-qtsvg-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826290" comment="qt5-qtsvg-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826291" comment="qt5-qtsvg-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826292" comment="qt5-qtsvg-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826293" comment="qt5-qttools-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826294" comment="qt5-qttools-common-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826295" comment="qt5-qttools-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826296" comment="qt5-qttools-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826297" comment="qt5-qttools-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826298" comment="qt5-qttools-libs-designer-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826299" comment="qt5-qttools-libs-designercomponents-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826300" comment="qt5-qttools-libs-help-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826301" comment="qt5-qttools-static-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826302" comment="qt5-qttranslations-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826303" comment="qt5-qtwayland-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826304" comment="qt5-qtwayland-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826305" comment="qt5-qtwayland-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826306" comment="qt5-qtwayland-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826307" comment="qt5-qtwebchannel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826308" comment="qt5-qtwebchannel-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826309" comment="qt5-qtwebchannel-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826310" comment="qt5-qtwebchannel-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826311" comment="qt5-qtwebsockets-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826312" comment="qt5-qtwebsockets-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826313" comment="qt5-qtwebsockets-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826314" comment="qt5-qtwebsockets-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826315" comment="qt5-qtx11extras-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826316" comment="qt5-qtx11extras-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826317" comment="qt5-qtx11extras-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826318" comment="qt5-qtxmlpatterns-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826319" comment="qt5-qtxmlpatterns-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826320" comment="qt5-qtxmlpatterns-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826321" comment="qt5-qtxmlpatterns-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826322" comment="qt5-rpm-macros-5.9.7-2.el7 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819872" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19872</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19872" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19872" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19872" ref_url="https://www.suse.com/security/cve/CVE-2018-19872" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006447.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1239-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/F6JOXIGNCPFOMQC4FYZBZOXZ6TI5K35Z/#F6JOXIGNCPFOMQC4FYZBZOXZ6TI5K35Z" source="SUSE-SU"/>
    <description>
    An issue was discovered in Qt 5.11. A malformed PPM image causes a division by zero and a crash in qppmhandler.cpp.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19872/">CVE-2018-19872 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19872">CVE-2018-19872 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1130246">SUSE bug 1130246</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827834" comment="qt-4.8.7-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827835" comment="qt-assistant-4.8.7-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827836" comment="qt-config-4.8.7-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827837" comment="qt-demos-4.8.7-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827838" comment="qt-devel-4.8.7-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827839" comment="qt-devel-private-4.8.7-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827840" comment="qt-doc-4.8.7-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827841" comment="qt-examples-4.8.7-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827842" comment="qt-mysql-4.8.7-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827843" comment="qt-odbc-4.8.7-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827844" comment="qt-postgresql-4.8.7-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827845" comment="qt-qdbusviewer-4.8.7-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827846" comment="qt-qvfb-4.8.7-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827847" comment="qt-x11-4.8.7-8.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819873" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19873</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19873" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19873" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19873" ref_url="https://www.suse.com/security/cve/CVE-2018-19873" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:4179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4210-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006715.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4261-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UBLMWNY73GOQMMNSWQSLSEICCCPUY6YZ/#UBLMWNY73GOQMMNSWQSLSEICCCPUY6YZ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0265-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PBSTGLBQYTXKIKAQ7SXDRS2NMVOY6J4K/#PBSTGLBQYTXKIKAQ7SXDRS2NMVOY6J4K" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1452-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KJKFQBI7CGD7FQDCE2V7CAQ2LKSPRQMR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IBKN6GS4GIBUYBLNFX4U4AW663FIHH5B/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1501-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3UNEB57TTFWJ3LAAGGQ4W5TXUQOAXYRV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1530-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FJLSHDERE4UB4726XQUI46NKCGT7AQKA/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Qt before 5.11.3. QBmpHandler has a buffer overflow via BMP data.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19873/">CVE-2018-19873 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19873">CVE-2018-19873 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1118596">SUSE bug 1118596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826222" comment="qt5-assistant-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826223" comment="qt5-designer-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826224" comment="qt5-doctools-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826225" comment="qt5-linguist-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826226" comment="qt5-qdbusviewer-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826227" comment="qt5-qt3d-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826228" comment="qt5-qt3d-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826229" comment="qt5-qt3d-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826230" comment="qt5-qt3d-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826231" comment="qt5-qtbase-5.9.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826232" comment="qt5-qtbase-common-5.9.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826233" comment="qt5-qtbase-devel-5.9.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826234" comment="qt5-qtbase-doc-5.9.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826235" comment="qt5-qtbase-examples-5.9.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826236" comment="qt5-qtbase-gui-5.9.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826237" comment="qt5-qtbase-mysql-5.9.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826238" comment="qt5-qtbase-odbc-5.9.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826239" comment="qt5-qtbase-postgresql-5.9.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826240" comment="qt5-qtbase-static-5.9.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826241" comment="qt5-qtcanvas3d-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826242" comment="qt5-qtcanvas3d-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826243" comment="qt5-qtcanvas3d-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826244" comment="qt5-qtconnectivity-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826245" comment="qt5-qtconnectivity-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826246" comment="qt5-qtconnectivity-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826247" comment="qt5-qtconnectivity-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826248" comment="qt5-qtdeclarative-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826249" comment="qt5-qtdeclarative-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826250" comment="qt5-qtdeclarative-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826251" comment="qt5-qtdeclarative-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826252" comment="qt5-qtdeclarative-static-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826253" comment="qt5-qtdoc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826254" comment="qt5-qtgraphicaleffects-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826255" comment="qt5-qtgraphicaleffects-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826256" comment="qt5-qtimageformats-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826257" comment="qt5-qtimageformats-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826258" comment="qt5-qtlocation-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826259" comment="qt5-qtlocation-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826260" comment="qt5-qtlocation-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826261" comment="qt5-qtlocation-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826262" comment="qt5-qtmultimedia-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826263" comment="qt5-qtmultimedia-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826264" comment="qt5-qtmultimedia-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826265" comment="qt5-qtmultimedia-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826266" comment="qt5-qtquickcontrols-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826267" comment="qt5-qtquickcontrols-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826268" comment="qt5-qtquickcontrols-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826269" comment="qt5-qtquickcontrols2-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826270" comment="qt5-qtquickcontrols2-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826271" comment="qt5-qtquickcontrols2-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826272" comment="qt5-qtquickcontrols2-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826273" comment="qt5-qtscript-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826274" comment="qt5-qtscript-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826275" comment="qt5-qtscript-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826276" comment="qt5-qtscript-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826277" comment="qt5-qtsensors-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826278" comment="qt5-qtsensors-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826279" comment="qt5-qtsensors-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826280" comment="qt5-qtsensors-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826281" comment="qt5-qtserialbus-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826282" comment="qt5-qtserialbus-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826283" comment="qt5-qtserialbus-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826284" comment="qt5-qtserialbus-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826285" comment="qt5-qtserialport-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826286" comment="qt5-qtserialport-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826287" comment="qt5-qtserialport-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826288" comment="qt5-qtserialport-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826289" comment="qt5-qtsvg-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826290" comment="qt5-qtsvg-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826291" comment="qt5-qtsvg-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826292" comment="qt5-qtsvg-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826293" comment="qt5-qttools-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826294" comment="qt5-qttools-common-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826295" comment="qt5-qttools-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826296" comment="qt5-qttools-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826297" comment="qt5-qttools-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826298" comment="qt5-qttools-libs-designer-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826299" comment="qt5-qttools-libs-designercomponents-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826300" comment="qt5-qttools-libs-help-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826301" comment="qt5-qttools-static-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826302" comment="qt5-qttranslations-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826303" comment="qt5-qtwayland-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826304" comment="qt5-qtwayland-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826305" comment="qt5-qtwayland-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826306" comment="qt5-qtwayland-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826307" comment="qt5-qtwebchannel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826308" comment="qt5-qtwebchannel-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826309" comment="qt5-qtwebchannel-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826310" comment="qt5-qtwebchannel-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826311" comment="qt5-qtwebsockets-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826312" comment="qt5-qtwebsockets-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826313" comment="qt5-qtwebsockets-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826314" comment="qt5-qtwebsockets-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826315" comment="qt5-qtx11extras-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826316" comment="qt5-qtx11extras-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826317" comment="qt5-qtx11extras-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826318" comment="qt5-qtxmlpatterns-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826319" comment="qt5-qtxmlpatterns-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826320" comment="qt5-qtxmlpatterns-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826321" comment="qt5-qtxmlpatterns-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826322" comment="qt5-rpm-macros-5.9.7-2.el7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827834" comment="qt-4.8.7-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827835" comment="qt-assistant-4.8.7-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827836" comment="qt-config-4.8.7-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827837" comment="qt-demos-4.8.7-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827838" comment="qt-devel-4.8.7-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827839" comment="qt-devel-private-4.8.7-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827840" comment="qt-doc-4.8.7-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827841" comment="qt-examples-4.8.7-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827842" comment="qt-mysql-4.8.7-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827843" comment="qt-odbc-4.8.7-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827844" comment="qt-postgresql-4.8.7-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827845" comment="qt-qdbusviewer-4.8.7-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827846" comment="qt-qvfb-4.8.7-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827847" comment="qt-x11-4.8.7-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826222" comment="qt5-assistant-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826223" comment="qt5-designer-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826224" comment="qt5-doctools-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826225" comment="qt5-linguist-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826226" comment="qt5-qdbusviewer-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826227" comment="qt5-qt3d-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826228" comment="qt5-qt3d-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826229" comment="qt5-qt3d-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826230" comment="qt5-qt3d-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826231" comment="qt5-qtbase-5.9.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826232" comment="qt5-qtbase-common-5.9.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826233" comment="qt5-qtbase-devel-5.9.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826234" comment="qt5-qtbase-doc-5.9.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826235" comment="qt5-qtbase-examples-5.9.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826236" comment="qt5-qtbase-gui-5.9.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826237" comment="qt5-qtbase-mysql-5.9.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826238" comment="qt5-qtbase-odbc-5.9.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826239" comment="qt5-qtbase-postgresql-5.9.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826240" comment="qt5-qtbase-static-5.9.7-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826241" comment="qt5-qtcanvas3d-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826242" comment="qt5-qtcanvas3d-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826243" comment="qt5-qtcanvas3d-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826244" comment="qt5-qtconnectivity-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826245" comment="qt5-qtconnectivity-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826246" comment="qt5-qtconnectivity-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826247" comment="qt5-qtconnectivity-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826248" comment="qt5-qtdeclarative-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826249" comment="qt5-qtdeclarative-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826250" comment="qt5-qtdeclarative-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826251" comment="qt5-qtdeclarative-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826252" comment="qt5-qtdeclarative-static-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826253" comment="qt5-qtdoc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826254" comment="qt5-qtgraphicaleffects-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826255" comment="qt5-qtgraphicaleffects-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826256" comment="qt5-qtimageformats-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826257" comment="qt5-qtimageformats-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826258" comment="qt5-qtlocation-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826259" comment="qt5-qtlocation-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826260" comment="qt5-qtlocation-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826261" comment="qt5-qtlocation-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826262" comment="qt5-qtmultimedia-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826263" comment="qt5-qtmultimedia-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826264" comment="qt5-qtmultimedia-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826265" comment="qt5-qtmultimedia-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826266" comment="qt5-qtquickcontrols-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826267" comment="qt5-qtquickcontrols-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826268" comment="qt5-qtquickcontrols-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826269" comment="qt5-qtquickcontrols2-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826270" comment="qt5-qtquickcontrols2-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826271" comment="qt5-qtquickcontrols2-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826272" comment="qt5-qtquickcontrols2-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826273" comment="qt5-qtscript-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826274" comment="qt5-qtscript-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826275" comment="qt5-qtscript-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826276" comment="qt5-qtscript-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826277" comment="qt5-qtsensors-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826278" comment="qt5-qtsensors-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826279" comment="qt5-qtsensors-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826280" comment="qt5-qtsensors-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826281" comment="qt5-qtserialbus-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826282" comment="qt5-qtserialbus-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826283" comment="qt5-qtserialbus-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826284" comment="qt5-qtserialbus-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826285" comment="qt5-qtserialport-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826286" comment="qt5-qtserialport-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826287" comment="qt5-qtserialport-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826288" comment="qt5-qtserialport-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826289" comment="qt5-qtsvg-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826290" comment="qt5-qtsvg-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826291" comment="qt5-qtsvg-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826292" comment="qt5-qtsvg-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826293" comment="qt5-qttools-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826294" comment="qt5-qttools-common-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826295" comment="qt5-qttools-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826296" comment="qt5-qttools-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826297" comment="qt5-qttools-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826298" comment="qt5-qttools-libs-designer-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826299" comment="qt5-qttools-libs-designercomponents-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826300" comment="qt5-qttools-libs-help-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826301" comment="qt5-qttools-static-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826302" comment="qt5-qttranslations-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826303" comment="qt5-qtwayland-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826304" comment="qt5-qtwayland-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826305" comment="qt5-qtwayland-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826306" comment="qt5-qtwayland-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826307" comment="qt5-qtwebchannel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826308" comment="qt5-qtwebchannel-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826309" comment="qt5-qtwebchannel-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826310" comment="qt5-qtwebchannel-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826311" comment="qt5-qtwebsockets-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826312" comment="qt5-qtwebsockets-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826313" comment="qt5-qtwebsockets-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826314" comment="qt5-qtwebsockets-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826315" comment="qt5-qtx11extras-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826316" comment="qt5-qtx11extras-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826317" comment="qt5-qtx11extras-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826318" comment="qt5-qtxmlpatterns-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826319" comment="qt5-qtxmlpatterns-devel-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826320" comment="qt5-qtxmlpatterns-doc-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826321" comment="qt5-qtxmlpatterns-examples-5.9.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826322" comment="qt5-rpm-macros-5.9.7-2.el7 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819985" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19985</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19985" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19985" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19985" ref_url="https://www.suse.com/security/cve/CVE-2018-19985" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13937-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13979-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005194.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0065-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HZOAR52RMMAMPTGY2TTSFPEKREAVGPNY/#HZOAR52RMMAMPTGY2TTSFPEKREAVGPNY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0140-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YC36SIOXVJQS57WNCR7J2V2OWLPWEMTW/#YC36SIOXVJQS57WNCR7J2V2OWLPWEMTW" source="SUSE-SU"/>
    <description>
    The function hso_get_config_data in drivers/net/usb/hso.c in the Linux kernel through 4.19.8 reads if_num from the USB device (as a u8) and uses it to index a small array, resulting in an object out-of-bounds (OOB) read that potentially allows arbitrary read in the kernel address space.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-19985/">CVE-2018-19985 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19985">CVE-2018-19985 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1120743">SUSE bug 1120743</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826993" comment="bpftool-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826994" comment="kernel-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826995" comment="kernel-abi-whitelists-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826996" comment="kernel-debug-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826999" comment="kernel-doc-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827000" comment="kernel-headers-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827001" comment="kernel-tools-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827002" comment="kernel-tools-libs-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827004" comment="perf-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827005" comment="python-perf-3.10.0-1127.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820060" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20060</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20060" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20060" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20060" ref_url="https://www.suse.com/security/cve/CVE-2018-20060" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:0444-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0447-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0450-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0452-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0456-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2370-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192370-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005931.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2131-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KFMC4LRB2CXRSDWEXN4Z4QWZ7YZ6RC4V/#KFMC4LRB2CXRSDWEXN4Z4QWZ7YZ6RC4V" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/pipermail/neuvector-updates/2023-November/000021.html" source="SUSE-SU"/>
    <description>
    urllib3 before version 1.23 does not remove the Authorization HTTP header when following a cross-origin redirect (i.e., a redirect that differs in host, port, or scheme). This can allow for credentials in the Authorization header to be exposed to unintended hosts or transmitted in cleartext.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-02-24"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.6/CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20060/">CVE-2018-20060 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20060">CVE-2018-20060 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1119376">SUSE bug 1119376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216275">SUSE bug 1216275</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826505" comment="python-urllib3-1.10.2-7.el7 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826505" comment="python-urllib3-1.10.2-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827964" comment="python-virtualenv-15.1.0-4.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827963" comment="python3-pip-9.0.3-7.el7_8 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820096" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20096</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20096" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20096" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20096" ref_url="https://www.suse.com/security/cve/CVE-2018-20096" source="SUSE CVE"/>
    <description>
    There is a heap-based buffer over-read in the Exiv2::tEXtToDataBuf function of pngimage.cpp in Exiv2 0.27-RC3. A crafted input will lead to a remote denial of service attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20096/">CVE-2018-20096 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20096">CVE-2018-20096 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1119513">SUSE bug 1119513</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826187" comment="exiv2-0.27.0-2.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826188" comment="exiv2-devel-0.27.0-2.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826189" comment="exiv2-doc-0.27.0-2.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826190" comment="exiv2-libs-0.27.0-2.el7_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820097" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20097</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20097" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20097" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20097" ref_url="https://www.suse.com/security/cve/CVE-2018-20097" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:4208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013143.html" source="SUSE-SU"/>
    <description>
    There is a SEGV in Exiv2::Internal::TiffParserWorker::findPrimaryGroups of tiffimage_int.cpp in Exiv2 0.27-RC3. A crafted input will lead to a remote denial of service attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20097/">CVE-2018-20097 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20097">CVE-2018-20097 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1119562">SUSE bug 1119562</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826187" comment="exiv2-0.27.0-2.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826188" comment="exiv2-devel-0.27.0-2.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826189" comment="exiv2-doc-0.27.0-2.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826190" comment="exiv2-libs-0.27.0-2.el7_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820098" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20098</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20098" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20098" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20098" ref_url="https://www.suse.com/security/cve/CVE-2018-20098" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:4208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013143.html" source="SUSE-SU"/>
    <description>
    There is a heap-based buffer over-read in Exiv2::Jp2Image::encodeJp2Header of jp2image.cpp in Exiv2 0.27-RC3. A crafted input will lead to a remote denial of service attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20098/">CVE-2018-20098 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20098">CVE-2018-20098 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1119560">SUSE bug 1119560</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826187" comment="exiv2-0.27.0-2.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826188" comment="exiv2-devel-0.27.0-2.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826189" comment="exiv2-doc-0.27.0-2.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826190" comment="exiv2-libs-0.27.0-2.el7_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820099" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20099</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20099" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20099" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20099" ref_url="https://www.suse.com/security/cve/CVE-2018-20099" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:4208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013143.html" source="SUSE-SU"/>
    <description>
    There is an infinite loop in Exiv2::Jp2Image::encodeJp2Header of jp2image.cpp in Exiv2 0.27-RC3. A crafted input will lead to a remote denial of service attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20099/">CVE-2018-20099 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20099">CVE-2018-20099 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1119559">SUSE bug 1119559</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826187" comment="exiv2-0.27.0-2.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826188" comment="exiv2-devel-0.27.0-2.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826189" comment="exiv2-doc-0.27.0-2.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826190" comment="exiv2-libs-0.27.0-2.el7_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820169" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20169</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20169" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20169" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20169" ref_url="https://www.suse.com/security/cve/CVE-2018-20169" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13937-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13979-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005194.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0065-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HZOAR52RMMAMPTGY2TTSFPEKREAVGPNY/#HZOAR52RMMAMPTGY2TTSFPEKREAVGPNY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0140-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YC36SIOXVJQS57WNCR7J2V2OWLPWEMTW/#YC36SIOXVJQS57WNCR7J2V2OWLPWEMTW" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 4.19.9. The USB subsystem mishandles size checks during the reading of an extra descriptor, related to __usb_get_extra_descriptor in drivers/usb/core/usb.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20169/">CVE-2018-20169 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20169">CVE-2018-20169 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1119714">SUSE bug 1119714</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826993" comment="bpftool-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826994" comment="kernel-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826995" comment="kernel-abi-whitelists-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826996" comment="kernel-debug-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826999" comment="kernel-doc-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827000" comment="kernel-headers-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827001" comment="kernel-tools-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827002" comment="kernel-tools-libs-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827004" comment="perf-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827005" comment="python-perf-3.10.0-1127.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820467" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20467</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20467" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20467" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20467" ref_url="https://www.suse.com/security/cve/CVE-2018-20467" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0739-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1033-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13993-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13995-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005265.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0016-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/F2NUE5ZDFVNURLLQG3ZFMS36AZYAINS5/#F2NUE5ZDFVNURLLQG3ZFMS36AZYAINS5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1141-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LKV3XYLWNGPVANCMRIU3RYCDYWNHSAZA/#LKV3XYLWNGPVANCMRIU3RYCDYWNHSAZA" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1320-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2XHJ2AOYGREC65MN6FYXWNZTOX3EBKGA/#2XHJ2AOYGREC65MN6FYXWNZTOX3EBKGA" source="SUSE-SU"/>
    <description>
    In coders/bmp.c in ImageMagick before 7.0.8-16, an input file can result in an infinite loop and hang, with high CPU and memory consumption. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20467/">CVE-2018-20467 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20467">CVE-2018-20467 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1120381">SUSE bug 1120381</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827880" comment="ImageMagick-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827881" comment="ImageMagick-c++-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827882" comment="ImageMagick-c++-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827883" comment="ImageMagick-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827884" comment="ImageMagick-doc-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827885" comment="ImageMagick-perl-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827886" comment="autotrace-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827887" comment="autotrace-devel-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827888" comment="emacs-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827889" comment="emacs-common-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827890" comment="emacs-el-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827891" comment="emacs-filesystem-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827892" comment="emacs-nox-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827893" comment="emacs-terminal-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827894" comment="inkscape-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827895" comment="inkscape-docs-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827896" comment="inkscape-view-0.92.2-3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820481" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20481</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20481" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20481" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20481" ref_url="https://www.suse.com/security/cve/CVE-2018-20481" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2906-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2907-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030446.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3854-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TS7QPSEQIBQO7BALZOE3TN7IO7IMHK3Y/" source="SUSE-SU"/>
    <description>
    XRef::getEntry in XRef.cc in Poppler 0.72.0 mishandles unallocated XRef entries, which allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted PDF document, when XRefEntry::setFlag in XRef.h is called from Parser::makeStream in Parser.cc.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20481/">CVE-2018-20481 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20481">CVE-2018-20481 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1120495">SUSE bug 1120495</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825972" comment="evince-3.28.2-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825973" comment="evince-browser-plugin-3.28.2-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825974" comment="evince-devel-3.28.2-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825975" comment="evince-dvi-3.28.2-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825976" comment="evince-libs-3.28.2-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825977" comment="evince-nautilus-3.28.2-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825978" comment="okular-4.10.5-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825979" comment="okular-devel-4.10.5-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825980" comment="okular-libs-4.10.5-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825981" comment="okular-part-4.10.5-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825982" comment="poppler-0.26.5-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825983" comment="poppler-cpp-0.26.5-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825984" comment="poppler-cpp-devel-0.26.5-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825985" comment="poppler-demos-0.26.5-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825986" comment="poppler-devel-0.26.5-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825987" comment="poppler-glib-0.26.5-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825988" comment="poppler-glib-devel-0.26.5-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825989" comment="poppler-qt-0.26.5-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825990" comment="poppler-qt-devel-0.26.5-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825991" comment="poppler-utils-0.26.5-38.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820532" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20532</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20532" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20532" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20532" ref_url="https://www.suse.com/security/cve/CVE-2018-20532" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2019:2742-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2019-October/012808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005763.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2265-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192265-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007438.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1927-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WVIOCGRDOEPR6QZDWDWT4JR4KMYHLNX5/#WVIOCGRDOEPR6QZDWDWT4JR4KMYHLNX5" source="SUSE-SU"/>
    <description>
    There is a NULL pointer dereference at ext/testcase.c (function testcase_read) in libsolvext.a in libsolv through 0.7.2 that will cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-20532/">CVE-2018-20532 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20532">CVE-2018-20532 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1120629">SUSE bug 1120629</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826521" comment="libsolv-0.6.34-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826522" comment="libsolv-demo-0.6.34-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826523" comment="libsolv-devel-0.6.34-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826524" comment="libsolv-tools-0.6.34-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826525" comment="python2-solv-0.6.34-4.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820533" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20533</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20533" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20533" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20533" ref_url="https://www.suse.com/security/cve/CVE-2018-20533" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2019:2742-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2019-October/012808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005763.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2265-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192265-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007438.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1927-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WVIOCGRDOEPR6QZDWDWT4JR4KMYHLNX5/#WVIOCGRDOEPR6QZDWDWT4JR4KMYHLNX5" source="SUSE-SU"/>
    <description>
    There is a NULL pointer dereference at ext/testcase.c (function testcase_str2dep_complex) in libsolvext.a in libsolv through 0.7.2 that will cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-20533/">CVE-2018-20533 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20533">CVE-2018-20533 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1120630">SUSE bug 1120630</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826521" comment="libsolv-0.6.34-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826522" comment="libsolv-demo-0.6.34-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826523" comment="libsolv-devel-0.6.34-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826524" comment="libsolv-tools-0.6.34-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826525" comment="python2-solv-0.6.34-4.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820534" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20534</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20534" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20534" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20534" ref_url="https://www.suse.com/security/cve/CVE-2018-20534" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2019:2742-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2019-October/012808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005763.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2265-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192265-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007438.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1927-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WVIOCGRDOEPR6QZDWDWT4JR4KMYHLNX5/#WVIOCGRDOEPR6QZDWDWT4JR4KMYHLNX5" source="SUSE-SU"/>
    <description>
    There is an illegal address access at ext/testcase.c in libsolv.a in libsolv through 0.7.2 that will cause a denial of service. NOTE: third parties dispute this issue stating that the issue affects the test suite and not the underlying library. It cannot be exploited in any real-world application
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-08"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20534/">CVE-2018-20534 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20534">CVE-2018-20534 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1120631">SUSE bug 1120631</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826521" comment="libsolv-0.6.34-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826522" comment="libsolv-demo-0.6.34-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826523" comment="libsolv-devel-0.6.34-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826524" comment="libsolv-tools-0.6.34-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826525" comment="python2-solv-0.6.34-4.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820650" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20650</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20650" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20650" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20650" ref_url="https://www.suse.com/security/cve/CVE-2018-20650" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2906-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2907-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030446.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3854-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TS7QPSEQIBQO7BALZOE3TN7IO7IMHK3Y/" source="SUSE-SU"/>
    <description>
    A reachable Object::dictLookup assertion in Poppler 0.72.0 allows attackers to cause a denial of service due to the lack of a check for the dict data type, as demonstrated by use of the FileSpec class (in FileSpec.cc) in pdfdetach.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20650/">CVE-2018-20650 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20650">CVE-2018-20650 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1120939">SUSE bug 1120939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120956">SUSE bug 1120956</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825972" comment="evince-3.28.2-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825973" comment="evince-browser-plugin-3.28.2-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825974" comment="evince-devel-3.28.2-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825975" comment="evince-dvi-3.28.2-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825976" comment="evince-libs-3.28.2-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825977" comment="evince-nautilus-3.28.2-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825978" comment="okular-4.10.5-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825979" comment="okular-devel-4.10.5-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825980" comment="okular-libs-4.10.5-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825981" comment="okular-part-4.10.5-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825982" comment="poppler-0.26.5-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825983" comment="poppler-cpp-0.26.5-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825984" comment="poppler-cpp-devel-0.26.5-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825985" comment="poppler-demos-0.26.5-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825986" comment="poppler-devel-0.26.5-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825987" comment="poppler-glib-0.26.5-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825988" comment="poppler-glib-devel-0.26.5-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825989" comment="poppler-qt-0.26.5-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825990" comment="poppler-qt-devel-0.26.5-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825991" comment="poppler-utils-0.26.5-38.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820662" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20662</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20662" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20662" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20662" ref_url="https://www.suse.com/security/cve/CVE-2018-20662" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4690-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4941-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4942-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017518.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3854-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TS7QPSEQIBQO7BALZOE3TN7IO7IMHK3Y/" source="SUSE-SU"/>
    <description>
    In Poppler 0.72.0, PDFDoc::setup in PDFDoc.cc allows attackers to cause a denial-of-service (application crash caused by Object.h SIGABRT, because of a wrong return value from PDFDoc::setup) by crafting a PDF file in which an xref data structure is mishandled during extractPDFSubtype processing.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20662/">CVE-2018-20662 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20662">CVE-2018-20662 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1120939">SUSE bug 1120939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120956">SUSE bug 1120956</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214622">SUSE bug 1214622</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825972" comment="evince-3.28.2-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825973" comment="evince-browser-plugin-3.28.2-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825974" comment="evince-devel-3.28.2-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825975" comment="evince-dvi-3.28.2-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825976" comment="evince-libs-3.28.2-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825977" comment="evince-nautilus-3.28.2-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825978" comment="okular-4.10.5-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825979" comment="okular-devel-4.10.5-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825980" comment="okular-libs-4.10.5-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825981" comment="okular-part-4.10.5-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825982" comment="poppler-0.26.5-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825983" comment="poppler-cpp-0.26.5-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825984" comment="poppler-cpp-devel-0.26.5-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825985" comment="poppler-demos-0.26.5-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825986" comment="poppler-devel-0.26.5-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825987" comment="poppler-glib-0.26.5-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825988" comment="poppler-glib-devel-0.26.5-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825989" comment="poppler-qt-0.26.5-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825990" comment="poppler-qt-devel-0.26.5-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825991" comment="poppler-utils-0.26.5-38.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820676" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20676</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20676" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20676" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20676" ref_url="https://www.suse.com/security/cve/CVE-2018-20676" source="SUSE CVE"/>
    <description>
    In Bootstrap before 3.4.0, XSS is possible in the tooltip data-viewport attribute.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-20676/">CVE-2018-20676 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20676">CVE-2018-20676 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828282" comment="ipa-client-4.6.8-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828283" comment="ipa-client-common-4.6.8-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828284" comment="ipa-common-4.6.8-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828285" comment="ipa-python-compat-4.6.8-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828286" comment="ipa-server-4.6.8-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828287" comment="ipa-server-common-4.6.8-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828288" comment="ipa-server-dns-4.6.8-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828289" comment="ipa-server-trust-ad-4.6.8-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828290" comment="python2-ipaclient-4.6.8-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828291" comment="python2-ipalib-4.6.8-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828292" comment="python2-ipaserver-4.6.8-5.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820677" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20677</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20677" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20677" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20677" ref_url="https://www.suse.com/security/cve/CVE-2018-20677" source="SUSE CVE"/>
    <description>
    In Bootstrap before 3.4.0, XSS is possible in the affix configuration target property.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-20677/">CVE-2018-20677 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20677">CVE-2018-20677 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828282" comment="ipa-client-4.6.8-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828283" comment="ipa-client-common-4.6.8-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828284" comment="ipa-common-4.6.8-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828285" comment="ipa-python-compat-4.6.8-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828286" comment="ipa-server-4.6.8-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828287" comment="ipa-server-common-4.6.8-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828288" comment="ipa-server-dns-4.6.8-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828289" comment="ipa-server-trust-ad-4.6.8-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828290" comment="python2-ipaclient-4.6.8-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828291" comment="python2-ipalib-4.6.8-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828292" comment="python2-ipaserver-4.6.8-5.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820685" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20685</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20685" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20685" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20685" ref_url="https://www.suse.com/security/cve/CVE-2018-20685" source="SUSE CVE"/>
		<reference ref_id="ESSA-2025:2889" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0125-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13931-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005049.html" source="SUSE-SU"/>
		<reference ref_id="TID000019375" ref_url="https://www.suse.com/support/kb/doc/?id=000019375" source="SUSE-SU"/>
		<reference ref_id="TID7023647" ref_url="https://www.suse.com/support/kb/doc/?id=7023647" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0091-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2MNLMLCJQ4RNIHX2VZUWA6ZK3G7XMXKU/#2MNLMLCJQ4RNIHX2VZUWA6ZK3G7XMXKU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0093-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GPIFICMWUTG4MCRMGPSQ5GUJZRXYKKPF/#GPIFICMWUTG4MCRMGPSQ5GUJZRXYKKPF" source="SUSE-SU"/>
    <description>
    In OpenSSH 7.9, scp.c in the scp client allows remote SSH servers to bypass intended access restrictions via the filename of . or an empty filename. The impact is modifying the permissions of the target directory on the client side.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-04-24"/>
	<updated date="2025-12-19"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20685/">CVE-2018-20685 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20685">CVE-2018-20685 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1121571">SUSE bug 1121571</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123220">SUSE bug 1123220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131109">SUSE bug 1131109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134932">SUSE bug 1134932</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009976140" comment="openssh-7.4p1-23.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976141" comment="openssh-askpass-7.4p1-23.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976142" comment="openssh-cavs-7.4p1-23.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976143" comment="openssh-clients-7.4p1-23.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976144" comment="openssh-keycat-7.4p1-23.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976145" comment="openssh-ldap-7.4p1-23.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976146" comment="openssh-server-7.4p1-23.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976147" comment="openssh-server-sysvinit-7.4p1-23.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976148" comment="pam_ssh_agent_auth-0.10.3-2.23.el7_9.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20836</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20836" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20836" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20836" ref_url="https://www.suse.com/security/cve/CVE-2018-20836" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1823-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1851-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20191851-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1852-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20191852-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006756.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1716-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HJXAHNWJ4IAQN4V6E2PEXAAFMQPYBBPT/#HJXAHNWJ4IAQN4V6E2PEXAAFMQPYBBPT" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1757-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PJTYGHQOYDY2SFDAAFYO3E3URRCWKEUQ/#PJTYGHQOYDY2SFDAAFYO3E3URRCWKEUQ" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 4.20. There is a race condition in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c, leading to a use-after-free.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-20836/">CVE-2018-20836 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20836">CVE-2018-20836 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1134395">SUSE bug 1134395</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828543" comment="bpftool-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828544" comment="kernel-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828545" comment="kernel-abi-whitelists-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828546" comment="kernel-debug-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828549" comment="kernel-doc-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828550" comment="kernel-headers-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828551" comment="kernel-tools-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828552" comment="kernel-tools-libs-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828554" comment="perf-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828555" comment="python-perf-3.10.0-1160.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820843" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20843</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20843" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20843" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20843" ref_url="https://www.suse.com/security/cve/CVE-2018-20843" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005700.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1777-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KU4GXTAKQFS5PA6PCLDQBJZL3QVIVCA2/#KU4GXTAKQFS5PA6PCLDQBJZL3QVIVCA2" source="SUSE-SU"/>
    <description>
    In libexpat in Expat before 2.2.7, XML input including XML names that contain a large number of colons could make the XML parser consume a high amount of RAM and CPU resources while processing (enough to be usable for denial-of-service attacks).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20843/">CVE-2018-20843 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20843">CVE-2018-20843 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1139937">SUSE bug 1139937</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828306" comment="expat-2.1.0-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828307" comment="expat-devel-2.1.0-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828308" comment="expat-static-2.1.0-12.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820852" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20852</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20852" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20852" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20852" ref_url="https://www.suse.com/security/cve/CVE-2018-20852" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005811.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007449.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1988-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FN4KSSOYAZVKWJ6LVNFARMICI7FNMU4U/#FN4KSSOYAZVKWJ6LVNFARMICI7FNMU4U" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1989-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QVPJ24WT4VQT4UAT45QHBIGS74L2XEU7/#QVPJ24WT4VQT4UAT45QHBIGS74L2XEU7" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0086-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SRKGGFVSV7DDWCMAOSO6E3F66U2CF5XR/" source="SUSE-SU"/>
    <description>
    http.cookiejar.DefaultPolicy.domain_return_ok in Lib/http/cookiejar.py in Python before 3.7.3 does not correctly validate the domain: it can be tricked into sending existing cookies to the wrong server. An attacker may abuse this flaw by using a server with a hostname that has another valid hostname as a suffix (e.g., pythonicexample.com to steal cookies for example.com). When a program uses http.cookiejar.DefaultPolicy and tries to do an HTTP connection to an attacker-controlled server, existing cookies can be leaked to the attacker. This affects 2.x through 2.7.16, 3.x before 3.4.10, 3.5.x before 3.5.7, 3.6.x before 3.6.9, and 3.7.x before 3.7.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20852/">CVE-2018-20852 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20852">CVE-2018-20852 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1141853">SUSE bug 1141853</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827805" comment="python-2.7.5-88.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827806" comment="python-debug-2.7.5-88.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827807" comment="python-devel-2.7.5-88.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827808" comment="python-libs-2.7.5-88.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827809" comment="python-test-2.7.5-88.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827810" comment="python-tools-2.7.5-88.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827812" comment="python3-3.6.8-13.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827813" comment="python3-debug-3.6.8-13.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827814" comment="python3-devel-3.6.8-13.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827815" comment="python3-idle-3.6.8-13.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827816" comment="python3-libs-3.6.8-13.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827817" comment="python3-test-3.6.8-13.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827818" comment="python3-tkinter-3.6.8-13.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827811" comment="tkinter-2.7.5-88.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820856" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20856</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20856" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20856" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20856" ref_url="https://www.suse.com/security/cve/CVE-2018-20856" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006243.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 4.18.7. In block/blk-core.c, there is an __blk_drain_queue() use-after-free because a certain error case is mishandled.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20856/">CVE-2018-20856 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20856">CVE-2018-20856 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1143048">SUSE bug 1143048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156331">SUSE bug 1156331</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826650" comment="bpftool-3.10.0-1062.4.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826651" comment="kernel-3.10.0-1062.4.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826652" comment="kernel-abi-whitelists-3.10.0-1062.4.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826653" comment="kernel-debug-3.10.0-1062.4.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826656" comment="kernel-doc-3.10.0-1062.4.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826657" comment="kernel-headers-3.10.0-1062.4.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826658" comment="kernel-tools-3.10.0-1062.4.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826659" comment="kernel-tools-libs-3.10.0-1062.4.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826661" comment="perf-3.10.0-1062.4.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826662" comment="python-perf-3.10.0-1062.4.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820969" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20969</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20969" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20969" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20969" ref_url="https://www.suse.com/security/cve/CVE-2018-20969" source="SUSE CVE"/>
    <description>
    do_ed_script in pch.c in GNU patch through 2.7.6 does not block strings beginning with a ! character. NOTE: this is the same commit as for CVE-2019-13638, but the ! syntax is specific to ed, and is unrelated to a shell metacharacter.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-20969/">CVE-2018-20969 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20969">CVE-2018-20969 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1146398">SUSE bug 1146398</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826649" comment="patch-2.7.1-12.el7_7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201821009" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-21009</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-21009" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-21009" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-21009" ref_url="https://www.suse.com/security/cve/CVE-2018-21009" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:2838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2906-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2907-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030446.html" source="SUSE-SU"/>
    <description>
    Poppler before 0.66.0 has an integer overflow in Parser::makeStream in Parser.cc.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-21009/">CVE-2018-21009 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-21009">CVE-2018-21009 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1149635">SUSE bug 1149635</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827681" comment="evince-3.28.2-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827682" comment="evince-browser-plugin-3.28.2-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827683" comment="evince-devel-3.28.2-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827684" comment="evince-dvi-3.28.2-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827685" comment="evince-libs-3.28.2-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827686" comment="evince-nautilus-3.28.2-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827687" comment="poppler-0.26.5-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827688" comment="poppler-cpp-0.26.5-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827689" comment="poppler-cpp-devel-0.26.5-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827690" comment="poppler-demos-0.26.5-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827691" comment="poppler-devel-0.26.5-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827692" comment="poppler-glib-0.26.5-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827693" comment="poppler-glib-devel-0.26.5-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827694" comment="poppler-qt-0.26.5-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827695" comment="poppler-qt-devel-0.26.5-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827696" comment="poppler-utils-0.26.5-42.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201825011" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-25011</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-25011" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25011" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-25011" ref_url="https://www.suse.com/security/cve/CVE-2018-25011" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008936.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1860-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4ZIJ3ZK5FGNGJN6E65XZKMQPSQ3RKNVG/" source="SUSE-SU"/>
    <description>
    A heap-based buffer overflow was found in libwebp in versions before 1.0.1 in PutLE16().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-25011/">CVE-2018-25011 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-25011">CVE-2018-25011 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1186247">SUSE bug 1186247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829121" comment="libwebp-0.3.0-10.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829122" comment="libwebp-devel-0.3.0-10.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829123" comment="libwebp-java-0.3.0-10.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829124" comment="libwebp-tools-0.3.0-10.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829182" comment="qt5-qtimageformats-5.9.7-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829183" comment="qt5-qtimageformats-doc-5.9.7-2.el7_9 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829182" comment="qt5-qtimageformats-5.9.7-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829183" comment="qt5-qtimageformats-doc-5.9.7-2.el7_9 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201825014" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-25014</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-25014" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25014" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-25014" ref_url="https://www.suse.com/security/cve/CVE-2018-25014" source="SUSE CVE"/>
    <description>
    A use of uninitialized value was found in libwebp in versions before 1.0.1 in ReadSymbol().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-25014/">CVE-2018-25014 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-25014">CVE-2018-25014 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1186250">SUSE bug 1186250</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829182" comment="qt5-qtimageformats-5.9.7-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829183" comment="qt5-qtimageformats-doc-5.9.7-2.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201825032" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-25032</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-25032" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-25032" ref_url="https://www.suse.com/security/cve/CVE-2018-25032" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-May/023165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1151-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1356-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011327.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010595.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010596.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:457-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:492-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010635.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010641.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010642.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010644.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:590-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:592-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:718-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:874-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1023-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1061-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010586.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3225-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012197.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:10126-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3URMJJJ2MKM4FNDYFMSSIEJDTNENDZRU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1061-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q3IAWI5KYTN2PXEFZY7OU7STBINLC3H6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14656-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PA2YASY5GVVBWOWVKGZPCNZJI5WMPXEX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14697-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U5YNW74OL2W7SH2XTAVN5TODNFIVFL3Y/" source="SUSE-SU"/>
    <description>
    zlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-25032/">CVE-2018-25032 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-25032">CVE-2018-25032 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1197459">SUSE bug 1197459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197893">SUSE bug 1197893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198667">SUSE bug 1198667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199104">SUSE bug 1199104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200049">SUSE bug 1200049</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201732">SUSE bug 1201732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202688">SUSE bug 1202688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224427">SUSE bug 1224427</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829673" comment="minizip-1.2.7-20.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829674" comment="minizip-devel-1.2.7-20.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829675" comment="zlib-1.2.7-20.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829676" comment="zlib-devel-1.2.7-20.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829677" comment="zlib-static-1.2.7-20.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182562" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2562</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2562" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2562" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2562" ref_url="https://www.suse.com/security/cve/CVE-2018-2562" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004235.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0223-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N63QDAZ62SQMYAFGJFRXU5HS26COSGB4/#N63QDAZ62SQMYAFGJFRXU5HS26COSGB4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0730-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KBZAZ4DT2DBACWY5V2A3RPBMMF3GJLCZ/#KBZAZ4DT2DBACWY5V2A3RPBMMF3GJLCZ" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server : Partition). Supported versions that are affected are 5.5.58 and prior, 5.6.38 and prior and 5.7.19 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 7.1 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-02-22"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-2562/">CVE-2018-2562 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2562">CVE-2018-2562 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1076369">SUSE bug 1076369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078431">SUSE bug 1078431</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824516" comment="mariadb-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824517" comment="mariadb-bench-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824518" comment="mariadb-devel-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824519" comment="mariadb-embedded-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824520" comment="mariadb-embedded-devel-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824521" comment="mariadb-libs-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824522" comment="mariadb-server-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824523" comment="mariadb-test-5.5.60-1.el7_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182579" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2579</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2579" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2579" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2579" ref_url="https://www.suse.com/security/cve/CVE-2018-2579" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003790.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003824.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0679-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MXACDB2PT3RZK4CLJ623FDWQJQT37HYP/#MXACDB2PT3RZK4CLJ623FDWQJQT37HYP" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0684-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FU6N5SQRH7FLNGTR5RRCBJDFJTOLN7AA/#FU6N5SQRH7FLNGTR5RRCBJDFJTOLN7AA" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-02-22"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2579/">CVE-2018-2579 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2579">CVE-2018-2579 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1076366">SUSE bug 1076366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082810">SUSE bug 1082810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823987" comment="java-1.7.0-openjdk-1.7.0.171-2.6.13.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823988" comment="java-1.7.0-openjdk-accessibility-1.7.0.171-2.6.13.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823989" comment="java-1.7.0-openjdk-demo-1.7.0.171-2.6.13.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823990" comment="java-1.7.0-openjdk-devel-1.7.0.171-2.6.13.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823991" comment="java-1.7.0-openjdk-headless-1.7.0.171-2.6.13.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823992" comment="java-1.7.0-openjdk-javadoc-1.7.0.171-2.6.13.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823993" comment="java-1.7.0-openjdk-src-1.7.0.171-2.6.13.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823921" comment="java-1.8.0-openjdk-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823922" comment="java-1.8.0-openjdk-accessibility-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823923" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823924" comment="java-1.8.0-openjdk-debug-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823925" comment="java-1.8.0-openjdk-demo-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823926" comment="java-1.8.0-openjdk-demo-debug-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823927" comment="java-1.8.0-openjdk-devel-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823928" comment="java-1.8.0-openjdk-devel-debug-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823929" comment="java-1.8.0-openjdk-headless-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823930" comment="java-1.8.0-openjdk-headless-debug-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823931" comment="java-1.8.0-openjdk-javadoc-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823932" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823933" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823934" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823935" comment="java-1.8.0-openjdk-src-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823936" comment="java-1.8.0-openjdk-src-debug-1.8.0.161-0.b14.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182582" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2582</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2582" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2582" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2582" ref_url="https://www.suse.com/security/cve/CVE-2018-2582" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003790.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003824.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0679-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MXACDB2PT3RZK4CLJ623FDWQJQT37HYP/#MXACDB2PT3RZK4CLJ623FDWQJQT37HYP" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Hotspot). Supported versions that are affected are Java SE: 8u152 and 9.0.1; Java SE Embedded: 8u151. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 6.5 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2582/">CVE-2018-2582 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2582">CVE-2018-2582 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1076366">SUSE bug 1076366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082810">SUSE bug 1082810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823921" comment="java-1.8.0-openjdk-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823922" comment="java-1.8.0-openjdk-accessibility-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823923" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823924" comment="java-1.8.0-openjdk-debug-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823925" comment="java-1.8.0-openjdk-demo-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823926" comment="java-1.8.0-openjdk-demo-debug-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823927" comment="java-1.8.0-openjdk-devel-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823928" comment="java-1.8.0-openjdk-devel-debug-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823929" comment="java-1.8.0-openjdk-headless-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823930" comment="java-1.8.0-openjdk-headless-debug-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823931" comment="java-1.8.0-openjdk-javadoc-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823932" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823933" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823934" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823935" comment="java-1.8.0-openjdk-src-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823936" comment="java-1.8.0-openjdk-src-debug-1.8.0.161-0.b14.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182588" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2588</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2588" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2588" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2588" ref_url="https://www.suse.com/security/cve/CVE-2018-2588" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003790.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003824.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0679-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MXACDB2PT3RZK4CLJ623FDWQJQT37HYP/#MXACDB2PT3RZK4CLJ623FDWQJQT37HYP" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0684-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FU6N5SQRH7FLNGTR5RRCBJDFJTOLN7AA/#FU6N5SQRH7FLNGTR5RRCBJDFJTOLN7AA" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: LDAP). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2588/">CVE-2018-2588 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2588">CVE-2018-2588 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1076366">SUSE bug 1076366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082810">SUSE bug 1082810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823987" comment="java-1.7.0-openjdk-1.7.0.171-2.6.13.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823988" comment="java-1.7.0-openjdk-accessibility-1.7.0.171-2.6.13.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823989" comment="java-1.7.0-openjdk-demo-1.7.0.171-2.6.13.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823990" comment="java-1.7.0-openjdk-devel-1.7.0.171-2.6.13.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823991" comment="java-1.7.0-openjdk-headless-1.7.0.171-2.6.13.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823992" comment="java-1.7.0-openjdk-javadoc-1.7.0.171-2.6.13.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823993" comment="java-1.7.0-openjdk-src-1.7.0.171-2.6.13.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823921" comment="java-1.8.0-openjdk-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823922" comment="java-1.8.0-openjdk-accessibility-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823923" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823924" comment="java-1.8.0-openjdk-debug-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823925" comment="java-1.8.0-openjdk-demo-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823926" comment="java-1.8.0-openjdk-demo-debug-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823927" comment="java-1.8.0-openjdk-devel-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823928" comment="java-1.8.0-openjdk-devel-debug-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823929" comment="java-1.8.0-openjdk-headless-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823930" comment="java-1.8.0-openjdk-headless-debug-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823931" comment="java-1.8.0-openjdk-javadoc-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823932" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823933" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823934" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823935" comment="java-1.8.0-openjdk-src-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823936" comment="java-1.8.0-openjdk-src-debug-1.8.0.161-0.b14.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182599" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2599</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2599" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2599" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2599" ref_url="https://www.suse.com/security/cve/CVE-2018-2599" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003790.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003824.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0679-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MXACDB2PT3RZK4CLJ623FDWQJQT37HYP/#MXACDB2PT3RZK4CLJ623FDWQJQT37HYP" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0684-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FU6N5SQRH7FLNGTR5RRCBJDFJTOLN7AA/#FU6N5SQRH7FLNGTR5RRCBJDFJTOLN7AA" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JNDI). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded, JRockit accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 4.8 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-2599/">CVE-2018-2599 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2599">CVE-2018-2599 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1076366">SUSE bug 1076366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082810">SUSE bug 1082810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823987" comment="java-1.7.0-openjdk-1.7.0.171-2.6.13.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823988" comment="java-1.7.0-openjdk-accessibility-1.7.0.171-2.6.13.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823989" comment="java-1.7.0-openjdk-demo-1.7.0.171-2.6.13.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823990" comment="java-1.7.0-openjdk-devel-1.7.0.171-2.6.13.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823991" comment="java-1.7.0-openjdk-headless-1.7.0.171-2.6.13.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823992" comment="java-1.7.0-openjdk-javadoc-1.7.0.171-2.6.13.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823993" comment="java-1.7.0-openjdk-src-1.7.0.171-2.6.13.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823921" comment="java-1.8.0-openjdk-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823922" comment="java-1.8.0-openjdk-accessibility-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823923" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823924" comment="java-1.8.0-openjdk-debug-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823925" comment="java-1.8.0-openjdk-demo-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823926" comment="java-1.8.0-openjdk-demo-debug-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823927" comment="java-1.8.0-openjdk-devel-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823928" comment="java-1.8.0-openjdk-devel-debug-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823929" comment="java-1.8.0-openjdk-headless-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823930" comment="java-1.8.0-openjdk-headless-debug-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823931" comment="java-1.8.0-openjdk-javadoc-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823932" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823933" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823934" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823935" comment="java-1.8.0-openjdk-src-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823936" comment="java-1.8.0-openjdk-src-debug-1.8.0.161-0.b14.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182602" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2602</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2602" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2602" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2602" ref_url="https://www.suse.com/security/cve/CVE-2018-2602" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003790.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003824.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0679-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MXACDB2PT3RZK4CLJ623FDWQJQT37HYP/#MXACDB2PT3RZK4CLJ623FDWQJQT37HYP" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0684-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FU6N5SQRH7FLNGTR5RRCBJDFJTOLN7AA/#FU6N5SQRH7FLNGTR5RRCBJDFJTOLN7AA" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: I18n). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Java SE, Java SE Embedded executes to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.5/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-2602/">CVE-2018-2602 at SUSE</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2602">CVE-2018-2602 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1076366">SUSE bug 1076366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082810">SUSE bug 1082810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823987" comment="java-1.7.0-openjdk-1.7.0.171-2.6.13.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823988" comment="java-1.7.0-openjdk-accessibility-1.7.0.171-2.6.13.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823989" comment="java-1.7.0-openjdk-demo-1.7.0.171-2.6.13.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823990" comment="java-1.7.0-openjdk-devel-1.7.0.171-2.6.13.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823991" comment="java-1.7.0-openjdk-headless-1.7.0.171-2.6.13.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823992" comment="java-1.7.0-openjdk-javadoc-1.7.0.171-2.6.13.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823993" comment="java-1.7.0-openjdk-src-1.7.0.171-2.6.13.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823921" comment="java-1.8.0-openjdk-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823922" comment="java-1.8.0-openjdk-accessibility-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823923" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823924" comment="java-1.8.0-openjdk-debug-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823925" comment="java-1.8.0-openjdk-demo-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823926" comment="java-1.8.0-openjdk-demo-debug-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823927" comment="java-1.8.0-openjdk-devel-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823928" comment="java-1.8.0-openjdk-devel-debug-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823929" comment="java-1.8.0-openjdk-headless-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823930" comment="java-1.8.0-openjdk-headless-debug-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823931" comment="java-1.8.0-openjdk-javadoc-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823932" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823933" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823934" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823935" comment="java-1.8.0-openjdk-src-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823936" comment="java-1.8.0-openjdk-src-debug-1.8.0.161-0.b14.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182603" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2603</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2603" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2603" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2603" ref_url="https://www.suse.com/security/cve/CVE-2018-2603" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003790.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003824.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0679-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MXACDB2PT3RZK4CLJ623FDWQJQT37HYP/#MXACDB2PT3RZK4CLJ623FDWQJQT37HYP" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0684-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FU6N5SQRH7FLNGTR5RRCBJDFJTOLN7AA/#FU6N5SQRH7FLNGTR5RRCBJDFJTOLN7AA" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2603/">CVE-2018-2603 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2603">CVE-2018-2603 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1076366">SUSE bug 1076366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082810">SUSE bug 1082810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823987" comment="java-1.7.0-openjdk-1.7.0.171-2.6.13.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823988" comment="java-1.7.0-openjdk-accessibility-1.7.0.171-2.6.13.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823989" comment="java-1.7.0-openjdk-demo-1.7.0.171-2.6.13.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823990" comment="java-1.7.0-openjdk-devel-1.7.0.171-2.6.13.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823991" comment="java-1.7.0-openjdk-headless-1.7.0.171-2.6.13.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823992" comment="java-1.7.0-openjdk-javadoc-1.7.0.171-2.6.13.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823993" comment="java-1.7.0-openjdk-src-1.7.0.171-2.6.13.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823921" comment="java-1.8.0-openjdk-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823922" comment="java-1.8.0-openjdk-accessibility-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823923" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823924" comment="java-1.8.0-openjdk-debug-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823925" comment="java-1.8.0-openjdk-demo-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823926" comment="java-1.8.0-openjdk-demo-debug-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823927" comment="java-1.8.0-openjdk-devel-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823928" comment="java-1.8.0-openjdk-devel-debug-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823929" comment="java-1.8.0-openjdk-headless-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823930" comment="java-1.8.0-openjdk-headless-debug-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823931" comment="java-1.8.0-openjdk-javadoc-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823932" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823933" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823934" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823935" comment="java-1.8.0-openjdk-src-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823936" comment="java-1.8.0-openjdk-src-debug-1.8.0.161-0.b14.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182618" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2618</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2618" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2618" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2618" ref_url="https://www.suse.com/security/cve/CVE-2018-2618" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003790.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003824.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0679-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MXACDB2PT3RZK4CLJ623FDWQJQT37HYP/#MXACDB2PT3RZK4CLJ623FDWQJQT37HYP" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0684-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FU6N5SQRH7FLNGTR5RRCBJDFJTOLN7AA/#FU6N5SQRH7FLNGTR5RRCBJDFJTOLN7AA" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JCE). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2618/">CVE-2018-2618 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2618">CVE-2018-2618 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1076366">SUSE bug 1076366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082810">SUSE bug 1082810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823987" comment="java-1.7.0-openjdk-1.7.0.171-2.6.13.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823988" comment="java-1.7.0-openjdk-accessibility-1.7.0.171-2.6.13.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823989" comment="java-1.7.0-openjdk-demo-1.7.0.171-2.6.13.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823990" comment="java-1.7.0-openjdk-devel-1.7.0.171-2.6.13.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823991" comment="java-1.7.0-openjdk-headless-1.7.0.171-2.6.13.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823992" comment="java-1.7.0-openjdk-javadoc-1.7.0.171-2.6.13.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823993" comment="java-1.7.0-openjdk-src-1.7.0.171-2.6.13.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823921" comment="java-1.8.0-openjdk-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823922" comment="java-1.8.0-openjdk-accessibility-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823923" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823924" comment="java-1.8.0-openjdk-debug-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823925" comment="java-1.8.0-openjdk-demo-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823926" comment="java-1.8.0-openjdk-demo-debug-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823927" comment="java-1.8.0-openjdk-devel-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823928" comment="java-1.8.0-openjdk-devel-debug-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823929" comment="java-1.8.0-openjdk-headless-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823930" comment="java-1.8.0-openjdk-headless-debug-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823931" comment="java-1.8.0-openjdk-javadoc-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823932" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823933" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823934" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823935" comment="java-1.8.0-openjdk-src-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823936" comment="java-1.8.0-openjdk-src-debug-1.8.0.161-0.b14.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182622" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2622</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2622" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2622" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2622" ref_url="https://www.suse.com/security/cve/CVE-2018-2622" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004235.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0223-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N63QDAZ62SQMYAFGJFRXU5HS26COSGB4/#N63QDAZ62SQMYAFGJFRXU5HS26COSGB4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0730-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KBZAZ4DT2DBACWY5V2A3RPBMMF3GJLCZ/#KBZAZ4DT2DBACWY5V2A3RPBMMF3GJLCZ" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.58 and prior, 5.6.38 and prior and 5.7.20 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2622/">CVE-2018-2622 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2622">CVE-2018-2622 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1076369">SUSE bug 1076369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078431">SUSE bug 1078431</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824516" comment="mariadb-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824517" comment="mariadb-bench-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824518" comment="mariadb-devel-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824519" comment="mariadb-embedded-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824520" comment="mariadb-embedded-devel-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824521" comment="mariadb-libs-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824522" comment="mariadb-server-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824523" comment="mariadb-test-5.5.60-1.el7_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182629" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2629</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2629" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2629" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2629" ref_url="https://www.suse.com/security/cve/CVE-2018-2629" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003806.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0679-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MXACDB2PT3RZK4CLJ623FDWQJQT37HYP/#MXACDB2PT3RZK4CLJ623FDWQJQT37HYP" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0684-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FU6N5SQRH7FLNGTR5RRCBJDFJTOLN7AA/#FU6N5SQRH7FLNGTR5RRCBJDFJTOLN7AA" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JGSS). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2629/">CVE-2018-2629 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2629">CVE-2018-2629 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1076366">SUSE bug 1076366</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823987" comment="java-1.7.0-openjdk-1.7.0.171-2.6.13.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823988" comment="java-1.7.0-openjdk-accessibility-1.7.0.171-2.6.13.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823989" comment="java-1.7.0-openjdk-demo-1.7.0.171-2.6.13.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823990" comment="java-1.7.0-openjdk-devel-1.7.0.171-2.6.13.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823991" comment="java-1.7.0-openjdk-headless-1.7.0.171-2.6.13.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823992" comment="java-1.7.0-openjdk-javadoc-1.7.0.171-2.6.13.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823993" comment="java-1.7.0-openjdk-src-1.7.0.171-2.6.13.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823921" comment="java-1.8.0-openjdk-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823922" comment="java-1.8.0-openjdk-accessibility-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823923" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823924" comment="java-1.8.0-openjdk-debug-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823925" comment="java-1.8.0-openjdk-demo-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823926" comment="java-1.8.0-openjdk-demo-debug-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823927" comment="java-1.8.0-openjdk-devel-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823928" comment="java-1.8.0-openjdk-devel-debug-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823929" comment="java-1.8.0-openjdk-headless-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823930" comment="java-1.8.0-openjdk-headless-debug-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823931" comment="java-1.8.0-openjdk-javadoc-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823932" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823933" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823934" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823935" comment="java-1.8.0-openjdk-src-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823936" comment="java-1.8.0-openjdk-src-debug-1.8.0.161-0.b14.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182633" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2633</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2633" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2633" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2633" ref_url="https://www.suse.com/security/cve/CVE-2018-2633" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003790.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003824.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0679-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MXACDB2PT3RZK4CLJ623FDWQJQT37HYP/#MXACDB2PT3RZK4CLJ623FDWQJQT37HYP" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0684-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FU6N5SQRH7FLNGTR5RRCBJDFJTOLN7AA/#FU6N5SQRH7FLNGTR5RRCBJDFJTOLN7AA" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JNDI). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-02-22"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2633/">CVE-2018-2633 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2633">CVE-2018-2633 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1076366">SUSE bug 1076366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082810">SUSE bug 1082810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823987" comment="java-1.7.0-openjdk-1.7.0.171-2.6.13.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823988" comment="java-1.7.0-openjdk-accessibility-1.7.0.171-2.6.13.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823989" comment="java-1.7.0-openjdk-demo-1.7.0.171-2.6.13.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823990" comment="java-1.7.0-openjdk-devel-1.7.0.171-2.6.13.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823991" comment="java-1.7.0-openjdk-headless-1.7.0.171-2.6.13.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823992" comment="java-1.7.0-openjdk-javadoc-1.7.0.171-2.6.13.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823993" comment="java-1.7.0-openjdk-src-1.7.0.171-2.6.13.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823921" comment="java-1.8.0-openjdk-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823922" comment="java-1.8.0-openjdk-accessibility-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823923" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823924" comment="java-1.8.0-openjdk-debug-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823925" comment="java-1.8.0-openjdk-demo-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823926" comment="java-1.8.0-openjdk-demo-debug-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823927" comment="java-1.8.0-openjdk-devel-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823928" comment="java-1.8.0-openjdk-devel-debug-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823929" comment="java-1.8.0-openjdk-headless-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823930" comment="java-1.8.0-openjdk-headless-debug-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823931" comment="java-1.8.0-openjdk-javadoc-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823932" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823933" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823934" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823935" comment="java-1.8.0-openjdk-src-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823936" comment="java-1.8.0-openjdk-src-debug-1.8.0.161-0.b14.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182634" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2634</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2634" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2634" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2634" ref_url="https://www.suse.com/security/cve/CVE-2018-2634" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003790.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003824.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0679-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MXACDB2PT3RZK4CLJ623FDWQJQT37HYP/#MXACDB2PT3RZK4CLJ623FDWQJQT37HYP" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0684-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FU6N5SQRH7FLNGTR5RRCBJDFJTOLN7AA/#FU6N5SQRH7FLNGTR5RRCBJDFJTOLN7AA" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JGSS). Supported versions that are affected are Java SE: 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. While the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 6.8 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2634/">CVE-2018-2634 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2634">CVE-2018-2634 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1076366">SUSE bug 1076366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082810">SUSE bug 1082810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823987" comment="java-1.7.0-openjdk-1.7.0.171-2.6.13.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823988" comment="java-1.7.0-openjdk-accessibility-1.7.0.171-2.6.13.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823989" comment="java-1.7.0-openjdk-demo-1.7.0.171-2.6.13.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823990" comment="java-1.7.0-openjdk-devel-1.7.0.171-2.6.13.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823991" comment="java-1.7.0-openjdk-headless-1.7.0.171-2.6.13.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823992" comment="java-1.7.0-openjdk-javadoc-1.7.0.171-2.6.13.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823993" comment="java-1.7.0-openjdk-src-1.7.0.171-2.6.13.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823921" comment="java-1.8.0-openjdk-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823922" comment="java-1.8.0-openjdk-accessibility-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823923" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823924" comment="java-1.8.0-openjdk-debug-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823925" comment="java-1.8.0-openjdk-demo-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823926" comment="java-1.8.0-openjdk-demo-debug-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823927" comment="java-1.8.0-openjdk-devel-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823928" comment="java-1.8.0-openjdk-devel-debug-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823929" comment="java-1.8.0-openjdk-headless-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823930" comment="java-1.8.0-openjdk-headless-debug-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823931" comment="java-1.8.0-openjdk-javadoc-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823932" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823933" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823934" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823935" comment="java-1.8.0-openjdk-src-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823936" comment="java-1.8.0-openjdk-src-debug-1.8.0.161-0.b14.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182637" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2637</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2637" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2637" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2637" ref_url="https://www.suse.com/security/cve/CVE-2018-2637" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003790.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003824.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0679-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MXACDB2PT3RZK4CLJ623FDWQJQT37HYP/#MXACDB2PT3RZK4CLJ623FDWQJQT37HYP" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0684-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FU6N5SQRH7FLNGTR5RRCBJDFJTOLN7AA/#FU6N5SQRH7FLNGTR5RRCBJDFJTOLN7AA" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JMX). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, JRockit accessible data as well as unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 7.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-02-23"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2637/">CVE-2018-2637 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2637">CVE-2018-2637 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1076366">SUSE bug 1076366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082810">SUSE bug 1082810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823987" comment="java-1.7.0-openjdk-1.7.0.171-2.6.13.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823988" comment="java-1.7.0-openjdk-accessibility-1.7.0.171-2.6.13.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823989" comment="java-1.7.0-openjdk-demo-1.7.0.171-2.6.13.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823990" comment="java-1.7.0-openjdk-devel-1.7.0.171-2.6.13.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823991" comment="java-1.7.0-openjdk-headless-1.7.0.171-2.6.13.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823992" comment="java-1.7.0-openjdk-javadoc-1.7.0.171-2.6.13.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823993" comment="java-1.7.0-openjdk-src-1.7.0.171-2.6.13.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823921" comment="java-1.8.0-openjdk-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823922" comment="java-1.8.0-openjdk-accessibility-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823923" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823924" comment="java-1.8.0-openjdk-debug-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823925" comment="java-1.8.0-openjdk-demo-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823926" comment="java-1.8.0-openjdk-demo-debug-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823927" comment="java-1.8.0-openjdk-devel-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823928" comment="java-1.8.0-openjdk-devel-debug-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823929" comment="java-1.8.0-openjdk-headless-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823930" comment="java-1.8.0-openjdk-headless-debug-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823931" comment="java-1.8.0-openjdk-javadoc-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823932" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823933" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823934" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823935" comment="java-1.8.0-openjdk-src-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823936" comment="java-1.8.0-openjdk-src-debug-1.8.0.161-0.b14.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2640</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2640" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2640" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2640" ref_url="https://www.suse.com/security/cve/CVE-2018-2640" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004235.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0223-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N63QDAZ62SQMYAFGJFRXU5HS26COSGB4/#N63QDAZ62SQMYAFGJFRXU5HS26COSGB4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0730-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KBZAZ4DT2DBACWY5V2A3RPBMMF3GJLCZ/#KBZAZ4DT2DBACWY5V2A3RPBMMF3GJLCZ" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.58 and prior, 5.6.38 and prior and 5.7.20 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2640/">CVE-2018-2640 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2640">CVE-2018-2640 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1076369">SUSE bug 1076369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078431">SUSE bug 1078431</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824516" comment="mariadb-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824517" comment="mariadb-bench-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824518" comment="mariadb-devel-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824519" comment="mariadb-embedded-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824520" comment="mariadb-embedded-devel-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824521" comment="mariadb-libs-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824522" comment="mariadb-server-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824523" comment="mariadb-test-5.5.60-1.el7_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182641" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2641</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2641" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2641" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2641" ref_url="https://www.suse.com/security/cve/CVE-2018-2641" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003790.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003824.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0679-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MXACDB2PT3RZK4CLJ623FDWQJQT37HYP/#MXACDB2PT3RZK4CLJ623FDWQJQT37HYP" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0684-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FU6N5SQRH7FLNGTR5RRCBJDFJTOLN7AA/#FU6N5SQRH7FLNGTR5RRCBJDFJTOLN7AA" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: AWT). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 6.1 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2641/">CVE-2018-2641 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2641">CVE-2018-2641 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1076366">SUSE bug 1076366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082810">SUSE bug 1082810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823987" comment="java-1.7.0-openjdk-1.7.0.171-2.6.13.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823988" comment="java-1.7.0-openjdk-accessibility-1.7.0.171-2.6.13.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823989" comment="java-1.7.0-openjdk-demo-1.7.0.171-2.6.13.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823990" comment="java-1.7.0-openjdk-devel-1.7.0.171-2.6.13.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823991" comment="java-1.7.0-openjdk-headless-1.7.0.171-2.6.13.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823992" comment="java-1.7.0-openjdk-javadoc-1.7.0.171-2.6.13.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823993" comment="java-1.7.0-openjdk-src-1.7.0.171-2.6.13.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823921" comment="java-1.8.0-openjdk-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823922" comment="java-1.8.0-openjdk-accessibility-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823923" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823924" comment="java-1.8.0-openjdk-debug-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823925" comment="java-1.8.0-openjdk-demo-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823926" comment="java-1.8.0-openjdk-demo-debug-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823927" comment="java-1.8.0-openjdk-devel-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823928" comment="java-1.8.0-openjdk-devel-debug-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823929" comment="java-1.8.0-openjdk-headless-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823930" comment="java-1.8.0-openjdk-headless-debug-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823931" comment="java-1.8.0-openjdk-javadoc-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823932" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823933" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823934" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823935" comment="java-1.8.0-openjdk-src-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823936" comment="java-1.8.0-openjdk-src-debug-1.8.0.161-0.b14.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182663" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2663</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2663" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2663" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2663" ref_url="https://www.suse.com/security/cve/CVE-2018-2663" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003790.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003824.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0679-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MXACDB2PT3RZK4CLJ623FDWQJQT37HYP/#MXACDB2PT3RZK4CLJ623FDWQJQT37HYP" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0684-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FU6N5SQRH7FLNGTR5RRCBJDFJTOLN7AA/#FU6N5SQRH7FLNGTR5RRCBJDFJTOLN7AA" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 4.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2663/">CVE-2018-2663 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2663">CVE-2018-2663 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1076366">SUSE bug 1076366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082810">SUSE bug 1082810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823987" comment="java-1.7.0-openjdk-1.7.0.171-2.6.13.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823988" comment="java-1.7.0-openjdk-accessibility-1.7.0.171-2.6.13.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823989" comment="java-1.7.0-openjdk-demo-1.7.0.171-2.6.13.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823990" comment="java-1.7.0-openjdk-devel-1.7.0.171-2.6.13.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823991" comment="java-1.7.0-openjdk-headless-1.7.0.171-2.6.13.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823992" comment="java-1.7.0-openjdk-javadoc-1.7.0.171-2.6.13.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823993" comment="java-1.7.0-openjdk-src-1.7.0.171-2.6.13.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823921" comment="java-1.8.0-openjdk-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823922" comment="java-1.8.0-openjdk-accessibility-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823923" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823924" comment="java-1.8.0-openjdk-debug-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823925" comment="java-1.8.0-openjdk-demo-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823926" comment="java-1.8.0-openjdk-demo-debug-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823927" comment="java-1.8.0-openjdk-devel-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823928" comment="java-1.8.0-openjdk-devel-debug-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823929" comment="java-1.8.0-openjdk-headless-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823930" comment="java-1.8.0-openjdk-headless-debug-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823931" comment="java-1.8.0-openjdk-javadoc-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823932" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823933" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823934" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823935" comment="java-1.8.0-openjdk-src-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823936" comment="java-1.8.0-openjdk-src-debug-1.8.0.161-0.b14.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182665" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2665</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2665" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2665" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2665" ref_url="https://www.suse.com/security/cve/CVE-2018-2665" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004235.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0223-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N63QDAZ62SQMYAFGJFRXU5HS26COSGB4/#N63QDAZ62SQMYAFGJFRXU5HS26COSGB4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0730-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KBZAZ4DT2DBACWY5V2A3RPBMMF3GJLCZ/#KBZAZ4DT2DBACWY5V2A3RPBMMF3GJLCZ" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.58 and prior, 5.6.38 and prior and 5.7.20 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2665/">CVE-2018-2665 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2665">CVE-2018-2665 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1076369">SUSE bug 1076369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078431">SUSE bug 1078431</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824516" comment="mariadb-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824517" comment="mariadb-bench-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824518" comment="mariadb-devel-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824519" comment="mariadb-embedded-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824520" comment="mariadb-embedded-devel-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824521" comment="mariadb-libs-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824522" comment="mariadb-server-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824523" comment="mariadb-test-5.5.60-1.el7_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182668" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2668</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2668" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2668" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2668" ref_url="https://www.suse.com/security/cve/CVE-2018-2668" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004235.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0223-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N63QDAZ62SQMYAFGJFRXU5HS26COSGB4/#N63QDAZ62SQMYAFGJFRXU5HS26COSGB4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0730-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KBZAZ4DT2DBACWY5V2A3RPBMMF3GJLCZ/#KBZAZ4DT2DBACWY5V2A3RPBMMF3GJLCZ" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.58 and prior, 5.6.38 and prior and 5.7.20 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2668/">CVE-2018-2668 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2668">CVE-2018-2668 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1076369">SUSE bug 1076369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078431">SUSE bug 1078431</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824516" comment="mariadb-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824517" comment="mariadb-bench-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824518" comment="mariadb-devel-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824519" comment="mariadb-embedded-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824520" comment="mariadb-embedded-devel-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824521" comment="mariadb-libs-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824522" comment="mariadb-server-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824523" comment="mariadb-test-5.5.60-1.el7_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182677" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2677</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2677" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2677" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2677" ref_url="https://www.suse.com/security/cve/CVE-2018-2677" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003790.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003824.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0679-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MXACDB2PT3RZK4CLJ623FDWQJQT37HYP/#MXACDB2PT3RZK4CLJ623FDWQJQT37HYP" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0684-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FU6N5SQRH7FLNGTR5RRCBJDFJTOLN7AA/#FU6N5SQRH7FLNGTR5RRCBJDFJTOLN7AA" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: AWT). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2677/">CVE-2018-2677 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2677">CVE-2018-2677 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1076366">SUSE bug 1076366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082810">SUSE bug 1082810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823987" comment="java-1.7.0-openjdk-1.7.0.171-2.6.13.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823988" comment="java-1.7.0-openjdk-accessibility-1.7.0.171-2.6.13.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823989" comment="java-1.7.0-openjdk-demo-1.7.0.171-2.6.13.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823990" comment="java-1.7.0-openjdk-devel-1.7.0.171-2.6.13.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823991" comment="java-1.7.0-openjdk-headless-1.7.0.171-2.6.13.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823992" comment="java-1.7.0-openjdk-javadoc-1.7.0.171-2.6.13.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823993" comment="java-1.7.0-openjdk-src-1.7.0.171-2.6.13.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823921" comment="java-1.8.0-openjdk-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823922" comment="java-1.8.0-openjdk-accessibility-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823923" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823924" comment="java-1.8.0-openjdk-debug-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823925" comment="java-1.8.0-openjdk-demo-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823926" comment="java-1.8.0-openjdk-demo-debug-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823927" comment="java-1.8.0-openjdk-devel-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823928" comment="java-1.8.0-openjdk-devel-debug-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823929" comment="java-1.8.0-openjdk-headless-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823930" comment="java-1.8.0-openjdk-headless-debug-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823931" comment="java-1.8.0-openjdk-javadoc-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823932" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823933" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823934" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823935" comment="java-1.8.0-openjdk-src-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823936" comment="java-1.8.0-openjdk-src-debug-1.8.0.161-0.b14.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182678" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2678</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2678" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2678" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2678" ref_url="https://www.suse.com/security/cve/CVE-2018-2678" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003790.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003824.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0679-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MXACDB2PT3RZK4CLJ623FDWQJQT37HYP/#MXACDB2PT3RZK4CLJ623FDWQJQT37HYP" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0684-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FU6N5SQRH7FLNGTR5RRCBJDFJTOLN7AA/#FU6N5SQRH7FLNGTR5RRCBJDFJTOLN7AA" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JNDI). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 4.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2678/">CVE-2018-2678 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2678">CVE-2018-2678 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1076366">SUSE bug 1076366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082810">SUSE bug 1082810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823987" comment="java-1.7.0-openjdk-1.7.0.171-2.6.13.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823988" comment="java-1.7.0-openjdk-accessibility-1.7.0.171-2.6.13.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823989" comment="java-1.7.0-openjdk-demo-1.7.0.171-2.6.13.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823990" comment="java-1.7.0-openjdk-devel-1.7.0.171-2.6.13.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823991" comment="java-1.7.0-openjdk-headless-1.7.0.171-2.6.13.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823992" comment="java-1.7.0-openjdk-javadoc-1.7.0.171-2.6.13.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823993" comment="java-1.7.0-openjdk-src-1.7.0.171-2.6.13.0.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823921" comment="java-1.8.0-openjdk-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823922" comment="java-1.8.0-openjdk-accessibility-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823923" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823924" comment="java-1.8.0-openjdk-debug-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823925" comment="java-1.8.0-openjdk-demo-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823926" comment="java-1.8.0-openjdk-demo-debug-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823927" comment="java-1.8.0-openjdk-devel-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823928" comment="java-1.8.0-openjdk-devel-debug-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823929" comment="java-1.8.0-openjdk-headless-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823930" comment="java-1.8.0-openjdk-headless-debug-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823931" comment="java-1.8.0-openjdk-javadoc-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823932" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823933" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823934" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823935" comment="java-1.8.0-openjdk-src-1.8.0.161-0.b14.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823936" comment="java-1.8.0-openjdk-src-debug-1.8.0.161-0.b14.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182755" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2755</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2755" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2755" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2755" ref_url="https://www.suse.com/security/cve/CVE-2018-2755" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1781-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004235.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1595-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OF2MUUC2JPOIVEDJ7GRAO76WNAZJHXLB/#OF2MUUC2JPOIVEDJ7GRAO76WNAZJHXLB" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1800-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CK4KTUKBSY5V6VVHVVF3DLHLSJIVBJD4/#CK4KTUKBSY5V6VVHVVF3DLHLSJIVBJD4" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Replication). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in MySQL Server, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of MySQL Server. CVSS 3.0 Base Score 7.7 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-02-22"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2755/">CVE-2018-2755 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2755">CVE-2018-2755 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1089987">SUSE bug 1089987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090518">SUSE bug 1090518</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824516" comment="mariadb-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824517" comment="mariadb-bench-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824518" comment="mariadb-devel-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824519" comment="mariadb-embedded-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824520" comment="mariadb-embedded-devel-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824521" comment="mariadb-libs-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824522" comment="mariadb-server-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824523" comment="mariadb-test-5.5.60-1.el7_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182761" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2761</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2761" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2761" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2761" ref_url="https://www.suse.com/security/cve/CVE-2018-2761" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1781-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004235.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1595-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OF2MUUC2JPOIVEDJ7GRAO76WNAZJHXLB/#OF2MUUC2JPOIVEDJ7GRAO76WNAZJHXLB" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1800-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CK4KTUKBSY5V6VVHVVF3DLHLSJIVBJD4/#CK4KTUKBSY5V6VVHVVF3DLHLSJIVBJD4" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client programs). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 5.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-02-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2761/">CVE-2018-2761 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2761">CVE-2018-2761 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1089987">SUSE bug 1089987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090518">SUSE bug 1090518</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824516" comment="mariadb-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824517" comment="mariadb-bench-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824518" comment="mariadb-devel-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824519" comment="mariadb-embedded-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824520" comment="mariadb-embedded-devel-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824521" comment="mariadb-libs-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824522" comment="mariadb-server-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824523" comment="mariadb-test-5.5.60-1.el7_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182767" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2767</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2767" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2767" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2767" ref_url="https://www.suse.com/security/cve/CVE-2018-2767" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1781-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004235.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1595-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OF2MUUC2JPOIVEDJ7GRAO76WNAZJHXLB/#OF2MUUC2JPOIVEDJ7GRAO76WNAZJHXLB" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1800-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CK4KTUKBSY5V6VVHVVF3DLHLSJIVBJD4/#CK4KTUKBSY5V6VVHVVF3DLHLSJIVBJD4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2293-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UNBLNDQ3K45QI6KFSQ2UZSBOVQ6QHQQB/#UNBLNDQ3K45QI6KFSQ2UZSBOVQ6QHQQB" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Encryption). Supported versions that are affected are 5.5.60 and prior, 5.6.40 and prior and 5.7.22 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-2767/">CVE-2018-2767 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2767">CVE-2018-2767 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1088681">SUSE bug 1088681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101675">SUSE bug 1101675</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824516" comment="mariadb-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824517" comment="mariadb-bench-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824518" comment="mariadb-devel-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824519" comment="mariadb-embedded-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824520" comment="mariadb-embedded-devel-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824521" comment="mariadb-libs-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824522" comment="mariadb-server-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824523" comment="mariadb-test-5.5.60-1.el7_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182771" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2771</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2771" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2771" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2771" ref_url="https://www.suse.com/security/cve/CVE-2018-2771" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1781-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004235.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1595-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OF2MUUC2JPOIVEDJ7GRAO76WNAZJHXLB/#OF2MUUC2JPOIVEDJ7GRAO76WNAZJHXLB" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1800-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CK4KTUKBSY5V6VVHVVF3DLHLSJIVBJD4/#CK4KTUKBSY5V6VVHVVF3DLHLSJIVBJD4" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Locking). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-02-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2771/">CVE-2018-2771 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2771">CVE-2018-2771 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1089987">SUSE bug 1089987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090518">SUSE bug 1090518</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824516" comment="mariadb-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824517" comment="mariadb-bench-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824518" comment="mariadb-devel-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824519" comment="mariadb-embedded-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824520" comment="mariadb-embedded-devel-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824521" comment="mariadb-libs-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824522" comment="mariadb-server-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824523" comment="mariadb-test-5.5.60-1.el7_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182781" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2781</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2781" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2781" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2781" ref_url="https://www.suse.com/security/cve/CVE-2018-2781" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1781-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004235.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1595-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OF2MUUC2JPOIVEDJ7GRAO76WNAZJHXLB/#OF2MUUC2JPOIVEDJ7GRAO76WNAZJHXLB" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1800-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CK4KTUKBSY5V6VVHVVF3DLHLSJIVBJD4/#CK4KTUKBSY5V6VVHVVF3DLHLSJIVBJD4" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-02-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2781/">CVE-2018-2781 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2781">CVE-2018-2781 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1089987">SUSE bug 1089987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090518">SUSE bug 1090518</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824516" comment="mariadb-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824517" comment="mariadb-bench-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824518" comment="mariadb-devel-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824519" comment="mariadb-embedded-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824520" comment="mariadb-embedded-devel-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824521" comment="mariadb-libs-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824522" comment="mariadb-server-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824523" comment="mariadb-test-5.5.60-1.el7_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182790" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2790</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2790" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2790" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2790" ref_url="https://www.suse.com/security/cve/CVE-2018-2790" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1690-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1692-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1738-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1764-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1938-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1938-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004314.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1710-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HMBLFO5YI6GOC44TCUUSMUDDR3DHGEIV/#HMBLFO5YI6GOC44TCUUSMUDDR3DHGEIV" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1719-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3WLATFR34BR2BJGWE7CVYZ46WZYM4UYC/#3WLATFR34BR2BJGWE7CVYZ46WZYM4UYC" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-02-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-2790/">CVE-2018-2790 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2790">CVE-2018-2790 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1090023">SUSE bug 1090023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093311">SUSE bug 1093311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101637">SUSE bug 1101637</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824211" comment="java-1.7.0-openjdk-1.7.0.181-2.6.14.5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824212" comment="java-1.7.0-openjdk-accessibility-1.7.0.181-2.6.14.5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824213" comment="java-1.7.0-openjdk-demo-1.7.0.181-2.6.14.5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824214" comment="java-1.7.0-openjdk-devel-1.7.0.181-2.6.14.5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824215" comment="java-1.7.0-openjdk-headless-1.7.0.181-2.6.14.5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824216" comment="java-1.7.0-openjdk-javadoc-1.7.0.181-2.6.14.5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824217" comment="java-1.7.0-openjdk-src-1.7.0.181-2.6.14.5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824183" comment="java-1.8.0-openjdk-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824184" comment="java-1.8.0-openjdk-accessibility-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824185" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824186" comment="java-1.8.0-openjdk-debug-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824187" comment="java-1.8.0-openjdk-demo-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824188" comment="java-1.8.0-openjdk-demo-debug-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824189" comment="java-1.8.0-openjdk-devel-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824190" comment="java-1.8.0-openjdk-devel-debug-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824191" comment="java-1.8.0-openjdk-headless-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824192" comment="java-1.8.0-openjdk-headless-debug-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824193" comment="java-1.8.0-openjdk-javadoc-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824194" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824195" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824196" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824197" comment="java-1.8.0-openjdk-src-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824198" comment="java-1.8.0-openjdk-src-debug-1.8.0.171-7.b10.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182794" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2794</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2794" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2794" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2794" ref_url="https://www.suse.com/security/cve/CVE-2018-2794" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1690-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1692-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1738-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1764-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1938-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1938-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004314.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1710-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HMBLFO5YI6GOC44TCUUSMUDDR3DHGEIV/#HMBLFO5YI6GOC44TCUUSMUDDR3DHGEIV" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1719-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3WLATFR34BR2BJGWE7CVYZ46WZYM4UYC/#3WLATFR34BR2BJGWE7CVYZ46WZYM4UYC" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, JRockit component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162, 10 and JRockit: R28.3.17. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Java SE, JRockit executes to compromise Java SE, JRockit. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 7.7 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2794/">CVE-2018-2794 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2794">CVE-2018-2794 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1090024">SUSE bug 1090024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093311">SUSE bug 1093311</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824211" comment="java-1.7.0-openjdk-1.7.0.181-2.6.14.5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824212" comment="java-1.7.0-openjdk-accessibility-1.7.0.181-2.6.14.5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824213" comment="java-1.7.0-openjdk-demo-1.7.0.181-2.6.14.5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824214" comment="java-1.7.0-openjdk-devel-1.7.0.181-2.6.14.5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824215" comment="java-1.7.0-openjdk-headless-1.7.0.181-2.6.14.5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824216" comment="java-1.7.0-openjdk-javadoc-1.7.0.181-2.6.14.5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824217" comment="java-1.7.0-openjdk-src-1.7.0.181-2.6.14.5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824183" comment="java-1.8.0-openjdk-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824184" comment="java-1.8.0-openjdk-accessibility-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824185" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824186" comment="java-1.8.0-openjdk-debug-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824187" comment="java-1.8.0-openjdk-demo-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824188" comment="java-1.8.0-openjdk-demo-debug-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824189" comment="java-1.8.0-openjdk-devel-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824190" comment="java-1.8.0-openjdk-devel-debug-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824191" comment="java-1.8.0-openjdk-headless-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824192" comment="java-1.8.0-openjdk-headless-debug-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824193" comment="java-1.8.0-openjdk-javadoc-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824194" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824195" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824196" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824197" comment="java-1.8.0-openjdk-src-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824198" comment="java-1.8.0-openjdk-src-debug-1.8.0.171-7.b10.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182795" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2795</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2795" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2795" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2795" ref_url="https://www.suse.com/security/cve/CVE-2018-2795" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1690-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1692-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1738-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1764-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1938-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1938-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004314.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1710-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HMBLFO5YI6GOC44TCUUSMUDDR3DHGEIV/#HMBLFO5YI6GOC44TCUUSMUDDR3DHGEIV" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1719-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3WLATFR34BR2BJGWE7CVYZ46WZYM4UYC/#3WLATFR34BR2BJGWE7CVYZ46WZYM4UYC" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2795/">CVE-2018-2795 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2795">CVE-2018-2795 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1090025">SUSE bug 1090025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093311">SUSE bug 1093311</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824211" comment="java-1.7.0-openjdk-1.7.0.181-2.6.14.5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824212" comment="java-1.7.0-openjdk-accessibility-1.7.0.181-2.6.14.5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824213" comment="java-1.7.0-openjdk-demo-1.7.0.181-2.6.14.5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824214" comment="java-1.7.0-openjdk-devel-1.7.0.181-2.6.14.5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824215" comment="java-1.7.0-openjdk-headless-1.7.0.181-2.6.14.5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824216" comment="java-1.7.0-openjdk-javadoc-1.7.0.181-2.6.14.5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824217" comment="java-1.7.0-openjdk-src-1.7.0.181-2.6.14.5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824183" comment="java-1.8.0-openjdk-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824184" comment="java-1.8.0-openjdk-accessibility-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824185" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824186" comment="java-1.8.0-openjdk-debug-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824187" comment="java-1.8.0-openjdk-demo-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824188" comment="java-1.8.0-openjdk-demo-debug-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824189" comment="java-1.8.0-openjdk-devel-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824190" comment="java-1.8.0-openjdk-devel-debug-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824191" comment="java-1.8.0-openjdk-headless-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824192" comment="java-1.8.0-openjdk-headless-debug-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824193" comment="java-1.8.0-openjdk-javadoc-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824194" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824195" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824196" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824197" comment="java-1.8.0-openjdk-src-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824198" comment="java-1.8.0-openjdk-src-debug-1.8.0.171-7.b10.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182796" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2796</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2796" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2796" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2796" ref_url="https://www.suse.com/security/cve/CVE-2018-2796" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1690-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1692-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1738-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1764-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1938-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1938-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004314.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1710-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HMBLFO5YI6GOC44TCUUSMUDDR3DHGEIV/#HMBLFO5YI6GOC44TCUUSMUDDR3DHGEIV" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1719-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3WLATFR34BR2BJGWE7CVYZ46WZYM4UYC/#3WLATFR34BR2BJGWE7CVYZ46WZYM4UYC" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Concurrency). Supported versions that are affected are Java SE: 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2796/">CVE-2018-2796 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2796">CVE-2018-2796 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1090026">SUSE bug 1090026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093311">SUSE bug 1093311</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824211" comment="java-1.7.0-openjdk-1.7.0.181-2.6.14.5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824212" comment="java-1.7.0-openjdk-accessibility-1.7.0.181-2.6.14.5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824213" comment="java-1.7.0-openjdk-demo-1.7.0.181-2.6.14.5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824214" comment="java-1.7.0-openjdk-devel-1.7.0.181-2.6.14.5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824215" comment="java-1.7.0-openjdk-headless-1.7.0.181-2.6.14.5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824216" comment="java-1.7.0-openjdk-javadoc-1.7.0.181-2.6.14.5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824217" comment="java-1.7.0-openjdk-src-1.7.0.181-2.6.14.5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824183" comment="java-1.8.0-openjdk-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824184" comment="java-1.8.0-openjdk-accessibility-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824185" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824186" comment="java-1.8.0-openjdk-debug-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824187" comment="java-1.8.0-openjdk-demo-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824188" comment="java-1.8.0-openjdk-demo-debug-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824189" comment="java-1.8.0-openjdk-devel-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824190" comment="java-1.8.0-openjdk-devel-debug-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824191" comment="java-1.8.0-openjdk-headless-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824192" comment="java-1.8.0-openjdk-headless-debug-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824193" comment="java-1.8.0-openjdk-javadoc-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824194" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824195" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824196" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824197" comment="java-1.8.0-openjdk-src-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824198" comment="java-1.8.0-openjdk-src-debug-1.8.0.171-7.b10.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2797</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2797" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2797" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2797" ref_url="https://www.suse.com/security/cve/CVE-2018-2797" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1690-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1692-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1738-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1764-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1938-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1938-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004314.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1710-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HMBLFO5YI6GOC44TCUUSMUDDR3DHGEIV/#HMBLFO5YI6GOC44TCUUSMUDDR3DHGEIV" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1719-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3WLATFR34BR2BJGWE7CVYZ46WZYM4UYC/#3WLATFR34BR2BJGWE7CVYZ46WZYM4UYC" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JMX). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2797/">CVE-2018-2797 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2797">CVE-2018-2797 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1090027">SUSE bug 1090027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093311">SUSE bug 1093311</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824211" comment="java-1.7.0-openjdk-1.7.0.181-2.6.14.5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824212" comment="java-1.7.0-openjdk-accessibility-1.7.0.181-2.6.14.5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824213" comment="java-1.7.0-openjdk-demo-1.7.0.181-2.6.14.5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824214" comment="java-1.7.0-openjdk-devel-1.7.0.181-2.6.14.5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824215" comment="java-1.7.0-openjdk-headless-1.7.0.181-2.6.14.5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824216" comment="java-1.7.0-openjdk-javadoc-1.7.0.181-2.6.14.5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824217" comment="java-1.7.0-openjdk-src-1.7.0.181-2.6.14.5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824183" comment="java-1.8.0-openjdk-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824184" comment="java-1.8.0-openjdk-accessibility-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824185" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824186" comment="java-1.8.0-openjdk-debug-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824187" comment="java-1.8.0-openjdk-demo-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824188" comment="java-1.8.0-openjdk-demo-debug-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824189" comment="java-1.8.0-openjdk-devel-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824190" comment="java-1.8.0-openjdk-devel-debug-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824191" comment="java-1.8.0-openjdk-headless-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824192" comment="java-1.8.0-openjdk-headless-debug-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824193" comment="java-1.8.0-openjdk-javadoc-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824194" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824195" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824196" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824197" comment="java-1.8.0-openjdk-src-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824198" comment="java-1.8.0-openjdk-src-debug-1.8.0.171-7.b10.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182798" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2798</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2798" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2798" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2798" ref_url="https://www.suse.com/security/cve/CVE-2018-2798" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1690-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1692-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1738-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1764-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1938-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1938-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004314.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1710-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HMBLFO5YI6GOC44TCUUSMUDDR3DHGEIV/#HMBLFO5YI6GOC44TCUUSMUDDR3DHGEIV" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1719-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3WLATFR34BR2BJGWE7CVYZ46WZYM4UYC/#3WLATFR34BR2BJGWE7CVYZ46WZYM4UYC" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: AWT). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2798/">CVE-2018-2798 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2798">CVE-2018-2798 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1090028">SUSE bug 1090028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093311">SUSE bug 1093311</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824211" comment="java-1.7.0-openjdk-1.7.0.181-2.6.14.5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824212" comment="java-1.7.0-openjdk-accessibility-1.7.0.181-2.6.14.5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824213" comment="java-1.7.0-openjdk-demo-1.7.0.181-2.6.14.5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824214" comment="java-1.7.0-openjdk-devel-1.7.0.181-2.6.14.5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824215" comment="java-1.7.0-openjdk-headless-1.7.0.181-2.6.14.5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824216" comment="java-1.7.0-openjdk-javadoc-1.7.0.181-2.6.14.5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824217" comment="java-1.7.0-openjdk-src-1.7.0.181-2.6.14.5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824183" comment="java-1.8.0-openjdk-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824184" comment="java-1.8.0-openjdk-accessibility-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824185" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824186" comment="java-1.8.0-openjdk-debug-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824187" comment="java-1.8.0-openjdk-demo-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824188" comment="java-1.8.0-openjdk-demo-debug-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824189" comment="java-1.8.0-openjdk-devel-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824190" comment="java-1.8.0-openjdk-devel-debug-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824191" comment="java-1.8.0-openjdk-headless-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824192" comment="java-1.8.0-openjdk-headless-debug-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824193" comment="java-1.8.0-openjdk-javadoc-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824194" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824195" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824196" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824197" comment="java-1.8.0-openjdk-src-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824198" comment="java-1.8.0-openjdk-src-debug-1.8.0.171-7.b10.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182799" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2799</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2799" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2799" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2799" ref_url="https://www.suse.com/security/cve/CVE-2018-2799" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1690-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1692-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1738-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1764-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1938-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1938-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004314.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1710-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HMBLFO5YI6GOC44TCUUSMUDDR3DHGEIV/#HMBLFO5YI6GOC44TCUUSMUDDR3DHGEIV" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1719-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3WLATFR34BR2BJGWE7CVYZ46WZYM4UYC/#3WLATFR34BR2BJGWE7CVYZ46WZYM4UYC" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JAXP). Supported versions that are affected are Java SE: 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2799/">CVE-2018-2799 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2799">CVE-2018-2799 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1090029">SUSE bug 1090029</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093311">SUSE bug 1093311</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824211" comment="java-1.7.0-openjdk-1.7.0.181-2.6.14.5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824212" comment="java-1.7.0-openjdk-accessibility-1.7.0.181-2.6.14.5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824213" comment="java-1.7.0-openjdk-demo-1.7.0.181-2.6.14.5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824214" comment="java-1.7.0-openjdk-devel-1.7.0.181-2.6.14.5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824215" comment="java-1.7.0-openjdk-headless-1.7.0.181-2.6.14.5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824216" comment="java-1.7.0-openjdk-javadoc-1.7.0.181-2.6.14.5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824217" comment="java-1.7.0-openjdk-src-1.7.0.181-2.6.14.5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824183" comment="java-1.8.0-openjdk-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824184" comment="java-1.8.0-openjdk-accessibility-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824185" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824186" comment="java-1.8.0-openjdk-debug-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824187" comment="java-1.8.0-openjdk-demo-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824188" comment="java-1.8.0-openjdk-demo-debug-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824189" comment="java-1.8.0-openjdk-devel-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824190" comment="java-1.8.0-openjdk-devel-debug-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824191" comment="java-1.8.0-openjdk-headless-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824192" comment="java-1.8.0-openjdk-headless-debug-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824193" comment="java-1.8.0-openjdk-javadoc-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824194" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824195" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824196" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824197" comment="java-1.8.0-openjdk-src-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824198" comment="java-1.8.0-openjdk-src-debug-1.8.0.171-7.b10.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2800</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2800" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2800" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2800" ref_url="https://www.suse.com/security/cve/CVE-2018-2800" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1690-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1692-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1738-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1764-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1938-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1938-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004314.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1710-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HMBLFO5YI6GOC44TCUUSMUDDR3DHGEIV/#HMBLFO5YI6GOC44TCUUSMUDDR3DHGEIV" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1719-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3WLATFR34BR2BJGWE7CVYZ46WZYM4UYC/#3WLATFR34BR2BJGWE7CVYZ46WZYM4UYC" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, JRockit component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 6u181, 7u171 and 8u162; JRockit: R28.3.17. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, JRockit accessible data as well as unauthorized read access to a subset of Java SE, JRockit accessible data. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 4.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-2800/">CVE-2018-2800 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2800">CVE-2018-2800 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1090030">SUSE bug 1090030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093311">SUSE bug 1093311</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824211" comment="java-1.7.0-openjdk-1.7.0.181-2.6.14.5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824212" comment="java-1.7.0-openjdk-accessibility-1.7.0.181-2.6.14.5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824213" comment="java-1.7.0-openjdk-demo-1.7.0.181-2.6.14.5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824214" comment="java-1.7.0-openjdk-devel-1.7.0.181-2.6.14.5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824215" comment="java-1.7.0-openjdk-headless-1.7.0.181-2.6.14.5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824216" comment="java-1.7.0-openjdk-javadoc-1.7.0.181-2.6.14.5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824217" comment="java-1.7.0-openjdk-src-1.7.0.181-2.6.14.5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824183" comment="java-1.8.0-openjdk-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824184" comment="java-1.8.0-openjdk-accessibility-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824185" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824186" comment="java-1.8.0-openjdk-debug-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824187" comment="java-1.8.0-openjdk-demo-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824188" comment="java-1.8.0-openjdk-demo-debug-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824189" comment="java-1.8.0-openjdk-devel-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824190" comment="java-1.8.0-openjdk-devel-debug-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824191" comment="java-1.8.0-openjdk-headless-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824192" comment="java-1.8.0-openjdk-headless-debug-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824193" comment="java-1.8.0-openjdk-javadoc-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824194" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824195" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824196" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824197" comment="java-1.8.0-openjdk-src-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824198" comment="java-1.8.0-openjdk-src-debug-1.8.0.171-7.b10.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182813" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2813</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2813" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2813" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2813" ref_url="https://www.suse.com/security/cve/CVE-2018-2813" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1781-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004235.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1595-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OF2MUUC2JPOIVEDJ7GRAO76WNAZJHXLB/#OF2MUUC2JPOIVEDJ7GRAO76WNAZJHXLB" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1800-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CK4KTUKBSY5V6VVHVVF3DLHLSJIVBJD4/#CK4KTUKBSY5V6VVHVVF3DLHLSJIVBJD4" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.0 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-02-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2813/">CVE-2018-2813 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2813">CVE-2018-2813 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1089987">SUSE bug 1089987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090518">SUSE bug 1090518</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824516" comment="mariadb-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824517" comment="mariadb-bench-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824518" comment="mariadb-devel-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824519" comment="mariadb-embedded-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824520" comment="mariadb-embedded-devel-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824521" comment="mariadb-libs-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824522" comment="mariadb-server-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824523" comment="mariadb-test-5.5.60-1.el7_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2814</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2814" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2814" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2814" ref_url="https://www.suse.com/security/cve/CVE-2018-2814" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1690-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1692-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1738-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1764-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1938-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1938-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004314.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1710-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HMBLFO5YI6GOC44TCUUSMUDDR3DHGEIV/#HMBLFO5YI6GOC44TCUUSMUDDR3DHGEIV" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1719-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3WLATFR34BR2BJGWE7CVYZ46WZYM4UYC/#3WLATFR34BR2BJGWE7CVYZ46WZYM4UYC" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Hotspot). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-02-22"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2814/">CVE-2018-2814 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2814">CVE-2018-2814 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1090032">SUSE bug 1090032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093311">SUSE bug 1093311</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824211" comment="java-1.7.0-openjdk-1.7.0.181-2.6.14.5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824212" comment="java-1.7.0-openjdk-accessibility-1.7.0.181-2.6.14.5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824213" comment="java-1.7.0-openjdk-demo-1.7.0.181-2.6.14.5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824214" comment="java-1.7.0-openjdk-devel-1.7.0.181-2.6.14.5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824215" comment="java-1.7.0-openjdk-headless-1.7.0.181-2.6.14.5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824216" comment="java-1.7.0-openjdk-javadoc-1.7.0.181-2.6.14.5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824217" comment="java-1.7.0-openjdk-src-1.7.0.181-2.6.14.5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824183" comment="java-1.8.0-openjdk-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824184" comment="java-1.8.0-openjdk-accessibility-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824185" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824186" comment="java-1.8.0-openjdk-debug-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824187" comment="java-1.8.0-openjdk-demo-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824188" comment="java-1.8.0-openjdk-demo-debug-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824189" comment="java-1.8.0-openjdk-devel-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824190" comment="java-1.8.0-openjdk-devel-debug-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824191" comment="java-1.8.0-openjdk-headless-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824192" comment="java-1.8.0-openjdk-headless-debug-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824193" comment="java-1.8.0-openjdk-javadoc-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824194" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824195" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824196" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824197" comment="java-1.8.0-openjdk-src-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824198" comment="java-1.8.0-openjdk-src-debug-1.8.0.171-7.b10.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182815" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2815</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2815" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2815" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2815" ref_url="https://www.suse.com/security/cve/CVE-2018-2815" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1690-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1692-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1938-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1938-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004264.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1710-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HMBLFO5YI6GOC44TCUUSMUDDR3DHGEIV/#HMBLFO5YI6GOC44TCUUSMUDDR3DHGEIV" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1719-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3WLATFR34BR2BJGWE7CVYZ46WZYM4UYC/#3WLATFR34BR2BJGWE7CVYZ46WZYM4UYC" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2815/">CVE-2018-2815 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2815">CVE-2018-2815 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1090033">SUSE bug 1090033</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824211" comment="java-1.7.0-openjdk-1.7.0.181-2.6.14.5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824212" comment="java-1.7.0-openjdk-accessibility-1.7.0.181-2.6.14.5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824213" comment="java-1.7.0-openjdk-demo-1.7.0.181-2.6.14.5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824214" comment="java-1.7.0-openjdk-devel-1.7.0.181-2.6.14.5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824215" comment="java-1.7.0-openjdk-headless-1.7.0.181-2.6.14.5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824216" comment="java-1.7.0-openjdk-javadoc-1.7.0.181-2.6.14.5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824217" comment="java-1.7.0-openjdk-src-1.7.0.181-2.6.14.5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824183" comment="java-1.8.0-openjdk-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824184" comment="java-1.8.0-openjdk-accessibility-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824185" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824186" comment="java-1.8.0-openjdk-debug-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824187" comment="java-1.8.0-openjdk-demo-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824188" comment="java-1.8.0-openjdk-demo-debug-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824189" comment="java-1.8.0-openjdk-devel-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824190" comment="java-1.8.0-openjdk-devel-debug-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824191" comment="java-1.8.0-openjdk-headless-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824192" comment="java-1.8.0-openjdk-headless-debug-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824193" comment="java-1.8.0-openjdk-javadoc-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824194" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824195" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824196" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824197" comment="java-1.8.0-openjdk-src-1.8.0.171-7.b10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824198" comment="java-1.8.0-openjdk-src-debug-1.8.0.171-7.b10.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2817</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2817" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2817" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2817" ref_url="https://www.suse.com/security/cve/CVE-2018-2817" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1781-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004235.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1595-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OF2MUUC2JPOIVEDJ7GRAO76WNAZJHXLB/#OF2MUUC2JPOIVEDJ7GRAO76WNAZJHXLB" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1800-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CK4KTUKBSY5V6VVHVVF3DLHLSJIVBJD4/#CK4KTUKBSY5V6VVHVVF3DLHLSJIVBJD4" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-02-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2817/">CVE-2018-2817 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2817">CVE-2018-2817 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1089987">SUSE bug 1089987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090518">SUSE bug 1090518</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824516" comment="mariadb-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824517" comment="mariadb-bench-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824518" comment="mariadb-devel-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824519" comment="mariadb-embedded-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824520" comment="mariadb-embedded-devel-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824521" comment="mariadb-libs-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824522" comment="mariadb-server-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824523" comment="mariadb-test-5.5.60-1.el7_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182819" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2819</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2819" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2819" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2819" ref_url="https://www.suse.com/security/cve/CVE-2018-2819" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1781-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004235.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1595-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OF2MUUC2JPOIVEDJ7GRAO76WNAZJHXLB/#OF2MUUC2JPOIVEDJ7GRAO76WNAZJHXLB" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1800-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CK4KTUKBSY5V6VVHVVF3DLHLSJIVBJD4/#CK4KTUKBSY5V6VVHVVF3DLHLSJIVBJD4" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-02-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2819/">CVE-2018-2819 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2819">CVE-2018-2819 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1089987">SUSE bug 1089987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090518">SUSE bug 1090518</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824516" comment="mariadb-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824517" comment="mariadb-bench-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824518" comment="mariadb-devel-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824519" comment="mariadb-embedded-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824520" comment="mariadb-embedded-devel-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824521" comment="mariadb-libs-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824522" comment="mariadb-server-5.5.60-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824523" comment="mariadb-test-5.5.60-1.el7_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182952" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2952</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2952" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2952" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2952" ref_url="https://www.suse.com/security/cve/CVE-2018-2952" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2583-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2649-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2839-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3064-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3064-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0049-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2206-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K6WANXMP6XOD6G3VRL7A3SDTZ3Z5FI6S/#K6WANXMP6XOD6G3VRL7A3SDTZ3Z5FI6S" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2247-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FFFSV6DLZNN5AEKLQ4NZ6BMF772GDED6/#FFFSV6DLZNN5AEKLQ4NZ6BMF772GDED6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3057-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FMANQHTHG6FDL53YMGLVNWCADZ7SBJTI/#FMANQHTHG6FDL53YMGLVNWCADZ7SBJTI" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3103-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2PFA5BW2DAJTSU5WJ6XZHKPJGNFARXDO/#2PFA5BW2DAJTSU5WJ6XZHKPJGNFARXDO" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0042-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DNU7M5Z2B7TCVZ4AJHU2KUMRUBGPJNVB/#DNU7M5Z2B7TCVZ4AJHU2KUMRUBGPJNVB" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Concurrency). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171; JRockit: R28.3.18. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-02"/>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2952/">CVE-2018-2952 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2952">CVE-2018-2952 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1101645">SUSE bug 1101645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101651">SUSE bug 1101651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101656">SUSE bug 1101656</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824497" comment="java-1.7.0-openjdk-1.7.0.191-2.6.15.4.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824498" comment="java-1.7.0-openjdk-accessibility-1.7.0.191-2.6.15.4.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824499" comment="java-1.7.0-openjdk-demo-1.7.0.191-2.6.15.4.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824500" comment="java-1.7.0-openjdk-devel-1.7.0.191-2.6.15.4.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824501" comment="java-1.7.0-openjdk-headless-1.7.0.191-2.6.15.4.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824502" comment="java-1.7.0-openjdk-javadoc-1.7.0.191-2.6.15.4.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824503" comment="java-1.7.0-openjdk-src-1.7.0.191-2.6.15.4.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824452" comment="java-1.8.0-openjdk-1.8.0.181-3.b13.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824453" comment="java-1.8.0-openjdk-accessibility-1.8.0.181-3.b13.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824454" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.181-3.b13.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824455" comment="java-1.8.0-openjdk-debug-1.8.0.181-3.b13.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824456" comment="java-1.8.0-openjdk-demo-1.8.0.181-3.b13.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824457" comment="java-1.8.0-openjdk-demo-debug-1.8.0.181-3.b13.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824458" comment="java-1.8.0-openjdk-devel-1.8.0.181-3.b13.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824459" comment="java-1.8.0-openjdk-devel-debug-1.8.0.181-3.b13.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824460" comment="java-1.8.0-openjdk-headless-1.8.0.181-3.b13.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824461" comment="java-1.8.0-openjdk-headless-debug-1.8.0.181-3.b13.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824462" comment="java-1.8.0-openjdk-javadoc-1.8.0.181-3.b13.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824463" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.181-3.b13.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824464" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.181-3.b13.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824465" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.181-3.b13.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824466" comment="java-1.8.0-openjdk-src-1.8.0.181-3.b13.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824467" comment="java-1.8.0-openjdk-src-debug-1.8.0.181-3.b13.el7_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183058" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3058</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-3058" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3058" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-3058" ref_url="https://www.suse.com/security/cve/CVE-2018-3058" source="SUSE CVE"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3972-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183972-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0555-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190555-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0628-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190628-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005775.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2293-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UNBLNDQ3K45QI6KFSQ2UZSBOVQ6QHQQB/#UNBLNDQ3K45QI6KFSQ2UZSBOVQ6QHQQB" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0327-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZBIBDKV4Q445TSAAVXOJN365L7BQQWY6/#ZBIBDKV4Q445TSAAVXOJN365L7BQQWY6" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: MyISAM). Supported versions that are affected are 5.5.60 and prior, 5.6.40 and prior and 5.7.22 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3058/">CVE-2018-3058 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3058">CVE-2018-3058 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1101676">SUSE bug 1101676</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116686">SUSE bug 1116686</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826567" comment="mariadb-5.5.64-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826568" comment="mariadb-bench-5.5.64-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826569" comment="mariadb-devel-5.5.64-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826570" comment="mariadb-embedded-5.5.64-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826571" comment="mariadb-embedded-devel-5.5.64-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826572" comment="mariadb-libs-5.5.64-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826573" comment="mariadb-server-5.5.64-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826574" comment="mariadb-test-5.5.64-1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183063" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3063</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-3063" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3063" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-3063" ref_url="https://www.suse.com/security/cve/CVE-2018-3063" source="SUSE CVE"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3972-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183972-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0555-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190555-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0628-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190628-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005775.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0327-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZBIBDKV4Q445TSAAVXOJN365L7BQQWY6/#ZBIBDKV4Q445TSAAVXOJN365L7BQQWY6" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Privileges). Supported versions that are affected are 5.5.60 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3063/">CVE-2018-3063 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3063">CVE-2018-3063 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1101677">SUSE bug 1101677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116686">SUSE bug 1116686</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826567" comment="mariadb-5.5.64-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826568" comment="mariadb-bench-5.5.64-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826569" comment="mariadb-devel-5.5.64-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826570" comment="mariadb-embedded-5.5.64-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826571" comment="mariadb-embedded-devel-5.5.64-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826572" comment="mariadb-libs-5.5.64-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826573" comment="mariadb-server-5.5.64-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826574" comment="mariadb-test-5.5.64-1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183066" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3066</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-3066" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3066" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-3066" ref_url="https://www.suse.com/security/cve/CVE-2018-3066" source="SUSE CVE"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3972-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183972-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0555-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190555-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0628-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190628-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005775.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2293-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UNBLNDQ3K45QI6KFSQ2UZSBOVQ6QHQQB/#UNBLNDQ3K45QI6KFSQ2UZSBOVQ6QHQQB" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0327-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZBIBDKV4Q445TSAAVXOJN365L7BQQWY6/#ZBIBDKV4Q445TSAAVXOJN365L7BQQWY6" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Options). Supported versions that are affected are 5.5.60 and prior, 5.6.40 and prior and 5.7.22 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data as well as unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.0 Base Score 3.3 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3066/">CVE-2018-3066 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3066">CVE-2018-3066 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1101678">SUSE bug 1101678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116686">SUSE bug 1116686</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826567" comment="mariadb-5.5.64-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826568" comment="mariadb-bench-5.5.64-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826569" comment="mariadb-devel-5.5.64-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826570" comment="mariadb-embedded-5.5.64-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826571" comment="mariadb-embedded-devel-5.5.64-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826572" comment="mariadb-libs-5.5.64-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826573" comment="mariadb-server-5.5.64-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826574" comment="mariadb-test-5.5.64-1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183081" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3081</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-3081" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3081" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-3081" ref_url="https://www.suse.com/security/cve/CVE-2018-3081" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004466.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2293-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UNBLNDQ3K45QI6KFSQ2UZSBOVQ6QHQQB/#UNBLNDQ3K45QI6KFSQ2UZSBOVQ6QHQQB" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Client component of Oracle MySQL (subcomponent: Client programs). Supported versions that are affected are 5.5.60 and prior, 5.6.40 and prior, 5.7.22 and prior and 8.0.11 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Client as well as unauthorized update, insert or delete access to some of MySQL Client accessible data. CVSS 3.0 Base Score 5.0 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-3081/">CVE-2018-3081 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3081">CVE-2018-3081 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1101680">SUSE bug 1101680</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826567" comment="mariadb-5.5.64-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826568" comment="mariadb-bench-5.5.64-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826569" comment="mariadb-devel-5.5.64-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826570" comment="mariadb-embedded-5.5.64-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826571" comment="mariadb-embedded-devel-5.5.64-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826572" comment="mariadb-libs-5.5.64-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826573" comment="mariadb-server-5.5.64-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826574" comment="mariadb-test-5.5.64-1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183136" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3136</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-3136" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3136" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-3136" ref_url="https://www.suse.com/security/cve/CVE-2018-3136" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3868-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3933-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3933-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4064-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0049-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0057-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3235-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RFNMLBT3DRHXG2JK3I4ER3PGQ2WEQIFT/#RFNMLBT3DRHXG2JK3I4ER3PGQ2WEQIFT" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0042-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DNU7M5Z2B7TCVZ4AJHU2KUMRUBGPJNVB/#DNU7M5Z2B7TCVZ4AJHU2KUMRUBGPJNVB" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0043-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U4E6TD23MZPFSCCET3CCXBOEPKA4LWCJ/#U4E6TD23MZPFSCCET3CCXBOEPKA4LWCJ" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u201, 7u191, 8u182 and 11; Java SE Embedded: 8u181. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g. code installed by an administrator). CVSS 3.0 Base Score 3.4 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-05"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3136/">CVE-2018-3136 at SUSE</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3136">CVE-2018-3136 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1112142">SUSE bug 1112142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112143">SUSE bug 1112143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112144">SUSE bug 1112144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112146">SUSE bug 1112146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112148">SUSE bug 1112148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112152">SUSE bug 1112152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116574">SUSE bug 1116574</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825340" comment="java-1.7.0-openjdk-1.7.0.201-2.6.16.1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825341" comment="java-1.7.0-openjdk-accessibility-1.7.0.201-2.6.16.1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825342" comment="java-1.7.0-openjdk-demo-1.7.0.201-2.6.16.1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825343" comment="java-1.7.0-openjdk-devel-1.7.0.201-2.6.16.1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825344" comment="java-1.7.0-openjdk-headless-1.7.0.201-2.6.16.1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825345" comment="java-1.7.0-openjdk-javadoc-1.7.0.201-2.6.16.1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825346" comment="java-1.7.0-openjdk-src-1.7.0.201-2.6.16.1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824607" comment="java-1.8.0-openjdk-1.8.0.191.b12-0.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824608" comment="java-1.8.0-openjdk-accessibility-1.8.0.191.b12-0.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824609" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.191.b12-0.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824610" comment="java-1.8.0-openjdk-debug-1.8.0.191.b12-0.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824611" comment="java-1.8.0-openjdk-demo-1.8.0.191.b12-0.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824612" comment="java-1.8.0-openjdk-demo-debug-1.8.0.191.b12-0.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824613" comment="java-1.8.0-openjdk-devel-1.8.0.191.b12-0.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824614" comment="java-1.8.0-openjdk-devel-debug-1.8.0.191.b12-0.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824615" comment="java-1.8.0-openjdk-headless-1.8.0.191.b12-0.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824616" comment="java-1.8.0-openjdk-headless-debug-1.8.0.191.b12-0.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824617" comment="java-1.8.0-openjdk-javadoc-1.8.0.191.b12-0.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824618" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.191.b12-0.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824619" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.191.b12-0.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824620" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.191.b12-0.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824621" comment="java-1.8.0-openjdk-src-1.8.0.191.b12-0.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824622" comment="java-1.8.0-openjdk-src-debug-1.8.0.191.b12-0.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825375" comment="java-11-openjdk-11.0.1.13-3.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825376" comment="java-11-openjdk-debug-11.0.1.13-3.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825377" comment="java-11-openjdk-demo-11.0.1.13-3.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825378" comment="java-11-openjdk-demo-debug-11.0.1.13-3.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825379" comment="java-11-openjdk-devel-11.0.1.13-3.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825380" comment="java-11-openjdk-devel-debug-11.0.1.13-3.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825381" comment="java-11-openjdk-headless-11.0.1.13-3.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825382" comment="java-11-openjdk-headless-debug-11.0.1.13-3.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825383" comment="java-11-openjdk-javadoc-11.0.1.13-3.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825384" comment="java-11-openjdk-javadoc-debug-11.0.1.13-3.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825385" comment="java-11-openjdk-javadoc-zip-11.0.1.13-3.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825386" comment="java-11-openjdk-javadoc-zip-debug-11.0.1.13-3.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825387" comment="java-11-openjdk-jmods-11.0.1.13-3.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825388" comment="java-11-openjdk-jmods-debug-11.0.1.13-3.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825389" comment="java-11-openjdk-src-11.0.1.13-3.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825390" comment="java-11-openjdk-src-debug-11.0.1.13-3.el7_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3139</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-3139" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3139" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-3139" ref_url="https://www.suse.com/security/cve/CVE-2018-3139" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3868-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3933-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3933-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4064-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0049-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0057-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3235-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RFNMLBT3DRHXG2JK3I4ER3PGQ2WEQIFT/#RFNMLBT3DRHXG2JK3I4ER3PGQ2WEQIFT" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0042-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DNU7M5Z2B7TCVZ4AJHU2KUMRUBGPJNVB/#DNU7M5Z2B7TCVZ4AJHU2KUMRUBGPJNVB" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0043-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U4E6TD23MZPFSCCET3CCXBOEPKA4LWCJ/#U4E6TD23MZPFSCCET3CCXBOEPKA4LWCJ" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u201, 7u191, 8u182 and 11; Java SE Embedded: 8u181. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g. code installed by an administrator). CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-06"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-3139/">CVE-2018-3139 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3139">CVE-2018-3139 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1112142">SUSE bug 1112142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112143">SUSE bug 1112143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112144">SUSE bug 1112144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112146">SUSE bug 1112146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112148">SUSE bug 1112148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112152">SUSE bug 1112152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116574">SUSE bug 1116574</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825340" comment="java-1.7.0-openjdk-1.7.0.201-2.6.16.1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825341" comment="java-1.7.0-openjdk-accessibility-1.7.0.201-2.6.16.1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825342" comment="java-1.7.0-openjdk-demo-1.7.0.201-2.6.16.1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825343" comment="java-1.7.0-openjdk-devel-1.7.0.201-2.6.16.1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825344" comment="java-1.7.0-openjdk-headless-1.7.0.201-2.6.16.1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825345" comment="java-1.7.0-openjdk-javadoc-1.7.0.201-2.6.16.1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825346" comment="java-1.7.0-openjdk-src-1.7.0.201-2.6.16.1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824607" comment="java-1.8.0-openjdk-1.8.0.191.b12-0.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824608" comment="java-1.8.0-openjdk-accessibility-1.8.0.191.b12-0.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824609" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.191.b12-0.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824610" comment="java-1.8.0-openjdk-debug-1.8.0.191.b12-0.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824611" comment="java-1.8.0-openjdk-demo-1.8.0.191.b12-0.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824612" comment="java-1.8.0-openjdk-demo-debug-1.8.0.191.b12-0.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824613" comment="java-1.8.0-openjdk-devel-1.8.0.191.b12-0.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824614" comment="java-1.8.0-openjdk-devel-debug-1.8.0.191.b12-0.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824615" comment="java-1.8.0-openjdk-headless-1.8.0.191.b12-0.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824616" comment="java-1.8.0-openjdk-headless-debug-1.8.0.191.b12-0.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824617" comment="java-1.8.0-openjdk-javadoc-1.8.0.191.b12-0.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824618" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.191.b12-0.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824619" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.191.b12-0.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824620" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.191.b12-0.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824621" comment="java-1.8.0-openjdk-src-1.8.0.191.b12-0.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824622" comment="java-1.8.0-openjdk-src-debug-1.8.0.191.b12-0.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825375" comment="java-11-openjdk-11.0.1.13-3.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825376" comment="java-11-openjdk-debug-11.0.1.13-3.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825377" comment="java-11-openjdk-demo-11.0.1.13-3.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825378" comment="java-11-openjdk-demo-debug-11.0.1.13-3.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825379" comment="java-11-openjdk-devel-11.0.1.13-3.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825380" comment="java-11-openjdk-devel-debug-11.0.1.13-3.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825381" comment="java-11-openjdk-headless-11.0.1.13-3.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825382" comment="java-11-openjdk-headless-debug-11.0.1.13-3.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825383" comment="java-11-openjdk-javadoc-11.0.1.13-3.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825384" comment="java-11-openjdk-javadoc-debug-11.0.1.13-3.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825385" comment="java-11-openjdk-javadoc-zip-11.0.1.13-3.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825386" comment="java-11-openjdk-javadoc-zip-debug-11.0.1.13-3.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825387" comment="java-11-openjdk-jmods-11.0.1.13-3.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825388" comment="java-11-openjdk-jmods-debug-11.0.1.13-3.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825389" comment="java-11-openjdk-src-11.0.1.13-3.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825390" comment="java-11-openjdk-src-debug-11.0.1.13-3.el7_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183149" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3149</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-3149" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3149" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-3149" ref_url="https://www.suse.com/security/cve/CVE-2018-3149" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3868-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3933-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3933-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4064-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0049-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0057-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3235-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RFNMLBT3DRHXG2JK3I4ER3PGQ2WEQIFT/#RFNMLBT3DRHXG2JK3I4ER3PGQ2WEQIFT" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0042-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DNU7M5Z2B7TCVZ4AJHU2KUMRUBGPJNVB/#DNU7M5Z2B7TCVZ4AJHU2KUMRUBGPJNVB" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0043-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U4E6TD23MZPFSCCET3CCXBOEPKA4LWCJ/#U4E6TD23MZPFSCCET3CCXBOEPKA4LWCJ" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JNDI). Supported versions that are affected are Java SE: 6u201, 7u191, 8u182 and 11; Java SE Embedded: 8u181; JRockit: R28.3.19. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g. through a web service which supplies data to the APIs. CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-25"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3149/">CVE-2018-3149 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3149">CVE-2018-3149 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1112142">SUSE bug 1112142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112143">SUSE bug 1112143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112144">SUSE bug 1112144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112146">SUSE bug 1112146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112148">SUSE bug 1112148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112152">SUSE bug 1112152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116574">SUSE bug 1116574</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825340" comment="java-1.7.0-openjdk-1.7.0.201-2.6.16.1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825341" comment="java-1.7.0-openjdk-accessibility-1.7.0.201-2.6.16.1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825342" comment="java-1.7.0-openjdk-demo-1.7.0.201-2.6.16.1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825343" comment="java-1.7.0-openjdk-devel-1.7.0.201-2.6.16.1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825344" comment="java-1.7.0-openjdk-headless-1.7.0.201-2.6.16.1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825345" comment="java-1.7.0-openjdk-javadoc-1.7.0.201-2.6.16.1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825346" comment="java-1.7.0-openjdk-src-1.7.0.201-2.6.16.1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824607" comment="java-1.8.0-openjdk-1.8.0.191.b12-0.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824608" comment="java-1.8.0-openjdk-accessibility-1.8.0.191.b12-0.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824609" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.191.b12-0.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824610" comment="java-1.8.0-openjdk-debug-1.8.0.191.b12-0.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824611" comment="java-1.8.0-openjdk-demo-1.8.0.191.b12-0.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824612" comment="java-1.8.0-openjdk-demo-debug-1.8.0.191.b12-0.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824613" comment="java-1.8.0-openjdk-devel-1.8.0.191.b12-0.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824614" comment="java-1.8.0-openjdk-devel-debug-1.8.0.191.b12-0.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824615" comment="java-1.8.0-openjdk-headless-1.8.0.191.b12-0.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824616" comment="java-1.8.0-openjdk-headless-debug-1.8.0.191.b12-0.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824617" comment="java-1.8.0-openjdk-javadoc-1.8.0.191.b12-0.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824618" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.191.b12-0.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824619" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.191.b12-0.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824620" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.191.b12-0.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824621" comment="java-1.8.0-openjdk-src-1.8.0.191.b12-0.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824622" comment="java-1.8.0-openjdk-src-debug-1.8.0.191.b12-0.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825375" comment="java-11-openjdk-11.0.1.13-3.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825376" comment="java-11-openjdk-debug-11.0.1.13-3.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825377" comment="java-11-openjdk-demo-11.0.1.13-3.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825378" comment="java-11-openjdk-demo-debug-11.0.1.13-3.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825379" comment="java-11-openjdk-devel-11.0.1.13-3.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825380" comment="java-11-openjdk-devel-debug-11.0.1.13-3.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825381" comment="java-11-openjdk-headless-11.0.1.13-3.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825382" comment="java-11-openjdk-headless-debug-11.0.1.13-3.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825383" comment="java-11-openjdk-javadoc-11.0.1.13-3.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825384" comment="java-11-openjdk-javadoc-debug-11.0.1.13-3.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825385" comment="java-11-openjdk-javadoc-zip-11.0.1.13-3.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825386" comment="java-11-openjdk-javadoc-zip-debug-11.0.1.13-3.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825387" comment="java-11-openjdk-jmods-11.0.1.13-3.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825388" comment="java-11-openjdk-jmods-debug-11.0.1.13-3.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825389" comment="java-11-openjdk-src-11.0.1.13-3.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825390" comment="java-11-openjdk-src-debug-11.0.1.13-3.el7_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183150" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3150</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-3150" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3150" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-3150" ref_url="https://www.suse.com/security/cve/CVE-2018-3150" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2018:3235-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RFNMLBT3DRHXG2JK3I4ER3PGQ2WEQIFT/#RFNMLBT3DRHXG2JK3I4ER3PGQ2WEQIFT" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Utility). The supported version that is affected is Java SE: 11. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-05"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3150/">CVE-2018-3150 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3150">CVE-2018-3150 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1112145">SUSE bug 1112145</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825375" comment="java-11-openjdk-11.0.1.13-3.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825376" comment="java-11-openjdk-debug-11.0.1.13-3.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825377" comment="java-11-openjdk-demo-11.0.1.13-3.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825378" comment="java-11-openjdk-demo-debug-11.0.1.13-3.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825379" comment="java-11-openjdk-devel-11.0.1.13-3.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825380" comment="java-11-openjdk-devel-debug-11.0.1.13-3.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825381" comment="java-11-openjdk-headless-11.0.1.13-3.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825382" comment="java-11-openjdk-headless-debug-11.0.1.13-3.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825383" comment="java-11-openjdk-javadoc-11.0.1.13-3.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825384" comment="java-11-openjdk-javadoc-debug-11.0.1.13-3.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825385" comment="java-11-openjdk-javadoc-zip-11.0.1.13-3.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825386" comment="java-11-openjdk-javadoc-zip-debug-11.0.1.13-3.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825387" comment="java-11-openjdk-jmods-11.0.1.13-3.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825388" comment="java-11-openjdk-jmods-debug-11.0.1.13-3.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825389" comment="java-11-openjdk-src-11.0.1.13-3.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825390" comment="java-11-openjdk-src-debug-11.0.1.13-3.el7_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183169" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3169</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-3169" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3169" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-3169" ref_url="https://www.suse.com/security/cve/CVE-2018-3169" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3868-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3933-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3933-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4064-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0049-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0057-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3235-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RFNMLBT3DRHXG2JK3I4ER3PGQ2WEQIFT/#RFNMLBT3DRHXG2JK3I4ER3PGQ2WEQIFT" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0042-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DNU7M5Z2B7TCVZ4AJHU2KUMRUBGPJNVB/#DNU7M5Z2B7TCVZ4AJHU2KUMRUBGPJNVB" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0043-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U4E6TD23MZPFSCCET3CCXBOEPKA4LWCJ/#U4E6TD23MZPFSCCET3CCXBOEPKA4LWCJ" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Hotspot). Supported versions that are affected are Java SE: 7u191, 8u182 and 11; Java SE Embedded: 8u181. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g. code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-25"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3169/">CVE-2018-3169 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3169">CVE-2018-3169 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1112142">SUSE bug 1112142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112143">SUSE bug 1112143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112144">SUSE bug 1112144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112146">SUSE bug 1112146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112148">SUSE bug 1112148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112152">SUSE bug 1112152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116574">SUSE bug 1116574</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825340" comment="java-1.7.0-openjdk-1.7.0.201-2.6.16.1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825341" comment="java-1.7.0-openjdk-accessibility-1.7.0.201-2.6.16.1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825342" comment="java-1.7.0-openjdk-demo-1.7.0.201-2.6.16.1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825343" comment="java-1.7.0-openjdk-devel-1.7.0.201-2.6.16.1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825344" comment="java-1.7.0-openjdk-headless-1.7.0.201-2.6.16.1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825345" comment="java-1.7.0-openjdk-javadoc-1.7.0.201-2.6.16.1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825346" comment="java-1.7.0-openjdk-src-1.7.0.201-2.6.16.1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824607" comment="java-1.8.0-openjdk-1.8.0.191.b12-0.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824608" comment="java-1.8.0-openjdk-accessibility-1.8.0.191.b12-0.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824609" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.191.b12-0.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824610" comment="java-1.8.0-openjdk-debug-1.8.0.191.b12-0.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824611" comment="java-1.8.0-openjdk-demo-1.8.0.191.b12-0.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824612" comment="java-1.8.0-openjdk-demo-debug-1.8.0.191.b12-0.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824613" comment="java-1.8.0-openjdk-devel-1.8.0.191.b12-0.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824614" comment="java-1.8.0-openjdk-devel-debug-1.8.0.191.b12-0.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824615" comment="java-1.8.0-openjdk-headless-1.8.0.191.b12-0.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824616" comment="java-1.8.0-openjdk-headless-debug-1.8.0.191.b12-0.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824617" comment="java-1.8.0-openjdk-javadoc-1.8.0.191.b12-0.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824618" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.191.b12-0.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824619" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.191.b12-0.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824620" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.191.b12-0.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824621" comment="java-1.8.0-openjdk-src-1.8.0.191.b12-0.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824622" comment="java-1.8.0-openjdk-src-debug-1.8.0.191.b12-0.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825375" comment="java-11-openjdk-11.0.1.13-3.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825376" comment="java-11-openjdk-debug-11.0.1.13-3.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825377" comment="java-11-openjdk-demo-11.0.1.13-3.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825378" comment="java-11-openjdk-demo-debug-11.0.1.13-3.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825379" comment="java-11-openjdk-devel-11.0.1.13-3.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825380" comment="java-11-openjdk-devel-debug-11.0.1.13-3.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825381" comment="java-11-openjdk-headless-11.0.1.13-3.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825382" comment="java-11-openjdk-headless-debug-11.0.1.13-3.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825383" comment="java-11-openjdk-javadoc-11.0.1.13-3.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825384" comment="java-11-openjdk-javadoc-debug-11.0.1.13-3.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825385" comment="java-11-openjdk-javadoc-zip-11.0.1.13-3.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825386" comment="java-11-openjdk-javadoc-zip-debug-11.0.1.13-3.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825387" comment="java-11-openjdk-jmods-11.0.1.13-3.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825388" comment="java-11-openjdk-jmods-debug-11.0.1.13-3.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825389" comment="java-11-openjdk-src-11.0.1.13-3.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825390" comment="java-11-openjdk-src-debug-11.0.1.13-3.el7_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3180</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-3180" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3180" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-3180" ref_url="https://www.suse.com/security/cve/CVE-2018-3180" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3868-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3933-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3933-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4064-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0049-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0057-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3235-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RFNMLBT3DRHXG2JK3I4ER3PGQ2WEQIFT/#RFNMLBT3DRHXG2JK3I4ER3PGQ2WEQIFT" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0042-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DNU7M5Z2B7TCVZ4AJHU2KUMRUBGPJNVB/#DNU7M5Z2B7TCVZ4AJHU2KUMRUBGPJNVB" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0043-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U4E6TD23MZPFSCCET3CCXBOEPKA4LWCJ/#U4E6TD23MZPFSCCET3CCXBOEPKA4LWCJ" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JSSE). Supported versions that are affected are Java SE: 6u201, 7u191, 8u182 and 11; Java SE Embedded: 8u181; JRockit: R28.3.19. Difficult to exploit vulnerability allows unauthenticated attacker with network access via SSL/TLS to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded, JRockit accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded, JRockit accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g. through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-3180/">CVE-2018-3180 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3180">CVE-2018-3180 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1112142">SUSE bug 1112142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112143">SUSE bug 1112143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112144">SUSE bug 1112144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112146">SUSE bug 1112146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112147">SUSE bug 1112147</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112148">SUSE bug 1112148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112152">SUSE bug 1112152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116574">SUSE bug 1116574</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825340" comment="java-1.7.0-openjdk-1.7.0.201-2.6.16.1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825341" comment="java-1.7.0-openjdk-accessibility-1.7.0.201-2.6.16.1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825342" comment="java-1.7.0-openjdk-demo-1.7.0.201-2.6.16.1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825343" comment="java-1.7.0-openjdk-devel-1.7.0.201-2.6.16.1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825344" comment="java-1.7.0-openjdk-headless-1.7.0.201-2.6.16.1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825345" comment="java-1.7.0-openjdk-javadoc-1.7.0.201-2.6.16.1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825346" comment="java-1.7.0-openjdk-src-1.7.0.201-2.6.16.1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824607" comment="java-1.8.0-openjdk-1.8.0.191.b12-0.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824608" comment="java-1.8.0-openjdk-accessibility-1.8.0.191.b12-0.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824609" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.191.b12-0.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824610" comment="java-1.8.0-openjdk-debug-1.8.0.191.b12-0.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824611" comment="java-1.8.0-openjdk-demo-1.8.0.191.b12-0.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824612" comment="java-1.8.0-openjdk-demo-debug-1.8.0.191.b12-0.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824613" comment="java-1.8.0-openjdk-devel-1.8.0.191.b12-0.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824614" comment="java-1.8.0-openjdk-devel-debug-1.8.0.191.b12-0.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824615" comment="java-1.8.0-openjdk-headless-1.8.0.191.b12-0.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824616" comment="java-1.8.0-openjdk-headless-debug-1.8.0.191.b12-0.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824617" comment="java-1.8.0-openjdk-javadoc-1.8.0.191.b12-0.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824618" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.191.b12-0.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824619" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.191.b12-0.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824620" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.191.b12-0.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824621" comment="java-1.8.0-openjdk-src-1.8.0.191.b12-0.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824622" comment="java-1.8.0-openjdk-src-debug-1.8.0.191.b12-0.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825375" comment="java-11-openjdk-11.0.1.13-3.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825376" comment="java-11-openjdk-debug-11.0.1.13-3.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825377" comment="java-11-openjdk-demo-11.0.1.13-3.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825378" comment="java-11-openjdk-demo-debug-11.0.1.13-3.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825379" comment="java-11-openjdk-devel-11.0.1.13-3.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825380" comment="java-11-openjdk-devel-debug-11.0.1.13-3.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825381" comment="java-11-openjdk-headless-11.0.1.13-3.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825382" comment="java-11-openjdk-headless-debug-11.0.1.13-3.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825383" comment="java-11-openjdk-javadoc-11.0.1.13-3.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825384" comment="java-11-openjdk-javadoc-debug-11.0.1.13-3.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825385" comment="java-11-openjdk-javadoc-zip-11.0.1.13-3.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825386" comment="java-11-openjdk-javadoc-zip-debug-11.0.1.13-3.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825387" comment="java-11-openjdk-jmods-11.0.1.13-3.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825388" comment="java-11-openjdk-jmods-debug-11.0.1.13-3.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825389" comment="java-11-openjdk-src-11.0.1.13-3.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825390" comment="java-11-openjdk-src-debug-11.0.1.13-3.el7_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183183" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3183</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-3183" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3183" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-3183" ref_url="https://www.suse.com/security/cve/CVE-2018-3183" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3868-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4064-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0057-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3235-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RFNMLBT3DRHXG2JK3I4ER3PGQ2WEQIFT/#RFNMLBT3DRHXG2JK3I4ER3PGQ2WEQIFT" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0043-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U4E6TD23MZPFSCCET3CCXBOEPKA4LWCJ/#U4E6TD23MZPFSCCET3CCXBOEPKA4LWCJ" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Scripting). Supported versions that are affected are Java SE: 8u182 and 11; Java SE Embedded: 8u181; JRockit: R28.3.19. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. While the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g. through a web service which supplies data to the APIs. CVSS 3.0 Base Score 9.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3183/">CVE-2018-3183 at SUSE</cve>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3183">CVE-2018-3183 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1112142">SUSE bug 1112142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112143">SUSE bug 1112143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112144">SUSE bug 1112144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112146">SUSE bug 1112146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112148">SUSE bug 1112148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112152">SUSE bug 1112152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116574">SUSE bug 1116574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120714">SUSE bug 1120714</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824607" comment="java-1.8.0-openjdk-1.8.0.191.b12-0.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824608" comment="java-1.8.0-openjdk-accessibility-1.8.0.191.b12-0.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824609" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.191.b12-0.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824610" comment="java-1.8.0-openjdk-debug-1.8.0.191.b12-0.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824611" comment="java-1.8.0-openjdk-demo-1.8.0.191.b12-0.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824612" comment="java-1.8.0-openjdk-demo-debug-1.8.0.191.b12-0.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824613" comment="java-1.8.0-openjdk-devel-1.8.0.191.b12-0.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824614" comment="java-1.8.0-openjdk-devel-debug-1.8.0.191.b12-0.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824615" comment="java-1.8.0-openjdk-headless-1.8.0.191.b12-0.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824616" comment="java-1.8.0-openjdk-headless-debug-1.8.0.191.b12-0.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824617" comment="java-1.8.0-openjdk-javadoc-1.8.0.191.b12-0.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824618" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.191.b12-0.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824619" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.191.b12-0.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824620" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.191.b12-0.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824621" comment="java-1.8.0-openjdk-src-1.8.0.191.b12-0.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824622" comment="java-1.8.0-openjdk-src-debug-1.8.0.191.b12-0.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825375" comment="java-11-openjdk-11.0.1.13-3.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825376" comment="java-11-openjdk-debug-11.0.1.13-3.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825377" comment="java-11-openjdk-demo-11.0.1.13-3.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825378" comment="java-11-openjdk-demo-debug-11.0.1.13-3.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825379" comment="java-11-openjdk-devel-11.0.1.13-3.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825380" comment="java-11-openjdk-devel-debug-11.0.1.13-3.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825381" comment="java-11-openjdk-headless-11.0.1.13-3.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825382" comment="java-11-openjdk-headless-debug-11.0.1.13-3.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825383" comment="java-11-openjdk-javadoc-11.0.1.13-3.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825384" comment="java-11-openjdk-javadoc-debug-11.0.1.13-3.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825385" comment="java-11-openjdk-javadoc-zip-11.0.1.13-3.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825386" comment="java-11-openjdk-javadoc-zip-debug-11.0.1.13-3.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825387" comment="java-11-openjdk-jmods-11.0.1.13-3.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825388" comment="java-11-openjdk-jmods-debug-11.0.1.13-3.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825389" comment="java-11-openjdk-src-11.0.1.13-3.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825390" comment="java-11-openjdk-src-debug-11.0.1.13-3.el7_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183214" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3214</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-3214" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3214" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-3214" ref_url="https://www.suse.com/security/cve/CVE-2018-3214" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3868-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3933-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3933-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4064-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0049-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0057-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0042-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DNU7M5Z2B7TCVZ4AJHU2KUMRUBGPJNVB/#DNU7M5Z2B7TCVZ4AJHU2KUMRUBGPJNVB" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0043-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U4E6TD23MZPFSCCET3CCXBOEPKA4LWCJ/#U4E6TD23MZPFSCCET3CCXBOEPKA4LWCJ" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Sound). Supported versions that are affected are Java SE: 6u201, 7u191 and 8u182; Java SE Embedded: 8u181; JRockit: R28.3.19. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g. through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-3214/">CVE-2018-3214 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3214">CVE-2018-3214 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1112142">SUSE bug 1112142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112143">SUSE bug 1112143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112144">SUSE bug 1112144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112146">SUSE bug 1112146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112148">SUSE bug 1112148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112152">SUSE bug 1112152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116574">SUSE bug 1116574</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825340" comment="java-1.7.0-openjdk-1.7.0.201-2.6.16.1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825341" comment="java-1.7.0-openjdk-accessibility-1.7.0.201-2.6.16.1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825342" comment="java-1.7.0-openjdk-demo-1.7.0.201-2.6.16.1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825343" comment="java-1.7.0-openjdk-devel-1.7.0.201-2.6.16.1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825344" comment="java-1.7.0-openjdk-headless-1.7.0.201-2.6.16.1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825345" comment="java-1.7.0-openjdk-javadoc-1.7.0.201-2.6.16.1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825346" comment="java-1.7.0-openjdk-src-1.7.0.201-2.6.16.1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824607" comment="java-1.8.0-openjdk-1.8.0.191.b12-0.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824608" comment="java-1.8.0-openjdk-accessibility-1.8.0.191.b12-0.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824609" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.191.b12-0.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824610" comment="java-1.8.0-openjdk-debug-1.8.0.191.b12-0.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824611" comment="java-1.8.0-openjdk-demo-1.8.0.191.b12-0.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824612" comment="java-1.8.0-openjdk-demo-debug-1.8.0.191.b12-0.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824613" comment="java-1.8.0-openjdk-devel-1.8.0.191.b12-0.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824614" comment="java-1.8.0-openjdk-devel-debug-1.8.0.191.b12-0.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824615" comment="java-1.8.0-openjdk-headless-1.8.0.191.b12-0.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824616" comment="java-1.8.0-openjdk-headless-debug-1.8.0.191.b12-0.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824617" comment="java-1.8.0-openjdk-javadoc-1.8.0.191.b12-0.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824618" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.191.b12-0.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824619" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.191.b12-0.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824620" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.191.b12-0.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824621" comment="java-1.8.0-openjdk-src-1.8.0.191.b12-0.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824622" comment="java-1.8.0-openjdk-src-debug-1.8.0.191.b12-0.el7_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183282" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3282</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-3282" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3282" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-3282" ref_url="https://www.suse.com/security/cve/CVE-2018-3282" source="SUSE CVE"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3972-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183972-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0555-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190555-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0628-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190628-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005775.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3478-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TXOIDV3A62VYHQJPOT3AJWCVKKCGT56F/#TXOIDV3A62VYHQJPOT3AJWCVKKCGT56F" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0327-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZBIBDKV4Q445TSAAVXOJN365L7BQQWY6/#ZBIBDKV4Q445TSAAVXOJN365L7BQQWY6" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Storage Engines). Supported versions that are affected are 5.5.61 and prior, 5.6.41 and prior, 5.7.23 and prior and 8.0.12 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3282/">CVE-2018-3282 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3282">CVE-2018-3282 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1112432">SUSE bug 1112432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116686">SUSE bug 1116686</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826567" comment="mariadb-5.5.64-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826568" comment="mariadb-bench-5.5.64-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826569" comment="mariadb-devel-5.5.64-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826570" comment="mariadb-embedded-5.5.64-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826571" comment="mariadb-embedded-devel-5.5.64-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826572" comment="mariadb-libs-5.5.64-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826573" comment="mariadb-server-5.5.64-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826574" comment="mariadb-test-5.5.64-1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183613" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3613</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-3613" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3613" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-3613" ref_url="https://www.suse.com/security/cve/CVE-2018-3613" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:4155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004989.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4240-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JPZORSTLPA2LHXFITF73X42HP5R6Q6ZF/#JPZORSTLPA2LHXFITF73X42HP5R6Q6ZF" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4254-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IU5LKCPVWU234CM7DGXXXCLPBTLJ6SNH/#IU5LKCPVWU234CM7DGXXXCLPBTLJ6SNH" source="SUSE-SU"/>
    <description>
    Logic issue in variable service module for EDK II/UDK2018/UDK2017/UDK2015 may allow an authenticated user to potentially enable escalation of privilege, information disclosure and/or denial of service via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3613/">CVE-2018-3613 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3613">CVE-2018-3613 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1115916">SUSE bug 1115916</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826217" comment="OVMF-20180508-6.gitee3198e672e2.el7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183620" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3620</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-3620" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3620" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-3620" ref_url="https://www.suse.com/security/cve/CVE-2018-3620" source="SUSE CVE"/>
		<reference ref_id="L1TF-BLOG-SUSE" ref_url="https://www.suse.com/c/suse-addresses-the-l1-terminal-fault-issue/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2344-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2366-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004537.html" source="SUSE-SU"/>
		<reference ref_id="TID000019216" ref_url="https://www.suse.com/support/kb/doc/?id=000019216" source="SUSE-SU"/>
		<reference ref_id="TID000019230" ref_url="https://www.suse.com/support/kb/doc/?id=000019230" source="SUSE-SU"/>
		<reference ref_id="TID000019335" ref_url="https://www.suse.com/support/kb/doc/?id=000019335" source="SUSE-SU"/>
		<reference ref_id="TID000019439" ref_url="https://www.suse.com/support/kb/doc/?id=000019439" source="SUSE-SU"/>
		<reference ref_id="TID7023077" ref_url="https://www.suse.com/support/kb/doc/?id=7023077" source="SUSE-SU"/>
		<reference ref_id="TID7023078" ref_url="https://www.suse.com/support/kb/doc/?id=7023078" source="SUSE-SU"/>
		<reference ref_id="TID7023312" ref_url="https://www.suse.com/support/kb/doc/?id=7023312" source="SUSE-SU"/>
		<reference ref_id="TID7023497" ref_url="https://www.suse.com/support/kb/doc/?id=7023497" source="SUSE-SU"/>
		<reference ref_id="TID7023836" ref_url="https://www.suse.com/support/kb/doc/?id=7023836" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2404-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DHR6QOZXXCNSV77C5MHVLBK4DBFOQPCN/#DHR6QOZXXCNSV77C5MHVLBK4DBFOQPCN" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2407-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6QZ6OW67VR3KFGN3MO3RPGU6G64AJTPB/#6QZ6OW67VR3KFGN3MO3RPGU6G64AJTPB" source="SUSE-SU"/>
    <description>
    Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access via a terminal page fault and a side-channel analysis.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3620/">CVE-2018-3620 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3620">CVE-2018-3620 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1087078">SUSE bug 1087078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087081">SUSE bug 1087081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089343">SUSE bug 1089343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090340">SUSE bug 1090340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091107">SUSE bug 1091107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099306">SUSE bug 1099306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104894">SUSE bug 1104894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136865">SUSE bug 1136865</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201877">SUSE bug 1201877</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824504" comment="kernel-3.10.0-862.11.6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824505" comment="kernel-abi-whitelists-3.10.0-862.11.6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824506" comment="kernel-debug-3.10.0-862.11.6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824509" comment="kernel-doc-3.10.0-862.11.6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824510" comment="kernel-headers-3.10.0-862.11.6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824511" comment="kernel-tools-3.10.0-862.11.6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824512" comment="kernel-tools-libs-3.10.0-862.11.6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824514" comment="perf-3.10.0-862.11.6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824515" comment="python-perf-3.10.0-862.11.6.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183639" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3639</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-3639" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3639" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639" source="SUSE CVE"/>
		<reference ref_id="BLOG-SPECTREV4" ref_url="https://www.suse.com/c/suse-addresses-spectre-variant-4/" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1362-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1363-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1366-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1377-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1614-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1699-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1935-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004357.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2304-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2331-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2335-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2340-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2650-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004631.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2973-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3064-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3064-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0049-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1211-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007405.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3324-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3349-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031064.html" source="SUSE-SU"/>
		<reference ref_id="TID000019189" ref_url="https://www.suse.com/support/kb/doc/?id=000019189" source="SUSE-SU"/>
		<reference ref_id="TID000019439" ref_url="https://www.suse.com/support/kb/doc/?id=000019439" source="SUSE-SU"/>
		<reference ref_id="TID7022512" ref_url="https://www.suse.com/support/kb/doc/?id=7022512" source="SUSE-SU"/>
		<reference ref_id="TID7022937" ref_url="https://www.suse.com/support/kb/doc/?id=7022937" source="SUSE-SU"/>
		<reference ref_id="TID7023836" ref_url="https://www.suse.com/support/kb/doc/?id=7023836" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1380-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3BCCQDPJW2OALB7V422FPMTSVLNT4SDK/#3BCCQDPJW2OALB7V422FPMTSVLNT4SDK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1418-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EN4KK2FGUDUKZAKRD5IRYD6AZQXJA3AU/#EN4KK2FGUDUKZAKRD5IRYD6AZQXJA3AU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1420-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DTY7JAJYMYELBQLVDLRBKHCODMF4VR2X/#DTY7JAJYMYELBQLVDLRBKHCODMF4VR2X" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1487-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5D5HCM6BTW7CSKI6FOYBLEEDAUENGGXC/#5D5HCM6BTW7CSKI6FOYBLEEDAUENGGXC" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1621-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FSQV2LVBPYK6LXE7MQKJGQOAPCP5LUJR/#FSQV2LVBPYK6LXE7MQKJGQOAPCP5LUJR" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1623-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XUSB6PC7DAOIGXD55U5BIXS3XLAJSCAD/#XUSB6PC7DAOIGXD55U5BIXS3XLAJSCAD" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1628-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MBPI2AXXFYB4AEHXIP57EMI675FERZLJ/#MBPI2AXXFYB4AEHXIP57EMI675FERZLJ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1773-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ID6PAFCJG4KPF2AULGBYPBQUFIOCIVYC/#ID6PAFCJG4KPF2AULGBYPBQUFIOCIVYC" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1904-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UCRPNJGUE3UBRNI24CJSLFLYA36U5YTK/#UCRPNJGUE3UBRNI24CJSLFLYA36U5YTK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2306-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/D2PVS7GZZR7IJ5VTYMKLDALGNC6VIE7J/#D2PVS7GZZR7IJ5VTYMKLDALGNC6VIE7J" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2399-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/USTMB5QHLNG2XPHOBRVR2A5AQTUUFTJD/#USTMB5QHLNG2XPHOBRVR2A5AQTUUFTJD" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2402-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LV572SEMHY7W2BLBGHICX7YQUWOEXYOY/#LV572SEMHY7W2BLBGHICX7YQUWOEXYOY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3103-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2PFA5BW2DAJTSU5WJ6XZHKPJGNFARXDO/#2PFA5BW2DAJTSU5WJ6XZHKPJGNFARXDO" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3709-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6QVAQ44FSYXJBEKJIEYZNJJDZMVYSMAC/#6QVAQ44FSYXJBEKJIEYZNJJDZMVYSMAC" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0042-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DNU7M5Z2B7TCVZ4AJHU2KUMRUBGPJNVB/#DNU7M5Z2B7TCVZ4AJHU2KUMRUBGPJNVB" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1438-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7O77T6GROGFAGVFEVEOJLXNTO37WYB7M/#7O77T6GROGFAGVFEVEOJLXNTO37WYB7M" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1439-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SRTWOMLHK3HQNCIFSWBLQE7M6MCMULOE/#SRTWOMLHK3HQNCIFSWBLQE7M6MCMULOE" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1325-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PR7IAIXMEHH4XQP5TC46UTZY6KWF5277/" source="SUSE-SU"/>
    <description>
    Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3639">CVE-2018-3639 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1074701">SUSE bug 1074701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085235">SUSE bug 1085235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085308">SUSE bug 1085308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087078">SUSE bug 1087078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092631">SUSE bug 1092631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092885">SUSE bug 1092885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094912">SUSE bug 1094912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098813">SUSE bug 1098813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100394">SUSE bug 1100394</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102640">SUSE bug 1102640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105412">SUSE bug 1105412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111963">SUSE bug 1111963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172781">SUSE bug 1172781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172782">SUSE bug 1172782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172783">SUSE bug 1172783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173489">SUSE bug 1173489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201877">SUSE bug 1201877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215674">SUSE bug 1215674</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824320" comment="java-1.7.0-openjdk-1.7.0.181-2.6.14.8.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824321" comment="java-1.7.0-openjdk-accessibility-1.7.0.181-2.6.14.8.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824322" comment="java-1.7.0-openjdk-demo-1.7.0.181-2.6.14.8.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824323" comment="java-1.7.0-openjdk-devel-1.7.0.181-2.6.14.8.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824324" comment="java-1.7.0-openjdk-headless-1.7.0.181-2.6.14.8.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824325" comment="java-1.7.0-openjdk-javadoc-1.7.0.181-2.6.14.8.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824326" comment="java-1.7.0-openjdk-src-1.7.0.181-2.6.14.8.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824327" comment="java-1.8.0-openjdk-1.8.0.171-8.b10.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824328" comment="java-1.8.0-openjdk-accessibility-1.8.0.171-8.b10.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824329" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.171-8.b10.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824330" comment="java-1.8.0-openjdk-debug-1.8.0.171-8.b10.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824331" comment="java-1.8.0-openjdk-demo-1.8.0.171-8.b10.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824332" comment="java-1.8.0-openjdk-demo-debug-1.8.0.171-8.b10.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824333" comment="java-1.8.0-openjdk-devel-1.8.0.171-8.b10.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824334" comment="java-1.8.0-openjdk-devel-debug-1.8.0.171-8.b10.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824335" comment="java-1.8.0-openjdk-headless-1.8.0.171-8.b10.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824336" comment="java-1.8.0-openjdk-headless-debug-1.8.0.171-8.b10.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824337" comment="java-1.8.0-openjdk-javadoc-1.8.0.171-8.b10.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824338" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.171-8.b10.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824339" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.171-8.b10.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824340" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.171-8.b10.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824341" comment="java-1.8.0-openjdk-src-1.8.0.171-8.b10.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824342" comment="java-1.8.0-openjdk-src-debug-1.8.0.171-8.b10.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824381" comment="kernel-3.10.0-862.6.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824382" comment="kernel-abi-whitelists-3.10.0-862.6.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824383" comment="kernel-debug-3.10.0-862.6.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824386" comment="kernel-doc-3.10.0-862.6.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824387" comment="kernel-headers-3.10.0-862.6.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824388" comment="kernel-tools-3.10.0-862.6.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824389" comment="kernel-tools-libs-3.10.0-862.6.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824401" comment="libvirt-3.9.0-14.el7_5.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824402" comment="libvirt-admin-3.9.0-14.el7_5.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824403" comment="libvirt-client-3.9.0-14.el7_5.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824404" comment="libvirt-daemon-3.9.0-14.el7_5.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824405" comment="libvirt-daemon-config-network-3.9.0-14.el7_5.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824406" comment="libvirt-daemon-config-nwfilter-3.9.0-14.el7_5.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824407" comment="libvirt-daemon-driver-interface-3.9.0-14.el7_5.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824408" comment="libvirt-daemon-driver-lxc-3.9.0-14.el7_5.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824409" comment="libvirt-daemon-driver-network-3.9.0-14.el7_5.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824410" comment="libvirt-daemon-driver-nodedev-3.9.0-14.el7_5.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824411" comment="libvirt-daemon-driver-nwfilter-3.9.0-14.el7_5.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824412" comment="libvirt-daemon-driver-qemu-3.9.0-14.el7_5.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824413" comment="libvirt-daemon-driver-secret-3.9.0-14.el7_5.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824414" comment="libvirt-daemon-driver-storage-3.9.0-14.el7_5.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824415" comment="libvirt-daemon-driver-storage-core-3.9.0-14.el7_5.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824416" comment="libvirt-daemon-driver-storage-disk-3.9.0-14.el7_5.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824417" comment="libvirt-daemon-driver-storage-gluster-3.9.0-14.el7_5.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824418" comment="libvirt-daemon-driver-storage-iscsi-3.9.0-14.el7_5.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824419" comment="libvirt-daemon-driver-storage-logical-3.9.0-14.el7_5.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824420" comment="libvirt-daemon-driver-storage-mpath-3.9.0-14.el7_5.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824421" comment="libvirt-daemon-driver-storage-rbd-3.9.0-14.el7_5.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824422" comment="libvirt-daemon-driver-storage-scsi-3.9.0-14.el7_5.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824423" comment="libvirt-daemon-kvm-3.9.0-14.el7_5.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824424" comment="libvirt-daemon-lxc-3.9.0-14.el7_5.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824425" comment="libvirt-devel-3.9.0-14.el7_5.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824426" comment="libvirt-docs-3.9.0-14.el7_5.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824427" comment="libvirt-libs-3.9.0-14.el7_5.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824428" comment="libvirt-lock-sanlock-3.9.0-14.el7_5.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824429" comment="libvirt-login-shell-3.9.0-14.el7_5.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824430" comment="libvirt-nss-3.9.0-14.el7_5.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824391" comment="perf-3.10.0-862.6.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824392" comment="python-perf-3.10.0-862.6.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824431" comment="qemu-img-1.5.3-156.el7_5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824432" comment="qemu-kvm-1.5.3-156.el7_5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824433" comment="qemu-kvm-common-1.5.3-156.el7_5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824434" comment="qemu-kvm-tools-1.5.3-156.el7_5.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183646" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3646</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-3646" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3646" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-3646" ref_url="https://www.suse.com/security/cve/CVE-2018-3646" source="SUSE CVE"/>
		<reference ref_id="L1TF-BLOG-SUSE" ref_url="https://www.suse.com/c/suse-addresses-the-l1-terminal-fault-issue/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2331-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2335-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2341-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2344-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004428.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2356-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2363-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2366-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2409-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2410-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2410-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2483-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2963-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20182963-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005008.html" source="SUSE-SU"/>
		<reference ref_id="TID000019216" ref_url="https://www.suse.com/support/kb/doc/?id=000019216" source="SUSE-SU"/>
		<reference ref_id="TID000019230" ref_url="https://www.suse.com/support/kb/doc/?id=000019230" source="SUSE-SU"/>
		<reference ref_id="TID000019335" ref_url="https://www.suse.com/support/kb/doc/?id=000019335" source="SUSE-SU"/>
		<reference ref_id="TID000019439" ref_url="https://www.suse.com/support/kb/doc/?id=000019439" source="SUSE-SU"/>
		<reference ref_id="TID7023077" ref_url="https://www.suse.com/support/kb/doc/?id=7023077" source="SUSE-SU"/>
		<reference ref_id="TID7023078" ref_url="https://www.suse.com/support/kb/doc/?id=7023078" source="SUSE-SU"/>
		<reference ref_id="TID7023312" ref_url="https://www.suse.com/support/kb/doc/?id=7023312" source="SUSE-SU"/>
		<reference ref_id="TID7023497" ref_url="https://www.suse.com/support/kb/doc/?id=7023497" source="SUSE-SU"/>
		<reference ref_id="TID7023836" ref_url="https://www.suse.com/support/kb/doc/?id=7023836" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2399-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/USTMB5QHLNG2XPHOBRVR2A5AQTUUFTJD/#USTMB5QHLNG2XPHOBRVR2A5AQTUUFTJD" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2404-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DHR6QOZXXCNSV77C5MHVLBK4DBFOQPCN/#DHR6QOZXXCNSV77C5MHVLBK4DBFOQPCN" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2407-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6QZ6OW67VR3KFGN3MO3RPGU6G64AJTPB/#6QZ6OW67VR3KFGN3MO3RPGU6G64AJTPB" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2434-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6LYYJIDEGPPEFUUXEAYMPHFAQGR6NTGX/#6LYYJIDEGPPEFUUXEAYMPHFAQGR6NTGX" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2436-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LDNBQIEC4J7WNUVAS6GCDAN7EQNDPMLV/#LDNBQIEC4J7WNUVAS6GCDAN7EQNDPMLV" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4304-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZGEUHNX43HCCBYABAIEDDEBPSLPX6CIN/#ZGEUHNX43HCCBYABAIEDDEBPSLPX6CIN" source="SUSE-SU"/>
    <description>
    Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3646/">CVE-2018-3646 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3646">CVE-2018-3646 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1087078">SUSE bug 1087078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087081">SUSE bug 1087081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089343">SUSE bug 1089343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091107">SUSE bug 1091107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099306">SUSE bug 1099306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104365">SUSE bug 1104365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104894">SUSE bug 1104894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106548">SUSE bug 1106548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113534">SUSE bug 1113534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136865">SUSE bug 1136865</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201877">SUSE bug 1201877</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824504" comment="kernel-3.10.0-862.11.6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824505" comment="kernel-abi-whitelists-3.10.0-862.11.6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824506" comment="kernel-debug-3.10.0-862.11.6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824509" comment="kernel-doc-3.10.0-862.11.6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824510" comment="kernel-headers-3.10.0-862.11.6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824511" comment="kernel-tools-3.10.0-862.11.6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824512" comment="kernel-tools-libs-3.10.0-862.11.6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824514" comment="perf-3.10.0-862.11.6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824515" comment="python-perf-3.10.0-862.11.6.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183665" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3665</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-3665" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3665" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-3665" ref_url="https://www.suse.com/security/cve/CVE-2018-3665" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1855-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1942-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1944-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1981-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2081-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004328.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004332.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2099-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20182099-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004347.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004348.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004349.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004351.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004387.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004391.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004393.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004395.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004397.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004499.html" source="SUSE-SU"/>
		<reference ref_id="TID000019231" ref_url="https://www.suse.com/support/kb/doc/?id=000019231" source="SUSE-SU"/>
		<reference ref_id="TID000019261" ref_url="https://www.suse.com/support/kb/doc/?id=000019261" source="SUSE-SU"/>
		<reference ref_id="TID000019439" ref_url="https://www.suse.com/support/kb/doc/?id=000019439" source="SUSE-SU"/>
		<reference ref_id="TID7022512" ref_url="https://www.suse.com/support/kb/doc/?id=7022512" source="SUSE-SU"/>
		<reference ref_id="TID7023076" ref_url="https://www.suse.com/support/kb/doc/?id=7023076" source="SUSE-SU"/>
		<reference ref_id="TID7023167" ref_url="https://www.suse.com/support/kb/doc/?id=7023167" source="SUSE-SU"/>
		<reference ref_id="TID7023836" ref_url="https://www.suse.com/support/kb/doc/?id=7023836" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1773-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ID6PAFCJG4KPF2AULGBYPBQUFIOCIVYC/#ID6PAFCJG4KPF2AULGBYPBQUFIOCIVYC" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2116-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N3OKO7RNL6JS24VQY6ENCPL3INPB4JPH/#N3OKO7RNL6JS24VQY6ENCPL3INPB4JPH" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2211-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VZ33BMB7LZHYUFUTHA35O66BLP6RK4N/#5VZ33BMB7LZHYUFUTHA35O66BLP6RK4N" source="SUSE-SU"/>
    <description>
    System software utilizing Lazy FP state restore technique on systems using Intel Core-based microprocessors may potentially allow a local process to infer data from another process through a speculative execution side channel.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3665/">CVE-2018-3665 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3665">CVE-2018-3665 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1087078">SUSE bug 1087078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087086">SUSE bug 1087086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090338">SUSE bug 1090338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095241">SUSE bug 1095241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095242">SUSE bug 1095242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096740">SUSE bug 1096740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100091">SUSE bug 1100091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100555">SUSE bug 1100555</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824353" comment="kernel-3.10.0-862.3.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824354" comment="kernel-abi-whitelists-3.10.0-862.3.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824355" comment="kernel-debug-3.10.0-862.3.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824358" comment="kernel-doc-3.10.0-862.3.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824359" comment="kernel-headers-3.10.0-862.3.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824360" comment="kernel-tools-3.10.0-862.3.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824361" comment="kernel-tools-libs-3.10.0-862.3.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824363" comment="perf-3.10.0-862.3.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824364" comment="python-perf-3.10.0-862.3.3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183693" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3693</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-3693" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3693" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-3693" ref_url="https://www.suse.com/security/cve/CVE-2018-3693" source="SUSE CVE"/>
		<reference ref_id="TID000019229" ref_url="https://www.suse.com/support/kb/doc/?id=000019229" source="SUSE-SU"/>
		<reference ref_id="TID000019439" ref_url="https://www.suse.com/support/kb/doc/?id=000019439" source="SUSE-SU"/>
		<reference ref_id="TID7022512" ref_url="https://www.suse.com/support/kb/doc/?id=7022512" source="SUSE-SU"/>
		<reference ref_id="TID7023075" ref_url="https://www.suse.com/support/kb/doc/?id=7023075" source="SUSE-SU"/>
		<reference ref_id="TID7023836" ref_url="https://www.suse.com/support/kb/doc/?id=7023836" source="SUSE-SU"/>
    <description>
    Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a speculative buffer overflow and side-channel analysis.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3693/">CVE-2018-3693 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3693">CVE-2018-3693 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1087078">SUSE bug 1087078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087084">SUSE bug 1087084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101008">SUSE bug 1101008</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824504" comment="kernel-3.10.0-862.11.6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824505" comment="kernel-abi-whitelists-3.10.0-862.11.6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824506" comment="kernel-debug-3.10.0-862.11.6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824509" comment="kernel-doc-3.10.0-862.11.6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824510" comment="kernel-headers-3.10.0-862.11.6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824511" comment="kernel-tools-3.10.0-862.11.6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824512" comment="kernel-tools-libs-3.10.0-862.11.6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824514" comment="perf-3.10.0-862.11.6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824515" comment="python-perf-3.10.0-862.11.6.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184121" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4121</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4121" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4121" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4121" ref_url="https://www.suse.com/security/cve/CVE-2018-4121" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004781.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3473-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BDAK2MVOAPTEET4XJ6HHZXTMPNQCVMAW/#BDAK2MVOAPTEET4XJ6HHZXTMPNQCVMAW" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari before 11.1 is affected. iCloud before 7.4 on Windows is affected. iTunes before 12.7.4 on Windows is affected. tvOS before 11.3 is affected. watchOS before 4.3 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-07"/>
	<updated date="2026-03-07"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4121/">CVE-2018-4121 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4121">CVE-2018-4121 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1092278">SUSE bug 1092278</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824843" comment="PackageKit-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824844" comment="PackageKit-command-not-found-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824845" comment="PackageKit-cron-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824846" comment="PackageKit-glib-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824847" comment="PackageKit-glib-devel-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824848" comment="PackageKit-gstreamer-plugin-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824849" comment="PackageKit-gtk3-module-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824850" comment="PackageKit-yum-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824851" comment="PackageKit-yum-plugin-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824852" comment="accountsservice-0.6.50-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824853" comment="accountsservice-devel-0.6.50-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824854" comment="accountsservice-libs-0.6.50-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824855" comment="adwaita-cursor-theme-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824856" comment="adwaita-gtk2-theme-3.28-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824857" comment="adwaita-icon-theme-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824858" comment="adwaita-icon-theme-devel-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824859" comment="appstream-data-7-20180614.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824860" comment="at-spi2-atk-2.26.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824861" comment="at-spi2-atk-devel-2.26.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824862" comment="at-spi2-core-2.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824863" comment="at-spi2-core-devel-2.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824864" comment="atk-2.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824865" comment="atk-devel-2.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824866" comment="baobab-3.28.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824867" comment="bolt-0.4-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824868" comment="brasero-3.12.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824869" comment="brasero-devel-3.12.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824870" comment="brasero-libs-3.12.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824871" comment="brasero-nautilus-3.12.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824872" comment="cairo-1.15.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824873" comment="cairo-devel-1.15.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824874" comment="cairo-gobject-1.15.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824875" comment="cairo-gobject-devel-1.15.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824876" comment="cairo-tools-1.15.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824877" comment="cheese-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824878" comment="cheese-libs-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824879" comment="cheese-libs-devel-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824880" comment="clutter-gst3-3.0.26-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824881" comment="clutter-gst3-devel-3.0.26-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824882" comment="compat-exiv2-023-0.23-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824883" comment="compat-libical1-1.0.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824884" comment="control-center-3.28.1-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824885" comment="control-center-filesystem-3.28.1-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824886" comment="dconf-0.28.0-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824887" comment="dconf-devel-0.28.0-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824888" comment="dconf-editor-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824889" comment="devhelp-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824890" comment="devhelp-devel-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824891" comment="devhelp-libs-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824892" comment="ekiga-4.0.1-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824893" comment="empathy-3.12.13-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824894" comment="eog-3.28.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824895" comment="eog-devel-3.28.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824896" comment="evince-3.28.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824897" comment="evince-browser-plugin-3.28.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824898" comment="evince-devel-3.28.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824899" comment="evince-dvi-3.28.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824900" comment="evince-libs-3.28.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824901" comment="evince-nautilus-3.28.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824902" comment="evolution-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824903" comment="evolution-bogofilter-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824904" comment="evolution-data-server-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824905" comment="evolution-data-server-devel-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824906" comment="evolution-data-server-doc-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824907" comment="evolution-data-server-langpacks-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824908" comment="evolution-data-server-perl-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824909" comment="evolution-data-server-tests-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824910" comment="evolution-devel-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824911" comment="evolution-devel-docs-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824912" comment="evolution-ews-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824913" comment="evolution-ews-langpacks-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824914" comment="evolution-help-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824915" comment="evolution-langpacks-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824916" comment="evolution-mapi-3.28.3-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824917" comment="evolution-mapi-langpacks-3.28.3-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824918" comment="evolution-pst-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824919" comment="evolution-spamassassin-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824920" comment="evolution-tests-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824921" comment="file-roller-3.28.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824922" comment="file-roller-nautilus-3.28.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824923" comment="flatpak-1.0.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824924" comment="flatpak-builder-1.0.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824925" comment="flatpak-devel-1.0.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824926" comment="flatpak-libs-1.0.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824927" comment="folks-0.11.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824928" comment="folks-devel-0.11.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824929" comment="folks-tools-0.11.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824930" comment="fontconfig-2.13.0-4.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824931" comment="fontconfig-devel-2.13.0-4.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824932" comment="fontconfig-devel-doc-2.13.0-4.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824933" comment="freetype-2.8-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824934" comment="freetype-demos-2.8-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824935" comment="freetype-devel-2.8-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824936" comment="fribidi-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824937" comment="fribidi-devel-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824938" comment="fwupd-1.0.8-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824939" comment="fwupd-devel-1.0.8-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824940" comment="fwupdate-12-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824941" comment="fwupdate-devel-12-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824942" comment="fwupdate-efi-12-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824943" comment="fwupdate-libs-12-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824944" comment="gcr-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824945" comment="gcr-devel-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824946" comment="gdk-pixbuf2-2.36.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824947" comment="gdk-pixbuf2-devel-2.36.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824948" comment="gdk-pixbuf2-tests-2.36.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824949" comment="gdm-3.28.2-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824950" comment="gdm-devel-3.28.2-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824951" comment="gdm-pam-extensions-devel-3.28.2-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824952" comment="gedit-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824953" comment="gedit-devel-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824954" comment="gedit-plugin-bookmarks-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824955" comment="gedit-plugin-bracketcompletion-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824956" comment="gedit-plugin-charmap-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824957" comment="gedit-plugin-codecomment-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824958" comment="gedit-plugin-colorpicker-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824959" comment="gedit-plugin-colorschemer-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824960" comment="gedit-plugin-commander-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824961" comment="gedit-plugin-drawspaces-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824962" comment="gedit-plugin-findinfiles-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824963" comment="gedit-plugin-joinlines-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824964" comment="gedit-plugin-multiedit-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824965" comment="gedit-plugin-smartspaces-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824966" comment="gedit-plugin-synctex-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824967" comment="gedit-plugin-terminal-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824968" comment="gedit-plugin-textsize-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824969" comment="gedit-plugin-translate-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824970" comment="gedit-plugin-wordcompletion-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824971" comment="gedit-plugins-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824972" comment="gedit-plugins-data-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824973" comment="geoclue2-2.4.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824974" comment="geoclue2-demos-2.4.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824975" comment="geoclue2-devel-2.4.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824976" comment="geoclue2-libs-2.4.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824977" comment="geocode-glib-3.26.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824978" comment="geocode-glib-devel-3.26.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824979" comment="gjs-1.52.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824980" comment="gjs-devel-1.52.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824981" comment="gjs-tests-1.52.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824982" comment="glade-3.22.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824983" comment="glade-devel-3.22.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824984" comment="glade-libs-3.22.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824985" comment="glib-networking-2.56.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824986" comment="glib-networking-tests-2.56.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824987" comment="glib2-2.56.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824988" comment="glib2-devel-2.56.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824989" comment="glib2-doc-2.56.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824990" comment="glib2-fam-2.56.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824991" comment="glib2-static-2.56.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824992" comment="glib2-tests-2.56.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824993" comment="glibmm24-2.56.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824994" comment="glibmm24-devel-2.56.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824995" comment="glibmm24-doc-2.56.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824996" comment="gnome-backgrounds-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824997" comment="gnome-bluetooth-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824998" comment="gnome-bluetooth-libs-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824999" comment="gnome-bluetooth-libs-devel-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825000" comment="gnome-boxes-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825001" comment="gnome-calculator-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825002" comment="gnome-classic-session-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825003" comment="gnome-clocks-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825004" comment="gnome-color-manager-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825005" comment="gnome-contacts-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825006" comment="gnome-desktop3-3.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825007" comment="gnome-desktop3-devel-3.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825008" comment="gnome-desktop3-tests-3.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825009" comment="gnome-devel-docs-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825010" comment="gnome-dictionary-3.26.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825011" comment="gnome-disk-utility-3.28.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825012" comment="gnome-documents-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825013" comment="gnome-documents-libs-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825014" comment="gnome-font-viewer-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825015" comment="gnome-getting-started-docs-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825016" comment="gnome-getting-started-docs-cs-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825017" comment="gnome-getting-started-docs-de-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825018" comment="gnome-getting-started-docs-es-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825019" comment="gnome-getting-started-docs-fr-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825020" comment="gnome-getting-started-docs-gl-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825021" comment="gnome-getting-started-docs-hu-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825022" comment="gnome-getting-started-docs-it-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825023" comment="gnome-getting-started-docs-pl-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825024" comment="gnome-getting-started-docs-pt_BR-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825025" comment="gnome-getting-started-docs-ru-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825026" comment="gnome-initial-setup-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825027" comment="gnome-keyring-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825028" comment="gnome-keyring-pam-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825029" comment="gnome-online-accounts-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825030" comment="gnome-online-accounts-devel-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825031" comment="gnome-online-miners-3.26.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825032" comment="gnome-packagekit-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825033" comment="gnome-packagekit-common-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825034" comment="gnome-packagekit-installer-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825035" comment="gnome-packagekit-updater-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825036" comment="gnome-screenshot-3.26.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825037" comment="gnome-session-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825038" comment="gnome-session-custom-session-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825039" comment="gnome-session-wayland-session-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825040" comment="gnome-session-xsession-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825041" comment="gnome-settings-daemon-3.28.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825042" comment="gnome-settings-daemon-devel-3.28.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825043" comment="gnome-shell-3.28.3-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825044" comment="gnome-shell-extension-alternate-tab-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825045" comment="gnome-shell-extension-apps-menu-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825046" comment="gnome-shell-extension-auto-move-windows-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825047" comment="gnome-shell-extension-common-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825048" comment="gnome-shell-extension-dash-to-dock-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825049" comment="gnome-shell-extension-drive-menu-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825050" comment="gnome-shell-extension-launch-new-instance-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825051" comment="gnome-shell-extension-native-window-placement-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825052" comment="gnome-shell-extension-no-hot-corner-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825053" comment="gnome-shell-extension-panel-favorites-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825054" comment="gnome-shell-extension-places-menu-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825055" comment="gnome-shell-extension-screenshot-window-sizer-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825056" comment="gnome-shell-extension-systemMonitor-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825057" comment="gnome-shell-extension-top-icons-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825058" comment="gnome-shell-extension-updates-dialog-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825059" comment="gnome-shell-extension-user-theme-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825060" comment="gnome-shell-extension-window-list-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825061" comment="gnome-shell-extension-windowsNavigator-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825062" comment="gnome-shell-extension-workspace-indicator-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825063" comment="gnome-software-3.28.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825064" comment="gnome-software-devel-3.28.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825065" comment="gnome-software-editor-3.28.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825066" comment="gnome-system-monitor-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825067" comment="gnome-terminal-3.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825068" comment="gnome-terminal-nautilus-3.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825069" comment="gnome-themes-standard-3.28-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825070" comment="gnome-tweak-tool-3.28.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825071" comment="gnome-user-docs-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825072" comment="gnote-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825073" comment="gobject-introspection-1.56.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825074" comment="gobject-introspection-devel-1.56.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825075" comment="gom-0.3.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825076" comment="gom-devel-0.3.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825077" comment="google-noto-emoji-color-fonts-20180508-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825078" comment="google-noto-emoji-fonts-20180508-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825079" comment="grilo-0.3.6-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825080" comment="grilo-devel-0.3.6-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825081" comment="grilo-plugins-0.3.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825082" comment="gsettings-desktop-schemas-3.28.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825083" comment="gsettings-desktop-schemas-devel-3.28.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825084" comment="gspell-1.6.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825085" comment="gspell-devel-1.6.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825086" comment="gspell-doc-1.6.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825087" comment="gssdp-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825088" comment="gssdp-devel-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825089" comment="gssdp-docs-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825090" comment="gssdp-utils-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825091" comment="gstreamer1-plugins-base-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825092" comment="gstreamer1-plugins-base-devel-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825093" comment="gstreamer1-plugins-base-devel-docs-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825094" comment="gstreamer1-plugins-base-tools-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825095" comment="gtk-doc-1.28-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825096" comment="gtk-update-icon-cache-3.22.30-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825097" comment="gtk3-3.22.30-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825098" comment="gtk3-devel-3.22.30-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825099" comment="gtk3-devel-docs-3.22.30-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825100" comment="gtk3-immodule-xim-3.22.30-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825101" comment="gtk3-immodules-3.22.30-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825102" comment="gtk3-tests-3.22.30-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825103" comment="gtksourceview3-3.24.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825104" comment="gtksourceview3-devel-3.24.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825105" comment="gtksourceview3-tests-3.24.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825106" comment="gucharmap-10.0.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825107" comment="gucharmap-devel-10.0.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825108" comment="gucharmap-libs-10.0.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825109" comment="gupnp-1.0.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825110" comment="gupnp-devel-1.0.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825111" comment="gupnp-docs-1.0.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825112" comment="gupnp-igd-0.2.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825113" comment="gupnp-igd-devel-0.2.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825114" comment="gupnp-igd-python-0.2.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825115" comment="gvfs-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825116" comment="gvfs-afc-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825117" comment="gvfs-afp-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825118" comment="gvfs-archive-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825119" comment="gvfs-client-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825120" comment="gvfs-devel-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825121" comment="gvfs-fuse-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825122" comment="gvfs-goa-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825123" comment="gvfs-gphoto2-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825124" comment="gvfs-mtp-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825125" comment="gvfs-smb-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825126" comment="gvfs-tests-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825127" comment="harfbuzz-1.7.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825128" comment="harfbuzz-devel-1.7.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825129" comment="harfbuzz-icu-1.7.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825130" comment="json-glib-1.4.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825131" comment="json-glib-devel-1.4.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825132" comment="json-glib-tests-1.4.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825133" comment="libappstream-glib-0.7.8-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825134" comment="libappstream-glib-builder-0.7.8-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825135" comment="libappstream-glib-builder-devel-0.7.8-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825136" comment="libappstream-glib-devel-0.7.8-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825137" comment="libchamplain-0.12.16-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825138" comment="libchamplain-demos-0.12.16-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825139" comment="libchamplain-devel-0.12.16-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825140" comment="libchamplain-gtk-0.12.16-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825141" comment="libcroco-0.6.12-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825142" comment="libcroco-devel-0.6.12-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825143" comment="libgdata-0.17.9-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825144" comment="libgdata-devel-0.17.9-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825145" comment="libgee-0.20.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825146" comment="libgee-devel-0.20.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825147" comment="libgepub-0.6.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825148" comment="libgepub-devel-0.6.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825149" comment="libgexiv2-0.10.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825150" comment="libgexiv2-devel-0.10.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825151" comment="libgnomekbd-3.26.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825152" comment="libgnomekbd-devel-3.26.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825153" comment="libgovirt-0.3.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825154" comment="libgovirt-devel-0.3.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825155" comment="libgtop2-2.38.0-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825156" comment="libgtop2-devel-2.38.0-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825157" comment="libgweather-3.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825158" comment="libgweather-devel-3.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825159" comment="libgxps-0.3.0-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825160" comment="libgxps-devel-0.3.0-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825161" comment="libgxps-tools-0.3.0-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825162" comment="libical-3.0.3-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825163" comment="libical-devel-3.0.3-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825164" comment="libical-glib-3.0.3-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825165" comment="libical-glib-devel-3.0.3-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825166" comment="libical-glib-doc-3.0.3-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825167" comment="libjpeg-turbo-1.2.90-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825168" comment="libjpeg-turbo-devel-1.2.90-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825169" comment="libjpeg-turbo-static-1.2.90-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825170" comment="libjpeg-turbo-utils-1.2.90-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825171" comment="libmediaart-1.9.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825172" comment="libmediaart-devel-1.9.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825173" comment="libmediaart-tests-1.9.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825174" comment="libosinfo-1.1.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825175" comment="libosinfo-devel-1.1.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825176" comment="libosinfo-vala-1.1.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825177" comment="libpeas-1.22.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825178" comment="libpeas-devel-1.22.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825179" comment="libpeas-gtk-1.22.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825180" comment="libpeas-loader-python-1.22.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825181" comment="librsvg2-2.40.20-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825182" comment="librsvg2-devel-2.40.20-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825183" comment="librsvg2-tools-2.40.20-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825184" comment="libsecret-0.18.6-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825185" comment="libsecret-devel-0.18.6-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825186" comment="libsoup-2.62.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825187" comment="libsoup-devel-2.62.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825188" comment="libwayland-client-1.15.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825189" comment="libwayland-cursor-1.15.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825190" comment="libwayland-egl-1.15.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825191" comment="libwayland-server-1.15.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825192" comment="libwnck3-3.24.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825193" comment="libwnck3-devel-3.24.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825194" comment="mozjs52-52.9.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825195" comment="mozjs52-devel-52.9.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825196" comment="mutter-3.28.3-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825197" comment="mutter-devel-3.28.3-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825198" comment="nautilus-3.26.3.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825199" comment="nautilus-devel-3.26.3.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825200" comment="nautilus-extensions-3.26.3.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825201" comment="nautilus-sendto-3.8.6-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825202" comment="openchange-2.3-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825203" comment="openchange-client-2.3-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825204" comment="openchange-devel-2.3-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825205" comment="openchange-devel-docs-2.3-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825206" comment="osinfo-db-20180531-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825207" comment="pango-1.42.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825208" comment="pango-devel-1.42.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825209" comment="pango-tests-1.42.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825210" comment="poppler-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825211" comment="poppler-cpp-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825212" comment="poppler-cpp-devel-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825213" comment="poppler-demos-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825214" comment="poppler-devel-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825215" comment="poppler-glib-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825216" comment="poppler-glib-devel-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825217" comment="poppler-qt-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825218" comment="poppler-qt-devel-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825219" comment="poppler-utils-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825220" comment="python2-gexiv2-0.10.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825221" comment="python2-pyatspi-2.26.0-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825222" comment="rest-0.8.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825223" comment="rest-devel-0.8.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825224" comment="rhythmbox-3.4.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825225" comment="rhythmbox-devel-3.4.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825226" comment="seahorse-nautilus-3.11.92-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825227" comment="shotwell-0.28.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825228" comment="sushi-3.28.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825229" comment="totem-3.26.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825230" comment="totem-devel-3.26.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825231" comment="totem-nautilus-3.26.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825232" comment="totem-pl-parser-3.26.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825233" comment="totem-pl-parser-devel-3.26.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825234" comment="turbojpeg-1.2.90-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825235" comment="turbojpeg-devel-1.2.90-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825236" comment="upower-0.99.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825237" comment="upower-devel-0.99.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825238" comment="upower-devel-docs-0.99.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825239" comment="vala-0.40.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825240" comment="vala-devel-0.40.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825241" comment="vala-doc-0.40.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825242" comment="valadoc-0.40.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825243" comment="valadoc-devel-0.40.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825244" comment="vino-3.22.0-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825245" comment="vte-profile-0.52.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825246" comment="vte291-0.52.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825247" comment="vte291-devel-0.52.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825248" comment="wayland-devel-1.15.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825249" comment="wayland-doc-1.15.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825250" comment="wayland-protocols-devel-1.14-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825251" comment="webkitgtk4-2.20.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825252" comment="webkitgtk4-devel-2.20.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825253" comment="webkitgtk4-doc-2.20.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825254" comment="webkitgtk4-jsc-2.20.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825255" comment="webkitgtk4-jsc-devel-2.20.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825256" comment="webkitgtk4-plugin-process-gtk2-2.20.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825257" comment="xdg-desktop-portal-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825258" comment="xdg-desktop-portal-devel-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825259" comment="xdg-desktop-portal-gtk-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825260" comment="yelp-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825261" comment="yelp-devel-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825262" comment="yelp-libs-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825263" comment="yelp-tools-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825264" comment="yelp-xsl-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825265" comment="yelp-xsl-devel-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825266" comment="zenity-3.28.1-1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4180</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4180" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4180" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4180" ref_url="https://www.suse.com/security/cve/CVE-2018-4180" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004381.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2239-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SN5LDW2X6KZ5ZMIJ6ATP5O5JDTGAPWPI/#SN5LDW2X6KZ5ZMIJ6ATP5O5JDTGAPWPI" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2292-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C7XJD5ZRTJLEM2NRS6Y6O4G62KB2C7LG/#C7XJD5ZRTJLEM2NRS6Y6O4G62KB2C7LG" source="SUSE-SU"/>
    <description>
    In macOS High Sierra before 10.13.5, an issue existed in CUPS. This issue was addressed with improved access restrictions.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4180/">CVE-2018-4180 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4180">CVE-2018-4180 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1096405">SUSE bug 1096405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096408">SUSE bug 1096408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827646" comment="cups-1.6.3-43.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827647" comment="cups-client-1.6.3-43.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827648" comment="cups-devel-1.6.3-43.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827649" comment="cups-filesystem-1.6.3-43.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827650" comment="cups-ipptool-1.6.3-43.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827651" comment="cups-libs-1.6.3-43.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827652" comment="cups-lpd-1.6.3-43.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184181" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4181</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4181" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4181" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4181" ref_url="https://www.suse.com/security/cve/CVE-2018-4181" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004381.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2239-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SN5LDW2X6KZ5ZMIJ6ATP5O5JDTGAPWPI/#SN5LDW2X6KZ5ZMIJ6ATP5O5JDTGAPWPI" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2292-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C7XJD5ZRTJLEM2NRS6Y6O4G62KB2C7LG/#C7XJD5ZRTJLEM2NRS6Y6O4G62KB2C7LG" source="SUSE-SU"/>
    <description>
    In macOS High Sierra before 10.13.5, an issue existed in CUPS. This issue was addressed with improved access restrictions.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-4181/">CVE-2018-4181 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4181">CVE-2018-4181 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1096406">SUSE bug 1096406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096408">SUSE bug 1096408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105281">SUSE bug 1105281</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827646" comment="cups-1.6.3-43.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827647" comment="cups-client-1.6.3-43.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827648" comment="cups-devel-1.6.3-43.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827649" comment="cups-filesystem-1.6.3-43.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827650" comment="cups-ipptool-1.6.3-43.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827651" comment="cups-libs-1.6.3-43.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827652" comment="cups-lpd-1.6.3-43.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184200" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4200</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4200" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4200" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4200" ref_url="https://www.suse.com/security/cve/CVE-2018-4200" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004781.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3473-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BDAK2MVOAPTEET4XJ6HHZXTMPNQCVMAW/#BDAK2MVOAPTEET4XJ6HHZXTMPNQCVMAW" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 11.3.1 is affected. Safari before 11.1 is affected. iCloud before 7.5 on Windows is affected. iTunes before 12.7.5 on Windows is affected. tvOS before 11.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site that triggers a WebCore::jsElementScrollHeightGetter use-after-free.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-07"/>
	<updated date="2026-03-07"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4200/">CVE-2018-4200 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4200">CVE-2018-4200 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1092280">SUSE bug 1092280</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824843" comment="PackageKit-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824844" comment="PackageKit-command-not-found-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824845" comment="PackageKit-cron-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824846" comment="PackageKit-glib-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824847" comment="PackageKit-glib-devel-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824848" comment="PackageKit-gstreamer-plugin-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824849" comment="PackageKit-gtk3-module-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824850" comment="PackageKit-yum-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824851" comment="PackageKit-yum-plugin-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824852" comment="accountsservice-0.6.50-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824853" comment="accountsservice-devel-0.6.50-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824854" comment="accountsservice-libs-0.6.50-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824855" comment="adwaita-cursor-theme-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824856" comment="adwaita-gtk2-theme-3.28-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824857" comment="adwaita-icon-theme-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824858" comment="adwaita-icon-theme-devel-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824859" comment="appstream-data-7-20180614.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824860" comment="at-spi2-atk-2.26.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824861" comment="at-spi2-atk-devel-2.26.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824862" comment="at-spi2-core-2.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824863" comment="at-spi2-core-devel-2.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824864" comment="atk-2.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824865" comment="atk-devel-2.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824866" comment="baobab-3.28.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824867" comment="bolt-0.4-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824868" comment="brasero-3.12.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824869" comment="brasero-devel-3.12.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824870" comment="brasero-libs-3.12.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824871" comment="brasero-nautilus-3.12.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824872" comment="cairo-1.15.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824873" comment="cairo-devel-1.15.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824874" comment="cairo-gobject-1.15.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824875" comment="cairo-gobject-devel-1.15.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824876" comment="cairo-tools-1.15.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824877" comment="cheese-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824878" comment="cheese-libs-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824879" comment="cheese-libs-devel-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824880" comment="clutter-gst3-3.0.26-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824881" comment="clutter-gst3-devel-3.0.26-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824882" comment="compat-exiv2-023-0.23-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824883" comment="compat-libical1-1.0.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824884" comment="control-center-3.28.1-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824885" comment="control-center-filesystem-3.28.1-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824886" comment="dconf-0.28.0-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824887" comment="dconf-devel-0.28.0-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824888" comment="dconf-editor-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824889" comment="devhelp-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824890" comment="devhelp-devel-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824891" comment="devhelp-libs-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824892" comment="ekiga-4.0.1-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824893" comment="empathy-3.12.13-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824894" comment="eog-3.28.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824895" comment="eog-devel-3.28.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824896" comment="evince-3.28.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824897" comment="evince-browser-plugin-3.28.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824898" comment="evince-devel-3.28.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824899" comment="evince-dvi-3.28.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824900" comment="evince-libs-3.28.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824901" comment="evince-nautilus-3.28.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824902" comment="evolution-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824903" comment="evolution-bogofilter-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824904" comment="evolution-data-server-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824905" comment="evolution-data-server-devel-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824906" comment="evolution-data-server-doc-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824907" comment="evolution-data-server-langpacks-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824908" comment="evolution-data-server-perl-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824909" comment="evolution-data-server-tests-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824910" comment="evolution-devel-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824911" comment="evolution-devel-docs-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824912" comment="evolution-ews-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824913" comment="evolution-ews-langpacks-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824914" comment="evolution-help-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824915" comment="evolution-langpacks-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824916" comment="evolution-mapi-3.28.3-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824917" comment="evolution-mapi-langpacks-3.28.3-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824918" comment="evolution-pst-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824919" comment="evolution-spamassassin-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824920" comment="evolution-tests-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824921" comment="file-roller-3.28.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824922" comment="file-roller-nautilus-3.28.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824923" comment="flatpak-1.0.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824924" comment="flatpak-builder-1.0.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824925" comment="flatpak-devel-1.0.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824926" comment="flatpak-libs-1.0.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824927" comment="folks-0.11.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824928" comment="folks-devel-0.11.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824929" comment="folks-tools-0.11.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824930" comment="fontconfig-2.13.0-4.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824931" comment="fontconfig-devel-2.13.0-4.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824932" comment="fontconfig-devel-doc-2.13.0-4.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824933" comment="freetype-2.8-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824934" comment="freetype-demos-2.8-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824935" comment="freetype-devel-2.8-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824936" comment="fribidi-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824937" comment="fribidi-devel-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824938" comment="fwupd-1.0.8-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824939" comment="fwupd-devel-1.0.8-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824940" comment="fwupdate-12-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824941" comment="fwupdate-devel-12-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824942" comment="fwupdate-efi-12-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824943" comment="fwupdate-libs-12-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824944" comment="gcr-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824945" comment="gcr-devel-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824946" comment="gdk-pixbuf2-2.36.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824947" comment="gdk-pixbuf2-devel-2.36.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824948" comment="gdk-pixbuf2-tests-2.36.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824949" comment="gdm-3.28.2-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824950" comment="gdm-devel-3.28.2-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824951" comment="gdm-pam-extensions-devel-3.28.2-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824952" comment="gedit-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824953" comment="gedit-devel-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824954" comment="gedit-plugin-bookmarks-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824955" comment="gedit-plugin-bracketcompletion-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824956" comment="gedit-plugin-charmap-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824957" comment="gedit-plugin-codecomment-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824958" comment="gedit-plugin-colorpicker-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824959" comment="gedit-plugin-colorschemer-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824960" comment="gedit-plugin-commander-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824961" comment="gedit-plugin-drawspaces-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824962" comment="gedit-plugin-findinfiles-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824963" comment="gedit-plugin-joinlines-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824964" comment="gedit-plugin-multiedit-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824965" comment="gedit-plugin-smartspaces-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824966" comment="gedit-plugin-synctex-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824967" comment="gedit-plugin-terminal-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824968" comment="gedit-plugin-textsize-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824969" comment="gedit-plugin-translate-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824970" comment="gedit-plugin-wordcompletion-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824971" comment="gedit-plugins-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824972" comment="gedit-plugins-data-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824973" comment="geoclue2-2.4.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824974" comment="geoclue2-demos-2.4.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824975" comment="geoclue2-devel-2.4.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824976" comment="geoclue2-libs-2.4.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824977" comment="geocode-glib-3.26.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824978" comment="geocode-glib-devel-3.26.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824979" comment="gjs-1.52.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824980" comment="gjs-devel-1.52.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824981" comment="gjs-tests-1.52.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824982" comment="glade-3.22.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824983" comment="glade-devel-3.22.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824984" comment="glade-libs-3.22.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824985" comment="glib-networking-2.56.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824986" comment="glib-networking-tests-2.56.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824987" comment="glib2-2.56.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824988" comment="glib2-devel-2.56.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824989" comment="glib2-doc-2.56.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824990" comment="glib2-fam-2.56.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824991" comment="glib2-static-2.56.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824992" comment="glib2-tests-2.56.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824993" comment="glibmm24-2.56.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824994" comment="glibmm24-devel-2.56.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824995" comment="glibmm24-doc-2.56.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824996" comment="gnome-backgrounds-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824997" comment="gnome-bluetooth-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824998" comment="gnome-bluetooth-libs-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824999" comment="gnome-bluetooth-libs-devel-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825000" comment="gnome-boxes-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825001" comment="gnome-calculator-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825002" comment="gnome-classic-session-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825003" comment="gnome-clocks-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825004" comment="gnome-color-manager-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825005" comment="gnome-contacts-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825006" comment="gnome-desktop3-3.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825007" comment="gnome-desktop3-devel-3.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825008" comment="gnome-desktop3-tests-3.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825009" comment="gnome-devel-docs-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825010" comment="gnome-dictionary-3.26.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825011" comment="gnome-disk-utility-3.28.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825012" comment="gnome-documents-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825013" comment="gnome-documents-libs-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825014" comment="gnome-font-viewer-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825015" comment="gnome-getting-started-docs-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825016" comment="gnome-getting-started-docs-cs-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825017" comment="gnome-getting-started-docs-de-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825018" comment="gnome-getting-started-docs-es-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825019" comment="gnome-getting-started-docs-fr-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825020" comment="gnome-getting-started-docs-gl-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825021" comment="gnome-getting-started-docs-hu-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825022" comment="gnome-getting-started-docs-it-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825023" comment="gnome-getting-started-docs-pl-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825024" comment="gnome-getting-started-docs-pt_BR-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825025" comment="gnome-getting-started-docs-ru-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825026" comment="gnome-initial-setup-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825027" comment="gnome-keyring-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825028" comment="gnome-keyring-pam-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825029" comment="gnome-online-accounts-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825030" comment="gnome-online-accounts-devel-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825031" comment="gnome-online-miners-3.26.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825032" comment="gnome-packagekit-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825033" comment="gnome-packagekit-common-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825034" comment="gnome-packagekit-installer-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825035" comment="gnome-packagekit-updater-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825036" comment="gnome-screenshot-3.26.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825037" comment="gnome-session-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825038" comment="gnome-session-custom-session-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825039" comment="gnome-session-wayland-session-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825040" comment="gnome-session-xsession-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825041" comment="gnome-settings-daemon-3.28.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825042" comment="gnome-settings-daemon-devel-3.28.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825043" comment="gnome-shell-3.28.3-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825044" comment="gnome-shell-extension-alternate-tab-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825045" comment="gnome-shell-extension-apps-menu-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825046" comment="gnome-shell-extension-auto-move-windows-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825047" comment="gnome-shell-extension-common-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825048" comment="gnome-shell-extension-dash-to-dock-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825049" comment="gnome-shell-extension-drive-menu-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825050" comment="gnome-shell-extension-launch-new-instance-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825051" comment="gnome-shell-extension-native-window-placement-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825052" comment="gnome-shell-extension-no-hot-corner-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825053" comment="gnome-shell-extension-panel-favorites-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825054" comment="gnome-shell-extension-places-menu-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825055" comment="gnome-shell-extension-screenshot-window-sizer-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825056" comment="gnome-shell-extension-systemMonitor-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825057" comment="gnome-shell-extension-top-icons-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825058" comment="gnome-shell-extension-updates-dialog-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825059" comment="gnome-shell-extension-user-theme-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825060" comment="gnome-shell-extension-window-list-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825061" comment="gnome-shell-extension-windowsNavigator-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825062" comment="gnome-shell-extension-workspace-indicator-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825063" comment="gnome-software-3.28.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825064" comment="gnome-software-devel-3.28.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825065" comment="gnome-software-editor-3.28.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825066" comment="gnome-system-monitor-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825067" comment="gnome-terminal-3.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825068" comment="gnome-terminal-nautilus-3.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825069" comment="gnome-themes-standard-3.28-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825070" comment="gnome-tweak-tool-3.28.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825071" comment="gnome-user-docs-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825072" comment="gnote-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825073" comment="gobject-introspection-1.56.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825074" comment="gobject-introspection-devel-1.56.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825075" comment="gom-0.3.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825076" comment="gom-devel-0.3.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825077" comment="google-noto-emoji-color-fonts-20180508-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825078" comment="google-noto-emoji-fonts-20180508-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825079" comment="grilo-0.3.6-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825080" comment="grilo-devel-0.3.6-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825081" comment="grilo-plugins-0.3.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825082" comment="gsettings-desktop-schemas-3.28.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825083" comment="gsettings-desktop-schemas-devel-3.28.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825084" comment="gspell-1.6.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825085" comment="gspell-devel-1.6.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825086" comment="gspell-doc-1.6.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825087" comment="gssdp-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825088" comment="gssdp-devel-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825089" comment="gssdp-docs-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825090" comment="gssdp-utils-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825091" comment="gstreamer1-plugins-base-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825092" comment="gstreamer1-plugins-base-devel-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825093" comment="gstreamer1-plugins-base-devel-docs-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825094" comment="gstreamer1-plugins-base-tools-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825095" comment="gtk-doc-1.28-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825096" comment="gtk-update-icon-cache-3.22.30-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825097" comment="gtk3-3.22.30-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825098" comment="gtk3-devel-3.22.30-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825099" comment="gtk3-devel-docs-3.22.30-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825100" comment="gtk3-immodule-xim-3.22.30-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825101" comment="gtk3-immodules-3.22.30-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825102" comment="gtk3-tests-3.22.30-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825103" comment="gtksourceview3-3.24.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825104" comment="gtksourceview3-devel-3.24.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825105" comment="gtksourceview3-tests-3.24.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825106" comment="gucharmap-10.0.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825107" comment="gucharmap-devel-10.0.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825108" comment="gucharmap-libs-10.0.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825109" comment="gupnp-1.0.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825110" comment="gupnp-devel-1.0.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825111" comment="gupnp-docs-1.0.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825112" comment="gupnp-igd-0.2.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825113" comment="gupnp-igd-devel-0.2.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825114" comment="gupnp-igd-python-0.2.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825115" comment="gvfs-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825116" comment="gvfs-afc-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825117" comment="gvfs-afp-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825118" comment="gvfs-archive-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825119" comment="gvfs-client-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825120" comment="gvfs-devel-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825121" comment="gvfs-fuse-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825122" comment="gvfs-goa-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825123" comment="gvfs-gphoto2-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825124" comment="gvfs-mtp-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825125" comment="gvfs-smb-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825126" comment="gvfs-tests-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825127" comment="harfbuzz-1.7.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825128" comment="harfbuzz-devel-1.7.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825129" comment="harfbuzz-icu-1.7.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825130" comment="json-glib-1.4.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825131" comment="json-glib-devel-1.4.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825132" comment="json-glib-tests-1.4.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825133" comment="libappstream-glib-0.7.8-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825134" comment="libappstream-glib-builder-0.7.8-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825135" comment="libappstream-glib-builder-devel-0.7.8-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825136" comment="libappstream-glib-devel-0.7.8-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825137" comment="libchamplain-0.12.16-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825138" comment="libchamplain-demos-0.12.16-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825139" comment="libchamplain-devel-0.12.16-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825140" comment="libchamplain-gtk-0.12.16-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825141" comment="libcroco-0.6.12-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825142" comment="libcroco-devel-0.6.12-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825143" comment="libgdata-0.17.9-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825144" comment="libgdata-devel-0.17.9-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825145" comment="libgee-0.20.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825146" comment="libgee-devel-0.20.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825147" comment="libgepub-0.6.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825148" comment="libgepub-devel-0.6.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825149" comment="libgexiv2-0.10.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825150" comment="libgexiv2-devel-0.10.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825151" comment="libgnomekbd-3.26.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825152" comment="libgnomekbd-devel-3.26.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825153" comment="libgovirt-0.3.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825154" comment="libgovirt-devel-0.3.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825155" comment="libgtop2-2.38.0-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825156" comment="libgtop2-devel-2.38.0-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825157" comment="libgweather-3.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825158" comment="libgweather-devel-3.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825159" comment="libgxps-0.3.0-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825160" comment="libgxps-devel-0.3.0-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825161" comment="libgxps-tools-0.3.0-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825162" comment="libical-3.0.3-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825163" comment="libical-devel-3.0.3-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825164" comment="libical-glib-3.0.3-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825165" comment="libical-glib-devel-3.0.3-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825166" comment="libical-glib-doc-3.0.3-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825167" comment="libjpeg-turbo-1.2.90-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825168" comment="libjpeg-turbo-devel-1.2.90-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825169" comment="libjpeg-turbo-static-1.2.90-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825170" comment="libjpeg-turbo-utils-1.2.90-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825171" comment="libmediaart-1.9.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825172" comment="libmediaart-devel-1.9.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825173" comment="libmediaart-tests-1.9.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825174" comment="libosinfo-1.1.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825175" comment="libosinfo-devel-1.1.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825176" comment="libosinfo-vala-1.1.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825177" comment="libpeas-1.22.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825178" comment="libpeas-devel-1.22.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825179" comment="libpeas-gtk-1.22.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825180" comment="libpeas-loader-python-1.22.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825181" comment="librsvg2-2.40.20-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825182" comment="librsvg2-devel-2.40.20-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825183" comment="librsvg2-tools-2.40.20-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825184" comment="libsecret-0.18.6-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825185" comment="libsecret-devel-0.18.6-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825186" comment="libsoup-2.62.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825187" comment="libsoup-devel-2.62.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825188" comment="libwayland-client-1.15.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825189" comment="libwayland-cursor-1.15.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825190" comment="libwayland-egl-1.15.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825191" comment="libwayland-server-1.15.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825192" comment="libwnck3-3.24.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825193" comment="libwnck3-devel-3.24.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825194" comment="mozjs52-52.9.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825195" comment="mozjs52-devel-52.9.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825196" comment="mutter-3.28.3-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825197" comment="mutter-devel-3.28.3-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825198" comment="nautilus-3.26.3.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825199" comment="nautilus-devel-3.26.3.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825200" comment="nautilus-extensions-3.26.3.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825201" comment="nautilus-sendto-3.8.6-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825202" comment="openchange-2.3-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825203" comment="openchange-client-2.3-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825204" comment="openchange-devel-2.3-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825205" comment="openchange-devel-docs-2.3-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825206" comment="osinfo-db-20180531-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825207" comment="pango-1.42.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825208" comment="pango-devel-1.42.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825209" comment="pango-tests-1.42.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825210" comment="poppler-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825211" comment="poppler-cpp-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825212" comment="poppler-cpp-devel-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825213" comment="poppler-demos-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825214" comment="poppler-devel-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825215" comment="poppler-glib-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825216" comment="poppler-glib-devel-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825217" comment="poppler-qt-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825218" comment="poppler-qt-devel-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825219" comment="poppler-utils-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825220" comment="python2-gexiv2-0.10.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825221" comment="python2-pyatspi-2.26.0-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825222" comment="rest-0.8.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825223" comment="rest-devel-0.8.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825224" comment="rhythmbox-3.4.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825225" comment="rhythmbox-devel-3.4.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825226" comment="seahorse-nautilus-3.11.92-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825227" comment="shotwell-0.28.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825228" comment="sushi-3.28.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825229" comment="totem-3.26.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825230" comment="totem-devel-3.26.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825231" comment="totem-nautilus-3.26.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825232" comment="totem-pl-parser-3.26.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825233" comment="totem-pl-parser-devel-3.26.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825234" comment="turbojpeg-1.2.90-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825235" comment="turbojpeg-devel-1.2.90-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825236" comment="upower-0.99.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825237" comment="upower-devel-0.99.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825238" comment="upower-devel-docs-0.99.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825239" comment="vala-0.40.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825240" comment="vala-devel-0.40.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825241" comment="vala-doc-0.40.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825242" comment="valadoc-0.40.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825243" comment="valadoc-devel-0.40.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825244" comment="vino-3.22.0-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825245" comment="vte-profile-0.52.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825246" comment="vte291-0.52.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825247" comment="vte291-devel-0.52.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825248" comment="wayland-devel-1.15.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825249" comment="wayland-doc-1.15.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825250" comment="wayland-protocols-devel-1.14-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825251" comment="webkitgtk4-2.20.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825252" comment="webkitgtk4-devel-2.20.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825253" comment="webkitgtk4-doc-2.20.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825254" comment="webkitgtk4-jsc-2.20.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825255" comment="webkitgtk4-jsc-devel-2.20.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825256" comment="webkitgtk4-plugin-process-gtk2-2.20.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825257" comment="xdg-desktop-portal-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825258" comment="xdg-desktop-portal-devel-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825259" comment="xdg-desktop-portal-gtk-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825260" comment="yelp-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825261" comment="yelp-devel-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825262" comment="yelp-libs-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825263" comment="yelp-tools-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825264" comment="yelp-xsl-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825265" comment="yelp-xsl-devel-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825266" comment="zenity-3.28.1-1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184204" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4204</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4204" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4204" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4204" ref_url="https://www.suse.com/security/cve/CVE-2018-4204" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004781.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3473-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BDAK2MVOAPTEET4XJ6HHZXTMPNQCVMAW/#BDAK2MVOAPTEET4XJ6HHZXTMPNQCVMAW" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 11.4 is affected. iOS before 11.3.1 is affected. Safari before 11.1 is affected. iCloud before 7.5 on Windows is affected. iTunes before 12.7.5 on Windows is affected. tvOS before 11.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-07"/>
	<updated date="2026-03-07"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4204/">CVE-2018-4204 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4204">CVE-2018-4204 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1092279">SUSE bug 1092279</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824843" comment="PackageKit-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824844" comment="PackageKit-command-not-found-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824845" comment="PackageKit-cron-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824846" comment="PackageKit-glib-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824847" comment="PackageKit-glib-devel-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824848" comment="PackageKit-gstreamer-plugin-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824849" comment="PackageKit-gtk3-module-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824850" comment="PackageKit-yum-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824851" comment="PackageKit-yum-plugin-1.1.10-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824852" comment="accountsservice-0.6.50-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824853" comment="accountsservice-devel-0.6.50-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824854" comment="accountsservice-libs-0.6.50-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824855" comment="adwaita-cursor-theme-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824856" comment="adwaita-gtk2-theme-3.28-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824857" comment="adwaita-icon-theme-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824858" comment="adwaita-icon-theme-devel-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824859" comment="appstream-data-7-20180614.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824860" comment="at-spi2-atk-2.26.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824861" comment="at-spi2-atk-devel-2.26.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824862" comment="at-spi2-core-2.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824863" comment="at-spi2-core-devel-2.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824864" comment="atk-2.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824865" comment="atk-devel-2.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824866" comment="baobab-3.28.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824867" comment="bolt-0.4-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824868" comment="brasero-3.12.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824869" comment="brasero-devel-3.12.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824870" comment="brasero-libs-3.12.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824871" comment="brasero-nautilus-3.12.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824872" comment="cairo-1.15.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824873" comment="cairo-devel-1.15.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824874" comment="cairo-gobject-1.15.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824875" comment="cairo-gobject-devel-1.15.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824876" comment="cairo-tools-1.15.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824877" comment="cheese-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824878" comment="cheese-libs-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824879" comment="cheese-libs-devel-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824880" comment="clutter-gst3-3.0.26-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824881" comment="clutter-gst3-devel-3.0.26-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824882" comment="compat-exiv2-023-0.23-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824883" comment="compat-libical1-1.0.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824884" comment="control-center-3.28.1-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824885" comment="control-center-filesystem-3.28.1-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824886" comment="dconf-0.28.0-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824887" comment="dconf-devel-0.28.0-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824888" comment="dconf-editor-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824889" comment="devhelp-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824890" comment="devhelp-devel-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824891" comment="devhelp-libs-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824892" comment="ekiga-4.0.1-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824893" comment="empathy-3.12.13-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824894" comment="eog-3.28.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824895" comment="eog-devel-3.28.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824896" comment="evince-3.28.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824897" comment="evince-browser-plugin-3.28.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824898" comment="evince-devel-3.28.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824899" comment="evince-dvi-3.28.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824900" comment="evince-libs-3.28.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824901" comment="evince-nautilus-3.28.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824902" comment="evolution-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824903" comment="evolution-bogofilter-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824904" comment="evolution-data-server-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824905" comment="evolution-data-server-devel-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824906" comment="evolution-data-server-doc-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824907" comment="evolution-data-server-langpacks-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824908" comment="evolution-data-server-perl-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824909" comment="evolution-data-server-tests-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824910" comment="evolution-devel-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824911" comment="evolution-devel-docs-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824912" comment="evolution-ews-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824913" comment="evolution-ews-langpacks-3.28.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824914" comment="evolution-help-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824915" comment="evolution-langpacks-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824916" comment="evolution-mapi-3.28.3-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824917" comment="evolution-mapi-langpacks-3.28.3-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824918" comment="evolution-pst-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824919" comment="evolution-spamassassin-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824920" comment="evolution-tests-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824921" comment="file-roller-3.28.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824922" comment="file-roller-nautilus-3.28.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824923" comment="flatpak-1.0.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824924" comment="flatpak-builder-1.0.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824925" comment="flatpak-devel-1.0.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824926" comment="flatpak-libs-1.0.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824927" comment="folks-0.11.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824928" comment="folks-devel-0.11.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824929" comment="folks-tools-0.11.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824930" comment="fontconfig-2.13.0-4.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824931" comment="fontconfig-devel-2.13.0-4.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824932" comment="fontconfig-devel-doc-2.13.0-4.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824933" comment="freetype-2.8-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824934" comment="freetype-demos-2.8-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824935" comment="freetype-devel-2.8-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824936" comment="fribidi-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824937" comment="fribidi-devel-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824938" comment="fwupd-1.0.8-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824939" comment="fwupd-devel-1.0.8-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824940" comment="fwupdate-12-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824941" comment="fwupdate-devel-12-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824942" comment="fwupdate-efi-12-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824943" comment="fwupdate-libs-12-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824944" comment="gcr-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824945" comment="gcr-devel-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824946" comment="gdk-pixbuf2-2.36.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824947" comment="gdk-pixbuf2-devel-2.36.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824948" comment="gdk-pixbuf2-tests-2.36.12-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824949" comment="gdm-3.28.2-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824950" comment="gdm-devel-3.28.2-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824951" comment="gdm-pam-extensions-devel-3.28.2-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824952" comment="gedit-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824953" comment="gedit-devel-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824954" comment="gedit-plugin-bookmarks-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824955" comment="gedit-plugin-bracketcompletion-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824956" comment="gedit-plugin-charmap-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824957" comment="gedit-plugin-codecomment-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824958" comment="gedit-plugin-colorpicker-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824959" comment="gedit-plugin-colorschemer-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824960" comment="gedit-plugin-commander-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824961" comment="gedit-plugin-drawspaces-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824962" comment="gedit-plugin-findinfiles-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824963" comment="gedit-plugin-joinlines-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824964" comment="gedit-plugin-multiedit-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824965" comment="gedit-plugin-smartspaces-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824966" comment="gedit-plugin-synctex-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824967" comment="gedit-plugin-terminal-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824968" comment="gedit-plugin-textsize-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824969" comment="gedit-plugin-translate-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824970" comment="gedit-plugin-wordcompletion-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824971" comment="gedit-plugins-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824972" comment="gedit-plugins-data-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824973" comment="geoclue2-2.4.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824974" comment="geoclue2-demos-2.4.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824975" comment="geoclue2-devel-2.4.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824976" comment="geoclue2-libs-2.4.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824977" comment="geocode-glib-3.26.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824978" comment="geocode-glib-devel-3.26.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824979" comment="gjs-1.52.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824980" comment="gjs-devel-1.52.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824981" comment="gjs-tests-1.52.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824982" comment="glade-3.22.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824983" comment="glade-devel-3.22.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824984" comment="glade-libs-3.22.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824985" comment="glib-networking-2.56.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824986" comment="glib-networking-tests-2.56.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824987" comment="glib2-2.56.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824988" comment="glib2-devel-2.56.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824989" comment="glib2-doc-2.56.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824990" comment="glib2-fam-2.56.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824991" comment="glib2-static-2.56.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824992" comment="glib2-tests-2.56.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824993" comment="glibmm24-2.56.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824994" comment="glibmm24-devel-2.56.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824995" comment="glibmm24-doc-2.56.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824996" comment="gnome-backgrounds-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824997" comment="gnome-bluetooth-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824998" comment="gnome-bluetooth-libs-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824999" comment="gnome-bluetooth-libs-devel-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825000" comment="gnome-boxes-3.28.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825001" comment="gnome-calculator-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825002" comment="gnome-classic-session-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825003" comment="gnome-clocks-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825004" comment="gnome-color-manager-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825005" comment="gnome-contacts-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825006" comment="gnome-desktop3-3.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825007" comment="gnome-desktop3-devel-3.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825008" comment="gnome-desktop3-tests-3.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825009" comment="gnome-devel-docs-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825010" comment="gnome-dictionary-3.26.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825011" comment="gnome-disk-utility-3.28.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825012" comment="gnome-documents-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825013" comment="gnome-documents-libs-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825014" comment="gnome-font-viewer-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825015" comment="gnome-getting-started-docs-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825016" comment="gnome-getting-started-docs-cs-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825017" comment="gnome-getting-started-docs-de-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825018" comment="gnome-getting-started-docs-es-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825019" comment="gnome-getting-started-docs-fr-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825020" comment="gnome-getting-started-docs-gl-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825021" comment="gnome-getting-started-docs-hu-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825022" comment="gnome-getting-started-docs-it-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825023" comment="gnome-getting-started-docs-pl-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825024" comment="gnome-getting-started-docs-pt_BR-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825025" comment="gnome-getting-started-docs-ru-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825026" comment="gnome-initial-setup-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825027" comment="gnome-keyring-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825028" comment="gnome-keyring-pam-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825029" comment="gnome-online-accounts-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825030" comment="gnome-online-accounts-devel-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825031" comment="gnome-online-miners-3.26.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825032" comment="gnome-packagekit-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825033" comment="gnome-packagekit-common-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825034" comment="gnome-packagekit-installer-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825035" comment="gnome-packagekit-updater-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825036" comment="gnome-screenshot-3.26.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825037" comment="gnome-session-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825038" comment="gnome-session-custom-session-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825039" comment="gnome-session-wayland-session-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825040" comment="gnome-session-xsession-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825041" comment="gnome-settings-daemon-3.28.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825042" comment="gnome-settings-daemon-devel-3.28.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825043" comment="gnome-shell-3.28.3-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825044" comment="gnome-shell-extension-alternate-tab-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825045" comment="gnome-shell-extension-apps-menu-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825046" comment="gnome-shell-extension-auto-move-windows-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825047" comment="gnome-shell-extension-common-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825048" comment="gnome-shell-extension-dash-to-dock-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825049" comment="gnome-shell-extension-drive-menu-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825050" comment="gnome-shell-extension-launch-new-instance-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825051" comment="gnome-shell-extension-native-window-placement-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825052" comment="gnome-shell-extension-no-hot-corner-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825053" comment="gnome-shell-extension-panel-favorites-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825054" comment="gnome-shell-extension-places-menu-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825055" comment="gnome-shell-extension-screenshot-window-sizer-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825056" comment="gnome-shell-extension-systemMonitor-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825057" comment="gnome-shell-extension-top-icons-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825058" comment="gnome-shell-extension-updates-dialog-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825059" comment="gnome-shell-extension-user-theme-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825060" comment="gnome-shell-extension-window-list-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825061" comment="gnome-shell-extension-windowsNavigator-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825062" comment="gnome-shell-extension-workspace-indicator-3.28.1-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825063" comment="gnome-software-3.28.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825064" comment="gnome-software-devel-3.28.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825065" comment="gnome-software-editor-3.28.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825066" comment="gnome-system-monitor-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825067" comment="gnome-terminal-3.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825068" comment="gnome-terminal-nautilus-3.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825069" comment="gnome-themes-standard-3.28-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825070" comment="gnome-tweak-tool-3.28.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825071" comment="gnome-user-docs-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825072" comment="gnote-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825073" comment="gobject-introspection-1.56.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825074" comment="gobject-introspection-devel-1.56.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825075" comment="gom-0.3.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825076" comment="gom-devel-0.3.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825077" comment="google-noto-emoji-color-fonts-20180508-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825078" comment="google-noto-emoji-fonts-20180508-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825079" comment="grilo-0.3.6-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825080" comment="grilo-devel-0.3.6-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825081" comment="grilo-plugins-0.3.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825082" comment="gsettings-desktop-schemas-3.28.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825083" comment="gsettings-desktop-schemas-devel-3.28.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825084" comment="gspell-1.6.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825085" comment="gspell-devel-1.6.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825086" comment="gspell-doc-1.6.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825087" comment="gssdp-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825088" comment="gssdp-devel-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825089" comment="gssdp-docs-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825090" comment="gssdp-utils-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825091" comment="gstreamer1-plugins-base-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825092" comment="gstreamer1-plugins-base-devel-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825093" comment="gstreamer1-plugins-base-devel-docs-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825094" comment="gstreamer1-plugins-base-tools-1.10.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825095" comment="gtk-doc-1.28-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825096" comment="gtk-update-icon-cache-3.22.30-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825097" comment="gtk3-3.22.30-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825098" comment="gtk3-devel-3.22.30-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825099" comment="gtk3-devel-docs-3.22.30-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825100" comment="gtk3-immodule-xim-3.22.30-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825101" comment="gtk3-immodules-3.22.30-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825102" comment="gtk3-tests-3.22.30-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825103" comment="gtksourceview3-3.24.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825104" comment="gtksourceview3-devel-3.24.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825105" comment="gtksourceview3-tests-3.24.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825106" comment="gucharmap-10.0.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825107" comment="gucharmap-devel-10.0.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825108" comment="gucharmap-libs-10.0.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825109" comment="gupnp-1.0.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825110" comment="gupnp-devel-1.0.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825111" comment="gupnp-docs-1.0.2-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825112" comment="gupnp-igd-0.2.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825113" comment="gupnp-igd-devel-0.2.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825114" comment="gupnp-igd-python-0.2.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825115" comment="gvfs-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825116" comment="gvfs-afc-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825117" comment="gvfs-afp-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825118" comment="gvfs-archive-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825119" comment="gvfs-client-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825120" comment="gvfs-devel-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825121" comment="gvfs-fuse-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825122" comment="gvfs-goa-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825123" comment="gvfs-gphoto2-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825124" comment="gvfs-mtp-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825125" comment="gvfs-smb-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825126" comment="gvfs-tests-1.36.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825127" comment="harfbuzz-1.7.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825128" comment="harfbuzz-devel-1.7.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825129" comment="harfbuzz-icu-1.7.5-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825130" comment="json-glib-1.4.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825131" comment="json-glib-devel-1.4.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825132" comment="json-glib-tests-1.4.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825133" comment="libappstream-glib-0.7.8-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825134" comment="libappstream-glib-builder-0.7.8-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825135" comment="libappstream-glib-builder-devel-0.7.8-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825136" comment="libappstream-glib-devel-0.7.8-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825137" comment="libchamplain-0.12.16-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825138" comment="libchamplain-demos-0.12.16-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825139" comment="libchamplain-devel-0.12.16-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825140" comment="libchamplain-gtk-0.12.16-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825141" comment="libcroco-0.6.12-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825142" comment="libcroco-devel-0.6.12-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825143" comment="libgdata-0.17.9-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825144" comment="libgdata-devel-0.17.9-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825145" comment="libgee-0.20.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825146" comment="libgee-devel-0.20.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825147" comment="libgepub-0.6.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825148" comment="libgepub-devel-0.6.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825149" comment="libgexiv2-0.10.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825150" comment="libgexiv2-devel-0.10.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825151" comment="libgnomekbd-3.26.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825152" comment="libgnomekbd-devel-3.26.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825153" comment="libgovirt-0.3.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825154" comment="libgovirt-devel-0.3.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825155" comment="libgtop2-2.38.0-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825156" comment="libgtop2-devel-2.38.0-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825157" comment="libgweather-3.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825158" comment="libgweather-devel-3.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825159" comment="libgxps-0.3.0-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825160" comment="libgxps-devel-0.3.0-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825161" comment="libgxps-tools-0.3.0-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825162" comment="libical-3.0.3-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825163" comment="libical-devel-3.0.3-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825164" comment="libical-glib-3.0.3-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825165" comment="libical-glib-devel-3.0.3-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825166" comment="libical-glib-doc-3.0.3-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825167" comment="libjpeg-turbo-1.2.90-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825168" comment="libjpeg-turbo-devel-1.2.90-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825169" comment="libjpeg-turbo-static-1.2.90-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825170" comment="libjpeg-turbo-utils-1.2.90-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825171" comment="libmediaart-1.9.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825172" comment="libmediaart-devel-1.9.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825173" comment="libmediaart-tests-1.9.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825174" comment="libosinfo-1.1.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825175" comment="libosinfo-devel-1.1.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825176" comment="libosinfo-vala-1.1.0-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825177" comment="libpeas-1.22.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825178" comment="libpeas-devel-1.22.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825179" comment="libpeas-gtk-1.22.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825180" comment="libpeas-loader-python-1.22.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825181" comment="librsvg2-2.40.20-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825182" comment="librsvg2-devel-2.40.20-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825183" comment="librsvg2-tools-2.40.20-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825184" comment="libsecret-0.18.6-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825185" comment="libsecret-devel-0.18.6-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825186" comment="libsoup-2.62.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825187" comment="libsoup-devel-2.62.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825188" comment="libwayland-client-1.15.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825189" comment="libwayland-cursor-1.15.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825190" comment="libwayland-egl-1.15.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825191" comment="libwayland-server-1.15.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825192" comment="libwnck3-3.24.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825193" comment="libwnck3-devel-3.24.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825194" comment="mozjs52-52.9.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825195" comment="mozjs52-devel-52.9.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825196" comment="mutter-3.28.3-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825197" comment="mutter-devel-3.28.3-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825198" comment="nautilus-3.26.3.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825199" comment="nautilus-devel-3.26.3.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825200" comment="nautilus-extensions-3.26.3.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825201" comment="nautilus-sendto-3.8.6-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825202" comment="openchange-2.3-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825203" comment="openchange-client-2.3-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825204" comment="openchange-devel-2.3-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825205" comment="openchange-devel-docs-2.3-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825206" comment="osinfo-db-20180531-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825207" comment="pango-1.42.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825208" comment="pango-devel-1.42.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825209" comment="pango-tests-1.42.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825210" comment="poppler-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825211" comment="poppler-cpp-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825212" comment="poppler-cpp-devel-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825213" comment="poppler-demos-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825214" comment="poppler-devel-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825215" comment="poppler-glib-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825216" comment="poppler-glib-devel-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825217" comment="poppler-qt-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825218" comment="poppler-qt-devel-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825219" comment="poppler-utils-0.26.5-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825220" comment="python2-gexiv2-0.10.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825221" comment="python2-pyatspi-2.26.0-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825222" comment="rest-0.8.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825223" comment="rest-devel-0.8.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825224" comment="rhythmbox-3.4.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825225" comment="rhythmbox-devel-3.4.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825226" comment="seahorse-nautilus-3.11.92-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825227" comment="shotwell-0.28.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825228" comment="sushi-3.28.3-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825229" comment="totem-3.26.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825230" comment="totem-devel-3.26.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825231" comment="totem-nautilus-3.26.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825232" comment="totem-pl-parser-3.26.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825233" comment="totem-pl-parser-devel-3.26.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825234" comment="turbojpeg-1.2.90-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825235" comment="turbojpeg-devel-1.2.90-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825236" comment="upower-0.99.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825237" comment="upower-devel-0.99.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825238" comment="upower-devel-docs-0.99.7-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825239" comment="vala-0.40.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825240" comment="vala-devel-0.40.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825241" comment="vala-doc-0.40.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825242" comment="valadoc-0.40.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825243" comment="valadoc-devel-0.40.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825244" comment="vino-3.22.0-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825245" comment="vte-profile-0.52.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825246" comment="vte291-0.52.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825247" comment="vte291-devel-0.52.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825248" comment="wayland-devel-1.15.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825249" comment="wayland-doc-1.15.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825250" comment="wayland-protocols-devel-1.14-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825251" comment="webkitgtk4-2.20.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825252" comment="webkitgtk4-devel-2.20.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825253" comment="webkitgtk4-doc-2.20.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825254" comment="webkitgtk4-jsc-2.20.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825255" comment="webkitgtk4-jsc-devel-2.20.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825256" comment="webkitgtk4-plugin-process-gtk2-2.20.5-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825257" comment="xdg-desktop-portal-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825258" comment="xdg-desktop-portal-devel-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825259" comment="xdg-desktop-portal-gtk-1.0.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825260" comment="yelp-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825261" comment="yelp-devel-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825262" comment="yelp-libs-3.28.1-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825263" comment="yelp-tools-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825264" comment="yelp-xsl-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825265" comment="yelp-xsl-devel-3.28.0-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825266" comment="zenity-3.28.1-1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184700" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4700</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4700" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4700" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4700" ref_url="https://www.suse.com/security/cve/CVE-2018-4700" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004958.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4105-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LFTEECU2ZRQQJ6Q6IZWXIGHFB4LWIWQ2/#LFTEECU2ZRQQJ6Q6IZWXIGHFB4LWIWQ2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4141-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TG6UJOEDYGZIMVAKITTYQOUSUXGG7VCR/#TG6UJOEDYGZIMVAKITTYQOUSUXGG7VCR" source="SUSE-SU"/>
    <description>
    DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2018-4300. Reason: This candidate is a duplicate of CVE-2018-4300. Notes: All CVE users should reference CVE-2018-4300 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-09"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4700/">CVE-2018-4700 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2018-4700">CVE-2018-4700 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1115750">SUSE bug 1115750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131480">SUSE bug 1131480</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827646" comment="cups-1.6.3-43.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827647" comment="cups-client-1.6.3-43.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827648" comment="cups-devel-1.6.3-43.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827649" comment="cups-filesystem-1.6.3-43.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827650" comment="cups-ipptool-1.6.3-43.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827651" comment="cups-libs-1.6.3-43.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827652" comment="cups-lpd-1.6.3-43.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185089" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5089</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5089" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5089" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5089" ref_url="https://www.suse.com/security/cve/CVE-2018-5089" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0361-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003710.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0203-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5TYQUE2YSHEM7YBV6PQBTTO4CRFS3VDX/#5TYQUE2YSHEM7YBV6PQBTTO4CRFS3VDX" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0256-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BDMR3YENC7V5BUBRGJXWANWHWNBW46OF/#BDMR3YENC7V5BUBRGJXWANWHWNBW46OF" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0257-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IQKYFID4LB22UT3U2EOJ242RTGFRORJJ/#IQKYFID4LB22UT3U2EOJ242RTGFRORJJ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Memory safety bugs were reported in Firefox 57 and Firefox ESR 52.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird &lt; 52.6, Firefox ESR &lt; 52.6, and Firefox &lt; 58.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-11-26"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5089/">CVE-2018-5089 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5089">CVE-2018-5089 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1077291">SUSE bug 1077291</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823951" comment="firefox-52.6.0-1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823986" comment="thunderbird-52.6.0-1.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185091" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5091</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5091" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5091" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5091" ref_url="https://www.suse.com/security/cve/CVE-2018-5091" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0361-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003710.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0203-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5TYQUE2YSHEM7YBV6PQBTTO4CRFS3VDX/#5TYQUE2YSHEM7YBV6PQBTTO4CRFS3VDX" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability can occur during WebRTC connections when interacting with the DTMF timers. This results in a potentially exploitable crash. This vulnerability affects Firefox ESR &lt; 52.6 and Firefox &lt; 58.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-11-27"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5091/">CVE-2018-5091 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5091">CVE-2018-5091 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1077291">SUSE bug 1077291</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823951" comment="firefox-52.6.0-1.el7_4 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185095" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5095</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5095" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5095" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5095" ref_url="https://www.suse.com/security/cve/CVE-2018-5095" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0361-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003710.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0203-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5TYQUE2YSHEM7YBV6PQBTTO4CRFS3VDX/#5TYQUE2YSHEM7YBV6PQBTTO4CRFS3VDX" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0256-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BDMR3YENC7V5BUBRGJXWANWHWNBW46OF/#BDMR3YENC7V5BUBRGJXWANWHWNBW46OF" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0257-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IQKYFID4LB22UT3U2EOJ242RTGFRORJJ/#IQKYFID4LB22UT3U2EOJ242RTGFRORJJ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    An integer overflow vulnerability in the Skia library when allocating memory for edge builders on some systems with at least 8 GB of RAM. This results in the use of uninitialized memory, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.6, Firefox ESR &lt; 52.6, and Firefox &lt; 58.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-11-27"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5095/">CVE-2018-5095 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5095">CVE-2018-5095 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1077291">SUSE bug 1077291</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823951" comment="firefox-52.6.0-1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823986" comment="thunderbird-52.6.0-1.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185096" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5096</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5096" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5096" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5096" ref_url="https://www.suse.com/security/cve/CVE-2018-5096" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0361-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003710.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0203-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5TYQUE2YSHEM7YBV6PQBTTO4CRFS3VDX/#5TYQUE2YSHEM7YBV6PQBTTO4CRFS3VDX" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0256-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BDMR3YENC7V5BUBRGJXWANWHWNBW46OF/#BDMR3YENC7V5BUBRGJXWANWHWNBW46OF" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0257-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IQKYFID4LB22UT3U2EOJ242RTGFRORJJ/#IQKYFID4LB22UT3U2EOJ242RTGFRORJJ" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability can occur while editing events in form elements on a page, resulting in a potentially exploitable crash. This vulnerability affects Firefox ESR &lt; 52.6 and Thunderbird &lt; 52.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-27"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5096/">CVE-2018-5096 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5096">CVE-2018-5096 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1077291">SUSE bug 1077291</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823951" comment="firefox-52.6.0-1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823986" comment="thunderbird-52.6.0-1.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185097" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5097</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5097" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5097" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5097" ref_url="https://www.suse.com/security/cve/CVE-2018-5097" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0361-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003710.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0203-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5TYQUE2YSHEM7YBV6PQBTTO4CRFS3VDX/#5TYQUE2YSHEM7YBV6PQBTTO4CRFS3VDX" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0256-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BDMR3YENC7V5BUBRGJXWANWHWNBW46OF/#BDMR3YENC7V5BUBRGJXWANWHWNBW46OF" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0257-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IQKYFID4LB22UT3U2EOJ242RTGFRORJJ/#IQKYFID4LB22UT3U2EOJ242RTGFRORJJ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability can occur during XSL transformations when the source document for the transformation is manipulated by script content during the transformation. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.6, Firefox ESR &lt; 52.6, and Firefox &lt; 58.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-11-28"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5097/">CVE-2018-5097 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5097">CVE-2018-5097 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1077291">SUSE bug 1077291</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823951" comment="firefox-52.6.0-1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823986" comment="thunderbird-52.6.0-1.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185098" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5098</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5098" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5098" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5098" ref_url="https://www.suse.com/security/cve/CVE-2018-5098" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0361-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003710.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0203-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5TYQUE2YSHEM7YBV6PQBTTO4CRFS3VDX/#5TYQUE2YSHEM7YBV6PQBTTO4CRFS3VDX" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0256-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BDMR3YENC7V5BUBRGJXWANWHWNBW46OF/#BDMR3YENC7V5BUBRGJXWANWHWNBW46OF" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0257-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IQKYFID4LB22UT3U2EOJ242RTGFRORJJ/#IQKYFID4LB22UT3U2EOJ242RTGFRORJJ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability can occur when form input elements, focus, and selections are manipulated by script content. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.6, Firefox ESR &lt; 52.6, and Firefox &lt; 58.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-11-27"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5098/">CVE-2018-5098 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5098">CVE-2018-5098 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1077291">SUSE bug 1077291</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823951" comment="firefox-52.6.0-1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823986" comment="thunderbird-52.6.0-1.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185099" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5099</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5099" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5099" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5099" ref_url="https://www.suse.com/security/cve/CVE-2018-5099" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0361-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003710.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0203-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5TYQUE2YSHEM7YBV6PQBTTO4CRFS3VDX/#5TYQUE2YSHEM7YBV6PQBTTO4CRFS3VDX" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0256-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BDMR3YENC7V5BUBRGJXWANWHWNBW46OF/#BDMR3YENC7V5BUBRGJXWANWHWNBW46OF" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0257-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IQKYFID4LB22UT3U2EOJ242RTGFRORJJ/#IQKYFID4LB22UT3U2EOJ242RTGFRORJJ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability can occur when the widget listener is holding strong references to browser objects that have previously been freed, resulting in a potentially exploitable crash when these references are used. This vulnerability affects Thunderbird &lt; 52.6, Firefox ESR &lt; 52.6, and Firefox &lt; 58.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-11-28"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5099/">CVE-2018-5099 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5099">CVE-2018-5099 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1077291">SUSE bug 1077291</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823951" comment="firefox-52.6.0-1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823986" comment="thunderbird-52.6.0-1.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185102" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5102</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5102" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5102" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5102" ref_url="https://www.suse.com/security/cve/CVE-2018-5102" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0361-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003710.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0203-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5TYQUE2YSHEM7YBV6PQBTTO4CRFS3VDX/#5TYQUE2YSHEM7YBV6PQBTTO4CRFS3VDX" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0256-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BDMR3YENC7V5BUBRGJXWANWHWNBW46OF/#BDMR3YENC7V5BUBRGJXWANWHWNBW46OF" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0257-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IQKYFID4LB22UT3U2EOJ242RTGFRORJJ/#IQKYFID4LB22UT3U2EOJ242RTGFRORJJ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability can occur when manipulating HTML media elements with media streams, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.6, Firefox ESR &lt; 52.6, and Firefox &lt; 58.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-11-28"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5102/">CVE-2018-5102 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5102">CVE-2018-5102 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1077291">SUSE bug 1077291</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823951" comment="firefox-52.6.0-1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823986" comment="thunderbird-52.6.0-1.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185103" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5103</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5103" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5103" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5103" ref_url="https://www.suse.com/security/cve/CVE-2018-5103" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0361-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003710.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0203-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5TYQUE2YSHEM7YBV6PQBTTO4CRFS3VDX/#5TYQUE2YSHEM7YBV6PQBTTO4CRFS3VDX" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0256-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BDMR3YENC7V5BUBRGJXWANWHWNBW46OF/#BDMR3YENC7V5BUBRGJXWANWHWNBW46OF" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0257-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IQKYFID4LB22UT3U2EOJ242RTGFRORJJ/#IQKYFID4LB22UT3U2EOJ242RTGFRORJJ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability can occur during mouse event handling due to issues with multiprocess support. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.6, Firefox ESR &lt; 52.6, and Firefox &lt; 58.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-11-26"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5103/">CVE-2018-5103 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5103">CVE-2018-5103 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1077291">SUSE bug 1077291</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823951" comment="firefox-52.6.0-1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823986" comment="thunderbird-52.6.0-1.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185104" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5104</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5104" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5104" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5104" ref_url="https://www.suse.com/security/cve/CVE-2018-5104" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0361-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003710.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0203-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5TYQUE2YSHEM7YBV6PQBTTO4CRFS3VDX/#5TYQUE2YSHEM7YBV6PQBTTO4CRFS3VDX" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0256-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BDMR3YENC7V5BUBRGJXWANWHWNBW46OF/#BDMR3YENC7V5BUBRGJXWANWHWNBW46OF" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0257-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IQKYFID4LB22UT3U2EOJ242RTGFRORJJ/#IQKYFID4LB22UT3U2EOJ242RTGFRORJJ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability can occur during font face manipulation when a font face is freed while still in use, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.6, Firefox ESR &lt; 52.6, and Firefox &lt; 58.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-11-27"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5104/">CVE-2018-5104 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5104">CVE-2018-5104 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1077291">SUSE bug 1077291</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823951" comment="firefox-52.6.0-1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823986" comment="thunderbird-52.6.0-1.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185117" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5117</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5117" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5117" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5117" ref_url="https://www.suse.com/security/cve/CVE-2018-5117" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0361-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003710.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0203-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5TYQUE2YSHEM7YBV6PQBTTO4CRFS3VDX/#5TYQUE2YSHEM7YBV6PQBTTO4CRFS3VDX" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0256-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BDMR3YENC7V5BUBRGJXWANWHWNBW46OF/#BDMR3YENC7V5BUBRGJXWANWHWNBW46OF" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0257-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IQKYFID4LB22UT3U2EOJ242RTGFRORJJ/#IQKYFID4LB22UT3U2EOJ242RTGFRORJJ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    If right-to-left text is used in the addressbar with left-to-right alignment, it is possible in some circumstances to scroll this text to spoof the displayed URL. This issue could result in the wrong URL being displayed as a location, which can mislead users to believe they are on a different site than the one loaded. This vulnerability affects Thunderbird &lt; 52.6, Firefox ESR &lt; 52.6, and Firefox &lt; 58.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-5117/">CVE-2018-5117 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5117">CVE-2018-5117 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1077291">SUSE bug 1077291</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823951" comment="firefox-52.6.0-1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823986" comment="thunderbird-52.6.0-1.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185125" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5125</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5125" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5125" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5125" ref_url="https://www.suse.com/security/cve/CVE-2018-5125" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003882.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0681-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/55YQYEFNICEGT7YN7HQQON2JGNOSIT2R/#55YQYEFNICEGT7YN7HQQON2JGNOSIT2R" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Memory safety bugs were reported in Firefox 58 and Firefox ESR 52.6. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird &lt; 52.7, Firefox ESR &lt; 52.7, and Firefox &lt; 59.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5125/">CVE-2018-5125 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5125">CVE-2018-5125 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1085130">SUSE bug 1085130</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824062" comment="firefox-52.7.0-1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824067" comment="thunderbird-52.7.0-1.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185127" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5127</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5127" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5127" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5127" ref_url="https://www.suse.com/security/cve/CVE-2018-5127" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003882.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0681-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/55YQYEFNICEGT7YN7HQQON2JGNOSIT2R/#55YQYEFNICEGT7YN7HQQON2JGNOSIT2R" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A buffer overflow can occur when manipulating the SVG "animatedPathSegList" through script. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.7, Firefox ESR &lt; 52.7, and Firefox &lt; 59.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5127/">CVE-2018-5127 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5127">CVE-2018-5127 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1085130">SUSE bug 1085130</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824062" comment="firefox-52.7.0-1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824067" comment="thunderbird-52.7.0-1.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185129" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5129</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5129" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5129" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5129" ref_url="https://www.suse.com/security/cve/CVE-2018-5129" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003882.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0681-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/55YQYEFNICEGT7YN7HQQON2JGNOSIT2R/#55YQYEFNICEGT7YN7HQQON2JGNOSIT2R" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A lack of parameter validation on IPC messages results in a potential out-of-bounds write through malformed IPC messages. This can potentially allow for sandbox escape through memory corruption in the parent process. This vulnerability affects Thunderbird &lt; 52.7, Firefox ESR &lt; 52.7, and Firefox &lt; 59.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5129/">CVE-2018-5129 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5129">CVE-2018-5129 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1085130">SUSE bug 1085130</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824062" comment="firefox-52.7.0-1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824067" comment="thunderbird-52.7.0-1.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185130" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5130</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5130" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5130" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5130" ref_url="https://www.suse.com/security/cve/CVE-2018-5130" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003882.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0681-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/55YQYEFNICEGT7YN7HQQON2JGNOSIT2R/#55YQYEFNICEGT7YN7HQQON2JGNOSIT2R" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    When packets with a mismatched RTP payload type are sent in WebRTC connections, in some circumstances a potentially exploitable crash is triggered. This vulnerability affects Firefox ESR &lt; 52.7 and Firefox &lt; 59.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-11-28"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5130/">CVE-2018-5130 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5130">CVE-2018-5130 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1085130">SUSE bug 1085130</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824062" comment="firefox-52.7.0-1.el7_4 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185131" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5131</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5131" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5131" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5131" ref_url="https://www.suse.com/security/cve/CVE-2018-5131" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003882.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0681-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/55YQYEFNICEGT7YN7HQQON2JGNOSIT2R/#55YQYEFNICEGT7YN7HQQON2JGNOSIT2R" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Under certain circumstances the "fetch()" API can return transient local copies of resources that were sent with a "no-store" or "no-cache" cache header instead of downloading a copy from the network as it should. This can result in previously stored, locally cached data of a website being accessible to users if they share a common profile while browsing. This vulnerability affects Firefox ESR &lt; 52.7 and Firefox &lt; 59.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-5131/">CVE-2018-5131 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5131">CVE-2018-5131 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1085130">SUSE bug 1085130</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824062" comment="firefox-52.7.0-1.el7_4 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185144" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5144</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5144" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5144" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5144" ref_url="https://www.suse.com/security/cve/CVE-2018-5144" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003882.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0681-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/55YQYEFNICEGT7YN7HQQON2JGNOSIT2R/#55YQYEFNICEGT7YN7HQQON2JGNOSIT2R" source="SUSE-SU"/>
    <description>
    An integer overflow can occur during conversion of text to some Unicode character sets due to an unchecked length parameter. This vulnerability affects Firefox ESR &lt; 52.7 and Thunderbird &lt; 52.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-5144/">CVE-2018-5144 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5144">CVE-2018-5144 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1085130">SUSE bug 1085130</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824062" comment="firefox-52.7.0-1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824067" comment="thunderbird-52.7.0-1.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185145" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5145</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5145" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5145" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5145" ref_url="https://www.suse.com/security/cve/CVE-2018-5145" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003882.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0681-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/55YQYEFNICEGT7YN7HQQON2JGNOSIT2R/#55YQYEFNICEGT7YN7HQQON2JGNOSIT2R" source="SUSE-SU"/>
    <description>
    Memory safety bugs were reported in Firefox ESR 52.6. These bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox ESR &lt; 52.7 and Thunderbird &lt; 52.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-05"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5145/">CVE-2018-5145 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5145">CVE-2018-5145 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1085130">SUSE bug 1085130</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824062" comment="firefox-52.7.0-1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824067" comment="thunderbird-52.7.0-1.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185146" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5146</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5146" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5146" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5146" ref_url="https://www.suse.com/security/cve/CVE-2018-5146" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003882.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0737-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O2ERK3TGYW22HRZWDX2VFIPJE55ML52P/#O2ERK3TGYW22HRZWDX2VFIPJE55ML52P" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    An out of bounds memory write while processing Vorbis audio data was reported through the Pwn2Own contest. This vulnerability affects Firefox &lt; 59.0.1, Firefox ESR &lt; 52.7.2, and Thunderbird &lt; 52.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-11-28"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5146/">CVE-2018-5146 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5146">CVE-2018-5146 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1085671">SUSE bug 1085671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085687">SUSE bug 1085687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180395">SUSE bug 1180395</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824063" comment="firefox-52.7.2-1.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824160" comment="libvorbis-1.3.3-8.el7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824161" comment="libvorbis-devel-1.3.3-8.el7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824162" comment="libvorbis-devel-docs-1.3.3-8.el7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824067" comment="thunderbird-52.7.0-1.el7_4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824160" comment="libvorbis-1.3.3-8.el7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824161" comment="libvorbis-devel-1.3.3-8.el7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824162" comment="libvorbis-devel-docs-1.3.3-8.el7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185148" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5148</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5148" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5148" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5148" ref_url="https://www.suse.com/security/cve/CVE-2018-5148" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003882.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability can occur in the compositor during certain graphics operations when a raw pointer is used instead of a reference counted one. This results in a potentially exploitable crash. This vulnerability affects Firefox ESR &lt; 52.7.3 and Firefox &lt; 59.0.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-11-27"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5148/">CVE-2018-5148 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5148">CVE-2018-5148 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1087059">SUSE bug 1087059</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824177" comment="firefox-52.7.3-1.el7_5 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185150" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5150</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5150" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5150" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5150" ref_url="https://www.suse.com/security/cve/CVE-2018-5150" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1334-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1212-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QW6ONOKWRAJKVXKDVJUWJYH7GOETIORR/#QW6ONOKWRAJKVXKDVJUWJYH7GOETIORR" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1359-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XIB7MOU4YAP2TTTQVJNMASWGZJFRRB4L/#XIB7MOU4YAP2TTTQVJNMASWGZJFRRB4L" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1361-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5Y6MPM7IKKPTMZZBNN5Z6JAJDE3BCVBE/#5Y6MPM7IKKPTMZZBNN5Z6JAJDE3BCVBE" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Memory safety bugs were reported in Firefox 59, Firefox ESR 52.7, and Thunderbird 52.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird &lt; 52.8, Thunderbird ESR &lt; 52.8, Firefox &lt; 60, and Firefox ESR &lt; 52.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5150/">CVE-2018-5150 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5150">CVE-2018-5150 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1092548">SUSE bug 1092548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092611">SUSE bug 1092611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093969">SUSE bug 1093969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093970">SUSE bug 1093970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093971">SUSE bug 1093971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093972">SUSE bug 1093972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093973">SUSE bug 1093973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824264" comment="firefox-52.8.0-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824346" comment="thunderbird-52.8.0-1.el7_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185154" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5154</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5154" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5154" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5154" ref_url="https://www.suse.com/security/cve/CVE-2018-5154" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1334-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1212-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QW6ONOKWRAJKVXKDVJUWJYH7GOETIORR/#QW6ONOKWRAJKVXKDVJUWJYH7GOETIORR" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1359-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XIB7MOU4YAP2TTTQVJNMASWGZJFRRB4L/#XIB7MOU4YAP2TTTQVJNMASWGZJFRRB4L" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1361-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5Y6MPM7IKKPTMZZBNN5Z6JAJDE3BCVBE/#5Y6MPM7IKKPTMZZBNN5Z6JAJDE3BCVBE" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability can occur while enumerating attributes during SVG animations with clip paths. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.8, Thunderbird ESR &lt; 52.8, Firefox &lt; 60, and Firefox ESR &lt; 52.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5154/">CVE-2018-5154 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5154">CVE-2018-5154 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1092548">SUSE bug 1092548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092611">SUSE bug 1092611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093969">SUSE bug 1093969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093970">SUSE bug 1093970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093971">SUSE bug 1093971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093972">SUSE bug 1093972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093973">SUSE bug 1093973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824264" comment="firefox-52.8.0-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824346" comment="thunderbird-52.8.0-1.el7_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185155" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5155</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5155" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5155" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5155" ref_url="https://www.suse.com/security/cve/CVE-2018-5155" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1334-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1212-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QW6ONOKWRAJKVXKDVJUWJYH7GOETIORR/#QW6ONOKWRAJKVXKDVJUWJYH7GOETIORR" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1359-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XIB7MOU4YAP2TTTQVJNMASWGZJFRRB4L/#XIB7MOU4YAP2TTTQVJNMASWGZJFRRB4L" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1361-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5Y6MPM7IKKPTMZZBNN5Z6JAJDE3BCVBE/#5Y6MPM7IKKPTMZZBNN5Z6JAJDE3BCVBE" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability can occur while adjusting layout during SVG animations with text paths. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.8, Thunderbird ESR &lt; 52.8, Firefox &lt; 60, and Firefox ESR &lt; 52.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5155/">CVE-2018-5155 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5155">CVE-2018-5155 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1092548">SUSE bug 1092548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092611">SUSE bug 1092611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093969">SUSE bug 1093969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093970">SUSE bug 1093970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093971">SUSE bug 1093971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093972">SUSE bug 1093972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093973">SUSE bug 1093973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824264" comment="firefox-52.8.0-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824346" comment="thunderbird-52.8.0-1.el7_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185156" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5156</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5156" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5156" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5156" ref_url="https://www.suse.com/security/cve/CVE-2018-5156" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004685.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004744.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1833-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RJT5QZI4AEZFZZAERFU4PCCU23J33X2Q/#RJT5QZI4AEZFZZAERFU4PCCU23J33X2Q" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2330-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NFZYHL4CEEO4DFGADLJSGPBS23HBMR45/#NFZYHL4CEEO4DFGADLJSGPBS23HBMR45" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2658-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y6J6RQFF6FJF5ANMYWEAOTUWGLGJPBHL/#Y6J6RQFF6FJF5ANMYWEAOTUWGLGJPBHL" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2807-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GLUOSK2EJUPHGOY64OTIF2JORV62RASV/#GLUOSK2EJUPHGOY64OTIF2JORV62RASV" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3051-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MTTZ6YPTQZTRHJWNCF4KNXDHV5N6Y2CU/#MTTZ6YPTQZTRHJWNCF4KNXDHV5N6Y2CU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3687-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BBHDVB7NPDAZXEW2BECURXKYFEGTTUL4/#BBHDVB7NPDAZXEW2BECURXKYFEGTTUL4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A vulnerability can occur when capturing a media stream when the media source type is changed as the capture is occurring. This can result in stream data being cast to the wrong type causing a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 60, Firefox ESR &lt; 60.1, Firefox ESR &lt; 52.9, and Firefox &lt; 61.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5156/">CVE-2018-5156 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5156">CVE-2018-5156 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1098998">SUSE bug 1098998</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824439" comment="firefox-60.1.0-4.el7_5 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185157" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5157</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5157" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5157" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5157" ref_url="https://www.suse.com/security/cve/CVE-2018-5157" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1334-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1212-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QW6ONOKWRAJKVXKDVJUWJYH7GOETIORR/#QW6ONOKWRAJKVXKDVJUWJYH7GOETIORR" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Same-origin protections for the PDF viewer can be bypassed, allowing a malicious site to intercept messages meant for the viewer. This could allow the site to retrieve PDF files restricted to viewing by an authenticated user on a third-party website. This vulnerability affects Firefox ESR &lt; 52.8 and Firefox &lt; 60.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5157/">CVE-2018-5157 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5157">CVE-2018-5157 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1092548">SUSE bug 1092548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092611">SUSE bug 1092611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093969">SUSE bug 1093969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093970">SUSE bug 1093970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093971">SUSE bug 1093971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093972">SUSE bug 1093972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093973">SUSE bug 1093973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824264" comment="firefox-52.8.0-1.el7_5 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185158" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5158</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5158" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5158" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5158" ref_url="https://www.suse.com/security/cve/CVE-2018-5158" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1334-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1212-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QW6ONOKWRAJKVXKDVJUWJYH7GOETIORR/#QW6ONOKWRAJKVXKDVJUWJYH7GOETIORR" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    The PDF viewer does not sufficiently sanitize PostScript calculator functions, allowing malicious JavaScript to be injected through a crafted PDF file. This JavaScript can then be run with the permissions of the PDF viewer by its worker. This vulnerability affects Firefox ESR &lt; 52.8 and Firefox &lt; 60.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5158/">CVE-2018-5158 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5158">CVE-2018-5158 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1092548">SUSE bug 1092548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092611">SUSE bug 1092611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093969">SUSE bug 1093969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093970">SUSE bug 1093970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093971">SUSE bug 1093971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093972">SUSE bug 1093972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093973">SUSE bug 1093973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824264" comment="firefox-52.8.0-1.el7_5 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185159" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5159</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5159" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5159" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5159" ref_url="https://www.suse.com/security/cve/CVE-2018-5159" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1334-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1212-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QW6ONOKWRAJKVXKDVJUWJYH7GOETIORR/#QW6ONOKWRAJKVXKDVJUWJYH7GOETIORR" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1359-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XIB7MOU4YAP2TTTQVJNMASWGZJFRRB4L/#XIB7MOU4YAP2TTTQVJNMASWGZJFRRB4L" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1361-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5Y6MPM7IKKPTMZZBNN5Z6JAJDE3BCVBE/#5Y6MPM7IKKPTMZZBNN5Z6JAJDE3BCVBE" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    An integer overflow can occur in the Skia library due to 32-bit integer use in an array without integer overflow checks, resulting in possible out-of-bounds writes. This could lead to a potentially exploitable crash triggerable by web content. This vulnerability affects Thunderbird &lt; 52.8, Thunderbird ESR &lt; 52.8, Firefox &lt; 60, and Firefox ESR &lt; 52.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5159/">CVE-2018-5159 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5159">CVE-2018-5159 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1092548">SUSE bug 1092548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092611">SUSE bug 1092611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093969">SUSE bug 1093969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093970">SUSE bug 1093970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093971">SUSE bug 1093971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093972">SUSE bug 1093972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093973">SUSE bug 1093973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824264" comment="firefox-52.8.0-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824346" comment="thunderbird-52.8.0-1.el7_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185161" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5161</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5161" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5161" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5161" ref_url="https://www.suse.com/security/cve/CVE-2018-5161" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2018:1359-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XIB7MOU4YAP2TTTQVJNMASWGZJFRRB4L/#XIB7MOU4YAP2TTTQVJNMASWGZJFRRB4L" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1361-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5Y6MPM7IKKPTMZZBNN5Z6JAJDE3BCVBE/#5Y6MPM7IKKPTMZZBNN5Z6JAJDE3BCVBE" source="SUSE-SU"/>
    <description>
    Crafted message headers can cause a Thunderbird process to hang on receiving the message. This vulnerability affects Thunderbird ESR &lt; 52.8 and Thunderbird &lt; 52.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5161/">CVE-2018-5161 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5161">CVE-2018-5161 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1092548">SUSE bug 1092548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092611">SUSE bug 1092611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093969">SUSE bug 1093969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093970">SUSE bug 1093970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093971">SUSE bug 1093971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093972">SUSE bug 1093972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093973">SUSE bug 1093973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824346" comment="thunderbird-52.8.0-1.el7_5 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185162" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5162</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5162" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5162" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5162" ref_url="https://www.suse.com/security/cve/CVE-2018-5162" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2018:1359-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XIB7MOU4YAP2TTTQVJNMASWGZJFRRB4L/#XIB7MOU4YAP2TTTQVJNMASWGZJFRRB4L" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1361-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5Y6MPM7IKKPTMZZBNN5Z6JAJDE3BCVBE/#5Y6MPM7IKKPTMZZBNN5Z6JAJDE3BCVBE" source="SUSE-SU"/>
    <description>
    Plaintext of decrypted emails can leak through the src attribute of remote images, or links. This vulnerability affects Thunderbird ESR &lt; 52.8 and Thunderbird &lt; 52.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5162/">CVE-2018-5162 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5162">CVE-2018-5162 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1092548">SUSE bug 1092548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092611">SUSE bug 1092611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093151">SUSE bug 1093151</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093969">SUSE bug 1093969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093970">SUSE bug 1093970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093971">SUSE bug 1093971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093972">SUSE bug 1093972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093973">SUSE bug 1093973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824346" comment="thunderbird-52.8.0-1.el7_5 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185168" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5168</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5168" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5168" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5168" ref_url="https://www.suse.com/security/cve/CVE-2018-5168" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1334-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1212-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QW6ONOKWRAJKVXKDVJUWJYH7GOETIORR/#QW6ONOKWRAJKVXKDVJUWJYH7GOETIORR" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1359-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XIB7MOU4YAP2TTTQVJNMASWGZJFRRB4L/#XIB7MOU4YAP2TTTQVJNMASWGZJFRRB4L" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1361-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5Y6MPM7IKKPTMZZBNN5Z6JAJDE3BCVBE/#5Y6MPM7IKKPTMZZBNN5Z6JAJDE3BCVBE" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Sites can bypass security checks on permissions to install lightweight themes by manipulating the "baseURI" property of the theme element. This could allow a malicious site to install a theme without user interaction which could contain offensive or embarrassing images. This vulnerability affects Thunderbird &lt; 52.8, Thunderbird ESR &lt; 52.8, Firefox &lt; 60, and Firefox ESR &lt; 52.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5168/">CVE-2018-5168 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5168">CVE-2018-5168 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1092548">SUSE bug 1092548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092611">SUSE bug 1092611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093969">SUSE bug 1093969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093970">SUSE bug 1093970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093971">SUSE bug 1093971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093972">SUSE bug 1093972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093973">SUSE bug 1093973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824264" comment="firefox-52.8.0-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824346" comment="thunderbird-52.8.0-1.el7_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185170" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5170</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5170" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5170" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5170" ref_url="https://www.suse.com/security/cve/CVE-2018-5170" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2018:1359-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XIB7MOU4YAP2TTTQVJNMASWGZJFRRB4L/#XIB7MOU4YAP2TTTQVJNMASWGZJFRRB4L" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1361-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5Y6MPM7IKKPTMZZBNN5Z6JAJDE3BCVBE/#5Y6MPM7IKKPTMZZBNN5Z6JAJDE3BCVBE" source="SUSE-SU"/>
    <description>
    It is possible to spoof the filename of an attachment and display an arbitrary attachment name. This could lead to a user opening a remote attachment which is a different file type than expected. This vulnerability affects Thunderbird ESR &lt; 52.8 and Thunderbird &lt; 52.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5170/">CVE-2018-5170 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5170">CVE-2018-5170 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1092548">SUSE bug 1092548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092611">SUSE bug 1092611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093969">SUSE bug 1093969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093970">SUSE bug 1093970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093971">SUSE bug 1093971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093972">SUSE bug 1093972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093973">SUSE bug 1093973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824346" comment="thunderbird-52.8.0-1.el7_5 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185178" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5178</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5178" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5178" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5178" ref_url="https://www.suse.com/security/cve/CVE-2018-5178" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1334-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1212-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QW6ONOKWRAJKVXKDVJUWJYH7GOETIORR/#QW6ONOKWRAJKVXKDVJUWJYH7GOETIORR" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1359-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XIB7MOU4YAP2TTTQVJNMASWGZJFRRB4L/#XIB7MOU4YAP2TTTQVJNMASWGZJFRRB4L" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1361-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5Y6MPM7IKKPTMZZBNN5Z6JAJDE3BCVBE/#5Y6MPM7IKKPTMZZBNN5Z6JAJDE3BCVBE" source="SUSE-SU"/>
    <description>
    A buffer overflow was found during UTF8 to Unicode string conversion within JavaScript with extremely large amounts of data. This vulnerability requires the use of a malicious or vulnerable legacy extension in order to occur. This vulnerability affects Thunderbird ESR &lt; 52.8, Thunderbird &lt; 52.8, and Firefox ESR &lt; 52.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5178/">CVE-2018-5178 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5178">CVE-2018-5178 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1092548">SUSE bug 1092548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092611">SUSE bug 1092611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093969">SUSE bug 1093969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093970">SUSE bug 1093970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093971">SUSE bug 1093971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093972">SUSE bug 1093972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093973">SUSE bug 1093973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824264" comment="firefox-52.8.0-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824346" comment="thunderbird-52.8.0-1.el7_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185183" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5183</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5183" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5183" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5183" ref_url="https://www.suse.com/security/cve/CVE-2018-5183" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1334-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1212-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QW6ONOKWRAJKVXKDVJUWJYH7GOETIORR/#QW6ONOKWRAJKVXKDVJUWJYH7GOETIORR" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1359-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XIB7MOU4YAP2TTTQVJNMASWGZJFRRB4L/#XIB7MOU4YAP2TTTQVJNMASWGZJFRRB4L" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1361-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5Y6MPM7IKKPTMZZBNN5Z6JAJDE3BCVBE/#5Y6MPM7IKKPTMZZBNN5Z6JAJDE3BCVBE" source="SUSE-SU"/>
    <description>
    Mozilla developers backported selected changes in the Skia library. These changes correct memory corruption issues including invalid buffer reads and writes during graphic operations. This vulnerability affects Thunderbird ESR &lt; 52.8, Thunderbird &lt; 52.8, and Firefox ESR &lt; 52.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5183/">CVE-2018-5183 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5183">CVE-2018-5183 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1092548">SUSE bug 1092548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092611">SUSE bug 1092611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093969">SUSE bug 1093969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093970">SUSE bug 1093970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093971">SUSE bug 1093971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093972">SUSE bug 1093972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093973">SUSE bug 1093973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824264" comment="firefox-52.8.0-1.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824346" comment="thunderbird-52.8.0-1.el7_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185184" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5184</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5184" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5184" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5184" ref_url="https://www.suse.com/security/cve/CVE-2018-5184" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2018:1359-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XIB7MOU4YAP2TTTQVJNMASWGZJFRRB4L/#XIB7MOU4YAP2TTTQVJNMASWGZJFRRB4L" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1361-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5Y6MPM7IKKPTMZZBNN5Z6JAJDE3BCVBE/#5Y6MPM7IKKPTMZZBNN5Z6JAJDE3BCVBE" source="SUSE-SU"/>
    <description>
    Using remote content in encrypted messages can lead to the disclosure of plaintext. This vulnerability affects Thunderbird ESR &lt; 52.8 and Thunderbird &lt; 52.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5184/">CVE-2018-5184 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5184">CVE-2018-5184 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1092548">SUSE bug 1092548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092611">SUSE bug 1092611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093152">SUSE bug 1093152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093969">SUSE bug 1093969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093970">SUSE bug 1093970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093971">SUSE bug 1093971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093972">SUSE bug 1093972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093973">SUSE bug 1093973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824346" comment="thunderbird-52.8.0-1.el7_5 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5185</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5185" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5185" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5185" ref_url="https://www.suse.com/security/cve/CVE-2018-5185" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2018:1359-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XIB7MOU4YAP2TTTQVJNMASWGZJFRRB4L/#XIB7MOU4YAP2TTTQVJNMASWGZJFRRB4L" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1361-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5Y6MPM7IKKPTMZZBNN5Z6JAJDE3BCVBE/#5Y6MPM7IKKPTMZZBNN5Z6JAJDE3BCVBE" source="SUSE-SU"/>
    <description>
    Plaintext of decrypted emails can leak through by user submitting an embedded form. This vulnerability affects Thunderbird ESR &lt; 52.8 and Thunderbird &lt; 52.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5185/">CVE-2018-5185 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5185">CVE-2018-5185 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1092548">SUSE bug 1092548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092611">SUSE bug 1092611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093151">SUSE bug 1093151</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093969">SUSE bug 1093969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093970">SUSE bug 1093970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093971">SUSE bug 1093971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093972">SUSE bug 1093972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093973">SUSE bug 1093973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824346" comment="thunderbird-52.8.0-1.el7_5 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185188" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5188</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5188" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5188" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5188" ref_url="https://www.suse.com/security/cve/CVE-2018-5188" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004685.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004744.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1833-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RJT5QZI4AEZFZZAERFU4PCCU23J33X2Q/#RJT5QZI4AEZFZZAERFU4PCCU23J33X2Q" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1905-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NSDGXV6BYAYITPPHPUOJNEJUIM4AZXG7/#NSDGXV6BYAYITPPHPUOJNEJUIM4AZXG7" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1907-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2PTHFVR36FU2ABANH7SNYHEYYHW4B7CG/#2PTHFVR36FU2ABANH7SNYHEYYHW4B7CG" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2330-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NFZYHL4CEEO4DFGADLJSGPBS23HBMR45/#NFZYHL4CEEO4DFGADLJSGPBS23HBMR45" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2658-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y6J6RQFF6FJF5ANMYWEAOTUWGLGJPBHL/#Y6J6RQFF6FJF5ANMYWEAOTUWGLGJPBHL" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2807-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GLUOSK2EJUPHGOY64OTIF2JORV62RASV/#GLUOSK2EJUPHGOY64OTIF2JORV62RASV" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3051-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MTTZ6YPTQZTRHJWNCF4KNXDHV5N6Y2CU/#MTTZ6YPTQZTRHJWNCF4KNXDHV5N6Y2CU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3687-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BBHDVB7NPDAZXEW2BECURXKYFEGTTUL4/#BBHDVB7NPDAZXEW2BECURXKYFEGTTUL4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Memory safety bugs present in Firefox 60, Firefox ESR 60, and Firefox ESR 52.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird &lt; 60, Thunderbird &lt; 52.9, Firefox ESR &lt; 60.1, Firefox ESR &lt; 52.9, and Firefox &lt; 61.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5188/">CVE-2018-5188 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5188">CVE-2018-5188 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1098998">SUSE bug 1098998</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824439" comment="firefox-60.1.0-4.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824468" comment="thunderbird-52.9.1-1.el7_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185344" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5344</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5344" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5344" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5344" ref_url="https://www.suse.com/security/cve/CVE-2018-5344" source="SUSE CVE"/>
    <description>
    In the Linux kernel through 4.14.13, drivers/block/loop.c mishandles lo_release serialization, which allows attackers to cause a denial of service (__lock_acquire use-after-free) or possibly have unspecified other impact.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5344/">CVE-2018-5344 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5344">CVE-2018-5344 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1075825">SUSE bug 1075825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824786" comment="bpftool-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824787" comment="kernel-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824788" comment="kernel-abi-whitelists-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824789" comment="kernel-debug-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824792" comment="kernel-doc-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824793" comment="kernel-headers-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824794" comment="kernel-tools-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824795" comment="kernel-tools-libs-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824797" comment="perf-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824798" comment="python-perf-3.10.0-957.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185345" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5345</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5345" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5345" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5345" ref_url="https://www.suse.com/security/cve/CVE-2018-5345" source="SUSE CVE"/>
    <description>
    A stack-based buffer overflow within GNOME gcab through 0.7.4 can be exploited by malicious attackers to cause a crash or, potentially, execute arbitrary code via a crafted .cab file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-30"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5345/">CVE-2018-5345 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5345">CVE-2018-5345 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1075745">SUSE bug 1075745</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823994" comment="gcab-0.7-4.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823995" comment="libgcab1-0.7-4.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823996" comment="libgcab1-devel-0.7-4.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185379" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5379</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5379" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5379" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5379" ref_url="https://www.suse.com/security/cve/CVE-2018-5379" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0457-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019517.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0473-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/B5VWAWSUM2FXK6N67BLMOJ4M7OXMAIXJ/#B5VWAWSUM2FXK6N67BLMOJ4M7OXMAIXJ" source="SUSE-SU"/>
    <description>
    The Quagga BGP daemon (bgpd) prior to version 1.2.3 can double-free memory when processing certain forms of UPDATE message, containing cluster-list and/or unknown attributes. A successful attack could cause a denial of service or potentially allow an attacker to execute arbitrary code.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5379/">CVE-2018-5379 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5379">CVE-2018-5379 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1079799">SUSE bug 1079799</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009823997" comment="quagga-0.99.22.4-5.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823998" comment="quagga-contrib-0.99.22.4-5.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009823999" comment="quagga-devel-0.99.22.4-5.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185383" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5383</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5383" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5383" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5383" ref_url="https://www.suse.com/security/cve/CVE-2018-5383" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0427-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0427-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005145.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0275-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SSENWVSWFCEEBUCKJKCSESC5WUXEJX6C/#SSENWVSWFCEEBUCKJKCSESC5WUXEJX6C" source="SUSE-SU"/>
    <description>
    Bluetooth firmware or operating system software drivers in macOS versions before 10.13, High Sierra and iOS versions before 11.4, and Android versions before the 2018-06-05 patch may not sufficiently validate elliptic curve parameters used to generate public keys during a Diffie-Hellman key exchange, which may allow a remote attacker to obtain the encryption key used by the device.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-11"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5383/">CVE-2018-5383 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5383">CVE-2018-5383 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1104301">SUSE bug 1104301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826395" comment="iwl100-firmware-39.31.5.1-72.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826396" comment="iwl1000-firmware-39.31.5.1-72.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826397" comment="iwl105-firmware-18.168.6.1-72.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826398" comment="iwl135-firmware-18.168.6.1-72.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826399" comment="iwl2000-firmware-18.168.6.1-72.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826400" comment="iwl2030-firmware-18.168.6.1-72.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826401" comment="iwl3160-firmware-22.0.7.0-72.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826402" comment="iwl3945-firmware-15.32.2.9-72.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826403" comment="iwl4965-firmware-228.61.2.24-72.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826404" comment="iwl5000-firmware-8.83.5.1_1-72.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826405" comment="iwl5150-firmware-8.24.2.2-72.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826406" comment="iwl6000-firmware-9.221.4.1-72.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826407" comment="iwl6000g2a-firmware-17.168.5.3-72.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826408" comment="iwl6000g2b-firmware-17.168.5.2-72.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826409" comment="iwl6050-firmware-41.28.5.1-72.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826410" comment="iwl7260-firmware-22.0.7.0-72.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826411" comment="iwl7265-firmware-22.0.7.0-72.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826412" comment="linux-firmware-20190429-72.gitddde598.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185390" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5390</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5390" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5390" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5390" ref_url="https://www.suse.com/security/cve/CVE-2018-5390" source="SUSE CVE"/>
		<reference ref_id="BLOG-SEGMENTSMACK" ref_url="https://www.suse.com/c/suse-addresses-segmentsmack-attack/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2344-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004628.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004629.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2962-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20182962-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2963-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20182963-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004796.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1425-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006072.html" source="SUSE-SU"/>
		<reference ref_id="TID000019282" ref_url="https://www.suse.com/support/kb/doc/?id=000019282" source="SUSE-SU"/>
		<reference ref_id="TID7023243" ref_url="https://www.suse.com/support/kb/doc/?id=7023243" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XUUL7WMOXILGLIZMZLYLY5D73VOU36JN/#XUUL7WMOXILGLIZMZLYLY5D73VOU36JN" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2404-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DHR6QOZXXCNSV77C5MHVLBK4DBFOQPCN/#DHR6QOZXXCNSV77C5MHVLBK4DBFOQPCN" source="SUSE-SU"/>
    <description>
    Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5390/">CVE-2018-5390 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5390">CVE-2018-5390 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102340">SUSE bug 1102340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102682">SUSE bug 1102682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103097">SUSE bug 1103097</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103098">SUSE bug 1103098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156434">SUSE bug 1156434</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824504" comment="kernel-3.10.0-862.11.6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824505" comment="kernel-abi-whitelists-3.10.0-862.11.6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824506" comment="kernel-debug-3.10.0-862.11.6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824509" comment="kernel-doc-3.10.0-862.11.6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824510" comment="kernel-headers-3.10.0-862.11.6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824511" comment="kernel-tools-3.10.0-862.11.6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824512" comment="kernel-tools-libs-3.10.0-862.11.6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824514" comment="perf-3.10.0-862.11.6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824515" comment="python-perf-3.10.0-862.11.6.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185391" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5391</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5391" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5391" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5391" ref_url="https://www.suse.com/security/cve/CVE-2018-5391" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2344-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3792-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3865-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0645-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190645-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0672-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005476.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2404-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DHR6QOZXXCNSV77C5MHVLBK4DBFOQPCN/#DHR6QOZXXCNSV77C5MHVLBK4DBFOQPCN" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2407-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6QZ6OW67VR3KFGN3MO3RPGU6G64AJTPB/#6QZ6OW67VR3KFGN3MO3RPGU6G64AJTPB" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0274-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NVVKFQLQIXPHKJECDTUPV4RH4VU2HNZY/#NVVKFQLQIXPHKJECDTUPV4RH4VU2HNZY" source="SUSE-SU"/>
    <description>
    The Linux kernel, versions 3.9+, is vulnerable to a denial of service attack with low rates of specially modified packets targeting IP fragment re-assembly. An attacker may cause a denial of service condition by sending specially crafted IP fragments. Various vulnerabilities in IP fragmentation have been discovered and fixed over the years. The current vulnerability (CVE-2018-5391) became exploitable in the Linux kernel with the increase of the IP fragment reassembly queue size.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5391/">CVE-2018-5391 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5391">CVE-2018-5391 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102340">SUSE bug 1102340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103097">SUSE bug 1103097</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103098">SUSE bug 1103098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108654">SUSE bug 1108654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114071">SUSE bug 1114071</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121102">SUSE bug 1121102</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134140">SUSE bug 1134140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181460">SUSE bug 1181460</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824786" comment="bpftool-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824787" comment="kernel-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824788" comment="kernel-abi-whitelists-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824789" comment="kernel-debug-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824792" comment="kernel-doc-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824793" comment="kernel-headers-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824794" comment="kernel-tools-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824795" comment="kernel-tools-libs-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824797" comment="perf-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824798" comment="python-perf-3.10.0-957.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185407" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5407</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5407" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5407" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5407" ref_url="https://www.suse.com/security/cve/CVE-2018-5407" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004873.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3864-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3866-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3964-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183964-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3989-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005586.html" source="SUSE-SU"/>
		<reference ref_id="TID000019335" ref_url="https://www.suse.com/support/kb/doc/?id=000019335" source="SUSE-SU"/>
		<reference ref_id="TID7023497" ref_url="https://www.suse.com/support/kb/doc/?id=7023497" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3903-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/33ZHM3NJ5DWLZFFD5BEPGTEBVQR7TL5H/#33ZHM3NJ5DWLZFFD5BEPGTEBVQR7TL5H" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4050-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RP4YGFIZ2DT67O24SFMUGKHPDZE2YQ6E/#RP4YGFIZ2DT67O24SFMUGKHPDZE2YQ6E" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4104-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J4BMNRK7ZVDGHSZAJJ4O24DNPDEMLYIY/#J4BMNRK7ZVDGHSZAJJ4O24DNPDEMLYIY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0088-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MCR24YF2JL7BUZULCM3J6PO547A2FBEH/#MCR24YF2JL7BUZULCM3J6PO547A2FBEH" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0234-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TEDLOHSLOHZ36RTEAODDXPLT3YMQBGBI/#TEDLOHSLOHZ36RTEAODDXPLT3YMQBGBI" source="SUSE-SU"/>
    <description>
    Simultaneous Multi-threading (SMT) in processors can enable local users to exploit software vulnerable to timing attacks via a side-channel timing attack on 'port contention'.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-5407/">CVE-2018-5407 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5407">CVE-2018-5407 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1113534">SUSE bug 1113534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116195">SUSE bug 1116195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148697">SUSE bug 1148697</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826217" comment="OVMF-20180508-6.gitee3198e672e2.el7 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826217" comment="OVMF-20180508-6.gitee3198e672e2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825587" comment="openssl-1.0.2k-16.el7_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825588" comment="openssl-devel-1.0.2k-16.el7_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825589" comment="openssl-libs-1.0.2k-16.el7_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825590" comment="openssl-perl-1.0.2k-16.el7_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825591" comment="openssl-static-1.0.2k-16.el7_6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185683" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5683</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5683" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5683" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5683" ref_url="https://www.suse.com/security/cve/CVE-2018-5683" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0638-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0459-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UDH4GC26SHCV4RBWDLH6XECWQIIC5KVX/#UDH4GC26SHCV4RBWDLH6XECWQIIC5KVX" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0780-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R3FRDROY2UV4WMIXYKNDNPPBXQOBE6U7/#R3FRDROY2UV4WMIXYKNDNPPBXQOBE6U7" source="SUSE-SU"/>
    <description>
    The vga_draw_text function in Qemu allows local OS guest privileged users to cause a denial of service (out-of-bounds read and QEMU process crash) by leveraging improper memory address validation.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5683/">CVE-2018-5683 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5683">CVE-2018-5683 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1076114">SUSE bug 1076114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076116">SUSE bug 1076116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824082" comment="qemu-img-1.5.3-156.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824083" comment="qemu-kvm-1.5.3-156.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824084" comment="qemu-kvm-common-1.5.3-156.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824085" comment="qemu-kvm-tools-1.5.3-156.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185712" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5712</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5712" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5712" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5712" ref_url="https://www.suse.com/security/cve/CVE-2018-5712" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003631.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003837.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in PHP before 5.6.33, 7.0.x before 7.0.27, 7.1.x before 7.1.13, and 7.2.x before 7.2.1. There is Reflected XSS on the PHAR 404 error page via the URI of a request for a .phar file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-5712/">CVE-2018-5712 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5712">CVE-2018-5712 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1076220">SUSE bug 1076220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076391">SUSE bug 1076391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091362">SUSE bug 1091362</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827765" comment="php-5.4.16-48.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827766" comment="php-bcmath-5.4.16-48.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827767" comment="php-cli-5.4.16-48.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827768" comment="php-common-5.4.16-48.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827769" comment="php-dba-5.4.16-48.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827770" comment="php-devel-5.4.16-48.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827771" comment="php-embedded-5.4.16-48.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827772" comment="php-enchant-5.4.16-48.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827773" comment="php-fpm-5.4.16-48.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827774" comment="php-gd-5.4.16-48.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827775" comment="php-intl-5.4.16-48.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827776" comment="php-ldap-5.4.16-48.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827777" comment="php-mbstring-5.4.16-48.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827778" comment="php-mysql-5.4.16-48.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827779" comment="php-mysqlnd-5.4.16-48.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827780" comment="php-odbc-5.4.16-48.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827781" comment="php-pdo-5.4.16-48.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827782" comment="php-pgsql-5.4.16-48.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827783" comment="php-process-5.4.16-48.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827784" comment="php-pspell-5.4.16-48.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827785" comment="php-recode-5.4.16-48.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827786" comment="php-snmp-5.4.16-48.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827787" comment="php-soap-5.4.16-48.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827788" comment="php-xml-5.4.16-48.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827789" comment="php-xmlrpc-5.4.16-48.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185729" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5729</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5729" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5729" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5729" ref_url="https://www.suse.com/security/cve/CVE-2018-5729" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0139-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SMD7M4ZIYICJIBXAT2O34XUCDIU6HRBV/#SMD7M4ZIYICJIBXAT2O34XUCDIU6HRBV" source="SUSE-SU"/>
    <description>
    MIT krb5 1.6 or later allows an authenticated kadmin with permission to add principals to an LDAP Kerberos database to cause a denial of service (NULL pointer dereference) or bypass a DN container check by supplying tagged data that is internal to the database module.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.2/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5729/">CVE-2018-5729 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5729">CVE-2018-5729 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1076211">SUSE bug 1076211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083926">SUSE bug 1083926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122468">SUSE bug 1122468</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824777" comment="krb5-devel-1.15.1-34.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824778" comment="krb5-libs-1.15.1-34.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824779" comment="krb5-pkinit-1.15.1-34.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824780" comment="krb5-server-1.15.1-34.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824781" comment="krb5-server-ldap-1.15.1-34.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824782" comment="krb5-workstation-1.15.1-34.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824783" comment="libkadm5-1.15.1-34.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185730" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5730</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5730" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5730" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5730" ref_url="https://www.suse.com/security/cve/CVE-2018-5730" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0139-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SMD7M4ZIYICJIBXAT2O34XUCDIU6HRBV/#SMD7M4ZIYICJIBXAT2O34XUCDIU6HRBV" source="SUSE-SU"/>
    <description>
    MIT krb5 1.6 or later allows an authenticated kadmin with permission to add principals to an LDAP Kerberos database to circumvent a DN containership check by supplying both a "linkdn" and "containerdn" database argument, or by supplying a DN string which is a left extension of a container DN string but is not hierarchically within the container DN.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-5730/">CVE-2018-5730 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5730">CVE-2018-5730 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1076211">SUSE bug 1076211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083927">SUSE bug 1083927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122468">SUSE bug 1122468</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824777" comment="krb5-devel-1.15.1-34.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824778" comment="krb5-libs-1.15.1-34.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824779" comment="krb5-pkinit-1.15.1-34.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824780" comment="krb5-server-1.15.1-34.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824781" comment="krb5-server-ldap-1.15.1-34.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824782" comment="krb5-workstation-1.15.1-34.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824783" comment="libkadm5-1.15.1-34.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185732" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5732</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5732" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5732" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5732" ref_url="https://www.suse.com/security/cve/CVE-2018-5732" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0810-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003843.html" source="SUSE-SU"/>
    <description>
    Failure to properly bounds-check a buffer used for processing DHCP options allows a malicious server (or an entity masquerading as a server) to cause a buffer overflow (and resulting crash) in dhclient by sending a response containing a specially constructed options section. Affects ISC DHCP versions 4.1.0 -&gt; 4.1-ESV-R15, 4.2.0 -&gt; 4.2.8, 4.3.0 -&gt; 4.3.6, 4.4.0
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5732/">CVE-2018-5732 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5732">CVE-2018-5732 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1083302">SUSE bug 1083302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085417">SUSE bug 1085417</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824056" comment="dhclient-4.2.5-58.el7_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824057" comment="dhcp-4.2.5-58.el7_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824058" comment="dhcp-common-4.2.5-58.el7_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824059" comment="dhcp-devel-4.2.5-58.el7_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824060" comment="dhcp-libs-4.2.5-58.el7_4.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185733" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5733</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5733" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5733" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5733" ref_url="https://www.suse.com/security/cve/CVE-2018-5733" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0810-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003843.html" source="SUSE-SU"/>
    <description>
    A malicious client which is allowed to send very large amounts of traffic (billions of packets) to a DHCP server can eventually overflow a 32-bit reference counter, potentially causing dhcpd to crash. Affects ISC DHCP 4.1.0 -&gt; 4.1-ESV-R15, 4.2.0 -&gt; 4.2.8, 4.3.0 -&gt; 4.3.6, 4.4.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5733/">CVE-2018-5733 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5733">CVE-2018-5733 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1083303">SUSE bug 1083303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085417">SUSE bug 1085417</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824056" comment="dhclient-4.2.5-58.el7_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824057" comment="dhcp-4.2.5-58.el7_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824058" comment="dhcp-common-4.2.5-58.el7_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824059" comment="dhcp-devel-4.2.5-58.el7_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824060" comment="dhcp-libs-4.2.5-58.el7_4.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185740" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5740</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5740" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5740" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5740" ref_url="https://www.suse.com/security/cve/CVE-2018-5740" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1406-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005975.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1532-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WBUJIKMVSVPU6MG5ID545Q4TTTFQ5HN5/#WBUJIKMVSVPU6MG5ID545Q4TTTFQ5HN5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1533-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DP6CCQYSAQ2GWBMKJAVZIUX7ZUNRET73/#DP6CCQYSAQ2GWBMKJAVZIUX7ZUNRET73" source="SUSE-SU"/>
    <description>
    "deny-answer-aliases" is a little-used feature intended to help recursive server operators protect end users against DNS rebinding attacks, a potential method of circumventing the security model used by client browsers. However, a defect in this feature makes it easy, when the feature is in use, to experience an assertion failure in name.c. Affects BIND 9.7.0-&gt;9.8.8, 9.9.0-&gt;9.9.13, 9.10.0-&gt;9.10.8, 9.11.0-&gt;9.11.4, 9.12.0-&gt;9.12.2, 9.13.0-&gt;9.13.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5740/">CVE-2018-5740 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5740">CVE-2018-5740 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1104129">SUSE bug 1104129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141730">SUSE bug 1141730</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148887">SUSE bug 1148887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177790">SUSE bug 1177790</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824541" comment="bind-9.9.4-61.el7_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824542" comment="bind-chroot-9.9.4-61.el7_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824543" comment="bind-devel-9.9.4-61.el7_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824544" comment="bind-libs-9.9.4-61.el7_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824545" comment="bind-libs-lite-9.9.4-61.el7_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824546" comment="bind-license-9.9.4-61.el7_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824547" comment="bind-lite-devel-9.9.4-61.el7_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824548" comment="bind-pkcs11-9.9.4-61.el7_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824549" comment="bind-pkcs11-devel-9.9.4-61.el7_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824550" comment="bind-pkcs11-libs-9.9.4-61.el7_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824551" comment="bind-pkcs11-utils-9.9.4-61.el7_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824552" comment="bind-sdb-9.9.4-61.el7_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824553" comment="bind-sdb-chroot-9.9.4-61.el7_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824554" comment="bind-utils-9.9.4-61.el7_5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185741" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5741</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5741" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5741" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5741" ref_url="https://www.suse.com/security/cve/CVE-2018-5741" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14400-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007552.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1699-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VUOYW2V65CJWOTYJHZKJDB23QXG7SODU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1701-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5DSIJXYG3NFNRGFIFTMKBYDE6QWREQSP/" source="SUSE-SU"/>
    <description>
    To provide fine-grained controls over the ability to use Dynamic DNS (DDNS) to update records in a zone, BIND 9 provides a feature called update-policy. Various rules can be configured to limit the types of updates that can be performed by a client, depending on the key used when sending the update request. Unfortunately, some rule types were not initially documented, and when documentation for them was added to the Administrator Reference Manual (ARM) in change #3112, the language that was added to the ARM at that time incorrectly described the behavior of two rule types, krb5-subdomain and ms-subdomain. This incorrect documentation could mislead operators into believing that policies they had configured were more restrictive than they actually were. This affects BIND versions prior to BIND 9.11.5 and BIND 9.12.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-5741/">CVE-2018-5741 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5741">CVE-2018-5741 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1109160">SUSE bug 1109160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171740">SUSE bug 1171740</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826092" comment="bind-9.11.4-9.P2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826093" comment="bind-chroot-9.11.4-9.P2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826094" comment="bind-devel-9.11.4-9.P2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826095" comment="bind-export-devel-9.11.4-9.P2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826096" comment="bind-export-libs-9.11.4-9.P2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826097" comment="bind-libs-9.11.4-9.P2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826098" comment="bind-libs-lite-9.11.4-9.P2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826099" comment="bind-license-9.11.4-9.P2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826100" comment="bind-lite-devel-9.11.4-9.P2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826101" comment="bind-pkcs11-9.11.4-9.P2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826102" comment="bind-pkcs11-devel-9.11.4-9.P2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826103" comment="bind-pkcs11-libs-9.11.4-9.P2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826104" comment="bind-pkcs11-utils-9.11.4-9.P2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826105" comment="bind-sdb-9.11.4-9.P2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826106" comment="bind-sdb-chroot-9.11.4-9.P2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826107" comment="bind-utils-9.11.4-9.P2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185742" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5742</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5742" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5742" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5742" ref_url="https://www.suse.com/security/cve/CVE-2018-5742" source="SUSE CVE"/>
    <description>
    While backporting a feature for a newer branch of BIND9, RedHat introduced a path leading to an assertion failure in buffer.c:420. Affects RedHat versions bind-9.9.4-65.el7 -&gt; bind-9.9.4-72.el7. No ISC releases are affected. Other packages from other distributions who made the same error may also be affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5742/">CVE-2018-5742 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5742">CVE-2018-5742 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825497" comment="bind-9.9.4-73.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825498" comment="bind-chroot-9.9.4-73.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825499" comment="bind-devel-9.9.4-73.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825500" comment="bind-libs-9.9.4-73.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825501" comment="bind-libs-lite-9.9.4-73.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825502" comment="bind-license-9.9.4-73.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825503" comment="bind-lite-devel-9.9.4-73.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825504" comment="bind-pkcs11-9.9.4-73.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825505" comment="bind-pkcs11-devel-9.9.4-73.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825506" comment="bind-pkcs11-libs-9.9.4-73.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825507" comment="bind-pkcs11-utils-9.9.4-73.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825508" comment="bind-sdb-9.9.4-73.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825509" comment="bind-sdb-chroot-9.9.4-73.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825510" comment="bind-utils-9.9.4-73.el7_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185743" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5743</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5743" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5743" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5743" ref_url="https://www.suse.com/security/cve/CVE-2018-5743" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1406-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005975.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1532-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WBUJIKMVSVPU6MG5ID545Q4TTTFQ5HN5/#WBUJIKMVSVPU6MG5ID545Q4TTTFQ5HN5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1533-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DP6CCQYSAQ2GWBMKJAVZIUX7ZUNRET73/#DP6CCQYSAQ2GWBMKJAVZIUX7ZUNRET73" source="SUSE-SU"/>
    <description>
    By design, BIND is intended to limit the number of TCP clients that can be connected at any given time. The number of allowed connections is a tunable parameter which, if unset, defaults to a conservative value for most servers. Unfortunately, the code which was intended to limit the number of simultaneous connections contained an error which could be exploited to grow the number of simultaneous connections beyond this limit. Versions affected: BIND 9.9.0 -&gt; 9.10.8-P1, 9.11.0 -&gt; 9.11.6, 9.12.0 -&gt; 9.12.4, 9.14.0. BIND 9 Supported Preview Edition versions 9.9.3-S1 -&gt; 9.11.5-S3, and 9.11.5-S5. Versions 9.13.0 -&gt; 9.13.7 of the 9.13 development branch are also affected. Versions prior to BIND 9.9.0 have not been evaluated for vulnerability to CVE-2018-5743.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5743/">CVE-2018-5743 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5743">CVE-2018-5743 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1133185">SUSE bug 1133185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148887">SUSE bug 1148887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157051">SUSE bug 1157051</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825818" comment="bind-9.9.4-74.el7_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825819" comment="bind-chroot-9.9.4-74.el7_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825820" comment="bind-devel-9.9.4-74.el7_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825821" comment="bind-libs-9.9.4-74.el7_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825822" comment="bind-libs-lite-9.9.4-74.el7_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825823" comment="bind-license-9.9.4-74.el7_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825824" comment="bind-lite-devel-9.9.4-74.el7_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825825" comment="bind-pkcs11-9.9.4-74.el7_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825826" comment="bind-pkcs11-devel-9.9.4-74.el7_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825827" comment="bind-pkcs11-libs-9.9.4-74.el7_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825828" comment="bind-pkcs11-utils-9.9.4-74.el7_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825829" comment="bind-sdb-9.9.4-74.el7_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825830" comment="bind-sdb-chroot-9.9.4-74.el7_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825831" comment="bind-utils-9.9.4-74.el7_6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185745" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5745</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5745" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5745" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5745" ref_url="https://www.suse.com/security/cve/CVE-2018-5745" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1406-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005975.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1532-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WBUJIKMVSVPU6MG5ID545Q4TTTFQ5HN5/#WBUJIKMVSVPU6MG5ID545Q4TTTFQ5HN5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1533-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DP6CCQYSAQ2GWBMKJAVZIUX7ZUNRET73/#DP6CCQYSAQ2GWBMKJAVZIUX7ZUNRET73" source="SUSE-SU"/>
    <description>
    "managed-keys" is a feature which allows a BIND resolver to automatically maintain the keys used by trust anchors which operators configure for use in DNSSEC validation. Due to an error in the managed-keys feature it is possible for a BIND server which uses managed-keys to exit due to an assertion failure if, during key rollover, a trust anchor's keys are replaced with keys which use an unsupported algorithm. Versions affected: BIND 9.9.0 -&gt; 9.10.8-P1, 9.11.0 -&gt; 9.11.5-P1, 9.12.0 -&gt; 9.12.3-P1, and versions 9.9.3-S1 -&gt; 9.11.5-S3 of BIND 9 Supported Preview Edition. Versions 9.13.0 -&gt; 9.13.6 of the 9.13 development branch are also affected. Versions prior to BIND 9.9.0 have not been evaluated for vulnerability to CVE-2018-5745.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5745/">CVE-2018-5745 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2018-5745">CVE-2018-5745 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1126068">SUSE bug 1126068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141730">SUSE bug 1141730</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148887">SUSE bug 1148887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177790">SUSE bug 1177790</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827657" comment="bind-9.11.4-16.P2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827658" comment="bind-chroot-9.11.4-16.P2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827659" comment="bind-devel-9.11.4-16.P2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827660" comment="bind-export-devel-9.11.4-16.P2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827661" comment="bind-export-libs-9.11.4-16.P2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827662" comment="bind-libs-9.11.4-16.P2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827663" comment="bind-libs-lite-9.11.4-16.P2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827664" comment="bind-license-9.11.4-16.P2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827665" comment="bind-lite-devel-9.11.4-16.P2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827666" comment="bind-pkcs11-9.11.4-16.P2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827667" comment="bind-pkcs11-devel-9.11.4-16.P2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827668" comment="bind-pkcs11-libs-9.11.4-16.P2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827669" comment="bind-pkcs11-utils-9.11.4-16.P2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827670" comment="bind-sdb-9.11.4-16.P2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827671" comment="bind-sdb-chroot-9.11.4-16.P2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827672" comment="bind-utils-9.11.4-16.P2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185748" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5748</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5748" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5748" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5748" ref_url="https://www.suse.com/security/cve/CVE-2018-5748" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004357.html" source="SUSE-SU"/>
    <description>
    qemu/qemu_monitor.c in libvirt allows attackers to cause a denial of service (memory consumption) via a large QEMU reply.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5748/">CVE-2018-5748 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5748">CVE-2018-5748 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1076500">SUSE bug 1076500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083625">SUSE bug 1083625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087887">SUSE bug 1087887</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824234" comment="libvirt-3.9.0-14.el7_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824235" comment="libvirt-admin-3.9.0-14.el7_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824236" comment="libvirt-client-3.9.0-14.el7_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824237" comment="libvirt-daemon-3.9.0-14.el7_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824238" comment="libvirt-daemon-config-network-3.9.0-14.el7_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824239" comment="libvirt-daemon-config-nwfilter-3.9.0-14.el7_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824240" comment="libvirt-daemon-driver-interface-3.9.0-14.el7_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824241" comment="libvirt-daemon-driver-lxc-3.9.0-14.el7_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824242" comment="libvirt-daemon-driver-network-3.9.0-14.el7_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824243" comment="libvirt-daemon-driver-nodedev-3.9.0-14.el7_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824244" comment="libvirt-daemon-driver-nwfilter-3.9.0-14.el7_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824245" comment="libvirt-daemon-driver-qemu-3.9.0-14.el7_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824246" comment="libvirt-daemon-driver-secret-3.9.0-14.el7_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824247" comment="libvirt-daemon-driver-storage-3.9.0-14.el7_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824248" comment="libvirt-daemon-driver-storage-core-3.9.0-14.el7_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824249" comment="libvirt-daemon-driver-storage-disk-3.9.0-14.el7_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824250" comment="libvirt-daemon-driver-storage-gluster-3.9.0-14.el7_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824251" comment="libvirt-daemon-driver-storage-iscsi-3.9.0-14.el7_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824252" comment="libvirt-daemon-driver-storage-logical-3.9.0-14.el7_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824253" comment="libvirt-daemon-driver-storage-mpath-3.9.0-14.el7_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824254" comment="libvirt-daemon-driver-storage-rbd-3.9.0-14.el7_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824255" comment="libvirt-daemon-driver-storage-scsi-3.9.0-14.el7_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824256" comment="libvirt-daemon-kvm-3.9.0-14.el7_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824257" comment="libvirt-daemon-lxc-3.9.0-14.el7_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824258" comment="libvirt-devel-3.9.0-14.el7_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824259" comment="libvirt-docs-3.9.0-14.el7_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824260" comment="libvirt-libs-3.9.0-14.el7_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824261" comment="libvirt-lock-sanlock-3.9.0-14.el7_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824262" comment="libvirt-login-shell-3.9.0-14.el7_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824263" comment="libvirt-nss-3.9.0-14.el7_5.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185750" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5750</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5750" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5750" ref_url="https://www.suse.com/security/cve/CVE-2018-5750" source="SUSE CVE"/>
    <description>
    The acpi_smbus_hc_add function in drivers/acpi/sbshc.c in the Linux kernel through 4.14.15 allows local users to obtain sensitive address information by reading dmesg data from an SBS HC printk call.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-5750/">CVE-2018-5750 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5750">CVE-2018-5750 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1077892">SUSE bug 1077892</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824165" comment="kernel-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824166" comment="kernel-abi-whitelists-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824167" comment="kernel-debug-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824170" comment="kernel-doc-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824171" comment="kernel-headers-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824172" comment="kernel-tools-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824173" comment="kernel-tools-libs-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824175" comment="perf-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824176" comment="python-perf-3.10.0-862.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5800</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5800" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5800" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5800" ref_url="https://www.suse.com/security/cve/CVE-2018-5800" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004772.html" source="SUSE-SU"/>
    <description>
    An off-by-one error within the "LibRaw::kodak_ycbcr_load_raw()" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.7 can be exploited to cause a heap-based buffer overflow and subsequently cause a crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5800/">CVE-2018-5800 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5800">CVE-2018-5800 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1084691">SUSE bug 1084691</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824775" comment="libkdcraw-4.10.5-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824776" comment="libkdcraw-devel-4.10.5-5.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185801" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5801</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5801" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5801" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5801" ref_url="https://www.suse.com/security/cve/CVE-2018-5801" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011101.html" source="SUSE-SU"/>
    <description>
    An error within the "LibRaw::unpack()" function (src/libraw_cxx.cpp) in LibRaw versions prior to 0.18.7 can be exploited to trigger a NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5801/">CVE-2018-5801 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5801">CVE-2018-5801 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1084690">SUSE bug 1084690</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824775" comment="libkdcraw-4.10.5-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824776" comment="libkdcraw-devel-4.10.5-5.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185802" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5802</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5802" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5802" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5802" ref_url="https://www.suse.com/security/cve/CVE-2018-5802" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004772.html" source="SUSE-SU"/>
    <description>
    An error within the "kodak_radc_load_raw()" function (internal/dcraw_common.cpp) related to the "buf" variable in LibRaw versions prior to 0.18.7 can be exploited to cause an out-of-bounds read memory access and subsequently cause a crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5802/">CVE-2018-5802 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5802">CVE-2018-5802 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1084688">SUSE bug 1084688</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824775" comment="libkdcraw-4.10.5-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824776" comment="libkdcraw-devel-4.10.5-5.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185803" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5803</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5803" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5803" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5803" ref_url="https://www.suse.com/security/cve/CVE-2018-5803" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1366-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1855-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2366-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004537.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1418-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EN4KK2FGUDUKZAKRD5IRYD6AZQXJA3AU/#EN4KK2FGUDUKZAKRD5IRYD6AZQXJA3AU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2119-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WKPTBMLW6CO7OGF3LPNC4LMQ2SS7VXKC/#WKPTBMLW6CO7OGF3LPNC4LMQ2SS7VXKC" source="SUSE-SU"/>
    <description>
    In the Linux Kernel before version 4.15.8, 4.14.25, 4.9.87, 4.4.121, 4.1.51, and 3.2.102, an error in the "_sctp_make_chunk()" function (net/sctp/sm_make_chunk.c) when handling SCTP packets length can be exploited to cause a kernel crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5803/">CVE-2018-5803 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5803">CVE-2018-5803 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1083900">SUSE bug 1083900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115893">SUSE bug 1115893</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824786" comment="bpftool-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824787" comment="kernel-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824788" comment="kernel-abi-whitelists-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824789" comment="kernel-debug-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824792" comment="kernel-doc-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824793" comment="kernel-headers-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824794" comment="kernel-tools-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824795" comment="kernel-tools-libs-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824797" comment="perf-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824798" comment="python-perf-3.10.0-957.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5805</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5805" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5805" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5805" ref_url="https://www.suse.com/security/cve/CVE-2018-5805" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0002-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190002-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011101.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4299-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S43L2KDX2MQL6XXJS6DLO4IZJ2WM4A4W/#S43L2KDX2MQL6XXJS6DLO4IZJ2WM4A4W" source="SUSE-SU"/>
    <description>
    A boundary error within the "quicktake_100_load_raw()" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.8 can be exploited to cause a stack-based buffer overflow and subsequently cause a crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5805/">CVE-2018-5805 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5805">CVE-2018-5805 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1097973">SUSE bug 1097973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824775" comment="libkdcraw-4.10.5-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824776" comment="libkdcraw-devel-4.10.5-5.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5806</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5806" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5806" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5806" ref_url="https://www.suse.com/security/cve/CVE-2018-5806" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0002-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190002-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011101.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4299-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S43L2KDX2MQL6XXJS6DLO4IZJ2WM4A4W/#S43L2KDX2MQL6XXJS6DLO4IZJ2WM4A4W" source="SUSE-SU"/>
    <description>
    An error within the "leaf_hdr_load_raw()" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.8 can be exploited to trigger a NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5806/">CVE-2018-5806 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5806">CVE-2018-5806 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1097974">SUSE bug 1097974</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824775" comment="libkdcraw-4.10.5-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824776" comment="libkdcraw-devel-4.10.5-5.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185848" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5848</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5848" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5848" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5848" ref_url="https://www.suse.com/security/cve/CVE-2018-5848" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1855-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1773-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ID6PAFCJG4KPF2AULGBYPBQUFIOCIVYC/#ID6PAFCJG4KPF2AULGBYPBQUFIOCIVYC" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2119-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WKPTBMLW6CO7OGF3LPNC4LMQ2SS7VXKC/#WKPTBMLW6CO7OGF3LPNC4LMQ2SS7VXKC" source="SUSE-SU"/>
    <description>
    In the function wmi_set_ie(), the length validation code does not handle unsigned integer overflow properly. As a result, a large value of the 'ie_len' argument can cause a buffer overflow in all Android releases from CAF (Android for MSM, Firefox OS for MSM, QRD Android) using the Linux Kernel.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5848/">CVE-2018-5848 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5848">CVE-2018-5848 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097356">SUSE bug 1097356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105412">SUSE bug 1105412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115339">SUSE bug 1115339</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824786" comment="bpftool-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824787" comment="kernel-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824788" comment="kernel-abi-whitelists-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824789" comment="kernel-debug-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824792" comment="kernel-doc-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824793" comment="kernel-headers-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824794" comment="kernel-tools-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824795" comment="kernel-tools-libs-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824797" comment="perf-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824798" comment="python-perf-3.10.0-957.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185950" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5950</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5950" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5950" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5950" ref_url="https://www.suse.com/security/cve/CVE-2018-5950" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:4296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005015.html" source="SUSE-SU"/>
    <description>
    Cross-site scripting (XSS) vulnerability in the web UI in Mailman before 2.1.26 allows remote attackers to inject arbitrary web script or HTML via a user-options URL.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5950/">CVE-2018-5950 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5950">CVE-2018-5950 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1077358">SUSE bug 1077358</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824061" comment="mailman-2.1.15-26.el7_4.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20186126" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-6126</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-6126" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6126" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-6126" ref_url="https://www.suse.com/security/cve/CVE-2018-6126" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1783-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004400.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1484-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UECFXLV5EKASOCJURMYX7QKZR2DTMCIJ/#UECFXLV5EKASOCJURMYX7QKZR2DTMCIJ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1485-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7RRDDFPMUPUODACY2QCWCW6YOFUNDRV4/#7RRDDFPMUPUODACY2QCWCW6YOFUNDRV4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1616-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NI2SOOT6EW5UHUHF2MX3MBFAXLATBLI2/#NI2SOOT6EW5UHUHF2MX3MBFAXLATBLI2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2054-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PG3GXZUYQCF4HM43QI2TIDEANAWKZZ5F/#PG3GXZUYQCF4HM43QI2TIDEANAWKZZ5F" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2055-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HFHWKT4CCZGJS2MA2NSEOQVC5NLJCES7/#HFHWKT4CCZGJS2MA2NSEOQVC5NLJCES7" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A precision error in Skia in Google Chrome prior to 67.0.3396.62 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-6126/">CVE-2018-6126 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6126">CVE-2018-6126 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1095163">SUSE bug 1095163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096449">SUSE bug 1096449</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824439" comment="firefox-60.1.0-4.el7_5 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20186485" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-6485</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-6485" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6485" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-6485" ref_url="https://www.suse.com/security/cve/CVE-2018-6485" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003758.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0494-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CRF5MPDADQ4YUE6MODU4JUS5YDCKTOEA/#CRF5MPDADQ4YUE6MODU4JUS5YDCKTOEA" source="SUSE-SU"/>
    <description>
    An integer overflow in the implementation of the posix_memalign in memalign functions in the GNU C Library (aka glibc or libc6) 2.26 and earlier could cause these functions to return a pointer to a heap area that is too small, potentially leading to heap corruption.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-6485/">CVE-2018-6485 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6485">CVE-2018-6485 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1079036">SUSE bug 1079036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123874">SUSE bug 1123874</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824800" comment="glibc-2.17-260.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824801" comment="glibc-common-2.17-260.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824802" comment="glibc-devel-2.17-260.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824803" comment="glibc-headers-2.17-260.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824804" comment="glibc-static-2.17-260.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824805" comment="glibc-utils-2.17-260.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824806" comment="nscd-2.17-260.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20186541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-6541</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-6541" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6541" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-6541" ref_url="https://www.suse.com/security/cve/CVE-2018-6541" source="SUSE CVE"/>
    <description>
    In ZZIPlib 0.13.67, there is a bus error caused by loading of a misaligned address (when handling disk64_trailer local entries) in __zzip_fetch_disk_trailer (zzip/zip.c). Remote attackers could leverage this vulnerability to cause a denial of service via a crafted zip file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6541/">CVE-2018-6541 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6541">CVE-2018-6541 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1079095">SUSE bug 1079095</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826459" comment="zziplib-0.13.62-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826460" comment="zziplib-devel-0.13.62-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826461" comment="zziplib-utils-0.13.62-11.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20186560" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-6560</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-6560" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6560" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-6560" ref_url="https://www.suse.com/security/cve/CVE-2018-6560" source="SUSE CVE"/>
    <description>
    In dbus-proxy/flatpak-proxy.c in Flatpak before 0.8.9, and 0.9.x and 0.10.x before 0.10.3, crafted D-Bus messages to the host can be used to break out of the sandbox, because whitespace handling in the proxy is not identical to whitespace handling in the daemon.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6560/">CVE-2018-6560 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6560">CVE-2018-6560 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1078923">SUSE bug 1078923</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824580" comment="flatpak-0.8.8-4.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824581" comment="flatpak-builder-0.8.8-4.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824582" comment="flatpak-devel-0.8.8-4.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824583" comment="flatpak-libs-0.8.8-4.el7_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20186574" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-6574</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-6574" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6574" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-6574" ref_url="https://www.suse.com/security/cve/CVE-2018-6574" source="SUSE CVE"/>
    <description>
    Go before 1.8.7, Go 1.9.x before 1.9.4, and Go 1.10 pre-releases before Go 1.10rc2 allow "go get" remote command execution during source code build, by leveraging the gcc or clang plugin feature, because -fplugin= and -plugin= arguments were not blocked.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6574/">CVE-2018-6574 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6574">CVE-2018-6574 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1080006">SUSE bug 1080006</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824131" comment="golang-1.9.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824132" comment="golang-bin-1.9.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824133" comment="golang-docs-1.9.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824134" comment="golang-misc-1.9.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824135" comment="golang-src-1.9.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824136" comment="golang-tests-1.9.4-1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20186764" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-6764</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-6764" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6764" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-6764" ref_url="https://www.suse.com/security/cve/CVE-2018-6764" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003885.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0939-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GNPLPRYR75LWWU4CR5O6E4YST3PJLYAF/#GNPLPRYR75LWWU4CR5O6E4YST3PJLYAF" source="SUSE-SU"/>
    <description>
    util/virlog.c in libvirt does not properly determine the hostname on LXC container startup, which allows local guest OS users to bypass an intended container protection mechanism and execute arbitrary commands via a crafted NSS module.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-6764/">CVE-2018-6764 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6764">CVE-2018-6764 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1080042">SUSE bug 1080042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088147">SUSE bug 1088147</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824808" comment="libvirt-4.5.0-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824809" comment="libvirt-admin-4.5.0-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824810" comment="libvirt-bash-completion-4.5.0-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824811" comment="libvirt-client-4.5.0-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824812" comment="libvirt-daemon-4.5.0-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824813" comment="libvirt-daemon-config-network-4.5.0-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824814" comment="libvirt-daemon-config-nwfilter-4.5.0-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824815" comment="libvirt-daemon-driver-interface-4.5.0-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824816" comment="libvirt-daemon-driver-lxc-4.5.0-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824817" comment="libvirt-daemon-driver-network-4.5.0-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824818" comment="libvirt-daemon-driver-nodedev-4.5.0-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824819" comment="libvirt-daemon-driver-nwfilter-4.5.0-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824820" comment="libvirt-daemon-driver-qemu-4.5.0-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824821" comment="libvirt-daemon-driver-secret-4.5.0-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824822" comment="libvirt-daemon-driver-storage-4.5.0-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824823" comment="libvirt-daemon-driver-storage-core-4.5.0-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824824" comment="libvirt-daemon-driver-storage-disk-4.5.0-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824825" comment="libvirt-daemon-driver-storage-gluster-4.5.0-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824826" comment="libvirt-daemon-driver-storage-iscsi-4.5.0-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824827" comment="libvirt-daemon-driver-storage-logical-4.5.0-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824828" comment="libvirt-daemon-driver-storage-mpath-4.5.0-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824829" comment="libvirt-daemon-driver-storage-rbd-4.5.0-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824830" comment="libvirt-daemon-driver-storage-scsi-4.5.0-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824831" comment="libvirt-daemon-kvm-4.5.0-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824832" comment="libvirt-daemon-lxc-4.5.0-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824833" comment="libvirt-devel-4.5.0-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824834" comment="libvirt-docs-4.5.0-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824835" comment="libvirt-libs-4.5.0-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824836" comment="libvirt-lock-sanlock-4.5.0-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824837" comment="libvirt-login-shell-4.5.0-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824838" comment="libvirt-nss-4.5.0-10.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20186790" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-6790</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-6790" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6790" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-6790" ref_url="https://www.suse.com/security/cve/CVE-2018-6790" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2018:0397-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BT2QPNOSYGV4PRT6334ZOQQEDV2F6DFL/#BT2QPNOSYGV4PRT6334ZOQQEDV2F6DFL" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0398-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O3VUSIEN5D322MWR2YA7OFCLYROIOPRV/#O3VUSIEN5D322MWR2YA7OFCLYROIOPRV" source="SUSE-SU"/>
    <description>
    An issue was discovered in KDE Plasma Workspace before 5.12.0. dataengines/notifications/notificationsengine.cpp allows remote attackers to discover client IP addresses via a URL in a notification, as demonstrated by the src attribute of an IMG element.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6790/">CVE-2018-6790 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6790">CVE-2018-6790 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1079429">SUSE bug 1079429</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826328" comment="kcm_colors-4.11.19-13.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826329" comment="kde-settings-19-23.9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826330" comment="kde-settings-ksplash-19-23.9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826331" comment="kde-settings-minimal-19-23.9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826332" comment="kde-settings-plasma-19-23.9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826333" comment="kde-settings-pulseaudio-19-23.9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826334" comment="kde-style-oxygen-4.11.19-13.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826335" comment="kde-workspace-4.11.19-13.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826336" comment="kde-workspace-devel-4.11.19-13.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826337" comment="kde-workspace-ksplash-themes-4.11.19-13.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826338" comment="kde-workspace-libs-4.11.19-13.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826339" comment="kdeclassic-cursor-theme-4.11.19-13.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826340" comment="kdelibs-4.14.8-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826341" comment="kdelibs-apidocs-4.14.8-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826342" comment="kdelibs-common-4.14.8-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826343" comment="kdelibs-devel-4.14.8-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826344" comment="kdelibs-ktexteditor-4.14.8-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826345" comment="kgreeter-plugins-4.11.19-13.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826346" comment="khotkeys-4.11.19-13.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826347" comment="khotkeys-libs-4.11.19-13.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826348" comment="kinfocenter-4.11.19-13.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826349" comment="kmag-4.10.5-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826350" comment="kmenuedit-4.11.19-13.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826351" comment="ksysguard-4.11.19-13.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826352" comment="ksysguard-libs-4.11.19-13.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826353" comment="ksysguardd-4.11.19-13.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826354" comment="kwin-4.11.19-13.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826355" comment="kwin-gles-4.11.19-13.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826356" comment="kwin-gles-libs-4.11.19-13.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826357" comment="kwin-libs-4.11.19-13.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826358" comment="libkworkspace-4.11.19-13.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826359" comment="oxygen-cursor-themes-4.11.19-13.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826360" comment="plasma-scriptengine-python-4.11.19-13.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826361" comment="plasma-scriptengine-ruby-4.11.19-13.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826362" comment="qt-settings-19-23.9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826363" comment="virtuoso-opensource-6.1.6-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826364" comment="virtuoso-opensource-utils-6.1.6-7.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20186914" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-6914</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-6914" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6914" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-6914" ref_url="https://www.suse.com/security/cve/CVE-2018-6914" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1771-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DDFTKHWDUNIX327O4WIHXU2TIVV47W3Z/#DDFTKHWDUNIX327O4WIHXU2TIVV47W3Z" source="SUSE-SU"/>
    <description>
    Directory traversal vulnerability in the Dir.mktmpdir method in the tmpdir library in Ruby before 2.2.10, 2.3.x before 2.3.7, 2.4.x before 2.4.4, 2.5.x before 2.5.1, and 2.6.0-preview1 might allow attackers to create arbitrary directories or files via a .. (dot dot) in the prefix argument.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-6914/">CVE-2018-6914 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6914">CVE-2018-6914 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1087441">SUSE bug 1087441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136906">SUSE bug 1136906</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825992" comment="ruby-2.0.0.648-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825993" comment="ruby-devel-2.0.0.648-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825994" comment="ruby-doc-2.0.0.648-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825995" comment="ruby-irb-2.0.0.648-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825996" comment="ruby-libs-2.0.0.648-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825997" comment="ruby-tcltk-2.0.0.648-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825998" comment="rubygem-bigdecimal-1.2.0-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825999" comment="rubygem-io-console-0.4.2-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826000" comment="rubygem-json-1.7.7-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826001" comment="rubygem-minitest-4.3.2-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826002" comment="rubygem-psych-2.0.0-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826003" comment="rubygem-rake-0.9.6-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826004" comment="rubygem-rdoc-4.0.0-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826005" comment="rubygems-2.0.14.1-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826006" comment="rubygems-devel-2.0.14.1-36.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20186927" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-6927</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-6927" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6927" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-6927" ref_url="https://www.suse.com/security/cve/CVE-2018-6927" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004055.html" source="SUSE-SU"/>
    <description>
    The futex_requeue function in kernel/futex.c in the Linux kernel before 4.14.15 might allow attackers to cause a denial of service (integer overflow) or possibly have unspecified other impact by triggering a negative wake or requeue value.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6927/">CVE-2018-6927 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6927">CVE-2018-6927 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1080757">SUSE bug 1080757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091815">SUSE bug 1091815</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824165" comment="kernel-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824166" comment="kernel-abi-whitelists-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824167" comment="kernel-debug-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824170" comment="kernel-doc-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824171" comment="kernel-headers-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824172" comment="kernel-tools-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824173" comment="kernel-tools-libs-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824175" comment="perf-3.10.0-862.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824176" comment="python-perf-3.10.0-862.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20186952" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-6952</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-6952" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6952" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-6952" ref_url="https://www.suse.com/security/cve/CVE-2018-6952" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011225.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1932-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011232.html" source="SUSE-SU"/>
    <description>
    A double free exists in the another_hunk function in pch.c in GNU patch through 2.7.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6952/">CVE-2018-6952 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6952">CVE-2018-6952 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1080985">SUSE bug 1080985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167721">SUSE bug 1167721</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826027" comment="patch-2.7.1-11.el7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187159" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7159</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7159" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7159" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7159" ref_url="https://www.suse.com/security/cve/CVE-2018-7159" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
    <description>
    The HTTP parser in all current versions of Node.js ignores spaces in the `Content-Length` header, allowing input such as `Content-Length: 1 2` to be interpreted as having a value of `12`. The HTTP specification does not allow for spaces in the `Content-Length` value and the Node.js HTTP parser has been brought into line on this particular difference. The security risk of this flaw to Node.js users is considered to be VERY LOW as it is difficult, and may be impossible, to craft an attack that makes use of this flaw in a way that could not already be achieved by supplying an incorrect value for `Content-Length`. Vulnerabilities may exist in user-code that make incorrect assumptions about the potential accuracy of this value compared to the actual length of the data supplied. Node.js users crafting lower-level HTTP utilities are advised to re-check the length of any input supplied after parsing is complete.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7159/">CVE-2018-7159 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7159">CVE-2018-7159 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1087453">SUSE bug 1087453</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826503" comment="http-parser-2.7.1-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826504" comment="http-parser-devel-2.7.1-8.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187191" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7191</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7191" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7191" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7191" ref_url="https://www.suse.com/security/cve/CVE-2018-7191" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1479-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/B4DQLC5NNFA52SY3VMJNLGCDAOQAXY7D/#B4DQLC5NNFA52SY3VMJNLGCDAOQAXY7D" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1570-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NJCQPY6KJMGUNOCG3VYC34NI2F6XUC3N/#NJCQPY6KJMGUNOCG3VYC34NI2F6XUC3N" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1579-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GOX3GRSFJIOAQWX677KTNVAGGH653HWU/#GOX3GRSFJIOAQWX677KTNVAGGH653HWU" source="SUSE-SU"/>
    <description>
    In the tun subsystem in the Linux kernel before 4.13.14, dev_get_valid_name is not called before register_netdevice. This allows local users to cause a denial of service (NULL pointer dereference and panic) via an ioctl(TUNSETIFF) call with a dev name containing a / character. This is similar to CVE-2013-4343.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7191/">CVE-2018-7191 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7191">CVE-2018-7191 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1135603">SUSE bug 1135603</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826993" comment="bpftool-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826994" comment="kernel-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826995" comment="kernel-abi-whitelists-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826996" comment="kernel-debug-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826999" comment="kernel-doc-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827000" comment="kernel-headers-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827001" comment="kernel-tools-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827002" comment="kernel-tools-libs-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827004" comment="perf-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827005" comment="python-perf-3.10.0-1127.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187208" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7208</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7208" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7208" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7208" ref_url="https://www.suse.com/security/cve/CVE-2018-7208" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2780-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192780-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2485-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0899-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-March/034658.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5QAJYH6VBFTH2NVELAX7K26MYZ6HLGQC/#5QAJYH6VBFTH2NVELAX7K26MYZ6HLGQC" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3323-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/23PRARCAWIOXVBWHEZY2G57LFWSFL7G4/#23PRARCAWIOXVBWHEZY2G57LFWSFL7G4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2415-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Z3JUZNUB5MLFYPANGJ7Z7AR432VRY6KN/#Z3JUZNUB5MLFYPANGJ7Z7AR432VRY6KN" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2432-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SWUEZJ7AYL2LKLBXPYPMQQS6C42W3MB6/#SWUEZJ7AYL2LKLBXPYPMQQS6C42W3MB6" source="SUSE-SU"/>
    <description>
    In the coff_pointerize_aux function in coffgen.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, an index is not validated, which allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted file, as demonstrated by objcopy of a COFF object.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7208/">CVE-2018-7208 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7208">CVE-2018-7208 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1081527">SUSE bug 1081527</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824624" comment="binutils-2.27-34.base.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824625" comment="binutils-devel-2.27-34.base.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187225" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7225</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7225" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7225" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7225" ref_url="https://www.suse.com/security/cve/CVE-2018-7225" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003847.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003871.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0851-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TJCGV4FW2F2CXE4HQYAOUDVY5N7K27C5/#TJCGV4FW2F2CXE4HQYAOUDVY5N7K27C5" source="SUSE-SU"/>
    <description>
    An issue was discovered in LibVNCServer through 0.9.11. rfbProcessClientNormalMessage() in rfbserver.c does not sanitize msg.cct.length, leading to access to uninitialized and potentially sensitive data or possibly unspecified other impact (e.g., an integer overflow) via specially crafted VNC packets.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7225/">CVE-2018-7225 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7225">CVE-2018-7225 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1081493">SUSE bug 1081493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090647">SUSE bug 1090647</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824158" comment="libvncserver-0.9.9-12.el7_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824159" comment="libvncserver-devel-0.9.9-12.el7_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187409" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7409</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7409" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7409" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7409" ref_url="https://www.suse.com/security/cve/CVE-2018-7409" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004227.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1845-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AQLOQSXCUSVJU7BM2PXDDILSIUS7REYX/#AQLOQSXCUSVJU7BM2PXDDILSIUS7REYX" source="SUSE-SU"/>
    <description>
    In unixODBC before 2.3.5, there is a buffer overflow in the unicode_to_ansi_copy() function in DriverManager/__info.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-7409/">CVE-2018-7409 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7409">CVE-2018-7409 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1082290">SUSE bug 1082290</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826576" comment="unixODBC-2.3.1-14.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826577" comment="unixODBC-devel-2.3.1-14.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187418" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7418</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7418" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7418" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7418" ref_url="https://www.suse.com/security/cve/CVE-2018-7418" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003868.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.2.0 to 2.2.12 and 2.4.0 to 2.4.4, the SIGCOMP dissector could crash. This was addressed in epan/dissectors/packet-sigcomp.c by correcting the extraction of the length value.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7418/">CVE-2018-7418 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7418">CVE-2018-7418 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1082692">SUSE bug 1082692</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827643" comment="wireshark-1.10.14-24.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827644" comment="wireshark-devel-1.10.14-24.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827645" comment="wireshark-gnome-1.10.14-24.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187456" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7456</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7456" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7456" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7456" ref_url="https://www.suse.com/security/cve/CVE-2018-7456" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004228.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004247.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1834-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/35GXTTHY6R26WIDWDJILDL4B3SUNHWM4/#35GXTTHY6R26WIDWDJILDL4B3SUNHWM4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1956-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CTUJZNZSO5HMXSWVLJFQFQYC3N3ZFG6U/#CTUJZNZSO5HMXSWVLJFQFQYC3N3ZFG6U" source="SUSE-SU"/>
    <description>
    A NULL Pointer Dereference occurs in the function TIFFPrintDirectory in tif_print.c in LibTIFF 3.9.3, 3.9.4, 3.9.5, 3.9.6, 3.9.7, 4.0.0alpha4, 4.0.0alpha5, 4.0.0alpha6, 4.0.0beta7, 4.0.0, 4.0.1, 4.0.2, 4.0.3, 4.0.4, 4.0.4beta, 4.0.5, 4.0.6, 4.0.7, 4.0.8 and 4.0.9 when using the tiffinfo tool to print crafted TIFF information, a different vulnerability than CVE-2017-18013. (This affects an earlier part of the TIFFPrintDirectory function that was not addressed by the CVE-2017-18013 patch.)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7456/">CVE-2018-7456 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7456">CVE-2018-7456 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1074317">SUSE bug 1074317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082825">SUSE bug 1082825</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826081" comment="compat-libtiff3-3.9.4-12.el7 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826081" comment="compat-libtiff3-3.9.4-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826088" comment="libtiff-4.0.3-32.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826089" comment="libtiff-devel-4.0.3-32.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826090" comment="libtiff-static-4.0.3-32.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826091" comment="libtiff-tools-4.0.3-32.el7 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187485" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7485</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7485" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7485" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7485" ref_url="https://www.suse.com/security/cve/CVE-2018-7485" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004227.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1845-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AQLOQSXCUSVJU7BM2PXDDILSIUS7REYX/#AQLOQSXCUSVJU7BM2PXDDILSIUS7REYX" source="SUSE-SU"/>
    <description>
    The SQLWriteFileDSN function in odbcinst/SQLWriteFileDSN.c in unixODBC 2.3.5 has strncpy arguments in the wrong order, which allows attackers to cause a denial of service or possibly have unspecified other impact.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-7485/">CVE-2018-7485 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7485">CVE-2018-7485 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1082484">SUSE bug 1082484</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826576" comment="unixODBC-2.3.1-14.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826577" comment="unixODBC-devel-2.3.1-14.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187549" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7549</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7549" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7549" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7549" ref_url="https://www.suse.com/security/cve/CVE-2018-7549" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010436.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1093-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GK62YTNMQ4SBUW42W4UTPSYBGUSFJAAP/#GK62YTNMQ4SBUW42W4UTPSYBGUSFJAAP" source="SUSE-SU"/>
    <description>
    In params.c in zsh through 5.4.2, there is a crash during a copy of an empty hash table, as demonstrated by typeset -p.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7549/">CVE-2018-7549 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7549">CVE-2018-7549 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1082991">SUSE bug 1082991</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200039">SUSE bug 1200039</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824784" comment="zsh-5.0.2-31.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824785" comment="zsh-html-5.0.2-31.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187550" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7550</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7550" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7550" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7550" ref_url="https://www.suse.com/security/cve/CVE-2018-7550" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2340-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004424.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0780-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R3FRDROY2UV4WMIXYKNDNPPBXQOBE6U7/#R3FRDROY2UV4WMIXYKNDNPPBXQOBE6U7" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2402-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LV572SEMHY7W2BLBGHICX7YQUWOEXYOY/#LV572SEMHY7W2BLBGHICX7YQUWOEXYOY" source="SUSE-SU"/>
    <description>
    The load_multiboot function in hw/i386/multiboot.c in Quick Emulator (aka QEMU) allows local guest OS users to execute arbitrary code on the QEMU host via a mh_load_end_addr value greater than mh_bss_end_addr, which triggers an out-of-bounds read or write memory access.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-7550/">CVE-2018-7550 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7550">CVE-2018-7550 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1083291">SUSE bug 1083291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083292">SUSE bug 1083292</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824524" comment="qemu-img-1.5.3-156.el7_5.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824525" comment="qemu-kvm-1.5.3-156.el7_5.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824526" comment="qemu-kvm-common-1.5.3-156.el7_5.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824527" comment="qemu-kvm-tools-1.5.3-156.el7_5.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187566" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7566</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7566" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7566" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7566" ref_url="https://www.suse.com/security/cve/CVE-2018-7566" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0989-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0991-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0992-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0993-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0995-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1004-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1005-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1009-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1010-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1013-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1016-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003932.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1019-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1022-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1023-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004055.html" source="SUSE-SU"/>
    <description>
    The Linux kernel 4.15 has a Buffer Overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-7566/">CVE-2018-7566 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7566">CVE-2018-7566 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1083483">SUSE bug 1083483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083488">SUSE bug 1083488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091815">SUSE bug 1091815</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824504" comment="kernel-3.10.0-862.11.6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824505" comment="kernel-abi-whitelists-3.10.0-862.11.6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824506" comment="kernel-debug-3.10.0-862.11.6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824509" comment="kernel-doc-3.10.0-862.11.6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824510" comment="kernel-headers-3.10.0-862.11.6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824511" comment="kernel-tools-3.10.0-862.11.6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824512" comment="kernel-tools-libs-3.10.0-862.11.6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824514" comment="perf-3.10.0-862.11.6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824515" comment="python-perf-3.10.0-862.11.6.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187568" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7568</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7568" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7568" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7568" ref_url="https://www.suse.com/security/cve/CVE-2018-7568" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2780-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192780-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5QAJYH6VBFTH2NVELAX7K26MYZ6HLGQC/#5QAJYH6VBFTH2NVELAX7K26MYZ6HLGQC" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3323-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/23PRARCAWIOXVBWHEZY2G57LFWSFL7G4/#23PRARCAWIOXVBWHEZY2G57LFWSFL7G4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2415-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Z3JUZNUB5MLFYPANGJ7Z7AR432VRY6KN/#Z3JUZNUB5MLFYPANGJ7Z7AR432VRY6KN" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2432-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SWUEZJ7AYL2LKLBXPYPMQQS6C42W3MB6/#SWUEZJ7AYL2LKLBXPYPMQQS6C42W3MB6" source="SUSE-SU"/>
    <description>
    The parse_die function in dwarf1.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (integer overflow and application crash) via an ELF file with corrupt dwarf1 debug information, as demonstrated by nm.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-03"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7568/">CVE-2018-7568 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7568">CVE-2018-7568 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1086788">SUSE bug 1086788</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824624" comment="binutils-2.27-34.base.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824625" comment="binutils-devel-2.27-34.base.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187569" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7569</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7569" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7569" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7569" ref_url="https://www.suse.com/security/cve/CVE-2018-7569" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2780-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192780-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5QAJYH6VBFTH2NVELAX7K26MYZ6HLGQC/#5QAJYH6VBFTH2NVELAX7K26MYZ6HLGQC" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3323-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/23PRARCAWIOXVBWHEZY2G57LFWSFL7G4/#23PRARCAWIOXVBWHEZY2G57LFWSFL7G4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2415-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Z3JUZNUB5MLFYPANGJ7Z7AR432VRY6KN/#Z3JUZNUB5MLFYPANGJ7Z7AR432VRY6KN" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2432-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SWUEZJ7AYL2LKLBXPYPMQQS6C42W3MB6/#SWUEZJ7AYL2LKLBXPYPMQQS6C42W3MB6" source="SUSE-SU"/>
    <description>
    dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (integer underflow or overflow, and application crash) via an ELF file with a corrupt DWARF FORM block, as demonstrated by nm.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-03"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7569/">CVE-2018-7569 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7569">CVE-2018-7569 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1083532">SUSE bug 1083532</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824624" comment="binutils-2.27-34.base.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824625" comment="binutils-devel-2.27-34.base.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187584" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7584</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7584" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7584" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7584" ref_url="https://www.suse.com/security/cve/CVE-2018-7584" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003798.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003837.html" source="SUSE-SU"/>
    <description>
    In PHP through 5.6.33, 7.0.x before 7.0.28, 7.1.x through 7.1.14, and 7.2.x through 7.2.2, there is a stack-based buffer under-read while parsing an HTTP response in the php_stream_url_wrap_http_ex function in ext/standard/http_fopen_wrapper.c. This subsequently results in copying a large string.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7584/">CVE-2018-7584 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7584">CVE-2018-7584 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1083639">SUSE bug 1083639</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827765" comment="php-5.4.16-48.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827766" comment="php-bcmath-5.4.16-48.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827767" comment="php-cli-5.4.16-48.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827768" comment="php-common-5.4.16-48.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827769" comment="php-dba-5.4.16-48.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827770" comment="php-devel-5.4.16-48.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827771" comment="php-embedded-5.4.16-48.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827772" comment="php-enchant-5.4.16-48.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827773" comment="php-fpm-5.4.16-48.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827774" comment="php-gd-5.4.16-48.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827775" comment="php-intl-5.4.16-48.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827776" comment="php-ldap-5.4.16-48.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827777" comment="php-mbstring-5.4.16-48.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827778" comment="php-mysql-5.4.16-48.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827779" comment="php-mysqlnd-5.4.16-48.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827780" comment="php-odbc-5.4.16-48.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827781" comment="php-pdo-5.4.16-48.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827782" comment="php-pgsql-5.4.16-48.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827783" comment="php-process-5.4.16-48.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827784" comment="php-pspell-5.4.16-48.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827785" comment="php-recode-5.4.16-48.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827786" comment="php-snmp-5.4.16-48.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827787" comment="php-soap-5.4.16-48.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827788" comment="php-xml-5.4.16-48.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827789" comment="php-xmlrpc-5.4.16-48.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187642" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7642</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7642" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7642" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7642" ref_url="https://www.suse.com/security/cve/CVE-2018-7642" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2780-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192780-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5QAJYH6VBFTH2NVELAX7K26MYZ6HLGQC/#5QAJYH6VBFTH2NVELAX7K26MYZ6HLGQC" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3323-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/23PRARCAWIOXVBWHEZY2G57LFWSFL7G4/#23PRARCAWIOXVBWHEZY2G57LFWSFL7G4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2415-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Z3JUZNUB5MLFYPANGJ7Z7AR432VRY6KN/#Z3JUZNUB5MLFYPANGJ7Z7AR432VRY6KN" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2432-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SWUEZJ7AYL2LKLBXPYPMQQS6C42W3MB6/#SWUEZJ7AYL2LKLBXPYPMQQS6C42W3MB6" source="SUSE-SU"/>
    <description>
    The swap_std_reloc_in function in aoutx.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (aout_32_swap_std_reloc_out NULL pointer dereference and application crash) via a crafted ELF file, as demonstrated by objcopy.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-03"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7642/">CVE-2018-7642 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7642">CVE-2018-7642 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1086786">SUSE bug 1086786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128518">SUSE bug 1128518</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824624" comment="binutils-2.27-34.base.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824625" comment="binutils-devel-2.27-34.base.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187643" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7643</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7643" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7643" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7643" ref_url="https://www.suse.com/security/cve/CVE-2018-7643" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2780-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192780-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5QAJYH6VBFTH2NVELAX7K26MYZ6HLGQC/#5QAJYH6VBFTH2NVELAX7K26MYZ6HLGQC" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3323-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/23PRARCAWIOXVBWHEZY2G57LFWSFL7G4/#23PRARCAWIOXVBWHEZY2G57LFWSFL7G4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2415-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Z3JUZNUB5MLFYPANGJ7Z7AR432VRY6KN/#Z3JUZNUB5MLFYPANGJ7Z7AR432VRY6KN" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2432-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SWUEZJ7AYL2LKLBXPYPMQQS6C42W3MB6/#SWUEZJ7AYL2LKLBXPYPMQQS6C42W3MB6" source="SUSE-SU"/>
    <description>
    The display_debug_ranges function in dwarf.c in GNU Binutils 2.30 allows remote attackers to cause a denial of service (integer overflow and application crash) or possibly have unspecified other impact via a crafted ELF file, as demonstrated by objdump.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7643/">CVE-2018-7643 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7643">CVE-2018-7643 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1086784">SUSE bug 1086784</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824624" comment="binutils-2.27-34.base.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824625" comment="binutils-devel-2.27-34.base.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187725" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7725</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7725" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7725" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7725" ref_url="https://www.suse.com/security/cve/CVE-2018-7725" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003884.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in ZZIPlib 0.13.68. An invalid memory address dereference was discovered in zzip_disk_fread in mmapped.c. The vulnerability causes an application crash, which leads to denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7725/">CVE-2018-7725 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7725">CVE-2018-7725 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1084519">SUSE bug 1084519</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825310" comment="zziplib-0.13.62-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825311" comment="zziplib-devel-0.13.62-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825312" comment="zziplib-utils-0.13.62-9.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187726" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7726</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7726" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7726" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7726" ref_url="https://www.suse.com/security/cve/CVE-2018-7726" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003884.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in ZZIPlib 0.13.68. There is a bus error caused by the __zzip_parse_root_directory function of zip.c. Attackers could leverage this vulnerability to cause a denial of service via a crafted zip file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7726/">CVE-2018-7726 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7726">CVE-2018-7726 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1084517">SUSE bug 1084517</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825310" comment="zziplib-0.13.62-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825311" comment="zziplib-devel-0.13.62-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825312" comment="zziplib-utils-0.13.62-9.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187727" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7727</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7727" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7727" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7727" ref_url="https://www.suse.com/security/cve/CVE-2018-7727" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3341-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006273.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in ZZIPlib 0.13.68. There is a memory leak triggered in the function zzip_mem_disk_new in memdisk.c, which will lead to a denial of service attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7727/">CVE-2018-7727 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7727">CVE-2018-7727 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1084515">SUSE bug 1084515</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825310" comment="zziplib-0.13.62-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825311" comment="zziplib-devel-0.13.62-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825312" comment="zziplib-utils-0.13.62-9.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187730" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7730</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7730" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7730" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7730" ref_url="https://www.suse.com/security/cve/CVE-2018-7730" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004783.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Exempi through 2.4.4. A certain case of a 0xffffffff length is mishandled in XMPFiles/source/FormatSupport/PSIR_FileWriter.cpp, leading to a heap-based buffer over-read in the PSD_MetaHandler::CacheFileData() function.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7730/">CVE-2018-7730 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7730">CVE-2018-7730 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1085295">SUSE bug 1085295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085585">SUSE bug 1085585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103718">SUSE bug 1103718</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826077" comment="exempi-2.2.0-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826078" comment="exempi-devel-2.2.0-9.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187740" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7740</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7740" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7740" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7740" ref_url="https://www.suse.com/security/cve/CVE-2018-7740" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1173-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003996.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0972-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GBNXEAMDIJUJNM3SGWQXJLMMRXTV5O25/#GBNXEAMDIJUJNM3SGWQXJLMMRXTV5O25" source="SUSE-SU"/>
    <description>
    The resv_map_release function in mm/hugetlb.c in the Linux kernel through 4.15.7 allows local users to cause a denial of service (BUG) via a crafted application that makes mmap system calls and has a large pgoff argument to the remap_file_pages system call.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7740/">CVE-2018-7740 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7740">CVE-2018-7740 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1084353">SUSE bug 1084353</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824786" comment="bpftool-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824787" comment="kernel-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824788" comment="kernel-abi-whitelists-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824789" comment="kernel-debug-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824792" comment="kernel-doc-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824793" comment="kernel-headers-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824794" comment="kernel-tools-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824795" comment="kernel-tools-libs-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824797" comment="perf-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824798" comment="python-perf-3.10.0-957.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187755" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7755</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7755" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7755" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7755" ref_url="https://www.suse.com/security/cve/CVE-2018-7755" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1651-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1668-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013765.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the fd_locked_ioctl function in drivers/block/floppy.c in the Linux kernel through 4.15.7. The floppy driver will copy a kernel pointer to user memory in response to the FDGETPRM ioctl. An attacker can send the FDGETPRM ioctl and use the obtained kernel pointer to discover the location of kernel code and data and bypass kernel security protections such as KASLR.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-7755/">CVE-2018-7755 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7755">CVE-2018-7755 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1084513">SUSE bug 1084513</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826007" comment="bpftool-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826008" comment="kernel-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826009" comment="kernel-abi-whitelists-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826010" comment="kernel-debug-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826013" comment="kernel-doc-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826014" comment="kernel-headers-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826015" comment="kernel-tools-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826016" comment="kernel-tools-libs-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826018" comment="perf-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826019" comment="python-perf-3.10.0-1062.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187757" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7757</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7757" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7757" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7757" ref_url="https://www.suse.com/security/cve/CVE-2018-7757" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3003-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183003-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3004-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004641.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3202-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/56FCVMOU7EZPSBZAXDQQHKB5N5YI7KX7/#56FCVMOU7EZPSBZAXDQQHKB5N5YI7KX7" source="SUSE-SU"/>
    <description>
    Memory leak in the sas_smp_get_phy_events function in drivers/scsi/libsas/sas_expander.c in the Linux kernel through 4.15.7 allows local users to cause a denial of service (memory consumption) via many read accesses to files in the /sys/class/sas_phy directory, as demonstrated by the /sys/class/sas_phy/phy-1:0:12/invalid_dword_count file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7757/">CVE-2018-7757 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7757">CVE-2018-7757 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1084536">SUSE bug 1084536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087209">SUSE bug 1087209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091815">SUSE bug 1091815</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824786" comment="bpftool-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824787" comment="kernel-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824788" comment="kernel-abi-whitelists-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824789" comment="kernel-debug-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824792" comment="kernel-doc-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824793" comment="kernel-headers-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824794" comment="kernel-tools-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824795" comment="kernel-tools-libs-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824797" comment="perf-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824798" comment="python-perf-3.10.0-957.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187858" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7858</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7858" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7858" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7858" ref_url="https://www.suse.com/security/cve/CVE-2018-7858" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005184.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1074-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q6DNNFUZSZUOD36332LAYVERA7GHAXUC/#Q6DNNFUZSZUOD36332LAYVERA7GHAXUC" source="SUSE-SU"/>
    <description>
    Quick Emulator (aka QEMU), when built with the Cirrus CLGD 54xx VGA Emulator support, allows local guest OS privileged users to cause a denial of service (out-of-bounds access and QEMU process crash) by leveraging incorrect region calculation when updating VGA display.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7858/">CVE-2018-7858 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7858">CVE-2018-7858 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1084604">SUSE bug 1084604</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824265" comment="qemu-img-1.5.3-156.el7_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824266" comment="qemu-kvm-1.5.3-156.el7_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824267" comment="qemu-kvm-common-1.5.3-156.el7_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824268" comment="qemu-kvm-tools-1.5.3-156.el7_5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20188014" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-8014</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-8014" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8014" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-8014" ref_url="https://www.suse.com/security/cve/CVE-2018-8014" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3011-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183011-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3011-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004782.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2740-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4L3QCD32DJXD32NB6KQT36REOW2EGGO2/#4L3QCD32DJXD32NB6KQT36REOW2EGGO2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3054-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/A3JYKL6TLYHL72D4OCQVELQ2QTE3SOTH/#A3JYKL6TLYHL72D4OCQVELQ2QTE3SOTH" source="SUSE-SU"/>
    <description>
    The defaults settings for the CORS filter provided in Apache Tomcat 9.0.0.M1 to 9.0.8, 8.5.0 to 8.5.31, 8.0.0.RC1 to 8.0.52, 7.0.41 to 7.0.88 are insecure and enable 'supportsCredentials' for all origins. It is expected that users of the CORS filter will have configured it appropriately for their environment rather than using it in the default configuration. Therefore, it is expected that most users will not be impacted by this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-8014/">CVE-2018-8014 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8014">CVE-2018-8014 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1093697">SUSE bug 1093697</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826470" comment="tomcat-7.0.76-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826471" comment="tomcat-admin-webapps-7.0.76-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826472" comment="tomcat-docs-webapp-7.0.76-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826473" comment="tomcat-el-2.2-api-7.0.76-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826474" comment="tomcat-javadoc-7.0.76-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826475" comment="tomcat-jsp-2.2-api-7.0.76-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826476" comment="tomcat-jsvc-7.0.76-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826477" comment="tomcat-lib-7.0.76-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826478" comment="tomcat-servlet-3.0-api-7.0.76-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826479" comment="tomcat-webapps-7.0.76-9.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20188034" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-8034</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-8034" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8034" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-8034" ref_url="https://www.suse.com/security/cve/CVE-2018-8034" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3011-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183011-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3011-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004782.html" source="SUSE-SU"/>
		<reference ref_id="TID7016795" ref_url="https://www.suse.com/support/kb/doc/?id=7016795" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2740-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4L3QCD32DJXD32NB6KQT36REOW2EGGO2/#4L3QCD32DJXD32NB6KQT36REOW2EGGO2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3054-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/A3JYKL6TLYHL72D4OCQVELQ2QTE3SOTH/#A3JYKL6TLYHL72D4OCQVELQ2QTE3SOTH" source="SUSE-SU"/>
    <description>
    The host name verification when using TLS with the WebSocket client was missing. It is now enabled by default. Versions Affected: Apache Tomcat 9.0.0.M1 to 9.0.9, 8.5.0 to 8.5.31, 8.0.0.RC1 to 8.0.52, and 7.0.35 to 7.0.88.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-8034/">CVE-2018-8034 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8034">CVE-2018-8034 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1102379">SUSE bug 1102379</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826470" comment="tomcat-7.0.76-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826471" comment="tomcat-admin-webapps-7.0.76-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826472" comment="tomcat-docs-webapp-7.0.76-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826473" comment="tomcat-el-2.2-api-7.0.76-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826474" comment="tomcat-javadoc-7.0.76-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826475" comment="tomcat-jsp-2.2-api-7.0.76-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826476" comment="tomcat-jsvc-7.0.76-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826477" comment="tomcat-lib-7.0.76-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826478" comment="tomcat-servlet-3.0-api-7.0.76-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826479" comment="tomcat-webapps-7.0.76-9.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20188087" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-8087</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-8087" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8087" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-8087" ref_url="https://www.suse.com/security/cve/CVE-2018-8087" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003902.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0781-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IGSNRZOHBLG7CUS6RPT3LPE2GCEITYQD/#IGSNRZOHBLG7CUS6RPT3LPE2GCEITYQD" source="SUSE-SU"/>
    <description>
    Memory leak in the hwsim_new_radio_nl function in drivers/net/wireless/mac80211_hwsim.c in the Linux kernel through 4.15.9 allows local users to cause a denial of service (memory consumption) by triggering an out-of-array error case.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-8087/">CVE-2018-8087 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8087">CVE-2018-8087 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1085053">SUSE bug 1085053</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826007" comment="bpftool-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826008" comment="kernel-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826009" comment="kernel-abi-whitelists-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826010" comment="kernel-debug-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826013" comment="kernel-doc-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826014" comment="kernel-headers-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826015" comment="kernel-tools-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826016" comment="kernel-tools-libs-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826018" comment="perf-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826019" comment="python-perf-3.10.0-1062.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20188088" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-8088</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-8088" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8088" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-8088" ref_url="https://www.suse.com/security/cve/CVE-2018-8088" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004199.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1625-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PAKFQANUPZGT6AR5ZGHOS7I2ATUZ336Z/#PAKFQANUPZGT6AR5ZGHOS7I2ATUZ336Z" source="SUSE-SU"/>
    <description>
    org.slf4j.ext.EventData in the slf4j-ext module in QOS.CH SLF4J before 1.8.0-beta2 allows remote attackers to bypass intended access restrictions via crafted data. EventData in the slf4j-ext module in QOS.CH SLF4J, has been fixed in SLF4J versions 1.7.26 later and in the 2.0.x series.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8088/">CVE-2018-8088 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8088">CVE-2018-8088 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1085970">SUSE bug 1085970</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824064" comment="slf4j-1.7.4-4.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824065" comment="slf4j-javadoc-1.7.4-4.el7_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824066" comment="slf4j-manual-1.7.4-4.el7_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20188777" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-8777</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-8777" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8777" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-8777" ref_url="https://www.suse.com/security/cve/CVE-2018-8777" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1771-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DDFTKHWDUNIX327O4WIHXU2TIVV47W3Z/#DDFTKHWDUNIX327O4WIHXU2TIVV47W3Z" source="SUSE-SU"/>
    <description>
    In Ruby before 2.2.10, 2.3.x before 2.3.7, 2.4.x before 2.4.4, 2.5.x before 2.5.1, and 2.6.0-preview1, an attacker can pass a large HTTP request with a crafted header to WEBrick server or a crafted body to WEBrick server/handler and cause a denial of service (memory consumption).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-8777/">CVE-2018-8777 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8777">CVE-2018-8777 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1087436">SUSE bug 1087436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136906">SUSE bug 1136906</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825992" comment="ruby-2.0.0.648-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825993" comment="ruby-devel-2.0.0.648-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825994" comment="ruby-doc-2.0.0.648-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825995" comment="ruby-irb-2.0.0.648-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825996" comment="ruby-libs-2.0.0.648-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825997" comment="ruby-tcltk-2.0.0.648-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825998" comment="rubygem-bigdecimal-1.2.0-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825999" comment="rubygem-io-console-0.4.2-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826000" comment="rubygem-json-1.7.7-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826001" comment="rubygem-minitest-4.3.2-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826002" comment="rubygem-psych-2.0.0-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826003" comment="rubygem-rake-0.9.6-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826004" comment="rubygem-rdoc-4.0.0-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826005" comment="rubygems-2.0.14.1-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826006" comment="rubygems-devel-2.0.14.1-36.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20188778" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-8778</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-8778" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8778" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-8778" ref_url="https://www.suse.com/security/cve/CVE-2018-8778" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1771-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DDFTKHWDUNIX327O4WIHXU2TIVV47W3Z/#DDFTKHWDUNIX327O4WIHXU2TIVV47W3Z" source="SUSE-SU"/>
    <description>
    In Ruby before 2.2.10, 2.3.x before 2.3.7, 2.4.x before 2.4.4, 2.5.x before 2.5.1, and 2.6.0-preview1, an attacker controlling the unpacking format (similar to format string vulnerabilities) can trigger a buffer under-read in the String#unpack method, resulting in a massive and controlled information disclosure.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-8778/">CVE-2018-8778 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8778">CVE-2018-8778 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1087433">SUSE bug 1087433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136906">SUSE bug 1136906</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825992" comment="ruby-2.0.0.648-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825993" comment="ruby-devel-2.0.0.648-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825994" comment="ruby-doc-2.0.0.648-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825995" comment="ruby-irb-2.0.0.648-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825996" comment="ruby-libs-2.0.0.648-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825997" comment="ruby-tcltk-2.0.0.648-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825998" comment="rubygem-bigdecimal-1.2.0-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825999" comment="rubygem-io-console-0.4.2-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826000" comment="rubygem-json-1.7.7-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826001" comment="rubygem-minitest-4.3.2-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826002" comment="rubygem-psych-2.0.0-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826003" comment="rubygem-rake-0.9.6-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826004" comment="rubygem-rdoc-4.0.0-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826005" comment="rubygems-2.0.14.1-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826006" comment="rubygems-devel-2.0.14.1-36.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20188779" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-8779</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-8779" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8779" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-8779" ref_url="https://www.suse.com/security/cve/CVE-2018-8779" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1771-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DDFTKHWDUNIX327O4WIHXU2TIVV47W3Z/#DDFTKHWDUNIX327O4WIHXU2TIVV47W3Z" source="SUSE-SU"/>
    <description>
    In Ruby before 2.2.10, 2.3.x before 2.3.7, 2.4.x before 2.4.4, 2.5.x before 2.5.1, and 2.6.0-preview1, the UNIXServer.open and UNIXSocket.open methods are not checked for null characters. It may be connected to an unintended socket.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-8779/">CVE-2018-8779 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8779">CVE-2018-8779 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1087440">SUSE bug 1087440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136906">SUSE bug 1136906</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825992" comment="ruby-2.0.0.648-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825993" comment="ruby-devel-2.0.0.648-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825994" comment="ruby-doc-2.0.0.648-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825995" comment="ruby-irb-2.0.0.648-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825996" comment="ruby-libs-2.0.0.648-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825997" comment="ruby-tcltk-2.0.0.648-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825998" comment="rubygem-bigdecimal-1.2.0-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825999" comment="rubygem-io-console-0.4.2-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826000" comment="rubygem-json-1.7.7-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826001" comment="rubygem-minitest-4.3.2-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826002" comment="rubygem-psych-2.0.0-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826003" comment="rubygem-rake-0.9.6-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826004" comment="rubygem-rdoc-4.0.0-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826005" comment="rubygems-2.0.14.1-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826006" comment="rubygems-devel-2.0.14.1-36.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20188780" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-8780</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-8780" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8780" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-8780" ref_url="https://www.suse.com/security/cve/CVE-2018-8780" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1771-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DDFTKHWDUNIX327O4WIHXU2TIVV47W3Z/#DDFTKHWDUNIX327O4WIHXU2TIVV47W3Z" source="SUSE-SU"/>
    <description>
    In Ruby before 2.2.10, 2.3.x before 2.3.7, 2.4.x before 2.4.4, 2.5.x before 2.5.1, and 2.6.0-preview1, the Dir.open, Dir.new, Dir.entries and Dir.empty? methods do not check NULL characters. When using the corresponding method, unintentional directory traversal may be performed.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-8780/">CVE-2018-8780 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8780">CVE-2018-8780 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1087437">SUSE bug 1087437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136906">SUSE bug 1136906</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825992" comment="ruby-2.0.0.648-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825993" comment="ruby-devel-2.0.0.648-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825994" comment="ruby-doc-2.0.0.648-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825995" comment="ruby-irb-2.0.0.648-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825996" comment="ruby-libs-2.0.0.648-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825997" comment="ruby-tcltk-2.0.0.648-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825998" comment="rubygem-bigdecimal-1.2.0-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825999" comment="rubygem-io-console-0.4.2-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826000" comment="rubygem-json-1.7.7-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826001" comment="rubygem-minitest-4.3.2-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826002" comment="rubygem-psych-2.0.0-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826003" comment="rubygem-rake-0.9.6-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826004" comment="rubygem-rdoc-4.0.0-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826005" comment="rubygems-2.0.14.1-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826006" comment="rubygems-devel-2.0.14.1-36.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20188781" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-8781</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-8781" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8781" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-8781" ref_url="https://www.suse.com/security/cve/CVE-2018-8781" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1173-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1366-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1523-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1531-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1537-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1539-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1636-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004334.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1418-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EN4KK2FGUDUKZAKRD5IRYD6AZQXJA3AU/#EN4KK2FGUDUKZAKRD5IRYD6AZQXJA3AU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2119-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WKPTBMLW6CO7OGF3LPNC4LMQ2SS7VXKC/#WKPTBMLW6CO7OGF3LPNC4LMQ2SS7VXKC" source="SUSE-SU"/>
    <description>
    The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c at the Linux kernel version 3.4 and up to and including 4.15 has an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8781/">CVE-2018-8781 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8781">CVE-2018-8781 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090643">SUSE bug 1090643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090646">SUSE bug 1090646</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824786" comment="bpftool-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824787" comment="kernel-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824788" comment="kernel-abi-whitelists-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824789" comment="kernel-debug-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824792" comment="kernel-doc-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824793" comment="kernel-headers-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824794" comment="kernel-tools-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824795" comment="kernel-tools-libs-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824797" comment="perf-3.10.0-957.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824798" comment="python-perf-3.10.0-957.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20188786" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-8786</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-8786" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8786" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-8786" ref_url="https://www.suse.com/security/cve/CVE-2018-8786" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0539-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007279.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0096-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6546GTVQBRKCKXCHRB6SE5TC4ANON353/#6546GTVQBRKCKXCHRB6SE5TC4ANON353" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0325-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MIETP2PR4Q4SATLCVO5M3PMEMOFCHU4C/#MIETP2PR4Q4SATLCVO5M3PMEMOFCHU4C" source="SUSE-SU"/>
    <description>
    FreeRDP prior to version 2.0.0-rc4 contains an Integer Truncation that leads to a Heap-Based Buffer Overflow in function update_read_bitmap_update() and results in a memory corruption and probably even a remote code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8786/">CVE-2018-8786 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8786">CVE-2018-8786 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1116708">SUSE bug 1116708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117963">SUSE bug 1117963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117966">SUSE bug 1117966</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131873">SUSE bug 1131873</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825634" comment="freerdp-1.0.2-15.el7_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825635" comment="freerdp-devel-1.0.2-15.el7_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825636" comment="freerdp-libs-1.0.2-15.el7_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825637" comment="freerdp-plugins-1.0.2-15.el7_6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20188787" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-8787</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-8787" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8787" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-8787" ref_url="https://www.suse.com/security/cve/CVE-2018-8787" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0539-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007279.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0096-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6546GTVQBRKCKXCHRB6SE5TC4ANON353/#6546GTVQBRKCKXCHRB6SE5TC4ANON353" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0325-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MIETP2PR4Q4SATLCVO5M3PMEMOFCHU4C/#MIETP2PR4Q4SATLCVO5M3PMEMOFCHU4C" source="SUSE-SU"/>
    <description>
    FreeRDP prior to version 2.0.0-rc4 contains an Integer Overflow that leads to a Heap-Based Buffer Overflow in function gdi_Bitmap_Decompress() and results in a memory corruption and probably even a remote code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8787/">CVE-2018-8787 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8787">CVE-2018-8787 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1116708">SUSE bug 1116708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117963">SUSE bug 1117963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117964">SUSE bug 1117964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131873">SUSE bug 1131873</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825634" comment="freerdp-1.0.2-15.el7_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825635" comment="freerdp-devel-1.0.2-15.el7_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825636" comment="freerdp-libs-1.0.2-15.el7_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825637" comment="freerdp-plugins-1.0.2-15.el7_6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20188788" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-8788</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-8788" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8788" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-8788" ref_url="https://www.suse.com/security/cve/CVE-2018-8788" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0539-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007279.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0096-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6546GTVQBRKCKXCHRB6SE5TC4ANON353/#6546GTVQBRKCKXCHRB6SE5TC4ANON353" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0325-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MIETP2PR4Q4SATLCVO5M3PMEMOFCHU4C/#MIETP2PR4Q4SATLCVO5M3PMEMOFCHU4C" source="SUSE-SU"/>
    <description>
    FreeRDP prior to version 2.0.0-rc4 contains an Out-Of-Bounds Write of up to 4 bytes in function nsc_rle_decode() that results in a memory corruption and possibly even a remote code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8788/">CVE-2018-8788 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8788">CVE-2018-8788 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1116708">SUSE bug 1116708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117963">SUSE bug 1117963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131873">SUSE bug 1131873</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825634" comment="freerdp-1.0.2-15.el7_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825635" comment="freerdp-devel-1.0.2-15.el7_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825636" comment="freerdp-libs-1.0.2-15.el7_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825637" comment="freerdp-plugins-1.0.2-15.el7_6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20188804" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-8804</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-8804" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8804" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-8804" ref_url="https://www.suse.com/security/cve/CVE-2018-8804" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003876.html" source="SUSE-SU"/>
    <description>
    WriteEPTImage in coders/ept.c in ImageMagick 7.0.7-25 Q16 allows remote attackers to cause a denial of service (MagickCore/memory.c double free and application crash) or possibly have unspecified other impact via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8804/">CVE-2018-8804 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8804">CVE-2018-8804 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1086011">SUSE bug 1086011</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827880" comment="ImageMagick-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827881" comment="ImageMagick-c++-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827882" comment="ImageMagick-c++-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827883" comment="ImageMagick-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827884" comment="ImageMagick-doc-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827885" comment="ImageMagick-perl-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827886" comment="autotrace-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827887" comment="autotrace-devel-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827888" comment="emacs-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827889" comment="emacs-common-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827890" comment="emacs-el-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827891" comment="emacs-filesystem-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827892" comment="emacs-nox-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827893" comment="emacs-terminal-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827894" comment="inkscape-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827895" comment="inkscape-docs-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827896" comment="inkscape-view-0.92.2-3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20188897" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-8897</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-8897" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8897" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-8897" ref_url="https://www.suse.com/security/cve/CVE-2018-8897" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1173-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1523-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1531-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1537-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1539-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1636-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004740.html" source="SUSE-SU"/>
		<reference ref_id="TID000019188" ref_url="https://www.suse.com/support/kb/doc/?id=000019188" source="SUSE-SU"/>
		<reference ref_id="TID7022916" ref_url="https://www.suse.com/support/kb/doc/?id=7022916" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1274-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7XRHMUF55OX3PSZEXNERH3QX6AHU5QDG/#7XRHMUF55OX3PSZEXNERH3QX6AHU5QDG" source="SUSE-SU"/>
    <description>
    A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer's Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL &lt; 3, the debug exception is delivered after the transfer to CPL &lt; 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8897/">CVE-2018-8897 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8897">CVE-2018-8897 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1087078">SUSE bug 1087078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087088">SUSE bug 1087088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090368">SUSE bug 1090368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090820">SUSE bug 1090820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090869">SUSE bug 1090869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092497">SUSE bug 1092497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093522">SUSE bug 1093522</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093524">SUSE bug 1093524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098813">SUSE bug 1098813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100835">SUSE bug 1100835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115893">SUSE bug 1115893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824218" comment="kernel-3.10.0-862.2.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824219" comment="kernel-abi-whitelists-3.10.0-862.2.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824220" comment="kernel-debug-3.10.0-862.2.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824223" comment="kernel-doc-3.10.0-862.2.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824224" comment="kernel-headers-3.10.0-862.2.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824225" comment="kernel-tools-3.10.0-862.2.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824226" comment="kernel-tools-libs-3.10.0-862.2.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824228" comment="perf-3.10.0-862.2.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824229" comment="python-perf-3.10.0-862.2.3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20188905" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-8905</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-8905" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8905" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-8905" ref_url="https://www.suse.com/security/cve/CVE-2018-8905" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004228.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004247.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1834-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/35GXTTHY6R26WIDWDJILDL4B3SUNHWM4/#35GXTTHY6R26WIDWDJILDL4B3SUNHWM4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1956-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CTUJZNZSO5HMXSWVLJFQFQYC3N3ZFG6U/#CTUJZNZSO5HMXSWVLJFQFQYC3N3ZFG6U" source="SUSE-SU"/>
    <description>
    In LibTIFF 4.0.9, a heap-based buffer overflow occurs in the function LZWDecodeCompat in tif_lzw.c via a crafted TIFF file, as demonstrated by tiff2ps.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-8905/">CVE-2018-8905 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8905">CVE-2018-8905 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1086408">SUSE bug 1086408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826088" comment="libtiff-4.0.3-32.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826089" comment="libtiff-devel-4.0.3-32.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826090" comment="libtiff-static-4.0.3-32.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826091" comment="libtiff-tools-4.0.3-32.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20188945" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-8945</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-8945" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8945" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-8945" ref_url="https://www.suse.com/security/cve/CVE-2018-8945" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2780-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192780-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5QAJYH6VBFTH2NVELAX7K26MYZ6HLGQC/#5QAJYH6VBFTH2NVELAX7K26MYZ6HLGQC" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3323-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/23PRARCAWIOXVBWHEZY2G57LFWSFL7G4/#23PRARCAWIOXVBWHEZY2G57LFWSFL7G4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2415-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Z3JUZNUB5MLFYPANGJ7Z7AR432VRY6KN/#Z3JUZNUB5MLFYPANGJ7Z7AR432VRY6KN" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2432-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SWUEZJ7AYL2LKLBXPYPMQQS6C42W3MB6/#SWUEZJ7AYL2LKLBXPYPMQQS6C42W3MB6" source="SUSE-SU"/>
    <description>
    The bfd_section_from_shdr function in elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (segmentation fault) via a large attribute section.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8945/">CVE-2018-8945 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8945">CVE-2018-8945 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1086608">SUSE bug 1086608</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009824624" comment="binutils-2.27-34.base.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009824625" comment="binutils-devel-2.27-34.base.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20188976" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-8976</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-8976" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8976" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-8976" ref_url="https://www.suse.com/security/cve/CVE-2018-8976" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:3598-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-October/025597.html" source="SUSE-SU"/>
    <description>
    In Exiv2 0.26, jpgimage.cpp allows remote attackers to cause a denial of service (image.cpp Exiv2::Internal::stringFormat out-of-bounds read) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8976/">CVE-2018-8976 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8976">CVE-2018-8976 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1086810">SUSE bug 1086810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826187" comment="exiv2-0.27.0-2.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826188" comment="exiv2-devel-0.27.0-2.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826189" comment="exiv2-doc-0.27.0-2.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826190" comment="exiv2-libs-0.27.0-2.el7_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20188977" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-8977</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-8977" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8977" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-8977" ref_url="https://www.suse.com/security/cve/CVE-2018-8977" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:3598-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-October/025597.html" source="SUSE-SU"/>
    <description>
    In Exiv2 0.26, the Exiv2::Internal::printCsLensFFFF function in canonmn_int.cpp allows remote attackers to cause a denial of service (invalid memory access) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8977/">CVE-2018-8977 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8977">CVE-2018-8977 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1086798">SUSE bug 1086798</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826187" comment="exiv2-0.27.0-2.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826188" comment="exiv2-devel-0.27.0-2.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826189" comment="exiv2-doc-0.27.0-2.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826190" comment="exiv2-libs-0.27.0-2.el7_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20189133" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-9133</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-9133" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9133" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-9133" ref_url="https://www.suse.com/security/cve/CVE-2018-9133" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004234.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1860-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U4T535MQXEFZP3FQMGJLWASIP2YK4CR6/#U4T535MQXEFZP3FQMGJLWASIP2YK4CR6" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.7-26 Q16 has excessive iteration in the DecodeLabImage and EncodeLabImage functions (coders/tiff.c), which results in a hang (tens of minutes) with a tiny PoC file. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted tiff file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-9133/">CVE-2018-9133 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9133">CVE-2018-9133 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1087820">SUSE bug 1087820</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827880" comment="ImageMagick-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827881" comment="ImageMagick-c++-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827882" comment="ImageMagick-c++-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827883" comment="ImageMagick-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827884" comment="ImageMagick-doc-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827885" comment="ImageMagick-perl-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827886" comment="autotrace-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827887" comment="autotrace-devel-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827888" comment="emacs-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827889" comment="emacs-common-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827890" comment="emacs-el-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827891" comment="emacs-filesystem-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827892" comment="emacs-nox-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827893" comment="emacs-terminal-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827894" comment="inkscape-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827895" comment="inkscape-docs-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827896" comment="inkscape-view-0.92.2-3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20189305" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-9305</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-9305" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9305" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-9305" ref_url="https://www.suse.com/security/cve/CVE-2018-9305" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006676.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0482-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U7X32HSPSOKHILGP4IPOOWMROAKSPGIY/" source="SUSE-SU"/>
    <description>
    In Exiv2 0.26, an out-of-bounds read in IptcData::printStructure in iptc.c could result in a crash or information leak, related to the "== 0x1c" case.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9305/">CVE-2018-9305 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9305">CVE-2018-9305 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1088424">SUSE bug 1088424</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826187" comment="exiv2-0.27.0-2.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826188" comment="exiv2-devel-0.27.0-2.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826189" comment="exiv2-doc-0.27.0-2.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826190" comment="exiv2-libs-0.27.0-2.el7_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20189363" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-9363</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-9363" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9363" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-9363" ref_url="https://www.suse.com/security/cve/CVE-2018-9363" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2539-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2738-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DX32XKZSPY6HCHEGEFNDB2BQLAVU6T6E/#DX32XKZSPY6HCHEGEFNDB2BQLAVU6T6E" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3071-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6GTFT5RXJ7J2RAR6KEKOT74XNNP3FJVH/#6GTFT5RXJ7J2RAR6KEKOT74XNNP3FJVH" source="SUSE-SU"/>
    <description>
    In the hidp_process_report in bluetooth, there is an integer overflow. This could lead to an out of bounds write with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-65853588 References: Upstream kernel.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-9363/">CVE-2018-9363 at SUSE</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9363">CVE-2018-9363 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105292">SUSE bug 1105292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105293">SUSE bug 1105293</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826007" comment="bpftool-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826008" comment="kernel-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826009" comment="kernel-abi-whitelists-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826010" comment="kernel-debug-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826013" comment="kernel-doc-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826014" comment="kernel-headers-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826015" comment="kernel-tools-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826016" comment="kernel-tools-libs-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826018" comment="perf-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826019" comment="python-perf-3.10.0-1062.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20189516" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-9516</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-9516" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9516" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-9516" ref_url="https://www.suse.com/security/cve/CVE-2018-9516" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3689-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3746-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13937-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3817-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EIAU4CLGWP7ZUAYRFQJAICKZ5P6PSBBK/#EIAU4CLGWP7ZUAYRFQJAICKZ5P6PSBBK" source="SUSE-SU"/>
    <description>
    In hid_debug_events_read of drivers/hid/hid-debug.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-71361580.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-07"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-9516/">CVE-2018-9516 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9516">CVE-2018-9516 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1108498">SUSE bug 1108498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123161">SUSE bug 1123161</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826007" comment="bpftool-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826008" comment="kernel-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826009" comment="kernel-abi-whitelists-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826010" comment="kernel-debug-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826013" comment="kernel-doc-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826014" comment="kernel-headers-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826015" comment="kernel-tools-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826016" comment="kernel-tools-libs-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826018" comment="perf-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826019" comment="python-perf-3.10.0-1062.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20189517" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-9517</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-9517" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9517" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-9517" ref_url="https://www.suse.com/security/cve/CVE-2018-9517" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3217-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-September/020289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0420-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2506-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029875.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
    <description>
    In pppol2tp_connect, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android kernel. Android ID: A-38159931.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-9517/">CVE-2018-9517 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9517">CVE-2018-9517 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1108488">SUSE bug 1108488</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826007" comment="bpftool-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826008" comment="kernel-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826009" comment="kernel-abi-whitelists-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826010" comment="kernel-debug-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826013" comment="kernel-doc-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826014" comment="kernel-headers-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826015" comment="kernel-tools-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826016" comment="kernel-tools-libs-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826018" comment="perf-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826019" comment="python-perf-3.10.0-1062.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20189568" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-9568</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-9568" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9568" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-9568" ref_url="https://www.suse.com/security/cve/CVE-2018-9568" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:4153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13937-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13979-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005194.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0065-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HZOAR52RMMAMPTGY2TTSFPEKREAVGPNY/#HZOAR52RMMAMPTGY2TTSFPEKREAVGPNY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0140-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YC36SIOXVJQS57WNCR7J2V2OWLPWEMTW/#YC36SIOXVJQS57WNCR7J2V2OWLPWEMTW" source="SUSE-SU"/>
    <description>
    In sk_clone_lock of sock.c, there is a possible memory corruption due to type confusion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android kernel. Android ID: A-113509306. References: Upstream kernel.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-9568/">CVE-2018-9568 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9568">CVE-2018-9568 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1118319">SUSE bug 1118319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118320">SUSE bug 1118320</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825602" comment="bpftool-3.10.0-957.10.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825603" comment="kernel-3.10.0-957.10.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825604" comment="kernel-abi-whitelists-3.10.0-957.10.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825605" comment="kernel-debug-3.10.0-957.10.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825608" comment="kernel-doc-3.10.0-957.10.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825609" comment="kernel-headers-3.10.0-957.10.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825610" comment="kernel-tools-3.10.0-957.10.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825611" comment="kernel-tools-libs-3.10.0-957.10.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825613" comment="perf-3.10.0-957.10.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825614" comment="python-perf-3.10.0-957.10.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20190154" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-0154</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-0154" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0154" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-0154" ref_url="https://www.suse.com/security/cve/CVE-2019-0154" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2946-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192946-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2503-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GT2JTOAOVM6XT2DFUS6CAXI4NAAVMRVR/#GT2JTOAOVM6XT2DFUS6CAXI4NAAVMRVR" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2507-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/45LLGKHM3X6KQJN67OZHE3KEGCRBVGEJ/#45LLGKHM3X6KQJN67OZHE3KEGCRBVGEJ" source="SUSE-SU"/>
    <description>
    Insufficient access control in subsystem for Intel (R) processor graphics in 6th, 7th, 8th and 9th Generation Intel(R) Core(TM) Processor Families; Intel(R) Pentium(R) Processor J, N, Silver and Gold Series; Intel(R) Celeron(R) Processor J, N, G3900 and G4900 Series; Intel(R) Atom(R) Processor A and E3900 Series; Intel(R) Xeon(R) Processor E3-1500 v5 and v6 and E-2100 Processor Families may allow an authenticated user to potentially enable denial of service via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-0154/">CVE-2019-0154 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0154">CVE-2019-0154 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1135966">SUSE bug 1135966</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181720">SUSE bug 1181720</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826733" comment="bpftool-3.10.0-1062.4.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826734" comment="kernel-3.10.0-1062.4.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826735" comment="kernel-abi-whitelists-3.10.0-1062.4.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826736" comment="kernel-debug-3.10.0-1062.4.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826739" comment="kernel-doc-3.10.0-1062.4.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826740" comment="kernel-headers-3.10.0-1062.4.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826741" comment="kernel-tools-3.10.0-1062.4.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826742" comment="kernel-tools-libs-3.10.0-1062.4.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826744" comment="perf-3.10.0-1062.4.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826745" comment="python-perf-3.10.0-1062.4.2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20190155" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-0155</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-0155" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0155" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-0155" ref_url="https://www.suse.com/security/cve/CVE-2019-0155" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2946-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192946-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007365.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2503-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GT2JTOAOVM6XT2DFUS6CAXI4NAAVMRVR/#GT2JTOAOVM6XT2DFUS6CAXI4NAAVMRVR" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2507-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/45LLGKHM3X6KQJN67OZHE3KEGCRBVGEJ/#45LLGKHM3X6KQJN67OZHE3KEGCRBVGEJ" source="SUSE-SU"/>
    <description>
    Insufficient access control in a subsystem for Intel (R) processor graphics in 6th, 7th, 8th and 9th Generation Intel(R) Core(TM) Processor Families; Intel(R) Pentium(R) Processor J, N, Silver and Gold Series; Intel(R) Celeron(R) Processor J, N, G3900 and G4900 Series; Intel(R) Atom(R) Processor A and E3900 Series; Intel(R) Xeon(R) Processor E3-1500 v5 and v6, E-2100 and E-2200 Processor Families; Intel(R) Graphics Driver for Windows before 26.20.100.6813 (DCH) or 26.20.100.6812 and before 21.20.x.5077 (aka15.45.5077), i915 Linux Driver for Intel(R) Processor Graphics before versions 5.4-rc7, 5.3.11, 4.19.84, 4.14.154, 4.9.201, 4.4.201 may allow an authenticated user to potentially enable escalation of privilege via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-0155/">CVE-2019-0155 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0155">CVE-2019-0155 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1135966">SUSE bug 1135966</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135967">SUSE bug 1135967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173663">SUSE bug 1173663</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826746" comment="bpftool-3.10.0-1062.4.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826747" comment="kernel-3.10.0-1062.4.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826748" comment="kernel-abi-whitelists-3.10.0-1062.4.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826749" comment="kernel-debug-3.10.0-1062.4.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826752" comment="kernel-doc-3.10.0-1062.4.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826753" comment="kernel-headers-3.10.0-1062.4.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826754" comment="kernel-tools-3.10.0-1062.4.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826755" comment="kernel-tools-libs-3.10.0-1062.4.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826757" comment="perf-3.10.0-1062.4.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826758" comment="python-perf-3.10.0-1062.4.3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20190160" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-0160</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-0160" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0160" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-0160" ref_url="https://www.suse.com/security/cve/CVE-2019-0160" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005268.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1172-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J6MT2HJ5QHVTLG5DOK6Y647K5FXKIIDP/#J6MT2HJ5QHVTLG5DOK6Y647K5FXKIIDP" source="SUSE-SU"/>
    <description>
    Buffer overflow in system firmware for EDK II may allow unauthenticated user to potentially enable escalation of privilege and/or denial of service via network access.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-0160/">CVE-2019-0160 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0160">CVE-2019-0160 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1130267">SUSE bug 1130267</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826217" comment="OVMF-20180508-6.gitee3198e672e2.el7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20190161" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-0161</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-0161" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0161" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-0161" ref_url="https://www.suse.com/security/cve/CVE-2019-0161" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1204-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20191204-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1352-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VEFMCCRZCRKIPIPKMJRYMISOUXAM4RWH/#VEFMCCRZCRKIPIPKMJRYMISOUXAM4RWH" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1425-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NAW64JEESR32NRDAJKUABDOOIV4E2SE4/#NAW64JEESR32NRDAJKUABDOOIV4E2SE4" source="SUSE-SU"/>
    <description>
    Stack overflow in XHCI for EDK II may allow an unauthenticated user to potentially enable denial of service via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-0161/">CVE-2019-0161 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0161">CVE-2019-0161 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1131361">SUSE bug 1131361</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826217" comment="OVMF-20180508-6.gitee3198e672e2.el7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20190217" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-0217</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-0217" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0217" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-0217" ref_url="https://www.suse.com/security/cve/CVE-2019-0217" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0888-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005303.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1190-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FDFK4HDIIBODNEBCEMSXMGNAT4V56ZSB/#FDFK4HDIIBODNEBCEMSXMGNAT4V56ZSB" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1209-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RNLNPLSIVUYNHELCO7GMIQ3KIORYAK6L/#RNLNPLSIVUYNHELCO7GMIQ3KIORYAK6L" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1258-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SOYY34KTSZJH4WOLOBYSCK7RBN7SVB2F/#SOYY34KTSZJH4WOLOBYSCK7RBN7SVB2F" source="SUSE-SU"/>
    <description>
    In Apache HTTP Server 2.4 release 2.4.38 and prior, a race condition in mod_auth_digest when running in a threaded server could allow a user with valid credentials to authenticate using another username, bypassing configured access control restrictions.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-0217/">CVE-2019-0217 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0217">CVE-2019-0217 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1131239">SUSE bug 1131239</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826578" comment="httpd-2.4.6-90.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826579" comment="httpd-devel-2.4.6-90.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826580" comment="httpd-manual-2.4.6-90.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826581" comment="httpd-tools-2.4.6-90.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826582" comment="mod_ldap-2.4.6-90.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826583" comment="mod_proxy_html-2.4.6-90.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826584" comment="mod_session-2.4.6-90.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826585" comment="mod_ssl-2.4.6-90.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20190220" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-0220</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-0220" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0220" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-0220" ref_url="https://www.suse.com/security/cve/CVE-2019-0220" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0888-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005303.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1190-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FDFK4HDIIBODNEBCEMSXMGNAT4V56ZSB/#FDFK4HDIIBODNEBCEMSXMGNAT4V56ZSB" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1209-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RNLNPLSIVUYNHELCO7GMIQ3KIORYAK6L/#RNLNPLSIVUYNHELCO7GMIQ3KIORYAK6L" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1258-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SOYY34KTSZJH4WOLOBYSCK7RBN7SVB2F/#SOYY34KTSZJH4WOLOBYSCK7RBN7SVB2F" source="SUSE-SU"/>
    <description>
    A vulnerability was found in Apache HTTP Server 2.4.0 to 2.4.38. When the path component of a request URL contains multiple consecutive slashes ('/'), directives such as LocationMatch and RewriteRule must account for duplicates in regular expressions while other aspects of the servers processing will implicitly collapse them.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-0220/">CVE-2019-0220 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0220">CVE-2019-0220 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1131241">SUSE bug 1131241</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826578" comment="httpd-2.4.6-90.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826579" comment="httpd-devel-2.4.6-90.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826580" comment="httpd-manual-2.4.6-90.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826581" comment="httpd-tools-2.4.6-90.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826582" comment="mod_ldap-2.4.6-90.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826583" comment="mod_proxy_html-2.4.6-90.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826584" comment="mod_session-2.4.6-90.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826585" comment="mod_ssl-2.4.6-90.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20190816" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-0816</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-0816" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0816" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-0816" ref_url="https://www.suse.com/security/cve/CVE-2019-0816" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006198.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3097-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193097-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006212.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2633-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BTJ6XBYKM5GEQXOHG36W55QBQGBBSDPD/#BTJ6XBYKM5GEQXOHG36W55QBQGBBSDPD" source="SUSE-SU"/>
    <description>
    A security feature bypass exists in Azure SSH Keypairs, due to a change in the provisioning logic for some Linux images that use cloud-init, aka 'Azure SSH Keypairs Security Feature Bypass Vulnerability'.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-0816/">CVE-2019-0816 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0816">CVE-2019-0816 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1129124">SUSE bug 1129124</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825615" comment="cloud-init-18.2-1.el7_6.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20191000019" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-1000019</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-1000019" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1000019" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-1000019" ref_url="https://www.suse.com/security/cve/CVE-2019-1000019" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006196.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1196-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TIJ7ZTUCNAB4P5RGZHQDF4OC3WRSBWO4/#TIJ7ZTUCNAB4P5RGZHQDF4OC3WRSBWO4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2615-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U6XQ3DWFEKK5LGAFI7F4YVSON52JVUJE/#U6XQ3DWFEKK5LGAFI7F4YVSON52JVUJE" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2632-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BCNN5SKOY4P2IA35RL7MCURKXTITD75T/#BCNN5SKOY4P2IA35RL7MCURKXTITD75T" source="SUSE-SU"/>
    <description>
    libarchive version commit bf9aec176c6748f0ee7a678c5f9f9555b9a757c1 onwards (release v3.0.2 onwards) contains a CWE-125: Out-of-bounds Read vulnerability in 7zip decompression, archive_read_support_format_7zip.c, header_bytes() that can result in a crash (denial of service). This attack appears to be exploitable via the victim opening a specially crafted 7zip file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-1000019/">CVE-2019-1000019 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1000019">CVE-2019-1000019 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1124341">SUSE bug 1124341</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826557" comment="bsdcpio-3.1.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826558" comment="bsdtar-3.1.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826559" comment="libarchive-3.1.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826560" comment="libarchive-devel-3.1.2-12.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20191000020" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-1000020</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-1000020" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1000020" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-1000020" ref_url="https://www.suse.com/security/cve/CVE-2019-1000020" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006196.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1196-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TIJ7ZTUCNAB4P5RGZHQDF4OC3WRSBWO4/#TIJ7ZTUCNAB4P5RGZHQDF4OC3WRSBWO4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2615-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U6XQ3DWFEKK5LGAFI7F4YVSON52JVUJE/#U6XQ3DWFEKK5LGAFI7F4YVSON52JVUJE" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2632-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BCNN5SKOY4P2IA35RL7MCURKXTITD75T/#BCNN5SKOY4P2IA35RL7MCURKXTITD75T" source="SUSE-SU"/>
    <description>
    libarchive version commit 5a98dcf8a86364b3c2c469c85b93647dfb139961 onwards (version v2.8.0 onwards) contains a CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') vulnerability in ISO9660 parser, archive_read_support_format_iso9660.c, read_CE()/parse_rockridge() that can result in DoS by infinite loop. This attack appears to be exploitable via the victim opening a specially crafted ISO9660 file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-1000020/">CVE-2019-1000020 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1000020">CVE-2019-1000020 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1124342">SUSE bug 1124342</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826557" comment="bsdcpio-3.1.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826558" comment="bsdtar-3.1.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826559" comment="libarchive-3.1.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826560" comment="libarchive-devel-3.1.2-12.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910063" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10063</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10063" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10063" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10063" ref_url="https://www.suse.com/security/cve/CVE-2019-10063" source="SUSE CVE"/>
    <description>
    Flatpak before 1.0.8, 1.1.x and 1.2.x before 1.2.4, and 1.3.x before 1.3.1 allows a sandbox bypass. Flatpak versions since 0.8.1 address CVE-2017-5226 by using a seccomp filter to prevent sandboxed apps from using the TIOCSTI ioctl, which could otherwise be used to inject commands into the controlling terminal so that they would be executed outside the sandbox after the sandboxed app exits. This fix was incomplete: on 64-bit platforms, the seccomp filter could be bypassed by an ioctl request number that has TIOCSTI in its 32 least significant bits and an arbitrary nonzero value in its 32 most significant bits, which the Linux kernel would treat as equivalent to TIOCSTI.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10063/">CVE-2019-10063 at SUSE</cve>
	<cve impact="critical" cvss3="9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10063">CVE-2019-10063 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1130637">SUSE bug 1130637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133041">SUSE bug 1133041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133043">SUSE bug 1133043</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825706" comment="flatpak-1.0.2-5.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825707" comment="flatpak-builder-1.0.0-5.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825708" comment="flatpak-devel-1.0.2-5.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825709" comment="flatpak-libs-1.0.2-5.el7_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910086" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10086</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10086" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10086" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10086" ref_url="https://www.suse.com/security/cve/CVE-2019-10086" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:9318" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005858.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZY7XA5ODCMNPHIE2KXBFLLPP6RFCHE62/#ZY7XA5ODCMNPHIE2KXBFLLPP6RFCHE62" source="SUSE-SU"/>
    <description>
    In Apache Commons Beanutils 1.9.2, a special BeanIntrospector class was added which allows suppressing the ability for an attacker to access the classloader via the class property available on all Java objects. We, however were not using this by default characteristic of the PropertyUtilsBean.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-10-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-10086/">CVE-2019-10086 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10086">CVE-2019-10086 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1146657">SUSE bug 1146657</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826842" comment="apache-commons-beanutils-1.8.3-15.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826843" comment="apache-commons-beanutils-javadoc-1.8.3-15.el7_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910098" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10098</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10098" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10098" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10098" ref_url="https://www.suse.com/security/cve/CVE-2019-10098" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:25-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2329-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005889.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2051-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2PR3ITGMIPGWWX4VYKKICQKSZVW5QUW3/#2PR3ITGMIPGWWX4VYKKICQKSZVW5QUW3" source="SUSE-SU"/>
    <description>
    In Apache HTTP server 2.4.0 to 2.4.39, Redirects configured with mod_rewrite that were intended to be self-referential might be fooled by encoded newlines and redirect instead to an unexpected URL within the request URL.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-01-30"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-10098/">CVE-2019-10098 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10098">CVE-2019-10098 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1145738">SUSE bug 1145738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168407">SUSE bug 1168407</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828309" comment="httpd-2.4.6-95.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828310" comment="httpd-devel-2.4.6-95.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828311" comment="httpd-manual-2.4.6-95.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828312" comment="httpd-tools-2.4.6-95.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828313" comment="mod_ldap-2.4.6-95.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828314" comment="mod_proxy_html-2.4.6-95.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828315" comment="mod_session-2.4.6-95.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828316" comment="mod_ssl-2.4.6-95.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20191010238" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-1010238</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-1010238" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010238" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-1010238" ref_url="https://www.suse.com/security/cve/CVE-2019-1010238" source="SUSE CVE"/>
    <description>
    Gnome Pango 1.42 and later is affected by: Buffer Overflow. The impact is: The heap based buffer overflow can be used to get code execution. The component is: function name: pango_log2vis_get_embedding_levels, assignment of nchars and the loop condition. The attack vector is: Bug can be used when application pass invalid utf-8 strings to functions like pango_itemize.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-1010238/">CVE-2019-1010238 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1010238">CVE-2019-1010238 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1142332">SUSE bug 1142332</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826592" comment="pango-1.42.4-4.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826593" comment="pango-devel-1.42.4-4.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826594" comment="pango-tests-1.42.4-4.el7_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20191010305" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-1010305</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-1010305" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010305" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-1010305" ref_url="https://www.suse.com/security/cve/CVE-2019-1010305" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007450.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0746-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S6T5SQLZ2AFX7P4RLGAUWJ7UXHA563FA/" source="SUSE-SU"/>
    <description>
    libmspack 0.9.1alpha is affected by: Buffer Overflow. The impact is: Information Disclosure. The component is: function chmd_read_headers() in libmspack(file libmspack/mspack/chmd.c). The attack vector is: the victim must open a specially crafted chm file. The fixed version is: after commit 2f084136cfe0d05e5bf5703f3e83c6d955234b4d.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1010305/">CVE-2019-1010305 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1010305">CVE-2019-1010305 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1141680">SUSE bug 1141680</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828107" comment="libmspack-0.5-0.8.alpha.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828108" comment="libmspack-devel-0.5-0.8.alpha.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910126" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10126</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10126" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10126" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10126" ref_url="https://www.suse.com/security/cve/CVE-2019-10126" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1823-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1851-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20191851-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1852-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20191852-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005958.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1716-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HJXAHNWJ4IAQN4V6E2PEXAAFMQPYBBPT/#HJXAHNWJ4IAQN4V6E2PEXAAFMQPYBBPT" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1757-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PJTYGHQOYDY2SFDAAFYO3E3URRCWKEUQ/#PJTYGHQOYDY2SFDAAFYO3E3URRCWKEUQ" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel. A heap based buffer overflow in mwifiex_uap_parse_tail_ies function in drivers/net/wireless/marvell/mwifiex/ie.c might lead to memory corruption and possibly other consequences.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10126/">CVE-2019-10126 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10126">CVE-2019-10126 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1136935">SUSE bug 1136935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137944">SUSE bug 1137944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142129">SUSE bug 1142129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156330">SUSE bug 1156330</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826650" comment="bpftool-3.10.0-1062.4.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826651" comment="kernel-3.10.0-1062.4.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826652" comment="kernel-abi-whitelists-3.10.0-1062.4.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826653" comment="kernel-debug-3.10.0-1062.4.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826656" comment="kernel-doc-3.10.0-1062.4.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826657" comment="kernel-headers-3.10.0-1062.4.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826658" comment="kernel-tools-3.10.0-1062.4.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826659" comment="kernel-tools-libs-3.10.0-1062.4.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826661" comment="perf-3.10.0-1062.4.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826662" comment="python-perf-3.10.0-1062.4.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910131" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10131</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10131" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10131" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10131" ref_url="https://www.suse.com/security/cve/CVE-2019-10131" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005633.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1427-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UBUZR3576DV3VPWDFVH5GABOZQEL2WTM/#UBUZR3576DV3VPWDFVH5GABOZQEL2WTM" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1683-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R7HRSDXPTVPKGAJNZBJCGV43DVFXWCDB/#R7HRSDXPTVPKGAJNZBJCGV43DVFXWCDB" source="SUSE-SU"/>
    <description>
    An off-by-one read vulnerability was discovered in ImageMagick before version 7.0.7-28 in the formatIPTCfromBuffer function in coders/meta.c. A local attacker may use this flaw to read beyond the end of the buffer or to crash the program.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10131/">CVE-2019-10131 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10131">CVE-2019-10131 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1134075">SUSE bug 1134075</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827880" comment="ImageMagick-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827881" comment="ImageMagick-c++-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827882" comment="ImageMagick-c++-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827883" comment="ImageMagick-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827884" comment="ImageMagick-doc-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827885" comment="ImageMagick-perl-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827886" comment="autotrace-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827887" comment="autotrace-devel-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827888" comment="emacs-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827889" comment="emacs-common-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827890" comment="emacs-el-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827891" comment="emacs-filesystem-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827892" comment="emacs-nox-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827893" comment="emacs-terminal-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827894" comment="inkscape-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827895" comment="inkscape-docs-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827896" comment="inkscape-view-0.92.2-3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910132" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10132</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10132" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10132" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10132" ref_url="https://www.suse.com/security/cve/CVE-2019-10132" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005555.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in libvirt &gt;= 4.1.0 in the virtlockd-admin.socket and virtlogd-admin.socket systemd units. A missing SocketMode configuration parameter allows any user on the host to connect using virtlockd-admin-sock or virtlogd-admin-sock and perform administrative tasks against the virtlockd and virtlogd daemons.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-10132/">CVE-2019-10132 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10132">CVE-2019-10132 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1134348">SUSE bug 1134348</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825786" comment="libvirt-4.5.0-10.el7_6.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825787" comment="libvirt-admin-4.5.0-10.el7_6.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825788" comment="libvirt-bash-completion-4.5.0-10.el7_6.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825789" comment="libvirt-client-4.5.0-10.el7_6.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825790" comment="libvirt-daemon-4.5.0-10.el7_6.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825791" comment="libvirt-daemon-config-network-4.5.0-10.el7_6.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825792" comment="libvirt-daemon-config-nwfilter-4.5.0-10.el7_6.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825793" comment="libvirt-daemon-driver-interface-4.5.0-10.el7_6.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825794" comment="libvirt-daemon-driver-lxc-4.5.0-10.el7_6.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825795" comment="libvirt-daemon-driver-network-4.5.0-10.el7_6.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825796" comment="libvirt-daemon-driver-nodedev-4.5.0-10.el7_6.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825797" comment="libvirt-daemon-driver-nwfilter-4.5.0-10.el7_6.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825798" comment="libvirt-daemon-driver-qemu-4.5.0-10.el7_6.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825799" comment="libvirt-daemon-driver-secret-4.5.0-10.el7_6.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825800" comment="libvirt-daemon-driver-storage-4.5.0-10.el7_6.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825801" comment="libvirt-daemon-driver-storage-core-4.5.0-10.el7_6.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825802" comment="libvirt-daemon-driver-storage-disk-4.5.0-10.el7_6.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825803" comment="libvirt-daemon-driver-storage-gluster-4.5.0-10.el7_6.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825804" comment="libvirt-daemon-driver-storage-iscsi-4.5.0-10.el7_6.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825805" comment="libvirt-daemon-driver-storage-logical-4.5.0-10.el7_6.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825806" comment="libvirt-daemon-driver-storage-mpath-4.5.0-10.el7_6.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825807" comment="libvirt-daemon-driver-storage-rbd-4.5.0-10.el7_6.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825808" comment="libvirt-daemon-driver-storage-scsi-4.5.0-10.el7_6.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825809" comment="libvirt-daemon-kvm-4.5.0-10.el7_6.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825810" comment="libvirt-daemon-lxc-4.5.0-10.el7_6.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825811" comment="libvirt-devel-4.5.0-10.el7_6.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825812" comment="libvirt-docs-4.5.0-10.el7_6.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825813" comment="libvirt-libs-4.5.0-10.el7_6.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825814" comment="libvirt-lock-sanlock-4.5.0-10.el7_6.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825815" comment="libvirt-login-shell-4.5.0-10.el7_6.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825816" comment="libvirt-nss-4.5.0-10.el7_6.10 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910143" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10143</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10143" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10143" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10143" ref_url="https://www.suse.com/security/cve/CVE-2019-10143" source="SUSE CVE"/>
    <description>
    It was discovered freeradius up to and including version 3.0.19 does not correctly configure logrotate, allowing a local attacker who already has control of the radiusd user to escalate his privileges to root, by tricking logrotate into writing a radiusd-writable file to a directory normally inaccessible by the radiusd user. NOTE: the upstream software maintainer has stated "there is simply no way for anyone to gain privileges through this alleged issue."
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10143/">CVE-2019-10143 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10143">CVE-2019-10143 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1136195">SUSE bug 1136195</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828391" comment="freeradius-3.0.13-15.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828392" comment="freeradius-devel-3.0.13-15.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828393" comment="freeradius-doc-3.0.13-15.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828394" comment="freeradius-krb5-3.0.13-15.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828395" comment="freeradius-ldap-3.0.13-15.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828396" comment="freeradius-mysql-3.0.13-15.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828397" comment="freeradius-perl-3.0.13-15.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828398" comment="freeradius-postgresql-3.0.13-15.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828399" comment="freeradius-python-3.0.13-15.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828400" comment="freeradius-sqlite-3.0.13-15.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828401" comment="freeradius-unixODBC-3.0.13-15.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828402" comment="freeradius-utils-3.0.13-15.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910146" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10146</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10146" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10146" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10146" ref_url="https://www.suse.com/security/cve/CVE-2019-10146" source="SUSE CVE"/>
    <description>
    A Reflected Cross Site Scripting flaw was found in all pki-core 10.x.x versions module from the pki-core server due to the CA Agent Service not properly sanitizing the certificate request page. An attacker could inject a specially crafted value that will be executed on the victim's browser.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-10146/">CVE-2019-10146 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10146">CVE-2019-10146 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828983" comment="pki-base-10.5.18-12.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828984" comment="pki-base-java-10.5.18-12.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828985" comment="pki-ca-10.5.18-12.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828986" comment="pki-javadoc-10.5.18-12.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828987" comment="pki-kra-10.5.18-12.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828988" comment="pki-server-10.5.18-12.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828989" comment="pki-symkey-10.5.18-12.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828990" comment="pki-tools-10.5.18-12.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910153" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10153</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10153" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10153" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10153" ref_url="https://www.suse.com/security/cve/CVE-2019-10153" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005692.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1719-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QBMIWV3Z4Y5FMJQXC37XDU4J3BYSDSLX/#QBMIWV3Z4Y5FMJQXC37XDU4J3BYSDSLX" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1751-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T2WC3SGXDOOFZDF2R7MCBDQ2Y2EPLUO5/#T2WC3SGXDOOFZDF2R7MCBDQ2Y2EPLUO5" source="SUSE-SU"/>
    <description>
    A flaw was discovered in fence-agents, prior to version 4.3.4, where using non-ASCII characters in a guest VM's comment or other fields would cause fence_rhevm to exit with an exception. In cluster environments, this could lead to preventing automated recovery or otherwise denying service to clusters of which that VM is a member.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10153/">CVE-2019-10153 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10153">CVE-2019-10153 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1137314">SUSE bug 1137314</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826029" comment="fence-agents-aliyun-4.2.1-24.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826030" comment="fence-agents-all-4.2.1-24.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826031" comment="fence-agents-amt-ws-4.2.1-24.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826032" comment="fence-agents-apc-4.2.1-24.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826033" comment="fence-agents-apc-snmp-4.2.1-24.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826034" comment="fence-agents-aws-4.2.1-24.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826035" comment="fence-agents-azure-arm-4.2.1-24.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826036" comment="fence-agents-bladecenter-4.2.1-24.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826037" comment="fence-agents-brocade-4.2.1-24.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826038" comment="fence-agents-cisco-mds-4.2.1-24.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826039" comment="fence-agents-cisco-ucs-4.2.1-24.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826040" comment="fence-agents-common-4.2.1-24.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826041" comment="fence-agents-compute-4.2.1-24.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826042" comment="fence-agents-drac5-4.2.1-24.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826043" comment="fence-agents-eaton-snmp-4.2.1-24.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826044" comment="fence-agents-emerson-4.2.1-24.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826045" comment="fence-agents-eps-4.2.1-24.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826046" comment="fence-agents-gce-4.2.1-24.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826047" comment="fence-agents-heuristics-ping-4.2.1-24.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826048" comment="fence-agents-hpblade-4.2.1-24.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826049" comment="fence-agents-ibmblade-4.2.1-24.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826050" comment="fence-agents-ifmib-4.2.1-24.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826051" comment="fence-agents-ilo-moonshot-4.2.1-24.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826052" comment="fence-agents-ilo-mp-4.2.1-24.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826053" comment="fence-agents-ilo-ssh-4.2.1-24.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826054" comment="fence-agents-ilo2-4.2.1-24.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826055" comment="fence-agents-intelmodular-4.2.1-24.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826056" comment="fence-agents-ipdu-4.2.1-24.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826057" comment="fence-agents-ipmilan-4.2.1-24.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826058" comment="fence-agents-kdump-4.2.1-24.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826059" comment="fence-agents-mpath-4.2.1-24.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826060" comment="fence-agents-redfish-4.2.1-24.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826061" comment="fence-agents-rhevm-4.2.1-24.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826062" comment="fence-agents-rsa-4.2.1-24.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826063" comment="fence-agents-rsb-4.2.1-24.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826064" comment="fence-agents-sbd-4.2.1-24.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826065" comment="fence-agents-scsi-4.2.1-24.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826066" comment="fence-agents-virsh-4.2.1-24.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826067" comment="fence-agents-vmware-rest-4.2.1-24.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826068" comment="fence-agents-vmware-soap-4.2.1-24.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826069" comment="fence-agents-wti-4.2.1-24.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910160" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10160</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10160" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10160" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10160" ref_url="https://www.suse.com/security/cve/CVE-2019-10160" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2053-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005783.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006445.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1906-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PUN2FYU6IS24OA6WO4U6AZW3MIX2AM5Y/#PUN2FYU6IS24OA6WO4U6AZW3MIX2AM5Y" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0086-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SRKGGFVSV7DDWCMAOSO6E3F66U2CF5XR/" source="SUSE-SU"/>
    <description>
    A security regression of CVE-2019-9636 was discovered in python since commit d537ab0ff9767ef024f26246899728f0116b1ec3 affecting versions 2.7, 3.5, 3.6, 3.7 and from v3.8.0a4 through v3.8.0b1, which still allows an attacker to exploit CVE-2019-9636 by abusing the user and password parts of a URL. When an application parses user-supplied URLs to store cookies, authentication credentials, or other kind of information, it is possible for an attacker to provide specially crafted URLs to make the application locate host-related information (e.g. cookies, authentication data) and send them to a different host than where it should, unlike if the URLs had been correctly parsed. The result of an attack may vary based on the application.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-24"/>
	<severity>Important</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10160/">CVE-2019-10160 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10160">CVE-2019-10160 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1138459">SUSE bug 1138459</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825877" comment="python-2.7.5-80.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825878" comment="python-debug-2.7.5-80.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825879" comment="python-devel-2.7.5-80.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825880" comment="python-libs-2.7.5-80.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825881" comment="python-test-2.7.5-80.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825882" comment="python-tools-2.7.5-80.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825883" comment="tkinter-2.7.5-80.el7_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910161" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10161</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10161" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10161" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10161" ref_url="https://www.suse.com/security/cve/CVE-2019-10161" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005613.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005628.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005629.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005809.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2227-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2227-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005908.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1672-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EX33W6SJQ2N6Y4VRWHLRPU5IT2Q2GTSQ/#EX33W6SJQ2N6Y4VRWHLRPU5IT2Q2GTSQ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1753-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TBD5ULGUEZL4TZRROZSNLPUISO6DF45I/#TBD5ULGUEZL4TZRROZSNLPUISO6DF45I" source="SUSE-SU"/>
    <description>
    It was discovered that libvirtd before versions 4.10.1 and 5.4.1 would permit read-only clients to use the virDomainSaveImageGetXMLDesc() API, specifying an arbitrary path which would be accessed with the permissions of the libvirtd process. An attacker with access to the libvirtd socket could use this to probe the existence of arbitrary files, cause denial of service or cause libvirtd to execute arbitrary programs.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10161/">CVE-2019-10161 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10161">CVE-2019-10161 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1138301">SUSE bug 1138301</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825846" comment="libvirt-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825847" comment="libvirt-admin-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825848" comment="libvirt-bash-completion-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825849" comment="libvirt-client-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825850" comment="libvirt-daemon-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825851" comment="libvirt-daemon-config-network-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825852" comment="libvirt-daemon-config-nwfilter-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825853" comment="libvirt-daemon-driver-interface-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825854" comment="libvirt-daemon-driver-lxc-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825855" comment="libvirt-daemon-driver-network-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825856" comment="libvirt-daemon-driver-nodedev-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825857" comment="libvirt-daemon-driver-nwfilter-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825858" comment="libvirt-daemon-driver-qemu-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825859" comment="libvirt-daemon-driver-secret-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825860" comment="libvirt-daemon-driver-storage-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825861" comment="libvirt-daemon-driver-storage-core-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825862" comment="libvirt-daemon-driver-storage-disk-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825863" comment="libvirt-daemon-driver-storage-gluster-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825864" comment="libvirt-daemon-driver-storage-iscsi-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825865" comment="libvirt-daemon-driver-storage-logical-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825866" comment="libvirt-daemon-driver-storage-mpath-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825867" comment="libvirt-daemon-driver-storage-rbd-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825868" comment="libvirt-daemon-driver-storage-scsi-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825869" comment="libvirt-daemon-kvm-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825870" comment="libvirt-daemon-lxc-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825871" comment="libvirt-devel-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825872" comment="libvirt-docs-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825873" comment="libvirt-libs-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825874" comment="libvirt-lock-sanlock-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825875" comment="libvirt-login-shell-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825876" comment="libvirt-nss-4.5.0-10.el7_6.12 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10166</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10166" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10166" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10166" ref_url="https://www.suse.com/security/cve/CVE-2019-10166" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005615.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1672-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EX33W6SJQ2N6Y4VRWHLRPU5IT2Q2GTSQ/#EX33W6SJQ2N6Y4VRWHLRPU5IT2Q2GTSQ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1753-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TBD5ULGUEZL4TZRROZSNLPUISO6DF45I/#TBD5ULGUEZL4TZRROZSNLPUISO6DF45I" source="SUSE-SU"/>
    <description>
    It was discovered that libvirtd, versions 4.x.x before 4.10.1 and 5.x.x before 5.4.1, would permit readonly clients to use the virDomainManagedSaveDefineXML() API, which would permit them to modify managed save state files. If a managed save had already been created by a privileged user, a local attacker could modify this file such that libvirtd would execute an arbitrary program when the domain was resumed.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10166/">CVE-2019-10166 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10166">CVE-2019-10166 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1138302">SUSE bug 1138302</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825846" comment="libvirt-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825847" comment="libvirt-admin-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825848" comment="libvirt-bash-completion-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825849" comment="libvirt-client-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825850" comment="libvirt-daemon-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825851" comment="libvirt-daemon-config-network-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825852" comment="libvirt-daemon-config-nwfilter-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825853" comment="libvirt-daemon-driver-interface-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825854" comment="libvirt-daemon-driver-lxc-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825855" comment="libvirt-daemon-driver-network-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825856" comment="libvirt-daemon-driver-nodedev-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825857" comment="libvirt-daemon-driver-nwfilter-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825858" comment="libvirt-daemon-driver-qemu-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825859" comment="libvirt-daemon-driver-secret-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825860" comment="libvirt-daemon-driver-storage-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825861" comment="libvirt-daemon-driver-storage-core-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825862" comment="libvirt-daemon-driver-storage-disk-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825863" comment="libvirt-daemon-driver-storage-gluster-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825864" comment="libvirt-daemon-driver-storage-iscsi-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825865" comment="libvirt-daemon-driver-storage-logical-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825866" comment="libvirt-daemon-driver-storage-mpath-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825867" comment="libvirt-daemon-driver-storage-rbd-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825868" comment="libvirt-daemon-driver-storage-scsi-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825869" comment="libvirt-daemon-kvm-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825870" comment="libvirt-daemon-lxc-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825871" comment="libvirt-devel-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825872" comment="libvirt-docs-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825873" comment="libvirt-libs-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825874" comment="libvirt-lock-sanlock-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825875" comment="libvirt-login-shell-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825876" comment="libvirt-nss-4.5.0-10.el7_6.12 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910167" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10167</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10167" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10167" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10167" ref_url="https://www.suse.com/security/cve/CVE-2019-10167" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005628.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005809.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2227-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2227-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005908.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1672-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EX33W6SJQ2N6Y4VRWHLRPU5IT2Q2GTSQ/#EX33W6SJQ2N6Y4VRWHLRPU5IT2Q2GTSQ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1753-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TBD5ULGUEZL4TZRROZSNLPUISO6DF45I/#TBD5ULGUEZL4TZRROZSNLPUISO6DF45I" source="SUSE-SU"/>
    <description>
    The virConnectGetDomainCapabilities() libvirt API, versions 4.x.x before 4.10.1 and 5.x.x before 5.4.1, accepts an "emulatorbin" argument to specify the program providing emulation for a domain. Since v1.2.19, libvirt will execute that program to probe the domain's capabilities. Read-only clients could specify an arbitrary path for this argument, causing libvirtd to execute a crafted executable with its own privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10167/">CVE-2019-10167 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10167">CVE-2019-10167 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1138303">SUSE bug 1138303</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825846" comment="libvirt-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825847" comment="libvirt-admin-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825848" comment="libvirt-bash-completion-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825849" comment="libvirt-client-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825850" comment="libvirt-daemon-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825851" comment="libvirt-daemon-config-network-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825852" comment="libvirt-daemon-config-nwfilter-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825853" comment="libvirt-daemon-driver-interface-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825854" comment="libvirt-daemon-driver-lxc-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825855" comment="libvirt-daemon-driver-network-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825856" comment="libvirt-daemon-driver-nodedev-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825857" comment="libvirt-daemon-driver-nwfilter-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825858" comment="libvirt-daemon-driver-qemu-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825859" comment="libvirt-daemon-driver-secret-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825860" comment="libvirt-daemon-driver-storage-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825861" comment="libvirt-daemon-driver-storage-core-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825862" comment="libvirt-daemon-driver-storage-disk-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825863" comment="libvirt-daemon-driver-storage-gluster-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825864" comment="libvirt-daemon-driver-storage-iscsi-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825865" comment="libvirt-daemon-driver-storage-logical-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825866" comment="libvirt-daemon-driver-storage-mpath-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825867" comment="libvirt-daemon-driver-storage-rbd-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825868" comment="libvirt-daemon-driver-storage-scsi-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825869" comment="libvirt-daemon-kvm-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825870" comment="libvirt-daemon-lxc-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825871" comment="libvirt-devel-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825872" comment="libvirt-docs-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825873" comment="libvirt-libs-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825874" comment="libvirt-lock-sanlock-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825875" comment="libvirt-login-shell-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825876" comment="libvirt-nss-4.5.0-10.el7_6.12 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910168" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10168</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10168" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10168" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10168" ref_url="https://www.suse.com/security/cve/CVE-2019-10168" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005615.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1753-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TBD5ULGUEZL4TZRROZSNLPUISO6DF45I/#TBD5ULGUEZL4TZRROZSNLPUISO6DF45I" source="SUSE-SU"/>
    <description>
    The virConnectBaselineHypervisorCPU() and virConnectCompareHypervisorCPU() libvirt APIs, 4.x.x before 4.10.1 and 5.x.x before 5.4.1, accept an "emulator" argument to specify the program providing emulation for a domain. Since v1.2.19, libvirt will execute that program to probe the domain's capabilities. Read-only clients could specify an arbitrary path for this argument, causing libvirtd to execute a crafted executable with its own privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10168/">CVE-2019-10168 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10168">CVE-2019-10168 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1138305">SUSE bug 1138305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138582">SUSE bug 1138582</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825846" comment="libvirt-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825847" comment="libvirt-admin-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825848" comment="libvirt-bash-completion-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825849" comment="libvirt-client-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825850" comment="libvirt-daemon-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825851" comment="libvirt-daemon-config-network-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825852" comment="libvirt-daemon-config-nwfilter-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825853" comment="libvirt-daemon-driver-interface-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825854" comment="libvirt-daemon-driver-lxc-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825855" comment="libvirt-daemon-driver-network-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825856" comment="libvirt-daemon-driver-nodedev-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825857" comment="libvirt-daemon-driver-nwfilter-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825858" comment="libvirt-daemon-driver-qemu-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825859" comment="libvirt-daemon-driver-secret-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825860" comment="libvirt-daemon-driver-storage-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825861" comment="libvirt-daemon-driver-storage-core-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825862" comment="libvirt-daemon-driver-storage-disk-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825863" comment="libvirt-daemon-driver-storage-gluster-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825864" comment="libvirt-daemon-driver-storage-iscsi-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825865" comment="libvirt-daemon-driver-storage-logical-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825866" comment="libvirt-daemon-driver-storage-mpath-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825867" comment="libvirt-daemon-driver-storage-rbd-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825868" comment="libvirt-daemon-driver-storage-scsi-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825869" comment="libvirt-daemon-kvm-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825870" comment="libvirt-daemon-lxc-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825871" comment="libvirt-devel-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825872" comment="libvirt-docs-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825873" comment="libvirt-libs-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825874" comment="libvirt-lock-sanlock-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825875" comment="libvirt-login-shell-4.5.0-10.el7_6.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825876" comment="libvirt-nss-4.5.0-10.el7_6.12 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910179" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10179</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10179" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10179" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10179" ref_url="https://www.suse.com/security/cve/CVE-2019-10179" source="SUSE CVE"/>
    <description>
    A vulnerability was found in all pki-core 10.x.x versions, where the Key Recovery Authority (KRA) Agent Service did not properly sanitize recovery request search page, enabling a Reflected Cross Site Scripting (XSS) vulnerability. An attacker could trick an authenticated victim into executing specially crafted Javascript code.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-10179/">CVE-2019-10179 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10179">CVE-2019-10179 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828983" comment="pki-base-10.5.18-12.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828984" comment="pki-base-java-10.5.18-12.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828985" comment="pki-ca-10.5.18-12.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828986" comment="pki-javadoc-10.5.18-12.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828987" comment="pki-kra-10.5.18-12.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828988" comment="pki-server-10.5.18-12.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828989" comment="pki-symkey-10.5.18-12.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828990" comment="pki-tools-10.5.18-12.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910181" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10181</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10181" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10181" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10181" ref_url="https://www.suse.com/security/cve/CVE-2019-10181" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010747.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1911-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TWXDTQ55XR63SPXVSZQDDIRRJUKGOCDE/#TWXDTQ55XR63SPXVSZQDDIRRJUKGOCDE" source="SUSE-SU"/>
    <description>
    It was found that in icedtea-web up to and including 1.7.2 and 1.8.2 executable code could be injected in a JAR file without compromising the signature verification. An attacker could use this flaw to inject code in a trusted JAR. The code would be executed inside the sandbox.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10181/">CVE-2019-10181 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10181">CVE-2019-10181 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1142835">SUSE bug 1142835</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825967" comment="icedtea-web-1.7.1-2.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825968" comment="icedtea-web-devel-1.7.1-2.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825969" comment="icedtea-web-javadoc-1.7.1-2.el7_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10182</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10182" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10182" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10182" ref_url="https://www.suse.com/security/cve/CVE-2019-10182" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010747.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1911-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TWXDTQ55XR63SPXVSZQDDIRRJUKGOCDE/#TWXDTQ55XR63SPXVSZQDDIRRJUKGOCDE" source="SUSE-SU"/>
    <description>
    It was found that icedtea-web though 1.7.2 and 1.8.2 did not properly sanitize paths from &lt;jar/&gt; elements in JNLP files. An attacker could trick a victim into running a specially crafted application and use this flaw to upload arbitrary files to arbitrary locations in the context of the user.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10182/">CVE-2019-10182 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10182">CVE-2019-10182 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1142825">SUSE bug 1142825</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825967" comment="icedtea-web-1.7.1-2.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825968" comment="icedtea-web-devel-1.7.1-2.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825969" comment="icedtea-web-javadoc-1.7.1-2.el7_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10185</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10185" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10185" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10185" ref_url="https://www.suse.com/security/cve/CVE-2019-10185" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010747.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1911-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TWXDTQ55XR63SPXVSZQDDIRRJUKGOCDE/#TWXDTQ55XR63SPXVSZQDDIRRJUKGOCDE" source="SUSE-SU"/>
    <description>
    It was found that icedtea-web up to and including 1.7.2 and 1.8.2 was vulnerable to a zip-slip attack during auto-extraction of a JAR file. An attacker could use this flaw to write files to arbitrary locations. This could also be used to replace the main running application and, possibly, break out of the sandbox.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10185/">CVE-2019-10185 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10185">CVE-2019-10185 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1142832">SUSE bug 1142832</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825967" comment="icedtea-web-1.7.1-2.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825968" comment="icedtea-web-devel-1.7.1-2.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825969" comment="icedtea-web-javadoc-1.7.1-2.el7_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910195" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10195</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10195" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10195" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10195" ref_url="https://www.suse.com/security/cve/CVE-2019-10195" source="SUSE CVE"/>
    <description>
    A flaw was found in IPA, all 4.6.x versions before 4.6.7, all 4.7.x versions before 4.7.4 and all 4.8.x versions before 4.8.3, in the way that FreeIPA's batch processing API logged operations. This included passing user passwords in clear text on FreeIPA masters. Batch processing of commands with passwords as arguments or options is not performed by default in FreeIPA but is possible by third-party components. An attacker having access to system logs on FreeIPA masters could use this flaw to produce log file content with passwords exposed.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-10195/">CVE-2019-10195 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10195">CVE-2019-10195 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826892" comment="ipa-client-4.6.5-11.el7_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826893" comment="ipa-client-common-4.6.5-11.el7_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826894" comment="ipa-common-4.6.5-11.el7_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826895" comment="ipa-python-compat-4.6.5-11.el7_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826896" comment="ipa-server-4.6.5-11.el7_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826897" comment="ipa-server-common-4.6.5-11.el7_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826898" comment="ipa-server-dns-4.6.5-11.el7_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826899" comment="ipa-server-trust-ad-4.6.5-11.el7_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826900" comment="python2-ipaclient-4.6.5-11.el7_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826901" comment="python2-ipalib-4.6.5-11.el7_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826902" comment="python2-ipaserver-4.6.5-11.el7_7.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910197" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10197</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10197" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10197" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10197" ref_url="https://www.suse.com/security/cve/CVE-2019-10197" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2673-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007440.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2142-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NWO6MTPOGUPGPCBM4M6NZXFALEUH5YWQ/#NWO6MTPOGUPGPCBM4M6NZXFALEUH5YWQ" source="SUSE-SU"/>
    <description>
    A flaw was found in samba versions 4.9.x up to 4.9.13, samba 4.10.x up to 4.10.8 and samba 4.11.x up to 4.11.0rc3, when certain parameters were set in the samba configuration file. An unauthenticated attacker could use this flaw to escape the shared directory and access the contents of directories outside the share.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10197/">CVE-2019-10197 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10197">CVE-2019-10197 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1141267">SUSE bug 1141267</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827724" comment="ctdb-4.10.4-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827725" comment="ctdb-tests-4.10.4-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827726" comment="libsmbclient-4.10.4-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827727" comment="libsmbclient-devel-4.10.4-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827728" comment="libwbclient-4.10.4-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827729" comment="libwbclient-devel-4.10.4-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827730" comment="samba-4.10.4-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827731" comment="samba-client-4.10.4-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827732" comment="samba-client-libs-4.10.4-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827733" comment="samba-common-4.10.4-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827734" comment="samba-common-libs-4.10.4-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827735" comment="samba-common-tools-4.10.4-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827736" comment="samba-dc-4.10.4-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827737" comment="samba-dc-libs-4.10.4-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827738" comment="samba-devel-4.10.4-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827739" comment="samba-krb5-printing-4.10.4-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827740" comment="samba-libs-4.10.4-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827741" comment="samba-pidl-4.10.4-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827742" comment="samba-python-4.10.4-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827743" comment="samba-python-test-4.10.4-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827744" comment="samba-test-4.10.4-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827745" comment="samba-test-libs-4.10.4-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827746" comment="samba-vfs-glusterfs-4.10.4-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827747" comment="samba-winbind-4.10.4-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827748" comment="samba-winbind-clients-4.10.4-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827749" comment="samba-winbind-krb5-locator-4.10.4-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827750" comment="samba-winbind-modules-4.10.4-10.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910207" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10207</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10207" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10207" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10207" ref_url="https://www.suse.com/security/cve/CVE-2019-10207" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1923-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EIHLFLWIJWATY4U7OHLNF5XU4F4GVLNR/#EIHLFLWIJWATY4U7OHLNF5XU4F4GVLNR" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1924-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QQRUSBNZ3H36Y5YE6DN2DIYEFRQKUSLI/#QQRUSBNZ3H36Y5YE6DN2DIYEFRQKUSLI" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel's Bluetooth implementation of UART, all versions kernel 3.x.x before 4.18.0 and kernel 5.x.x. An attacker with local access and write permissions to the Bluetooth hardware could use this flaw to issue a specially crafted ioctl function call and cause the system to crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-10207/">CVE-2019-10207 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10207">CVE-2019-10207 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1123959">SUSE bug 1123959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142857">SUSE bug 1142857</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826993" comment="bpftool-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826994" comment="kernel-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826995" comment="kernel-abi-whitelists-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826996" comment="kernel-debug-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826999" comment="kernel-doc-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827000" comment="kernel-headers-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827001" comment="kernel-tools-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827002" comment="kernel-tools-libs-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827004" comment="perf-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827005" comment="python-perf-3.10.0-1127.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910208" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10208</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10208" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10208" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10208" ref_url="https://www.suse.com/security/cve/CVE-2019-10208" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005891.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005847.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2707-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2062-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DXL3UFEQ3KJXLD6LBEAF3FKSOQML63YZ/#DXL3UFEQ3KJXLD6LBEAF3FKSOQML63YZ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1227-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RPLLEO7T4JPO4J5JMG2O4ZTONMNDEL64/" source="SUSE-SU"/>
    <description>
    A flaw was discovered in postgresql versions 9.4.x before 9.4.24, 9.5.x before 9.5.19, 9.6.x before 9.6.15, 10.x before 10.10 and 11.x before 11.5 where arbitrary SQL statements can be executed given a suitable SECURITY DEFINER function. An attacker, with EXECUTE permission on the function, can execute arbitrary SQL as the owner of the function.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-24"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10208/">CVE-2019-10208 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-10208">CVE-2019-10208 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1145092">SUSE bug 1145092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171566">SUSE bug 1171566</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829092" comment="postgresql-9.2.24-6.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829093" comment="postgresql-contrib-9.2.24-6.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829094" comment="postgresql-devel-9.2.24-6.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829095" comment="postgresql-docs-9.2.24-6.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829096" comment="postgresql-libs-9.2.24-6.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829097" comment="postgresql-plperl-9.2.24-6.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829098" comment="postgresql-plpython-9.2.24-6.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829099" comment="postgresql-pltcl-9.2.24-6.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829100" comment="postgresql-server-9.2.24-6.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829101" comment="postgresql-static-9.2.24-6.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829102" comment="postgresql-test-9.2.24-6.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829103" comment="postgresql-upgrade-9.2.24-6.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910216" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10216</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10216" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10216" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10216" ref_url="https://www.suse.com/security/cve/CVE-2019-10216" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005903.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2139-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FW24DFNY77J4KEU5ORI5WO22DIZS5RJA/#FW24DFNY77J4KEU5ORI5WO22DIZS5RJA" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2160-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JPH6CBN4BXBRQTLEAQWN2VLL3HGGVVYV/#JPH6CBN4BXBRQTLEAQWN2VLL3HGGVVYV" source="SUSE-SU"/>
    <description>
    In ghostscript before version 9.50, the .buildfont1 procedure did not properly secure its privileged calls, enabling scripts to bypass `-dSAFER` restrictions. An attacker could abuse this flaw by creating a specially crafted PostScript file that could escalate privileges and access files outside of restricted areas.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-05"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-10216/">CVE-2019-10216 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10216">CVE-2019-10216 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1144621">SUSE bug 1144621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146882">SUSE bug 1146882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146884">SUSE bug 1146884</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826586" comment="ghostscript-9.25-2.el7_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826587" comment="ghostscript-cups-9.25-2.el7_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826588" comment="ghostscript-doc-9.25-2.el7_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826589" comment="ghostscript-gtk-9.25-2.el7_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826590" comment="libgs-9.25-2.el7_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826591" comment="libgs-devel-9.25-2.el7_7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910218" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10218</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10218" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10218" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10218" ref_url="https://www.suse.com/security/cve/CVE-2019-10218" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2866-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192866-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2868-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192868-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2875-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192875-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2673-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007440.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2442-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KL7HWA2VLDM4QBSVFP4UKNPEMH7WKMUL/#KL7HWA2VLDM4QBSVFP4UKNPEMH7WKMUL" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2458-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KYWG4CAL266MXJWOZTEBJZ6FOONDSHUS/#KYWG4CAL266MXJWOZTEBJZ6FOONDSHUS" source="SUSE-SU"/>
    <description>
    A flaw was found in the samba client, all samba versions before samba 4.11.2, 4.10.10 and 4.9.15, where a malicious server can supply a pathname to the client with separators. This could allow the client to access files and folders outside of the SMB network pathnames. An attacker could use this vulnerability to create files outside of the current working directory using the privileges of the client user.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-10218/">CVE-2019-10218 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10218">CVE-2019-10218 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1144902">SUSE bug 1144902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144903">SUSE bug 1144903</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827724" comment="ctdb-4.10.4-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827725" comment="ctdb-tests-4.10.4-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827726" comment="libsmbclient-4.10.4-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827727" comment="libsmbclient-devel-4.10.4-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827728" comment="libwbclient-4.10.4-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827729" comment="libwbclient-devel-4.10.4-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827730" comment="samba-4.10.4-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827731" comment="samba-client-4.10.4-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827732" comment="samba-client-libs-4.10.4-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827733" comment="samba-common-4.10.4-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827734" comment="samba-common-libs-4.10.4-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827735" comment="samba-common-tools-4.10.4-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827736" comment="samba-dc-4.10.4-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827737" comment="samba-dc-libs-4.10.4-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827738" comment="samba-devel-4.10.4-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827739" comment="samba-krb5-printing-4.10.4-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827740" comment="samba-libs-4.10.4-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827741" comment="samba-pidl-4.10.4-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827742" comment="samba-python-4.10.4-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827743" comment="samba-python-test-4.10.4-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827744" comment="samba-test-4.10.4-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827745" comment="samba-test-libs-4.10.4-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827746" comment="samba-vfs-glusterfs-4.10.4-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827747" comment="samba-winbind-4.10.4-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827748" comment="samba-winbind-clients-4.10.4-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827749" comment="samba-winbind-krb5-locator-4.10.4-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827750" comment="samba-winbind-modules-4.10.4-10.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910221" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10221</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10221" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10221" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10221" ref_url="https://www.suse.com/security/cve/CVE-2019-10221" source="SUSE CVE"/>
    <description>
    A Reflected Cross Site Scripting vulnerability was found in all pki-core 10.x.x versions, where the pki-ca module from the pki-core server. This flaw is caused by missing sanitization of the GET URL parameters. An attacker could abuse this flaw to trick an authenticated user into clicking a specially crafted link which can execute arbitrary code when viewed in a browser.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-10221/">CVE-2019-10221 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10221">CVE-2019-10221 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828983" comment="pki-base-10.5.18-12.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828984" comment="pki-base-java-10.5.18-12.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828985" comment="pki-ca-10.5.18-12.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828986" comment="pki-javadoc-10.5.18-12.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828987" comment="pki-kra-10.5.18-12.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828988" comment="pki-server-10.5.18-12.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828989" comment="pki-symkey-10.5.18-12.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828990" comment="pki-tools-10.5.18-12.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910638" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10638</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10638" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10638" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10638" ref_url="https://www.suse.com/security/cve/CVE-2019-10638" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1823-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1851-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20191851-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1852-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20191852-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005958.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1716-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HJXAHNWJ4IAQN4V6E2PEXAAFMQPYBBPT/#HJXAHNWJ4IAQN4V6E2PEXAAFMQPYBBPT" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1757-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PJTYGHQOYDY2SFDAAFYO3E3URRCWKEUQ/#PJTYGHQOYDY2SFDAAFYO3E3URRCWKEUQ" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 5.1.7, a device can be tracked by an attacker using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic is sent to multiple destination IP addresses, it is possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). An attack may be conducted by hosting a crafted web page that uses WebRTC or gQUIC to force UDP traffic to attacker-controlled IP addresses.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10638/">CVE-2019-10638 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10638">CVE-2019-10638 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1140575">SUSE bug 1140575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140577">SUSE bug 1140577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142129">SUSE bug 1142129</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826993" comment="bpftool-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826994" comment="kernel-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826995" comment="kernel-abi-whitelists-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826996" comment="kernel-debug-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826999" comment="kernel-doc-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827000" comment="kernel-headers-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827001" comment="kernel-tools-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827002" comment="kernel-tools-libs-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827004" comment="perf-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827005" comment="python-perf-3.10.0-1127.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910639" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10639</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10639" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10639" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10639" ref_url="https://www.suse.com/security/cve/CVE-2019-10639" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1823-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1851-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20191851-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1852-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20191852-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005958.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1716-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HJXAHNWJ4IAQN4V6E2PEXAAFMQPYBBPT/#HJXAHNWJ4IAQN4V6E2PEXAAFMQPYBBPT" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1757-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PJTYGHQOYDY2SFDAAFYO3E3URRCWKEUQ/#PJTYGHQOYDY2SFDAAFYO3E3URRCWKEUQ" source="SUSE-SU"/>
    <description>
    The Linux kernel 4.x (starting from 4.1) and 5.x before 5.0.8 allows Information Exposure (partial kernel address disclosure), leading to a KASLR bypass. Specifically, it is possible to extract the KASLR kernel image offset using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic is sent to multiple destination IP addresses, it is possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). This key contains enough bits from a kernel address (of a static variable) so when the key is extracted (via enumeration), the offset of the kernel image is exposed. This attack can be carried out remotely, by the attacker forcing the target device to send UDP or ICMP (or certain other) traffic to attacker-controlled IP addresses. Forcing a server to send UDP traffic is trivial if the server is a DNS server. ICMP traffic is trivial if the server answers ICMP Echo requests (ping). For client targets, if the target visits the attacker's web page, then WebRTC or gQUIC can be used to force UDP traffic to attacker-controlled IP addresses. NOTE: this attack against KASLR became viable in 4.1 because IP ID generation was changed to have a dependency on an address associated with a network namespace.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10639/">CVE-2019-10639 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10639">CVE-2019-10639 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1140577">SUSE bug 1140577</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826993" comment="bpftool-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826994" comment="kernel-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826995" comment="kernel-abi-whitelists-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826996" comment="kernel-debug-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826999" comment="kernel-doc-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827000" comment="kernel-headers-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827001" comment="kernel-tools-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827002" comment="kernel-tools-libs-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827004" comment="perf-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827005" comment="python-perf-3.10.0-1127.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910650" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10650</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10650" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10650" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10650" ref_url="https://www.suse.com/security/cve/CVE-2019-10650" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1019-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005358.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1033-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005441.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1320-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2XHJ2AOYGREC65MN6FYXWNZTOX3EBKGA/#2XHJ2AOYGREC65MN6FYXWNZTOX3EBKGA" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1331-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PXXOQJNFJALZODZCRBAWWSZX3GTWPSKT/#PXXOQJNFJALZODZCRBAWWSZX3GTWPSKT" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.8-36 Q16, there is a heap-based buffer over-read in the function WriteTIFFImage of coders/tiff.c, which allows an attacker to cause a denial of service or information disclosure via a crafted image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10650/">CVE-2019-10650 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10650">CVE-2019-10650 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1131317">SUSE bug 1131317</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827880" comment="ImageMagick-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827881" comment="ImageMagick-c++-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827882" comment="ImageMagick-c++-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827883" comment="ImageMagick-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827884" comment="ImageMagick-doc-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827885" comment="ImageMagick-perl-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827886" comment="autotrace-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827887" comment="autotrace-devel-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827888" comment="emacs-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827889" comment="emacs-common-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827890" comment="emacs-el-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827891" comment="emacs-filesystem-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827892" comment="emacs-nox-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827893" comment="emacs-terminal-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827894" comment="inkscape-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827895" comment="inkscape-docs-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827896" comment="inkscape-view-0.92.2-3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910871" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10871</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10871" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10871" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10871" ref_url="https://www.suse.com/security/cve/CVE-2019-10871" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011080.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3854-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TS7QPSEQIBQO7BALZOE3TN7IO7IMHK3Y/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Poppler 0.74.0. There is a heap-based buffer over-read in the function PSOutputDev::checkPageSlice at PSOutputDev.cc.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-10871/">CVE-2019-10871 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10871">CVE-2019-10871 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1131696">SUSE bug 1131696</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827681" comment="evince-3.28.2-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827682" comment="evince-browser-plugin-3.28.2-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827683" comment="evince-devel-3.28.2-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827684" comment="evince-dvi-3.28.2-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827685" comment="evince-libs-3.28.2-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827686" comment="evince-nautilus-3.28.2-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827687" comment="poppler-0.26.5-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827688" comment="poppler-cpp-0.26.5-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827689" comment="poppler-cpp-devel-0.26.5-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827690" comment="poppler-demos-0.26.5-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827691" comment="poppler-devel-0.26.5-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827692" comment="poppler-glib-0.26.5-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827693" comment="poppler-glib-devel-0.26.5-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827694" comment="poppler-qt-0.26.5-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827695" comment="poppler-qt-devel-0.26.5-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827696" comment="poppler-utils-0.26.5-42.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911043" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11043</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11043" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11043" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11043" ref_url="https://www.suse.com/security/cve/CVE-2019-11043" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006550.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012983.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2441-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XR434E7JZFRASEGMKXAGLV6276BG7CJ2/#XR434E7JZFRASEGMKXAGLV6276BG7CJ2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2457-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DKERIMOGORTBNVH2THNIFCTX7ULBSKYV/#DKERIMOGORTBNVH2THNIFCTX7ULBSKYV" source="SUSE-SU"/>
    <description>
    In PHP versions 7.1.x below 7.1.33, 7.2.x below 7.2.24 and 7.3.x below 7.3.11 in certain configurations of FPM setup it is possible to cause FPM module to write past allocated buffers into the space reserved for FCGI protocol data, thus opening the possibility of remote code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-30"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11043/">CVE-2019-11043 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11043">CVE-2019-11043 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1154999">SUSE bug 1154999</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826708" comment="php-5.4.16-46.1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826709" comment="php-bcmath-5.4.16-46.1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826710" comment="php-cli-5.4.16-46.1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826711" comment="php-common-5.4.16-46.1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826712" comment="php-dba-5.4.16-46.1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826713" comment="php-devel-5.4.16-46.1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826714" comment="php-embedded-5.4.16-46.1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826715" comment="php-enchant-5.4.16-46.1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826716" comment="php-fpm-5.4.16-46.1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826717" comment="php-gd-5.4.16-46.1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826718" comment="php-intl-5.4.16-46.1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826719" comment="php-ldap-5.4.16-46.1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826720" comment="php-mbstring-5.4.16-46.1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826721" comment="php-mysql-5.4.16-46.1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826722" comment="php-mysqlnd-5.4.16-46.1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826723" comment="php-odbc-5.4.16-46.1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826724" comment="php-pdo-5.4.16-46.1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826725" comment="php-pgsql-5.4.16-46.1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826726" comment="php-process-5.4.16-46.1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826727" comment="php-pspell-5.4.16-46.1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826728" comment="php-recode-5.4.16-46.1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826729" comment="php-snmp-5.4.16-46.1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826730" comment="php-soap-5.4.16-46.1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826731" comment="php-xml-5.4.16-46.1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826732" comment="php-xmlrpc-5.4.16-46.1.el7_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911068" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11068</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11068" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11068" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11068" ref_url="https://www.suse.com/security/cve/CVE-2019-11068" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1221-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005772.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1428-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4NC6JYCW6AOKCPY44BVDJEHAEZOST7HQ/#4NC6JYCW6AOKCPY44BVDJEHAEZOST7HQ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1430-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6XBZN5QJD3GQNVGWYVIV5ID4F4OJDRS5/#6XBZN5QJD3GQNVGWYVIV5ID4F4OJDRS5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1433-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4VHP5XI7AOFECZTZP7RTWTCS7HV5U7LM/#4VHP5XI7AOFECZTZP7RTWTCS7HV5U7LM" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1527-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6IH56YOTZGFXNOIR75H2UYJCQOA2UAJA/#6IH56YOTZGFXNOIR75H2UYJCQOA2UAJA" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1824-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NM2KMIISZ2FSHQKYLFT4WOLDJMPLTJJ7/#NM2KMIISZ2FSHQKYLFT4WOLDJMPLTJJ7" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14697-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U5YNW74OL2W7SH2XTAVN5TODNFIVFL3Y/" source="SUSE-SU"/>
    <description>
    libxslt through 1.1.33 allows bypass of a protection mechanism because callers of xsltCheckRead and xsltCheckWrite permit access even upon receiving a -1 error code. xsltCheckRead can return -1 for a crafted URL that is not actually invalid and is subsequently loaded.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-11068/">CVE-2019-11068 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11068">CVE-2019-11068 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1132160">SUSE bug 1132160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154212">SUSE bug 1154212</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828468" comment="libxslt-1.1.28-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828469" comment="libxslt-devel-1.1.28-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828470" comment="libxslt-python-1.1.28-6.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911070" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11070</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11070" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11070" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11070" ref_url="https://www.suse.com/security/cve/CVE-2019-11070" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005420.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005426.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1374-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CGMQTO45E47X7O5HB3O7ZWDQLHRQ7G2Q/#CGMQTO45E47X7O5HB3O7ZWDQLHRQ7G2Q" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1391-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ALCAK5M2LDATQSAWCRSTBKKIPCCHELPM/#ALCAK5M2LDATQSAWCRSTBKKIPCCHELPM" source="SUSE-SU"/>
    <description>
    WebKitGTK and WPE WebKit prior to version 2.24.1 failed to properly apply configured HTTP proxy settings when downloading livestream video (HLS, DASH, or Smooth Streaming), an error resulting in deanonymization. This issue was corrected by changing the way livestreams are downloaded.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-10-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11070/">CVE-2019-11070 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11070">CVE-2019-11070 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1132196">SUSE bug 1132196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132256">SUSE bug 1132256</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828527" comment="webkitgtk4-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828528" comment="webkitgtk4-devel-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828529" comment="webkitgtk4-doc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828530" comment="webkitgtk4-jsc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828531" comment="webkitgtk4-jsc-devel-2.28.2-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911085" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11085</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11085" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11085" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11085" ref_url="https://www.suse.com/security/cve/CVE-2019-11085" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1674-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1479-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/B4DQLC5NNFA52SY3VMJNLGCDAOQAXY7D/#B4DQLC5NNFA52SY3VMJNLGCDAOQAXY7D" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1579-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GOX3GRSFJIOAQWX677KTNVAGGH653HWU/#GOX3GRSFJIOAQWX677KTNVAGGH653HWU" source="SUSE-SU"/>
    <description>
    Insufficient input validation in Kernel Mode Driver in Intel(R) i915 Graphics for Linux before version 5.0 may allow an authenticated user to potentially enable escalation of privilege via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11085/">CVE-2019-11085 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11085">CVE-2019-11085 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1135278">SUSE bug 1135278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135280">SUSE bug 1135280</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825932" comment="bpftool-3.10.0-957.27.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825933" comment="kernel-3.10.0-957.27.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825934" comment="kernel-abi-whitelists-3.10.0-957.27.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825935" comment="kernel-debug-3.10.0-957.27.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825938" comment="kernel-doc-3.10.0-957.27.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825939" comment="kernel-headers-3.10.0-957.27.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825940" comment="kernel-tools-3.10.0-957.27.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825941" comment="kernel-tools-libs-3.10.0-957.27.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825943" comment="perf-3.10.0-957.27.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825944" comment="python-perf-3.10.0-957.27.2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911091" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11091</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11091" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11091" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091" source="SUSE CVE"/>
		<reference ref_id="MDS-BLOG-SUSE" ref_url="https://www.suse.com/c/suse-addresses-microarchitectural-data-sampling-vulnerabilities/" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2019:2715-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2019-October/012780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2019:2767-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2019-October/012836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1356-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005510.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1547-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<reference ref_id="TID000019406" ref_url="https://www.suse.com/support/kb/doc/?id=000019406" source="SUSE-SU"/>
		<reference ref_id="TID000019455" ref_url="https://www.suse.com/support/kb/doc/?id=000019455" source="SUSE-SU"/>
		<reference ref_id="TID7023736" ref_url="https://www.suse.com/support/kb/doc/?id=7023736" source="SUSE-SU"/>
		<reference ref_id="TID7023881" ref_url="https://www.suse.com/support/kb/doc/?id=7023881" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1402-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/33MA77JSUFVKUR6Z5BDK3Q5WJV5TLMGX/#33MA77JSUFVKUR6Z5BDK3Q5WJV5TLMGX" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1403-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VXQE4RWMS56TBCJGRYUPTRMOPKA4W36G/#VXQE4RWMS56TBCJGRYUPTRMOPKA4W36G" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1404-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZZ2FZBVA3Q7VOUC5KRK2EODJSBYJDCKH/#ZZ2FZBVA3Q7VOUC5KRK2EODJSBYJDCKH" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1405-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QGG5FDRTW3N4DP7WJX4MDPGAOAXLSD6M/#QGG5FDRTW3N4DP7WJX4MDPGAOAXLSD6M" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1407-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UMXCAWC5QTZVSPZOYUW3E3GVJJUKCQ2S/#UMXCAWC5QTZVSPZOYUW3E3GVJJUKCQ2S" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1408-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZSE72NMUCLWUM5YDC3SFM4F3IBT36O4H/#ZSE72NMUCLWUM5YDC3SFM4F3IBT36O4H" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1419-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MBTX5PVRT77LNABRQZJWPEB5R2XII2HZ/#MBTX5PVRT77LNABRQZJWPEB5R2XII2HZ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1420-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PHUAEI2S4AOFDWOX4LHSXMP4KM5BJRWS/#PHUAEI2S4AOFDWOX4LHSXMP4KM5BJRWS" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1468-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7TYDM6JT7REGY5GWV2QCHLGWEXWMFQXU/#7TYDM6JT7REGY5GWV2QCHLGWEXWMFQXU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1505-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EXK6FJ36C5QT4K2AAY7SESWBHLXITKIA/#EXK6FJ36C5QT4K2AAY7SESWBHLXITKIA" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1805-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YSPWDEAWE7P6Q74P7Y3X6GN4DTSDOX2P/#YSPWDEAWE7P6Q74P7Y3X6GN4DTSDOX2P" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1806-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C57DILLST76FNAJLKX2HCZ5LXACTE6OS/#C57DILLST76FNAJLKX2HCZ5LXACTE6OS" source="SUSE-SU"/>
    <description>
    Microarchitectural Data Sampling Uncacheable Memory (MDSUM): Uncacheable memory on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11091">CVE-2019-11091 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1103186">SUSE bug 1103186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111331">SUSE bug 1111331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132686">SUSE bug 1132686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133319">SUSE bug 1133319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135394">SUSE bug 1135394</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138043">SUSE bug 1138043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138534">SUSE bug 1138534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141977">SUSE bug 1141977</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201877">SUSE bug 1201877</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825722" comment="bpftool-3.10.0-957.12.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825723" comment="kernel-3.10.0-957.12.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825724" comment="kernel-abi-whitelists-3.10.0-957.12.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825725" comment="kernel-debug-3.10.0-957.12.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825728" comment="kernel-doc-3.10.0-957.12.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825729" comment="kernel-headers-3.10.0-957.12.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825730" comment="kernel-tools-3.10.0-957.12.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825731" comment="kernel-tools-libs-3.10.0-957.12.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825735" comment="libvirt-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825736" comment="libvirt-admin-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825737" comment="libvirt-bash-completion-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825738" comment="libvirt-client-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825739" comment="libvirt-daemon-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825740" comment="libvirt-daemon-config-network-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825741" comment="libvirt-daemon-config-nwfilter-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825742" comment="libvirt-daemon-driver-interface-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825743" comment="libvirt-daemon-driver-lxc-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825744" comment="libvirt-daemon-driver-network-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825745" comment="libvirt-daemon-driver-nodedev-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825746" comment="libvirt-daemon-driver-nwfilter-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825747" comment="libvirt-daemon-driver-qemu-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825748" comment="libvirt-daemon-driver-secret-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825749" comment="libvirt-daemon-driver-storage-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825750" comment="libvirt-daemon-driver-storage-core-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825751" comment="libvirt-daemon-driver-storage-disk-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825752" comment="libvirt-daemon-driver-storage-gluster-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825753" comment="libvirt-daemon-driver-storage-iscsi-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825754" comment="libvirt-daemon-driver-storage-logical-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825755" comment="libvirt-daemon-driver-storage-mpath-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825756" comment="libvirt-daemon-driver-storage-rbd-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825757" comment="libvirt-daemon-driver-storage-scsi-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825758" comment="libvirt-daemon-kvm-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825759" comment="libvirt-daemon-lxc-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825760" comment="libvirt-devel-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825761" comment="libvirt-docs-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825762" comment="libvirt-libs-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825763" comment="libvirt-lock-sanlock-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825764" comment="libvirt-login-shell-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825765" comment="libvirt-nss-4.5.0-10.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825733" comment="perf-3.10.0-957.12.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825734" comment="python-perf-3.10.0-957.12.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825766" comment="qemu-img-1.5.3-160.el7_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825767" comment="qemu-kvm-1.5.3-160.el7_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825768" comment="qemu-kvm-common-1.5.3-160.el7_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825769" comment="qemu-kvm-tools-1.5.3-160.el7_6.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911135" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11135</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11135" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11135" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11135" ref_url="https://www.suse.com/security/cve/CVE-2019-11135" source="SUSE CVE"/>
		<reference ref_id="SUSE-BLOG-TAA-IFU" ref_url="https://www.suse.com/c/suse-addresses-transactional-asynchronous-abort-and-machine-check-error-on-page-size-changes-issues/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2946-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192946-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2947-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192947-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2953-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192953-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2955-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192955-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2956-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2957-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2958-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192958-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2959-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192959-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2961-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192961-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2987-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3340-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="TID000019563" ref_url="https://www.suse.com/support/kb/doc/?id=000019563" source="SUSE-SU"/>
		<reference ref_id="TID7024251" ref_url="https://www.suse.com/support/kb/doc/?id=7024251" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2494-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/E37URKMMJAKXS5WM65BEKIVDDLOSR6PW/#E37URKMMJAKXS5WM65BEKIVDDLOSR6PW" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2503-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GT2JTOAOVM6XT2DFUS6CAXI4NAAVMRVR/#GT2JTOAOVM6XT2DFUS6CAXI4NAAVMRVR" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2504-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M3QLZVRJX73SZ6RSPQ7ODD7UC3C6F6FE/#M3QLZVRJX73SZ6RSPQ7ODD7UC3C6F6FE" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2505-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YGK33QVVCMOM3HRWRJ6FPIFV2JBB4XDB/#YGK33QVVCMOM3HRWRJ6FPIFV2JBB4XDB" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2506-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R6YJ2KCZGK5VBSLWES67ERVZEO724CJC/#R6YJ2KCZGK5VBSLWES67ERVZEO724CJC" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2507-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/45LLGKHM3X6KQJN67OZHE3KEGCRBVGEJ/#45LLGKHM3X6KQJN67OZHE3KEGCRBVGEJ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2509-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4GUK5H34U2XTLAIOJIQ7UDAHEDBJ2QCT/#4GUK5H34U2XTLAIOJIQ7UDAHEDBJ2QCT" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2510-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KGVFZGJMBR53343ITOTWO7YW2JVKGHDT/#KGVFZGJMBR53343ITOTWO7YW2JVKGHDT" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2527-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ILHYRTCJV4JB7GTI5KDDGCMTR5BWLJPM/#ILHYRTCJV4JB7GTI5KDDGCMTR5BWLJPM" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2528-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VPYX74HKOHWYW6GOJM3PN5OCIGQS4IP2/#VPYX74HKOHWYW6GOJM3PN5OCIGQS4IP2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2710-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VPOZE7PRHYWJK54T4PNLQG6ZIUGENA75/#VPOZE7PRHYWJK54T4PNLQG6ZIUGENA75" source="SUSE-SU"/>
    <description>
    TSX Asynchronous Abort condition on some CPUs utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11135/">CVE-2019-11135 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11135">CVE-2019-11135 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1139073">SUSE bug 1139073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152497">SUSE bug 1152497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152505">SUSE bug 1152505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152506">SUSE bug 1152506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160120">SUSE bug 1160120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201877">SUSE bug 1201877</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826733" comment="bpftool-3.10.0-1062.4.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826734" comment="kernel-3.10.0-1062.4.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826735" comment="kernel-abi-whitelists-3.10.0-1062.4.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826736" comment="kernel-debug-3.10.0-1062.4.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826739" comment="kernel-doc-3.10.0-1062.4.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826740" comment="kernel-headers-3.10.0-1062.4.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826741" comment="kernel-tools-3.10.0-1062.4.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826742" comment="kernel-tools-libs-3.10.0-1062.4.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826744" comment="perf-3.10.0-1062.4.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826745" comment="python-perf-3.10.0-1062.4.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826875" comment="qemu-img-1.5.3-167.el7_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826876" comment="qemu-kvm-1.5.3-167.el7_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826877" comment="qemu-kvm-common-1.5.3-167.el7_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826878" comment="qemu-kvm-tools-1.5.3-167.el7_7.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911190" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11190</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11190" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11190" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11190" ref_url="https://www.suse.com/security/cve/CVE-2019-11190" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005630.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1570-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NJCQPY6KJMGUNOCG3VYC34NI2F6XUC3N/#NJCQPY6KJMGUNOCG3VYC34NI2F6XUC3N" source="SUSE-SU"/>
    <description>
    The Linux kernel before 4.8 allows local users to bypass ASLR on setuid programs (such as /bin/su) because install_exec_creds() is called too late in load_elf_binary() in fs/binfmt_elf.c, and thus the ptrace_may_access() check has a race condition when reading /proc/pid/stat.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11190/">CVE-2019-11190 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11190">CVE-2019-11190 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1131543">SUSE bug 1131543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132374">SUSE bug 1132374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132472">SUSE bug 1132472</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826993" comment="bpftool-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826994" comment="kernel-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826995" comment="kernel-abi-whitelists-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826996" comment="kernel-debug-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826999" comment="kernel-doc-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827000" comment="kernel-headers-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827001" comment="kernel-tools-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827002" comment="kernel-tools-libs-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827004" comment="perf-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827005" comment="python-perf-3.10.0-1127.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911234" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11234</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11234" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11234" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11234" ref_url="https://www.suse.com/security/cve/CVE-2019-11234" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005429.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1346-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N5NJZCFMF2WWTEIRNAML6C6UXN7RD2S5/#N5NJZCFMF2WWTEIRNAML6C6UXN7RD2S5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1394-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GEAJMZR6Z35WVANJM6OIPISUB5SZLXPE/#GEAJMZR6Z35WVANJM6OIPISUB5SZLXPE" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0542-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KRT7OQMTAGCH47U5CUE43ZVIS7MSQ35Z/" source="SUSE-SU"/>
    <description>
    FreeRADIUS before 3.0.19 does not prevent use of reflection for authentication spoofing, aka a "Dragonblood" issue, a similar issue to CVE-2019-9497.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-11234/">CVE-2019-11234 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11234">CVE-2019-11234 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1132664">SUSE bug 1132664</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825710" comment="freeradius-3.0.13-10.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825711" comment="freeradius-devel-3.0.13-10.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825712" comment="freeradius-doc-3.0.13-10.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825713" comment="freeradius-krb5-3.0.13-10.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825714" comment="freeradius-ldap-3.0.13-10.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825715" comment="freeradius-mysql-3.0.13-10.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825716" comment="freeradius-perl-3.0.13-10.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825717" comment="freeradius-postgresql-3.0.13-10.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825718" comment="freeradius-python-3.0.13-10.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825719" comment="freeradius-sqlite-3.0.13-10.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825720" comment="freeradius-unixODBC-3.0.13-10.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825721" comment="freeradius-utils-3.0.13-10.el7_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911235" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11235</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11235" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11235" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11235" ref_url="https://www.suse.com/security/cve/CVE-2019-11235" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005429.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1346-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N5NJZCFMF2WWTEIRNAML6C6UXN7RD2S5/#N5NJZCFMF2WWTEIRNAML6C6UXN7RD2S5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1394-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GEAJMZR6Z35WVANJM6OIPISUB5SZLXPE/#GEAJMZR6Z35WVANJM6OIPISUB5SZLXPE" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0542-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KRT7OQMTAGCH47U5CUE43ZVIS7MSQ35Z/" source="SUSE-SU"/>
    <description>
    FreeRADIUS before 3.0.19 mishandles the "each participant verifies that the received scalar is within a range, and that the received group element is a valid point on the curve being used" protection mechanism, aka a "Dragonblood" issue, a similar issue to CVE-2019-9498 and CVE-2019-9499.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-11235/">CVE-2019-11235 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11235">CVE-2019-11235 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1132549">SUSE bug 1132549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132664">SUSE bug 1132664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144524">SUSE bug 1144524</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825710" comment="freeradius-3.0.13-10.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825711" comment="freeradius-devel-3.0.13-10.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825712" comment="freeradius-doc-3.0.13-10.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825713" comment="freeradius-krb5-3.0.13-10.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825714" comment="freeradius-ldap-3.0.13-10.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825715" comment="freeradius-mysql-3.0.13-10.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825716" comment="freeradius-perl-3.0.13-10.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825717" comment="freeradius-postgresql-3.0.13-10.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825718" comment="freeradius-python-3.0.13-10.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825719" comment="freeradius-sqlite-3.0.13-10.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825720" comment="freeradius-unixODBC-3.0.13-10.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825721" comment="freeradius-utils-3.0.13-10.el7_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911236" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11236</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11236" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11236" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11236" ref_url="https://www.suse.com/security/cve/CVE-2019-11236" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0444-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0447-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0450-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0452-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0456-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2370-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192370-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005931.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2131-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KFMC4LRB2CXRSDWEXN4Z4QWZ7YZ6RC4V/#KFMC4LRB2CXRSDWEXN4Z4QWZ7YZ6RC4V" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2133-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H6XIL4ESPB36DIYNSA6QU4ON4ME4EMKV/#H6XIL4ESPB36DIYNSA6QU4ON4ME4EMKV" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/pipermail/neuvector-updates/2023-November/000021.html" source="SUSE-SU"/>
    <description>
    In the urllib3 library through 1.24.1 for Python, CRLF injection is possible if the attacker controls the request parameter.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-02-28"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11236/">CVE-2019-11236 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11236">CVE-2019-11236 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1129071">SUSE bug 1129071</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132663">SUSE bug 1132663</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826505" comment="python-urllib3-1.10.2-7.el7 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826505" comment="python-urllib3-1.10.2-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827964" comment="python-virtualenv-15.1.0-4.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827963" comment="python3-pip-9.0.3-7.el7_8 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20191125" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-1125</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-1125" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1125" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-1125" ref_url="https://www.suse.com/security/cve/CVE-2019-1125" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005790.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005786.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005958.html" source="SUSE-SU"/>
		<reference ref_id="TID000019474" ref_url="https://www.suse.com/support/kb/doc/?id=000019474" source="SUSE-SU"/>
		<reference ref_id="TID7023930" ref_url="https://www.suse.com/support/kb/doc/?id=7023930" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1923-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EIHLFLWIJWATY4U7OHLNF5XU4F4GVLNR/#EIHLFLWIJWATY4U7OHLNF5XU4F4GVLNR" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1924-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QQRUSBNZ3H36Y5YE6DN2DIYEFRQKUSLI/#QQRUSBNZ3H36Y5YE6DN2DIYEFRQKUSLI" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1125/">CVE-2019-1125 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1125">CVE-2019-1125 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1139358">SUSE bug 1139358</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826601" comment="bpftool-3.10.0-1062.1.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826602" comment="kernel-3.10.0-1062.1.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826603" comment="kernel-abi-whitelists-3.10.0-1062.1.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826604" comment="kernel-debug-3.10.0-1062.1.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826607" comment="kernel-doc-3.10.0-1062.1.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826608" comment="kernel-headers-3.10.0-1062.1.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826609" comment="kernel-tools-3.10.0-1062.1.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826610" comment="kernel-tools-libs-3.10.0-1062.1.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826612" comment="perf-3.10.0-1062.1.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826613" comment="python-perf-3.10.0-1062.1.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911324" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11324</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11324" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11324" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11324" ref_url="https://www.suse.com/security/cve/CVE-2019-11324" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0444-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0447-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0450-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0452-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0456-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2370-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192370-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005927.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2131-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KFMC4LRB2CXRSDWEXN4Z4QWZ7YZ6RC4V/#KFMC4LRB2CXRSDWEXN4Z4QWZ7YZ6RC4V" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2133-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H6XIL4ESPB36DIYNSA6QU4ON4ME4EMKV/#H6XIL4ESPB36DIYNSA6QU4ON4ME4EMKV" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/pipermail/neuvector-updates/2023-November/000021.html" source="SUSE-SU"/>
    <description>
    The urllib3 library before 1.24.2 for Python mishandles certain cases where the desired set of CA certificates is different from the OS store of CA certificates, which results in SSL connections succeeding in situations where a verification failure is the correct outcome. This is related to use of the ssl_context, ca_certs, or ca_certs_dir argument.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11324/">CVE-2019-11324 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11324">CVE-2019-11324 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1132900">SUSE bug 1132900</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827963" comment="python3-pip-9.0.3-7.el7_8 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911358" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11358</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11358" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11358" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11358" ref_url="https://www.suse.com/security/cve/CVE-2019-11358" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1839-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3LGJSPCN3VEG2UJPYCUB6TU75JTIV2TQ/#3LGJSPCN3VEG2UJPYCUB6TU75JTIV2TQ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1872-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5XTP44JEOSNXRVW4JDZXA5XGMBDZLWSW/#5XTP44JEOSNXRVW4JDZXA5XGMBDZLWSW" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:0231-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MGXYA34Z6RRQFK6OU2VOIH22CODOT5ES/" source="SUSE-SU"/>
    <description>
    jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11358/">CVE-2019-11358 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11358">CVE-2019-11358 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828282" comment="ipa-client-4.6.8-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828283" comment="ipa-client-common-4.6.8-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828284" comment="ipa-common-4.6.8-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828285" comment="ipa-python-compat-4.6.8-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828286" comment="ipa-server-4.6.8-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828287" comment="ipa-server-common-4.6.8-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828288" comment="ipa-server-dns-4.6.8-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828289" comment="ipa-server-trust-ad-4.6.8-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829899" comment="pcs-0.9.169-3.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829900" comment="pcs-snmp-0.9.169-3.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828290" comment="python2-ipaclient-4.6.8-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828291" comment="python2-ipalib-4.6.8-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828292" comment="python2-ipaserver-4.6.8-5.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911459" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11459</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11459" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11459" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11459" ref_url="https://www.suse.com/security/cve/CVE-2019-11459" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005796.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2080-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005806.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1667-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WLF3BNIMMM5SR4BSVUN2MAGDLKVT7RE3/#WLF3BNIMMM5SR4BSVUN2MAGDLKVT7RE3" source="SUSE-SU"/>
    <description>
    The tiff_document_render() and tiff_document_get_thumbnail() functions in the TIFF document backend in GNOME Evince through 3.32.0 did not handle errors from TIFFReadRGBAImageOriented(), leading to uninitialized memory use when processing certain TIFF image files.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11459/">CVE-2019-11459 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11459">CVE-2019-11459 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1133037">SUSE bug 1133037</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827681" comment="evince-3.28.2-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827682" comment="evince-browser-plugin-3.28.2-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827683" comment="evince-devel-3.28.2-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827684" comment="evince-dvi-3.28.2-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827685" comment="evince-libs-3.28.2-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827686" comment="evince-nautilus-3.28.2-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827687" comment="poppler-0.26.5-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827688" comment="poppler-cpp-0.26.5-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827689" comment="poppler-cpp-devel-0.26.5-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827690" comment="poppler-demos-0.26.5-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827691" comment="poppler-devel-0.26.5-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827692" comment="poppler-glib-0.26.5-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827693" comment="poppler-glib-devel-0.26.5-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827694" comment="poppler-qt-0.26.5-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827695" comment="poppler-qt-devel-0.26.5-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827696" comment="poppler-utils-0.26.5-42.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911470" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11470</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11470" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11470" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11470" ref_url="https://www.suse.com/security/cve/CVE-2019-11470" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1523-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005633.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1603-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/STQTYIB5Q2JC4ZOB7CKYDRND3OSUWGTW/#STQTYIB5Q2JC4ZOB7CKYDRND3OSUWGTW" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1683-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R7HRSDXPTVPKGAJNZBJCGV43DVFXWCDB/#R7HRSDXPTVPKGAJNZBJCGV43DVFXWCDB" source="SUSE-SU"/>
    <description>
    The cineon parsing component in ImageMagick 7.0.8-26 Q16 allows attackers to cause a denial-of-service (uncontrolled resource consumption) by crafting a Cineon image with an incorrect claimed image size. This occurs because ReadCINImage in coders/cin.c lacks a check for insufficient image data in a file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11470/">CVE-2019-11470 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11470">CVE-2019-11470 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1133205">SUSE bug 1133205</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827880" comment="ImageMagick-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827881" comment="ImageMagick-c++-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827882" comment="ImageMagick-c++-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827883" comment="ImageMagick-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827884" comment="ImageMagick-doc-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827885" comment="ImageMagick-perl-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827886" comment="autotrace-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827887" comment="autotrace-devel-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827888" comment="emacs-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827889" comment="emacs-common-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827890" comment="emacs-el-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827891" comment="emacs-filesystem-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827892" comment="emacs-nox-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827893" comment="emacs-terminal-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827894" comment="inkscape-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827895" comment="inkscape-docs-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827896" comment="inkscape-view-0.92.2-3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911472" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11472</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11472" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11472" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11472" ref_url="https://www.suse.com/security/cve/CVE-2019-11472" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1523-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005633.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1603-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/STQTYIB5Q2JC4ZOB7CKYDRND3OSUWGTW/#STQTYIB5Q2JC4ZOB7CKYDRND3OSUWGTW" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1683-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R7HRSDXPTVPKGAJNZBJCGV43DVFXWCDB/#R7HRSDXPTVPKGAJNZBJCGV43DVFXWCDB" source="SUSE-SU"/>
    <description>
    ReadXWDImage in coders/xwd.c in the XWD image parsing component of ImageMagick 7.0.8-41 Q16 allows attackers to cause a denial-of-service (divide-by-zero error) by crafting an XWD image file in which the header indicates neither LSB first nor MSB first.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11472/">CVE-2019-11472 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11472">CVE-2019-11472 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1133202">SUSE bug 1133202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133203">SUSE bug 1133203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133204">SUSE bug 1133204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146213">SUSE bug 1146213</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827880" comment="ImageMagick-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827881" comment="ImageMagick-c++-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827882" comment="ImageMagick-c++-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827883" comment="ImageMagick-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827884" comment="ImageMagick-doc-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827885" comment="ImageMagick-perl-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827886" comment="autotrace-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827887" comment="autotrace-devel-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827888" comment="emacs-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827889" comment="emacs-common-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827890" comment="emacs-el-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827891" comment="emacs-filesystem-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827892" comment="emacs-nox-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827893" comment="emacs-terminal-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827894" comment="inkscape-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827895" comment="inkscape-docs-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827896" comment="inkscape-view-0.92.2-3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911477" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11477</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11477" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11477" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11477" ref_url="https://www.suse.com/security/cve/CVE-2019-11477" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1668-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1674-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="TID000019472" ref_url="https://www.suse.com/support/kb/doc/?id=000019472" source="SUSE-SU"/>
		<reference ref_id="TID7023928" ref_url="https://www.suse.com/support/kb/doc/?id=7023928" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1570-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NJCQPY6KJMGUNOCG3VYC34NI2F6XUC3N/#NJCQPY6KJMGUNOCG3VYC34NI2F6XUC3N" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1571-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CDOL6RIYB7LA5CRMCAHJHNNPCUYRJAEV/#CDOL6RIYB7LA5CRMCAHJHNNPCUYRJAEV" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1579-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GOX3GRSFJIOAQWX677KTNVAGGH653HWU/#GOX3GRSFJIOAQWX677KTNVAGGH653HWU" source="SUSE-SU"/>
    <description>
    Jonathan Looney discovered that the TCP_SKB_CB(skb)-&gt;tcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit 3b4929f65b0d8249f19a50245cd88ed1a2f78cff.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-11477/">CVE-2019-11477 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11477">CVE-2019-11477 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1132686">SUSE bug 1132686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137586">SUSE bug 1137586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142129">SUSE bug 1142129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153242">SUSE bug 1153242</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825833" comment="bpftool-3.10.0-957.21.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825834" comment="kernel-3.10.0-957.21.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825835" comment="kernel-abi-whitelists-3.10.0-957.21.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825836" comment="kernel-debug-3.10.0-957.21.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825839" comment="kernel-doc-3.10.0-957.21.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825840" comment="kernel-headers-3.10.0-957.21.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825841" comment="kernel-tools-3.10.0-957.21.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825842" comment="kernel-tools-libs-3.10.0-957.21.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825844" comment="perf-3.10.0-957.21.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825845" comment="python-perf-3.10.0-957.21.3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911478" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11478</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11478" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11478" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11478" ref_url="https://www.suse.com/security/cve/CVE-2019-11478" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1668-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1674-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1851-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20191851-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006072.html" source="SUSE-SU"/>
		<reference ref_id="TID000019472" ref_url="https://www.suse.com/support/kb/doc/?id=000019472" source="SUSE-SU"/>
		<reference ref_id="TID7023928" ref_url="https://www.suse.com/support/kb/doc/?id=7023928" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1570-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NJCQPY6KJMGUNOCG3VYC34NI2F6XUC3N/#NJCQPY6KJMGUNOCG3VYC34NI2F6XUC3N" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1571-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CDOL6RIYB7LA5CRMCAHJHNNPCUYRJAEV/#CDOL6RIYB7LA5CRMCAHJHNNPCUYRJAEV" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1579-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GOX3GRSFJIOAQWX677KTNVAGGH653HWU/#GOX3GRSFJIOAQWX677KTNVAGGH653HWU" source="SUSE-SU"/>
    <description>
    Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit f070ef2ac66716357066b683fb0baf55f8191a2e.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11478/">CVE-2019-11478 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11478">CVE-2019-11478 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1132686">SUSE bug 1132686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137586">SUSE bug 1137586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142129">SUSE bug 1142129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143542">SUSE bug 1143542</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825833" comment="bpftool-3.10.0-957.21.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825834" comment="kernel-3.10.0-957.21.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825835" comment="kernel-abi-whitelists-3.10.0-957.21.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825836" comment="kernel-debug-3.10.0-957.21.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825839" comment="kernel-doc-3.10.0-957.21.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825840" comment="kernel-headers-3.10.0-957.21.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825841" comment="kernel-tools-3.10.0-957.21.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825842" comment="kernel-tools-libs-3.10.0-957.21.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825844" comment="perf-3.10.0-957.21.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825845" comment="python-perf-3.10.0-957.21.3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911479" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11479</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11479" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11479" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11479" ref_url="https://www.suse.com/security/cve/CVE-2019-11479" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="TID000019472" ref_url="https://www.suse.com/support/kb/doc/?id=000019472" source="SUSE-SU"/>
		<reference ref_id="TID7023928" ref_url="https://www.suse.com/support/kb/doc/?id=7023928" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1570-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NJCQPY6KJMGUNOCG3VYC34NI2F6XUC3N/#NJCQPY6KJMGUNOCG3VYC34NI2F6XUC3N" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1571-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CDOL6RIYB7LA5CRMCAHJHNNPCUYRJAEV/#CDOL6RIYB7LA5CRMCAHJHNNPCUYRJAEV" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1579-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GOX3GRSFJIOAQWX677KTNVAGGH653HWU/#GOX3GRSFJIOAQWX677KTNVAGGH653HWU" source="SUSE-SU"/>
    <description>
    Jonathan Looney discovered that the Linux kernel default MSS is hard-coded to 48 bytes. This allows a remote peer to fragment TCP resend queues significantly more than if a larger MSS were enforced. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commits 967c05aee439e6e5d7d805e195b3a20ef5c433d6 and 5f3e2bf008c2221478101ee72f5cb4654b9fc363.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11479/">CVE-2019-11479 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11479">CVE-2019-11479 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1132686">SUSE bug 1132686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137586">SUSE bug 1137586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142129">SUSE bug 1142129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143542">SUSE bug 1143542</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825833" comment="bpftool-3.10.0-957.21.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825834" comment="kernel-3.10.0-957.21.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825835" comment="kernel-abi-whitelists-3.10.0-957.21.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825836" comment="kernel-debug-3.10.0-957.21.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825839" comment="kernel-doc-3.10.0-957.21.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825840" comment="kernel-headers-3.10.0-957.21.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825841" comment="kernel-tools-3.10.0-957.21.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825842" comment="kernel-tools-libs-3.10.0-957.21.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825844" comment="perf-3.10.0-957.21.3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825845" comment="python-perf-3.10.0-957.21.3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911487" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11487</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11487" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11487" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11487" ref_url="https://www.suse.com/security/cve/CVE-2019-11487" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1668-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1674-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005668.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1823-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1852-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20191852-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1570-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NJCQPY6KJMGUNOCG3VYC34NI2F6XUC3N/#NJCQPY6KJMGUNOCG3VYC34NI2F6XUC3N" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1571-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CDOL6RIYB7LA5CRMCAHJHNNPCUYRJAEV/#CDOL6RIYB7LA5CRMCAHJHNNPCUYRJAEV" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1579-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GOX3GRSFJIOAQWX677KTNVAGGH653HWU/#GOX3GRSFJIOAQWX677KTNVAGGH653HWU" source="SUSE-SU"/>
    <description>
    The Linux kernel before 5.1-rc5 allows page-&gt;_refcount reference count overflow, with resultant use-after-free issues, if about 140 GiB of RAM exists. This is related to fs/fuse/dev.c, fs/pipe.c, fs/splice.c, include/linux/mm.h, include/linux/pipe_fs_i.h, kernel/trace/trace.c, mm/gup.c, and mm/hugetlb.c. It can occur with FUSE requests.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11487/">CVE-2019-11487 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11487">CVE-2019-11487 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1133190">SUSE bug 1133190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133191">SUSE bug 1133191</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826933" comment="bpftool-3.10.0-1062.18.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826934" comment="kernel-3.10.0-1062.18.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826935" comment="kernel-abi-whitelists-3.10.0-1062.18.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826936" comment="kernel-debug-3.10.0-1062.18.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826939" comment="kernel-doc-3.10.0-1062.18.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826940" comment="kernel-headers-3.10.0-1062.18.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826941" comment="kernel-tools-3.10.0-1062.18.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826942" comment="kernel-tools-libs-3.10.0-1062.18.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826944" comment="perf-3.10.0-1062.18.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826945" comment="python-perf-3.10.0-1062.18.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911500" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11500</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11500" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11500" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11500" ref_url="https://www.suse.com/security/cve/CVE-2019-11500" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2454-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005980.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2278-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4ZX4AZ5LGOZTCD7HGA6Y7KWE3LMXAGVL/#4ZX4AZ5LGOZTCD7HGA6Y7KWE3LMXAGVL" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2281-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IMVHW3467XEMK5NR3ZTGJITWRNY4PIDD/#IMVHW3467XEMK5NR3ZTGJITWRNY4PIDD" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14715-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KZSDCZ5LA6IHY7KXVSL6ULAJVP6OFT2M/" source="SUSE-SU"/>
    <description>
    In Dovecot before 2.2.36.4 and 2.3.x before 2.3.7.2 (and Pigeonhole before 0.5.7.2), protocol processing can fail for quoted strings. This occurs because '\0' characters are mishandled, and can lead to out-of-bounds writes and remote code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11500/">CVE-2019-11500 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11500">CVE-2019-11500 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1145559">SUSE bug 1145559</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826644" comment="dovecot-2.2.36-3.el7_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826645" comment="dovecot-devel-2.2.36-3.el7_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826646" comment="dovecot-mysql-2.2.36-3.el7_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826647" comment="dovecot-pgsql-2.2.36-3.el7_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826648" comment="dovecot-pigeonhole-2.2.36-3.el7_7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911597" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11597</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11597" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11597" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11597" ref_url="https://www.suse.com/security/cve/CVE-2019-11597" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005670.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1683-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R7HRSDXPTVPKGAJNZBJCGV43DVFXWCDB/#R7HRSDXPTVPKGAJNZBJCGV43DVFXWCDB" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1795-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5YZNSIXGPGN372UJTEEWMWF7Z73XUBQX/#5YZNSIXGPGN372UJTEEWMWF7Z73XUBQX" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.8-43 Q16, there is a heap-based buffer over-read in the function WriteTIFFImage of coders/tiff.c, which allows an attacker to cause a denial of service or possibly information disclosure via a crafted image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11597/">CVE-2019-11597 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11597">CVE-2019-11597 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1138464">SUSE bug 1138464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146211">SUSE bug 1146211</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827880" comment="ImageMagick-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827881" comment="ImageMagick-c++-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827882" comment="ImageMagick-c++-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827883" comment="ImageMagick-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827884" comment="ImageMagick-doc-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827885" comment="ImageMagick-perl-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827886" comment="autotrace-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827887" comment="autotrace-devel-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827888" comment="emacs-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827889" comment="emacs-common-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827890" comment="emacs-el-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827891" comment="emacs-filesystem-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827892" comment="emacs-nox-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827893" comment="emacs-terminal-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827894" comment="inkscape-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827895" comment="inkscape-docs-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827896" comment="inkscape-view-0.92.2-3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911598" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11598</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11598" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11598" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11598" ref_url="https://www.suse.com/security/cve/CVE-2019-11598" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1523-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005633.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1603-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/STQTYIB5Q2JC4ZOB7CKYDRND3OSUWGTW/#STQTYIB5Q2JC4ZOB7CKYDRND3OSUWGTW" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1683-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R7HRSDXPTVPKGAJNZBJCGV43DVFXWCDB/#R7HRSDXPTVPKGAJNZBJCGV43DVFXWCDB" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.8-40 Q16, there is a heap-based buffer over-read in the function WritePNMImage of coders/pnm.c, which allows an attacker to cause a denial of service or possibly information disclosure via a crafted image file. This is related to SetGrayscaleImage in MagickCore/quantize.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11598/">CVE-2019-11598 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11598">CVE-2019-11598 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1136732">SUSE bug 1136732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179313">SUSE bug 1179313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179336">SUSE bug 1179336</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827880" comment="ImageMagick-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827881" comment="ImageMagick-c++-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827882" comment="ImageMagick-c++-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827883" comment="ImageMagick-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827884" comment="ImageMagick-doc-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827885" comment="ImageMagick-perl-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827886" comment="autotrace-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827887" comment="autotrace-devel-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827888" comment="emacs-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827889" comment="emacs-common-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827890" comment="emacs-el-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827891" comment="emacs-filesystem-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827892" comment="emacs-nox-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827893" comment="emacs-terminal-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827894" comment="inkscape-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827895" comment="inkscape-docs-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827896" comment="inkscape-view-0.92.2-3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911599" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11599</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11599" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11599" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11599" ref_url="https://www.suse.com/security/cve/CVE-2019-11599" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1823-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1851-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20191851-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1852-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20191852-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005958.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1716-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HJXAHNWJ4IAQN4V6E2PEXAAFMQPYBBPT/#HJXAHNWJ4IAQN4V6E2PEXAAFMQPYBBPT" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1757-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PJTYGHQOYDY2SFDAAFYO3E3URRCWKEUQ/#PJTYGHQOYDY2SFDAAFYO3E3URRCWKEUQ" source="SUSE-SU"/>
    <description>
    The coredump implementation in the Linux kernel before 5.0.10 does not use locking or other mechanisms to prevent vma layout or vma flags changes while it runs, which allows local users to obtain sensitive information, cause a denial of service, or possibly have unspecified other impact by triggering a race condition with mmget_not_zero or get_task_mm calls. This is related to fs/userfaultfd.c, mm/mmap.c, fs/proc/task_mmu.c, and drivers/infiniband/core/uverbs_main.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11599/">CVE-2019-11599 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11599">CVE-2019-11599 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1131645">SUSE bug 1131645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133738">SUSE bug 1133738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157905">SUSE bug 1157905</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826007" comment="bpftool-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826008" comment="kernel-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826009" comment="kernel-abi-whitelists-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826010" comment="kernel-debug-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826013" comment="kernel-doc-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826014" comment="kernel-headers-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826015" comment="kernel-tools-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826016" comment="kernel-tools-libs-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826018" comment="perf-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826019" comment="python-perf-3.10.0-1062.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911691" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11691</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11691" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11691" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11691" ref_url="https://www.suse.com/security/cve/CVE-2019-11691" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1405-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005544.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1484-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CTZNURZG4U3I3C6SR6N64PNF5AQ2VWNR/#CTZNURZG4U3I3C6SR6N64PNF5AQ2VWNR" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1534-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YRJRSOQJ2HUXLMXMB5IAGC7CGYVG6MJ7/#YRJRSOQJ2HUXLMXMB5IAGC7CGYVG6MJ7" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1664-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZFVBHHF6WMJDJB73NZDWFFGS6D23TB67/#ZFVBHHF6WMJDJB73NZDWFFGS6D23TB67" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability can occur when working with XMLHttpRequest (XHR) in an event loop, causing the XHR main thread to be called after it has been freed. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 60.7, Firefox &lt; 67, and Firefox ESR &lt; 60.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11691/">CVE-2019-11691 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11691">CVE-2019-11691 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1135824">SUSE bug 1135824</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825817" comment="firefox-60.7.0-1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825832" comment="thunderbird-60.7.0-1.el7_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911692" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11692</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11692" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11692" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11692" ref_url="https://www.suse.com/security/cve/CVE-2019-11692" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1405-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005544.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1484-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CTZNURZG4U3I3C6SR6N64PNF5AQ2VWNR/#CTZNURZG4U3I3C6SR6N64PNF5AQ2VWNR" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1534-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YRJRSOQJ2HUXLMXMB5IAGC7CGYVG6MJ7/#YRJRSOQJ2HUXLMXMB5IAGC7CGYVG6MJ7" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1664-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZFVBHHF6WMJDJB73NZDWFFGS6D23TB67/#ZFVBHHF6WMJDJB73NZDWFFGS6D23TB67" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability can occur when listeners are removed from the event listener manager while still in use, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 60.7, Firefox &lt; 67, and Firefox ESR &lt; 60.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11692/">CVE-2019-11692 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11692">CVE-2019-11692 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1135824">SUSE bug 1135824</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825817" comment="firefox-60.7.0-1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825832" comment="thunderbird-60.7.0-1.el7_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911693" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11693</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11693" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11693" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11693" ref_url="https://www.suse.com/security/cve/CVE-2019-11693" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1405-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005544.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1484-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CTZNURZG4U3I3C6SR6N64PNF5AQ2VWNR/#CTZNURZG4U3I3C6SR6N64PNF5AQ2VWNR" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1534-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YRJRSOQJ2HUXLMXMB5IAGC7CGYVG6MJ7/#YRJRSOQJ2HUXLMXMB5IAGC7CGYVG6MJ7" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1664-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZFVBHHF6WMJDJB73NZDWFFGS6D23TB67/#ZFVBHHF6WMJDJB73NZDWFFGS6D23TB67" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    The bufferdata function in WebGL is vulnerable to a buffer overflow with specific graphics drivers on Linux. This could result in malicious content freezing a tab or triggering a potentially exploitable crash. *Note: this issue only occurs on Linux. Other operating systems are unaffected.*. This vulnerability affects Thunderbird &lt; 60.7, Firefox &lt; 67, and Firefox ESR &lt; 60.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11693/">CVE-2019-11693 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11693">CVE-2019-11693 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1135824">SUSE bug 1135824</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825817" comment="firefox-60.7.0-1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825832" comment="thunderbird-60.7.0-1.el7_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911698" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11698</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11698" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11698" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11698" ref_url="https://www.suse.com/security/cve/CVE-2019-11698" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1405-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005544.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1484-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CTZNURZG4U3I3C6SR6N64PNF5AQ2VWNR/#CTZNURZG4U3I3C6SR6N64PNF5AQ2VWNR" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1534-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YRJRSOQJ2HUXLMXMB5IAGC7CGYVG6MJ7/#YRJRSOQJ2HUXLMXMB5IAGC7CGYVG6MJ7" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1664-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZFVBHHF6WMJDJB73NZDWFFGS6D23TB67/#ZFVBHHF6WMJDJB73NZDWFFGS6D23TB67" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    If a crafted hyperlink is dragged and dropped to the bookmark bar or sidebar and the resulting bookmark is subsequently dragged and dropped into the web content area, an arbitrary query of a user's browser history can be run and transmitted to the content page via drop event data. This allows for the theft of browser history by a malicious site. This vulnerability affects Thunderbird &lt; 60.7, Firefox &lt; 67, and Firefox ESR &lt; 60.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11698/">CVE-2019-11698 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11698">CVE-2019-11698 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1135824">SUSE bug 1135824</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825817" comment="firefox-60.7.0-1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825832" comment="thunderbird-60.7.0-1.el7_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911703" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11703</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11703" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11703" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11703" ref_url="https://www.suse.com/security/cve/CVE-2019-11703" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005558.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005623.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1577-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WCIMQTHFDN4TV42SAUIRCICP4ADJVYNJ/#WCIMQTHFDN4TV42SAUIRCICP4ADJVYNJ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1583-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FZRVVKWNJN3X4BODFXF57K5CF6KN4CQH/#FZRVVKWNJN3X4BODFXF57K5CF6KN4CQH" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1606-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LLKQ5EZXADDPRD2AIRRG5BLXWO4VGDSF/#LLKQ5EZXADDPRD2AIRRG5BLXWO4VGDSF" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1664-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZFVBHHF6WMJDJB73NZDWFFGS6D23TB67/#ZFVBHHF6WMJDJB73NZDWFFGS6D23TB67" source="SUSE-SU"/>
    <description>
    A flaw in Thunderbird's implementation of iCal causes a heap buffer overflow in parser_get_next_char when processing certain email messages, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 60.7.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-10-24"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11703/">CVE-2019-11703 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11703">CVE-2019-11703 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1137595">SUSE bug 1137595</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825890" comment="thunderbird-60.7.2-2.el7_6 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911704" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11704</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11704" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11704" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11704" ref_url="https://www.suse.com/security/cve/CVE-2019-11704" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005558.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005623.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1577-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WCIMQTHFDN4TV42SAUIRCICP4ADJVYNJ/#WCIMQTHFDN4TV42SAUIRCICP4ADJVYNJ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1583-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FZRVVKWNJN3X4BODFXF57K5CF6KN4CQH/#FZRVVKWNJN3X4BODFXF57K5CF6KN4CQH" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1606-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LLKQ5EZXADDPRD2AIRRG5BLXWO4VGDSF/#LLKQ5EZXADDPRD2AIRRG5BLXWO4VGDSF" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1664-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZFVBHHF6WMJDJB73NZDWFFGS6D23TB67/#ZFVBHHF6WMJDJB73NZDWFFGS6D23TB67" source="SUSE-SU"/>
    <description>
    A flaw in Thunderbird's implementation of iCal causes a heap buffer overflow in icalmemory_strdup_and_dequote when processing certain email messages, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 60.7.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-10-25"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11704/">CVE-2019-11704 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11704">CVE-2019-11704 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1137595">SUSE bug 1137595</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825890" comment="thunderbird-60.7.2-2.el7_6 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911705" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11705</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11705" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11705" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11705" ref_url="https://www.suse.com/security/cve/CVE-2019-11705" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005558.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005623.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1577-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WCIMQTHFDN4TV42SAUIRCICP4ADJVYNJ/#WCIMQTHFDN4TV42SAUIRCICP4ADJVYNJ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1583-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FZRVVKWNJN3X4BODFXF57K5CF6KN4CQH/#FZRVVKWNJN3X4BODFXF57K5CF6KN4CQH" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1606-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LLKQ5EZXADDPRD2AIRRG5BLXWO4VGDSF/#LLKQ5EZXADDPRD2AIRRG5BLXWO4VGDSF" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1664-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZFVBHHF6WMJDJB73NZDWFFGS6D23TB67/#ZFVBHHF6WMJDJB73NZDWFFGS6D23TB67" source="SUSE-SU"/>
    <description>
    A flaw in Thunderbird's implementation of iCal causes a stack buffer overflow in icalrecur_add_bydayrules when processing certain email messages, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 60.7.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-10-23"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11705/">CVE-2019-11705 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11705">CVE-2019-11705 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1137595">SUSE bug 1137595</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825890" comment="thunderbird-60.7.2-2.el7_6 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911706" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11706</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11706" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11706" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11706" ref_url="https://www.suse.com/security/cve/CVE-2019-11706" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005558.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005623.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1577-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WCIMQTHFDN4TV42SAUIRCICP4ADJVYNJ/#WCIMQTHFDN4TV42SAUIRCICP4ADJVYNJ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1583-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FZRVVKWNJN3X4BODFXF57K5CF6KN4CQH/#FZRVVKWNJN3X4BODFXF57K5CF6KN4CQH" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1606-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LLKQ5EZXADDPRD2AIRRG5BLXWO4VGDSF/#LLKQ5EZXADDPRD2AIRRG5BLXWO4VGDSF" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1664-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZFVBHHF6WMJDJB73NZDWFFGS6D23TB67/#ZFVBHHF6WMJDJB73NZDWFFGS6D23TB67" source="SUSE-SU"/>
    <description>
    A flaw in Thunderbird's implementation of iCal causes a type confusion in icaltimezone_get_vtimezone_properties when processing certain email messages, resulting in a crash. This vulnerability affects Thunderbird &lt; 60.7.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-10-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11706/">CVE-2019-11706 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11706">CVE-2019-11706 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1137595">SUSE bug 1137595</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825890" comment="thunderbird-60.7.2-2.el7_6 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911707" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11707</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11707" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11707" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11707" ref_url="https://www.suse.com/security/cve/CVE-2019-11707" source="SUSE CVE"/>
		<reference ref_id="SUSE-RU-2019:1625-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2019-June/011821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005623.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1593-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AVI7KKW6DTGF6PJHZEXDKEANATAFIDY5/#AVI7KKW6DTGF6PJHZEXDKEANATAFIDY5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1594-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KJQO6IL224BRB2K7BQINQENKIGOWFCEV/#KJQO6IL224BRB2K7BQINQENKIGOWFCEV" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1606-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LLKQ5EZXADDPRD2AIRRG5BLXWO4VGDSF/#LLKQ5EZXADDPRD2AIRRG5BLXWO4VGDSF" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1664-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZFVBHHF6WMJDJB73NZDWFFGS6D23TB67/#ZFVBHHF6WMJDJB73NZDWFFGS6D23TB67" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A type confusion vulnerability can occur when manipulating JavaScript objects due to issues in Array.pop. This can allow for an exploitable crash. We are aware of targeted attacks in the wild abusing this flaw. This vulnerability affects Firefox ESR &lt; 60.7.1, Firefox &lt; 67.0.3, and Thunderbird &lt; 60.7.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11707/">CVE-2019-11707 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11707">CVE-2019-11707 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1138614">SUSE bug 1138614</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825884" comment="firefox-60.7.2-1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825890" comment="thunderbird-60.7.2-2.el7_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911708" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11708</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11708" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11708" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11708" ref_url="https://www.suse.com/security/cve/CVE-2019-11708" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005624.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1594-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KJQO6IL224BRB2K7BQINQENKIGOWFCEV/#KJQO6IL224BRB2K7BQINQENKIGOWFCEV" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1595-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XALV3AU3HBDKJFBHPZDW2YNTUSXWL2UF/#XALV3AU3HBDKJFBHPZDW2YNTUSXWL2UF" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1606-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LLKQ5EZXADDPRD2AIRRG5BLXWO4VGDSF/#LLKQ5EZXADDPRD2AIRRG5BLXWO4VGDSF" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1664-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZFVBHHF6WMJDJB73NZDWFFGS6D23TB67/#ZFVBHHF6WMJDJB73NZDWFFGS6D23TB67" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Insufficient vetting of parameters passed with the Prompt:Open IPC message between child and parent processes can result in the non-sandboxed parent process opening web content chosen by a compromised child process. When combined with additional vulnerabilities this could result in executing arbitrary code on the user's computer. This vulnerability affects Firefox ESR &lt; 60.7.2, Firefox &lt; 67.0.4, and Thunderbird &lt; 60.7.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11708/">CVE-2019-11708 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11708">CVE-2019-11708 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1138872">SUSE bug 1138872</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825884" comment="firefox-60.7.2-1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825890" comment="thunderbird-60.7.2-2.el7_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911709" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11709</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11709" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11709" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11709" ref_url="https://www.suse.com/security/cve/CVE-2019-11709" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1782-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/L2OL5NHTBFHZV7CIYYV5WBHTHT5OL4L4/#L2OL5NHTBFHZV7CIYYV5WBHTHT5OL4L4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1811-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NPELIQJSVPILKWICIZT35XKU63YJVM3B/#NPELIQJSVPILKWICIZT35XKU63YJVM3B" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1813-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/V27WB75NZG4F3JRTHROVZKQF44DOF2SZ/#V27WB75NZG4F3JRTHROVZKQF44DOF2SZ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1990-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IM3PWUII7AODRR5RC2OP6EBPMKQT446V/#IM3PWUII7AODRR5RC2OP6EBPMKQT446V" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2248-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QT7HMZ3VUEMJ463IILXJ7LOGN6RQAID5/#QT7HMZ3VUEMJ463IILXJ7LOGN6RQAID5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2249-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MZU237GIBE77LH7VPAJS5W64IMRQ7NSM/#MZU237GIBE77LH7VPAJS5W64IMRQ7NSM" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Mozilla developers and community members reported memory safety bugs present in Firefox 67 and Firefox ESR 60.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox ESR &lt; 60.8, Firefox &lt; 68, and Thunderbird &lt; 60.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11709/">CVE-2019-11709 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11709">CVE-2019-11709 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825891" comment="firefox-60.8.0-1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825892" comment="thunderbird-60.8.0-1.el7_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911711" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11711</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11711" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11711" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11711" ref_url="https://www.suse.com/security/cve/CVE-2019-11711" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1782-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/L2OL5NHTBFHZV7CIYYV5WBHTHT5OL4L4/#L2OL5NHTBFHZV7CIYYV5WBHTHT5OL4L4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1811-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NPELIQJSVPILKWICIZT35XKU63YJVM3B/#NPELIQJSVPILKWICIZT35XKU63YJVM3B" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1813-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/V27WB75NZG4F3JRTHROVZKQF44DOF2SZ/#V27WB75NZG4F3JRTHROVZKQF44DOF2SZ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1990-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IM3PWUII7AODRR5RC2OP6EBPMKQT446V/#IM3PWUII7AODRR5RC2OP6EBPMKQT446V" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2248-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QT7HMZ3VUEMJ463IILXJ7LOGN6RQAID5/#QT7HMZ3VUEMJ463IILXJ7LOGN6RQAID5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2249-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MZU237GIBE77LH7VPAJS5W64IMRQ7NSM/#MZU237GIBE77LH7VPAJS5W64IMRQ7NSM" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    When an inner window is reused, it does not consider the use of document.domain for cross-origin protections. If pages on different subdomains ever cooperatively use document.domain, then either page can abuse this to inject script into arbitrary pages on the other subdomain, even those that did not use document.domain to relax their origin security. This vulnerability affects Firefox ESR &lt; 60.8, Firefox &lt; 68, and Thunderbird &lt; 60.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11711/">CVE-2019-11711 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11711">CVE-2019-11711 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825891" comment="firefox-60.8.0-1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825892" comment="thunderbird-60.8.0-1.el7_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911712" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11712</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11712" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11712" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11712" ref_url="https://www.suse.com/security/cve/CVE-2019-11712" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1782-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/L2OL5NHTBFHZV7CIYYV5WBHTHT5OL4L4/#L2OL5NHTBFHZV7CIYYV5WBHTHT5OL4L4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1811-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NPELIQJSVPILKWICIZT35XKU63YJVM3B/#NPELIQJSVPILKWICIZT35XKU63YJVM3B" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1813-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/V27WB75NZG4F3JRTHROVZKQF44DOF2SZ/#V27WB75NZG4F3JRTHROVZKQF44DOF2SZ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1990-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IM3PWUII7AODRR5RC2OP6EBPMKQT446V/#IM3PWUII7AODRR5RC2OP6EBPMKQT446V" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2248-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QT7HMZ3VUEMJ463IILXJ7LOGN6RQAID5/#QT7HMZ3VUEMJ463IILXJ7LOGN6RQAID5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2249-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MZU237GIBE77LH7VPAJS5W64IMRQ7NSM/#MZU237GIBE77LH7VPAJS5W64IMRQ7NSM" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    POST requests made by NPAPI plugins, such as Flash, that receive a status 308 redirect response can bypass CORS requirements. This can allow an attacker to perform Cross-Site Request Forgery (CSRF) attacks. This vulnerability affects Firefox ESR &lt; 60.8, Firefox &lt; 68, and Thunderbird &lt; 60.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11712/">CVE-2019-11712 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11712">CVE-2019-11712 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825891" comment="firefox-60.8.0-1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825892" comment="thunderbird-60.8.0-1.el7_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911713" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11713</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11713" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11713" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11713" ref_url="https://www.suse.com/security/cve/CVE-2019-11713" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1782-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/L2OL5NHTBFHZV7CIYYV5WBHTHT5OL4L4/#L2OL5NHTBFHZV7CIYYV5WBHTHT5OL4L4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1811-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NPELIQJSVPILKWICIZT35XKU63YJVM3B/#NPELIQJSVPILKWICIZT35XKU63YJVM3B" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1813-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/V27WB75NZG4F3JRTHROVZKQF44DOF2SZ/#V27WB75NZG4F3JRTHROVZKQF44DOF2SZ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1990-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IM3PWUII7AODRR5RC2OP6EBPMKQT446V/#IM3PWUII7AODRR5RC2OP6EBPMKQT446V" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2248-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QT7HMZ3VUEMJ463IILXJ7LOGN6RQAID5/#QT7HMZ3VUEMJ463IILXJ7LOGN6RQAID5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2249-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MZU237GIBE77LH7VPAJS5W64IMRQ7NSM/#MZU237GIBE77LH7VPAJS5W64IMRQ7NSM" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability can occur in HTTP/2 when a cached HTTP/2 stream is closed while still in use, resulting in a potentially exploitable crash. This vulnerability affects Firefox ESR &lt; 60.8, Firefox &lt; 68, and Thunderbird &lt; 60.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11713/">CVE-2019-11713 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11713">CVE-2019-11713 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825891" comment="firefox-60.8.0-1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825892" comment="thunderbird-60.8.0-1.el7_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911715" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11715</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11715" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11715" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11715" ref_url="https://www.suse.com/security/cve/CVE-2019-11715" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1782-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/L2OL5NHTBFHZV7CIYYV5WBHTHT5OL4L4/#L2OL5NHTBFHZV7CIYYV5WBHTHT5OL4L4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1811-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NPELIQJSVPILKWICIZT35XKU63YJVM3B/#NPELIQJSVPILKWICIZT35XKU63YJVM3B" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1813-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/V27WB75NZG4F3JRTHROVZKQF44DOF2SZ/#V27WB75NZG4F3JRTHROVZKQF44DOF2SZ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1990-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IM3PWUII7AODRR5RC2OP6EBPMKQT446V/#IM3PWUII7AODRR5RC2OP6EBPMKQT446V" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2248-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QT7HMZ3VUEMJ463IILXJ7LOGN6RQAID5/#QT7HMZ3VUEMJ463IILXJ7LOGN6RQAID5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2249-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MZU237GIBE77LH7VPAJS5W64IMRQ7NSM/#MZU237GIBE77LH7VPAJS5W64IMRQ7NSM" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Due to an error while parsing page content, it is possible for properly sanitized user input to be misinterpreted and lead to XSS hazards on web sites in certain circumstances. This vulnerability affects Firefox ESR &lt; 60.8, Firefox &lt; 68, and Thunderbird &lt; 60.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11715/">CVE-2019-11715 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11715">CVE-2019-11715 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825891" comment="firefox-60.8.0-1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825892" comment="thunderbird-60.8.0-1.el7_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911717" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11717</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11717" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11717" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11717" ref_url="https://www.suse.com/security/cve/CVE-2019-11717" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1782-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/L2OL5NHTBFHZV7CIYYV5WBHTHT5OL4L4/#L2OL5NHTBFHZV7CIYYV5WBHTHT5OL4L4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1811-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NPELIQJSVPILKWICIZT35XKU63YJVM3B/#NPELIQJSVPILKWICIZT35XKU63YJVM3B" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1813-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/V27WB75NZG4F3JRTHROVZKQF44DOF2SZ/#V27WB75NZG4F3JRTHROVZKQF44DOF2SZ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1990-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IM3PWUII7AODRR5RC2OP6EBPMKQT446V/#IM3PWUII7AODRR5RC2OP6EBPMKQT446V" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2248-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QT7HMZ3VUEMJ463IILXJ7LOGN6RQAID5/#QT7HMZ3VUEMJ463IILXJ7LOGN6RQAID5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2249-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MZU237GIBE77LH7VPAJS5W64IMRQ7NSM/#MZU237GIBE77LH7VPAJS5W64IMRQ7NSM" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A vulnerability exists where the caret ("^") character is improperly escaped constructing some URIs due to it being used as a separator, allowing for possible spoofing of origin attributes. This vulnerability affects Firefox ESR &lt; 60.8, Firefox &lt; 68, and Thunderbird &lt; 60.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11717/">CVE-2019-11717 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11717">CVE-2019-11717 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825891" comment="firefox-60.8.0-1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825892" comment="thunderbird-60.8.0-1.el7_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911719" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11719</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11719" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11719" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11719" ref_url="https://www.suse.com/security/cve/CVE-2019-11719" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1782-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/L2OL5NHTBFHZV7CIYYV5WBHTHT5OL4L4/#L2OL5NHTBFHZV7CIYYV5WBHTHT5OL4L4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1811-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NPELIQJSVPILKWICIZT35XKU63YJVM3B/#NPELIQJSVPILKWICIZT35XKU63YJVM3B" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1813-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/V27WB75NZG4F3JRTHROVZKQF44DOF2SZ/#V27WB75NZG4F3JRTHROVZKQF44DOF2SZ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1990-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IM3PWUII7AODRR5RC2OP6EBPMKQT446V/#IM3PWUII7AODRR5RC2OP6EBPMKQT446V" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2248-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QT7HMZ3VUEMJ463IILXJ7LOGN6RQAID5/#QT7HMZ3VUEMJ463IILXJ7LOGN6RQAID5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2249-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MZU237GIBE77LH7VPAJS5W64IMRQ7NSM/#MZU237GIBE77LH7VPAJS5W64IMRQ7NSM" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    When importing a curve25519 private key in PKCS#8format with leading 0x00 bytes, it is possible to trigger an out-of-bounds read in the Network Security Services (NSS) library. This could lead to information disclosure. This vulnerability affects Firefox ESR &lt; 60.8, Firefox &lt; 68, and Thunderbird &lt; 60.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11719/">CVE-2019-11719 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11719">CVE-2019-11719 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828558" comment="nspr-4.25.0-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828559" comment="nspr-devel-4.25.0-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828560" comment="nss-3.53.1-3.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828561" comment="nss-devel-3.53.1-3.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828562" comment="nss-pkcs11-devel-3.53.1-3.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828563" comment="nss-softokn-3.53.1-6.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828564" comment="nss-softokn-devel-3.53.1-6.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828565" comment="nss-softokn-freebl-3.53.1-6.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828566" comment="nss-softokn-freebl-devel-3.53.1-6.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828567" comment="nss-sysinit-3.53.1-3.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828568" comment="nss-tools-3.53.1-3.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828569" comment="nss-util-3.53.1-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828570" comment="nss-util-devel-3.53.1-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911727" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11727</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11727" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11727" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11727" ref_url="https://www.suse.com/security/cve/CVE-2019-11727" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007079.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2248-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QT7HMZ3VUEMJ463IILXJ7LOGN6RQAID5/#QT7HMZ3VUEMJ463IILXJ7LOGN6RQAID5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2249-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MZU237GIBE77LH7VPAJS5W64IMRQ7NSM/#MZU237GIBE77LH7VPAJS5W64IMRQ7NSM" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2251-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/D6AIQRJID7DIPCU5KTEO6R57LSZRFM6K/#D6AIQRJID7DIPCU5KTEO6R57LSZRFM6K" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2260-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W2DVGAQNNMLX7LJQ6C6CR4YYNEUN3XNO/#W2DVGAQNNMLX7LJQ6C6CR4YYNEUN3XNO" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A vulnerability exists where it possible to force Network Security Services (NSS) to sign CertificateVerify with PKCS#1 v1.5 signatures when those are the only ones advertised by server in CertificateRequest in TLS 1.3. PKCS#1 v1.5 signatures should not be used for TLS 1.3 messages. This vulnerability affects Firefox &lt; 68.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-04"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11727/">CVE-2019-11727 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11727">CVE-2019-11727 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141322">SUSE bug 1141322</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828558" comment="nspr-4.25.0-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828559" comment="nspr-devel-4.25.0-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828560" comment="nss-3.53.1-3.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828561" comment="nss-devel-3.53.1-3.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828562" comment="nss-pkcs11-devel-3.53.1-3.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828563" comment="nss-softokn-3.53.1-6.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828564" comment="nss-softokn-devel-3.53.1-6.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828565" comment="nss-softokn-freebl-3.53.1-6.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828566" comment="nss-softokn-freebl-devel-3.53.1-6.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828567" comment="nss-sysinit-3.53.1-3.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828568" comment="nss-tools-3.53.1-3.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828569" comment="nss-util-3.53.1-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828570" comment="nss-util-devel-3.53.1-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911729" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11729</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11729" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11729" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11729" ref_url="https://www.suse.com/security/cve/CVE-2019-11729" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1782-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/L2OL5NHTBFHZV7CIYYV5WBHTHT5OL4L4/#L2OL5NHTBFHZV7CIYYV5WBHTHT5OL4L4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1811-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NPELIQJSVPILKWICIZT35XKU63YJVM3B/#NPELIQJSVPILKWICIZT35XKU63YJVM3B" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1813-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/V27WB75NZG4F3JRTHROVZKQF44DOF2SZ/#V27WB75NZG4F3JRTHROVZKQF44DOF2SZ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1990-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IM3PWUII7AODRR5RC2OP6EBPMKQT446V/#IM3PWUII7AODRR5RC2OP6EBPMKQT446V" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2248-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QT7HMZ3VUEMJ463IILXJ7LOGN6RQAID5/#QT7HMZ3VUEMJ463IILXJ7LOGN6RQAID5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2249-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MZU237GIBE77LH7VPAJS5W64IMRQ7NSM/#MZU237GIBE77LH7VPAJS5W64IMRQ7NSM" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Empty or malformed p256-ECDH public keys may trigger a segmentation fault due values being improperly sanitized before being copied into memory and used. This vulnerability affects Firefox ESR &lt; 60.8, Firefox &lt; 68, and Thunderbird &lt; 60.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11729/">CVE-2019-11729 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11729">CVE-2019-11729 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826791" comment="nss-3.44.0-7.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826792" comment="nss-devel-3.44.0-7.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826793" comment="nss-softokn-3.44.0-8.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826794" comment="nss-softokn-devel-3.44.0-8.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826795" comment="nss-softokn-freebl-3.44.0-8.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826796" comment="nss-softokn-freebl-devel-3.44.0-8.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826797" comment="nss-sysinit-3.44.0-7.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826798" comment="nss-tools-3.44.0-7.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826799" comment="nss-util-3.44.0-4.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826800" comment="nss-util-devel-3.44.0-4.el7_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911730" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11730</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11730" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11730" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11730" ref_url="https://www.suse.com/security/cve/CVE-2019-11730" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1782-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/L2OL5NHTBFHZV7CIYYV5WBHTHT5OL4L4/#L2OL5NHTBFHZV7CIYYV5WBHTHT5OL4L4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1811-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NPELIQJSVPILKWICIZT35XKU63YJVM3B/#NPELIQJSVPILKWICIZT35XKU63YJVM3B" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1813-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/V27WB75NZG4F3JRTHROVZKQF44DOF2SZ/#V27WB75NZG4F3JRTHROVZKQF44DOF2SZ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1990-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IM3PWUII7AODRR5RC2OP6EBPMKQT446V/#IM3PWUII7AODRR5RC2OP6EBPMKQT446V" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2248-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QT7HMZ3VUEMJ463IILXJ7LOGN6RQAID5/#QT7HMZ3VUEMJ463IILXJ7LOGN6RQAID5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2249-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MZU237GIBE77LH7VPAJS5W64IMRQ7NSM/#MZU237GIBE77LH7VPAJS5W64IMRQ7NSM" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A vulnerability exists where if a user opens a locally saved HTML file, this file can use file: URIs to access other files in the same directory or sub-directories if the names are known or guessed. The Fetch API can then be used to read the contents of any files stored in these directories and they may uploaded to a server. It was demonstrated that in combination with a popular Android messaging app, if a malicious HTML attachment is sent to a user and they opened that attachment in Firefox, due to that app's predictable pattern for locally-saved file names, it is possible to read attachments the victim received from other correspondents. This vulnerability affects Firefox ESR &lt; 60.8, Firefox &lt; 68, and Thunderbird &lt; 60.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11730/">CVE-2019-11730 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11730">CVE-2019-11730 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825891" comment="firefox-60.8.0-1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825892" comment="thunderbird-60.8.0-1.el7_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911733" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11733</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11733" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11733" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11733" ref_url="https://www.suse.com/security/cve/CVE-2019-11733" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2251-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/D6AIQRJID7DIPCU5KTEO6R57LSZRFM6K/#D6AIQRJID7DIPCU5KTEO6R57LSZRFM6K" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2260-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W2DVGAQNNMLX7LJQ6C6CR4YYNEUN3XNO/#W2DVGAQNNMLX7LJQ6C6CR4YYNEUN3XNO" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    When a master password is set, it is required to be entered again before stored passwords can be accessed in the 'Saved Logins' dialog. It was found that locally stored passwords can be copied to the clipboard thorough the 'copy password' context menu item without re-entering the master password if the master password had been previously entered in the same session, allowing for potential theft of stored passwords. This vulnerability affects Firefox &lt; 68.0.2 and Firefox ESR &lt; 68.0.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11733/">CVE-2019-11733 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11733">CVE-2019-11733 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1145665">SUSE bug 1145665</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826629" comment="firefox-60.9.0-1.el7_7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911739" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11739</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11739" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11739" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11739" ref_url="https://www.suse.com/security/cve/CVE-2019-11739" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005982.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2248-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QT7HMZ3VUEMJ463IILXJ7LOGN6RQAID5/#QT7HMZ3VUEMJ463IILXJ7LOGN6RQAID5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2249-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MZU237GIBE77LH7VPAJS5W64IMRQ7NSM/#MZU237GIBE77LH7VPAJS5W64IMRQ7NSM" source="SUSE-SU"/>
    <description>
    Encrypted S/MIME parts in a crafted multipart/alternative message can leak plaintext when included in a a HTML reply/forward. This vulnerability affects Thunderbird &lt; 68.1 and Thunderbird &lt; 60.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11739/">CVE-2019-11739 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11739">CVE-2019-11739 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1150939">SUSE bug 1150939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150940">SUSE bug 1150940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826630" comment="thunderbird-60.9.0-1.el7_7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911740" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11740</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11740" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11740" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11740" ref_url="https://www.suse.com/security/cve/CVE-2019-11740" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2248-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QT7HMZ3VUEMJ463IILXJ7LOGN6RQAID5/#QT7HMZ3VUEMJ463IILXJ7LOGN6RQAID5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2249-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MZU237GIBE77LH7VPAJS5W64IMRQ7NSM/#MZU237GIBE77LH7VPAJS5W64IMRQ7NSM" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2251-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/D6AIQRJID7DIPCU5KTEO6R57LSZRFM6K/#D6AIQRJID7DIPCU5KTEO6R57LSZRFM6K" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2260-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W2DVGAQNNMLX7LJQ6C6CR4YYNEUN3XNO/#W2DVGAQNNMLX7LJQ6C6CR4YYNEUN3XNO" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Mozilla developers and community members reported memory safety bugs present in Firefox 68, Firefox ESR 68, and Firefox 60.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox &lt; 69, Thunderbird &lt; 68.1, Thunderbird &lt; 60.9, Firefox ESR &lt; 60.9, and Firefox ESR &lt; 68.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11740/">CVE-2019-11740 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11740">CVE-2019-11740 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1149299">SUSE bug 1149299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149323">SUSE bug 1149323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149324">SUSE bug 1149324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150940">SUSE bug 1150940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826629" comment="firefox-60.9.0-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826630" comment="thunderbird-60.9.0-1.el7_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911742" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11742</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11742" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11742" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11742" ref_url="https://www.suse.com/security/cve/CVE-2019-11742" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2248-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QT7HMZ3VUEMJ463IILXJ7LOGN6RQAID5/#QT7HMZ3VUEMJ463IILXJ7LOGN6RQAID5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2249-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MZU237GIBE77LH7VPAJS5W64IMRQ7NSM/#MZU237GIBE77LH7VPAJS5W64IMRQ7NSM" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2251-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/D6AIQRJID7DIPCU5KTEO6R57LSZRFM6K/#D6AIQRJID7DIPCU5KTEO6R57LSZRFM6K" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2260-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W2DVGAQNNMLX7LJQ6C6CR4YYNEUN3XNO/#W2DVGAQNNMLX7LJQ6C6CR4YYNEUN3XNO" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A same-origin policy violation occurs allowing the theft of cross-origin images through a combination of SVG filters and a &amp;lt;canvas&amp;gt; element due to an error in how same-origin policy is applied to cached image content. The resulting same-origin policy violation could allow for data theft. This vulnerability affects Firefox &lt; 69, Thunderbird &lt; 68.1, Thunderbird &lt; 60.9, Firefox ESR &lt; 60.9, and Firefox ESR &lt; 68.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11742/">CVE-2019-11742 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11742">CVE-2019-11742 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1149303">SUSE bug 1149303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149323">SUSE bug 1149323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149324">SUSE bug 1149324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150940">SUSE bug 1150940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826629" comment="firefox-60.9.0-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826630" comment="thunderbird-60.9.0-1.el7_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911743" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11743</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11743" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11743" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11743" ref_url="https://www.suse.com/security/cve/CVE-2019-11743" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2248-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QT7HMZ3VUEMJ463IILXJ7LOGN6RQAID5/#QT7HMZ3VUEMJ463IILXJ7LOGN6RQAID5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2249-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MZU237GIBE77LH7VPAJS5W64IMRQ7NSM/#MZU237GIBE77LH7VPAJS5W64IMRQ7NSM" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2251-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/D6AIQRJID7DIPCU5KTEO6R57LSZRFM6K/#D6AIQRJID7DIPCU5KTEO6R57LSZRFM6K" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2260-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W2DVGAQNNMLX7LJQ6C6CR4YYNEUN3XNO/#W2DVGAQNNMLX7LJQ6C6CR4YYNEUN3XNO" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Navigation events were not fully adhering to the W3C's "Navigation-Timing Level 2" draft specification in some instances for the unload event, which restricts access to detailed timing attributes to only be same-origin. This resulted in potential cross-origin information exposure of history through timing side-channel attacks. This vulnerability affects Firefox &lt; 69, Thunderbird &lt; 68.1, Thunderbird &lt; 60.9, Firefox ESR &lt; 60.9, and Firefox ESR &lt; 68.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11743/">CVE-2019-11743 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11743">CVE-2019-11743 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1149298">SUSE bug 1149298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149323">SUSE bug 1149323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149324">SUSE bug 1149324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150940">SUSE bug 1150940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826629" comment="firefox-60.9.0-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826630" comment="thunderbird-60.9.0-1.el7_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911744" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11744</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11744" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11744" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11744" ref_url="https://www.suse.com/security/cve/CVE-2019-11744" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2248-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QT7HMZ3VUEMJ463IILXJ7LOGN6RQAID5/#QT7HMZ3VUEMJ463IILXJ7LOGN6RQAID5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2249-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MZU237GIBE77LH7VPAJS5W64IMRQ7NSM/#MZU237GIBE77LH7VPAJS5W64IMRQ7NSM" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2251-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/D6AIQRJID7DIPCU5KTEO6R57LSZRFM6K/#D6AIQRJID7DIPCU5KTEO6R57LSZRFM6K" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2260-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W2DVGAQNNMLX7LJQ6C6CR4YYNEUN3XNO/#W2DVGAQNNMLX7LJQ6C6CR4YYNEUN3XNO" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Some HTML elements, such as &amp;lt;title&amp;gt; and &amp;lt;textarea&amp;gt;, can contain literal angle brackets without treating them as markup. It is possible to pass a literal closing tag to .innerHTML on these elements, and subsequent content after that will be parsed as if it were outside the tag. This can lead to XSS if a site does not filter user input as strictly for these elements as it does for other elements. This vulnerability affects Firefox &lt; 69, Thunderbird &lt; 68.1, Thunderbird &lt; 60.9, Firefox ESR &lt; 60.9, and Firefox ESR &lt; 68.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11744/">CVE-2019-11744 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11744">CVE-2019-11744 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1149304">SUSE bug 1149304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149323">SUSE bug 1149323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149324">SUSE bug 1149324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150940">SUSE bug 1150940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826629" comment="firefox-60.9.0-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826630" comment="thunderbird-60.9.0-1.el7_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911745" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11745</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11745" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11745" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11745" ref_url="https://www.suse.com/security/cve/CVE-2019-11745" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0088-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200088-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007079.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0002-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IT3UIP5O2QPRMJEIU4SZ6MBHNKBLUYZT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0008-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AN4USN47JRBDAYTJ7ARVSFYOKEKTGTFV/" source="SUSE-SU"/>
    <description>
    When encrypting with a block cipher, if a call to NSC_EncryptUpdate was made with data smaller than the block size, a small out of bounds write could occur. This could have caused heap corruption and a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 68.3, Firefox ESR &lt; 68.3, and Firefox &lt; 71.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11745/">CVE-2019-11745 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11745">CVE-2019-11745 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1158328">SUSE bug 1158328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158527">SUSE bug 1158527</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826791" comment="nss-3.44.0-7.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826792" comment="nss-devel-3.44.0-7.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826793" comment="nss-softokn-3.44.0-8.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826794" comment="nss-softokn-devel-3.44.0-8.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826795" comment="nss-softokn-freebl-3.44.0-8.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826796" comment="nss-softokn-freebl-devel-3.44.0-8.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826797" comment="nss-sysinit-3.44.0-7.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826798" comment="nss-tools-3.44.0-7.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826799" comment="nss-util-3.44.0-4.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826800" comment="nss-util-devel-3.44.0-4.el7_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911746" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11746</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11746" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11746" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11746" ref_url="https://www.suse.com/security/cve/CVE-2019-11746" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2248-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QT7HMZ3VUEMJ463IILXJ7LOGN6RQAID5/#QT7HMZ3VUEMJ463IILXJ7LOGN6RQAID5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2249-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MZU237GIBE77LH7VPAJS5W64IMRQ7NSM/#MZU237GIBE77LH7VPAJS5W64IMRQ7NSM" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2251-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/D6AIQRJID7DIPCU5KTEO6R57LSZRFM6K/#D6AIQRJID7DIPCU5KTEO6R57LSZRFM6K" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2260-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W2DVGAQNNMLX7LJQ6C6CR4YYNEUN3XNO/#W2DVGAQNNMLX7LJQ6C6CR4YYNEUN3XNO" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability can occur while manipulating video elements if the body is freed while still in use. This results in a potentially exploitable crash. This vulnerability affects Firefox &lt; 69, Thunderbird &lt; 68.1, Thunderbird &lt; 60.9, Firefox ESR &lt; 60.9, and Firefox ESR &lt; 68.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-11-27"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11746/">CVE-2019-11746 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11746">CVE-2019-11746 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1149297">SUSE bug 1149297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149323">SUSE bug 1149323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149324">SUSE bug 1149324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150940">SUSE bug 1150940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826629" comment="firefox-60.9.0-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826630" comment="thunderbird-60.9.0-1.el7_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911752" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11752</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11752" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11752" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11752" ref_url="https://www.suse.com/security/cve/CVE-2019-11752" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2248-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QT7HMZ3VUEMJ463IILXJ7LOGN6RQAID5/#QT7HMZ3VUEMJ463IILXJ7LOGN6RQAID5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2249-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MZU237GIBE77LH7VPAJS5W64IMRQ7NSM/#MZU237GIBE77LH7VPAJS5W64IMRQ7NSM" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2251-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/D6AIQRJID7DIPCU5KTEO6R57LSZRFM6K/#D6AIQRJID7DIPCU5KTEO6R57LSZRFM6K" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2260-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W2DVGAQNNMLX7LJQ6C6CR4YYNEUN3XNO/#W2DVGAQNNMLX7LJQ6C6CR4YYNEUN3XNO" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    It is possible to delete an IndexedDB key value and subsequently try to extract it during conversion. This results in a use-after-free and a potentially exploitable crash. This vulnerability affects Firefox &lt; 69, Thunderbird &lt; 68.1, Thunderbird &lt; 60.9, Firefox ESR &lt; 60.9, and Firefox ESR &lt; 68.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-11-27"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11752/">CVE-2019-11752 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11752">CVE-2019-11752 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1149296">SUSE bug 1149296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149323">SUSE bug 1149323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149324">SUSE bug 1149324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150940">SUSE bug 1150940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826629" comment="firefox-60.9.0-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826630" comment="thunderbird-60.9.0-1.el7_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911756" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11756</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11756" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11756" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11756" ref_url="https://www.suse.com/security/cve/CVE-2019-11756" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Improper refcounting of soft token session objects could cause a use-after-free and crash (likely limited to a denial of service). This vulnerability affects Firefox &lt; 71.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11756/">CVE-2019-11756 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11756">CVE-2019-11756 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1161447">SUSE bug 1161447</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828558" comment="nspr-4.25.0-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828559" comment="nspr-devel-4.25.0-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828560" comment="nss-3.53.1-3.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828561" comment="nss-devel-3.53.1-3.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828562" comment="nss-pkcs11-devel-3.53.1-3.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828563" comment="nss-softokn-3.53.1-6.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828564" comment="nss-softokn-devel-3.53.1-6.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828565" comment="nss-softokn-freebl-3.53.1-6.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828566" comment="nss-softokn-freebl-devel-3.53.1-6.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828567" comment="nss-sysinit-3.53.1-3.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828568" comment="nss-tools-3.53.1-3.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828569" comment="nss-util-3.53.1-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828570" comment="nss-util-devel-3.53.1-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911757" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11757</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11757" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11757" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11757" ref_url="https://www.suse.com/security/cve/CVE-2019-11757" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2871-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192871-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2451-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/V6ZXQOV37FDUBMBAJGH2RCLCL55J6IYA/#V6ZXQOV37FDUBMBAJGH2RCLCL55J6IYA" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2452-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MOTGZDQMJE6HU6RXRSOTDTGAHLJOOFJB/#MOTGZDQMJE6HU6RXRSOTDTGAHLJOOFJB" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2459-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LFFTUGZUT6RBMXE667KP6UIOCTQIRDNS/#LFFTUGZUT6RBMXE667KP6UIOCTQIRDNS" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2464-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ISVN7BSIYJ7GDXZNJMHOFE6I6LYX7RUX/#ISVN7BSIYJ7GDXZNJMHOFE6I6LYX7RUX" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    When following the value's prototype chain, it was possible to retain a reference to a locale, delete it, and subsequently reference it. This resulted in a use-after-free and a potentially exploitable crash. This vulnerability affects Firefox &lt; 70, Thunderbird &lt; 68.2, and Firefox ESR &lt; 68.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11757/">CVE-2019-11757 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11757">CVE-2019-11757 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1154738">SUSE bug 1154738</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
</definition>
<definition id="oval:org.opensuse.security:def:201911758" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11758</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11758" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11758" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11758" ref_url="https://www.suse.com/security/cve/CVE-2019-11758" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2871-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192871-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2451-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/V6ZXQOV37FDUBMBAJGH2RCLCL55J6IYA/#V6ZXQOV37FDUBMBAJGH2RCLCL55J6IYA" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2452-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MOTGZDQMJE6HU6RXRSOTDTGAHLJOOFJB/#MOTGZDQMJE6HU6RXRSOTDTGAHLJOOFJB" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2459-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LFFTUGZUT6RBMXE667KP6UIOCTQIRDNS/#LFFTUGZUT6RBMXE667KP6UIOCTQIRDNS" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2464-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ISVN7BSIYJ7GDXZNJMHOFE6I6LYX7RUX/#ISVN7BSIYJ7GDXZNJMHOFE6I6LYX7RUX" source="SUSE-SU"/>
    <description>
    Mozilla community member Philipp reported a memory safety bug present in Firefox 68 when 360 Total Security was installed. This bug showed evidence of memory corruption in the accessibility engine and we presume that with enough effort that it could be exploited to run arbitrary code. This vulnerability affects Firefox &lt; 69, Thunderbird &lt; 68.2, and Firefox ESR &lt; 68.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11758/">CVE-2019-11758 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11758">CVE-2019-11758 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1154738">SUSE bug 1154738</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826704" comment="firefox-68.2.0-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826707" comment="thunderbird-68.2.0-1.el7_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911759" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11759</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11759" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11759" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11759" ref_url="https://www.suse.com/security/cve/CVE-2019-11759" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2871-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192871-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2451-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/V6ZXQOV37FDUBMBAJGH2RCLCL55J6IYA/#V6ZXQOV37FDUBMBAJGH2RCLCL55J6IYA" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2452-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MOTGZDQMJE6HU6RXRSOTDTGAHLJOOFJB/#MOTGZDQMJE6HU6RXRSOTDTGAHLJOOFJB" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2459-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LFFTUGZUT6RBMXE667KP6UIOCTQIRDNS/#LFFTUGZUT6RBMXE667KP6UIOCTQIRDNS" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2464-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ISVN7BSIYJ7GDXZNJMHOFE6I6LYX7RUX/#ISVN7BSIYJ7GDXZNJMHOFE6I6LYX7RUX" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    An attacker could have caused 4 bytes of HMAC output to be written past the end of a buffer stored on the stack. This could be used by an attacker to execute arbitrary code or more likely lead to a crash. This vulnerability affects Firefox &lt; 70, Thunderbird &lt; 68.2, and Firefox ESR &lt; 68.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11759/">CVE-2019-11759 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11759">CVE-2019-11759 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1154738">SUSE bug 1154738</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826704" comment="firefox-68.2.0-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826707" comment="thunderbird-68.2.0-1.el7_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911760" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11760</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11760" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11760" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11760" ref_url="https://www.suse.com/security/cve/CVE-2019-11760" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2871-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192871-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2451-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/V6ZXQOV37FDUBMBAJGH2RCLCL55J6IYA/#V6ZXQOV37FDUBMBAJGH2RCLCL55J6IYA" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2452-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MOTGZDQMJE6HU6RXRSOTDTGAHLJOOFJB/#MOTGZDQMJE6HU6RXRSOTDTGAHLJOOFJB" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2459-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LFFTUGZUT6RBMXE667KP6UIOCTQIRDNS/#LFFTUGZUT6RBMXE667KP6UIOCTQIRDNS" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2464-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ISVN7BSIYJ7GDXZNJMHOFE6I6LYX7RUX/#ISVN7BSIYJ7GDXZNJMHOFE6I6LYX7RUX" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A fixed-size stack buffer could overflow in nrappkit when doing WebRTC signaling. This resulted in a potentially exploitable crash in some instances. This vulnerability affects Firefox &lt; 70, Thunderbird &lt; 68.2, and Firefox ESR &lt; 68.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11760/">CVE-2019-11760 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11760">CVE-2019-11760 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1154738">SUSE bug 1154738</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826704" comment="firefox-68.2.0-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826707" comment="thunderbird-68.2.0-1.el7_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911761" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11761</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11761" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11761" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11761" ref_url="https://www.suse.com/security/cve/CVE-2019-11761" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2871-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192871-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2451-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/V6ZXQOV37FDUBMBAJGH2RCLCL55J6IYA/#V6ZXQOV37FDUBMBAJGH2RCLCL55J6IYA" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2452-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MOTGZDQMJE6HU6RXRSOTDTGAHLJOOFJB/#MOTGZDQMJE6HU6RXRSOTDTGAHLJOOFJB" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2459-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LFFTUGZUT6RBMXE667KP6UIOCTQIRDNS/#LFFTUGZUT6RBMXE667KP6UIOCTQIRDNS" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2464-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ISVN7BSIYJ7GDXZNJMHOFE6I6LYX7RUX/#ISVN7BSIYJ7GDXZNJMHOFE6I6LYX7RUX" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    By using a form with a data URI it was possible to gain access to the privileged JSONView object that had been cloned into content. Impact from exposing this object appears to be minimal, however it was a bypass of existing defense in depth mechanisms. This vulnerability affects Firefox &lt; 70, Thunderbird &lt; 68.2, and Firefox ESR &lt; 68.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11761/">CVE-2019-11761 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11761">CVE-2019-11761 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1154738">SUSE bug 1154738</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826704" comment="firefox-68.2.0-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826707" comment="thunderbird-68.2.0-1.el7_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911762" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11762</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11762" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11762" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11762" ref_url="https://www.suse.com/security/cve/CVE-2019-11762" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2871-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192871-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2451-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/V6ZXQOV37FDUBMBAJGH2RCLCL55J6IYA/#V6ZXQOV37FDUBMBAJGH2RCLCL55J6IYA" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2452-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MOTGZDQMJE6HU6RXRSOTDTGAHLJOOFJB/#MOTGZDQMJE6HU6RXRSOTDTGAHLJOOFJB" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2459-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LFFTUGZUT6RBMXE667KP6UIOCTQIRDNS/#LFFTUGZUT6RBMXE667KP6UIOCTQIRDNS" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2464-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ISVN7BSIYJ7GDXZNJMHOFE6I6LYX7RUX/#ISVN7BSIYJ7GDXZNJMHOFE6I6LYX7RUX" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    If two same-origin documents set document.domain differently to become cross-origin, it was possible for them to call arbitrary DOM methods/getters/setters on the now-cross-origin window. This vulnerability affects Firefox &lt; 70, Thunderbird &lt; 68.2, and Firefox ESR &lt; 68.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11762/">CVE-2019-11762 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11762">CVE-2019-11762 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1154738">SUSE bug 1154738</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826704" comment="firefox-68.2.0-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826707" comment="thunderbird-68.2.0-1.el7_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911763" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11763</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11763" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11763" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11763" ref_url="https://www.suse.com/security/cve/CVE-2019-11763" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2871-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192871-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2451-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/V6ZXQOV37FDUBMBAJGH2RCLCL55J6IYA/#V6ZXQOV37FDUBMBAJGH2RCLCL55J6IYA" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2452-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MOTGZDQMJE6HU6RXRSOTDTGAHLJOOFJB/#MOTGZDQMJE6HU6RXRSOTDTGAHLJOOFJB" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2459-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LFFTUGZUT6RBMXE667KP6UIOCTQIRDNS/#LFFTUGZUT6RBMXE667KP6UIOCTQIRDNS" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2464-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ISVN7BSIYJ7GDXZNJMHOFE6I6LYX7RUX/#ISVN7BSIYJ7GDXZNJMHOFE6I6LYX7RUX" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Failure to correctly handle null bytes when processing HTML entities resulted in Firefox incorrectly parsing these entities. This could have led to HTML comment text being treated as HTML which could have led to XSS in a web application under certain conditions. It could have also led to HTML entities being masked from filters - enabling the use of entities to mask the actual characters of interest from filters. This vulnerability affects Firefox &lt; 70, Thunderbird &lt; 68.2, and Firefox ESR &lt; 68.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11763/">CVE-2019-11763 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11763">CVE-2019-11763 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1154738">SUSE bug 1154738</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826704" comment="firefox-68.2.0-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826707" comment="thunderbird-68.2.0-1.el7_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911764" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11764</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11764" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11764" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11764" ref_url="https://www.suse.com/security/cve/CVE-2019-11764" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2871-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192871-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2451-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/V6ZXQOV37FDUBMBAJGH2RCLCL55J6IYA/#V6ZXQOV37FDUBMBAJGH2RCLCL55J6IYA" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2452-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MOTGZDQMJE6HU6RXRSOTDTGAHLJOOFJB/#MOTGZDQMJE6HU6RXRSOTDTGAHLJOOFJB" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2459-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LFFTUGZUT6RBMXE667KP6UIOCTQIRDNS/#LFFTUGZUT6RBMXE667KP6UIOCTQIRDNS" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2464-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ISVN7BSIYJ7GDXZNJMHOFE6I6LYX7RUX/#ISVN7BSIYJ7GDXZNJMHOFE6I6LYX7RUX" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Mozilla developers and community members reported memory safety bugs present in Firefox 69 and Firefox ESR 68.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could be exploited to run arbitrary code. This vulnerability affects Firefox &lt; 70, Thunderbird &lt; 68.2, and Firefox ESR &lt; 68.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11764/">CVE-2019-11764 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11764">CVE-2019-11764 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1154738">SUSE bug 1154738</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826704" comment="firefox-68.2.0-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826707" comment="thunderbird-68.2.0-1.el7_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911810" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11810</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11810" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11810" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11810" ref_url="https://www.suse.com/security/cve/CVE-2019-11810" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005790.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005786.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005958.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1923-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EIHLFLWIJWATY4U7OHLNF5XU4F4GVLNR/#EIHLFLWIJWATY4U7OHLNF5XU4F4GVLNR" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1924-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QQRUSBNZ3H36Y5YE6DN2DIYEFRQKUSLI/#QQRUSBNZ3H36Y5YE6DN2DIYEFRQKUSLI" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.0.7. A NULL pointer dereference can occur when megasas_create_frame_pool() fails in megasas_alloc_cmds() in drivers/scsi/megaraid/megaraid_sas_base.c. This causes a Denial of Service, related to a use-after-free.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.9/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11810/">CVE-2019-11810 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11810">CVE-2019-11810 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1134399">SUSE bug 1134399</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826007" comment="bpftool-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826008" comment="kernel-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826009" comment="kernel-abi-whitelists-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826010" comment="kernel-debug-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826013" comment="kernel-doc-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826014" comment="kernel-headers-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826015" comment="kernel-tools-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826016" comment="kernel-tools-libs-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826018" comment="perf-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826019" comment="python-perf-3.10.0-1062.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911811" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11811</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11811" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11811" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11811" ref_url="https://www.suse.com/security/cve/CVE-2019-11811" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1479-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/B4DQLC5NNFA52SY3VMJNLGCDAOQAXY7D/#B4DQLC5NNFA52SY3VMJNLGCDAOQAXY7D" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.0.4. There is a use-after-free upon attempted read access to /proc/ioports after the ipmi_si module is removed, related to drivers/char/ipmi/ipmi_si_intf.c, drivers/char/ipmi/ipmi_si_mem_io.c, and drivers/char/ipmi/ipmi_si_port_io.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.9/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11811/">CVE-2019-11811 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11811">CVE-2019-11811 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1134397">SUSE bug 1134397</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825932" comment="bpftool-3.10.0-957.27.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825933" comment="kernel-3.10.0-957.27.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825934" comment="kernel-abi-whitelists-3.10.0-957.27.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825935" comment="kernel-debug-3.10.0-957.27.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825938" comment="kernel-doc-3.10.0-957.27.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825939" comment="kernel-headers-3.10.0-957.27.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825940" comment="kernel-tools-3.10.0-957.27.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825941" comment="kernel-tools-libs-3.10.0-957.27.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825943" comment="perf-3.10.0-957.27.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825944" comment="python-perf-3.10.0-957.27.2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911833" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11833</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11833" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11833" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11833" ref_url="https://www.suse.com/security/cve/CVE-2019-11833" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1479-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/B4DQLC5NNFA52SY3VMJNLGCDAOQAXY7D/#B4DQLC5NNFA52SY3VMJNLGCDAOQAXY7D" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1570-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NJCQPY6KJMGUNOCG3VYC34NI2F6XUC3N/#NJCQPY6KJMGUNOCG3VYC34NI2F6XUC3N" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1579-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GOX3GRSFJIOAQWX677KTNVAGGH653HWU/#GOX3GRSFJIOAQWX677KTNVAGGH653HWU" source="SUSE-SU"/>
    <description>
    fs/ext4/extents.c in the Linux kernel through 5.1.2 does not zero out the unused memory region in the extent tree block, which might allow local users to obtain sensitive information by reading uninitialized data in the filesystem.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-06"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11833/">CVE-2019-11833 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11833">CVE-2019-11833 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1135281">SUSE bug 1135281</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826007" comment="bpftool-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826008" comment="kernel-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826009" comment="kernel-abi-whitelists-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826010" comment="kernel-debug-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826013" comment="kernel-doc-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826014" comment="kernel-headers-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826015" comment="kernel-tools-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826016" comment="kernel-tools-libs-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826018" comment="perf-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826019" comment="python-perf-3.10.0-1062.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911884" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11884</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11884" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11884" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11884" ref_url="https://www.suse.com/security/cve/CVE-2019-11884" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1404-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZZ2FZBVA3Q7VOUC5KRK2EODJSBYJDCKH/#ZZ2FZBVA3Q7VOUC5KRK2EODJSBYJDCKH" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1407-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UMXCAWC5QTZVSPZOYUW3E3GVJJUKCQ2S/#UMXCAWC5QTZVSPZOYUW3E3GVJJUKCQ2S" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1479-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/B4DQLC5NNFA52SY3VMJNLGCDAOQAXY7D/#B4DQLC5NNFA52SY3VMJNLGCDAOQAXY7D" source="SUSE-SU"/>
    <description>
    The do_hidp_sock_ioctl function in net/bluetooth/hidp/sock.c in the Linux kernel before 5.0.15 allows a local user to obtain potentially sensitive information from kernel stack memory via a HIDPCONNADD command, because a name field may not end with a '\0' character.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11884/">CVE-2019-11884 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11884">CVE-2019-11884 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1134848">SUSE bug 1134848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139868">SUSE bug 1139868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826993" comment="bpftool-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826994" comment="kernel-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826995" comment="kernel-abi-whitelists-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826996" comment="kernel-debug-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826999" comment="kernel-doc-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827000" comment="kernel-headers-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827001" comment="kernel-tools-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827002" comment="kernel-tools-libs-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827004" comment="perf-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827005" comment="python-perf-3.10.0-1127.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912155" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12155</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12155" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12155" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12155" ref_url="https://www.suse.com/security/cve/CVE-2019-12155" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14151-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006485.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2041-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TUKWOBV7QSC7BRGVOAZZDM7P4VZESISG/#TUKWOBV7QSC7BRGVOAZZDM7P4VZESISG" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6SBK6URNJUYYH2QPGRG7N4UIGYSVXV6U/#6SBK6URNJUYYH2QPGRG7N4UIGYSVXV6U" source="SUSE-SU"/>
    <description>
    interface_release_resource in hw/display/qxl.c in QEMU 3.1.x through 4.0.0 has a NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12155/">CVE-2019-12155 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12155">CVE-2019-12155 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1135902">SUSE bug 1135902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135905">SUSE bug 1135905</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826625" comment="qemu-img-1.5.3-167.el7_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826626" comment="qemu-kvm-1.5.3-167.el7_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826627" comment="qemu-kvm-common-1.5.3-167.el7_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826628" comment="qemu-kvm-tools-1.5.3-167.el7_7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912293" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12293</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12293" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12293" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12293" ref_url="https://www.suse.com/security/cve/CVE-2019-12293" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:2838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2907-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030446.html" source="SUSE-SU"/>
    <description>
    In Poppler through 0.76.1, there is a heap-based buffer over-read in JPXStream::init in JPEG2000Stream.cc via data with inconsistent heights or widths.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12293/">CVE-2019-12293 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12293">CVE-2019-12293 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1136105">SUSE bug 1136105</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827681" comment="evince-3.28.2-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827682" comment="evince-browser-plugin-3.28.2-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827683" comment="evince-devel-3.28.2-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827684" comment="evince-dvi-3.28.2-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827685" comment="evince-libs-3.28.2-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827686" comment="evince-nautilus-3.28.2-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827687" comment="poppler-0.26.5-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827688" comment="poppler-cpp-0.26.5-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827689" comment="poppler-cpp-devel-0.26.5-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827690" comment="poppler-demos-0.26.5-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827691" comment="poppler-devel-0.26.5-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827692" comment="poppler-glib-0.26.5-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827693" comment="poppler-glib-devel-0.26.5-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827694" comment="poppler-qt-0.26.5-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827695" comment="poppler-qt-devel-0.26.5-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827696" comment="poppler-utils-0.26.5-42.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912382" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12382</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12382" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12382" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12382" ref_url="https://www.suse.com/security/cve/CVE-2019-12382" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1570-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NJCQPY6KJMGUNOCG3VYC34NI2F6XUC3N/#NJCQPY6KJMGUNOCG3VYC34NI2F6XUC3N" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1571-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CDOL6RIYB7LA5CRMCAHJHNNPCUYRJAEV/#CDOL6RIYB7LA5CRMCAHJHNNPCUYRJAEV" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1579-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GOX3GRSFJIOAQWX677KTNVAGGH653HWU/#GOX3GRSFJIOAQWX677KTNVAGGH653HWU" source="SUSE-SU"/>
    <description>
    An issue was discovered in drm_load_edid_firmware in drivers/gpu/drm/drm_edid_load.c in the Linux kernel through 5.1.5. There is an unchecked kstrdup of fwstr, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash). NOTE: The vendor disputes this issues as not being a vulnerability because kstrdup() returning NULL is handled sufficiently and there is no chance for a NULL pointer dereference
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12382/">CVE-2019-12382 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12382">CVE-2019-12382 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1136586">SUSE bug 1136586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155298">SUSE bug 1155298</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826993" comment="bpftool-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826994" comment="kernel-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826995" comment="kernel-abi-whitelists-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826996" comment="kernel-debug-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826999" comment="kernel-doc-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827000" comment="kernel-headers-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827001" comment="kernel-tools-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827002" comment="kernel-tools-libs-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827004" comment="perf-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827005" comment="python-perf-3.10.0-1127.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912387" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12387</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12387" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12387" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12387" ref_url="https://www.suse.com/security/cve/CVE-2019-12387" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4074-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-November/026310.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1760-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IXM52Z7OZQKEBVKJAXNZAPMTC5NN267A/#IXM52Z7OZQKEBVKJAXNZAPMTC5NN267A" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1785-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TS4FPI4ZVPJQF5ENDUAHNWBU7DAMUMAV/#TS4FPI4ZVPJQF5ENDUAHNWBU7DAMUMAV" source="SUSE-SU"/>
    <description>
    In Twisted before 19.2.1, twisted.web did not validate or sanitize URIs or HTTP methods, allowing an attacker to inject invalid characters such as CRLF.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-12387/">CVE-2019-12387 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12387">CVE-2019-12387 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1137825">SUSE bug 1137825</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827751" comment="python-twisted-web-12.1.0-6.el7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912420" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12420</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12420" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12420" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12420" ref_url="https://www.suse.com/security/cve/CVE-2019-12420" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008613.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008622.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0551-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GXHYC7MWI2M6Y32ROZZBS5HOZOAF2HAN/" source="SUSE-SU"/>
    <description>
    In Apache SpamAssassin before 3.4.3, a message can be crafted in a way to use excessive resources. Upgrading to SA 3.4.3 as soon as possible is the recommended fix but details will not be shared publicly.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12420/">CVE-2019-12420 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12420">CVE-2019-12420 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1159133">SUSE bug 1159133</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186513">SUSE bug 1186513</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828333" comment="spamassassin-3.4.0-6.el7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912450" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12450</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12450" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12450" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12450" ref_url="https://www.suse.com/security/cve/CVE-2019-12450" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1594-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1722-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005644.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1650-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/X3N6TDMIOTAGWJSCT36DZCQOTW6O7IHE/#X3N6TDMIOTAGWJSCT36DZCQOTW6O7IHE" source="SUSE-SU"/>
    <description>
    file_copy_fallback in gio/gfile.c in GNOME GLib 2.15.0 through 2.61.1 does not properly restrict file permissions while a copy operation is in progress. Instead, default permissions are used.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-12450/">CVE-2019-12450 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12450">CVE-2019-12450 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1137001">SUSE bug 1137001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139959">SUSE bug 1139959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142126">SUSE bug 1142126</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828350" comment="glib2-2.56.1-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828351" comment="glib2-devel-2.56.1-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828352" comment="glib2-doc-2.56.1-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828353" comment="glib2-fam-2.56.1-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828354" comment="glib2-static-2.56.1-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828355" comment="glib2-tests-2.56.1-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828356" comment="ibus-1.5.17-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828357" comment="ibus-devel-1.5.17-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828358" comment="ibus-devel-docs-1.5.17-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828359" comment="ibus-gtk2-1.5.17-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828360" comment="ibus-gtk3-1.5.17-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828361" comment="ibus-libs-1.5.17-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828362" comment="ibus-pygtk2-1.5.17-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828363" comment="ibus-setup-1.5.17-11.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912519" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12519</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12519" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12519" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12519" ref_url="https://www.suse.com/security/cve/CVE-2019-12519" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1227-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007289.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0623-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PKK52WC254R33WBSNPYY4IHIZMYTJYNU/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Squid through 4.7. When handling the tag esi:when when ESI is enabled, Squid calls ESIExpression::Evaluate. This function uses a fixed stack buffer to hold the expression while it's being evaluated. When processing the expression, it could either evaluate the top of the stack, or add a new member to the stack. When adding a new member, there is no check to ensure that the stack won't overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-12519/">CVE-2019-12519 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12519">CVE-2019-12519 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1169659">SUSE bug 1169659</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827959" comment="squid-3.5.20-15.el7_8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827960" comment="squid-migration-script-3.5.20-15.el7_8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827961" comment="squid-sysvinit-3.5.20-15.el7_8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912525" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12525</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12525" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12525" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12525" ref_url="https://www.suse.com/security/cve/CVE-2019-12525" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005801.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2089-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007289.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2540-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5B7VIBHEUXO2VYU6NZTEL6I7K4WUKD7G/#5B7VIBHEUXO2VYU6NZTEL6I7K4WUKD7G" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2541-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2PLGSQEPKZX62EREA7UHDNEMHR3Z23A6/#2PLGSQEPKZX62EREA7UHDNEMHR3Z23A6" source="SUSE-SU"/>
    <description>
    An issue was discovered in Squid 3.3.9 through 3.5.28 and 4.x through 4.7. When Squid is configured to use Digest authentication, it parses the header Proxy-Authorization. It searches for certain tokens such as domain, uri, and qop. Squid checks if this token's value starts with a quote and ends with one. If so, it performs a memcpy of its length minus 2. Squid never checks whether the value is just a single quote (which would satisfy its requirements), leading to a memcpy of its length minus 1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12525/">CVE-2019-12525 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12525">CVE-2019-12525 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1141332">SUSE bug 1141332</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827959" comment="squid-3.5.20-15.el7_8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827960" comment="squid-migration-script-3.5.20-15.el7_8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827961" comment="squid-sysvinit-3.5.20-15.el7_8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912528" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12528</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12528" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12528" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12528" ref_url="https://www.suse.com/security/cve/CVE-2019-12528" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007289.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0307-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OSBD4IUE3J32BEBGOTEFYZCO2BC6SOBD/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0606-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AGFVFRNFEBM5GAYSO2Y6EUODQ7XBSWE3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0623-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PKK52WC254R33WBSNPYY4IHIZMYTJYNU/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Squid before 4.10. It allows a crafted FTP server to trigger disclosure of sensitive information from heap memory, such as information associated with other users' sessions or non-Squid processes.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-12528/">CVE-2019-12528 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12528">CVE-2019-12528 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1162689">SUSE bug 1162689</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828576" comment="squid-3.5.20-17.el7_9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828577" comment="squid-migration-script-3.5.20-17.el7_9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828578" comment="squid-sysvinit-3.5.20-17.el7_9.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912614" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12614</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12614" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12614" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12614" ref_url="https://www.suse.com/security/cve/CVE-2019-12614" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1823-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1851-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20191851-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1852-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20191852-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005958.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1716-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HJXAHNWJ4IAQN4V6E2PEXAAFMQPYBBPT/#HJXAHNWJ4IAQN4V6E2PEXAAFMQPYBBPT" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1757-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PJTYGHQOYDY2SFDAAFYO3E3URRCWKEUQ/#PJTYGHQOYDY2SFDAAFYO3E3URRCWKEUQ" source="SUSE-SU"/>
    <description>
    An issue was discovered in dlpar_parse_cc_property in arch/powerpc/platforms/pseries/dlpar.c in the Linux kernel through 5.1.6. There is an unchecked kstrdup of prop-&gt;name, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12614/">CVE-2019-12614 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12614">CVE-2019-12614 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1137194">SUSE bug 1137194</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828543" comment="bpftool-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828544" comment="kernel-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828545" comment="kernel-abi-whitelists-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828546" comment="kernel-debug-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828549" comment="kernel-doc-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828550" comment="kernel-headers-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828551" comment="kernel-tools-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828552" comment="kernel-tools-libs-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828554" comment="perf-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828555" comment="python-perf-3.10.0-1160.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912735" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12735</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12735" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12735" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12735" ref_url="https://www.suse.com/security/cve/CVE-2019-12735" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005543.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1457-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005545.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1551-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TYOETLXB2RD3GRLLDIZKE7UUWDK5TXBE/#TYOETLXB2RD3GRLLDIZKE7UUWDK5TXBE" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1561-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EA6FIRLDRZGR2FVSPZOUMCMXJLSQDFXI/#EA6FIRLDRZGR2FVSPZOUMCMXJLSQDFXI" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1562-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5MZQAY5ITS7K633KSHC2D4DFRFAVJTWQ/#5MZQAY5ITS7K633KSHC2D4DFRFAVJTWQ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1759-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JVVBP77XXWO6UY6YS7QTWDVNSXCX6BNR/#JVVBP77XXWO6UY6YS7QTWDVNSXCX6BNR" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1796-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q6RJXM33RFU6CEU4RJBJ7IIU6ZU4ZYVM/#Q6RJXM33RFU6CEU4RJBJ7IIU6ZU4ZYVM" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1997-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O5Q6ECCW6N3P3VMFMCNJL5AQBTRSD4AI/#O5Q6ECCW6N3P3VMFMCNJL5AQBTRSD4AI" source="SUSE-SU"/>
    <description>
    getchar.c in Vim before 8.1.1365 and Neovim before 0.3.6 allows remote attackers to execute arbitrary OS commands via the :source! command in a modeline, as demonstrated by execute in Vim, and assert_fails or nvim_input in Neovim.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-11-13"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12735/">CVE-2019-12735 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12735">CVE-2019-12735 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1137443">SUSE bug 1137443</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830559" comment="vim-X11-7.4.160-6.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830560" comment="vim-common-7.4.160-6.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830561" comment="vim-enhanced-7.4.160-6.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830562" comment="vim-filesystem-7.4.160-6.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830563" comment="vim-minimal-7.4.160-6.el7_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912749" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12749</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12749" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12749" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12749" ref_url="https://www.suse.com/security/cve/CVE-2019-12749" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:25-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005601.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005596.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2820-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1672-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006978.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1604-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XZVR64DPBS7J3FRD6GWGPW3Y54OBW62W/#XZVR64DPBS7J3FRD6GWGPW3Y54OBW62W" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1671-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QNHYN47AVCXFKCLHEOJ5O7FB65XSK7QL/#QNHYN47AVCXFKCLHEOJ5O7FB65XSK7QL" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1750-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PGA7NJC7OHX4NMTM3JZ3FS42PFMMYLII/#PGA7NJC7OHX4NMTM3JZ3FS42PFMMYLII" source="SUSE-SU"/>
    <description>
    dbus before 1.10.28, 1.12.x before 1.12.16, and 1.13.x before 1.13.12, as used in DBusServer in Canonical Upstart in Ubuntu 14.04 (and in some, less common, uses of dbus-daemon), allows cookie spoofing because of symlink mishandling in the reference implementation of DBUS_COOKIE_SHA1 in the libdbus library. (This only affects the DBUS_COOKIE_SHA1 authentication mechanism.) A malicious client with write access to its own home directory could manipulate a ~/.dbus-keyrings symlink to cause a DBusServer with a different uid to read and write in unintended locations. In the worst case, this could result in the DBusServer reusing a cookie that is known to the malicious client, and treating that cookie as evidence that a subsequent client connection came from an attacker-chosen uid, allowing authentication bypass.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-02-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-12749/">CVE-2019-12749 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12749">CVE-2019-12749 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1137832">SUSE bug 1137832</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828521" comment="dbus-1.10.24-15.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828522" comment="dbus-devel-1.10.24-15.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828523" comment="dbus-doc-1.10.24-15.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828524" comment="dbus-libs-1.10.24-15.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828525" comment="dbus-tests-1.10.24-15.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828526" comment="dbus-x11-1.10.24-15.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912779" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12779</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12779" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12779" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12779" ref_url="https://www.suse.com/security/cve/CVE-2019-12779" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005685.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005691.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1718-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XZULCDIKWQRWYN77SCOGRQMMYMT62MM3/#XZULCDIKWQRWYN77SCOGRQMMYMT62MM3" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1752-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LJ3QR2QSCYHVQGSCKZRFXB33KK4AAVYH/#LJ3QR2QSCYHVQGSCKZRFXB33KK4AAVYH" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1891-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MNI5EGA4ITHBYFWJQONAG73DSNBCMD5G/#MNI5EGA4ITHBYFWJQONAG73DSNBCMD5G" source="SUSE-SU"/>
    <description>
    libqb before 1.0.5 allows local users to overwrite arbitrary files via a symlink attack, because it uses predictable filenames (under /dev/shm and /tmp) without O_EXCL.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-12779/">CVE-2019-12779 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12779">CVE-2019-12779 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1137835">SUSE bug 1137835</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827901" comment="libqb-1.0.1-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827902" comment="libqb-devel-1.0.1-9.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912974" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12974</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12974" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12974" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12974" ref_url="https://www.suse.com/security/cve/CVE-2019-12974" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2010-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192010-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YNM2LVHZUR2GCLOOK3NWALHSAJQKCA67/#YNM2LVHZUR2GCLOOK3NWALHSAJQKCA67" source="SUSE-SU"/>
    <description>
    A NULL pointer dereference in the function ReadPANGOImage in coders/pango.c and the function ReadVIDImage in coders/vid.c in ImageMagick 7.0.8-34 allows remote attackers to cause a denial of service via a crafted image.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12974/">CVE-2019-12974 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12974">CVE-2019-12974 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1140111">SUSE bug 1140111</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827880" comment="ImageMagick-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827881" comment="ImageMagick-c++-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827882" comment="ImageMagick-c++-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827883" comment="ImageMagick-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827884" comment="ImageMagick-doc-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827885" comment="ImageMagick-perl-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827886" comment="autotrace-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827887" comment="autotrace-devel-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827888" comment="emacs-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827889" comment="emacs-common-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827890" comment="emacs-el-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827891" comment="emacs-filesystem-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827892" comment="emacs-nox-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827893" comment="emacs-terminal-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827894" comment="inkscape-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827895" comment="inkscape-docs-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827896" comment="inkscape-view-0.92.2-3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912975" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12975</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12975" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12975" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12975" ref_url="https://www.suse.com/security/cve/CVE-2019-12975" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2010-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192010-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YNM2LVHZUR2GCLOOK3NWALHSAJQKCA67/#YNM2LVHZUR2GCLOOK3NWALHSAJQKCA67" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-34 has a memory leak vulnerability in the WriteDPXImage function in coders/dpx.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12975/">CVE-2019-12975 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12975">CVE-2019-12975 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1140106">SUSE bug 1140106</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827880" comment="ImageMagick-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827881" comment="ImageMagick-c++-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827882" comment="ImageMagick-c++-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827883" comment="ImageMagick-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827884" comment="ImageMagick-doc-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827885" comment="ImageMagick-perl-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827886" comment="autotrace-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827887" comment="autotrace-devel-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827888" comment="emacs-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827889" comment="emacs-common-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827890" comment="emacs-el-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827891" comment="emacs-filesystem-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827892" comment="emacs-nox-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827893" comment="emacs-terminal-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827894" comment="inkscape-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827895" comment="inkscape-docs-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827896" comment="inkscape-view-0.92.2-3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912976" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12976</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12976" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12976" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12976" ref_url="https://www.suse.com/security/cve/CVE-2019-12976" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2010-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192010-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YNM2LVHZUR2GCLOOK3NWALHSAJQKCA67/#YNM2LVHZUR2GCLOOK3NWALHSAJQKCA67" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-34 has a memory leak in the ReadPCLImage function in coders/pcl.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12976/">CVE-2019-12976 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12976">CVE-2019-12976 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1140110">SUSE bug 1140110</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827880" comment="ImageMagick-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827881" comment="ImageMagick-c++-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827882" comment="ImageMagick-c++-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827883" comment="ImageMagick-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827884" comment="ImageMagick-doc-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827885" comment="ImageMagick-perl-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827886" comment="autotrace-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827887" comment="autotrace-devel-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827888" comment="emacs-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827889" comment="emacs-common-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827890" comment="emacs-el-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827891" comment="emacs-filesystem-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827892" comment="emacs-nox-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827893" comment="emacs-terminal-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827894" comment="inkscape-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827895" comment="inkscape-docs-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827896" comment="inkscape-view-0.92.2-3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912978" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12978</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12978" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12978" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12978" ref_url="https://www.suse.com/security/cve/CVE-2019-12978" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2010-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192010-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YNM2LVHZUR2GCLOOK3NWALHSAJQKCA67/#YNM2LVHZUR2GCLOOK3NWALHSAJQKCA67" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-34 has a "use of uninitialized value" vulnerability in the ReadPANGOImage function in coders/pango.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12978/">CVE-2019-12978 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12978">CVE-2019-12978 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1139885">SUSE bug 1139885</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827880" comment="ImageMagick-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827881" comment="ImageMagick-c++-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827882" comment="ImageMagick-c++-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827883" comment="ImageMagick-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827884" comment="ImageMagick-doc-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827885" comment="ImageMagick-perl-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827886" comment="autotrace-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827887" comment="autotrace-devel-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827888" comment="emacs-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827889" comment="emacs-common-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827890" comment="emacs-el-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827891" comment="emacs-filesystem-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827892" comment="emacs-nox-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827893" comment="emacs-terminal-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827894" comment="inkscape-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827895" comment="inkscape-docs-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827896" comment="inkscape-view-0.92.2-3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912979" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12979</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12979" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12979" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12979" ref_url="https://www.suse.com/security/cve/CVE-2019-12979" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2010-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192010-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YNM2LVHZUR2GCLOOK3NWALHSAJQKCA67/#YNM2LVHZUR2GCLOOK3NWALHSAJQKCA67" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-34 has a "use of uninitialized value" vulnerability in the SyncImageSettings function in MagickCore/image.c. This is related to AcquireImage in magick/image.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12979/">CVE-2019-12979 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12979">CVE-2019-12979 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1139886">SUSE bug 1139886</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827880" comment="ImageMagick-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827881" comment="ImageMagick-c++-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827882" comment="ImageMagick-c++-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827883" comment="ImageMagick-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827884" comment="ImageMagick-doc-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827885" comment="ImageMagick-perl-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827886" comment="autotrace-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827887" comment="autotrace-devel-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827888" comment="emacs-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827889" comment="emacs-common-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827890" comment="emacs-el-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827891" comment="emacs-filesystem-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827892" comment="emacs-nox-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827893" comment="emacs-terminal-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827894" comment="inkscape-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827895" comment="inkscape-docs-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827896" comment="inkscape-view-0.92.2-3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913038" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13038</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13038" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13038" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13038" ref_url="https://www.suse.com/security/cve/CVE-2019-13038" source="SUSE CVE"/>
    <description>
    mod_auth_mellon through 0.14.2 has an Open Redirect via the login?ReturnTo= substring, as demonstrated by omitting the // after http: in the target URL.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13038/">CVE-2019-13038 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13038">CVE-2019-13038 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826988" comment="mod_auth_mellon-0.14.0-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826989" comment="mod_auth_mellon-diagnostics-0.14.0-8.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913133" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13133</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13133" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13133" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13133" ref_url="https://www.suse.com/security/cve/CVE-2019-13133" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2010-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192010-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YNM2LVHZUR2GCLOOK3NWALHSAJQKCA67/#YNM2LVHZUR2GCLOOK3NWALHSAJQKCA67" source="SUSE-SU"/>
    <description>
    ImageMagick before 7.0.8-50 has a memory leak vulnerability in the function ReadBMPImage in coders/bmp.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-13133/">CVE-2019-13133 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13133">CVE-2019-13133 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1140100">SUSE bug 1140100</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827880" comment="ImageMagick-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827881" comment="ImageMagick-c++-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827882" comment="ImageMagick-c++-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827883" comment="ImageMagick-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827884" comment="ImageMagick-doc-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827885" comment="ImageMagick-perl-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827886" comment="autotrace-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827887" comment="autotrace-devel-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827888" comment="emacs-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827889" comment="emacs-common-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827890" comment="emacs-el-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827891" comment="emacs-filesystem-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827892" comment="emacs-nox-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827893" comment="emacs-terminal-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827894" comment="inkscape-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827895" comment="inkscape-docs-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827896" comment="inkscape-view-0.92.2-3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913134" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13134</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13134" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13134" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13134" ref_url="https://www.suse.com/security/cve/CVE-2019-13134" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2010-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192010-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YNM2LVHZUR2GCLOOK3NWALHSAJQKCA67/#YNM2LVHZUR2GCLOOK3NWALHSAJQKCA67" source="SUSE-SU"/>
    <description>
    ImageMagick before 7.0.8-50 has a memory leak vulnerability in the function ReadVIFFImage in coders/viff.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-13134/">CVE-2019-13134 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13134">CVE-2019-13134 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1140102">SUSE bug 1140102</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827880" comment="ImageMagick-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827881" comment="ImageMagick-c++-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827882" comment="ImageMagick-c++-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827883" comment="ImageMagick-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827884" comment="ImageMagick-doc-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827885" comment="ImageMagick-perl-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827886" comment="autotrace-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827887" comment="autotrace-devel-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827888" comment="emacs-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827889" comment="emacs-common-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827890" comment="emacs-el-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827891" comment="emacs-filesystem-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827892" comment="emacs-nox-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827893" comment="emacs-terminal-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827894" comment="inkscape-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827895" comment="inkscape-docs-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827896" comment="inkscape-view-0.92.2-3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913135" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13135</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13135" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13135" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13135" ref_url="https://www.suse.com/security/cve/CVE-2019-13135" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2010-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192010-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YNM2LVHZUR2GCLOOK3NWALHSAJQKCA67/#YNM2LVHZUR2GCLOOK3NWALHSAJQKCA67" source="SUSE-SU"/>
    <description>
    ImageMagick before 7.0.8-50 has a "use of uninitialized value" vulnerability in the function ReadCUTImage in coders/cut.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-13135/">CVE-2019-13135 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13135">CVE-2019-13135 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1140103">SUSE bug 1140103</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827880" comment="ImageMagick-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827881" comment="ImageMagick-c++-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827882" comment="ImageMagick-c++-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827883" comment="ImageMagick-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827884" comment="ImageMagick-doc-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827885" comment="ImageMagick-perl-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827886" comment="autotrace-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827887" comment="autotrace-devel-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827888" comment="emacs-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827889" comment="emacs-common-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827890" comment="emacs-el-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827891" comment="emacs-filesystem-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827892" comment="emacs-nox-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827893" comment="emacs-terminal-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827894" comment="inkscape-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827895" comment="inkscape-docs-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827896" comment="inkscape-view-0.92.2-3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913232" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13232</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13232" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13232" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13232" ref_url="https://www.suse.com/security/cve/CVE-2019-13232" source="SUSE CVE"/>
    <description>
    Info-ZIP UnZip 6.0 mishandles the overlapping of files inside a ZIP container, leading to denial of service (resource consumption), aka a "better zip bomb" issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13232/">CVE-2019-13232 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13232">CVE-2019-13232 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1140748">SUSE bug 1140748</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827897" comment="unzip-6.0-21.el7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913233" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13233</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13233" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13233" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13233" ref_url="https://www.suse.com/security/cve/CVE-2019-13233" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1757-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PJTYGHQOYDY2SFDAAFYO3E3URRCWKEUQ/#PJTYGHQOYDY2SFDAAFYO3E3URRCWKEUQ" source="SUSE-SU"/>
    <description>
    In arch/x86/lib/insn-eval.c in the Linux kernel before 5.1.9, there is a use-after-free for access to an LDT entry because of a race condition between modify_ldt() and a #BR exception for an MPX bounds violation.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13233/">CVE-2019-13233 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13233">CVE-2019-13233 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1140454">SUSE bug 1140454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144502">SUSE bug 1144502</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826993" comment="bpftool-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826994" comment="kernel-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826995" comment="kernel-abi-whitelists-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826996" comment="kernel-debug-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826999" comment="kernel-doc-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827000" comment="kernel-headers-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827001" comment="kernel-tools-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827002" comment="kernel-tools-libs-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827004" comment="perf-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827005" comment="python-perf-3.10.0-1127.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913295" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13295</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13295" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13295" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13295" ref_url="https://www.suse.com/security/cve/CVE-2019-13295" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2010-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192010-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YNM2LVHZUR2GCLOOK3NWALHSAJQKCA67/#YNM2LVHZUR2GCLOOK3NWALHSAJQKCA67" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-50 Q16 has a heap-based buffer over-read at MagickCore/threshold.c in AdaptiveThresholdImage because a width of zero is mishandled.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13295/">CVE-2019-13295 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13295">CVE-2019-13295 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1140664">SUSE bug 1140664</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827880" comment="ImageMagick-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827881" comment="ImageMagick-c++-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827882" comment="ImageMagick-c++-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827883" comment="ImageMagick-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827884" comment="ImageMagick-doc-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827885" comment="ImageMagick-perl-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827886" comment="autotrace-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827887" comment="autotrace-devel-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827888" comment="emacs-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827889" comment="emacs-common-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827890" comment="emacs-el-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827891" comment="emacs-filesystem-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827892" comment="emacs-nox-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827893" comment="emacs-terminal-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827894" comment="inkscape-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827895" comment="inkscape-docs-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827896" comment="inkscape-view-0.92.2-3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913297" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13297</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13297" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13297" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13297" ref_url="https://www.suse.com/security/cve/CVE-2019-13297" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2010-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192010-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YNM2LVHZUR2GCLOOK3NWALHSAJQKCA67/#YNM2LVHZUR2GCLOOK3NWALHSAJQKCA67" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-50 Q16 has a heap-based buffer over-read at MagickCore/threshold.c in AdaptiveThresholdImage because a height of zero is mishandled.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13297/">CVE-2019-13297 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13297">CVE-2019-13297 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1140666">SUSE bug 1140666</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827880" comment="ImageMagick-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827881" comment="ImageMagick-c++-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827882" comment="ImageMagick-c++-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827883" comment="ImageMagick-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827884" comment="ImageMagick-doc-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827885" comment="ImageMagick-perl-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827886" comment="autotrace-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827887" comment="autotrace-devel-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827888" comment="emacs-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827889" comment="emacs-common-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827890" comment="emacs-el-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827891" comment="emacs-filesystem-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827892" comment="emacs-nox-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827893" comment="emacs-terminal-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827894" comment="inkscape-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827895" comment="inkscape-docs-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827896" comment="inkscape-view-0.92.2-3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913300" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13300</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13300" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13300" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13300" ref_url="https://www.suse.com/security/cve/CVE-2019-13300" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2010-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192010-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YNM2LVHZUR2GCLOOK3NWALHSAJQKCA67/#YNM2LVHZUR2GCLOOK3NWALHSAJQKCA67" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-50 Q16 has a heap-based buffer overflow at MagickCore/statistic.c in EvaluateImages because of mishandling columns.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-13300/">CVE-2019-13300 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13300">CVE-2019-13300 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1140669">SUSE bug 1140669</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827880" comment="ImageMagick-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827881" comment="ImageMagick-c++-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827882" comment="ImageMagick-c++-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827883" comment="ImageMagick-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827884" comment="ImageMagick-doc-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827885" comment="ImageMagick-perl-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827886" comment="autotrace-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827887" comment="autotrace-devel-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827888" comment="emacs-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827889" comment="emacs-common-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827890" comment="emacs-el-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827891" comment="emacs-filesystem-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827892" comment="emacs-nox-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827893" comment="emacs-terminal-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827894" comment="inkscape-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827895" comment="inkscape-docs-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827896" comment="inkscape-view-0.92.2-3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913301" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13301</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13301" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13301" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13301" ref_url="https://www.suse.com/security/cve/CVE-2019-13301" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2010-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192010-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YNM2LVHZUR2GCLOOK3NWALHSAJQKCA67/#YNM2LVHZUR2GCLOOK3NWALHSAJQKCA67" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-50 Q16 has memory leaks in AcquireMagickMemory because of an AnnotateImage error.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13301/">CVE-2019-13301 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13301">CVE-2019-13301 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1140554">SUSE bug 1140554</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827880" comment="ImageMagick-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827881" comment="ImageMagick-c++-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827882" comment="ImageMagick-c++-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827883" comment="ImageMagick-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827884" comment="ImageMagick-doc-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827885" comment="ImageMagick-perl-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827886" comment="autotrace-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827887" comment="autotrace-devel-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827888" comment="emacs-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827889" comment="emacs-common-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827890" comment="emacs-el-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827891" comment="emacs-filesystem-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827892" comment="emacs-nox-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827893" comment="emacs-terminal-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827894" comment="inkscape-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827895" comment="inkscape-docs-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827896" comment="inkscape-view-0.92.2-3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913304" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13304</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13304" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13304" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13304" ref_url="https://www.suse.com/security/cve/CVE-2019-13304" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YNM2LVHZUR2GCLOOK3NWALHSAJQKCA67/#YNM2LVHZUR2GCLOOK3NWALHSAJQKCA67" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-50 Q16 has a stack-based buffer overflow at coders/pnm.c in WritePNMImage because of a misplaced assignment.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13304/">CVE-2019-13304 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13304">CVE-2019-13304 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1140547">SUSE bug 1140547</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827880" comment="ImageMagick-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827881" comment="ImageMagick-c++-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827882" comment="ImageMagick-c++-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827883" comment="ImageMagick-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827884" comment="ImageMagick-doc-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827885" comment="ImageMagick-perl-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827886" comment="autotrace-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827887" comment="autotrace-devel-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827888" comment="emacs-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827889" comment="emacs-common-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827890" comment="emacs-el-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827891" comment="emacs-filesystem-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827892" comment="emacs-nox-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827893" comment="emacs-terminal-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827894" comment="inkscape-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827895" comment="inkscape-docs-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827896" comment="inkscape-view-0.92.2-3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913305" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13305</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13305" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13305" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13305" ref_url="https://www.suse.com/security/cve/CVE-2019-13305" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YNM2LVHZUR2GCLOOK3NWALHSAJQKCA67/#YNM2LVHZUR2GCLOOK3NWALHSAJQKCA67" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-50 Q16 has a stack-based buffer overflow at coders/pnm.c in WritePNMImage because of a misplaced strncpy and an off-by-one error.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13305/">CVE-2019-13305 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13305">CVE-2019-13305 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1140545">SUSE bug 1140545</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827880" comment="ImageMagick-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827881" comment="ImageMagick-c++-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827882" comment="ImageMagick-c++-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827883" comment="ImageMagick-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827884" comment="ImageMagick-doc-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827885" comment="ImageMagick-perl-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827886" comment="autotrace-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827887" comment="autotrace-devel-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827888" comment="emacs-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827889" comment="emacs-common-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827890" comment="emacs-el-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827891" comment="emacs-filesystem-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827892" comment="emacs-nox-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827893" comment="emacs-terminal-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827894" comment="inkscape-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827895" comment="inkscape-docs-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827896" comment="inkscape-view-0.92.2-3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913306" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13306</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13306" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13306" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13306" ref_url="https://www.suse.com/security/cve/CVE-2019-13306" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YNM2LVHZUR2GCLOOK3NWALHSAJQKCA67/#YNM2LVHZUR2GCLOOK3NWALHSAJQKCA67" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-50 Q16 has a stack-based buffer overflow at coders/pnm.c in WritePNMImage because of off-by-one errors.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-13306/">CVE-2019-13306 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13306">CVE-2019-13306 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1140543">SUSE bug 1140543</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827880" comment="ImageMagick-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827881" comment="ImageMagick-c++-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827882" comment="ImageMagick-c++-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827883" comment="ImageMagick-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827884" comment="ImageMagick-doc-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827885" comment="ImageMagick-perl-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827886" comment="autotrace-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827887" comment="autotrace-devel-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827888" comment="emacs-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827889" comment="emacs-common-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827890" comment="emacs-el-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827891" comment="emacs-filesystem-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827892" comment="emacs-nox-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827893" comment="emacs-terminal-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827894" comment="inkscape-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827895" comment="inkscape-docs-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827896" comment="inkscape-view-0.92.2-3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913307" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13307</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13307" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13307" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13307" ref_url="https://www.suse.com/security/cve/CVE-2019-13307" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2010-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192010-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YNM2LVHZUR2GCLOOK3NWALHSAJQKCA67/#YNM2LVHZUR2GCLOOK3NWALHSAJQKCA67" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-50 Q16 has a heap-based buffer overflow at MagickCore/statistic.c in EvaluateImages because of mishandling rows.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13307/">CVE-2019-13307 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13307">CVE-2019-13307 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1140538">SUSE bug 1140538</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827880" comment="ImageMagick-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827881" comment="ImageMagick-c++-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827882" comment="ImageMagick-c++-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827883" comment="ImageMagick-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827884" comment="ImageMagick-doc-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827885" comment="ImageMagick-perl-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827886" comment="autotrace-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827887" comment="autotrace-devel-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827888" comment="emacs-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827889" comment="emacs-common-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827890" comment="emacs-el-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827891" comment="emacs-filesystem-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827892" comment="emacs-nox-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827893" comment="emacs-terminal-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827894" comment="inkscape-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827895" comment="inkscape-docs-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827896" comment="inkscape-view-0.92.2-3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913309" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13309</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13309" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13309" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13309" ref_url="https://www.suse.com/security/cve/CVE-2019-13309" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YNM2LVHZUR2GCLOOK3NWALHSAJQKCA67/#YNM2LVHZUR2GCLOOK3NWALHSAJQKCA67" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-50 Q16 has memory leaks at AcquireMagickMemory because of mishandling the NoSuchImage error in CLIListOperatorImages in MagickWand/operation.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13309/">CVE-2019-13309 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13309">CVE-2019-13309 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1140501">SUSE bug 1140501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140520">SUSE bug 1140520</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827880" comment="ImageMagick-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827881" comment="ImageMagick-c++-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827882" comment="ImageMagick-c++-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827883" comment="ImageMagick-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827884" comment="ImageMagick-doc-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827885" comment="ImageMagick-perl-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827886" comment="autotrace-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827887" comment="autotrace-devel-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827888" comment="emacs-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827889" comment="emacs-common-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827890" comment="emacs-el-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827891" comment="emacs-filesystem-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827892" comment="emacs-nox-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827893" comment="emacs-terminal-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827894" comment="inkscape-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827895" comment="inkscape-docs-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827896" comment="inkscape-view-0.92.2-3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913310" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13310</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13310" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13310" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13310" ref_url="https://www.suse.com/security/cve/CVE-2019-13310" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2010-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192010-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YNM2LVHZUR2GCLOOK3NWALHSAJQKCA67/#YNM2LVHZUR2GCLOOK3NWALHSAJQKCA67" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-50 Q16 has memory leaks at AcquireMagickMemory because of an error in MagickWand/mogrify.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13310/">CVE-2019-13310 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13310">CVE-2019-13310 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1140501">SUSE bug 1140501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140520">SUSE bug 1140520</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827880" comment="ImageMagick-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827881" comment="ImageMagick-c++-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827882" comment="ImageMagick-c++-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827883" comment="ImageMagick-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827884" comment="ImageMagick-doc-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827885" comment="ImageMagick-perl-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827886" comment="autotrace-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827887" comment="autotrace-devel-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827888" comment="emacs-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827889" comment="emacs-common-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827890" comment="emacs-el-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827891" comment="emacs-filesystem-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827892" comment="emacs-nox-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827893" comment="emacs-terminal-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827894" comment="inkscape-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827895" comment="inkscape-docs-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827896" comment="inkscape-view-0.92.2-3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913311" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13311</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13311" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13311" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13311" ref_url="https://www.suse.com/security/cve/CVE-2019-13311" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2010-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192010-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YNM2LVHZUR2GCLOOK3NWALHSAJQKCA67/#YNM2LVHZUR2GCLOOK3NWALHSAJQKCA67" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-50 Q16 has memory leaks at AcquireMagickMemory because of a wand/mogrify.c error.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13311/">CVE-2019-13311 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13311">CVE-2019-13311 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1140513">SUSE bug 1140513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140554">SUSE bug 1140554</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827880" comment="ImageMagick-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827881" comment="ImageMagick-c++-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827882" comment="ImageMagick-c++-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827883" comment="ImageMagick-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827884" comment="ImageMagick-doc-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827885" comment="ImageMagick-perl-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827886" comment="autotrace-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827887" comment="autotrace-devel-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827888" comment="emacs-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827889" comment="emacs-common-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827890" comment="emacs-el-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827891" comment="emacs-filesystem-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827892" comment="emacs-nox-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827893" comment="emacs-terminal-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827894" comment="inkscape-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827895" comment="inkscape-docs-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827896" comment="inkscape-view-0.92.2-3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913313" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13313</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13313" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13313" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13313" ref_url="https://www.suse.com/security/cve/CVE-2019-13313" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018558.html" source="SUSE-SU"/>
    <description>
    libosinfo 1.5.0 allows local users to discover credentials by listing a process, because credentials are passed to osinfo-install-script via the command line.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13313/">CVE-2019-13313 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13313">CVE-2019-13313 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1140749">SUSE bug 1140749</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827653" comment="libosinfo-1.1.0-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827654" comment="libosinfo-devel-1.1.0-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827655" comment="libosinfo-vala-1.1.0-5.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913345" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13345</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13345" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13345" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13345" ref_url="https://www.suse.com/security/cve/CVE-2019-13345" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005801.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2089-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007289.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1963-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2UH37K2ETOHK6U4MYQVVMVSUFOMKNP2Z/#2UH37K2ETOHK6U4MYQVVMVSUFOMKNP2Z" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2540-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5B7VIBHEUXO2VYU6NZTEL6I7K4WUKD7G/#5B7VIBHEUXO2VYU6NZTEL6I7K4WUKD7G" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2541-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2PLGSQEPKZX62EREA7UHDNEMHR3Z23A6/#2PLGSQEPKZX62EREA7UHDNEMHR3Z23A6" source="SUSE-SU"/>
    <description>
    The cachemgr.cgi web module of Squid through 4.7 has XSS via the user_name or auth parameter.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-13345/">CVE-2019-13345 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13345">CVE-2019-13345 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1140738">SUSE bug 1140738</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827678" comment="squid-3.5.20-15.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827679" comment="squid-migration-script-3.5.20-15.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827680" comment="squid-sysvinit-3.5.20-15.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913454" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13454</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13454" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13454" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13454" ref_url="https://www.suse.com/security/cve/CVE-2019-13454" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2010-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192010-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YNM2LVHZUR2GCLOOK3NWALHSAJQKCA67/#YNM2LVHZUR2GCLOOK3NWALHSAJQKCA67" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.1-0 to 7.0.8-54 Q16 allows Division by Zero in RemoveDuplicateLayers in MagickCore/layer.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-13454/">CVE-2019-13454 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13454">CVE-2019-13454 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1141171">SUSE bug 1141171</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827880" comment="ImageMagick-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827881" comment="ImageMagick-c++-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827882" comment="ImageMagick-c++-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827883" comment="ImageMagick-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827884" comment="ImageMagick-doc-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827885" comment="ImageMagick-perl-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827886" comment="autotrace-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827887" comment="autotrace-devel-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827888" comment="emacs-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827889" comment="emacs-common-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827890" comment="emacs-el-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827891" comment="emacs-filesystem-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827892" comment="emacs-nox-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827893" comment="emacs-terminal-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827894" comment="inkscape-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827895" comment="inkscape-docs-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827896" comment="inkscape-view-0.92.2-3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913456" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13456</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13456" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13456" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13456" ref_url="https://www.suse.com/security/cve/CVE-2019-13456" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1023-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007316.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0553-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TMVXSP5XFJILXXXL4PCJEJOUEIQCWQ5X/" source="SUSE-SU"/>
    <description>
    In FreeRADIUS 3.0 through 3.0.19, on average 1 in every 2048 EAP-pwd handshakes fails because the password element cannot be found within 10 iterations of the hunting and pecking loop. This leaks information that an attacker can use to recover the password of any user. This information leakage is similar to the "Dragonblood" attack and CVE-2019-9494.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13456/">CVE-2019-13456 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13456">CVE-2019-13456 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1144524">SUSE bug 1144524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1166858">SUSE bug 1166858</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828391" comment="freeradius-3.0.13-15.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828392" comment="freeradius-devel-3.0.13-15.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828393" comment="freeradius-doc-3.0.13-15.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828394" comment="freeradius-krb5-3.0.13-15.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828395" comment="freeradius-ldap-3.0.13-15.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828396" comment="freeradius-mysql-3.0.13-15.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828397" comment="freeradius-perl-3.0.13-15.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828398" comment="freeradius-postgresql-3.0.13-15.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828399" comment="freeradius-python-3.0.13-15.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828400" comment="freeradius-sqlite-3.0.13-15.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828401" comment="freeradius-unixODBC-3.0.13-15.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828402" comment="freeradius-utils-3.0.13-15.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913616" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13616</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13616" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13616" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13616" ref_url="https://www.suse.com/security/cve/CVE-2019-13616" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2463-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007740.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2070-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H6CP3W3YJYYFIAMX7CDOYPH65QZMBRGD/#H6CP3W3YJYYFIAMX7CDOYPH65QZMBRGD" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2071-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3QX7GXNBMMTXZSXQVKMIC4P6EVVZNDRA/#3QX7GXNBMMTXZSXQVKMIC4P6EVVZNDRA" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2108-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/L64IV5QDMXKI6JPESXNTCMESEKNUADR2/#L64IV5QDMXKI6JPESXNTCMESEKNUADR2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2109-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LT2L2SUT2SJMJ23HFEUSMEN3PCAFI5LM/#LT2L2SUT2SJMJ23HFEUSMEN3PCAFI5LM" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2224-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/L5YO2SMMKMNOUCDJA5YX7FDHQRWWPZYC/#L5YO2SMMKMNOUCDJA5YX7FDHQRWWPZYC" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2226-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IQBBVL7NKFQCKXQSXMKBM2TVT7PV2MZZ/#IQBBVL7NKFQCKXQSXMKBM2TVT7PV2MZZ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1916-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KFAVEMB6RSGK626NYU5HGZQL46KEPIB5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1990-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BGSHRLXRLM6QT7N73JKYMSATV36M64Q6/" source="SUSE-SU"/>
    <description>
    SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer over-read in BlitNtoN in video/SDL_blit_N.c when called from SDL_SoftBlit in video/SDL_blit.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13616/">CVE-2019-13616 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13616">CVE-2019-13616 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1141844">SUSE bug 1141844</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826765" comment="SDL-1.2.15-14.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826766" comment="SDL-devel-1.2.15-14.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826767" comment="SDL-static-1.2.15-14.el7_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913638" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13638</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13638" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13638" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13638" ref_url="https://www.suse.com/security/cve/CVE-2019-13638" source="SUSE CVE"/>
    <description>
    GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13638/">CVE-2019-13638 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13638">CVE-2019-13638 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1088420">SUSE bug 1088420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142513">SUSE bug 1142513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146398">SUSE bug 1146398</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826649" comment="patch-2.7.1-12.el7_7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913648" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13648</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13648" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13648" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13648" ref_url="https://www.suse.com/security/cve/CVE-2019-13648" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005790.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005786.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005958.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1923-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EIHLFLWIJWATY4U7OHLNF5XU4F4GVLNR/#EIHLFLWIJWATY4U7OHLNF5XU4F4GVLNR" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1924-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QQRUSBNZ3H36Y5YE6DN2DIYEFRQKUSLI/#QQRUSBNZ3H36Y5YE6DN2DIYEFRQKUSLI" source="SUSE-SU"/>
    <description>
    In the Linux kernel through 5.2.1 on the powerpc platform, when hardware transactional memory is disabled, a local user can cause a denial of service (TM Bad Thing exception and system crash) via a sigreturn() system call that sends a crafted signal frame. This affects arch/powerpc/kernel/signal_32.c and arch/powerpc/kernel/signal_64.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-13648/">CVE-2019-13648 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13648">CVE-2019-13648 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1142254">SUSE bug 1142254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142265">SUSE bug 1142265</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826993" comment="bpftool-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826994" comment="kernel-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826995" comment="kernel-abi-whitelists-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826996" comment="kernel-debug-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826999" comment="kernel-doc-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827000" comment="kernel-headers-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827001" comment="kernel-tools-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827002" comment="kernel-tools-libs-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827004" comment="perf-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827005" comment="python-perf-3.10.0-1127.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913734" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13734</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13734" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13734" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13734" ref_url="https://www.suse.com/security/cve/CVE-2019-13734" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:2692-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3I7JW5ADR66AGNQQYWOCKQVPC4IOUCKD/#3I7JW5ADR66AGNQQYWOCKQVPC4IOUCKD" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2694-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M7S2JFSREIHYGCP4KXIISPEHVMV7FBWS/#M7S2JFSREIHYGCP4KXIISPEHVMV7FBWS" source="SUSE-SU"/>
    <description>
    Out of bounds write in SQLite in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13734/">CVE-2019-13734 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13734">CVE-2019-13734 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1158982">SUSE bug 1158982</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826866" comment="lemon-3.7.17-8.el7_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826867" comment="sqlite-3.7.17-8.el7_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826868" comment="sqlite-devel-3.7.17-8.el7_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826869" comment="sqlite-doc-3.7.17-8.el7_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826870" comment="sqlite-tcl-3.7.17-8.el7_7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20191387" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-1387</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-1387" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1387" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-1387" ref_url="https://www.suse.com/security/cve/CVE-2019-1387" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006748.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0123-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MGTC3VP4MCFQ5HPSFYOHMPVGOI32A7EM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0598-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VP5YOKSRLMTVAPQKPHEDGCOIZL5JKJW5/" source="SUSE-SU"/>
    <description>
    An issue was found in Git before v2.24.1, v2.23.1, v2.22.2, v2.21.1, v2.20.2, v2.19.3, v2.18.2, v2.17.3, v2.16.6, v2.15.4, and v2.14.6. Recursive clones are currently affected by a vulnerability that is caused by too-lax validation of submodule names, allowing very targeted attacks via remote code execution in recursive clones.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-1387/">CVE-2019-1387 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1387">CVE-2019-1387 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1158785">SUSE bug 1158785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158793">SUSE bug 1158793</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826824" comment="emacs-git-1.8.3.1-21.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826825" comment="emacs-git-el-1.8.3.1-21.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826826" comment="git-1.8.3.1-21.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826827" comment="git-all-1.8.3.1-21.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826828" comment="git-bzr-1.8.3.1-21.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826829" comment="git-cvs-1.8.3.1-21.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826830" comment="git-daemon-1.8.3.1-21.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826831" comment="git-email-1.8.3.1-21.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826832" comment="git-gnome-keyring-1.8.3.1-21.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826833" comment="git-gui-1.8.3.1-21.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826834" comment="git-hg-1.8.3.1-21.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826835" comment="git-instaweb-1.8.3.1-21.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826836" comment="git-p4-1.8.3.1-21.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826837" comment="git-svn-1.8.3.1-21.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826838" comment="gitk-1.8.3.1-21.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826839" comment="gitweb-1.8.3.1-21.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826840" comment="perl-Git-1.8.3.1-21.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826841" comment="perl-Git-SVN-1.8.3.1-21.el7_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914283" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14283</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14283" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14283" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14283" ref_url="https://www.suse.com/security/cve/CVE-2019-14283" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005790.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005786.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005958.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1923-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EIHLFLWIJWATY4U7OHLNF5XU4F4GVLNR/#EIHLFLWIJWATY4U7OHLNF5XU4F4GVLNR" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1924-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QQRUSBNZ3H36Y5YE6DN2DIYEFRQKUSLI/#QQRUSBNZ3H36Y5YE6DN2DIYEFRQKUSLI" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 5.2.3, set_geometry in drivers/block/floppy.c does not validate the sect and head fields, as demonstrated by an integer overflow and out-of-bounds read. It can be triggered by an unprivileged local user when a floppy disk has been inserted. NOTE: QEMU creates the floppy device by default.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14283/">CVE-2019-14283 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14283">CVE-2019-14283 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1143191">SUSE bug 1143191</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826993" comment="bpftool-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826994" comment="kernel-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826995" comment="kernel-abi-whitelists-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826996" comment="kernel-debug-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826999" comment="kernel-doc-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827000" comment="kernel-headers-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827001" comment="kernel-tools-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827002" comment="kernel-tools-libs-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827004" comment="perf-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827005" comment="python-perf-3.10.0-1127.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914287" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14287</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14287" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14287" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14287" ref_url="https://www.suse.com/security/cve/CVE-2019-14287" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2656-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192656-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2666-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2668-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2316-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5CZZAG7XSZAR6GDRIODAMMG67QVMCPCH/#5CZZAG7XSZAR6GDRIODAMMG67QVMCPCH" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2333-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BSBNENZR57LOHEQOPC2JHBLICDY4PCZ5/#BSBNENZR57LOHEQOPC2JHBLICDY4PCZ5" source="SUSE-SU"/>
    <description>
    In Sudo before 1.8.28, an attacker with access to a Runas ALL sudoer account can bypass certain policy blacklists and session PAM modules, and can cause incorrect logging, by invoking sudo with a crafted user ID. For example, this allows bypass of !root configuration, and USER= logging, for a "sudo -u \#$((0xffffffff))" command.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14287/">CVE-2019-14287 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14287">CVE-2019-14287 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1153674">SUSE bug 1153674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156093">SUSE bug 1156093</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826705" comment="sudo-1.8.23-4.el7_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826706" comment="sudo-devel-1.8.23-4.el7_7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914378" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14378</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14378" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14378" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14378" ref_url="https://www.suse.com/security/cve/CVE-2019-14378" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14151-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2955-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192955-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006485.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2041-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TUKWOBV7QSC7BRGVOAZZDM7P4VZESISG/#TUKWOBV7QSC7BRGVOAZZDM7P4VZESISG" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6SBK6URNJUYYH2QPGRG7N4UIGYSVXV6U/#6SBK6URNJUYYH2QPGRG7N4UIGYSVXV6U" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2510-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KGVFZGJMBR53343ITOTWO7YW2JVKGHDT/#KGVFZGJMBR53343ITOTWO7YW2JVKGHDT" source="SUSE-SU"/>
    <description>
    ip_reass in ip_input.c in libslirp 4.0.0 has a heap-based buffer overflow via a large packet because it mishandles a case involving the first fragment.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-02-13"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14378/">CVE-2019-14378 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14378">CVE-2019-14378 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1143794">SUSE bug 1143794</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143797">SUSE bug 1143797</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826875" comment="qemu-img-1.5.3-167.el7_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826876" comment="qemu-kvm-1.5.3-167.el7_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826877" comment="qemu-kvm-common-1.5.3-167.el7_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826878" comment="qemu-kvm-tools-1.5.3-167.el7_7.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14494</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14494" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14494" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14494" ref_url="https://www.suse.com/security/cve/CVE-2019-14494" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011080.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3854-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TS7QPSEQIBQO7BALZOE3TN7IO7IMHK3Y/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Poppler through 0.78.0. There is a divide-by-zero error in the function SplashOutputDev::tilingPatternFill at SplashOutputDev.cc.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14494/">CVE-2019-14494 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14494">CVE-2019-14494 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1143950">SUSE bug 1143950</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828334" comment="evince-3.28.2-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828335" comment="evince-browser-plugin-3.28.2-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828336" comment="evince-devel-3.28.2-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828337" comment="evince-dvi-3.28.2-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828338" comment="evince-libs-3.28.2-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828339" comment="evince-nautilus-3.28.2-10.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828340" comment="poppler-0.26.5-43.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828341" comment="poppler-cpp-0.26.5-43.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828342" comment="poppler-cpp-devel-0.26.5-43.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828343" comment="poppler-demos-0.26.5-43.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828344" comment="poppler-devel-0.26.5-43.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828345" comment="poppler-glib-0.26.5-43.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828346" comment="poppler-glib-devel-0.26.5-43.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828347" comment="poppler-qt-0.26.5-43.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828348" comment="poppler-qt-devel-0.26.5-43.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828349" comment="poppler-utils-0.26.5-43.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914744" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14744</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14744" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14744" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14744" ref_url="https://www.suse.com/security/cve/CVE-2019-14744" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1851-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NUT64UDNW74IDXCK3DKVBYT7T2GAOQ4A/#NUT64UDNW74IDXCK3DKVBYT7T2GAOQ4A" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1851-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZQO5EYPXIVZ5HZPEQ377KQFRRENZNQJI/#ZQO5EYPXIVZ5HZPEQ377KQFRRENZNQJI" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1855-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3PV6Z3TCAM4W7P2QXLK2LD7IRGXUU5R7/#3PV6Z3TCAM4W7P2QXLK2LD7IRGXUU5R7" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1898-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JRL77WXMC2B6FM2K6QCBCXRGCZBFJF3O/#JRL77WXMC2B6FM2K6QCBCXRGCZBFJF3O" source="SUSE-SU"/>
    <description>
    In KDE Frameworks KConfig before 5.61.0, malicious desktop files and configuration files lead to code execution with minimal user interaction. This relates to libKF5ConfigCore.so, and the mishandling of .desktop and .directory files, as demonstrated by a shell command on an Icon line in a .desktop file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-14744/">CVE-2019-14744 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14744">CVE-2019-14744 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1144600">SUSE bug 1144600</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826614" comment="kde-settings-19-23.10.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826615" comment="kde-settings-ksplash-19-23.10.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826616" comment="kde-settings-minimal-19-23.10.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826617" comment="kde-settings-plasma-19-23.10.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826618" comment="kde-settings-pulseaudio-19-23.10.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826619" comment="kdelibs-4.14.8-11.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826620" comment="kdelibs-apidocs-4.14.8-11.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826621" comment="kdelibs-common-4.14.8-11.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826622" comment="kdelibs-devel-4.14.8-11.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826623" comment="kdelibs-ktexteditor-4.14.8-11.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826624" comment="qt-settings-19-23.10.el7_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914811" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14811</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14811" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14811" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14811" ref_url="https://www.suse.com/security/cve/CVE-2019-14811" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005970.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2222-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2XOZCYLX5M5QZSG2QI4G4WPB3AVOCY4C/#2XOZCYLX5M5QZSG2QI4G4WPB3AVOCY4C" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2223-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7XGX735CL3KDIKASKAQUMDRQD4HIHZEJ/#7XGX735CL3KDIKASKAQUMDRQD4HIHZEJ" source="SUSE-SU"/>
    <description>
    A flaw was found in, ghostscript versions prior to 9.50, in the .pdf_hook_DSC_Creator procedure where it did not properly secure its privileged calls, enabling scripts to bypass `-dSAFER` restrictions. A specially crafted PostScript file could disable security protection and then have access to the file system, or execute arbitrary commands.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-05"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14811/">CVE-2019-14811 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14811">CVE-2019-14811 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1146882">SUSE bug 1146882</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826595" comment="ghostscript-9.25-2.el7_7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826596" comment="ghostscript-cups-9.25-2.el7_7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826597" comment="ghostscript-doc-9.25-2.el7_7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826598" comment="ghostscript-gtk-9.25-2.el7_7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826599" comment="libgs-9.25-2.el7_7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826600" comment="libgs-devel-9.25-2.el7_7.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914812" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14812</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14812" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14812" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14812" ref_url="https://www.suse.com/security/cve/CVE-2019-14812" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005970.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2222-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2XOZCYLX5M5QZSG2QI4G4WPB3AVOCY4C/#2XOZCYLX5M5QZSG2QI4G4WPB3AVOCY4C" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2223-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7XGX735CL3KDIKASKAQUMDRQD4HIHZEJ/#7XGX735CL3KDIKASKAQUMDRQD4HIHZEJ" source="SUSE-SU"/>
    <description>
    A flaw was found in all ghostscript versions 9.x before 9.50, in the .setuserparams2 procedure where it did not properly secure its privileged calls, enabling scripts to bypass `-dSAFER` restrictions. A specially crafted PostScript file could disable security protection and then have access to the file system, or execute arbitrary commands.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-07"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14812/">CVE-2019-14812 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14812">CVE-2019-14812 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1146882">SUSE bug 1146882</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826595" comment="ghostscript-9.25-2.el7_7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826596" comment="ghostscript-cups-9.25-2.el7_7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826597" comment="ghostscript-doc-9.25-2.el7_7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826598" comment="ghostscript-gtk-9.25-2.el7_7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826599" comment="libgs-9.25-2.el7_7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826600" comment="libgs-devel-9.25-2.el7_7.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914813" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14813</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14813" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14813" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14813" ref_url="https://www.suse.com/security/cve/CVE-2019-14813" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005970.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2222-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2XOZCYLX5M5QZSG2QI4G4WPB3AVOCY4C/#2XOZCYLX5M5QZSG2QI4G4WPB3AVOCY4C" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2223-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7XGX735CL3KDIKASKAQUMDRQD4HIHZEJ/#7XGX735CL3KDIKASKAQUMDRQD4HIHZEJ" source="SUSE-SU"/>
    <description>
    A flaw was found in ghostscript, versions 9.x before 9.50, in the setsystemparams procedure where it did not properly secure its privileged calls, enabling scripts to bypass `-dSAFER` restrictions. A specially crafted PostScript file could disable security protection and then have access to the file system, or execute arbitrary commands.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-05"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14813/">CVE-2019-14813 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14813">CVE-2019-14813 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1146882">SUSE bug 1146882</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826595" comment="ghostscript-9.25-2.el7_7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826596" comment="ghostscript-cups-9.25-2.el7_7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826597" comment="ghostscript-doc-9.25-2.el7_7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826598" comment="ghostscript-gtk-9.25-2.el7_7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826599" comment="libgs-9.25-2.el7_7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826600" comment="libgs-devel-9.25-2.el7_7.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914816" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14816</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14816" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14816" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14816" ref_url="https://www.suse.com/security/cve/CVE-2019-14816" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007367.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4CEC37F4Q2EPQFGCPFIWQY5MJOYSR3WW/#4CEC37F4Q2EPQFGCPFIWQY5MJOYSR3WW" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VOAHRKDA7W6T2DPZV7YKHMSWYSGQCJCW/#VOAHRKDA7W6T2DPZV7YKHMSWYSGQCJCW" source="SUSE-SU"/>
    <description>
    There is heap-based buffer overflow in kernel, all versions up to, excluding 5.3, in the marvell wifi chip driver in Linux kernel, that allows local users to cause a denial of service(system crash) or possibly execute arbitrary code.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14816/">CVE-2019-14816 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14816">CVE-2019-14816 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1146516">SUSE bug 1146516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173666">SUSE bug 1173666</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826879" comment="bpftool-3.10.0-1062.12.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826880" comment="kernel-3.10.0-1062.12.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826881" comment="kernel-abi-whitelists-3.10.0-1062.12.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826882" comment="kernel-debug-3.10.0-1062.12.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826885" comment="kernel-doc-3.10.0-1062.12.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826886" comment="kernel-headers-3.10.0-1062.12.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826887" comment="kernel-tools-3.10.0-1062.12.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826888" comment="kernel-tools-libs-3.10.0-1062.12.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826890" comment="perf-3.10.0-1062.12.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826891" comment="python-perf-3.10.0-1062.12.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14817</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14817" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14817" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14817" ref_url="https://www.suse.com/security/cve/CVE-2019-14817" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005970.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2222-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2XOZCYLX5M5QZSG2QI4G4WPB3AVOCY4C/#2XOZCYLX5M5QZSG2QI4G4WPB3AVOCY4C" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2223-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7XGX735CL3KDIKASKAQUMDRQD4HIHZEJ/#7XGX735CL3KDIKASKAQUMDRQD4HIHZEJ" source="SUSE-SU"/>
    <description>
    A flaw was found in, ghostscript versions prior to 9.50, in the .pdfexectoken and other procedures where it did not properly secure its privileged calls, enabling scripts to bypass `-dSAFER` restrictions. A specially crafted PostScript file could disable security protection and then have access to the file system, or execute arbitrary commands.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-11"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14817/">CVE-2019-14817 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14817">CVE-2019-14817 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1146882">SUSE bug 1146882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146884">SUSE bug 1146884</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826595" comment="ghostscript-9.25-2.el7_7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826596" comment="ghostscript-cups-9.25-2.el7_7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826597" comment="ghostscript-doc-9.25-2.el7_7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826598" comment="ghostscript-gtk-9.25-2.el7_7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826599" comment="libgs-9.25-2.el7_7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826600" comment="libgs-devel-9.25-2.el7_7.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914821" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14821</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14821" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14821" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14821" ref_url="https://www.suse.com/security/cve/CVE-2019-14821" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2706-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192706-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2307-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O7FGUFIPLWDXYK7VLKXBJND7NJWBBYU6/#O7FGUFIPLWDXYK7VLKXBJND7NJWBBYU6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2308-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C647ZGMUBEKKW7XKI4MVE7QEHYRLVUIX/#C647ZGMUBEKKW7XKI4MVE7QEHYRLVUIX" source="SUSE-SU"/>
    <description>
    An out-of-bounds access issue was found in the Linux kernel, all versions through 5.3, in the way Linux kernel's KVM hypervisor implements the Coalesced MMIO write operation. It operates on an MMIO ring buffer 'struct kvm_coalesced_mmio' object, wherein write indices 'ring-&gt;first' and 'ring-&gt;last' value could be supplied by a host user-space process. An unprivileged host user or process with access to '/dev/kvm' device could use this flaw to crash the host kernel, resulting in a denial of service or potentially escalating privileges on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-14821/">CVE-2019-14821 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14821">CVE-2019-14821 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1151350">SUSE bug 1151350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218966">SUSE bug 1218966</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826769" comment="bpftool-3.10.0-1062.7.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826770" comment="kernel-3.10.0-1062.7.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826771" comment="kernel-abi-whitelists-3.10.0-1062.7.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826772" comment="kernel-debug-3.10.0-1062.7.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826775" comment="kernel-doc-3.10.0-1062.7.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826776" comment="kernel-headers-3.10.0-1062.7.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826777" comment="kernel-tools-3.10.0-1062.7.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826778" comment="kernel-tools-libs-3.10.0-1062.7.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826780" comment="perf-3.10.0-1062.7.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826781" comment="python-perf-3.10.0-1062.7.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914822" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14822</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14822" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14822" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14822" ref_url="https://www.suse.com/security/cve/CVE-2019-14822" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2427-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005948.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2174-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/A5OYLMXW4CL6JVAISTO2TH2RNZYNOM3Q/#A5OYLMXW4CL6JVAISTO2TH2RNZYNOM3Q" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2199-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PFKRZPBAZEPSQ27O4426QARM24O4VMSC/#PFKRZPBAZEPSQ27O4426QARM24O4VMSC" source="SUSE-SU"/>
    <description>
    A flaw was discovered in ibus in versions before 1.5.22 that allows any unprivileged user to monitor and send method calls to the ibus bus of another user due to a misconfiguration in the DBus server setup. A local attacker may use this flaw to intercept all keystrokes of a victim user who is using the graphical interface, change the input method engine, or modify other input related configurations of the victim user.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14822/">CVE-2019-14822 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14822">CVE-2019-14822 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1150011">SUSE bug 1150011</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828350" comment="glib2-2.56.1-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828351" comment="glib2-devel-2.56.1-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828352" comment="glib2-doc-2.56.1-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828353" comment="glib2-fam-2.56.1-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828354" comment="glib2-static-2.56.1-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828355" comment="glib2-tests-2.56.1-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828356" comment="ibus-1.5.17-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828357" comment="ibus-devel-1.5.17-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828358" comment="ibus-devel-docs-1.5.17-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828359" comment="ibus-gtk2-1.5.17-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828360" comment="ibus-gtk3-1.5.17-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828361" comment="ibus-libs-1.5.17-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828362" comment="ibus-pygtk2-1.5.17-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828363" comment="ibus-setup-1.5.17-11.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914823" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14823</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14823" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14823" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14823" ref_url="https://www.suse.com/security/cve/CVE-2019-14823" source="SUSE CVE"/>
    <description>
    A flaw was found in the "Leaf and Chain" OCSP policy implementation in JSS' CryptoManager versions after 4.4.6, 4.5.3, 4.6.0, where it implicitly trusted the root certificate of a certificate chain. Applications using this policy may not properly verify the chain and could be vulnerable to attacks such as Man in the Middle.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-14823/">CVE-2019-14823 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14823">CVE-2019-14823 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826663" comment="jss-4.4.6-3.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826664" comment="jss-javadoc-4.4.6-3.el7_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914824" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14824</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14824" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14824" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14824" ref_url="https://www.suse.com/security/cve/CVE-2019-14824" source="SUSE CVE"/>
    <description>
    A flaw was found in the 'deref' plugin of 389-ds-base where it could use the 'search' permission to display attribute values. In some configurations, this could allow an authenticated attacker to view private attributes, such as password hashes.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-14824/">CVE-2019-14824 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14824">CVE-2019-14824 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826782" comment="389-ds-base-1.3.9.1-12.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826783" comment="389-ds-base-devel-1.3.9.1-12.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826784" comment="389-ds-base-libs-1.3.9.1-12.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826785" comment="389-ds-base-snmp-1.3.9.1-12.el7_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914834" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14834</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14834" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14834" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14834" ref_url="https://www.suse.com/security/cve/CVE-2019-14834" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0419-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008224.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2669-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q67RZVOGYUXDBDWXHU3XGAS736VQNOM4/#Q67RZVOGYUXDBDWXHU3XGAS736VQNOM4" source="SUSE-SU"/>
    <description>
    A vulnerability was found in dnsmasq before version 2.81, where the memory leak allows remote attackers to cause a denial of service (memory consumption) via vectors involving DHCP response creation.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14834/">CVE-2019-14834 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14834">CVE-2019-14834 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1154849">SUSE bug 1154849</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828238" comment="dnsmasq-2.76-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828239" comment="dnsmasq-utils-2.76-16.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14835</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14835" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14835" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14835" ref_url="https://www.suse.com/security/cve/CVE-2019-14835" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2572-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006399.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4CEC37F4Q2EPQFGCPFIWQY5MJOYSR3WW/#4CEC37F4Q2EPQFGCPFIWQY5MJOYSR3WW" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VOAHRKDA7W6T2DPZV7YKHMSWYSGQCJCW/#VOAHRKDA7W6T2DPZV7YKHMSWYSGQCJCW" source="SUSE-SU"/>
    <description>
    A buffer overflow flaw was found, in versions from 2.6.34 to 5.2.x, in the way Linux kernel's vhost functionality that translates virtqueue buffers to IOVs, logged the buffer descriptors during migration. A privileged guest user able to pass descriptors with invalid length to the host when migration is underway, could use this flaw to increase their privileges on the host.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14835/">CVE-2019-14835 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14835">CVE-2019-14835 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1150112">SUSE bug 1150112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151021">SUSE bug 1151021</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826631" comment="bpftool-3.10.0-1062.1.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826632" comment="kernel-3.10.0-1062.1.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826633" comment="kernel-abi-whitelists-3.10.0-1062.1.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826634" comment="kernel-debug-3.10.0-1062.1.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826637" comment="kernel-doc-3.10.0-1062.1.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826638" comment="kernel-headers-3.10.0-1062.1.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826639" comment="kernel-tools-3.10.0-1062.1.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826640" comment="kernel-tools-libs-3.10.0-1062.1.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826642" comment="perf-3.10.0-1062.1.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826643" comment="python-perf-3.10.0-1062.1.2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914850" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14850</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14850" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14850" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14850" ref_url="https://www.suse.com/security/cve/CVE-2019-14850" source="SUSE CVE"/>
    <description>
    A denial of service vulnerability was discovered in nbdkit 1.12.7, 1.14.1 and 1.15.1. An attacker could connect to the nbdkit service and cause it to perform a large amount of work in initializing backend plugins, by simply opening a connection to the service. This vulnerability could cause resource consumption and degradation of service in nbdkit, depending on the plugins configured on the server-side.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-14850/">CVE-2019-14850 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14850">CVE-2019-14850 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827827" comment="nbdkit-1.8.0-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827828" comment="nbdkit-basic-plugins-1.8.0-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827829" comment="nbdkit-devel-1.8.0-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827830" comment="nbdkit-example-plugins-1.8.0-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827831" comment="nbdkit-plugin-python-common-1.8.0-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827832" comment="nbdkit-plugin-python2-1.8.0-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827833" comment="nbdkit-plugin-vddk-1.8.0-3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914857" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14857</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14857" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14857" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14857" ref_url="https://www.suse.com/security/cve/CVE-2019-14857" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2934-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023659.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2499-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XSQ4PV6MSRCTP37A4LYZR5PQVS7FRJPW/#XSQ4PV6MSRCTP37A4LYZR5PQVS7FRJPW" source="SUSE-SU"/>
    <description>
    A flaw was found in mod_auth_openidc before version 2.4.0.1. An open redirect issue exists in URLs with trailing slashes similar to CVE-2019-3877 in mod_auth_mellon.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-01-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14857/">CVE-2019-14857 at SUSE</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14857">CVE-2019-14857 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1153666">SUSE bug 1153666</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828319" comment="mod_auth_openidc-1.8.8-7.el7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914866" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14866</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14866" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14866" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14866" ref_url="https://www.suse.com/security/cve/CVE-2019-14866" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:25-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:53-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006178.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2593-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S6XCUOVCXNQ6F2SKISA7LWT5WFS5W7MT/#S6XCUOVCXNQ6F2SKISA7LWT5WFS5W7MT" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2596-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GAJR4QB4A2YQ5MYPKKBZWQZEHXTFQ2KX/#GAJR4QB4A2YQ5MYPKKBZWQZEHXTFQ2KX" source="SUSE-SU"/>
    <description>
    In all versions of cpio before 2.13 does not properly validate input files when generating TAR archives. When cpio is used to create TAR archives from paths an attacker can write to, the resulting archive may contain files with permissions the attacker did not have or in paths he did not have access to. Extracting those archives from a high-privilege user without carefully reviewing them may lead to the compromise of the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14866/">CVE-2019-14866 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14866">CVE-2019-14866 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1155199">SUSE bug 1155199</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828265" comment="cpio-2.11-28.el7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914867" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14867</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14867" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14867" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14867" ref_url="https://www.suse.com/security/cve/CVE-2019-14867" source="SUSE CVE"/>
    <description>
    A flaw was found in IPA, all 4.6.x versions before 4.6.7, all 4.7.x versions before 4.7.4 and all 4.8.x versions before 4.8.3, in the way the internal function ber_scanf() was used in some components of the IPA server, which parsed kerberos key data. An unauthenticated attacker who could trigger parsing of the krb principal key could cause the IPA server to crash or in some conditions, cause arbitrary code to be executed on the server hosting the IPA server.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-14867/">CVE-2019-14867 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14867">CVE-2019-14867 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826892" comment="ipa-client-4.6.5-11.el7_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826893" comment="ipa-client-common-4.6.5-11.el7_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826894" comment="ipa-common-4.6.5-11.el7_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826895" comment="ipa-python-compat-4.6.5-11.el7_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826896" comment="ipa-server-4.6.5-11.el7_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826897" comment="ipa-server-common-4.6.5-11.el7_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826898" comment="ipa-server-dns-4.6.5-11.el7_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826899" comment="ipa-server-trust-ad-4.6.5-11.el7_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826900" comment="python2-ipaclient-4.6.5-11.el7_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826901" comment="python2-ipalib-4.6.5-11.el7_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826902" comment="python2-ipaserver-4.6.5-11.el7_7.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914868" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14868</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14868" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14868" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14868" ref_url="https://www.suse.com/security/cve/CVE-2019-14868" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036291.html" source="SUSE-SU"/>
    <description>
    In ksh version 20120801, a flaw was found in the way it evaluates certain environment variables. An attacker could use this flaw to override or bypass environment restrictions to execute shell commands. Services and applications that allow remote unauthenticated attackers to provide one of those environment variables could allow them to exploit this issue remotely.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-08"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14868/">CVE-2019-14868 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14868">CVE-2019-14868 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1160796">SUSE bug 1160796</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826917" comment="ksh-20120801-140.el7_7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914869" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14869</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14869" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14869" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14869" ref_url="https://www.suse.com/security/cve/CVE-2019-14869" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2981-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006145.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2534-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/A7OOQVAVZWGJV7SRTPEB56IEUKCK7PN2/#A7OOQVAVZWGJV7SRTPEB56IEUKCK7PN2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2535-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DEDVC2T3PCK37MHLMBUHMO35WKQT4U5J/#DEDVC2T3PCK37MHLMBUHMO35WKQT4U5J" source="SUSE-SU"/>
    <description>
    A flaw was found in all versions of ghostscript 9.x before 9.50, where the `.charkeys` procedure, where it did not properly secure its privileged calls, enabling scripts to bypass `-dSAFER` restrictions. An attacker could abuse this flaw by creating a specially crafted PostScript file that could escalate privileges within the Ghostscript and access files outside of restricted areas or execute commands.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14869/">CVE-2019-14869 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14869">CVE-2019-14869 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1156275">SUSE bug 1156275</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826759" comment="ghostscript-9.25-2.el7_7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826760" comment="ghostscript-cups-9.25-2.el7_7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826761" comment="ghostscript-doc-9.25-2.el7_7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826762" comment="ghostscript-gtk-9.25-2.el7_7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826763" comment="libgs-9.25-2.el7_7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826764" comment="libgs-devel-9.25-2.el7_7.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914895" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14895</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14895" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14895" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14895" ref_url="https://www.suse.com/security/cve/CVE-2019-14895" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2492-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007359.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007365.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ETQRKHU2REMA5EANI2CSGTNBUHZHYU3W/#ETQRKHU2REMA5EANI2CSGTNBUHZHYU3W" source="SUSE-SU"/>
    <description>
    A heap-based buffer overflow was discovered in the Linux kernel, all versions 3.x.x and 4.x.x before 4.18.0, in Marvell WiFi chip driver. The flaw could occur when the station attempts a connection negotiation during the handling of the remote devices country settings. This could allow the remote device to cause a denial of service (system crash) or possibly execute arbitrary code.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14895/">CVE-2019-14895 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14895">CVE-2019-14895 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1157042">SUSE bug 1157042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157158">SUSE bug 1157158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173100">SUSE bug 1173100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173660">SUSE bug 1173660</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826879" comment="bpftool-3.10.0-1062.12.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826880" comment="kernel-3.10.0-1062.12.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826881" comment="kernel-abi-whitelists-3.10.0-1062.12.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826882" comment="kernel-debug-3.10.0-1062.12.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826885" comment="kernel-doc-3.10.0-1062.12.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826886" comment="kernel-headers-3.10.0-1062.12.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826887" comment="kernel-tools-3.10.0-1062.12.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826888" comment="kernel-tools-libs-3.10.0-1062.12.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826890" comment="perf-3.10.0-1062.12.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826891" comment="python-perf-3.10.0-1062.12.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914898" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14898</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14898" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14898" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14898" ref_url="https://www.suse.com/security/cve/CVE-2019-14898" source="SUSE CVE"/>
    <description>
    The fix for CVE-2019-11599, affecting the Linux kernel before 5.0.10 was not complete. A local user could use this flaw to obtain sensitive information, cause a denial of service, or possibly have other unspecified impacts by triggering a race condition with mmget_not_zero or get_task_mm calls.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-14898/">CVE-2019-14898 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14898">CVE-2019-14898 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1157905">SUSE bug 1157905</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826879" comment="bpftool-3.10.0-1062.12.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826880" comment="kernel-3.10.0-1062.12.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826881" comment="kernel-abi-whitelists-3.10.0-1062.12.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826882" comment="kernel-debug-3.10.0-1062.12.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826885" comment="kernel-doc-3.10.0-1062.12.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826886" comment="kernel-headers-3.10.0-1062.12.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826887" comment="kernel-tools-3.10.0-1062.12.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826888" comment="kernel-tools-libs-3.10.0-1062.12.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826890" comment="perf-3.10.0-1062.12.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826891" comment="python-perf-3.10.0-1062.12.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914901" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14901</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14901" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14901" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14901" ref_url="https://www.suse.com/security/cve/CVE-2019-14901" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2492-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007365.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ETQRKHU2REMA5EANI2CSGTNBUHZHYU3W/#ETQRKHU2REMA5EANI2CSGTNBUHZHYU3W" source="SUSE-SU"/>
    <description>
    A heap overflow flaw was found in the Linux kernel, all versions 3.x.x and 4.x.x before 4.18.0, in Marvell WiFi chip driver. The vulnerability allows a remote attacker to cause a system crash, resulting in a denial of service, or execute arbitrary code. The highest threat with this vulnerability is with the availability of the system. If code execution occurs, the code will run with the permissions of root. This will affect both confidentiality and integrity of files on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14901/">CVE-2019-14901 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14901">CVE-2019-14901 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1157042">SUSE bug 1157042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173661">SUSE bug 1173661</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826879" comment="bpftool-3.10.0-1062.12.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826880" comment="kernel-3.10.0-1062.12.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826881" comment="kernel-abi-whitelists-3.10.0-1062.12.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826882" comment="kernel-debug-3.10.0-1062.12.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826885" comment="kernel-doc-3.10.0-1062.12.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826886" comment="kernel-headers-3.10.0-1062.12.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826887" comment="kernel-tools-3.10.0-1062.12.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826888" comment="kernel-tools-libs-3.10.0-1062.12.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826890" comment="perf-3.10.0-1062.12.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826891" comment="python-perf-3.10.0-1062.12.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914906" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14906</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14906" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14906" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14906" ref_url="https://www.suse.com/security/cve/CVE-2019-14906" source="SUSE CVE"/>
    <description>
    A flaw was found with the RHSA-2019:3950 erratum, where it did not fix the CVE-2019-13616 SDL vulnerability. This issue only affects Red Hat SDL packages, SDL versions through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer overflow flaw while copying an existing surface into a new optimized one, due to a lack of validation while loading a BMP image, is possible. An application that uses SDL to parse untrusted input files may be vulnerable to this flaw, which could allow an attacker to make the application crash or execute code.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-14906/">CVE-2019-14906 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14906">CVE-2019-14906 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826786" comment="SDL-1.2.15-15.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826787" comment="SDL-devel-1.2.15-15.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826788" comment="SDL-static-1.2.15-15.el7_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914907" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14907</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14907" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14907" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14907" ref_url="https://www.suse.com/security/cve/CVE-2019-14907" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006391.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006401.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2673-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007440.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0122-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OSS2CK6VSLL6IEQRPPMP2VPFDOZ7PYGK/" source="SUSE-SU"/>
    <description>
    All samba versions 4.9.x before 4.9.18, 4.10.x before 4.10.12 and 4.11.x before 4.11.5 have an issue where if it is set with "log level = 3" (or above) then the string obtained from the client, after a failed character conversion, is printed. Such strings can be provided during the NTLMSSP authentication exchange. In the Samba AD DC in particular, this may cause a long-lived process(such as the RPC server) to terminate. (In the file server case, the most likely target, smbd, operates as process-per-client and so a crash there is harmless).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14907/">CVE-2019-14907 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14907">CVE-2019-14907 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1160888">SUSE bug 1160888</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828364" comment="ctdb-4.10.16-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828365" comment="ctdb-tests-4.10.16-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828366" comment="libsmbclient-4.10.16-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828367" comment="libsmbclient-devel-4.10.16-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828368" comment="libwbclient-4.10.16-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828369" comment="libwbclient-devel-4.10.16-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828370" comment="samba-4.10.16-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828371" comment="samba-client-4.10.16-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828372" comment="samba-client-libs-4.10.16-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828373" comment="samba-common-4.10.16-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828374" comment="samba-common-libs-4.10.16-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828375" comment="samba-common-tools-4.10.16-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828376" comment="samba-dc-4.10.16-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828377" comment="samba-dc-libs-4.10.16-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828378" comment="samba-devel-4.10.16-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828379" comment="samba-krb5-printing-4.10.16-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828380" comment="samba-libs-4.10.16-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828381" comment="samba-pidl-4.10.16-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828382" comment="samba-python-4.10.16-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828383" comment="samba-python-test-4.10.16-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828384" comment="samba-test-4.10.16-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828385" comment="samba-test-libs-4.10.16-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828386" comment="samba-vfs-glusterfs-4.10.16-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828387" comment="samba-winbind-4.10.16-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828388" comment="samba-winbind-clients-4.10.16-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828389" comment="samba-winbind-krb5-locator-4.10.16-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828390" comment="samba-winbind-modules-4.10.16-5.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914973" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14973</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14973" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14973" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14973" ref_url="https://www.suse.com/security/cve/CVE-2019-14973" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007480.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1561-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T4EXJABMPMN6UJVDGJ3YM4HVDIRMDCEJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1840-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OVMZRAMTY6Q4MZMMBZQV6ARN5G262VRR/" source="SUSE-SU"/>
    <description>
    _TIFFCheckMalloc and _TIFFCheckRealloc in tif_aux.c in LibTIFF through 4.0.10 mishandle Integer Overflow checks because they rely on compiler behavior that is undefined by the applicable C standards. This can, for example, lead to an application crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14973/">CVE-2019-14973 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14973">CVE-2019-14973 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1146608">SUSE bug 1146608</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828257" comment="libtiff-4.0.3-35.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828258" comment="libtiff-devel-4.0.3-35.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828259" comment="libtiff-static-4.0.3-35.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828260" comment="libtiff-tools-4.0.3-35.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914980" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14980</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14980" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14980" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14980" ref_url="https://www.suse.com/security/cve/CVE-2019-14980" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2785-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006088.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2515-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HKLSLL4IX54TYZVRJUYXN4DW53SHUXMP/#HKLSLL4IX54TYZVRJUYXN4DW53SHUXMP" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2519-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GGD5GT3XH47ZWIXPD27DWBTDQARZCQQU/#GGD5GT3XH47ZWIXPD27DWBTDQARZCQQU" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.x before 7.0.8-42 and 6.x before 6.9.10-42, there is a use after free vulnerability in the UnmapBlob function that allows an attacker to cause a denial of service by sending a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14980/">CVE-2019-14980 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14980">CVE-2019-14980 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1146068">SUSE bug 1146068</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827880" comment="ImageMagick-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827881" comment="ImageMagick-c++-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827882" comment="ImageMagick-c++-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827883" comment="ImageMagick-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827884" comment="ImageMagick-doc-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827885" comment="ImageMagick-perl-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827886" comment="autotrace-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827887" comment="autotrace-devel-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827888" comment="emacs-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827889" comment="emacs-common-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827890" comment="emacs-el-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827891" comment="emacs-filesystem-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827892" comment="emacs-nox-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827893" comment="emacs-terminal-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827894" comment="inkscape-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827895" comment="inkscape-docs-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827896" comment="inkscape-view-0.92.2-3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914981" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14981</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14981" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14981" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14981" ref_url="https://www.suse.com/security/cve/CVE-2019-14981" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006088.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2515-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HKLSLL4IX54TYZVRJUYXN4DW53SHUXMP/#HKLSLL4IX54TYZVRJUYXN4DW53SHUXMP" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2519-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GGD5GT3XH47ZWIXPD27DWBTDQARZCQQU/#GGD5GT3XH47ZWIXPD27DWBTDQARZCQQU" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.x before 7.0.8-41 and 6.x before 6.9.10-41, there is a divide-by-zero vulnerability in the MeanShiftImage function. It allows an attacker to cause a denial of service by sending a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14981/">CVE-2019-14981 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14981">CVE-2019-14981 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1146065">SUSE bug 1146065</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827880" comment="ImageMagick-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827881" comment="ImageMagick-c++-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827882" comment="ImageMagick-c++-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827883" comment="ImageMagick-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827884" comment="ImageMagick-doc-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827885" comment="ImageMagick-perl-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827886" comment="autotrace-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827887" comment="autotrace-devel-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827888" comment="emacs-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827889" comment="emacs-common-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827890" comment="emacs-el-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827891" comment="emacs-filesystem-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827892" comment="emacs-nox-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827893" comment="emacs-terminal-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827894" comment="inkscape-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827895" comment="inkscape-docs-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827896" comment="inkscape-view-0.92.2-3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15139</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15139" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15139" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15139" ref_url="https://www.suse.com/security/cve/CVE-2019-15139" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2785-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006088.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2515-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HKLSLL4IX54TYZVRJUYXN4DW53SHUXMP/#HKLSLL4IX54TYZVRJUYXN4DW53SHUXMP" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2519-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GGD5GT3XH47ZWIXPD27DWBTDQARZCQQU/#GGD5GT3XH47ZWIXPD27DWBTDQARZCQQU" source="SUSE-SU"/>
    <description>
    The XWD image (X Window System window dumping file) parsing component in ImageMagick 7.0.8-41 Q16 allows attackers to cause a denial-of-service (application crash resulting from an out-of-bounds Read) in ReadXWDImage in coders/xwd.c by crafting a corrupted XWD image file, a different vulnerability than CVE-2019-11472.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15139/">CVE-2019-15139 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15139">CVE-2019-15139 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1146213">SUSE bug 1146213</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827880" comment="ImageMagick-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827881" comment="ImageMagick-c++-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827882" comment="ImageMagick-c++-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827883" comment="ImageMagick-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827884" comment="ImageMagick-doc-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827885" comment="ImageMagick-perl-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827886" comment="autotrace-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827887" comment="autotrace-devel-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827888" comment="emacs-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827889" comment="emacs-common-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827890" comment="emacs-el-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827891" comment="emacs-filesystem-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827892" comment="emacs-nox-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827893" comment="emacs-terminal-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827894" comment="inkscape-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827895" comment="inkscape-docs-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827896" comment="inkscape-view-0.92.2-3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915140" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15140</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15140" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15140" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15140" ref_url="https://www.suse.com/security/cve/CVE-2019-15140" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2785-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006088.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2515-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HKLSLL4IX54TYZVRJUYXN4DW53SHUXMP/#HKLSLL4IX54TYZVRJUYXN4DW53SHUXMP" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2519-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GGD5GT3XH47ZWIXPD27DWBTDQARZCQQU/#GGD5GT3XH47ZWIXPD27DWBTDQARZCQQU" source="SUSE-SU"/>
    <description>
    coders/mat.c in ImageMagick 7.0.8-43 Q16 allows remote attackers to cause a denial of service (use-after-free and application crash) or possibly have unspecified other impact by crafting a Matlab image file that is mishandled in ReadImage in MagickCore/constitute.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15140/">CVE-2019-15140 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15140">CVE-2019-15140 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1146212">SUSE bug 1146212</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827880" comment="ImageMagick-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827881" comment="ImageMagick-c++-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827882" comment="ImageMagick-c++-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827883" comment="ImageMagick-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827884" comment="ImageMagick-doc-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827885" comment="ImageMagick-perl-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827886" comment="autotrace-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827887" comment="autotrace-devel-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827888" comment="emacs-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827889" comment="emacs-common-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827890" comment="emacs-el-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827891" comment="emacs-filesystem-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827892" comment="emacs-nox-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827893" comment="emacs-terminal-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827894" comment="inkscape-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827895" comment="inkscape-docs-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827896" comment="inkscape-view-0.92.2-3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915141" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15141</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15141" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15141" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15141" ref_url="https://www.suse.com/security/cve/CVE-2019-15141" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2785-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006088.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2515-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HKLSLL4IX54TYZVRJUYXN4DW53SHUXMP/#HKLSLL4IX54TYZVRJUYXN4DW53SHUXMP" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2519-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GGD5GT3XH47ZWIXPD27DWBTDQARZCQQU/#GGD5GT3XH47ZWIXPD27DWBTDQARZCQQU" source="SUSE-SU"/>
    <description>
    WriteTIFFImage in coders/tiff.c in ImageMagick 7.0.8-43 Q16 allows attackers to cause a denial-of-service (application crash resulting from a heap-based buffer over-read) via a crafted TIFF image file, related to TIFFRewriteDirectory, TIFFWriteDirectory, TIFFWriteDirectorySec, and TIFFWriteDirectoryTagColormap in tif_dirwrite.c of LibTIFF. NOTE: this occurs because of an incomplete fix for CVE-2019-11597.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15141/">CVE-2019-15141 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15141">CVE-2019-15141 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1146211">SUSE bug 1146211</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827880" comment="ImageMagick-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827881" comment="ImageMagick-c++-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827882" comment="ImageMagick-c++-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827883" comment="ImageMagick-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827884" comment="ImageMagick-doc-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827885" comment="ImageMagick-perl-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827886" comment="autotrace-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827887" comment="autotrace-devel-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827888" comment="emacs-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827889" comment="emacs-common-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827890" comment="emacs-el-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827891" comment="emacs-filesystem-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827892" comment="emacs-nox-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827893" comment="emacs-terminal-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827894" comment="inkscape-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827895" comment="inkscape-docs-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827896" comment="inkscape-view-0.92.2-3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915217" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15217</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15217" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15217" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15217" ref_url="https://www.suse.com/security/cve/CVE-2019-15217" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4CEC37F4Q2EPQFGCPFIWQY5MJOYSR3WW/#4CEC37F4Q2EPQFGCPFIWQY5MJOYSR3WW" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VOAHRKDA7W6T2DPZV7YKHMSWYSGQCJCW/#VOAHRKDA7W6T2DPZV7YKHMSWYSGQCJCW" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.2.3. There is a NULL pointer dereference caused by a malicious USB device in the drivers/media/usb/zr364xx/zr364xx.c driver.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15217/">CVE-2019-15217 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15217">CVE-2019-15217 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146547">SUSE bug 1146547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158381">SUSE bug 1158381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158834">SUSE bug 1158834</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828543" comment="bpftool-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828544" comment="kernel-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828545" comment="kernel-abi-whitelists-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828546" comment="kernel-debug-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828549" comment="kernel-doc-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828550" comment="kernel-headers-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828551" comment="kernel-tools-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828552" comment="kernel-tools-libs-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828554" comment="perf-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828555" comment="python-perf-3.10.0-1160.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915239" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15239</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15239" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15239" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15239" ref_url="https://www.suse.com/security/cve/CVE-2019-15239" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006226.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006244.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4CEC37F4Q2EPQFGCPFIWQY5MJOYSR3WW/#4CEC37F4Q2EPQFGCPFIWQY5MJOYSR3WW" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VOAHRKDA7W6T2DPZV7YKHMSWYSGQCJCW/#VOAHRKDA7W6T2DPZV7YKHMSWYSGQCJCW" source="SUSE-SU"/>
    <description>
    In the Linux kernel, a certain net/ipv4/tcp_output.c change, which was properly incorporated into 4.16.12, was incorrectly backported to the earlier longterm kernels, introducing a new vulnerability that was potentially more severe than the issue that was intended to be fixed by backporting. Specifically, by adding to a write queue between disconnection and re-connection, a local attacker can trigger multiple use-after-free conditions. This can result in a kernel crash, or potentially in privilege escalation. NOTE: this affects (for example) Linux distributions that use 4.9.x longterm kernels before 4.9.190 or 4.14.x longterm kernels before 4.14.139.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15239/">CVE-2019-15239 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15239">CVE-2019-15239 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1146589">SUSE bug 1146589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156317">SUSE bug 1156317</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826769" comment="bpftool-3.10.0-1062.7.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826770" comment="kernel-3.10.0-1062.7.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826771" comment="kernel-abi-whitelists-3.10.0-1062.7.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826772" comment="kernel-debug-3.10.0-1062.7.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826775" comment="kernel-doc-3.10.0-1062.7.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826776" comment="kernel-headers-3.10.0-1062.7.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826777" comment="kernel-tools-3.10.0-1062.7.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826778" comment="kernel-tools-libs-3.10.0-1062.7.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826780" comment="perf-3.10.0-1062.7.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826781" comment="python-perf-3.10.0-1062.7.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20191559" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-1559</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-1559" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1559" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-1559" ref_url="https://www.suse.com/security/cve/CVE-2019-1559" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0572-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005508.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005586.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005602.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1076-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/X3J42WSGRSXTXLUES5HF6USZUDFK6EUH/#X3J42WSGRSXTXLUES5HF6USZUDFK6EUH" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1105-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BABYTFKK6BZ5GQXJED77GCUO2MDMDYO3/#BABYTFKK6BZ5GQXJED77GCUO2MDMDYO3" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1173-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2BPBVCCEQB7DEYUO5NU5DN7KHH3PXUAL/#2BPBVCCEQB7DEYUO5NU5DN7KHH3PXUAL" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1175-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XZWNOOAJJQHEJI4IXEME4MF3GP7QKTA7/#XZWNOOAJJQHEJI4IXEME4MF3GP7QKTA7" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1432-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PJYXWE62KKD5ASTWGRAR5B66BQCUHX6D/#PJYXWE62KKD5ASTWGRAR5B66BQCUHX6D" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1637-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DQ54CGEZNQNNINBRR7CXEBKX5H2VF56B/#DQ54CGEZNQNNINBRR7CXEBKX5H2VF56B" source="SUSE-SU"/>
    <description>
    If an application encounters a fatal protocol error and then calls SSL_shutdown() twice (once to send a close_notify, and once to receive one) then OpenSSL can respond differently to the calling application if a 0 byte record is received with invalid padding compared to if a 0 byte record is received with an invalid MAC. If the application then behaves differently based on that in a way that is detectable to the remote peer, then this amounts to a padding oracle that could be used to decrypt data. In order for this to be exploitable "non-stitched" ciphersuites must be in use. Stitched ciphersuites are optimised implementations of certain commonly used ciphersuites. Also the application must call SSL_shutdown() twice even if a protocol error has occurred (applications should not do this but some do anyway). Fixed in OpenSSL 1.0.2r (Affected 1.0.2-1.0.2q).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1559/">CVE-2019-1559 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1559">CVE-2019-1559 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1127080">SUSE bug 1127080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130039">SUSE bug 1130039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141798">SUSE bug 1141798</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826561" comment="openssl-1.0.2k-19.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826562" comment="openssl-devel-1.0.2k-19.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826563" comment="openssl-libs-1.0.2k-19.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826564" comment="openssl-perl-1.0.2k-19.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826565" comment="openssl-static-1.0.2k-19.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915605" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15605</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15605" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15605" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15605" ref_url="https://www.suse.com/security/cve/CVE-2019-15605" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0427-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006506.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006508.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0454-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006526.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0488-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006531.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0293-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LLBX73ZML2HFTXADVLS3JFSWUPDITBSK/" source="SUSE-SU"/>
    <description>
    HTTP request smuggling in Node.js 10, 12, and 13 causes malicious payload delivery when transfer-encoding is malformed
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-15605/">CVE-2019-15605 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15605">CVE-2019-15605 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1163102">SUSE bug 1163102</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826927" comment="http-parser-2.7.1-8.el7_7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826928" comment="http-parser-devel-2.7.1-8.el7_7.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915690" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15690</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15690" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15690" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15690" ref_url="https://www.suse.com/security/cve/CVE-2019-15690" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1164-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006773.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006774.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0624-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/X6PQATT2HQIOVLXBCKXH2SSVO2ZT5TCP/" source="SUSE-SU"/>
    <description>
    LibVNCServer 0.9.12 release and earlier contains heap buffer overflow vulnerability within the HandleCursorShape() function in libvncclient/cursor.c. An attacker sends cursor shapes with specially crafted dimensions, which can result in remote code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15690/">CVE-2019-15690 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-15690">CVE-2019-15690 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1160471">SUSE bug 1160471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170441">SUSE bug 1170441</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826965" comment="libvncserver-0.9.9-14.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826966" comment="libvncserver-devel-0.9.9-14.el7_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915691" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15691</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15691" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15691" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15691" ref_url="https://www.suse.com/security/cve/CVE-2019-15691" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006359.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006358.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006418.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0087-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JT6NEMBSZCMVNVGETAKBKJSQLQK4EMXV/" source="SUSE-SU"/>
    <description>
    TigerVNC version prior to 1.10.1 is vulnerable to stack use-after-return, which occurs due to incorrect usage of stack memory in ZRLEDecoder. If decoding routine would throw an exception, ZRLEDecoder may try to access stack variable, which has been already freed during the process of stack unwinding. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15691/">CVE-2019-15691 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15691">CVE-2019-15691 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1159856">SUSE bug 1159856</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828226" comment="tigervnc-1.8.0-21.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828227" comment="tigervnc-icons-1.8.0-21.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828228" comment="tigervnc-license-1.8.0-21.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828229" comment="tigervnc-server-1.8.0-21.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828230" comment="tigervnc-server-applet-1.8.0-21.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828231" comment="tigervnc-server-minimal-1.8.0-21.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828232" comment="tigervnc-server-module-1.8.0-21.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915692" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15692</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15692" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15692" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15692" ref_url="https://www.suse.com/security/cve/CVE-2019-15692" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006359.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006358.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006418.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0087-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JT6NEMBSZCMVNVGETAKBKJSQLQK4EMXV/" source="SUSE-SU"/>
    <description>
    TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow. Vulnerability could be triggered from CopyRectDecoder due to incorrect value checks. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15692/">CVE-2019-15692 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15692">CVE-2019-15692 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1160250">SUSE bug 1160250</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828226" comment="tigervnc-1.8.0-21.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828227" comment="tigervnc-icons-1.8.0-21.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828228" comment="tigervnc-license-1.8.0-21.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828229" comment="tigervnc-server-1.8.0-21.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828230" comment="tigervnc-server-applet-1.8.0-21.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828231" comment="tigervnc-server-minimal-1.8.0-21.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828232" comment="tigervnc-server-module-1.8.0-21.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915693" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15693</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15693" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15693" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15693" ref_url="https://www.suse.com/security/cve/CVE-2019-15693" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006359.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006358.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006418.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0087-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JT6NEMBSZCMVNVGETAKBKJSQLQK4EMXV/" source="SUSE-SU"/>
    <description>
    TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which occurs in TightDecoder::FilterGradient. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15693/">CVE-2019-15693 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15693">CVE-2019-15693 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1159858">SUSE bug 1159858</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828226" comment="tigervnc-1.8.0-21.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828227" comment="tigervnc-icons-1.8.0-21.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828228" comment="tigervnc-license-1.8.0-21.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828229" comment="tigervnc-server-1.8.0-21.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828230" comment="tigervnc-server-applet-1.8.0-21.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828231" comment="tigervnc-server-minimal-1.8.0-21.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828232" comment="tigervnc-server-module-1.8.0-21.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915694" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15694</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15694" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15694" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15694" ref_url="https://www.suse.com/security/cve/CVE-2019-15694" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006359.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006358.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006418.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0087-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JT6NEMBSZCMVNVGETAKBKJSQLQK4EMXV/" source="SUSE-SU"/>
    <description>
    TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15694/">CVE-2019-15694 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15694">CVE-2019-15694 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1160251">SUSE bug 1160251</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828226" comment="tigervnc-1.8.0-21.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828227" comment="tigervnc-icons-1.8.0-21.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828228" comment="tigervnc-license-1.8.0-21.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828229" comment="tigervnc-server-1.8.0-21.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828230" comment="tigervnc-server-applet-1.8.0-21.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828231" comment="tigervnc-server-minimal-1.8.0-21.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828232" comment="tigervnc-server-module-1.8.0-21.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915695" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15695</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15695" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15695" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15695" ref_url="https://www.suse.com/security/cve/CVE-2019-15695" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006359.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006358.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006418.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0087-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JT6NEMBSZCMVNVGETAKBKJSQLQK4EMXV/" source="SUSE-SU"/>
    <description>
    TigerVNC version prior to 1.10.1 is vulnerable to stack buffer overflow, which could be triggered from CMsgReader::readSetCursor. This vulnerability occurs due to insufficient sanitization of PixelFormat. Since remote attacker can choose offset from start of the buffer to start writing his values, exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15695/">CVE-2019-15695 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15695">CVE-2019-15695 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1159860">SUSE bug 1159860</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828226" comment="tigervnc-1.8.0-21.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828227" comment="tigervnc-icons-1.8.0-21.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828228" comment="tigervnc-license-1.8.0-21.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828229" comment="tigervnc-server-1.8.0-21.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828230" comment="tigervnc-server-applet-1.8.0-21.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828231" comment="tigervnc-server-minimal-1.8.0-21.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828232" comment="tigervnc-server-module-1.8.0-21.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915807" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15807</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15807" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15807" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15807" ref_url="https://www.suse.com/security/cve/CVE-2019-15807" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 5.1.13, there is a memory leak in drivers/scsi/libsas/sas_expander.c when SAS expander discovery fails. This will cause a BUG and denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15807/">CVE-2019-15807 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15807">CVE-2019-15807 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1148938">SUSE bug 1148938</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828543" comment="bpftool-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828544" comment="kernel-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828545" comment="kernel-abi-whitelists-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828546" comment="kernel-debug-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828549" comment="kernel-doc-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828550" comment="kernel-headers-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828551" comment="kernel-tools-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828552" comment="kernel-tools-libs-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828554" comment="perf-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828555" comment="python-perf-3.10.0-1160.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915903" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15903</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15903" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15903" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15903" ref_url="https://www.suse.com/security/cve/CVE-2019-15903" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:25-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2871-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192871-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2204-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5CGA46HDWG2655GNXOETWDGQHCIJSDEK/#5CGA46HDWG2655GNXOETWDGQHCIJSDEK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2205-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/I7RUMUOQJYGFBCGNSCG4U4EJFLVOGMVS/#I7RUMUOQJYGFBCGNSCG4U4EJFLVOGMVS" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2420-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3NWTA6MINHDECNVPEESVOI4YS5GWLB2W/#3NWTA6MINHDECNVPEESVOI4YS5GWLB2W" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2424-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PWAZQUNDL6EYARWSXF52VFRXI6QGOKQ5/#PWAZQUNDL6EYARWSXF52VFRXI6QGOKQ5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2425-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PUHPSOYGL3R2UY6Q72GDJBKT62EGZHYF/#PUHPSOYGL3R2UY6Q72GDJBKT62EGZHYF" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2447-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QNJAWHUQKXHQBG3I7GI4ACW3CYHDJAHM/#QNJAWHUQKXHQBG3I7GI4ACW3CYHDJAHM" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2451-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/V6ZXQOV37FDUBMBAJGH2RCLCL55J6IYA/#V6ZXQOV37FDUBMBAJGH2RCLCL55J6IYA" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2452-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MOTGZDQMJE6HU6RXRSOTDTGAHLJOOFJB/#MOTGZDQMJE6HU6RXRSOTDTGAHLJOOFJB" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2459-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LFFTUGZUT6RBMXE667KP6UIOCTQIRDNS/#LFFTUGZUT6RBMXE667KP6UIOCTQIRDNS" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2464-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ISVN7BSIYJ7GDXZNJMHOFE6I6LYX7RUX/#ISVN7BSIYJ7GDXZNJMHOFE6I6LYX7RUX" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0010-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NHWBJKQPSZZUXFRQCXMMXQYJB6ONVGNX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0086-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SRKGGFVSV7DDWCMAOSO6E3F66U2CF5XR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    In libexpat before 2.2.8, crafted XML input could fool the parser into changing from DTD parsing to document parsing too early; a consecutive call to XML_GetCurrentLineNumber (or XML_GetCurrentColumnNumber) then resulted in a heap-based buffer over-read.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-06-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15903/">CVE-2019-15903 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15903">CVE-2019-15903 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1149429">SUSE bug 1149429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154738">SUSE bug 1154738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154806">SUSE bug 1154806</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828306" comment="expat-2.1.0-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828307" comment="expat-devel-2.1.0-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828308" comment="expat-static-2.1.0-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826707" comment="thunderbird-68.2.0-1.el7_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915916" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15916</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15916" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15916" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15916" ref_url="https://www.suse.com/security/cve/CVE-2019-15916" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006770.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ETQRKHU2REMA5EANI2CSGTNBUHZHYU3W/#ETQRKHU2REMA5EANI2CSGTNBUHZHYU3W" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.0.1. There is a memory leak in register_queue_kobjects() in net/core/net-sysfs.c, which will cause denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15916/">CVE-2019-15916 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15916">CVE-2019-15916 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1149448">SUSE bug 1149448</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826993" comment="bpftool-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826994" comment="kernel-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826995" comment="kernel-abi-whitelists-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826996" comment="kernel-debug-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826999" comment="kernel-doc-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827000" comment="kernel-headers-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827001" comment="kernel-tools-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827002" comment="kernel-tools-libs-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827004" comment="perf-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827005" comment="python-perf-3.10.0-1127.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915917" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15917</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15917" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15917" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15917" ref_url="https://www.suse.com/security/cve/CVE-2019-15917" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006225.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006228.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006236.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4CEC37F4Q2EPQFGCPFIWQY5MJOYSR3WW/#4CEC37F4Q2EPQFGCPFIWQY5MJOYSR3WW" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VOAHRKDA7W6T2DPZV7YKHMSWYSGQCJCW/#VOAHRKDA7W6T2DPZV7YKHMSWYSGQCJCW" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.0.5. There is a use-after-free issue when hci_uart_register_dev() fails in hci_uart_set_proto() in drivers/bluetooth/hci_ldisc.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15917/">CVE-2019-15917 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15917">CVE-2019-15917 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1149539">SUSE bug 1149539</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156334">SUSE bug 1156334</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828543" comment="bpftool-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828544" comment="kernel-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828545" comment="kernel-abi-whitelists-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828546" comment="kernel-debug-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828549" comment="kernel-doc-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828550" comment="kernel-headers-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828551" comment="kernel-tools-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828552" comment="kernel-tools-libs-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828554" comment="perf-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828555" comment="python-perf-3.10.0-1160.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916056" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16056</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16056" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16056" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16056" ref_url="https://www.suse.com/security/cve/CVE-2019-16056" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2020:1342-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-May/014755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2748-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008150.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2389-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2RIZHQXVDEAO3HIKQR7NL3UVMHX36FKF/#2RIZHQXVDEAO3HIKQR7NL3UVMHX36FKF" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2393-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DUNCE6TBYMZ75QK6G6S6XVUETIWV7IX7/#DUNCE6TBYMZ75QK6G6S6XVUETIWV7IX7" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2438-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6PXOI3GEE52ZWA3KKGSYWWLSPBYOIN2G/#6PXOI3GEE52ZWA3KKGSYWWLSPBYOIN2G" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2453-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LG5WELJTI6DYP26XUAUTB5URMEK2M7JU/#LG5WELJTI6DYP26XUAUTB5URMEK2M7JU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0086-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SRKGGFVSV7DDWCMAOSO6E3F66U2CF5XR/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Python through 2.7.16, 3.x through 3.5.7, 3.6.x through 3.6.9, and 3.7.x through 3.7.4. The email module wrongly parses email addresses that contain multiple @ characters. An application that uses the email module and implements some kind of checks on the From/To headers of a message could be tricked into accepting an email address that should be denied. An attack may be the same as in CVE-2019-11340; however, this CVE applies to Python more generally.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-16056/">CVE-2019-16056 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16056">CVE-2019-16056 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1149955">SUSE bug 1149955</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827805" comment="python-2.7.5-88.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827806" comment="python-debug-2.7.5-88.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827807" comment="python-devel-2.7.5-88.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827808" comment="python-libs-2.7.5-88.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827809" comment="python-test-2.7.5-88.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827810" comment="python-tools-2.7.5-88.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827812" comment="python3-3.6.8-13.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827813" comment="python3-debug-3.6.8-13.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827814" comment="python3-devel-3.6.8-13.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827815" comment="python3-idle-3.6.8-13.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827816" comment="python3-libs-3.6.8-13.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827817" comment="python3-test-3.6.8-13.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827818" comment="python3-tkinter-3.6.8-13.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827811" comment="tkinter-2.7.5-88.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916231" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16231</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16231" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16231" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16231" ref_url="https://www.suse.com/security/cve/CVE-2019-16231" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2503-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GT2JTOAOVM6XT2DFUS6CAXI4NAAVMRVR/#GT2JTOAOVM6XT2DFUS6CAXI4NAAVMRVR" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2507-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/45LLGKHM3X6KQJN67OZHE3KEGCRBVGEJ/#45LLGKHM3X6KQJN67OZHE3KEGCRBVGEJ" source="SUSE-SU"/>
    <description>
    drivers/net/fjes/fjes_main.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16231/">CVE-2019-16231 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16231">CVE-2019-16231 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1150466">SUSE bug 1150466</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828543" comment="bpftool-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828544" comment="kernel-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828545" comment="kernel-abi-whitelists-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828546" comment="kernel-debug-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828549" comment="kernel-doc-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828550" comment="kernel-headers-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828551" comment="kernel-tools-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828552" comment="kernel-tools-libs-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828554" comment="perf-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828555" comment="python-perf-3.10.0-1160.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916233" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16233</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16233" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16233" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16233" ref_url="https://www.suse.com/security/cve/CVE-2019-16233" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2946-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192946-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2947-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192947-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2953-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192953-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2444-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NDCZ4VF2YAQG5WJDX6YMBFF67X36UMPN/#NDCZ4VF2YAQG5WJDX6YMBFF67X36UMPN" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2503-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GT2JTOAOVM6XT2DFUS6CAXI4NAAVMRVR/#GT2JTOAOVM6XT2DFUS6CAXI4NAAVMRVR" source="SUSE-SU"/>
    <description>
    drivers/scsi/qla2xxx/qla_os.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16233/">CVE-2019-16233 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16233">CVE-2019-16233 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1150457">SUSE bug 1150457</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828543" comment="bpftool-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828544" comment="kernel-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828545" comment="kernel-abi-whitelists-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828546" comment="kernel-debug-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828549" comment="kernel-doc-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828550" comment="kernel-headers-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828551" comment="kernel-tools-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828552" comment="kernel-tools-libs-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828554" comment="perf-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828555" comment="python-perf-3.10.0-1160.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916707" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16707</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16707" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16707" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16707" ref_url="https://www.suse.com/security/cve/CVE-2019-16707" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2966-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007591.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1717-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7ARK36GN54T2JM6Y2JVEQHZVXGX2ZPQD/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1719-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CYGT75YB6QHUENFFAWZO4II2FUX42ARQ/" source="SUSE-SU"/>
    <description>
    Hunspell 1.7.0 has an invalid read operation in SuggestMgr::leftcommonsubstring in suggestmgr.cxx.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16707/">CVE-2019-16707 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16707">CVE-2019-16707 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1151867">SUSE bug 1151867</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828320" comment="hunspell-1.3.2-16.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828321" comment="hunspell-devel-1.3.2-16.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916708" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16708</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16708" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16708" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16708" ref_url="https://www.suse.com/security/cve/CVE-2019-16708" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2785-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006088.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2515-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HKLSLL4IX54TYZVRJUYXN4DW53SHUXMP/#HKLSLL4IX54TYZVRJUYXN4DW53SHUXMP" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2519-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GGD5GT3XH47ZWIXPD27DWBTDQARZCQQU/#GGD5GT3XH47ZWIXPD27DWBTDQARZCQQU" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-35 has a memory leak in magick/xwindow.c, related to XCreateImage.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16708/">CVE-2019-16708 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16708">CVE-2019-16708 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1151781">SUSE bug 1151781</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827880" comment="ImageMagick-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827881" comment="ImageMagick-c++-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827882" comment="ImageMagick-c++-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827883" comment="ImageMagick-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827884" comment="ImageMagick-doc-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827885" comment="ImageMagick-perl-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827886" comment="autotrace-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827887" comment="autotrace-devel-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827888" comment="emacs-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827889" comment="emacs-common-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827890" comment="emacs-el-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827891" comment="emacs-filesystem-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827892" comment="emacs-nox-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827893" comment="emacs-terminal-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827894" comment="inkscape-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827895" comment="inkscape-docs-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827896" comment="inkscape-view-0.92.2-3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916709" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16709</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16709" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16709" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16709" ref_url="https://www.suse.com/security/cve/CVE-2019-16709" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2785-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006088.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2317-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JJVCFARQYCO23RHFOKJ4QO7QHXRJSHXN/#JJVCFARQYCO23RHFOKJ4QO7QHXRJSHXN" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2321-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/L6L5SCVDXJNSNBNPZNIMHMDAIPSM44U6/#L6L5SCVDXJNSNBNPZNIMHMDAIPSM44U6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2515-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HKLSLL4IX54TYZVRJUYXN4DW53SHUXMP/#HKLSLL4IX54TYZVRJUYXN4DW53SHUXMP" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2519-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GGD5GT3XH47ZWIXPD27DWBTDQARZCQQU/#GGD5GT3XH47ZWIXPD27DWBTDQARZCQQU" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-35 has a memory leak in coders/dps.c, as demonstrated by XCreateImage.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16709/">CVE-2019-16709 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16709">CVE-2019-16709 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1151782">SUSE bug 1151782</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827880" comment="ImageMagick-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827881" comment="ImageMagick-c++-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827882" comment="ImageMagick-c++-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827883" comment="ImageMagick-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827884" comment="ImageMagick-doc-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827885" comment="ImageMagick-perl-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827886" comment="autotrace-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827887" comment="autotrace-devel-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827888" comment="emacs-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827889" comment="emacs-common-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827890" comment="emacs-el-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827891" comment="emacs-filesystem-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827892" comment="emacs-nox-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827893" comment="emacs-terminal-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827894" comment="inkscape-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827895" comment="inkscape-docs-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827896" comment="inkscape-view-0.92.2-3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916710" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16710</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16710" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16710" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16710" ref_url="https://www.suse.com/security/cve/CVE-2019-16710" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2785-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006088.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2515-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HKLSLL4IX54TYZVRJUYXN4DW53SHUXMP/#HKLSLL4IX54TYZVRJUYXN4DW53SHUXMP" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2519-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GGD5GT3XH47ZWIXPD27DWBTDQARZCQQU/#GGD5GT3XH47ZWIXPD27DWBTDQARZCQQU" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-35 has a memory leak in coders/dot.c, as demonstrated by AcquireMagickMemory in MagickCore/memory.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16710/">CVE-2019-16710 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16710">CVE-2019-16710 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1151783">SUSE bug 1151783</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827880" comment="ImageMagick-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827881" comment="ImageMagick-c++-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827882" comment="ImageMagick-c++-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827883" comment="ImageMagick-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827884" comment="ImageMagick-doc-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827885" comment="ImageMagick-perl-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827886" comment="autotrace-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827887" comment="autotrace-devel-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827888" comment="emacs-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827889" comment="emacs-common-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827890" comment="emacs-el-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827891" comment="emacs-filesystem-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827892" comment="emacs-nox-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827893" comment="emacs-terminal-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827894" comment="inkscape-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827895" comment="inkscape-docs-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827896" comment="inkscape-view-0.92.2-3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916711" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16711</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16711" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16711" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16711" ref_url="https://www.suse.com/security/cve/CVE-2019-16711" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2785-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006088.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2515-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HKLSLL4IX54TYZVRJUYXN4DW53SHUXMP/#HKLSLL4IX54TYZVRJUYXN4DW53SHUXMP" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2519-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GGD5GT3XH47ZWIXPD27DWBTDQARZCQQU/#GGD5GT3XH47ZWIXPD27DWBTDQARZCQQU" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-40 has a memory leak in Huffman2DEncodeImage in coders/ps2.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16711/">CVE-2019-16711 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16711">CVE-2019-16711 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1151784">SUSE bug 1151784</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827880" comment="ImageMagick-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827881" comment="ImageMagick-c++-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827882" comment="ImageMagick-c++-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827883" comment="ImageMagick-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827884" comment="ImageMagick-doc-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827885" comment="ImageMagick-perl-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827886" comment="autotrace-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827887" comment="autotrace-devel-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827888" comment="emacs-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827889" comment="emacs-common-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827890" comment="emacs-el-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827891" comment="emacs-filesystem-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827892" comment="emacs-nox-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827893" comment="emacs-terminal-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827894" comment="inkscape-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827895" comment="inkscape-docs-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827896" comment="inkscape-view-0.92.2-3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916712" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16712</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16712" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16712" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16712" ref_url="https://www.suse.com/security/cve/CVE-2019-16712" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2785-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006088.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2515-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HKLSLL4IX54TYZVRJUYXN4DW53SHUXMP/#HKLSLL4IX54TYZVRJUYXN4DW53SHUXMP" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2519-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GGD5GT3XH47ZWIXPD27DWBTDQARZCQQU/#GGD5GT3XH47ZWIXPD27DWBTDQARZCQQU" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-43 has a memory leak in Huffman2DEncodeImage in coders/ps3.c, as demonstrated by WritePS3Image.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16712/">CVE-2019-16712 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16712">CVE-2019-16712 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1151785">SUSE bug 1151785</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827880" comment="ImageMagick-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827881" comment="ImageMagick-c++-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827882" comment="ImageMagick-c++-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827883" comment="ImageMagick-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827884" comment="ImageMagick-doc-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827885" comment="ImageMagick-perl-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827886" comment="autotrace-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827887" comment="autotrace-devel-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827888" comment="emacs-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827889" comment="emacs-common-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827890" comment="emacs-el-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827891" comment="emacs-filesystem-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827892" comment="emacs-nox-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827893" comment="emacs-terminal-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827894" comment="inkscape-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827895" comment="inkscape-docs-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827896" comment="inkscape-view-0.92.2-3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916713" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16713</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16713" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16713" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16713" ref_url="https://www.suse.com/security/cve/CVE-2019-16713" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2785-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006088.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2515-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HKLSLL4IX54TYZVRJUYXN4DW53SHUXMP/#HKLSLL4IX54TYZVRJUYXN4DW53SHUXMP" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2519-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GGD5GT3XH47ZWIXPD27DWBTDQARZCQQU/#GGD5GT3XH47ZWIXPD27DWBTDQARZCQQU" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-43 has a memory leak in coders/dot.c, as demonstrated by PingImage in MagickCore/constitute.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16713/">CVE-2019-16713 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16713">CVE-2019-16713 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1151786">SUSE bug 1151786</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827880" comment="ImageMagick-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827881" comment="ImageMagick-c++-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827882" comment="ImageMagick-c++-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827883" comment="ImageMagick-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827884" comment="ImageMagick-doc-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827885" comment="ImageMagick-perl-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827886" comment="autotrace-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827887" comment="autotrace-devel-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827888" comment="emacs-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827889" comment="emacs-common-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827890" comment="emacs-el-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827891" comment="emacs-filesystem-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827892" comment="emacs-nox-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827893" comment="emacs-terminal-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827894" comment="inkscape-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827895" comment="inkscape-docs-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827896" comment="inkscape-view-0.92.2-3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916746" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16746</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16746" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16746" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16746" ref_url="https://www.suse.com/security/cve/CVE-2019-16746" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2492-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007357.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007359.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007358.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2576-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007393.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0336-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LSSHQFX4IJH5UZIPQACYQ6RIWLLJPS6R/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1153-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5TP74A7GFRKHFHFASPUDW72EHCZZEIBB/" source="SUSE-SU"/>
    <description>
    An issue was discovered in net/wireless/nl80211.c in the Linux kernel through 5.2.17. It does not check the length of variable elements in a beacon head, leading to a buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-16746/">CVE-2019-16746 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16746">CVE-2019-16746 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1152107">SUSE bug 1152107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173659">SUSE bug 1173659</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826993" comment="bpftool-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826994" comment="kernel-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826995" comment="kernel-abi-whitelists-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826996" comment="kernel-debug-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826999" comment="kernel-doc-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827000" comment="kernel-headers-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827001" comment="kernel-tools-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827002" comment="kernel-tools-libs-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827004" comment="perf-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827005" comment="python-perf-3.10.0-1127.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916865" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16865</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16865" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16865" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16865" ref_url="https://www.suse.com/security/cve/CVE-2019-16865" source="SUSE CVE"/>
		<reference ref_id="SUSE-RU-2020:2072-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-July/015563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2020:2161-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-August/015668.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007188.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Pillow before 6.2.0. When reading specially crafted invalid image files, the library can either allocate very large amounts of memory or take an extremely long period of time to process the image.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16865/">CVE-2019-16865 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16865">CVE-2019-16865 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1153191">SUSE bug 1153191</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826919" comment="python-pillow-2.0.0-20.gitd1c6db8.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826920" comment="python-pillow-devel-2.0.0-20.gitd1c6db8.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826921" comment="python-pillow-doc-2.0.0-20.gitd1c6db8.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826922" comment="python-pillow-qt-2.0.0-20.gitd1c6db8.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826923" comment="python-pillow-sane-2.0.0-20.gitd1c6db8.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826924" comment="python-pillow-tk-2.0.0-20.gitd1c6db8.el7_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916935" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16935</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16935" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16935" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16935" ref_url="https://www.suse.com/security/cve/CVE-2019-16935" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:17-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2748-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008118.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2389-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2RIZHQXVDEAO3HIKQR7NL3UVMHX36FKF/#2RIZHQXVDEAO3HIKQR7NL3UVMHX36FKF" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2393-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DUNCE6TBYMZ75QK6G6S6XVUETIWV7IX7/#DUNCE6TBYMZ75QK6G6S6XVUETIWV7IX7" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2438-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6PXOI3GEE52ZWA3KKGSYWWLSPBYOIN2G/#6PXOI3GEE52ZWA3KKGSYWWLSPBYOIN2G" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2453-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LG5WELJTI6DYP26XUAUTB5URMEK2M7JU/#LG5WELJTI6DYP26XUAUTB5URMEK2M7JU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0086-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SRKGGFVSV7DDWCMAOSO6E3F66U2CF5XR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2332-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S3JTHM6LLDKL7VPNRJUSRPNZAD2FZ25H/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2333-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FLGERALYYFTBIX3ZKPM6EQ2WJVUXLOXY/" source="SUSE-SU"/>
    <description>
    The documentation XML-RPC server in Python through 2.7.16, 3.x through 3.6.9, and 3.7.x through 3.7.4 has XSS via the server_title field. This occurs in Lib/DocXMLRPCServer.py in Python 2.x, and in Lib/xmlrpc/server.py in Python 3.x. If set_server_title is called with untrusted input, arbitrary JavaScript can be delivered to clients that visit the http URL for this server.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-16935/">CVE-2019-16935 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16935">CVE-2019-16935 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1153238">SUSE bug 1153238</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828266" comment="python-2.7.5-89.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828267" comment="python-debug-2.7.5-89.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828268" comment="python-devel-2.7.5-89.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828269" comment="python-libs-2.7.5-89.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828270" comment="python-test-2.7.5-89.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828271" comment="python-tools-2.7.5-89.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828246" comment="python3-3.6.8-17.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828247" comment="python3-debug-3.6.8-17.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828248" comment="python3-devel-3.6.8-17.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828249" comment="python3-idle-3.6.8-17.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828250" comment="python3-libs-3.6.8-17.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828251" comment="python3-test-3.6.8-17.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828252" comment="python3-tkinter-3.6.8-17.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828272" comment="tkinter-2.7.5-89.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916994" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16994</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16994" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16994" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16994" ref_url="https://www.suse.com/security/cve/CVE-2019-16994" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0336-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LSSHQFX4IJH5UZIPQACYQ6RIWLLJPS6R/" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 5.0, a memory leak exists in sit_init_net() in net/ipv6/sit.c when register_netdev() fails to register sitn-&gt;fb_tunnel_dev, which may cause denial of service, aka CID-07f12b26e21a.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16994/">CVE-2019-16994 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16994">CVE-2019-16994 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1161523">SUSE bug 1161523</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828543" comment="bpftool-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828544" comment="kernel-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828545" comment="kernel-abi-whitelists-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828546" comment="kernel-debug-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828549" comment="kernel-doc-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828550" comment="kernel-headers-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828551" comment="kernel-tools-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828552" comment="kernel-tools-libs-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828554" comment="perf-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828555" comment="python-perf-3.10.0-1160.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917005" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17005</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17005" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17005" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17005" ref_url="https://www.suse.com/security/cve/CVE-2019-17005" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006276.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0002-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IT3UIP5O2QPRMJEIU4SZ6MBHNKBLUYZT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    The plain text serializer used a fixed-size array for the number of &lt;ol&gt; elements it could process; however it was possible to overflow the static-sized array leading to memory corruption and a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 68.3, Firefox ESR &lt; 68.3, and Firefox &lt; 71.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17005/">CVE-2019-17005 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17005">CVE-2019-17005 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1158328">SUSE bug 1158328</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826789" comment="firefox-68.3.0-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826790" comment="thunderbird-68.3.0-1.el7_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917006" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17006</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17006" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17006" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17006" ref_url="https://www.suse.com/security/cve/CVE-2019-17006" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0088-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200088-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1677-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0008-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AN4USN47JRBDAYTJ7ARVSFYOKEKTGTFV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0854-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HXBTGBKRMQSNENPDBPRN6BJXXF2PQMP4/" source="SUSE-SU"/>
    <description>
    In Network Security Services (NSS) before 3.46, several cryptographic primitives had missing length checks. In cases where the application calling the library did not perform a sanity check on the inputs it could result in a crash due to a buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-17006/">CVE-2019-17006 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17006">CVE-2019-17006 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1159819">SUSE bug 1159819</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828558" comment="nspr-4.25.0-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828559" comment="nspr-devel-4.25.0-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828560" comment="nss-3.53.1-3.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828561" comment="nss-devel-3.53.1-3.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828562" comment="nss-pkcs11-devel-3.53.1-3.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828563" comment="nss-softokn-3.53.1-6.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828564" comment="nss-softokn-devel-3.53.1-6.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828565" comment="nss-softokn-freebl-3.53.1-6.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828566" comment="nss-softokn-freebl-devel-3.53.1-6.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828567" comment="nss-sysinit-3.53.1-3.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828568" comment="nss-tools-3.53.1-3.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828569" comment="nss-util-3.53.1-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828570" comment="nss-util-devel-3.53.1-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917008" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17008</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17008" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17008" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17008" ref_url="https://www.suse.com/security/cve/CVE-2019-17008" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006276.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0002-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IT3UIP5O2QPRMJEIU4SZ6MBHNKBLUYZT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    When using nested workers, a use-after-free could occur during worker destruction. This resulted in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 68.3, Firefox ESR &lt; 68.3, and Firefox &lt; 71.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17008/">CVE-2019-17008 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17008">CVE-2019-17008 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1158328">SUSE bug 1158328</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826789" comment="firefox-68.3.0-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826790" comment="thunderbird-68.3.0-1.el7_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917010" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17010</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17010" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17010" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17010" ref_url="https://www.suse.com/security/cve/CVE-2019-17010" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006276.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0002-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IT3UIP5O2QPRMJEIU4SZ6MBHNKBLUYZT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Under certain conditions, when checking the Resist Fingerprinting preference during device orientation checks, a race condition could have caused a use-after-free and a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 68.3, Firefox ESR &lt; 68.3, and Firefox &lt; 71.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17010/">CVE-2019-17010 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17010">CVE-2019-17010 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1158328">SUSE bug 1158328</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826789" comment="firefox-68.3.0-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826790" comment="thunderbird-68.3.0-1.el7_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917011" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17011</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17011" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17011" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17011" ref_url="https://www.suse.com/security/cve/CVE-2019-17011" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006276.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0002-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IT3UIP5O2QPRMJEIU4SZ6MBHNKBLUYZT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Under certain conditions, when retrieving a document from a DocShell in the antitracking code, a race condition could cause a use-after-free condition and a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 68.3, Firefox ESR &lt; 68.3, and Firefox &lt; 71.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17011/">CVE-2019-17011 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17011">CVE-2019-17011 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1158328">SUSE bug 1158328</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826789" comment="firefox-68.3.0-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826790" comment="thunderbird-68.3.0-1.el7_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917012" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17012</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17012" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17012" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17012" ref_url="https://www.suse.com/security/cve/CVE-2019-17012" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006276.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0002-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IT3UIP5O2QPRMJEIU4SZ6MBHNKBLUYZT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Mozilla developers reported memory safety bugs present in Firefox 70 and Firefox ESR 68.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird &lt; 68.3, Firefox ESR &lt; 68.3, and Firefox &lt; 71.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17012/">CVE-2019-17012 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17012">CVE-2019-17012 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1158328">SUSE bug 1158328</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826789" comment="firefox-68.3.0-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826790" comment="thunderbird-68.3.0-1.el7_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917016" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17016</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17016" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17016" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17016" ref_url="https://www.suse.com/security/cve/CVE-2019-17016" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006327.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0060-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZNI5ZREIFUGK6K2ZYLOQORGC64NABUB7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0094-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OJFCANPRYJXAXFVESLPVQQXRQHIF7VBS/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    When pasting a &amp;lt;style&amp;gt; tag from the clipboard into a rich text editor, the CSS sanitizer incorrectly rewrites a @namespace rule. This could allow for injection into certain types of websites resulting in data exfiltration. This vulnerability affects Firefox ESR &lt; 68.4 and Firefox &lt; 72.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17016/">CVE-2019-17016 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17016">CVE-2019-17016 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1160305">SUSE bug 1160305</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826806" comment="firefox-68.4.1-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826807" comment="thunderbird-68.4.1-2.el7_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917017" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17017</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17017" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17017" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17017" ref_url="https://www.suse.com/security/cve/CVE-2019-17017" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006327.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0060-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZNI5ZREIFUGK6K2ZYLOQORGC64NABUB7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0094-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OJFCANPRYJXAXFVESLPVQQXRQHIF7VBS/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Due to a missing case handling object types, a type confusion vulnerability could occur, resulting in a crash. We presume that with enough effort that it could be exploited to run arbitrary code. This vulnerability affects Firefox ESR &lt; 68.4 and Firefox &lt; 72.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17017/">CVE-2019-17017 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17017">CVE-2019-17017 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1160305">SUSE bug 1160305</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826806" comment="firefox-68.4.1-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826807" comment="thunderbird-68.4.1-2.el7_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917022" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17022</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17022" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17022" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17022" ref_url="https://www.suse.com/security/cve/CVE-2019-17022" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006327.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0060-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZNI5ZREIFUGK6K2ZYLOQORGC64NABUB7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0094-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OJFCANPRYJXAXFVESLPVQQXRQHIF7VBS/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    When pasting a &amp;lt;style&amp;gt; tag from the clipboard into a rich text editor, the CSS sanitizer does not escape &amp;lt; and &amp;gt; characters. Because the resulting string is pasted directly into the text node of the element this does not result in a direct injection into the webpage; however, if a webpage subsequently copies the node's innerHTML, assigning it to another innerHTML, this would result in an XSS vulnerability. Two WYSIWYG editors were identified with this behavior, more may exist. This vulnerability affects Firefox ESR &lt; 68.4 and Firefox &lt; 72.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17022/">CVE-2019-17022 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17022">CVE-2019-17022 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1160305">SUSE bug 1160305</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826806" comment="firefox-68.4.1-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826807" comment="thunderbird-68.4.1-2.el7_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917023" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17023</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17023" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17023" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17023" ref_url="https://www.suse.com/security/cve/CVE-2019-17023" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    After a HelloRetryRequest has been sent, the client may negotiate a lower protocol that TLS 1.3, resulting in an invalid state transition in the TLS State Machine. If the client gets into this state, incoming Application Data records will be ignored. This vulnerability affects Firefox &lt; 72.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17023/">CVE-2019-17023 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17023">CVE-2019-17023 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1160305">SUSE bug 1160305</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828558" comment="nspr-4.25.0-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828559" comment="nspr-devel-4.25.0-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828560" comment="nss-3.53.1-3.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828561" comment="nss-devel-3.53.1-3.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828562" comment="nss-pkcs11-devel-3.53.1-3.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828563" comment="nss-softokn-3.53.1-6.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828564" comment="nss-softokn-devel-3.53.1-6.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828565" comment="nss-softokn-freebl-3.53.1-6.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828566" comment="nss-softokn-freebl-devel-3.53.1-6.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828567" comment="nss-sysinit-3.53.1-3.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828568" comment="nss-tools-3.53.1-3.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828569" comment="nss-util-3.53.1-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828570" comment="nss-util-devel-3.53.1-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917024" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17024</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17024" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17024" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17024" ref_url="https://www.suse.com/security/cve/CVE-2019-17024" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006327.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0060-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZNI5ZREIFUGK6K2ZYLOQORGC64NABUB7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0094-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OJFCANPRYJXAXFVESLPVQQXRQHIF7VBS/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Mozilla developers reported memory safety bugs present in Firefox 71 and Firefox ESR 68.3. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR &lt; 68.4 and Firefox &lt; 72.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17024/">CVE-2019-17024 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17024">CVE-2019-17024 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1160305">SUSE bug 1160305</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826806" comment="firefox-68.4.1-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826807" comment="thunderbird-68.4.1-2.el7_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917026" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17026</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17026" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17026" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17026" ref_url="https://www.suse.com/security/cve/CVE-2019-17026" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006327.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0060-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZNI5ZREIFUGK6K2ZYLOQORGC64NABUB7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0094-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OJFCANPRYJXAXFVESLPVQQXRQHIF7VBS/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Incorrect alias information in IonMonkey JIT compiler for setting array elements could lead to a type confusion. We are aware of targeted attacks in the wild abusing this flaw. This vulnerability affects Firefox ESR &lt; 68.4.1, Thunderbird &lt; 68.4.1, and Firefox &lt; 72.0.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17026/">CVE-2019-17026 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17026">CVE-2019-17026 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1160498">SUSE bug 1160498</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826806" comment="firefox-68.4.1-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826807" comment="thunderbird-68.4.1-2.el7_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917041" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17041</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17041" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17041" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17041" ref_url="https://www.suse.com/security/cve/CVE-2019-17041" source="SUSE CVE"/>
		<reference ref_id="SUSE-RU-2019:2816-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2019-October/012878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2937-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006547.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K34YO2MFPF7UWWPMFPCBD5XIN5B6YXCD/#K34YO2MFPF7UWWPMFPCBD5XIN5B6YXCD" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2501-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HGAAMZFD7LMSZOUVWIBFBE2KYRGA2SN/#5HGAAMZFD7LMSZOUVWIBFBE2KYRGA2SN" source="SUSE-SU"/>
    <description>
    An issue was discovered in Rsyslog v8.1908.0. contrib/pmaixforwardedfrom/pmaixforwardedfrom.c has a heap overflow in the parser for AIX log messages. The parser tries to locate a log message delimiter (in this case, a space or a colon) but fails to account for strings that do not satisfy this constraint. If the string does not match, then the variable lenMsg will reach the value zero and will skip the sanity check that detects invalid log messages. The message will then be considered valid, and the parser will eat up the nonexistent colon delimiter. In doing so, it will decrement lenMsg, a signed integer, whose value was zero and now becomes minus one. The following step in the parser is to shift left the contents of the message. To do this, it will call memmove with the right pointers to the target and destination strings, but the lenMsg will now be interpreted as a huge value, causing a heap overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17041/">CVE-2019-17041 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17041">CVE-2019-17041 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1153451">SUSE bug 1153451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198831">SUSE bug 1198831</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826970" comment="rsyslog-8.24.0-52.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826971" comment="rsyslog-crypto-8.24.0-52.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826972" comment="rsyslog-doc-8.24.0-52.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826973" comment="rsyslog-elasticsearch-8.24.0-52.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826974" comment="rsyslog-gnutls-8.24.0-52.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826975" comment="rsyslog-gssapi-8.24.0-52.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826976" comment="rsyslog-kafka-8.24.0-52.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826977" comment="rsyslog-libdbi-8.24.0-52.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826978" comment="rsyslog-mmaudit-8.24.0-52.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826979" comment="rsyslog-mmjsonparse-8.24.0-52.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826980" comment="rsyslog-mmkubernetes-8.24.0-52.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826981" comment="rsyslog-mmnormalize-8.24.0-52.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826982" comment="rsyslog-mmsnmptrapd-8.24.0-52.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826983" comment="rsyslog-mysql-8.24.0-52.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826984" comment="rsyslog-pgsql-8.24.0-52.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826985" comment="rsyslog-relp-8.24.0-52.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826986" comment="rsyslog-snmp-8.24.0-52.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826987" comment="rsyslog-udpspoof-8.24.0-52.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917042" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17042</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17042" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17042" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17042" ref_url="https://www.suse.com/security/cve/CVE-2019-17042" source="SUSE CVE"/>
		<reference ref_id="SUSE-RU-2019:2816-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2019-October/012878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2937-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006547.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K34YO2MFPF7UWWPMFPCBD5XIN5B6YXCD/#K34YO2MFPF7UWWPMFPCBD5XIN5B6YXCD" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2501-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HGAAMZFD7LMSZOUVWIBFBE2KYRGA2SN/#5HGAAMZFD7LMSZOUVWIBFBE2KYRGA2SN" source="SUSE-SU"/>
    <description>
    An issue was discovered in Rsyslog v8.1908.0. contrib/pmcisconames/pmcisconames.c has a heap overflow in the parser for Cisco log messages. The parser tries to locate a log message delimiter (in this case, a space or a colon), but fails to account for strings that do not satisfy this constraint. If the string does not match, then the variable lenMsg will reach the value zero and will skip the sanity check that detects invalid log messages. The message will then be considered valid, and the parser will eat up the nonexistent colon delimiter. In doing so, it will decrement lenMsg, a signed integer, whose value was zero and now becomes minus one. The following step in the parser is to shift left the contents of the message. To do this, it will call memmove with the right pointers to the target and destination strings, but the lenMsg will now be interpreted as a huge value, causing a heap overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17042/">CVE-2019-17042 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17042">CVE-2019-17042 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1153459">SUSE bug 1153459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198831">SUSE bug 1198831</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826970" comment="rsyslog-8.24.0-52.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826971" comment="rsyslog-crypto-8.24.0-52.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826972" comment="rsyslog-doc-8.24.0-52.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826973" comment="rsyslog-elasticsearch-8.24.0-52.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826974" comment="rsyslog-gnutls-8.24.0-52.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826975" comment="rsyslog-gssapi-8.24.0-52.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826976" comment="rsyslog-kafka-8.24.0-52.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826977" comment="rsyslog-libdbi-8.24.0-52.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826978" comment="rsyslog-mmaudit-8.24.0-52.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826979" comment="rsyslog-mmjsonparse-8.24.0-52.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826980" comment="rsyslog-mmkubernetes-8.24.0-52.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826981" comment="rsyslog-mmnormalize-8.24.0-52.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826982" comment="rsyslog-mmsnmptrapd-8.24.0-52.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826983" comment="rsyslog-mysql-8.24.0-52.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826984" comment="rsyslog-pgsql-8.24.0-52.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826985" comment="rsyslog-relp-8.24.0-52.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826986" comment="rsyslog-snmp-8.24.0-52.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826987" comment="rsyslog-udpspoof-8.24.0-52.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917053" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17053</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17053" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17053" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17053" ref_url="https://www.suse.com/security/cve/CVE-2019-17053" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006135.html" source="SUSE-SU"/>
    <description>
    ieee802154_create in net/ieee802154/socket.c in the AF_IEEE802154 network module in the Linux kernel through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-e69dbd4619e7.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17053/">CVE-2019-17053 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-17053">CVE-2019-17053 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1152789">SUSE bug 1152789</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828543" comment="bpftool-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828544" comment="kernel-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828545" comment="kernel-abi-whitelists-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828546" comment="kernel-debug-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828549" comment="kernel-doc-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828550" comment="kernel-headers-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828551" comment="kernel-tools-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828552" comment="kernel-tools-libs-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828554" comment="perf-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828555" comment="python-perf-3.10.0-1160.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917055" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17055</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17055" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17055" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17055" ref_url="https://www.suse.com/security/cve/CVE-2019-17055" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2953-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192953-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2503-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GT2JTOAOVM6XT2DFUS6CAXI4NAAVMRVR/#GT2JTOAOVM6XT2DFUS6CAXI4NAAVMRVR" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2507-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/45LLGKHM3X6KQJN67OZHE3KEGCRBVGEJ/#45LLGKHM3X6KQJN67OZHE3KEGCRBVGEJ" source="SUSE-SU"/>
    <description>
    base_sock_create in drivers/isdn/mISDN/socket.c in the AF_ISDN network module in the Linux kernel through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-b91ee4aa2a21.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17055/">CVE-2019-17055 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17055">CVE-2019-17055 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1152782">SUSE bug 1152782</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828543" comment="bpftool-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828544" comment="kernel-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828545" comment="kernel-abi-whitelists-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828546" comment="kernel-debug-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828549" comment="kernel-doc-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828550" comment="kernel-headers-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828551" comment="kernel-tools-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828552" comment="kernel-tools-libs-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828554" comment="perf-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828555" comment="python-perf-3.10.0-1160.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917133" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17133</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17133" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17133" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17133" ref_url="https://www.suse.com/security/cve/CVE-2019-17133" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2829-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192829-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2859-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192859-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2946-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192946-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2947-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192947-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2953-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192953-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006228.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006399.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2392-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q4WWYJXXZCGVC2OIDWXE4ESZ2GFQW5ER/#Q4WWYJXXZCGVC2OIDWXE4ESZ2GFQW5ER" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2444-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NDCZ4VF2YAQG5WJDX6YMBFF67X36UMPN/#NDCZ4VF2YAQG5WJDX6YMBFF67X36UMPN" source="SUSE-SU"/>
    <description>
    In the Linux kernel through 5.3.2, cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c does not reject a long SSID IE, leading to a Buffer Overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17133/">CVE-2019-17133 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17133">CVE-2019-17133 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1153158">SUSE bug 1153158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153161">SUSE bug 1153161</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826879" comment="bpftool-3.10.0-1062.12.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826880" comment="kernel-3.10.0-1062.12.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826881" comment="kernel-abi-whitelists-3.10.0-1062.12.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826882" comment="kernel-debug-3.10.0-1062.12.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826885" comment="kernel-doc-3.10.0-1062.12.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826886" comment="kernel-headers-3.10.0-1062.12.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826887" comment="kernel-tools-3.10.0-1062.12.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826888" comment="kernel-tools-libs-3.10.0-1062.12.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826890" comment="perf-3.10.0-1062.12.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826891" comment="python-perf-3.10.0-1062.12.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17185</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17185" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17185" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17185" ref_url="https://www.suse.com/security/cve/CVE-2019-17185" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1023-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007316.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0553-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TMVXSP5XFJILXXXL4PCJEJOUEIQCWQ5X/" source="SUSE-SU"/>
    <description>
    In FreeRADIUS 3.0.x before 3.0.20, the EAP-pwd module used a global OpenSSL BN_CTX instance to handle all handshakes. This mean multiple threads use the same BN_CTX instance concurrently, resulting in crashes when concurrent EAP-pwd handshakes are initiated. This can be abused by an adversary as a Denial-of-Service (DoS) attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17185/">CVE-2019-17185 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17185">CVE-2019-17185 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1166847">SUSE bug 1166847</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828391" comment="freeradius-3.0.13-15.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828392" comment="freeradius-devel-3.0.13-15.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828393" comment="freeradius-doc-3.0.13-15.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828394" comment="freeradius-krb5-3.0.13-15.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828395" comment="freeradius-ldap-3.0.13-15.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828396" comment="freeradius-mysql-3.0.13-15.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828397" comment="freeradius-perl-3.0.13-15.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828398" comment="freeradius-postgresql-3.0.13-15.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828399" comment="freeradius-python-3.0.13-15.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828400" comment="freeradius-sqlite-3.0.13-15.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828401" comment="freeradius-unixODBC-3.0.13-15.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828402" comment="freeradius-utils-3.0.13-15.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917402" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17402</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17402" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17402" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17402" ref_url="https://www.suse.com/security/cve/CVE-2019-17402" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013143.html" source="SUSE-SU"/>
    <description>
    Exiv2 0.27.2 allows attackers to trigger a crash in Exiv2::getULong in types.cpp when called from Exiv2::Internal::CiffDirectory::readDirectory in crwimage_int.cpp, because there is no validation of the relationship of the total size to the offset and size.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17402/">CVE-2019-17402 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17402">CVE-2019-17402 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1153577">SUSE bug 1153577</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828512" comment="exiv2-0.27.0-3.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828513" comment="exiv2-devel-0.27.0-3.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828514" comment="exiv2-doc-0.27.0-3.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828515" comment="exiv2-libs-0.27.0-3.el7_8 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917498" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17498</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17498" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17498" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17498" ref_url="https://www.suse.com/security/cve/CVE-2019-17498" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:25-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14226-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914226-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2936-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192936-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007887.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2483-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H3AQRXLVKQVS3DRKN3ELYECMDLVYDUBY/#H3AQRXLVKQVS3DRKN3ELYECMDLVYDUBY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2126-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VZ5CXNJKJVQFPMHVDXDS6F67TKZ3TJ7E/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2129-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HAQH2P56QS5PVJGYRATVMCCAWSF5JABQ/" source="SUSE-SU"/>
    <description>
    In libssh2 v1.9.0 and earlier versions, the SSH_MSG_DISCONNECT logic in packet.c has an integer overflow in a bounds check, enabling an attacker to specify an arbitrary (out-of-bounds) offset for a subsequent memory read. A crafted SSH server may be able to disclose sensitive information or cause a denial of service condition on the client system when a user connects to the server.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17498/">CVE-2019-17498 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17498">CVE-2019-17498 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1154862">SUSE bug 1154862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171566">SUSE bug 1171566</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828273" comment="libssh2-1.8.0-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828274" comment="libssh2-devel-1.8.0-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828275" comment="libssh2-docs-1.8.0-4.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917540" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17540</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17540" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17540" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17540" ref_url="https://www.suse.com/security/cve/CVE-2019-17540" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:2259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/032996.html" source="SUSE-SU"/>
    <description>
    ImageMagick before 7.0.8-54 has a heap-based buffer overflow in ReadPSInfo in coders/ps.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-17540/">CVE-2019-17540 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-17540">CVE-2019-17540 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1153866">SUSE bug 1153866</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827880" comment="ImageMagick-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827881" comment="ImageMagick-c++-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827882" comment="ImageMagick-c++-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827883" comment="ImageMagick-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827884" comment="ImageMagick-doc-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827885" comment="ImageMagick-perl-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827886" comment="autotrace-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827887" comment="autotrace-devel-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827888" comment="emacs-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827889" comment="emacs-common-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827890" comment="emacs-el-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827891" comment="emacs-filesystem-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827892" comment="emacs-nox-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827893" comment="emacs-terminal-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827894" comment="inkscape-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827895" comment="inkscape-docs-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827896" comment="inkscape-view-0.92.2-3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17541</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17541" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17541" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17541" ref_url="https://www.suse.com/security/cve/CVE-2019-17541" source="SUSE CVE"/>
    <description>
    ImageMagick before 7.0.8-55 has a use-after-free in DestroyStringInfo in MagickCore/string.c because the error manager is mishandled in coders/jpeg.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-17541/">CVE-2019-17541 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-17541">CVE-2019-17541 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1153867">SUSE bug 1153867</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827880" comment="ImageMagick-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827881" comment="ImageMagick-c++-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827882" comment="ImageMagick-c++-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827883" comment="ImageMagick-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827884" comment="ImageMagick-doc-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827885" comment="ImageMagick-perl-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827886" comment="autotrace-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827887" comment="autotrace-devel-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827888" comment="emacs-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827889" comment="emacs-common-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827890" comment="emacs-el-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827891" comment="emacs-filesystem-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827892" comment="emacs-nox-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827893" comment="emacs-terminal-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827894" comment="inkscape-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827895" comment="inkscape-docs-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827896" comment="inkscape-view-0.92.2-3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917546" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17546</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17546" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17546" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17546" ref_url="https://www.suse.com/security/cve/CVE-2019-17546" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010261.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0480-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7OF4G5SOPBRKT4CZJV5MAQLV5LXXFO62/" source="SUSE-SU"/>
    <description>
    tif_getimage.c in LibTIFF through 4.0.10, as used in GDAL through 3.0.1 and other products, has an integer overflow that potentially causes a heap-based buffer overflow via a crafted RGBA image, related to a "Negative-size-param" condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17546/">CVE-2019-17546 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17546">CVE-2019-17546 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1154365">SUSE bug 1154365</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828257" comment="libtiff-4.0.3-35.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828258" comment="libtiff-devel-4.0.3-35.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828259" comment="libtiff-static-4.0.3-35.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828260" comment="libtiff-tools-4.0.3-35.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917563" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17563</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17563" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17563" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17563" ref_url="https://www.suse.com/security/cve/CVE-2019-17563" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006307.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0226-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200226-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006867.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0038-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/54BLO3OHVPO6A3AIEQHGLVDNHSXP5KDS/" source="SUSE-SU"/>
    <description>
    When using FORM authentication with Apache Tomcat 9.0.0.M1 to 9.0.29, 8.5.0 to 8.5.49 and 7.0.0 to 7.0.98 there was a narrow window where an attacker could perform a session fixation attack. The window was considered too narrow for an exploit to be practical but, erring on the side of caution, this issue has been treated as a security vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:A/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-17563/">CVE-2019-17563 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17563">CVE-2019-17563 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1159729">SUSE bug 1159729</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828458" comment="tomcat-7.0.76-15.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828459" comment="tomcat-admin-webapps-7.0.76-15.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828460" comment="tomcat-docs-webapp-7.0.76-15.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828461" comment="tomcat-el-2.2-api-7.0.76-15.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828462" comment="tomcat-javadoc-7.0.76-15.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828463" comment="tomcat-jsp-2.2-api-7.0.76-15.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828464" comment="tomcat-jsvc-7.0.76-15.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828465" comment="tomcat-lib-7.0.76-15.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828466" comment="tomcat-servlet-3.0-api-7.0.76-15.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828467" comment="tomcat-webapps-7.0.76-15.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917626" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17626</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17626" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17626" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17626" ref_url="https://www.suse.com/security/cve/CVE-2019-17626" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006410.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006451.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0160-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/P6DNCEK2CMM7NMTN5U5RG4TX5UEQWO23/" source="SUSE-SU"/>
    <description>
    ReportLab through 3.5.26 allows remote code execution because of toColor(eval(arg)) in colors.py, as demonstrated by a crafted XML document with '&lt;span color="' followed by arbitrary Python code.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-17626/">CVE-2019-17626 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17626">CVE-2019-17626 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1154370">SUSE bug 1154370</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215560">SUSE bug 1215560</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826844" comment="python-reportlab-2.5-9.el7_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826845" comment="python-reportlab-docs-2.5-9.el7_7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917666" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17666</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17666" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17666" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17666" ref_url="https://www.suse.com/security/cve/CVE-2019-17666" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2946-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192946-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2947-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192947-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2953-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192953-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2392-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q4WWYJXXZCGVC2OIDWXE4ESZ2GFQW5ER/#Q4WWYJXXZCGVC2OIDWXE4ESZ2GFQW5ER" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2444-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NDCZ4VF2YAQG5WJDX6YMBFF67X36UMPN/#NDCZ4VF2YAQG5WJDX6YMBFF67X36UMPN" source="SUSE-SU"/>
    <description>
    rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel through 5.3.6 lacks a certain upper-bound check, leading to a buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-17666/">CVE-2019-17666 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17666">CVE-2019-17666 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1154372">SUSE bug 1154372</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826933" comment="bpftool-3.10.0-1062.18.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826934" comment="kernel-3.10.0-1062.18.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826935" comment="kernel-abi-whitelists-3.10.0-1062.18.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826936" comment="kernel-debug-3.10.0-1062.18.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826939" comment="kernel-doc-3.10.0-1062.18.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826940" comment="kernel-headers-3.10.0-1062.18.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826941" comment="kernel-tools-3.10.0-1062.18.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826942" comment="kernel-tools-libs-3.10.0-1062.18.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826944" comment="perf-3.10.0-1062.18.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826945" comment="python-perf-3.10.0-1062.18.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918197" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18197</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18197" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18197" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18197" ref_url="https://www.suse.com/security/cve/CVE-2019-18197" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0920-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007307.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1409-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006855.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0189-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WSVRYLRPQE3DA7JXQF45EVKRHJ433WYL/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0210-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AAOUMLFZMVYH6TYWJSSQ6OXQGLVPDPJ6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0233-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7II7R5BUNZZ5ZN2QJ3UC33I67Y7HE4J2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0731-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VPMGA7XXHF73HETFZFL65FVIKUTCEITB/" source="SUSE-SU"/>
    <description>
    In xsltCopyText in transform.c in libxslt 1.1.33, a pointer variable isn't reset under certain circumstances. If the relevant memory area happened to be freed and reused in a certain way, a bounds check could fail and memory outside a buffer could be written to, or uninitialized data could be disclosed.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18197/">CVE-2019-18197 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18197">CVE-2019-18197 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1154609">SUSE bug 1154609</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157028">SUSE bug 1157028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162833">SUSE bug 1162833</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169511">SUSE bug 1169511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190108">SUSE bug 1190108</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828468" comment="libxslt-1.1.28-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828469" comment="libxslt-devel-1.1.28-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828470" comment="libxslt-python-1.1.28-6.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918282" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18282</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18282" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18282" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18282" ref_url="https://www.suse.com/security/cve/CVE-2019-18282" source="SUSE CVE"/>
    <description>
    The flow_dissector feature in the Linux kernel 4.3 through 5.x before 5.3.10 has a device tracking vulnerability, aka CID-55667441c84f. This occurs because the auto flowlabel of a UDP IPv6 packet relies on a 32-bit hashrnd value as a secret, and because jhash (instead of siphash) is used. The hashrnd value remains the same starting from boot time, and can be inferred by an attacker. This affects net/core/flow_dissector.c and related code.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-18282/">CVE-2019-18282 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18282">CVE-2019-18282 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1161121">SUSE bug 1161121</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828811" comment="bpftool-3.10.0-1160.11.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828812" comment="kernel-3.10.0-1160.11.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828813" comment="kernel-abi-whitelists-3.10.0-1160.11.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828814" comment="kernel-debug-3.10.0-1160.11.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828817" comment="kernel-doc-3.10.0-1160.11.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828818" comment="kernel-headers-3.10.0-1160.11.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828819" comment="kernel-tools-3.10.0-1160.11.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828820" comment="kernel-tools-libs-3.10.0-1160.11.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828822" comment="perf-3.10.0-1160.11.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828823" comment="python-perf-3.10.0-1160.11.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918397" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18397</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18397" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18397" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18397" ref_url="https://www.suse.com/security/cve/CVE-2019-18397" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008796.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0763-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GPZ3M35XR5IQLIBDLZFFWGW6Z6SM7YNW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1655-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NAPU2NE5KWWCW4NS2FW7DLCSMM442VDM/" source="SUSE-SU"/>
    <description>
    A buffer overflow in the fribidi_get_par_embedding_levels_ex() function in lib/fribidi-bidi.c of GNU FriBidi through 1.0.7 allows an attacker to cause a denial of service or possibly execute arbitrary code by delivering crafted text content to a user, when this content is then rendered by an application that uses FriBidi for text layout calculations. Examples include any GNOME or GTK+ based application that uses Pango for text layout, as this internally uses FriBidi for bidirectional text layout. For example, the attacker can construct a crafted text file to be opened in GEdit, or a crafted IRC message to be viewed in HexChat.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18397/">CVE-2019-18397 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18397">CVE-2019-18397 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1156260">SUSE bug 1156260</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826804" comment="fribidi-1.0.2-1.el7_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826805" comment="fribidi-devel-1.0.2-1.el7_7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918408" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18408</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18408" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18408" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18408" ref_url="https://www.suse.com/security/cve/CVE-2019-18408" source="SUSE CVE"/>
		<reference ref_id="SUSE-RU-2021:2757-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-August/019872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006196.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2615-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U6XQ3DWFEKK5LGAFI7F4YVSON52JVUJE/#U6XQ3DWFEKK5LGAFI7F4YVSON52JVUJE" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2632-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BCNN5SKOY4P2IA35RL7MCURKXTITD75T/#BCNN5SKOY4P2IA35RL7MCURKXTITD75T" source="SUSE-SU"/>
    <description>
    archive_read_format_rar_read_data in archive_read_support_format_rar.c in libarchive before 3.4.0 has a use-after-free in a certain ARCHIVE_FAILED situation, related to Ppmd7_DecodeSymbol.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-18408/">CVE-2019-18408 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-18408">CVE-2019-18408 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1155079">SUSE bug 1155079</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826862" comment="bsdcpio-3.1.2-14.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826863" comment="bsdtar-3.1.2-14.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826864" comment="libarchive-3.1.2-14.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826865" comment="libarchive-devel-3.1.2-14.el7_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918609" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18609</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18609" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18609" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18609" ref_url="https://www.suse.com/security/cve/CVE-2019-18609" source="SUSE CVE"/>
    <description>
    An issue was discovered in amqp_handle_input in amqp_connection.c in rabbitmq-c 0.9.0. There is an integer overflow that leads to heap memory corruption in the handling of CONNECTION_STATE_HEADER. A rogue server could return a malicious frame header that leads to a smaller target_size value than needed. This condition is then carried on to a memcpy function that copies too much data into a heap buffer.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-18609/">CVE-2019-18609 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18609">CVE-2019-18609 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828303" comment="librabbitmq-0.8.0-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828304" comment="librabbitmq-devel-0.8.0-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828305" comment="librabbitmq-examples-0.8.0-3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918634" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18634</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18634" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18634" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18634" ref_url="https://www.suse.com/security/cve/CVE-2019-18634" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0409-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006492.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0244-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4CUEBOEARZZHY5H3SPMWGMTOGOV3N2QV/" source="SUSE-SU"/>
    <description>
    In Sudo before 1.8.26, if pwfeedback is enabled in /etc/sudoers, users can trigger a stack-based buffer overflow in the privileged sudo process. (pwfeedback is a default setting in Linux Mint and elementary OS; however, it is NOT the default for upstream and many other packages, and would exist only if enabled by an administrator.) The attacker needs to deliver a long string to the stdin of getln() in tgetpass.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-08"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18634/">CVE-2019-18634 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18634">CVE-2019-18634 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1162202">SUSE bug 1162202</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826904" comment="sudo-1.8.23-4.el7_7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826905" comment="sudo-devel-1.8.23-4.el7_7.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918660" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18660</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18660" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18660" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18660" ref_url="https://www.suse.com/security/cve/CVE-2019-18660" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006770.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ETQRKHU2REMA5EANI2CSGTNBUHZHYU3W/#ETQRKHU2REMA5EANI2CSGTNBUHZHYU3W" source="SUSE-SU"/>
    <description>
    The Linux kernel before 5.4.1 on powerpc allows Information Exposure because the Spectre-RSB mitigation is not in place for all applicable CPUs, aka CID-39e72bf96f58. This is related to arch/powerpc/kernel/entry_64.S and arch/powerpc/kernel/security.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-18660/">CVE-2019-18660 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18660">CVE-2019-18660 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1157038">SUSE bug 1157038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157923">SUSE bug 1157923</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826993" comment="bpftool-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826994" comment="kernel-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826995" comment="kernel-abi-whitelists-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826996" comment="kernel-debug-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826999" comment="kernel-doc-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827000" comment="kernel-headers-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827001" comment="kernel-tools-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827002" comment="kernel-tools-libs-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827004" comment="perf-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827005" comment="python-perf-3.10.0-1127.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918808" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18808</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18808" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18808" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18808" ref_url="https://www.suse.com/security/cve/CVE-2019-18808" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0336-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LSSHQFX4IJH5UZIPQACYQ6RIWLLJPS6R/" source="SUSE-SU"/>
    <description>
    A memory leak in the ccp_run_sha_cmd() function in drivers/crypto/ccp/ccp-ops.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-128c66429247.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18808/">CVE-2019-18808 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18808">CVE-2019-18808 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1156259">SUSE bug 1156259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189884">SUSE bug 1189884</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190534">SUSE bug 1190534</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828543" comment="bpftool-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828544" comment="kernel-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828545" comment="kernel-abi-whitelists-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828546" comment="kernel-debug-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828549" comment="kernel-doc-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828550" comment="kernel-headers-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828551" comment="kernel-tools-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828552" comment="kernel-tools-libs-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828554" comment="perf-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828555" comment="python-perf-3.10.0-1160.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919046" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19046</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19046" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19046" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19046" ref_url="https://www.suse.com/security/cve/CVE-2019-19046" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ETQRKHU2REMA5EANI2CSGTNBUHZHYU3W/#ETQRKHU2REMA5EANI2CSGTNBUHZHYU3W" source="SUSE-SU"/>
    <description>
    A memory leak in the __ipmi_bmc_register() function in drivers/char/ipmi/ipmi_msghandler.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering ida_simple_get() failure, aka CID-4aa7afb0ee20. NOTE: third parties dispute the relevance of this because an attacker cannot realistically control this failure at probe time
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19046/">CVE-2019-19046 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19046">CVE-2019-19046 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1157304">SUSE bug 1157304</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828543" comment="bpftool-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828544" comment="kernel-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828545" comment="kernel-abi-whitelists-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828546" comment="kernel-debug-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828549" comment="kernel-doc-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828550" comment="kernel-headers-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828551" comment="kernel-tools-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828552" comment="kernel-tools-libs-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828554" comment="perf-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828555" comment="python-perf-3.10.0-1160.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919055" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19055</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19055" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19055" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19055" ref_url="https://www.suse.com/security/cve/CVE-2019-19055" source="SUSE CVE"/>
    <description>
    A memory leak in the nl80211_get_ftm_responder_stats() function in net/wireless/nl80211.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering nl80211hdr_put() failures, aka CID-1399c59fa929. NOTE: third parties dispute the relevance of this because it occurs on a code path where a successful allocation has already occurred
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19055/">CVE-2019-19055 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19055">CVE-2019-19055 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1157319">SUSE bug 1157319</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828543" comment="bpftool-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828544" comment="kernel-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828545" comment="kernel-abi-whitelists-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828546" comment="kernel-debug-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828549" comment="kernel-doc-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828550" comment="kernel-headers-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828551" comment="kernel-tools-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828552" comment="kernel-tools-libs-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828554" comment="perf-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828555" comment="python-perf-3.10.0-1160.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919058" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19058</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19058" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19058" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19058" ref_url="https://www.suse.com/security/cve/CVE-2019-19058" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ETQRKHU2REMA5EANI2CSGTNBUHZHYU3W/#ETQRKHU2REMA5EANI2CSGTNBUHZHYU3W" source="SUSE-SU"/>
    <description>
    A memory leak in the alloc_sgtable() function in drivers/net/wireless/intel/iwlwifi/fw/dbg.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering alloc_page() failures, aka CID-b4b814fec1a5.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19058/">CVE-2019-19058 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19058">CVE-2019-19058 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1157145">SUSE bug 1157145</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828543" comment="bpftool-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828544" comment="kernel-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828545" comment="kernel-abi-whitelists-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828546" comment="kernel-debug-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828549" comment="kernel-doc-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828550" comment="kernel-headers-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828551" comment="kernel-tools-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828552" comment="kernel-tools-libs-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828554" comment="perf-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828555" comment="python-perf-3.10.0-1160.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919059" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19059</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19059" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19059" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19059" ref_url="https://www.suse.com/security/cve/CVE-2019-19059" source="SUSE CVE"/>
    <description>
    Multiple memory leaks in the iwl_pcie_ctxt_info_gen3_init() function in drivers/net/wireless/intel/iwlwifi/pcie/ctxt-info-gen3.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption) by triggering iwl_pcie_init_fw_sec() or dma_alloc_coherent() failures, aka CID-0f4f199443fa.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19059/">CVE-2019-19059 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19059">CVE-2019-19059 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1157296">SUSE bug 1157296</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828543" comment="bpftool-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828544" comment="kernel-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828545" comment="kernel-abi-whitelists-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828546" comment="kernel-debug-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828549" comment="kernel-doc-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828550" comment="kernel-headers-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828551" comment="kernel-tools-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828552" comment="kernel-tools-libs-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828554" comment="perf-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828555" comment="python-perf-3.10.0-1160.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919062" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19062</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19062" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19062" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19062" ref_url="https://www.suse.com/security/cve/CVE-2019-19062" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ETQRKHU2REMA5EANI2CSGTNBUHZHYU3W/#ETQRKHU2REMA5EANI2CSGTNBUHZHYU3W" source="SUSE-SU"/>
    <description>
    A memory leak in the crypto_report() function in crypto/crypto_user_base.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering crypto_report_alg() failures, aka CID-ffdde5932042.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19062/">CVE-2019-19062 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19062">CVE-2019-19062 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1157333">SUSE bug 1157333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828543" comment="bpftool-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828544" comment="kernel-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828545" comment="kernel-abi-whitelists-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828546" comment="kernel-debug-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828549" comment="kernel-doc-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828550" comment="kernel-headers-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828551" comment="kernel-tools-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828552" comment="kernel-tools-libs-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828554" comment="perf-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828555" comment="python-perf-3.10.0-1160.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919063" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19063</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19063" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19063" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19063" ref_url="https://www.suse.com/security/cve/CVE-2019-19063" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ETQRKHU2REMA5EANI2CSGTNBUHZHYU3W/#ETQRKHU2REMA5EANI2CSGTNBUHZHYU3W" source="SUSE-SU"/>
    <description>
    Two memory leaks in the rtl_usb_probe() function in drivers/net/wireless/realtek/rtlwifi/usb.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption), aka CID-3f9361695113.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19063/">CVE-2019-19063 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19063">CVE-2019-19063 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1157298">SUSE bug 1157298</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828543" comment="bpftool-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828544" comment="kernel-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828545" comment="kernel-abi-whitelists-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828546" comment="kernel-debug-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828549" comment="kernel-doc-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828550" comment="kernel-headers-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828551" comment="kernel-tools-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828552" comment="kernel-tools-libs-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828554" comment="perf-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828555" comment="python-perf-3.10.0-1160.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919126" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19126</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19126" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19126" ref_url="https://www.suse.com/security/cve/CVE-2019-19126" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006420.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:31-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006421.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:33-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:35-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:39-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:53-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006413.html" source="SUSE-SU"/>
    <description>
    On the x86-64 architecture, the GNU C Library (aka glibc) before 2.31 fails to ignore the LD_PREFER_MAP_32BIT_EXEC environment variable during program execution after a security transition, allowing local attackers to restrict the possible mapping addresses for loaded libraries and thus bypass ASLR for a setuid program.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19126/">CVE-2019-19126 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19126">CVE-2019-19126 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1157292">SUSE bug 1157292</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828109" comment="glibc-2.17-317.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828110" comment="glibc-common-2.17-317.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828111" comment="glibc-devel-2.17-317.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828112" comment="glibc-headers-2.17-317.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828113" comment="glibc-static-2.17-317.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828114" comment="glibc-utils-2.17-317.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828115" comment="nscd-2.17-317.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919332" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19332</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19332" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19332" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19332" ref_url="https://www.suse.com/security/cve/CVE-2019-19332" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0336-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LSSHQFX4IJH5UZIPQACYQ6RIWLLJPS6R/" source="SUSE-SU"/>
    <description>
    An out-of-bounds memory write issue was found in the Linux Kernel, version 3.13 through 5.4, in the way the Linux kernel's KVM hypervisor handled the 'KVM_GET_EMULATED_CPUID' ioctl(2) request to get CPUID features emulated by the KVM hypervisor. A user or process able to access the '/dev/kvm' device could use this flaw to crash the system, resulting in a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19332/">CVE-2019-19332 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19332">CVE-2019-19332 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1158827">SUSE bug 1158827</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828543" comment="bpftool-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828544" comment="kernel-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828545" comment="kernel-abi-whitelists-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828546" comment="kernel-debug-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828549" comment="kernel-doc-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828550" comment="kernel-headers-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828551" comment="kernel-tools-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828552" comment="kernel-tools-libs-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828554" comment="perf-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828555" comment="python-perf-3.10.0-1160.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919338" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19338</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19338" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19338" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19338" ref_url="https://www.suse.com/security/cve/CVE-2019-19338" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0336-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LSSHQFX4IJH5UZIPQACYQ6RIWLLJPS6R/" source="SUSE-SU"/>
    <description>
    A flaw was found in the fix for CVE-2019-11135, in the Linux upstream kernel versions before 5.5 where, the way Intel CPUs handle speculative execution of instructions when a TSX Asynchronous Abort (TAA) error occurs. When a guest is running on a host CPU affected by the TAA flaw (TAA_NO=0), but is not affected by the MDS issue (MDS_NO=1), the guest was to clear the affected buffers by using a VERW instruction mechanism. But when the MDS_NO=1 bit was exported to the guests, the guests did not use the VERW mechanism to clear the affected buffers. This issue affects guests running on Cascade Lake CPUs and requires that host has 'TSX' enabled. Confidentiality of data is the highest threat associated with this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19338/">CVE-2019-19338 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19338">CVE-2019-19338 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1158954">SUSE bug 1158954</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826933" comment="bpftool-3.10.0-1062.18.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826934" comment="kernel-3.10.0-1062.18.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826935" comment="kernel-abi-whitelists-3.10.0-1062.18.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826936" comment="kernel-debug-3.10.0-1062.18.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826939" comment="kernel-doc-3.10.0-1062.18.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826940" comment="kernel-headers-3.10.0-1062.18.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826941" comment="kernel-tools-3.10.0-1062.18.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826942" comment="kernel-tools-libs-3.10.0-1062.18.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826944" comment="perf-3.10.0-1062.18.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826945" comment="python-perf-3.10.0-1062.18.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919447" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19447</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19447" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19447" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19447" ref_url="https://www.suse.com/security/cve/CVE-2019-19447" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2492-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007359.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007365.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0336-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LSSHQFX4IJH5UZIPQACYQ6RIWLLJPS6R/" source="SUSE-SU"/>
    <description>
    In the Linux kernel 5.0.21, mounting a crafted ext4 filesystem image, performing some operations, and unmounting can lead to a use-after-free in ext4_put_super in fs/ext4/super.c, related to dump_orphan_list in fs/ext4/super.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19447/">CVE-2019-19447 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19447">CVE-2019-19447 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1158819">SUSE bug 1158819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173869">SUSE bug 1173869</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828543" comment="bpftool-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828544" comment="kernel-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828545" comment="kernel-abi-whitelists-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828546" comment="kernel-debug-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828549" comment="kernel-doc-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828550" comment="kernel-headers-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828551" comment="kernel-tools-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828552" comment="kernel-tools-libs-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828554" comment="perf-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828555" comment="python-perf-3.10.0-1160.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919450" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19450</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19450" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19450" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19450" ref_url="https://www.suse.com/security/cve/CVE-2019-19450" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016630.html" source="SUSE-SU"/>
    <description>
    paraparser in ReportLab before 3.5.31 allows remote code execution because start_unichar in paraparser.py evaluates untrusted user input in a unichar element in a crafted XML document with '&lt;unichar code="' followed by arbitrary Python code, a similar issue to CVE-2019-17626.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-19450/">CVE-2019-19450 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19450">CVE-2019-19450 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215560">SUSE bug 1215560</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830368" comment="python-reportlab-2.5-11.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830369" comment="python-reportlab-docs-2.5-11.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919523" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19523</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19523" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19523" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19523" ref_url="https://www.suse.com/security/cve/CVE-2019-19523" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006770.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0336-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LSSHQFX4IJH5UZIPQACYQ6RIWLLJPS6R/" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 5.3.7, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/adutux.c driver, aka CID-44efc269db79.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-19523/">CVE-2019-19523 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19523">CVE-2019-19523 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1158381">SUSE bug 1158381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158823">SUSE bug 1158823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158834">SUSE bug 1158834</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828543" comment="bpftool-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828544" comment="kernel-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828545" comment="kernel-abi-whitelists-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828546" comment="kernel-debug-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828549" comment="kernel-doc-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828550" comment="kernel-headers-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828551" comment="kernel-tools-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828552" comment="kernel-tools-libs-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828554" comment="perf-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828555" comment="python-perf-3.10.0-1160.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919524" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19524</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19524" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19524" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19524" ref_url="https://www.suse.com/security/cve/CVE-2019-19524" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006770.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ETQRKHU2REMA5EANI2CSGTNBUHZHYU3W/#ETQRKHU2REMA5EANI2CSGTNBUHZHYU3W" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 5.3.12, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/input/ff-memless.c driver, aka CID-fa3a5a1880c9.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19524/">CVE-2019-19524 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19524">CVE-2019-19524 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1158381">SUSE bug 1158381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158413">SUSE bug 1158413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158834">SUSE bug 1158834</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828543" comment="bpftool-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828544" comment="kernel-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828545" comment="kernel-abi-whitelists-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828546" comment="kernel-debug-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828549" comment="kernel-doc-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828550" comment="kernel-headers-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828551" comment="kernel-tools-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828552" comment="kernel-tools-libs-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828554" comment="perf-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828555" comment="python-perf-3.10.0-1160.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919527" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19527</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19527" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19527" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19527" ref_url="https://www.suse.com/security/cve/CVE-2019-19527" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006770.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0336-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LSSHQFX4IJH5UZIPQACYQ6RIWLLJPS6R/" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 5.2.10, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/hid/usbhid/hiddev.c driver, aka CID-9c09b214f30e.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-19527/">CVE-2019-19527 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19527">CVE-2019-19527 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1158381">SUSE bug 1158381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158834">SUSE bug 1158834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158900">SUSE bug 1158900</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828081" comment="bpftool-3.10.0-1127.18.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828082" comment="kernel-3.10.0-1127.18.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828083" comment="kernel-abi-whitelists-3.10.0-1127.18.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828084" comment="kernel-debug-3.10.0-1127.18.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828087" comment="kernel-doc-3.10.0-1127.18.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828088" comment="kernel-headers-3.10.0-1127.18.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828089" comment="kernel-tools-3.10.0-1127.18.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828090" comment="kernel-tools-libs-3.10.0-1127.18.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828092" comment="perf-3.10.0-1127.18.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828093" comment="python-perf-3.10.0-1127.18.2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919530" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19530</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19530" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19530" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19530" ref_url="https://www.suse.com/security/cve/CVE-2019-19530" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006770.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ETQRKHU2REMA5EANI2CSGTNBUHZHYU3W/#ETQRKHU2REMA5EANI2CSGTNBUHZHYU3W" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 5.2.10, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/class/cdc-acm.c driver, aka CID-c52873e5a1ef.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19530/">CVE-2019-19530 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19530">CVE-2019-19530 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1158381">SUSE bug 1158381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158410">SUSE bug 1158410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158834">SUSE bug 1158834</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828543" comment="bpftool-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828544" comment="kernel-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828545" comment="kernel-abi-whitelists-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828546" comment="kernel-debug-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828549" comment="kernel-doc-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828550" comment="kernel-headers-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828551" comment="kernel-tools-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828552" comment="kernel-tools-libs-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828554" comment="perf-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828555" comment="python-perf-3.10.0-1160.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919532" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19532</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19532" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19532" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19532" ref_url="https://www.suse.com/security/cve/CVE-2019-19532" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006770.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0336-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LSSHQFX4IJH5UZIPQACYQ6RIWLLJPS6R/" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 5.3.9, there are multiple out-of-bounds write bugs that can be caused by a malicious USB device in the Linux kernel HID drivers, aka CID-d9d4b1e46d95. This affects drivers/hid/hid-axff.c, drivers/hid/hid-dr.c, drivers/hid/hid-emsff.c, drivers/hid/hid-gaff.c, drivers/hid/hid-holtekff.c, drivers/hid/hid-lg2ff.c, drivers/hid/hid-lg3ff.c, drivers/hid/hid-lg4ff.c, drivers/hid/hid-lgff.c, drivers/hid/hid-logitech-hidpp.c, drivers/hid/hid-microsoft.c, drivers/hid/hid-sony.c, drivers/hid/hid-tmff.c, and drivers/hid/hid-zpff.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19532/">CVE-2019-19532 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19532">CVE-2019-19532 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1158381">SUSE bug 1158381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158823">SUSE bug 1158823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158824">SUSE bug 1158824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158834">SUSE bug 1158834</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828991" comment="bpftool-3.10.0-1160.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828992" comment="kernel-3.10.0-1160.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828993" comment="kernel-abi-whitelists-3.10.0-1160.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828994" comment="kernel-debug-3.10.0-1160.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828997" comment="kernel-doc-3.10.0-1160.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828998" comment="kernel-headers-3.10.0-1160.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828999" comment="kernel-tools-3.10.0-1160.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829000" comment="kernel-tools-libs-3.10.0-1160.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829002" comment="perf-3.10.0-1160.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829003" comment="python-perf-3.10.0-1160.21.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919534" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19534</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19534" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19534" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19534" ref_url="https://www.suse.com/security/cve/CVE-2019-19534" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ETQRKHU2REMA5EANI2CSGTNBUHZHYU3W/#ETQRKHU2REMA5EANI2CSGTNBUHZHYU3W" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 5.3.11, there is an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_core.c driver, aka CID-f7a1337f0d29.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19534/">CVE-2019-19534 at SUSE</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19534">CVE-2019-19534 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1158381">SUSE bug 1158381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158398">SUSE bug 1158398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158834">SUSE bug 1158834</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828543" comment="bpftool-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828544" comment="kernel-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828545" comment="kernel-abi-whitelists-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828546" comment="kernel-debug-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828549" comment="kernel-doc-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828550" comment="kernel-headers-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828551" comment="kernel-tools-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828552" comment="kernel-tools-libs-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828554" comment="perf-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828555" comment="python-perf-3.10.0-1160.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919537" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19537</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19537" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19537" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19537" ref_url="https://www.suse.com/security/cve/CVE-2019-19537" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006770.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0336-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LSSHQFX4IJH5UZIPQACYQ6RIWLLJPS6R/" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 5.2.10, there is a race condition bug that can be caused by a malicious USB device in the USB character device driver layer, aka CID-303911cfc5b9. This affects drivers/usb/core/file.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19537/">CVE-2019-19537 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19537">CVE-2019-19537 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1158381">SUSE bug 1158381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158834">SUSE bug 1158834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158904">SUSE bug 1158904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828543" comment="bpftool-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828544" comment="kernel-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828545" comment="kernel-abi-whitelists-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828546" comment="kernel-debug-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828549" comment="kernel-doc-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828550" comment="kernel-headers-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828551" comment="kernel-tools-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828552" comment="kernel-tools-libs-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828554" comment="perf-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828555" comment="python-perf-3.10.0-1160.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919767" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19767</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19767" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19767" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19767" ref_url="https://www.suse.com/security/cve/CVE-2019-19767" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0336-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LSSHQFX4IJH5UZIPQACYQ6RIWLLJPS6R/" source="SUSE-SU"/>
    <description>
    The Linux kernel before 5.4.2 mishandles ext4_expand_extra_isize, as demonstrated by use-after-free errors in __ext4_expand_extra_isize and ext4_xattr_set_entry, related to fs/ext4/inode.c and fs/ext4/super.c, aka CID-4ea99936a163.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19767/">CVE-2019-19767 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19767">CVE-2019-19767 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1159297">SUSE bug 1159297</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828543" comment="bpftool-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828544" comment="kernel-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828545" comment="kernel-abi-whitelists-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828546" comment="kernel-debug-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828549" comment="kernel-doc-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828550" comment="kernel-headers-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828551" comment="kernel-tools-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828552" comment="kernel-tools-libs-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828554" comment="perf-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828555" comment="python-perf-3.10.0-1160.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919768" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19768</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19768" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19768" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19768" ref_url="https://www.suse.com/security/cve/CVE-2019-19768" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0388-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6IRYS6743ISN3DBCZORC2AEZU7D7GZNC/" source="SUSE-SU"/>
    <description>
    In the Linux kernel 5.4.0-rc2, there is a use-after-free (read) in the __blk_add_trace function in kernel/trace/blktrace.c (which is used to fill out a blk_io_trace structure and place it in a per-cpu sub-buffer).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19768/">CVE-2019-19768 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19768">CVE-2019-19768 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1159285">SUSE bug 1159285</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827965" comment="bpftool-3.10.0-1127.8.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827966" comment="kernel-3.10.0-1127.8.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827967" comment="kernel-abi-whitelists-3.10.0-1127.8.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827968" comment="kernel-debug-3.10.0-1127.8.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827971" comment="kernel-doc-3.10.0-1127.8.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827972" comment="kernel-headers-3.10.0-1127.8.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827973" comment="kernel-tools-3.10.0-1127.8.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827974" comment="kernel-tools-libs-3.10.0-1127.8.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827976" comment="perf-3.10.0-1127.8.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827977" comment="python-perf-3.10.0-1127.8.2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919807" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19807</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19807" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19807" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19807" ref_url="https://www.suse.com/security/cve/CVE-2019-19807" source="SUSE CVE"/>
    <description>
    In the Linux kernel before 5.3.11, sound/core/timer.c has a use-after-free caused by erroneous code refactoring, aka CID-e7af6307a8a5. This is related to snd_timer_open and snd_timer_close_locked. The timeri variable was originally intended to be for a newly created timer instance, but was used for a different purpose after refactoring.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-19807/">CVE-2019-19807 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19807">CVE-2019-19807 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1159281">SUSE bug 1159281</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828543" comment="bpftool-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828544" comment="kernel-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828545" comment="kernel-abi-whitelists-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828546" comment="kernel-debug-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828549" comment="kernel-doc-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828550" comment="kernel-headers-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828551" comment="kernel-tools-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828552" comment="kernel-tools-libs-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828554" comment="perf-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828555" comment="python-perf-3.10.0-1160.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919948" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19948</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19948" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19948" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19948" ref_url="https://www.suse.com/security/cve/CVE-2019-19948" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006496.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0170-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RMADUUGIJOMGWTGEOMAQBO6UBDDHSMR5/" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.8-43 Q16, there is a heap-based buffer overflow in the function WriteSGIImage of coders/sgi.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19948/">CVE-2019-19948 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19948">CVE-2019-19948 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1159861">SUSE bug 1159861</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827880" comment="ImageMagick-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827881" comment="ImageMagick-c++-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827882" comment="ImageMagick-c++-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827883" comment="ImageMagick-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827884" comment="ImageMagick-doc-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827885" comment="ImageMagick-perl-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827886" comment="autotrace-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827887" comment="autotrace-devel-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827888" comment="emacs-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827889" comment="emacs-common-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827890" comment="emacs-el-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827891" comment="emacs-filesystem-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827892" comment="emacs-nox-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827893" comment="emacs-terminal-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827894" comment="inkscape-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827895" comment="inkscape-docs-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827896" comment="inkscape-view-0.92.2-3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919949" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19949</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19949" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19949" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19949" ref_url="https://www.suse.com/security/cve/CVE-2019-19949" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006496.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0170-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RMADUUGIJOMGWTGEOMAQBO6UBDDHSMR5/" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.8-43 Q16, there is a heap-based buffer over-read in the function WritePNGImage of coders/png.c, related to Magick_png_write_raw_profile and LocaleNCompare.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-19949/">CVE-2019-19949 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19949">CVE-2019-19949 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1160369">SUSE bug 1160369</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827880" comment="ImageMagick-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827881" comment="ImageMagick-c++-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827882" comment="ImageMagick-c++-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827883" comment="ImageMagick-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827884" comment="ImageMagick-doc-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827885" comment="ImageMagick-perl-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827886" comment="autotrace-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827887" comment="autotrace-devel-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827888" comment="emacs-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827889" comment="emacs-common-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827890" comment="emacs-el-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827891" comment="emacs-filesystem-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827892" comment="emacs-nox-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827893" comment="emacs-terminal-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827894" comment="inkscape-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827895" comment="inkscape-docs-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827896" comment="inkscape-view-0.92.2-3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919956" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19956</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19956" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19956" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19956" ref_url="https://www.suse.com/security/cve/CVE-2019-19956" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006891.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1532-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008797.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0681-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/75OUBX7RPPAARGW2FKOWVC52NVIH42S5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0781-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AQPKJALN5664H5AAEJXKAEHG3AP5Y6RH/" source="SUSE-SU"/>
    <description>
    xmlParseBalancedChunkMemoryRecover in parser.c in libxml2 before 2.9.10 has a memory leak related to newDoc-&gt;oldNs.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19956/">CVE-2019-19956 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19956">CVE-2019-19956 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1159928">SUSE bug 1159928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191860">SUSE bug 1191860</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828403" comment="libxml2-2.9.1-6.el7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828404" comment="libxml2-devel-2.9.1-6.el7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828405" comment="libxml2-python-2.9.1-6.el7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828406" comment="libxml2-static-2.9.1-6.el7.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201920044" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20044</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20044" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20044" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20044" ref_url="https://www.suse.com/security/cve/CVE-2019-20044" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010436.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0735-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BYQO6XCA5HFPKOF2ANXLGSZGFT63LHPA/" source="SUSE-SU"/>
    <description>
    In Zsh before 5.8, attackers able to execute commands can regain privileges dropped by the --no-PRIVILEGED option. Zsh fails to overwrite the saved uid, so the original privileges can be restored by executing MODULE_PATH=/dir/with/module zmodload with a module that calls setuid().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-08"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-20044/">CVE-2019-20044 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20044">CVE-2019-20044 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1163882">SUSE bug 1163882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200039">SUSE bug 1200039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200202">SUSE bug 1200202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200209">SUSE bug 1200209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826948" comment="zsh-5.0.2-34.el7_7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826949" comment="zsh-html-5.0.2-34.el7_7.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201920054" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20054</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20054" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20054" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20054" ref_url="https://www.suse.com/security/cve/CVE-2019-20054" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0336-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LSSHQFX4IJH5UZIPQACYQ6RIWLLJPS6R/" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 5.0.6, there is a NULL pointer dereference in drop_sysctl_table() in fs/proc/proc_sysctl.c, related to put_links, aka CID-23da9588037e.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20054/">CVE-2019-20054 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20054">CVE-2019-20054 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1159910">SUSE bug 1159910</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828543" comment="bpftool-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828544" comment="kernel-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828545" comment="kernel-abi-whitelists-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828546" comment="kernel-debug-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828549" comment="kernel-doc-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828550" comment="kernel-headers-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828551" comment="kernel-tools-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828552" comment="kernel-tools-libs-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828554" comment="perf-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828555" comment="python-perf-3.10.0-1160.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201920095" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20095</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20095" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20095" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20095" ref_url="https://www.suse.com/security/cve/CVE-2019-20095" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0336-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LSSHQFX4IJH5UZIPQACYQ6RIWLLJPS6R/" source="SUSE-SU"/>
    <description>
    mwifiex_tm_cmd in drivers/net/wireless/marvell/mwifiex/cfg80211.c in the Linux kernel before 5.1.6 has some error-handling cases that did not free allocated hostcmd memory, aka CID-003b686ace82. This will cause a memory leak and denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20095/">CVE-2019-20095 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20095">CVE-2019-20095 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1159909">SUSE bug 1159909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159914">SUSE bug 1159914</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828543" comment="bpftool-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828544" comment="kernel-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828545" comment="kernel-abi-whitelists-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828546" comment="kernel-debug-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828549" comment="kernel-doc-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828550" comment="kernel-headers-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828551" comment="kernel-tools-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828552" comment="kernel-tools-libs-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828554" comment="perf-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828555" comment="python-perf-3.10.0-1160.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201920382" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20382</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20382" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20382" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20382" ref_url="https://www.suse.com/security/cve/CVE-2019-20382" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1523-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006874.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0468-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S5VG234WOT345KSVGE32CW6SK7I55AZP/" source="SUSE-SU"/>
    <description>
    QEMU 4.1.0 has a memory leak in zrle_compress_data in ui/vnc-enc-zrle.c during a VNC disconnect operation because libz is misused, resulting in a situation where memory allocated in deflateInit2 is not freed in deflateEnd.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20382/">CVE-2019-20382 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20382">CVE-2019-20382 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1165776">SUSE bug 1165776</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828261" comment="qemu-img-1.5.3-175.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828262" comment="qemu-kvm-1.5.3-175.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828263" comment="qemu-kvm-common-1.5.3-175.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828264" comment="qemu-kvm-tools-1.5.3-175.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201920386" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20386</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20386" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20386" ref_url="https://www.suse.com/security/cve/CVE-2019-20386" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:361-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:48-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:53-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0335-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0208-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3SLX2X3J4XZECXPBKC7QV2ZINGO53ABE/" source="SUSE-SU"/>
    <description>
    An issue was discovered in button_open in login/logind-button.c in systemd before 243. When executing the udevadm trigger command, a memory leak may occur.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20386/">CVE-2019-20386 at SUSE</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20386">CVE-2019-20386 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1161436">SUSE bug 1161436</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828471" comment="libgudev1-219-78.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828472" comment="libgudev1-devel-219-78.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828473" comment="systemd-219-78.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828474" comment="systemd-devel-219-78.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828475" comment="systemd-journal-gateway-219-78.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828476" comment="systemd-libs-219-78.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828477" comment="systemd-networkd-219-78.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828478" comment="systemd-python-219-78.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828479" comment="systemd-resolved-219-78.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828480" comment="systemd-sysv-219-78.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201920388" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20388</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20388" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20388" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20388" ref_url="https://www.suse.com/security/cve/CVE-2019-20388" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008797.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0681-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/75OUBX7RPPAARGW2FKOWVC52NVIH42S5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14697-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U5YNW74OL2W7SH2XTAVN5TODNFIVFL3Y/" source="SUSE-SU"/>
    <description>
    xmlSchemaPreRun in xmlschemas.c in libxml2 2.9.10 allows an xmlSchemaValidateStream memory leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20388/">CVE-2019-20388 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20388">CVE-2019-20388 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1161521">SUSE bug 1161521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191860">SUSE bug 1191860</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828403" comment="libxml2-2.9.1-6.el7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828404" comment="libxml2-devel-2.9.1-6.el7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828405" comment="libxml2-python-2.9.1-6.el7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828406" comment="libxml2-static-2.9.1-6.el7.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201920479" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20479</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20479" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20479" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20479" ref_url="https://www.suse.com/security/cve/CVE-2019-20479" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023659.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0376-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NIP3SQQXT63Y5HR5DRBJROQ2MS2JCC22/" source="SUSE-SU"/>
    <description>
    A flaw was found in mod_auth_openidc before version 2.4.1. An open redirect issue exists in URLs with a slash and backslash at the beginning.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-12-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-20479/">CVE-2019-20479 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20479">CVE-2019-20479 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1164459">SUSE bug 1164459</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828319" comment="mod_auth_openidc-1.8.8-7.el7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201920485" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20485</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20485" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20485" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20485" ref_url="https://www.suse.com/security/cve/CVE-2019-20485" source="SUSE CVE"/>
    <description>
    qemu/qemu_driver.c in libvirt before 6.0.0 mishandles the holding of a monitor job during a query to a guest agent, which allows attackers to cause a denial of service (API blockage).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20485/">CVE-2019-20485 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20485">CVE-2019-20485 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1165616">SUSE bug 1165616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168683">SUSE bug 1168683</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828407" comment="libvirt-4.5.0-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828408" comment="libvirt-admin-4.5.0-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828409" comment="libvirt-bash-completion-4.5.0-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828410" comment="libvirt-client-4.5.0-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828411" comment="libvirt-daemon-4.5.0-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828412" comment="libvirt-daemon-config-network-4.5.0-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828413" comment="libvirt-daemon-config-nwfilter-4.5.0-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828414" comment="libvirt-daemon-driver-interface-4.5.0-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828415" comment="libvirt-daemon-driver-lxc-4.5.0-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828416" comment="libvirt-daemon-driver-network-4.5.0-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828417" comment="libvirt-daemon-driver-nodedev-4.5.0-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828418" comment="libvirt-daemon-driver-nwfilter-4.5.0-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828419" comment="libvirt-daemon-driver-qemu-4.5.0-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828420" comment="libvirt-daemon-driver-secret-4.5.0-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828421" comment="libvirt-daemon-driver-storage-4.5.0-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828422" comment="libvirt-daemon-driver-storage-core-4.5.0-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828423" comment="libvirt-daemon-driver-storage-disk-4.5.0-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828424" comment="libvirt-daemon-driver-storage-gluster-4.5.0-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828425" comment="libvirt-daemon-driver-storage-iscsi-4.5.0-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828426" comment="libvirt-daemon-driver-storage-logical-4.5.0-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828427" comment="libvirt-daemon-driver-storage-mpath-4.5.0-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828428" comment="libvirt-daemon-driver-storage-rbd-4.5.0-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828429" comment="libvirt-daemon-driver-storage-scsi-4.5.0-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828430" comment="libvirt-daemon-kvm-4.5.0-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828431" comment="libvirt-daemon-lxc-4.5.0-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828432" comment="libvirt-devel-4.5.0-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828433" comment="libvirt-docs-4.5.0-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828434" comment="libvirt-libs-4.5.0-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828435" comment="libvirt-lock-sanlock-4.5.0-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828436" comment="libvirt-login-shell-4.5.0-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828437" comment="libvirt-nss-4.5.0-36.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201920503" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20503</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20503" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20503" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20503" ref_url="https://www.suse.com/security/cve/CVE-2019-20503" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006628.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006599.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0340-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KHPFCQ63EOQXZDGBRU642ETLDYDU7FRW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0365-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HGL3YWEWUN75GTMINUSKZKQIQ6MO4NDA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0366-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M4XSGNQTGWEYYC34KIWMTBKR7IVQN3XO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0389-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WW3SNSMEGRDYQ4Y6PCVLKAPOLTCQF2FP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    usrsctp before 2019-12-20 has out-of-bounds reads in sctp_load_addresses_from_init.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-20503/">CVE-2019-20503 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20503">CVE-2019-20503 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1166238">SUSE bug 1166238</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167090">SUSE bug 1167090</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826932" comment="firefox-68.6.0-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826964" comment="thunderbird-68.6.0-1.el7_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201920636" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20636</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20636" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20636" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20636" ref_url="https://www.suse.com/security/cve/CVE-2019-20636" source="SUSE CVE"/>
    <description>
    In the Linux kernel before 5.4.12, drivers/input/input.c has out-of-bounds writes via a crafted keycode table, as demonstrated by input_set_keycode, aka CID-cb222aed03d7.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-20636/">CVE-2019-20636 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20636">CVE-2019-20636 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1168075">SUSE bug 1168075</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828543" comment="bpftool-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828544" comment="kernel-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828545" comment="kernel-abi-whitelists-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828546" comment="kernel-debug-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828549" comment="kernel-doc-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828550" comment="kernel-headers-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828551" comment="kernel-tools-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828552" comment="kernel-tools-libs-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828554" comment="perf-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828555" comment="python-perf-3.10.0-1160.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201920811" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20811</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20811" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20811" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20811" ref_url="https://www.suse.com/security/cve/CVE-2019-20811" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1651-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1668-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011310.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.0.6. In rx_queue_add_kobject() and netdev_queue_add_kobject() in net/core/net-sysfs.c, a reference count is mishandled, aka CID-a3e23f719f5c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20811/">CVE-2019-20811 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20811">CVE-2019-20811 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1172456">SUSE bug 1172456</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828737" comment="bpftool-3.10.0-1160.6.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828738" comment="kernel-3.10.0-1160.6.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828739" comment="kernel-abi-whitelists-3.10.0-1160.6.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828740" comment="kernel-debug-3.10.0-1160.6.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828743" comment="kernel-doc-3.10.0-1160.6.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828744" comment="kernel-headers-3.10.0-1160.6.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828745" comment="kernel-tools-3.10.0-1160.6.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828746" comment="kernel-tools-libs-3.10.0-1160.6.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828748" comment="perf-3.10.0-1160.6.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828749" comment="python-perf-3.10.0-1160.6.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201920907" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20907</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20907" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20907" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20907" ref_url="https://www.suse.com/security/cve/CVE-2019-20907" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:17-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0444-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0447-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0450-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0452-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0456-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021358.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20492-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024203.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1254-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TG2EXCXRVU6CVJPO4YGOI5QI6ZYPE5MF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1257-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/L55Z4K254SOWYSZ2NJQQPAT7PFMYEWIR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1258-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RAREW56JQZJSWCPC4FGALUA3UC5IDC3E/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1265-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MMY6CQR6V6UDNGDSNLCCA34KJTQQIHW2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2332-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S3JTHM6LLDKL7VPNRJUSRPNZAD2FZ25H/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2333-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FLGERALYYFTBIX3ZKPM6EQ2WJVUXLOXY/" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/pipermail/neuvector-updates/2023-November/000021.html" source="SUSE-SU"/>
    <description>
    In Lib/tarfile.py in Python through 3.8.3, an attacker is able to craft a TAR archive leading to an infinite loop when opened by tarfile.open, because _proc_pax lacks header validation.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-02-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20907/">CVE-2019-20907 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20907">CVE-2019-20907 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1174091">SUSE bug 1174091</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828669" comment="python-2.7.5-90.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828670" comment="python-debug-2.7.5-90.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828671" comment="python-devel-2.7.5-90.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828672" comment="python-libs-2.7.5-90.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828673" comment="python-test-2.7.5-90.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828674" comment="python-tools-2.7.5-90.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828676" comment="python3-3.6.8-18.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828677" comment="python3-debug-3.6.8-18.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828678" comment="python3-devel-3.6.8-18.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828679" comment="python3-idle-3.6.8-18.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828680" comment="python3-libs-3.6.8-18.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828681" comment="python3-test-3.6.8-18.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828682" comment="python3-tkinter-3.6.8-18.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828675" comment="tkinter-2.7.5-90.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201920916" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20916</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20916" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20916" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20916" ref_url="https://www.suse.com/security/cve/CVE-2019-20916" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:750-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007932.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:17-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2021:2130-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-June/019414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0444-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0447-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0450-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0452-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0456-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2726-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3016-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007889.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3593-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3594-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3865-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0432-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1454-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0516-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013882.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1598-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RAEVYJJYMY5RTYMCNI2TPKL6Z5Y4O6IO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1613-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SZNJECZOYFETF5WEVEBW763UUD34HBGH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2143-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LG3I7MSGZF7WN3YNM7ML4QMO6MXYUU73/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2152-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4KXU352TPOYPGUNSKDJRXFXWPD5NF32K/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2169-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7DKY5FFZVXAPBL5ATB6LJG4VYEF3GOLN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2184-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G3AA6BSUJEGBBKUCQO6J25OSG7PA6ZKH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2185-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KOMPFK5R4IK4IFOQTL5NIJK6DKSYRSXT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2189-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/E2GBJR7SZL3UIJETOGQDYOPIODBESJYI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2190-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/623Y5GJHFGANTQ36ECKXIXY3QVKGYSCE/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2211-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EUMJS3WWV7Y2IVJFRMZNDUXZBSPWORBP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0270-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WUT6BSX5663NCXU3Y4KR3RA3RQHJMCFI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0331-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3AKEBUCTPHZWXJGF6EWK7HBTO726SP2Y/" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/pipermail/neuvector-updates/2023-November/000021.html" source="SUSE-SU"/>
    <description>
    The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20916/">CVE-2019-20916 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20916">CVE-2019-20916 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1176262">SUSE bug 1176262</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829744" comment="python-virtualenv-15.1.0-7.el7_9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201920934" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20934</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20934" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20934" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20934" ref_url="https://www.suse.com/security/cve/CVE-2019-20934" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0075-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H7EJISS2OPKUSJFJ2BG5ZWHA2Z6H3VQB/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.2.6. On NUMA systems, the Linux fair scheduler has a use-after-free in show_numa_stats() because NUMA fault statistics are inappropriately freed, aka CID-16d51a590a8c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-20934/">CVE-2019-20934 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20934">CVE-2019-20934 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1179663">SUSE bug 1179663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179666">SUSE bug 1179666</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829207" comment="bpftool-3.10.0-1160.36.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829208" comment="kernel-3.10.0-1160.36.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829209" comment="kernel-abi-whitelists-3.10.0-1160.36.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829210" comment="kernel-debug-3.10.0-1160.36.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829213" comment="kernel-doc-3.10.0-1160.36.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829214" comment="kernel-headers-3.10.0-1160.36.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829215" comment="kernel-tools-3.10.0-1160.36.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829216" comment="kernel-tools-libs-3.10.0-1160.36.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829218" comment="perf-3.10.0-1160.36.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829219" comment="python-perf-3.10.0-1160.36.2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192422" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2422</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2422" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2422" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2422" ref_url="https://www.suse.com/security/cve/CVE-2019-2422" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0585-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190585-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13978-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005193.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0161-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ORCDRSEWQ6BJYEU2ZLJO4T4GEPU43V5Y/#ORCDRSEWQ6BJYEU2ZLJO4T4GEPU43V5Y" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0346-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FDKUXCDPLO7SR6NRODPJR2SF7OTNKJWB/#FDKUXCDPLO7SR6NRODPJR2SF7OTNKJWB" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1439-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SRTWOMLHK3HQNCIFSWBLQE7M6MCMULOE/#SRTWOMLHK3HQNCIFSWBLQE7M6MCMULOE" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FB3JSJFJ65CTYO56ZD763FBI6DRQHHVR/#FB3JSJFJ65CTYO56ZD763FBI6DRQHHVR" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u201, 8u192 and 11.0.1; Java SE Embedded: 8u191. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-07"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2422/">CVE-2019-2422 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2422">CVE-2019-2422 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1122293">SUSE bug 1122293</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825580" comment="java-1.7.0-openjdk-1.7.0.211-2.6.17.1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825581" comment="java-1.7.0-openjdk-accessibility-1.7.0.211-2.6.17.1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825582" comment="java-1.7.0-openjdk-demo-1.7.0.211-2.6.17.1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825583" comment="java-1.7.0-openjdk-devel-1.7.0.211-2.6.17.1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825584" comment="java-1.7.0-openjdk-headless-1.7.0.211-2.6.17.1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825585" comment="java-1.7.0-openjdk-javadoc-1.7.0.211-2.6.17.1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825586" comment="java-1.7.0-openjdk-src-1.7.0.211-2.6.17.1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825548" comment="java-1.8.0-openjdk-1.8.0.201.b09-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825549" comment="java-1.8.0-openjdk-accessibility-1.8.0.201.b09-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825550" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.201.b09-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825551" comment="java-1.8.0-openjdk-debug-1.8.0.201.b09-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825552" comment="java-1.8.0-openjdk-demo-1.8.0.201.b09-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825553" comment="java-1.8.0-openjdk-demo-debug-1.8.0.201.b09-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825554" comment="java-1.8.0-openjdk-devel-1.8.0.201.b09-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825555" comment="java-1.8.0-openjdk-devel-debug-1.8.0.201.b09-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825556" comment="java-1.8.0-openjdk-headless-1.8.0.201.b09-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825557" comment="java-1.8.0-openjdk-headless-debug-1.8.0.201.b09-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825558" comment="java-1.8.0-openjdk-javadoc-1.8.0.201.b09-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825559" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.201.b09-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825560" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.201.b09-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825561" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.201.b09-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825562" comment="java-1.8.0-openjdk-src-1.8.0.201.b09-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825563" comment="java-1.8.0-openjdk-src-debug-1.8.0.201.b09-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825564" comment="java-11-openjdk-11.0.2.7-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825565" comment="java-11-openjdk-debug-11.0.2.7-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825566" comment="java-11-openjdk-demo-11.0.2.7-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825567" comment="java-11-openjdk-demo-debug-11.0.2.7-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825568" comment="java-11-openjdk-devel-11.0.2.7-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825569" comment="java-11-openjdk-devel-debug-11.0.2.7-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825570" comment="java-11-openjdk-headless-11.0.2.7-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825571" comment="java-11-openjdk-headless-debug-11.0.2.7-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825572" comment="java-11-openjdk-javadoc-11.0.2.7-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825573" comment="java-11-openjdk-javadoc-debug-11.0.2.7-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825574" comment="java-11-openjdk-javadoc-zip-11.0.2.7-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825575" comment="java-11-openjdk-javadoc-zip-debug-11.0.2.7-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825576" comment="java-11-openjdk-jmods-11.0.2.7-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825577" comment="java-11-openjdk-jmods-debug-11.0.2.7-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825578" comment="java-11-openjdk-src-11.0.2.7-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825579" comment="java-11-openjdk-src-debug-11.0.2.7-0.el7_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201925013" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-25013</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-25013" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-25013" ref_url="https://www.suse.com/security/cve/CVE-2019-25013" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:57-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:58-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:59-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0653-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008397.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0579-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018088.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0358-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WMNRZB427QFJOPYP4EA4KBZOTT622NY3/" source="SUSE-SU"/>
    <description>
    The iconv feature in the GNU C Library (aka glibc or libc6) through 2.32, when processing invalid multi-byte input sequences in the EUC-KR encoding, may have a buffer over-read.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-25013/">CVE-2019-25013 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-25013">CVE-2019-25013 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1182117">SUSE bug 1182117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220988">SUSE bug 1220988</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828938" comment="glibc-2.17-322.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828939" comment="glibc-common-2.17-322.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828940" comment="glibc-devel-2.17-322.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828941" comment="glibc-headers-2.17-322.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828942" comment="glibc-static-2.17-322.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828943" comment="glibc-utils-2.17-322.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828944" comment="nscd-2.17-322.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192503" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2503</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2503" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2503" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2503" ref_url="https://www.suse.com/security/cve/CVE-2019-2503" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:0138-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TTCAAVZAMA2OKJYY5RKTV5VCZWZ5Z2EN/#TTCAAVZAMA2OKJYY5RKTV5VCZWZ5Z2EN" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Connection Handling). Supported versions that are affected are 5.6.42 and prior, 5.7.24 and prior and 8.0.13 and prior. Difficult to exploit vulnerability allows low privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.4 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2503/">CVE-2019-2503 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2503">CVE-2019-2503 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1122198">SUSE bug 1122198</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826567" comment="mariadb-5.5.64-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826568" comment="mariadb-bench-5.5.64-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826569" comment="mariadb-devel-5.5.64-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826570" comment="mariadb-embedded-5.5.64-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826571" comment="mariadb-embedded-devel-5.5.64-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826572" comment="mariadb-libs-5.5.64-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826573" comment="mariadb-server-5.5.64-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826574" comment="mariadb-test-5.5.64-1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192529" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2529</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2529" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2529" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2529" ref_url="https://www.suse.com/security/cve/CVE-2019-2529" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005813.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0138-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TTCAAVZAMA2OKJYY5RKTV5VCZWZ5Z2EN/#TTCAAVZAMA2OKJYY5RKTV5VCZWZ5Z2EN" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.6.42 and prior, 5.7.24 and prior and 8.0.13 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2529/">CVE-2019-2529 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2529">CVE-2019-2529 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1122198">SUSE bug 1122198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136037">SUSE bug 1136037</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826567" comment="mariadb-5.5.64-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826568" comment="mariadb-bench-5.5.64-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826569" comment="mariadb-devel-5.5.64-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826570" comment="mariadb-embedded-5.5.64-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826571" comment="mariadb-embedded-devel-5.5.64-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826572" comment="mariadb-libs-5.5.64-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826573" comment="mariadb-server-5.5.64-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826574" comment="mariadb-test-5.5.64-1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192602" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2602</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2602" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2602" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2602" ref_url="https://www.suse.com/security/cve/CVE-2019-2602" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1211-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1308-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005616.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1327-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZNMUQ7IKH7EC73W444I4WQG4VKHBRBWR/#ZNMUQ7IKH7EC73W444I4WQG4VKHBRBWR" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1438-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7O77T6GROGFAGVFEVEOJLXNTO37WYB7M/#7O77T6GROGFAGVFEVEOJLXNTO37WYB7M" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1439-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SRTWOMLHK3HQNCIFSWBLQE7M6MCMULOE/#SRTWOMLHK3HQNCIFSWBLQE7M6MCMULOE" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FB3JSJFJ65CTYO56ZD763FBI6DRQHHVR/#FB3JSJFJ65CTYO56ZD763FBI6DRQHHVR" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u211, 8u202, 11.0.2 and 12; Java SE Embedded: 8u201. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Java SE, Java SE Embedded. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2602/">CVE-2019-2602 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2602">CVE-2019-2602 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1132728">SUSE bug 1132728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134718">SUSE bug 1134718</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825679" comment="java-1.7.0-openjdk-1.7.0.221-2.6.18.0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825680" comment="java-1.7.0-openjdk-accessibility-1.7.0.221-2.6.18.0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825681" comment="java-1.7.0-openjdk-demo-1.7.0.221-2.6.18.0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825682" comment="java-1.7.0-openjdk-devel-1.7.0.221-2.6.18.0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825683" comment="java-1.7.0-openjdk-headless-1.7.0.221-2.6.18.0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825684" comment="java-1.7.0-openjdk-javadoc-1.7.0.221-2.6.18.0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825685" comment="java-1.7.0-openjdk-src-1.7.0.221-2.6.18.0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825647" comment="java-1.8.0-openjdk-1.8.0.212.b04-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825648" comment="java-1.8.0-openjdk-accessibility-1.8.0.212.b04-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825649" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.212.b04-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825650" comment="java-1.8.0-openjdk-debug-1.8.0.212.b04-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825651" comment="java-1.8.0-openjdk-demo-1.8.0.212.b04-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825652" comment="java-1.8.0-openjdk-demo-debug-1.8.0.212.b04-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825653" comment="java-1.8.0-openjdk-devel-1.8.0.212.b04-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825654" comment="java-1.8.0-openjdk-devel-debug-1.8.0.212.b04-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825655" comment="java-1.8.0-openjdk-headless-1.8.0.212.b04-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825656" comment="java-1.8.0-openjdk-headless-debug-1.8.0.212.b04-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825657" comment="java-1.8.0-openjdk-javadoc-1.8.0.212.b04-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825658" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.212.b04-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825659" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.212.b04-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825660" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.212.b04-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825661" comment="java-1.8.0-openjdk-src-1.8.0.212.b04-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825662" comment="java-1.8.0-openjdk-src-debug-1.8.0.212.b04-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825663" comment="java-11-openjdk-11.0.3.7-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825664" comment="java-11-openjdk-debug-11.0.3.7-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825665" comment="java-11-openjdk-demo-11.0.3.7-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825666" comment="java-11-openjdk-demo-debug-11.0.3.7-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825667" comment="java-11-openjdk-devel-11.0.3.7-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825668" comment="java-11-openjdk-devel-debug-11.0.3.7-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825669" comment="java-11-openjdk-headless-11.0.3.7-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825670" comment="java-11-openjdk-headless-debug-11.0.3.7-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825671" comment="java-11-openjdk-javadoc-11.0.3.7-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825672" comment="java-11-openjdk-javadoc-debug-11.0.3.7-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825673" comment="java-11-openjdk-javadoc-zip-11.0.3.7-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825674" comment="java-11-openjdk-javadoc-zip-debug-11.0.3.7-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825675" comment="java-11-openjdk-jmods-11.0.3.7-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825676" comment="java-11-openjdk-jmods-debug-11.0.3.7-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825677" comment="java-11-openjdk-src-11.0.3.7-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825678" comment="java-11-openjdk-src-debug-11.0.3.7-0.el7_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192614" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2614</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2614" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2614" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2614" ref_url="https://www.suse.com/security/cve/CVE-2019-2614" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2867-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192867-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006248.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1913-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RDO2MTJJEZTLDADTA3HBUUS3EZQVKVCI/#RDO2MTJJEZTLDADTA3HBUUS3EZQVKVCI" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1915-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OXQKXAPAJJT33LGJQ6CM5JKXLFJQB3SV/#OXQKXAPAJJT33LGJQ6CM5JKXLFJQB3SV" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Replication). Supported versions that are affected are 5.6.43 and prior, 5.7.25 and prior and 8.0.15 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2614/">CVE-2019-2614 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2614">CVE-2019-2614 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1132826">SUSE bug 1132826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136035">SUSE bug 1136035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141798">SUSE bug 1141798</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826567" comment="mariadb-5.5.64-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826568" comment="mariadb-bench-5.5.64-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826569" comment="mariadb-devel-5.5.64-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826570" comment="mariadb-embedded-5.5.64-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826571" comment="mariadb-embedded-devel-5.5.64-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826572" comment="mariadb-libs-5.5.64-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826573" comment="mariadb-server-5.5.64-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826574" comment="mariadb-test-5.5.64-1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192627" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2627</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2627" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2627" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2627" ref_url="https://www.suse.com/security/cve/CVE-2019-2627" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2867-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192867-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006248.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1913-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RDO2MTJJEZTLDADTA3HBUUS3EZQVKVCI/#RDO2MTJJEZTLDADTA3HBUUS3EZQVKVCI" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1915-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OXQKXAPAJJT33LGJQ6CM5JKXLFJQB3SV/#OXQKXAPAJJT33LGJQ6CM5JKXLFJQB3SV" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Privileges). Supported versions that are affected are 5.6.43 and prior, 5.7.25 and prior and 8.0.15 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2627/">CVE-2019-2627 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2627">CVE-2019-2627 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1132826">SUSE bug 1132826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136035">SUSE bug 1136035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141798">SUSE bug 1141798</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826567" comment="mariadb-5.5.64-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826568" comment="mariadb-bench-5.5.64-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826569" comment="mariadb-devel-5.5.64-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826570" comment="mariadb-embedded-5.5.64-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826571" comment="mariadb-embedded-devel-5.5.64-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826572" comment="mariadb-libs-5.5.64-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826573" comment="mariadb-server-5.5.64-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826574" comment="mariadb-test-5.5.64-1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192684" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2684</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2684" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2684" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2684" ref_url="https://www.suse.com/security/cve/CVE-2019-2684" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1211-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1308-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005616.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1327-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZNMUQ7IKH7EC73W444I4WQG4VKHBRBWR/#ZNMUQ7IKH7EC73W444I4WQG4VKHBRBWR" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1438-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7O77T6GROGFAGVFEVEOJLXNTO37WYB7M/#7O77T6GROGFAGVFEVEOJLXNTO37WYB7M" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1439-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SRTWOMLHK3HQNCIFSWBLQE7M6MCMULOE/#SRTWOMLHK3HQNCIFSWBLQE7M6MCMULOE" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FB3JSJFJ65CTYO56ZD763FBI6DRQHHVR/#FB3JSJFJ65CTYO56ZD763FBI6DRQHHVR" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 7u211, 8u202, 11.0.2 and 12; Java SE Embedded: 8u201. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2684/">CVE-2019-2684 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2684">CVE-2019-2684 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1132732">SUSE bug 1132732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134718">SUSE bug 1134718</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184734">SUSE bug 1184734</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825679" comment="java-1.7.0-openjdk-1.7.0.221-2.6.18.0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825680" comment="java-1.7.0-openjdk-accessibility-1.7.0.221-2.6.18.0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825681" comment="java-1.7.0-openjdk-demo-1.7.0.221-2.6.18.0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825682" comment="java-1.7.0-openjdk-devel-1.7.0.221-2.6.18.0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825683" comment="java-1.7.0-openjdk-headless-1.7.0.221-2.6.18.0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825684" comment="java-1.7.0-openjdk-javadoc-1.7.0.221-2.6.18.0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825685" comment="java-1.7.0-openjdk-src-1.7.0.221-2.6.18.0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825647" comment="java-1.8.0-openjdk-1.8.0.212.b04-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825648" comment="java-1.8.0-openjdk-accessibility-1.8.0.212.b04-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825649" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.212.b04-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825650" comment="java-1.8.0-openjdk-debug-1.8.0.212.b04-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825651" comment="java-1.8.0-openjdk-demo-1.8.0.212.b04-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825652" comment="java-1.8.0-openjdk-demo-debug-1.8.0.212.b04-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825653" comment="java-1.8.0-openjdk-devel-1.8.0.212.b04-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825654" comment="java-1.8.0-openjdk-devel-debug-1.8.0.212.b04-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825655" comment="java-1.8.0-openjdk-headless-1.8.0.212.b04-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825656" comment="java-1.8.0-openjdk-headless-debug-1.8.0.212.b04-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825657" comment="java-1.8.0-openjdk-javadoc-1.8.0.212.b04-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825658" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.212.b04-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825659" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.212.b04-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825660" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.212.b04-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825661" comment="java-1.8.0-openjdk-src-1.8.0.212.b04-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825662" comment="java-1.8.0-openjdk-src-debug-1.8.0.212.b04-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825663" comment="java-11-openjdk-11.0.3.7-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825664" comment="java-11-openjdk-debug-11.0.3.7-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825665" comment="java-11-openjdk-demo-11.0.3.7-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825666" comment="java-11-openjdk-demo-debug-11.0.3.7-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825667" comment="java-11-openjdk-devel-11.0.3.7-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825668" comment="java-11-openjdk-devel-debug-11.0.3.7-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825669" comment="java-11-openjdk-headless-11.0.3.7-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825670" comment="java-11-openjdk-headless-debug-11.0.3.7-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825671" comment="java-11-openjdk-javadoc-11.0.3.7-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825672" comment="java-11-openjdk-javadoc-debug-11.0.3.7-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825673" comment="java-11-openjdk-javadoc-zip-11.0.3.7-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825674" comment="java-11-openjdk-javadoc-zip-debug-11.0.3.7-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825675" comment="java-11-openjdk-jmods-11.0.3.7-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825676" comment="java-11-openjdk-jmods-debug-11.0.3.7-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825677" comment="java-11-openjdk-src-11.0.3.7-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825678" comment="java-11-openjdk-src-debug-11.0.3.7-0.el7_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192698" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2698</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2698" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2698" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2698" ref_url="https://www.suse.com/security/cve/CVE-2019-2698" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1211-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1308-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005616.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1438-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7O77T6GROGFAGVFEVEOJLXNTO37WYB7M/#7O77T6GROGFAGVFEVEOJLXNTO37WYB7M" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1439-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SRTWOMLHK3HQNCIFSWBLQE7M6MCMULOE/#SRTWOMLHK3HQNCIFSWBLQE7M6MCMULOE" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FB3JSJFJ65CTYO56ZD763FBI6DRQHHVR/#FB3JSJFJ65CTYO56ZD763FBI6DRQHHVR" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE component of Oracle Java SE (subcomponent: 2D). Supported versions that are affected are Java SE: 7u211 and 8u202. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-02"/>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-2698/">CVE-2019-2698 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2698">CVE-2019-2698 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1132729">SUSE bug 1132729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134718">SUSE bug 1134718</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163365">SUSE bug 1163365</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825679" comment="java-1.7.0-openjdk-1.7.0.221-2.6.18.0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825680" comment="java-1.7.0-openjdk-accessibility-1.7.0.221-2.6.18.0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825681" comment="java-1.7.0-openjdk-demo-1.7.0.221-2.6.18.0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825682" comment="java-1.7.0-openjdk-devel-1.7.0.221-2.6.18.0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825683" comment="java-1.7.0-openjdk-headless-1.7.0.221-2.6.18.0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825684" comment="java-1.7.0-openjdk-javadoc-1.7.0.221-2.6.18.0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825685" comment="java-1.7.0-openjdk-src-1.7.0.221-2.6.18.0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825647" comment="java-1.8.0-openjdk-1.8.0.212.b04-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825648" comment="java-1.8.0-openjdk-accessibility-1.8.0.212.b04-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825649" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.212.b04-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825650" comment="java-1.8.0-openjdk-debug-1.8.0.212.b04-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825651" comment="java-1.8.0-openjdk-demo-1.8.0.212.b04-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825652" comment="java-1.8.0-openjdk-demo-debug-1.8.0.212.b04-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825653" comment="java-1.8.0-openjdk-devel-1.8.0.212.b04-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825654" comment="java-1.8.0-openjdk-devel-debug-1.8.0.212.b04-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825655" comment="java-1.8.0-openjdk-headless-1.8.0.212.b04-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825656" comment="java-1.8.0-openjdk-headless-debug-1.8.0.212.b04-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825657" comment="java-1.8.0-openjdk-javadoc-1.8.0.212.b04-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825658" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.212.b04-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825659" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.212.b04-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825660" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.212.b04-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825661" comment="java-1.8.0-openjdk-src-1.8.0.212.b04-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825662" comment="java-1.8.0-openjdk-src-debug-1.8.0.212.b04-0.el7_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192737" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2737</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2737" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2737" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2737" ref_url="https://www.suse.com/security/cve/CVE-2019-2737" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3369-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193369-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006654.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2698-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EL25YKJX6ZC6Q322TAJNA7AK5OZSDX2O/#EL25YKJX6ZC6Q322TAJNA7AK5OZSDX2O" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server : Pluggable Auth). Supported versions that are affected are 5.6.44 and prior, 5.7.26 and prior and 8.0.16 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-2737/">CVE-2019-2737 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2737">CVE-2019-2737 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1132826">SUSE bug 1132826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141798">SUSE bug 1141798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156669">SUSE bug 1156669</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827752" comment="mariadb-5.5.65-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827753" comment="mariadb-bench-5.5.65-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827754" comment="mariadb-devel-5.5.65-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827755" comment="mariadb-embedded-5.5.65-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827756" comment="mariadb-embedded-devel-5.5.65-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827757" comment="mariadb-libs-5.5.65-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827758" comment="mariadb-server-5.5.65-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827759" comment="mariadb-test-5.5.65-1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192739" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2739</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2739" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2739" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2739" ref_url="https://www.suse.com/security/cve/CVE-2019-2739" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3369-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193369-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006654.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2698-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EL25YKJX6ZC6Q322TAJNA7AK5OZSDX2O/#EL25YKJX6ZC6Q322TAJNA7AK5OZSDX2O" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Privileges). Supported versions that are affected are 5.6.44 and prior, 5.7.26 and prior and 8.0.16 and prior. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 5.1 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-2739/">CVE-2019-2739 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2739">CVE-2019-2739 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1132826">SUSE bug 1132826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141798">SUSE bug 1141798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156669">SUSE bug 1156669</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827752" comment="mariadb-5.5.65-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827753" comment="mariadb-bench-5.5.65-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827754" comment="mariadb-devel-5.5.65-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827755" comment="mariadb-embedded-5.5.65-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827756" comment="mariadb-embedded-devel-5.5.65-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827757" comment="mariadb-libs-5.5.65-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827758" comment="mariadb-server-5.5.65-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827759" comment="mariadb-test-5.5.65-1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192740" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2740</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2740" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2740" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2740" ref_url="https://www.suse.com/security/cve/CVE-2019-2740" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3369-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193369-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006654.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2698-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EL25YKJX6ZC6Q322TAJNA7AK5OZSDX2O/#EL25YKJX6ZC6Q322TAJNA7AK5OZSDX2O" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: XML). Supported versions that are affected are 5.6.44 and prior, 5.7.26 and prior and 8.0.16 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-2740/">CVE-2019-2740 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2740">CVE-2019-2740 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1132826">SUSE bug 1132826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141798">SUSE bug 1141798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156669">SUSE bug 1156669</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827752" comment="mariadb-5.5.65-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827753" comment="mariadb-bench-5.5.65-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827754" comment="mariadb-devel-5.5.65-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827755" comment="mariadb-embedded-5.5.65-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827756" comment="mariadb-embedded-devel-5.5.65-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827757" comment="mariadb-libs-5.5.65-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827758" comment="mariadb-server-5.5.65-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827759" comment="mariadb-test-5.5.65-1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192745" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2745</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2745" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2745" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2745" ref_url="https://www.suse.com/security/cve/CVE-2019-2745" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2002-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192002-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2036-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005820.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1912-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WLAA33SFC2BQWUMXROFQCWU3SJN2HD7O/#WLAA33SFC2BQWUMXROFQCWU3SJN2HD7O" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1916-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7CWQDHDFTQ5TMYECHR6T3YTCURIWVTNU/#7CWQDHDFTQ5TMYECHR6T3YTCURIWVTNU" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 7u221, 8u212 and 11.0.3. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Java SE executes to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2745/">CVE-2019-2745 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2745">CVE-2019-2745 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1141784">SUSE bug 1141784</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825925" comment="java-1.7.0-openjdk-1.7.0.231-2.6.19.1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825926" comment="java-1.7.0-openjdk-accessibility-1.7.0.231-2.6.19.1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825927" comment="java-1.7.0-openjdk-demo-1.7.0.231-2.6.19.1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825928" comment="java-1.7.0-openjdk-devel-1.7.0.231-2.6.19.1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825929" comment="java-1.7.0-openjdk-headless-1.7.0.231-2.6.19.1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825930" comment="java-1.7.0-openjdk-javadoc-1.7.0.231-2.6.19.1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825931" comment="java-1.7.0-openjdk-src-1.7.0.231-2.6.19.1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825909" comment="java-1.8.0-openjdk-1.8.0.222.b10-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825910" comment="java-1.8.0-openjdk-accessibility-1.8.0.222.b10-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825911" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.222.b10-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825912" comment="java-1.8.0-openjdk-debug-1.8.0.222.b10-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825913" comment="java-1.8.0-openjdk-demo-1.8.0.222.b10-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825914" comment="java-1.8.0-openjdk-demo-debug-1.8.0.222.b10-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825915" comment="java-1.8.0-openjdk-devel-1.8.0.222.b10-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825916" comment="java-1.8.0-openjdk-devel-debug-1.8.0.222.b10-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825917" comment="java-1.8.0-openjdk-headless-1.8.0.222.b10-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825918" comment="java-1.8.0-openjdk-headless-debug-1.8.0.222.b10-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825919" comment="java-1.8.0-openjdk-javadoc-1.8.0.222.b10-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825920" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.222.b10-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825921" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.222.b10-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825922" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.222.b10-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825923" comment="java-1.8.0-openjdk-src-1.8.0.222.b10-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825924" comment="java-1.8.0-openjdk-src-debug-1.8.0.222.b10-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825893" comment="java-11-openjdk-11.0.4.11-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825894" comment="java-11-openjdk-debug-11.0.4.11-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825895" comment="java-11-openjdk-demo-11.0.4.11-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825896" comment="java-11-openjdk-demo-debug-11.0.4.11-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825897" comment="java-11-openjdk-devel-11.0.4.11-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825898" comment="java-11-openjdk-devel-debug-11.0.4.11-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825899" comment="java-11-openjdk-headless-11.0.4.11-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825900" comment="java-11-openjdk-headless-debug-11.0.4.11-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825901" comment="java-11-openjdk-javadoc-11.0.4.11-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825902" comment="java-11-openjdk-javadoc-debug-11.0.4.11-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825903" comment="java-11-openjdk-javadoc-zip-11.0.4.11-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825904" comment="java-11-openjdk-javadoc-zip-debug-11.0.4.11-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825905" comment="java-11-openjdk-jmods-11.0.4.11-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825906" comment="java-11-openjdk-jmods-debug-11.0.4.11-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825907" comment="java-11-openjdk-src-11.0.4.11-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825908" comment="java-11-openjdk-src-debug-11.0.4.11-0.el7_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192762" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2762</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2762" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2762" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2762" ref_url="https://www.suse.com/security/cve/CVE-2019-2762" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2002-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192002-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2036-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2291-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192291-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2371-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192371-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1912-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WLAA33SFC2BQWUMXROFQCWU3SJN2HD7O/#WLAA33SFC2BQWUMXROFQCWU3SJN2HD7O" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1916-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7CWQDHDFTQ5TMYECHR6T3YTCURIWVTNU/#7CWQDHDFTQ5TMYECHR6T3YTCURIWVTNU" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Utilities). Supported versions that are affected are Java SE: 7u221, 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2762/">CVE-2019-2762 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2762">CVE-2019-2762 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1141782">SUSE bug 1141782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1147021">SUSE bug 1147021</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825925" comment="java-1.7.0-openjdk-1.7.0.231-2.6.19.1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825926" comment="java-1.7.0-openjdk-accessibility-1.7.0.231-2.6.19.1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825927" comment="java-1.7.0-openjdk-demo-1.7.0.231-2.6.19.1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825928" comment="java-1.7.0-openjdk-devel-1.7.0.231-2.6.19.1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825929" comment="java-1.7.0-openjdk-headless-1.7.0.231-2.6.19.1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825930" comment="java-1.7.0-openjdk-javadoc-1.7.0.231-2.6.19.1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825931" comment="java-1.7.0-openjdk-src-1.7.0.231-2.6.19.1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825909" comment="java-1.8.0-openjdk-1.8.0.222.b10-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825910" comment="java-1.8.0-openjdk-accessibility-1.8.0.222.b10-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825911" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.222.b10-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825912" comment="java-1.8.0-openjdk-debug-1.8.0.222.b10-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825913" comment="java-1.8.0-openjdk-demo-1.8.0.222.b10-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825914" comment="java-1.8.0-openjdk-demo-debug-1.8.0.222.b10-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825915" comment="java-1.8.0-openjdk-devel-1.8.0.222.b10-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825916" comment="java-1.8.0-openjdk-devel-debug-1.8.0.222.b10-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825917" comment="java-1.8.0-openjdk-headless-1.8.0.222.b10-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825918" comment="java-1.8.0-openjdk-headless-debug-1.8.0.222.b10-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825919" comment="java-1.8.0-openjdk-javadoc-1.8.0.222.b10-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825920" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.222.b10-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825921" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.222.b10-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825922" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.222.b10-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825923" comment="java-1.8.0-openjdk-src-1.8.0.222.b10-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825924" comment="java-1.8.0-openjdk-src-debug-1.8.0.222.b10-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825893" comment="java-11-openjdk-11.0.4.11-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825894" comment="java-11-openjdk-debug-11.0.4.11-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825895" comment="java-11-openjdk-demo-11.0.4.11-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825896" comment="java-11-openjdk-demo-debug-11.0.4.11-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825897" comment="java-11-openjdk-devel-11.0.4.11-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825898" comment="java-11-openjdk-devel-debug-11.0.4.11-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825899" comment="java-11-openjdk-headless-11.0.4.11-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825900" comment="java-11-openjdk-headless-debug-11.0.4.11-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825901" comment="java-11-openjdk-javadoc-11.0.4.11-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825902" comment="java-11-openjdk-javadoc-debug-11.0.4.11-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825903" comment="java-11-openjdk-javadoc-zip-11.0.4.11-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825904" comment="java-11-openjdk-javadoc-zip-debug-11.0.4.11-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825905" comment="java-11-openjdk-jmods-11.0.4.11-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825906" comment="java-11-openjdk-jmods-debug-11.0.4.11-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825907" comment="java-11-openjdk-src-11.0.4.11-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825908" comment="java-11-openjdk-src-debug-11.0.4.11-0.el7_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192769" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2769</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2769" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2769" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2769" ref_url="https://www.suse.com/security/cve/CVE-2019-2769" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2002-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192002-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2036-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2291-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192291-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2371-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192371-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1912-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WLAA33SFC2BQWUMXROFQCWU3SJN2HD7O/#WLAA33SFC2BQWUMXROFQCWU3SJN2HD7O" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1916-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7CWQDHDFTQ5TMYECHR6T3YTCURIWVTNU/#7CWQDHDFTQ5TMYECHR6T3YTCURIWVTNU" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Utilities). Supported versions that are affected are Java SE: 7u221, 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2769/">CVE-2019-2769 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2769">CVE-2019-2769 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1141783">SUSE bug 1141783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1147021">SUSE bug 1147021</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825925" comment="java-1.7.0-openjdk-1.7.0.231-2.6.19.1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825926" comment="java-1.7.0-openjdk-accessibility-1.7.0.231-2.6.19.1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825927" comment="java-1.7.0-openjdk-demo-1.7.0.231-2.6.19.1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825928" comment="java-1.7.0-openjdk-devel-1.7.0.231-2.6.19.1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825929" comment="java-1.7.0-openjdk-headless-1.7.0.231-2.6.19.1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825930" comment="java-1.7.0-openjdk-javadoc-1.7.0.231-2.6.19.1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825931" comment="java-1.7.0-openjdk-src-1.7.0.231-2.6.19.1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825909" comment="java-1.8.0-openjdk-1.8.0.222.b10-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825910" comment="java-1.8.0-openjdk-accessibility-1.8.0.222.b10-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825911" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.222.b10-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825912" comment="java-1.8.0-openjdk-debug-1.8.0.222.b10-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825913" comment="java-1.8.0-openjdk-demo-1.8.0.222.b10-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825914" comment="java-1.8.0-openjdk-demo-debug-1.8.0.222.b10-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825915" comment="java-1.8.0-openjdk-devel-1.8.0.222.b10-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825916" comment="java-1.8.0-openjdk-devel-debug-1.8.0.222.b10-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825917" comment="java-1.8.0-openjdk-headless-1.8.0.222.b10-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825918" comment="java-1.8.0-openjdk-headless-debug-1.8.0.222.b10-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825919" comment="java-1.8.0-openjdk-javadoc-1.8.0.222.b10-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825920" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.222.b10-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825921" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.222.b10-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825922" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.222.b10-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825923" comment="java-1.8.0-openjdk-src-1.8.0.222.b10-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825924" comment="java-1.8.0-openjdk-src-debug-1.8.0.222.b10-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825893" comment="java-11-openjdk-11.0.4.11-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825894" comment="java-11-openjdk-debug-11.0.4.11-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825895" comment="java-11-openjdk-demo-11.0.4.11-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825896" comment="java-11-openjdk-demo-debug-11.0.4.11-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825897" comment="java-11-openjdk-devel-11.0.4.11-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825898" comment="java-11-openjdk-devel-debug-11.0.4.11-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825899" comment="java-11-openjdk-headless-11.0.4.11-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825900" comment="java-11-openjdk-headless-debug-11.0.4.11-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825901" comment="java-11-openjdk-javadoc-11.0.4.11-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825902" comment="java-11-openjdk-javadoc-debug-11.0.4.11-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825903" comment="java-11-openjdk-javadoc-zip-11.0.4.11-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825904" comment="java-11-openjdk-javadoc-zip-debug-11.0.4.11-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825905" comment="java-11-openjdk-jmods-11.0.4.11-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825906" comment="java-11-openjdk-jmods-debug-11.0.4.11-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825907" comment="java-11-openjdk-src-11.0.4.11-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825908" comment="java-11-openjdk-src-debug-11.0.4.11-0.el7_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192786" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2786</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2786" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2786" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2786" ref_url="https://www.suse.com/security/cve/CVE-2019-2786" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2002-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192002-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2036-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2291-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192291-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2371-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192371-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1912-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WLAA33SFC2BQWUMXROFQCWU3SJN2HD7O/#WLAA33SFC2BQWUMXROFQCWU3SJN2HD7O" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1916-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7CWQDHDFTQ5TMYECHR6T3YTCURIWVTNU/#7CWQDHDFTQ5TMYECHR6T3YTCURIWVTNU" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.4 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-05"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2786/">CVE-2019-2786 at SUSE</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2786">CVE-2019-2786 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1141787">SUSE bug 1141787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1147021">SUSE bug 1147021</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825925" comment="java-1.7.0-openjdk-1.7.0.231-2.6.19.1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825926" comment="java-1.7.0-openjdk-accessibility-1.7.0.231-2.6.19.1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825927" comment="java-1.7.0-openjdk-demo-1.7.0.231-2.6.19.1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825928" comment="java-1.7.0-openjdk-devel-1.7.0.231-2.6.19.1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825929" comment="java-1.7.0-openjdk-headless-1.7.0.231-2.6.19.1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825930" comment="java-1.7.0-openjdk-javadoc-1.7.0.231-2.6.19.1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825931" comment="java-1.7.0-openjdk-src-1.7.0.231-2.6.19.1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825909" comment="java-1.8.0-openjdk-1.8.0.222.b10-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825910" comment="java-1.8.0-openjdk-accessibility-1.8.0.222.b10-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825911" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.222.b10-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825912" comment="java-1.8.0-openjdk-debug-1.8.0.222.b10-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825913" comment="java-1.8.0-openjdk-demo-1.8.0.222.b10-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825914" comment="java-1.8.0-openjdk-demo-debug-1.8.0.222.b10-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825915" comment="java-1.8.0-openjdk-devel-1.8.0.222.b10-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825916" comment="java-1.8.0-openjdk-devel-debug-1.8.0.222.b10-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825917" comment="java-1.8.0-openjdk-headless-1.8.0.222.b10-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825918" comment="java-1.8.0-openjdk-headless-debug-1.8.0.222.b10-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825919" comment="java-1.8.0-openjdk-javadoc-1.8.0.222.b10-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825920" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.222.b10-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825921" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.222.b10-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825922" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.222.b10-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825923" comment="java-1.8.0-openjdk-src-1.8.0.222.b10-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825924" comment="java-1.8.0-openjdk-src-debug-1.8.0.222.b10-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825893" comment="java-11-openjdk-11.0.4.11-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825894" comment="java-11-openjdk-debug-11.0.4.11-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825895" comment="java-11-openjdk-demo-11.0.4.11-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825896" comment="java-11-openjdk-demo-debug-11.0.4.11-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825897" comment="java-11-openjdk-devel-11.0.4.11-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825898" comment="java-11-openjdk-devel-debug-11.0.4.11-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825899" comment="java-11-openjdk-headless-11.0.4.11-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825900" comment="java-11-openjdk-headless-debug-11.0.4.11-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825901" comment="java-11-openjdk-javadoc-11.0.4.11-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825902" comment="java-11-openjdk-javadoc-debug-11.0.4.11-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825903" comment="java-11-openjdk-javadoc-zip-11.0.4.11-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825904" comment="java-11-openjdk-javadoc-zip-debug-11.0.4.11-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825905" comment="java-11-openjdk-jmods-11.0.4.11-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825906" comment="java-11-openjdk-jmods-debug-11.0.4.11-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825907" comment="java-11-openjdk-src-11.0.4.11-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825908" comment="java-11-openjdk-src-debug-11.0.4.11-0.el7_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2805</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2805" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2805" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2805" ref_url="https://www.suse.com/security/cve/CVE-2019-2805" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3369-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193369-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006654.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2698-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EL25YKJX6ZC6Q322TAJNA7AK5OZSDX2O/#EL25YKJX6ZC6Q322TAJNA7AK5OZSDX2O" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Parser). Supported versions that are affected are 5.6.44 and prior, 5.7.26 and prior and 8.0.16 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2805/">CVE-2019-2805 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2805">CVE-2019-2805 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1132826">SUSE bug 1132826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141798">SUSE bug 1141798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156669">SUSE bug 1156669</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827752" comment="mariadb-5.5.65-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827753" comment="mariadb-bench-5.5.65-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827754" comment="mariadb-devel-5.5.65-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827755" comment="mariadb-embedded-5.5.65-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827756" comment="mariadb-embedded-devel-5.5.65-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827757" comment="mariadb-libs-5.5.65-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827758" comment="mariadb-server-5.5.65-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827759" comment="mariadb-test-5.5.65-1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192816" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2816</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2816" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2816" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2816" ref_url="https://www.suse.com/security/cve/CVE-2019-2816" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2002-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192002-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2036-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2291-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192291-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2371-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192371-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1912-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WLAA33SFC2BQWUMXROFQCWU3SJN2HD7O/#WLAA33SFC2BQWUMXROFQCWU3SJN2HD7O" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1916-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7CWQDHDFTQ5TMYECHR6T3YTCURIWVTNU/#7CWQDHDFTQ5TMYECHR6T3YTCURIWVTNU" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 7u221, 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2816/">CVE-2019-2816 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2816">CVE-2019-2816 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1141785">SUSE bug 1141785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1147021">SUSE bug 1147021</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825925" comment="java-1.7.0-openjdk-1.7.0.231-2.6.19.1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825926" comment="java-1.7.0-openjdk-accessibility-1.7.0.231-2.6.19.1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825927" comment="java-1.7.0-openjdk-demo-1.7.0.231-2.6.19.1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825928" comment="java-1.7.0-openjdk-devel-1.7.0.231-2.6.19.1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825929" comment="java-1.7.0-openjdk-headless-1.7.0.231-2.6.19.1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825930" comment="java-1.7.0-openjdk-javadoc-1.7.0.231-2.6.19.1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825931" comment="java-1.7.0-openjdk-src-1.7.0.231-2.6.19.1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825909" comment="java-1.8.0-openjdk-1.8.0.222.b10-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825910" comment="java-1.8.0-openjdk-accessibility-1.8.0.222.b10-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825911" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.222.b10-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825912" comment="java-1.8.0-openjdk-debug-1.8.0.222.b10-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825913" comment="java-1.8.0-openjdk-demo-1.8.0.222.b10-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825914" comment="java-1.8.0-openjdk-demo-debug-1.8.0.222.b10-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825915" comment="java-1.8.0-openjdk-devel-1.8.0.222.b10-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825916" comment="java-1.8.0-openjdk-devel-debug-1.8.0.222.b10-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825917" comment="java-1.8.0-openjdk-headless-1.8.0.222.b10-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825918" comment="java-1.8.0-openjdk-headless-debug-1.8.0.222.b10-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825919" comment="java-1.8.0-openjdk-javadoc-1.8.0.222.b10-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825920" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.222.b10-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825921" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.222.b10-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825922" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.222.b10-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825923" comment="java-1.8.0-openjdk-src-1.8.0.222.b10-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825924" comment="java-1.8.0-openjdk-src-debug-1.8.0.222.b10-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825893" comment="java-11-openjdk-11.0.4.11-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825894" comment="java-11-openjdk-debug-11.0.4.11-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825895" comment="java-11-openjdk-demo-11.0.4.11-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825896" comment="java-11-openjdk-demo-debug-11.0.4.11-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825897" comment="java-11-openjdk-devel-11.0.4.11-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825898" comment="java-11-openjdk-devel-debug-11.0.4.11-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825899" comment="java-11-openjdk-headless-11.0.4.11-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825900" comment="java-11-openjdk-headless-debug-11.0.4.11-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825901" comment="java-11-openjdk-javadoc-11.0.4.11-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825902" comment="java-11-openjdk-javadoc-debug-11.0.4.11-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825903" comment="java-11-openjdk-javadoc-zip-11.0.4.11-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825904" comment="java-11-openjdk-javadoc-zip-debug-11.0.4.11-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825905" comment="java-11-openjdk-jmods-11.0.4.11-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825906" comment="java-11-openjdk-jmods-debug-11.0.4.11-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825907" comment="java-11-openjdk-src-11.0.4.11-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825908" comment="java-11-openjdk-src-debug-11.0.4.11-0.el7_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192818" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2818</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2818" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2818" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2818" ref_url="https://www.suse.com/security/cve/CVE-2019-2818" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2002-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192002-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1916-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7CWQDHDFTQ5TMYECHR6T3YTCURIWVTNU/#7CWQDHDFTQ5TMYECHR6T3YTCURIWVTNU" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 11.0.3 and 12.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-06"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2818/">CVE-2019-2818 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2818">CVE-2019-2818 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1141788">SUSE bug 1141788</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825893" comment="java-11-openjdk-11.0.4.11-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825894" comment="java-11-openjdk-debug-11.0.4.11-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825895" comment="java-11-openjdk-demo-11.0.4.11-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825896" comment="java-11-openjdk-demo-debug-11.0.4.11-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825897" comment="java-11-openjdk-devel-11.0.4.11-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825898" comment="java-11-openjdk-devel-debug-11.0.4.11-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825899" comment="java-11-openjdk-headless-11.0.4.11-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825900" comment="java-11-openjdk-headless-debug-11.0.4.11-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825901" comment="java-11-openjdk-javadoc-11.0.4.11-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825902" comment="java-11-openjdk-javadoc-debug-11.0.4.11-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825903" comment="java-11-openjdk-javadoc-zip-11.0.4.11-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825904" comment="java-11-openjdk-javadoc-zip-debug-11.0.4.11-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825905" comment="java-11-openjdk-jmods-11.0.4.11-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825906" comment="java-11-openjdk-jmods-debug-11.0.4.11-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825907" comment="java-11-openjdk-src-11.0.4.11-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825908" comment="java-11-openjdk-src-debug-11.0.4.11-0.el7_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192821" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2821</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2821" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2821" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2821" ref_url="https://www.suse.com/security/cve/CVE-2019-2821" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2002-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192002-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1916-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7CWQDHDFTQ5TMYECHR6T3YTCURIWVTNU/#7CWQDHDFTQ5TMYECHR6T3YTCURIWVTNU" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE component of Oracle Java SE (subcomponent: JSSE). Supported versions that are affected are Java SE: 11.0.3 and 12.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via TLS to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2821/">CVE-2019-2821 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2821">CVE-2019-2821 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1141781">SUSE bug 1141781</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825893" comment="java-11-openjdk-11.0.4.11-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825894" comment="java-11-openjdk-debug-11.0.4.11-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825895" comment="java-11-openjdk-demo-11.0.4.11-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825896" comment="java-11-openjdk-demo-debug-11.0.4.11-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825897" comment="java-11-openjdk-devel-11.0.4.11-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825898" comment="java-11-openjdk-devel-debug-11.0.4.11-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825899" comment="java-11-openjdk-headless-11.0.4.11-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825900" comment="java-11-openjdk-headless-debug-11.0.4.11-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825901" comment="java-11-openjdk-javadoc-11.0.4.11-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825902" comment="java-11-openjdk-javadoc-debug-11.0.4.11-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825903" comment="java-11-openjdk-javadoc-zip-11.0.4.11-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825904" comment="java-11-openjdk-javadoc-zip-debug-11.0.4.11-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825905" comment="java-11-openjdk-jmods-11.0.4.11-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825906" comment="java-11-openjdk-jmods-debug-11.0.4.11-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825907" comment="java-11-openjdk-src-11.0.4.11-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825908" comment="java-11-openjdk-src-debug-11.0.4.11-0.el7_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192842" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2842</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2842" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2842" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2842" ref_url="https://www.suse.com/security/cve/CVE-2019-2842" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2036-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005820.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1912-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WLAA33SFC2BQWUMXROFQCWU3SJN2HD7O/#WLAA33SFC2BQWUMXROFQCWU3SJN2HD7O" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE component of Oracle Java SE (subcomponent: JCE). The supported version that is affected is Java SE: 8u212. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-07"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2842/">CVE-2019-2842 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2842">CVE-2019-2842 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1141786">SUSE bug 1141786</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825925" comment="java-1.7.0-openjdk-1.7.0.231-2.6.19.1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825926" comment="java-1.7.0-openjdk-accessibility-1.7.0.231-2.6.19.1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825927" comment="java-1.7.0-openjdk-demo-1.7.0.231-2.6.19.1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825928" comment="java-1.7.0-openjdk-devel-1.7.0.231-2.6.19.1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825929" comment="java-1.7.0-openjdk-headless-1.7.0.231-2.6.19.1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825930" comment="java-1.7.0-openjdk-javadoc-1.7.0.231-2.6.19.1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825931" comment="java-1.7.0-openjdk-src-1.7.0.231-2.6.19.1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825909" comment="java-1.8.0-openjdk-1.8.0.222.b10-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825910" comment="java-1.8.0-openjdk-accessibility-1.8.0.222.b10-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825911" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.222.b10-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825912" comment="java-1.8.0-openjdk-debug-1.8.0.222.b10-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825913" comment="java-1.8.0-openjdk-demo-1.8.0.222.b10-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825914" comment="java-1.8.0-openjdk-demo-debug-1.8.0.222.b10-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825915" comment="java-1.8.0-openjdk-devel-1.8.0.222.b10-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825916" comment="java-1.8.0-openjdk-devel-debug-1.8.0.222.b10-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825917" comment="java-1.8.0-openjdk-headless-1.8.0.222.b10-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825918" comment="java-1.8.0-openjdk-headless-debug-1.8.0.222.b10-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825919" comment="java-1.8.0-openjdk-javadoc-1.8.0.222.b10-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825920" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.222.b10-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825921" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.222.b10-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825922" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.222.b10-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825923" comment="java-1.8.0-openjdk-src-1.8.0.222.b10-0.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825924" comment="java-1.8.0-openjdk-src-debug-1.8.0.222.b10-0.el7_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192945" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2945</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2945" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2945" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2945" ref_url="https://www.suse.com/security/cve/CVE-2019-2945" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0051-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200051-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006314.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2557-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WCIMAT2F4HXIE6ZIVQQAFTNF3WZ5QK2Y/#WCIMAT2F4HXIE6ZIVQQAFTNF3WZ5QK2Y" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2565-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7UPD3ISREA7GUESZ6NQVU7DWRQ66OGDW/#7UPD3ISREA7GUESZ6NQVU7DWRQ66OGDW" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2687-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/I6ALR2AGAFL63Y6TKSBCMO2DIQNCCY5U/#I6ALR2AGAFL63Y6TKSBCMO2DIQNCCY5U" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2945/">CVE-2019-2945 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2945">CVE-2019-2945 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1154212">SUSE bug 1154212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158442">SUSE bug 1158442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826697" comment="java-1.7.0-openjdk-1.7.0.241-2.6.20.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826698" comment="java-1.7.0-openjdk-accessibility-1.7.0.241-2.6.20.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826699" comment="java-1.7.0-openjdk-demo-1.7.0.241-2.6.20.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826700" comment="java-1.7.0-openjdk-devel-1.7.0.241-2.6.20.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826701" comment="java-1.7.0-openjdk-headless-1.7.0.241-2.6.20.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826702" comment="java-1.7.0-openjdk-javadoc-1.7.0.241-2.6.20.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826703" comment="java-1.7.0-openjdk-src-1.7.0.241-2.6.20.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826681" comment="java-1.8.0-openjdk-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826682" comment="java-1.8.0-openjdk-accessibility-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826683" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826684" comment="java-1.8.0-openjdk-debug-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826685" comment="java-1.8.0-openjdk-demo-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826686" comment="java-1.8.0-openjdk-demo-debug-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826687" comment="java-1.8.0-openjdk-devel-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826688" comment="java-1.8.0-openjdk-devel-debug-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826689" comment="java-1.8.0-openjdk-headless-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826690" comment="java-1.8.0-openjdk-headless-debug-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826691" comment="java-1.8.0-openjdk-javadoc-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826692" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826693" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826694" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826695" comment="java-1.8.0-openjdk-src-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826696" comment="java-1.8.0-openjdk-src-debug-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826665" comment="java-11-openjdk-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826666" comment="java-11-openjdk-debug-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826667" comment="java-11-openjdk-demo-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826668" comment="java-11-openjdk-demo-debug-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826669" comment="java-11-openjdk-devel-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826670" comment="java-11-openjdk-devel-debug-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826671" comment="java-11-openjdk-headless-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826672" comment="java-11-openjdk-headless-debug-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826673" comment="java-11-openjdk-javadoc-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826674" comment="java-11-openjdk-javadoc-debug-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826675" comment="java-11-openjdk-javadoc-zip-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826676" comment="java-11-openjdk-javadoc-zip-debug-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826677" comment="java-11-openjdk-jmods-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826678" comment="java-11-openjdk-jmods-debug-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826679" comment="java-11-openjdk-src-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826680" comment="java-11-openjdk-src-debug-11.0.5.10-0.el7_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192949" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2949</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2949" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2949" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2949" ref_url="https://www.suse.com/security/cve/CVE-2019-2949" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006985.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2557-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WCIMAT2F4HXIE6ZIVQQAFTNF3WZ5QK2Y/#WCIMAT2F4HXIE6ZIVQQAFTNF3WZ5QK2Y" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2565-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7UPD3ISREA7GUESZ6NQVU7DWRQ66OGDW/#7UPD3ISREA7GUESZ6NQVU7DWRQ66OGDW" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2687-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/I6ALR2AGAFL63Y6TKSBCMO2DIQNCCY5U/#I6ALR2AGAFL63Y6TKSBCMO2DIQNCCY5U" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Kerberos). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via Kerberos to compromise Java SE, Java SE Embedded. While the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 6.8 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2949/">CVE-2019-2949 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2949">CVE-2019-2949 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1154212">SUSE bug 1154212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172277">SUSE bug 1172277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826681" comment="java-1.8.0-openjdk-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826682" comment="java-1.8.0-openjdk-accessibility-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826683" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826684" comment="java-1.8.0-openjdk-debug-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826685" comment="java-1.8.0-openjdk-demo-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826686" comment="java-1.8.0-openjdk-demo-debug-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826687" comment="java-1.8.0-openjdk-devel-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826688" comment="java-1.8.0-openjdk-devel-debug-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826689" comment="java-1.8.0-openjdk-headless-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826690" comment="java-1.8.0-openjdk-headless-debug-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826691" comment="java-1.8.0-openjdk-javadoc-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826692" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826693" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826694" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826695" comment="java-1.8.0-openjdk-src-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826696" comment="java-1.8.0-openjdk-src-debug-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826665" comment="java-11-openjdk-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826666" comment="java-11-openjdk-debug-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826667" comment="java-11-openjdk-demo-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826668" comment="java-11-openjdk-demo-debug-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826669" comment="java-11-openjdk-devel-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826670" comment="java-11-openjdk-devel-debug-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826671" comment="java-11-openjdk-headless-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826672" comment="java-11-openjdk-headless-debug-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826673" comment="java-11-openjdk-javadoc-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826674" comment="java-11-openjdk-javadoc-debug-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826675" comment="java-11-openjdk-javadoc-zip-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826676" comment="java-11-openjdk-javadoc-zip-debug-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826677" comment="java-11-openjdk-jmods-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826678" comment="java-11-openjdk-jmods-debug-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826679" comment="java-11-openjdk-src-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826680" comment="java-11-openjdk-src-debug-11.0.5.10-0.el7_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192962" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2962</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2962" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2962" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2962" ref_url="https://www.suse.com/security/cve/CVE-2019-2962" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0051-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200051-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006314.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2557-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WCIMAT2F4HXIE6ZIVQQAFTNF3WZ5QK2Y/#WCIMAT2F4HXIE6ZIVQQAFTNF3WZ5QK2Y" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2565-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7UPD3ISREA7GUESZ6NQVU7DWRQ66OGDW/#7UPD3ISREA7GUESZ6NQVU7DWRQ66OGDW" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2687-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/I6ALR2AGAFL63Y6TKSBCMO2DIQNCCY5U/#I6ALR2AGAFL63Y6TKSBCMO2DIQNCCY5U" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2962/">CVE-2019-2962 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2962">CVE-2019-2962 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1154212">SUSE bug 1154212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158442">SUSE bug 1158442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826697" comment="java-1.7.0-openjdk-1.7.0.241-2.6.20.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826698" comment="java-1.7.0-openjdk-accessibility-1.7.0.241-2.6.20.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826699" comment="java-1.7.0-openjdk-demo-1.7.0.241-2.6.20.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826700" comment="java-1.7.0-openjdk-devel-1.7.0.241-2.6.20.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826701" comment="java-1.7.0-openjdk-headless-1.7.0.241-2.6.20.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826702" comment="java-1.7.0-openjdk-javadoc-1.7.0.241-2.6.20.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826703" comment="java-1.7.0-openjdk-src-1.7.0.241-2.6.20.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826681" comment="java-1.8.0-openjdk-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826682" comment="java-1.8.0-openjdk-accessibility-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826683" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826684" comment="java-1.8.0-openjdk-debug-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826685" comment="java-1.8.0-openjdk-demo-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826686" comment="java-1.8.0-openjdk-demo-debug-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826687" comment="java-1.8.0-openjdk-devel-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826688" comment="java-1.8.0-openjdk-devel-debug-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826689" comment="java-1.8.0-openjdk-headless-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826690" comment="java-1.8.0-openjdk-headless-debug-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826691" comment="java-1.8.0-openjdk-javadoc-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826692" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826693" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826694" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826695" comment="java-1.8.0-openjdk-src-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826696" comment="java-1.8.0-openjdk-src-debug-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826665" comment="java-11-openjdk-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826666" comment="java-11-openjdk-debug-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826667" comment="java-11-openjdk-demo-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826668" comment="java-11-openjdk-demo-debug-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826669" comment="java-11-openjdk-devel-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826670" comment="java-11-openjdk-devel-debug-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826671" comment="java-11-openjdk-headless-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826672" comment="java-11-openjdk-headless-debug-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826673" comment="java-11-openjdk-javadoc-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826674" comment="java-11-openjdk-javadoc-debug-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826675" comment="java-11-openjdk-javadoc-zip-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826676" comment="java-11-openjdk-javadoc-zip-debug-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826677" comment="java-11-openjdk-jmods-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826678" comment="java-11-openjdk-jmods-debug-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826679" comment="java-11-openjdk-src-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826680" comment="java-11-openjdk-src-debug-11.0.5.10-0.el7_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192964" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2964</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2964" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2964" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2964" ref_url="https://www.suse.com/security/cve/CVE-2019-2964" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0051-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200051-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006314.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2557-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WCIMAT2F4HXIE6ZIVQQAFTNF3WZ5QK2Y/#WCIMAT2F4HXIE6ZIVQQAFTNF3WZ5QK2Y" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2565-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7UPD3ISREA7GUESZ6NQVU7DWRQ66OGDW/#7UPD3ISREA7GUESZ6NQVU7DWRQ66OGDW" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2687-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/I6ALR2AGAFL63Y6TKSBCMO2DIQNCCY5U/#I6ALR2AGAFL63Y6TKSBCMO2DIQNCCY5U" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Concurrency). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2964/">CVE-2019-2964 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2964">CVE-2019-2964 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1154212">SUSE bug 1154212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158442">SUSE bug 1158442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826697" comment="java-1.7.0-openjdk-1.7.0.241-2.6.20.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826698" comment="java-1.7.0-openjdk-accessibility-1.7.0.241-2.6.20.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826699" comment="java-1.7.0-openjdk-demo-1.7.0.241-2.6.20.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826700" comment="java-1.7.0-openjdk-devel-1.7.0.241-2.6.20.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826701" comment="java-1.7.0-openjdk-headless-1.7.0.241-2.6.20.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826702" comment="java-1.7.0-openjdk-javadoc-1.7.0.241-2.6.20.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826703" comment="java-1.7.0-openjdk-src-1.7.0.241-2.6.20.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826681" comment="java-1.8.0-openjdk-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826682" comment="java-1.8.0-openjdk-accessibility-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826683" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826684" comment="java-1.8.0-openjdk-debug-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826685" comment="java-1.8.0-openjdk-demo-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826686" comment="java-1.8.0-openjdk-demo-debug-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826687" comment="java-1.8.0-openjdk-devel-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826688" comment="java-1.8.0-openjdk-devel-debug-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826689" comment="java-1.8.0-openjdk-headless-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826690" comment="java-1.8.0-openjdk-headless-debug-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826691" comment="java-1.8.0-openjdk-javadoc-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826692" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826693" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826694" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826695" comment="java-1.8.0-openjdk-src-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826696" comment="java-1.8.0-openjdk-src-debug-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826665" comment="java-11-openjdk-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826666" comment="java-11-openjdk-debug-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826667" comment="java-11-openjdk-demo-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826668" comment="java-11-openjdk-demo-debug-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826669" comment="java-11-openjdk-devel-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826670" comment="java-11-openjdk-devel-debug-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826671" comment="java-11-openjdk-headless-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826672" comment="java-11-openjdk-headless-debug-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826673" comment="java-11-openjdk-javadoc-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826674" comment="java-11-openjdk-javadoc-debug-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826675" comment="java-11-openjdk-javadoc-zip-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826676" comment="java-11-openjdk-javadoc-zip-debug-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826677" comment="java-11-openjdk-jmods-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826678" comment="java-11-openjdk-jmods-debug-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826679" comment="java-11-openjdk-src-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826680" comment="java-11-openjdk-src-debug-11.0.5.10-0.el7_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192973" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2973</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2973" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2973" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2973" ref_url="https://www.suse.com/security/cve/CVE-2019-2973" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0051-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200051-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006314.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2557-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WCIMAT2F4HXIE6ZIVQQAFTNF3WZ5QK2Y/#WCIMAT2F4HXIE6ZIVQQAFTNF3WZ5QK2Y" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2565-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7UPD3ISREA7GUESZ6NQVU7DWRQ66OGDW/#7UPD3ISREA7GUESZ6NQVU7DWRQ66OGDW" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2687-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/I6ALR2AGAFL63Y6TKSBCMO2DIQNCCY5U/#I6ALR2AGAFL63Y6TKSBCMO2DIQNCCY5U" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JAXP). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2973/">CVE-2019-2973 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2973">CVE-2019-2973 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1154212">SUSE bug 1154212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158442">SUSE bug 1158442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826697" comment="java-1.7.0-openjdk-1.7.0.241-2.6.20.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826698" comment="java-1.7.0-openjdk-accessibility-1.7.0.241-2.6.20.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826699" comment="java-1.7.0-openjdk-demo-1.7.0.241-2.6.20.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826700" comment="java-1.7.0-openjdk-devel-1.7.0.241-2.6.20.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826701" comment="java-1.7.0-openjdk-headless-1.7.0.241-2.6.20.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826702" comment="java-1.7.0-openjdk-javadoc-1.7.0.241-2.6.20.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826703" comment="java-1.7.0-openjdk-src-1.7.0.241-2.6.20.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826681" comment="java-1.8.0-openjdk-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826682" comment="java-1.8.0-openjdk-accessibility-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826683" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826684" comment="java-1.8.0-openjdk-debug-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826685" comment="java-1.8.0-openjdk-demo-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826686" comment="java-1.8.0-openjdk-demo-debug-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826687" comment="java-1.8.0-openjdk-devel-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826688" comment="java-1.8.0-openjdk-devel-debug-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826689" comment="java-1.8.0-openjdk-headless-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826690" comment="java-1.8.0-openjdk-headless-debug-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826691" comment="java-1.8.0-openjdk-javadoc-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826692" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826693" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826694" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826695" comment="java-1.8.0-openjdk-src-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826696" comment="java-1.8.0-openjdk-src-debug-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826665" comment="java-11-openjdk-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826666" comment="java-11-openjdk-debug-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826667" comment="java-11-openjdk-demo-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826668" comment="java-11-openjdk-demo-debug-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826669" comment="java-11-openjdk-devel-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826670" comment="java-11-openjdk-devel-debug-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826671" comment="java-11-openjdk-headless-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826672" comment="java-11-openjdk-headless-debug-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826673" comment="java-11-openjdk-javadoc-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826674" comment="java-11-openjdk-javadoc-debug-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826675" comment="java-11-openjdk-javadoc-zip-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826676" comment="java-11-openjdk-javadoc-zip-debug-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826677" comment="java-11-openjdk-jmods-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826678" comment="java-11-openjdk-jmods-debug-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826679" comment="java-11-openjdk-src-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826680" comment="java-11-openjdk-src-debug-11.0.5.10-0.el7_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192974" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2974</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2974" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2974" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2974" ref_url="https://www.suse.com/security/cve/CVE-2019-2974" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3369-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193369-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0050-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200050-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006654.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2698-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EL25YKJX6ZC6Q322TAJNA7AK5OZSDX2O/#EL25YKJX6ZC6Q322TAJNA7AK5OZSDX2O" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 5.6.45 and prior, 5.7.27 and prior and 8.0.17 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2974/">CVE-2019-2974 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2974">CVE-2019-2974 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1154162">SUSE bug 1154162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156669">SUSE bug 1156669</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828504" comment="mariadb-5.5.68-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828505" comment="mariadb-bench-5.5.68-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828506" comment="mariadb-devel-5.5.68-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828507" comment="mariadb-embedded-5.5.68-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828508" comment="mariadb-embedded-devel-5.5.68-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828509" comment="mariadb-libs-5.5.68-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828510" comment="mariadb-server-5.5.68-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828511" comment="mariadb-test-5.5.68-1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192975" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2975</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2975" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2975" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2975" ref_url="https://www.suse.com/security/cve/CVE-2019-2975" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006304.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2557-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WCIMAT2F4HXIE6ZIVQQAFTNF3WZ5QK2Y/#WCIMAT2F4HXIE6ZIVQQAFTNF3WZ5QK2Y" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2565-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7UPD3ISREA7GUESZ6NQVU7DWRQ66OGDW/#7UPD3ISREA7GUESZ6NQVU7DWRQ66OGDW" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2687-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/I6ALR2AGAFL63Y6TKSBCMO2DIQNCCY5U/#I6ALR2AGAFL63Y6TKSBCMO2DIQNCCY5U" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Scripting). Supported versions that are affected are Java SE: 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 4.8 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-2975/">CVE-2019-2975 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2975">CVE-2019-2975 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1154212">SUSE bug 1154212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158442">SUSE bug 1158442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826681" comment="java-1.8.0-openjdk-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826682" comment="java-1.8.0-openjdk-accessibility-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826683" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826684" comment="java-1.8.0-openjdk-debug-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826685" comment="java-1.8.0-openjdk-demo-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826686" comment="java-1.8.0-openjdk-demo-debug-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826687" comment="java-1.8.0-openjdk-devel-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826688" comment="java-1.8.0-openjdk-devel-debug-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826689" comment="java-1.8.0-openjdk-headless-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826690" comment="java-1.8.0-openjdk-headless-debug-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826691" comment="java-1.8.0-openjdk-javadoc-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826692" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826693" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826694" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826695" comment="java-1.8.0-openjdk-src-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826696" comment="java-1.8.0-openjdk-src-debug-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826665" comment="java-11-openjdk-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826666" comment="java-11-openjdk-debug-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826667" comment="java-11-openjdk-demo-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826668" comment="java-11-openjdk-demo-debug-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826669" comment="java-11-openjdk-devel-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826670" comment="java-11-openjdk-devel-debug-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826671" comment="java-11-openjdk-headless-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826672" comment="java-11-openjdk-headless-debug-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826673" comment="java-11-openjdk-javadoc-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826674" comment="java-11-openjdk-javadoc-debug-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826675" comment="java-11-openjdk-javadoc-zip-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826676" comment="java-11-openjdk-javadoc-zip-debug-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826677" comment="java-11-openjdk-jmods-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826678" comment="java-11-openjdk-jmods-debug-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826679" comment="java-11-openjdk-src-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826680" comment="java-11-openjdk-src-debug-11.0.5.10-0.el7_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192977" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2977</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2977" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2977" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2977" ref_url="https://www.suse.com/security/cve/CVE-2019-2977" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006189.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2557-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WCIMAT2F4HXIE6ZIVQQAFTNF3WZ5QK2Y/#WCIMAT2F4HXIE6ZIVQQAFTNF3WZ5QK2Y" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2565-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7UPD3ISREA7GUESZ6NQVU7DWRQ66OGDW/#7UPD3ISREA7GUESZ6NQVU7DWRQ66OGDW" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 11.0.4 and 13. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.8 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2977/">CVE-2019-2977 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2977">CVE-2019-2977 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1154212">SUSE bug 1154212</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826665" comment="java-11-openjdk-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826666" comment="java-11-openjdk-debug-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826667" comment="java-11-openjdk-demo-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826668" comment="java-11-openjdk-demo-debug-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826669" comment="java-11-openjdk-devel-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826670" comment="java-11-openjdk-devel-debug-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826671" comment="java-11-openjdk-headless-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826672" comment="java-11-openjdk-headless-debug-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826673" comment="java-11-openjdk-javadoc-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826674" comment="java-11-openjdk-javadoc-debug-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826675" comment="java-11-openjdk-javadoc-zip-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826676" comment="java-11-openjdk-javadoc-zip-debug-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826677" comment="java-11-openjdk-jmods-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826678" comment="java-11-openjdk-jmods-debug-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826679" comment="java-11-openjdk-src-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826680" comment="java-11-openjdk-src-debug-11.0.5.10-0.el7_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192978" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2978</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2978" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2978" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2978" ref_url="https://www.suse.com/security/cve/CVE-2019-2978" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0051-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200051-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006314.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2557-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WCIMAT2F4HXIE6ZIVQQAFTNF3WZ5QK2Y/#WCIMAT2F4HXIE6ZIVQQAFTNF3WZ5QK2Y" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2565-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7UPD3ISREA7GUESZ6NQVU7DWRQ66OGDW/#7UPD3ISREA7GUESZ6NQVU7DWRQ66OGDW" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2687-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/I6ALR2AGAFL63Y6TKSBCMO2DIQNCCY5U/#I6ALR2AGAFL63Y6TKSBCMO2DIQNCCY5U" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2978/">CVE-2019-2978 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2978">CVE-2019-2978 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1154212">SUSE bug 1154212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158442">SUSE bug 1158442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826697" comment="java-1.7.0-openjdk-1.7.0.241-2.6.20.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826698" comment="java-1.7.0-openjdk-accessibility-1.7.0.241-2.6.20.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826699" comment="java-1.7.0-openjdk-demo-1.7.0.241-2.6.20.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826700" comment="java-1.7.0-openjdk-devel-1.7.0.241-2.6.20.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826701" comment="java-1.7.0-openjdk-headless-1.7.0.241-2.6.20.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826702" comment="java-1.7.0-openjdk-javadoc-1.7.0.241-2.6.20.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826703" comment="java-1.7.0-openjdk-src-1.7.0.241-2.6.20.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826681" comment="java-1.8.0-openjdk-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826682" comment="java-1.8.0-openjdk-accessibility-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826683" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826684" comment="java-1.8.0-openjdk-debug-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826685" comment="java-1.8.0-openjdk-demo-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826686" comment="java-1.8.0-openjdk-demo-debug-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826687" comment="java-1.8.0-openjdk-devel-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826688" comment="java-1.8.0-openjdk-devel-debug-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826689" comment="java-1.8.0-openjdk-headless-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826690" comment="java-1.8.0-openjdk-headless-debug-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826691" comment="java-1.8.0-openjdk-javadoc-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826692" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826693" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826694" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826695" comment="java-1.8.0-openjdk-src-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826696" comment="java-1.8.0-openjdk-src-debug-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826665" comment="java-11-openjdk-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826666" comment="java-11-openjdk-debug-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826667" comment="java-11-openjdk-demo-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826668" comment="java-11-openjdk-demo-debug-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826669" comment="java-11-openjdk-devel-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826670" comment="java-11-openjdk-devel-debug-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826671" comment="java-11-openjdk-headless-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826672" comment="java-11-openjdk-headless-debug-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826673" comment="java-11-openjdk-javadoc-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826674" comment="java-11-openjdk-javadoc-debug-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826675" comment="java-11-openjdk-javadoc-zip-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826676" comment="java-11-openjdk-javadoc-zip-debug-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826677" comment="java-11-openjdk-jmods-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826678" comment="java-11-openjdk-jmods-debug-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826679" comment="java-11-openjdk-src-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826680" comment="java-11-openjdk-src-debug-11.0.5.10-0.el7_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192981" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2981</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2981" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2981" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2981" ref_url="https://www.suse.com/security/cve/CVE-2019-2981" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0051-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200051-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006314.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2557-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WCIMAT2F4HXIE6ZIVQQAFTNF3WZ5QK2Y/#WCIMAT2F4HXIE6ZIVQQAFTNF3WZ5QK2Y" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2565-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7UPD3ISREA7GUESZ6NQVU7DWRQ66OGDW/#7UPD3ISREA7GUESZ6NQVU7DWRQ66OGDW" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2687-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/I6ALR2AGAFL63Y6TKSBCMO2DIQNCCY5U/#I6ALR2AGAFL63Y6TKSBCMO2DIQNCCY5U" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JAXP). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2981/">CVE-2019-2981 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2981">CVE-2019-2981 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1154212">SUSE bug 1154212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158442">SUSE bug 1158442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826697" comment="java-1.7.0-openjdk-1.7.0.241-2.6.20.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826698" comment="java-1.7.0-openjdk-accessibility-1.7.0.241-2.6.20.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826699" comment="java-1.7.0-openjdk-demo-1.7.0.241-2.6.20.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826700" comment="java-1.7.0-openjdk-devel-1.7.0.241-2.6.20.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826701" comment="java-1.7.0-openjdk-headless-1.7.0.241-2.6.20.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826702" comment="java-1.7.0-openjdk-javadoc-1.7.0.241-2.6.20.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826703" comment="java-1.7.0-openjdk-src-1.7.0.241-2.6.20.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826681" comment="java-1.8.0-openjdk-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826682" comment="java-1.8.0-openjdk-accessibility-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826683" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826684" comment="java-1.8.0-openjdk-debug-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826685" comment="java-1.8.0-openjdk-demo-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826686" comment="java-1.8.0-openjdk-demo-debug-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826687" comment="java-1.8.0-openjdk-devel-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826688" comment="java-1.8.0-openjdk-devel-debug-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826689" comment="java-1.8.0-openjdk-headless-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826690" comment="java-1.8.0-openjdk-headless-debug-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826691" comment="java-1.8.0-openjdk-javadoc-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826692" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826693" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826694" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826695" comment="java-1.8.0-openjdk-src-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826696" comment="java-1.8.0-openjdk-src-debug-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826665" comment="java-11-openjdk-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826666" comment="java-11-openjdk-debug-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826667" comment="java-11-openjdk-demo-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826668" comment="java-11-openjdk-demo-debug-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826669" comment="java-11-openjdk-devel-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826670" comment="java-11-openjdk-devel-debug-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826671" comment="java-11-openjdk-headless-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826672" comment="java-11-openjdk-headless-debug-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826673" comment="java-11-openjdk-javadoc-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826674" comment="java-11-openjdk-javadoc-debug-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826675" comment="java-11-openjdk-javadoc-zip-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826676" comment="java-11-openjdk-javadoc-zip-debug-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826677" comment="java-11-openjdk-jmods-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826678" comment="java-11-openjdk-jmods-debug-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826679" comment="java-11-openjdk-src-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826680" comment="java-11-openjdk-src-debug-11.0.5.10-0.el7_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192983" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2983</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2983" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2983" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2983" ref_url="https://www.suse.com/security/cve/CVE-2019-2983" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0051-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200051-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006314.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2557-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WCIMAT2F4HXIE6ZIVQQAFTNF3WZ5QK2Y/#WCIMAT2F4HXIE6ZIVQQAFTNF3WZ5QK2Y" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2565-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7UPD3ISREA7GUESZ6NQVU7DWRQ66OGDW/#7UPD3ISREA7GUESZ6NQVU7DWRQ66OGDW" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2687-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/I6ALR2AGAFL63Y6TKSBCMO2DIQNCCY5U/#I6ALR2AGAFL63Y6TKSBCMO2DIQNCCY5U" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2983/">CVE-2019-2983 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2983">CVE-2019-2983 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1154212">SUSE bug 1154212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158442">SUSE bug 1158442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826697" comment="java-1.7.0-openjdk-1.7.0.241-2.6.20.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826698" comment="java-1.7.0-openjdk-accessibility-1.7.0.241-2.6.20.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826699" comment="java-1.7.0-openjdk-demo-1.7.0.241-2.6.20.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826700" comment="java-1.7.0-openjdk-devel-1.7.0.241-2.6.20.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826701" comment="java-1.7.0-openjdk-headless-1.7.0.241-2.6.20.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826702" comment="java-1.7.0-openjdk-javadoc-1.7.0.241-2.6.20.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826703" comment="java-1.7.0-openjdk-src-1.7.0.241-2.6.20.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826681" comment="java-1.8.0-openjdk-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826682" comment="java-1.8.0-openjdk-accessibility-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826683" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826684" comment="java-1.8.0-openjdk-debug-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826685" comment="java-1.8.0-openjdk-demo-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826686" comment="java-1.8.0-openjdk-demo-debug-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826687" comment="java-1.8.0-openjdk-devel-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826688" comment="java-1.8.0-openjdk-devel-debug-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826689" comment="java-1.8.0-openjdk-headless-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826690" comment="java-1.8.0-openjdk-headless-debug-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826691" comment="java-1.8.0-openjdk-javadoc-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826692" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826693" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826694" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826695" comment="java-1.8.0-openjdk-src-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826696" comment="java-1.8.0-openjdk-src-debug-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826665" comment="java-11-openjdk-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826666" comment="java-11-openjdk-debug-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826667" comment="java-11-openjdk-demo-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826668" comment="java-11-openjdk-demo-debug-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826669" comment="java-11-openjdk-devel-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826670" comment="java-11-openjdk-devel-debug-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826671" comment="java-11-openjdk-headless-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826672" comment="java-11-openjdk-headless-debug-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826673" comment="java-11-openjdk-javadoc-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826674" comment="java-11-openjdk-javadoc-debug-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826675" comment="java-11-openjdk-javadoc-zip-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826676" comment="java-11-openjdk-javadoc-zip-debug-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826677" comment="java-11-openjdk-jmods-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826678" comment="java-11-openjdk-jmods-debug-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826679" comment="java-11-openjdk-src-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826680" comment="java-11-openjdk-src-debug-11.0.5.10-0.el7_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192987" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2987</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2987" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2987" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2987" ref_url="https://www.suse.com/security/cve/CVE-2019-2987" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006304.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2557-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WCIMAT2F4HXIE6ZIVQQAFTNF3WZ5QK2Y/#WCIMAT2F4HXIE6ZIVQQAFTNF3WZ5QK2Y" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2565-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7UPD3ISREA7GUESZ6NQVU7DWRQ66OGDW/#7UPD3ISREA7GUESZ6NQVU7DWRQ66OGDW" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2687-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/I6ALR2AGAFL63Y6TKSBCMO2DIQNCCY5U/#I6ALR2AGAFL63Y6TKSBCMO2DIQNCCY5U" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 11.0.4 and 13. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2987/">CVE-2019-2987 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2987">CVE-2019-2987 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1154212">SUSE bug 1154212</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826697" comment="java-1.7.0-openjdk-1.7.0.241-2.6.20.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826698" comment="java-1.7.0-openjdk-accessibility-1.7.0.241-2.6.20.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826699" comment="java-1.7.0-openjdk-demo-1.7.0.241-2.6.20.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826700" comment="java-1.7.0-openjdk-devel-1.7.0.241-2.6.20.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826701" comment="java-1.7.0-openjdk-headless-1.7.0.241-2.6.20.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826702" comment="java-1.7.0-openjdk-javadoc-1.7.0.241-2.6.20.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826703" comment="java-1.7.0-openjdk-src-1.7.0.241-2.6.20.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826681" comment="java-1.8.0-openjdk-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826682" comment="java-1.8.0-openjdk-accessibility-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826683" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826684" comment="java-1.8.0-openjdk-debug-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826685" comment="java-1.8.0-openjdk-demo-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826686" comment="java-1.8.0-openjdk-demo-debug-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826687" comment="java-1.8.0-openjdk-devel-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826688" comment="java-1.8.0-openjdk-devel-debug-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826689" comment="java-1.8.0-openjdk-headless-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826690" comment="java-1.8.0-openjdk-headless-debug-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826691" comment="java-1.8.0-openjdk-javadoc-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826692" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826693" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826694" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826695" comment="java-1.8.0-openjdk-src-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826696" comment="java-1.8.0-openjdk-src-debug-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826665" comment="java-11-openjdk-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826666" comment="java-11-openjdk-debug-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826667" comment="java-11-openjdk-demo-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826668" comment="java-11-openjdk-demo-debug-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826669" comment="java-11-openjdk-devel-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826670" comment="java-11-openjdk-devel-debug-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826671" comment="java-11-openjdk-headless-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826672" comment="java-11-openjdk-headless-debug-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826673" comment="java-11-openjdk-javadoc-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826674" comment="java-11-openjdk-javadoc-debug-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826675" comment="java-11-openjdk-javadoc-zip-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826676" comment="java-11-openjdk-javadoc-zip-debug-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826677" comment="java-11-openjdk-jmods-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826678" comment="java-11-openjdk-jmods-debug-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826679" comment="java-11-openjdk-src-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826680" comment="java-11-openjdk-src-debug-11.0.5.10-0.el7_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192988" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2988</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2988" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2988" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2988" ref_url="https://www.suse.com/security/cve/CVE-2019-2988" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006314.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2557-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WCIMAT2F4HXIE6ZIVQQAFTNF3WZ5QK2Y/#WCIMAT2F4HXIE6ZIVQQAFTNF3WZ5QK2Y" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2565-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7UPD3ISREA7GUESZ6NQVU7DWRQ66OGDW/#7UPD3ISREA7GUESZ6NQVU7DWRQ66OGDW" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2687-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/I6ALR2AGAFL63Y6TKSBCMO2DIQNCCY5U/#I6ALR2AGAFL63Y6TKSBCMO2DIQNCCY5U" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2988/">CVE-2019-2988 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2988">CVE-2019-2988 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1154212">SUSE bug 1154212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158442">SUSE bug 1158442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826697" comment="java-1.7.0-openjdk-1.7.0.241-2.6.20.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826698" comment="java-1.7.0-openjdk-accessibility-1.7.0.241-2.6.20.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826699" comment="java-1.7.0-openjdk-demo-1.7.0.241-2.6.20.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826700" comment="java-1.7.0-openjdk-devel-1.7.0.241-2.6.20.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826701" comment="java-1.7.0-openjdk-headless-1.7.0.241-2.6.20.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826702" comment="java-1.7.0-openjdk-javadoc-1.7.0.241-2.6.20.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826703" comment="java-1.7.0-openjdk-src-1.7.0.241-2.6.20.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826681" comment="java-1.8.0-openjdk-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826682" comment="java-1.8.0-openjdk-accessibility-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826683" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826684" comment="java-1.8.0-openjdk-debug-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826685" comment="java-1.8.0-openjdk-demo-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826686" comment="java-1.8.0-openjdk-demo-debug-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826687" comment="java-1.8.0-openjdk-devel-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826688" comment="java-1.8.0-openjdk-devel-debug-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826689" comment="java-1.8.0-openjdk-headless-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826690" comment="java-1.8.0-openjdk-headless-debug-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826691" comment="java-1.8.0-openjdk-javadoc-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826692" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826693" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826694" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826695" comment="java-1.8.0-openjdk-src-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826696" comment="java-1.8.0-openjdk-src-debug-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826665" comment="java-11-openjdk-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826666" comment="java-11-openjdk-debug-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826667" comment="java-11-openjdk-demo-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826668" comment="java-11-openjdk-demo-debug-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826669" comment="java-11-openjdk-devel-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826670" comment="java-11-openjdk-devel-debug-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826671" comment="java-11-openjdk-headless-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826672" comment="java-11-openjdk-headless-debug-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826673" comment="java-11-openjdk-javadoc-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826674" comment="java-11-openjdk-javadoc-debug-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826675" comment="java-11-openjdk-javadoc-zip-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826676" comment="java-11-openjdk-javadoc-zip-debug-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826677" comment="java-11-openjdk-jmods-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826678" comment="java-11-openjdk-jmods-debug-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826679" comment="java-11-openjdk-src-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826680" comment="java-11-openjdk-src-debug-11.0.5.10-0.el7_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192989" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2989</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2989" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2989" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2989" ref_url="https://www.suse.com/security/cve/CVE-2019-2989" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0051-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200051-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006314.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2557-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WCIMAT2F4HXIE6ZIVQQAFTNF3WZ5QK2Y/#WCIMAT2F4HXIE6ZIVQQAFTNF3WZ5QK2Y" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2565-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7UPD3ISREA7GUESZ6NQVU7DWRQ66OGDW/#7UPD3ISREA7GUESZ6NQVU7DWRQ66OGDW" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2687-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/I6ALR2AGAFL63Y6TKSBCMO2DIQNCCY5U/#I6ALR2AGAFL63Y6TKSBCMO2DIQNCCY5U" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. While the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS v3.0 Base Score 6.8 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2989/">CVE-2019-2989 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2989">CVE-2019-2989 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1154212">SUSE bug 1154212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158442">SUSE bug 1158442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826697" comment="java-1.7.0-openjdk-1.7.0.241-2.6.20.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826698" comment="java-1.7.0-openjdk-accessibility-1.7.0.241-2.6.20.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826699" comment="java-1.7.0-openjdk-demo-1.7.0.241-2.6.20.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826700" comment="java-1.7.0-openjdk-devel-1.7.0.241-2.6.20.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826701" comment="java-1.7.0-openjdk-headless-1.7.0.241-2.6.20.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826702" comment="java-1.7.0-openjdk-javadoc-1.7.0.241-2.6.20.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826703" comment="java-1.7.0-openjdk-src-1.7.0.241-2.6.20.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826681" comment="java-1.8.0-openjdk-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826682" comment="java-1.8.0-openjdk-accessibility-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826683" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826684" comment="java-1.8.0-openjdk-debug-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826685" comment="java-1.8.0-openjdk-demo-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826686" comment="java-1.8.0-openjdk-demo-debug-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826687" comment="java-1.8.0-openjdk-devel-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826688" comment="java-1.8.0-openjdk-devel-debug-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826689" comment="java-1.8.0-openjdk-headless-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826690" comment="java-1.8.0-openjdk-headless-debug-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826691" comment="java-1.8.0-openjdk-javadoc-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826692" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826693" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826694" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826695" comment="java-1.8.0-openjdk-src-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826696" comment="java-1.8.0-openjdk-src-debug-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826665" comment="java-11-openjdk-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826666" comment="java-11-openjdk-debug-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826667" comment="java-11-openjdk-demo-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826668" comment="java-11-openjdk-demo-debug-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826669" comment="java-11-openjdk-devel-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826670" comment="java-11-openjdk-devel-debug-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826671" comment="java-11-openjdk-headless-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826672" comment="java-11-openjdk-headless-debug-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826673" comment="java-11-openjdk-javadoc-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826674" comment="java-11-openjdk-javadoc-debug-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826675" comment="java-11-openjdk-javadoc-zip-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826676" comment="java-11-openjdk-javadoc-zip-debug-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826677" comment="java-11-openjdk-jmods-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826678" comment="java-11-openjdk-jmods-debug-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826679" comment="java-11-openjdk-src-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826680" comment="java-11-openjdk-src-debug-11.0.5.10-0.el7_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192992" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2992</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2992" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2992" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2992" ref_url="https://www.suse.com/security/cve/CVE-2019-2992" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0051-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200051-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006314.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2557-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WCIMAT2F4HXIE6ZIVQQAFTNF3WZ5QK2Y/#WCIMAT2F4HXIE6ZIVQQAFTNF3WZ5QK2Y" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2565-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7UPD3ISREA7GUESZ6NQVU7DWRQ66OGDW/#7UPD3ISREA7GUESZ6NQVU7DWRQ66OGDW" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2687-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/I6ALR2AGAFL63Y6TKSBCMO2DIQNCCY5U/#I6ALR2AGAFL63Y6TKSBCMO2DIQNCCY5U" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2992/">CVE-2019-2992 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2992">CVE-2019-2992 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1154212">SUSE bug 1154212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158442">SUSE bug 1158442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826697" comment="java-1.7.0-openjdk-1.7.0.241-2.6.20.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826698" comment="java-1.7.0-openjdk-accessibility-1.7.0.241-2.6.20.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826699" comment="java-1.7.0-openjdk-demo-1.7.0.241-2.6.20.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826700" comment="java-1.7.0-openjdk-devel-1.7.0.241-2.6.20.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826701" comment="java-1.7.0-openjdk-headless-1.7.0.241-2.6.20.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826702" comment="java-1.7.0-openjdk-javadoc-1.7.0.241-2.6.20.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826703" comment="java-1.7.0-openjdk-src-1.7.0.241-2.6.20.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826681" comment="java-1.8.0-openjdk-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826682" comment="java-1.8.0-openjdk-accessibility-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826683" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826684" comment="java-1.8.0-openjdk-debug-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826685" comment="java-1.8.0-openjdk-demo-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826686" comment="java-1.8.0-openjdk-demo-debug-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826687" comment="java-1.8.0-openjdk-devel-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826688" comment="java-1.8.0-openjdk-devel-debug-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826689" comment="java-1.8.0-openjdk-headless-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826690" comment="java-1.8.0-openjdk-headless-debug-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826691" comment="java-1.8.0-openjdk-javadoc-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826692" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826693" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826694" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826695" comment="java-1.8.0-openjdk-src-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826696" comment="java-1.8.0-openjdk-src-debug-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826665" comment="java-11-openjdk-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826666" comment="java-11-openjdk-debug-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826667" comment="java-11-openjdk-demo-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826668" comment="java-11-openjdk-demo-debug-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826669" comment="java-11-openjdk-devel-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826670" comment="java-11-openjdk-devel-debug-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826671" comment="java-11-openjdk-headless-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826672" comment="java-11-openjdk-headless-debug-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826673" comment="java-11-openjdk-javadoc-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826674" comment="java-11-openjdk-javadoc-debug-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826675" comment="java-11-openjdk-javadoc-zip-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826676" comment="java-11-openjdk-javadoc-zip-debug-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826677" comment="java-11-openjdk-jmods-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826678" comment="java-11-openjdk-jmods-debug-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826679" comment="java-11-openjdk-src-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826680" comment="java-11-openjdk-src-debug-11.0.5.10-0.el7_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192999" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2999</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2999" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2999" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2999" ref_url="https://www.suse.com/security/cve/CVE-2019-2999" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0051-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200051-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006314.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2557-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WCIMAT2F4HXIE6ZIVQQAFTNF3WZ5QK2Y/#WCIMAT2F4HXIE6ZIVQQAFTNF3WZ5QK2Y" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2565-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7UPD3ISREA7GUESZ6NQVU7DWRQ66OGDW/#7UPD3ISREA7GUESZ6NQVU7DWRQ66OGDW" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2687-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/I6ALR2AGAFL63Y6TKSBCMO2DIQNCCY5U/#I6ALR2AGAFL63Y6TKSBCMO2DIQNCCY5U" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE product of Oracle Java SE (component: Javadoc). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE accessible data as well as unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.7 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2999/">CVE-2019-2999 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2999">CVE-2019-2999 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1154212">SUSE bug 1154212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158442">SUSE bug 1158442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826697" comment="java-1.7.0-openjdk-1.7.0.241-2.6.20.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826698" comment="java-1.7.0-openjdk-accessibility-1.7.0.241-2.6.20.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826699" comment="java-1.7.0-openjdk-demo-1.7.0.241-2.6.20.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826700" comment="java-1.7.0-openjdk-devel-1.7.0.241-2.6.20.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826701" comment="java-1.7.0-openjdk-headless-1.7.0.241-2.6.20.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826702" comment="java-1.7.0-openjdk-javadoc-1.7.0.241-2.6.20.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826703" comment="java-1.7.0-openjdk-src-1.7.0.241-2.6.20.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826681" comment="java-1.8.0-openjdk-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826682" comment="java-1.8.0-openjdk-accessibility-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826683" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826684" comment="java-1.8.0-openjdk-debug-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826685" comment="java-1.8.0-openjdk-demo-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826686" comment="java-1.8.0-openjdk-demo-debug-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826687" comment="java-1.8.0-openjdk-devel-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826688" comment="java-1.8.0-openjdk-devel-debug-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826689" comment="java-1.8.0-openjdk-headless-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826690" comment="java-1.8.0-openjdk-headless-debug-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826691" comment="java-1.8.0-openjdk-javadoc-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826692" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826693" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826694" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826695" comment="java-1.8.0-openjdk-src-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826696" comment="java-1.8.0-openjdk-src-debug-1.8.0.232.b09-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826665" comment="java-11-openjdk-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826666" comment="java-11-openjdk-debug-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826667" comment="java-11-openjdk-demo-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826668" comment="java-11-openjdk-demo-debug-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826669" comment="java-11-openjdk-devel-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826670" comment="java-11-openjdk-devel-debug-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826671" comment="java-11-openjdk-headless-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826672" comment="java-11-openjdk-headless-debug-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826673" comment="java-11-openjdk-javadoc-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826674" comment="java-11-openjdk-javadoc-debug-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826675" comment="java-11-openjdk-javadoc-zip-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826676" comment="java-11-openjdk-javadoc-zip-debug-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826677" comment="java-11-openjdk-jmods-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826678" comment="java-11-openjdk-jmods-debug-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826679" comment="java-11-openjdk-src-11.0.5.10-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826680" comment="java-11-openjdk-src-debug-11.0.5.10-0.el7_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193459" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3459</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3459" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3459" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3459" ref_url="https://www.suse.com/security/cve/CVE-2019-3459" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0784-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190784-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0785-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190785-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005734.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0140-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YC36SIOXVJQS57WNCR7J2V2OWLPWEMTW/#YC36SIOXVJQS57WNCR7J2V2OWLPWEMTW" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0203-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UIEBC5XKVMKKVG2FBX5VPRFS2CNKDSF3/#UIEBC5XKVMKKVG2FBX5VPRFS2CNKDSF3" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0274-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NVVKFQLQIXPHKJECDTUPV4RH4VU2HNZY/#NVVKFQLQIXPHKJECDTUPV4RH4VU2HNZY" source="SUSE-SU"/>
    <description>
    A heap address information leak while using L2CAP_GET_CONF_OPT was discovered in the Linux kernel before 5.1-rc1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.6/CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3459/">CVE-2019-3459 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3459">CVE-2019-3459 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1120758">SUSE bug 1120758</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826007" comment="bpftool-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826008" comment="kernel-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826009" comment="kernel-abi-whitelists-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826010" comment="kernel-debug-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826013" comment="kernel-doc-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826014" comment="kernel-headers-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826015" comment="kernel-tools-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826016" comment="kernel-tools-libs-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826018" comment="perf-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826019" comment="python-perf-3.10.0-1062.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193460" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3460</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3460" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3460" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3460" ref_url="https://www.suse.com/security/cve/CVE-2019-3460" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0784-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190784-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0785-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190785-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005734.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0140-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YC36SIOXVJQS57WNCR7J2V2OWLPWEMTW/#YC36SIOXVJQS57WNCR7J2V2OWLPWEMTW" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0203-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UIEBC5XKVMKKVG2FBX5VPRFS2CNKDSF3/#UIEBC5XKVMKKVG2FBX5VPRFS2CNKDSF3" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0274-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NVVKFQLQIXPHKJECDTUPV4RH4VU2HNZY/#NVVKFQLQIXPHKJECDTUPV4RH4VU2HNZY" source="SUSE-SU"/>
    <description>
    A heap data infoleak in multiple locations including L2CAP_PARSE_CONF_RSP was found in the Linux kernel before 5.1-rc1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.6/CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3460/">CVE-2019-3460 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3460">CVE-2019-3460 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1120758">SUSE bug 1120758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155131">SUSE bug 1155131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826007" comment="bpftool-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826008" comment="kernel-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826009" comment="kernel-abi-whitelists-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826010" comment="kernel-debug-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826013" comment="kernel-doc-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826014" comment="kernel-headers-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826015" comment="kernel-tools-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826016" comment="kernel-tools-libs-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826018" comment="perf-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826019" comment="python-perf-3.10.0-1062.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193695" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3695</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3695" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3695" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3695" ref_url="https://www.suse.com/security/cve/CVE-2019-3695" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0356-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006470.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0213-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5H2QLVWXMCNAAZGT4FMPQWBY3GIGIGGY/" source="SUSE-SU"/>
    <description>
    A Improper Control of Generation of Code vulnerability in the packaging of pcp of SUSE Linux Enterprise High Performance Computing 15-ESPOS, SUSE Linux Enterprise High Performance Computing 15-LTSS, SUSE Linux Enterprise Module for Development Tools 15, SUSE Linux Enterprise Module for Development Tools 15-SP1, SUSE Linux Enterprise Module for Open Buildservice Development Tools 15, SUSE Linux Enterprise Server 15-LTSS, SUSE Linux Enterprise Server for SAP 15, SUSE Linux Enterprise Software Development Kit 12-SP4, SUSE Linux Enterprise Software Development Kit 12-SP5; openSUSE Leap 15.1 allows the user pcp to run code as root by placing it into /var/log/pcp/configs.sh This issue affects: SUSE Linux Enterprise High Performance Computing 15-ESPOS pcp versions prior to 3.11.9-5.8.1. SUSE Linux Enterprise High Performance Computing 15-LTSS pcp versions prior to 3.11.9-5.8.1. SUSE Linux Enterprise Module for Development Tools 15 pcp versions prior to 3.11.9-5.8.1. SUSE Linux Enterprise Module for Development Tools 15-SP1 pcp versions prior to 4.3.1-3.5.3. SUSE Linux Enterprise Module for Open Buildservice Development Tools 15 pcp versions prior to 3.11.9-5.8.1. SUSE Linux Enterprise Server 15-LTSS pcp versions prior to 3.11.9-5.8.1. SUSE Linux Enterprise Server for SAP 15 pcp versions prior to 3.11.9-5.8.1. SUSE Linux Enterprise Software Development Kit 12-SP4 pcp versions prior to 3.11.9-6.14.1. SUSE Linux Enterprise Software Development Kit 12-SP5 pcp versions prior to 3.11.9-6.14.1. openSUSE Leap 15.1 pcp versions prior to 4.3.1-lp151.2.3.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-10"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3695/">CVE-2019-3695 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3695">CVE-2019-3695 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1152533">SUSE bug 1152533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152763">SUSE bug 1152763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154062">SUSE bug 1154062</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828126" comment="pcp-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828127" comment="pcp-conf-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828128" comment="pcp-devel-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828129" comment="pcp-doc-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828130" comment="pcp-export-pcp2elasticsearch-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828131" comment="pcp-export-pcp2graphite-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828132" comment="pcp-export-pcp2influxdb-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828133" comment="pcp-export-pcp2json-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828134" comment="pcp-export-pcp2spark-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828135" comment="pcp-export-pcp2xml-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828136" comment="pcp-export-pcp2zabbix-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828137" comment="pcp-export-zabbix-agent-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828138" comment="pcp-gui-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828139" comment="pcp-import-collectl2pcp-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828140" comment="pcp-import-ganglia2pcp-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828141" comment="pcp-import-iostat2pcp-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828142" comment="pcp-import-mrtg2pcp-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828143" comment="pcp-import-sar2pcp-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828144" comment="pcp-libs-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828145" comment="pcp-libs-devel-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828146" comment="pcp-manager-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828147" comment="pcp-pmda-activemq-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828148" comment="pcp-pmda-apache-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828149" comment="pcp-pmda-bash-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828150" comment="pcp-pmda-bcc-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828151" comment="pcp-pmda-bind2-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828152" comment="pcp-pmda-bonding-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828153" comment="pcp-pmda-cifs-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828154" comment="pcp-pmda-cisco-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828155" comment="pcp-pmda-dbping-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828156" comment="pcp-pmda-dm-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828157" comment="pcp-pmda-docker-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828158" comment="pcp-pmda-ds389-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828159" comment="pcp-pmda-ds389log-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828160" comment="pcp-pmda-elasticsearch-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828161" comment="pcp-pmda-gfs2-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828162" comment="pcp-pmda-gluster-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828163" comment="pcp-pmda-gpfs-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828164" comment="pcp-pmda-gpsd-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828165" comment="pcp-pmda-haproxy-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828166" comment="pcp-pmda-infiniband-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828167" comment="pcp-pmda-json-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828168" comment="pcp-pmda-libvirt-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828169" comment="pcp-pmda-lio-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828170" comment="pcp-pmda-lmsensors-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828171" comment="pcp-pmda-logger-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828172" comment="pcp-pmda-lustre-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828173" comment="pcp-pmda-lustrecomm-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828174" comment="pcp-pmda-mailq-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828175" comment="pcp-pmda-memcache-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828176" comment="pcp-pmda-mic-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828177" comment="pcp-pmda-mounts-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828178" comment="pcp-pmda-mysql-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828179" comment="pcp-pmda-named-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828180" comment="pcp-pmda-netfilter-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828181" comment="pcp-pmda-news-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828182" comment="pcp-pmda-nfsclient-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828183" comment="pcp-pmda-nginx-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828184" comment="pcp-pmda-nvidia-gpu-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828185" comment="pcp-pmda-oracle-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828186" comment="pcp-pmda-pdns-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828187" comment="pcp-pmda-perfevent-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828188" comment="pcp-pmda-postfix-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828189" comment="pcp-pmda-postgresql-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828190" comment="pcp-pmda-prometheus-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828191" comment="pcp-pmda-redis-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828192" comment="pcp-pmda-roomtemp-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828193" comment="pcp-pmda-rpm-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828194" comment="pcp-pmda-rsyslog-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828195" comment="pcp-pmda-samba-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828196" comment="pcp-pmda-sendmail-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828197" comment="pcp-pmda-shping-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828198" comment="pcp-pmda-slurm-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828199" comment="pcp-pmda-smart-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828200" comment="pcp-pmda-snmp-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828201" comment="pcp-pmda-summary-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828202" comment="pcp-pmda-systemd-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828203" comment="pcp-pmda-trace-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828204" comment="pcp-pmda-unbound-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828205" comment="pcp-pmda-vmware-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828206" comment="pcp-pmda-weblog-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828207" comment="pcp-pmda-zimbra-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828208" comment="pcp-pmda-zswap-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828209" comment="pcp-selinux-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828210" comment="pcp-system-tools-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828211" comment="pcp-testsuite-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828212" comment="pcp-webapi-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828213" comment="pcp-webapp-blinkenlights-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828214" comment="pcp-webapp-grafana-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828215" comment="pcp-webapp-graphite-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828216" comment="pcp-webapp-vector-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828217" comment="pcp-webjs-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828218" comment="pcp-zeroconf-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828219" comment="perl-PCP-LogImport-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828220" comment="perl-PCP-LogSummary-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828221" comment="perl-PCP-MMV-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828222" comment="perl-PCP-PMDA-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828223" comment="python-pcp-4.3.2-12.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193696" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3696</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3696" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3696" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3696" ref_url="https://www.suse.com/security/cve/CVE-2019-3696" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0356-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006470.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0213-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5H2QLVWXMCNAAZGT4FMPQWBY3GIGIGGY/" source="SUSE-SU"/>
    <description>
    A Improper Limitation of a Pathname to a Restricted Directory vulnerability in the packaging of pcp of SUSE Linux Enterprise High Performance Computing 15-ESPOS, SUSE Linux Enterprise High Performance Computing 15-LTSS, SUSE Linux Enterprise Module for Development Tools 15, SUSE Linux Enterprise Module for Development Tools 15-SP1, SUSE Linux Enterprise Module for Open Buildservice Development Tools 15, SUSE Linux Enterprise Server 15-LTSS, SUSE Linux Enterprise Server for SAP 15, SUSE Linux Enterprise Software Development Kit 12-SP4, SUSE Linux Enterprise Software Development Kit 12-SP5; openSUSE Leap 15.1 allows local user pcp to overwrite arbitrary files with arbitrary content. This issue affects: SUSE Linux Enterprise High Performance Computing 15-ESPOS pcp versions prior to 3.11.9-5.8.1. SUSE Linux Enterprise High Performance Computing 15-LTSS pcp versions prior to 3.11.9-5.8.1. SUSE Linux Enterprise Module for Development Tools 15 pcp versions prior to 3.11.9-5.8.1. SUSE Linux Enterprise Module for Development Tools 15-SP1 pcp versions prior to 4.3.1-3.5.3. SUSE Linux Enterprise Module for Open Buildservice Development Tools 15 pcp versions prior to 3.11.9-5.8.1. SUSE Linux Enterprise Server 15-LTSS pcp versions prior to 3.11.9-5.8.1. SUSE Linux Enterprise Server for SAP 15 pcp versions prior to 3.11.9-5.8.1. SUSE Linux Enterprise Software Development Kit 12-SP4 pcp versions prior to 3.11.9-6.14.1. SUSE Linux Enterprise Software Development Kit 12-SP5 pcp versions prior to 3.11.9-6.14.1. openSUSE Leap 15.1 pcp versions prior to 4.3.1-lp151.2.3.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-08"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3696/">CVE-2019-3696 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3696">CVE-2019-3696 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1152533">SUSE bug 1152533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153921">SUSE bug 1153921</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154062">SUSE bug 1154062</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828126" comment="pcp-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828127" comment="pcp-conf-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828128" comment="pcp-devel-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828129" comment="pcp-doc-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828130" comment="pcp-export-pcp2elasticsearch-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828131" comment="pcp-export-pcp2graphite-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828132" comment="pcp-export-pcp2influxdb-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828133" comment="pcp-export-pcp2json-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828134" comment="pcp-export-pcp2spark-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828135" comment="pcp-export-pcp2xml-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828136" comment="pcp-export-pcp2zabbix-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828137" comment="pcp-export-zabbix-agent-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828138" comment="pcp-gui-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828139" comment="pcp-import-collectl2pcp-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828140" comment="pcp-import-ganglia2pcp-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828141" comment="pcp-import-iostat2pcp-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828142" comment="pcp-import-mrtg2pcp-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828143" comment="pcp-import-sar2pcp-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828144" comment="pcp-libs-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828145" comment="pcp-libs-devel-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828146" comment="pcp-manager-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828147" comment="pcp-pmda-activemq-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828148" comment="pcp-pmda-apache-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828149" comment="pcp-pmda-bash-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828150" comment="pcp-pmda-bcc-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828151" comment="pcp-pmda-bind2-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828152" comment="pcp-pmda-bonding-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828153" comment="pcp-pmda-cifs-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828154" comment="pcp-pmda-cisco-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828155" comment="pcp-pmda-dbping-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828156" comment="pcp-pmda-dm-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828157" comment="pcp-pmda-docker-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828158" comment="pcp-pmda-ds389-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828159" comment="pcp-pmda-ds389log-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828160" comment="pcp-pmda-elasticsearch-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828161" comment="pcp-pmda-gfs2-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828162" comment="pcp-pmda-gluster-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828163" comment="pcp-pmda-gpfs-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828164" comment="pcp-pmda-gpsd-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828165" comment="pcp-pmda-haproxy-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828166" comment="pcp-pmda-infiniband-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828167" comment="pcp-pmda-json-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828168" comment="pcp-pmda-libvirt-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828169" comment="pcp-pmda-lio-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828170" comment="pcp-pmda-lmsensors-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828171" comment="pcp-pmda-logger-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828172" comment="pcp-pmda-lustre-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828173" comment="pcp-pmda-lustrecomm-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828174" comment="pcp-pmda-mailq-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828175" comment="pcp-pmda-memcache-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828176" comment="pcp-pmda-mic-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828177" comment="pcp-pmda-mounts-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828178" comment="pcp-pmda-mysql-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828179" comment="pcp-pmda-named-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828180" comment="pcp-pmda-netfilter-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828181" comment="pcp-pmda-news-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828182" comment="pcp-pmda-nfsclient-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828183" comment="pcp-pmda-nginx-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828184" comment="pcp-pmda-nvidia-gpu-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828185" comment="pcp-pmda-oracle-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828186" comment="pcp-pmda-pdns-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828187" comment="pcp-pmda-perfevent-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828188" comment="pcp-pmda-postfix-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828189" comment="pcp-pmda-postgresql-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828190" comment="pcp-pmda-prometheus-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828191" comment="pcp-pmda-redis-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828192" comment="pcp-pmda-roomtemp-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828193" comment="pcp-pmda-rpm-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828194" comment="pcp-pmda-rsyslog-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828195" comment="pcp-pmda-samba-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828196" comment="pcp-pmda-sendmail-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828197" comment="pcp-pmda-shping-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828198" comment="pcp-pmda-slurm-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828199" comment="pcp-pmda-smart-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828200" comment="pcp-pmda-snmp-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828201" comment="pcp-pmda-summary-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828202" comment="pcp-pmda-systemd-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828203" comment="pcp-pmda-trace-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828204" comment="pcp-pmda-unbound-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828205" comment="pcp-pmda-vmware-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828206" comment="pcp-pmda-weblog-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828207" comment="pcp-pmda-zimbra-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828208" comment="pcp-pmda-zswap-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828209" comment="pcp-selinux-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828210" comment="pcp-system-tools-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828211" comment="pcp-testsuite-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828212" comment="pcp-webapi-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828213" comment="pcp-webapp-blinkenlights-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828214" comment="pcp-webapp-grafana-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828215" comment="pcp-webapp-graphite-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828216" comment="pcp-webapp-vector-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828217" comment="pcp-webjs-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828218" comment="pcp-zeroconf-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828219" comment="perl-PCP-LogImport-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828220" comment="perl-PCP-LogSummary-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828221" comment="perl-PCP-MMV-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828222" comment="perl-PCP-PMDA-4.3.2-12.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828223" comment="python-pcp-4.3.2-12.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193811" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3811</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3811" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3811" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3811" ref_url="https://www.suse.com/security/cve/CVE-2019-3811" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0542-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190542-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0552-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190552-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0556-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190556-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005264.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0344-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NT6ZEFQ4B6JZKL6AAQC6N4XDZ2JOD7Z3/#NT6ZEFQ4B6JZKL6AAQC6N4XDZ2JOD7Z3" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1174-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/X4QZB26KU6RQB26GK2TQJT5NDIOFQCKR/#X4QZB26KU6RQB26GK2TQJT5NDIOFQCKR" source="SUSE-SU"/>
    <description>
    A vulnerability was found in sssd. If a user was configured with no home directory set, sssd would return '/' (the root directory) instead of '' (the empty string / no home directory). This could impact services that restrict the user's filesystem access to within their home directory through chroot() etc. All versions before 2.1 are vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3811/">CVE-2019-3811 at SUSE</cve>
	<cve impact="medium" cvss3="5.2/CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3811">CVE-2019-3811 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1121759">SUSE bug 1121759</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826413" comment="libipa_hbac-1.16.4-21.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826414" comment="libipa_hbac-devel-1.16.4-21.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826415" comment="libsss_autofs-1.16.4-21.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826416" comment="libsss_certmap-1.16.4-21.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826417" comment="libsss_certmap-devel-1.16.4-21.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826418" comment="libsss_idmap-1.16.4-21.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826419" comment="libsss_idmap-devel-1.16.4-21.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826420" comment="libsss_nss_idmap-1.16.4-21.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826421" comment="libsss_nss_idmap-devel-1.16.4-21.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826422" comment="libsss_simpleifp-1.16.4-21.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826423" comment="libsss_simpleifp-devel-1.16.4-21.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826424" comment="libsss_sudo-1.16.4-21.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826425" comment="python-libipa_hbac-1.16.4-21.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826426" comment="python-libsss_nss_idmap-1.16.4-21.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826427" comment="python-sss-1.16.4-21.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826428" comment="python-sss-murmur-1.16.4-21.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826429" comment="python-sssdconfig-1.16.4-21.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826430" comment="sssd-1.16.4-21.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826431" comment="sssd-ad-1.16.4-21.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826432" comment="sssd-client-1.16.4-21.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826433" comment="sssd-common-1.16.4-21.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826434" comment="sssd-common-pac-1.16.4-21.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826435" comment="sssd-dbus-1.16.4-21.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826436" comment="sssd-ipa-1.16.4-21.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826437" comment="sssd-kcm-1.16.4-21.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826438" comment="sssd-krb5-1.16.4-21.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826439" comment="sssd-krb5-common-1.16.4-21.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826440" comment="sssd-ldap-1.16.4-21.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826441" comment="sssd-libwbclient-1.16.4-21.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826442" comment="sssd-libwbclient-devel-1.16.4-21.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826443" comment="sssd-polkit-rules-1.16.4-21.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826444" comment="sssd-proxy-1.16.4-21.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826445" comment="sssd-tools-1.16.4-21.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826446" comment="sssd-winbind-idmap-1.16.4-21.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193813" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3813</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3813" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3813" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3813" ref_url="https://www.suse.com/security/cve/CVE-2019-3813" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0231-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005405.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005094.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0167-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KOYZQCCPVZTLRGKL5HJUTHZCJ6BLDEZI/#KOYZQCCPVZTLRGKL5HJUTHZCJ6BLDEZI" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0176-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IIDK2YHHVUM3VEAJGJZHJA6GVW4XZ2WA/#IIDK2YHHVUM3VEAJGJZHJA6GVW4XZ2WA" source="SUSE-SU"/>
    <description>
    Spice, versions 0.5.2 through 0.14.1, are vulnerable to an out-of-bounds read due to an off-by-one error in memslot_get_virt. This may lead to a denial of service, or, in the worst case, code-execution by unauthenticated attackers.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3813/">CVE-2019-3813 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3813">CVE-2019-3813 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1122706">SUSE bug 1122706</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825530" comment="spice-server-0.14.0-6.el7_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825531" comment="spice-server-devel-0.14.0-6.el7_6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3814</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3814" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3814" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3814" ref_url="https://www.suse.com/security/cve/CVE-2019-3814" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005310.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0243-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QOAK2WGY4Y6IB27AVCF6VZCKTV263VD4/#QOAK2WGY4Y6IB27AVCF6VZCKTV263VD4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1220-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T6JZ5KYWCGBSV4S56647OI7IOJEDU36V/#T6JZ5KYWCGBSV4S56647OI7IOJEDU36V" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14715-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KZSDCZ5LA6IHY7KXVSL6ULAJVP6OFT2M/" source="SUSE-SU"/>
    <description>
    It was discovered that Dovecot before versions 2.2.36.1 and 2.3.4.1 incorrectly handled client certificates. A remote attacker in possession of a valid certificate with an empty username field could possibly use this issue to impersonate other users.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-3814/">CVE-2019-3814 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3814">CVE-2019-3814 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1123022">SUSE bug 1123022</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827673" comment="dovecot-2.2.36-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827674" comment="dovecot-devel-2.2.36-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827675" comment="dovecot-mysql-2.2.36-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827676" comment="dovecot-pgsql-2.2.36-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827677" comment="dovecot-pigeonhole-2.2.36-6.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193815" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3815</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3815" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3815" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3815" ref_url="https://www.suse.com/security/cve/CVE-2019-3815" source="SUSE CVE"/>
    <description>
    A memory leak was discovered in the backport of fixes for CVE-2018-16864 in Red Hat Enterprise Linux. Function dispatch_message_real() in journald-server.c does not free the memory allocated by set_iovec_field_free() to store the `_CMDLINE=` entry. A local attacker may use this flaw to make systemd-journald crash. This issue only affects versions shipped with Red Hat Enterprise since v219-62.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3815/">CVE-2019-3815 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3815">CVE-2019-3815 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1108912">SUSE bug 1108912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120323">SUSE bug 1120323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122265">SUSE bug 1122265</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825511" comment="libgudev1-219-62.el7_6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825512" comment="libgudev1-devel-219-62.el7_6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825513" comment="systemd-219-62.el7_6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825514" comment="systemd-devel-219-62.el7_6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825515" comment="systemd-journal-gateway-219-62.el7_6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825516" comment="systemd-libs-219-62.el7_6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825517" comment="systemd-networkd-219-62.el7_6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825518" comment="systemd-python-219-62.el7_6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825519" comment="systemd-resolved-219-62.el7_6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825520" comment="systemd-sysv-219-62.el7_6.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193816" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3816</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3816" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3816" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3816" ref_url="https://www.suse.com/security/cve/CVE-2019-3816" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0654-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13981-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201913981-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1111-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KFUBWPIQNXTWDIPGMP4SO3OSCZDHINE4/#KFUBWPIQNXTWDIPGMP4SO3OSCZDHINE4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1217-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/F3JF3H3O3OWBKHYTRQ55YYXANXKZZKYQ/#F3JF3H3O3OWBKHYTRQ55YYXANXKZZKYQ" source="SUSE-SU"/>
    <description>
    Openwsman, versions up to and including 2.6.9, are vulnerable to arbitrary file disclosure because the working directory of openwsmand daemon was set to root directory. A remote, unauthenticated attacker can exploit this vulnerability by sending a specially crafted HTTP request to openwsman server.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-3816/">CVE-2019-3816 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3816">CVE-2019-3816 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1122623">SUSE bug 1122623</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825622" comment="libwsman-devel-2.6.3-6.git4391e5c.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825623" comment="libwsman1-2.6.3-6.git4391e5c.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825624" comment="openwsman-client-2.6.3-6.git4391e5c.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825625" comment="openwsman-perl-2.6.3-6.git4391e5c.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825626" comment="openwsman-python-2.6.3-6.git4391e5c.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825627" comment="openwsman-ruby-2.6.3-6.git4391e5c.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825628" comment="openwsman-server-2.6.3-6.git4391e5c.el7_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193820" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3820</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3820" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3820" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3820" ref_url="https://www.suse.com/security/cve/CVE-2019-3820" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005547.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1529-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BPA2B4U4EGKZAFG3RL7B6XB6T4N4TTC7/#BPA2B4U4EGKZAFG3RL7B6XB6T4N4TTC7" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1582-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FKRGPUTD23DJKYAHKVBLVIBSZI3VUZXA/#FKRGPUTD23DJKYAHKVBLVIBSZI3VUZXA" source="SUSE-SU"/>
    <description>
    It was discovered that the gnome-shell lock screen since version 3.15.91 did not properly restrict all contextual actions. An attacker with physical access to a locked workstation could invoke certain keyboard shortcuts, and potentially other actions.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-3820/">CVE-2019-3820 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3820">CVE-2019-3820 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1124493">SUSE bug 1124493</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827009" comment="LibRaw-0.19.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827010" comment="LibRaw-devel-0.19.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827011" comment="LibRaw-static-0.19.4-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827012" comment="accountsservice-0.6.50-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827013" comment="accountsservice-devel-0.6.50-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827014" comment="accountsservice-libs-0.6.50-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827015" comment="colord-1.3.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827016" comment="colord-devel-1.3.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827017" comment="colord-devel-docs-1.3.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827018" comment="colord-extra-profiles-1.3.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827019" comment="colord-libs-1.3.4-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827020" comment="control-center-3.28.1-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827021" comment="control-center-filesystem-3.28.1-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827022" comment="gdm-3.28.2-22.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827023" comment="gdm-devel-3.28.2-22.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827024" comment="gdm-pam-extensions-devel-3.28.2-22.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827025" comment="gnome-classic-session-3.28.1-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827026" comment="gnome-online-accounts-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827027" comment="gnome-online-accounts-devel-3.28.2-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827028" comment="gnome-settings-daemon-3.28.1-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827029" comment="gnome-settings-daemon-devel-3.28.1-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827030" comment="gnome-shell-3.28.3-24.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827031" comment="gnome-shell-extension-alternate-tab-3.28.1-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827032" comment="gnome-shell-extension-apps-menu-3.28.1-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827033" comment="gnome-shell-extension-auto-move-windows-3.28.1-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827034" comment="gnome-shell-extension-common-3.28.1-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827035" comment="gnome-shell-extension-dash-to-dock-3.28.1-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827036" comment="gnome-shell-extension-disable-screenshield-3.28.1-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827037" comment="gnome-shell-extension-drive-menu-3.28.1-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827038" comment="gnome-shell-extension-extra-osk-keys-3.28.1-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827039" comment="gnome-shell-extension-horizontal-workspaces-3.28.1-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827040" comment="gnome-shell-extension-launch-new-instance-3.28.1-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827041" comment="gnome-shell-extension-native-window-placement-3.28.1-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827042" comment="gnome-shell-extension-no-hot-corner-3.28.1-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827043" comment="gnome-shell-extension-panel-favorites-3.28.1-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827044" comment="gnome-shell-extension-places-menu-3.28.1-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827045" comment="gnome-shell-extension-screenshot-window-sizer-3.28.1-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827046" comment="gnome-shell-extension-systemMonitor-3.28.1-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827047" comment="gnome-shell-extension-top-icons-3.28.1-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827048" comment="gnome-shell-extension-updates-dialog-3.28.1-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827049" comment="gnome-shell-extension-user-theme-3.28.1-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827050" comment="gnome-shell-extension-window-grouper-3.28.1-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827051" comment="gnome-shell-extension-window-list-3.28.1-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827052" comment="gnome-shell-extension-windowsNavigator-3.28.1-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827053" comment="gnome-shell-extension-workspace-indicator-3.28.1-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827054" comment="gnome-tweak-tool-3.28.1-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827055" comment="gsettings-desktop-schemas-3.28.0-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827056" comment="gsettings-desktop-schemas-devel-3.28.0-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827057" comment="gtk-update-icon-cache-3.22.30-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827058" comment="gtk3-3.22.30-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827059" comment="gtk3-devel-3.22.30-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827060" comment="gtk3-devel-docs-3.22.30-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827061" comment="gtk3-immodule-xim-3.22.30-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827062" comment="gtk3-immodules-3.22.30-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827063" comment="gtk3-tests-3.22.30-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827064" comment="libcanberra-0.30-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827065" comment="libcanberra-devel-0.30-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827066" comment="libcanberra-gtk2-0.30-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827067" comment="libcanberra-gtk3-0.30-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827068" comment="libgweather-3.28.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827069" comment="libgweather-devel-3.28.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827070" comment="mutter-3.28.3-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827071" comment="mutter-devel-3.28.3-20.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827072" comment="nautilus-3.26.3.1-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827073" comment="nautilus-devel-3.26.3.1-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827074" comment="nautilus-extensions-3.26.3.1-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827075" comment="osinfo-db-20190805-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827076" comment="shared-mime-info-1.8-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827077" comment="tracker-1.10.5-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827078" comment="tracker-devel-1.10.5-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827079" comment="tracker-docs-1.10.5-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827080" comment="tracker-needle-1.10.5-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827081" comment="tracker-preferences-1.10.5-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827082" comment="xchat-2.8.8-25.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827083" comment="xchat-tcl-2.8.8-25.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193827" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3827</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3827" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3827" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3827" ref_url="https://www.suse.com/security/cve/CVE-2019-3827" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005137.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0261-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EHTJ6QR4Z76JZTPUEXBA4LH7I54YMIFE/#EHTJ6QR4Z76JZTPUEXBA4LH7I54YMIFE" source="SUSE-SU"/>
    <description>
    An incorrect permission check in the admin backend in gvfs before version 1.39.4 was found that allows reading and modify arbitrary files by privileged users without asking for password when no authentication agent is running. This vulnerability can be exploited by malicious programs running under privileges of users belonging to the wheel group to further escalate its privileges by modifying system files without user's knowledge. Successful exploitation requires uncommon system configuration.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-02"/>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3827/">CVE-2019-3827 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3827">CVE-2019-3827 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1125084">SUSE bug 1125084</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826374" comment="gvfs-1.36.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826375" comment="gvfs-afc-1.36.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826376" comment="gvfs-afp-1.36.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826377" comment="gvfs-archive-1.36.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826378" comment="gvfs-client-1.36.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826379" comment="gvfs-devel-1.36.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826380" comment="gvfs-fuse-1.36.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826381" comment="gvfs-goa-1.36.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826382" comment="gvfs-gphoto2-1.36.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826383" comment="gvfs-mtp-1.36.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826384" comment="gvfs-smb-1.36.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826385" comment="gvfs-tests-1.36.2-3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193833" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3833</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3833" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3833" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3833" ref_url="https://www.suse.com/security/cve/CVE-2019-3833" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0654-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13981-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201913981-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1111-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KFUBWPIQNXTWDIPGMP4SO3OSCZDHINE4/#KFUBWPIQNXTWDIPGMP4SO3OSCZDHINE4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1217-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/F3JF3H3O3OWBKHYTRQ55YYXANXKZZKYQ/#F3JF3H3O3OWBKHYTRQ55YYXANXKZZKYQ" source="SUSE-SU"/>
    <description>
    Openwsman, versions up to and including 2.6.9, are vulnerable to infinite loop in process_connection() when parsing specially crafted HTTP requests. A remote, unauthenticated attacker can exploit this vulnerability by sending malicious HTTP request to cause denial of service to openwsman server.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-3833/">CVE-2019-3833 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3833">CVE-2019-3833 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1122623">SUSE bug 1122623</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828293" comment="libwsman-devel-2.6.3-7.git4391e5c.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828294" comment="libwsman1-2.6.3-7.git4391e5c.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828295" comment="openwsman-client-2.6.3-7.git4391e5c.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828296" comment="openwsman-perl-2.6.3-7.git4391e5c.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828297" comment="openwsman-python-2.6.3-7.git4391e5c.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828298" comment="openwsman-ruby-2.6.3-7.git4391e5c.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828299" comment="openwsman-server-2.6.3-7.git4391e5c.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3835</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3835" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3835" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3835" ref_url="https://www.suse.com/security/cve/CVE-2019-3835" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005970.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2222-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2XOZCYLX5M5QZSG2QI4G4WPB3AVOCY4C/#2XOZCYLX5M5QZSG2QI4G4WPB3AVOCY4C" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2223-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7XGX735CL3KDIKASKAQUMDRQD4HIHZEJ/#7XGX735CL3KDIKASKAQUMDRQD4HIHZEJ" source="SUSE-SU"/>
    <description>
    It was found that the superexec operator was available in the internal dictionary in ghostscript before 9.27. A specially crafted PostScript file could use this flaw in order to, for example, have access to the file system outside of the constrains imposed by -dSAFER.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3835/">CVE-2019-3835 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3835">CVE-2019-3835 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1129180">SUSE bug 1129180</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825617" comment="ghostscript-9.07-31.el7_6.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825618" comment="ghostscript-cups-9.07-31.el7_6.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825619" comment="ghostscript-devel-9.07-31.el7_6.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825620" comment="ghostscript-doc-9.07-31.el7_6.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825621" comment="ghostscript-gtk-9.07-31.el7_6.10 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193838" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3838</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3838" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3838" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3838" ref_url="https://www.suse.com/security/cve/CVE-2019-3838" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0718-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005228.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1119-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/A5XRFR5Y3TQBE7UG7JJ3TWGGE2DKYEYK/#A5XRFR5Y3TQBE7UG7JJ3TWGGE2DKYEYK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1121-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VNMB7SY4NA6CB3TLYX3CCJWSCLZI2SXL/#VNMB7SY4NA6CB3TLYX3CCJWSCLZI2SXL" source="SUSE-SU"/>
    <description>
    It was found that the forceput operator could be extracted from the DefineResource method in ghostscript before 9.27. A specially crafted PostScript file could use this flaw in order to, for example, have access to the file system outside of the constrains imposed by -dSAFER.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3838/">CVE-2019-3838 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3838">CVE-2019-3838 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1018128">SUSE bug 1018128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030263">SUSE bug 1030263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032135">SUSE bug 1032135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038835">SUSE bug 1038835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050888">SUSE bug 1050888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050889">SUSE bug 1050889</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106171">SUSE bug 1106171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106172">SUSE bug 1106172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106173">SUSE bug 1106173</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107422">SUSE bug 1107422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107423">SUSE bug 1107423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107581">SUSE bug 1107581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111479">SUSE bug 1111479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112229">SUSE bug 1112229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114495">SUSE bug 1114495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117022">SUSE bug 1117022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117327">SUSE bug 1117327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118318">SUSE bug 1118318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129180">SUSE bug 1129180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129186">SUSE bug 1129186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136756">SUSE bug 1136756</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825617" comment="ghostscript-9.07-31.el7_6.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825618" comment="ghostscript-cups-9.07-31.el7_6.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825619" comment="ghostscript-devel-9.07-31.el7_6.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825620" comment="ghostscript-doc-9.07-31.el7_6.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825621" comment="ghostscript-gtk-9.07-31.el7_6.10 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193839" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3839</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3839" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3839" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3839" ref_url="https://www.suse.com/security/cve/CVE-2019-3839" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005970.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2222-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2XOZCYLX5M5QZSG2QI4G4WPB3AVOCY4C/#2XOZCYLX5M5QZSG2QI4G4WPB3AVOCY4C" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2223-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7XGX735CL3KDIKASKAQUMDRQD4HIHZEJ/#7XGX735CL3KDIKASKAQUMDRQD4HIHZEJ" source="SUSE-SU"/>
    <description>
    It was found that in ghostscript some privileged operators remained accessible from various places after the CVE-2019-6116 fix. A specially crafted PostScript file could use this flaw in order to, for example, have access to the file system outside of the constrains imposed by -dSAFER. Ghostscript versions before 9.27 are vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-3839/">CVE-2019-3839 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3839">CVE-2019-3839 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1134156">SUSE bug 1134156</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825700" comment="ghostscript-9.07-31.el7_6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825701" comment="ghostscript-cups-9.07-31.el7_6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825702" comment="ghostscript-devel-9.07-31.el7_6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825703" comment="ghostscript-doc-9.07-31.el7_6.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825704" comment="ghostscript-gtk-9.07-31.el7_6.11 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193840" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3840</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3840" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3840" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3840" ref_url="https://www.suse.com/security/cve/CVE-2019-3840" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0936-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1042-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005368.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1288-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/777DJPBBP6OVYLNA33AECP7XPWPDPERV/#777DJPBBP6OVYLNA33AECP7XPWPDPERV" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1294-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/55FH76FGRVJL2NG6ULO7FIH5PWHNCDN4/#55FH76FGRVJL2NG6ULO7FIH5PWHNCDN4" source="SUSE-SU"/>
    <description>
    A NULL pointer dereference flaw was discovered in libvirt before version 5.0.0 in the way it gets interface information through the QEMU agent. An attacker in a guest VM can use this flaw to crash libvirtd and cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-3840/">CVE-2019-3840 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3840">CVE-2019-3840 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1127458">SUSE bug 1127458</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826526" comment="libvirt-4.5.0-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826527" comment="libvirt-admin-4.5.0-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826528" comment="libvirt-bash-completion-4.5.0-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826529" comment="libvirt-client-4.5.0-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826530" comment="libvirt-daemon-4.5.0-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826531" comment="libvirt-daemon-config-network-4.5.0-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826532" comment="libvirt-daemon-config-nwfilter-4.5.0-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826533" comment="libvirt-daemon-driver-interface-4.5.0-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826534" comment="libvirt-daemon-driver-lxc-4.5.0-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826535" comment="libvirt-daemon-driver-network-4.5.0-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826536" comment="libvirt-daemon-driver-nodedev-4.5.0-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826537" comment="libvirt-daemon-driver-nwfilter-4.5.0-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826538" comment="libvirt-daemon-driver-qemu-4.5.0-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826539" comment="libvirt-daemon-driver-secret-4.5.0-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826540" comment="libvirt-daemon-driver-storage-4.5.0-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826541" comment="libvirt-daemon-driver-storage-core-4.5.0-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826542" comment="libvirt-daemon-driver-storage-disk-4.5.0-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826543" comment="libvirt-daemon-driver-storage-gluster-4.5.0-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826544" comment="libvirt-daemon-driver-storage-iscsi-4.5.0-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826545" comment="libvirt-daemon-driver-storage-logical-4.5.0-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826546" comment="libvirt-daemon-driver-storage-mpath-4.5.0-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826547" comment="libvirt-daemon-driver-storage-rbd-4.5.0-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826548" comment="libvirt-daemon-driver-storage-scsi-4.5.0-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826549" comment="libvirt-daemon-kvm-4.5.0-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826550" comment="libvirt-daemon-lxc-4.5.0-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826551" comment="libvirt-devel-4.5.0-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826552" comment="libvirt-docs-4.5.0-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826553" comment="libvirt-libs-4.5.0-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826554" comment="libvirt-lock-sanlock-4.5.0-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826555" comment="libvirt-login-shell-4.5.0-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826556" comment="libvirt-nss-4.5.0-23.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193846" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3846</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3846" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3846" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3846" ref_url="https://www.suse.com/security/cve/CVE-2019-3846" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1668-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1674-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1570-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NJCQPY6KJMGUNOCG3VYC34NI2F6XUC3N/#NJCQPY6KJMGUNOCG3VYC34NI2F6XUC3N" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1571-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CDOL6RIYB7LA5CRMCAHJHNNPCUYRJAEV/#CDOL6RIYB7LA5CRMCAHJHNNPCUYRJAEV" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1579-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GOX3GRSFJIOAQWX677KTNVAGGH653HWU/#GOX3GRSFJIOAQWX677KTNVAGGH653HWU" source="SUSE-SU"/>
    <description>
    A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3846/">CVE-2019-3846 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3846">CVE-2019-3846 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1136424">SUSE bug 1136424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136446">SUSE bug 1136446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156330">SUSE bug 1156330</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826650" comment="bpftool-3.10.0-1062.4.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826651" comment="kernel-3.10.0-1062.4.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826652" comment="kernel-abi-whitelists-3.10.0-1062.4.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826653" comment="kernel-debug-3.10.0-1062.4.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826656" comment="kernel-doc-3.10.0-1062.4.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826657" comment="kernel-headers-3.10.0-1062.4.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826658" comment="kernel-tools-3.10.0-1062.4.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826659" comment="kernel-tools-libs-3.10.0-1062.4.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826661" comment="perf-3.10.0-1062.4.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826662" comment="python-perf-3.10.0-1062.4.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193855" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3855</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3855" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3855" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3855" ref_url="https://www.suse.com/security/cve/CVE-2019-3855" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13982-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201913982-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007887.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1075-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RT3KLE6OCATVJTFMDJJYTQWCFMJMLES6/#RT3KLE6OCATVJTFMDJJYTQWCFMJMLES6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1109-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZD25U3ME4BCNPHHDUMEWX4A2M5KJM34P/#ZD25U3ME4BCNPHHDUMEWX4A2M5KJM34P" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2126-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VZ5CXNJKJVQFPMHVDXDS6F67TKZ3TJ7E/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2129-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HAQH2P56QS5PVJGYRATVMCCAWSF5JABQ/" source="SUSE-SU"/>
    <description>
    An integer overflow flaw which could lead to an out of bounds write was discovered in libssh2 before 1.8.1 in the way packets are read from the server. A remote attacker who compromises a SSH server may be able to execute code on the client system when a user connects to the server.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-12-11"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3855/">CVE-2019-3855 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3855">CVE-2019-3855 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1128471">SUSE bug 1128471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134329">SUSE bug 1134329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135434">SUSE bug 1135434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141850">SUSE bug 1141850</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825630" comment="libssh2-1.4.3-12.el7_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825631" comment="libssh2-devel-1.4.3-12.el7_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825632" comment="libssh2-docs-1.4.3-12.el7_6.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193856" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3856</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3856" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3856" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3856" ref_url="https://www.suse.com/security/cve/CVE-2019-3856" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13982-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201913982-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007887.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1075-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RT3KLE6OCATVJTFMDJJYTQWCFMJMLES6/#RT3KLE6OCATVJTFMDJJYTQWCFMJMLES6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1109-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZD25U3ME4BCNPHHDUMEWX4A2M5KJM34P/#ZD25U3ME4BCNPHHDUMEWX4A2M5KJM34P" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2126-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VZ5CXNJKJVQFPMHVDXDS6F67TKZ3TJ7E/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2129-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HAQH2P56QS5PVJGYRATVMCCAWSF5JABQ/" source="SUSE-SU"/>
    <description>
    An integer overflow flaw, which could lead to an out of bounds write, was discovered in libssh2 before 1.8.1 in the way keyboard prompt requests are parsed. A remote attacker who compromises a SSH server may be able to execute code on the client system when a user connects to the server.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-12-10"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3856/">CVE-2019-3856 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3856">CVE-2019-3856 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1128472">SUSE bug 1128472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135434">SUSE bug 1135434</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825630" comment="libssh2-1.4.3-12.el7_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825631" comment="libssh2-devel-1.4.3-12.el7_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825632" comment="libssh2-docs-1.4.3-12.el7_6.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193857" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3857</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3857" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3857" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3857" ref_url="https://www.suse.com/security/cve/CVE-2019-3857" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13982-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201913982-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007887.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1075-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RT3KLE6OCATVJTFMDJJYTQWCFMJMLES6/#RT3KLE6OCATVJTFMDJJYTQWCFMJMLES6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1109-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZD25U3ME4BCNPHHDUMEWX4A2M5KJM34P/#ZD25U3ME4BCNPHHDUMEWX4A2M5KJM34P" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2126-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VZ5CXNJKJVQFPMHVDXDS6F67TKZ3TJ7E/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2129-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HAQH2P56QS5PVJGYRATVMCCAWSF5JABQ/" source="SUSE-SU"/>
    <description>
    An integer overflow flaw which could lead to an out of bounds write was discovered in libssh2 before 1.8.1 in the way SSH_MSG_CHANNEL_REQUEST packets with an exit signal are parsed. A remote attacker who compromises a SSH server may be able to execute code on the client system when a user connects to the server.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-12-10"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3857/">CVE-2019-3857 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3857">CVE-2019-3857 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1128474">SUSE bug 1128474</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135434">SUSE bug 1135434</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825630" comment="libssh2-1.4.3-12.el7_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825631" comment="libssh2-devel-1.4.3-12.el7_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825632" comment="libssh2-docs-1.4.3-12.el7_6.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193858" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3858</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3858" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3858" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3858" ref_url="https://www.suse.com/security/cve/CVE-2019-3858" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13982-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201913982-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007887.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1075-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RT3KLE6OCATVJTFMDJJYTQWCFMJMLES6/#RT3KLE6OCATVJTFMDJJYTQWCFMJMLES6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1109-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZD25U3ME4BCNPHHDUMEWX4A2M5KJM34P/#ZD25U3ME4BCNPHHDUMEWX4A2M5KJM34P" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2126-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VZ5CXNJKJVQFPMHVDXDS6F67TKZ3TJ7E/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2129-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HAQH2P56QS5PVJGYRATVMCCAWSF5JABQ/" source="SUSE-SU"/>
    <description>
    An out of bounds read flaw was discovered in libssh2 before 1.8.1 when a specially crafted SFTP packet is received from the server. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3858/">CVE-2019-3858 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3858">CVE-2019-3858 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1128476">SUSE bug 1128476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135434">SUSE bug 1135434</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826323" comment="libssh2-1.8.0-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826324" comment="libssh2-devel-1.8.0-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826325" comment="libssh2-docs-1.8.0-3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193861" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3861</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3861" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3861" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3861" ref_url="https://www.suse.com/security/cve/CVE-2019-3861" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13982-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201913982-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007887.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1075-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RT3KLE6OCATVJTFMDJJYTQWCFMJMLES6/#RT3KLE6OCATVJTFMDJJYTQWCFMJMLES6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1109-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZD25U3ME4BCNPHHDUMEWX4A2M5KJM34P/#ZD25U3ME4BCNPHHDUMEWX4A2M5KJM34P" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2126-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VZ5CXNJKJVQFPMHVDXDS6F67TKZ3TJ7E/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2129-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HAQH2P56QS5PVJGYRATVMCCAWSF5JABQ/" source="SUSE-SU"/>
    <description>
    An out of bounds read flaw was discovered in libssh2 before 1.8.1 in the way SSH packets with a padding length value greater than the packet length are parsed. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-12-12"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3861/">CVE-2019-3861 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3861">CVE-2019-3861 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1128490">SUSE bug 1128490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135434">SUSE bug 1135434</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826323" comment="libssh2-1.8.0-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826324" comment="libssh2-devel-1.8.0-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826325" comment="libssh2-docs-1.8.0-3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193862" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3862</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3862" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3862" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3862" ref_url="https://www.suse.com/security/cve/CVE-2019-3862" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13982-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201913982-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007887.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1075-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RT3KLE6OCATVJTFMDJJYTQWCFMJMLES6/#RT3KLE6OCATVJTFMDJJYTQWCFMJMLES6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1109-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZD25U3ME4BCNPHHDUMEWX4A2M5KJM34P/#ZD25U3ME4BCNPHHDUMEWX4A2M5KJM34P" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2126-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VZ5CXNJKJVQFPMHVDXDS6F67TKZ3TJ7E/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2129-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HAQH2P56QS5PVJGYRATVMCCAWSF5JABQ/" source="SUSE-SU"/>
    <description>
    An out of bounds read flaw was discovered in libssh2 before 1.8.1 in the way SSH_MSG_CHANNEL_REQUEST packets with an exit status message and no payload are parsed. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-12-10"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3862/">CVE-2019-3862 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3862">CVE-2019-3862 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1128492">SUSE bug 1128492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135434">SUSE bug 1135434</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825952" comment="libssh2-1.4.3-12.el7_6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825953" comment="libssh2-devel-1.4.3-12.el7_6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825954" comment="libssh2-docs-1.4.3-12.el7_6.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193863" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3863</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3863" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3863" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3863" ref_url="https://www.suse.com/security/cve/CVE-2019-3863" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13982-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201913982-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007887.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1075-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RT3KLE6OCATVJTFMDJJYTQWCFMJMLES6/#RT3KLE6OCATVJTFMDJJYTQWCFMJMLES6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1109-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZD25U3ME4BCNPHHDUMEWX4A2M5KJM34P/#ZD25U3ME4BCNPHHDUMEWX4A2M5KJM34P" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2126-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VZ5CXNJKJVQFPMHVDXDS6F67TKZ3TJ7E/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2129-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HAQH2P56QS5PVJGYRATVMCCAWSF5JABQ/" source="SUSE-SU"/>
    <description>
    A flaw was found in libssh2 before 1.8.1 creating a vulnerability on the SSH client side. A server could send a multiple keyboard interactive response messages whose total length are greater than unsigned char max characters. This value is used by the SSH client as an index to copy memory causing in an out of bounds memory write error.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-12-19"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3863/">CVE-2019-3863 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3863">CVE-2019-3863 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1128493">SUSE bug 1128493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130103">SUSE bug 1130103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135434">SUSE bug 1135434</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825630" comment="libssh2-1.4.3-12.el7_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825631" comment="libssh2-devel-1.4.3-12.el7_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825632" comment="libssh2-docs-1.4.3-12.el7_6.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193877" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3877</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3877" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3877" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3877" ref_url="https://www.suse.com/security/cve/CVE-2019-3877" source="SUSE CVE"/>
    <description>
    A vulnerability was found in mod_auth_mellon before v0.14.2. An open redirect in the logout URL allows requests with backslashes to pass through by assuming that it is a relative URL, while the browsers silently convert backslash characters into forward slashes treating them as an absolute URL. This mismatch allows an attacker to bypass the redirect URL validation logic in apr_uri_parse function.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-3877/">CVE-2019-3877 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3877">CVE-2019-3877 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1153666">SUSE bug 1153666</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825645" comment="mod_auth_mellon-0.14.0-2.el7_6.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825646" comment="mod_auth_mellon-diagnostics-0.14.0-2.el7_6.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193878" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3878</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3878" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3878" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3878" ref_url="https://www.suse.com/security/cve/CVE-2019-3878" source="SUSE CVE"/>
    <description>
    A vulnerability was found in mod_auth_mellon before v0.14.2. If Apache is configured as a reverse proxy and mod_auth_mellon is configured to only let through authenticated users (with the require valid-user directive), adding special HTTP headers that are normally used to start the special SAML ECP (non-browser based) can be used to bypass authentication.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-3878/">CVE-2019-3878 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3878">CVE-2019-3878 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825645" comment="mod_auth_mellon-0.14.0-2.el7_6.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825646" comment="mod_auth_mellon-diagnostics-0.14.0-2.el7_6.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193880" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3880</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3880" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3880" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3880" ref_url="https://www.suse.com/security/cve/CVE-2019-3880" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14042-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005435.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1180-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/A3YQCPWQDOVIHYCAJA7PNFVBS6RMALBA/#A3YQCPWQDOVIHYCAJA7PNFVBS6RMALBA" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1292-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OSRDEK7FHUMHIZG35B4RXJ52RGPT2A55/#OSRDEK7FHUMHIZG35B4RXJ52RGPT2A55" source="SUSE-SU"/>
    <description>
    A flaw was found in the way samba implemented an RPC endpoint emulating the Windows registry service API. An unprivileged attacker could use this flaw to create a new registry hive file anywhere they have unix permissions which could lead to creation of a new file in the Samba share. Versions before 4.8.11, 4.9.6 and 4.10.2 are vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3880/">CVE-2019-3880 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3880">CVE-2019-3880 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1131060">SUSE bug 1131060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139519">SUSE bug 1139519</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826160" comment="ctdb-4.9.1-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826161" comment="ctdb-tests-4.9.1-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826162" comment="libsmbclient-4.9.1-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826163" comment="libsmbclient-devel-4.9.1-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826164" comment="libwbclient-4.9.1-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826165" comment="libwbclient-devel-4.9.1-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826166" comment="samba-4.9.1-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826167" comment="samba-client-4.9.1-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826168" comment="samba-client-libs-4.9.1-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826169" comment="samba-common-4.9.1-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826170" comment="samba-common-libs-4.9.1-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826171" comment="samba-common-tools-4.9.1-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826172" comment="samba-dc-4.9.1-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826173" comment="samba-dc-libs-4.9.1-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826174" comment="samba-devel-4.9.1-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826175" comment="samba-krb5-printing-4.9.1-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826176" comment="samba-libs-4.9.1-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826177" comment="samba-pidl-4.9.1-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826178" comment="samba-python-4.9.1-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826179" comment="samba-python-test-4.9.1-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826180" comment="samba-test-4.9.1-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826181" comment="samba-test-libs-4.9.1-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826182" comment="samba-vfs-glusterfs-4.9.1-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826183" comment="samba-winbind-4.9.1-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826184" comment="samba-winbind-clients-4.9.1-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826185" comment="samba-winbind-krb5-locator-4.9.1-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826186" comment="samba-winbind-modules-4.9.1-6.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193882" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3882</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3882" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3882" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3882" ref_url="https://www.suse.com/security/cve/CVE-2019-3882" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1404-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZZ2FZBVA3Q7VOUC5KRK2EODJSBYJDCKH/#ZZ2FZBVA3Q7VOUC5KRK2EODJSBYJDCKH" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1407-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UMXCAWC5QTZVSPZOYUW3E3GVJJUKCQ2S/#UMXCAWC5QTZVSPZOYUW3E3GVJJUKCQ2S" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1479-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/B4DQLC5NNFA52SY3VMJNLGCDAOQAXY7D/#B4DQLC5NNFA52SY3VMJNLGCDAOQAXY7D" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel's vfio interface implementation that permits violation of the user's locked memory limit. If a device is bound to a vfio driver, such as vfio-pci, and the local attacker is administratively granted ownership of the device, it may cause a system memory exhaustion and thus a denial of service (DoS). Versions 3.10, 4.14 and 4.18 are vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-3882/">CVE-2019-3882 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3882">CVE-2019-3882 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1131416">SUSE bug 1131416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131427">SUSE bug 1131427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133319">SUSE bug 1133319</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826007" comment="bpftool-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826008" comment="kernel-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826009" comment="kernel-abi-whitelists-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826010" comment="kernel-debug-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826013" comment="kernel-doc-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826014" comment="kernel-headers-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826015" comment="kernel-tools-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826016" comment="kernel-tools-libs-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826018" comment="perf-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826019" comment="python-perf-3.10.0-1062.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193883" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3883</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3883" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3883" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3883" ref_url="https://www.suse.com/security/cve/CVE-2019-3883" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005817.html" source="SUSE-SU"/>
    <description>
    In 389-ds-base up to version 1.4.1.2, requests are handled by workers threads. Each sockets will be waited by the worker for at most 'ioblocktimeout' seconds. However this timeout applies only for un-encrypted requests. Connections using SSL/TLS are not taking this timeout into account during reads, and may hang longer.An unauthenticated attacker could repeatedly create hanging LDAP requests to hang all the workers, resulting in a Denial of Service.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3883/">CVE-2019-3883 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3883">CVE-2019-3883 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1132385">SUSE bug 1132385</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825955" comment="389-ds-base-1.3.8.4-25.1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825956" comment="389-ds-base-devel-1.3.8.4-25.1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825957" comment="389-ds-base-libs-1.3.8.4-25.1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825958" comment="389-ds-base-snmp-1.3.8.4-25.1.el7_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193890" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3890</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3890" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3890" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3890" ref_url="https://www.suse.com/security/cve/CVE-2019-3890" source="SUSE CVE"/>
    <description>
    It was discovered evolution-ews before 3.31.3 does not check the validity of SSL certificates. An attacker could abuse this flaw to get confidential information by tricking the user into connecting to a fake server without the user noticing the difference.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-3890/">CVE-2019-3890 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3890">CVE-2019-3890 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1131359">SUSE bug 1131359</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827697" comment="atk-2.28.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827698" comment="atk-devel-2.28.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827699" comment="evolution-3.28.5-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827700" comment="evolution-bogofilter-3.28.5-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827701" comment="evolution-data-server-3.28.5-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827702" comment="evolution-data-server-devel-3.28.5-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827703" comment="evolution-data-server-doc-3.28.5-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827704" comment="evolution-data-server-langpacks-3.28.5-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827705" comment="evolution-data-server-perl-3.28.5-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827706" comment="evolution-data-server-tests-3.28.5-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827707" comment="evolution-devel-3.28.5-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827708" comment="evolution-devel-docs-3.28.5-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827709" comment="evolution-ews-3.28.5-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827710" comment="evolution-ews-langpacks-3.28.5-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827711" comment="evolution-help-3.28.5-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827712" comment="evolution-langpacks-3.28.5-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827713" comment="evolution-pst-3.28.5-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827714" comment="evolution-spamassassin-3.28.5-8.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193900" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3900</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3900" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3900" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3900" ref_url="https://www.suse.com/security/cve/CVE-2019-3900" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3217-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-September/020289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013765.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
    <description>
    An infinite loop issue was found in the vhost_net kernel module in Linux Kernel up to and including v5.1-rc6, while handling incoming packets in handle_rx(). It could occur if one end sends packets faster than the other end can process them. A guest user, maybe remote one, could use this flaw to stall the vhost_net kernel thread, resulting in a DoS scenario.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-3900/">CVE-2019-3900 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3900">CVE-2019-3900 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1133374">SUSE bug 1133374</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826007" comment="bpftool-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826008" comment="kernel-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826009" comment="kernel-abi-whitelists-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826010" comment="kernel-debug-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826013" comment="kernel-doc-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826014" comment="kernel-headers-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826015" comment="kernel-tools-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826016" comment="kernel-tools-libs-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826018" comment="perf-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826019" comment="python-perf-3.10.0-1062.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193901" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3901</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3901" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3901" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3901" ref_url="https://www.suse.com/security/cve/CVE-2019-3901" source="SUSE CVE"/>
    <description>
    A race condition in perf_event_open() allows local attackers to leak sensitive data from setuid programs. As no relevant locks (in particular the cred_guard_mutex) are held during the ptrace_may_access() call, it is possible for the specified target task to perform an execve() syscall with setuid execution before perf_event_alloc() actually attaches to it, allowing an attacker to bypass the ptrace_may_access() check and the perf_event_exit_task(current) call that is performed in install_exec_creds() during privileged execve() calls. This issue affects kernel versions before 4.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-3901/">CVE-2019-3901 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3901">CVE-2019-3901 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1132374">SUSE bug 1132374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133106">SUSE bug 1133106</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826993" comment="bpftool-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826994" comment="kernel-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826995" comment="kernel-abi-whitelists-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826996" comment="kernel-debug-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826999" comment="kernel-doc-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827000" comment="kernel-headers-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827001" comment="kernel-tools-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827002" comment="kernel-tools-libs-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827004" comment="perf-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827005" comment="python-perf-3.10.0-1127.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195010" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5010</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5010" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5010" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5010" ref_url="https://www.suse.com/security/cve/CVE-2019-5010" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:17-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0444-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0447-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0450-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0452-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0456-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0243-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0482-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008118.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0155-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NY6OZIHZM76MZKDRQYP5AGGMPDVFH6AL/#NY6OZIHZM76MZKDRQYP5AGGMPDVFH6AL" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0184-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YSG6J77EBBTYJCB655ESSA3XS2MLQXEY/#YSG6J77EBBTYJCB655ESSA3XS2MLQXEY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0292-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IXW4Q5XXH3FLRADKBIW4D7ORQVXQFZS5/#IXW4Q5XXH3FLRADKBIW4D7ORQVXQFZS5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0086-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SRKGGFVSV7DDWCMAOSO6E3F66U2CF5XR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2332-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S3JTHM6LLDKL7VPNRJUSRPNZAD2FZ25H/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2333-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FLGERALYYFTBIX3ZKPM6EQ2WJVUXLOXY/" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/pipermail/neuvector-updates/2023-November/000021.html" source="SUSE-SU"/>
    <description>
    An exploitable denial-of-service vulnerability exists in the X509 certificate parser of Python.org Python 2.7.11 / 3.6.6. A specially crafted X509 certificate can cause a NULL pointer dereference, resulting in a denial of service. An attacker can initiate or accept TLS connections using crafted certificates to trigger this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-05"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5010/">CVE-2019-5010 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5010">CVE-2019-5010 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1122191">SUSE bug 1122191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826020" comment="python-2.7.5-86.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826021" comment="python-debug-2.7.5-86.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826022" comment="python-devel-2.7.5-86.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826023" comment="python-libs-2.7.5-86.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826024" comment="python-test-2.7.5-86.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826025" comment="python-tools-2.7.5-86.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826026" comment="tkinter-2.7.5-86.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195094" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5094</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5094" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5094" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5094" ref_url="https://www.suse.com/security/cve/CVE-2019-5094" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2019:2676-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2019-October/012746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2019:2677-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2019-October/012745.html" source="SUSE-SU"/>
    <description>
    An exploitable code execution vulnerability exists in the quota file functionality of E2fsprogs 1.45.3. A specially crafted ext4 partition can cause an out-of-bounds write on the heap, resulting in code execution. An attacker can corrupt a partition to trigger this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5094/">CVE-2019-5094 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5094">CVE-2019-5094 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1152101">SUSE bug 1152101</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828481" comment="e2fsprogs-1.42.9-19.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828482" comment="e2fsprogs-devel-1.42.9-19.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828483" comment="e2fsprogs-libs-1.42.9-19.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828484" comment="e2fsprogs-static-1.42.9-19.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828485" comment="libcom_err-1.42.9-19.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828486" comment="libcom_err-devel-1.42.9-19.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828487" comment="libss-1.42.9-19.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828488" comment="libss-devel-1.42.9-19.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195188" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5188</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5188" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5188" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5188" ref_url="https://www.suse.com/security/cve/CVE-2019-5188" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:25-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006420.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:31-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006421.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:33-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:35-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:39-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:51-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:52-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:53-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:9-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006332.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006471.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0166-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UAY64T4BPHMZUGCVF62LR4FNFISTO7DG/" source="SUSE-SU"/>
    <description>
    A code execution vulnerability exists in the directory rehashing functionality of E2fsprogs e2fsck 1.45.4. A specially crafted ext4 directory can cause an out-of-bounds write on the stack, resulting in code execution. An attacker can corrupt a partition to trigger this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5188/">CVE-2019-5188 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5188">CVE-2019-5188 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1160571">SUSE bug 1160571</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828481" comment="e2fsprogs-1.42.9-19.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828482" comment="e2fsprogs-devel-1.42.9-19.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828483" comment="e2fsprogs-libs-1.42.9-19.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828484" comment="e2fsprogs-static-1.42.9-19.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828485" comment="libcom_err-1.42.9-19.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828486" comment="libcom_err-devel-1.42.9-19.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828487" comment="libss-1.42.9-19.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828488" comment="libss-devel-1.42.9-19.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195436" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5436</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5436" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5436" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5436" ref_url="https://www.suse.com/security/cve/CVE-2019-5436" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1357-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1363-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005506.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2009-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192009-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1492-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GTGSFLU55LI4HBELIVJXSI5XTJVBNXL4/#GTGSFLU55LI4HBELIVJXSI5XTJVBNXL4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1508-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WWO3X5LYUW2TEQ63D4DELZMU4QQZVAWH/#WWO3X5LYUW2TEQ63D4DELZMU4QQZVAWH" source="SUSE-SU"/>
    <description>
    A heap buffer overflow in the TFTP receiving code allows for DoS or arbitrary code execution in libcurl versions 7.19.4 through 7.64.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5436/">CVE-2019-5436 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5436">CVE-2019-5436 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1135170">SUSE bug 1135170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149496">SUSE bug 1149496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154162">SUSE bug 1154162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167096">SUSE bug 1167096</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827006" comment="curl-7.29.0-57.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827007" comment="libcurl-7.29.0-57.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827008" comment="libcurl-devel-7.29.0-57.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195482" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5482</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5482" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5482" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5482" ref_url="https://www.suse.com/security/cve/CVE-2019-5482" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:25-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005897.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2339-2" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192339-2.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2373-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192373-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005919.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2149-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NIKS45KSFVOLSIAG25BFXES44NWKE3CF/#NIKS45KSFVOLSIAG25BFXES44NWKE3CF" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2169-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2OQDY2WY4IJ7RZNRIYSG6HVK76K77GK2/#2OQDY2WY4IJ7RZNRIYSG6HVK76K77GK2" source="SUSE-SU"/>
    <description>
    Heap buffer overflow in the TFTP protocol handler in cURL 7.19.4 to 7.65.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5482/">CVE-2019-5482 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5482">CVE-2019-5482 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1149496">SUSE bug 1149496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156634">SUSE bug 1156634</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828276" comment="curl-7.29.0-59.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828277" comment="libcurl-7.29.0-59.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828278" comment="libcurl-devel-7.29.0-59.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195489" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5489</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5489" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5489" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5489" ref_url="https://www.suse.com/security/cve/CVE-2019-5489" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="TID000019369" ref_url="https://www.suse.com/support/kb/doc/?id=000019369" source="SUSE-SU"/>
		<reference ref_id="TID7023616" ref_url="https://www.suse.com/support/kb/doc/?id=7023616" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1479-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/B4DQLC5NNFA52SY3VMJNLGCDAOQAXY7D/#B4DQLC5NNFA52SY3VMJNLGCDAOQAXY7D" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1570-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NJCQPY6KJMGUNOCG3VYC34NI2F6XUC3N/#NJCQPY6KJMGUNOCG3VYC34NI2F6XUC3N" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1579-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GOX3GRSFJIOAQWX677KTNVAGGH653HWU/#GOX3GRSFJIOAQWX677KTNVAGGH653HWU" source="SUSE-SU"/>
    <description>
    The mincore() implementation in mm/mincore.c in the Linux kernel through 4.19.13 allowed local attackers to observe page cache access patterns of other processes on the same system, potentially allowing sniffing of secret information. (Fixing this affects the output of the fincore program.) Limited remote exploitation may be possible, as demonstrated by latency differences in accessing public files from an Apache HTTP Server.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-5489/">CVE-2019-5489 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5489">CVE-2019-5489 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1120843">SUSE bug 1120843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120885">SUSE bug 1120885</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826007" comment="bpftool-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826008" comment="kernel-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826009" comment="kernel-abi-whitelists-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826010" comment="kernel-debug-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826013" comment="kernel-doc-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826014" comment="kernel-headers-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826015" comment="kernel-tools-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826016" comment="kernel-tools-libs-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826018" comment="perf-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826019" comment="python-perf-3.10.0-1062.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195544" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5544</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5544" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5544" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5544" ref_url="https://www.suse.com/security/cve/CVE-2019-5544" source="SUSE CVE"/>
    <description>
    OpenSLP as used in ESXi and the Horizon DaaS appliances has a heap overwrite issue. VMware has evaluated the severity of this issue to be in the Critical severity range with a maximum CVSSv3 base score of 9.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5544/">CVE-2019-5544 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5544">CVE-2019-5544 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1157869">SUSE bug 1157869</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826801" comment="openslp-2.0.0-8.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826802" comment="openslp-devel-2.0.0-8.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826803" comment="openslp-server-2.0.0-8.el7_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195785" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5785</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5785" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5785" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5785" ref_url="https://www.suse.com/security/cve/CVE-2019-5785" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005294.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0202-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/76BHXWZR6NIF34CVLAJSPKLDIVI6QUYR/#76BHXWZR6NIF34CVLAJSPKLDIVI6QUYR" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0248-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XMFECNQD7OR7OS7QMHOXX2IJDRTXXZP5/#XMFECNQD7OR7OS7QMHOXX2IJDRTXXZP5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0249-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NSXP45BAXW5ILKJSQRXHTBUOBZUKLD2F/#NSXP45BAXW5ILKJSQRXHTBUOBZUKLD2F" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0250-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XYPZEBWIK7AMOD476T3MOZLNOKSPBHWB/#XYPZEBWIK7AMOD476T3MOZLNOKSPBHWB" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0251-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YTL5HAWTQVZCKKAVSVP4LCGEQTWZR73J/#YTL5HAWTQVZCKKAVSVP4LCGEQTWZR73J" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1126-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GSODLL2FRT4TZVOPDYQGDUHJR25R63RL/#GSODLL2FRT4TZVOPDYQGDUHJR25R63RL" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1162-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AL5AUD2CY37ZNSQZPBX6C3K32ZVWBIIH/#AL5AUD2CY37ZNSQZPBX6C3K32ZVWBIIH" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Incorrect convexity calculations in Skia in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5785/">CVE-2019-5785 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5785">CVE-2019-5785 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1125330">SUSE bug 1125330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125396">SUSE bug 1125396</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825543" comment="firefox-60.5.1-1.el7_6 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195798" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5798</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5798" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5798" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5798" ref_url="https://www.suse.com/security/cve/CVE-2019-5798" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005544.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0343-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S2X2GPNBAXWR3TLOS6ELD7IUIBVRLPGX/#S2X2GPNBAXWR3TLOS6ELD7IUIBVRLPGX" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1062-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UEJ3CRVCTM23JSBBSLBH5OMPDHJF2SQK/#UEJ3CRVCTM23JSBBSLBH5OMPDHJF2SQK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1484-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CTZNURZG4U3I3C6SR6N64PNF5AQ2VWNR/#CTZNURZG4U3I3C6SR6N64PNF5AQ2VWNR" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1534-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YRJRSOQJ2HUXLMXMB5IAGC7CGYVG6MJ7/#YRJRSOQJ2HUXLMXMB5IAGC7CGYVG6MJ7" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1664-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZFVBHHF6WMJDJB73NZDWFFGS6D23TB67/#ZFVBHHF6WMJDJB73NZDWFFGS6D23TB67" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1666-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VVYZ3GC3OTOPB2PPY5NYCHCFEYLSYXV/#5VVYZ3GC3OTOPB2PPY5NYCHCFEYLSYXV" source="SUSE-SU"/>
    <description>
    Lack of correct bounds checking in Skia in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5798/">CVE-2019-5798 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5798">CVE-2019-5798 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1129059">SUSE bug 1129059</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135824">SUSE bug 1135824</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825817" comment="firefox-60.7.0-1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825832" comment="thunderbird-60.7.0-1.el7_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195953" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5953</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5953" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5953" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5953" ref_url="https://www.suse.com/security/cve/CVE-2019-5953" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0925-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190925-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0956-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005343.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1236-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5F5Z3PSNRHZAHO5AVKZDHXI62T5VUYUN/#5F5Z3PSNRHZAHO5AVKZDHXI62T5VUYUN" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1281-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CPVKYR7UZFAASLF6UEVYT26YEFJ6EIVY/#CPVKYR7UZFAASLF6UEVYT26YEFJ6EIVY" source="SUSE-SU"/>
    <description>
    Buffer overflow in GNU Wget 1.20.1 and earlier allows remote attackers to cause a denial-of-service (DoS) or may execute an arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5953/">CVE-2019-5953 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5953">CVE-2019-5953 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1131493">SUSE bug 1131493</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825770" comment="wget-1.14-18.el7_6.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20196109" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-6109</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-6109" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6109" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-6109" ref_url="https://www.suse.com/security/cve/CVE-2019-6109" source="SUSE CVE"/>
		<reference ref_id="ESSA-2025:2889" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0125-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0941-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13931-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14016-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005565.html" source="SUSE-SU"/>
		<reference ref_id="TID000019375" ref_url="https://www.suse.com/support/kb/doc/?id=000019375" source="SUSE-SU"/>
		<reference ref_id="TID7023647" ref_url="https://www.suse.com/support/kb/doc/?id=7023647" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0091-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2MNLMLCJQ4RNIHX2VZUWA6ZK3G7XMXKU/#2MNLMLCJQ4RNIHX2VZUWA6ZK3G7XMXKU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0093-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GPIFICMWUTG4MCRMGPSQ5GUJZRXYKKPF/#GPIFICMWUTG4MCRMGPSQ5GUJZRXYKKPF" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0307-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S63AIPCO4O55HWF7CTXNRODVU5X3HLUD/#S63AIPCO4O55HWF7CTXNRODVU5X3HLUD" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1602-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/362POC6TTSXVH3GN2FECATQBAMCINKKJ/#362POC6TTSXVH3GN2FECATQBAMCINKKJ" source="SUSE-SU"/>
    <description>
    An issue was discovered in OpenSSH 7.9. Due to missing character encoding in the progress display, a malicious server (or Man-in-The-Middle attacker) can employ crafted object names to manipulate the client output, e.g., by using ANSI control codes to hide additional files being transferred. This affects refresh_progress_meter() in progressmeter.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-04-24"/>
	<updated date="2025-04-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6109/">CVE-2019-6109 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6109">CVE-2019-6109 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1121571">SUSE bug 1121571</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121816">SUSE bug 1121816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121818">SUSE bug 1121818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121821">SUSE bug 1121821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138392">SUSE bug 1138392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144902">SUSE bug 1144902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144903">SUSE bug 1144903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148884">SUSE bug 1148884</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009976140" comment="openssh-7.4p1-23.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976141" comment="openssh-askpass-7.4p1-23.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976142" comment="openssh-cavs-7.4p1-23.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976143" comment="openssh-clients-7.4p1-23.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976144" comment="openssh-keycat-7.4p1-23.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976145" comment="openssh-ldap-7.4p1-23.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976146" comment="openssh-server-7.4p1-23.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976147" comment="openssh-server-sysvinit-7.4p1-23.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976148" comment="pam_ssh_agent_auth-0.10.3-2.23.el7_9.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20196110" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-6110</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-6110" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6110" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-6110" ref_url="https://www.suse.com/security/cve/CVE-2019-6110" source="SUSE CVE"/>
		<reference ref_id="ESSA-2025:2889" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0125-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13931-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005049.html" source="SUSE-SU"/>
		<reference ref_id="TID000019375" ref_url="https://www.suse.com/support/kb/doc/?id=000019375" source="SUSE-SU"/>
		<reference ref_id="TID7023647" ref_url="https://www.suse.com/support/kb/doc/?id=7023647" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0091-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2MNLMLCJQ4RNIHX2VZUWA6ZK3G7XMXKU/#2MNLMLCJQ4RNIHX2VZUWA6ZK3G7XMXKU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0093-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GPIFICMWUTG4MCRMGPSQ5GUJZRXYKKPF/#GPIFICMWUTG4MCRMGPSQ5GUJZRXYKKPF" source="SUSE-SU"/>
    <description>
    In OpenSSH 7.9, due to accepting and displaying arbitrary stderr output from the server, a malicious server (or Man-in-The-Middle attacker) can manipulate the client output, for example to use ANSI control codes to hide additional files being transferred.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-04-24"/>
	<updated date="2025-04-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6110/">CVE-2019-6110 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6110">CVE-2019-6110 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1121571">SUSE bug 1121571</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121816">SUSE bug 1121816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121818">SUSE bug 1121818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121821">SUSE bug 1121821</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009976140" comment="openssh-7.4p1-23.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976141" comment="openssh-askpass-7.4p1-23.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976142" comment="openssh-cavs-7.4p1-23.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976143" comment="openssh-clients-7.4p1-23.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976144" comment="openssh-keycat-7.4p1-23.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976145" comment="openssh-ldap-7.4p1-23.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976146" comment="openssh-server-7.4p1-23.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976147" comment="openssh-server-sysvinit-7.4p1-23.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976148" comment="pam_ssh_agent_auth-0.10.3-2.23.el7_9.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20196111" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-6111</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-6111" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6111" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-6111" ref_url="https://www.suse.com/security/cve/CVE-2019-6111" source="SUSE CVE"/>
		<reference ref_id="ESSA-2025:2889" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0125-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0941-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13931-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14016-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005565.html" source="SUSE-SU"/>
		<reference ref_id="TID000019375" ref_url="https://www.suse.com/support/kb/doc/?id=000019375" source="SUSE-SU"/>
		<reference ref_id="TID7023647" ref_url="https://www.suse.com/support/kb/doc/?id=7023647" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0091-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2MNLMLCJQ4RNIHX2VZUWA6ZK3G7XMXKU/#2MNLMLCJQ4RNIHX2VZUWA6ZK3G7XMXKU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0093-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GPIFICMWUTG4MCRMGPSQ5GUJZRXYKKPF/#GPIFICMWUTG4MCRMGPSQ5GUJZRXYKKPF" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0307-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S63AIPCO4O55HWF7CTXNRODVU5X3HLUD/#S63AIPCO4O55HWF7CTXNRODVU5X3HLUD" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1602-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/362POC6TTSXVH3GN2FECATQBAMCINKKJ/#362POC6TTSXVH3GN2FECATQBAMCINKKJ" source="SUSE-SU"/>
    <description>
    An issue was discovered in OpenSSH 7.9. Due to the scp implementation being derived from 1983 rcp, the server chooses which files/directories are sent to the client. However, the scp client only performs cursory validation of the object name returned (only directory traversal attacks are prevented). A malicious scp server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the scp client target directory. If recursive operation (-r) is performed, the server can manipulate subdirectories as well (for example, to overwrite the .ssh/authorized_keys file).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-04-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-6111/">CVE-2019-6111 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6111">CVE-2019-6111 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1121571">SUSE bug 1121571</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121816">SUSE bug 1121816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121818">SUSE bug 1121818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121821">SUSE bug 1121821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123028">SUSE bug 1123028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123220">SUSE bug 1123220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131109">SUSE bug 1131109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138392">SUSE bug 1138392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144902">SUSE bug 1144902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144903">SUSE bug 1144903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148884">SUSE bug 1148884</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201840">SUSE bug 1201840</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820087" comment="openssh-7.4p1-16.el7.PTF.1122802.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820088" comment="openssh-askpass-7.4p1-16.el7.PTF.1122802.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820089" comment="openssh-cavs-7.4p1-16.el7.PTF.1122802.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820090" comment="openssh-clients-7.4p1-16.el7.PTF.1122802.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820091" comment="openssh-keycat-7.4p1-16.el7.PTF.1122802.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820092" comment="openssh-ldap-7.4p1-16.el7.PTF.1122802.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820093" comment="openssh-server-7.4p1-16.el7.PTF.1122802.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820094" comment="openssh-server-sysvinit-7.4p1-16.el7.PTF.1122802.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820095" comment="pam_ssh_agent_auth-0.10.3-2.16.el7.PTF.1122802.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009976140" comment="openssh-7.4p1-23.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976141" comment="openssh-askpass-7.4p1-23.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976142" comment="openssh-cavs-7.4p1-23.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976143" comment="openssh-clients-7.4p1-23.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976144" comment="openssh-keycat-7.4p1-23.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976145" comment="openssh-ldap-7.4p1-23.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976146" comment="openssh-server-7.4p1-23.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976147" comment="openssh-server-sysvinit-7.4p1-23.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976148" comment="pam_ssh_agent_auth-0.10.3-2.23.el7_9.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20196116" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-6116</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-6116" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6116" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-6116" ref_url="https://www.suse.com/security/cve/CVE-2019-6116" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0144-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0103-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/B2PEURLUJBIXDYV6PDFIJWQCHSDIUP6K/#B2PEURLUJBIXDYV6PDFIJWQCHSDIUP6K" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0104-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JX3MAI6H4MC2EFU7457Y7TRWIFXUVGDS/#JX3MAI6H4MC2EFU7457Y7TRWIFXUVGDS" source="SUSE-SU"/>
    <description>
    In Artifex Ghostscript through 9.26, ephemeral or transient procedures can allow access to system operators, leading to remote code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-08"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6116/">CVE-2019-6116 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6116">CVE-2019-6116 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1122319">SUSE bug 1122319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129186">SUSE bug 1129186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134156">SUSE bug 1134156</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825522" comment="ghostscript-9.07-31.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825523" comment="ghostscript-cups-9.07-31.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825524" comment="ghostscript-devel-9.07-31.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825525" comment="ghostscript-doc-9.07-31.el7_6.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825526" comment="ghostscript-gtk-9.07-31.el7_6.9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20196133" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-6133</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-6133" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6133" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-6133" ref_url="https://www.suse.com/security/cve/CVE-2019-6133" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2035-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1914-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WACL7CXBMNAPN66ZQLNZWBJ426BKAHKC/#WACL7CXBMNAPN66ZQLNZWBJ426BKAHKC" source="SUSE-SU"/>
    <description>
    In PolicyKit (aka polkit) 0.115, the "start time" protection mechanism can be bypassed because fork() is not atomic, and therefore authorization decisions are improperly cached. This is related to lack of uid checking in polkitbackend/polkitbackendinteractiveauthority.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6133/">CVE-2019-6133 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6133">CVE-2019-6133 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1070943">SUSE bug 1070943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121826">SUSE bug 1121826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121872">SUSE bug 1121872</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825527" comment="polkit-0.112-18.el7_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825528" comment="polkit-devel-0.112-18.el7_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825529" comment="polkit-docs-0.112-18.el7_6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20196237" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-6237</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-6237" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6237" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-6237" ref_url="https://www.suse.com/security/cve/CVE-2019-6237" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005709.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1766-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OQE4VHBLMH2J7F26YN2UPX2X5S3MOQCL/#OQE4VHBLMH2J7F26YN2UPX2X5S3MOQCL" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.3, macOS Mojave 10.14.5, tvOS 12.3, Safari 12.1.1, iTunes for Windows 12.9.5, iCloud for Windows 7.12. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-6237/">CVE-2019-6237 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6237">CVE-2019-6237 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1135715">SUSE bug 1135715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828527" comment="webkitgtk4-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828528" comment="webkitgtk4-devel-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828529" comment="webkitgtk4-doc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828530" comment="webkitgtk4-jsc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828531" comment="webkitgtk4-jsc-devel-2.28.2-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20196251" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-6251</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-6251" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6251" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-6251" ref_url="https://www.suse.com/security/cve/CVE-2019-6251" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005420.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005426.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1374-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CGMQTO45E47X7O5HB3O7ZWDQLHRQ7G2Q/#CGMQTO45E47X7O5HB3O7ZWDQLHRQ7G2Q" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1391-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ALCAK5M2LDATQSAWCRSTBKKIPCCHELPM/#ALCAK5M2LDATQSAWCRSTBKKIPCCHELPM" source="SUSE-SU"/>
    <description>
    WebKitGTK and WPE WebKit prior to version 2.24.1 are vulnerable to address bar spoofing upon certain JavaScript redirections. An attacker could cause malicious web content to be displayed as if for a trusted URI. This is similar to the CVE-2018-8383 issue in Microsoft Edge.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-6251/">CVE-2019-6251 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6251">CVE-2019-6251 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1121894">SUSE bug 1121894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132256">SUSE bug 1132256</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828527" comment="webkitgtk4-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828528" comment="webkitgtk4-devel-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828529" comment="webkitgtk4-doc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828530" comment="webkitgtk4-jsc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828531" comment="webkitgtk4-jsc-devel-2.28.2-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20196454" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-6454</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-6454" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6454" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-6454" ref_url="https://www.suse.com/security/cve/CVE-2019-6454" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0425-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0425-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005509.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1364-2" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20191364-2.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0255-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PVC3OWGGMGT5GMZC57YPFU4GL6LK2NEL/#PVC3OWGGMGT5GMZC57YPFU4GL6LK2NEL" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0268-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N5KJIVSQ6SIWIZCOPDW6ZUKGH3WJPYSM/#N5KJIVSQ6SIWIZCOPDW6ZUKGH3WJPYSM" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1450-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CVI6HFZTM3O5G7YF7OPSQTP4HME7F7XK/#CVI6HFZTM3O5G7YF7OPSQTP4HME7F7XK" source="SUSE-SU"/>
    <description>
    An issue was discovered in sd-bus in systemd 239. bus_process_object() in libsystemd/sd-bus/bus-objects.c allocates a variable-length stack buffer for temporarily storing the object path of incoming D-Bus messages. An unprivileged local user can exploit this by sending a specially crafted message to PID1, causing the stack pointer to jump over the stack guard pages into an unmapped memory region and trigger a denial of service (systemd PID1 crash and kernel panic).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-6454/">CVE-2019-6454 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6454">CVE-2019-6454 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1125352">SUSE bug 1125352</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825533" comment="libgudev1-219-62.el7_6.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825534" comment="libgudev1-devel-219-62.el7_6.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825535" comment="systemd-219-62.el7_6.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825536" comment="systemd-devel-219-62.el7_6.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825537" comment="systemd-journal-gateway-219-62.el7_6.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825538" comment="systemd-libs-219-62.el7_6.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825539" comment="systemd-networkd-219-62.el7_6.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825540" comment="systemd-python-219-62.el7_6.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825541" comment="systemd-resolved-219-62.el7_6.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825542" comment="systemd-sysv-219-62.el7_6.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20196465" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-6465</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-6465" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6465" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-6465" ref_url="https://www.suse.com/security/cve/CVE-2019-6465" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1406-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005975.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1532-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WBUJIKMVSVPU6MG5ID545Q4TTTFQ5HN5/#WBUJIKMVSVPU6MG5ID545Q4TTTFQ5HN5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1533-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DP6CCQYSAQ2GWBMKJAVZIUX7ZUNRET73/#DP6CCQYSAQ2GWBMKJAVZIUX7ZUNRET73" source="SUSE-SU"/>
    <description>
    Controls for zone transfers may not be properly applied to Dynamically Loadable Zones (DLZs) if the zones are writable Versions affected: BIND 9.9.0 -&gt; 9.10.8-P1, 9.11.0 -&gt; 9.11.5-P2, 9.12.0 -&gt; 9.12.3-P2, and versions 9.9.3-S1 -&gt; 9.11.5-S3 of BIND 9 Supported Preview Edition. Versions 9.13.0 -&gt; 9.13.6 of the 9.13 development branch are also affected. Versions prior to BIND 9.9.0 have not been evaluated for vulnerability to CVE-2019-6465.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-6465/">CVE-2019-6465 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6465">CVE-2019-6465 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1126069">SUSE bug 1126069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141730">SUSE bug 1141730</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148887">SUSE bug 1148887</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827657" comment="bind-9.11.4-16.P2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827658" comment="bind-chroot-9.11.4-16.P2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827659" comment="bind-devel-9.11.4-16.P2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827660" comment="bind-export-devel-9.11.4-16.P2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827661" comment="bind-export-libs-9.11.4-16.P2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827662" comment="bind-libs-9.11.4-16.P2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827663" comment="bind-libs-lite-9.11.4-16.P2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827664" comment="bind-license-9.11.4-16.P2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827665" comment="bind-lite-devel-9.11.4-16.P2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827666" comment="bind-pkcs11-9.11.4-16.P2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827667" comment="bind-pkcs11-devel-9.11.4-16.P2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827668" comment="bind-pkcs11-libs-9.11.4-16.P2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827669" comment="bind-pkcs11-utils-9.11.4-16.P2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827670" comment="bind-sdb-9.11.4-16.P2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827671" comment="bind-sdb-chroot-9.11.4-16.P2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827672" comment="bind-utils-9.11.4-16.P2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20196470" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-6470</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-6470" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6470" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-6470" ref_url="https://www.suse.com/security/cve/CVE-2019-6470" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2657-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192657-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2727-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006128.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2340-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OY36YDTO2O5ELHGFN5X7RRNCLG6DVF5R/#OY36YDTO2O5ELHGFN5X7RRNCLG6DVF5R" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2341-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J2L7BAA63TTF4QK6OBDKINRL6LAEUZIE/#J2L7BAA63TTF4QK6OBDKINRL6LAEUZIE" source="SUSE-SU"/>
    <description>
    There had existed in one of the ISC BIND libraries a bug in a function that was used by dhcpd when operating in DHCPv6 mode. There was also a bug in dhcpd relating to the use of this function per its documentation, but the bug in the library function prevented this from causing any harm. All releases of dhcpd from ISC contain copies of this, and other, BIND libraries in combinations that have been tested prior to release and are known to not present issues like this. Some third-party packagers of ISC software have modified the dhcpd source, BIND source, or version matchup in ways that create the crash potential. Based on reports available to ISC, the crash probability is large and no analysis has been done on how, or even if, the probability can be manipulated by an attacker. Affects: Builds of dhcpd versions prior to version 4.4.1 when using BIND versions 9.11.2 or later, or BIND versions with specific bug fixes backported to them. ISC does not have access to comprehensive version lists for all repackagings of dhcpd that are vulnerable. In particular, builds from other vendors may also be affected. Operators are advised to consult their vendor documentation.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-6470/">CVE-2019-6470 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6470">CVE-2019-6470 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1134078">SUSE bug 1134078</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826108" comment="dhclient-4.2.5-77.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826109" comment="dhcp-4.2.5-77.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826110" comment="dhcp-common-4.2.5-77.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826111" comment="dhcp-devel-4.2.5-77.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826112" comment="dhcp-libs-4.2.5-77.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20196477" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-6477</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-6477" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6477" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-6477" ref_url="https://www.suse.com/security/cve/CVE-2019-6477" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007552.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1699-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VUOYW2V65CJWOTYJHZKJDB23QXG7SODU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1701-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5DSIJXYG3NFNRGFIFTMKBYDE6QWREQSP/" source="SUSE-SU"/>
    <description>
    With pipelining enabled each incoming query on a TCP connection requires a similar resource allocation to a query received via UDP or via TCP without pipelining enabled. A client using a TCP-pipelined connection to a server could consume more resources than the server has been provisioned to handle. When a TCP connection with a large number of pipelined queries is closed, the load on the server releasing these multiple resources can cause it to become unresponsive, even for queries that can be answered authoritatively or from cache. (This is most likely to be perceived as an intermittent server problem).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-6477/">CVE-2019-6477 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6477">CVE-2019-6477 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1157051">SUSE bug 1157051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197136">SUSE bug 1197136</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827657" comment="bind-9.11.4-16.P2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827658" comment="bind-chroot-9.11.4-16.P2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827659" comment="bind-devel-9.11.4-16.P2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827660" comment="bind-export-devel-9.11.4-16.P2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827661" comment="bind-export-libs-9.11.4-16.P2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827662" comment="bind-libs-9.11.4-16.P2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827663" comment="bind-libs-lite-9.11.4-16.P2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827664" comment="bind-license-9.11.4-16.P2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827665" comment="bind-lite-devel-9.11.4-16.P2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827666" comment="bind-pkcs11-9.11.4-16.P2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827667" comment="bind-pkcs11-devel-9.11.4-16.P2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827668" comment="bind-pkcs11-libs-9.11.4-16.P2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827669" comment="bind-pkcs11-utils-9.11.4-16.P2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827670" comment="bind-sdb-9.11.4-16.P2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827671" comment="bind-sdb-chroot-9.11.4-16.P2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827672" comment="bind-utils-9.11.4-16.P2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20196778" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-6778</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-6778" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6778" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-6778" ref_url="https://www.suse.com/security/cve/CVE-2019-6778" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0457-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0471-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1523-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008673.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0254-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CFHQEGEI3EZECFQN4HM6ST73KWNYQDTG/#CFHQEGEI3EZECFQN4HM6ST73KWNYQDTG" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1074-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q6DNNFUZSZUOD36332LAYVERA7GHAXUC/#Q6DNNFUZSZUOD36332LAYVERA7GHAXUC" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1226-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NQEJRRAMYLR3KYSMGDFZNQ2EVDLKC3JW/#NQEJRRAMYLR3KYSMGDFZNQ2EVDLKC3JW" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2044-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IPOWPMYYK3WJSOVNKFMAIQ3WHQED7KOC/#IPOWPMYYK3WJSOVNKFMAIQ3WHQED7KOC" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0468-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S5VG234WOT345KSVGE32CW6SK7I55AZP/" source="SUSE-SU"/>
    <description>
    In QEMU 3.0.0, tcp_emu in slirp/tcp_subr.c has a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6778/">CVE-2019-6778 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6778">CVE-2019-6778 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1123156">SUSE bug 1123156</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123157">SUSE bug 1123157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825948" comment="qemu-img-1.5.3-160.el7_6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825949" comment="qemu-kvm-1.5.3-160.el7_6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825950" comment="qemu-kvm-common-1.5.3-160.el7_6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825951" comment="qemu-kvm-tools-1.5.3-160.el7_6.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20196974" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-6974</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-6974" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6974" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-6974" ref_url="https://www.suse.com/security/cve/CVE-2019-6974" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0672-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0709-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005226.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0722-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0726-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0754-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005241.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0784-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190784-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0785-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190785-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005476.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0203-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UIEBC5XKVMKKVG2FBX5VPRFS2CNKDSF3/#UIEBC5XKVMKKVG2FBX5VPRFS2CNKDSF3" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 4.20.8, kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandles reference counting because of a race condition, leading to a use-after-free.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6974/">CVE-2019-6974 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6974">CVE-2019-6974 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1124728">SUSE bug 1124728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124729">SUSE bug 1124729</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825687" comment="bpftool-3.10.0-957.12.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825688" comment="kernel-3.10.0-957.12.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825689" comment="kernel-abi-whitelists-3.10.0-957.12.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825690" comment="kernel-debug-3.10.0-957.12.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825693" comment="kernel-doc-3.10.0-957.12.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825694" comment="kernel-headers-3.10.0-957.12.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825695" comment="kernel-tools-3.10.0-957.12.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825696" comment="kernel-tools-libs-3.10.0-957.12.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825698" comment="perf-3.10.0-957.12.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825699" comment="python-perf-3.10.0-957.12.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20196978" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-6978</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-6978" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6978" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-6978" ref_url="https://www.suse.com/security/cve/CVE-2019-6978" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006586.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010962.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0207-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VBAD4CHQ7DDJ2I6FD4IRL5J2KTC4AEQ3/#VBAD4CHQ7DDJ2I6FD4IRL5J2KTC4AEQ3" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1140-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZUKMEIFUI32VUT2VEEOME53KXFMNOLFM/#ZUKMEIFUI32VUT2VEEOME53KXFMNOLFM" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BTHBKC7A4BRQZVCDIQQU2NJC4NYEFV5X/#BTHBKC7A4BRQZVCDIQQU2NJC4NYEFV5X" source="SUSE-SU"/>
    <description>
    The GD Graphics Library (aka LibGD) 2.2.5 has a double free in the gdImage*Ptr() functions in gd_gif_out.c, gd_jpeg.c, and gd_wbmp.c. NOTE: PHP is unaffected.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6978/">CVE-2019-6978 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6978">CVE-2019-6978 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1123522">SUSE bug 1123522</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828300" comment="libwmf-0.2.8.4-44.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828301" comment="libwmf-devel-0.2.8.4-44.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828302" comment="libwmf-lite-0.2.8.4-44.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20197149" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-7149</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-7149" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7149" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-7149" ref_url="https://www.suse.com/security/cve/CVE-2019-7149" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2614-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012057.html" source="SUSE-SU"/>
    <description>
    A heap-based buffer over-read was discovered in the function read_srclines in dwarf_getsrclines.c in libdw in elfutils 0.175. A crafted input can cause segmentation faults, leading to denial-of-service, as demonstrated by eu-nm.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-7149/">CVE-2019-7149 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7149">CVE-2019-7149 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1123559">SUSE bug 1123559</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826462" comment="elfutils-0.176-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826463" comment="elfutils-default-yama-scope-0.176-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826464" comment="elfutils-devel-0.176-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826465" comment="elfutils-devel-static-0.176-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826466" comment="elfutils-libelf-0.176-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826467" comment="elfutils-libelf-devel-0.176-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826468" comment="elfutils-libelf-devel-static-0.176-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826469" comment="elfutils-libs-0.176-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20197150" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-7150</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-7150" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7150" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-7150" ref_url="https://www.suse.com/security/cve/CVE-2019-7150" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2614-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1590-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Z5JKL6B32NFBYAZ26H2YW75ZH2O62BBE/#Z5JKL6B32NFBYAZ26H2YW75ZH2O62BBE" source="SUSE-SU"/>
    <description>
    An issue was discovered in elfutils 0.175. A segmentation fault can occur in the function elf64_xlatetom in libelf/elf32_xlatetom.c, due to dwfl_segment_report_module not checking whether the dyn data read from a core file is truncated. A crafted input can cause a program crash, leading to denial-of-service, as demonstrated by eu-stack.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7150/">CVE-2019-7150 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7150">CVE-2019-7150 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1123685">SUSE bug 1123685</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826462" comment="elfutils-0.176-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826463" comment="elfutils-default-yama-scope-0.176-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826464" comment="elfutils-devel-0.176-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826465" comment="elfutils-devel-static-0.176-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826466" comment="elfutils-libelf-0.176-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826467" comment="elfutils-libelf-devel-0.176-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826468" comment="elfutils-libelf-devel-static-0.176-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826469" comment="elfutils-libs-0.176-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20197175" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-7175</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-7175" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7175" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-7175" ref_url="https://www.suse.com/security/cve/CVE-2019-7175" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0739-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1033-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13993-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13995-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005265.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7XHNBRYO2YNE776B7CZLENE3HRGDQZUJ/#7XHNBRYO2YNE776B7CZLENE3HRGDQZUJ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1141-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LKV3XYLWNGPVANCMRIU3RYCDYWNHSAZA/#LKV3XYLWNGPVANCMRIU3RYCDYWNHSAZA" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1320-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2XHJ2AOYGREC65MN6FYXWNZTOX3EBKGA/#2XHJ2AOYGREC65MN6FYXWNZTOX3EBKGA" source="SUSE-SU"/>
    <description>
    In ImageMagick before 7.0.8-25, some memory leaks exist in DecodeImage in coders/pcd.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7175/">CVE-2019-7175 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7175">CVE-2019-7175 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1128649">SUSE bug 1128649</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827880" comment="ImageMagick-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827881" comment="ImageMagick-c++-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827882" comment="ImageMagick-c++-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827883" comment="ImageMagick-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827884" comment="ImageMagick-doc-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827885" comment="ImageMagick-perl-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827886" comment="autotrace-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827887" comment="autotrace-devel-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827888" comment="emacs-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827889" comment="emacs-common-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827890" comment="emacs-el-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827891" comment="emacs-filesystem-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827892" comment="emacs-nox-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827893" comment="emacs-terminal-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827894" comment="inkscape-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827895" comment="inkscape-docs-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827896" comment="inkscape-view-0.92.2-3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20197221" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-7221</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-7221" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7221" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-7221" ref_url="https://www.suse.com/security/cve/CVE-2019-7221" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0645-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190645-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0672-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0709-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005226.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0722-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0726-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0754-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005241.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0784-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190784-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0785-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190785-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005476.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0203-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UIEBC5XKVMKKVG2FBX5VPRFS2CNKDSF3/#UIEBC5XKVMKKVG2FBX5VPRFS2CNKDSF3" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0274-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NVVKFQLQIXPHKJECDTUPV4RH4VU2HNZY/#NVVKFQLQIXPHKJECDTUPV4RH4VU2HNZY" source="SUSE-SU"/>
    <description>
    The KVM implementation in the Linux kernel through 4.20.5 has a Use-after-Free.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-7221/">CVE-2019-7221 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7221">CVE-2019-7221 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1124732">SUSE bug 1124732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124734">SUSE bug 1124734</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825687" comment="bpftool-3.10.0-957.12.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825688" comment="kernel-3.10.0-957.12.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825689" comment="kernel-abi-whitelists-3.10.0-957.12.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825690" comment="kernel-debug-3.10.0-957.12.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825693" comment="kernel-doc-3.10.0-957.12.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825694" comment="kernel-headers-3.10.0-957.12.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825695" comment="kernel-tools-3.10.0-957.12.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825696" comment="kernel-tools-libs-3.10.0-957.12.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825698" comment="perf-3.10.0-957.12.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825699" comment="python-perf-3.10.0-957.12.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20197222" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-7222</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-7222" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7222" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-7222" ref_url="https://www.suse.com/security/cve/CVE-2019-7222" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0784-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190784-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0785-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190785-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13979-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005194.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0203-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UIEBC5XKVMKKVG2FBX5VPRFS2CNKDSF3/#UIEBC5XKVMKKVG2FBX5VPRFS2CNKDSF3" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0274-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NVVKFQLQIXPHKJECDTUPV4RH4VU2HNZY/#NVVKFQLQIXPHKJECDTUPV4RH4VU2HNZY" source="SUSE-SU"/>
    <description>
    The KVM implementation in the Linux kernel through 4.20.5 has an Information Leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-7222/">CVE-2019-7222 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7222">CVE-2019-7222 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1124735">SUSE bug 1124735</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826007" comment="bpftool-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826008" comment="kernel-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826009" comment="kernel-abi-whitelists-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826010" comment="kernel-debug-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826013" comment="kernel-doc-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826014" comment="kernel-headers-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826015" comment="kernel-tools-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826016" comment="kernel-tools-libs-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826018" comment="perf-3.10.0-1062.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826019" comment="python-perf-3.10.0-1062.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20197310" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-7310</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-7310" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7310" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-7310" ref_url="https://www.suse.com/security/cve/CVE-2019-7310" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2906-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2907-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3241-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030848.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3854-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TS7QPSEQIBQO7BALZOE3TN7IO7IMHK3Y/" source="SUSE-SU"/>
    <description>
    In Poppler 0.73.0, a heap-based buffer over-read (due to an integer signedness error in the XRef::getEntry function in XRef.cc) allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted PDF document, as demonstrated by pdftocairo.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-7310/">CVE-2019-7310 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7310">CVE-2019-7310 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1124150">SUSE bug 1124150</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825972" comment="evince-3.28.2-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825973" comment="evince-browser-plugin-3.28.2-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825974" comment="evince-devel-3.28.2-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825975" comment="evince-dvi-3.28.2-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825976" comment="evince-libs-3.28.2-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825977" comment="evince-nautilus-3.28.2-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825978" comment="okular-4.10.5-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825979" comment="okular-devel-4.10.5-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825980" comment="okular-libs-4.10.5-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825981" comment="okular-part-4.10.5-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825982" comment="poppler-0.26.5-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825983" comment="poppler-cpp-0.26.5-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825984" comment="poppler-cpp-devel-0.26.5-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825985" comment="poppler-demos-0.26.5-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825986" comment="poppler-devel-0.26.5-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825987" comment="poppler-glib-0.26.5-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825988" comment="poppler-glib-devel-0.26.5-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825989" comment="poppler-qt-0.26.5-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825990" comment="poppler-qt-devel-0.26.5-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825991" comment="poppler-utils-0.26.5-38.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20197317" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-7317</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-7317" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7317" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-7317" ref_url="https://www.suse.com/security/cve/CVE-2019-7317" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1398-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1405-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005544.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2002-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192002-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2036-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2291-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192291-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2371-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192371-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3060-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006567.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1484-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CTZNURZG4U3I3C6SR6N64PNF5AQ2VWNR/#CTZNURZG4U3I3C6SR6N64PNF5AQ2VWNR" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1530-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q4HM5QQMXWECPZMLHD5SAWL5ZKD2JZWL/#Q4HM5QQMXWECPZMLHD5SAWL5ZKD2JZWL" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1534-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YRJRSOQJ2HUXLMXMB5IAGC7CGYVG6MJ7/#YRJRSOQJ2HUXLMXMB5IAGC7CGYVG6MJ7" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1664-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZFVBHHF6WMJDJB73NZDWFFGS6D23TB67/#ZFVBHHF6WMJDJB73NZDWFFGS6D23TB67" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1912-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WLAA33SFC2BQWUMXROFQCWU3SJN2HD7O/#WLAA33SFC2BQWUMXROFQCWU3SJN2HD7O" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1916-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7CWQDHDFTQ5TMYECHR6T3YTCURIWVTNU/#7CWQDHDFTQ5TMYECHR6T3YTCURIWVTNU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    png_image_free in png.c in libpng 1.6.x before 1.6.37 has a use-after-free because png_image_free_function is called under png_safe_execute.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-7317/">CVE-2019-7317 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7317">CVE-2019-7317 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1124211">SUSE bug 1124211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135824">SUSE bug 1135824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141780">SUSE bug 1141780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1147021">SUSE bug 1147021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165297">SUSE bug 1165297</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825817" comment="firefox-60.7.0-1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825832" comment="thunderbird-60.7.0-1.el7_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20197397" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-7397</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-7397" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7397" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-7397" ref_url="https://www.suse.com/security/cve/CVE-2019-7397" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0739-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1033-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13993-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13995-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005265.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0214-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7LEFSXJIEKOHFD2IR23GU6IWNWYPVKE4/#7LEFSXJIEKOHFD2IR23GU6IWNWYPVKE4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0215-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MWW5DKKDE7W3TMZANWMOOGCBNI3BKEB6/#MWW5DKKDE7W3TMZANWMOOGCBNI3BKEB6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0235-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XNOMEKEATIJCS5NFXLGEUO37AJSVJ77S/#XNOMEKEATIJCS5NFXLGEUO37AJSVJ77S" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1141-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LKV3XYLWNGPVANCMRIU3RYCDYWNHSAZA/#LKV3XYLWNGPVANCMRIU3RYCDYWNHSAZA" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1320-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2XHJ2AOYGREC65MN6FYXWNZTOX3EBKGA/#2XHJ2AOYGREC65MN6FYXWNZTOX3EBKGA" source="SUSE-SU"/>
    <description>
    In ImageMagick before 7.0.8-25 and GraphicsMagick through 1.3.31, several memory leaks exist in WritePDFImage in coders/pdf.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7397/">CVE-2019-7397 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7397">CVE-2019-7397 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1124366">SUSE bug 1124366</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827880" comment="ImageMagick-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827881" comment="ImageMagick-c++-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827882" comment="ImageMagick-c++-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827883" comment="ImageMagick-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827884" comment="ImageMagick-doc-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827885" comment="ImageMagick-perl-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827886" comment="autotrace-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827887" comment="autotrace-devel-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827888" comment="emacs-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827889" comment="emacs-common-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827890" comment="emacs-el-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827891" comment="emacs-filesystem-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827892" comment="emacs-nox-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827893" comment="emacs-terminal-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827894" comment="inkscape-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827895" comment="inkscape-docs-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827896" comment="inkscape-view-0.92.2-3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20197398" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-7398</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-7398" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7398" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-7398" ref_url="https://www.suse.com/security/cve/CVE-2019-7398" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0739-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1033-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13993-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13995-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005265.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1141-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LKV3XYLWNGPVANCMRIU3RYCDYWNHSAZA/#LKV3XYLWNGPVANCMRIU3RYCDYWNHSAZA" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1320-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2XHJ2AOYGREC65MN6FYXWNZTOX3EBKGA/#2XHJ2AOYGREC65MN6FYXWNZTOX3EBKGA" source="SUSE-SU"/>
    <description>
    In ImageMagick before 7.0.8-25, a memory leak exists in WriteDIBImage in coders/dib.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7398/">CVE-2019-7398 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7398">CVE-2019-7398 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1124365">SUSE bug 1124365</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827880" comment="ImageMagick-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827881" comment="ImageMagick-c++-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827882" comment="ImageMagick-c++-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827883" comment="ImageMagick-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827884" comment="ImageMagick-doc-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827885" comment="ImageMagick-perl-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827886" comment="autotrace-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827887" comment="autotrace-devel-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827888" comment="emacs-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827889" comment="emacs-common-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827890" comment="emacs-el-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827891" comment="emacs-filesystem-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827892" comment="emacs-nox-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827893" comment="emacs-terminal-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827894" comment="inkscape-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827895" comment="inkscape-docs-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827896" comment="inkscape-view-0.92.2-3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20197524" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-7524</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-7524" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7524" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-7524" ref_url="https://www.suse.com/security/cve/CVE-2019-7524" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005310.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1212-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6GDE32CP4MDRRXRXYZPEUPVLNQ5Q65AG/#6GDE32CP4MDRRXRXYZPEUPVLNQ5Q65AG" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1220-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T6JZ5KYWCGBSV4S56647OI7IOJEDU36V/#T6JZ5KYWCGBSV4S56647OI7IOJEDU36V" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14715-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KZSDCZ5LA6IHY7KXVSL6ULAJVP6OFT2M/" source="SUSE-SU"/>
    <description>
    In Dovecot before 2.2.36.3 and 2.3.x before 2.3.5.1, a local attacker can cause a buffer overflow in the indexer-worker process, which can be used to elevate to root. This occurs because of missing checks in the fts and pop3-uidl components.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-7524/">CVE-2019-7524 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7524">CVE-2019-7524 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1130116">SUSE bug 1130116</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827673" comment="dovecot-2.2.36-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827674" comment="dovecot-devel-2.2.36-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827675" comment="dovecot-mysql-2.2.36-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827676" comment="dovecot-pgsql-2.2.36-6.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827677" comment="dovecot-pigeonhole-2.2.36-6.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20197572" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-7572</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-7572" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7572" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-7572" ref_url="https://www.suse.com/security/cve/CVE-2019-7572" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005272.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1213-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZRCDLQ2YIEJ6ULD3V4IHTBE3ZLPAYH62/#ZRCDLQ2YIEJ6ULD3V4IHTBE3ZLPAYH62" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1223-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PVVNKCWJ5RBDOAJTNQX6VN77H27KTKSW/#PVVNKCWJ5RBDOAJTNQX6VN77H27KTKSW" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1261-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MSOTDS52YKZL25TU3JHV22PWUVFQ6U5U/#MSOTDS52YKZL25TU3JHV22PWUVFQ6U5U" source="SUSE-SU"/>
    <description>
    SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a buffer over-read in IMA_ADPCM_nibble in audio/SDL_wave.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-02"/>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7572/">CVE-2019-7572 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7572">CVE-2019-7572 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1124806">SUSE bug 1124806</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828123" comment="SDL-1.2.15-17.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828124" comment="SDL-devel-1.2.15-17.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828125" comment="SDL-static-1.2.15-17.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20197573" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-7573</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-7573" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7573" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-7573" ref_url="https://www.suse.com/security/cve/CVE-2019-7573" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005272.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1213-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZRCDLQ2YIEJ6ULD3V4IHTBE3ZLPAYH62/#ZRCDLQ2YIEJ6ULD3V4IHTBE3ZLPAYH62" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1223-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PVVNKCWJ5RBDOAJTNQX6VN77H27KTKSW/#PVVNKCWJ5RBDOAJTNQX6VN77H27KTKSW" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1261-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MSOTDS52YKZL25TU3JHV22PWUVFQ6U5U/#MSOTDS52YKZL25TU3JHV22PWUVFQ6U5U" source="SUSE-SU"/>
    <description>
    SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer over-read in InitMS_ADPCM in audio/SDL_wave.c (inside the wNumCoef loop).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7573/">CVE-2019-7573 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7573">CVE-2019-7573 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1124805">SUSE bug 1124805</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828123" comment="SDL-1.2.15-17.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828124" comment="SDL-devel-1.2.15-17.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828125" comment="SDL-static-1.2.15-17.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20197574" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-7574</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-7574" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7574" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-7574" ref_url="https://www.suse.com/security/cve/CVE-2019-7574" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005272.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1213-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZRCDLQ2YIEJ6ULD3V4IHTBE3ZLPAYH62/#ZRCDLQ2YIEJ6ULD3V4IHTBE3ZLPAYH62" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1223-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PVVNKCWJ5RBDOAJTNQX6VN77H27KTKSW/#PVVNKCWJ5RBDOAJTNQX6VN77H27KTKSW" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1261-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MSOTDS52YKZL25TU3JHV22PWUVFQ6U5U/#MSOTDS52YKZL25TU3JHV22PWUVFQ6U5U" source="SUSE-SU"/>
    <description>
    SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer over-read in IMA_ADPCM_decode in audio/SDL_wave.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7574/">CVE-2019-7574 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7574">CVE-2019-7574 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1124803">SUSE bug 1124803</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828123" comment="SDL-1.2.15-17.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828124" comment="SDL-devel-1.2.15-17.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828125" comment="SDL-static-1.2.15-17.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20197575" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-7575</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-7575" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7575" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-7575" ref_url="https://www.suse.com/security/cve/CVE-2019-7575" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005272.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1213-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZRCDLQ2YIEJ6ULD3V4IHTBE3ZLPAYH62/#ZRCDLQ2YIEJ6ULD3V4IHTBE3ZLPAYH62" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1223-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PVVNKCWJ5RBDOAJTNQX6VN77H27KTKSW/#PVVNKCWJ5RBDOAJTNQX6VN77H27KTKSW" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1261-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MSOTDS52YKZL25TU3JHV22PWUVFQ6U5U/#MSOTDS52YKZL25TU3JHV22PWUVFQ6U5U" source="SUSE-SU"/>
    <description>
    SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer overflow in MS_ADPCM_decode in audio/SDL_wave.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-7575/">CVE-2019-7575 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7575">CVE-2019-7575 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1124802">SUSE bug 1124802</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828123" comment="SDL-1.2.15-17.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828124" comment="SDL-devel-1.2.15-17.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828125" comment="SDL-static-1.2.15-17.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20197576" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-7576</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-7576" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7576" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-7576" ref_url="https://www.suse.com/security/cve/CVE-2019-7576" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005272.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1213-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZRCDLQ2YIEJ6ULD3V4IHTBE3ZLPAYH62/#ZRCDLQ2YIEJ6ULD3V4IHTBE3ZLPAYH62" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1223-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PVVNKCWJ5RBDOAJTNQX6VN77H27KTKSW/#PVVNKCWJ5RBDOAJTNQX6VN77H27KTKSW" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1261-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MSOTDS52YKZL25TU3JHV22PWUVFQ6U5U/#MSOTDS52YKZL25TU3JHV22PWUVFQ6U5U" source="SUSE-SU"/>
    <description>
    SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer over-read in InitMS_ADPCM in audio/SDL_wave.c (outside the wNumCoef loop).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7576/">CVE-2019-7576 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7576">CVE-2019-7576 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1124799">SUSE bug 1124799</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828123" comment="SDL-1.2.15-17.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828124" comment="SDL-devel-1.2.15-17.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828125" comment="SDL-static-1.2.15-17.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20197577" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-7577</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-7577" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7577" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-7577" ref_url="https://www.suse.com/security/cve/CVE-2019-7577" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005272.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1213-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZRCDLQ2YIEJ6ULD3V4IHTBE3ZLPAYH62/#ZRCDLQ2YIEJ6ULD3V4IHTBE3ZLPAYH62" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1223-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PVVNKCWJ5RBDOAJTNQX6VN77H27KTKSW/#PVVNKCWJ5RBDOAJTNQX6VN77H27KTKSW" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1261-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MSOTDS52YKZL25TU3JHV22PWUVFQ6U5U/#MSOTDS52YKZL25TU3JHV22PWUVFQ6U5U" source="SUSE-SU"/>
    <description>
    SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a buffer over-read in SDL_LoadWAV_RW in audio/SDL_wave.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7577/">CVE-2019-7577 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7577">CVE-2019-7577 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1124800">SUSE bug 1124800</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828123" comment="SDL-1.2.15-17.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828124" comment="SDL-devel-1.2.15-17.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828125" comment="SDL-static-1.2.15-17.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20197578" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-7578</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-7578" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7578" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-7578" ref_url="https://www.suse.com/security/cve/CVE-2019-7578" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005272.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1213-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZRCDLQ2YIEJ6ULD3V4IHTBE3ZLPAYH62/#ZRCDLQ2YIEJ6ULD3V4IHTBE3ZLPAYH62" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1223-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PVVNKCWJ5RBDOAJTNQX6VN77H27KTKSW/#PVVNKCWJ5RBDOAJTNQX6VN77H27KTKSW" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1261-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MSOTDS52YKZL25TU3JHV22PWUVFQ6U5U/#MSOTDS52YKZL25TU3JHV22PWUVFQ6U5U" source="SUSE-SU"/>
    <description>
    SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer over-read in InitIMA_ADPCM in audio/SDL_wave.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7578/">CVE-2019-7578 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7578">CVE-2019-7578 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1125099">SUSE bug 1125099</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828123" comment="SDL-1.2.15-17.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828124" comment="SDL-devel-1.2.15-17.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828125" comment="SDL-static-1.2.15-17.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20197635" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-7635</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-7635" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7635" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-7635" ref_url="https://www.suse.com/security/cve/CVE-2019-7635" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005272.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1213-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZRCDLQ2YIEJ6ULD3V4IHTBE3ZLPAYH62/#ZRCDLQ2YIEJ6ULD3V4IHTBE3ZLPAYH62" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1223-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PVVNKCWJ5RBDOAJTNQX6VN77H27KTKSW/#PVVNKCWJ5RBDOAJTNQX6VN77H27KTKSW" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1261-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MSOTDS52YKZL25TU3JHV22PWUVFQ6U5U/#MSOTDS52YKZL25TU3JHV22PWUVFQ6U5U" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2071-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3QX7GXNBMMTXZSXQVKMIC4P6EVVZNDRA/#3QX7GXNBMMTXZSXQVKMIC4P6EVVZNDRA" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2109-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LT2L2SUT2SJMJ23HFEUSMEN3PCAFI5LM/#LT2L2SUT2SJMJ23HFEUSMEN3PCAFI5LM" source="SUSE-SU"/>
    <description>
    SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer over-read in Blit1to4 in video/SDL_blit_1.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7635/">CVE-2019-7635 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7635">CVE-2019-7635 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1124827">SUSE bug 1124827</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828123" comment="SDL-1.2.15-17.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828124" comment="SDL-devel-1.2.15-17.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828125" comment="SDL-static-1.2.15-17.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20197636" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-7636</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-7636" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7636" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-7636" ref_url="https://www.suse.com/security/cve/CVE-2019-7636" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005272.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1213-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZRCDLQ2YIEJ6ULD3V4IHTBE3ZLPAYH62/#ZRCDLQ2YIEJ6ULD3V4IHTBE3ZLPAYH62" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1223-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PVVNKCWJ5RBDOAJTNQX6VN77H27KTKSW/#PVVNKCWJ5RBDOAJTNQX6VN77H27KTKSW" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1261-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MSOTDS52YKZL25TU3JHV22PWUVFQ6U5U/#MSOTDS52YKZL25TU3JHV22PWUVFQ6U5U" source="SUSE-SU"/>
    <description>
    SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer over-read in SDL_GetRGB in video/SDL_pixels.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7636/">CVE-2019-7636 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7636">CVE-2019-7636 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1124826">SUSE bug 1124826</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828123" comment="SDL-1.2.15-17.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828124" comment="SDL-devel-1.2.15-17.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828125" comment="SDL-static-1.2.15-17.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20197637" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-7637</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-7637" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7637" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-7637" ref_url="https://www.suse.com/security/cve/CVE-2019-7637" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005595.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010802.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1213-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZRCDLQ2YIEJ6ULD3V4IHTBE3ZLPAYH62/#ZRCDLQ2YIEJ6ULD3V4IHTBE3ZLPAYH62" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1223-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PVVNKCWJ5RBDOAJTNQX6VN77H27KTKSW/#PVVNKCWJ5RBDOAJTNQX6VN77H27KTKSW" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1261-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MSOTDS52YKZL25TU3JHV22PWUVFQ6U5U/#MSOTDS52YKZL25TU3JHV22PWUVFQ6U5U" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1632-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7YJX5NSXBCENKYURQGKRNPLWFUNAJE2P/#7YJX5NSXBCENKYURQGKRNPLWFUNAJE2P" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1633-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HWWGNEISNASSWP5NTBQLM6YLUKJPUBIS/#HWWGNEISNASSWP5NTBQLM6YLUKJPUBIS" source="SUSE-SU"/>
    <description>
    SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer overflow in SDL_FillRect in video/SDL_surface.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-7637/">CVE-2019-7637 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7637">CVE-2019-7637 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1124825">SUSE bug 1124825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134135">SUSE bug 1134135</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828123" comment="SDL-1.2.15-17.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828124" comment="SDL-devel-1.2.15-17.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828125" comment="SDL-static-1.2.15-17.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20197638" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-7638</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-7638" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7638" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-7638" ref_url="https://www.suse.com/security/cve/CVE-2019-7638" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005272.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1213-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZRCDLQ2YIEJ6ULD3V4IHTBE3ZLPAYH62/#ZRCDLQ2YIEJ6ULD3V4IHTBE3ZLPAYH62" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1223-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PVVNKCWJ5RBDOAJTNQX6VN77H27KTKSW/#PVVNKCWJ5RBDOAJTNQX6VN77H27KTKSW" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1261-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MSOTDS52YKZL25TU3JHV22PWUVFQ6U5U/#MSOTDS52YKZL25TU3JHV22PWUVFQ6U5U" source="SUSE-SU"/>
    <description>
    SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer over-read in Map1toN in video/SDL_pixels.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7638/">CVE-2019-7638 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7638">CVE-2019-7638 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1124824">SUSE bug 1124824</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828123" comment="SDL-1.2.15-17.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828124" comment="SDL-devel-1.2.15-17.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828125" comment="SDL-static-1.2.15-17.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20197664" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-7664</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-7664" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7664" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-7664" ref_url="https://www.suse.com/security/cve/CVE-2019-7664" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2614-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012057.html" source="SUSE-SU"/>
    <description>
    In elfutils 0.175, a negative-sized memcpy is attempted in elf_cvt_note in libelf/note_xlate.h because of an incorrect overflow check. Crafted elf input causes a segmentation fault, leading to denial of service (program crash).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7664/">CVE-2019-7664 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7664">CVE-2019-7664 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1125008">SUSE bug 1125008</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826462" comment="elfutils-0.176-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826463" comment="elfutils-default-yama-scope-0.176-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826464" comment="elfutils-devel-0.176-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826465" comment="elfutils-devel-static-0.176-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826466" comment="elfutils-libelf-0.176-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826467" comment="elfutils-libelf-devel-0.176-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826468" comment="elfutils-libelf-devel-static-0.176-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826469" comment="elfutils-libs-0.176-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20197665" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-7665</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-7665" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7665" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-7665" ref_url="https://www.suse.com/security/cve/CVE-2019-7665" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2614-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1590-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Z5JKL6B32NFBYAZ26H2YW75ZH2O62BBE/#Z5JKL6B32NFBYAZ26H2YW75ZH2O62BBE" source="SUSE-SU"/>
    <description>
    In elfutils 0.175, a heap-based buffer over-read was discovered in the function elf32_xlatetom in elf32_xlatetom.c in libelf. A crafted ELF input can cause a segmentation fault leading to denial of service (program crash) because ebl_core_note does not reject malformed core file notes.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7665/">CVE-2019-7665 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7665">CVE-2019-7665 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1125007">SUSE bug 1125007</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826462" comment="elfutils-0.176-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826463" comment="elfutils-default-yama-scope-0.176-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826464" comment="elfutils-devel-0.176-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826465" comment="elfutils-devel-static-0.176-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826466" comment="elfutils-libelf-0.176-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826467" comment="elfutils-libelf-devel-0.176-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826468" comment="elfutils-libelf-devel-static-0.176-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826469" comment="elfutils-libs-0.176-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198308" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8308</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8308" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8308" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8308" ref_url="https://www.suse.com/security/cve/CVE-2019-8308" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005831.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2038-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/63JAJFCHSTH4KUI7632AH6V6T6Q3EXJ2/#63JAJFCHSTH4KUI7632AH6V6T6Q3EXJ2" source="SUSE-SU"/>
    <description>
    Flatpak before 1.0.7, and 1.1.x and 1.2.x before 1.2.3, exposes /proc in the apply_extra script sandbox, which allows attackers to modify a host-side executable file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8308/">CVE-2019-8308 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8308">CVE-2019-8308 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1125431">SUSE bug 1125431</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825544" comment="flatpak-1.0.2-4.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825545" comment="flatpak-builder-1.0.0-4.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825546" comment="flatpak-devel-1.0.2-4.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825547" comment="flatpak-libs-1.0.2-4.el7_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198322" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8322</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8322" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8322" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8322" ref_url="https://www.suse.com/security/cve/CVE-2019-8322" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1771-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DDFTKHWDUNIX327O4WIHXU2TIVV47W3Z/#DDFTKHWDUNIX327O4WIHXU2TIVV47W3Z" source="SUSE-SU"/>
    <description>
    An issue was discovered in RubyGems 2.6 and later through 3.0.2. The gem owner command outputs the contents of the API response directly to stdout. Therefore, if the response is crafted, escape sequence injection may occur.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-8322/">CVE-2019-8322 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8322">CVE-2019-8322 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1130622">SUSE bug 1130622</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825771" comment="ruby-2.0.0.648-35.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825772" comment="ruby-devel-2.0.0.648-35.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825773" comment="ruby-doc-2.0.0.648-35.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825774" comment="ruby-irb-2.0.0.648-35.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825775" comment="ruby-libs-2.0.0.648-35.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825776" comment="ruby-tcltk-2.0.0.648-35.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825777" comment="rubygem-bigdecimal-1.2.0-35.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825778" comment="rubygem-io-console-0.4.2-35.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825779" comment="rubygem-json-1.7.7-35.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825780" comment="rubygem-minitest-4.3.2-35.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825781" comment="rubygem-psych-2.0.0-35.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825782" comment="rubygem-rake-0.9.6-35.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825783" comment="rubygem-rdoc-4.0.0-35.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825784" comment="rubygems-2.0.14.1-35.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825785" comment="rubygems-devel-2.0.14.1-35.el7_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198323" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8323</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8323" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8323" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8323" ref_url="https://www.suse.com/security/cve/CVE-2019-8323" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1771-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DDFTKHWDUNIX327O4WIHXU2TIVV47W3Z/#DDFTKHWDUNIX327O4WIHXU2TIVV47W3Z" source="SUSE-SU"/>
    <description>
    An issue was discovered in RubyGems 2.6 and later through 3.0.2. Gem::GemcutterUtilities#with_response may output the API response to stdout as it is. Therefore, if the API side modifies the response, escape sequence injection may occur.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-8323/">CVE-2019-8323 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8323">CVE-2019-8323 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1130620">SUSE bug 1130620</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825771" comment="ruby-2.0.0.648-35.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825772" comment="ruby-devel-2.0.0.648-35.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825773" comment="ruby-doc-2.0.0.648-35.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825774" comment="ruby-irb-2.0.0.648-35.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825775" comment="ruby-libs-2.0.0.648-35.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825776" comment="ruby-tcltk-2.0.0.648-35.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825777" comment="rubygem-bigdecimal-1.2.0-35.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825778" comment="rubygem-io-console-0.4.2-35.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825779" comment="rubygem-json-1.7.7-35.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825780" comment="rubygem-minitest-4.3.2-35.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825781" comment="rubygem-psych-2.0.0-35.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825782" comment="rubygem-rake-0.9.6-35.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825783" comment="rubygem-rdoc-4.0.0-35.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825784" comment="rubygems-2.0.14.1-35.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825785" comment="rubygems-devel-2.0.14.1-35.el7_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198324" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8324</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8324" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8324" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8324" ref_url="https://www.suse.com/security/cve/CVE-2019-8324" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1771-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DDFTKHWDUNIX327O4WIHXU2TIVV47W3Z/#DDFTKHWDUNIX327O4WIHXU2TIVV47W3Z" source="SUSE-SU"/>
    <description>
    An issue was discovered in RubyGems 2.6 and later through 3.0.2. A crafted gem with a multi-line name is not handled correctly. Therefore, an attacker could inject arbitrary code to the stub line of gemspec, which is eval-ed by code in ensure_loadable_spec during the preinstall check.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8324/">CVE-2019-8324 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8324">CVE-2019-8324 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1130617">SUSE bug 1130617</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825771" comment="ruby-2.0.0.648-35.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825772" comment="ruby-devel-2.0.0.648-35.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825773" comment="ruby-doc-2.0.0.648-35.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825774" comment="ruby-irb-2.0.0.648-35.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825775" comment="ruby-libs-2.0.0.648-35.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825776" comment="ruby-tcltk-2.0.0.648-35.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825777" comment="rubygem-bigdecimal-1.2.0-35.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825778" comment="rubygem-io-console-0.4.2-35.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825779" comment="rubygem-json-1.7.7-35.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825780" comment="rubygem-minitest-4.3.2-35.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825781" comment="rubygem-psych-2.0.0-35.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825782" comment="rubygem-rake-0.9.6-35.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825783" comment="rubygem-rdoc-4.0.0-35.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825784" comment="rubygems-2.0.14.1-35.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825785" comment="rubygems-devel-2.0.14.1-35.el7_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198325" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8325</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8325" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8325" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8325" ref_url="https://www.suse.com/security/cve/CVE-2019-8325" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1771-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DDFTKHWDUNIX327O4WIHXU2TIVV47W3Z/#DDFTKHWDUNIX327O4WIHXU2TIVV47W3Z" source="SUSE-SU"/>
    <description>
    An issue was discovered in RubyGems 2.6 and later through 3.0.2. Since Gem::CommandManager#run calls alert_error without escaping, escape sequence injection is possible. (There are many ways to cause an error.)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-8325/">CVE-2019-8325 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8325">CVE-2019-8325 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1130611">SUSE bug 1130611</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825771" comment="ruby-2.0.0.648-35.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825772" comment="ruby-devel-2.0.0.648-35.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825773" comment="ruby-doc-2.0.0.648-35.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825774" comment="ruby-irb-2.0.0.648-35.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825775" comment="ruby-libs-2.0.0.648-35.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825776" comment="ruby-tcltk-2.0.0.648-35.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825777" comment="rubygem-bigdecimal-1.2.0-35.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825778" comment="rubygem-io-console-0.4.2-35.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825779" comment="rubygem-json-1.7.7-35.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825780" comment="rubygem-minitest-4.3.2-35.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825781" comment="rubygem-psych-2.0.0-35.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825782" comment="rubygem-rake-0.9.6-35.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825783" comment="rubygem-rdoc-4.0.0-35.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825784" comment="rubygems-2.0.14.1-35.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825785" comment="rubygems-devel-2.0.14.1-35.el7_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198331" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8331</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8331" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8331" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8331" ref_url="https://www.suse.com/security/cve/CVE-2019-8331" source="SUSE CVE"/>
    <description>
    In Bootstrap before 3.4.1 and 4.3.x before 4.3.1, XSS is possible in the tooltip or popover data-template attribute.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-14"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8331/">CVE-2019-8331 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8331">CVE-2019-8331 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247983">SUSE bug 1247983</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828282" comment="ipa-client-4.6.8-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828283" comment="ipa-client-common-4.6.8-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828284" comment="ipa-common-4.6.8-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828285" comment="ipa-python-compat-4.6.8-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828286" comment="ipa-server-4.6.8-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828287" comment="ipa-server-common-4.6.8-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828288" comment="ipa-server-dns-4.6.8-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828289" comment="ipa-server-trust-ad-4.6.8-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828290" comment="python2-ipaclient-4.6.8-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828291" comment="python2-ipalib-4.6.8-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828292" comment="python2-ipaserver-4.6.8-5.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198379" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8379</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8379" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8379" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8379" ref_url="https://www.suse.com/security/cve/CVE-2019-8379" source="SUSE CVE"/>
    <description>
    An issue was discovered in AdvanceCOMP through 2.1. A NULL pointer dereference exists in the function be_uint32_read() located in endianrw.h. It can be triggered by sending a crafted file to a binary. It allows an attacker to cause a Denial of Service (Segmentation fault) or possibly have unspecified other impact when a victim opens a specially crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8379/">CVE-2019-8379 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8379">CVE-2019-8379 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826575" comment="advancecomp-1.15-21.el7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198383" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8383</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8383" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8383" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8383" ref_url="https://www.suse.com/security/cve/CVE-2019-8383" source="SUSE CVE"/>
    <description>
    An issue was discovered in AdvanceCOMP through 2.1. An invalid memory address occurs in the function adv_png_unfilter_8 in lib/png.c. It can be triggered by sending a crafted file to a binary. It allows an attacker to cause a Denial of Service (Segmentation fault) or possibly have unspecified other impact when a victim opens a specially crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8383/">CVE-2019-8383 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8383">CVE-2019-8383 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826575" comment="advancecomp-1.15-21.el7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198506" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8506</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8506" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8506" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8506" ref_url="https://www.suse.com/security/cve/CVE-2019-8506" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005420.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005426.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1374-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CGMQTO45E47X7O5HB3O7ZWDQLHRQ7G2Q/#CGMQTO45E47X7O5HB3O7ZWDQLHRQ7G2Q" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1391-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ALCAK5M2LDATQSAWCRSTBKKIPCCHELPM/#ALCAK5M2LDATQSAWCRSTBKKIPCCHELPM" source="SUSE-SU"/>
    <description>
    A type confusion issue was addressed with improved memory handling. This issue is fixed in iOS 12.2, tvOS 12.2, watchOS 5.2, Safari 12.1, iTunes 12.9.4 for Windows, iCloud for Windows 7.11. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-30"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8506/">CVE-2019-8506 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8506">CVE-2019-8506 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1132256">SUSE bug 1132256</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828527" comment="webkitgtk4-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828528" comment="webkitgtk4-devel-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828529" comment="webkitgtk4-doc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828530" comment="webkitgtk4-jsc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828531" comment="webkitgtk4-jsc-devel-2.28.2-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198524" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8524</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8524" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8524" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8524" ref_url="https://www.suse.com/security/cve/CVE-2019-8524" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005420.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005426.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1374-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CGMQTO45E47X7O5HB3O7ZWDQLHRQ7G2Q/#CGMQTO45E47X7O5HB3O7ZWDQLHRQ7G2Q" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1391-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ALCAK5M2LDATQSAWCRSTBKKIPCCHELPM/#ALCAK5M2LDATQSAWCRSTBKKIPCCHELPM" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.2, tvOS 12.2, Safari 12.1, iTunes 12.9.4 for Windows, iCloud for Windows 7.11. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8524/">CVE-2019-8524 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8524">CVE-2019-8524 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1132256">SUSE bug 1132256</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828527" comment="webkitgtk4-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828528" comment="webkitgtk4-devel-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828529" comment="webkitgtk4-doc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828530" comment="webkitgtk4-jsc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828531" comment="webkitgtk4-jsc-devel-2.28.2-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198535" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8535</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8535" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8535" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8535" ref_url="https://www.suse.com/security/cve/CVE-2019-8535" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005420.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005426.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1374-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CGMQTO45E47X7O5HB3O7ZWDQLHRQ7G2Q/#CGMQTO45E47X7O5HB3O7ZWDQLHRQ7G2Q" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1391-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ALCAK5M2LDATQSAWCRSTBKKIPCCHELPM/#ALCAK5M2LDATQSAWCRSTBKKIPCCHELPM" source="SUSE-SU"/>
    <description>
    A memory corruption issue was addressed with improved state management. This issue is fixed in iOS 12.2, tvOS 12.2, Safari 12.1, iTunes 12.9.4 for Windows, iCloud for Windows 7.11. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-10-23"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8535/">CVE-2019-8535 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8535">CVE-2019-8535 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1132256">SUSE bug 1132256</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828527" comment="webkitgtk4-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828528" comment="webkitgtk4-devel-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828529" comment="webkitgtk4-doc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828530" comment="webkitgtk4-jsc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828531" comment="webkitgtk4-jsc-devel-2.28.2-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198536" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8536</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8536" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8536" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8536" ref_url="https://www.suse.com/security/cve/CVE-2019-8536" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005420.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005426.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1374-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CGMQTO45E47X7O5HB3O7ZWDQLHRQ7G2Q/#CGMQTO45E47X7O5HB3O7ZWDQLHRQ7G2Q" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1391-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ALCAK5M2LDATQSAWCRSTBKKIPCCHELPM/#ALCAK5M2LDATQSAWCRSTBKKIPCCHELPM" source="SUSE-SU"/>
    <description>
    A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 12.2, tvOS 12.2, watchOS 5.2, Safari 12.1, iTunes 12.9.4 for Windows, iCloud for Windows 7.11. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-10-23"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8536/">CVE-2019-8536 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8536">CVE-2019-8536 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1132256">SUSE bug 1132256</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828527" comment="webkitgtk4-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828528" comment="webkitgtk4-devel-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828529" comment="webkitgtk4-doc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828530" comment="webkitgtk4-jsc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828531" comment="webkitgtk4-jsc-devel-2.28.2-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198544" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8544</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8544" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8544" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8544" ref_url="https://www.suse.com/security/cve/CVE-2019-8544" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005420.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005426.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1374-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CGMQTO45E47X7O5HB3O7ZWDQLHRQ7G2Q/#CGMQTO45E47X7O5HB3O7ZWDQLHRQ7G2Q" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1391-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ALCAK5M2LDATQSAWCRSTBKKIPCCHELPM/#ALCAK5M2LDATQSAWCRSTBKKIPCCHELPM" source="SUSE-SU"/>
    <description>
    A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 12.2, tvOS 12.2, watchOS 5.2, Safari 12.1, iTunes 12.9.4 for Windows, iCloud for Windows 7.11. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-10-23"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8544/">CVE-2019-8544 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8544">CVE-2019-8544 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1132256">SUSE bug 1132256</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828527" comment="webkitgtk4-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828528" comment="webkitgtk4-devel-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828529" comment="webkitgtk4-doc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828530" comment="webkitgtk4-jsc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828531" comment="webkitgtk4-jsc-devel-2.28.2-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198551" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8551</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8551" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8551" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8551" ref_url="https://www.suse.com/security/cve/CVE-2019-8551" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005420.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1374-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CGMQTO45E47X7O5HB3O7ZWDQLHRQ7G2Q/#CGMQTO45E47X7O5HB3O7ZWDQLHRQ7G2Q" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1391-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ALCAK5M2LDATQSAWCRSTBKKIPCCHELPM/#ALCAK5M2LDATQSAWCRSTBKKIPCCHELPM" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK/#YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W3TSYNLOG3MH5MKP7O3LUULRVNBIECSK/#W3TSYNLOG3MH5MKP7O3LUULRVNBIECSK" source="SUSE-SU"/>
    <description>
    A logic issue was addressed with improved validation. This issue is fixed in iOS 12.2, tvOS 12.2, Safari 12.1, iTunes 12.9.4 for Windows, iCloud for Windows 7.11. Processing maliciously crafted web content may lead to universal cross site scripting.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-10-23"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8551/">CVE-2019-8551 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8551">CVE-2019-8551 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1132256">SUSE bug 1132256</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828527" comment="webkitgtk4-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828528" comment="webkitgtk4-devel-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828529" comment="webkitgtk4-doc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828530" comment="webkitgtk4-jsc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828531" comment="webkitgtk4-jsc-devel-2.28.2-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198558" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8558</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8558" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8558" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8558" ref_url="https://www.suse.com/security/cve/CVE-2019-8558" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005420.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1374-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CGMQTO45E47X7O5HB3O7ZWDQLHRQ7G2Q/#CGMQTO45E47X7O5HB3O7ZWDQLHRQ7G2Q" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1391-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ALCAK5M2LDATQSAWCRSTBKKIPCCHELPM/#ALCAK5M2LDATQSAWCRSTBKKIPCCHELPM" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK/#YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W3TSYNLOG3MH5MKP7O3LUULRVNBIECSK/#W3TSYNLOG3MH5MKP7O3LUULRVNBIECSK" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.2, tvOS 12.2, watchOS 5.2, Safari 12.1, iTunes 12.9.4 for Windows, iCloud for Windows 7.11. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8558/">CVE-2019-8558 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8558">CVE-2019-8558 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1132256">SUSE bug 1132256</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828527" comment="webkitgtk4-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828528" comment="webkitgtk4-devel-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828529" comment="webkitgtk4-doc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828530" comment="webkitgtk4-jsc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828531" comment="webkitgtk4-jsc-devel-2.28.2-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198559" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8559</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8559" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8559" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8559" ref_url="https://www.suse.com/security/cve/CVE-2019-8559" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005420.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1374-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CGMQTO45E47X7O5HB3O7ZWDQLHRQ7G2Q/#CGMQTO45E47X7O5HB3O7ZWDQLHRQ7G2Q" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1391-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ALCAK5M2LDATQSAWCRSTBKKIPCCHELPM/#ALCAK5M2LDATQSAWCRSTBKKIPCCHELPM" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK/#YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W3TSYNLOG3MH5MKP7O3LUULRVNBIECSK/#W3TSYNLOG3MH5MKP7O3LUULRVNBIECSK" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.2, tvOS 12.2, watchOS 5.2, Safari 12.1, iTunes 12.9.4 for Windows, iCloud for Windows 7.11. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-10-23"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8559/">CVE-2019-8559 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8559">CVE-2019-8559 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1132256">SUSE bug 1132256</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828527" comment="webkitgtk4-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828528" comment="webkitgtk4-devel-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828529" comment="webkitgtk4-doc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828530" comment="webkitgtk4-jsc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828531" comment="webkitgtk4-jsc-devel-2.28.2-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198563" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8563</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8563" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8563" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8563" ref_url="https://www.suse.com/security/cve/CVE-2019-8563" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005420.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1374-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CGMQTO45E47X7O5HB3O7ZWDQLHRQ7G2Q/#CGMQTO45E47X7O5HB3O7ZWDQLHRQ7G2Q" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1391-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ALCAK5M2LDATQSAWCRSTBKKIPCCHELPM/#ALCAK5M2LDATQSAWCRSTBKKIPCCHELPM" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK/#YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W3TSYNLOG3MH5MKP7O3LUULRVNBIECSK/#W3TSYNLOG3MH5MKP7O3LUULRVNBIECSK" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.2, tvOS 12.2, watchOS 5.2, Safari 12.1, iTunes 12.9.4 for Windows, iCloud for Windows 7.11. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-10-23"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8563/">CVE-2019-8563 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8563">CVE-2019-8563 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1132256">SUSE bug 1132256</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828527" comment="webkitgtk4-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828528" comment="webkitgtk4-devel-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828529" comment="webkitgtk4-doc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828530" comment="webkitgtk4-jsc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828531" comment="webkitgtk4-jsc-devel-2.28.2-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198571" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8571</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8571" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8571" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8571" ref_url="https://www.suse.com/security/cve/CVE-2019-8571" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005709.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1766-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OQE4VHBLMH2J7F26YN2UPX2X5S3MOQCL/#OQE4VHBLMH2J7F26YN2UPX2X5S3MOQCL" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.3, macOS Mojave 10.14.5, tvOS 12.3, Safari 12.1.1, iTunes for Windows 12.9.5, iCloud for Windows 7.12. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8571/">CVE-2019-8571 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8571">CVE-2019-8571 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1135715">SUSE bug 1135715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828527" comment="webkitgtk4-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828528" comment="webkitgtk4-devel-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828529" comment="webkitgtk4-doc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828530" comment="webkitgtk4-jsc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828531" comment="webkitgtk4-jsc-devel-2.28.2-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198583" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8583</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8583" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8583" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8583" ref_url="https://www.suse.com/security/cve/CVE-2019-8583" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005709.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1766-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OQE4VHBLMH2J7F26YN2UPX2X5S3MOQCL/#OQE4VHBLMH2J7F26YN2UPX2X5S3MOQCL" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.3, macOS Mojave 10.14.5, tvOS 12.3, watchOS 5.2.1, Safari 12.1.1, iTunes for Windows 12.9.5, iCloud for Windows 7.12. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8583/">CVE-2019-8583 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8583">CVE-2019-8583 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1135715">SUSE bug 1135715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828527" comment="webkitgtk4-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828528" comment="webkitgtk4-devel-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828529" comment="webkitgtk4-doc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828530" comment="webkitgtk4-jsc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828531" comment="webkitgtk4-jsc-devel-2.28.2-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198584" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8584</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8584" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8584" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8584" ref_url="https://www.suse.com/security/cve/CVE-2019-8584" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005709.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1766-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OQE4VHBLMH2J7F26YN2UPX2X5S3MOQCL/#OQE4VHBLMH2J7F26YN2UPX2X5S3MOQCL" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.3, macOS Mojave 10.14.5, tvOS 12.3, Safari 12.1.1, iTunes for Windows 12.9.5, iCloud for Windows 7.12. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8584/">CVE-2019-8584 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8584">CVE-2019-8584 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1135715">SUSE bug 1135715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828527" comment="webkitgtk4-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828528" comment="webkitgtk4-devel-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828529" comment="webkitgtk4-doc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828530" comment="webkitgtk4-jsc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828531" comment="webkitgtk4-jsc-devel-2.28.2-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198586" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8586</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8586" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8586" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8586" ref_url="https://www.suse.com/security/cve/CVE-2019-8586" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005709.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1766-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OQE4VHBLMH2J7F26YN2UPX2X5S3MOQCL/#OQE4VHBLMH2J7F26YN2UPX2X5S3MOQCL" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.3, macOS Mojave 10.14.5, tvOS 12.3, Safari 12.1.1, iTunes for Windows 12.9.5, iCloud for Windows 7.12. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8586/">CVE-2019-8586 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8586">CVE-2019-8586 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1135715">SUSE bug 1135715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828527" comment="webkitgtk4-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828528" comment="webkitgtk4-devel-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828529" comment="webkitgtk4-doc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828530" comment="webkitgtk4-jsc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828531" comment="webkitgtk4-jsc-devel-2.28.2-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198587" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8587</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8587" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8587" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8587" ref_url="https://www.suse.com/security/cve/CVE-2019-8587" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005709.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1766-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OQE4VHBLMH2J7F26YN2UPX2X5S3MOQCL/#OQE4VHBLMH2J7F26YN2UPX2X5S3MOQCL" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.3, macOS Mojave 10.14.5, tvOS 12.3, Safari 12.1.1, iTunes for Windows 12.9.5, iCloud for Windows 7.12. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8587/">CVE-2019-8587 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8587">CVE-2019-8587 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1135715">SUSE bug 1135715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828527" comment="webkitgtk4-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828528" comment="webkitgtk4-devel-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828529" comment="webkitgtk4-doc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828530" comment="webkitgtk4-jsc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828531" comment="webkitgtk4-jsc-devel-2.28.2-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198594" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8594</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8594" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8594" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8594" ref_url="https://www.suse.com/security/cve/CVE-2019-8594" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005709.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1766-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OQE4VHBLMH2J7F26YN2UPX2X5S3MOQCL/#OQE4VHBLMH2J7F26YN2UPX2X5S3MOQCL" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.3, macOS Mojave 10.14.5, tvOS 12.3, Safari 12.1.1, iTunes for Windows 12.9.5, iCloud for Windows 7.12. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8594/">CVE-2019-8594 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8594">CVE-2019-8594 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1135715">SUSE bug 1135715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828527" comment="webkitgtk4-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828528" comment="webkitgtk4-devel-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828529" comment="webkitgtk4-doc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828530" comment="webkitgtk4-jsc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828531" comment="webkitgtk4-jsc-devel-2.28.2-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198595" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8595</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8595" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8595" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8595" ref_url="https://www.suse.com/security/cve/CVE-2019-8595" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2345-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005951.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1766-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OQE4VHBLMH2J7F26YN2UPX2X5S3MOQCL/#OQE4VHBLMH2J7F26YN2UPX2X5S3MOQCL" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2207-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ILDNTG7O4EJQAKVHL4AWGZGRHZJTSPFV/#ILDNTG7O4EJQAKVHL4AWGZGRHZJTSPFV" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2208-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/24QMYHAZS2AJE54DTAKCEMDKYJVLT7R7/#24QMYHAZS2AJE54DTAKCEMDKYJVLT7R7" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.3, macOS Mojave 10.14.5, tvOS 12.3, Safari 12.1.1, iTunes for Windows 12.9.5, iCloud for Windows 7.12. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8595/">CVE-2019-8595 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8595">CVE-2019-8595 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1135715">SUSE bug 1135715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828527" comment="webkitgtk4-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828528" comment="webkitgtk4-devel-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828529" comment="webkitgtk4-doc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828530" comment="webkitgtk4-jsc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828531" comment="webkitgtk4-jsc-devel-2.28.2-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198596" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8596</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8596" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8596" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8596" ref_url="https://www.suse.com/security/cve/CVE-2019-8596" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005709.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1766-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OQE4VHBLMH2J7F26YN2UPX2X5S3MOQCL/#OQE4VHBLMH2J7F26YN2UPX2X5S3MOQCL" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.3, macOS Mojave 10.14.5, tvOS 12.3, Safari 12.1.1, iTunes for Windows 12.9.5, iCloud for Windows 7.12. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8596/">CVE-2019-8596 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8596">CVE-2019-8596 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1135715">SUSE bug 1135715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828527" comment="webkitgtk4-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828528" comment="webkitgtk4-devel-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828529" comment="webkitgtk4-doc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828530" comment="webkitgtk4-jsc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828531" comment="webkitgtk4-jsc-devel-2.28.2-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198597" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8597</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8597" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8597" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8597" ref_url="https://www.suse.com/security/cve/CVE-2019-8597" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005709.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1766-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OQE4VHBLMH2J7F26YN2UPX2X5S3MOQCL/#OQE4VHBLMH2J7F26YN2UPX2X5S3MOQCL" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.3, macOS Mojave 10.14.5, tvOS 12.3, Safari 12.1.1, iTunes for Windows 12.9.5, iCloud for Windows 7.12. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8597/">CVE-2019-8597 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8597">CVE-2019-8597 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1135715">SUSE bug 1135715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828527" comment="webkitgtk4-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828528" comment="webkitgtk4-devel-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828529" comment="webkitgtk4-doc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828530" comment="webkitgtk4-jsc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828531" comment="webkitgtk4-jsc-devel-2.28.2-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198601" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8601</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8601" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8601" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8601" ref_url="https://www.suse.com/security/cve/CVE-2019-8601" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005709.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1766-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OQE4VHBLMH2J7F26YN2UPX2X5S3MOQCL/#OQE4VHBLMH2J7F26YN2UPX2X5S3MOQCL" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.3, macOS Mojave 10.14.5, tvOS 12.3, watchOS 5.2.1, Safari 12.1.1, iTunes for Windows 12.9.5, iCloud for Windows 7.12. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8601/">CVE-2019-8601 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8601">CVE-2019-8601 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1135715">SUSE bug 1135715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828527" comment="webkitgtk4-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828528" comment="webkitgtk4-devel-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828529" comment="webkitgtk4-doc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828530" comment="webkitgtk4-jsc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828531" comment="webkitgtk4-jsc-devel-2.28.2-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198607" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8607</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8607" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8607" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8607" ref_url="https://www.suse.com/security/cve/CVE-2019-8607" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2345-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005951.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1766-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OQE4VHBLMH2J7F26YN2UPX2X5S3MOQCL/#OQE4VHBLMH2J7F26YN2UPX2X5S3MOQCL" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2207-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ILDNTG7O4EJQAKVHL4AWGZGRHZJTSPFV/#ILDNTG7O4EJQAKVHL4AWGZGRHZJTSPFV" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2208-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/24QMYHAZS2AJE54DTAKCEMDKYJVLT7R7/#24QMYHAZS2AJE54DTAKCEMDKYJVLT7R7" source="SUSE-SU"/>
    <description>
    An out-of-bounds read was addressed with improved input validation. This issue is fixed in iOS 12.3, macOS Mojave 10.14.5, tvOS 12.3, watchOS 5.2.1, Safari 12.1.1, iTunes for Windows 12.9.5, iCloud for Windows 7.12. Processing maliciously crafted web content may result in the disclosure of process memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8607/">CVE-2019-8607 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8607">CVE-2019-8607 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1135715">SUSE bug 1135715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828527" comment="webkitgtk4-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828528" comment="webkitgtk4-devel-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828529" comment="webkitgtk4-doc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828530" comment="webkitgtk4-jsc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828531" comment="webkitgtk4-jsc-devel-2.28.2-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198608" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8608</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8608" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8608" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8608" ref_url="https://www.suse.com/security/cve/CVE-2019-8608" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005709.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1766-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OQE4VHBLMH2J7F26YN2UPX2X5S3MOQCL/#OQE4VHBLMH2J7F26YN2UPX2X5S3MOQCL" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.3, macOS Mojave 10.14.5, tvOS 12.3, Safari 12.1.1, iTunes for Windows 12.9.5, iCloud for Windows 7.12. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8608/">CVE-2019-8608 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8608">CVE-2019-8608 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1135715">SUSE bug 1135715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828527" comment="webkitgtk4-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828528" comment="webkitgtk4-devel-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828529" comment="webkitgtk4-doc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828530" comment="webkitgtk4-jsc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828531" comment="webkitgtk4-jsc-devel-2.28.2-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198609" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8609</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8609" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8609" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8609" ref_url="https://www.suse.com/security/cve/CVE-2019-8609" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005709.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1766-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OQE4VHBLMH2J7F26YN2UPX2X5S3MOQCL/#OQE4VHBLMH2J7F26YN2UPX2X5S3MOQCL" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.3, macOS Mojave 10.14.5, tvOS 12.3, Safari 12.1.1, iTunes for Windows 12.9.5, iCloud for Windows 7.12. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8609/">CVE-2019-8609 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8609">CVE-2019-8609 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1135715">SUSE bug 1135715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828527" comment="webkitgtk4-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828528" comment="webkitgtk4-devel-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828529" comment="webkitgtk4-doc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828530" comment="webkitgtk4-jsc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828531" comment="webkitgtk4-jsc-devel-2.28.2-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198610" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8610</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8610" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8610" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8610" ref_url="https://www.suse.com/security/cve/CVE-2019-8610" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005709.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1766-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OQE4VHBLMH2J7F26YN2UPX2X5S3MOQCL/#OQE4VHBLMH2J7F26YN2UPX2X5S3MOQCL" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.3, macOS Mojave 10.14.5, tvOS 12.3, Safari 12.1.1, iTunes for Windows 12.9.5, iCloud for Windows 7.12. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8610/">CVE-2019-8610 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8610">CVE-2019-8610 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1135715">SUSE bug 1135715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828527" comment="webkitgtk4-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828528" comment="webkitgtk4-devel-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828529" comment="webkitgtk4-doc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828530" comment="webkitgtk4-jsc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828531" comment="webkitgtk4-jsc-devel-2.28.2-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198611" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8611</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8611" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8611" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8611" ref_url="https://www.suse.com/security/cve/CVE-2019-8611" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005709.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1766-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OQE4VHBLMH2J7F26YN2UPX2X5S3MOQCL/#OQE4VHBLMH2J7F26YN2UPX2X5S3MOQCL" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.3, macOS Mojave 10.14.5, tvOS 12.3, Safari 12.1.1, iTunes for Windows 12.9.5, iCloud for Windows 7.12. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8611/">CVE-2019-8611 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8611">CVE-2019-8611 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1135715">SUSE bug 1135715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828527" comment="webkitgtk4-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828528" comment="webkitgtk4-devel-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828529" comment="webkitgtk4-doc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828530" comment="webkitgtk4-jsc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828531" comment="webkitgtk4-jsc-devel-2.28.2-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198615" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8615</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8615" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8615" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8615" ref_url="https://www.suse.com/security/cve/CVE-2019-8615" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2345-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005951.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1766-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OQE4VHBLMH2J7F26YN2UPX2X5S3MOQCL/#OQE4VHBLMH2J7F26YN2UPX2X5S3MOQCL" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2207-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ILDNTG7O4EJQAKVHL4AWGZGRHZJTSPFV/#ILDNTG7O4EJQAKVHL4AWGZGRHZJTSPFV" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2208-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/24QMYHAZS2AJE54DTAKCEMDKYJVLT7R7/#24QMYHAZS2AJE54DTAKCEMDKYJVLT7R7" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.3, macOS Mojave 10.14.5, tvOS 12.3, Safari 12.1.1, iTunes for Windows 12.9.5, iCloud for Windows 7.12. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8615/">CVE-2019-8615 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8615">CVE-2019-8615 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1135715">SUSE bug 1135715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828527" comment="webkitgtk4-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828528" comment="webkitgtk4-devel-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828529" comment="webkitgtk4-doc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828530" comment="webkitgtk4-jsc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828531" comment="webkitgtk4-jsc-devel-2.28.2-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198619" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8619</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8619" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8619" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8619" ref_url="https://www.suse.com/security/cve/CVE-2019-8619" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005709.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1766-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OQE4VHBLMH2J7F26YN2UPX2X5S3MOQCL/#OQE4VHBLMH2J7F26YN2UPX2X5S3MOQCL" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.3, macOS Mojave 10.14.5, tvOS 12.3, Safari 12.1.1, iTunes for Windows 12.9.5, iCloud for Windows 7.12. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8619/">CVE-2019-8619 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8619">CVE-2019-8619 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1135715">SUSE bug 1135715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828527" comment="webkitgtk4-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828528" comment="webkitgtk4-devel-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828529" comment="webkitgtk4-doc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828530" comment="webkitgtk4-jsc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828531" comment="webkitgtk4-jsc-devel-2.28.2-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198622" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8622</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8622" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8622" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8622" ref_url="https://www.suse.com/security/cve/CVE-2019-8622" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005709.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1766-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OQE4VHBLMH2J7F26YN2UPX2X5S3MOQCL/#OQE4VHBLMH2J7F26YN2UPX2X5S3MOQCL" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.3, macOS Mojave 10.14.5, tvOS 12.3, watchOS 5.2.1, Safari 12.1.1, iTunes for Windows 12.9.5, iCloud for Windows 7.12. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8622/">CVE-2019-8622 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8622">CVE-2019-8622 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1135715">SUSE bug 1135715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828527" comment="webkitgtk4-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828528" comment="webkitgtk4-devel-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828529" comment="webkitgtk4-doc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828530" comment="webkitgtk4-jsc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828531" comment="webkitgtk4-jsc-devel-2.28.2-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198623" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8623</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8623" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8623" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8623" ref_url="https://www.suse.com/security/cve/CVE-2019-8623" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005709.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1766-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OQE4VHBLMH2J7F26YN2UPX2X5S3MOQCL/#OQE4VHBLMH2J7F26YN2UPX2X5S3MOQCL" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.3, macOS Mojave 10.14.5, tvOS 12.3, watchOS 5.2.1, Safari 12.1.1, iTunes for Windows 12.9.5, iCloud for Windows 7.12. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8623/">CVE-2019-8623 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8623">CVE-2019-8623 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1135715">SUSE bug 1135715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828527" comment="webkitgtk4-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828528" comment="webkitgtk4-devel-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828529" comment="webkitgtk4-doc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828530" comment="webkitgtk4-jsc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828531" comment="webkitgtk4-jsc-devel-2.28.2-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198625" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8625</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8625" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8625" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8625" ref_url="https://www.suse.com/security/cve/CVE-2019-8625" source="SUSE CVE"/>
		<reference ref_id="RHSA-2020:4451" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006752.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK/#YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W3TSYNLOG3MH5MKP7O3LUULRVNBIECSK/#W3TSYNLOG3MH5MKP7O3LUULRVNBIECSK" source="SUSE-SU"/>
    <description>
    A logic issue was addressed with improved state management. This issue is fixed in tvOS 13, iTunes for Windows 12.10.1, iCloud for Windows 10.7, iCloud for Windows 7.14. Processing maliciously crafted web content may lead to universal cross site scripting.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-28"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-8625/">CVE-2019-8625 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8625">CVE-2019-8625 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1155321">SUSE bug 1155321</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828527" comment="webkitgtk4-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828528" comment="webkitgtk4-devel-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828529" comment="webkitgtk4-doc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828530" comment="webkitgtk4-jsc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828531" comment="webkitgtk4-jsc-devel-2.28.2-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198644" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8644</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8644" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8644" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8644" ref_url="https://www.suse.com/security/cve/CVE-2019-8644" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2345-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005951.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2207-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ILDNTG7O4EJQAKVHL4AWGZGRHZJTSPFV/#ILDNTG7O4EJQAKVHL4AWGZGRHZJTSPFV" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2208-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/24QMYHAZS2AJE54DTAKCEMDKYJVLT7R7/#24QMYHAZS2AJE54DTAKCEMDKYJVLT7R7" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8644/">CVE-2019-8644 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8644">CVE-2019-8644 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1148931">SUSE bug 1148931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828527" comment="webkitgtk4-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828528" comment="webkitgtk4-devel-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828529" comment="webkitgtk4-doc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828530" comment="webkitgtk4-jsc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828531" comment="webkitgtk4-jsc-devel-2.28.2-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198649" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8649</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8649" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8649" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8649" ref_url="https://www.suse.com/security/cve/CVE-2019-8649" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2345-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005951.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2207-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ILDNTG7O4EJQAKVHL4AWGZGRHZJTSPFV/#ILDNTG7O4EJQAKVHL4AWGZGRHZJTSPFV" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2208-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/24QMYHAZS2AJE54DTAKCEMDKYJVLT7R7/#24QMYHAZS2AJE54DTAKCEMDKYJVLT7R7" source="SUSE-SU"/>
    <description>
    A logic issue existed in the handling of synchronous page loads. This issue was addressed with improved state management. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to universal cross site scripting.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8649/">CVE-2019-8649 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8649">CVE-2019-8649 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1148931">SUSE bug 1148931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828527" comment="webkitgtk4-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828528" comment="webkitgtk4-devel-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828529" comment="webkitgtk4-doc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828530" comment="webkitgtk4-jsc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828531" comment="webkitgtk4-jsc-devel-2.28.2-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198658" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8658</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8658" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8658" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8658" ref_url="https://www.suse.com/security/cve/CVE-2019-8658" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2345-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005951.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2207-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ILDNTG7O4EJQAKVHL4AWGZGRHZJTSPFV/#ILDNTG7O4EJQAKVHL4AWGZGRHZJTSPFV" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2208-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/24QMYHAZS2AJE54DTAKCEMDKYJVLT7R7/#24QMYHAZS2AJE54DTAKCEMDKYJVLT7R7" source="SUSE-SU"/>
    <description>
    A logic issue was addressed with improved state management. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, watchOS 5.3, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to universal cross site scripting.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8658/">CVE-2019-8658 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8658">CVE-2019-8658 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1148931">SUSE bug 1148931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828527" comment="webkitgtk4-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828528" comment="webkitgtk4-devel-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828529" comment="webkitgtk4-doc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828530" comment="webkitgtk4-jsc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828531" comment="webkitgtk4-jsc-devel-2.28.2-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198666" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8666</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8666" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8666" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8666" ref_url="https://www.suse.com/security/cve/CVE-2019-8666" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2345-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005951.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2207-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ILDNTG7O4EJQAKVHL4AWGZGRHZJTSPFV/#ILDNTG7O4EJQAKVHL4AWGZGRHZJTSPFV" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2208-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/24QMYHAZS2AJE54DTAKCEMDKYJVLT7R7/#24QMYHAZS2AJE54DTAKCEMDKYJVLT7R7" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8666/">CVE-2019-8666 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8666">CVE-2019-8666 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1148931">SUSE bug 1148931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828527" comment="webkitgtk4-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828528" comment="webkitgtk4-devel-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828529" comment="webkitgtk4-doc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828530" comment="webkitgtk4-jsc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828531" comment="webkitgtk4-jsc-devel-2.28.2-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198669" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8669</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8669" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8669" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8669" ref_url="https://www.suse.com/security/cve/CVE-2019-8669" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2345-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005951.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2207-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ILDNTG7O4EJQAKVHL4AWGZGRHZJTSPFV/#ILDNTG7O4EJQAKVHL4AWGZGRHZJTSPFV" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2208-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/24QMYHAZS2AJE54DTAKCEMDKYJVLT7R7/#24QMYHAZS2AJE54DTAKCEMDKYJVLT7R7" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, watchOS 5.3, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8669/">CVE-2019-8669 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8669">CVE-2019-8669 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1148931">SUSE bug 1148931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828527" comment="webkitgtk4-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828528" comment="webkitgtk4-devel-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828529" comment="webkitgtk4-doc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828530" comment="webkitgtk4-jsc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828531" comment="webkitgtk4-jsc-devel-2.28.2-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198671" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8671</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8671" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8671" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8671" ref_url="https://www.suse.com/security/cve/CVE-2019-8671" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2345-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005951.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2207-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ILDNTG7O4EJQAKVHL4AWGZGRHZJTSPFV/#ILDNTG7O4EJQAKVHL4AWGZGRHZJTSPFV" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2208-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/24QMYHAZS2AJE54DTAKCEMDKYJVLT7R7/#24QMYHAZS2AJE54DTAKCEMDKYJVLT7R7" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8671/">CVE-2019-8671 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8671">CVE-2019-8671 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1148931">SUSE bug 1148931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828527" comment="webkitgtk4-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828528" comment="webkitgtk4-devel-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828529" comment="webkitgtk4-doc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828530" comment="webkitgtk4-jsc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828531" comment="webkitgtk4-jsc-devel-2.28.2-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198672" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8672</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8672" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8672" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8672" ref_url="https://www.suse.com/security/cve/CVE-2019-8672" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2345-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005951.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2207-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ILDNTG7O4EJQAKVHL4AWGZGRHZJTSPFV/#ILDNTG7O4EJQAKVHL4AWGZGRHZJTSPFV" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2208-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/24QMYHAZS2AJE54DTAKCEMDKYJVLT7R7/#24QMYHAZS2AJE54DTAKCEMDKYJVLT7R7" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, watchOS 5.3, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8672/">CVE-2019-8672 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8672">CVE-2019-8672 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1148931">SUSE bug 1148931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828527" comment="webkitgtk4-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828528" comment="webkitgtk4-devel-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828529" comment="webkitgtk4-doc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828530" comment="webkitgtk4-jsc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828531" comment="webkitgtk4-jsc-devel-2.28.2-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198673" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8673</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8673" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8673" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8673" ref_url="https://www.suse.com/security/cve/CVE-2019-8673" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2345-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005951.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2207-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ILDNTG7O4EJQAKVHL4AWGZGRHZJTSPFV/#ILDNTG7O4EJQAKVHL4AWGZGRHZJTSPFV" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2208-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/24QMYHAZS2AJE54DTAKCEMDKYJVLT7R7/#24QMYHAZS2AJE54DTAKCEMDKYJVLT7R7" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8673/">CVE-2019-8673 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8673">CVE-2019-8673 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1148931">SUSE bug 1148931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828527" comment="webkitgtk4-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828528" comment="webkitgtk4-devel-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828529" comment="webkitgtk4-doc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828530" comment="webkitgtk4-jsc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828531" comment="webkitgtk4-jsc-devel-2.28.2-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198674" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8674</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8674" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8674" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8674" ref_url="https://www.suse.com/security/cve/CVE-2019-8674" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK/#YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W3TSYNLOG3MH5MKP7O3LUULRVNBIECSK/#W3TSYNLOG3MH5MKP7O3LUULRVNBIECSK" source="SUSE-SU"/>
    <description>
    A logic issue was addressed with improved state management. This issue is fixed in iOS 13, Safari 13. Processing maliciously crafted web content may lead to universal cross site scripting.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-8674/">CVE-2019-8674 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8674">CVE-2019-8674 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1155321">SUSE bug 1155321</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828527" comment="webkitgtk4-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828528" comment="webkitgtk4-devel-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828529" comment="webkitgtk4-doc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828530" comment="webkitgtk4-jsc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828531" comment="webkitgtk4-jsc-devel-2.28.2-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198675" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8675</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8675" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8675" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8675" ref_url="https://www.suse.com/security/cve/CVE-2019-8675" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006170.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2573-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2U7ZFFNECZWE2BZ2HMLFUOQGBZYQKIS5/#2U7ZFFNECZWE2BZ2HMLFUOQGBZYQKIS5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2575-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/24BSJBHQAG2FNFAWH2UT55ZV7FBGBDIE/#24BSJBHQAG2FNFAWH2UT55ZV7FBGBDIE" source="SUSE-SU"/>
    <description>
    A buffer overflow issue was addressed with improved memory handling. This issue is fixed in macOS Mojave 10.14.6, Security Update 2019-004 High Sierra, Security Update 2019-004 Sierra. An attacker in a privileged network position may be able to execute arbitrary code.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-24"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8675/">CVE-2019-8675 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8675">CVE-2019-8675 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1146358">SUSE bug 1146358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168422">SUSE bug 1168422</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828116" comment="cups-1.6.3-51.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828117" comment="cups-client-1.6.3-51.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828118" comment="cups-devel-1.6.3-51.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828119" comment="cups-filesystem-1.6.3-51.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828120" comment="cups-ipptool-1.6.3-51.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828121" comment="cups-libs-1.6.3-51.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828122" comment="cups-lpd-1.6.3-51.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198676" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8676</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8676" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8676" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8676" ref_url="https://www.suse.com/security/cve/CVE-2019-8676" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2345-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005951.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2207-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ILDNTG7O4EJQAKVHL4AWGZGRHZJTSPFV/#ILDNTG7O4EJQAKVHL4AWGZGRHZJTSPFV" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2208-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/24QMYHAZS2AJE54DTAKCEMDKYJVLT7R7/#24QMYHAZS2AJE54DTAKCEMDKYJVLT7R7" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, watchOS 5.3, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8676/">CVE-2019-8676 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8676">CVE-2019-8676 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1148931">SUSE bug 1148931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828527" comment="webkitgtk4-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828528" comment="webkitgtk4-devel-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828529" comment="webkitgtk4-doc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828530" comment="webkitgtk4-jsc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828531" comment="webkitgtk4-jsc-devel-2.28.2-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198677" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8677</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8677" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8677" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8677" ref_url="https://www.suse.com/security/cve/CVE-2019-8677" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2345-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005951.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2207-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ILDNTG7O4EJQAKVHL4AWGZGRHZJTSPFV/#ILDNTG7O4EJQAKVHL4AWGZGRHZJTSPFV" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2208-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/24QMYHAZS2AJE54DTAKCEMDKYJVLT7R7/#24QMYHAZS2AJE54DTAKCEMDKYJVLT7R7" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8677/">CVE-2019-8677 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8677">CVE-2019-8677 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1148931">SUSE bug 1148931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828527" comment="webkitgtk4-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828528" comment="webkitgtk4-devel-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828529" comment="webkitgtk4-doc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828530" comment="webkitgtk4-jsc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828531" comment="webkitgtk4-jsc-devel-2.28.2-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198678" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8678</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8678" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8678" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8678" ref_url="https://www.suse.com/security/cve/CVE-2019-8678" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2345-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005951.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2207-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ILDNTG7O4EJQAKVHL4AWGZGRHZJTSPFV/#ILDNTG7O4EJQAKVHL4AWGZGRHZJTSPFV" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2208-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/24QMYHAZS2AJE54DTAKCEMDKYJVLT7R7/#24QMYHAZS2AJE54DTAKCEMDKYJVLT7R7" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8678/">CVE-2019-8678 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8678">CVE-2019-8678 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1148931">SUSE bug 1148931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828527" comment="webkitgtk4-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828528" comment="webkitgtk4-devel-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828529" comment="webkitgtk4-doc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828530" comment="webkitgtk4-jsc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828531" comment="webkitgtk4-jsc-devel-2.28.2-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198679" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8679</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8679" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8679" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8679" ref_url="https://www.suse.com/security/cve/CVE-2019-8679" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2345-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005951.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2207-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ILDNTG7O4EJQAKVHL4AWGZGRHZJTSPFV/#ILDNTG7O4EJQAKVHL4AWGZGRHZJTSPFV" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2208-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/24QMYHAZS2AJE54DTAKCEMDKYJVLT7R7/#24QMYHAZS2AJE54DTAKCEMDKYJVLT7R7" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8679/">CVE-2019-8679 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8679">CVE-2019-8679 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1148931">SUSE bug 1148931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828527" comment="webkitgtk4-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828528" comment="webkitgtk4-devel-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828529" comment="webkitgtk4-doc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828530" comment="webkitgtk4-jsc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828531" comment="webkitgtk4-jsc-devel-2.28.2-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198680" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8680</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8680" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8680" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8680" ref_url="https://www.suse.com/security/cve/CVE-2019-8680" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2345-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005951.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2207-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ILDNTG7O4EJQAKVHL4AWGZGRHZJTSPFV/#ILDNTG7O4EJQAKVHL4AWGZGRHZJTSPFV" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2208-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/24QMYHAZS2AJE54DTAKCEMDKYJVLT7R7/#24QMYHAZS2AJE54DTAKCEMDKYJVLT7R7" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8680/">CVE-2019-8680 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8680">CVE-2019-8680 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1148931">SUSE bug 1148931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828527" comment="webkitgtk4-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828528" comment="webkitgtk4-devel-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828529" comment="webkitgtk4-doc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828530" comment="webkitgtk4-jsc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828531" comment="webkitgtk4-jsc-devel-2.28.2-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198681" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8681</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8681" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8681" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8681" ref_url="https://www.suse.com/security/cve/CVE-2019-8681" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2345-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2207-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ILDNTG7O4EJQAKVHL4AWGZGRHZJTSPFV/#ILDNTG7O4EJQAKVHL4AWGZGRHZJTSPFV" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2208-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/24QMYHAZS2AJE54DTAKCEMDKYJVLT7R7/#24QMYHAZS2AJE54DTAKCEMDKYJVLT7R7" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK/#YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W3TSYNLOG3MH5MKP7O3LUULRVNBIECSK/#W3TSYNLOG3MH5MKP7O3LUULRVNBIECSK" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8681/">CVE-2019-8681 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8681">CVE-2019-8681 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1148931">SUSE bug 1148931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828527" comment="webkitgtk4-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828528" comment="webkitgtk4-devel-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828529" comment="webkitgtk4-doc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828530" comment="webkitgtk4-jsc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828531" comment="webkitgtk4-jsc-devel-2.28.2-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198683" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8683</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8683" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8683" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8683" ref_url="https://www.suse.com/security/cve/CVE-2019-8683" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2345-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005951.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2207-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ILDNTG7O4EJQAKVHL4AWGZGRHZJTSPFV/#ILDNTG7O4EJQAKVHL4AWGZGRHZJTSPFV" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2208-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/24QMYHAZS2AJE54DTAKCEMDKYJVLT7R7/#24QMYHAZS2AJE54DTAKCEMDKYJVLT7R7" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, watchOS 5.3, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8683/">CVE-2019-8683 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8683">CVE-2019-8683 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1148931">SUSE bug 1148931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828527" comment="webkitgtk4-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828528" comment="webkitgtk4-devel-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828529" comment="webkitgtk4-doc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828530" comment="webkitgtk4-jsc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828531" comment="webkitgtk4-jsc-devel-2.28.2-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198684" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8684</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8684" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8684" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8684" ref_url="https://www.suse.com/security/cve/CVE-2019-8684" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2345-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2207-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ILDNTG7O4EJQAKVHL4AWGZGRHZJTSPFV/#ILDNTG7O4EJQAKVHL4AWGZGRHZJTSPFV" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2208-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/24QMYHAZS2AJE54DTAKCEMDKYJVLT7R7/#24QMYHAZS2AJE54DTAKCEMDKYJVLT7R7" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK/#YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W3TSYNLOG3MH5MKP7O3LUULRVNBIECSK/#W3TSYNLOG3MH5MKP7O3LUULRVNBIECSK" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, watchOS 5.3, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8684/">CVE-2019-8684 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8684">CVE-2019-8684 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1148931">SUSE bug 1148931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828527" comment="webkitgtk4-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828528" comment="webkitgtk4-devel-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828529" comment="webkitgtk4-doc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828530" comment="webkitgtk4-jsc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828531" comment="webkitgtk4-jsc-devel-2.28.2-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198686" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8686</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8686" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8686" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8686" ref_url="https://www.suse.com/security/cve/CVE-2019-8686" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2345-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2207-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ILDNTG7O4EJQAKVHL4AWGZGRHZJTSPFV/#ILDNTG7O4EJQAKVHL4AWGZGRHZJTSPFV" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2208-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/24QMYHAZS2AJE54DTAKCEMDKYJVLT7R7/#24QMYHAZS2AJE54DTAKCEMDKYJVLT7R7" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK/#YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W3TSYNLOG3MH5MKP7O3LUULRVNBIECSK/#W3TSYNLOG3MH5MKP7O3LUULRVNBIECSK" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8686/">CVE-2019-8686 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8686">CVE-2019-8686 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1148931">SUSE bug 1148931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828527" comment="webkitgtk4-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828528" comment="webkitgtk4-devel-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828529" comment="webkitgtk4-doc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828530" comment="webkitgtk4-jsc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828531" comment="webkitgtk4-jsc-devel-2.28.2-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198687" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8687</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8687" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8687" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8687" ref_url="https://www.suse.com/security/cve/CVE-2019-8687" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2345-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2207-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ILDNTG7O4EJQAKVHL4AWGZGRHZJTSPFV/#ILDNTG7O4EJQAKVHL4AWGZGRHZJTSPFV" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2208-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/24QMYHAZS2AJE54DTAKCEMDKYJVLT7R7/#24QMYHAZS2AJE54DTAKCEMDKYJVLT7R7" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK/#YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W3TSYNLOG3MH5MKP7O3LUULRVNBIECSK/#W3TSYNLOG3MH5MKP7O3LUULRVNBIECSK" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8687/">CVE-2019-8687 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8687">CVE-2019-8687 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1148931">SUSE bug 1148931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828527" comment="webkitgtk4-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828528" comment="webkitgtk4-devel-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828529" comment="webkitgtk4-doc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828530" comment="webkitgtk4-jsc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828531" comment="webkitgtk4-jsc-devel-2.28.2-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198688" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8688</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8688" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8688" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8688" ref_url="https://www.suse.com/security/cve/CVE-2019-8688" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2345-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2207-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ILDNTG7O4EJQAKVHL4AWGZGRHZJTSPFV/#ILDNTG7O4EJQAKVHL4AWGZGRHZJTSPFV" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2208-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/24QMYHAZS2AJE54DTAKCEMDKYJVLT7R7/#24QMYHAZS2AJE54DTAKCEMDKYJVLT7R7" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK/#YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W3TSYNLOG3MH5MKP7O3LUULRVNBIECSK/#W3TSYNLOG3MH5MKP7O3LUULRVNBIECSK" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, watchOS 5.3, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8688/">CVE-2019-8688 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8688">CVE-2019-8688 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1148931">SUSE bug 1148931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828527" comment="webkitgtk4-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828528" comment="webkitgtk4-devel-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828529" comment="webkitgtk4-doc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828530" comment="webkitgtk4-jsc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828531" comment="webkitgtk4-jsc-devel-2.28.2-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198689" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8689</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8689" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8689" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8689" ref_url="https://www.suse.com/security/cve/CVE-2019-8689" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2345-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2207-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ILDNTG7O4EJQAKVHL4AWGZGRHZJTSPFV/#ILDNTG7O4EJQAKVHL4AWGZGRHZJTSPFV" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2208-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/24QMYHAZS2AJE54DTAKCEMDKYJVLT7R7/#24QMYHAZS2AJE54DTAKCEMDKYJVLT7R7" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK/#YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W3TSYNLOG3MH5MKP7O3LUULRVNBIECSK/#W3TSYNLOG3MH5MKP7O3LUULRVNBIECSK" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, watchOS 5.3, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8689/">CVE-2019-8689 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8689">CVE-2019-8689 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1148931">SUSE bug 1148931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828527" comment="webkitgtk4-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828528" comment="webkitgtk4-devel-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828529" comment="webkitgtk4-doc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828530" comment="webkitgtk4-jsc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828531" comment="webkitgtk4-jsc-devel-2.28.2-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198690" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8690</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8690" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8690" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8690" ref_url="https://www.suse.com/security/cve/CVE-2019-8690" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2345-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2207-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ILDNTG7O4EJQAKVHL4AWGZGRHZJTSPFV/#ILDNTG7O4EJQAKVHL4AWGZGRHZJTSPFV" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2208-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/24QMYHAZS2AJE54DTAKCEMDKYJVLT7R7/#24QMYHAZS2AJE54DTAKCEMDKYJVLT7R7" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK/#YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W3TSYNLOG3MH5MKP7O3LUULRVNBIECSK/#W3TSYNLOG3MH5MKP7O3LUULRVNBIECSK" source="SUSE-SU"/>
    <description>
    A logic issue existed in the handling of document loads. This issue was addressed with improved state management. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to universal cross site scripting.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8690/">CVE-2019-8690 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8690">CVE-2019-8690 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1148931">SUSE bug 1148931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828527" comment="webkitgtk4-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828528" comment="webkitgtk4-devel-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828529" comment="webkitgtk4-doc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828530" comment="webkitgtk4-jsc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828531" comment="webkitgtk4-jsc-devel-2.28.2-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198696" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8696</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8696" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8696" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8696" ref_url="https://www.suse.com/security/cve/CVE-2019-8696" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006170.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2573-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2U7ZFFNECZWE2BZ2HMLFUOQGBZYQKIS5/#2U7ZFFNECZWE2BZ2HMLFUOQGBZYQKIS5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2575-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/24BSJBHQAG2FNFAWH2UT55ZV7FBGBDIE/#24BSJBHQAG2FNFAWH2UT55ZV7FBGBDIE" source="SUSE-SU"/>
    <description>
    A buffer overflow issue was addressed with improved memory handling. This issue is fixed in macOS Mojave 10.14.6, Security Update 2019-004 High Sierra, Security Update 2019-004 Sierra. An attacker in a privileged network position may be able to execute arbitrary code.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-23"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8696/">CVE-2019-8696 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8696">CVE-2019-8696 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1146358">SUSE bug 1146358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146359">SUSE bug 1146359</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828116" comment="cups-1.6.3-51.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828117" comment="cups-client-1.6.3-51.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828118" comment="cups-devel-1.6.3-51.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828119" comment="cups-filesystem-1.6.3-51.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828120" comment="cups-ipptool-1.6.3-51.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828121" comment="cups-libs-1.6.3-51.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828122" comment="cups-lpd-1.6.3-51.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198707" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8707</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8707" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8707" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8707" ref_url="https://www.suse.com/security/cve/CVE-2019-8707" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK/#YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W3TSYNLOG3MH5MKP7O3LUULRVNBIECSK/#W3TSYNLOG3MH5MKP7O3LUULRVNBIECSK" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in tvOS 13, iTunes for Windows 12.10.1, iCloud for Windows 10.7, iCloud for Windows 7.14. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8707/">CVE-2019-8707 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8707">CVE-2019-8707 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1155321">SUSE bug 1155321</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828527" comment="webkitgtk4-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828528" comment="webkitgtk4-devel-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828529" comment="webkitgtk4-doc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828530" comment="webkitgtk4-jsc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828531" comment="webkitgtk4-jsc-devel-2.28.2-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198710" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8710</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8710" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8710" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8710" ref_url="https://www.suse.com/security/cve/CVE-2019-8710" source="SUSE CVE"/>
		<reference ref_id="RHSA-2020:4451" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006752.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK/#YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W3TSYNLOG3MH5MKP7O3LUULRVNBIECSK/#W3TSYNLOG3MH5MKP7O3LUULRVNBIECSK" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iCloud for Windows 11.0. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-28"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8710/">CVE-2019-8710 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8710">CVE-2019-8710 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1156318">SUSE bug 1156318</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828527" comment="webkitgtk4-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828528" comment="webkitgtk4-devel-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828529" comment="webkitgtk4-doc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828530" comment="webkitgtk4-jsc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828531" comment="webkitgtk4-jsc-devel-2.28.2-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198719" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8719</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8719" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8719" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8719" ref_url="https://www.suse.com/security/cve/CVE-2019-8719" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK/#YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W3TSYNLOG3MH5MKP7O3LUULRVNBIECSK/#W3TSYNLOG3MH5MKP7O3LUULRVNBIECSK" source="SUSE-SU"/>
    <description>
    A logic issue was addressed with improved state management. This issue is fixed in tvOS 13, iTunes for Windows 12.10.1, iCloud for Windows 10.7, iCloud for Windows 7.14. Processing maliciously crafted web content may lead to universal cross site scripting.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-8719/">CVE-2019-8719 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8719">CVE-2019-8719 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1155321">SUSE bug 1155321</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828527" comment="webkitgtk4-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828528" comment="webkitgtk4-devel-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828529" comment="webkitgtk4-doc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828530" comment="webkitgtk4-jsc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828531" comment="webkitgtk4-jsc-devel-2.28.2-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198720" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8720</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8720" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8720" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8720" ref_url="https://www.suse.com/security/cve/CVE-2019-8720" source="SUSE CVE"/>
		<reference ref_id="RHSA-2020:4451" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006752.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK/#YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W3TSYNLOG3MH5MKP7O3LUULRVNBIECSK/#W3TSYNLOG3MH5MKP7O3LUULRVNBIECSK" source="SUSE-SU"/>
    <description>
    A vulnerability was found in WebKit. The flaw is triggered when processing maliciously crafted web content that may lead to arbitrary code execution. Improved memory handling addresses the multiple memory corruption issues.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-28"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8720/">CVE-2019-8720 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8720">CVE-2019-8720 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1155321">SUSE bug 1155321</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828527" comment="webkitgtk4-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828528" comment="webkitgtk4-devel-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828529" comment="webkitgtk4-doc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828530" comment="webkitgtk4-jsc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828531" comment="webkitgtk4-jsc-devel-2.28.2-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198726" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8726</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8726" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8726" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8726" ref_url="https://www.suse.com/security/cve/CVE-2019-8726" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK/#YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W3TSYNLOG3MH5MKP7O3LUULRVNBIECSK/#W3TSYNLOG3MH5MKP7O3LUULRVNBIECSK" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in tvOS 13, iTunes for Windows 12.10.1, iCloud for Windows 10.7, iCloud for Windows 7.14. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8726/">CVE-2019-8726 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8726">CVE-2019-8726 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1155321">SUSE bug 1155321</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828527" comment="webkitgtk4-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828528" comment="webkitgtk4-devel-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828529" comment="webkitgtk4-doc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828530" comment="webkitgtk4-jsc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828531" comment="webkitgtk4-jsc-devel-2.28.2-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198733" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8733</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8733" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8733" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8733" ref_url="https://www.suse.com/security/cve/CVE-2019-8733" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK/#YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W3TSYNLOG3MH5MKP7O3LUULRVNBIECSK/#W3TSYNLOG3MH5MKP7O3LUULRVNBIECSK" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in tvOS 13, iTunes for Windows 12.10.1, iCloud for Windows 10.7, iCloud for Windows 7.14. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8733/">CVE-2019-8733 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8733">CVE-2019-8733 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1155321">SUSE bug 1155321</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828527" comment="webkitgtk4-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828528" comment="webkitgtk4-devel-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828529" comment="webkitgtk4-doc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828530" comment="webkitgtk4-jsc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828531" comment="webkitgtk4-jsc-devel-2.28.2-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198735" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8735</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8735" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8735" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8735" ref_url="https://www.suse.com/security/cve/CVE-2019-8735" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK/#YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W3TSYNLOG3MH5MKP7O3LUULRVNBIECSK/#W3TSYNLOG3MH5MKP7O3LUULRVNBIECSK" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in tvOS 13, iTunes for Windows 12.10.1, iCloud for Windows 10.7, iCloud for Windows 7.14. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8735/">CVE-2019-8735 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8735">CVE-2019-8735 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1155321">SUSE bug 1155321</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828527" comment="webkitgtk4-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828528" comment="webkitgtk4-devel-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828529" comment="webkitgtk4-doc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828530" comment="webkitgtk4-jsc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828531" comment="webkitgtk4-jsc-devel-2.28.2-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198743" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8743</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8743" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8743" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8743" ref_url="https://www.suse.com/security/cve/CVE-2019-8743" source="SUSE CVE"/>
		<reference ref_id="RHSA-2020:4451" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006752.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK/#YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W3TSYNLOG3MH5MKP7O3LUULRVNBIECSK/#W3TSYNLOG3MH5MKP7O3LUULRVNBIECSK" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in watchOS 6.1. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-28"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8743/">CVE-2019-8743 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8743">CVE-2019-8743 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1156318">SUSE bug 1156318</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828527" comment="webkitgtk4-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828528" comment="webkitgtk4-devel-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828529" comment="webkitgtk4-doc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828530" comment="webkitgtk4-jsc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828531" comment="webkitgtk4-jsc-devel-2.28.2-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198763" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8763</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8763" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8763" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8763" ref_url="https://www.suse.com/security/cve/CVE-2019-8763" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK/#YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W3TSYNLOG3MH5MKP7O3LUULRVNBIECSK/#W3TSYNLOG3MH5MKP7O3LUULRVNBIECSK" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 13.1 and iPadOS 13.1, tvOS 13, Safari 13.0.1, iTunes for Windows 12.10.1, iCloud for Windows 10.7, iCloud for Windows 7.14. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8763/">CVE-2019-8763 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8763">CVE-2019-8763 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1155321">SUSE bug 1155321</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828527" comment="webkitgtk4-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828528" comment="webkitgtk4-devel-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828529" comment="webkitgtk4-doc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828530" comment="webkitgtk4-jsc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828531" comment="webkitgtk4-jsc-devel-2.28.2-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198764" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8764</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8764" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8764" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8764" ref_url="https://www.suse.com/security/cve/CVE-2019-8764" source="SUSE CVE"/>
		<reference ref_id="RHSA-2020:4451" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006752.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK/#YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W3TSYNLOG3MH5MKP7O3LUULRVNBIECSK/#W3TSYNLOG3MH5MKP7O3LUULRVNBIECSK" source="SUSE-SU"/>
    <description>
    A logic issue was addressed with improved state management. This issue is fixed in watchOS 6.1. Processing maliciously crafted web content may lead to universal cross site scripting.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-28"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-8764/">CVE-2019-8764 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8764">CVE-2019-8764 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1156318">SUSE bug 1156318</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828527" comment="webkitgtk4-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828528" comment="webkitgtk4-devel-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828529" comment="webkitgtk4-doc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828530" comment="webkitgtk4-jsc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828531" comment="webkitgtk4-jsc-devel-2.28.2-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198765" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8765</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8765" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8765" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8765" ref_url="https://www.suse.com/security/cve/CVE-2019-8765" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK/#YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W3TSYNLOG3MH5MKP7O3LUULRVNBIECSK/#W3TSYNLOG3MH5MKP7O3LUULRVNBIECSK" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in watchOS 6.1. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8765/">CVE-2019-8765 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8765">CVE-2019-8765 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1156318">SUSE bug 1156318</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828527" comment="webkitgtk4-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828528" comment="webkitgtk4-devel-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828529" comment="webkitgtk4-doc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828530" comment="webkitgtk4-jsc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828531" comment="webkitgtk4-jsc-devel-2.28.2-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198766" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8766</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8766" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8766" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8766" ref_url="https://www.suse.com/security/cve/CVE-2019-8766" source="SUSE CVE"/>
		<reference ref_id="RHSA-2020:4451" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK/#YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W3TSYNLOG3MH5MKP7O3LUULRVNBIECSK/#W3TSYNLOG3MH5MKP7O3LUULRVNBIECSK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FK6EK2KGH7KDPXCBN2Q3SSAVOCIXNCFX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IILRBHE4XKYN4SZKE6UX55V3HK54NAIK/" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in watchOS 6.1, iCloud for Windows 11.0. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-28"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8766/">CVE-2019-8766 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8766">CVE-2019-8766 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1156318">SUSE bug 1156318</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828527" comment="webkitgtk4-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828528" comment="webkitgtk4-devel-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828529" comment="webkitgtk4-doc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828530" comment="webkitgtk4-jsc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828531" comment="webkitgtk4-jsc-devel-2.28.2-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198768" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8768</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8768" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8768" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8768" ref_url="https://www.suse.com/security/cve/CVE-2019-8768" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK/#YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W3TSYNLOG3MH5MKP7O3LUULRVNBIECSK/#W3TSYNLOG3MH5MKP7O3LUULRVNBIECSK" source="SUSE-SU"/>
    <description>
    "Clear History and Website Data" did not clear the history. The issue was addressed with improved data deletion. This issue is fixed in macOS Catalina 10.15. A user may be unable to delete browsing history items.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8768/">CVE-2019-8768 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8768">CVE-2019-8768 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1155321">SUSE bug 1155321</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828527" comment="webkitgtk4-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828528" comment="webkitgtk4-devel-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828529" comment="webkitgtk4-doc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828530" comment="webkitgtk4-jsc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828531" comment="webkitgtk4-jsc-devel-2.28.2-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198769" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8769</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8769" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8769" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8769" ref_url="https://www.suse.com/security/cve/CVE-2019-8769" source="SUSE CVE"/>
		<reference ref_id="RHSA-2020:4451" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006752.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK/#YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W3TSYNLOG3MH5MKP7O3LUULRVNBIECSK/#W3TSYNLOG3MH5MKP7O3LUULRVNBIECSK" source="SUSE-SU"/>
    <description>
    An issue existed in the drawing of web page elements. The issue was addressed with improved logic. This issue is fixed in iOS 13.1 and iPadOS 13.1, macOS Catalina 10.15. Visiting a maliciously crafted website may reveal browsing history.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-28"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8769/">CVE-2019-8769 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8769">CVE-2019-8769 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1155321">SUSE bug 1155321</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828527" comment="webkitgtk4-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828528" comment="webkitgtk4-devel-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828529" comment="webkitgtk4-doc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828530" comment="webkitgtk4-jsc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828531" comment="webkitgtk4-jsc-devel-2.28.2-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198771" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8771</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8771" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8771" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8771" ref_url="https://www.suse.com/security/cve/CVE-2019-8771" source="SUSE CVE"/>
		<reference ref_id="RHSA-2020:4451" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006752.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK/#YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W3TSYNLOG3MH5MKP7O3LUULRVNBIECSK/#W3TSYNLOG3MH5MKP7O3LUULRVNBIECSK" source="SUSE-SU"/>
    <description>
    This issue was addressed with improved iframe sandbox enforcement. This issue is fixed in Safari 13.0.1, iOS 13. Maliciously crafted web content may violate iframe sandboxing policy.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-28"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-8771/">CVE-2019-8771 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8771">CVE-2019-8771 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1155321">SUSE bug 1155321</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828527" comment="webkitgtk4-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828528" comment="webkitgtk4-devel-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828529" comment="webkitgtk4-doc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828530" comment="webkitgtk4-jsc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828531" comment="webkitgtk4-jsc-devel-2.28.2-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198782" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8782</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8782" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8782" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8782" ref_url="https://www.suse.com/security/cve/CVE-2019-8782" source="SUSE CVE"/>
		<reference ref_id="RHSA-2020:4451" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK/#YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W3TSYNLOG3MH5MKP7O3LUULRVNBIECSK/#W3TSYNLOG3MH5MKP7O3LUULRVNBIECSK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FK6EK2KGH7KDPXCBN2Q3SSAVOCIXNCFX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IILRBHE4XKYN4SZKE6UX55V3HK54NAIK/" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 13.2 and iPadOS 13.2, tvOS 13.2, Safari 13.0.3, iTunes for Windows 12.10.2, iCloud for Windows 11.0. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-28"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8782/">CVE-2019-8782 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8782">CVE-2019-8782 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1156318">SUSE bug 1156318</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828527" comment="webkitgtk4-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828528" comment="webkitgtk4-devel-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828529" comment="webkitgtk4-doc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828530" comment="webkitgtk4-jsc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828531" comment="webkitgtk4-jsc-devel-2.28.2-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198783" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8783</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8783" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8783" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8783" ref_url="https://www.suse.com/security/cve/CVE-2019-8783" source="SUSE CVE"/>
		<reference ref_id="RHSA-2020:4451" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006752.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK/#YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W3TSYNLOG3MH5MKP7O3LUULRVNBIECSK/#W3TSYNLOG3MH5MKP7O3LUULRVNBIECSK" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 13.2 and iPadOS 13.2, tvOS 13.2, Safari 13.0.3, iTunes for Windows 12.10.2, iCloud for Windows 11.0, iCloud for Windows 7.15. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-28"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8783/">CVE-2019-8783 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8783">CVE-2019-8783 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1156318">SUSE bug 1156318</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828527" comment="webkitgtk4-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828528" comment="webkitgtk4-devel-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828529" comment="webkitgtk4-doc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828530" comment="webkitgtk4-jsc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828531" comment="webkitgtk4-jsc-devel-2.28.2-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198808" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8808</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8808" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8808" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8808" ref_url="https://www.suse.com/security/cve/CVE-2019-8808" source="SUSE CVE"/>
		<reference ref_id="RHSA-2020:4451" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK/#YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W3TSYNLOG3MH5MKP7O3LUULRVNBIECSK/#W3TSYNLOG3MH5MKP7O3LUULRVNBIECSK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FK6EK2KGH7KDPXCBN2Q3SSAVOCIXNCFX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IILRBHE4XKYN4SZKE6UX55V3HK54NAIK/" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 13.2 and iPadOS 13.2, tvOS 13.2, watchOS 6.1, Safari 13.0.3, iTunes for Windows 12.10.2. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-28"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8808/">CVE-2019-8808 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8808">CVE-2019-8808 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1156318">SUSE bug 1156318</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828527" comment="webkitgtk4-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828528" comment="webkitgtk4-devel-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828529" comment="webkitgtk4-doc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828530" comment="webkitgtk4-jsc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828531" comment="webkitgtk4-jsc-devel-2.28.2-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198811" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8811</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8811" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8811" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8811" ref_url="https://www.suse.com/security/cve/CVE-2019-8811" source="SUSE CVE"/>
		<reference ref_id="RHSA-2020:4451" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006752.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK/#YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W3TSYNLOG3MH5MKP7O3LUULRVNBIECSK/#W3TSYNLOG3MH5MKP7O3LUULRVNBIECSK" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 13.2 and iPadOS 13.2, tvOS 13.2, watchOS 6.1, Safari 13.0.3, iTunes for Windows 12.10.2, iCloud for Windows 11.0, iCloud for Windows 7.15. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-28"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8811/">CVE-2019-8811 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8811">CVE-2019-8811 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1156318">SUSE bug 1156318</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828527" comment="webkitgtk4-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828528" comment="webkitgtk4-devel-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828529" comment="webkitgtk4-doc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828530" comment="webkitgtk4-jsc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828531" comment="webkitgtk4-jsc-devel-2.28.2-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198812" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8812</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8812" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8812" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8812" ref_url="https://www.suse.com/security/cve/CVE-2019-8812" source="SUSE CVE"/>
		<reference ref_id="RHSA-2020:4451" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006752.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK/#YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W3TSYNLOG3MH5MKP7O3LUULRVNBIECSK/#W3TSYNLOG3MH5MKP7O3LUULRVNBIECSK" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 13.2 and iPadOS 13.2, tvOS 13.2, watchOS 6.1, Safari 13.0.3, iTunes for Windows 12.10.2. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-28"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8812/">CVE-2019-8812 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8812">CVE-2019-8812 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1156318">SUSE bug 1156318</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828527" comment="webkitgtk4-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828528" comment="webkitgtk4-devel-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828529" comment="webkitgtk4-doc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828530" comment="webkitgtk4-jsc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828531" comment="webkitgtk4-jsc-devel-2.28.2-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198813" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8813</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8813" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8813" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8813" ref_url="https://www.suse.com/security/cve/CVE-2019-8813" source="SUSE CVE"/>
		<reference ref_id="RHSA-2020:4451" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006752.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK/#YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W3TSYNLOG3MH5MKP7O3LUULRVNBIECSK/#W3TSYNLOG3MH5MKP7O3LUULRVNBIECSK" source="SUSE-SU"/>
    <description>
    A logic issue was addressed with improved state management. This issue is fixed in iOS 13.2 and iPadOS 13.2, tvOS 13.2, Safari 13.0.3, iTunes for Windows 12.10.2, iCloud for Windows 11.0. Processing maliciously crafted web content may lead to universal cross site scripting.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-28"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-8813/">CVE-2019-8813 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8813">CVE-2019-8813 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1156318">SUSE bug 1156318</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828527" comment="webkitgtk4-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828528" comment="webkitgtk4-devel-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828529" comment="webkitgtk4-doc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828530" comment="webkitgtk4-jsc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828531" comment="webkitgtk4-jsc-devel-2.28.2-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8814</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8814" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8814" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8814" ref_url="https://www.suse.com/security/cve/CVE-2019-8814" source="SUSE CVE"/>
		<reference ref_id="RHSA-2020:4451" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006752.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK/#YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W3TSYNLOG3MH5MKP7O3LUULRVNBIECSK/#W3TSYNLOG3MH5MKP7O3LUULRVNBIECSK" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 13.2 and iPadOS 13.2, tvOS 13.2, Safari 13.0.3, iTunes for Windows 12.10.2, iCloud for Windows 11.0, iCloud for Windows 7.15. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-28"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8814/">CVE-2019-8814 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8814">CVE-2019-8814 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1156318">SUSE bug 1156318</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828527" comment="webkitgtk4-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828528" comment="webkitgtk4-devel-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828529" comment="webkitgtk4-doc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828530" comment="webkitgtk4-jsc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828531" comment="webkitgtk4-jsc-devel-2.28.2-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198815" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8815</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8815" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8815" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8815" ref_url="https://www.suse.com/security/cve/CVE-2019-8815" source="SUSE CVE"/>
		<reference ref_id="RHSA-2020:4451" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK/#YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W3TSYNLOG3MH5MKP7O3LUULRVNBIECSK/#W3TSYNLOG3MH5MKP7O3LUULRVNBIECSK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FK6EK2KGH7KDPXCBN2Q3SSAVOCIXNCFX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IILRBHE4XKYN4SZKE6UX55V3HK54NAIK/" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 13.2 and iPadOS 13.2, tvOS 13.2, Safari 13.0.3, iTunes for Windows 12.10.2, iCloud for Windows 11.0, iCloud for Windows 7.15. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-28"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8815/">CVE-2019-8815 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8815">CVE-2019-8815 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1156318">SUSE bug 1156318</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828527" comment="webkitgtk4-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828528" comment="webkitgtk4-devel-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828529" comment="webkitgtk4-doc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828530" comment="webkitgtk4-jsc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828531" comment="webkitgtk4-jsc-devel-2.28.2-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198816" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8816</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8816" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8816" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8816" ref_url="https://www.suse.com/security/cve/CVE-2019-8816" source="SUSE CVE"/>
		<reference ref_id="RHSA-2020:4451" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006752.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK/#YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W3TSYNLOG3MH5MKP7O3LUULRVNBIECSK/#W3TSYNLOG3MH5MKP7O3LUULRVNBIECSK" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 13.2 and iPadOS 13.2, tvOS 13.2, watchOS 6.1, Safari 13.0.3, iTunes for Windows 12.10.2, iCloud for Windows 11.0, iCloud for Windows 7.15. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-28"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8816/">CVE-2019-8816 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8816">CVE-2019-8816 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1156318">SUSE bug 1156318</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828527" comment="webkitgtk4-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828528" comment="webkitgtk4-devel-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828529" comment="webkitgtk4-doc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828530" comment="webkitgtk4-jsc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828531" comment="webkitgtk4-jsc-devel-2.28.2-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198819" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8819</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8819" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8819" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8819" ref_url="https://www.suse.com/security/cve/CVE-2019-8819" source="SUSE CVE"/>
		<reference ref_id="RHSA-2020:4451" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006752.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK/#YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W3TSYNLOG3MH5MKP7O3LUULRVNBIECSK/#W3TSYNLOG3MH5MKP7O3LUULRVNBIECSK" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 13.2 and iPadOS 13.2, tvOS 13.2, Safari 13.0.3, iTunes for Windows 12.10.2, iCloud for Windows 11.0, iCloud for Windows 7.15. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-28"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8819/">CVE-2019-8819 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8819">CVE-2019-8819 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1156318">SUSE bug 1156318</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828527" comment="webkitgtk4-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828528" comment="webkitgtk4-devel-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828529" comment="webkitgtk4-doc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828530" comment="webkitgtk4-jsc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828531" comment="webkitgtk4-jsc-devel-2.28.2-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198820" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8820</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8820" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8820" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8820" ref_url="https://www.suse.com/security/cve/CVE-2019-8820" source="SUSE CVE"/>
		<reference ref_id="RHSA-2020:4451" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006752.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK/#YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W3TSYNLOG3MH5MKP7O3LUULRVNBIECSK/#W3TSYNLOG3MH5MKP7O3LUULRVNBIECSK" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 13.2 and iPadOS 13.2, tvOS 13.2, watchOS 6.1, Safari 13.0.3, iTunes for Windows 12.10.2, iCloud for Windows 11.0, iCloud for Windows 7.15. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-28"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8820/">CVE-2019-8820 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8820">CVE-2019-8820 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1156318">SUSE bug 1156318</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828527" comment="webkitgtk4-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828528" comment="webkitgtk4-devel-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828529" comment="webkitgtk4-doc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828530" comment="webkitgtk4-jsc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828531" comment="webkitgtk4-jsc-devel-2.28.2-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198821" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8821</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8821" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8821" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8821" ref_url="https://www.suse.com/security/cve/CVE-2019-8821" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK/#YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W3TSYNLOG3MH5MKP7O3LUULRVNBIECSK/#W3TSYNLOG3MH5MKP7O3LUULRVNBIECSK" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 13.2 and iPadOS 13.2, tvOS 13.2, Safari 13.0.3, iTunes for Windows 12.10.2, iCloud for Windows 11.0, iCloud for Windows 7.15. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8821/">CVE-2019-8821 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8821">CVE-2019-8821 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1156318">SUSE bug 1156318</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828527" comment="webkitgtk4-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828528" comment="webkitgtk4-devel-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828529" comment="webkitgtk4-doc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828530" comment="webkitgtk4-jsc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828531" comment="webkitgtk4-jsc-devel-2.28.2-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198822" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8822</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8822" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8822" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8822" ref_url="https://www.suse.com/security/cve/CVE-2019-8822" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK/#YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W3TSYNLOG3MH5MKP7O3LUULRVNBIECSK/#W3TSYNLOG3MH5MKP7O3LUULRVNBIECSK" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 13.2 and iPadOS 13.2, tvOS 13.2, Safari 13.0.3, iTunes for Windows 12.10.2, iCloud for Windows 11.0, iCloud for Windows 7.15. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8822/">CVE-2019-8822 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8822">CVE-2019-8822 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1156318">SUSE bug 1156318</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828527" comment="webkitgtk4-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828528" comment="webkitgtk4-devel-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828529" comment="webkitgtk4-doc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828530" comment="webkitgtk4-jsc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828531" comment="webkitgtk4-jsc-devel-2.28.2-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198823" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8823</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8823" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8823" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8823" ref_url="https://www.suse.com/security/cve/CVE-2019-8823" source="SUSE CVE"/>
		<reference ref_id="RHSA-2020:4451" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006752.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK/#YLQI2W5TS56J3JQ5FT62EA3IH5W2VNRK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W3TSYNLOG3MH5MKP7O3LUULRVNBIECSK/#W3TSYNLOG3MH5MKP7O3LUULRVNBIECSK" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 13.2 and iPadOS 13.2, tvOS 13.2, Safari 13.0.3, iTunes for Windows 12.10.2, iCloud for Windows 11.0, iCloud for Windows 7.15. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-28"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8823/">CVE-2019-8823 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8823">CVE-2019-8823 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1156318">SUSE bug 1156318</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828527" comment="webkitgtk4-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828528" comment="webkitgtk4-devel-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828529" comment="webkitgtk4-doc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828530" comment="webkitgtk4-jsc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828531" comment="webkitgtk4-jsc-devel-2.28.2-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8835</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8835" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8835" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8835" ref_url="https://www.suse.com/security/cve/CVE-2019-8835" source="SUSE CVE"/>
		<reference ref_id="RHSA-2020:4451" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006752.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0278-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VOF6TVHJ47XHC6EPRQMZJI47W7QNTVVH/" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in tvOS 13.3, iCloud for Windows 10.9, iOS 13.3 and iPadOS 13.3, Safari 13.0.4, iTunes 12.10.3 for Windows, iCloud for Windows 7.16. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-28"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8835/">CVE-2019-8835 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8835">CVE-2019-8835 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1161719">SUSE bug 1161719</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828527" comment="webkitgtk4-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828528" comment="webkitgtk4-devel-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828529" comment="webkitgtk4-doc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828530" comment="webkitgtk4-jsc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828531" comment="webkitgtk4-jsc-devel-2.28.2-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198844" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8844</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8844" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8844" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8844" ref_url="https://www.suse.com/security/cve/CVE-2019-8844" source="SUSE CVE"/>
		<reference ref_id="RHSA-2020:4451" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006752.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0278-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VOF6TVHJ47XHC6EPRQMZJI47W7QNTVVH/" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in tvOS 13.3, watchOS 6.1.1, iCloud for Windows 10.9, iOS 13.3 and iPadOS 13.3, Safari 13.0.4, iTunes 12.10.3 for Windows, iCloud for Windows 7.16. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-28"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8844/">CVE-2019-8844 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8844">CVE-2019-8844 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1161719">SUSE bug 1161719</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828527" comment="webkitgtk4-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828528" comment="webkitgtk4-devel-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828529" comment="webkitgtk4-doc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828530" comment="webkitgtk4-jsc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828531" comment="webkitgtk4-jsc-devel-2.28.2-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198846" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8846</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8846" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8846" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8846" ref_url="https://www.suse.com/security/cve/CVE-2019-8846" source="SUSE CVE"/>
		<reference ref_id="RHSA-2020:4451" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006752.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0278-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VOF6TVHJ47XHC6EPRQMZJI47W7QNTVVH/" source="SUSE-SU"/>
    <description>
    A use after free issue was addressed with improved memory management. This issue is fixed in tvOS 13.3, iCloud for Windows 10.9, iOS 13.3 and iPadOS 13.3, Safari 13.0.4, iTunes 12.10.3 for Windows, iCloud for Windows 7.16. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-28"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8846/">CVE-2019-8846 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8846">CVE-2019-8846 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1161719">SUSE bug 1161719</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828527" comment="webkitgtk4-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828528" comment="webkitgtk4-devel-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828529" comment="webkitgtk4-doc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828530" comment="webkitgtk4-jsc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828531" comment="webkitgtk4-jsc-devel-2.28.2-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199024" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9024</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9024" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9024" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9024" ref_url="https://www.suse.com/security/cve/CVE-2019-9024" source="SUSE CVE"/>
		<reference ref_id="SUSE-RU-2019:0823-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2019-March/011096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14013-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012983.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1256-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/56IIRJZJO4AUJ5P4OG4A54MA5I75PGG3/#56IIRJZJO4AUJ5P4OG4A54MA5I75PGG3" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1293-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NZWMSUH7ONCTOOFMQD67ITPFYWLFS43E/#NZWMSUH7ONCTOOFMQD67ITPFYWLFS43E" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XB2BVRYZNLMC4LSAMSBDSCL5S7EXDJNZ/#XB2BVRYZNLMC4LSAMSBDSCL5S7EXDJNZ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1573-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BZGSTORTRYTIVYMVFOFYRIJIMKYXZ32T/#BZGSTORTRYTIVYMVFOFYRIJIMKYXZ32T" source="SUSE-SU"/>
    <description>
    An issue was discovered in PHP before 5.6.40, 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.1. xmlrpc_decode() can allow a hostile XMLRPC server to cause PHP to read memory outside of allocated areas in base64_decode_xmlrpc in ext/xmlrpc/libxmlrpc/base64.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9024/">CVE-2019-9024 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9024">CVE-2019-9024 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1126821">SUSE bug 1126821</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827765" comment="php-5.4.16-48.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827766" comment="php-bcmath-5.4.16-48.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827767" comment="php-cli-5.4.16-48.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827768" comment="php-common-5.4.16-48.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827769" comment="php-dba-5.4.16-48.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827770" comment="php-devel-5.4.16-48.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827771" comment="php-embedded-5.4.16-48.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827772" comment="php-enchant-5.4.16-48.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827773" comment="php-fpm-5.4.16-48.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827774" comment="php-gd-5.4.16-48.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827775" comment="php-intl-5.4.16-48.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827776" comment="php-ldap-5.4.16-48.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827777" comment="php-mbstring-5.4.16-48.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827778" comment="php-mysql-5.4.16-48.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827779" comment="php-mysqlnd-5.4.16-48.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827780" comment="php-odbc-5.4.16-48.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827781" comment="php-pdo-5.4.16-48.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827782" comment="php-pgsql-5.4.16-48.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827783" comment="php-process-5.4.16-48.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827784" comment="php-pspell-5.4.16-48.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827785" comment="php-recode-5.4.16-48.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827786" comment="php-snmp-5.4.16-48.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827787" comment="php-soap-5.4.16-48.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827788" comment="php-xml-5.4.16-48.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827789" comment="php-xmlrpc-5.4.16-48.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199200" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9200</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9200" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9200" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9200" ref_url="https://www.suse.com/security/cve/CVE-2019-9200" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009785.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3854-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TS7QPSEQIBQO7BALZOE3TN7IO7IMHK3Y/" source="SUSE-SU"/>
    <description>
    A heap-based buffer underwrite exists in ImageStream::getLine() located at Stream.cc in Poppler 0.74.0 that can (for example) be triggered by sending a crafted PDF file to the pdfimages binary. It allows an attacker to cause Denial of Service (Segmentation fault) or possibly have unspecified other impact.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9200/">CVE-2019-9200 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9200">CVE-2019-9200 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1127329">SUSE bug 1127329</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825972" comment="evince-3.28.2-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825973" comment="evince-browser-plugin-3.28.2-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825974" comment="evince-devel-3.28.2-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825975" comment="evince-dvi-3.28.2-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825976" comment="evince-libs-3.28.2-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825977" comment="evince-nautilus-3.28.2-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825978" comment="okular-4.10.5-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825979" comment="okular-devel-4.10.5-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825980" comment="okular-libs-4.10.5-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825981" comment="okular-part-4.10.5-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825982" comment="poppler-0.26.5-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825983" comment="poppler-cpp-0.26.5-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825984" comment="poppler-cpp-devel-0.26.5-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825985" comment="poppler-demos-0.26.5-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825986" comment="poppler-devel-0.26.5-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825987" comment="poppler-glib-0.26.5-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825988" comment="poppler-glib-devel-0.26.5-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825989" comment="poppler-qt-0.26.5-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825990" comment="poppler-qt-devel-0.26.5-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825991" comment="poppler-utils-0.26.5-38.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9210</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9210" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9210" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9210" ref_url="https://www.suse.com/security/cve/CVE-2019-9210" source="SUSE CVE"/>
    <description>
    In AdvanceCOMP 2.1, png_compress in pngex.cc in advpng has an integer overflow upon encountering an invalid PNG size, which results in an attempted memcpy to write into a buffer that is too small. (There is also a heap-based buffer over-read.)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-9210/">CVE-2019-9210 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9210">CVE-2019-9210 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827640" comment="advancecomp-1.15-22.el7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199232" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9232</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9232" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9232" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9232" ref_url="https://www.suse.com/security/cve/CVE-2019-9232" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006387.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006524.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0105-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T4RF53ZFC352SC6CQMBMJW5OCHIHHCUV/" source="SUSE-SU"/>
    <description>
    In libvpx, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-122675483
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9232/">CVE-2019-9232 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9232">CVE-2019-9232 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1160613">SUSE bug 1160613</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828233" comment="libvpx-1.3.0-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828234" comment="libvpx-devel-1.3.0-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828235" comment="libvpx-utils-1.3.0-8.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199278" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9278</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9278" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9278" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9278" ref_url="https://www.suse.com/security/cve/CVE-2019-9278" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0457-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1553-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007105.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0264-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N3W2XLWGGOGKFWMYDWO7BNL4BPWKDWQB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0793-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VOGSCWNCJDTFI3UJ7KXEWPODU7FRDVNO/" source="SUSE-SU"/>
    <description>
    In libexif, there is a possible out of bounds write due to an integer overflow. This could lead to remote escalation of privilege in the media content provider with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-112537774
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9278/">CVE-2019-9278 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9278">CVE-2019-9278 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1160770">SUSE bug 1160770</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828535" comment="libexif-0.6.22-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828536" comment="libexif-devel-0.6.22-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828537" comment="libexif-doc-0.6.22-1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199433" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9433</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9433" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9433" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9433" ref_url="https://www.suse.com/security/cve/CVE-2019-9433" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006387.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006524.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0105-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T4RF53ZFC352SC6CQMBMJW5OCHIHHCUV/" source="SUSE-SU"/>
    <description>
    In libvpx, there is a possible information disclosure due to improper input validation. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-80479354
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9433/">CVE-2019-9433 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9433">CVE-2019-9433 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1160614">SUSE bug 1160614</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828233" comment="libvpx-1.3.0-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828234" comment="libvpx-devel-1.3.0-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828235" comment="libvpx-utils-1.3.0-8.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199454" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9454</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9454" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9454" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9454" ref_url="https://www.suse.com/security/cve/CVE-2019-9454" source="SUSE CVE"/>
    <description>
    In the Android kernel in i2c driver there is a possible out of bounds write due to memory corruption. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-9454/">CVE-2019-9454 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-9454">CVE-2019-9454 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1150023">SUSE bug 1150023</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828543" comment="bpftool-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828544" comment="kernel-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828545" comment="kernel-abi-whitelists-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828546" comment="kernel-debug-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828549" comment="kernel-doc-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828550" comment="kernel-headers-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828551" comment="kernel-tools-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828552" comment="kernel-tools-libs-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828554" comment="perf-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828555" comment="python-perf-3.10.0-1160.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199458" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9458</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9458" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9458" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9458" ref_url="https://www.suse.com/security/cve/CVE-2019-9458" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2492-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007357.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007359.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2531-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007353.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0543-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TIJNUS3JX74DEJSKTRECNDTYTY3LURG2/" source="SUSE-SU"/>
    <description>
    In the Android kernel in the video driver there is a use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9458/">CVE-2019-9458 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9458">CVE-2019-9458 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1168295">SUSE bug 1168295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173963">SUSE bug 1173963</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828543" comment="bpftool-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828544" comment="kernel-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828545" comment="kernel-abi-whitelists-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828546" comment="kernel-debug-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828549" comment="kernel-doc-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828550" comment="kernel-headers-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828551" comment="kernel-tools-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828552" comment="kernel-tools-libs-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828554" comment="perf-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828555" comment="python-perf-3.10.0-1160.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199500" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9500</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9500" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9500" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9500" ref_url="https://www.suse.com/security/cve/CVE-2019-9500" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1404-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZZ2FZBVA3Q7VOUC5KRK2EODJSBYJDCKH/#ZZ2FZBVA3Q7VOUC5KRK2EODJSBYJDCKH" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1479-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/B4DQLC5NNFA52SY3VMJNLGCDAOQAXY7D/#B4DQLC5NNFA52SY3VMJNLGCDAOQAXY7D" source="SUSE-SU"/>
    <description>
    The Broadcom brcmfmac WiFi driver prior to commit 1b5e2423164b3670e8bc9174e4762d297990deff is vulnerable to a heap buffer overflow. If the Wake-up on Wireless LAN functionality is configured, a malicious event frame can be constructed to trigger an heap buffer overflow in the brcmf_wowl_nd_results function. This vulnerability can be exploited with compromised chipsets to compromise the host, or when used in combination with CVE-2019-9503, can be used remotely. In the worst case scenario, by sending specially-crafted WiFi packets, a remote, unauthenticated attacker may be able to execute arbitrary code on a vulnerable system. More typically, this vulnerability will result in denial-of-service conditions.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-11"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9500/">CVE-2019-9500 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9500">CVE-2019-9500 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1132681">SUSE bug 1132681</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826601" comment="bpftool-3.10.0-1062.1.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826602" comment="kernel-3.10.0-1062.1.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826603" comment="kernel-abi-whitelists-3.10.0-1062.1.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826604" comment="kernel-debug-3.10.0-1062.1.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826607" comment="kernel-doc-3.10.0-1062.1.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826608" comment="kernel-headers-3.10.0-1062.1.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826609" comment="kernel-tools-3.10.0-1062.1.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826610" comment="kernel-tools-libs-3.10.0-1062.1.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826612" comment="perf-3.10.0-1062.1.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826613" comment="python-perf-3.10.0-1062.1.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199503" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9503</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9503" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9503" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9503" ref_url="https://www.suse.com/security/cve/CVE-2019-9503" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1404-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZZ2FZBVA3Q7VOUC5KRK2EODJSBYJDCKH/#ZZ2FZBVA3Q7VOUC5KRK2EODJSBYJDCKH" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1407-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UMXCAWC5QTZVSPZOYUW3E3GVJJUKCQ2S/#UMXCAWC5QTZVSPZOYUW3E3GVJJUKCQ2S" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1479-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/B4DQLC5NNFA52SY3VMJNLGCDAOQAXY7D/#B4DQLC5NNFA52SY3VMJNLGCDAOQAXY7D" source="SUSE-SU"/>
    <description>
    The Broadcom brcmfmac WiFi driver prior to commit a4176ec356c73a46c07c181c6d04039fafa34a9f is vulnerable to a frame validation bypass. If the brcmfmac driver receives a firmware event frame from a remote source, the is_wlc_event_frame function will cause this frame to be discarded and unprocessed. If the driver receives the firmware event frame from the host, the appropriate handler is called. This frame validation can be bypassed if the bus used is USB (for instance by a wifi dongle). This can allow firmware event frames from a remote source to be processed. In the worst case scenario, by sending specially-crafted WiFi packets, a remote, unauthenticated attacker may be able to execute arbitrary code on a vulnerable system. More typically, this vulnerability will result in denial-of-service conditions.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9503/">CVE-2019-9503 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9503">CVE-2019-9503 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1132673">SUSE bug 1132673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132828">SUSE bug 1132828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133319">SUSE bug 1133319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156653">SUSE bug 1156653</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826993" comment="bpftool-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826994" comment="kernel-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826995" comment="kernel-abi-whitelists-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826996" comment="kernel-debug-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826999" comment="kernel-doc-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827000" comment="kernel-headers-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827001" comment="kernel-tools-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827002" comment="kernel-tools-libs-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827004" comment="perf-3.10.0-1127.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827005" comment="python-perf-3.10.0-1127.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199506" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9506</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9506" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9506" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9506" ref_url="https://www.suse.com/security/cve/CVE-2019-9506" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2706-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192706-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2307-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O7FGUFIPLWDXYK7VLKXBJND7NJWBBYU6/#O7FGUFIPLWDXYK7VLKXBJND7NJWBBYU6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2308-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C647ZGMUBEKKW7XKI4MVE7QEHYRLVUIX/#C647ZGMUBEKKW7XKI4MVE7QEHYRLVUIX" source="SUSE-SU"/>
    <description>
    The Bluetooth BR/EDR specification up to and including version 5.1 permits sufficiently low encryption key length and does not prevent an attacker from influencing the key length negotiation. This allows practical brute-force attacks (aka "KNOB") that can decrypt traffic and inject arbitrary ciphertext without the victim noticing.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9506/">CVE-2019-9506 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9506">CVE-2019-9506 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1137865">SUSE bug 1137865</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146042">SUSE bug 1146042</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826650" comment="bpftool-3.10.0-1062.4.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826651" comment="kernel-3.10.0-1062.4.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826652" comment="kernel-abi-whitelists-3.10.0-1062.4.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826653" comment="kernel-debug-3.10.0-1062.4.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826656" comment="kernel-doc-3.10.0-1062.4.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826657" comment="kernel-headers-3.10.0-1062.4.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826658" comment="kernel-tools-3.10.0-1062.4.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826659" comment="kernel-tools-libs-3.10.0-1062.4.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826661" comment="perf-3.10.0-1062.4.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826662" comment="python-perf-3.10.0-1062.4.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199631" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9631</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9631" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9631" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9631" ref_url="https://www.suse.com/security/cve/CVE-2019-9631" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017204.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3854-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TS7QPSEQIBQO7BALZOE3TN7IO7IMHK3Y/" source="SUSE-SU"/>
    <description>
    Poppler 0.74.0 has a heap-based buffer over-read in the CairoRescaleBox.cc downsample_row_box_filter function.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9631/">CVE-2019-9631 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9631">CVE-2019-9631 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1129202">SUSE bug 1129202</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825972" comment="evince-3.28.2-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825973" comment="evince-browser-plugin-3.28.2-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825974" comment="evince-devel-3.28.2-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825975" comment="evince-dvi-3.28.2-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825976" comment="evince-libs-3.28.2-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825977" comment="evince-nautilus-3.28.2-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825978" comment="okular-4.10.5-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825979" comment="okular-devel-4.10.5-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825980" comment="okular-libs-4.10.5-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825981" comment="okular-part-4.10.5-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825982" comment="poppler-0.26.5-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825983" comment="poppler-cpp-0.26.5-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825984" comment="poppler-cpp-devel-0.26.5-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825985" comment="poppler-demos-0.26.5-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825986" comment="poppler-devel-0.26.5-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825987" comment="poppler-glib-0.26.5-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825988" comment="poppler-glib-devel-0.26.5-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825989" comment="poppler-qt-0.26.5-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825990" comment="poppler-qt-devel-0.26.5-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825991" comment="poppler-utils-0.26.5-38.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199636" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9636</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9636" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9636" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9636" ref_url="https://www.suse.com/security/cve/CVE-2019-9636" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005348.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005347.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006445.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1273-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NYCAJPNWPU25JLCX2FYZZV2MBQ6FWPSK/#NYCAJPNWPU25JLCX2FYZZV2MBQ6FWPSK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1282-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DLHTVGZDK7ZGLTEXACMCPRLJRWDZY43F/#DLHTVGZDK7ZGLTEXACMCPRLJRWDZY43F" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1371-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5CNS37XWYNGXF5NIDQ74DESU2NNVQ2T6/#5CNS37XWYNGXF5NIDQ74DESU2NNVQ2T6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1580-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VAG5CCYJAAO5BDYUK75Z6D5XHKZOD2J2/#VAG5CCYJAAO5BDYUK75Z6D5XHKZOD2J2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0086-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SRKGGFVSV7DDWCMAOSO6E3F66U2CF5XR/" source="SUSE-SU"/>
    <description>
    Python 2.7.x through 2.7.16 and 3.x through 3.7.2 is affected by: Improper Handling of Unicode Encoding (with an incorrect netloc) during NFKC normalization. The impact is: Information disclosure (credentials, cookies, etc. that are cached against a given hostname). The components are: urllib.parse.urlsplit, urllib.parse.urlparse. The attack vector is: A specially crafted URL could be incorrectly parsed to locate cookies or authentication data and send that information to a different host than when parsed correctly. This is fixed in: v2.7.17, v2.7.17rc1, v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1, v3.5.7, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.9, v3.6.9rc1; v3.7.3, v3.7.3rc1, v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-24"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9636/">CVE-2019-9636 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9636">CVE-2019-9636 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1129346">SUSE bug 1129346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135433">SUSE bug 1135433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138459">SUSE bug 1138459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145004">SUSE bug 1145004</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825638" comment="python-2.7.5-77.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825639" comment="python-debug-2.7.5-77.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825640" comment="python-devel-2.7.5-77.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825641" comment="python-libs-2.7.5-77.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825642" comment="python-test-2.7.5-77.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825643" comment="python-tools-2.7.5-77.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825644" comment="tkinter-2.7.5-77.el7_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199740" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9740</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9740" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9740" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9740" ref_url="https://www.suse.com/security/cve/CVE-2019-9740" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0444-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0447-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0450-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0452-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0456-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2370-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192370-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007763.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2131-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KFMC4LRB2CXRSDWEXN4Z4QWZ7YZ6RC4V/#KFMC4LRB2CXRSDWEXN4Z4QWZ7YZ6RC4V" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2133-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H6XIL4ESPB36DIYNSA6QU4ON4ME4EMKV/#H6XIL4ESPB36DIYNSA6QU4ON4ME4EMKV" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/pipermail/neuvector-updates/2023-November/000021.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in urllib2 in Python 2.x through 2.7.16 and urllib in Python 3.x through 3.7.3. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \r\n (specifically in the query string after a ? character) followed by an HTTP header or a Redis command. This is fixed in: v2.7.17, v2.7.17rc1, v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.9, v3.6.9rc1; v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9740/">CVE-2019-9740 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9740">CVE-2019-9740 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1129071">SUSE bug 1129071</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130840">SUSE bug 1130840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132663">SUSE bug 1132663</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826020" comment="python-2.7.5-86.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826021" comment="python-debug-2.7.5-86.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826022" comment="python-devel-2.7.5-86.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826023" comment="python-libs-2.7.5-86.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826024" comment="python-test-2.7.5-86.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826025" comment="python-tools-2.7.5-86.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826026" comment="tkinter-2.7.5-86.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199755" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9755</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9755" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9755" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9755" ref_url="https://www.suse.com/security/cve/CVE-2019-9755" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005359.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005357.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2965-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009416.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1313-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RSEK4YA2B74TZJQNE2TC3NLZMADEI6PD/#RSEK4YA2B74TZJQNE2TC3NLZMADEI6PD" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1314-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DFSBRAA3E2TPHRMA27ALD7R5QBVMDSR2/#DFSBRAA3E2TPHRMA27ALD7R5QBVMDSR2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1244-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6I22R7EMWP6WBQIXDCKB4KJMMB67TMZK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2971-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/APJMFOEFTZSFEAKDMRWUM25JNERJUHUT/" source="SUSE-SU"/>
    <description>
    An integer underflow issue exists in ntfs-3g 2017.3.23. A local attacker could potentially exploit this by running /bin/ntfs-3g with specially crafted arguments from a specially crafted directory to cause a heap buffer overflow, resulting in a crash or the ability to execute arbitrary code. In installations where /bin/ntfs-3g is a setuid-root binary, this could lead to a local escalation of privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9755/">CVE-2019-9755 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9755">CVE-2019-9755 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1130165">SUSE bug 1130165</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826566" comment="libguestfs-winsupport-7.2-3.el7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199788" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9788</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9788" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9788" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9788" ref_url="https://www.suse.com/security/cve/CVE-2019-9788" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005294.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1056-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5V5IPNU6QQQSKJSTVJVL4JZQI4XWEO36/#5V5IPNU6QQQSKJSTVJVL4JZQI4XWEO36" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1077-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/F7O4DXUZQKWNDOD7CALQE6TV52NTY7NL/#F7O4DXUZQKWNDOD7CALQE6TV52NTY7NL" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1126-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GSODLL2FRT4TZVOPDYQGDUHJR25R63RL/#GSODLL2FRT4TZVOPDYQGDUHJR25R63RL" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1162-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AL5AUD2CY37ZNSQZPBX6C3K32ZVWBIIH/#AL5AUD2CY37ZNSQZPBX6C3K32ZVWBIIH" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Mozilla developers and community members reported memory safety bugs present in Firefox 65, Firefox ESR 60.5, and Thunderbird 60.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird &lt; 60.6, Firefox ESR &lt; 60.6, and Firefox &lt; 66.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9788/">CVE-2019-9788 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9788">CVE-2019-9788 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1129821">SUSE bug 1129821</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825616" comment="firefox-60.6.0-3.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825633" comment="thunderbird-60.6.1-1.el7_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199790" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9790</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9790" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9790" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9790" ref_url="https://www.suse.com/security/cve/CVE-2019-9790" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005294.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1056-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5V5IPNU6QQQSKJSTVJVL4JZQI4XWEO36/#5V5IPNU6QQQSKJSTVJVL4JZQI4XWEO36" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1077-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/F7O4DXUZQKWNDOD7CALQE6TV52NTY7NL/#F7O4DXUZQKWNDOD7CALQE6TV52NTY7NL" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1126-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GSODLL2FRT4TZVOPDYQGDUHJR25R63RL/#GSODLL2FRT4TZVOPDYQGDUHJR25R63RL" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1162-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AL5AUD2CY37ZNSQZPBX6C3K32ZVWBIIH/#AL5AUD2CY37ZNSQZPBX6C3K32ZVWBIIH" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability can occur when a raw pointer to a DOM element on a page is obtained using JavaScript and the element is then removed while still in use. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 60.6, Firefox ESR &lt; 60.6, and Firefox &lt; 66.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9790/">CVE-2019-9790 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9790">CVE-2019-9790 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1129821">SUSE bug 1129821</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825616" comment="firefox-60.6.0-3.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825633" comment="thunderbird-60.6.1-1.el7_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199791" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9791</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9791" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9791" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9791" ref_url="https://www.suse.com/security/cve/CVE-2019-9791" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005294.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1056-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5V5IPNU6QQQSKJSTVJVL4JZQI4XWEO36/#5V5IPNU6QQQSKJSTVJVL4JZQI4XWEO36" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1077-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/F7O4DXUZQKWNDOD7CALQE6TV52NTY7NL/#F7O4DXUZQKWNDOD7CALQE6TV52NTY7NL" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1126-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GSODLL2FRT4TZVOPDYQGDUHJR25R63RL/#GSODLL2FRT4TZVOPDYQGDUHJR25R63RL" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1162-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AL5AUD2CY37ZNSQZPBX6C3K32ZVWBIIH/#AL5AUD2CY37ZNSQZPBX6C3K32ZVWBIIH" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    The type inference system allows the compilation of functions that can cause type confusions between arbitrary objects when compiled through the IonMonkey just-in-time (JIT) compiler and when the constructor function is entered through on-stack replacement (OSR). This allows for possible arbitrary reading and writing of objects during an exploitable crash. This vulnerability affects Thunderbird &lt; 60.6, Firefox ESR &lt; 60.6, and Firefox &lt; 66.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9791/">CVE-2019-9791 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9791">CVE-2019-9791 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1129821">SUSE bug 1129821</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825616" comment="firefox-60.6.0-3.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825633" comment="thunderbird-60.6.1-1.el7_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199792" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9792</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9792" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9792" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9792" ref_url="https://www.suse.com/security/cve/CVE-2019-9792" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005294.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1056-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5V5IPNU6QQQSKJSTVJVL4JZQI4XWEO36/#5V5IPNU6QQQSKJSTVJVL4JZQI4XWEO36" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1077-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/F7O4DXUZQKWNDOD7CALQE6TV52NTY7NL/#F7O4DXUZQKWNDOD7CALQE6TV52NTY7NL" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1126-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GSODLL2FRT4TZVOPDYQGDUHJR25R63RL/#GSODLL2FRT4TZVOPDYQGDUHJR25R63RL" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1162-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AL5AUD2CY37ZNSQZPBX6C3K32ZVWBIIH/#AL5AUD2CY37ZNSQZPBX6C3K32ZVWBIIH" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    The IonMonkey just-in-time (JIT) compiler can leak an internal JS_OPTIMIZED_OUT magic value to the running script during a bailout. This magic value can then be used by JavaScript to achieve memory corruption, which results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 60.6, Firefox ESR &lt; 60.6, and Firefox &lt; 66.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9792/">CVE-2019-9792 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9792">CVE-2019-9792 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1129821">SUSE bug 1129821</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825616" comment="firefox-60.6.0-3.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825633" comment="thunderbird-60.6.1-1.el7_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199793" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9793</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9793" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9793" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9793" ref_url="https://www.suse.com/security/cve/CVE-2019-9793" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005294.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1056-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5V5IPNU6QQQSKJSTVJVL4JZQI4XWEO36/#5V5IPNU6QQQSKJSTVJVL4JZQI4XWEO36" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1077-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/F7O4DXUZQKWNDOD7CALQE6TV52NTY7NL/#F7O4DXUZQKWNDOD7CALQE6TV52NTY7NL" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1126-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GSODLL2FRT4TZVOPDYQGDUHJR25R63RL/#GSODLL2FRT4TZVOPDYQGDUHJR25R63RL" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1162-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AL5AUD2CY37ZNSQZPBX6C3K32ZVWBIIH/#AL5AUD2CY37ZNSQZPBX6C3K32ZVWBIIH" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A mechanism was discovered that removes some bounds checking for string, array, or typed array accesses if Spectre mitigations have been disabled. This vulnerability could allow an attacker to create an arbitrary value in compiled JavaScript, for which the range analysis will infer a fully controlled, incorrect range in circumstances where users have explicitly disabled Spectre mitigations. *Note: Spectre mitigations are currently enabled for all users by default settings.*. This vulnerability affects Thunderbird &lt; 60.6, Firefox ESR &lt; 60.6, and Firefox &lt; 66.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9793/">CVE-2019-9793 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9793">CVE-2019-9793 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1129821">SUSE bug 1129821</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825616" comment="firefox-60.6.0-3.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825633" comment="thunderbird-60.6.1-1.el7_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199795" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9795</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9795" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9795" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9795" ref_url="https://www.suse.com/security/cve/CVE-2019-9795" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005294.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1056-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5V5IPNU6QQQSKJSTVJVL4JZQI4XWEO36/#5V5IPNU6QQQSKJSTVJVL4JZQI4XWEO36" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1077-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/F7O4DXUZQKWNDOD7CALQE6TV52NTY7NL/#F7O4DXUZQKWNDOD7CALQE6TV52NTY7NL" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1126-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GSODLL2FRT4TZVOPDYQGDUHJR25R63RL/#GSODLL2FRT4TZVOPDYQGDUHJR25R63RL" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1162-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AL5AUD2CY37ZNSQZPBX6C3K32ZVWBIIH/#AL5AUD2CY37ZNSQZPBX6C3K32ZVWBIIH" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A vulnerability where type-confusion in the IonMonkey just-in-time (JIT) compiler could potentially be used by malicious JavaScript to trigger a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 60.6, Firefox ESR &lt; 60.6, and Firefox &lt; 66.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9795/">CVE-2019-9795 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9795">CVE-2019-9795 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1129821">SUSE bug 1129821</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825616" comment="firefox-60.6.0-3.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825633" comment="thunderbird-60.6.1-1.el7_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199796" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9796</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9796" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9796" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9796" ref_url="https://www.suse.com/security/cve/CVE-2019-9796" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005294.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1056-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5V5IPNU6QQQSKJSTVJVL4JZQI4XWEO36/#5V5IPNU6QQQSKJSTVJVL4JZQI4XWEO36" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1077-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/F7O4DXUZQKWNDOD7CALQE6TV52NTY7NL/#F7O4DXUZQKWNDOD7CALQE6TV52NTY7NL" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1126-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GSODLL2FRT4TZVOPDYQGDUHJR25R63RL/#GSODLL2FRT4TZVOPDYQGDUHJR25R63RL" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1162-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AL5AUD2CY37ZNSQZPBX6C3K32ZVWBIIH/#AL5AUD2CY37ZNSQZPBX6C3K32ZVWBIIH" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability can occur when the SMIL animation controller incorrectly registers with the refresh driver twice when only a single registration is expected. When a registration is later freed with the removal of the animation controller element, the refresh driver incorrectly leaves a dangling pointer to the driver's observer array. This vulnerability affects Thunderbird &lt; 60.6, Firefox ESR &lt; 60.6, and Firefox &lt; 66.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9796/">CVE-2019-9796 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9796">CVE-2019-9796 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1129821">SUSE bug 1129821</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825616" comment="firefox-60.6.0-3.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825633" comment="thunderbird-60.6.1-1.el7_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9797</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9797" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9797" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9797" ref_url="https://www.suse.com/security/cve/CVE-2019-9797" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005544.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1484-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CTZNURZG4U3I3C6SR6N64PNF5AQ2VWNR/#CTZNURZG4U3I3C6SR6N64PNF5AQ2VWNR" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1534-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YRJRSOQJ2HUXLMXMB5IAGC7CGYVG6MJ7/#YRJRSOQJ2HUXLMXMB5IAGC7CGYVG6MJ7" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1664-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZFVBHHF6WMJDJB73NZDWFFGS6D23TB67/#ZFVBHHF6WMJDJB73NZDWFFGS6D23TB67" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Cross-origin images can be read in violation of the same-origin policy by exporting an image after using createImageBitmap to read the image and then rendering the resulting bitmap image within a canvas element. This vulnerability affects Firefox &lt; 66.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9797/">CVE-2019-9797 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9797">CVE-2019-9797 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1129821">SUSE bug 1129821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135824">SUSE bug 1135824</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825817" comment="firefox-60.7.0-1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825832" comment="thunderbird-60.7.0-1.el7_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9800</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9800" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9800" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9800" ref_url="https://www.suse.com/security/cve/CVE-2019-9800" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1405-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005544.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1484-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CTZNURZG4U3I3C6SR6N64PNF5AQ2VWNR/#CTZNURZG4U3I3C6SR6N64PNF5AQ2VWNR" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1534-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YRJRSOQJ2HUXLMXMB5IAGC7CGYVG6MJ7/#YRJRSOQJ2HUXLMXMB5IAGC7CGYVG6MJ7" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1664-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZFVBHHF6WMJDJB73NZDWFFGS6D23TB67/#ZFVBHHF6WMJDJB73NZDWFFGS6D23TB67" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Mozilla developers and community members reported memory safety bugs present in Firefox 66, Firefox ESR 60.6, and Thunderbird 60.6. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird &lt; 60.7, Firefox &lt; 67, and Firefox ESR &lt; 60.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9800/">CVE-2019-9800 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9800">CVE-2019-9800 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1135824">SUSE bug 1135824</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825817" comment="firefox-60.7.0-1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825832" comment="thunderbird-60.7.0-1.el7_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199810" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9810</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9810" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9810" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9810" ref_url="https://www.suse.com/security/cve/CVE-2019-9810" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005294.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1056-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5V5IPNU6QQQSKJSTVJVL4JZQI4XWEO36/#5V5IPNU6QQQSKJSTVJVL4JZQI4XWEO36" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1077-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/F7O4DXUZQKWNDOD7CALQE6TV52NTY7NL/#F7O4DXUZQKWNDOD7CALQE6TV52NTY7NL" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1126-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GSODLL2FRT4TZVOPDYQGDUHJR25R63RL/#GSODLL2FRT4TZVOPDYQGDUHJR25R63RL" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1152-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/D7NSXTNELARHLJAVEODYTH4L63NRDLJH/#D7NSXTNELARHLJAVEODYTH4L63NRDLJH" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1162-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AL5AUD2CY37ZNSQZPBX6C3K32ZVWBIIH/#AL5AUD2CY37ZNSQZPBX6C3K32ZVWBIIH" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Incorrect alias information in IonMonkey JIT compiler for Array.prototype.slice method may lead to missing bounds check and a buffer overflow. This vulnerability affects Firefox &lt; 66.0.1, Firefox ESR &lt; 60.6.1, and Thunderbird &lt; 60.6.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-11-27"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9810/">CVE-2019-9810 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9810">CVE-2019-9810 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1129821">SUSE bug 1129821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130262">SUSE bug 1130262</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825629" comment="firefox-60.6.1-1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825633" comment="thunderbird-60.6.1-1.el7_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199811" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9811</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9811" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9811" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9811" ref_url="https://www.suse.com/security/cve/CVE-2019-9811" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1782-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/L2OL5NHTBFHZV7CIYYV5WBHTHT5OL4L4/#L2OL5NHTBFHZV7CIYYV5WBHTHT5OL4L4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1811-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NPELIQJSVPILKWICIZT35XKU63YJVM3B/#NPELIQJSVPILKWICIZT35XKU63YJVM3B" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1813-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/V27WB75NZG4F3JRTHROVZKQF44DOF2SZ/#V27WB75NZG4F3JRTHROVZKQF44DOF2SZ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1990-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IM3PWUII7AODRR5RC2OP6EBPMKQT446V/#IM3PWUII7AODRR5RC2OP6EBPMKQT446V" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2251-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/D6AIQRJID7DIPCU5KTEO6R57LSZRFM6K/#D6AIQRJID7DIPCU5KTEO6R57LSZRFM6K" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2260-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W2DVGAQNNMLX7LJQ6C6CR4YYNEUN3XNO/#W2DVGAQNNMLX7LJQ6C6CR4YYNEUN3XNO" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    As part of a winning Pwn2Own entry, a researcher demonstrated a sandbox escape by installing a malicious language pack and then opening a browser feature that used the compromised translation. This vulnerability affects Firefox ESR &lt; 60.8, Firefox &lt; 68, and Thunderbird &lt; 60.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9811/">CVE-2019-9811 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9811">CVE-2019-9811 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825891" comment="firefox-60.8.0-1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825892" comment="thunderbird-60.8.0-1.el7_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199812" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9812</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9812" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9812" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9812" ref_url="https://www.suse.com/security/cve/CVE-2019-9812" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2251-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/D6AIQRJID7DIPCU5KTEO6R57LSZRFM6K/#D6AIQRJID7DIPCU5KTEO6R57LSZRFM6K" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2260-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W2DVGAQNNMLX7LJQ6C6CR4YYNEUN3XNO/#W2DVGAQNNMLX7LJQ6C6CR4YYNEUN3XNO" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Given a compromised sandboxed content process due to a separate vulnerability, it is possible to escape that sandbox by loading accounts.firefox.com in that process and forcing a log-in to a malicious Firefox Sync account. Preference settings that disable the sandbox are then synchronized to the local machine and the compromised browser would restart without the sandbox if a crash is triggered. This vulnerability affects Firefox ESR &lt; 60.9, Firefox ESR &lt; 68.1, and Firefox &lt; 69.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9812/">CVE-2019-9812 at SUSE</cve>
	<cve impact="critical" cvss3="9.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9812">CVE-2019-9812 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1149294">SUSE bug 1149294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149323">SUSE bug 1149323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149324">SUSE bug 1149324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826629" comment="firefox-60.9.0-1.el7_7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199813" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9813</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9813" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9813" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9813" ref_url="https://www.suse.com/security/cve/CVE-2019-9813" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005294.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1056-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5V5IPNU6QQQSKJSTVJVL4JZQI4XWEO36/#5V5IPNU6QQQSKJSTVJVL4JZQI4XWEO36" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1077-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/F7O4DXUZQKWNDOD7CALQE6TV52NTY7NL/#F7O4DXUZQKWNDOD7CALQE6TV52NTY7NL" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1126-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GSODLL2FRT4TZVOPDYQGDUHJR25R63RL/#GSODLL2FRT4TZVOPDYQGDUHJR25R63RL" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1152-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/D7NSXTNELARHLJAVEODYTH4L63NRDLJH/#D7NSXTNELARHLJAVEODYTH4L63NRDLJH" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1162-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AL5AUD2CY37ZNSQZPBX6C3K32ZVWBIIH/#AL5AUD2CY37ZNSQZPBX6C3K32ZVWBIIH" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Incorrect handling of __proto__ mutations may lead to type confusion in IonMonkey JIT code and can be leveraged for arbitrary memory read and write. This vulnerability affects Firefox &lt; 66.0.1, Firefox ESR &lt; 60.6.1, and Thunderbird &lt; 60.6.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-11-26"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9813/">CVE-2019-9813 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9813">CVE-2019-9813 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1129821">SUSE bug 1129821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130262">SUSE bug 1130262</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825629" comment="firefox-60.6.1-1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825633" comment="thunderbird-60.6.1-1.el7_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199816" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9816</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9816" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9816" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9816" ref_url="https://www.suse.com/security/cve/CVE-2019-9816" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1405-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005544.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1484-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CTZNURZG4U3I3C6SR6N64PNF5AQ2VWNR/#CTZNURZG4U3I3C6SR6N64PNF5AQ2VWNR" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1534-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YRJRSOQJ2HUXLMXMB5IAGC7CGYVG6MJ7/#YRJRSOQJ2HUXLMXMB5IAGC7CGYVG6MJ7" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1664-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZFVBHHF6WMJDJB73NZDWFFGS6D23TB67/#ZFVBHHF6WMJDJB73NZDWFFGS6D23TB67" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A possible vulnerability exists where type confusion can occur when manipulating JavaScript objects in object groups, allowing for the bypassing of security checks within these groups. *Note: this vulnerability has only been demonstrated with UnboxedObjects, which are disabled by default on all supported releases.*. This vulnerability affects Thunderbird &lt; 60.7, Firefox &lt; 67, and Firefox ESR &lt; 60.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9816/">CVE-2019-9816 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9816">CVE-2019-9816 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1135824">SUSE bug 1135824</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825817" comment="firefox-60.7.0-1.el7_6 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9817</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9817" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9817" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9817" ref_url="https://www.suse.com/security/cve/CVE-2019-9817" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1405-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005544.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1484-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CTZNURZG4U3I3C6SR6N64PNF5AQ2VWNR/#CTZNURZG4U3I3C6SR6N64PNF5AQ2VWNR" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1534-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YRJRSOQJ2HUXLMXMB5IAGC7CGYVG6MJ7/#YRJRSOQJ2HUXLMXMB5IAGC7CGYVG6MJ7" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1664-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZFVBHHF6WMJDJB73NZDWFFGS6D23TB67/#ZFVBHHF6WMJDJB73NZDWFFGS6D23TB67" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Images from a different domain can be read using a canvas object in some circumstances. This could be used to steal image data from a different site in violation of same-origin policy. This vulnerability affects Thunderbird &lt; 60.7, Firefox &lt; 67, and Firefox ESR &lt; 60.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9817/">CVE-2019-9817 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9817">CVE-2019-9817 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1135824">SUSE bug 1135824</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825817" comment="firefox-60.7.0-1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825832" comment="thunderbird-60.7.0-1.el7_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199819" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9819</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9819" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9819" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9819" ref_url="https://www.suse.com/security/cve/CVE-2019-9819" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1405-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005544.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1484-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CTZNURZG4U3I3C6SR6N64PNF5AQ2VWNR/#CTZNURZG4U3I3C6SR6N64PNF5AQ2VWNR" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1534-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YRJRSOQJ2HUXLMXMB5IAGC7CGYVG6MJ7/#YRJRSOQJ2HUXLMXMB5IAGC7CGYVG6MJ7" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1664-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZFVBHHF6WMJDJB73NZDWFFGS6D23TB67/#ZFVBHHF6WMJDJB73NZDWFFGS6D23TB67" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A vulnerability where a JavaScript compartment mismatch can occur while working with the fetch API, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 60.7, Firefox &lt; 67, and Firefox ESR &lt; 60.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9819/">CVE-2019-9819 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9819">CVE-2019-9819 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1135824">SUSE bug 1135824</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825817" comment="firefox-60.7.0-1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825832" comment="thunderbird-60.7.0-1.el7_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199820" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9820</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9820" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9820" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9820" ref_url="https://www.suse.com/security/cve/CVE-2019-9820" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1405-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005544.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1484-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CTZNURZG4U3I3C6SR6N64PNF5AQ2VWNR/#CTZNURZG4U3I3C6SR6N64PNF5AQ2VWNR" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1534-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YRJRSOQJ2HUXLMXMB5IAGC7CGYVG6MJ7/#YRJRSOQJ2HUXLMXMB5IAGC7CGYVG6MJ7" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1664-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZFVBHHF6WMJDJB73NZDWFFGS6D23TB67/#ZFVBHHF6WMJDJB73NZDWFFGS6D23TB67" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability can occur in the chrome event handler when it is freed while still in use. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 60.7, Firefox &lt; 67, and Firefox ESR &lt; 60.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9820/">CVE-2019-9820 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9820">CVE-2019-9820 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1135824">SUSE bug 1135824</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009825817" comment="firefox-60.7.0-1.el7_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009825832" comment="thunderbird-60.7.0-1.el7_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199824" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9824</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9824" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9824" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9824" ref_url="https://www.suse.com/security/cve/CVE-2019-9824" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005480.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1226-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NQEJRRAMYLR3KYSMGDFZNQ2EVDLKC3JW/#NQEJRRAMYLR3KYSMGDFZNQ2EVDLKC3JW" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1274-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/47V7NEB7OP2TDLKBJL5ONQDBZWODPPUK/#47V7NEB7OP2TDLKBJL5ONQDBZWODPPUK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1405-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QGG5FDRTW3N4DP7WJX4MDPGAOAXLSD6M/#QGG5FDRTW3N4DP7WJX4MDPGAOAXLSD6M" source="SUSE-SU"/>
    <description>
    tcp_emu in slirp/tcp_subr.c (aka slirp/src/tcp_subr.c) in QEMU 3.0.0 uses uninitialized data in an snprintf call, leading to Information disclosure.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9824/">CVE-2019-9824 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9824">CVE-2019-9824 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1118900">SUSE bug 1118900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129622">SUSE bug 1129622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129623">SUSE bug 1129623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826120" comment="qemu-img-1.5.3-167.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826121" comment="qemu-kvm-1.5.3-167.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826122" comment="qemu-kvm-common-1.5.3-167.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826123" comment="qemu-kvm-tools-1.5.3-167.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199924" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9924</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9924" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9924" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9924" ref_url="https://www.suse.com/security/cve/CVE-2019-9924" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0838-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005665.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005307.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1178-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SVH6QJJCHYJ53EFLFFAFGHUTDZQLEQO4/#SVH6QJJCHYJ53EFLFFAFGHUTDZQLEQO4" source="SUSE-SU"/>
    <description>
    rbash in Bash before 4.4-beta2 did not prevent the shell user from modifying BASH_CMDS, thus allowing the user to execute any command with the permissions of the shell.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-10-23"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9924/">CVE-2019-9924 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9924">CVE-2019-9924 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1130324">SUSE bug 1130324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827790" comment="bash-4.2.46-34.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827791" comment="bash-doc-4.2.46-34.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199947" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9947</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9947" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9947" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9947" ref_url="https://www.suse.com/security/cve/CVE-2019-9947" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0444-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0447-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0450-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0452-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0456-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1352-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021358.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20492-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024203.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2389-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2RIZHQXVDEAO3HIKQR7NL3UVMHX36FKF/#2RIZHQXVDEAO3HIKQR7NL3UVMHX36FKF" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2393-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DUNCE6TBYMZ75QK6G6S6XVUETIWV7IX7/#DUNCE6TBYMZ75QK6G6S6XVUETIWV7IX7" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0086-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SRKGGFVSV7DDWCMAOSO6E3F66U2CF5XR/" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/pipermail/neuvector-updates/2023-November/000021.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in urllib2 in Python 2.x through 2.7.16 and urllib in Python 3.x through 3.7.3. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \r\n (specifically in the path component of a URL that lacks a ? character) followed by an HTTP header or a Redis command. This is similar to the CVE-2019-9740 query string issue. This is fixed in: v2.7.17, v2.7.17rc1, v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.9, v3.6.9rc1; v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-02-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9947/">CVE-2019-9947 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9947">CVE-2019-9947 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1130840">SUSE bug 1130840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136184">SUSE bug 1136184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155094">SUSE bug 1155094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201559">SUSE bug 1201559</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826020" comment="python-2.7.5-86.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826021" comment="python-debug-2.7.5-86.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826022" comment="python-devel-2.7.5-86.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826023" comment="python-libs-2.7.5-86.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826024" comment="python-test-2.7.5-86.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826025" comment="python-tools-2.7.5-86.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199948" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9948</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9948" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9948" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9948" ref_url="https://www.suse.com/security/cve/CVE-2019-9948" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005347.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1273-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NYCAJPNWPU25JLCX2FYZZV2MBQ6FWPSK/#NYCAJPNWPU25JLCX2FYZZV2MBQ6FWPSK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1580-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VAG5CCYJAAO5BDYUK75Z6D5XHKZOD2J2/#VAG5CCYJAAO5BDYUK75Z6D5XHKZOD2J2" source="SUSE-SU"/>
    <description>
    urllib in Python 2.x through 2.7.16 supports the local_file: scheme, which makes it easier for remote attackers to bypass protection mechanisms that blacklist file: URIs, as demonstrated by triggering a urllib.urlopen('local_file:///etc/passwd') call.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9948/">CVE-2019-9948 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9948">CVE-2019-9948 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1130847">SUSE bug 1130847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135433">SUSE bug 1135433</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826020" comment="python-2.7.5-86.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826021" comment="python-debug-2.7.5-86.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826022" comment="python-devel-2.7.5-86.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826023" comment="python-libs-2.7.5-86.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826024" comment="python-test-2.7.5-86.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826025" comment="python-tools-2.7.5-86.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826026" comment="tkinter-2.7.5-86.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199956" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9956</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9956" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9956" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9956" ref_url="https://www.suse.com/security/cve/CVE-2019-9956" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1019-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005358.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1033-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005441.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1320-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2XHJ2AOYGREC65MN6FYXWNZTOX3EBKGA/#2XHJ2AOYGREC65MN6FYXWNZTOX3EBKGA" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1331-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PXXOQJNFJALZODZCRBAWWSZX3GTWPSKT/#PXXOQJNFJALZODZCRBAWWSZX3GTWPSKT" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.8-35 Q16, there is a stack-based buffer overflow in the function PopHexPixel of coders/ps.c, which allows an attacker to cause a denial of service or code execution via a crafted image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9956/">CVE-2019-9956 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9956">CVE-2019-9956 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1130330">SUSE bug 1130330</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827880" comment="ImageMagick-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827881" comment="ImageMagick-c++-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827882" comment="ImageMagick-c++-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827883" comment="ImageMagick-devel-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827884" comment="ImageMagick-doc-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827885" comment="ImageMagick-perl-6.9.10.68-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827886" comment="autotrace-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827887" comment="autotrace-devel-0.31.1-38.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827888" comment="emacs-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827889" comment="emacs-common-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827890" comment="emacs-el-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827891" comment="emacs-filesystem-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827892" comment="emacs-nox-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827893" comment="emacs-terminal-24.3-23.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827894" comment="inkscape-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827895" comment="inkscape-docs-0.92.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827896" comment="inkscape-view-0.92.2-3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199959" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9959</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9959" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9959" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9959" ref_url="https://www.suse.com/security/cve/CVE-2019-9959" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011080.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3854-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TS7QPSEQIBQO7BALZOE3TN7IO7IMHK3Y/" source="SUSE-SU"/>
    <description>
    The JPXStream::init function in Poppler 0.78.0 and earlier doesn't check for negative values of stream length, leading to an Integer Overflow, thereby making it possible to allocate a large memory chunk on the heap, with a size controlled by an attacker, as demonstrated by pdftocairo.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9959/">CVE-2019-9959 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9959">CVE-2019-9959 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1142465">SUSE bug 1142465</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827681" comment="evince-3.28.2-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827682" comment="evince-browser-plugin-3.28.2-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827683" comment="evince-devel-3.28.2-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827684" comment="evince-dvi-3.28.2-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827685" comment="evince-libs-3.28.2-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827686" comment="evince-nautilus-3.28.2-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827687" comment="poppler-0.26.5-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827688" comment="poppler-cpp-0.26.5-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827689" comment="poppler-cpp-devel-0.26.5-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827690" comment="poppler-demos-0.26.5-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827691" comment="poppler-devel-0.26.5-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827692" comment="poppler-glib-0.26.5-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827693" comment="poppler-glib-devel-0.26.5-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827694" comment="poppler-qt-0.26.5-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827695" comment="poppler-qt-devel-0.26.5-42.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827696" comment="poppler-utils-0.26.5-42.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20200034" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-0034</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-0034" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0034" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-0034" ref_url="https://www.suse.com/security/cve/CVE-2020-0034" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1297-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009936.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0680-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TCLO6H4TMYC4OPEGZQNYZIQBWIOHFIVS/" source="SUSE-SU"/>
    <description>
    In vp8_decode_frame of decodeframe.c, there is a possible out of bounds read due to improper input validation. This could lead to remote information disclosure if error correction were turned on, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1Android ID: A-62458770
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-0034/">CVE-2020-0034 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0034">CVE-2020-0034 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1166066">SUSE bug 1166066</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828233" comment="libvpx-1.3.0-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828234" comment="libvpx-devel-1.3.0-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828235" comment="libvpx-utils-1.3.0-8.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20200093" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-0093</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-0093" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0093" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-0093" ref_url="https://www.suse.com/security/cve/CVE-2020-0093" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1553-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007105.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0793-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VOGSCWNCJDTFI3UJ7KXEWPODU7FRDVNO/" source="SUSE-SU"/>
    <description>
    In exif_data_save_data_entry of exif-data.c, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-148705132
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0093/">CVE-2020-0093 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0093">CVE-2020-0093 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1171847">SUSE bug 1171847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172116">SUSE bug 1172116</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828535" comment="libexif-0.6.22-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828536" comment="libexif-devel-0.6.22-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828537" comment="libexif-doc-0.6.22-1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20200182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-0182</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-0182" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0182" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-0182" ref_url="https://www.suse.com/security/cve/CVE-2020-0182" source="SUSE CVE"/>
    <description>
    In exif_entry_get_value of exif-entry.c, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-147140917
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-0182/">CVE-2020-0182 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0182">CVE-2020-0182 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1172766">SUSE bug 1172766</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828535" comment="libexif-0.6.22-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828536" comment="libexif-devel-0.6.22-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828537" comment="libexif-doc-0.6.22-1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20200427" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-0427</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-0427" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0427" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-0427" ref_url="https://www.suse.com/security/cve/CVE-2020-0427" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007544.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007876.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1586-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AEK7Q7ZWE4WXOTEGJF4TF2SYKEP43GGZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1655-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TH734NYI5EZD4XQ2VE5Y7HNPWOK3EVXA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    In create_pinctrl of core.c, there is a possible out of bounds read due to a use after free. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-140550171
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0427/">CVE-2020-0427 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0427">CVE-2020-0427 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1176725">SUSE bug 1176725</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828991" comment="bpftool-3.10.0-1160.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828992" comment="kernel-3.10.0-1160.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828993" comment="kernel-abi-whitelists-3.10.0-1160.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828994" comment="kernel-debug-3.10.0-1160.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828997" comment="kernel-doc-3.10.0-1160.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828998" comment="kernel-headers-3.10.0-1160.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828999" comment="kernel-tools-3.10.0-1160.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829000" comment="kernel-tools-libs-3.10.0-1160.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829002" comment="perf-3.10.0-1160.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829003" comment="python-perf-3.10.0-1160.21.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20200452" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-0452</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-0452" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0452" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-0452" ref_url="https://www.suse.com/security/cve/CVE-2020-0452" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010691.html" source="SUSE-SU"/>
    <description>
    In exif_entry_get_value of exif-entry.c, there is a possible out of bounds write due to an integer overflow. This could lead to remote code execution if a third party app used this library to process remote image data with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11 Android-8.0Android ID: A-159625731
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0452/">CVE-2020-0452 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0452">CVE-2020-0452 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1178479">SUSE bug 1178479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208307">SUSE bug 1208307</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828796" comment="libexif-0.6.22-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828797" comment="libexif-devel-0.6.22-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828798" comment="libexif-doc-0.6.22-2.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20200465" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-0465</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-0465" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0465" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-0465" ref_url="https://www.suse.com/security/cve/CVE-2020-0465" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0377-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-February/017944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0060-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IGMHKFBCILMH7EZ36H75HXZ2RO2WG2GR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0075-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H7EJISS2OPKUSJFJ2BG5ZWHA2Z6H3VQB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    In various methods of hid-multitouch.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-162844689References: Upstream kernel
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0465/">CVE-2020-0465 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0465">CVE-2020-0465 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1180029">SUSE bug 1180029</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180030">SUSE bug 1180030</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829589" comment="bpftool-3.10.0-1160.59.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829590" comment="kernel-3.10.0-1160.59.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829591" comment="kernel-abi-whitelists-3.10.0-1160.59.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829592" comment="kernel-debug-3.10.0-1160.59.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829595" comment="kernel-doc-3.10.0-1160.59.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829596" comment="kernel-headers-3.10.0-1160.59.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829597" comment="kernel-tools-3.10.0-1160.59.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829598" comment="kernel-tools-libs-3.10.0-1160.59.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829600" comment="perf-3.10.0-1160.59.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829601" comment="python-perf-3.10.0-1160.59.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20200466" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-0466</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-0466" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0466" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-0466" ref_url="https://www.suse.com/security/cve/CVE-2020-0466" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0377-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-February/017944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008323.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0060-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IGMHKFBCILMH7EZ36H75HXZ2RO2WG2GR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0075-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H7EJISS2OPKUSJFJ2BG5ZWHA2Z6H3VQB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    In do_epoll_ctl and ep_loop_check_proc of eventpoll.c, there is a possible use after free due to a logic error. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-147802478References: Upstream kernel
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0466/">CVE-2020-0466 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0466">CVE-2020-0466 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1180031">SUSE bug 1180031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180032">SUSE bug 1180032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199255">SUSE bug 1199255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200084">SUSE bug 1200084</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829589" comment="bpftool-3.10.0-1160.59.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829590" comment="kernel-3.10.0-1160.59.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829591" comment="kernel-abi-whitelists-3.10.0-1160.59.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829592" comment="kernel-debug-3.10.0-1160.59.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829595" comment="kernel-doc-3.10.0-1160.59.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829596" comment="kernel-headers-3.10.0-1160.59.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829597" comment="kernel-tools-3.10.0-1160.59.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829598" comment="kernel-tools-libs-3.10.0-1160.59.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829600" comment="perf-3.10.0-1160.59.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829601" comment="python-perf-3.10.0-1160.59.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20200543" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-0543</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-0543" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0543" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-0543" ref_url="https://www.suse.com/security/cve/CVE-2020-0543" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:4496-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-December/026906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1634-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008731.html" source="SUSE-SU"/>
		<reference ref_id="TID000019439" ref_url="https://www.suse.com/support/kb/doc/?id=000019439" source="SUSE-SU"/>
		<reference ref_id="TID000019643" ref_url="https://www.suse.com/support/kb/doc/?id=000019643" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0791-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FEGYVZIAZERXLY4SF7SWJUPJOF7CD7LU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0801-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BOYMLRUHWMVAOFIPZH7KANUUUY2YYNL3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0818-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GRJJ64XQBFNSNFR6IVUVZQQYKIPTZY7K/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0965-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/INF4LPB5UI4GVQ3GIB2BQFBCEWY7ANGZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0985-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M6HXOTDBKTDVSG3RF4LKQV654JBFT3BZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0543/">CVE-2020-0543 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0543">CVE-2020-0543 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1154824">SUSE bug 1154824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172205">SUSE bug 1172205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172206">SUSE bug 1172206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172207">SUSE bug 1172207</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172770">SUSE bug 1172770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201877">SUSE bug 1201877</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829242" comment="microcode_ctl-2.1-73.11.el7_9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20200548" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-0548</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-0548" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0548" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-0548" ref_url="https://www.suse.com/security/cve/CVE-2020-0548" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:4496-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-December/026906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006925.html" source="SUSE-SU"/>
		<reference ref_id="TID000019635" ref_url="https://www.suse.com/support/kb/doc/?id=000019635" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0791-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FEGYVZIAZERXLY4SF7SWJUPJOF7CD7LU/" source="SUSE-SU"/>
    <description>
    Cleanup errors in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0548/">CVE-2020-0548 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0548">CVE-2020-0548 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1156353">SUSE bug 1156353</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829242" comment="microcode_ctl-2.1-73.11.el7_9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20200549" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-0549</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-0549" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0549" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-0549" ref_url="https://www.suse.com/security/cve/CVE-2020-0549" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:4496-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-December/026906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006925.html" source="SUSE-SU"/>
		<reference ref_id="TID000019635" ref_url="https://www.suse.com/support/kb/doc/?id=000019635" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0791-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FEGYVZIAZERXLY4SF7SWJUPJOF7CD7LU/" source="SUSE-SU"/>
    <description>
    Cleanup errors in some data cache evictions for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0549/">CVE-2020-0549 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0549">CVE-2020-0549 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1156353">SUSE bug 1156353</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829242" comment="microcode_ctl-2.1-73.11.el7_9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20200556" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-0556</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-0556" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0556" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-0556" ref_url="https://www.suse.com/security/cve/CVE-2020-0556" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007858.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0479-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WEBIYTTPN5SC3I7XNKFVKXTJO4HY7VAK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0872-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FH5J3K5JJQI5P652QACFCNPXGJ2FWZ3A/" source="SUSE-SU"/>
    <description>
    Improper access control in subsystem for BlueZ before version 5.54 may allow an unauthenticated user to potentially enable escalation of privilege and denial of service via adjacent access
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-0556/">CVE-2020-0556 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0556">CVE-2020-0556 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1166751">SUSE bug 1166751</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828438" comment="bluez-5.44-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828439" comment="bluez-cups-5.44-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828440" comment="bluez-hid2hci-5.44-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828441" comment="bluez-libs-5.44-7.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828442" comment="bluez-libs-devel-5.44-7.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20200569" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-0569</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-0569" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0569" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-0569" ref_url="https://www.suse.com/security/cve/CVE-2020-0569" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006459.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0209-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NLSSECY2HHYXFLQWFRGBQIABWVQ73BET/" source="SUSE-SU"/>
    <description>
    Out of bounds write in Intel(R) PROSet/Wireless WiFi products on Windows 10 may allow an authenticated user to potentially enable denial of service via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0569/">CVE-2020-0569 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0569">CVE-2020-0569 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1161167">SUSE bug 1161167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162191">SUSE bug 1162191</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828493" comment="qt5-qtbase-5.9.7-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828494" comment="qt5-qtbase-common-5.9.7-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828495" comment="qt5-qtbase-devel-5.9.7-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828496" comment="qt5-qtbase-doc-5.9.7-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828497" comment="qt5-qtbase-examples-5.9.7-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828498" comment="qt5-qtbase-gui-5.9.7-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828499" comment="qt5-qtbase-mysql-5.9.7-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828500" comment="qt5-qtbase-odbc-5.9.7-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828501" comment="qt5-qtbase-postgresql-5.9.7-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828502" comment="qt5-qtbase-static-5.9.7-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828503" comment="qt5-rpm-macros-5.9.7-4.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20200570" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-0570</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-0570" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0570" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-0570" ref_url="https://www.suse.com/security/cve/CVE-2020-0570" source="SUSE CVE"/>
    <description>
    Uncontrolled search path in the QT Library before 5.14.0, 5.12.7 and 5.9.10 may allow an authenticated user to potentially enable elevation of privilege via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0570/">CVE-2020-0570 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0570">CVE-2020-0570 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1161167">SUSE bug 1161167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162191">SUSE bug 1162191</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828493" comment="qt5-qtbase-5.9.7-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828494" comment="qt5-qtbase-common-5.9.7-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828495" comment="qt5-qtbase-devel-5.9.7-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828496" comment="qt5-qtbase-doc-5.9.7-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828497" comment="qt5-qtbase-examples-5.9.7-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828498" comment="qt5-qtbase-gui-5.9.7-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828499" comment="qt5-qtbase-mysql-5.9.7-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828500" comment="qt5-qtbase-odbc-5.9.7-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828501" comment="qt5-qtbase-postgresql-5.9.7-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828502" comment="qt5-qtbase-static-5.9.7-4.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828503" comment="qt5-rpm-macros-5.9.7-4.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010018" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10018</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10018" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10018" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10018" ref_url="https://www.suse.com/security/cve/CVE-2020-10018" source="SUSE CVE"/>
		<reference ref_id="RHSA-2020:4451" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0602-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J5KUWZQAYRQ7HDH4NCHGTTCT2XK6U6RX/" source="SUSE-SU"/>
    <description>
    WebKitGTK through 2.26.4 and WPE WebKit through 2.26.4 (which are the versions right before 2.28.0) contains a memory corruption issue (use-after-free) that may lead to arbitrary code execution. This issue has been fixed in 2.28.0 with improved memory handling.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-28"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-10018/">CVE-2020-10018 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10018">CVE-2020-10018 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1165528">SUSE bug 1165528</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828527" comment="webkitgtk4-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828528" comment="webkitgtk4-devel-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828529" comment="webkitgtk4-doc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828530" comment="webkitgtk4-jsc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828531" comment="webkitgtk4-jsc-devel-2.28.2-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010029" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10029</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10029" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10029" ref_url="https://www.suse.com/security/cve/CVE-2020-10029" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0668-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007618.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0381-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4NQA6XYK57K7QJFDG3CG3N6OY46L7Q2T/" source="SUSE-SU"/>
    <description>
    The GNU C Library (aka glibc or libc6) before 2.32 could overflow an on-stack buffer during range reduction if an input to an 80-bit long double function contains a non-canonical bit pattern, a seen when passing a 0x5d414141414141410000 value to sinl on x86 targets. This is related to sysdeps/ieee754/ldbl-96/e_rem_pio2l.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-10029/">CVE-2020-10029 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10029">CVE-2020-10029 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1165784">SUSE bug 1165784</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828938" comment="glibc-2.17-322.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828939" comment="glibc-common-2.17-322.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828940" comment="glibc-devel-2.17-322.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828941" comment="glibc-headers-2.17-322.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828942" comment="glibc-static-2.17-322.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828943" comment="glibc-utils-2.17-322.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828944" comment="nscd-2.17-322.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010108" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10108</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10108" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10108" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10108" ref_url="https://www.suse.com/security/cve/CVE-2020-10108" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:2811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4074-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-November/026310.html" source="SUSE-SU"/>
    <description>
    In Twisted Web through 19.10.0, there was an HTTP request splitting vulnerability. When presented with two content-length headers, it ignored the first header. When the second content-length value was set to zero, the request body was interpreted as a pipelined request.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-10108/">CVE-2020-10108 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10108">CVE-2020-10108 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1166457">SUSE bug 1166457</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827957" comment="python-twisted-web-12.1.0-7.el7_8 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010109" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10109</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10109" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10109" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10109" ref_url="https://www.suse.com/security/cve/CVE-2020-10109" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:2811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011921.html" source="SUSE-SU"/>
    <description>
    In Twisted Web through 19.10.0, there was an HTTP request splitting vulnerability. When presented with a content-length and a chunked encoding header, the content-length took precedence and the remainder of the request body was interpreted as a pipelined request.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-10109/">CVE-2020-10109 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10109">CVE-2020-10109 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1166458">SUSE bug 1166458</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827957" comment="python-twisted-web-12.1.0-7.el7_8 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010188" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10188</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10188" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10188" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10188" ref_url="https://www.suse.com/security/cve/CVE-2020-10188" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006882.html" source="SUSE-SU"/>
    <description>
    utility.c in telnetd in netkit telnet through 0.17 allows remote attackers to execute arbitrary code via short writes or urgent data, because of a buffer overflow involving the netclear and nextitem functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10188/">CVE-2020-10188 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10188">CVE-2020-10188 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1165787">SUSE bug 1165787</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827911" comment="telnet-0.17-65.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827912" comment="telnet-server-0.17-65.el7_8 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010531" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10531</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10531" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10531" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10531" ref_url="https://www.suse.com/security/cve/CVE-2020-10531" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3016-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016192.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3017-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016200.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-OU-2024:0647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-February/034458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0819-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006779.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1568-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3563-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3563-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016928.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0459-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WVDVOYJ5IRTMFBUIFQNNT57NKN3MNRN4/" source="SUSE-SU"/>
    <description>
    An issue was discovered in International Components for Unicode (ICU) for C/C++ through 66.1. An integer overflow, leading to a heap-based buffer overflow, exists in the UnicodeString::doAppend() function in common/unistr.cpp.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10531/">CVE-2020-10531 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10531">CVE-2020-10531 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1166844">SUSE bug 1166844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175778">SUSE bug 1175778</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826960" comment="icu-50.2-4.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826961" comment="libicu-50.2-4.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826962" comment="libicu-devel-50.2-4.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826963" comment="libicu-doc-50.2-4.el7_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010543" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10543</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10543" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10543" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10543" ref_url="https://www.suse.com/security/cve/CVE-2020-10543" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:340-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1682-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007092.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0850-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RFKVQHG6H52DLWIOP6HAYWKPLPU5XGEA/" source="SUSE-SU"/>
    <description>
    Perl before 5.30.3 on 32-bit platforms allows a heap-based buffer overflow because nested regular expression quantifiers have an integer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-10543/">CVE-2020-10543 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10543">CVE-2020-10543 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1171863">SUSE bug 1171863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225627">SUSE bug 1225627</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828916" comment="perl-5.16.3-299.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828917" comment="perl-CPAN-1.9800-299.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828918" comment="perl-ExtUtils-CBuilder-0.28.2.6-299.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828919" comment="perl-ExtUtils-Embed-1.30-299.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828920" comment="perl-ExtUtils-Install-1.58-299.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828921" comment="perl-IO-Zlib-1.10-299.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828922" comment="perl-Locale-Maketext-Simple-0.21-299.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828923" comment="perl-Module-CoreList-2.76.02-299.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828924" comment="perl-Module-Loaded-0.08-299.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828925" comment="perl-Object-Accessor-0.42-299.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828926" comment="perl-Package-Constants-0.02-299.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828927" comment="perl-Pod-Escapes-1.04-299.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828928" comment="perl-Time-Piece-1.20.1-299.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828929" comment="perl-core-5.16.3-299.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828930" comment="perl-devel-5.16.3-299.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828931" comment="perl-libs-5.16.3-299.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828932" comment="perl-macros-5.16.3-299.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828933" comment="perl-tests-5.16.3-299.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010690" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10690</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10690" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10690" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10690" ref_url="https://www.suse.com/security/cve/CVE-2020-10690" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0801-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BOYMLRUHWMVAOFIPZH7KANUUUY2YYNL3/" source="SUSE-SU"/>
    <description>
    There is a use-after-free in kernel versions before 5.5 due to a race condition between the release of ptp_clock and cdev while resource deallocation. When a (high privileged) process allocates a ptp device file (like /dev/ptpX) and voluntarily goes to sleep. During this time if the underlying device is removed, it can cause an exploitable condition as the process wakes up to terminate and clean all attached files. The system crashes due to the cdev structure being invalid (as already freed) which is pointed to by the inode.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10690/">CVE-2020-10690 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10690">CVE-2020-10690 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1170056">SUSE bug 1170056</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828543" comment="bpftool-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828544" comment="kernel-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828545" comment="kernel-abi-whitelists-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828546" comment="kernel-debug-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828549" comment="kernel-doc-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828550" comment="kernel-headers-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828551" comment="kernel-tools-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828552" comment="kernel-tools-libs-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828554" comment="perf-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828555" comment="python-perf-3.10.0-1160.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010703" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10703</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10703" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10703" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10703" ref_url="https://www.suse.com/security/cve/CVE-2020-10703" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006811.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006821.html" source="SUSE-SU"/>
    <description>
    A NULL pointer dereference was found in the libvirt API responsible introduced in upstream version 3.10.0, and fixed in libvirt 6.0.0, for fetching a storage pool based on its target path. In more detail, this flaw affects storage pools created without a target path such as network-based pools like gluster and RBD. Unprivileged users with a read-only connection could abuse this flaw to crash the libvirt daemon, resulting in a potential denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10703/">CVE-2020-10703 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10703">CVE-2020-10703 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1168683">SUSE bug 1168683</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828407" comment="libvirt-4.5.0-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828408" comment="libvirt-admin-4.5.0-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828409" comment="libvirt-bash-completion-4.5.0-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828410" comment="libvirt-client-4.5.0-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828411" comment="libvirt-daemon-4.5.0-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828412" comment="libvirt-daemon-config-network-4.5.0-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828413" comment="libvirt-daemon-config-nwfilter-4.5.0-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828414" comment="libvirt-daemon-driver-interface-4.5.0-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828415" comment="libvirt-daemon-driver-lxc-4.5.0-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828416" comment="libvirt-daemon-driver-network-4.5.0-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828417" comment="libvirt-daemon-driver-nodedev-4.5.0-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828418" comment="libvirt-daemon-driver-nwfilter-4.5.0-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828419" comment="libvirt-daemon-driver-qemu-4.5.0-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828420" comment="libvirt-daemon-driver-secret-4.5.0-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828421" comment="libvirt-daemon-driver-storage-4.5.0-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828422" comment="libvirt-daemon-driver-storage-core-4.5.0-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828423" comment="libvirt-daemon-driver-storage-disk-4.5.0-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828424" comment="libvirt-daemon-driver-storage-gluster-4.5.0-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828425" comment="libvirt-daemon-driver-storage-iscsi-4.5.0-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828426" comment="libvirt-daemon-driver-storage-logical-4.5.0-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828427" comment="libvirt-daemon-driver-storage-mpath-4.5.0-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828428" comment="libvirt-daemon-driver-storage-rbd-4.5.0-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828429" comment="libvirt-daemon-driver-storage-scsi-4.5.0-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828430" comment="libvirt-daemon-kvm-4.5.0-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828431" comment="libvirt-daemon-lxc-4.5.0-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828432" comment="libvirt-devel-4.5.0-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828433" comment="libvirt-docs-4.5.0-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828434" comment="libvirt-libs-4.5.0-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828435" comment="libvirt-lock-sanlock-4.5.0-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828436" comment="libvirt-login-shell-4.5.0-36.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828437" comment="libvirt-nss-4.5.0-36.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010711" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10711</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10711" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10711" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10711" ref_url="https://www.suse.com/security/cve/CVE-2020-10711" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0801-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BOYMLRUHWMVAOFIPZH7KANUUUY2YYNL3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0935-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Z6FEYXFXT2CJAAJJVCMBHT3BT2ZBZC3G/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A NULL pointer dereference flaw was found in the Linux kernel's SELinux subsystem in versions before 5.7. This flaw occurs while importing the Commercial IP Security Option (CIPSO) protocol's category bitmap into the SELinux extensible bitmap via the' ebitmap_netlbl_import' routine. While processing the CIPSO restricted bitmap tag in the 'cipso_v4_parsetag_rbm' routine, it sets the security attribute to indicate that the category bitmap is present, even if it has not been allocated. This issue leads to a NULL pointer dereference issue while importing the same category bitmap into SELinux. This flaw allows a remote network user to crash the system kernel, resulting in a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10711/">CVE-2020-10711 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10711">CVE-2020-10711 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1171191">SUSE bug 1171191</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827965" comment="bpftool-3.10.0-1127.8.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827966" comment="kernel-3.10.0-1127.8.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827967" comment="kernel-abi-whitelists-3.10.0-1127.8.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827968" comment="kernel-debug-3.10.0-1127.8.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827971" comment="kernel-doc-3.10.0-1127.8.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827972" comment="kernel-headers-3.10.0-1127.8.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827973" comment="kernel-tools-3.10.0-1127.8.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827974" comment="kernel-tools-libs-3.10.0-1127.8.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827976" comment="perf-3.10.0-1127.8.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827977" comment="python-perf-3.10.0-1127.8.2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010732" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10732</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10732" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10732" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10732" ref_url="https://www.suse.com/security/cve/CVE-2020-10732" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0801-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BOYMLRUHWMVAOFIPZH7KANUUUY2YYNL3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0935-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Z6FEYXFXT2CJAAJJVCMBHT3BT2ZBZC3G/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel's implementation of Userspace core dumps. This flaw allows an attacker with a local account to crash a trivial program and exfiltrate private kernel data.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10732/">CVE-2020-10732 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10732">CVE-2020-10732 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1171220">SUSE bug 1171220</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828543" comment="bpftool-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828544" comment="kernel-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828545" comment="kernel-abi-whitelists-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828546" comment="kernel-debug-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828549" comment="kernel-doc-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828550" comment="kernel-headers-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828551" comment="kernel-tools-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828552" comment="kernel-tools-libs-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828554" comment="perf-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828555" comment="python-perf-3.10.0-1160.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010742" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10742</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10742" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10742" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10742" ref_url="https://www.suse.com/security/cve/CVE-2020-10742" source="SUSE CVE"/>
    <description>
    A flaw was found in the Linux kernel. An index buffer overflow during Direct IO write leading to the NFS client to crash. In some cases, a reach out of the index after one memory allocation by kmalloc will cause a kernel panic. The highest threat from this vulnerability is to data confidentiality and system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10742/">CVE-2020-10742 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10742">CVE-2020-10742 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1171984">SUSE bug 1171984</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828543" comment="bpftool-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828544" comment="kernel-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828545" comment="kernel-abi-whitelists-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828546" comment="kernel-debug-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828549" comment="kernel-doc-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828550" comment="kernel-headers-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828551" comment="kernel-tools-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828552" comment="kernel-tools-libs-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828554" comment="perf-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828555" comment="python-perf-3.10.0-1160.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010751" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10751</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10751" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10751" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10751" ref_url="https://www.suse.com/security/cve/CVE-2020-10751" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0801-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BOYMLRUHWMVAOFIPZH7KANUUUY2YYNL3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0935-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Z6FEYXFXT2CJAAJJVCMBHT3BT2ZBZC3G/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernels SELinux LSM hook implementation before version 5.7, where it incorrectly assumed that an skb would only contain a single netlink message. The hook would incorrectly only validate the first netlink message in the skb and allow or deny the rest of the messages within the skb with the granted permission without further processing.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-10751/">CVE-2020-10751 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10751">CVE-2020-10751 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1171189">SUSE bug 1171189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174963">SUSE bug 1174963</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828543" comment="bpftool-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828544" comment="kernel-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828545" comment="kernel-abi-whitelists-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828546" comment="kernel-debug-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828549" comment="kernel-doc-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828550" comment="kernel-headers-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828551" comment="kernel-tools-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828552" comment="kernel-tools-libs-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828554" comment="perf-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828555" comment="python-perf-3.10.0-1160.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010754" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10754</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10754" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10754" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10754" ref_url="https://www.suse.com/security/cve/CVE-2020-10754" source="SUSE CVE"/>
    <description>
    It was found that nmcli, a command line interface to NetworkManager did not honour 802-1x.ca-path and 802-1x.phase2-ca-path settings, when creating a new profile. When a user connects to a network using this profile, the authentication does not happen and the connection is made insecurely.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-10754/">CVE-2020-10754 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10754">CVE-2020-10754 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1172457">SUSE bug 1172457</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828443" comment="NetworkManager-1.18.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828444" comment="NetworkManager-adsl-1.18.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828445" comment="NetworkManager-bluetooth-1.18.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828446" comment="NetworkManager-config-server-1.18.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828447" comment="NetworkManager-dispatcher-routing-rules-1.18.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828448" comment="NetworkManager-glib-1.18.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828449" comment="NetworkManager-glib-devel-1.18.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828450" comment="NetworkManager-libnm-1.18.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828451" comment="NetworkManager-libnm-devel-1.18.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828452" comment="NetworkManager-ovs-1.18.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828453" comment="NetworkManager-ppp-1.18.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828454" comment="NetworkManager-team-1.18.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828455" comment="NetworkManager-tui-1.18.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828456" comment="NetworkManager-wifi-1.18.8-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828457" comment="NetworkManager-wwan-1.18.8-1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010757" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10757</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10757" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10757" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10757" ref_url="https://www.suse.com/security/cve/CVE-2020-10757" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1754-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1758-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007368.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0801-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BOYMLRUHWMVAOFIPZH7KANUUUY2YYNL3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux Kernel in versions after 4.5-rc1 in the way mremap handled DAX Huge Pages. This flaw allows a local attacker with access to a DAX enabled storage to escalate their privileges on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10757/">CVE-2020-10757 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10757">CVE-2020-10757 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1159281">SUSE bug 1159281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172317">SUSE bug 1172317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172437">SUSE bug 1172437</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828081" comment="bpftool-3.10.0-1127.18.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828082" comment="kernel-3.10.0-1127.18.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828083" comment="kernel-abi-whitelists-3.10.0-1127.18.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828084" comment="kernel-debug-3.10.0-1127.18.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828087" comment="kernel-doc-3.10.0-1127.18.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828088" comment="kernel-headers-3.10.0-1127.18.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828089" comment="kernel-tools-3.10.0-1127.18.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828090" comment="kernel-tools-libs-3.10.0-1127.18.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828092" comment="perf-3.10.0-1127.18.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828093" comment="python-perf-3.10.0-1127.18.2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010769" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10769</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10769" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10769" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10769" ref_url="https://www.suse.com/security/cve/CVE-2020-10769" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011287.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1153-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5TP74A7GFRKHFHFASPUDW72EHCZZEIBB/" source="SUSE-SU"/>
    <description>
    A buffer over-read flaw was found in RH kernel versions before 5.0 in crypto_authenc_extractkeys in crypto/authenc.c in the IPsec Cryptographic algorithm's module, authenc. When a payload longer than 4 bytes, and is not following 4-byte alignment boundary guidelines, it causes a buffer over-read threat, leading to a system crash. This flaw allows a local attacker with user privileges to cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10769/">CVE-2020-10769 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10769">CVE-2020-10769 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1173265">SUSE bug 1173265</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828811" comment="bpftool-3.10.0-1160.11.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828812" comment="kernel-3.10.0-1160.11.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828813" comment="kernel-abi-whitelists-3.10.0-1160.11.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828814" comment="kernel-debug-3.10.0-1160.11.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828817" comment="kernel-doc-3.10.0-1160.11.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828818" comment="kernel-headers-3.10.0-1160.11.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828819" comment="kernel-tools-3.10.0-1160.11.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828820" comment="kernel-tools-libs-3.10.0-1160.11.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828822" comment="perf-3.10.0-1160.11.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828823" comment="python-perf-3.10.0-1160.11.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010772" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10772</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10772" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10772" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10772" ref_url="https://www.suse.com/security/cve/CVE-2020-10772" source="SUSE CVE"/>
    <description>
    An incomplete fix for CVE-2020-12662 was shipped for Unbound in Red Hat Enterprise Linux 7, as part of erratum RHSA-2020:2414. Vulnerable versions of Unbound could still amplify an incoming query into a large number of queries directed to a target, even with a lower amplification ratio compared to versions of Unbound that shipped before the mentioned erratum. This issue is about the incomplete fix for CVE-2020-12662, and it does not affect upstream versions of Unbound.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-10772/">CVE-2020-10772 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10772">CVE-2020-10772 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1171889">SUSE bug 1171889</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828035" comment="unbound-1.6.6-5.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828036" comment="unbound-devel-1.6.6-5.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828037" comment="unbound-libs-1.6.6-5.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828038" comment="unbound-python-1.6.6-5.el7_8 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010878" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10878</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10878" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10878" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10878" ref_url="https://www.suse.com/security/cve/CVE-2020-10878" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:340-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1682-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007092.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0850-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RFKVQHG6H52DLWIOP6HAYWKPLPU5XGEA/" source="SUSE-SU"/>
    <description>
    Perl before 5.30.3 has an integer overflow related to mishandling of a "PL_regkind[OP(n)] == NOTHING" situation. A crafted regular expression could lead to malformed bytecode with a possibility of instruction injection.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-10878/">CVE-2020-10878 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10878">CVE-2020-10878 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1171864">SUSE bug 1171864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225627">SUSE bug 1225627</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828916" comment="perl-5.16.3-299.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828917" comment="perl-CPAN-1.9800-299.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828918" comment="perl-ExtUtils-CBuilder-0.28.2.6-299.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828919" comment="perl-ExtUtils-Embed-1.30-299.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828920" comment="perl-ExtUtils-Install-1.58-299.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828921" comment="perl-IO-Zlib-1.10-299.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828922" comment="perl-Locale-Maketext-Simple-0.21-299.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828923" comment="perl-Module-CoreList-2.76.02-299.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828924" comment="perl-Module-Loaded-0.08-299.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828925" comment="perl-Object-Accessor-0.42-299.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828926" comment="perl-Package-Constants-0.02-299.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828927" comment="perl-Pod-Escapes-1.04-299.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828928" comment="perl-Time-Piece-1.20.1-299.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828929" comment="perl-core-5.16.3-299.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828930" comment="perl-devel-5.16.3-299.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828931" comment="perl-libs-5.16.3-299.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828932" comment="perl-macros-5.16.3-299.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828933" comment="perl-tests-5.16.3-299.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010942" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10942</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10942" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10942" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10942" ref_url="https://www.suse.com/security/cve/CVE-2020-10942" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0543-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TIJNUS3JX74DEJSKTRECNDTYTY3LURG2/" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 5.5.8, get_raw_socket in drivers/vhost/net.c lacks validation of an sk_family field, which might allow attackers to trigger kernel stack corruption via crafted system calls.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10942/">CVE-2020-10942 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10942">CVE-2020-10942 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1167629">SUSE bug 1167629</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828543" comment="bpftool-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828544" comment="kernel-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828545" comment="kernel-abi-whitelists-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828546" comment="kernel-debug-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828549" comment="kernel-doc-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828550" comment="kernel-headers-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828551" comment="kernel-tools-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828552" comment="kernel-tools-libs-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828554" comment="perf-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828555" comment="python-perf-3.10.0-1160.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011008" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11008</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11008" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11008" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11008" ref_url="https://www.suse.com/security/cve/CVE-2020-11008" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0598-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VP5YOKSRLMTVAPQKPHEDGCOIZL5JKJW5/" source="SUSE-SU"/>
    <description>
    Affected versions of Git have a vulnerability whereby Git can be tricked into sending private credentials to a host controlled by an attacker. This bug is similar to CVE-2020-5260(GHSA-qm7j-c969-7j4q). The fix for that bug still left the door open for an exploit where _some_ credential is leaked (but the attacker cannot control which one). Git uses external "credential helper" programs to store and retrieve passwords or other credentials from secure storage provided by the operating system. Specially-crafted URLs that are considered illegal as of the recently published Git versions can cause Git to send a "blank" pattern to helpers, missing hostname and protocol fields. Many helpers will interpret this as matching _any_ URL, and will return some unspecified stored password, leaking the password to an attacker's server. The vulnerability can be triggered by feeding a malicious URL to `git clone`. However, the affected URLs look rather suspicious; the likely vector would be through systems which automatically clone URLs not visible to the user, such as Git submodules, or package systems built around Git. The root of the problem is in Git itself, which should not be feeding blank input to helpers. However, the ability to exploit the vulnerability in practice depends on which helpers are in use. Credential helpers which are known to trigger the vulnerability: - Git's "store" helper - Git's "cache" helper - the "osxkeychain" helper that ships in Git's "contrib" directory Credential helpers which are known to be safe even with vulnerable versions of Git: - Git Credential Manager for Windows Any helper not in this list should be assumed to trigger the vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-11008/">CVE-2020-11008 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11008">CVE-2020-11008 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1169936">SUSE bug 1169936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170741">SUSE bug 1170741</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827978" comment="emacs-git-1.8.3.1-23.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827979" comment="emacs-git-el-1.8.3.1-23.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827980" comment="git-1.8.3.1-23.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827981" comment="git-all-1.8.3.1-23.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827982" comment="git-bzr-1.8.3.1-23.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827983" comment="git-cvs-1.8.3.1-23.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827984" comment="git-daemon-1.8.3.1-23.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827985" comment="git-email-1.8.3.1-23.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827986" comment="git-gnome-keyring-1.8.3.1-23.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827987" comment="git-gui-1.8.3.1-23.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827988" comment="git-hg-1.8.3.1-23.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827989" comment="git-instaweb-1.8.3.1-23.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827990" comment="git-p4-1.8.3.1-23.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827991" comment="git-svn-1.8.3.1-23.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827992" comment="gitk-1.8.3.1-23.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827993" comment="gitweb-1.8.3.1-23.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827994" comment="perl-Git-1.8.3.1-23.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827995" comment="perl-Git-SVN-1.8.3.1-23.el7_8 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011018" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11018</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11018" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11018" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11018" ref_url="https://www.suse.com/security/cve/CVE-2020-11018" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007279.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1090-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PMFBUGT3IBZIELBHFAWBVPCGUFYQHVRD/" source="SUSE-SU"/>
    <description>
    In FreeRDP less than or equal to 2.0.0, a possible resource exhaustion vulnerability can be performed. Malicious clients could trigger out of bound reads causing memory allocation with random size. This has been fixed in 2.1.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11018/">CVE-2020-11018 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11018">CVE-2020-11018 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1171441">SUSE bug 1171441</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828516" comment="freerdp-2.1.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828517" comment="freerdp-devel-2.1.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828518" comment="freerdp-libs-2.1.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828519" comment="libwinpr-2.1.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828520" comment="libwinpr-devel-2.1.1-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011019" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11019</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11019" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11019" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11019" ref_url="https://www.suse.com/security/cve/CVE-2020-11019" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007279.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1090-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PMFBUGT3IBZIELBHFAWBVPCGUFYQHVRD/" source="SUSE-SU"/>
    <description>
    In FreeRDP less than or equal to 2.0.0, when running with logger set to "WLOG_TRACE", a possible crash of application could occur due to a read of an invalid array index. Data could be printed as string to local terminal. This has been fixed in 2.1.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11019/">CVE-2020-11019 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11019">CVE-2020-11019 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1171441">SUSE bug 1171441</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828516" comment="freerdp-2.1.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828517" comment="freerdp-devel-2.1.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828518" comment="freerdp-libs-2.1.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828519" comment="libwinpr-2.1.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828520" comment="libwinpr-devel-2.1.1-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011022" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11022</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11022" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11022" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11022" ref_url="https://www.suse.com/security/cve/CVE-2020-11022" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:714-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:715-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2650-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007435.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1060-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VVPI65AW45TXMRAYCWJ6YJT3LF4GIMWL/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1106-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4IXKYESUUIOBHBKL32YKWOWHSJKS7RN3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1888-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q4QSMZXUNVYKSR2VDCHWASQTIS4WW2JC/" source="SUSE-SU"/>
    <description>
    In jQuery starting with 1.12.0 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-04-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-11022/">CVE-2020-11022 at SUSE</cve>
	<cve impact="medium" cvss3="6.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11022">CVE-2020-11022 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1173090">SUSE bug 1173090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178434">SUSE bug 1178434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190663">SUSE bug 1190663</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
</definition>
<definition id="oval:org.opensuse.security:def:202011023" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11023</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11023" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11023" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11023" ref_url="https://www.suse.com/security/cve/CVE-2020-11023" source="SUSE CVE"/>
		<reference ref_id="ESSA-2025:2436" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000881.html" source="SUSE-SU"/>
		<reference ref_id="ESSA-2025:2437" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000882.html" source="SUSE-SU"/>
		<reference ref_id="ESSA-2025:2438" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000885.html" source="SUSE-SU"/>
		<reference ref_id="ESSA-2025:2444" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000894.html" source="SUSE-SU"/>
		<reference ref_id="ESSA-2025:2445" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000888.html" source="SUSE-SU"/>
		<reference ref_id="ESSA-2025:2446" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000895.html" source="SUSE-SU"/>
		<reference ref_id="ESSA-2025:2613" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000899.html" source="SUSE-SU"/>
		<reference ref_id="ESSA-2025:2971" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001150.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1210" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000848.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1215" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000878.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1255" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001152.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1300" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000856.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1301" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000864.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1306" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000865.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1309" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000855.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1314" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000877.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1329" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000851.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1338" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000879.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1346" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000866.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1601" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:714-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:715-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028254.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1060-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VVPI65AW45TXMRAYCWJ6YJT3LF4GIMWL/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1106-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4IXKYESUUIOBHBKL32YKWOWHSJKS7RN3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1888-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q4QSMZXUNVYKSR2VDCHWASQTIS4WW2JC/" source="SUSE-SU"/>
    <description>
    In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing &lt;option&gt; elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-05-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-11023/">CVE-2020-11023 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11023">CVE-2020-11023 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1173090">SUSE bug 1173090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178434">SUSE bug 1178434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190660">SUSE bug 1190660</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
</definition>
<definition id="oval:org.opensuse.security:def:202011038" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11038</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11038" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11038" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11038" ref_url="https://www.suse.com/security/cve/CVE-2020-11038" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007279.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1090-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PMFBUGT3IBZIELBHFAWBVPCGUFYQHVRD/" source="SUSE-SU"/>
    <description>
    In FreeRDP less than or equal to 2.0.0, an Integer Overflow to Buffer Overflow exists. When using /video redirection, a manipulated server can instruct the client to allocate a buffer with a smaller size than requested due to an integer overflow in size calculation. With later messages, the server can manipulate the client to write data out of bound to the previously allocated buffer. This has been patched in 2.1.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11038/">CVE-2020-11038 at SUSE</cve>
	<cve impact="medium" cvss3="6.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11038">CVE-2020-11038 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1171441">SUSE bug 1171441</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828516" comment="freerdp-2.1.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828517" comment="freerdp-devel-2.1.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828518" comment="freerdp-libs-2.1.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828519" comment="libwinpr-2.1.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828520" comment="libwinpr-devel-2.1.1-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011039" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11039</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11039" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11039" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11039" ref_url="https://www.suse.com/security/cve/CVE-2020-11039" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007279.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1090-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PMFBUGT3IBZIELBHFAWBVPCGUFYQHVRD/" source="SUSE-SU"/>
    <description>
    In FreeRDP less than or equal to 2.0.0, when using a manipulated server with USB redirection enabled (nearly) arbitrary memory can be read and written due to integer overflows in length checks. This has been patched in 2.1.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11039/">CVE-2020-11039 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11039">CVE-2020-11039 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1171441">SUSE bug 1171441</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828516" comment="freerdp-2.1.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828517" comment="freerdp-devel-2.1.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828518" comment="freerdp-libs-2.1.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828519" comment="libwinpr-2.1.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828520" comment="libwinpr-devel-2.1.1-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011040" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11040</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11040" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11040" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11040" ref_url="https://www.suse.com/security/cve/CVE-2020-11040" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007279.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1090-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PMFBUGT3IBZIELBHFAWBVPCGUFYQHVRD/" source="SUSE-SU"/>
    <description>
    In FreeRDP less than or equal to 2.0.0, there is an out-of-bound data read from memory in clear_decompress_subcode_rlex, visualized on screen as color. This has been patched in 2.1.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11040/">CVE-2020-11040 at SUSE</cve>
	<cve impact="low" cvss3="2.2/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11040">CVE-2020-11040 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1171441">SUSE bug 1171441</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828516" comment="freerdp-2.1.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828517" comment="freerdp-devel-2.1.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828518" comment="freerdp-libs-2.1.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828519" comment="libwinpr-2.1.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828520" comment="libwinpr-devel-2.1.1-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011041" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11041</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11041" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11041" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11041" ref_url="https://www.suse.com/security/cve/CVE-2020-11041" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007279.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1090-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PMFBUGT3IBZIELBHFAWBVPCGUFYQHVRD/" source="SUSE-SU"/>
    <description>
    In FreeRDP less than or equal to 2.0.0, an outside controlled array index is used unchecked for data used as configuration for sound backend (alsa, oss, pulse, ...). The most likely outcome is a crash of the client instance followed by no or distorted sound or a session disconnect. If a user cannot upgrade to the patched version, a workaround is to disable sound for the session. This has been patched in 2.1.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11041/">CVE-2020-11041 at SUSE</cve>
	<cve impact="low" cvss3="2.2/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11041">CVE-2020-11041 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1171441">SUSE bug 1171441</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828516" comment="freerdp-2.1.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828517" comment="freerdp-devel-2.1.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828518" comment="freerdp-libs-2.1.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828519" comment="libwinpr-2.1.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828520" comment="libwinpr-devel-2.1.1-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011042" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11042</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11042" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11042" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11042" ref_url="https://www.suse.com/security/cve/CVE-2020-11042" source="SUSE CVE"/>
    <description>
    In FreeRDP greater than 1.1 and before 2.0.0, there is an out-of-bounds read in update_read_icon_info. It allows reading a attacker-defined amount of client memory (32bit unsigned -&gt; 4GB) to an intermediate buffer. This can be used to crash the client or store information for later retrieval. This has been patched in 2.0.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11042/">CVE-2020-11042 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11042">CVE-2020-11042 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1171441">SUSE bug 1171441</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828516" comment="freerdp-2.1.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828517" comment="freerdp-devel-2.1.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828518" comment="freerdp-libs-2.1.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828519" comment="libwinpr-2.1.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828520" comment="libwinpr-devel-2.1.1-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011043" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11043</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11043" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11043" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11043" ref_url="https://www.suse.com/security/cve/CVE-2020-11043" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007279.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1090-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PMFBUGT3IBZIELBHFAWBVPCGUFYQHVRD/" source="SUSE-SU"/>
    <description>
    In FreeRDP less than or equal to 2.0.0, there is an out-of-bounds read in rfx_process_message_tileset. Invalid data fed to RFX decoder results in garbage on screen (as colors). This has been patched in 2.1.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11043/">CVE-2020-11043 at SUSE</cve>
	<cve impact="low" cvss3="2.2/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11043">CVE-2020-11043 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1171441">SUSE bug 1171441</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828516" comment="freerdp-2.1.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828517" comment="freerdp-devel-2.1.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828518" comment="freerdp-libs-2.1.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828519" comment="libwinpr-2.1.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828520" comment="libwinpr-devel-2.1.1-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011044" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11044</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11044" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11044" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11044" ref_url="https://www.suse.com/security/cve/CVE-2020-11044" source="SUSE CVE"/>
    <description>
    In FreeRDP greater than 1.2 and before 2.0.0, a double free in update_read_cache_bitmap_v3_order crashes the client application if corrupted data from a manipulated server is parsed. This has been patched in 2.0.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11044/">CVE-2020-11044 at SUSE</cve>
	<cve impact="low" cvss3="2.2/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11044">CVE-2020-11044 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1171441">SUSE bug 1171441</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828516" comment="freerdp-2.1.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828517" comment="freerdp-devel-2.1.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828518" comment="freerdp-libs-2.1.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828519" comment="libwinpr-2.1.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828520" comment="libwinpr-devel-2.1.1-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011045" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11045</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11045" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11045" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11045" ref_url="https://www.suse.com/security/cve/CVE-2020-11045" source="SUSE CVE"/>
    <description>
    In FreeRDP after 1.0 and before 2.0.0, there is an out-of-bound read in in update_read_bitmap_data that allows client memory to be read to an image buffer. The result displayed on screen as colour.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11045/">CVE-2020-11045 at SUSE</cve>
	<cve impact="low" cvss3="2.2/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11045">CVE-2020-11045 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1171441">SUSE bug 1171441</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828516" comment="freerdp-2.1.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828517" comment="freerdp-devel-2.1.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828518" comment="freerdp-libs-2.1.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828519" comment="libwinpr-2.1.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828520" comment="libwinpr-devel-2.1.1-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011046" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11046</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11046" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11046" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11046" ref_url="https://www.suse.com/security/cve/CVE-2020-11046" source="SUSE CVE"/>
    <description>
    In FreeRDP after 1.0 and before 2.0.0, there is a stream out-of-bounds seek in update_read_synchronize that could lead to a later out-of-bounds read.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11046/">CVE-2020-11046 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11046">CVE-2020-11046 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1171441">SUSE bug 1171441</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828516" comment="freerdp-2.1.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828517" comment="freerdp-devel-2.1.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828518" comment="freerdp-libs-2.1.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828519" comment="libwinpr-2.1.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828520" comment="libwinpr-devel-2.1.1-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011047" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11047</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11047" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11047" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11047" ref_url="https://www.suse.com/security/cve/CVE-2020-11047" source="SUSE CVE"/>
    <description>
    In FreeRDP after 1.1 and before 2.0.0, there is an out-of-bounds read in autodetect_recv_bandwidth_measure_results. A malicious server can extract up to 8 bytes of client memory with a manipulated message by providing a short input and reading the measurement result data. This has been patched in 2.0.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11047/">CVE-2020-11047 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11047">CVE-2020-11047 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1171441">SUSE bug 1171441</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828516" comment="freerdp-2.1.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828517" comment="freerdp-devel-2.1.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828518" comment="freerdp-libs-2.1.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828519" comment="libwinpr-2.1.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828520" comment="libwinpr-devel-2.1.1-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011048" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11048</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11048" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11048" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11048" ref_url="https://www.suse.com/security/cve/CVE-2020-11048" source="SUSE CVE"/>
    <description>
    In FreeRDP after 1.0 and before 2.0.0, there is an out-of-bounds read. It only allows to abort a session. No data extraction is possible. This has been fixed in 2.0.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11048/">CVE-2020-11048 at SUSE</cve>
	<cve impact="low" cvss3="2.2/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11048">CVE-2020-11048 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1171441">SUSE bug 1171441</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828516" comment="freerdp-2.1.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828517" comment="freerdp-devel-2.1.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828518" comment="freerdp-libs-2.1.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828519" comment="libwinpr-2.1.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828520" comment="libwinpr-devel-2.1.1-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011049" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11049</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11049" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11049" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11049" ref_url="https://www.suse.com/security/cve/CVE-2020-11049" source="SUSE CVE"/>
    <description>
    In FreeRDP after 1.1 and before 2.0.0, there is an out-of-bound read of client memory that is then passed on to the protocol parser. This has been patched in 2.0.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11049/">CVE-2020-11049 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11049">CVE-2020-11049 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1171441">SUSE bug 1171441</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828516" comment="freerdp-2.1.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828517" comment="freerdp-devel-2.1.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828518" comment="freerdp-libs-2.1.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828519" comment="libwinpr-2.1.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828520" comment="libwinpr-devel-2.1.1-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011058" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11058</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11058" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11058" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11058" ref_url="https://www.suse.com/security/cve/CVE-2020-11058" source="SUSE CVE"/>
    <description>
    In FreeRDP after 1.1 and before 2.0.0, a stream out-of-bounds seek in rdp_read_font_capability_set could lead to a later out-of-bounds read. As a result, a manipulated client or server might force a disconnect due to an invalid data read. This has been fixed in 2.0.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11058/">CVE-2020-11058 at SUSE</cve>
	<cve impact="low" cvss3="2.2/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11058">CVE-2020-11058 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1171441">SUSE bug 1171441</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828516" comment="freerdp-2.1.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828517" comment="freerdp-devel-2.1.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828518" comment="freerdp-libs-2.1.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828519" comment="libwinpr-2.1.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828520" comment="libwinpr-devel-2.1.1-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011078" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11078</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11078" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11078" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11078" ref_url="https://www.suse.com/security/cve/CVE-2020-11078" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008783.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1808-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-May/019148.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0772-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ANZIEBB4AJVGYC2KYDE7RDSTFBBTL5ID/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0796-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BX6XMG6VSE6RQ4LZXDDXUYZZZ2FYOQM7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1806-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DTGWJY2VML3YAAFAOOYJAQP5SZ4X6XWG/" source="SUSE-SU"/>
    <description>
    In httplib2 before version 0.18.0, an attacker controlling unescaped part of uri for `httplib2.Http.request()` could change request headers and body, send additional hidden requests to same server. This vulnerability impacts software that uses httplib2 with uri constructed by string concatenation, as opposed to proper urllib building with escaping. This has been fixed in 0.18.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-11078/">CVE-2020-11078 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11078">CVE-2020-11078 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1171998">SUSE bug 1171998</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828625" comment="fence-agents-aliyun-4.2.1-41.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828626" comment="fence-agents-all-4.2.1-41.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828627" comment="fence-agents-amt-ws-4.2.1-41.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828628" comment="fence-agents-apc-4.2.1-41.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828629" comment="fence-agents-apc-snmp-4.2.1-41.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828630" comment="fence-agents-aws-4.2.1-41.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828631" comment="fence-agents-azure-arm-4.2.1-41.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828632" comment="fence-agents-bladecenter-4.2.1-41.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828633" comment="fence-agents-brocade-4.2.1-41.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828634" comment="fence-agents-cisco-mds-4.2.1-41.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828635" comment="fence-agents-cisco-ucs-4.2.1-41.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828636" comment="fence-agents-common-4.2.1-41.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828637" comment="fence-agents-compute-4.2.1-41.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828638" comment="fence-agents-drac5-4.2.1-41.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828639" comment="fence-agents-eaton-snmp-4.2.1-41.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828640" comment="fence-agents-emerson-4.2.1-41.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828641" comment="fence-agents-eps-4.2.1-41.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828642" comment="fence-agents-gce-4.2.1-41.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828643" comment="fence-agents-heuristics-ping-4.2.1-41.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828644" comment="fence-agents-hpblade-4.2.1-41.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828645" comment="fence-agents-ibmblade-4.2.1-41.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828646" comment="fence-agents-ifmib-4.2.1-41.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828647" comment="fence-agents-ilo-moonshot-4.2.1-41.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828648" comment="fence-agents-ilo-mp-4.2.1-41.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828649" comment="fence-agents-ilo-ssh-4.2.1-41.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828650" comment="fence-agents-ilo2-4.2.1-41.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828651" comment="fence-agents-intelmodular-4.2.1-41.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828652" comment="fence-agents-ipdu-4.2.1-41.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828653" comment="fence-agents-ipmilan-4.2.1-41.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828654" comment="fence-agents-kdump-4.2.1-41.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828655" comment="fence-agents-lpar-4.2.1-41.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828656" comment="fence-agents-mpath-4.2.1-41.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828657" comment="fence-agents-redfish-4.2.1-41.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828658" comment="fence-agents-rhevm-4.2.1-41.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828659" comment="fence-agents-rsa-4.2.1-41.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828660" comment="fence-agents-rsb-4.2.1-41.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828661" comment="fence-agents-sbd-4.2.1-41.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828662" comment="fence-agents-scsi-4.2.1-41.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828663" comment="fence-agents-virsh-4.2.1-41.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828664" comment="fence-agents-vmware-rest-4.2.1-41.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828665" comment="fence-agents-vmware-soap-4.2.1-41.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828666" comment="fence-agents-wti-4.2.1-41.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828667" comment="resource-agents-4.1.1-61.el7_9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828668" comment="resource-agents-aliyun-4.1.1-61.el7_9.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011085" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11085</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11085" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11085" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11085" ref_url="https://www.suse.com/security/cve/CVE-2020-11085" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007279.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1090-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PMFBUGT3IBZIELBHFAWBVPCGUFYQHVRD/" source="SUSE-SU"/>
    <description>
    In FreeRDP before 2.1.0, there is an out-of-bounds read in cliprdr_read_format_list. Clipboard format data read (by client or server) might read data out-of-bounds. This has been fixed in 2.1.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11085/">CVE-2020-11085 at SUSE</cve>
	<cve impact="low" cvss3="2.6/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11085">CVE-2020-11085 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1171441">SUSE bug 1171441</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828516" comment="freerdp-2.1.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828517" comment="freerdp-devel-2.1.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828518" comment="freerdp-libs-2.1.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828519" comment="libwinpr-2.1.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828520" comment="libwinpr-devel-2.1.1-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011086" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11086</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11086" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11086" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11086" ref_url="https://www.suse.com/security/cve/CVE-2020-11086" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007279.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1090-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PMFBUGT3IBZIELBHFAWBVPCGUFYQHVRD/" source="SUSE-SU"/>
    <description>
    In FreeRDP less than or equal to 2.0.0, there is an out-of-bound read in ntlm_read_ntlm_v2_client_challenge that reads up to 28 bytes out-of-bound to an internal structure. This has been fixed in 2.1.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11086/">CVE-2020-11086 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11086">CVE-2020-11086 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1171441">SUSE bug 1171441</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828516" comment="freerdp-2.1.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828517" comment="freerdp-devel-2.1.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828518" comment="freerdp-libs-2.1.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828519" comment="libwinpr-2.1.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828520" comment="libwinpr-devel-2.1.1-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011087" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11087</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11087" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11087" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11087" ref_url="https://www.suse.com/security/cve/CVE-2020-11087" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007279.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1090-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PMFBUGT3IBZIELBHFAWBVPCGUFYQHVRD/" source="SUSE-SU"/>
    <description>
    In FreeRDP less than or equal to 2.0.0, there is an out-of-bound read in ntlm_read_AuthenticateMessage. This has been fixed in 2.1.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11087/">CVE-2020-11087 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11087">CVE-2020-11087 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1171441">SUSE bug 1171441</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828516" comment="freerdp-2.1.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828517" comment="freerdp-devel-2.1.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828518" comment="freerdp-libs-2.1.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828519" comment="libwinpr-2.1.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828520" comment="libwinpr-devel-2.1.1-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011088" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11088</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11088" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11088" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11088" ref_url="https://www.suse.com/security/cve/CVE-2020-11088" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007279.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1090-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PMFBUGT3IBZIELBHFAWBVPCGUFYQHVRD/" source="SUSE-SU"/>
    <description>
    In FreeRDP less than or equal to 2.0.0, there is an out-of-bound read in ntlm_read_NegotiateMessage. This has been fixed in 2.1.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11088/">CVE-2020-11088 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11088">CVE-2020-11088 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1171441">SUSE bug 1171441</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828516" comment="freerdp-2.1.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828517" comment="freerdp-devel-2.1.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828518" comment="freerdp-libs-2.1.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828519" comment="libwinpr-2.1.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828520" comment="libwinpr-devel-2.1.1-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011089" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11089</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11089" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11089" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11089" ref_url="https://www.suse.com/security/cve/CVE-2020-11089" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007279.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1090-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PMFBUGT3IBZIELBHFAWBVPCGUFYQHVRD/" source="SUSE-SU"/>
    <description>
    In FreeRDP before 2.1.0, there is an out-of-bound read in irp functions (parallel_process_irp_create, serial_process_irp_create, drive_process_irp_write, printer_process_irp_write, rdpei_recv_pdu, serial_process_irp_write). This has been fixed in 2.1.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11089/">CVE-2020-11089 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11089">CVE-2020-11089 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1171441">SUSE bug 1171441</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828516" comment="freerdp-2.1.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828517" comment="freerdp-devel-2.1.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828518" comment="freerdp-libs-2.1.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828519" comment="libwinpr-2.1.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828520" comment="libwinpr-devel-2.1.1-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011522" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11522</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11522" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11522" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11522" ref_url="https://www.suse.com/security/cve/CVE-2020-11522" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007279.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1090-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PMFBUGT3IBZIELBHFAWBVPCGUFYQHVRD/" source="SUSE-SU"/>
    <description>
    libfreerdp/gdi/gdi.c in FreeRDP &gt; 1.0 through 2.0.0-rc4 has an Out-of-bounds Read.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11522/">CVE-2020-11522 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11522">CVE-2020-11522 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1169413">SUSE bug 1169413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171444">SUSE bug 1171444</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828516" comment="freerdp-2.1.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828517" comment="freerdp-devel-2.1.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828518" comment="freerdp-libs-2.1.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828519" comment="libwinpr-2.1.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828520" comment="libwinpr-devel-2.1.1-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011525" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11525</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11525" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11525" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11525" ref_url="https://www.suse.com/security/cve/CVE-2020-11525" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007279.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1090-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PMFBUGT3IBZIELBHFAWBVPCGUFYQHVRD/" source="SUSE-SU"/>
    <description>
    libfreerdp/cache/bitmap.c in FreeRDP versions &gt; 1.0 through 2.0.0-rc4 has an Out of bounds read.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11525/">CVE-2020-11525 at SUSE</cve>
	<cve impact="low" cvss3="2.2/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11525">CVE-2020-11525 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1169413">SUSE bug 1169413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171447">SUSE bug 1171447</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828516" comment="freerdp-2.1.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828517" comment="freerdp-devel-2.1.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828518" comment="freerdp-libs-2.1.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828519" comment="libwinpr-2.1.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828520" comment="libwinpr-devel-2.1.1-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011526" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11526</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11526" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11526" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11526" ref_url="https://www.suse.com/security/cve/CVE-2020-11526" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007279.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1090-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PMFBUGT3IBZIELBHFAWBVPCGUFYQHVRD/" source="SUSE-SU"/>
    <description>
    libfreerdp/core/update.c in FreeRDP versions &gt; 1.1 through 2.0.0-rc4 has an Out-of-bounds Read.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11526/">CVE-2020-11526 at SUSE</cve>
	<cve impact="low" cvss3="2.2/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11526">CVE-2020-11526 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1169413">SUSE bug 1169413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171674">SUSE bug 1171674</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828516" comment="freerdp-2.1.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828517" comment="freerdp-devel-2.1.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828518" comment="freerdp-libs-2.1.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828519" comment="libwinpr-2.1.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828520" comment="libwinpr-devel-2.1.1-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011565" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11565</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11565" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11565" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11565" ref_url="https://www.suse.com/security/cve/CVE-2020-11565" source="SUSE CVE"/>
    <description>
    An issue was discovered in the Linux kernel through 5.6.2. mpol_parse_str in mm/mempolicy.c has a stack-based out-of-bounds write because an empty nodelist is mishandled during mount option parsing, aka CID-aa9f7d5172fa. NOTE: Someone in the security community disagrees that this is a vulnerability because the issue “is a bug in parsing mount options which can only be specified by a privileged user, so triggering the bug does not grant any powers not already held.”
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-11565/">CVE-2020-11565 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11565">CVE-2020-11565 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1168831">SUSE bug 1168831</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828543" comment="bpftool-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828544" comment="kernel-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828545" comment="kernel-abi-whitelists-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828546" comment="kernel-debug-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828549" comment="kernel-doc-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828550" comment="kernel-headers-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828551" comment="kernel-tools-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828552" comment="kernel-tools-libs-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828554" comment="perf-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828555" comment="python-perf-3.10.0-1160.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011668" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11668</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11668" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11668" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11668" ref_url="https://www.suse.com/security/cve/CVE-2020-11668" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2492-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007357.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007359.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007358.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2531-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0060-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IGMHKFBCILMH7EZ36H75HXZ2RO2WG2GR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0075-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H7EJISS2OPKUSJFJ2BG5ZWHA2Z6H3VQB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 5.6.1, drivers/media/usb/gspca/xirlink_cit.c (aka the Xirlink camera USB driver) mishandles invalid descriptors, aka CID-a246b4d54770.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11668/">CVE-2020-11668 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11668">CVE-2020-11668 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1168952">SUSE bug 1168952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173942">SUSE bug 1173942</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829207" comment="bpftool-3.10.0-1160.36.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829208" comment="kernel-3.10.0-1160.36.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829209" comment="kernel-abi-whitelists-3.10.0-1160.36.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829210" comment="kernel-debug-3.10.0-1160.36.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829213" comment="kernel-doc-3.10.0-1160.36.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829214" comment="kernel-headers-3.10.0-1160.36.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829215" comment="kernel-tools-3.10.0-1160.36.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829216" comment="kernel-tools-libs-3.10.0-1160.36.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829218" comment="perf-3.10.0-1160.36.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829219" comment="python-perf-3.10.0-1160.36.2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011761" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11761</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11761" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11761" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11761" ref_url="https://www.suse.com/security/cve/CVE-2020-11761" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006826.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0682-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UPIMHT3QWHTJ2S55J25KV3UTF3KXVI46/" source="SUSE-SU"/>
    <description>
    An issue was discovered in OpenEXR before 2.4.1. There is an out-of-bounds read during Huffman uncompression, as demonstrated by FastHufDecoder::refill in ImfFastHuf.cpp.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11761/">CVE-2020-11761 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11761">CVE-2020-11761 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1169578">SUSE bug 1169578</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828532" comment="OpenEXR-1.7.1-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828533" comment="OpenEXR-devel-1.7.1-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828534" comment="OpenEXR-libs-1.7.1-8.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011763" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11763</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11763" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11763" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11763" ref_url="https://www.suse.com/security/cve/CVE-2020-11763" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006826.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0682-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UPIMHT3QWHTJ2S55J25KV3UTF3KXVI46/" source="SUSE-SU"/>
    <description>
    An issue was discovered in OpenEXR before 2.4.1. There is an std::vector out-of-bounds read and write, as demonstrated by ImfTileOffsets.cpp.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11763/">CVE-2020-11763 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11763">CVE-2020-11763 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1169576">SUSE bug 1169576</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828532" comment="OpenEXR-1.7.1-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828533" comment="OpenEXR-devel-1.7.1-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828534" comment="OpenEXR-libs-1.7.1-8.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011764" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11764</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11764" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11764" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11764" ref_url="https://www.suse.com/security/cve/CVE-2020-11764" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006826.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0682-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UPIMHT3QWHTJ2S55J25KV3UTF3KXVI46/" source="SUSE-SU"/>
    <description>
    An issue was discovered in OpenEXR before 2.4.1. There is an out-of-bounds write in copyIntoFrameBuffer in ImfMisc.cpp.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11764/">CVE-2020-11764 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11764">CVE-2020-11764 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1169574">SUSE bug 1169574</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828532" comment="OpenEXR-1.7.1-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828533" comment="OpenEXR-devel-1.7.1-8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828534" comment="OpenEXR-libs-1.7.1-8.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011793" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11793</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11793" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11793" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11793" ref_url="https://www.suse.com/security/cve/CVE-2020-11793" source="SUSE CVE"/>
		<reference ref_id="RHSA-2020:4451" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006752.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0602-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J5KUWZQAYRQ7HDH4NCHGTTCT2XK6U6RX/" source="SUSE-SU"/>
    <description>
    A use-after-free issue exists in WebKitGTK before 2.28.1 and WPE WebKit before 2.28.1 via crafted web content that allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-28"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11793/">CVE-2020-11793 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11793">CVE-2020-11793 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1169658">SUSE bug 1169658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828527" comment="webkitgtk4-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828528" comment="webkitgtk4-devel-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828529" comment="webkitgtk4-doc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828530" comment="webkitgtk4-jsc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828531" comment="webkitgtk4-jsc-devel-2.28.2-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011868" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11868</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11868" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11868" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11868" ref_url="https://www.suse.com/security/cve/CVE-2020-11868" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0934-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BIQMBPSMZGTUEK5KJC4HX6YOA3YJ3SL6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1007-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JNRU5O2D5HWSXEDH4T2XTCSGOTFSCOIH/" source="SUSE-SU"/>
    <description>
    ntpd in ntp before 4.2.8p14 and 4.3.x before 4.3.100 allows an off-path attacker to block unauthenticated synchronization via a server mode packet with a spoofed source IP address, because transmissions are rescheduled even when a packet lacks a valid origin timestamp.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11868/">CVE-2020-11868 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11868">CVE-2020-11868 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1169740">SUSE bug 1169740</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828039" comment="ntp-4.2.6p5-29.el7_8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828040" comment="ntp-doc-4.2.6p5-29.el7_8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828041" comment="ntp-perl-4.2.6p5-29.el7_8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828042" comment="ntpdate-4.2.6p5-29.el7_8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828043" comment="sntp-4.2.6p5-29.el7_8.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011945" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11945</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11945" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11945" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11945" ref_url="https://www.suse.com/security/cve/CVE-2020-11945" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1227-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007289.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0623-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PKK52WC254R33WBSNPYY4IHIZMYTJYNU/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Squid before 5.0.2. A remote attacker can replay a sniffed Digest Authentication nonce to gain access to resources that are otherwise forbidden. This occurs because the attacker can overflow the nonce reference counter (a short integer). Remote code execution may occur if the pooled token credentials are freed (instead of replayed as valid credentials).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11945/">CVE-2020-11945 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11945">CVE-2020-11945 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1170313">SUSE bug 1170313</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827959" comment="squid-3.5.20-15.el7_8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827960" comment="squid-migration-script-3.5.20-15.el7_8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827961" comment="squid-sysvinit-3.5.20-15.el7_8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012049" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12049</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12049" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12049" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12049" ref_url="https://www.suse.com/security/cve/CVE-2020-12049" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:57-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:660-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-September/020142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009192.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2590-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009330.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1204-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LPUICUYAOLJREPLAWO5JOKCXD4HSH4KT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2810-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ILND7MBTQAFIRZBI5CMERWHRUVEAKAOD/" source="SUSE-SU"/>
    <description>
    An issue was discovered in dbus &gt;= 1.3.0 before 1.12.18. The DBusServer in libdbus, as used in dbus-daemon, leaks file descriptors when a message exceeds the per-message file descriptor limit. A local attacker with access to the D-Bus system bus or another system service's private AF_UNIX socket could use this to make the system service reach its file descriptor limit, denying service to subsequent D-Bus clients.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12049/">CVE-2020-12049 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12049">CVE-2020-12049 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1172505">SUSE bug 1172505</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828058" comment="dbus-1.10.24-14.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828059" comment="dbus-devel-1.10.24-14.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828060" comment="dbus-doc-1.10.24-14.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828061" comment="dbus-libs-1.10.24-14.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828062" comment="dbus-tests-1.10.24-14.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828063" comment="dbus-x11-1.10.24-14.el7_8 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012100" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12100</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12100" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12100" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12100" ref_url="https://www.suse.com/security/cve/CVE-2020-12100" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008153.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0026-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GLBPVUTTVOKCDH7OSMVSVIQEI7TKHOMX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0072-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DUR6FYAW4F7DJJAFNZ7FNLNEQNDU6ZEZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14715-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KZSDCZ5LA6IHY7KXVSL6ULAJVP6OFT2M/" source="SUSE-SU"/>
    <description>
    In Dovecot before 2.3.11.3, uncontrolled recursion in submission, lmtp, and lda allows remote attackers to cause a denial of service (resource consumption) via a crafted e-mail message with deeply nested MIME parts.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12100/">CVE-2020-12100 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12100">CVE-2020-12100 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1174920">SUSE bug 1174920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180406">SUSE bug 1180406</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828101" comment="dovecot-2.2.36-6.el7_8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828102" comment="dovecot-devel-2.2.36-6.el7_8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828103" comment="dovecot-mysql-2.2.36-6.el7_8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828104" comment="dovecot-pgsql-2.2.36-6.el7_8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828105" comment="dovecot-pigeonhole-2.2.36-6.el7_8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012243" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12243</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12243" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12243" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12243" ref_url="https://www.suse.com/security/cve/CVE-2020-12243" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006790.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006807.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006783.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006801.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0647-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AH3RYISLVMAE2VXUYPS7XRVL5OOKGCKA/" source="SUSE-SU"/>
    <description>
    In filter.c in slapd in OpenLDAP before 2.4.50, LDAP search filters with nested boolean expressions can result in denial of service (daemon crash).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12243/">CVE-2020-12243 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12243">CVE-2020-12243 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1170771">SUSE bug 1170771</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828538" comment="openldap-2.4.44-22.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828539" comment="openldap-clients-2.4.44-22.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828540" comment="openldap-devel-2.4.44-22.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828541" comment="openldap-servers-2.4.44-22.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828542" comment="openldap-servers-sql-2.4.44-22.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012321" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12321</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12321" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12321" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12321" ref_url="https://www.suse.com/security/cve/CVE-2020-12321" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007778.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007786.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1960-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SNZ3NYJWZSI2ISRG5U4RX3XMDBRHDRTX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1962-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WWOUPKVHO4A2R27BZDEYM2EMS4RXKDM4/" source="SUSE-SU"/>
    <description>
    Improper buffer restriction in some Intel(R) Wireless Bluetooth(R) products before version 21.110 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12321/">CVE-2020-12321 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12321">CVE-2020-12321 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1178671">SUSE bug 1178671</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828899" comment="iwl100-firmware-39.31.5.1-80.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828900" comment="iwl1000-firmware-39.31.5.1-80.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828901" comment="iwl105-firmware-18.168.6.1-80.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828902" comment="iwl135-firmware-18.168.6.1-80.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828903" comment="iwl2000-firmware-18.168.6.1-80.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828904" comment="iwl2030-firmware-18.168.6.1-80.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828905" comment="iwl3160-firmware-25.30.13.0-80.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828906" comment="iwl3945-firmware-15.32.2.9-80.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828907" comment="iwl4965-firmware-228.61.2.24-80.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828908" comment="iwl5000-firmware-8.83.5.1_1-80.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828909" comment="iwl5150-firmware-8.24.2.2-80.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828910" comment="iwl6000-firmware-9.221.4.1-80.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828911" comment="iwl6000g2a-firmware-18.168.6.1-80.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828912" comment="iwl6000g2b-firmware-18.168.6.1-80.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828913" comment="iwl6050-firmware-41.28.5.1-80.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828914" comment="iwl7260-firmware-25.30.13.0-80.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828915" comment="linux-firmware-20200421-80.git78c0348.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012362" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12362</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12362" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12362" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12362" ref_url="https://www.suse.com/security/cve/CVE-2020-12362" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008452.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0393-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R5J7TLH5AZYERG7B3PW3ALPYSBMFCGV5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0407-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KH2XS5MRKRSCX3I5AS4LGZH576PO6KUD/" source="SUSE-SU"/>
    <description>
    Integer overflow in the firmware for some Intel(R) Graphics Drivers for Windows * before version 26.20.100.7212 and before Linux kernel version 5.5 may allow a privileged user to potentially enable an escalation of privilege via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12362/">CVE-2020-12362 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12362">CVE-2020-12362 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1181720">SUSE bug 1181720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182033">SUSE bug 1182033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190859">SUSE bug 1190859</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829154" comment="bpftool-3.10.0-1160.31.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829155" comment="kernel-3.10.0-1160.31.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829156" comment="kernel-abi-whitelists-3.10.0-1160.31.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829157" comment="kernel-debug-3.10.0-1160.31.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829160" comment="kernel-doc-3.10.0-1160.31.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829161" comment="kernel-headers-3.10.0-1160.31.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829162" comment="kernel-tools-3.10.0-1160.31.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829163" comment="kernel-tools-libs-3.10.0-1160.31.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829165" comment="perf-3.10.0-1160.31.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829166" comment="python-perf-3.10.0-1160.31.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012363" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12363</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12363" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12363" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12363" ref_url="https://www.suse.com/security/cve/CVE-2020-12363" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008452.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0393-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R5J7TLH5AZYERG7B3PW3ALPYSBMFCGV5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0407-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KH2XS5MRKRSCX3I5AS4LGZH576PO6KUD/" source="SUSE-SU"/>
    <description>
    Improper input validation in some Intel(R) Graphics Drivers for Windows* before version 26.20.100.7212 and before Linux kernel version 5.5 may allow a privileged user to potentially enable a denial of service via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="1.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12363/">CVE-2020-12363 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12363">CVE-2020-12363 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1181720">SUSE bug 1181720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181735">SUSE bug 1181735</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829154" comment="bpftool-3.10.0-1160.31.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829155" comment="kernel-3.10.0-1160.31.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829156" comment="kernel-abi-whitelists-3.10.0-1160.31.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829157" comment="kernel-debug-3.10.0-1160.31.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829160" comment="kernel-doc-3.10.0-1160.31.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829161" comment="kernel-headers-3.10.0-1160.31.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829162" comment="kernel-tools-3.10.0-1160.31.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829163" comment="kernel-tools-libs-3.10.0-1160.31.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829165" comment="perf-3.10.0-1160.31.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829166" comment="python-perf-3.10.0-1160.31.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012364" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12364</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12364" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12364" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12364" ref_url="https://www.suse.com/security/cve/CVE-2020-12364" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008452.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0393-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R5J7TLH5AZYERG7B3PW3ALPYSBMFCGV5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0407-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KH2XS5MRKRSCX3I5AS4LGZH576PO6KUD/" source="SUSE-SU"/>
    <description>
    Null pointer reference in some Intel(R) Graphics Drivers for Windows* before version 26.20.100.7212 and before version Linux kernel version 5.5 may allow a privileged user to potentially enable a denial of service via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="1.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12364/">CVE-2020-12364 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12364">CVE-2020-12364 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1181720">SUSE bug 1181720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181736">SUSE bug 1181736</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829154" comment="bpftool-3.10.0-1160.31.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829155" comment="kernel-3.10.0-1160.31.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829156" comment="kernel-abi-whitelists-3.10.0-1160.31.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829157" comment="kernel-debug-3.10.0-1160.31.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829160" comment="kernel-doc-3.10.0-1160.31.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829161" comment="kernel-headers-3.10.0-1160.31.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829162" comment="kernel-tools-3.10.0-1160.31.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829163" comment="kernel-tools-libs-3.10.0-1160.31.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829165" comment="perf-3.10.0-1160.31.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829166" comment="python-perf-3.10.0-1160.31.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012387" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12387</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12387" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12387" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12387" ref_url="https://www.suse.com/security/cve/CVE-2020-12387" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1225-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006809.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0621-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EHIK2CEXF7KGEAHF2CFW2EEKLTCAFFXT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0643-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5YQSDU3MFHQWYW5DLTHJ4JOYHWTHCHMN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A race condition when running shutdown code for Web Worker led to a use-after-free vulnerability. This resulted in a potentially exploitable crash. This vulnerability affects Firefox ESR &lt; 68.8, Firefox &lt; 76, and Thunderbird &lt; 68.8.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12387/">CVE-2020-12387 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12387">CVE-2020-12387 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1171186">SUSE bug 1171186</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827958" comment="firefox-68.8.0-1.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827962" comment="thunderbird-68.8.0-1.el7_8 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012392" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12392</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12392" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12392" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12392" ref_url="https://www.suse.com/security/cve/CVE-2020-12392" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1225-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006809.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0621-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EHIK2CEXF7KGEAHF2CFW2EEKLTCAFFXT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0643-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5YQSDU3MFHQWYW5DLTHJ4JOYHWTHCHMN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    The 'Copy as cURL' feature of Devtools' network tab did not properly escape the HTTP POST data of a request, which can be controlled by the website. If a user used the 'Copy as cURL' feature and pasted the command into a terminal, it could have resulted in the disclosure of local files. This vulnerability affects Firefox ESR &lt; 68.8, Firefox &lt; 76, and Thunderbird &lt; 68.8.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12392/">CVE-2020-12392 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12392">CVE-2020-12392 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1171186">SUSE bug 1171186</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827958" comment="firefox-68.8.0-1.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827962" comment="thunderbird-68.8.0-1.el7_8 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012395" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12395</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12395" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12395" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12395" ref_url="https://www.suse.com/security/cve/CVE-2020-12395" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1225-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006809.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0621-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EHIK2CEXF7KGEAHF2CFW2EEKLTCAFFXT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0643-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5YQSDU3MFHQWYW5DLTHJ4JOYHWTHCHMN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Mozilla developers and community members reported memory safety bugs present in Firefox 75 and Firefox ESR 68.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR &lt; 68.8, Firefox &lt; 76, and Thunderbird &lt; 68.8.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12395/">CVE-2020-12395 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12395">CVE-2020-12395 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1171186">SUSE bug 1171186</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827958" comment="firefox-68.8.0-1.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827962" comment="thunderbird-68.8.0-1.el7_8 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012397" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12397</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12397" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12397" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12397" ref_url="https://www.suse.com/security/cve/CVE-2020-12397" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1225-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0643-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5YQSDU3MFHQWYW5DLTHJ4JOYHWTHCHMN/" source="SUSE-SU"/>
    <description>
    By encoding Unicode whitespace characters within the From email header, an attacker can spoof the sender email address that Thunderbird displays. This vulnerability affects Thunderbird &lt; 68.8.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12397/">CVE-2020-12397 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12397">CVE-2020-12397 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1171186">SUSE bug 1171186</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827962" comment="thunderbird-68.8.0-1.el7_8 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012398" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12398</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12398" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12398" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12398" ref_url="https://www.suse.com/security/cve/CVE-2020-12398" source="SUSE CVE"/>
		<reference ref_id="RHSA-2020:2614" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1591-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007108.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0799-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QHQ53NVPCSMD2N5NCZQXOOHEI6WXWV5G/" source="SUSE-SU"/>
    <description>
    If Thunderbird is configured to use STARTTLS for an IMAP server, and the server sends a PREAUTH response, then Thunderbird will continue with an unencrypted connection, causing email data to be sent without protection. This vulnerability affects Thunderbird &lt; 68.9.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-05-18"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12398/">CVE-2020-12398 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12398">CVE-2020-12398 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1172402">SUSE bug 1172402</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828034" comment="thunderbird-68.9.0-1.el7_8 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012400" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12400</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12400" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12400" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12400" ref_url="https://www.suse.com/security/cve/CVE-2020-12400" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    When converting coordinates from projective to affine, the modular inversion was not performed in constant time, resulting in a possible timing-based side channel attack. This vulnerability affects Firefox &lt; 80 and Firefox for Android &lt; 80.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12400/">CVE-2020-12400 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12400">CVE-2020-12400 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1174763">SUSE bug 1174763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175686">SUSE bug 1175686</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828558" comment="nspr-4.25.0-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828559" comment="nspr-devel-4.25.0-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828560" comment="nss-3.53.1-3.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828561" comment="nss-devel-3.53.1-3.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828562" comment="nss-pkcs11-devel-3.53.1-3.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828563" comment="nss-softokn-3.53.1-6.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828564" comment="nss-softokn-devel-3.53.1-6.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828565" comment="nss-softokn-freebl-3.53.1-6.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828566" comment="nss-softokn-freebl-devel-3.53.1-6.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828567" comment="nss-sysinit-3.53.1-3.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828568" comment="nss-tools-3.53.1-3.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828569" comment="nss-util-3.53.1-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828570" comment="nss-util-devel-3.53.1-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012401" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12401</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12401" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12401" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12401" ref_url="https://www.suse.com/security/cve/CVE-2020-12401" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    During ECDSA signature generation, padding applied in the nonce designed to ensure constant-time scalar multiplication was removed, resulting in variable-time execution dependent on secret data. This vulnerability affects Firefox &lt; 80 and Firefox for Android &lt; 80.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12401/">CVE-2020-12401 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12401">CVE-2020-12401 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1174763">SUSE bug 1174763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175686">SUSE bug 1175686</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828558" comment="nspr-4.25.0-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828559" comment="nspr-devel-4.25.0-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828560" comment="nss-3.53.1-3.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828561" comment="nss-devel-3.53.1-3.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828562" comment="nss-pkcs11-devel-3.53.1-3.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828563" comment="nss-softokn-3.53.1-6.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828564" comment="nss-softokn-devel-3.53.1-6.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828565" comment="nss-softokn-freebl-3.53.1-6.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828566" comment="nss-softokn-freebl-devel-3.53.1-6.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828567" comment="nss-sysinit-3.53.1-3.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828568" comment="nss-tools-3.53.1-3.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828569" comment="nss-util-3.53.1-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828570" comment="nss-util-devel-3.53.1-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012402" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12402</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12402" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12402" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12402" ref_url="https://www.suse.com/security/cve/CVE-2020-12402" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007121.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0953-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OZXP64DVK5MPY3Y7TIL5FD4NLLYB7IXH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0955-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/62SBXYYHCYQ7PZ2H2VC26CEXR66YDCCA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0983-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IC6WAA3I6RVAR7RIOKVD5HFWG5AGB2TV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1017-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/I7VVAECKE6LOD5F2FZICEGZKYEAAKBWU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    During RSA key generation, bignum implementations used a variation of the Binary Extended Euclidean Algorithm which entailed significantly input-dependent flow. This allowed an attacker able to perform electromagnetic-based side channel attacks to record traces leading to the recovery of the secret primes. *Note:* An unmodified Firefox browser does not generate RSA keys in normal operation and is not affected, but products built on top of it might. This vulnerability affects Firefox &lt; 78.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12402/">CVE-2020-12402 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12402">CVE-2020-12402 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1173032">SUSE bug 1173032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173576">SUSE bug 1173576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174230">SUSE bug 1174230</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828558" comment="nspr-4.25.0-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828559" comment="nspr-devel-4.25.0-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828560" comment="nss-3.53.1-3.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828561" comment="nss-devel-3.53.1-3.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828562" comment="nss-pkcs11-devel-3.53.1-3.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828563" comment="nss-softokn-3.53.1-6.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828564" comment="nss-softokn-devel-3.53.1-6.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828565" comment="nss-softokn-freebl-3.53.1-6.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828566" comment="nss-softokn-freebl-devel-3.53.1-6.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828567" comment="nss-sysinit-3.53.1-3.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828568" comment="nss-tools-3.53.1-3.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828569" comment="nss-util-3.53.1-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828570" comment="nss-util-devel-3.53.1-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012403" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12403</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12403" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12403" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12403" ref_url="https://www.suse.com/security/cve/CVE-2020-12403" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the way CHACHA20-POLY1305 was implemented in NSS in versions before 3.55. When using multi-part Chacha20, it could cause out-of-bounds reads. This issue was fixed by explicitly disabling multi-part ChaCha20 (which was not functioning correctly) and strictly enforcing tag length. The highest threat from this vulnerability is to confidentiality and system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12403/">CVE-2020-12403 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12403">CVE-2020-12403 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1174763">SUSE bug 1174763</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828558" comment="nspr-4.25.0-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828559" comment="nspr-devel-4.25.0-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828560" comment="nss-3.53.1-3.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828561" comment="nss-devel-3.53.1-3.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828562" comment="nss-pkcs11-devel-3.53.1-3.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828563" comment="nss-softokn-3.53.1-6.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828564" comment="nss-softokn-devel-3.53.1-6.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828565" comment="nss-softokn-freebl-3.53.1-6.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828566" comment="nss-softokn-freebl-devel-3.53.1-6.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828567" comment="nss-sysinit-3.53.1-3.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828568" comment="nss-tools-3.53.1-3.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828569" comment="nss-util-3.53.1-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828570" comment="nss-util-devel-3.53.1-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012405" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12405</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12405" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12405" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12405" ref_url="https://www.suse.com/security/cve/CVE-2020-12405" source="SUSE CVE"/>
		<reference ref_id="RHSA-2020:2614" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006897.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1591-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007108.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0789-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZTV3M4DDQBWDFVSAQIZ4J7EMKSFCGA4G/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0799-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QHQ53NVPCSMD2N5NCZQXOOHEI6WXWV5G/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    When browsing a malicious page, a race condition in our SharedWorkerService could occur and lead to a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 68.9.0, Firefox &lt; 77, and Firefox ESR &lt; 68.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-05-18"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12405/">CVE-2020-12405 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12405">CVE-2020-12405 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1172402">SUSE bug 1172402</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828012" comment="firefox-68.9.0-1.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828034" comment="thunderbird-68.9.0-1.el7_8 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012406" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12406</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12406" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12406" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12406" ref_url="https://www.suse.com/security/cve/CVE-2020-12406" source="SUSE CVE"/>
		<reference ref_id="RHSA-2020:2614" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006897.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1591-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007108.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0789-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZTV3M4DDQBWDFVSAQIZ4J7EMKSFCGA4G/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0799-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QHQ53NVPCSMD2N5NCZQXOOHEI6WXWV5G/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Mozilla Developer Iain Ireland discovered a missing type check during unboxed objects removal, resulting in a crash. We presume that with enough effort that it could be exploited to run arbitrary code. This vulnerability affects Thunderbird &lt; 68.9.0, Firefox &lt; 77, and Firefox ESR &lt; 68.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-05-18"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12406/">CVE-2020-12406 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12406">CVE-2020-12406 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1172402">SUSE bug 1172402</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828012" comment="firefox-68.9.0-1.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828034" comment="thunderbird-68.9.0-1.el7_8 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012410" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12410</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12410" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12410" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12410" ref_url="https://www.suse.com/security/cve/CVE-2020-12410" source="SUSE CVE"/>
		<reference ref_id="RHSA-2020:2614" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006897.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1591-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007108.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0789-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZTV3M4DDQBWDFVSAQIZ4J7EMKSFCGA4G/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0799-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QHQ53NVPCSMD2N5NCZQXOOHEI6WXWV5G/" source="SUSE-SU"/>
    <description>
    Mozilla developers reported memory safety bugs present in Firefox 76 and Firefox ESR 68.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird &lt; 68.9.0, Firefox &lt; 77, and Firefox ESR &lt; 68.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-05-18"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12410/">CVE-2020-12410 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12410">CVE-2020-12410 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1172402">SUSE bug 1172402</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828012" comment="firefox-68.9.0-1.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828034" comment="thunderbird-68.9.0-1.el7_8 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012417" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12417</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12417" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12417" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12417" ref_url="https://www.suse.com/security/cve/CVE-2020-12417" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007122.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0967-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YAYUZVFPL5N3QXJNFURNBG4J7U6HBKUJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0982-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42LJZ4E7FAWVTKPVLPQEJB45C3YAMRAT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0983-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IC6WAA3I6RVAR7RIOKVD5HFWG5AGB2TV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1017-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/I7VVAECKE6LOD5F2FZICEGZKYEAAKBWU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Due to confusion about ValueTags on JavaScript Objects, an object may pass through the type barrier, resulting in memory corruption and a potentially exploitable crash. *Note: this issue only affects Firefox on ARM64 platforms.* This vulnerability affects Firefox ESR &lt; 68.10, Firefox &lt; 78, and Thunderbird &lt; 68.10.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12417/">CVE-2020-12417 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12417">CVE-2020-12417 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1173576">SUSE bug 1173576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174230">SUSE bug 1174230</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828057" comment="firefox-68.10.0-1.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828064" comment="thunderbird-68.10.0-1.el7_8 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012418" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12418</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12418" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12418" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12418" ref_url="https://www.suse.com/security/cve/CVE-2020-12418" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007122.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0967-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YAYUZVFPL5N3QXJNFURNBG4J7U6HBKUJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0982-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42LJZ4E7FAWVTKPVLPQEJB45C3YAMRAT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0983-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IC6WAA3I6RVAR7RIOKVD5HFWG5AGB2TV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1017-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/I7VVAECKE6LOD5F2FZICEGZKYEAAKBWU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Manipulating individual parts of a URL object could have caused an out-of-bounds read, leaking process memory to malicious JavaScript. This vulnerability affects Firefox ESR &lt; 68.10, Firefox &lt; 78, and Thunderbird &lt; 68.10.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12418/">CVE-2020-12418 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12418">CVE-2020-12418 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1173576">SUSE bug 1173576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174230">SUSE bug 1174230</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828057" comment="firefox-68.10.0-1.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828064" comment="thunderbird-68.10.0-1.el7_8 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012419" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12419</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12419" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12419" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12419" ref_url="https://www.suse.com/security/cve/CVE-2020-12419" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007122.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0967-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YAYUZVFPL5N3QXJNFURNBG4J7U6HBKUJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0982-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42LJZ4E7FAWVTKPVLPQEJB45C3YAMRAT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0983-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IC6WAA3I6RVAR7RIOKVD5HFWG5AGB2TV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1017-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/I7VVAECKE6LOD5F2FZICEGZKYEAAKBWU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    When processing callbacks that occurred during window flushing in the parent process, the associated window may die; causing a use-after-free condition. This could have led to memory corruption and a potentially exploitable crash. This vulnerability affects Firefox ESR &lt; 68.10, Firefox &lt; 78, and Thunderbird &lt; 68.10.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12419/">CVE-2020-12419 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12419">CVE-2020-12419 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1173576">SUSE bug 1173576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174230">SUSE bug 1174230</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828057" comment="firefox-68.10.0-1.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828064" comment="thunderbird-68.10.0-1.el7_8 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012420" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12420</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12420" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12420" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12420" ref_url="https://www.suse.com/security/cve/CVE-2020-12420" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007122.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0967-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YAYUZVFPL5N3QXJNFURNBG4J7U6HBKUJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0982-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42LJZ4E7FAWVTKPVLPQEJB45C3YAMRAT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0983-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IC6WAA3I6RVAR7RIOKVD5HFWG5AGB2TV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1017-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/I7VVAECKE6LOD5F2FZICEGZKYEAAKBWU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    When trying to connect to a STUN server, a race condition could have caused a use-after-free of a pointer, leading to memory corruption and a potentially exploitable crash. This vulnerability affects Firefox ESR &lt; 68.10, Firefox &lt; 78, and Thunderbird &lt; 68.10.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12420/">CVE-2020-12420 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12420">CVE-2020-12420 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1173576">SUSE bug 1173576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174230">SUSE bug 1174230</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828057" comment="firefox-68.10.0-1.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828064" comment="thunderbird-68.10.0-1.el7_8 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012421" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12421</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12421" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12421" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12421" ref_url="https://www.suse.com/security/cve/CVE-2020-12421" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007122.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0967-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YAYUZVFPL5N3QXJNFURNBG4J7U6HBKUJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0982-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42LJZ4E7FAWVTKPVLPQEJB45C3YAMRAT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0983-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IC6WAA3I6RVAR7RIOKVD5HFWG5AGB2TV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1017-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/I7VVAECKE6LOD5F2FZICEGZKYEAAKBWU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    When performing add-on updates, certificate chains terminating in non-built-in-roots were rejected (even if they were legitimately added by an administrator.) This could have caused add-ons to become out-of-date silently without notification to the user. This vulnerability affects Firefox ESR &lt; 68.10, Firefox &lt; 78, and Thunderbird &lt; 68.10.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12421/">CVE-2020-12421 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12421">CVE-2020-12421 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1173576">SUSE bug 1173576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174230">SUSE bug 1174230</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828057" comment="firefox-68.10.0-1.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828064" comment="thunderbird-68.10.0-1.el7_8 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012422" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12422</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12422" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12422" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12422" ref_url="https://www.suse.com/security/cve/CVE-2020-12422" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007121.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0983-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IC6WAA3I6RVAR7RIOKVD5HFWG5AGB2TV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1017-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/I7VVAECKE6LOD5F2FZICEGZKYEAAKBWU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    In non-standard configurations, a JPEG image created by JavaScript could have caused an internal variable to overflow, resulting in an out of bounds write, memory corruption, and a potentially exploitable crash. This vulnerability affects Firefox &lt; 78.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12422/">CVE-2020-12422 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12422">CVE-2020-12422 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1173576">SUSE bug 1173576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174230">SUSE bug 1174230</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828575" comment="firefox-78.3.0-1.el7_9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012424" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12424</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12424" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12424" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12424" ref_url="https://www.suse.com/security/cve/CVE-2020-12424" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007121.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0983-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IC6WAA3I6RVAR7RIOKVD5HFWG5AGB2TV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1017-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/I7VVAECKE6LOD5F2FZICEGZKYEAAKBWU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    When constructing a permission prompt for WebRTC, a URI was supplied from the content process. This URI was untrusted, and could have been the URI of an origin that was previously granted permission; bypassing the prompt. This vulnerability affects Firefox &lt; 78.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12424/">CVE-2020-12424 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12424">CVE-2020-12424 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1173576">SUSE bug 1173576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174230">SUSE bug 1174230</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828575" comment="firefox-78.3.0-1.el7_9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012425" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12425</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12425" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12425" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12425" ref_url="https://www.suse.com/security/cve/CVE-2020-12425" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007121.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0983-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IC6WAA3I6RVAR7RIOKVD5HFWG5AGB2TV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1017-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/I7VVAECKE6LOD5F2FZICEGZKYEAAKBWU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Due to confusion processing a hyphen character in Date.parse(), a one-byte out of bounds read could have occurred, leading to potential information disclosure. This vulnerability affects Firefox &lt; 78.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12425/">CVE-2020-12425 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12425">CVE-2020-12425 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1173576">SUSE bug 1173576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174230">SUSE bug 1174230</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828575" comment="firefox-78.3.0-1.el7_9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012653" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12653</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12653" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12653" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12653" ref_url="https://www.suse.com/security/cve/CVE-2020-12653" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0801-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BOYMLRUHWMVAOFIPZH7KANUUUY2YYNL3/" source="SUSE-SU"/>
    <description>
    An issue was found in Linux kernel before 5.5.4. The mwifiex_cmd_append_vsie_tlv() function in drivers/net/wireless/marvell/mwifiex/scan.c allows local users to gain privileges or cause a denial of service because of an incorrect memcpy and buffer overflow, aka CID-b70261a288ea.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12653/">CVE-2020-12653 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12653">CVE-2020-12653 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1159281">SUSE bug 1159281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171195">SUSE bug 1171195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171254">SUSE bug 1171254</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828081" comment="bpftool-3.10.0-1127.18.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828082" comment="kernel-3.10.0-1127.18.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828083" comment="kernel-abi-whitelists-3.10.0-1127.18.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828084" comment="kernel-debug-3.10.0-1127.18.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828087" comment="kernel-doc-3.10.0-1127.18.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828088" comment="kernel-headers-3.10.0-1127.18.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828089" comment="kernel-tools-3.10.0-1127.18.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828090" comment="kernel-tools-libs-3.10.0-1127.18.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828092" comment="perf-3.10.0-1127.18.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828093" comment="python-perf-3.10.0-1127.18.2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012654" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12654</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12654" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12654" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12654" ref_url="https://www.suse.com/security/cve/CVE-2020-12654" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0801-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BOYMLRUHWMVAOFIPZH7KANUUUY2YYNL3/" source="SUSE-SU"/>
    <description>
    An issue was found in Linux kernel before 5.5.4. mwifiex_ret_wmm_get_status() in drivers/net/wireless/marvell/mwifiex/wmm.c allows a remote AP to trigger a heap-based buffer overflow because of an incorrect memcpy, aka CID-3a9b153c5591.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12654/">CVE-2020-12654 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12654">CVE-2020-12654 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1159281">SUSE bug 1159281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171202">SUSE bug 1171202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171252">SUSE bug 1171252</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828081" comment="bpftool-3.10.0-1127.18.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828082" comment="kernel-3.10.0-1127.18.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828083" comment="kernel-abi-whitelists-3.10.0-1127.18.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828084" comment="kernel-debug-3.10.0-1127.18.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828087" comment="kernel-doc-3.10.0-1127.18.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828088" comment="kernel-headers-3.10.0-1127.18.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828089" comment="kernel-tools-3.10.0-1127.18.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828090" comment="kernel-tools-libs-3.10.0-1127.18.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828092" comment="perf-3.10.0-1127.18.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828093" comment="python-perf-3.10.0-1127.18.2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012662" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12662</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12662" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12662" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12662" ref_url="https://www.suse.com/security/cve/CVE-2020-12662" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0912-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7BOBQ5VCGBBEOIK4YR7ZR7XNQZWV62CU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0913-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T55GJ6QH6PJCNSGR6UDZXXY5UJWCQYT3/" source="SUSE-SU"/>
    <description>
    Unbound before 1.10.1 has Insufficient Control of Network Message Volume, aka an "NXNSAttack" issue. This is triggered by random subdomains in the NSDNAME in NS records.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12662/">CVE-2020-12662 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12662">CVE-2020-12662 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1171889">SUSE bug 1171889</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828018" comment="unbound-1.6.6-4.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828019" comment="unbound-libs-1.6.6-4.el7_8 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012663" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12663</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12663" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12663" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12663" ref_url="https://www.suse.com/security/cve/CVE-2020-12663" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0912-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7BOBQ5VCGBBEOIK4YR7ZR7XNQZWV62CU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0913-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T55GJ6QH6PJCNSGR6UDZXXY5UJWCQYT3/" source="SUSE-SU"/>
    <description>
    Unbound before 1.10.1 has an infinite loop via malformed DNS answers received from upstream servers.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12663/">CVE-2020-12663 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12663">CVE-2020-12663 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1171889">SUSE bug 1171889</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828018" comment="unbound-1.6.6-4.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828019" comment="unbound-libs-1.6.6-4.el7_8 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012673" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12673</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12673" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12673" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12673" ref_url="https://www.suse.com/security/cve/CVE-2020-12673" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008152.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1241-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/V5BQ7VTUOTG643O3W2XOD47UQ4UFUGOJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1262-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GQSVMLDLGR5JKMB2KBTSQIMV3RQYCJZ3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14715-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KZSDCZ5LA6IHY7KXVSL6ULAJVP6OFT2M/" source="SUSE-SU"/>
    <description>
    In Dovecot before 2.3.11.3, sending a specially formatted NTLM request will crash the auth service because of an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12673/">CVE-2020-12673 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12673">CVE-2020-12673 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1174920">SUSE bug 1174920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174922">SUSE bug 1174922</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828101" comment="dovecot-2.2.36-6.el7_8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828102" comment="dovecot-devel-2.2.36-6.el7_8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828103" comment="dovecot-mysql-2.2.36-6.el7_8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828104" comment="dovecot-pgsql-2.2.36-6.el7_8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828105" comment="dovecot-pigeonhole-2.2.36-6.el7_8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012674" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12674</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12674" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12674" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12674" ref_url="https://www.suse.com/security/cve/CVE-2020-12674" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008152.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1241-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/V5BQ7VTUOTG643O3W2XOD47UQ4UFUGOJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1262-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GQSVMLDLGR5JKMB2KBTSQIMV3RQYCJZ3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14715-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KZSDCZ5LA6IHY7KXVSL6ULAJVP6OFT2M/" source="SUSE-SU"/>
    <description>
    In Dovecot before 2.3.11.3, sending a specially formatted RPA request will crash the auth service because a length of zero is mishandled.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12674/">CVE-2020-12674 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12674">CVE-2020-12674 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1174920">SUSE bug 1174920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174923">SUSE bug 1174923</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828101" comment="dovecot-2.2.36-6.el7_8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828102" comment="dovecot-devel-2.2.36-6.el7_8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828103" comment="dovecot-mysql-2.2.36-6.el7_8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828104" comment="dovecot-pgsql-2.2.36-6.el7_8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828105" comment="dovecot-pigeonhole-2.2.36-6.el7_8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012723" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12723</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12723" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12723" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12723" ref_url="https://www.suse.com/security/cve/CVE-2020-12723" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:340-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1682-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007092.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0850-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RFKVQHG6H52DLWIOP6HAYWKPLPU5XGEA/" source="SUSE-SU"/>
    <description>
    regcomp.c in Perl before 5.30.3 allows a buffer overflow via a crafted regular expression because of recursive S_study_chunk calls.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-12723/">CVE-2020-12723 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12723">CVE-2020-12723 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1171866">SUSE bug 1171866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225627">SUSE bug 1225627</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828916" comment="perl-5.16.3-299.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828917" comment="perl-CPAN-1.9800-299.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828918" comment="perl-ExtUtils-CBuilder-0.28.2.6-299.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828919" comment="perl-ExtUtils-Embed-1.30-299.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828920" comment="perl-ExtUtils-Install-1.58-299.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828921" comment="perl-IO-Zlib-1.10-299.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828922" comment="perl-Locale-Maketext-Simple-0.21-299.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828923" comment="perl-Module-CoreList-2.76.02-299.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828924" comment="perl-Module-Loaded-0.08-299.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828925" comment="perl-Object-Accessor-0.42-299.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828926" comment="perl-Package-Constants-0.02-299.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828927" comment="perl-Pod-Escapes-1.04-299.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828928" comment="perl-Time-Piece-1.20.1-299.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828929" comment="perl-core-5.16.3-299.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828930" comment="perl-devel-5.16.3-299.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828931" comment="perl-libs-5.16.3-299.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828932" comment="perl-macros-5.16.3-299.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828933" comment="perl-tests-5.16.3-299.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012767" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12767</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12767" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12767" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12767" ref_url="https://www.suse.com/security/cve/CVE-2020-12767" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1553-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007105.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0793-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VOGSCWNCJDTFI3UJ7KXEWPODU7FRDVNO/" source="SUSE-SU"/>
    <description>
    exif_entry_get_value in exif-entry.c in libexif 0.6.21 has a divide-by-zero error.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12767/">CVE-2020-12767 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12767">CVE-2020-12767 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1171475">SUSE bug 1171475</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828535" comment="libexif-0.6.22-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828536" comment="libexif-devel-0.6.22-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828537" comment="libexif-doc-0.6.22-1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012770" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12770</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12770" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12770" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12770" ref_url="https://www.suse.com/security/cve/CVE-2020-12770" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3205-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3217-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-September/020289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020194.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3179-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UNTKFNNFNHHX5QOW7C4SZXLANXGXQCYJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3205-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AUF5M64CM26PNMNFO4R3S57DLRRNSTVG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel through 5.6.11. sg_write lacks an sg_remove_request call in a certain failure case, aka CID-83c6f2390040.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-12770/">CVE-2020-12770 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12770">CVE-2020-12770 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1171420">SUSE bug 1171420</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828543" comment="bpftool-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828544" comment="kernel-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828545" comment="kernel-abi-whitelists-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828546" comment="kernel-debug-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828549" comment="kernel-doc-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828550" comment="kernel-headers-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828551" comment="kernel-tools-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828552" comment="kernel-tools-libs-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828554" comment="perf-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828555" comment="python-perf-3.10.0-1160.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012825" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12825</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12825" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12825" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12825" ref_url="https://www.suse.com/security/cve/CVE-2020-12825" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009454.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/012001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012482.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1294-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FYZZYH2MI4PFNRWE2NZ5CTA5TOHKDLPC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3123-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WG6EJIK3ZOQTMMMAGVUCMM2QCK7CQQ77/" source="SUSE-SU"/>
    <description>
    libcroco through 0.6.13 has excessive recursion in cr_parser_parse_any_core in cr-parser.c, leading to stack consumption.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-12825/">CVE-2020-12825 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12825">CVE-2020-12825 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1171685">SUSE bug 1171685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203730">SUSE bug 1203730</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208647">SUSE bug 1208647</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828556" comment="libcroco-0.6.12-6.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828557" comment="libcroco-devel-0.6.12-6.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012826" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12826</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12826" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12826" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12826" ref_url="https://www.suse.com/security/cve/CVE-2020-12826" source="SUSE CVE"/>
    <description>
    A signal access-control issue was discovered in the Linux kernel before 5.6.5, aka CID-7395ea4e65c2. Because exec_id in include/linux/sched.h is only 32 bits, an integer overflow can interfere with a do_notify_parent protection mechanism. A child process can send an arbitrary signal to a parent process in a different security domain. Exploitation limitations include the amount of elapsed time before an integer overflow occurs, and the lack of scenarios where signals to a parent process present a substantial operational threat.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-12826/">CVE-2020-12826 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12826">CVE-2020-12826 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1171727">SUSE bug 1171727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171985">SUSE bug 1171985</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828543" comment="bpftool-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828544" comment="kernel-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828545" comment="kernel-abi-whitelists-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828546" comment="kernel-debug-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828549" comment="kernel-doc-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828550" comment="kernel-headers-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828551" comment="kernel-tools-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828552" comment="kernel-tools-libs-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828554" comment="perf-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828555" comment="python-perf-3.10.0-1160.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012888" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12888</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12888" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12888" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12888" ref_url="https://www.suse.com/security/cve/CVE-2020-12888" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0935-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Z6FEYXFXT2CJAAJJVCMBHT3BT2ZBZC3G/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1153-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5TP74A7GFRKHFHFASPUDW72EHCZZEIBB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    The VFIO PCI driver in the Linux kernel through 5.6.13 mishandles attempts to access disabled memory space.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12888/">CVE-2020-12888 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12888">CVE-2020-12888 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1159281">SUSE bug 1159281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171868">SUSE bug 1171868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176979">SUSE bug 1176979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179612">SUSE bug 1179612</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828044" comment="bpftool-3.10.0-1127.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828045" comment="kernel-3.10.0-1127.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828046" comment="kernel-abi-whitelists-3.10.0-1127.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828047" comment="kernel-debug-3.10.0-1127.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828050" comment="kernel-doc-3.10.0-1127.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828051" comment="kernel-headers-3.10.0-1127.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828052" comment="kernel-tools-3.10.0-1127.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828053" comment="kernel-tools-libs-3.10.0-1127.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828055" comment="perf-3.10.0-1127.13.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828056" comment="python-perf-3.10.0-1127.13.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013112" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13112</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13112" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13112" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13112" ref_url="https://www.suse.com/security/cve/CVE-2020-13112" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1553-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007105.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0793-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VOGSCWNCJDTFI3UJ7KXEWPODU7FRDVNO/" source="SUSE-SU"/>
    <description>
    An issue was discovered in libexif before 0.6.22. Several buffer over-reads in EXIF MakerNote handling could lead to information disclosure and crashes. This is different from CVE-2020-0093.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13112/">CVE-2020-13112 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13112">CVE-2020-13112 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1172116">SUSE bug 1172116</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828031" comment="libexif-0.6.21-7.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828032" comment="libexif-devel-0.6.21-7.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828033" comment="libexif-doc-0.6.21-7.el7_8 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013113" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13113</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13113" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13113" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13113" ref_url="https://www.suse.com/security/cve/CVE-2020-13113" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1553-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007105.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0793-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VOGSCWNCJDTFI3UJ7KXEWPODU7FRDVNO/" source="SUSE-SU"/>
    <description>
    An issue was discovered in libexif before 0.6.22. Use of uninitialized memory in EXIF Makernote handling could lead to crashes and potential use-after-free conditions.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13113/">CVE-2020-13113 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13113">CVE-2020-13113 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1172105">SUSE bug 1172105</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828535" comment="libexif-0.6.22-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828536" comment="libexif-devel-0.6.22-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828537" comment="libexif-doc-0.6.22-1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013114" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13114</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13114" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13114" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13114" ref_url="https://www.suse.com/security/cve/CVE-2020-13114" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1553-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007105.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0793-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VOGSCWNCJDTFI3UJ7KXEWPODU7FRDVNO/" source="SUSE-SU"/>
    <description>
    An issue was discovered in libexif before 0.6.22. An unrestricted size in handling Canon EXIF MakerNote data could lead to consumption of large amounts of compute time for decoding EXIF data.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-13114/">CVE-2020-13114 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13114">CVE-2020-13114 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1172121">SUSE bug 1172121</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828535" comment="libexif-0.6.22-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828536" comment="libexif-devel-0.6.22-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828537" comment="libexif-doc-0.6.22-1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013396" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13396</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13396" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13396" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13396" ref_url="https://www.suse.com/security/cve/CVE-2020-13396" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007279.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1090-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PMFBUGT3IBZIELBHFAWBVPCGUFYQHVRD/" source="SUSE-SU"/>
    <description>
    An issue was discovered in FreeRDP before 2.1.1. An out-of-bounds (OOB) read vulnerability has been detected in ntlm_read_ChallengeMessage in winpr/libwinpr/sspi/NTLM/ntlm_message.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-13396/">CVE-2020-13396 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13396">CVE-2020-13396 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1171441">SUSE bug 1171441</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828516" comment="freerdp-2.1.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828517" comment="freerdp-devel-2.1.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828518" comment="freerdp-libs-2.1.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828519" comment="libwinpr-2.1.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828520" comment="libwinpr-devel-2.1.1-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013397" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13397</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13397" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13397" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13397" ref_url="https://www.suse.com/security/cve/CVE-2020-13397" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007279.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1090-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PMFBUGT3IBZIELBHFAWBVPCGUFYQHVRD/" source="SUSE-SU"/>
    <description>
    An issue was discovered in FreeRDP before 2.1.1. An out-of-bounds (OOB) read vulnerability has been detected in security_fips_decrypt in libfreerdp/core/security.c due to an uninitialized value.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-13397/">CVE-2020-13397 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13397">CVE-2020-13397 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1171441">SUSE bug 1171441</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828516" comment="freerdp-2.1.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828517" comment="freerdp-devel-2.1.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828518" comment="freerdp-libs-2.1.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828519" comment="libwinpr-2.1.1-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828520" comment="libwinpr-devel-2.1.1-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013398" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13398</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13398" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13398" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13398" ref_url="https://www.suse.com/security/cve/CVE-2020-13398" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007279.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1090-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PMFBUGT3IBZIELBHFAWBVPCGUFYQHVRD/" source="SUSE-SU"/>
    <description>
    An issue was discovered in FreeRDP before 2.1.1. An out-of-bounds (OOB) write vulnerability has been detected in crypto_rsa_common in libfreerdp/crypto/crypto.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-13398/">CVE-2020-13398 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13398">CVE-2020-13398 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1171441">SUSE bug 1171441</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828013" comment="freerdp-2.0.0-4.rc4.el7_8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828014" comment="freerdp-devel-2.0.0-4.rc4.el7_8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828015" comment="freerdp-libs-2.0.0-4.rc4.el7_8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828016" comment="libwinpr-2.0.0-4.rc4.el7_8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828017" comment="libwinpr-devel-2.0.0-4.rc4.el7_8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013692" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13692</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13692" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13692" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13692" ref_url="https://www.suse.com/security/cve/CVE-2020-13692" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008368.html" source="SUSE-SU"/>
    <description>
    PostgreSQL JDBC Driver (aka PgJDBC) before 42.2.13 allows XXE.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-13692/">CVE-2020-13692 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13692">CVE-2020-13692 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1172746">SUSE bug 1172746</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828097" comment="postgresql-jdbc-9.2.1002-8.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828098" comment="postgresql-jdbc-javadoc-9.2.1002-8.el7_8 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013765" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13765</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13765" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13765" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13765" ref_url="https://www.suse.com/security/cve/CVE-2020-13765" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008673.html" source="SUSE-SU"/>
    <description>
    rom_copy() in hw/core/loader.c in QEMU 4.0 and 4.1.0 does not validate the relationship between two addresses, which allows attackers to trigger an invalid memory copy operation.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-13765/">CVE-2020-13765 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13765">CVE-2020-13765 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1172478">SUSE bug 1172478</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828934" comment="qemu-img-1.5.3-175.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828935" comment="qemu-kvm-1.5.3-175.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828936" comment="qemu-kvm-common-1.5.3-175.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828937" comment="qemu-kvm-tools-1.5.3-175.el7_9.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13817</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13817" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13817" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13817" ref_url="https://www.suse.com/security/cve/CVE-2020-13817" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0934-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BIQMBPSMZGTUEK5KJC4HX6YOA3YJ3SL6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1007-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JNRU5O2D5HWSXEDH4T2XTCSGOTFSCOIH/" source="SUSE-SU"/>
    <description>
    ntpd in ntp before 4.2.8p14 and 4.3.x before 4.3.100 allows remote attackers to cause a denial of service (daemon exit or system time change) by predicting transmit timestamps for use in spoofed packets. The victim must be relying on unauthenticated IPv4 time sources. There must be an off-path attacker who can query time from the victim's ntpd instance.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13817/">CVE-2020-13817 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13817">CVE-2020-13817 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1172651">SUSE bug 1172651</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828039" comment="ntp-4.2.6p5-29.el7_8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828040" comment="ntp-doc-4.2.6p5-29.el7_8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828041" comment="ntp-perl-4.2.6p5-29.el7_8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828042" comment="ntpdate-4.2.6p5-29.el7_8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828043" comment="sntp-4.2.6p5-29.el7_8.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013867" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13867</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13867" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13867" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13867" ref_url="https://www.suse.com/security/cve/CVE-2020-13867" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007313.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1141-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6BPXIASA4V6DSLONENRUIASAHPYZVW33/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1144-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4PX7JLIKRNS2RCCOLNHOGX47YIHEZFME/" source="SUSE-SU"/>
    <description>
    Open-iSCSI targetcli-fb through 2.1.52 has weak permissions for /etc/target (and for the backup directory and backup files).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-13867/">CVE-2020-13867 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13867">CVE-2020-13867 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1172743">SUSE bug 1172743</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828808" comment="targetcli-2.1.53-1.el7_9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013935" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13935</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13935" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13935" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13935" ref_url="https://www.suse.com/security/cve/CVE-2020-13935" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007410.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024949.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1102-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2SHR4A7AACRBE6SOGGZ4DHOUB2VN3CQ3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1111-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3NN6ZGANMSDS23UAUBMSBL5YPXFGFOO6/" source="SUSE-SU"/>
    <description>
    The payload length in a WebSocket frame was not correctly validated in Apache Tomcat 10.0.0-M1 to 10.0.0-M6, 9.0.0.M1 to 9.0.36, 8.5.0 to 8.5.56 and 7.0.27 to 7.0.104. Invalid payload lengths could trigger an infinite loop. Multiple requests with invalid payload lengths could lead to a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-27"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13935/">CVE-2020-13935 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13935">CVE-2020-13935 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1174117">SUSE bug 1174117</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828458" comment="tomcat-7.0.76-15.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828459" comment="tomcat-admin-webapps-7.0.76-15.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828460" comment="tomcat-docs-webapp-7.0.76-15.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828461" comment="tomcat-el-2.2-api-7.0.76-15.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828462" comment="tomcat-javadoc-7.0.76-15.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828463" comment="tomcat-jsp-2.2-api-7.0.76-15.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828464" comment="tomcat-jsvc-7.0.76-15.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828465" comment="tomcat-lib-7.0.76-15.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828466" comment="tomcat-servlet-3.0-api-7.0.76-15.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828467" comment="tomcat-webapps-7.0.76-15.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014019" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14019</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14019" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14019" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14019" ref_url="https://www.suse.com/security/cve/CVE-2020-14019" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007211.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1156-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2JAYTWHR6VYW7M5KLVZ2QEMLBDK5TCX4/" source="SUSE-SU"/>
    <description>
    Open-iSCSI rtslib-fb through 2.1.72 has weak permissions for /etc/target/saveconfig.json because shutil.copyfile (instead of shutil.copy) is used, and thus permissions are not preserved.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14019/">CVE-2020-14019 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14019">CVE-2020-14019 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1173257">SUSE bug 1173257</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828809" comment="python-rtslib-2.1.74-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828810" comment="python-rtslib-doc-2.1.74-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014145" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14145</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14145" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14145" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14145" ref_url="https://www.suse.com/security/cve/CVE-2020-14145" source="SUSE CVE"/>
		<reference ref_id="ESSA-2025:2889" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3866-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0022-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008149.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2240-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OTSUNUWKKFI2BZV3IR5RLHAQFXINNKM7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2298-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/D34ALFN2MMC67CCWTOANPH5DLTSAHLOG/" source="SUSE-SU"/>
    <description>
    The client side in OpenSSH 5.7 through 8.4 has an Observable Discrepancy leading to an information leak in the algorithm negotiation. This allows man-in-the-middle attackers to target initial connection attempts (where no host key for the server has been cached by the client). NOTE: some reports state that 8.5 and 8.6 are also affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-04-24"/>
	<updated date="2025-04-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14145/">CVE-2020-14145 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14145">CVE-2020-14145 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1173513">SUSE bug 1173513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177569">SUSE bug 1177569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189078">SUSE bug 1189078</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009976140" comment="openssh-7.4p1-23.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976141" comment="openssh-askpass-7.4p1-23.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976142" comment="openssh-cavs-7.4p1-23.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976143" comment="openssh-clients-7.4p1-23.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976144" comment="openssh-keycat-7.4p1-23.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976145" comment="openssh-ldap-7.4p1-23.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976146" comment="openssh-server-7.4p1-23.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976147" comment="openssh-server-sysvinit-7.4p1-23.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976148" comment="pam_ssh_agent_auth-0.10.3-2.23.el7_9.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014305" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14305</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14305" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14305" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14305" ref_url="https://www.suse.com/security/cve/CVE-2020-14305" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds memory write flaw was found in how the Linux kernel's Voice Over IP H.323 connection tracking functionality handled connections on ipv6 port 1720. This flaw allows an unauthenticated remote user to crash the system, causing a denial of service. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14305/">CVE-2020-14305 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14305">CVE-2020-14305 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1173346">SUSE bug 1173346</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828543" comment="bpftool-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828544" comment="kernel-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828545" comment="kernel-abi-whitelists-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828546" comment="kernel-debug-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828549" comment="kernel-doc-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828550" comment="kernel-headers-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828551" comment="kernel-tools-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828552" comment="kernel-tools-libs-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828554" comment="perf-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828555" comment="python-perf-3.10.0-1160.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014314" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14314</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14314" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14314" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14314" ref_url="https://www.suse.com/security/cve/CVE-2020-14314" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007348.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2576-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007393.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007405.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2610-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007426.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1325-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PR7IAIXMEHH4XQP5TC46UTZY6KWF5277/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1382-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZQA73YKYLNFVSY2PY7W2M2F3PSXXE566/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A memory out-of-bounds read flaw was found in the Linux kernel before 5.9-rc2 with the ext3/ext4 file system, in the way it accesses a directory with broken indexing. This flaw allows a local user to crash the system if the directory exists. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14314/">CVE-2020-14314 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14314">CVE-2020-14314 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1173798">SUSE bug 1173798</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828811" comment="bpftool-3.10.0-1160.11.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828812" comment="kernel-3.10.0-1160.11.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828813" comment="kernel-abi-whitelists-3.10.0-1160.11.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828814" comment="kernel-debug-3.10.0-1160.11.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828817" comment="kernel-doc-3.10.0-1160.11.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828818" comment="kernel-headers-3.10.0-1160.11.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828819" comment="kernel-tools-3.10.0-1160.11.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828820" comment="kernel-tools-libs-3.10.0-1160.11.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828822" comment="perf-3.10.0-1160.11.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828823" comment="python-perf-3.10.0-1160.11.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014318" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14318</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14318" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14318" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14318" ref_url="https://www.suse.com/security/cve/CVE-2020-14318" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008231.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1811-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CMACH6PT5L3O7PRJMZJJD6STDGKNEMN7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1819-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YCRJNTQTA2BOMDKWPLFYNJRR3S6WWE74/" source="SUSE-SU"/>
    <description>
    A flaw was found in the way samba handled file and directory permissions. An authenticated user could use this flaw to gain access to certain file and directory information which otherwise would be unavailable to the attacker.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14318/">CVE-2020-14318 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14318">CVE-2020-14318 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1173902">SUSE bug 1173902</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828824" comment="ctdb-4.10.16-9.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828825" comment="ctdb-tests-4.10.16-9.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828826" comment="libsmbclient-4.10.16-9.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828827" comment="libsmbclient-devel-4.10.16-9.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828828" comment="libwbclient-4.10.16-9.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828829" comment="libwbclient-devel-4.10.16-9.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828830" comment="samba-4.10.16-9.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828831" comment="samba-client-4.10.16-9.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828832" comment="samba-client-libs-4.10.16-9.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828833" comment="samba-common-4.10.16-9.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828834" comment="samba-common-libs-4.10.16-9.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828835" comment="samba-common-tools-4.10.16-9.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828836" comment="samba-dc-4.10.16-9.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828837" comment="samba-dc-libs-4.10.16-9.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828838" comment="samba-devel-4.10.16-9.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828839" comment="samba-krb5-printing-4.10.16-9.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828840" comment="samba-libs-4.10.16-9.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828841" comment="samba-pidl-4.10.16-9.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828842" comment="samba-python-4.10.16-9.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828843" comment="samba-python-test-4.10.16-9.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828844" comment="samba-test-4.10.16-9.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828845" comment="samba-test-libs-4.10.16-9.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828846" comment="samba-vfs-glusterfs-4.10.16-9.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828847" comment="samba-winbind-4.10.16-9.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828848" comment="samba-winbind-clients-4.10.16-9.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828849" comment="samba-winbind-krb5-locator-4.10.16-9.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828850" comment="samba-winbind-modules-4.10.16-9.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014323" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14323</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14323" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14323" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14323" ref_url="https://www.suse.com/security/cve/CVE-2020-14323" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1811-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CMACH6PT5L3O7PRJMZJJD6STDGKNEMN7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1819-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YCRJNTQTA2BOMDKWPLFYNJRR3S6WWE74/" source="SUSE-SU"/>
    <description>
    A null pointer dereference flaw was found in samba's Winbind service in versions before 4.11.15, before 4.12.9 and before 4.13.1. A local user could use this flaw to crash the winbind service causing denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14323/">CVE-2020-14323 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14323">CVE-2020-14323 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1173994">SUSE bug 1173994</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828824" comment="ctdb-4.10.16-9.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828825" comment="ctdb-tests-4.10.16-9.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828826" comment="libsmbclient-4.10.16-9.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828827" comment="libsmbclient-devel-4.10.16-9.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828828" comment="libwbclient-4.10.16-9.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828829" comment="libwbclient-devel-4.10.16-9.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828830" comment="samba-4.10.16-9.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828831" comment="samba-client-4.10.16-9.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828832" comment="samba-client-libs-4.10.16-9.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828833" comment="samba-common-4.10.16-9.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828834" comment="samba-common-libs-4.10.16-9.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828835" comment="samba-common-tools-4.10.16-9.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828836" comment="samba-dc-4.10.16-9.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828837" comment="samba-dc-libs-4.10.16-9.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828838" comment="samba-devel-4.10.16-9.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828839" comment="samba-krb5-printing-4.10.16-9.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828840" comment="samba-libs-4.10.16-9.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828841" comment="samba-pidl-4.10.16-9.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828842" comment="samba-python-4.10.16-9.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828843" comment="samba-python-test-4.10.16-9.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828844" comment="samba-test-4.10.16-9.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828845" comment="samba-test-libs-4.10.16-9.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828846" comment="samba-vfs-glusterfs-4.10.16-9.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828847" comment="samba-winbind-4.10.16-9.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828848" comment="samba-winbind-clients-4.10.16-9.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828849" comment="samba-winbind-krb5-locator-4.10.16-9.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828850" comment="samba-winbind-modules-4.10.16-9.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014331" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14331</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14331" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14331" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14331" ref_url="https://www.suse.com/security/cve/CVE-2020-14331" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2492-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007357.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007359.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007358.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2531-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2537-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2576-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007393.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007405.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2610-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1153-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5TP74A7GFRKHFHFASPUDW72EHCZZEIBB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1236-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RZBOHACFHPZE53IZN4OJDZ5XKOOT76WT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1325-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PR7IAIXMEHH4XQP5TC46UTZY6KWF5277/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel's implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14331/">CVE-2020-14331 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14331">CVE-2020-14331 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1174205">SUSE bug 1174205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174247">SUSE bug 1174247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828737" comment="bpftool-3.10.0-1160.6.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828738" comment="kernel-3.10.0-1160.6.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828739" comment="kernel-abi-whitelists-3.10.0-1160.6.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828740" comment="kernel-debug-3.10.0-1160.6.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828743" comment="kernel-doc-3.10.0-1160.6.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828744" comment="kernel-headers-3.10.0-1160.6.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828745" comment="kernel-tools-3.10.0-1160.6.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828746" comment="kernel-tools-libs-3.10.0-1160.6.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828748" comment="perf-3.10.0-1160.6.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828749" comment="python-perf-3.10.0-1160.6.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014345" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14345</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14345" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14345" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14345" ref_url="https://www.suse.com/security/cve/CVE-2020-14345" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007305.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1279-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2ZCBNEQPXRY7Y2OLJWKY3DOMNUWZTW4I/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1302-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PX4CWFHP6NLHKTSPGMXDTNPSALD3ZAFO/" source="SUSE-SU"/>
    <description>
    A flaw was found in X.Org Server before xorg-x11-server 1.20.9. An Out-Of-Bounds access in XkbSetNames function may lead to a privilege escalation vulnerability. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14345/">CVE-2020-14345 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14345">CVE-2020-14345 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1174635">SUSE bug 1174635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174638">SUSE bug 1174638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174908">SUSE bug 1174908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174910">SUSE bug 1174910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174913">SUSE bug 1174913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177596">SUSE bug 1177596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181067">SUSE bug 1181067</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828613" comment="xorg-x11-server-Xdmx-1.20.4-12.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828614" comment="xorg-x11-server-Xephyr-1.20.4-12.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828615" comment="xorg-x11-server-Xnest-1.20.4-12.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828616" comment="xorg-x11-server-Xorg-1.20.4-12.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828617" comment="xorg-x11-server-Xvfb-1.20.4-12.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828618" comment="xorg-x11-server-Xwayland-1.20.4-12.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828619" comment="xorg-x11-server-common-1.20.4-12.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828620" comment="xorg-x11-server-devel-1.20.4-12.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828621" comment="xorg-x11-server-source-1.20.4-12.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014346" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14346</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14346" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14346" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14346" ref_url="https://www.suse.com/security/cve/CVE-2020-14346" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007305.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1279-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2ZCBNEQPXRY7Y2OLJWKY3DOMNUWZTW4I/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1302-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PX4CWFHP6NLHKTSPGMXDTNPSALD3ZAFO/" source="SUSE-SU"/>
    <description>
    A flaw was found in xorg-x11-server before 1.20.9. An integer underflow in the X input extension protocol decoding in the X server may lead to arbitrary access of memory contents. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14346/">CVE-2020-14346 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14346">CVE-2020-14346 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1174635">SUSE bug 1174635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174638">SUSE bug 1174638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174910">SUSE bug 1174910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174913">SUSE bug 1174913</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828613" comment="xorg-x11-server-Xdmx-1.20.4-12.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828614" comment="xorg-x11-server-Xephyr-1.20.4-12.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828615" comment="xorg-x11-server-Xnest-1.20.4-12.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828616" comment="xorg-x11-server-Xorg-1.20.4-12.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828617" comment="xorg-x11-server-Xvfb-1.20.4-12.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828618" comment="xorg-x11-server-Xwayland-1.20.4-12.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828619" comment="xorg-x11-server-common-1.20.4-12.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828620" comment="xorg-x11-server-devel-1.20.4-12.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828621" comment="xorg-x11-server-source-1.20.4-12.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014347" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14347</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14347" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14347" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14347" ref_url="https://www.suse.com/security/cve/CVE-2020-14347" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007305.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1279-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2ZCBNEQPXRY7Y2OLJWKY3DOMNUWZTW4I/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1302-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PX4CWFHP6NLHKTSPGMXDTNPSALD3ZAFO/" source="SUSE-SU"/>
    <description>
    A flaw was found in the way xserver memory was not properly initialized. This could leak parts of server memory to the X client. In cases where Xorg server runs with elevated privileges, this could result in possible ASLR bypass. Xorg-server before version 1.20.9 is vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14347/">CVE-2020-14347 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14347">CVE-2020-14347 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1174633">SUSE bug 1174633</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828799" comment="xorg-x11-server-Xdmx-1.20.4-15.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828800" comment="xorg-x11-server-Xephyr-1.20.4-15.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828801" comment="xorg-x11-server-Xnest-1.20.4-15.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828802" comment="xorg-x11-server-Xorg-1.20.4-15.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828803" comment="xorg-x11-server-Xvfb-1.20.4-15.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828804" comment="xorg-x11-server-Xwayland-1.20.4-15.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828805" comment="xorg-x11-server-common-1.20.4-15.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828806" comment="xorg-x11-server-devel-1.20.4-15.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828807" comment="xorg-x11-server-source-1.20.4-15.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014351" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14351</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14351" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14351" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14351" ref_url="https://www.suse.com/security/cve/CVE-2020-14351" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007876.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1906-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W7MTGDUP74HR4XORTRYN7I7MANTKWCGQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2112-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4EZ6GLHJ7GRNO5SFTV2VI7JJOEEIMD6U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel. A use-after-free memory flaw was found in the perf subsystem allowing a local attacker with permission to monitor perf events to corrupt memory and possibly escalate privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14351/">CVE-2020-14351 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14351">CVE-2020-14351 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1177086">SUSE bug 1177086</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828991" comment="bpftool-3.10.0-1160.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828992" comment="kernel-3.10.0-1160.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828993" comment="kernel-abi-whitelists-3.10.0-1160.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828994" comment="kernel-debug-3.10.0-1160.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828997" comment="kernel-doc-3.10.0-1160.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828998" comment="kernel-headers-3.10.0-1160.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828999" comment="kernel-tools-3.10.0-1160.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829000" comment="kernel-tools-libs-3.10.0-1160.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829002" comment="perf-3.10.0-1160.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829003" comment="python-perf-3.10.0-1160.21.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014352" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14352</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14352" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14352" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14352" ref_url="https://www.suse.com/security/cve/CVE-2020-14352" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:1289-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2DH6WGXDJ45VIW5OBGKBLRE3HPNE3IPY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1428-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G7GZALJI63DQK5OFRITVFDO6O6KP72ST/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0277-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMUBDUMWN7YJEDAXCHHKHS3ODSQ7RUOF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0295-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GYLQMSF6PIISUQS6BSMK2ASAHIX4PTL5/" source="SUSE-SU"/>
    <description>
    A flaw was found in librepo in versions before 1.12.1. A directory traversal vulnerability was found where it failed to sanitize paths in remote repository metadata. An attacker controlling a remote repository may be able to copy files outside of the destination directory on the targeted system via path traversal. This flaw could potentially result in system compromise via the overwriting of critical system files. The highest threat from this flaw is to users that make use of untrusted third-party repositories.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14352/">CVE-2020-14352 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14352">CVE-2020-14352 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1175475">SUSE bug 1175475</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828699" comment="librepo-1.8.1-8.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828700" comment="librepo-devel-1.8.1-8.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828701" comment="python-librepo-1.8.1-8.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014355" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14355</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14355" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14355" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14355" ref_url="https://www.suse.com/security/cve/CVE-2020-14355" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-June/019243.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1905-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-June/019242.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1956-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008998.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1802-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GVCKE5FRMM4RYS2S4SPPRMJHEPI5JLFH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1803-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2XB6BAWYCJNLY7DVH2MQKCOGF5V2QOKE/" source="SUSE-SU"/>
    <description>
    Multiple buffer overflow vulnerabilities were found in the QUIC image decoding process of the SPICE remote display system, before spice-0.14.2-1. Both the SPICE client (spice-gtk) and server are affected by these flaws. These flaws allow a malicious client or server to send specially crafted messages that, when processed by the QUIC image compression algorithm, result in a process crash or potential code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14355/">CVE-2020-14355 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14355">CVE-2020-14355 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1177158">SUSE bug 1177158</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828580" comment="spice-glib-0.35-5.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828581" comment="spice-glib-devel-0.35-5.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828582" comment="spice-gtk-tools-0.35-5.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828583" comment="spice-gtk3-0.35-5.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828584" comment="spice-gtk3-devel-0.35-5.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828585" comment="spice-gtk3-vala-0.35-5.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828586" comment="spice-server-0.14.0-9.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828587" comment="spice-server-devel-0.14.0-9.el7_9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014360" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14360</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14360" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14360" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14360" ref_url="https://www.suse.com/security/cve/CVE-2020-14360" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007897.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2147-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HP4SY5GPVDDNTXYVZ6YALLHT7B5RVDBJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2186-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LJUVPABDGLSKQJMNPJUJBYOQTIDGD67K/" source="SUSE-SU"/>
    <description>
    A flaw was found in the X.Org Server before version 1.20.10. An out-of-bounds access in the XkbSetMap function may lead to a privilege escalation vulnerability. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14360/">CVE-2020-14360 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14360">CVE-2020-14360 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1174908">SUSE bug 1174908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177596">SUSE bug 1177596</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828799" comment="xorg-x11-server-Xdmx-1.20.4-15.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828800" comment="xorg-x11-server-Xephyr-1.20.4-15.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828801" comment="xorg-x11-server-Xnest-1.20.4-15.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828802" comment="xorg-x11-server-Xorg-1.20.4-15.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828803" comment="xorg-x11-server-Xvfb-1.20.4-15.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828804" comment="xorg-x11-server-Xwayland-1.20.4-15.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828805" comment="xorg-x11-server-common-1.20.4-15.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828806" comment="xorg-x11-server-devel-1.20.4-15.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828807" comment="xorg-x11-server-source-1.20.4-15.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014361" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14361</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14361" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14361" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14361" ref_url="https://www.suse.com/security/cve/CVE-2020-14361" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007349.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1374-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YUZTQB5FCFRZUSAFU6IQN53BAVRHXPQK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1376-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/I3BCFJDSKRVUSS6JJFN5VUGNSWDGF7KV/" source="SUSE-SU"/>
    <description>
    A flaw was found in X.Org Server before xorg-x11-server 1.20.9. An Integer underflow leading to heap-buffer overflow may lead to a privilege escalation vulnerability. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14361/">CVE-2020-14361 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14361">CVE-2020-14361 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1174635">SUSE bug 1174635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174638">SUSE bug 1174638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174910">SUSE bug 1174910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174913">SUSE bug 1174913</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828613" comment="xorg-x11-server-Xdmx-1.20.4-12.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828614" comment="xorg-x11-server-Xephyr-1.20.4-12.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828615" comment="xorg-x11-server-Xnest-1.20.4-12.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828616" comment="xorg-x11-server-Xorg-1.20.4-12.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828617" comment="xorg-x11-server-Xvfb-1.20.4-12.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828618" comment="xorg-x11-server-Xwayland-1.20.4-12.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828619" comment="xorg-x11-server-common-1.20.4-12.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828620" comment="xorg-x11-server-devel-1.20.4-12.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828621" comment="xorg-x11-server-source-1.20.4-12.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014362" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14362</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14362" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14362" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14362" ref_url="https://www.suse.com/security/cve/CVE-2020-14362" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007349.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1374-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YUZTQB5FCFRZUSAFU6IQN53BAVRHXPQK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1376-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/I3BCFJDSKRVUSS6JJFN5VUGNSWDGF7KV/" source="SUSE-SU"/>
    <description>
    A flaw was found in X.Org Server before xorg-x11-server 1.20.9. An Integer underflow leading to heap-buffer overflow may lead to a privilege escalation vulnerability. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14362/">CVE-2020-14362 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14362">CVE-2020-14362 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1174635">SUSE bug 1174635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174638">SUSE bug 1174638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174910">SUSE bug 1174910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174913">SUSE bug 1174913</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828613" comment="xorg-x11-server-Xdmx-1.20.4-12.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828614" comment="xorg-x11-server-Xephyr-1.20.4-12.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828615" comment="xorg-x11-server-Xnest-1.20.4-12.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828616" comment="xorg-x11-server-Xorg-1.20.4-12.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828617" comment="xorg-x11-server-Xvfb-1.20.4-12.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828618" comment="xorg-x11-server-Xwayland-1.20.4-12.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828619" comment="xorg-x11-server-common-1.20.4-12.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828620" comment="xorg-x11-server-devel-1.20.4-12.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828621" comment="xorg-x11-server-source-1.20.4-12.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014363" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14363</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14363" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14363" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14363" ref_url="https://www.suse.com/security/cve/CVE-2020-14363" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2474-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2475-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007895.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1368-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/766DDRWQZZ4JN2FX3CT4S2CZ6SZQUZOD/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1370-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IOZDBASQU5F6WB6XA5TE34NSNFRLX63O/" source="SUSE-SU"/>
    <description>
    An integer overflow vulnerability leading to a double-free was found in libX11. This flaw allows a local privileged attacker to cause an application compiled with libX11 to crash, or in some cases, result in arbitrary code execution. The highest threat from this flaw is to confidentiality, integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14363/">CVE-2020-14363 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14363">CVE-2020-14363 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1175239">SUSE bug 1175239</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828609" comment="libX11-1.6.7-3.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828610" comment="libX11-common-1.6.7-3.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828611" comment="libX11-devel-1.6.7-3.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014364" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14364</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14364" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14364" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14364" ref_url="https://www.suse.com/security/cve/CVE-2020-14364" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2877-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1942-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008990.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1664-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QVFXHYA5K5PLF3ZBKNJIJ5BFDWNHLJZM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1043-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SVDDMT7IUGYOEFTYO3UWD73PJMJL4FSY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1942-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IEKBDJBTGKO53MSKM3SRYVUQDWIJ2N5I/" source="SUSE-SU"/>
    <description>
    An out-of-bounds read/write access flaw was found in the USB emulator of the QEMU in versions before 5.2.0. This issue occurs while processing USB packets from a guest when USBDevice 'setup_len' exceeds its 'data_buf[4096]' in the do_token_in, do_token_out routines. This flaw allows a guest user to crash the QEMU process, resulting in a denial of service, or the potential execution of arbitrary code with the privileges of the QEMU process on the host.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14364/">CVE-2020-14364 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14364">CVE-2020-14364 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1175441">SUSE bug 1175441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175534">SUSE bug 1175534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176494">SUSE bug 1176494</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177130">SUSE bug 1177130</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828571" comment="qemu-img-1.5.3-175.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828572" comment="qemu-kvm-1.5.3-175.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828573" comment="qemu-kvm-common-1.5.3-175.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828574" comment="qemu-kvm-tools-1.5.3-175.el7_9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014372" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14372</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14372" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14372" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14372" ref_url="https://www.suse.com/security/cve/CVE-2020-14372" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0681-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008423.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008418.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-March/018162.html" source="SUSE-SU"/>
		<reference ref_id="TID000019892" ref_url="https://www.suse.com/support/kb/doc/?id=000019892" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0462-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XXPYL42MSKRB4D7LRFMW7PBGGLKSJKPS/" source="SUSE-SU"/>
    <description>
    A flaw was found in grub2 in versions prior to 2.06, where it incorrectly enables the usage of the ACPI command when Secure Boot is enabled. This flaw allows an attacker with privileged access to craft a Secondary System Description Table (SSDT) containing code to overwrite the Linux kernel lockdown variable content directly into memory. The table is further loaded and executed by the kernel, defeating its Secure Boot lockdown and allowing the attacker to load unsigned code. The highest threat from this vulnerability is to data confidentiality and integrity, as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14372/">CVE-2020-14372 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14372">CVE-2020-14372 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1175970">SUSE bug 1175970</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828968" comment="grub2-2.02-0.87.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828969" comment="grub2-common-2.02-0.87.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828970" comment="grub2-efi-ia32-2.02-0.87.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828971" comment="grub2-efi-ia32-cdboot-2.02-0.87.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828972" comment="grub2-efi-ia32-modules-2.02-0.87.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828973" comment="grub2-efi-x64-2.02-0.87.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828974" comment="grub2-efi-x64-cdboot-2.02-0.87.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828975" comment="grub2-efi-x64-modules-2.02-0.87.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828976" comment="grub2-pc-2.02-0.87.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828977" comment="grub2-pc-modules-2.02-0.87.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828978" comment="grub2-tools-2.02-0.87.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828979" comment="grub2-tools-extra-2.02-0.87.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828980" comment="grub2-tools-minimal-2.02-0.87.el7_9.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014385" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14385</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14385" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14385" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14385" ref_url="https://www.suse.com/security/cve/CVE-2020-14385" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007551.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1586-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AEK7Q7ZWE4WXOTEGJF4TF2SYKEP43GGZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel before 5.9-rc4. A failure of the file system metadata validator in XFS can cause an inode with a valid, user-creatable extended attribute to be flagged as corrupt. This can lead to the filesystem being shutdown, or otherwise rendered inaccessible until it is remounted, leading to a denial of service. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14385/">CVE-2020-14385 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14385">CVE-2020-14385 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1176137">SUSE bug 1176137</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828811" comment="bpftool-3.10.0-1160.11.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828812" comment="kernel-3.10.0-1160.11.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828813" comment="kernel-abi-whitelists-3.10.0-1160.11.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828814" comment="kernel-debug-3.10.0-1160.11.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828817" comment="kernel-doc-3.10.0-1160.11.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828818" comment="kernel-headers-3.10.0-1160.11.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828819" comment="kernel-tools-3.10.0-1160.11.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828820" comment="kernel-tools-libs-3.10.0-1160.11.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828822" comment="perf-3.10.0-1160.11.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828823" comment="python-perf-3.10.0-1160.11.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014422" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14422</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14422" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14422" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14422" ref_url="https://www.suse.com/security/cve/CVE-2020-14422" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:17-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008118.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0931-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EJ5YJ4DPLMATY2TORRUFGKKVWJH2NQVJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0940-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NBB2F3ACCOHHRVALSQOWIIKEDKQJDF7R/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0989-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GM3QZGSZPMW3D7HRZUC22RGSYILXCJAH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1002-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W3G3MHKIU5FV6NKK5GS7XEYQ6W3XV56Z/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2332-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S3JTHM6LLDKL7VPNRJUSRPNZAD2FZ25H/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2333-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FLGERALYYFTBIX3ZKPM6EQ2WJVUXLOXY/" source="SUSE-SU"/>
    <description>
    Lib/ipaddress.py in Python through 3.8.3 improperly computes hash values in the IPv4Interface and IPv6Interface classes, which might allow a remote attacker to cause a denial of service if an application is affected by the performance of a dictionary containing IPv4Interface or IPv6Interface objects, and this attacker can cause many dictionary entries to be created. This is fixed in: v3.5.10, v3.5.10rc1; v3.6.12; v3.7.9; v3.8.4, v3.8.4rc1, v3.8.5, v3.8.6, v3.8.6rc1; v3.9.0, v3.9.0b4, v3.9.0b5, v3.9.0rc1, v3.9.0rc2.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14422/">CVE-2020-14422 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14422">CVE-2020-14422 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1173274">SUSE bug 1173274</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828676" comment="python3-3.6.8-18.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828677" comment="python3-debug-3.6.8-18.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828678" comment="python3-devel-3.6.8-18.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828679" comment="python3-idle-3.6.8-18.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828680" comment="python3-libs-3.6.8-18.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828681" comment="python3-test-3.6.8-18.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828682" comment="python3-tkinter-3.6.8-18.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014556" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14556</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14556" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14556" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14556" ref_url="https://www.suse.com/security/cve/CVE-2020-14556" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1175-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OBVIPKYXH7UFEA4YILLJTCJFAKUA36GY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1191-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H4IIZ6ZBTN5B5RODTQKG5W6GMA4WEV5D/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1893-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HBBXJG37CKNUXLISK3DWSBAHF6A3VI34/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2048-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DJAO3FCIU7U6QFGCFQBWQ7AIAFG7CCLZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2083-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWRVFCOMHOVFD7QH66A4H74YOLORU4TF/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14556/">CVE-2020-14556 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14556">CVE-2020-14556 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1174157">SUSE bug 1174157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175259">SUSE bug 1175259</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828065" comment="java-1.8.0-openjdk-1.8.0.262.b10-0.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828066" comment="java-1.8.0-openjdk-accessibility-1.8.0.262.b10-0.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828067" comment="java-1.8.0-openjdk-demo-1.8.0.262.b10-0.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828068" comment="java-1.8.0-openjdk-devel-1.8.0.262.b10-0.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828069" comment="java-1.8.0-openjdk-headless-1.8.0.262.b10-0.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828070" comment="java-1.8.0-openjdk-javadoc-1.8.0.262.b10-0.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828071" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.262.b10-0.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828072" comment="java-1.8.0-openjdk-src-1.8.0.262.b10-0.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828073" comment="java-11-openjdk-11.0.8.10-0.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828074" comment="java-11-openjdk-demo-11.0.8.10-0.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828075" comment="java-11-openjdk-devel-11.0.8.10-0.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828076" comment="java-11-openjdk-headless-11.0.8.10-0.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828077" comment="java-11-openjdk-javadoc-11.0.8.10-0.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828078" comment="java-11-openjdk-javadoc-zip-11.0.8.10-0.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828079" comment="java-11-openjdk-jmods-11.0.8.10-0.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828080" comment="java-11-openjdk-src-11.0.8.10-0.el7_8 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014562" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14562</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14562" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14562" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14562" ref_url="https://www.suse.com/security/cve/CVE-2020-14562" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007229.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1175-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OBVIPKYXH7UFEA4YILLJTCJFAKUA36GY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1191-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H4IIZ6ZBTN5B5RODTQKG5W6GMA4WEV5D/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE product of Oracle Java SE (component: ImageIO). Supported versions that are affected are Java SE: 11.0.7 and 14.0.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14562/">CVE-2020-14562 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14562">CVE-2020-14562 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1174157">SUSE bug 1174157</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828073" comment="java-11-openjdk-11.0.8.10-0.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828074" comment="java-11-openjdk-demo-11.0.8.10-0.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828075" comment="java-11-openjdk-devel-11.0.8.10-0.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828076" comment="java-11-openjdk-headless-11.0.8.10-0.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828077" comment="java-11-openjdk-javadoc-11.0.8.10-0.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828078" comment="java-11-openjdk-javadoc-zip-11.0.8.10-0.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828079" comment="java-11-openjdk-jmods-11.0.8.10-0.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828080" comment="java-11-openjdk-src-11.0.8.10-0.el7_8 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014573" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14573</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14573" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14573" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14573" ref_url="https://www.suse.com/security/cve/CVE-2020-14573" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007229.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1175-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OBVIPKYXH7UFEA4YILLJTCJFAKUA36GY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1191-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H4IIZ6ZBTN5B5RODTQKG5W6GMA4WEV5D/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 11.0.7 and 14.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14573/">CVE-2020-14573 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14573">CVE-2020-14573 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1174157">SUSE bug 1174157</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828073" comment="java-11-openjdk-11.0.8.10-0.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828074" comment="java-11-openjdk-demo-11.0.8.10-0.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828075" comment="java-11-openjdk-devel-11.0.8.10-0.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828076" comment="java-11-openjdk-headless-11.0.8.10-0.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828077" comment="java-11-openjdk-javadoc-11.0.8.10-0.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828078" comment="java-11-openjdk-javadoc-zip-11.0.8.10-0.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828079" comment="java-11-openjdk-jmods-11.0.8.10-0.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828080" comment="java-11-openjdk-src-11.0.8.10-0.el7_8 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014577" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14577</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14577" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14577" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14577" ref_url="https://www.suse.com/security/cve/CVE-2020-14577" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007347.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1175-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OBVIPKYXH7UFEA4YILLJTCJFAKUA36GY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1191-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H4IIZ6ZBTN5B5RODTQKG5W6GMA4WEV5D/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1893-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HBBXJG37CKNUXLISK3DWSBAHF6A3VI34/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2048-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DJAO3FCIU7U6QFGCFQBWQ7AIAFG7CCLZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2083-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWRVFCOMHOVFD7QH66A4H74YOLORU4TF/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via TLS to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14577/">CVE-2020-14577 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14577">CVE-2020-14577 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1174157">SUSE bug 1174157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175259">SUSE bug 1175259</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828065" comment="java-1.8.0-openjdk-1.8.0.262.b10-0.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828066" comment="java-1.8.0-openjdk-accessibility-1.8.0.262.b10-0.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828067" comment="java-1.8.0-openjdk-demo-1.8.0.262.b10-0.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828068" comment="java-1.8.0-openjdk-devel-1.8.0.262.b10-0.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828069" comment="java-1.8.0-openjdk-headless-1.8.0.262.b10-0.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828070" comment="java-1.8.0-openjdk-javadoc-1.8.0.262.b10-0.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828071" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.262.b10-0.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828072" comment="java-1.8.0-openjdk-src-1.8.0.262.b10-0.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828073" comment="java-11-openjdk-11.0.8.10-0.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828074" comment="java-11-openjdk-demo-11.0.8.10-0.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828075" comment="java-11-openjdk-devel-11.0.8.10-0.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828076" comment="java-11-openjdk-headless-11.0.8.10-0.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828077" comment="java-11-openjdk-javadoc-11.0.8.10-0.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828078" comment="java-11-openjdk-javadoc-zip-11.0.8.10-0.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828079" comment="java-11-openjdk-jmods-11.0.8.10-0.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828080" comment="java-11-openjdk-src-11.0.8.10-0.el7_8 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014578" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14578</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14578" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14578" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14578" ref_url="https://www.suse.com/security/cve/CVE-2020-14578" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007347.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1893-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HBBXJG37CKNUXLISK3DWSBAHF6A3VI34/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2048-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DJAO3FCIU7U6QFGCFQBWQ7AIAFG7CCLZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2083-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWRVFCOMHOVFD7QH66A4H74YOLORU4TF/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u261 and 8u251; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14578/">CVE-2020-14578 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14578">CVE-2020-14578 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1174157">SUSE bug 1174157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175259">SUSE bug 1175259</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828065" comment="java-1.8.0-openjdk-1.8.0.262.b10-0.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828066" comment="java-1.8.0-openjdk-accessibility-1.8.0.262.b10-0.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828067" comment="java-1.8.0-openjdk-demo-1.8.0.262.b10-0.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828068" comment="java-1.8.0-openjdk-devel-1.8.0.262.b10-0.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828069" comment="java-1.8.0-openjdk-headless-1.8.0.262.b10-0.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828070" comment="java-1.8.0-openjdk-javadoc-1.8.0.262.b10-0.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828071" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.262.b10-0.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828072" comment="java-1.8.0-openjdk-src-1.8.0.262.b10-0.el7_8 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014579" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14579</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14579" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14579" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14579" ref_url="https://www.suse.com/security/cve/CVE-2020-14579" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007347.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1893-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HBBXJG37CKNUXLISK3DWSBAHF6A3VI34/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2048-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DJAO3FCIU7U6QFGCFQBWQ7AIAFG7CCLZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2083-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWRVFCOMHOVFD7QH66A4H74YOLORU4TF/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u261 and 8u251; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14579/">CVE-2020-14579 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14579">CVE-2020-14579 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1174157">SUSE bug 1174157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175259">SUSE bug 1175259</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828065" comment="java-1.8.0-openjdk-1.8.0.262.b10-0.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828066" comment="java-1.8.0-openjdk-accessibility-1.8.0.262.b10-0.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828067" comment="java-1.8.0-openjdk-demo-1.8.0.262.b10-0.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828068" comment="java-1.8.0-openjdk-devel-1.8.0.262.b10-0.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828069" comment="java-1.8.0-openjdk-headless-1.8.0.262.b10-0.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828070" comment="java-1.8.0-openjdk-javadoc-1.8.0.262.b10-0.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828071" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.262.b10-0.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828072" comment="java-1.8.0-openjdk-src-1.8.0.262.b10-0.el7_8 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014583" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14583</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14583" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14583" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14583" ref_url="https://www.suse.com/security/cve/CVE-2020-14583" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007347.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1175-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OBVIPKYXH7UFEA4YILLJTCJFAKUA36GY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1191-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H4IIZ6ZBTN5B5RODTQKG5W6GMA4WEV5D/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1893-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HBBXJG37CKNUXLISK3DWSBAHF6A3VI34/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2048-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DJAO3FCIU7U6QFGCFQBWQ7AIAFG7CCLZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2083-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWRVFCOMHOVFD7QH66A4H74YOLORU4TF/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14583/">CVE-2020-14583 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14583">CVE-2020-14583 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1174157">SUSE bug 1174157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175259">SUSE bug 1175259</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828065" comment="java-1.8.0-openjdk-1.8.0.262.b10-0.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828066" comment="java-1.8.0-openjdk-accessibility-1.8.0.262.b10-0.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828067" comment="java-1.8.0-openjdk-demo-1.8.0.262.b10-0.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828068" comment="java-1.8.0-openjdk-devel-1.8.0.262.b10-0.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828069" comment="java-1.8.0-openjdk-headless-1.8.0.262.b10-0.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828070" comment="java-1.8.0-openjdk-javadoc-1.8.0.262.b10-0.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828071" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.262.b10-0.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828072" comment="java-1.8.0-openjdk-src-1.8.0.262.b10-0.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828073" comment="java-11-openjdk-11.0.8.10-0.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828074" comment="java-11-openjdk-demo-11.0.8.10-0.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828075" comment="java-11-openjdk-devel-11.0.8.10-0.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828076" comment="java-11-openjdk-headless-11.0.8.10-0.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828077" comment="java-11-openjdk-javadoc-11.0.8.10-0.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828078" comment="java-11-openjdk-javadoc-zip-11.0.8.10-0.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828079" comment="java-11-openjdk-jmods-11.0.8.10-0.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828080" comment="java-11-openjdk-src-11.0.8.10-0.el7_8 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014593" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14593</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14593" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14593" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14593" ref_url="https://www.suse.com/security/cve/CVE-2020-14593" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007347.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1175-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OBVIPKYXH7UFEA4YILLJTCJFAKUA36GY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1191-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H4IIZ6ZBTN5B5RODTQKG5W6GMA4WEV5D/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1893-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HBBXJG37CKNUXLISK3DWSBAHF6A3VI34/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2048-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DJAO3FCIU7U6QFGCFQBWQ7AIAFG7CCLZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2083-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWRVFCOMHOVFD7QH66A4H74YOLORU4TF/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 7.4 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-14593/">CVE-2020-14593 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14593">CVE-2020-14593 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1174157">SUSE bug 1174157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175259">SUSE bug 1175259</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828065" comment="java-1.8.0-openjdk-1.8.0.262.b10-0.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828066" comment="java-1.8.0-openjdk-accessibility-1.8.0.262.b10-0.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828067" comment="java-1.8.0-openjdk-demo-1.8.0.262.b10-0.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828068" comment="java-1.8.0-openjdk-devel-1.8.0.262.b10-0.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828069" comment="java-1.8.0-openjdk-headless-1.8.0.262.b10-0.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828070" comment="java-1.8.0-openjdk-javadoc-1.8.0.262.b10-0.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828071" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.262.b10-0.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828072" comment="java-1.8.0-openjdk-src-1.8.0.262.b10-0.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828073" comment="java-11-openjdk-11.0.8.10-0.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828074" comment="java-11-openjdk-demo-11.0.8.10-0.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828075" comment="java-11-openjdk-devel-11.0.8.10-0.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828076" comment="java-11-openjdk-headless-11.0.8.10-0.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828077" comment="java-11-openjdk-javadoc-11.0.8.10-0.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828078" comment="java-11-openjdk-javadoc-zip-11.0.8.10-0.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828079" comment="java-11-openjdk-jmods-11.0.8.10-0.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828080" comment="java-11-openjdk-src-11.0.8.10-0.el7_8 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014621" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14621</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14621" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14621" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14621" ref_url="https://www.suse.com/security/cve/CVE-2020-14621" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007347.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1175-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OBVIPKYXH7UFEA4YILLJTCJFAKUA36GY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1191-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H4IIZ6ZBTN5B5RODTQKG5W6GMA4WEV5D/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1893-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HBBXJG37CKNUXLISK3DWSBAHF6A3VI34/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2048-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DJAO3FCIU7U6QFGCFQBWQ7AIAFG7CCLZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2083-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWRVFCOMHOVFD7QH66A4H74YOLORU4TF/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JAXP). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14621/">CVE-2020-14621 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14621">CVE-2020-14621 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1174157">SUSE bug 1174157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175259">SUSE bug 1175259</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828065" comment="java-1.8.0-openjdk-1.8.0.262.b10-0.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828066" comment="java-1.8.0-openjdk-accessibility-1.8.0.262.b10-0.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828067" comment="java-1.8.0-openjdk-demo-1.8.0.262.b10-0.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828068" comment="java-1.8.0-openjdk-devel-1.8.0.262.b10-0.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828069" comment="java-1.8.0-openjdk-headless-1.8.0.262.b10-0.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828070" comment="java-1.8.0-openjdk-javadoc-1.8.0.262.b10-0.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828071" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.262.b10-0.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828072" comment="java-1.8.0-openjdk-src-1.8.0.262.b10-0.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828073" comment="java-11-openjdk-11.0.8.10-0.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828074" comment="java-11-openjdk-demo-11.0.8.10-0.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828075" comment="java-11-openjdk-devel-11.0.8.10-0.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828076" comment="java-11-openjdk-headless-11.0.8.10-0.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828077" comment="java-11-openjdk-javadoc-11.0.8.10-0.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828078" comment="java-11-openjdk-javadoc-zip-11.0.8.10-0.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828079" comment="java-11-openjdk-jmods-11.0.8.10-0.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828080" comment="java-11-openjdk-src-11.0.8.10-0.el7_8 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20201472" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-1472</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-1472" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1472" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-1472" ref_url="https://www.suse.com/security/cve/CVE-2020-1472" source="SUSE CVE"/>
		<reference ref_id="BLOG-ZEROLOGON" ref_url="https://www.suse.com/c/suse-addresses-zerologon-vulnerability/" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:4496-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-December/026906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2722-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007469.html" source="SUSE-SU"/>
		<reference ref_id="TID000019713" ref_url="https://www.suse.com/support/kb/doc/?id=000019713" source="SUSE-SU"/>
		<reference ref_id="TID000021140" ref_url="https://www.suse.com/support/kb/doc/?id=000021140" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1513-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KIFWB3J2XLNWGA6COF3AOZWWE5GEZ7FK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1526-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CLGH2D6JTPXQWFIDKIDMP5POGFAESAKI/" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-08"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1472/">CVE-2020-1472 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1472">CVE-2020-1472 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1176579">SUSE bug 1176579</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828824" comment="ctdb-4.10.16-9.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828825" comment="ctdb-tests-4.10.16-9.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828826" comment="libsmbclient-4.10.16-9.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828827" comment="libsmbclient-devel-4.10.16-9.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828828" comment="libwbclient-4.10.16-9.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828829" comment="libwbclient-devel-4.10.16-9.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828830" comment="samba-4.10.16-9.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828831" comment="samba-client-4.10.16-9.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828832" comment="samba-client-libs-4.10.16-9.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828833" comment="samba-common-4.10.16-9.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828834" comment="samba-common-libs-4.10.16-9.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828835" comment="samba-common-tools-4.10.16-9.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828836" comment="samba-dc-4.10.16-9.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828837" comment="samba-dc-libs-4.10.16-9.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828838" comment="samba-devel-4.10.16-9.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828839" comment="samba-krb5-printing-4.10.16-9.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828840" comment="samba-libs-4.10.16-9.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828841" comment="samba-pidl-4.10.16-9.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828842" comment="samba-python-4.10.16-9.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828843" comment="samba-python-test-4.10.16-9.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828844" comment="samba-test-4.10.16-9.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828845" comment="samba-test-libs-4.10.16-9.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828846" comment="samba-vfs-glusterfs-4.10.16-9.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828847" comment="samba-winbind-4.10.16-9.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828848" comment="samba-winbind-clients-4.10.16-9.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828849" comment="samba-winbind-krb5-locator-4.10.16-9.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828850" comment="samba-winbind-modules-4.10.16-9.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014779" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14779</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14779" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14779" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14779" ref_url="https://www.suse.com/security/cve/CVE-2020-14779" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3932-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0019-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008155.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1893-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HBBXJG37CKNUXLISK3DWSBAHF6A3VI34/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1984-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4JSWTDWV5MMTZOHS5HIFMSHB3IUNUEUX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1994-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y5I3H5OR336ZSCD3OKSPETQ54YCFESWA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2048-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DJAO3FCIU7U6QFGCFQBWQ7AIAFG7CCLZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2083-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWRVFCOMHOVFD7QH66A4H74YOLORU4TF/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14779/">CVE-2020-14779 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14779">CVE-2020-14779 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1177943">SUSE bug 1177943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180063">SUSE bug 1180063</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828598" comment="java-1.8.0-openjdk-1.8.0.272.b10-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828599" comment="java-1.8.0-openjdk-accessibility-1.8.0.272.b10-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828600" comment="java-1.8.0-openjdk-demo-1.8.0.272.b10-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828601" comment="java-1.8.0-openjdk-devel-1.8.0.272.b10-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828602" comment="java-1.8.0-openjdk-headless-1.8.0.272.b10-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828603" comment="java-1.8.0-openjdk-javadoc-1.8.0.272.b10-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828604" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.272.b10-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828605" comment="java-1.8.0-openjdk-src-1.8.0.272.b10-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828588" comment="java-11-openjdk-11.0.9.11-0.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828589" comment="java-11-openjdk-demo-11.0.9.11-0.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828590" comment="java-11-openjdk-devel-11.0.9.11-0.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828591" comment="java-11-openjdk-headless-11.0.9.11-0.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828592" comment="java-11-openjdk-javadoc-11.0.9.11-0.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828593" comment="java-11-openjdk-javadoc-zip-11.0.9.11-0.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828594" comment="java-11-openjdk-jmods-11.0.9.11-0.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828595" comment="java-11-openjdk-src-11.0.9.11-0.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828596" comment="java-11-openjdk-static-libs-11.0.9.11-0.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014781" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14781</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14781" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14781" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14781" ref_url="https://www.suse.com/security/cve/CVE-2020-14781" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3932-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0019-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008155.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1893-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HBBXJG37CKNUXLISK3DWSBAHF6A3VI34/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1984-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4JSWTDWV5MMTZOHS5HIFMSHB3IUNUEUX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1994-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y5I3H5OR336ZSCD3OKSPETQ54YCFESWA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2048-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DJAO3FCIU7U6QFGCFQBWQ7AIAFG7CCLZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2083-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWRVFCOMHOVFD7QH66A4H74YOLORU4TF/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JNDI). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14781/">CVE-2020-14781 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14781">CVE-2020-14781 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1177943">SUSE bug 1177943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180063">SUSE bug 1180063</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828598" comment="java-1.8.0-openjdk-1.8.0.272.b10-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828599" comment="java-1.8.0-openjdk-accessibility-1.8.0.272.b10-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828600" comment="java-1.8.0-openjdk-demo-1.8.0.272.b10-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828601" comment="java-1.8.0-openjdk-devel-1.8.0.272.b10-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828602" comment="java-1.8.0-openjdk-headless-1.8.0.272.b10-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828603" comment="java-1.8.0-openjdk-javadoc-1.8.0.272.b10-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828604" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.272.b10-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828605" comment="java-1.8.0-openjdk-src-1.8.0.272.b10-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828588" comment="java-11-openjdk-11.0.9.11-0.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828589" comment="java-11-openjdk-demo-11.0.9.11-0.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828590" comment="java-11-openjdk-devel-11.0.9.11-0.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828591" comment="java-11-openjdk-headless-11.0.9.11-0.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828592" comment="java-11-openjdk-javadoc-11.0.9.11-0.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828593" comment="java-11-openjdk-javadoc-zip-11.0.9.11-0.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828594" comment="java-11-openjdk-jmods-11.0.9.11-0.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828595" comment="java-11-openjdk-src-11.0.9.11-0.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828596" comment="java-11-openjdk-static-libs-11.0.9.11-0.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014782" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14782</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14782" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14782" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14782" ref_url="https://www.suse.com/security/cve/CVE-2020-14782" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0019-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1893-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HBBXJG37CKNUXLISK3DWSBAHF6A3VI34/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1984-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4JSWTDWV5MMTZOHS5HIFMSHB3IUNUEUX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1994-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y5I3H5OR336ZSCD3OKSPETQ54YCFESWA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2048-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DJAO3FCIU7U6QFGCFQBWQ7AIAFG7CCLZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2083-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWRVFCOMHOVFD7QH66A4H74YOLORU4TF/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14782/">CVE-2020-14782 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14782">CVE-2020-14782 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1177943">SUSE bug 1177943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180063">SUSE bug 1180063</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828598" comment="java-1.8.0-openjdk-1.8.0.272.b10-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828599" comment="java-1.8.0-openjdk-accessibility-1.8.0.272.b10-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828600" comment="java-1.8.0-openjdk-demo-1.8.0.272.b10-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828601" comment="java-1.8.0-openjdk-devel-1.8.0.272.b10-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828602" comment="java-1.8.0-openjdk-headless-1.8.0.272.b10-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828603" comment="java-1.8.0-openjdk-javadoc-1.8.0.272.b10-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828604" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.272.b10-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828605" comment="java-1.8.0-openjdk-src-1.8.0.272.b10-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828588" comment="java-11-openjdk-11.0.9.11-0.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828589" comment="java-11-openjdk-demo-11.0.9.11-0.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828590" comment="java-11-openjdk-devel-11.0.9.11-0.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828591" comment="java-11-openjdk-headless-11.0.9.11-0.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828592" comment="java-11-openjdk-javadoc-11.0.9.11-0.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828593" comment="java-11-openjdk-javadoc-zip-11.0.9.11-0.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828594" comment="java-11-openjdk-jmods-11.0.9.11-0.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828595" comment="java-11-openjdk-src-11.0.9.11-0.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828596" comment="java-11-openjdk-static-libs-11.0.9.11-0.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014792" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14792</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14792" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14792" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14792" ref_url="https://www.suse.com/security/cve/CVE-2020-14792" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3932-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0019-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008155.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1893-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HBBXJG37CKNUXLISK3DWSBAHF6A3VI34/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1984-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4JSWTDWV5MMTZOHS5HIFMSHB3IUNUEUX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1994-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y5I3H5OR336ZSCD3OKSPETQ54YCFESWA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2048-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DJAO3FCIU7U6QFGCFQBWQ7AIAFG7CCLZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2083-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWRVFCOMHOVFD7QH66A4H74YOLORU4TF/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 4.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14792/">CVE-2020-14792 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14792">CVE-2020-14792 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1177943">SUSE bug 1177943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180063">SUSE bug 1180063</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828598" comment="java-1.8.0-openjdk-1.8.0.272.b10-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828599" comment="java-1.8.0-openjdk-accessibility-1.8.0.272.b10-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828600" comment="java-1.8.0-openjdk-demo-1.8.0.272.b10-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828601" comment="java-1.8.0-openjdk-devel-1.8.0.272.b10-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828602" comment="java-1.8.0-openjdk-headless-1.8.0.272.b10-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828603" comment="java-1.8.0-openjdk-javadoc-1.8.0.272.b10-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828604" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.272.b10-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828605" comment="java-1.8.0-openjdk-src-1.8.0.272.b10-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828588" comment="java-11-openjdk-11.0.9.11-0.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828589" comment="java-11-openjdk-demo-11.0.9.11-0.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828590" comment="java-11-openjdk-devel-11.0.9.11-0.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828591" comment="java-11-openjdk-headless-11.0.9.11-0.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828592" comment="java-11-openjdk-javadoc-11.0.9.11-0.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828593" comment="java-11-openjdk-javadoc-zip-11.0.9.11-0.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828594" comment="java-11-openjdk-jmods-11.0.9.11-0.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828595" comment="java-11-openjdk-src-11.0.9.11-0.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828596" comment="java-11-openjdk-static-libs-11.0.9.11-0.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014796" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14796</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14796" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14796" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14796" ref_url="https://www.suse.com/security/cve/CVE-2020-14796" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3932-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0019-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008155.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1893-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HBBXJG37CKNUXLISK3DWSBAHF6A3VI34/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1984-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4JSWTDWV5MMTZOHS5HIFMSHB3IUNUEUX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1994-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y5I3H5OR336ZSCD3OKSPETQ54YCFESWA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2048-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DJAO3FCIU7U6QFGCFQBWQ7AIAFG7CCLZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2083-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWRVFCOMHOVFD7QH66A4H74YOLORU4TF/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14796/">CVE-2020-14796 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14796">CVE-2020-14796 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1177943">SUSE bug 1177943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180063">SUSE bug 1180063</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828598" comment="java-1.8.0-openjdk-1.8.0.272.b10-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828599" comment="java-1.8.0-openjdk-accessibility-1.8.0.272.b10-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828600" comment="java-1.8.0-openjdk-demo-1.8.0.272.b10-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828601" comment="java-1.8.0-openjdk-devel-1.8.0.272.b10-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828602" comment="java-1.8.0-openjdk-headless-1.8.0.272.b10-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828603" comment="java-1.8.0-openjdk-javadoc-1.8.0.272.b10-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828604" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.272.b10-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828605" comment="java-1.8.0-openjdk-src-1.8.0.272.b10-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828588" comment="java-11-openjdk-11.0.9.11-0.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828589" comment="java-11-openjdk-demo-11.0.9.11-0.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828590" comment="java-11-openjdk-devel-11.0.9.11-0.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828591" comment="java-11-openjdk-headless-11.0.9.11-0.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828592" comment="java-11-openjdk-javadoc-11.0.9.11-0.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828593" comment="java-11-openjdk-javadoc-zip-11.0.9.11-0.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828594" comment="java-11-openjdk-jmods-11.0.9.11-0.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828595" comment="java-11-openjdk-src-11.0.9.11-0.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828596" comment="java-11-openjdk-static-libs-11.0.9.11-0.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14797</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14797" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14797" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14797" ref_url="https://www.suse.com/security/cve/CVE-2020-14797" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3932-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0019-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008155.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1893-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HBBXJG37CKNUXLISK3DWSBAHF6A3VI34/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1984-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4JSWTDWV5MMTZOHS5HIFMSHB3IUNUEUX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1994-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y5I3H5OR336ZSCD3OKSPETQ54YCFESWA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2048-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DJAO3FCIU7U6QFGCFQBWQ7AIAFG7CCLZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2083-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWRVFCOMHOVFD7QH66A4H74YOLORU4TF/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14797/">CVE-2020-14797 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14797">CVE-2020-14797 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1177943">SUSE bug 1177943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180063">SUSE bug 1180063</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828598" comment="java-1.8.0-openjdk-1.8.0.272.b10-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828599" comment="java-1.8.0-openjdk-accessibility-1.8.0.272.b10-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828600" comment="java-1.8.0-openjdk-demo-1.8.0.272.b10-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828601" comment="java-1.8.0-openjdk-devel-1.8.0.272.b10-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828602" comment="java-1.8.0-openjdk-headless-1.8.0.272.b10-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828603" comment="java-1.8.0-openjdk-javadoc-1.8.0.272.b10-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828604" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.272.b10-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828605" comment="java-1.8.0-openjdk-src-1.8.0.272.b10-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828588" comment="java-11-openjdk-11.0.9.11-0.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828589" comment="java-11-openjdk-demo-11.0.9.11-0.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828590" comment="java-11-openjdk-devel-11.0.9.11-0.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828591" comment="java-11-openjdk-headless-11.0.9.11-0.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828592" comment="java-11-openjdk-javadoc-11.0.9.11-0.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828593" comment="java-11-openjdk-javadoc-zip-11.0.9.11-0.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828594" comment="java-11-openjdk-jmods-11.0.9.11-0.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828595" comment="java-11-openjdk-src-11.0.9.11-0.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828596" comment="java-11-openjdk-static-libs-11.0.9.11-0.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014803" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14803</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14803" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14803" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14803" ref_url="https://www.suse.com/security/cve/CVE-2020-14803" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3932-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0019-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008405.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0670-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14634-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008347.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008363.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1893-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HBBXJG37CKNUXLISK3DWSBAHF6A3VI34/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1984-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4JSWTDWV5MMTZOHS5HIFMSHB3IUNUEUX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1994-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y5I3H5OR336ZSCD3OKSPETQ54YCFESWA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2048-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DJAO3FCIU7U6QFGCFQBWQ7AIAFG7CCLZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2083-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWRVFCOMHOVFD7QH66A4H74YOLORU4TF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0374-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IE6Q2IB2YXUXIWFBPF2P2FIHVNJLBUPC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GS63GCBRVH7N4JEIZNQAPVFNNVB2OGSU/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 11.0.8 and 15. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14803/">CVE-2020-14803 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14803">CVE-2020-14803 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1177943">SUSE bug 1177943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181239">SUSE bug 1181239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182186">SUSE bug 1182186</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828598" comment="java-1.8.0-openjdk-1.8.0.272.b10-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828599" comment="java-1.8.0-openjdk-accessibility-1.8.0.272.b10-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828600" comment="java-1.8.0-openjdk-demo-1.8.0.272.b10-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828601" comment="java-1.8.0-openjdk-devel-1.8.0.272.b10-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828602" comment="java-1.8.0-openjdk-headless-1.8.0.272.b10-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828603" comment="java-1.8.0-openjdk-javadoc-1.8.0.272.b10-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828604" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.272.b10-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828605" comment="java-1.8.0-openjdk-src-1.8.0.272.b10-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828588" comment="java-11-openjdk-11.0.9.11-0.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828589" comment="java-11-openjdk-demo-11.0.9.11-0.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828590" comment="java-11-openjdk-devel-11.0.9.11-0.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828591" comment="java-11-openjdk-headless-11.0.9.11-0.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828592" comment="java-11-openjdk-javadoc-11.0.9.11-0.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828593" comment="java-11-openjdk-javadoc-zip-11.0.9.11-0.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828594" comment="java-11-openjdk-jmods-11.0.9.11-0.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828595" comment="java-11-openjdk-src-11.0.9.11-0.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828596" comment="java-11-openjdk-static-libs-11.0.9.11-0.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015049" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15049</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15049" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15049" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15049" ref_url="https://www.suse.com/security/cve/CVE-2020-15049" source="SUSE CVE"/>
		<reference ref_id="GHSA-qf3v-rc95-96j5" ref_url="https://github.com/squid-cache/squid/security/advisories//GHSA-qf3v-rc95-96j5" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007332.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1346-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7ZLGD6G3KY7JU2TB5YQO7CEN77XZWRYS/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1369-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UMN3THRFFUTAXOEGHNHSGKY647AMB7D6/" source="SUSE-SU"/>
    <description>
    An issue was discovered in http/ContentLengthInterpreter.cc in Squid before 4.12 and 5.x before 5.0.3. A Request Smuggling and Poisoning attack can succeed against the HTTP cache. The client sends an HTTP request with a Content-Length header containing "+\ "-" or an uncommon shell whitespace character prefix to the length field-value.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15049/">CVE-2020-15049 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15049">CVE-2020-15049 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1173455">SUSE bug 1173455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174381">SUSE bug 1174381</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828576" comment="squid-3.5.20-17.el7_9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828577" comment="squid-migration-script-3.5.20-17.el7_9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828578" comment="squid-sysvinit-3.5.20-17.el7_9.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015436" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15436</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15436" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15436" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15436" ref_url="https://www.suse.com/security/cve/CVE-2020-15436" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3718-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2161-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ICEKZTGIQ6MSKDFOTIOJ2RLWAWJFPSYA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2193-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4YRSQJNKLIOJJTD3P2UKMHRFMCIG3JDN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2260-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZYES3O2NEKKQXQ3R5CZOH5YCWJ3TJSKH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in fs/block_dev.c in the Linux kernel before 5.8 allows local users to gain privileges or cause a denial of service by leveraging improper access to a certain error field.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15436/">CVE-2020-15436 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15436">CVE-2020-15436 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1179141">SUSE bug 1179141</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828886" comment="bpftool-3.10.0-1160.15.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828887" comment="kernel-3.10.0-1160.15.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828888" comment="kernel-abi-whitelists-3.10.0-1160.15.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828889" comment="kernel-debug-3.10.0-1160.15.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828892" comment="kernel-doc-3.10.0-1160.15.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828893" comment="kernel-headers-3.10.0-1160.15.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828894" comment="kernel-tools-3.10.0-1160.15.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828895" comment="kernel-tools-libs-3.10.0-1160.15.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828897" comment="perf-3.10.0-1160.15.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828898" comment="python-perf-3.10.0-1160.15.2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015648" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15648</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15648" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15648" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15648" ref_url="https://www.suse.com/security/cve/CVE-2020-15648" source="SUSE CVE"/>
    <description>
    Using object or embed tags, it was possible to frame other websites, even if they disallowed framing using the X-Frame-Options header. This vulnerability affects Thunderbird &lt; 78 and Firefox &lt; 78.0.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15648/">CVE-2020-15648 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15648">CVE-2020-15648 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1173948">SUSE bug 1173948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174230">SUSE bug 1174230</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828575" comment="firefox-78.3.0-1.el7_9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015652" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15652</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15652" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15652" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15652" ref_url="https://www.suse.com/security/cve/CVE-2020-15652" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007233.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007246.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1147-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5DGEDDAZOZ3MVQ6CTQDOF3OY2ZULXYVT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1155-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R6BL5GAJDZT5KI6F57UOVMEACIM4SELV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1179-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7GAJX7QWS3CXVO7O3GQRKSU7ZZGE2NY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1189-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UBKX3FDVNS55I25FQR4AZLPCXUHCR5TX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1205-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LRVUDBACBZNNAF7T4L2HIQYOBVY5TJX7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    By observing the stack trace for JavaScript errors in web workers, it was possible to leak the result of a cross-origin redirect. This applied only to content that can be parsed as script. This vulnerability affects Firefox &lt; 79, Firefox ESR &lt; 68.11, Firefox ESR &lt; 78.1, Thunderbird &lt; 68.11, and Thunderbird &lt; 78.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-15652/">CVE-2020-15652 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15652">CVE-2020-15652 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1174538">SUSE bug 1174538</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828094" comment="firefox-68.11.0-1.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828099" comment="thunderbird-68.11.0-1.el7_8 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015653" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15653</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15653" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15653" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15653" ref_url="https://www.suse.com/security/cve/CVE-2020-15653" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007233.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1147-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5DGEDDAZOZ3MVQ6CTQDOF3OY2ZULXYVT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1155-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R6BL5GAJDZT5KI6F57UOVMEACIM4SELV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1189-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UBKX3FDVNS55I25FQR4AZLPCXUHCR5TX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    An iframe sandbox element with the allow-popups flag could be bypassed when using noopener links. This could have led to security issues for websites relying on sandbox configurations that allowed popups and hosted arbitrary content. This vulnerability affects Firefox ESR &lt; 78.1, Firefox &lt; 79, and Thunderbird &lt; 78.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15653/">CVE-2020-15653 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15653">CVE-2020-15653 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1174538">SUSE bug 1174538</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828575" comment="firefox-78.3.0-1.el7_9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015654" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15654</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15654" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15654" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15654" ref_url="https://www.suse.com/security/cve/CVE-2020-15654" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007233.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1147-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5DGEDDAZOZ3MVQ6CTQDOF3OY2ZULXYVT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1155-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R6BL5GAJDZT5KI6F57UOVMEACIM4SELV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1189-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UBKX3FDVNS55I25FQR4AZLPCXUHCR5TX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    When in an endless loop, a website specifying a custom cursor using CSS could make it look like the user is interacting with the user interface, when they are not. This could lead to a perceived broken state, especially when interactions with existing browser dialogs and warnings do not work. This vulnerability affects Firefox ESR &lt; 78.1, Firefox &lt; 79, and Thunderbird &lt; 78.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15654/">CVE-2020-15654 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15654">CVE-2020-15654 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1174538">SUSE bug 1174538</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828575" comment="firefox-78.3.0-1.el7_9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015656" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15656</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15656" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15656" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15656" ref_url="https://www.suse.com/security/cve/CVE-2020-15656" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007233.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1147-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5DGEDDAZOZ3MVQ6CTQDOF3OY2ZULXYVT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1155-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R6BL5GAJDZT5KI6F57UOVMEACIM4SELV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1189-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UBKX3FDVNS55I25FQR4AZLPCXUHCR5TX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    JIT optimizations involving the Javascript arguments object could confuse later optimizations. This risk was already mitigated by various precautions in the code, resulting in this bug rated at only moderate severity. This vulnerability affects Firefox ESR &lt; 78.1, Firefox &lt; 79, and Thunderbird &lt; 78.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-15656/">CVE-2020-15656 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15656">CVE-2020-15656 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1174538">SUSE bug 1174538</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828575" comment="firefox-78.3.0-1.el7_9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015658" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15658</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15658" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15658" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15658" ref_url="https://www.suse.com/security/cve/CVE-2020-15658" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007233.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1147-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5DGEDDAZOZ3MVQ6CTQDOF3OY2ZULXYVT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1155-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R6BL5GAJDZT5KI6F57UOVMEACIM4SELV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1189-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UBKX3FDVNS55I25FQR4AZLPCXUHCR5TX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    The code for downloading files did not properly take care of special characters, which led to an attacker being able to cut off the file ending at an earlier position, leading to a different file type being downloaded than shown in the dialog. This vulnerability affects Firefox ESR &lt; 78.1, Firefox &lt; 79, and Thunderbird &lt; 78.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15658/">CVE-2020-15658 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15658">CVE-2020-15658 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1174538">SUSE bug 1174538</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828575" comment="firefox-78.3.0-1.el7_9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015659" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15659</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15659" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15659" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15659" ref_url="https://www.suse.com/security/cve/CVE-2020-15659" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007233.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007246.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1147-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5DGEDDAZOZ3MVQ6CTQDOF3OY2ZULXYVT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1155-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R6BL5GAJDZT5KI6F57UOVMEACIM4SELV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1179-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7GAJX7QWS3CXVO7O3GQRKSU7ZZGE2NY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1189-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UBKX3FDVNS55I25FQR4AZLPCXUHCR5TX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1205-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LRVUDBACBZNNAF7T4L2HIQYOBVY5TJX7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Mozilla developers and community members reported memory safety bugs present in Firefox 78 and Firefox ESR 78.0. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 79, Firefox ESR &lt; 68.11, Firefox ESR &lt; 78.1, Thunderbird &lt; 68.11, and Thunderbird &lt; 78.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15659/">CVE-2020-15659 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15659">CVE-2020-15659 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1174538">SUSE bug 1174538</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828094" comment="firefox-68.11.0-1.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828099" comment="thunderbird-68.11.0-1.el7_8 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015664" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15664</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15664" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15664" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15664" ref_url="https://www.suse.com/security/cve/CVE-2020-15664" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2552-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007483.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1383-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5U3575B4DNDI75CVTXVASA5NIEHF6Z5T/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1384-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WYSRL2U5C4T7VE7LBKRIZAK532Z7UEVE/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1391-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4XXWGIMVAKYX3GCY2P3ALG3JWR7OE5TI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1392-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JNYOBI47YQLW5EKAMJETBNNXHGSR2TYF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    By holding a reference to the eval() function from an about:blank window, a malicious webpage could have gained access to the InstallTrigger object which would allow them to prompt the user to install an extension. Combined with user confusion, this could result in an unintended or malicious extension being installed. This vulnerability affects Firefox &lt; 80, Thunderbird &lt; 78.2, Thunderbird &lt; 68.12, Firefox ESR &lt; 68.12, Firefox ESR &lt; 78.2, and Firefox for Android &lt; 80.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15664/">CVE-2020-15664 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15664">CVE-2020-15664 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1175686">SUSE bug 1175686</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828100" comment="firefox-68.12.0-1.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828106" comment="thunderbird-68.12.0-1.el7_8 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015669" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15669</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15669" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15669" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15669" ref_url="https://www.suse.com/security/cve/CVE-2020-15669" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2552-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007376.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1383-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5U3575B4DNDI75CVTXVASA5NIEHF6Z5T/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1392-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JNYOBI47YQLW5EKAMJETBNNXHGSR2TYF/" source="SUSE-SU"/>
    <description>
    When aborting an operation, such as a fetch, an abort signal may be deleted while alerting the objects to be notified. This results in a use-after-free and we presume that with enough effort it could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR &lt; 68.12 and Thunderbird &lt; 68.12.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15669/">CVE-2020-15669 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15669">CVE-2020-15669 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1175686">SUSE bug 1175686</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828100" comment="firefox-68.12.0-1.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828106" comment="thunderbird-68.12.0-1.el7_8 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015673" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15673</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15673" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15673" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15673" ref_url="https://www.suse.com/security/cve/CVE-2020-15673" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2747-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-September/016248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007671.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1555-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BGV7A23CWHNBANNVQ6C3WS22F3FRDIO4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1574-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4BLMBLPQOANT6X2TSM5JYZQJWZLARWUV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1780-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HNDBN7MZZMEI27CRDAIIISBFFMEHIVVF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1785-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R5OWF6DU6XOO63OKUF4UOEC77CR6OULI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Mozilla developers reported memory safety bugs present in Firefox 80 and Firefox ESR 78.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 81, Thunderbird &lt; 78.3, and Firefox ESR &lt; 78.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15673/">CVE-2020-15673 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15673">CVE-2020-15673 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1176756">SUSE bug 1176756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176899">SUSE bug 1176899</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828575" comment="firefox-78.3.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828579" comment="thunderbird-78.3.1-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015676" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15676</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15676" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15676" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15676" ref_url="https://www.suse.com/security/cve/CVE-2020-15676" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2747-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-September/016248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007671.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1555-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BGV7A23CWHNBANNVQ6C3WS22F3FRDIO4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1574-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4BLMBLPQOANT6X2TSM5JYZQJWZLARWUV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1780-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HNDBN7MZZMEI27CRDAIIISBFFMEHIVVF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1785-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R5OWF6DU6XOO63OKUF4UOEC77CR6OULI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Firefox sometimes ran the onload handler for SVG elements that the DOM sanitizer decided to remove, resulting in JavaScript being executed after pasting attacker-controlled data into a contenteditable element. This vulnerability affects Firefox &lt; 81, Thunderbird &lt; 78.3, and Firefox ESR &lt; 78.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15676/">CVE-2020-15676 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15676">CVE-2020-15676 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1176756">SUSE bug 1176756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176899">SUSE bug 1176899</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828575" comment="firefox-78.3.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828579" comment="thunderbird-78.3.1-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015677" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15677</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15677" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15677" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15677" ref_url="https://www.suse.com/security/cve/CVE-2020-15677" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2747-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-September/016248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007671.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1555-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BGV7A23CWHNBANNVQ6C3WS22F3FRDIO4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1574-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4BLMBLPQOANT6X2TSM5JYZQJWZLARWUV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1780-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HNDBN7MZZMEI27CRDAIIISBFFMEHIVVF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1785-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R5OWF6DU6XOO63OKUF4UOEC77CR6OULI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    By exploiting an Open Redirect vulnerability on a website, an attacker could have spoofed the site displayed in the download file dialog to show the original site (the one suffering from the open redirect) rather than the site the file was actually downloaded from. This vulnerability affects Firefox &lt; 81, Thunderbird &lt; 78.3, and Firefox ESR &lt; 78.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15677/">CVE-2020-15677 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15677">CVE-2020-15677 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1176756">SUSE bug 1176756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176899">SUSE bug 1176899</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828575" comment="firefox-78.3.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828579" comment="thunderbird-78.3.1-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015678" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15678</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15678" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15678" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15678" ref_url="https://www.suse.com/security/cve/CVE-2020-15678" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2747-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-September/016248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007671.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1555-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BGV7A23CWHNBANNVQ6C3WS22F3FRDIO4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1574-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4BLMBLPQOANT6X2TSM5JYZQJWZLARWUV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1780-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HNDBN7MZZMEI27CRDAIIISBFFMEHIVVF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1785-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R5OWF6DU6XOO63OKUF4UOEC77CR6OULI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    When recursing through graphical layers while scrolling, an iterator may have become invalid, resulting in a potential use-after-free. This occurs because the function APZCTreeManager::ComputeClippedCompositionBounds did not follow iterator invalidation rules. This vulnerability affects Firefox &lt; 81, Thunderbird &lt; 78.3, and Firefox ESR &lt; 78.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15678/">CVE-2020-15678 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15678">CVE-2020-15678 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1176756">SUSE bug 1176756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176899">SUSE bug 1176899</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828575" comment="firefox-78.3.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828579" comment="thunderbird-78.3.1-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015683" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15683</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15683" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15683" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15683" ref_url="https://www.suse.com/security/cve/CVE-2020-15683" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3022-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007631.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007671.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1732-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/E7GHJMBMQLXUP64YOBPBFDGB3EBMHTOF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1748-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CU2EYNXYAWD2VQ4FXESYJGATZGSMOZCO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1780-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HNDBN7MZZMEI27CRDAIIISBFFMEHIVVF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1785-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R5OWF6DU6XOO63OKUF4UOEC77CR6OULI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Mozilla developers and community members reported memory safety bugs present in Firefox 81 and Firefox ESR 78.3. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR &lt; 78.4, Firefox &lt; 82, and Thunderbird &lt; 78.4.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15683/">CVE-2020-15683 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15683">CVE-2020-15683 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1177872">SUSE bug 1177872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177977">SUSE bug 1177977</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828597" comment="firefox-78.4.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828612" comment="thunderbird-78.4.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015685" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15685</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15685" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15685" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15685" ref_url="https://www.suse.com/security/cve/CVE-2020-15685" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008261.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0208-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PJ6EGWAN3STX7MVPJ6SXVNB6AQBHBJEA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0209-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LV6TQVT6324Y5SWHTL34EKZT7PFDOYE4/" source="SUSE-SU"/>
    <description>
    During the plaintext phase of the STARTTLS connection setup, protocol commands could have been injected and evaluated within the encrypted session. This vulnerability affects Thunderbird &lt; 78.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15685/">CVE-2020-15685 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15685">CVE-2020-15685 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1181414">SUSE bug 1181414</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828885" comment="thunderbird-78.7.0-1.el7_9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015810" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15810</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15810" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15810" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15810" ref_url="https://www.suse.com/security/cve/CVE-2020-15810" source="SUSE CVE"/>
		<reference ref_id="GHSA-3365-q9qx-f98m" ref_url="https://github.com/squid-cache/squid/security/advisories//GHSA-3365-q9qx-f98m" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14590-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007332.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010430.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1346-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7ZLGD6G3KY7JU2TB5YQO7CEN77XZWRYS/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1369-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UMN3THRFFUTAXOEGHNHSGKY647AMB7D6/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Squid before 4.13 and 5.x before 5.0.4. Due to incorrect data validation, HTTP Request Smuggling attacks may succeed against HTTP and HTTPS traffic. This leads to cache poisoning. This allows any client, including browser scripts, to bypass local security and poison the proxy cache and any downstream caches with content from an arbitrary source. When configured for relaxed header parsing (the default), Squid relays headers containing whitespace characters to upstream servers. When this occurs as a prefix to a Content-Length header, the frame length specified will be ignored by Squid (allowing for a conflicting length to be used from another Content-Length header) but relayed upstream.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15810/">CVE-2020-15810 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15810">CVE-2020-15810 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1175664">SUSE bug 1175664</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828576" comment="squid-3.5.20-17.el7_9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828577" comment="squid-migration-script-3.5.20-17.el7_9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828578" comment="squid-sysvinit-3.5.20-17.el7_9.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015811" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15811</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15811" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15811" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15811" ref_url="https://www.suse.com/security/cve/CVE-2020-15811" source="SUSE CVE"/>
		<reference ref_id="GHSA-c7p8-xqhm-49wv" ref_url="https://github.com/squid-cache/squid/security/advisories//GHSA-c7p8-xqhm-49wv" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14590-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007332.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007341.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1346-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7ZLGD6G3KY7JU2TB5YQO7CEN77XZWRYS/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1369-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UMN3THRFFUTAXOEGHNHSGKY647AMB7D6/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Squid before 4.13 and 5.x before 5.0.4. Due to incorrect data validation, HTTP Request Splitting attacks may succeed against HTTP and HTTPS traffic. This leads to cache poisoning. This allows any client, including browser scripts, to bypass local security and poison the browser cache and any downstream caches with content from an arbitrary source. Squid uses a string search instead of parsing the Transfer-Encoding header to find chunked encoding. This allows an attacker to hide a second request inside Transfer-Encoding: it is interpreted by Squid as chunked and split out into a second request delivered upstream. Squid will then deliver two distinct responses to the client, corrupting any downstream caches.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15811/">CVE-2020-15811 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15811">CVE-2020-15811 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1175665">SUSE bug 1175665</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828576" comment="squid-3.5.20-17.el7_9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828577" comment="squid-migration-script-3.5.20-17.el7_9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828578" comment="squid-sysvinit-3.5.20-17.el7_9.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015862" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15862</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15862" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15862" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15862" ref_url="https://www.suse.com/security/cve/CVE-2020-15862" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:4191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0050-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010490.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0050-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2OQK3YBZP7LLGFOZF2RYGZC5GDDRHRI6/" source="SUSE-SU"/>
    <description>
    Net-SNMP through 5.8 has Improper Privilege Management because SNMP WRITE access to the EXTEND MIB provides the ability to run arbitrary commands as root.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15862/">CVE-2020-15862 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15862">CVE-2020-15862 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1174961">SUSE bug 1174961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193875">SUSE bug 1193875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196341">SUSE bug 1196341</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828786" comment="net-snmp-5.7.2-49.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828787" comment="net-snmp-agent-libs-5.7.2-49.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828788" comment="net-snmp-devel-5.7.2-49.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828789" comment="net-snmp-gui-5.7.2-49.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828790" comment="net-snmp-libs-5.7.2-49.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828791" comment="net-snmp-perl-5.7.2-49.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828792" comment="net-snmp-python-5.7.2-49.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828793" comment="net-snmp-sysvinit-5.7.2-49.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828794" comment="net-snmp-utils-5.7.2-49.el7_9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015969" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15969</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15969" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15969" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15969" ref_url="https://www.suse.com/security/cve/CVE-2020-15969" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3022-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007631.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007671.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RSRYM5HZR7DJFCM4PTV3322SCZDBNVEX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1715-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7SPENP4DSO2RHCGDP36WTNMPXQSGB2TO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1732-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/E7GHJMBMQLXUP64YOBPBFDGB3EBMHTOF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1748-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CU2EYNXYAWD2VQ4FXESYJGATZGSMOZCO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1780-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HNDBN7MZZMEI27CRDAIIISBFFMEHIVVF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1785-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R5OWF6DU6XOO63OKUF4UOEC77CR6OULI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1829-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3H3IAURHPZWH2LAQL44ANHYEB6AFWZGW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Use after free in WebRTC in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15969/">CVE-2020-15969 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15969">CVE-2020-15969 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1177408">SUSE bug 1177408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177872">SUSE bug 1177872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177977">SUSE bug 1177977</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828597" comment="firefox-78.4.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828612" comment="thunderbird-78.4.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015999" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15999</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15999" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15999" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15999" ref_url="https://www.suse.com/security/cve/CVE-2020-15999" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007642.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2995-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007607.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007883.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1718-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R7LKJ7B6IPZZV4TBLBONR7Y6JGZSXZCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1731-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VG25TUU6YQ4UT3RXGH7XVCZA5WYCJKQJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1734-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Z6MSPBOHA3QD3XDIF4K4XJIZRWNJYUFS/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1737-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZPBMHSM2LSITBUOQWKXR2EMXHGLYG53Z/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1744-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BWJNS362SMLJHC3QLIIPV6WEXDNB6S5L/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1829-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3H3IAURHPZWH2LAQL44ANHYEB6AFWZGW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1952-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MZPDJYULXAMSZLQSDCDB6AOO535U72YK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2020-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LK7W6L42GLCUWLGKEJNDWSRASOS3CLIA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2031-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KX646YBHO2LBCWJZORVE6CWXY2DMCYHR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2096-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DVMMW4XRNOGVJH2XZU4UUV2ATGSF6TJ6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2187-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JXIRQKYZLZFQPPH6RZY4V3IIMPGHUT5V/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2315-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/76P3E35NHCSZCWGVU63J3OKJKJO3HUJD/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1134-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N6MMS3NOFXF2TZBZ5M3EC6VOB65FRP4I/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Heap buffer overflow in Freetype in Google Chrome prior to 86.0.4240.111 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15999/">CVE-2020-15999 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15999">CVE-2020-15999 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1177914">SUSE bug 1177914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177936">SUSE bug 1177936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178824">SUSE bug 1178824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178894">SUSE bug 1178894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828606" comment="freetype-2.8-14.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828607" comment="freetype-demos-2.8-14.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828608" comment="freetype-devel-2.8-14.el7_9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016012" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16012</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16012" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16012" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16012" ref_url="https://www.suse.com/security/cve/CVE-2020-16012" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007883.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2010-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QY4HVSGBXI6UWJK3O7NRFLCCCLNP2X5N/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2012-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LYG4UYLBRBIOTJZ2AK7WUVPNH52MH5CG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2020-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LK7W6L42GLCUWLGKEJNDWSRASOS3CLIA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2021-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FVE6T2JL6PI433CTW6BAFC3ROZDJMVMC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2026-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/V3EEK4JCTZ6ZUPXX2R7FXWU4SEGDRFMY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2031-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KX646YBHO2LBCWJZORVE6CWXY2DMCYHR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2032-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JIZKUW3YM4QYNE4MWWJG47ZVOOWCF43S/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2055-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C2RCNJJSY7TUK4IYHVCSUVEBMIXTWCWM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2096-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DVMMW4XRNOGVJH2XZU4UUV2ATGSF6TJ6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2187-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JXIRQKYZLZFQPPH6RZY4V3IIMPGHUT5V/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2315-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/76P3E35NHCSZCWGVU63J3OKJKJO3HUJD/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Side-channel information leakage in graphics in Google Chrome prior to 87.0.4280.66 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-16012/">CVE-2020-16012 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16012">CVE-2020-16012 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1178824">SUSE bug 1178824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178894">SUSE bug 1178894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178923">SUSE bug 1178923</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828785" comment="firefox-78.5.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828784" comment="thunderbird-78.5.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016042" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16042</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16042" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16042" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16042" ref_url="https://www.suse.com/security/cve/CVE-2020-16042" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008122.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2181-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CDMZGVMNSMD6LDMI25NDRZ36NEBSFUHY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2213-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VCC4XLQNOV2QXKDOJAWY34R26577RWDC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2216-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XPQHVY33MWDC273XBHHGBLLDEBESEZOU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2229-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LVYWJ3IDOZBKDSDO2ORAHQLOXALQJEGV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2317-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZRYMYUEZXYQNBK2DWV7DAYE5EXEQPBUX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2318-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LL2B6S5KIA4HGLES3CDLSB4VRZW275H2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2324-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MFGNB2YB4LDKDYXRSTS5R357XYHABN5P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2325-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JZN3OVPTOCIWBAWJK4JZQDXFN752D6AR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2359-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AKN6XFMHGSU5TFVYGT3C4SOLOD7IXLXK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2360-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DD5O6DYQGK2VKG37ZUD4DXDFLTSCZFGY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Uninitialized Use in V8 in Google Chrome prior to 87.0.4280.88 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16042/">CVE-2020-16042 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16042">CVE-2020-16042 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1179576">SUSE bug 1179576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180039">SUSE bug 1180039</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828863" comment="firefox-78.6.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828869" comment="thunderbird-78.6.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016044" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16044</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16044" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16044" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16044" ref_url="https://www.suse.com/security/cve/CVE-2020-16044" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0056-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MWW23OVUF57OUUNFOOBPRID66YRCNBPH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0063-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R64OG7KLB7DVCRVNOYE46AZ266XQ2F23/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0093-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/72PBD5PFZIW6WZ7R65QRFVISRDWYC6WO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0127-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3236IRHAJFLO3NB3KMMBI5XYZOZFL6S7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0166-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UJLGW3JAYRVM7Z2KD5X5WM5BVADC7BWN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0173-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GKJ4GOW4YBBVDHM3PN6ELURRBVPFRRJA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0177-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VTDULA6C5LKSUE5KO6PVLSSHYEEXC2I4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0186-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TOOA23IRO3YBKSJ5CXVBQQVXGGHUF7QV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0973-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5TAIJROLXEDDASYPE5FNK2OGKN4IAJT5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1016-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FA7FANKJNI72BRIWJCZ3TLBXXZJS7GLL/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Use after free in WebRTC in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to potentially exploit heap corruption via a crafted SCTP packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16044/">CVE-2020-16044 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16044">CVE-2020-16044 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1180623">SUSE bug 1180623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181137">SUSE bug 1181137</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828876" comment="firefox-78.6.1-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828877" comment="thunderbird-78.6.1-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016092" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16092</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16092" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16092" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16092" ref_url="https://www.suse.com/security/cve/CVE-2020-16092" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2877-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008671.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1664-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QVFXHYA5K5PLF3ZBKNJIJ5BFDWNHLJZM/" source="SUSE-SU"/>
    <description>
    In QEMU through 5.0.0, an assertion failure can occur in the network packet processing. This issue affects the e1000e and vmxnet3 network devices. A malicious guest user/process could use this flaw to abort the QEMU process on the host, resulting in a denial of service condition in net_tx_pkt_add_raw_fragment in hw/net/net_tx_pkt.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-05"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-16092/">CVE-2020-16092 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16092">CVE-2020-16092 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1174641">SUSE bug 1174641</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828934" comment="qemu-img-1.5.3-175.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828935" comment="qemu-kvm-1.5.3-175.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828936" comment="qemu-kvm-common-1.5.3-175.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828937" comment="qemu-kvm-tools-1.5.3-175.el7_9.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20201721" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-1721</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-1721" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1721" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-1721" ref_url="https://www.suse.com/security/cve/CVE-2020-1721" source="SUSE CVE"/>
    <description>
    A flaw was found in the Key Recovery Authority (KRA) Agent Service in pki-core 10.10.5 where it did not properly sanitize the recovery ID during a key recovery request, enabling a reflected cross-site scripting (XSS) vulnerability. An attacker could trick an authenticated victim into executing specially crafted Javascript code.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-1721/">CVE-2020-1721 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1721">CVE-2020-1721 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828983" comment="pki-base-10.5.18-12.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828984" comment="pki-base-java-10.5.18-12.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828985" comment="pki-ca-10.5.18-12.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828986" comment="pki-javadoc-10.5.18-12.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828987" comment="pki-kra-10.5.18-12.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828988" comment="pki-server-10.5.18-12.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828989" comment="pki-symkey-10.5.18-12.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828990" comment="pki-tools-10.5.18-12.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20201722" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-1722</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-1722" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1722" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-1722" ref_url="https://www.suse.com/security/cve/CVE-2020-1722" source="SUSE CVE"/>
    <description>
    A flaw was found in all ipa versions 4.x.x through 4.8.0. When sending a very long password (&gt;= 1,000,000 characters) to the server, the password hashing process could exhaust memory and CPU leading to a denial of service and the website becoming unresponsive. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-1722/">CVE-2020-1722 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1722">CVE-2020-1722 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828282" comment="ipa-client-4.6.8-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828283" comment="ipa-client-common-4.6.8-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828284" comment="ipa-common-4.6.8-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828285" comment="ipa-python-compat-4.6.8-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828286" comment="ipa-server-4.6.8-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828287" comment="ipa-server-common-4.6.8-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828288" comment="ipa-server-dns-4.6.8-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828289" comment="ipa-server-trust-ad-4.6.8-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828290" comment="python2-ipaclient-4.6.8-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828291" comment="python2-ipalib-4.6.8-5.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828292" comment="python2-ipaserver-4.6.8-5.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20201749" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-1749</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-1749" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1749" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-1749" ref_url="https://www.suse.com/security/cve/CVE-2020-1749" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0868-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007358.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2610-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008780.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1325-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PR7IAIXMEHH4XQP5TC46UTZY6KWF5277/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel's implementation of some networking protocols in IPsec, such as VXLAN and GENEVE tunnels over IPv6. When an encrypted tunnel is created between two hosts, the kernel isn't correctly routing tunneled data over the encrypted link; rather sending the data unencrypted. This would allow anyone in between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1749/">CVE-2020-1749 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1749">CVE-2020-1749 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1165629">SUSE bug 1165629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165631">SUSE bug 1165631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177511">SUSE bug 1177511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177513">SUSE bug 1177513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189302">SUSE bug 1189302</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828543" comment="bpftool-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828544" comment="kernel-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828545" comment="kernel-abi-whitelists-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828546" comment="kernel-debug-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828549" comment="kernel-doc-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828550" comment="kernel-headers-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828551" comment="kernel-tools-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828552" comment="kernel-tools-libs-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828554" comment="perf-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828555" comment="python-perf-3.10.0-1160.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202017507" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-17507</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-17507" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17507" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-17507" ref_url="https://www.suse.com/security/cve/CVE-2020-17507" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009927.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1452-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KJKFQBI7CGD7FQDCE2V7CAQ2LKSPRQMR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IBKN6GS4GIBUYBLNFX4U4AW663FIHH5B/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1501-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3UNEB57TTFWJ3LAAGGQ4W5TXUQOAXYRV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1530-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FJLSHDERE4UB4726XQUI46NKCGT7AQKA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1564-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OYIAKF2NSRYD2DJJ5PXQATMPRZJO442M/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1568-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BFW3E2URRACFHK2EVSCHCU4WBERMUHGE/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2142-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QLSRXEMNPXJ5APSF7LPSU6DIH47XLGMI/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Qt through 5.12.9, and 5.13.x through 5.15.x before 5.15.1. read_xbm_body in gui/image/qxbmhandler.cpp has a buffer over-read.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-17507/">CVE-2020-17507 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-17507">CVE-2020-17507 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1176315">SUSE bug 1176315</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828712" comment="qt-4.8.7-9.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828713" comment="qt-assistant-4.8.7-9.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828714" comment="qt-config-4.8.7-9.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828715" comment="qt-demos-4.8.7-9.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828716" comment="qt-devel-4.8.7-9.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828717" comment="qt-devel-private-4.8.7-9.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828718" comment="qt-doc-4.8.7-9.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828719" comment="qt-examples-4.8.7-9.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828720" comment="qt-mysql-4.8.7-9.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828721" comment="qt-odbc-4.8.7-9.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828722" comment="qt-postgresql-4.8.7-9.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828723" comment="qt-qdbusviewer-4.8.7-9.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828724" comment="qt-qvfb-4.8.7-9.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828725" comment="qt-x11-4.8.7-9.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828726" comment="qt5-qtbase-5.9.7-5.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828727" comment="qt5-qtbase-common-5.9.7-5.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828728" comment="qt5-qtbase-devel-5.9.7-5.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828729" comment="qt5-qtbase-doc-5.9.7-5.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828730" comment="qt5-qtbase-examples-5.9.7-5.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828731" comment="qt5-qtbase-gui-5.9.7-5.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828732" comment="qt5-qtbase-mysql-5.9.7-5.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828733" comment="qt5-qtbase-odbc-5.9.7-5.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828734" comment="qt5-qtbase-postgresql-5.9.7-5.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828735" comment="qt5-qtbase-static-5.9.7-5.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828736" comment="qt5-rpm-macros-5.9.7-5.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20201927" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-1927</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-1927" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1927" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-1927" ref_url="https://www.suse.com/security/cve/CVE-2020-1927" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006814.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0597-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4PH4IMDFDAGXIZ542OBXWA3YM2WL2ZA5/" source="SUSE-SU"/>
    <description>
    In Apache HTTP Server 2.4.0 to 2.4.41, redirects configured with mod_rewrite that were intended to be self-referential might be fooled by encoded newlines and redirect instead to an an unexpected URL within the request URL.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-1927/">CVE-2020-1927 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1927">CVE-2020-1927 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1145738">SUSE bug 1145738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168407">SUSE bug 1168407</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170718">SUSE bug 1170718</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828309" comment="httpd-2.4.6-95.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828310" comment="httpd-devel-2.4.6-95.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828311" comment="httpd-manual-2.4.6-95.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828312" comment="httpd-tools-2.4.6-95.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828313" comment="mod_ldap-2.4.6-95.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828314" comment="mod_proxy_html-2.4.6-95.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828315" comment="mod_session-2.4.6-95.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828316" comment="mod_ssl-2.4.6-95.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20201934" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-1934</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-1934" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1934" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-1934" ref_url="https://www.suse.com/security/cve/CVE-2020-1934" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006719.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0597-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4PH4IMDFDAGXIZ542OBXWA3YM2WL2ZA5/" source="SUSE-SU"/>
    <description>
    In Apache HTTP Server 2.4.0 to 2.4.41, mod_proxy_ftp may use uninitialized memory when proxying to a malicious FTP server.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-1934/">CVE-2020-1934 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1934">CVE-2020-1934 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1168404">SUSE bug 1168404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170718">SUSE bug 1170718</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828309" comment="httpd-2.4.6-95.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828310" comment="httpd-devel-2.4.6-95.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828311" comment="httpd-manual-2.4.6-95.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828312" comment="httpd-tools-2.4.6-95.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828313" comment="mod_ldap-2.4.6-95.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828314" comment="mod_proxy_html-2.4.6-95.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828315" comment="mod_session-2.4.6-95.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828316" comment="mod_ssl-2.4.6-95.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20201935" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-1935</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-1935" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1935" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-1935" ref_url="https://www.suse.com/security/cve/CVE-2020-1935" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007410.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0345-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/F3FOVKJAK2YR7UVBYBATR7JKLD5IA6WI/" source="SUSE-SU"/>
    <description>
    In Apache Tomcat 9.0.0.M1 to 9.0.30, 8.5.0 to 8.5.50 and 7.0.0 to 7.0.99 the HTTP header parsing code used an approach to end-of-line parsing that allowed some invalid HTTP headers to be parsed as valid. This led to a possibility of HTTP Request Smuggling if Tomcat was located behind a reverse proxy that incorrectly handled the invalid Transfer-Encoding header in a particular manner. Such a reverse proxy is considered unlikely.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-1935/">CVE-2020-1935 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1935">CVE-2020-1935 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1164860">SUSE bug 1164860</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828702" comment="tomcat-7.0.76-16.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828703" comment="tomcat-admin-webapps-7.0.76-16.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828704" comment="tomcat-docs-webapp-7.0.76-16.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828705" comment="tomcat-el-2.2-api-7.0.76-16.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828706" comment="tomcat-javadoc-7.0.76-16.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828707" comment="tomcat-jsp-2.2-api-7.0.76-16.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828708" comment="tomcat-jsvc-7.0.76-16.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828709" comment="tomcat-lib-7.0.76-16.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828710" comment="tomcat-servlet-3.0-api-7.0.76-16.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828711" comment="tomcat-webapps-7.0.76-16.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20201938" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-1938</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-1938" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1938" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-1938" ref_url="https://www.suse.com/security/cve/CVE-2020-1938" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006629.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006719.html" source="SUSE-SU"/>
		<reference ref_id="TID000019606" ref_url="https://www.suse.com/support/kb/doc/?id=000019606" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0345-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/F3FOVKJAK2YR7UVBYBATR7JKLD5IA6WI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0597-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4PH4IMDFDAGXIZ542OBXWA3YM2WL2ZA5/" source="SUSE-SU"/>
    <description>
    When using the Apache JServ Protocol (AJP), care must be taken when trusting incoming connections to Apache Tomcat. Tomcat treats AJP connections as having higher trust than, for example, a similar HTTP connection. If such connections are available to an attacker, they can be exploited in ways that may be surprising. In Apache Tomcat 9.0.0.M1 to 9.0.0.30, 8.5.0 to 8.5.50 and 7.0.0 to 7.0.99, Tomcat shipped with an AJP Connector enabled by default that listened on all configured IP addresses. It was expected (and recommended in the security guide) that this Connector would be disabled if not required. This vulnerability report identified a mechanism that allowed: - returning arbitrary files from anywhere in the web application - processing any file in the web application as a JSP Further, if the web application allowed file upload and stored those files within the web application (or the attacker was able to control the content of the web application by some other means) then this, along with the ability to process a file as a JSP, made remote code execution possible. It is important to note that mitigation is only required if an AJP port is accessible to untrusted users. Users wishing to take a defence-in-depth approach and block the vector that permits returning arbitrary files and execution as JSP may upgrade to Apache Tomcat 9.0.31, 8.5.51 or 7.0.100 or later. A number of changes were made to the default AJP Connector configuration in 9.0.31 to harden the default configuration. It is likely that users upgrading to 9.0.31, 8.5.51 or 7.0.100 or later will need to make small changes to their configurations.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2020-1938/">CVE-2020-1938 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1938">CVE-2020-1938 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1164692">SUSE bug 1164692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1166559">SUSE bug 1166559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169066">SUSE bug 1169066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175170">SUSE bug 1175170</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826950" comment="tomcat-7.0.76-11.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826951" comment="tomcat-admin-webapps-7.0.76-11.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826952" comment="tomcat-docs-webapp-7.0.76-11.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826953" comment="tomcat-el-2.2-api-7.0.76-11.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826954" comment="tomcat-javadoc-7.0.76-11.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826955" comment="tomcat-jsp-2.2-api-7.0.76-11.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826956" comment="tomcat-jsvc-7.0.76-11.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826957" comment="tomcat-lib-7.0.76-11.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826958" comment="tomcat-servlet-3.0-api-7.0.76-11.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826959" comment="tomcat-webapps-7.0.76-11.el7_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20201971" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-1971</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-1971" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1971" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-1971" ref_url="https://www.suse.com/security/cve/CVE-2020-1971" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:17-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:20-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:8-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:9-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3722-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008175.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2223-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMYUDIGG7RM42AIH4Q3WW4VZGFRAPLQ7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2236-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YDLYD3JFZSOPG5DPXOHFTMZTUOLPOK5J/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2245-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DET3T3KBOIXDZC2VZ5XGHXVGQ54LOAI5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2269-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SGJECGZC6A7C36WKBWL3FKK6U7IGO4OK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0064-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EIIX5B6YLG6I6J4WR546EWZU23BNUSV6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0065-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3MAV3V72VVUTVO6VC6SN5XB5EYX3TJWK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0082-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JQ2RC7AEXMLHMCFO7K3XLJO5WMPQXS7V/" source="SUSE-SU"/>
    <description>
    The X.509 GeneralName type is a generic type for representing different types of names. One of those name types is known as EDIPartyName. OpenSSL provides a function GENERAL_NAME_cmp which compares different instances of a GENERAL_NAME to see if they are equal or not. This function behaves incorrectly when both GENERAL_NAMEs contain an EDIPARTYNAME. A NULL pointer dereference and a crash may occur leading to a possible denial of service attack. OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes: 1) Comparing CRL distribution point names between an available CRL and a CRL distribution point embedded in an X509 certificate 2) When verifying that a timestamp response token signer matches the timestamp authority name (exposed via the API functions TS_RESP_verify_response and TS_RESP_verify_token) If an attacker can control both items being compared then that attacker could trigger a crash. For example if the attacker can trick a client or server into checking a malicious certificate against a malicious CRL then this may occur. Note that some applications automatically download CRLs based on a URL embedded in a certificate. This checking happens prior to the signatures on the certificate and CRL being verified. OpenSSL's s_server, s_client and verify tools have support for the "-crl_download" option which implements automatic CRL downloading and this attack has been demonstrated to work against those tools. Note that an unrelated bug means that affected versions of OpenSSL cannot parse or construct correct encodings of EDIPARTYNAME. However it is possible to construct a malformed EDIPARTYNAME that OpenSSL's parser will accept and hence trigger this attack. All OpenSSL 1.1.1 and 1.0.2 versions are affected by this issue. Other OpenSSL releases are out of support and have not been checked. Fixed in OpenSSL 1.1.1i (Affected 1.1.1-1.1.1h). Fixed in OpenSSL 1.0.2x (Affected 1.0.2-1.0.2w).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-1971/">CVE-2020-1971 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1971">CVE-2020-1971 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1179491">SUSE bug 1179491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196179">SUSE bug 1196179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199303">SUSE bug 1199303</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828864" comment="openssl-1.0.2k-21.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828865" comment="openssl-devel-1.0.2k-21.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828866" comment="openssl-libs-1.0.2k-21.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828867" comment="openssl-perl-1.0.2k-21.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828868" comment="openssl-static-1.0.2k-21.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20201983" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-1983</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-1983" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1983" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-1983" ref_url="https://www.suse.com/security/cve/CVE-2020-1983" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006873.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1523-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008673.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0636-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CCDKP2JD5R6KY4I5SVS2BPLDEJ5IHIYN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0756-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ODUWECA6HHYVEDIL3STBFAHJCJLTCAPV/" source="SUSE-SU"/>
    <description>
    A use after free vulnerability in ip_reass() in ip_input.c of libslirp 4.2.0 and prior releases allows crafted packets to cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-1983/">CVE-2020-1983 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1983">CVE-2020-1983 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1170940">SUSE bug 1170940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828571" comment="qemu-img-1.5.3-175.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828572" comment="qemu-kvm-1.5.3-175.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828573" comment="qemu-kvm-common-1.5.3-175.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828574" comment="qemu-kvm-tools-1.5.3-175.el7_9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202022218" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-22218</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-22218" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22218" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-22218" ref_url="https://www.suse.com/security/cve/CVE-2020-22218" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016300.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in function _libssh2_packet_add in libssh2 1.10.0 allows attackers to access out of bounds memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-22218/">CVE-2020-22218 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-22218">CVE-2020-22218 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214527">SUSE bug 1214527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217508">SUSE bug 1217508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218318">SUSE bug 1218318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218349">SUSE bug 1218349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221580">SUSE bug 1221580</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830365" comment="libssh2-1.8.0-4.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830366" comment="libssh2-devel-1.8.0-4.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830367" comment="libssh2-docs-1.8.0-4.el7_9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202024394" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-24394</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-24394" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24394" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-24394" ref_url="https://www.suse.com/security/cve/CVE-2020-24394" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007405.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2610-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007726.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1325-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PR7IAIXMEHH4XQP5TC46UTZY6KWF5277/" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 5.7.8, fs/nfsd/vfs.c (in the NFS server) can set incorrect permissions on new filesystem objects when the filesystem lacks ACL support, aka CID-22cf8419f131. This occurs because the current umask is not considered.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-24394/">CVE-2020-24394 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24394">CVE-2020-24394 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1175518">SUSE bug 1175518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175992">SUSE bug 1175992</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828811" comment="bpftool-3.10.0-1160.11.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828812" comment="kernel-3.10.0-1160.11.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828813" comment="kernel-abi-whitelists-3.10.0-1160.11.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828814" comment="kernel-debug-3.10.0-1160.11.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828817" comment="kernel-doc-3.10.0-1160.11.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828818" comment="kernel-headers-3.10.0-1160.11.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828819" comment="kernel-tools-3.10.0-1160.11.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828820" comment="kernel-tools-libs-3.10.0-1160.11.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828822" comment="perf-3.10.0-1160.11.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828823" comment="python-perf-3.10.0-1160.11.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202024489" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-24489</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-24489" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24489" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-24489" ref_url="https://www.suse.com/security/cve/CVE-2020-24489" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14758-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1930-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-June/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1931-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1932-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1933-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008987.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LVSPIXHZZESTI3IJTF7URWDUHHXIRWBP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1933-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JL4WBLDZZMRKCJPRBNYNFPGJBJE5OQZO/" source="SUSE-SU"/>
    <description>
    Incomplete cleanup in some Intel(R) VT-d products may allow an authenticated user to potentially enable escalation of privilege via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-24489/">CVE-2020-24489 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24489">CVE-2020-24489 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1179839">SUSE bug 1179839</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192359">SUSE bug 1192359</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199300">SUSE bug 1199300</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201731">SUSE bug 1201731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225680">SUSE bug 1225680</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829242" comment="microcode_ctl-2.1-73.11.el7_9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202024511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-24511</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-24511" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24511" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-24511" ref_url="https://www.suse.com/security/cve/CVE-2020-24511" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14758-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1930-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-June/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1931-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1932-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1933-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008987.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LVSPIXHZZESTI3IJTF7URWDUHHXIRWBP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1933-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JL4WBLDZZMRKCJPRBNYNFPGJBJE5OQZO/" source="SUSE-SU"/>
    <description>
    Improper isolation of shared resources in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-24511/">CVE-2020-24511 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24511">CVE-2020-24511 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1179836">SUSE bug 1179836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192360">SUSE bug 1192360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199300">SUSE bug 1199300</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201731">SUSE bug 1201731</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829242" comment="microcode_ctl-2.1-73.11.el7_9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202024512" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-24512</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-24512" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24512" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-24512" ref_url="https://www.suse.com/security/cve/CVE-2020-24512" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14758-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1930-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-June/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1931-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1932-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1933-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008987.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LVSPIXHZZESTI3IJTF7URWDUHHXIRWBP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1933-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JL4WBLDZZMRKCJPRBNYNFPGJBJE5OQZO/" source="SUSE-SU"/>
    <description>
    Observable timing discrepancy in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-24512/">CVE-2020-24512 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24512">CVE-2020-24512 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1179837">SUSE bug 1179837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192360">SUSE bug 1192360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199300">SUSE bug 1199300</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201731">SUSE bug 1201731</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829242" comment="microcode_ctl-2.1-73.11.el7_9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202024513" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-24513</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-24513" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24513" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-24513" ref_url="https://www.suse.com/security/cve/CVE-2020-24513" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14758-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1930-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-June/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1931-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1932-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1933-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008987.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LVSPIXHZZESTI3IJTF7URWDUHHXIRWBP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1933-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JL4WBLDZZMRKCJPRBNYNFPGJBJE5OQZO/" source="SUSE-SU"/>
    <description>
    Domain-bypass transient execution vulnerability in some Intel Atom(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-24513/">CVE-2020-24513 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24513">CVE-2020-24513 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1179833">SUSE bug 1179833</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192360">SUSE bug 1192360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199300">SUSE bug 1199300</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201731">SUSE bug 1201731</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829126" comment="microcode_ctl-2.1-73.9.el7_9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202024606" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-24606</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-24606" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24606" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-24606" ref_url="https://www.suse.com/security/cve/CVE-2020-24606" source="SUSE CVE"/>
		<reference ref_id="GHSA-vvj7-xjgq-g2jg" ref_url="https://github.com/squid-cache/squid/security/advisories//GHSA-vvj7-xjgq-g2jg" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14590-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007332.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007341.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1346-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7ZLGD6G3KY7JU2TB5YQO7CEN77XZWRYS/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1369-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UMN3THRFFUTAXOEGHNHSGKY647AMB7D6/" source="SUSE-SU"/>
    <description>
    Squid before 4.13 and 5.x before 5.0.4 allows a trusted peer to perform Denial of Service by consuming all available CPU cycles during handling of a crafted Cache Digest response message. This only occurs when cache_peer is used with the cache digests feature. The problem exists because peerDigestHandleReply() livelocking in peer_digest.cc mishandles EOF.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-24606/">CVE-2020-24606 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24606">CVE-2020-24606 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1175671">SUSE bug 1175671</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828576" comment="squid-3.5.20-17.el7_9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828577" comment="squid-migration-script-3.5.20-17.el7_9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828578" comment="squid-sysvinit-3.5.20-17.el7_9.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025097" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25097</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25097" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25097" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25097" ref_url="https://www.suse.com/security/cve/CVE-2020-25097" source="SUSE CVE"/>
		<reference ref_id="GHSA-jvf6-h9gj-pmj6" ref_url="https://github.com/squid-cache/squid/security/advisories//GHSA-jvf6-h9gj-pmj6" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011543.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0879-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/E33JWP5CXQF3EVKKDRECX4457F2ILQP2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1961-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PR56WJLXVU76BKBW5SFENNPKF5TJSS5K/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Squid through 4.13 and 5.x through 5.0.4. Due to improper input validation, it allows a trusted client to perform HTTP Request Smuggling and access services otherwise forbidden by the security controls. This occurs for certain uri_whitespace configuration settings.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25097/">CVE-2020-25097 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25097">CVE-2020-25097 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1183436">SUSE bug 1183436</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829039" comment="squid-3.5.20-17.el7_9.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829040" comment="squid-migration-script-3.5.20-17.el7_9.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829041" comment="squid-sysvinit-3.5.20-17.el7_9.6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025211" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25211</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25211" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25211" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25211" ref_url="https://www.suse.com/security/cve/CVE-2020-25211" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0427-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0241-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GZRN6BW22C4S3GVCJVPHDT4HHTLVGVZE/" source="SUSE-SU"/>
    <description>
    In the Linux kernel through 5.8.7, local attackers able to inject conntrack netlink configuration could overflow a local buffer, causing crashes or triggering use of incorrect protocol numbers in ctnetlink_parse_tuple_filter in net/netfilter/nf_conntrack_netlink.c, aka CID-1cc5ef91d2ff.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-25211/">CVE-2020-25211 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25211">CVE-2020-25211 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1176395">SUSE bug 1176395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192356">SUSE bug 1192356</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828991" comment="bpftool-3.10.0-1160.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828992" comment="kernel-3.10.0-1160.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828993" comment="kernel-abi-whitelists-3.10.0-1160.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828994" comment="kernel-debug-3.10.0-1160.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828997" comment="kernel-doc-3.10.0-1160.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828998" comment="kernel-headers-3.10.0-1160.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828999" comment="kernel-tools-3.10.0-1160.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829000" comment="kernel-tools-libs-3.10.0-1160.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829002" comment="perf-3.10.0-1160.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829003" comment="python-perf-3.10.0-1160.21.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025212" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25212</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25212" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25212" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25212" ref_url="https://www.suse.com/security/cve/CVE-2020-25212" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007544.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2981-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007601.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-November/016787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007876.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1655-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TH734NYI5EZD4XQ2VE5Y7HNPWOK3EVXA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1682-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/P7AP5V2WMODZLL2BP3KNT37XWNT7K5NX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1698-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ODIY42JEXH7RGWFLZMCA4RHYSA2XEWTJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2112-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4EZ6GLHJ7GRNO5SFTV2VI7JJOEEIMD6U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A TOCTOU mismatch in the NFS client code in the Linux kernel before 5.8.3 could be used by local attackers to corrupt memory or possibly have unspecified other impact because a size check is in fs/nfs/nfs4proc.c instead of fs/nfs/nfs4xdr.c, aka CID-b4487b935452.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25212/">CVE-2020-25212 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25212">CVE-2020-25212 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1176381">SUSE bug 1176381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176382">SUSE bug 1176382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177027">SUSE bug 1177027</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828811" comment="bpftool-3.10.0-1160.11.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828812" comment="kernel-3.10.0-1160.11.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828813" comment="kernel-abi-whitelists-3.10.0-1160.11.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828814" comment="kernel-debug-3.10.0-1160.11.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828817" comment="kernel-doc-3.10.0-1160.11.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828818" comment="kernel-headers-3.10.0-1160.11.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828819" comment="kernel-tools-3.10.0-1160.11.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828820" comment="kernel-tools-libs-3.10.0-1160.11.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828822" comment="perf-3.10.0-1160.11.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828823" comment="python-perf-3.10.0-1160.11.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025632" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25632</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25632" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25632" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25632" ref_url="https://www.suse.com/security/cve/CVE-2020-25632" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0681-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008423.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008418.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-March/018162.html" source="SUSE-SU"/>
		<reference ref_id="TID000019892" ref_url="https://www.suse.com/support/kb/doc/?id=000019892" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0462-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XXPYL42MSKRB4D7LRFMW7PBGGLKSJKPS/" source="SUSE-SU"/>
    <description>
    A flaw was found in grub2 in versions prior to 2.06. The rmmod implementation allows the unloading of a module used as a dependency without checking if any other dependent module is still loaded leading to a use-after-free scenario. This could allow arbitrary code to be executed or a bypass of Secure Boot protections. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25632/">CVE-2020-25632 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25632">CVE-2020-25632 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1176711">SUSE bug 1176711</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828968" comment="grub2-2.02-0.87.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828969" comment="grub2-common-2.02-0.87.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828970" comment="grub2-efi-ia32-2.02-0.87.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828971" comment="grub2-efi-ia32-cdboot-2.02-0.87.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828972" comment="grub2-efi-ia32-modules-2.02-0.87.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828973" comment="grub2-efi-x64-2.02-0.87.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828974" comment="grub2-efi-x64-cdboot-2.02-0.87.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828975" comment="grub2-efi-x64-modules-2.02-0.87.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828976" comment="grub2-pc-2.02-0.87.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828977" comment="grub2-pc-modules-2.02-0.87.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828978" comment="grub2-tools-2.02-0.87.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828979" comment="grub2-tools-extra-2.02-0.87.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828980" comment="grub2-tools-minimal-2.02-0.87.el7_9.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025637" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25637</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25637" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25637" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25637" ref_url="https://www.suse.com/security/cve/CVE-2020-25637" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2970-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007628.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007687.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1777-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3OCPTCY4NDHTGHFZWIAO6KHGTLUQSXQ5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1778-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TJK5HZ5F2H34L3UWADRCLKFCCF5KDLVY/" source="SUSE-SU"/>
    <description>
    A double free memory issue was found to occur in the libvirt API, in versions before 6.8.0, responsible for requesting information about network interfaces of a running QEMU domain. This flaw affects the polkit access control driver. Specifically, clients connecting to the read-write socket with limited ACL permissions could use this flaw to crash the libvirt daemon, resulting in a denial of service, or potentially escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25637/">CVE-2020-25637 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25637">CVE-2020-25637 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1174955">SUSE bug 1174955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177155">SUSE bug 1177155</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828750" comment="libvirt-4.5.0-36.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828751" comment="libvirt-admin-4.5.0-36.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828752" comment="libvirt-bash-completion-4.5.0-36.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828753" comment="libvirt-client-4.5.0-36.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828754" comment="libvirt-daemon-4.5.0-36.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828755" comment="libvirt-daemon-config-network-4.5.0-36.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828756" comment="libvirt-daemon-config-nwfilter-4.5.0-36.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828757" comment="libvirt-daemon-driver-interface-4.5.0-36.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828758" comment="libvirt-daemon-driver-lxc-4.5.0-36.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828759" comment="libvirt-daemon-driver-network-4.5.0-36.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828760" comment="libvirt-daemon-driver-nodedev-4.5.0-36.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828761" comment="libvirt-daemon-driver-nwfilter-4.5.0-36.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828762" comment="libvirt-daemon-driver-qemu-4.5.0-36.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828763" comment="libvirt-daemon-driver-secret-4.5.0-36.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828764" comment="libvirt-daemon-driver-storage-4.5.0-36.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828765" comment="libvirt-daemon-driver-storage-core-4.5.0-36.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828766" comment="libvirt-daemon-driver-storage-disk-4.5.0-36.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828767" comment="libvirt-daemon-driver-storage-gluster-4.5.0-36.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828768" comment="libvirt-daemon-driver-storage-iscsi-4.5.0-36.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828769" comment="libvirt-daemon-driver-storage-logical-4.5.0-36.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828770" comment="libvirt-daemon-driver-storage-mpath-4.5.0-36.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828771" comment="libvirt-daemon-driver-storage-rbd-4.5.0-36.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828772" comment="libvirt-daemon-driver-storage-scsi-4.5.0-36.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828773" comment="libvirt-daemon-kvm-4.5.0-36.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828774" comment="libvirt-daemon-lxc-4.5.0-36.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828775" comment="libvirt-devel-4.5.0-36.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828776" comment="libvirt-docs-4.5.0-36.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828777" comment="libvirt-libs-4.5.0-36.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828778" comment="libvirt-lock-sanlock-4.5.0-36.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828779" comment="libvirt-login-shell-4.5.0-36.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828780" comment="libvirt-nss-4.5.0-36.el7_9.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025643" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25643</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25643" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25643" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25643" ref_url="https://www.suse.com/security/cve/CVE-2020-25643" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007544.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2980-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1655-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TH734NYI5EZD4XQ2VE5Y7HNPWOK3EVXA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1698-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ODIY42JEXH7RGWFLZMCA4RHYSA2XEWTJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2112-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4EZ6GLHJ7GRNO5SFTV2VI7JJOEEIMD6U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A flaw was found in the HDLC_PPP module of the Linux kernel in versions before 5.9-rc7. Memory corruption and a read overflow is caused by improper input validation in the ppp_cp_parse_cr function which can cause the system to crash or cause a denial of service. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25643/">CVE-2020-25643 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25643">CVE-2020-25643 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1177206">SUSE bug 1177206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177226">SUSE bug 1177226</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828811" comment="bpftool-3.10.0-1160.11.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828812" comment="kernel-3.10.0-1160.11.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828813" comment="kernel-abi-whitelists-3.10.0-1160.11.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828814" comment="kernel-debug-3.10.0-1160.11.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828817" comment="kernel-doc-3.10.0-1160.11.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828818" comment="kernel-headers-3.10.0-1160.11.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828819" comment="kernel-tools-3.10.0-1160.11.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828820" comment="kernel-tools-libs-3.10.0-1160.11.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828822" comment="perf-3.10.0-1160.11.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828823" comment="python-perf-3.10.0-1160.11.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025645" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25645</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25645" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25645" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25645" ref_url="https://www.suse.com/security/cve/CVE-2020-25645" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2980-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2981-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007601.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007798.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3400-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3402-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008612.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1682-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/P7AP5V2WMODZLL2BP3KNT37XWNT7K5NX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1698-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ODIY42JEXH7RGWFLZMCA4RHYSA2XEWTJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2112-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4EZ6GLHJ7GRNO5SFTV2VI7JJOEEIMD6U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel in versions before 5.9-rc7. Traffic between two Geneve endpoints may be unencrypted when IPsec is configured to encrypt traffic for the specific UDP port used by the GENEVE tunnel allowing anyone between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25645/">CVE-2020-25645 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25645">CVE-2020-25645 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1177511">SUSE bug 1177511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177513">SUSE bug 1177513</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828991" comment="bpftool-3.10.0-1160.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828992" comment="kernel-3.10.0-1160.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828993" comment="kernel-abi-whitelists-3.10.0-1160.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828994" comment="kernel-debug-3.10.0-1160.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828997" comment="kernel-doc-3.10.0-1160.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828998" comment="kernel-headers-3.10.0-1160.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828999" comment="kernel-tools-3.10.0-1160.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829000" comment="kernel-tools-libs-3.10.0-1160.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829002" comment="perf-3.10.0-1160.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829003" comment="python-perf-3.10.0-1160.21.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025647" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25647</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25647" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25647" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25647" ref_url="https://www.suse.com/security/cve/CVE-2020-25647" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0681-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008423.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008418.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-March/018162.html" source="SUSE-SU"/>
		<reference ref_id="TID000019892" ref_url="https://www.suse.com/support/kb/doc/?id=000019892" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0462-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XXPYL42MSKRB4D7LRFMW7PBGGLKSJKPS/" source="SUSE-SU"/>
    <description>
    A flaw was found in grub2 in versions prior to 2.06. During USB device initialization, descriptors are read with very little bounds checking and assumes the USB device is providing sane values. If properly exploited, an attacker could trigger memory corruption leading to arbitrary code execution allowing a bypass of the Secure Boot mechanism. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25647/">CVE-2020-25647 at SUSE</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25647">CVE-2020-25647 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1177883">SUSE bug 1177883</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828968" comment="grub2-2.02-0.87.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828969" comment="grub2-common-2.02-0.87.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828970" comment="grub2-efi-ia32-2.02-0.87.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828971" comment="grub2-efi-ia32-cdboot-2.02-0.87.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828972" comment="grub2-efi-ia32-modules-2.02-0.87.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828973" comment="grub2-efi-x64-2.02-0.87.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828974" comment="grub2-efi-x64-cdboot-2.02-0.87.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828975" comment="grub2-efi-x64-modules-2.02-0.87.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828976" comment="grub2-pc-2.02-0.87.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828977" comment="grub2-pc-modules-2.02-0.87.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828978" comment="grub2-tools-2.02-0.87.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828979" comment="grub2-tools-extra-2.02-0.87.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828980" comment="grub2-tools-minimal-2.02-0.87.el7_9.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025648" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25648</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25648" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25648" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25648" ref_url="https://www.suse.com/security/cve/CVE-2020-25648" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the way NSS handled CCS (ChangeCipherSpec) messages in TLS 1.3. This flaw allows a remote attacker to send multiple CCS messages, causing a denial of service for servers compiled with the NSS library. The highest threat from this vulnerability is to system availability. This flaw affects NSS versions before 3.58.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25648/">CVE-2020-25648 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25648">CVE-2020-25648 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1177917">SUSE bug 1177917</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829066" comment="nss-3.53.1-7.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829067" comment="nss-devel-3.53.1-7.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829068" comment="nss-pkcs11-devel-3.53.1-7.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829069" comment="nss-sysinit-3.53.1-7.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829070" comment="nss-tools-3.53.1-7.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025654" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25654</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25654" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25654" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25654" ref_url="https://www.suse.com/security/cve/CVE-2020-25654" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3054-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007665.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007674.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1782-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZV2VGOZZ4VYEWCBY73L27TONCDUEGOOY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1825-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ALZ3WACSNOI25KPU75MGY4VMQWERZHFP/" source="SUSE-SU"/>
    <description>
    An ACL bypass flaw was found in pacemaker. An attacker having a local account on the cluster and in the haclient group could use IPC communication with various daemons directly to perform certain tasks that they would be prevented by ACLs from doing if they went through the configuration.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25654/">CVE-2020-25654 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25654">CVE-2020-25654 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1173668">SUSE bug 1173668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177916">SUSE bug 1177916</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196165">SUSE bug 1196165</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828854" comment="pacemaker-1.1.23-1.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828855" comment="pacemaker-cli-1.1.23-1.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828856" comment="pacemaker-cluster-libs-1.1.23-1.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828857" comment="pacemaker-cts-1.1.23-1.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828858" comment="pacemaker-doc-1.1.23-1.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828859" comment="pacemaker-libs-1.1.23-1.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828860" comment="pacemaker-libs-devel-1.1.23-1.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828861" comment="pacemaker-nagios-plugins-metadata-1.1.23-1.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828862" comment="pacemaker-remote-1.1.23-1.el7_9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025656" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25656</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25656" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25656" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25656" ref_url="https://www.suse.com/security/cve/CVE-2020-25656" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1906-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W7MTGDUP74HR4XORTRYN7I7MANTKWCGQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2112-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4EZ6GLHJ7GRNO5SFTV2VI7JJOEEIMD6U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel. A use-after-free was found in the way the console subsystem was using ioctls KDGKBSENT and KDSKBSENT. A local user could use this flaw to get read memory access out of bounds. The highest threat from this vulnerability is to data confidentiality.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25656/">CVE-2020-25656 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25656">CVE-2020-25656 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1177766">SUSE bug 1177766</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828991" comment="bpftool-3.10.0-1160.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828992" comment="kernel-3.10.0-1160.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828993" comment="kernel-abi-whitelists-3.10.0-1160.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828994" comment="kernel-debug-3.10.0-1160.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828997" comment="kernel-doc-3.10.0-1160.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828998" comment="kernel-headers-3.10.0-1160.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828999" comment="kernel-tools-3.10.0-1160.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829000" comment="kernel-tools-libs-3.10.0-1160.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829002" comment="perf-3.10.0-1160.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829003" comment="python-perf-3.10.0-1160.21.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025684" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25684</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25684" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25684" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25684" ref_url="https://www.suse.com/security/cve/CVE-2020-25684" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008225.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008226.html" source="SUSE-SU"/>
		<reference ref_id="TID000019824" ref_url="https://www.suse.com/support/kb/doc/?id=000019824" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0124-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GY5KV2WHBZG4XCWVKZOU4DFCHSMBT5KV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0129-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6B57K75B7OP43O3RNF2Q6TTLL4DZ6KPE/" source="SUSE-SU"/>
    <description>
    A flaw was found in dnsmasq before version 2.83. When getting a reply from a forwarded query, dnsmasq checks in the forward.c:reply_query() if the reply destination address/port is used by the pending forwarded queries. However, it does not use the address/port to retrieve the exact forwarded query, substantially reducing the number of attempts an attacker on the network would have to perform to forge a reply and get it accepted by dnsmasq. This issue contrasts with RFC5452, which specifies a query's attributes that all must be used to match a reply. This flaw allows an attacker to perform a DNS Cache Poisoning attack. If chained with CVE-2020-25685 or CVE-2020-25686, the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-25684/">CVE-2020-25684 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25684">CVE-2020-25684 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1177077">SUSE bug 1177077</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828878" comment="dnsmasq-2.76-16.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828879" comment="dnsmasq-utils-2.76-16.el7_9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025685" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25685</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25685" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25685" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25685" ref_url="https://www.suse.com/security/cve/CVE-2020-25685" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008225.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008226.html" source="SUSE-SU"/>
		<reference ref_id="TID000019824" ref_url="https://www.suse.com/support/kb/doc/?id=000019824" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0124-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GY5KV2WHBZG4XCWVKZOU4DFCHSMBT5KV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0129-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6B57K75B7OP43O3RNF2Q6TTLL4DZ6KPE/" source="SUSE-SU"/>
    <description>
    A flaw was found in dnsmasq before version 2.83. When getting a reply from a forwarded query, dnsmasq checks in forward.c:reply_query(), which is the forwarded query that matches the reply, by only using a weak hash of the query name. Due to the weak hash (CRC32 when dnsmasq is compiled without DNSSEC, SHA-1 when it is) this flaw allows an off-path attacker to find several different domains all having the same hash, substantially reducing the number of attempts they would have to perform to forge a reply and get it accepted by dnsmasq. This is in contrast with RFC5452, which specifies that the query name is one of the attributes of a query that must be used to match a reply. This flaw could be abused to perform a DNS Cache Poisoning attack. If chained with CVE-2020-25684 the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-25685/">CVE-2020-25685 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25685">CVE-2020-25685 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1177077">SUSE bug 1177077</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828878" comment="dnsmasq-2.76-16.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828879" comment="dnsmasq-utils-2.76-16.el7_9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025686" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25686</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25686" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25686" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25686" ref_url="https://www.suse.com/security/cve/CVE-2020-25686" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008225.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008226.html" source="SUSE-SU"/>
		<reference ref_id="TID000019824" ref_url="https://www.suse.com/support/kb/doc/?id=000019824" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0124-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GY5KV2WHBZG4XCWVKZOU4DFCHSMBT5KV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0129-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6B57K75B7OP43O3RNF2Q6TTLL4DZ6KPE/" source="SUSE-SU"/>
    <description>
    A flaw was found in dnsmasq before version 2.83. When receiving a query, dnsmasq does not check for an existing pending request for the same name and forwards a new request. By default, a maximum of 150 pending queries can be sent to upstream servers, so there can be at most 150 queries for the same name. This flaw allows an off-path attacker on the network to substantially reduce the number of attempts that it would have to perform to forge a reply and have it accepted by dnsmasq. This issue is mentioned in the "Birthday Attacks" section of RFC5452. If chained with CVE-2020-25684, the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-25686/">CVE-2020-25686 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25686">CVE-2020-25686 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1177077">SUSE bug 1177077</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828878" comment="dnsmasq-2.76-16.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828879" comment="dnsmasq-utils-2.76-16.el7_9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025692" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25692</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25692" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25692" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25692" ref_url="https://www.suse.com/security/cve/CVE-2020-25692" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:673-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:674-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:677-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007773.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007774.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007790.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:707-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:709-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:17-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:8-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:9-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007765.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007764.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1918-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3VC65YBN4WMTACGDQE7SGD2ZBAJBKS3O/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1920-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/P5OV5ACOVPOXU3LAYTZRU6RI5XRK4L6W/" source="SUSE-SU"/>
    <description>
    A NULL pointer dereference was found in OpenLDAP server and was fixed in openldap 2.4.55, during a request for renaming RDNs. An unauthenticated attacker could remotely crash the slapd process by sending a specially crafted request, causing a Denial of Service.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25692/">CVE-2020-25692 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25692">CVE-2020-25692 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1178387">SUSE bug 1178387</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829071" comment="openldap-2.4.44-23.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829072" comment="openldap-clients-2.4.44-23.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829073" comment="openldap-devel-2.4.44-23.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829074" comment="openldap-servers-2.4.44-23.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829075" comment="openldap-servers-sql-2.4.44-23.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025694" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25694</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25694" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25694" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25694" ref_url="https://www.suse.com/security/cve/CVE-2020-25694" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3425-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007818.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008245.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2018-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/POYD3IAUBQT7S6ZQCAA74X6IBDUAZLMP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2019-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G6VHIJFOQOSKIFV42ZSMOTHSA5DC24KC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2028-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/L5R6PO3JMYKK4HQNK7WZVASGEFWHGSV5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2029-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IKSTAWI2GC3DK7OVNMCBYUONUED4FQJM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0337-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IQQBNVIVAXDZCJPFZE43ZEZ3C6DSC3WG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14360-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RSHH7GG3JERRES4WX7FTBWO2TZCAMJMP/" source="SUSE-SU"/>
    <description>
    A flaw was found in PostgreSQL versions before 13.1, before 12.5, before 11.10, before 10.15, before 9.6.20 and before 9.5.24. If a client application that creates additional database connections only reuses the basic connection parameters while dropping security-relevant parameters, an opportunity for a man-in-the-middle attack, or the ability to observe clear-text transmissions, could exist. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25694/">CVE-2020-25694 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25694">CVE-2020-25694 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1178667">SUSE bug 1178667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179870">SUSE bug 1179870</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829092" comment="postgresql-9.2.24-6.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829093" comment="postgresql-contrib-9.2.24-6.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829094" comment="postgresql-devel-9.2.24-6.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829095" comment="postgresql-docs-9.2.24-6.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829096" comment="postgresql-libs-9.2.24-6.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829097" comment="postgresql-plperl-9.2.24-6.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829098" comment="postgresql-plpython-9.2.24-6.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829099" comment="postgresql-pltcl-9.2.24-6.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829100" comment="postgresql-server-9.2.24-6.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829101" comment="postgresql-static-9.2.24-6.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829102" comment="postgresql-test-9.2.24-6.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829103" comment="postgresql-upgrade-9.2.24-6.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025695" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25695</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25695" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25695" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25695" ref_url="https://www.suse.com/security/cve/CVE-2020-25695" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3425-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007818.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008245.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2018-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/POYD3IAUBQT7S6ZQCAA74X6IBDUAZLMP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2019-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G6VHIJFOQOSKIFV42ZSMOTHSA5DC24KC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2028-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/L5R6PO3JMYKK4HQNK7WZVASGEFWHGSV5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2029-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IKSTAWI2GC3DK7OVNMCBYUONUED4FQJM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0337-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IQQBNVIVAXDZCJPFZE43ZEZ3C6DSC3WG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14360-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RSHH7GG3JERRES4WX7FTBWO2TZCAMJMP/" source="SUSE-SU"/>
    <description>
    A flaw was found in PostgreSQL versions before 13.1, before 12.5, before 11.10, before 10.15, before 9.6.20 and before 9.5.24. An attacker having permission to create non-temporary objects in at least one schema can execute arbitrary SQL functions under the identity of a superuser. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25695/">CVE-2020-25695 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25695">CVE-2020-25695 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1178666">SUSE bug 1178666</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829092" comment="postgresql-9.2.24-6.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829093" comment="postgresql-contrib-9.2.24-6.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829094" comment="postgresql-devel-9.2.24-6.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829095" comment="postgresql-docs-9.2.24-6.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829096" comment="postgresql-libs-9.2.24-6.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829097" comment="postgresql-plperl-9.2.24-6.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829098" comment="postgresql-plpython-9.2.24-6.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829099" comment="postgresql-pltcl-9.2.24-6.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829100" comment="postgresql-server-9.2.24-6.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829101" comment="postgresql-static-9.2.24-6.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829102" comment="postgresql-test-9.2.24-6.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829103" comment="postgresql-upgrade-9.2.24-6.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025704" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25704</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25704" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25704" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25704" ref_url="https://www.suse.com/security/cve/CVE-2020-25704" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007962.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1906-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W7MTGDUP74HR4XORTRYN7I7MANTKWCGQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2034-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7GIP2AYRG3VCHD6CCU4URBF5KVBKIT63/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2112-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4EZ6GLHJ7GRNO5SFTV2VI7JJOEEIMD6U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2260-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZYES3O2NEKKQXQ3R5CZOH5YCWJ3TJSKH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A flaw memory leak in the Linux kernel performance monitoring subsystem was found in the way if using PERF_EVENT_IOC_SET_FILTER. A local user could use this flaw to starve the resources causing denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25704/">CVE-2020-25704 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25704">CVE-2020-25704 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1178393">SUSE bug 1178393</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829509" comment="bpftool-3.10.0-1160.53.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829510" comment="kernel-3.10.0-1160.53.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829511" comment="kernel-abi-whitelists-3.10.0-1160.53.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829512" comment="kernel-debug-3.10.0-1160.53.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829515" comment="kernel-doc-3.10.0-1160.53.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829516" comment="kernel-headers-3.10.0-1160.53.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829517" comment="kernel-tools-3.10.0-1160.53.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829518" comment="kernel-tools-libs-3.10.0-1160.53.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829520" comment="perf-3.10.0-1160.53.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829521" comment="python-perf-3.10.0-1160.53.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025705" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25705</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25705" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25705" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25705" ref_url="https://www.suse.com/security/cve/CVE-2020-25705" source="SUSE CVE"/>
		<reference ref_id="SADDNS-BLOG" ref_url="https://www.suse.com/c/suse-releases-fix-for-saddns-vulnerability/" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3651-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3670-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007977.html" source="SUSE-SU"/>
		<reference ref_id="TID000019786" ref_url="https://www.suse.com/support/kb/doc/?id=000019786" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2034-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7GIP2AYRG3VCHD6CCU4URBF5KVBKIT63/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2112-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4EZ6GLHJ7GRNO5SFTV2VI7JJOEEIMD6U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2161-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ICEKZTGIQ6MSKDFOTIOJ2RLWAWJFPSYA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A flaw in ICMP packets in the Linux kernel may allow an attacker to quickly scan open UDP ports. This flaw allows an off-path remote attacker to effectively bypass source port UDP randomization. Software that relies on UDP source port randomization are indirectly affected as well on the Linux Based Products (RUGGEDCOM RM1224: All versions between v5.0 and v6.4, SCALANCE M-800: All versions between v5.0 and v6.4, SCALANCE S615: All versions between v5.0 and v6.4, SCALANCE SC-600: All versions prior to v2.1.3, SCALANCE W1750D: v8.3.0.1, v8.6.0, and v8.7.0, SIMATIC Cloud Connect 7: All versions, SIMATIC MV500 Family: All versions, SIMATIC NET CP 1243-1 (incl. SIPLUS variants): Versions 3.1.39 and later, SIMATIC NET CP 1243-7 LTE EU: Version
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-25705/">CVE-2020-25705 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25705">CVE-2020-25705 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1175721">SUSE bug 1175721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178782">SUSE bug 1178782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178783">SUSE bug 1178783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191790">SUSE bug 1191790</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828991" comment="bpftool-3.10.0-1160.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828992" comment="kernel-3.10.0-1160.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828993" comment="kernel-abi-whitelists-3.10.0-1160.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828994" comment="kernel-debug-3.10.0-1160.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828997" comment="kernel-doc-3.10.0-1160.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828998" comment="kernel-headers-3.10.0-1160.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828999" comment="kernel-tools-3.10.0-1160.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829000" comment="kernel-tools-libs-3.10.0-1160.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829002" comment="perf-3.10.0-1160.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829003" comment="python-perf-3.10.0-1160.21.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025709" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25709</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25709" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25709" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25709" ref_url="https://www.suse.com/security/cve/CVE-2020-25709" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:22-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:23-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:24-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:25-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:26-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:50-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:51-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008207.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0102-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HXI5DVBGML6XRCQGGMOYKQFUJDZ2JPS6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0107-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DU5LAY3LI5VYENQTLYA5AGNA47GQHI2B/" source="SUSE-SU"/>
    <description>
    A flaw was found in OpenLDAP. This flaw allows an attacker who can send a malicious packet to be processed by OpenLDAP's slapd server, to trigger an assertion failure. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-12-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25709/">CVE-2020-25709 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25709">CVE-2020-25709 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1178909">SUSE bug 1178909</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829602" comment="openldap-2.4.44-25.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829603" comment="openldap-clients-2.4.44-25.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829604" comment="openldap-devel-2.4.44-25.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829605" comment="openldap-servers-2.4.44-25.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829606" comment="openldap-servers-sql-2.4.44-25.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025710" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25710</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25710" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25710" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25710" ref_url="https://www.suse.com/security/cve/CVE-2020-25710" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:22-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:23-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:24-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:25-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:26-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:50-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:51-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008207.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0102-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HXI5DVBGML6XRCQGGMOYKQFUJDZ2JPS6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0107-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DU5LAY3LI5VYENQTLYA5AGNA47GQHI2B/" source="SUSE-SU"/>
    <description>
    A flaw was found in OpenLDAP in versions before 2.4.56. This flaw allows an attacker who sends a malicious packet processed by OpenLDAP to force a failed assertion in csnNormalize23(). The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25710/">CVE-2020-25710 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25710">CVE-2020-25710 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1178909">SUSE bug 1178909</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829602" comment="openldap-2.4.44-25.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829603" comment="openldap-clients-2.4.44-25.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829604" comment="openldap-devel-2.4.44-25.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829605" comment="openldap-servers-2.4.44-25.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829606" comment="openldap-servers-sql-2.4.44-25.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025712" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25712</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25712" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25712" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25712" ref_url="https://www.suse.com/security/cve/CVE-2020-25712" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007897.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2147-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HP4SY5GPVDDNTXYVZ6YALLHT7B5RVDBJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2186-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LJUVPABDGLSKQJMNPJUJBYOQTIDGD67K/" source="SUSE-SU"/>
    <description>
    A flaw was found in xorg-x11-server before 1.20.10. A heap-buffer overflow in XkbSetDeviceInfo may lead to a privilege escalation vulnerability. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25712/">CVE-2020-25712 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25712">CVE-2020-25712 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1174908">SUSE bug 1174908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177596">SUSE bug 1177596</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828799" comment="xorg-x11-server-Xdmx-1.20.4-15.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828800" comment="xorg-x11-server-Xephyr-1.20.4-15.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828801" comment="xorg-x11-server-Xnest-1.20.4-15.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828802" comment="xorg-x11-server-Xorg-1.20.4-15.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828803" comment="xorg-x11-server-Xvfb-1.20.4-15.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828804" comment="xorg-x11-server-Xwayland-1.20.4-15.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828805" comment="xorg-x11-server-common-1.20.4-15.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828806" comment="xorg-x11-server-devel-1.20.4-15.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828807" comment="xorg-x11-server-source-1.20.4-15.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025715" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25715</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25715" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25715" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25715" ref_url="https://www.suse.com/security/cve/CVE-2020-25715" source="SUSE CVE"/>
    <description>
    A flaw was found in pki-core 10.9.0. A specially crafted POST request can be used to reflect a DOM-based cross-site scripting (XSS) attack to inject code into the search query form which can get automatically executed. The highest threat from this vulnerability is to data integrity.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-25715/">CVE-2020-25715 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25715">CVE-2020-25715 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828983" comment="pki-base-10.5.18-12.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828984" comment="pki-base-java-10.5.18-12.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828985" comment="pki-ca-10.5.18-12.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828986" comment="pki-javadoc-10.5.18-12.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828987" comment="pki-kra-10.5.18-12.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828988" comment="pki-server-10.5.18-12.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828989" comment="pki-symkey-10.5.18-12.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828990" comment="pki-tools-10.5.18-12.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025717" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25717</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25717" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25717" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25717" ref_url="https://www.suse.com/security/cve/CVE-2020-25717" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2021:4095-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/021115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2021:4117-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/021132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2021:4126-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/021140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2021:4127-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/021141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2021:4149-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/021170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2021:4173-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/021201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2021:4173-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3650-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3673-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3674-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3746-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0361-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010209.html" source="SUSE-SU"/>
		<reference ref_id="TID000020533" ref_url="https://www.suse.com/support/kb/doc/?id=000020533" source="SUSE-SU"/>
		<reference ref_id="TID000020593" ref_url="https://www.suse.com/support/kb/doc/?id=000020593" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1471-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6W4QSQCTUGSIZCTRT4FGJNMRLZDUZS6Y/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3647-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/36K5HNX67LYX5XOVQRL3MSIC5YSJ5M5W/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3650-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7ZU5FWTEOBTHR7WNP3HEICT3NJTBNV2V/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3662-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DJMHDQABDOOUGOYNHF2X56XA57GXYYSN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3674-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZYEHJEQQ7LEL2T775B7QLR3IFR6LJGLZ/" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/pipermail/neuvector-updates/2023-November/000021.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the way Samba maps domain users to local users. An authenticated attacker could use this flaw to cause possible privilege escalation.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-25717/">CVE-2020-25717 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25717">CVE-2020-25717 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1192284">SUSE bug 1192284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192505">SUSE bug 1192505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192601">SUSE bug 1192601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192849">SUSE bug 1192849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193011">SUSE bug 1193011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194049">SUSE bug 1194049</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194307">SUSE bug 1194307</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195815">SUSE bug 1195815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196344">SUSE bug 1196344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196717">SUSE bug 1196717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196920">SUSE bug 1196920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205061">SUSE bug 1205061</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829457" comment="ctdb-4.10.16-17.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829458" comment="ctdb-tests-4.10.16-17.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829459" comment="libsmbclient-4.10.16-17.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829460" comment="libsmbclient-devel-4.10.16-17.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829461" comment="libwbclient-4.10.16-17.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829462" comment="libwbclient-devel-4.10.16-17.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829463" comment="samba-4.10.16-17.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829464" comment="samba-client-4.10.16-17.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829465" comment="samba-client-libs-4.10.16-17.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829466" comment="samba-common-4.10.16-17.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829467" comment="samba-common-libs-4.10.16-17.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829468" comment="samba-common-tools-4.10.16-17.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829469" comment="samba-dc-4.10.16-17.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829470" comment="samba-dc-libs-4.10.16-17.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829471" comment="samba-devel-4.10.16-17.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829472" comment="samba-krb5-printing-4.10.16-17.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829473" comment="samba-libs-4.10.16-17.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829474" comment="samba-pidl-4.10.16-17.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829475" comment="samba-python-4.10.16-17.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829476" comment="samba-python-test-4.10.16-17.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829477" comment="samba-test-4.10.16-17.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829478" comment="samba-test-libs-4.10.16-17.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829479" comment="samba-vfs-glusterfs-4.10.16-17.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829480" comment="samba-winbind-4.10.16-17.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829481" comment="samba-winbind-clients-4.10.16-17.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829482" comment="samba-winbind-krb5-locator-4.10.16-17.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829483" comment="samba-winbind-modules-4.10.16-17.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025719" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25719</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25719" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25719" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25719" ref_url="https://www.suse.com/security/cve/CVE-2020-25719" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0361-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010209.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3647-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/36K5HNX67LYX5XOVQRL3MSIC5YSJ5M5W/" source="SUSE-SU"/>
    <description>
    A flaw was found in the way Samba, as an Active Directory Domain Controller, implemented Kerberos name-based authentication. The Samba AD DC, could become confused about the user a ticket represents if it did not strictly require a Kerberos PAC and always use the SIDs found within. The result could include total domain compromise.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25719/">CVE-2020-25719 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25719">CVE-2020-25719 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1192247">SUSE bug 1192247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829484" comment="ipa-client-4.6.8-5.el7_9.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829485" comment="ipa-client-common-4.6.8-5.el7_9.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829486" comment="ipa-common-4.6.8-5.el7_9.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829487" comment="ipa-python-compat-4.6.8-5.el7_9.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829488" comment="ipa-server-4.6.8-5.el7_9.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829489" comment="ipa-server-common-4.6.8-5.el7_9.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829490" comment="ipa-server-dns-4.6.8-5.el7_9.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829491" comment="ipa-server-trust-ad-4.6.8-5.el7_9.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829492" comment="python2-ipaclient-4.6.8-5.el7_9.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829493" comment="python2-ipalib-4.6.8-5.el7_9.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829494" comment="python2-ipaserver-4.6.8-5.el7_9.10 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20202574" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-2574</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-2574" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2574" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-2574" ref_url="https://www.suse.com/security/cve/CVE-2020-2574" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0523-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006654.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0289-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2WWOUCCIRD2P3YRI5GU76EFPRT63XZMG/" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Client product of Oracle MySQL (component: C API). Supported versions that are affected are 5.6.46 and prior, 5.7.28 and prior and 8.0.18 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Client. CVSS 3.0 Base Score 5.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-2574/">CVE-2020-2574 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2574">CVE-2020-2574 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1161085">SUSE bug 1161085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162388">SUSE bug 1162388</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828504" comment="mariadb-5.5.68-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828505" comment="mariadb-bench-5.5.68-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828506" comment="mariadb-devel-5.5.68-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828507" comment="mariadb-embedded-5.5.68-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828508" comment="mariadb-embedded-devel-5.5.68-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828509" comment="mariadb-libs-5.5.68-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828510" comment="mariadb-server-5.5.68-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828511" comment="mariadb-test-5.5.68-1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20202583" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-2583</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-2583" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2583" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-2583" ref_url="https://www.suse.com/security/cve/CVE-2020-2583" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0231-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200231-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006507.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0113-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UHEFQFKPZG5GKRDDYOMR6437UBEB7DVN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0147-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EXE2DU5XRWUVQTJLZTYIUB2YYV4MG4EC/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-06"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2583/">CVE-2020-2583 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2583">CVE-2020-2583 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1160968">SUSE bug 1160968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162972">SUSE bug 1162972</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826906" comment="java-1.7.0-openjdk-1.7.0.251-2.6.21.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826907" comment="java-1.7.0-openjdk-accessibility-1.7.0.251-2.6.21.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826908" comment="java-1.7.0-openjdk-demo-1.7.0.251-2.6.21.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826909" comment="java-1.7.0-openjdk-devel-1.7.0.251-2.6.21.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826910" comment="java-1.7.0-openjdk-headless-1.7.0.251-2.6.21.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826911" comment="java-1.7.0-openjdk-javadoc-1.7.0.251-2.6.21.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826912" comment="java-1.7.0-openjdk-src-1.7.0.251-2.6.21.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826846" comment="java-1.8.0-openjdk-1.8.0.242.b08-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826847" comment="java-1.8.0-openjdk-accessibility-1.8.0.242.b08-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826848" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.242.b08-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826849" comment="java-1.8.0-openjdk-debug-1.8.0.242.b08-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826850" comment="java-1.8.0-openjdk-demo-1.8.0.242.b08-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826851" comment="java-1.8.0-openjdk-demo-debug-1.8.0.242.b08-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826852" comment="java-1.8.0-openjdk-devel-1.8.0.242.b08-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826853" comment="java-1.8.0-openjdk-devel-debug-1.8.0.242.b08-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826854" comment="java-1.8.0-openjdk-headless-1.8.0.242.b08-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826855" comment="java-1.8.0-openjdk-headless-debug-1.8.0.242.b08-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826856" comment="java-1.8.0-openjdk-javadoc-1.8.0.242.b08-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826857" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.242.b08-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826858" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.242.b08-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826859" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.242.b08-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826860" comment="java-1.8.0-openjdk-src-1.8.0.242.b08-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826861" comment="java-1.8.0-openjdk-src-debug-1.8.0.242.b08-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826808" comment="java-11-openjdk-11.0.6.10-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826809" comment="java-11-openjdk-debug-11.0.6.10-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826810" comment="java-11-openjdk-demo-11.0.6.10-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826811" comment="java-11-openjdk-demo-debug-11.0.6.10-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826812" comment="java-11-openjdk-devel-11.0.6.10-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826813" comment="java-11-openjdk-devel-debug-11.0.6.10-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826814" comment="java-11-openjdk-headless-11.0.6.10-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826815" comment="java-11-openjdk-headless-debug-11.0.6.10-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826816" comment="java-11-openjdk-javadoc-11.0.6.10-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826817" comment="java-11-openjdk-javadoc-debug-11.0.6.10-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826818" comment="java-11-openjdk-javadoc-zip-11.0.6.10-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826819" comment="java-11-openjdk-javadoc-zip-debug-11.0.6.10-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826820" comment="java-11-openjdk-jmods-11.0.6.10-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826821" comment="java-11-openjdk-jmods-debug-11.0.6.10-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826822" comment="java-11-openjdk-src-11.0.6.10-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826823" comment="java-11-openjdk-src-debug-11.0.6.10-1.el7_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20202590" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-2590</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-2590" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2590" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-2590" ref_url="https://www.suse.com/security/cve/CVE-2020-2590" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0231-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200231-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006592.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0113-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UHEFQFKPZG5GKRDDYOMR6437UBEB7DVN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0147-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EXE2DU5XRWUVQTJLZTYIUB2YYV4MG4EC/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Security). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via Kerberos to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-07"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2590/">CVE-2020-2590 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2590">CVE-2020-2590 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1160968">SUSE bug 1160968</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826906" comment="java-1.7.0-openjdk-1.7.0.251-2.6.21.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826907" comment="java-1.7.0-openjdk-accessibility-1.7.0.251-2.6.21.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826908" comment="java-1.7.0-openjdk-demo-1.7.0.251-2.6.21.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826909" comment="java-1.7.0-openjdk-devel-1.7.0.251-2.6.21.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826910" comment="java-1.7.0-openjdk-headless-1.7.0.251-2.6.21.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826911" comment="java-1.7.0-openjdk-javadoc-1.7.0.251-2.6.21.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826912" comment="java-1.7.0-openjdk-src-1.7.0.251-2.6.21.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826846" comment="java-1.8.0-openjdk-1.8.0.242.b08-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826847" comment="java-1.8.0-openjdk-accessibility-1.8.0.242.b08-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826848" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.242.b08-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826849" comment="java-1.8.0-openjdk-debug-1.8.0.242.b08-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826850" comment="java-1.8.0-openjdk-demo-1.8.0.242.b08-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826851" comment="java-1.8.0-openjdk-demo-debug-1.8.0.242.b08-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826852" comment="java-1.8.0-openjdk-devel-1.8.0.242.b08-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826853" comment="java-1.8.0-openjdk-devel-debug-1.8.0.242.b08-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826854" comment="java-1.8.0-openjdk-headless-1.8.0.242.b08-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826855" comment="java-1.8.0-openjdk-headless-debug-1.8.0.242.b08-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826856" comment="java-1.8.0-openjdk-javadoc-1.8.0.242.b08-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826857" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.242.b08-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826858" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.242.b08-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826859" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.242.b08-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826860" comment="java-1.8.0-openjdk-src-1.8.0.242.b08-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826861" comment="java-1.8.0-openjdk-src-debug-1.8.0.242.b08-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826808" comment="java-11-openjdk-11.0.6.10-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826809" comment="java-11-openjdk-debug-11.0.6.10-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826810" comment="java-11-openjdk-demo-11.0.6.10-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826811" comment="java-11-openjdk-demo-debug-11.0.6.10-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826812" comment="java-11-openjdk-devel-11.0.6.10-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826813" comment="java-11-openjdk-devel-debug-11.0.6.10-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826814" comment="java-11-openjdk-headless-11.0.6.10-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826815" comment="java-11-openjdk-headless-debug-11.0.6.10-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826816" comment="java-11-openjdk-javadoc-11.0.6.10-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826817" comment="java-11-openjdk-javadoc-debug-11.0.6.10-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826818" comment="java-11-openjdk-javadoc-zip-11.0.6.10-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826819" comment="java-11-openjdk-javadoc-zip-debug-11.0.6.10-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826820" comment="java-11-openjdk-jmods-11.0.6.10-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826821" comment="java-11-openjdk-jmods-debug-11.0.6.10-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826822" comment="java-11-openjdk-src-11.0.6.10-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826823" comment="java-11-openjdk-src-debug-11.0.6.10-1.el7_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20202593" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-2593</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-2593" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2593" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-2593" ref_url="https://www.suse.com/security/cve/CVE-2020-2593" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0231-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200231-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006507.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0113-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UHEFQFKPZG5GKRDDYOMR6437UBEB7DVN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0147-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EXE2DU5XRWUVQTJLZTYIUB2YYV4MG4EC/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2593/">CVE-2020-2593 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2593">CVE-2020-2593 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1160968">SUSE bug 1160968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162972">SUSE bug 1162972</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826906" comment="java-1.7.0-openjdk-1.7.0.251-2.6.21.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826907" comment="java-1.7.0-openjdk-accessibility-1.7.0.251-2.6.21.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826908" comment="java-1.7.0-openjdk-demo-1.7.0.251-2.6.21.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826909" comment="java-1.7.0-openjdk-devel-1.7.0.251-2.6.21.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826910" comment="java-1.7.0-openjdk-headless-1.7.0.251-2.6.21.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826911" comment="java-1.7.0-openjdk-javadoc-1.7.0.251-2.6.21.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826912" comment="java-1.7.0-openjdk-src-1.7.0.251-2.6.21.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826846" comment="java-1.8.0-openjdk-1.8.0.242.b08-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826847" comment="java-1.8.0-openjdk-accessibility-1.8.0.242.b08-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826848" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.242.b08-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826849" comment="java-1.8.0-openjdk-debug-1.8.0.242.b08-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826850" comment="java-1.8.0-openjdk-demo-1.8.0.242.b08-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826851" comment="java-1.8.0-openjdk-demo-debug-1.8.0.242.b08-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826852" comment="java-1.8.0-openjdk-devel-1.8.0.242.b08-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826853" comment="java-1.8.0-openjdk-devel-debug-1.8.0.242.b08-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826854" comment="java-1.8.0-openjdk-headless-1.8.0.242.b08-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826855" comment="java-1.8.0-openjdk-headless-debug-1.8.0.242.b08-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826856" comment="java-1.8.0-openjdk-javadoc-1.8.0.242.b08-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826857" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.242.b08-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826858" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.242.b08-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826859" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.242.b08-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826860" comment="java-1.8.0-openjdk-src-1.8.0.242.b08-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826861" comment="java-1.8.0-openjdk-src-debug-1.8.0.242.b08-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826808" comment="java-11-openjdk-11.0.6.10-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826809" comment="java-11-openjdk-debug-11.0.6.10-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826810" comment="java-11-openjdk-demo-11.0.6.10-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826811" comment="java-11-openjdk-demo-debug-11.0.6.10-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826812" comment="java-11-openjdk-devel-11.0.6.10-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826813" comment="java-11-openjdk-devel-debug-11.0.6.10-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826814" comment="java-11-openjdk-headless-11.0.6.10-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826815" comment="java-11-openjdk-headless-debug-11.0.6.10-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826816" comment="java-11-openjdk-javadoc-11.0.6.10-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826817" comment="java-11-openjdk-javadoc-debug-11.0.6.10-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826818" comment="java-11-openjdk-javadoc-zip-11.0.6.10-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826819" comment="java-11-openjdk-javadoc-zip-debug-11.0.6.10-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826820" comment="java-11-openjdk-jmods-11.0.6.10-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826821" comment="java-11-openjdk-jmods-debug-11.0.6.10-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826822" comment="java-11-openjdk-src-11.0.6.10-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826823" comment="java-11-openjdk-src-debug-11.0.6.10-1.el7_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20202601" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-2601</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-2601" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2601" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-2601" ref_url="https://www.suse.com/security/cve/CVE-2020-2601" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0231-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200231-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006592.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0113-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UHEFQFKPZG5GKRDDYOMR6437UBEB7DVN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0147-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EXE2DU5XRWUVQTJLZTYIUB2YYV4MG4EC/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Security). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via Kerberos to compromise Java SE, Java SE Embedded. While the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 6.8 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2601/">CVE-2020-2601 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2601">CVE-2020-2601 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1160968">SUSE bug 1160968</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826906" comment="java-1.7.0-openjdk-1.7.0.251-2.6.21.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826907" comment="java-1.7.0-openjdk-accessibility-1.7.0.251-2.6.21.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826908" comment="java-1.7.0-openjdk-demo-1.7.0.251-2.6.21.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826909" comment="java-1.7.0-openjdk-devel-1.7.0.251-2.6.21.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826910" comment="java-1.7.0-openjdk-headless-1.7.0.251-2.6.21.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826911" comment="java-1.7.0-openjdk-javadoc-1.7.0.251-2.6.21.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826912" comment="java-1.7.0-openjdk-src-1.7.0.251-2.6.21.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826846" comment="java-1.8.0-openjdk-1.8.0.242.b08-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826847" comment="java-1.8.0-openjdk-accessibility-1.8.0.242.b08-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826848" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.242.b08-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826849" comment="java-1.8.0-openjdk-debug-1.8.0.242.b08-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826850" comment="java-1.8.0-openjdk-demo-1.8.0.242.b08-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826851" comment="java-1.8.0-openjdk-demo-debug-1.8.0.242.b08-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826852" comment="java-1.8.0-openjdk-devel-1.8.0.242.b08-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826853" comment="java-1.8.0-openjdk-devel-debug-1.8.0.242.b08-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826854" comment="java-1.8.0-openjdk-headless-1.8.0.242.b08-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826855" comment="java-1.8.0-openjdk-headless-debug-1.8.0.242.b08-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826856" comment="java-1.8.0-openjdk-javadoc-1.8.0.242.b08-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826857" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.242.b08-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826858" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.242.b08-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826859" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.242.b08-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826860" comment="java-1.8.0-openjdk-src-1.8.0.242.b08-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826861" comment="java-1.8.0-openjdk-src-debug-1.8.0.242.b08-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826808" comment="java-11-openjdk-11.0.6.10-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826809" comment="java-11-openjdk-debug-11.0.6.10-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826810" comment="java-11-openjdk-demo-11.0.6.10-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826811" comment="java-11-openjdk-demo-debug-11.0.6.10-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826812" comment="java-11-openjdk-devel-11.0.6.10-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826813" comment="java-11-openjdk-devel-debug-11.0.6.10-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826814" comment="java-11-openjdk-headless-11.0.6.10-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826815" comment="java-11-openjdk-headless-debug-11.0.6.10-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826816" comment="java-11-openjdk-javadoc-11.0.6.10-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826817" comment="java-11-openjdk-javadoc-debug-11.0.6.10-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826818" comment="java-11-openjdk-javadoc-zip-11.0.6.10-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826819" comment="java-11-openjdk-javadoc-zip-debug-11.0.6.10-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826820" comment="java-11-openjdk-jmods-11.0.6.10-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826821" comment="java-11-openjdk-jmods-debug-11.0.6.10-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826822" comment="java-11-openjdk-src-11.0.6.10-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826823" comment="java-11-openjdk-src-debug-11.0.6.10-1.el7_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20202604" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-2604</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-2604" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2604" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-2604" ref_url="https://www.suse.com/security/cve/CVE-2020-2604" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0231-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200231-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006507.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0113-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UHEFQFKPZG5GKRDDYOMR6437UBEB7DVN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0147-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EXE2DU5XRWUVQTJLZTYIUB2YYV4MG4EC/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS v3.0 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2604/">CVE-2020-2604 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2604">CVE-2020-2604 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1160968">SUSE bug 1160968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162972">SUSE bug 1162972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165863">SUSE bug 1165863</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826906" comment="java-1.7.0-openjdk-1.7.0.251-2.6.21.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826907" comment="java-1.7.0-openjdk-accessibility-1.7.0.251-2.6.21.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826908" comment="java-1.7.0-openjdk-demo-1.7.0.251-2.6.21.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826909" comment="java-1.7.0-openjdk-devel-1.7.0.251-2.6.21.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826910" comment="java-1.7.0-openjdk-headless-1.7.0.251-2.6.21.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826911" comment="java-1.7.0-openjdk-javadoc-1.7.0.251-2.6.21.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826912" comment="java-1.7.0-openjdk-src-1.7.0.251-2.6.21.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826846" comment="java-1.8.0-openjdk-1.8.0.242.b08-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826847" comment="java-1.8.0-openjdk-accessibility-1.8.0.242.b08-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826848" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.242.b08-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826849" comment="java-1.8.0-openjdk-debug-1.8.0.242.b08-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826850" comment="java-1.8.0-openjdk-demo-1.8.0.242.b08-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826851" comment="java-1.8.0-openjdk-demo-debug-1.8.0.242.b08-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826852" comment="java-1.8.0-openjdk-devel-1.8.0.242.b08-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826853" comment="java-1.8.0-openjdk-devel-debug-1.8.0.242.b08-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826854" comment="java-1.8.0-openjdk-headless-1.8.0.242.b08-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826855" comment="java-1.8.0-openjdk-headless-debug-1.8.0.242.b08-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826856" comment="java-1.8.0-openjdk-javadoc-1.8.0.242.b08-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826857" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.242.b08-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826858" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.242.b08-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826859" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.242.b08-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826860" comment="java-1.8.0-openjdk-src-1.8.0.242.b08-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826861" comment="java-1.8.0-openjdk-src-debug-1.8.0.242.b08-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826808" comment="java-11-openjdk-11.0.6.10-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826809" comment="java-11-openjdk-debug-11.0.6.10-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826810" comment="java-11-openjdk-demo-11.0.6.10-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826811" comment="java-11-openjdk-demo-debug-11.0.6.10-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826812" comment="java-11-openjdk-devel-11.0.6.10-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826813" comment="java-11-openjdk-devel-debug-11.0.6.10-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826814" comment="java-11-openjdk-headless-11.0.6.10-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826815" comment="java-11-openjdk-headless-debug-11.0.6.10-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826816" comment="java-11-openjdk-javadoc-11.0.6.10-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826817" comment="java-11-openjdk-javadoc-debug-11.0.6.10-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826818" comment="java-11-openjdk-javadoc-zip-11.0.6.10-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826819" comment="java-11-openjdk-javadoc-zip-debug-11.0.6.10-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826820" comment="java-11-openjdk-jmods-11.0.6.10-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826821" comment="java-11-openjdk-jmods-debug-11.0.6.10-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826822" comment="java-11-openjdk-src-11.0.6.10-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826823" comment="java-11-openjdk-src-debug-11.0.6.10-1.el7_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026116" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26116</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26116" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26116" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26116" ref_url="https://www.suse.com/security/cve/CVE-2020-26116" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:17-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:410-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0341-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008345.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1859-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HZUR4GGWYLZ7VYS4RR7MJ7D7RHSBYJQP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1988-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KQJZUPSO3MIAIYJBX2VTZETYQSLUJQPN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2332-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S3JTHM6LLDKL7VPNRJUSRPNZAD2FZ25H/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2333-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FLGERALYYFTBIX3ZKPM6EQ2WJVUXLOXY/" source="SUSE-SU"/>
    <description>
    http.client in Python 3.x before 3.5.10, 3.6.x before 3.6.12, 3.7.x before 3.7.9, and 3.8.x before 3.8.5 allows CRLF injection if the attacker controls the HTTP request method, as demonstrated by inserting CR and LF control characters in the first argument of HTTPConnection.request.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-26116/">CVE-2020-26116 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26116">CVE-2020-26116 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1177120">SUSE bug 1177120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177211">SUSE bug 1177211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192361">SUSE bug 1192361</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829745" comment="python-2.7.5-92.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829746" comment="python-debug-2.7.5-92.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829747" comment="python-devel-2.7.5-92.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829748" comment="python-libs-2.7.5-92.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829749" comment="python-test-2.7.5-92.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829750" comment="python-tools-2.7.5-92.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829751" comment="tkinter-2.7.5-92.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026137" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26137</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26137" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26137" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26137" ref_url="https://www.suse.com/security/cve/CVE-2020-26137" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:17-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0444-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0447-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0450-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0452-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0456-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007763.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009517.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2237-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3Y5UAWOTOHQRGI2VNSOUDC2SOAHGJLAH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2282-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VS7J7DOJY26YMLJIUVHRH7UQFVLGBWIQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1206-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6CAFSANHH6TU43VSKAJ5JA2EMHSREMKP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2817-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TOZI5ZFPFR2BACIE74HUJWDXC2ZWXNGD/" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/pipermail/neuvector-updates/2023-November/000021.html" source="SUSE-SU"/>
    <description>
    urllib3 before 1.25.9 allows CRLF injection if the attacker controls the HTTP request method, as demonstrated by inserting CR and LF control characters in the first argument of putrequest(). NOTE: this is similar to CVE-2020-26116.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26137/">CVE-2020-26137 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26137">CVE-2020-26137 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1177120">SUSE bug 1177120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177211">SUSE bug 1177211</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829745" comment="python-2.7.5-92.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829746" comment="python-debug-2.7.5-92.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829747" comment="python-devel-2.7.5-92.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829748" comment="python-libs-2.7.5-92.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829749" comment="python-test-2.7.5-92.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829750" comment="python-tools-2.7.5-92.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829751" comment="tkinter-2.7.5-92.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026217" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26217</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26217" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26217" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26217" ref_url="https://www.suse.com/security/cve/CVE-2020-26217" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008228.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008524.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0140-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CTO6QRFLVKVHOYBP6VLJP4KZXZFZSKET/" source="SUSE-SU"/>
    <description>
    XStream before version 1.4.14 is vulnerable to Remote Code Execution.The vulnerability may allow a remote attacker to run arbitrary shell commands only by manipulating the processed input stream. Only users who rely on blocklists are affected. Anyone using XStream's Security Framework allowlist is not affected. The linked advisory provides code workarounds for users who cannot upgrade. The issue is fixed in version 1.4.14.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26217/">CVE-2020-26217 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26217">CVE-2020-26217 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1180994">SUSE bug 1180994</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828880" comment="xstream-1.3.1-12.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828881" comment="xstream-javadoc-1.3.1-12.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20202654" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-2654</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-2654" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2654" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-2654" ref_url="https://www.suse.com/security/cve/CVE-2020-2654" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0231-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200231-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006985.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0113-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UHEFQFKPZG5GKRDDYOMR6437UBEB7DVN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0147-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EXE2DU5XRWUVQTJLZTYIUB2YYV4MG4EC/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2654/">CVE-2020-2654 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2654">CVE-2020-2654 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1160968">SUSE bug 1160968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172277">SUSE bug 1172277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826906" comment="java-1.7.0-openjdk-1.7.0.251-2.6.21.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826907" comment="java-1.7.0-openjdk-accessibility-1.7.0.251-2.6.21.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826908" comment="java-1.7.0-openjdk-demo-1.7.0.251-2.6.21.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826909" comment="java-1.7.0-openjdk-devel-1.7.0.251-2.6.21.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826910" comment="java-1.7.0-openjdk-headless-1.7.0.251-2.6.21.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826911" comment="java-1.7.0-openjdk-javadoc-1.7.0.251-2.6.21.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826912" comment="java-1.7.0-openjdk-src-1.7.0.251-2.6.21.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826846" comment="java-1.8.0-openjdk-1.8.0.242.b08-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826847" comment="java-1.8.0-openjdk-accessibility-1.8.0.242.b08-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826848" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.242.b08-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826849" comment="java-1.8.0-openjdk-debug-1.8.0.242.b08-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826850" comment="java-1.8.0-openjdk-demo-1.8.0.242.b08-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826851" comment="java-1.8.0-openjdk-demo-debug-1.8.0.242.b08-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826852" comment="java-1.8.0-openjdk-devel-1.8.0.242.b08-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826853" comment="java-1.8.0-openjdk-devel-debug-1.8.0.242.b08-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826854" comment="java-1.8.0-openjdk-headless-1.8.0.242.b08-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826855" comment="java-1.8.0-openjdk-headless-debug-1.8.0.242.b08-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826856" comment="java-1.8.0-openjdk-javadoc-1.8.0.242.b08-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826857" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.242.b08-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826858" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.242.b08-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826859" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.242.b08-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826860" comment="java-1.8.0-openjdk-src-1.8.0.242.b08-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826861" comment="java-1.8.0-openjdk-src-debug-1.8.0.242.b08-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826808" comment="java-11-openjdk-11.0.6.10-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826809" comment="java-11-openjdk-debug-11.0.6.10-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826810" comment="java-11-openjdk-demo-11.0.6.10-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826811" comment="java-11-openjdk-demo-debug-11.0.6.10-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826812" comment="java-11-openjdk-devel-11.0.6.10-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826813" comment="java-11-openjdk-devel-debug-11.0.6.10-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826814" comment="java-11-openjdk-headless-11.0.6.10-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826815" comment="java-11-openjdk-headless-debug-11.0.6.10-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826816" comment="java-11-openjdk-javadoc-11.0.6.10-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826817" comment="java-11-openjdk-javadoc-debug-11.0.6.10-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826818" comment="java-11-openjdk-javadoc-zip-11.0.6.10-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826819" comment="java-11-openjdk-javadoc-zip-debug-11.0.6.10-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826820" comment="java-11-openjdk-jmods-11.0.6.10-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826821" comment="java-11-openjdk-jmods-debug-11.0.6.10-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826822" comment="java-11-openjdk-src-11.0.6.10-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826823" comment="java-11-openjdk-src-debug-11.0.6.10-1.el7_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20202655" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-2655</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-2655" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2655" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-2655" ref_url="https://www.suse.com/security/cve/CVE-2020-2655" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006398.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0113-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UHEFQFKPZG5GKRDDYOMR6437UBEB7DVN/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 11.0.5 and 13.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE accessible data as well as unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2655/">CVE-2020-2655 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2655">CVE-2020-2655 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1160968">SUSE bug 1160968</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826808" comment="java-11-openjdk-11.0.6.10-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826809" comment="java-11-openjdk-debug-11.0.6.10-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826810" comment="java-11-openjdk-demo-11.0.6.10-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826811" comment="java-11-openjdk-demo-debug-11.0.6.10-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826812" comment="java-11-openjdk-devel-11.0.6.10-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826813" comment="java-11-openjdk-devel-debug-11.0.6.10-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826814" comment="java-11-openjdk-headless-11.0.6.10-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826815" comment="java-11-openjdk-headless-debug-11.0.6.10-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826816" comment="java-11-openjdk-javadoc-11.0.6.10-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826817" comment="java-11-openjdk-javadoc-debug-11.0.6.10-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826818" comment="java-11-openjdk-javadoc-zip-11.0.6.10-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826819" comment="java-11-openjdk-javadoc-zip-debug-11.0.6.10-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826820" comment="java-11-openjdk-jmods-11.0.6.10-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826821" comment="java-11-openjdk-jmods-debug-11.0.6.10-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826822" comment="java-11-openjdk-src-11.0.6.10-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826823" comment="java-11-openjdk-src-debug-11.0.6.10-1.el7_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20202659" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-2659</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-2659" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2659" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-2659" ref_url="https://www.suse.com/security/cve/CVE-2020-2659" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0231-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200231-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006507.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0147-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EXE2DU5XRWUVQTJLZTYIUB2YYV4MG4EC/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u241 and 8u231; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-05"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2659/">CVE-2020-2659 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2659">CVE-2020-2659 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1160968">SUSE bug 1160968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162972">SUSE bug 1162972</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826906" comment="java-1.7.0-openjdk-1.7.0.251-2.6.21.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826907" comment="java-1.7.0-openjdk-accessibility-1.7.0.251-2.6.21.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826908" comment="java-1.7.0-openjdk-demo-1.7.0.251-2.6.21.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826909" comment="java-1.7.0-openjdk-devel-1.7.0.251-2.6.21.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826910" comment="java-1.7.0-openjdk-headless-1.7.0.251-2.6.21.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826911" comment="java-1.7.0-openjdk-javadoc-1.7.0.251-2.6.21.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826912" comment="java-1.7.0-openjdk-src-1.7.0.251-2.6.21.0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826846" comment="java-1.8.0-openjdk-1.8.0.242.b08-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826847" comment="java-1.8.0-openjdk-accessibility-1.8.0.242.b08-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826848" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.242.b08-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826849" comment="java-1.8.0-openjdk-debug-1.8.0.242.b08-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826850" comment="java-1.8.0-openjdk-demo-1.8.0.242.b08-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826851" comment="java-1.8.0-openjdk-demo-debug-1.8.0.242.b08-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826852" comment="java-1.8.0-openjdk-devel-1.8.0.242.b08-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826853" comment="java-1.8.0-openjdk-devel-debug-1.8.0.242.b08-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826854" comment="java-1.8.0-openjdk-headless-1.8.0.242.b08-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826855" comment="java-1.8.0-openjdk-headless-debug-1.8.0.242.b08-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826856" comment="java-1.8.0-openjdk-javadoc-1.8.0.242.b08-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826857" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.242.b08-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826858" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.242.b08-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826859" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.242.b08-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826860" comment="java-1.8.0-openjdk-src-1.8.0.242.b08-0.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826861" comment="java-1.8.0-openjdk-src-debug-1.8.0.242.b08-0.el7_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026950" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26950</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26950" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26950" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26950" ref_url="https://www.suse.com/security/cve/CVE-2020-26950" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007779.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007812.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1909-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3AMXWTXD2SXOW4LKFZ4XU2QOQYXVDMOL/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1919-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/I6SUAYN7JWUE2A26Q6GJ5JMMXTKYHZSL/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2022-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RMGXD75QZYXYUNEY2A43RG5HRUA6C7BT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2133-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/A3SMMQGPABLYJBCFGYFKI43SSCXS244L/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    In certain circumstances, the MCallGetProperty opcode can be emitted with unmet assumptions resulting in an exploitable use-after-free condition. This vulnerability affects Firefox &lt; 82.0.3, Firefox ESR &lt; 78.4.1, and Thunderbird &lt; 78.4.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26950/">CVE-2020-26950 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26950">CVE-2020-26950 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1177872">SUSE bug 1177872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178588">SUSE bug 1178588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178611">SUSE bug 1178611</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828782" comment="firefox-78.4.1-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828783" comment="thunderbird-78.4.3-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026951" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26951</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26951" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26951" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26951" ref_url="https://www.suse.com/security/cve/CVE-2020-26951" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007883.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2020-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LK7W6L42GLCUWLGKEJNDWSRASOS3CLIA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2031-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KX646YBHO2LBCWJZORVE6CWXY2DMCYHR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2096-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DVMMW4XRNOGVJH2XZU4UUV2ATGSF6TJ6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2187-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JXIRQKYZLZFQPPH6RZY4V3IIMPGHUT5V/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2315-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/76P3E35NHCSZCWGVU63J3OKJKJO3HUJD/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A parsing and event loading mismatch in Firefox's SVG code could have allowed load events to fire, even after sanitization. An attacker already capable of exploiting an XSS vulnerability in privileged internal pages could have used this attack to bypass our built-in sanitizer. This vulnerability affects Firefox &lt; 83, Firefox ESR &lt; 78.5, and Thunderbird &lt; 78.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26951/">CVE-2020-26951 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26951">CVE-2020-26951 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1178824">SUSE bug 1178824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178894">SUSE bug 1178894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828785" comment="firefox-78.5.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828784" comment="thunderbird-78.5.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026953" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26953</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26953" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26953" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26953" ref_url="https://www.suse.com/security/cve/CVE-2020-26953" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007883.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2020-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LK7W6L42GLCUWLGKEJNDWSRASOS3CLIA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2031-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KX646YBHO2LBCWJZORVE6CWXY2DMCYHR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2096-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DVMMW4XRNOGVJH2XZU4UUV2ATGSF6TJ6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2187-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JXIRQKYZLZFQPPH6RZY4V3IIMPGHUT5V/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2315-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/76P3E35NHCSZCWGVU63J3OKJKJO3HUJD/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    It was possible to cause the browser to enter fullscreen mode without displaying the security UI; thus making it possible to attempt a phishing attack or otherwise confuse the user. This vulnerability affects Firefox &lt; 83, Firefox ESR &lt; 78.5, and Thunderbird &lt; 78.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26953/">CVE-2020-26953 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26953">CVE-2020-26953 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1178824">SUSE bug 1178824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178894">SUSE bug 1178894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828785" comment="firefox-78.5.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828784" comment="thunderbird-78.5.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026956" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26956</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26956" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26956" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26956" ref_url="https://www.suse.com/security/cve/CVE-2020-26956" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007883.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2020-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LK7W6L42GLCUWLGKEJNDWSRASOS3CLIA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2031-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KX646YBHO2LBCWJZORVE6CWXY2DMCYHR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2096-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DVMMW4XRNOGVJH2XZU4UUV2ATGSF6TJ6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2187-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JXIRQKYZLZFQPPH6RZY4V3IIMPGHUT5V/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2315-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/76P3E35NHCSZCWGVU63J3OKJKJO3HUJD/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    In some cases, removing HTML elements during sanitization would keep existing SVG event handlers and therefore lead to XSS. This vulnerability affects Firefox &lt; 83, Firefox ESR &lt; 78.5, and Thunderbird &lt; 78.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26956/">CVE-2020-26956 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26956">CVE-2020-26956 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1178824">SUSE bug 1178824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178894">SUSE bug 1178894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828785" comment="firefox-78.5.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828784" comment="thunderbird-78.5.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026958" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26958</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26958" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26958" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26958" ref_url="https://www.suse.com/security/cve/CVE-2020-26958" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007883.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2020-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LK7W6L42GLCUWLGKEJNDWSRASOS3CLIA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2031-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KX646YBHO2LBCWJZORVE6CWXY2DMCYHR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2096-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DVMMW4XRNOGVJH2XZU4UUV2ATGSF6TJ6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2187-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JXIRQKYZLZFQPPH6RZY4V3IIMPGHUT5V/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2315-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/76P3E35NHCSZCWGVU63J3OKJKJO3HUJD/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Firefox did not block execution of scripts with incorrect MIME types when the response was intercepted and cached through a ServiceWorker. This could lead to a cross-site script inclusion vulnerability, or a Content Security Policy bypass. This vulnerability affects Firefox &lt; 83, Firefox ESR &lt; 78.5, and Thunderbird &lt; 78.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26958/">CVE-2020-26958 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26958">CVE-2020-26958 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1178824">SUSE bug 1178824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178894">SUSE bug 1178894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828785" comment="firefox-78.5.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828784" comment="thunderbird-78.5.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026959" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26959</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26959" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26959" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26959" ref_url="https://www.suse.com/security/cve/CVE-2020-26959" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007883.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2020-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LK7W6L42GLCUWLGKEJNDWSRASOS3CLIA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2031-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KX646YBHO2LBCWJZORVE6CWXY2DMCYHR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2096-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DVMMW4XRNOGVJH2XZU4UUV2ATGSF6TJ6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2187-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JXIRQKYZLZFQPPH6RZY4V3IIMPGHUT5V/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2315-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/76P3E35NHCSZCWGVU63J3OKJKJO3HUJD/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    During browser shutdown, reference decrementing could have occured on a previously freed object, resulting in a use-after-free, memory corruption, and a potentially exploitable crash. This vulnerability affects Firefox &lt; 83, Firefox ESR &lt; 78.5, and Thunderbird &lt; 78.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26959/">CVE-2020-26959 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26959">CVE-2020-26959 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1178824">SUSE bug 1178824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178894">SUSE bug 1178894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828785" comment="firefox-78.5.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828784" comment="thunderbird-78.5.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026960" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26960</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26960" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26960" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26960" ref_url="https://www.suse.com/security/cve/CVE-2020-26960" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007883.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2020-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LK7W6L42GLCUWLGKEJNDWSRASOS3CLIA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2031-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KX646YBHO2LBCWJZORVE6CWXY2DMCYHR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2096-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DVMMW4XRNOGVJH2XZU4UUV2ATGSF6TJ6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2187-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JXIRQKYZLZFQPPH6RZY4V3IIMPGHUT5V/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2315-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/76P3E35NHCSZCWGVU63J3OKJKJO3HUJD/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    If the Compact() method was called on an nsTArray, the array could have been reallocated without updating other pointers, leading to a potential use-after-free and exploitable crash. This vulnerability affects Firefox &lt; 83, Firefox ESR &lt; 78.5, and Thunderbird &lt; 78.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26960/">CVE-2020-26960 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26960">CVE-2020-26960 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1178824">SUSE bug 1178824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178894">SUSE bug 1178894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828785" comment="firefox-78.5.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828784" comment="thunderbird-78.5.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026961" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26961</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26961" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26961" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26961" ref_url="https://www.suse.com/security/cve/CVE-2020-26961" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007883.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2020-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LK7W6L42GLCUWLGKEJNDWSRASOS3CLIA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2031-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KX646YBHO2LBCWJZORVE6CWXY2DMCYHR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2096-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DVMMW4XRNOGVJH2XZU4UUV2ATGSF6TJ6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2187-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JXIRQKYZLZFQPPH6RZY4V3IIMPGHUT5V/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2315-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/76P3E35NHCSZCWGVU63J3OKJKJO3HUJD/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    When DNS over HTTPS is in use, it intentionally filters RFC1918 and related IP ranges from the responses as these do not make sense coming from a DoH resolver. However when an IPv4 address was mapped through IPv6, these addresses were erroneously let through, leading to a potential DNS Rebinding attack. This vulnerability affects Firefox &lt; 83, Firefox ESR &lt; 78.5, and Thunderbird &lt; 78.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26961/">CVE-2020-26961 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26961">CVE-2020-26961 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1178824">SUSE bug 1178824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178894">SUSE bug 1178894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828785" comment="firefox-78.5.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828784" comment="thunderbird-78.5.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026965" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26965</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26965" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26965" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26965" ref_url="https://www.suse.com/security/cve/CVE-2020-26965" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007883.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2020-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LK7W6L42GLCUWLGKEJNDWSRASOS3CLIA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2031-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KX646YBHO2LBCWJZORVE6CWXY2DMCYHR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2096-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DVMMW4XRNOGVJH2XZU4UUV2ATGSF6TJ6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2187-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JXIRQKYZLZFQPPH6RZY4V3IIMPGHUT5V/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2315-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/76P3E35NHCSZCWGVU63J3OKJKJO3HUJD/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Some websites have a feature "Show Password" where clicking a button will change a password field into a textbook field, revealing the typed password. If, when using a software keyboard that remembers user input, a user typed their password and used that feature, the type of the password field was changed, resulting in a keyboard layout change and the possibility for the software keyboard to remember the typed password. This vulnerability affects Firefox &lt; 83, Firefox ESR &lt; 78.5, and Thunderbird &lt; 78.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-26965/">CVE-2020-26965 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26965">CVE-2020-26965 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1178824">SUSE bug 1178824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178894">SUSE bug 1178894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828785" comment="firefox-78.5.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828784" comment="thunderbird-78.5.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026968" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26968</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26968" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26968" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26968" ref_url="https://www.suse.com/security/cve/CVE-2020-26968" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007883.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2020-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LK7W6L42GLCUWLGKEJNDWSRASOS3CLIA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2031-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KX646YBHO2LBCWJZORVE6CWXY2DMCYHR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2096-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DVMMW4XRNOGVJH2XZU4UUV2ATGSF6TJ6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2187-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JXIRQKYZLZFQPPH6RZY4V3IIMPGHUT5V/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2315-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/76P3E35NHCSZCWGVU63J3OKJKJO3HUJD/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Mozilla developers reported memory safety bugs present in Firefox 82 and Firefox ESR 78.4. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 83, Firefox ESR &lt; 78.5, and Thunderbird &lt; 78.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26968/">CVE-2020-26968 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26968">CVE-2020-26968 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1178824">SUSE bug 1178824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178894">SUSE bug 1178894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828785" comment="firefox-78.5.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828784" comment="thunderbird-78.5.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026970" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26970</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26970" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26970" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26970" ref_url="https://www.suse.com/security/cve/CVE-2020-26970" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008122.html" source="SUSE-SU"/>
    <description>
    When reading SMTP server status codes, Thunderbird writes an integer value to a position on the stack that is intended to contain just one byte. Depending on processor architecture and stack layout, this leads to stack corruption that may be exploitable. This vulnerability affects Thunderbird &lt; 78.5.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-26970/">CVE-2020-26970 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26970">CVE-2020-26970 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1179530">SUSE bug 1179530</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828795" comment="thunderbird-78.5.1-1.el7_9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026971" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26971</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26971" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26971" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26971" ref_url="https://www.suse.com/security/cve/CVE-2020-26971" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008122.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2317-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZRYMYUEZXYQNBK2DWV7DAYE5EXEQPBUX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2318-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LL2B6S5KIA4HGLES3CDLSB4VRZW275H2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2324-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MFGNB2YB4LDKDYXRSTS5R357XYHABN5P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2325-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JZN3OVPTOCIWBAWJK4JZQDXFN752D6AR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Certain blit values provided by the user were not properly constrained leading to a heap buffer overflow on some video drivers. This vulnerability affects Firefox &lt; 84, Thunderbird &lt; 78.6, and Firefox ESR &lt; 78.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26971/">CVE-2020-26971 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26971">CVE-2020-26971 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1180039">SUSE bug 1180039</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828863" comment="firefox-78.6.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828869" comment="thunderbird-78.6.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026973" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26973</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26973" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26973" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26973" ref_url="https://www.suse.com/security/cve/CVE-2020-26973" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008122.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2317-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZRYMYUEZXYQNBK2DWV7DAYE5EXEQPBUX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2318-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LL2B6S5KIA4HGLES3CDLSB4VRZW275H2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2324-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MFGNB2YB4LDKDYXRSTS5R357XYHABN5P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2325-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JZN3OVPTOCIWBAWJK4JZQDXFN752D6AR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Certain input to the CSS Sanitizer confused it, resulting in incorrect components being removed. This could have been used as a sanitizer bypass. This vulnerability affects Firefox &lt; 84, Thunderbird &lt; 78.6, and Firefox ESR &lt; 78.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26973/">CVE-2020-26973 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26973">CVE-2020-26973 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1180039">SUSE bug 1180039</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828863" comment="firefox-78.6.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828869" comment="thunderbird-78.6.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026974" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26974</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26974" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26974" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26974" ref_url="https://www.suse.com/security/cve/CVE-2020-26974" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008122.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2317-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZRYMYUEZXYQNBK2DWV7DAYE5EXEQPBUX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2318-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LL2B6S5KIA4HGLES3CDLSB4VRZW275H2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2324-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MFGNB2YB4LDKDYXRSTS5R357XYHABN5P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2325-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JZN3OVPTOCIWBAWJK4JZQDXFN752D6AR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    When flex-basis was used on a table wrapper, a StyleGenericFlexBasis object could have been incorrectly cast to the wrong type. This resulted in a heap user-after-free, memory corruption, and a potentially exploitable crash. This vulnerability affects Firefox &lt; 84, Thunderbird &lt; 78.6, and Firefox ESR &lt; 78.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26974/">CVE-2020-26974 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26974">CVE-2020-26974 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1180039">SUSE bug 1180039</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828863" comment="firefox-78.6.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828869" comment="thunderbird-78.6.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026976" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26976</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26976" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26976" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26976" ref_url="https://www.suse.com/security/cve/CVE-2020-26976" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008256.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0208-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PJ6EGWAN3STX7MVPJ6SXVNB6AQBHBJEA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0209-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LV6TQVT6324Y5SWHTL34EKZT7PFDOYE4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0222-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PYQVYICIBRGAYRG5HERVZ2YG2FAQSVAR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0223-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/52CRMXRMPMDDBTKZVMDMEO76I3JZEYGF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    When a HTTPS pages was embedded in a HTTP page, and there was a service worker registered for the former, the service worker could have intercepted the request for the secure page despite the iframe not being a secure context due to the (insecure) framing. This vulnerability affects Firefox &lt; 84.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26976/">CVE-2020-26976 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26976">CVE-2020-26976 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1180039">SUSE bug 1180039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181414">SUSE bug 1181414</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828884" comment="firefox-78.7.0-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828885" comment="thunderbird-78.7.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026978" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26978</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26978" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26978" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26978" ref_url="https://www.suse.com/security/cve/CVE-2020-26978" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008122.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2317-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZRYMYUEZXYQNBK2DWV7DAYE5EXEQPBUX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2318-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LL2B6S5KIA4HGLES3CDLSB4VRZW275H2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2324-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MFGNB2YB4LDKDYXRSTS5R357XYHABN5P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2325-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JZN3OVPTOCIWBAWJK4JZQDXFN752D6AR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Using techniques that built on the slipstream research, a malicious webpage could have exposed both an internal network's hosts as well as services running on the user's local machine. This vulnerability affects Firefox &lt; 84, Thunderbird &lt; 78.6, and Firefox ESR &lt; 78.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26978/">CVE-2020-26978 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26978">CVE-2020-26978 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1180039">SUSE bug 1180039</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828863" comment="firefox-78.6.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828869" comment="thunderbird-78.6.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027170" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27170</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27170" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27170" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27170" ref_url="https://www.suse.com/security/cve/CVE-2020-27170" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1210-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0532-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZC652CKFCHQCNNU7MZKBTO27OZE22Q5U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0758-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BUQVIATUWQNZFSV6IFJENJSRWJSP2QHF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.11.8. kernel/bpf/verifier.c performs undesirable out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory, aka CID-f232326f6966. This affects pointer types that do not define a ptr_limit.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-27170/">CVE-2020-27170 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27170">CVE-2020-27170 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1183686">SUSE bug 1183686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183775">SUSE bug 1183775</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829154" comment="bpftool-3.10.0-1160.31.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829155" comment="kernel-3.10.0-1160.31.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829156" comment="kernel-abi-whitelists-3.10.0-1160.31.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829157" comment="kernel-debug-3.10.0-1160.31.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829160" comment="kernel-doc-3.10.0-1160.31.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829161" comment="kernel-headers-3.10.0-1160.31.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829162" comment="kernel-tools-3.10.0-1160.31.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829163" comment="kernel-tools-libs-3.10.0-1160.31.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829165" comment="perf-3.10.0-1160.31.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829166" comment="python-perf-3.10.0-1160.31.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20202732" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-2732</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-2732" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2732" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-2732" ref_url="https://www.suse.com/security/cve/CVE-2020-2732" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0336-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LSSHQFX4IJH5UZIPQACYQ6RIWLLJPS6R/" source="SUSE-SU"/>
    <description>
    A flaw was discovered in the way that the KVM hypervisor handled instruction emulation for an L2 guest when nested virtualisation is enabled. Under some circumstances, an L2 guest may trick the L0 guest into accessing sensitive L1 resources that should be inaccessible to the L2 guest.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-2732/">CVE-2020-2732 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2732">CVE-2020-2732 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1163971">SUSE bug 1163971</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828543" comment="bpftool-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828544" comment="kernel-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828545" comment="kernel-abi-whitelists-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828546" comment="kernel-debug-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828549" comment="kernel-doc-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828550" comment="kernel-headers-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828551" comment="kernel-tools-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828552" comment="kernel-tools-libs-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828554" comment="perf-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828555" comment="python-perf-3.10.0-1160.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20202752" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-2752</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-2752" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2752" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-2752" ref_url="https://www.suse.com/security/cve/CVE-2020-2752" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007915.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0870-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AF4G5AT4UQQLEPLII3FJM3MCCFFEVLGX/" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Client product of Oracle MySQL (component: C API). Supported versions that are affected are 5.6.47 and prior, 5.7.27 and prior and 8.0.17 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Client. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2752/">CVE-2020-2752 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2752">CVE-2020-2752 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1171550">SUSE bug 1171550</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828504" comment="mariadb-5.5.68-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828505" comment="mariadb-bench-5.5.68-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828506" comment="mariadb-devel-5.5.68-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828507" comment="mariadb-embedded-5.5.68-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828508" comment="mariadb-embedded-devel-5.5.68-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828509" comment="mariadb-libs-5.5.68-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828510" comment="mariadb-server-5.5.68-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828511" comment="mariadb-test-5.5.68-1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20202754" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-2754</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-2754" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2754" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-2754" ref_url="https://www.suse.com/security/cve/CVE-2020-2754" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1511-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1569-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1572-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006987.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0757-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SDEP4JPECWYIDSKVUAK7GXMXY4KKSX4F/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0800-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O5TZOSA2HN7YVJLBZ65OCTYL45LXKWSO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0841-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/56SMPQCDYAYIGH6IZE2Q6FR76AXS3AYR/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Scripting). Supported versions that are affected are Java SE: 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2754/">CVE-2020-2754 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2754">CVE-2020-2754 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1169511">SUSE bug 1169511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172277">SUSE bug 1172277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827949" comment="java-1.8.0-openjdk-1.8.0.252.b09-2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827950" comment="java-1.8.0-openjdk-accessibility-1.8.0.252.b09-2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827951" comment="java-1.8.0-openjdk-demo-1.8.0.252.b09-2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827952" comment="java-1.8.0-openjdk-devel-1.8.0.252.b09-2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827953" comment="java-1.8.0-openjdk-headless-1.8.0.252.b09-2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827954" comment="java-1.8.0-openjdk-javadoc-1.8.0.252.b09-2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827955" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.252.b09-2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827956" comment="java-1.8.0-openjdk-src-1.8.0.252.b09-2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827923" comment="java-11-openjdk-11.0.7.10-4.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827924" comment="java-11-openjdk-demo-11.0.7.10-4.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827925" comment="java-11-openjdk-devel-11.0.7.10-4.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827926" comment="java-11-openjdk-headless-11.0.7.10-4.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827927" comment="java-11-openjdk-javadoc-11.0.7.10-4.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827928" comment="java-11-openjdk-javadoc-zip-11.0.7.10-4.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827929" comment="java-11-openjdk-jmods-11.0.7.10-4.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827930" comment="java-11-openjdk-src-11.0.7.10-4.el7_8 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20202755" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-2755</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-2755" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2755" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-2755" ref_url="https://www.suse.com/security/cve/CVE-2020-2755" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1511-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1569-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1572-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006987.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0757-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SDEP4JPECWYIDSKVUAK7GXMXY4KKSX4F/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0800-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O5TZOSA2HN7YVJLBZ65OCTYL45LXKWSO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0841-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/56SMPQCDYAYIGH6IZE2Q6FR76AXS3AYR/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Scripting). Supported versions that are affected are Java SE: 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2755/">CVE-2020-2755 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2755">CVE-2020-2755 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1169511">SUSE bug 1169511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172277">SUSE bug 1172277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827949" comment="java-1.8.0-openjdk-1.8.0.252.b09-2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827950" comment="java-1.8.0-openjdk-accessibility-1.8.0.252.b09-2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827951" comment="java-1.8.0-openjdk-demo-1.8.0.252.b09-2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827952" comment="java-1.8.0-openjdk-devel-1.8.0.252.b09-2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827953" comment="java-1.8.0-openjdk-headless-1.8.0.252.b09-2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827954" comment="java-1.8.0-openjdk-javadoc-1.8.0.252.b09-2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827955" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.252.b09-2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827956" comment="java-1.8.0-openjdk-src-1.8.0.252.b09-2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827923" comment="java-11-openjdk-11.0.7.10-4.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827924" comment="java-11-openjdk-demo-11.0.7.10-4.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827925" comment="java-11-openjdk-devel-11.0.7.10-4.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827926" comment="java-11-openjdk-headless-11.0.7.10-4.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827927" comment="java-11-openjdk-javadoc-11.0.7.10-4.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827928" comment="java-11-openjdk-javadoc-zip-11.0.7.10-4.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827929" comment="java-11-openjdk-jmods-11.0.7.10-4.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827930" comment="java-11-openjdk-src-11.0.7.10-4.el7_8 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20202756" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-2756</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-2756" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2756" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-2756" ref_url="https://www.suse.com/security/cve/CVE-2020-2756" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1511-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1569-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1572-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006987.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0757-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SDEP4JPECWYIDSKVUAK7GXMXY4KKSX4F/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0800-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O5TZOSA2HN7YVJLBZ65OCTYL45LXKWSO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0841-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/56SMPQCDYAYIGH6IZE2Q6FR76AXS3AYR/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2756/">CVE-2020-2756 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2756">CVE-2020-2756 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1169511">SUSE bug 1169511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172277">SUSE bug 1172277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827916" comment="java-1.7.0-openjdk-1.7.0.261-2.6.22.2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827917" comment="java-1.7.0-openjdk-accessibility-1.7.0.261-2.6.22.2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827918" comment="java-1.7.0-openjdk-demo-1.7.0.261-2.6.22.2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827919" comment="java-1.7.0-openjdk-devel-1.7.0.261-2.6.22.2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827920" comment="java-1.7.0-openjdk-headless-1.7.0.261-2.6.22.2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827921" comment="java-1.7.0-openjdk-javadoc-1.7.0.261-2.6.22.2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827922" comment="java-1.7.0-openjdk-src-1.7.0.261-2.6.22.2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827949" comment="java-1.8.0-openjdk-1.8.0.252.b09-2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827950" comment="java-1.8.0-openjdk-accessibility-1.8.0.252.b09-2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827951" comment="java-1.8.0-openjdk-demo-1.8.0.252.b09-2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827952" comment="java-1.8.0-openjdk-devel-1.8.0.252.b09-2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827953" comment="java-1.8.0-openjdk-headless-1.8.0.252.b09-2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827954" comment="java-1.8.0-openjdk-javadoc-1.8.0.252.b09-2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827955" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.252.b09-2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827956" comment="java-1.8.0-openjdk-src-1.8.0.252.b09-2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827923" comment="java-11-openjdk-11.0.7.10-4.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827924" comment="java-11-openjdk-demo-11.0.7.10-4.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827925" comment="java-11-openjdk-devel-11.0.7.10-4.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827926" comment="java-11-openjdk-headless-11.0.7.10-4.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827927" comment="java-11-openjdk-javadoc-11.0.7.10-4.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827928" comment="java-11-openjdk-javadoc-zip-11.0.7.10-4.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827929" comment="java-11-openjdk-jmods-11.0.7.10-4.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827930" comment="java-11-openjdk-src-11.0.7.10-4.el7_8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827916" comment="java-1.7.0-openjdk-1.7.0.261-2.6.22.2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827917" comment="java-1.7.0-openjdk-accessibility-1.7.0.261-2.6.22.2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827918" comment="java-1.7.0-openjdk-demo-1.7.0.261-2.6.22.2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827919" comment="java-1.7.0-openjdk-devel-1.7.0.261-2.6.22.2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827920" comment="java-1.7.0-openjdk-headless-1.7.0.261-2.6.22.2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827921" comment="java-1.7.0-openjdk-javadoc-1.7.0.261-2.6.22.2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827922" comment="java-1.7.0-openjdk-src-1.7.0.261-2.6.22.2.el7_8 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20202757" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-2757</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-2757" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2757" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-2757" ref_url="https://www.suse.com/security/cve/CVE-2020-2757" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1511-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1569-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1572-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006987.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0757-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SDEP4JPECWYIDSKVUAK7GXMXY4KKSX4F/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0800-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O5TZOSA2HN7YVJLBZ65OCTYL45LXKWSO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0841-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/56SMPQCDYAYIGH6IZE2Q6FR76AXS3AYR/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2757/">CVE-2020-2757 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2757">CVE-2020-2757 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1169511">SUSE bug 1169511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172277">SUSE bug 1172277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827916" comment="java-1.7.0-openjdk-1.7.0.261-2.6.22.2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827917" comment="java-1.7.0-openjdk-accessibility-1.7.0.261-2.6.22.2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827918" comment="java-1.7.0-openjdk-demo-1.7.0.261-2.6.22.2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827919" comment="java-1.7.0-openjdk-devel-1.7.0.261-2.6.22.2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827920" comment="java-1.7.0-openjdk-headless-1.7.0.261-2.6.22.2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827921" comment="java-1.7.0-openjdk-javadoc-1.7.0.261-2.6.22.2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827922" comment="java-1.7.0-openjdk-src-1.7.0.261-2.6.22.2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827949" comment="java-1.8.0-openjdk-1.8.0.252.b09-2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827950" comment="java-1.8.0-openjdk-accessibility-1.8.0.252.b09-2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827951" comment="java-1.8.0-openjdk-demo-1.8.0.252.b09-2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827952" comment="java-1.8.0-openjdk-devel-1.8.0.252.b09-2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827953" comment="java-1.8.0-openjdk-headless-1.8.0.252.b09-2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827954" comment="java-1.8.0-openjdk-javadoc-1.8.0.252.b09-2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827955" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.252.b09-2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827956" comment="java-1.8.0-openjdk-src-1.8.0.252.b09-2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827923" comment="java-11-openjdk-11.0.7.10-4.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827924" comment="java-11-openjdk-demo-11.0.7.10-4.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827925" comment="java-11-openjdk-devel-11.0.7.10-4.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827926" comment="java-11-openjdk-headless-11.0.7.10-4.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827927" comment="java-11-openjdk-javadoc-11.0.7.10-4.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827928" comment="java-11-openjdk-javadoc-zip-11.0.7.10-4.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827929" comment="java-11-openjdk-jmods-11.0.7.10-4.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827930" comment="java-11-openjdk-src-11.0.7.10-4.el7_8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827916" comment="java-1.7.0-openjdk-1.7.0.261-2.6.22.2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827917" comment="java-1.7.0-openjdk-accessibility-1.7.0.261-2.6.22.2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827918" comment="java-1.7.0-openjdk-demo-1.7.0.261-2.6.22.2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827919" comment="java-1.7.0-openjdk-devel-1.7.0.261-2.6.22.2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827920" comment="java-1.7.0-openjdk-headless-1.7.0.261-2.6.22.2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827921" comment="java-1.7.0-openjdk-javadoc-1.7.0.261-2.6.22.2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827922" comment="java-1.7.0-openjdk-src-1.7.0.261-2.6.22.2.el7_8 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20202767" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-2767</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-2767" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2767" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-2767" ref_url="https://www.suse.com/security/cve/CVE-2020-2767" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1511-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1572-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006907.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0757-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SDEP4JPECWYIDSKVUAK7GXMXY4KKSX4F/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 11.0.6 and 14. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE accessible data as well as unauthorized read access to a subset of Java SE accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2767/">CVE-2020-2767 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2767">CVE-2020-2767 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1169511">SUSE bug 1169511</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827923" comment="java-11-openjdk-11.0.7.10-4.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827924" comment="java-11-openjdk-demo-11.0.7.10-4.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827925" comment="java-11-openjdk-devel-11.0.7.10-4.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827926" comment="java-11-openjdk-headless-11.0.7.10-4.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827927" comment="java-11-openjdk-javadoc-11.0.7.10-4.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827928" comment="java-11-openjdk-javadoc-zip-11.0.7.10-4.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827929" comment="java-11-openjdk-jmods-11.0.7.10-4.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827930" comment="java-11-openjdk-src-11.0.7.10-4.el7_8 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20202773" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-2773</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-2773" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2773" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-2773" ref_url="https://www.suse.com/security/cve/CVE-2020-2773" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1511-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1569-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1572-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006987.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0757-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SDEP4JPECWYIDSKVUAK7GXMXY4KKSX4F/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0800-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O5TZOSA2HN7YVJLBZ65OCTYL45LXKWSO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0841-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/56SMPQCDYAYIGH6IZE2Q6FR76AXS3AYR/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Security). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2773/">CVE-2020-2773 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2773">CVE-2020-2773 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1169511">SUSE bug 1169511</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827916" comment="java-1.7.0-openjdk-1.7.0.261-2.6.22.2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827917" comment="java-1.7.0-openjdk-accessibility-1.7.0.261-2.6.22.2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827918" comment="java-1.7.0-openjdk-demo-1.7.0.261-2.6.22.2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827919" comment="java-1.7.0-openjdk-devel-1.7.0.261-2.6.22.2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827920" comment="java-1.7.0-openjdk-headless-1.7.0.261-2.6.22.2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827921" comment="java-1.7.0-openjdk-javadoc-1.7.0.261-2.6.22.2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827922" comment="java-1.7.0-openjdk-src-1.7.0.261-2.6.22.2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827949" comment="java-1.8.0-openjdk-1.8.0.252.b09-2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827950" comment="java-1.8.0-openjdk-accessibility-1.8.0.252.b09-2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827951" comment="java-1.8.0-openjdk-demo-1.8.0.252.b09-2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827952" comment="java-1.8.0-openjdk-devel-1.8.0.252.b09-2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827953" comment="java-1.8.0-openjdk-headless-1.8.0.252.b09-2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827954" comment="java-1.8.0-openjdk-javadoc-1.8.0.252.b09-2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827955" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.252.b09-2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827956" comment="java-1.8.0-openjdk-src-1.8.0.252.b09-2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827923" comment="java-11-openjdk-11.0.7.10-4.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827924" comment="java-11-openjdk-demo-11.0.7.10-4.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827925" comment="java-11-openjdk-devel-11.0.7.10-4.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827926" comment="java-11-openjdk-headless-11.0.7.10-4.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827927" comment="java-11-openjdk-javadoc-11.0.7.10-4.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827928" comment="java-11-openjdk-javadoc-zip-11.0.7.10-4.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827929" comment="java-11-openjdk-jmods-11.0.7.10-4.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827930" comment="java-11-openjdk-src-11.0.7.10-4.el7_8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827916" comment="java-1.7.0-openjdk-1.7.0.261-2.6.22.2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827917" comment="java-1.7.0-openjdk-accessibility-1.7.0.261-2.6.22.2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827918" comment="java-1.7.0-openjdk-demo-1.7.0.261-2.6.22.2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827919" comment="java-1.7.0-openjdk-devel-1.7.0.261-2.6.22.2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827920" comment="java-1.7.0-openjdk-headless-1.7.0.261-2.6.22.2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827921" comment="java-1.7.0-openjdk-javadoc-1.7.0.261-2.6.22.2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827922" comment="java-1.7.0-openjdk-src-1.7.0.261-2.6.22.2.el7_8 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027749" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27749</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27749" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27749" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27749" ref_url="https://www.suse.com/security/cve/CVE-2020-27749" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0681-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008423.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008418.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-March/018162.html" source="SUSE-SU"/>
		<reference ref_id="TID000019892" ref_url="https://www.suse.com/support/kb/doc/?id=000019892" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0462-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XXPYL42MSKRB4D7LRFMW7PBGGLKSJKPS/" source="SUSE-SU"/>
    <description>
    A flaw was found in grub2 in versions prior to 2.06. Variable names present are expanded in the supplied command line into their corresponding variable contents, using a 1kB stack buffer for temporary storage, without sufficient bounds checking. If the function is called with a command line that references a variable with a sufficiently large payload, it is possible to overflow the stack buffer, corrupt the stack frame and control execution which could also circumvent Secure Boot protections. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27749/">CVE-2020-27749 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27749">CVE-2020-27749 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1179264">SUSE bug 1179264</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828968" comment="grub2-2.02-0.87.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828969" comment="grub2-common-2.02-0.87.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828970" comment="grub2-efi-ia32-2.02-0.87.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828971" comment="grub2-efi-ia32-cdboot-2.02-0.87.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828972" comment="grub2-efi-ia32-modules-2.02-0.87.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828973" comment="grub2-efi-x64-2.02-0.87.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828974" comment="grub2-efi-x64-cdboot-2.02-0.87.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828975" comment="grub2-efi-x64-modules-2.02-0.87.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828976" comment="grub2-pc-2.02-0.87.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828977" comment="grub2-pc-modules-2.02-0.87.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828978" comment="grub2-tools-2.02-0.87.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828979" comment="grub2-tools-extra-2.02-0.87.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828980" comment="grub2-tools-minimal-2.02-0.87.el7_9.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027777" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27777</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27777" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27777" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27777" ref_url="https://www.suse.com/security/cve/CVE-2020-27777" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3714-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-December/017242.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3718-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2161-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ICEKZTGIQ6MSKDFOTIOJ2RLWAWJFPSYA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2193-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4YRSQJNKLIOJJTD3P2UKMHRFMCIG3JDN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2260-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZYES3O2NEKKQXQ3R5CZOH5YCWJ3TJSKH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0060-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IGMHKFBCILMH7EZ36H75HXZ2RO2WG2GR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0075-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H7EJISS2OPKUSJFJ2BG5ZWHA2Z6H3VQB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A flaw was found in the way RTAS handled memory accesses in userspace to kernel communication. On a locked down (usually due to Secure Boot) guest system running on top of PowerVM or KVM hypervisors (pseries platform) a root like local user could use this flaw to further increase their privileges to that of a running kernel.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27777/">CVE-2020-27777 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27777">CVE-2020-27777 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1179107">SUSE bug 1179107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179419">SUSE bug 1179419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200343">SUSE bug 1200343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220060">SUSE bug 1220060</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829273" comment="bpftool-3.10.0-1160.41.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829274" comment="kernel-3.10.0-1160.41.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829275" comment="kernel-abi-whitelists-3.10.0-1160.41.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829276" comment="kernel-debug-3.10.0-1160.41.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829279" comment="kernel-doc-3.10.0-1160.41.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829280" comment="kernel-headers-3.10.0-1160.41.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829281" comment="kernel-tools-3.10.0-1160.41.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829282" comment="kernel-tools-libs-3.10.0-1160.41.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829284" comment="perf-3.10.0-1160.41.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829285" comment="python-perf-3.10.0-1160.41.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027779" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27779</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27779" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27779" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27779" ref_url="https://www.suse.com/security/cve/CVE-2020-27779" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0681-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008423.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008418.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-March/018162.html" source="SUSE-SU"/>
		<reference ref_id="TID000019892" ref_url="https://www.suse.com/support/kb/doc/?id=000019892" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0462-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XXPYL42MSKRB4D7LRFMW7PBGGLKSJKPS/" source="SUSE-SU"/>
    <description>
    A flaw was found in grub2 in versions prior to 2.06. The cutmem command does not honor secure boot locking allowing an privileged attacker to remove address ranges from memory creating an opportunity to circumvent SecureBoot protections after proper triage about grub's memory layout. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27779/">CVE-2020-27779 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27779">CVE-2020-27779 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1179265">SUSE bug 1179265</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828968" comment="grub2-2.02-0.87.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828969" comment="grub2-common-2.02-0.87.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828970" comment="grub2-efi-ia32-2.02-0.87.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828971" comment="grub2-efi-ia32-cdboot-2.02-0.87.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828972" comment="grub2-efi-ia32-modules-2.02-0.87.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828973" comment="grub2-efi-x64-2.02-0.87.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828974" comment="grub2-efi-x64-cdboot-2.02-0.87.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828975" comment="grub2-efi-x64-modules-2.02-0.87.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828976" comment="grub2-pc-2.02-0.87.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828977" comment="grub2-pc-modules-2.02-0.87.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828978" comment="grub2-tools-2.02-0.87.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828979" comment="grub2-tools-extra-2.02-0.87.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828980" comment="grub2-tools-minimal-2.02-0.87.el7_9.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20202778" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-2778</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-2778" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2778" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-2778" ref_url="https://www.suse.com/security/cve/CVE-2020-2778" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1511-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1572-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006907.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0757-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SDEP4JPECWYIDSKVUAK7GXMXY4KKSX4F/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 11.0.6 and 14. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-2778/">CVE-2020-2778 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2778">CVE-2020-2778 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1169511">SUSE bug 1169511</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827923" comment="java-11-openjdk-11.0.7.10-4.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827924" comment="java-11-openjdk-demo-11.0.7.10-4.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827925" comment="java-11-openjdk-devel-11.0.7.10-4.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827926" comment="java-11-openjdk-headless-11.0.7.10-4.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827927" comment="java-11-openjdk-javadoc-11.0.7.10-4.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827928" comment="java-11-openjdk-javadoc-zip-11.0.7.10-4.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827929" comment="java-11-openjdk-jmods-11.0.7.10-4.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827930" comment="java-11-openjdk-src-11.0.7.10-4.el7_8 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20202780" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-2780</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-2780" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2780" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-2780" ref_url="https://www.suse.com/security/cve/CVE-2020-2780" source="SUSE CVE"/>
    <description>
    Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 5.6.47 and prior, 5.7.29 and prior and 8.0.19 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2780/">CVE-2020-2780 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2780">CVE-2020-2780 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828504" comment="mariadb-5.5.68-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828505" comment="mariadb-bench-5.5.68-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828506" comment="mariadb-devel-5.5.68-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828507" comment="mariadb-embedded-5.5.68-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828508" comment="mariadb-embedded-devel-5.5.68-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828509" comment="mariadb-libs-5.5.68-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828510" comment="mariadb-server-5.5.68-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828511" comment="mariadb-test-5.5.68-1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20202781" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-2781</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-2781" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2781" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-2781" ref_url="https://www.suse.com/security/cve/CVE-2020-2781" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1511-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1569-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1572-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006987.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0757-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SDEP4JPECWYIDSKVUAK7GXMXY4KKSX4F/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0800-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O5TZOSA2HN7YVJLBZ65OCTYL45LXKWSO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0841-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/56SMPQCDYAYIGH6IZE2Q6FR76AXS3AYR/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2781/">CVE-2020-2781 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2781">CVE-2020-2781 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1169511">SUSE bug 1169511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172277">SUSE bug 1172277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827916" comment="java-1.7.0-openjdk-1.7.0.261-2.6.22.2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827917" comment="java-1.7.0-openjdk-accessibility-1.7.0.261-2.6.22.2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827918" comment="java-1.7.0-openjdk-demo-1.7.0.261-2.6.22.2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827919" comment="java-1.7.0-openjdk-devel-1.7.0.261-2.6.22.2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827920" comment="java-1.7.0-openjdk-headless-1.7.0.261-2.6.22.2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827921" comment="java-1.7.0-openjdk-javadoc-1.7.0.261-2.6.22.2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827922" comment="java-1.7.0-openjdk-src-1.7.0.261-2.6.22.2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827949" comment="java-1.8.0-openjdk-1.8.0.252.b09-2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827950" comment="java-1.8.0-openjdk-accessibility-1.8.0.252.b09-2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827951" comment="java-1.8.0-openjdk-demo-1.8.0.252.b09-2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827952" comment="java-1.8.0-openjdk-devel-1.8.0.252.b09-2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827953" comment="java-1.8.0-openjdk-headless-1.8.0.252.b09-2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827954" comment="java-1.8.0-openjdk-javadoc-1.8.0.252.b09-2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827955" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.252.b09-2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827956" comment="java-1.8.0-openjdk-src-1.8.0.252.b09-2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827923" comment="java-11-openjdk-11.0.7.10-4.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827924" comment="java-11-openjdk-demo-11.0.7.10-4.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827925" comment="java-11-openjdk-devel-11.0.7.10-4.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827926" comment="java-11-openjdk-headless-11.0.7.10-4.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827927" comment="java-11-openjdk-javadoc-11.0.7.10-4.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827928" comment="java-11-openjdk-javadoc-zip-11.0.7.10-4.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827929" comment="java-11-openjdk-jmods-11.0.7.10-4.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827930" comment="java-11-openjdk-src-11.0.7.10-4.el7_8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827916" comment="java-1.7.0-openjdk-1.7.0.261-2.6.22.2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827917" comment="java-1.7.0-openjdk-accessibility-1.7.0.261-2.6.22.2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827918" comment="java-1.7.0-openjdk-demo-1.7.0.261-2.6.22.2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827919" comment="java-1.7.0-openjdk-devel-1.7.0.261-2.6.22.2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827920" comment="java-1.7.0-openjdk-headless-1.7.0.261-2.6.22.2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827921" comment="java-1.7.0-openjdk-javadoc-1.7.0.261-2.6.22.2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827922" comment="java-1.7.0-openjdk-src-1.7.0.261-2.6.22.2.el7_8 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20202800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-2800</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-2800" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2800" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-2800" ref_url="https://www.suse.com/security/cve/CVE-2020-2800" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1511-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1569-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1572-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006987.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0757-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SDEP4JPECWYIDSKVUAK7GXMXY4KKSX4F/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0800-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O5TZOSA2HN7YVJLBZ65OCTYL45LXKWSO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0841-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/56SMPQCDYAYIGH6IZE2Q6FR76AXS3AYR/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Lightweight HTTP Server). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2800/">CVE-2020-2800 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2800">CVE-2020-2800 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1169511">SUSE bug 1169511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172277">SUSE bug 1172277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827916" comment="java-1.7.0-openjdk-1.7.0.261-2.6.22.2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827917" comment="java-1.7.0-openjdk-accessibility-1.7.0.261-2.6.22.2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827918" comment="java-1.7.0-openjdk-demo-1.7.0.261-2.6.22.2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827919" comment="java-1.7.0-openjdk-devel-1.7.0.261-2.6.22.2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827920" comment="java-1.7.0-openjdk-headless-1.7.0.261-2.6.22.2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827921" comment="java-1.7.0-openjdk-javadoc-1.7.0.261-2.6.22.2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827922" comment="java-1.7.0-openjdk-src-1.7.0.261-2.6.22.2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827949" comment="java-1.8.0-openjdk-1.8.0.252.b09-2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827950" comment="java-1.8.0-openjdk-accessibility-1.8.0.252.b09-2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827951" comment="java-1.8.0-openjdk-demo-1.8.0.252.b09-2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827952" comment="java-1.8.0-openjdk-devel-1.8.0.252.b09-2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827953" comment="java-1.8.0-openjdk-headless-1.8.0.252.b09-2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827954" comment="java-1.8.0-openjdk-javadoc-1.8.0.252.b09-2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827955" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.252.b09-2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827956" comment="java-1.8.0-openjdk-src-1.8.0.252.b09-2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827923" comment="java-11-openjdk-11.0.7.10-4.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827924" comment="java-11-openjdk-demo-11.0.7.10-4.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827925" comment="java-11-openjdk-devel-11.0.7.10-4.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827926" comment="java-11-openjdk-headless-11.0.7.10-4.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827927" comment="java-11-openjdk-javadoc-11.0.7.10-4.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827928" comment="java-11-openjdk-javadoc-zip-11.0.7.10-4.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827929" comment="java-11-openjdk-jmods-11.0.7.10-4.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827930" comment="java-11-openjdk-src-11.0.7.10-4.el7_8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827916" comment="java-1.7.0-openjdk-1.7.0.261-2.6.22.2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827917" comment="java-1.7.0-openjdk-accessibility-1.7.0.261-2.6.22.2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827918" comment="java-1.7.0-openjdk-demo-1.7.0.261-2.6.22.2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827919" comment="java-1.7.0-openjdk-devel-1.7.0.261-2.6.22.2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827920" comment="java-1.7.0-openjdk-headless-1.7.0.261-2.6.22.2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827921" comment="java-1.7.0-openjdk-javadoc-1.7.0.261-2.6.22.2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827922" comment="java-1.7.0-openjdk-src-1.7.0.261-2.6.22.2.el7_8 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20202803" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-2803</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-2803" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2803" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-2803" ref_url="https://www.suse.com/security/cve/CVE-2020-2803" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1511-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1569-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1572-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006987.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0757-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SDEP4JPECWYIDSKVUAK7GXMXY4KKSX4F/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0800-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O5TZOSA2HN7YVJLBZ65OCTYL45LXKWSO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0841-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/56SMPQCDYAYIGH6IZE2Q6FR76AXS3AYR/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2803/">CVE-2020-2803 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2803">CVE-2020-2803 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1169511">SUSE bug 1169511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172277">SUSE bug 1172277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827916" comment="java-1.7.0-openjdk-1.7.0.261-2.6.22.2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827917" comment="java-1.7.0-openjdk-accessibility-1.7.0.261-2.6.22.2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827918" comment="java-1.7.0-openjdk-demo-1.7.0.261-2.6.22.2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827919" comment="java-1.7.0-openjdk-devel-1.7.0.261-2.6.22.2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827920" comment="java-1.7.0-openjdk-headless-1.7.0.261-2.6.22.2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827921" comment="java-1.7.0-openjdk-javadoc-1.7.0.261-2.6.22.2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827922" comment="java-1.7.0-openjdk-src-1.7.0.261-2.6.22.2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827949" comment="java-1.8.0-openjdk-1.8.0.252.b09-2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827950" comment="java-1.8.0-openjdk-accessibility-1.8.0.252.b09-2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827951" comment="java-1.8.0-openjdk-demo-1.8.0.252.b09-2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827952" comment="java-1.8.0-openjdk-devel-1.8.0.252.b09-2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827953" comment="java-1.8.0-openjdk-headless-1.8.0.252.b09-2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827954" comment="java-1.8.0-openjdk-javadoc-1.8.0.252.b09-2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827955" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.252.b09-2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827956" comment="java-1.8.0-openjdk-src-1.8.0.252.b09-2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827923" comment="java-11-openjdk-11.0.7.10-4.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827924" comment="java-11-openjdk-demo-11.0.7.10-4.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827925" comment="java-11-openjdk-devel-11.0.7.10-4.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827926" comment="java-11-openjdk-headless-11.0.7.10-4.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827927" comment="java-11-openjdk-javadoc-11.0.7.10-4.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827928" comment="java-11-openjdk-javadoc-zip-11.0.7.10-4.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827929" comment="java-11-openjdk-jmods-11.0.7.10-4.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827930" comment="java-11-openjdk-src-11.0.7.10-4.el7_8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827916" comment="java-1.7.0-openjdk-1.7.0.261-2.6.22.2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827917" comment="java-1.7.0-openjdk-accessibility-1.7.0.261-2.6.22.2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827918" comment="java-1.7.0-openjdk-demo-1.7.0.261-2.6.22.2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827919" comment="java-1.7.0-openjdk-devel-1.7.0.261-2.6.22.2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827920" comment="java-1.7.0-openjdk-headless-1.7.0.261-2.6.22.2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827921" comment="java-1.7.0-openjdk-javadoc-1.7.0.261-2.6.22.2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827922" comment="java-1.7.0-openjdk-src-1.7.0.261-2.6.22.2.el7_8 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20202805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-2805</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-2805" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2805" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-2805" ref_url="https://www.suse.com/security/cve/CVE-2020-2805" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1511-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1569-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1572-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006987.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0757-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SDEP4JPECWYIDSKVUAK7GXMXY4KKSX4F/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0800-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O5TZOSA2HN7YVJLBZ65OCTYL45LXKWSO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0841-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/56SMPQCDYAYIGH6IZE2Q6FR76AXS3AYR/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2805/">CVE-2020-2805 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2805">CVE-2020-2805 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1169511">SUSE bug 1169511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172277">SUSE bug 1172277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827916" comment="java-1.7.0-openjdk-1.7.0.261-2.6.22.2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827917" comment="java-1.7.0-openjdk-accessibility-1.7.0.261-2.6.22.2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827918" comment="java-1.7.0-openjdk-demo-1.7.0.261-2.6.22.2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827919" comment="java-1.7.0-openjdk-devel-1.7.0.261-2.6.22.2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827920" comment="java-1.7.0-openjdk-headless-1.7.0.261-2.6.22.2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827921" comment="java-1.7.0-openjdk-javadoc-1.7.0.261-2.6.22.2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827922" comment="java-1.7.0-openjdk-src-1.7.0.261-2.6.22.2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827949" comment="java-1.8.0-openjdk-1.8.0.252.b09-2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827950" comment="java-1.8.0-openjdk-accessibility-1.8.0.252.b09-2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827951" comment="java-1.8.0-openjdk-demo-1.8.0.252.b09-2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827952" comment="java-1.8.0-openjdk-devel-1.8.0.252.b09-2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827953" comment="java-1.8.0-openjdk-headless-1.8.0.252.b09-2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827954" comment="java-1.8.0-openjdk-javadoc-1.8.0.252.b09-2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827955" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.252.b09-2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827956" comment="java-1.8.0-openjdk-src-1.8.0.252.b09-2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827923" comment="java-11-openjdk-11.0.7.10-4.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827924" comment="java-11-openjdk-demo-11.0.7.10-4.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827925" comment="java-11-openjdk-devel-11.0.7.10-4.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827926" comment="java-11-openjdk-headless-11.0.7.10-4.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827927" comment="java-11-openjdk-javadoc-11.0.7.10-4.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827928" comment="java-11-openjdk-javadoc-zip-11.0.7.10-4.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827929" comment="java-11-openjdk-jmods-11.0.7.10-4.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827930" comment="java-11-openjdk-src-11.0.7.10-4.el7_8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827916" comment="java-1.7.0-openjdk-1.7.0.261-2.6.22.2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827917" comment="java-1.7.0-openjdk-accessibility-1.7.0.261-2.6.22.2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827918" comment="java-1.7.0-openjdk-demo-1.7.0.261-2.6.22.2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827919" comment="java-1.7.0-openjdk-devel-1.7.0.261-2.6.22.2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827920" comment="java-1.7.0-openjdk-headless-1.7.0.261-2.6.22.2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827921" comment="java-1.7.0-openjdk-javadoc-1.7.0.261-2.6.22.2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827922" comment="java-1.7.0-openjdk-src-1.7.0.261-2.6.22.2.el7_8 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20202812" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-2812</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-2812" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2812" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-2812" ref_url="https://www.suse.com/security/cve/CVE-2020-2812" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007915.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0870-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AF4G5AT4UQQLEPLII3FJM3MCCFFEVLGX/" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Stored Procedure). Supported versions that are affected are 5.6.47 and prior, 5.7.29 and prior and 8.0.19 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2812/">CVE-2020-2812 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2812">CVE-2020-2812 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1171550">SUSE bug 1171550</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828504" comment="mariadb-5.5.68-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828505" comment="mariadb-bench-5.5.68-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828506" comment="mariadb-devel-5.5.68-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828507" comment="mariadb-embedded-5.5.68-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828508" comment="mariadb-embedded-devel-5.5.68-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828509" comment="mariadb-libs-5.5.68-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828510" comment="mariadb-server-5.5.68-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828511" comment="mariadb-test-5.5.68-1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20202816" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-2816</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-2816" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2816" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-2816" ref_url="https://www.suse.com/security/cve/CVE-2020-2816" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1511-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1572-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006907.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0757-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SDEP4JPECWYIDSKVUAK7GXMXY4KKSX4F/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 11.0.6 and 14. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE accessible data. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 7.5 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-2816/">CVE-2020-2816 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2816">CVE-2020-2816 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1169511">SUSE bug 1169511</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827923" comment="java-11-openjdk-11.0.7.10-4.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827924" comment="java-11-openjdk-demo-11.0.7.10-4.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827925" comment="java-11-openjdk-devel-11.0.7.10-4.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827926" comment="java-11-openjdk-headless-11.0.7.10-4.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827927" comment="java-11-openjdk-javadoc-11.0.7.10-4.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827928" comment="java-11-openjdk-javadoc-zip-11.0.7.10-4.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827929" comment="java-11-openjdk-jmods-11.0.7.10-4.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827930" comment="java-11-openjdk-src-11.0.7.10-4.el7_8 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20202830" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-2830</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-2830" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2830" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-2830" ref_url="https://www.suse.com/security/cve/CVE-2020-2830" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1511-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1569-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1572-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006987.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0757-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SDEP4JPECWYIDSKVUAK7GXMXY4KKSX4F/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0800-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O5TZOSA2HN7YVJLBZ65OCTYL45LXKWSO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0841-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/56SMPQCDYAYIGH6IZE2Q6FR76AXS3AYR/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Concurrency). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2830/">CVE-2020-2830 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2830">CVE-2020-2830 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1169511">SUSE bug 1169511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172277">SUSE bug 1172277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827916" comment="java-1.7.0-openjdk-1.7.0.261-2.6.22.2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827917" comment="java-1.7.0-openjdk-accessibility-1.7.0.261-2.6.22.2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827918" comment="java-1.7.0-openjdk-demo-1.7.0.261-2.6.22.2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827919" comment="java-1.7.0-openjdk-devel-1.7.0.261-2.6.22.2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827920" comment="java-1.7.0-openjdk-headless-1.7.0.261-2.6.22.2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827921" comment="java-1.7.0-openjdk-javadoc-1.7.0.261-2.6.22.2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827922" comment="java-1.7.0-openjdk-src-1.7.0.261-2.6.22.2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827949" comment="java-1.8.0-openjdk-1.8.0.252.b09-2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827950" comment="java-1.8.0-openjdk-accessibility-1.8.0.252.b09-2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827951" comment="java-1.8.0-openjdk-demo-1.8.0.252.b09-2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827952" comment="java-1.8.0-openjdk-devel-1.8.0.252.b09-2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827953" comment="java-1.8.0-openjdk-headless-1.8.0.252.b09-2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827954" comment="java-1.8.0-openjdk-javadoc-1.8.0.252.b09-2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827955" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.252.b09-2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827956" comment="java-1.8.0-openjdk-src-1.8.0.252.b09-2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827923" comment="java-11-openjdk-11.0.7.10-4.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827924" comment="java-11-openjdk-demo-11.0.7.10-4.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827925" comment="java-11-openjdk-devel-11.0.7.10-4.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827926" comment="java-11-openjdk-headless-11.0.7.10-4.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827927" comment="java-11-openjdk-javadoc-11.0.7.10-4.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827928" comment="java-11-openjdk-javadoc-zip-11.0.7.10-4.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827929" comment="java-11-openjdk-jmods-11.0.7.10-4.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827930" comment="java-11-openjdk-src-11.0.7.10-4.el7_8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827916" comment="java-1.7.0-openjdk-1.7.0.261-2.6.22.2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827917" comment="java-1.7.0-openjdk-accessibility-1.7.0.261-2.6.22.2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827918" comment="java-1.7.0-openjdk-demo-1.7.0.261-2.6.22.2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827919" comment="java-1.7.0-openjdk-devel-1.7.0.261-2.6.22.2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827920" comment="java-1.7.0-openjdk-headless-1.7.0.261-2.6.22.2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827921" comment="java-1.7.0-openjdk-javadoc-1.7.0.261-2.6.22.2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827922" comment="java-1.7.0-openjdk-src-1.7.0.261-2.6.22.2.el7_8 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202028374" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-28374</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-28374" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28374" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-28374" ref_url="https://www.suse.com/security/cve/CVE-2020-28374" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0093-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-January/017662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0427-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0818-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-March/018289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008500.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008509.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008510.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008502.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0868-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008513.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008497.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0060-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IGMHKFBCILMH7EZ36H75HXZ2RO2WG2GR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0075-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H7EJISS2OPKUSJFJ2BG5ZWHA2Z6H3VQB/" source="SUSE-SU"/>
    <description>
    In drivers/target/target_core_xcopy.c in the Linux kernel before 5.10.7, insufficient identifier checking in the LIO SCSI target code can be used by remote attackers to read or write files via directory traversal in an XCOPY request, aka CID-2896c93811e3. For example, an attack can occur over a network if the attacker has access to one iSCSI LUN. The attacker gains control over file access because I/O operations are proxied via an attacker-selected backstore.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-28374/">CVE-2020-28374 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28374">CVE-2020-28374 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1178372">SUSE bug 1178372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178684">SUSE bug 1178684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180676">SUSE bug 1180676</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828991" comment="bpftool-3.10.0-1160.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828992" comment="kernel-3.10.0-1160.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828993" comment="kernel-abi-whitelists-3.10.0-1160.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828994" comment="kernel-debug-3.10.0-1160.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828997" comment="kernel-doc-3.10.0-1160.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828998" comment="kernel-headers-3.10.0-1160.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828999" comment="kernel-tools-3.10.0-1160.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829000" comment="kernel-tools-libs-3.10.0-1160.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829002" comment="perf-3.10.0-1160.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829003" comment="python-perf-3.10.0-1160.21.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202028948" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-28948</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-28948" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28948" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-28948" ref_url="https://www.suse.com/security/cve/CVE-2020-28948" source="SUSE CVE"/>
    <description>
    Archive_Tar through 1.4.10 allows an unserialization attack because phar: is blocked but PHAR: is not blocked.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-28948/">CVE-2020-28948 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28948">CVE-2020-28948 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1193679">SUSE bug 1193679</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829898" comment="php-pear-1.9.4-23.el7_9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202028949" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-28949</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-28949" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28949" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-28949" ref_url="https://www.suse.com/security/cve/CVE-2020-28949" source="SUSE CVE"/>
    <description>
    Archive_Tar through 1.4.10 has :// filename sanitization only to address phar attacks, and thus any other stream-wrapper attack (such as file:// to overwrite files) can still succeed.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-28949/">CVE-2020-28949 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28949">CVE-2020-28949 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1193680">SUSE bug 1193680</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829898" comment="php-pear-1.9.4-23.el7_9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202029443" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-29443</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-29443" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29443" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-29443" ref_url="https://www.suse.com/security/cve/CVE-2020-29443" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008673.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0600-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ATYM36RK6JXDXZ33F2KFHZHDZ3F3YD24/" source="SUSE-SU"/>
    <description>
    ide_atapi_cmd_reply_end in hw/ide/atapi.c in QEMU 5.1.0 allows out-of-bounds read access because a buffer index is not validated.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-09"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-29443/">CVE-2020-29443 at SUSE</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29443">CVE-2020-29443 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1181108">SUSE bug 1181108</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829174" comment="qemu-img-1.5.3-175.el7_9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829175" comment="qemu-kvm-1.5.3-175.el7_9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829176" comment="qemu-kvm-common-1.5.3-175.el7_9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829177" comment="qemu-kvm-tools-1.5.3-175.el7_9.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202029573" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-29573</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-29573" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29573" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-29573" ref_url="https://www.suse.com/security/cve/CVE-2020-29573" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:58-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:59-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0653-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008397.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0579-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018088.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0358-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WMNRZB427QFJOPYP4EA4KBZOTT622NY3/" source="SUSE-SU"/>
    <description>
    sysdeps/i386/ldbl2mpn.c in the GNU C Library (aka glibc or libc6) before 2.23 on x86 targets has a stack-based buffer overflow if the input to any of the printf family of functions is an 80-bit long double with a non-canonical bit pattern, as seen when passing a \x00\x04\x00\x00\x00\x00\x00\x00\x00\x04 value to sprintf. NOTE: the issue does not affect glibc by default in 2016 or later (i.e., 2.23 or later) because of commits made in 2015 for inlining of C99 math functions through use of GCC built-ins. In other words, the reference to 2.23 is intentional despite the mention of "Fixed for glibc 2.33" in the 26649 reference.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29573/">CVE-2020-29573 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29573">CVE-2020-29573 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1179721">SUSE bug 1179721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220988">SUSE bug 1220988</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828938" comment="glibc-2.17-322.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828939" comment="glibc-common-2.17-322.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828940" comment="glibc-devel-2.17-322.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828941" comment="glibc-headers-2.17-322.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828942" comment="glibc-static-2.17-322.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828943" comment="glibc-utils-2.17-322.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828944" comment="nscd-2.17-322.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202029599" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-29599</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-29599" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29599" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-29599" ref_url="https://www.suse.com/security/cve/CVE-2020-29599" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008220.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMIDOKTR355FMU6NNJAZYI3VSQVSKBVF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HHVDAUG64ZZXILYBSYFLJC2X5Q3ZAHD/" source="SUSE-SU"/>
    <description>
    ImageMagick before 6.9.11-40 and 7.x before 7.0.10-40 mishandles the -authenticate option, which allows setting a password for password-protected PDF files. The user-controlled password was not properly escaped/sanitized and it was therefore possible to inject additional shell commands via coders/pdf.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29599/">CVE-2020-29599 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29599">CVE-2020-29599 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1179753">SUSE bug 1179753</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828870" comment="ImageMagick-6.9.10.68-5.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828871" comment="ImageMagick-c++-6.9.10.68-5.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828872" comment="ImageMagick-c++-devel-6.9.10.68-5.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828873" comment="ImageMagick-devel-6.9.10.68-5.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828874" comment="ImageMagick-doc-6.9.10.68-5.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828875" comment="ImageMagick-perl-6.9.10.68-5.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202029661" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-29661</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-29661" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29661" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-29661" ref_url="https://www.suse.com/security/cve/CVE-2020-29661" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2021:14663-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-March/018202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0377-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-February/017944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0060-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IGMHKFBCILMH7EZ36H75HXZ2RO2WG2GR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0075-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H7EJISS2OPKUSJFJ2BG5ZWHA2Z6H3VQB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/pipermail/neuvector-updates/2023-November/000021.html" source="SUSE-SU"/>
    <description>
    A locking issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_jobctrl.c allows a use-after-free attack against TIOCSPGRP, aka CID-54ffccbf053b.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29661/">CVE-2020-29661 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29661">CVE-2020-29661 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1179745">SUSE bug 1179745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179877">SUSE bug 1179877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214268">SUSE bug 1214268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218966">SUSE bug 1218966</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828991" comment="bpftool-3.10.0-1160.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828992" comment="kernel-3.10.0-1160.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828993" comment="kernel-abi-whitelists-3.10.0-1160.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828994" comment="kernel-debug-3.10.0-1160.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828997" comment="kernel-doc-3.10.0-1160.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828998" comment="kernel-headers-3.10.0-1160.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828999" comment="kernel-tools-3.10.0-1160.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829000" comment="kernel-tools-libs-3.10.0-1160.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829002" comment="perf-3.10.0-1160.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829003" comment="python-perf-3.10.0-1160.21.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202035111" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-35111</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-35111" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35111" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-35111" ref_url="https://www.suse.com/security/cve/CVE-2020-35111" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008122.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2317-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZRYMYUEZXYQNBK2DWV7DAYE5EXEQPBUX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2318-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LL2B6S5KIA4HGLES3CDLSB4VRZW275H2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2324-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MFGNB2YB4LDKDYXRSTS5R357XYHABN5P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2325-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JZN3OVPTOCIWBAWJK4JZQDXFN752D6AR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    When an extension with the proxy permission registered to receive &lt;all_urls&gt;, the proxy.onRequest callback was not triggered for view-source URLs. While web content cannot navigate to such URLs, a user opening View Source could have inadvertently leaked their IP address. This vulnerability affects Firefox &lt; 84, Thunderbird &lt; 78.6, and Firefox ESR &lt; 78.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-35111/">CVE-2020-35111 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35111">CVE-2020-35111 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1180039">SUSE bug 1180039</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828863" comment="firefox-78.6.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828869" comment="thunderbird-78.6.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202035113" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-35113</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-35113" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35113" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-35113" ref_url="https://www.suse.com/security/cve/CVE-2020-35113" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008122.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2317-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZRYMYUEZXYQNBK2DWV7DAYE5EXEQPBUX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2318-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LL2B6S5KIA4HGLES3CDLSB4VRZW275H2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2324-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MFGNB2YB4LDKDYXRSTS5R357XYHABN5P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2325-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JZN3OVPTOCIWBAWJK4JZQDXFN752D6AR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Mozilla developers reported memory safety bugs present in Firefox 83 and Firefox ESR 78.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 84, Thunderbird &lt; 78.6, and Firefox ESR &lt; 78.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35113/">CVE-2020-35113 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35113">CVE-2020-35113 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1180039">SUSE bug 1180039</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828863" comment="firefox-78.6.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828869" comment="thunderbird-78.6.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202035452" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-35452</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-35452" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35452" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-35452" ref_url="https://www.suse.com/security/cve/CVE-2020-35452" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2004-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009074.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0908-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/F32WQ7K6A45WOBEDFMGMRXDC2F2SL3IF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2127-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KAQGPGA6ZQQT3VO5WOYFSSTZFH57MPWK/" source="SUSE-SU"/>
    <description>
    Apache HTTP Server versions 2.4.0 to 2.4.46 A specially crafted Digest nonce can cause a stack overflow in mod_auth_digest. There is no report of this overflow being exploitable, nor the Apache HTTP Server team could create one, though some particular compiler and/or compilation option might make it possible, with limited consequences anyway due to the size (a single byte) and the value (zero byte) of the overflow
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-31"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35452/">CVE-2020-35452 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35452">CVE-2020-35452 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1186922">SUSE bug 1186922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187933">SUSE bug 1187933</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009881415" comment="httpd-2.4.6-99.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881416" comment="httpd-devel-2.4.6-99.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881417" comment="httpd-manual-2.4.6-99.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881418" comment="httpd-tools-2.4.6-99.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881419" comment="mod_ldap-2.4.6-99.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881420" comment="mod_proxy_html-2.4.6-99.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881421" comment="mod_session-2.4.6-99.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881422" comment="mod_ssl-2.4.6-99.el7_9.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202035513" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-35513</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-35513" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35513" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-35513" ref_url="https://www.suse.com/security/cve/CVE-2020-35513" source="SUSE CVE"/>
    <description>
    A flaw incorrect umask during file or directory modification in the Linux kernel NFS (network file system) functionality was found in the way user create and delete object using NFSv4.2 or newer if both simultaneously accessing the NFS by the other process that is not using new NFSv4.2. A user with access to the NFS could use this flaw to starve the resources causing denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35513/">CVE-2020-35513 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35513">CVE-2020-35513 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1181362">SUSE bug 1181362</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828886" comment="bpftool-3.10.0-1160.15.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828887" comment="kernel-3.10.0-1160.15.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828888" comment="kernel-abi-whitelists-3.10.0-1160.15.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828889" comment="kernel-debug-3.10.0-1160.15.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828892" comment="kernel-doc-3.10.0-1160.15.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828893" comment="kernel-headers-3.10.0-1160.15.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828894" comment="kernel-tools-3.10.0-1160.15.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828895" comment="kernel-tools-libs-3.10.0-1160.15.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828897" comment="perf-3.10.0-1160.15.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828898" comment="python-perf-3.10.0-1160.15.2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202035518" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-35518</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-35518" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35518" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-35518" ref_url="https://www.suse.com/security/cve/CVE-2020-35518" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008440.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0418-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IJZAIJRIBNKFP5CET6TYMJ3FGMU6WYAM/" source="SUSE-SU"/>
    <description>
    When binding against a DN during authentication, the reply from 389-ds-base will be different whether the DN exists or not. This can be used by an unauthenticated attacker to check the existence of an entry in the LDAP database.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-35518/">CVE-2020-35518 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35518">CVE-2020-35518 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1181159">SUSE bug 1181159</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829178" comment="389-ds-base-1.3.10.2-12.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829179" comment="389-ds-base-devel-1.3.10.2-12.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829180" comment="389-ds-base-libs-1.3.10.2-12.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829181" comment="389-ds-base-snmp-1.3.10.2-12.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202036193" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-36193</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-36193" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36193" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-36193" ref_url="https://www.suse.com/security/cve/CVE-2020-36193" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009393.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009434.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1267-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3FVUJPS33WNJWFOH7YMK5YSCLKXVMWLW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2872-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GCXMJ4INSB7EFEHMD7OOE6NXYQU2F77I/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3018-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GXQPYU7Y2O7P5YZ73KTEOHBFQS2G55P3/" source="SUSE-SU"/>
    <description>
    Tar.php in Archive_Tar through 1.4.11 allows write operations with Directory Traversal due to inadequate checking of symbolic links, a related issue to CVE-2020-28948.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-36193/">CVE-2020-36193 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36193">CVE-2020-36193 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1189591">SUSE bug 1189591</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829898" comment="php-pear-1.9.4-23.el7_9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202036322" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-36322</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-36322" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36322" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-36322" ref_url="https://www.suse.com/security/cve/CVE-2020-36322" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1572-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-May/018906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1724-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-May/019049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1865-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009234.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0579-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6PH44XSVUZTRLJSGALUUATIQLKQWL4C5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the FUSE filesystem implementation in the Linux kernel before 5.10.6, aka CID-5d069dbe8aaf. fuse_do_getattr() calls make_bad_inode() in inappropriate situations, causing a system crash. NOTE: the original fix for this vulnerability was incomplete, and its incompleteness is tracked as CVE-2021-28950.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36322/">CVE-2020-36322 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36322">CVE-2020-36322 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1184211">SUSE bug 1184211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184952">SUSE bug 1184952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189302">SUSE bug 1189302</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829509" comment="bpftool-3.10.0-1160.53.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829510" comment="kernel-3.10.0-1160.53.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829511" comment="kernel-abi-whitelists-3.10.0-1160.53.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829512" comment="kernel-debug-3.10.0-1160.53.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829515" comment="kernel-doc-3.10.0-1160.53.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829516" comment="kernel-headers-3.10.0-1160.53.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829517" comment="kernel-tools-3.10.0-1160.53.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829518" comment="kernel-tools-libs-3.10.0-1160.53.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829520" comment="perf-3.10.0-1160.53.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829521" comment="python-perf-3.10.0-1160.53.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202036328" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-36328</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-36328" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36328" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-36328" ref_url="https://www.suse.com/security/cve/CVE-2020-36328" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008936.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1860-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4ZIJ3ZK5FGNGJN6E65XZKMQPSQ3RKNVG/" source="SUSE-SU"/>
    <description>
    A flaw was found in libwebp in versions before 1.0.1. A heap-based buffer overflow in function WebPDecodeRGBInto is possible due to an invalid check for buffer size. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36328/">CVE-2020-36328 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36328">CVE-2020-36328 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1185688">SUSE bug 1185688</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829121" comment="libwebp-0.3.0-10.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829122" comment="libwebp-devel-0.3.0-10.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829123" comment="libwebp-java-0.3.0-10.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829124" comment="libwebp-tools-0.3.0-10.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829182" comment="qt5-qtimageformats-5.9.7-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829183" comment="qt5-qtimageformats-doc-5.9.7-2.el7_9 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829182" comment="qt5-qtimageformats-5.9.7-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829183" comment="qt5-qtimageformats-doc-5.9.7-2.el7_9 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202036329" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-36329</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-36329" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36329" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-36329" ref_url="https://www.suse.com/security/cve/CVE-2020-36329" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008936.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1860-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4ZIJ3ZK5FGNGJN6E65XZKMQPSQ3RKNVG/" source="SUSE-SU"/>
    <description>
    A flaw was found in libwebp in versions before 1.0.1. A use-after-free was found due to a thread being killed too early. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36329/">CVE-2020-36329 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36329">CVE-2020-36329 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1185652">SUSE bug 1185652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187486">SUSE bug 1187486</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829121" comment="libwebp-0.3.0-10.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829122" comment="libwebp-devel-0.3.0-10.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829123" comment="libwebp-java-0.3.0-10.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829124" comment="libwebp-tools-0.3.0-10.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829182" comment="qt5-qtimageformats-5.9.7-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829183" comment="qt5-qtimageformats-doc-5.9.7-2.el7_9 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829182" comment="qt5-qtimageformats-5.9.7-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829183" comment="qt5-qtimageformats-doc-5.9.7-2.el7_9 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202036385" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-36385</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-36385" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36385" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-36385" ref_url="https://www.suse.com/security/cve/CVE-2020-36385" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009226.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009279.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2184-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GJZ4RMNGAPDHTNV6KJGNPSEJH2RUZFKU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2202-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T4PWFRJWECGAGZTBIOYHZ6KUMSA6KC43/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2427-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HJIMD6XIKYMKE35TUYXKKYPX4737LEVU/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.10. drivers/infiniband/core/ucma.c has a use-after-free because the ctx is reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called, aka CID-f5449e74802c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36385/">CVE-2020-36385 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36385">CVE-2020-36385 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1187050">SUSE bug 1187050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187052">SUSE bug 1187052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189302">SUSE bug 1189302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196174">SUSE bug 1196174</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196810">SUSE bug 1196810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196914">SUSE bug 1196914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200084">SUSE bug 1200084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201734">SUSE bug 1201734</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829410" comment="bpftool-3.10.0-1160.49.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829411" comment="kernel-3.10.0-1160.49.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829412" comment="kernel-abi-whitelists-3.10.0-1160.49.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829413" comment="kernel-debug-3.10.0-1160.49.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829416" comment="kernel-doc-3.10.0-1160.49.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829417" comment="kernel-headers-3.10.0-1160.49.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829418" comment="kernel-tools-3.10.0-1160.49.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829419" comment="kernel-tools-libs-3.10.0-1160.49.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829421" comment="perf-3.10.0-1160.49.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829422" comment="python-perf-3.10.0-1160.49.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202036558" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-36558</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-36558" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36558" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-36558" ref_url="https://www.suse.com/security/cve/CVE-2020-36558" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2875-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2892-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013765.html" source="SUSE-SU"/>
    <description>
    A race condition in the Linux kernel before 5.5.7 involving VT_RESIZEX could lead to a NULL pointer dereference and general protection fault.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-02"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36558/">CVE-2020-36558 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36558">CVE-2020-36558 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1200910">SUSE bug 1200910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201752">SUSE bug 1201752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205313">SUSE bug 1205313</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009858640" comment="bpftool-3.10.0-1160.118.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858641" comment="kernel-3.10.0-1160.118.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858642" comment="kernel-abi-whitelists-3.10.0-1160.118.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858643" comment="kernel-debug-3.10.0-1160.118.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858646" comment="kernel-doc-3.10.0-1160.118.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858647" comment="kernel-headers-3.10.0-1160.118.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858648" comment="kernel-tools-3.10.0-1160.118.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858649" comment="kernel-tools-libs-3.10.0-1160.118.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858651" comment="perf-3.10.0-1160.118.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858652" comment="python-perf-3.10.0-1160.118.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20203862" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-3862</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-3862" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3862" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-3862" ref_url="https://www.suse.com/security/cve/CVE-2020-3862" source="SUSE CVE"/>
		<reference ref_id="RHSA-2020:4451" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006752.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0278-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VOF6TVHJ47XHC6EPRQMZJI47W7QNTVVH/" source="SUSE-SU"/>
    <description>
    A denial of service issue was addressed with improved memory handling. This issue is fixed in iOS 13.3.1 and iPadOS 13.3.1, tvOS 13.3.1, Safari 13.0.5, iTunes for Windows 12.10.4, iCloud for Windows 11.0, iCloud for Windows 7.17. A malicious website may be able to cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-28"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-3862/">CVE-2020-3862 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3862">CVE-2020-3862 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1163809">SUSE bug 1163809</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828527" comment="webkitgtk4-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828528" comment="webkitgtk4-devel-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828529" comment="webkitgtk4-doc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828530" comment="webkitgtk4-jsc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828531" comment="webkitgtk4-jsc-devel-2.28.2-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20203864" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-3864</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-3864" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3864" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-3864" ref_url="https://www.suse.com/security/cve/CVE-2020-3864" source="SUSE CVE"/>
		<reference ref_id="RHSA-2020:4451" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006752.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0278-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VOF6TVHJ47XHC6EPRQMZJI47W7QNTVVH/" source="SUSE-SU"/>
    <description>
    A logic issue was addressed with improved validation. This issue is fixed in iCloud for Windows 7.17, iTunes 12.10.4 for Windows, iCloud for Windows 10.9.2, tvOS 13.3.1, Safari 13.0.5, iOS 13.3.1 and iPadOS 13.3.1. A DOM object context may not have had a unique security origin.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-28"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-3864/">CVE-2020-3864 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3864">CVE-2020-3864 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1163809">SUSE bug 1163809</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828527" comment="webkitgtk4-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828528" comment="webkitgtk4-devel-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828529" comment="webkitgtk4-doc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828530" comment="webkitgtk4-jsc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828531" comment="webkitgtk4-jsc-devel-2.28.2-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20203865" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-3865</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-3865" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3865" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-3865" ref_url="https://www.suse.com/security/cve/CVE-2020-3865" source="SUSE CVE"/>
		<reference ref_id="RHSA-2020:4451" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006752.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0278-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VOF6TVHJ47XHC6EPRQMZJI47W7QNTVVH/" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 13.3.1 and iPadOS 13.3.1, tvOS 13.3.1, Safari 13.0.5, iTunes for Windows 12.10.4, iCloud for Windows 11.0, iCloud for Windows 7.17. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-28"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3865/">CVE-2020-3865 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3865">CVE-2020-3865 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1163809">SUSE bug 1163809</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828527" comment="webkitgtk4-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828528" comment="webkitgtk4-devel-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828529" comment="webkitgtk4-doc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828530" comment="webkitgtk4-jsc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828531" comment="webkitgtk4-jsc-devel-2.28.2-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20203867" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-3867</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-3867" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3867" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-3867" ref_url="https://www.suse.com/security/cve/CVE-2020-3867" source="SUSE CVE"/>
		<reference ref_id="RHSA-2020:4451" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006752.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0278-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VOF6TVHJ47XHC6EPRQMZJI47W7QNTVVH/" source="SUSE-SU"/>
    <description>
    A logic issue was addressed with improved state management. This issue is fixed in iOS 13.3.1 and iPadOS 13.3.1, tvOS 13.3.1, Safari 13.0.5, iTunes for Windows 12.10.4, iCloud for Windows 11.0, iCloud for Windows 7.17. Processing maliciously crafted web content may lead to universal cross site scripting.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-28"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-3867/">CVE-2020-3867 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3867">CVE-2020-3867 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1163809">SUSE bug 1163809</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828527" comment="webkitgtk4-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828528" comment="webkitgtk4-devel-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828529" comment="webkitgtk4-doc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828530" comment="webkitgtk4-jsc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828531" comment="webkitgtk4-jsc-devel-2.28.2-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20203868" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-3868</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-3868" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3868" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-3868" ref_url="https://www.suse.com/security/cve/CVE-2020-3868" source="SUSE CVE"/>
		<reference ref_id="RHSA-2020:4451" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006752.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0278-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VOF6TVHJ47XHC6EPRQMZJI47W7QNTVVH/" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 13.3.1 and iPadOS 13.3.1, tvOS 13.3.1, Safari 13.0.5, iTunes for Windows 12.10.4, iCloud for Windows 11.0, iCloud for Windows 7.17. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-28"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3868/">CVE-2020-3868 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3868">CVE-2020-3868 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1163809">SUSE bug 1163809</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828527" comment="webkitgtk4-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828528" comment="webkitgtk4-devel-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828529" comment="webkitgtk4-doc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828530" comment="webkitgtk4-jsc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828531" comment="webkitgtk4-jsc-devel-2.28.2-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20203885" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-3885</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-3885" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3885" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-3885" ref_url="https://www.suse.com/security/cve/CVE-2020-3885" source="SUSE CVE"/>
		<reference ref_id="RHSA-2020:4451" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010071.html" source="SUSE-SU"/>
    <description>
    A logic issue was addressed with improved restrictions. This issue is fixed in iOS 13.4 and iPadOS 13.4, tvOS 13.4, Safari 13.1, iTunes for Windows 12.10.5, iCloud for Windows 10.9.3, iCloud for Windows 7.18. A file URL may be incorrectly processed.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-28"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-3885/">CVE-2020-3885 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3885">CVE-2020-3885 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1170643">SUSE bug 1170643</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828527" comment="webkitgtk4-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828528" comment="webkitgtk4-devel-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828529" comment="webkitgtk4-doc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828530" comment="webkitgtk4-jsc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828531" comment="webkitgtk4-jsc-devel-2.28.2-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20203894" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-3894</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-3894" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3894" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-3894" ref_url="https://www.suse.com/security/cve/CVE-2020-3894" source="SUSE CVE"/>
		<reference ref_id="RHSA-2020:4451" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010071.html" source="SUSE-SU"/>
    <description>
    A race condition was addressed with additional validation. This issue is fixed in iOS 13.4 and iPadOS 13.4, tvOS 13.4, Safari 13.1, iTunes for Windows 12.10.5, iCloud for Windows 10.9.3, iCloud for Windows 7.18. An application may be able to read restricted memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-28"/>
	<severity>Important</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-3894/">CVE-2020-3894 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3894">CVE-2020-3894 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1170643">SUSE bug 1170643</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828527" comment="webkitgtk4-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828528" comment="webkitgtk4-devel-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828529" comment="webkitgtk4-doc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828530" comment="webkitgtk4-jsc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828531" comment="webkitgtk4-jsc-devel-2.28.2-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20203895" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-3895</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-3895" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3895" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-3895" ref_url="https://www.suse.com/security/cve/CVE-2020-3895" source="SUSE CVE"/>
		<reference ref_id="RHSA-2020:4451" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010071.html" source="SUSE-SU"/>
    <description>
    A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 13.4 and iPadOS 13.4, tvOS 13.4, watchOS 6.2, Safari 13.1, iTunes for Windows 12.10.5, iCloud for Windows 10.9.3, iCloud for Windows 7.18. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-28"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3895/">CVE-2020-3895 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3895">CVE-2020-3895 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1170643">SUSE bug 1170643</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828527" comment="webkitgtk4-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828528" comment="webkitgtk4-devel-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828529" comment="webkitgtk4-doc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828530" comment="webkitgtk4-jsc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828531" comment="webkitgtk4-jsc-devel-2.28.2-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20203897" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-3897</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-3897" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3897" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-3897" ref_url="https://www.suse.com/security/cve/CVE-2020-3897" source="SUSE CVE"/>
		<reference ref_id="RHSA-2020:4451" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010071.html" source="SUSE-SU"/>
    <description>
    A type confusion issue was addressed with improved memory handling. This issue is fixed in iOS 13.4 and iPadOS 13.4, tvOS 13.4, watchOS 6.2, Safari 13.1, iTunes for Windows 12.10.5, iCloud for Windows 10.9.3, iCloud for Windows 7.18. A remote attacker may be able to cause arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-28"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3897/">CVE-2020-3897 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3897">CVE-2020-3897 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1170643">SUSE bug 1170643</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828527" comment="webkitgtk4-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828528" comment="webkitgtk4-devel-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828529" comment="webkitgtk4-doc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828530" comment="webkitgtk4-jsc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828531" comment="webkitgtk4-jsc-devel-2.28.2-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20203899" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-3899</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-3899" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3899" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-3899" ref_url="https://www.suse.com/security/cve/CVE-2020-3899" source="SUSE CVE"/>
		<reference ref_id="RHSA-2020:4451" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006786.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006800.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0646-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WGCT2IKPMMBWAIPGXTCQMWSCAIVC5NV5/" source="SUSE-SU"/>
    <description>
    A memory consumption issue was addressed with improved memory handling. This issue is fixed in iOS 13.4 and iPadOS 13.4, tvOS 13.4, watchOS 6.2, Safari 13.1, iTunes for Windows 12.10.5, iCloud for Windows 10.9.3, iCloud for Windows 7.18. A remote attacker may be able to cause arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-28"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3899/">CVE-2020-3899 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3899">CVE-2020-3899 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1170643">SUSE bug 1170643</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828527" comment="webkitgtk4-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828528" comment="webkitgtk4-devel-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828529" comment="webkitgtk4-doc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828530" comment="webkitgtk4-jsc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828531" comment="webkitgtk4-jsc-devel-2.28.2-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20203900" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-3900</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-3900" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3900" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-3900" ref_url="https://www.suse.com/security/cve/CVE-2020-3900" source="SUSE CVE"/>
		<reference ref_id="RHSA-2020:4451" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010071.html" source="SUSE-SU"/>
    <description>
    A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 13.4 and iPadOS 13.4, tvOS 13.4, watchOS 6.2, Safari 13.1, iTunes for Windows 12.10.5, iCloud for Windows 10.9.3, iCloud for Windows 7.18. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-28"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3900/">CVE-2020-3900 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3900">CVE-2020-3900 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1170643">SUSE bug 1170643</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828527" comment="webkitgtk4-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828528" comment="webkitgtk4-devel-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828529" comment="webkitgtk4-doc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828530" comment="webkitgtk4-jsc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828531" comment="webkitgtk4-jsc-devel-2.28.2-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20203901" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-3901</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-3901" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3901" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-3901" ref_url="https://www.suse.com/security/cve/CVE-2020-3901" source="SUSE CVE"/>
		<reference ref_id="RHSA-2020:4451" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010071.html" source="SUSE-SU"/>
    <description>
    A type confusion issue was addressed with improved memory handling. This issue is fixed in iOS 13.4 and iPadOS 13.4, tvOS 13.4, watchOS 6.2, Safari 13.1, iTunes for Windows 12.10.5, iCloud for Windows 10.9.3, iCloud for Windows 7.18. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-28"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3901/">CVE-2020-3901 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3901">CVE-2020-3901 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1170643">SUSE bug 1170643</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828527" comment="webkitgtk4-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828528" comment="webkitgtk4-devel-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828529" comment="webkitgtk4-doc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828530" comment="webkitgtk4-jsc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828531" comment="webkitgtk4-jsc-devel-2.28.2-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20203902" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-3902</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-3902" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3902" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-3902" ref_url="https://www.suse.com/security/cve/CVE-2020-3902" source="SUSE CVE"/>
		<reference ref_id="RHSA-2020:4451" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FK6EK2KGH7KDPXCBN2Q3SSAVOCIXNCFX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IILRBHE4XKYN4SZKE6UX55V3HK54NAIK/" source="SUSE-SU"/>
    <description>
    An input validation issue was addressed with improved input validation. This issue is fixed in iOS 13.4 and iPadOS 13.4, tvOS 13.4, Safari 13.1, iTunes for Windows 12.10.5, iCloud for Windows 10.9.3, iCloud for Windows 7.18. Processing maliciously crafted web content may lead to a cross site scripting attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-28"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-3902/">CVE-2020-3902 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3902">CVE-2020-3902 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1170643">SUSE bug 1170643</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828527" comment="webkitgtk4-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828528" comment="webkitgtk4-devel-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828529" comment="webkitgtk4-doc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828530" comment="webkitgtk4-jsc-2.28.2-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828531" comment="webkitgtk4-jsc-devel-2.28.2-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20205208" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-5208</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-5208" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5208" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-5208" ref_url="https://www.suse.com/security/cve/CVE-2020-5208" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0405-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006600.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0247-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YYUWQCVFXPHLUAQWF4QMIVRD77QESCFB/" source="SUSE-SU"/>
    <description>
    It's been found that multiple functions in ipmitool before 1.8.19 neglect proper checking of the data received from a remote LAN party, which may lead to buffer overflows and potentially to remote code execution on the ipmitool side. This is especially dangerous if ipmitool is run as a privileged user. This problem is fixed in version 1.8.19.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-5208/">CVE-2020-5208 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-5208">CVE-2020-5208 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1163026">SUSE bug 1163026</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826967" comment="bmc-snmp-proxy-1.8.18-9.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826968" comment="exchange-bmc-os-info-1.8.18-9.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826969" comment="ipmitool-1.8.18-9.el7_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20205260" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-5260</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-5260" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5260" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-5260" ref_url="https://www.suse.com/security/cve/CVE-2020-5260" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0991-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0992-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0524-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FTDYLTR4TUBTNP4EFF5L2ZOAKYAB4Z2U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0598-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VP5YOKSRLMTVAPQKPHEDGCOIZL5JKJW5/" source="SUSE-SU"/>
    <description>
    Affected versions of Git have a vulnerability whereby Git can be tricked into sending private credentials to a host controlled by an attacker. Git uses external "credential helper" programs to store and retrieve passwords or other credentials from secure storage provided by the operating system. Specially-crafted URLs that contain an encoded newline can inject unintended values into the credential helper protocol stream, causing the credential helper to retrieve the password for one server (e.g., good.example.com) for an HTTP request being made to another server (e.g., evil.example.com), resulting in credentials for the former being sent to the latter. There are no restrictions on the relationship between the two, meaning that an attacker can craft a URL that will present stored credentials for any host to a host of their choosing. The vulnerability can be triggered by feeding a malicious URL to git clone. However, the affected URLs look rather suspicious; the likely vector would be through systems which automatically clone URLs not visible to the user, such as Git submodules, or package systems built around Git. The problem has been patched in the versions published on April 14th, 2020, going back to v2.17.x. Anyone wishing to backport the change further can do so by applying commit 9a6bbee (the full release includes extra checks for git fsck, but that commit is sufficient to protect clients against the vulnerability). The patched versions are: 2.17.4, 2.18.3, 2.19.4, 2.20.3, 2.21.2, 2.22.3, 2.23.2, 2.24.2, 2.25.3, 2.26.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-5260/">CVE-2020-5260 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-5260">CVE-2020-5260 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1168930">SUSE bug 1168930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169936">SUSE bug 1169936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170741">SUSE bug 1170741</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827931" comment="emacs-git-1.8.3.1-22.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827932" comment="emacs-git-el-1.8.3.1-22.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827933" comment="git-1.8.3.1-22.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827934" comment="git-all-1.8.3.1-22.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827935" comment="git-bzr-1.8.3.1-22.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827936" comment="git-cvs-1.8.3.1-22.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827937" comment="git-daemon-1.8.3.1-22.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827938" comment="git-email-1.8.3.1-22.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827939" comment="git-gnome-keyring-1.8.3.1-22.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827940" comment="git-gui-1.8.3.1-22.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827941" comment="git-hg-1.8.3.1-22.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827942" comment="git-instaweb-1.8.3.1-22.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827943" comment="git-p4-1.8.3.1-22.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827944" comment="git-svn-1.8.3.1-22.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827945" comment="gitk-1.8.3.1-22.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827946" comment="gitweb-1.8.3.1-22.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827947" comment="perl-Git-1.8.3.1-22.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827948" comment="perl-Git-SVN-1.8.3.1-22.el7_8 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20205312" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-5312</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-5312" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5312" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-5312" ref_url="https://www.suse.com/security/cve/CVE-2020-5312" source="SUSE CVE"/>
		<reference ref_id="SUSE-RU-2020:2072-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-July/015563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2020:2161-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-August/015668.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007188.html" source="SUSE-SU"/>
    <description>
    libImaging/PcxDecode.c in Pillow before 6.2.2 has a PCX P mode buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-5312/">CVE-2020-5312 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-5312">CVE-2020-5312 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1160152">SUSE bug 1160152</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826919" comment="python-pillow-2.0.0-20.gitd1c6db8.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826920" comment="python-pillow-devel-2.0.0-20.gitd1c6db8.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826921" comment="python-pillow-doc-2.0.0-20.gitd1c6db8.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826922" comment="python-pillow-qt-2.0.0-20.gitd1c6db8.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826923" comment="python-pillow-sane-2.0.0-20.gitd1c6db8.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826924" comment="python-pillow-tk-2.0.0-20.gitd1c6db8.el7_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20205313" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-5313</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-5313" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5313" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-5313" ref_url="https://www.suse.com/security/cve/CVE-2020-5313" source="SUSE CVE"/>
		<reference ref_id="SUSE-RU-2020:2072-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-July/015563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2020:2161-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-August/015668.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007188.html" source="SUSE-SU"/>
    <description>
    libImaging/FliDecode.c in Pillow before 6.2.2 has an FLI buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-5313/">CVE-2020-5313 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-5313">CVE-2020-5313 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1160153">SUSE bug 1160153</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828240" comment="python-pillow-2.0.0-21.gitd1c6db8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828241" comment="python-pillow-devel-2.0.0-21.gitd1c6db8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828242" comment="python-pillow-doc-2.0.0-21.gitd1c6db8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828243" comment="python-pillow-qt-2.0.0-21.gitd1c6db8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828244" comment="python-pillow-sane-2.0.0-21.gitd1c6db8.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828245" comment="python-pillow-tk-2.0.0-21.gitd1c6db8.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20205395" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-5395</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-5395" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5395" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-5395" ref_url="https://www.suse.com/security/cve/CVE-2020-5395" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0118-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200118-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007920.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0089-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5QPPX3AILYJ7EZFRHLVKJIQTXQP5K6IO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2111-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZUXEDXI4LMNYPGQ23AHUPAFPEN5QAEZM/" source="SUSE-SU"/>
    <description>
    FontForge 20190801 has a use-after-free in SFD_GetFontMetaData in sfd.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-5395/">CVE-2020-5395 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-5395">CVE-2020-5395 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1160220">SUSE bug 1160220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178308">SUSE bug 1178308</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828317" comment="fontforge-20120731b-13.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828318" comment="fontforge-devel-20120731b-13.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206463" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6463</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6463" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6463" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6463" ref_url="https://www.suse.com/security/cve/CVE-2020-6463" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007233.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007246.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0823-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2O6PVTTGIFWWYECON2SKIS2UIAMBVTM3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0832-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LHJICQXQ63XG4HH3O4IEPJYNQJNP2NVV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1147-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5DGEDDAZOZ3MVQ6CTQDOF3OY2ZULXYVT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1155-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R6BL5GAJDZT5KI6F57UOVMEACIM4SELV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1179-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7GAJX7QWS3CXVO7O3GQRKSU7ZZGE2NY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1189-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UBKX3FDVNS55I25FQR4AZLPCXUHCR5TX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1205-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LRVUDBACBZNNAF7T4L2HIQYOBVY5TJX7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Use after free in ANGLE in Google Chrome prior to 81.0.4044.122 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-6463/">CVE-2020-6463 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6463">CVE-2020-6463 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1171975">SUSE bug 1171975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174538">SUSE bug 1174538</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828094" comment="firefox-68.11.0-1.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828099" comment="thunderbird-68.11.0-1.el7_8 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206514" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6514</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6514" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6514" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6514" ref_url="https://www.suse.com/security/cve/CVE-2020-6514" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007233.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007246.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1020-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HFV4AYJ7GJLZVA5D4ARU5H4RK6EYKRCE/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1021-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q55W7KZFLR3UGN4DZTG2DV3E64K6CNP6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1048-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W2JQIILB6PSFXNLUKHHJWYX5HTDVPLVE/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1061-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GONT67H2PPPIF3W6X5ZYIIS6IY5KH7EO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1147-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5DGEDDAZOZ3MVQ6CTQDOF3OY2ZULXYVT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NUYO4K4AZKJVSJP4235727TELODNCOSP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1155-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R6BL5GAJDZT5KI6F57UOVMEACIM4SELV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1172-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WZQTQQL5WTZXSGFZFDO5XE5G5NKPCJ6E/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1179-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7GAJX7QWS3CXVO7O3GQRKSU7ZZGE2NY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1189-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UBKX3FDVNS55I25FQR4AZLPCXUHCR5TX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1205-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LRVUDBACBZNNAF7T4L2HIQYOBVY5TJX7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in WebRTC in Google Chrome prior to 84.0.4147.89 allowed an attacker in a privileged network position to potentially exploit heap corruption via a crafted SCTP stream.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6514/">CVE-2020-6514 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6514">CVE-2020-6514 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1174189">SUSE bug 1174189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174538">SUSE bug 1174538</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828094" comment="firefox-68.11.0-1.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828099" comment="thunderbird-68.11.0-1.el7_8 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206792" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6792</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6792" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6792" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6792" ref_url="https://www.suse.com/security/cve/CVE-2020-6792" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006480.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0231-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N7YWPZQVCFPWDEOU6J3TATNMIGNZ4N6P/" source="SUSE-SU"/>
    <description>
    When deriving an identifier for an email message, uninitialized memory was used in addition to the message contents. This vulnerability affects Thunderbird &lt; 68.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6792/">CVE-2020-6792 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6792">CVE-2020-6792 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1163368">SUSE bug 1163368</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826918" comment="thunderbird-68.5.0-1.el7_7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206793" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6793</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6793" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6793" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6793" ref_url="https://www.suse.com/security/cve/CVE-2020-6793" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006480.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0231-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N7YWPZQVCFPWDEOU6J3TATNMIGNZ4N6P/" source="SUSE-SU"/>
    <description>
    When processing an email message with an ill-formed envelope, Thunderbird could read data from a random memory location. This vulnerability affects Thunderbird &lt; 68.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6793/">CVE-2020-6793 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6793">CVE-2020-6793 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1163368">SUSE bug 1163368</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826918" comment="thunderbird-68.5.0-1.el7_7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206794" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6794</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6794" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6794" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6794" ref_url="https://www.suse.com/security/cve/CVE-2020-6794" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006480.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0231-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N7YWPZQVCFPWDEOU6J3TATNMIGNZ4N6P/" source="SUSE-SU"/>
    <description>
    If a user saved passwords before Thunderbird 60 and then later set a master password, an unencrypted copy of these passwords is still accessible. This is because the older stored password file was not deleted when the data was copied to a new format starting in Thunderbird 60. The new master password is added only on the new file. This could allow the exposure of stored password data outside of user expectations. This vulnerability affects Thunderbird &lt; 68.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6794/">CVE-2020-6794 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6794">CVE-2020-6794 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1163368">SUSE bug 1163368</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826918" comment="thunderbird-68.5.0-1.el7_7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206795" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6795</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6795" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6795" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6795" ref_url="https://www.suse.com/security/cve/CVE-2020-6795" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006480.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0231-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N7YWPZQVCFPWDEOU6J3TATNMIGNZ4N6P/" source="SUSE-SU"/>
    <description>
    When processing a message that contains multiple S/MIME signatures, a bug in the MIME processing code caused a null pointer dereference, leading to an unexploitable crash. This vulnerability affects Thunderbird &lt; 68.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6795/">CVE-2020-6795 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6795">CVE-2020-6795 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1163368">SUSE bug 1163368</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826918" comment="thunderbird-68.5.0-1.el7_7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206796" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6796</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6796" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6796" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6796" ref_url="https://www.suse.com/security/cve/CVE-2020-6796" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006514.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0230-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/P7R5CGITOKISJ3KLHI423OQ7CG622ECE/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A content process could have modified shared memory relating to crash reporting information, crash itself, and cause an out-of-bound write. This could have caused memory corruption and a potentially exploitable crash. This vulnerability affects Firefox &lt; 73 and Firefox &lt; ESR68.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6796/">CVE-2020-6796 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6796">CVE-2020-6796 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1163368">SUSE bug 1163368</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826903" comment="firefox-68.5.0-2.el7_7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206798" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6798</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6798" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6798" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6798" ref_url="https://www.suse.com/security/cve/CVE-2020-6798" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006514.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0230-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/P7R5CGITOKISJ3KLHI423OQ7CG622ECE/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0231-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N7YWPZQVCFPWDEOU6J3TATNMIGNZ4N6P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    If a template tag was used in a select tag, the parser could be confused and allow JavaScript parsing and execution when it should not be allowed. A site that relied on the browser behaving correctly could suffer a cross-site scripting vulnerability as a result. In general, this flaw cannot be exploited through email in the Thunderbird product because scripting is disabled when reading mail, but is potentially a risk in browser or browser-like contexts. This vulnerability affects Thunderbird &lt; 68.5, Firefox &lt; 73, and Firefox &lt; ESR68.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-6798/">CVE-2020-6798 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6798">CVE-2020-6798 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1163368">SUSE bug 1163368</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826903" comment="firefox-68.5.0-2.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826918" comment="thunderbird-68.5.0-1.el7_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6800</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6800" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6800" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6800" ref_url="https://www.suse.com/security/cve/CVE-2020-6800" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006514.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0230-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/P7R5CGITOKISJ3KLHI423OQ7CG622ECE/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0231-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N7YWPZQVCFPWDEOU6J3TATNMIGNZ4N6P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Mozilla developers and community members reported memory safety bugs present in Firefox 72 and Firefox ESR 68.4. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. In general, these flaws cannot be exploited through email in the Thunderbird product because scripting is disabled when reading mail, but are potentially risks in browser or browser-like contexts. This vulnerability affects Thunderbird &lt; 68.5, Firefox &lt; 73, and Firefox &lt; ESR68.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6800/">CVE-2020-6800 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6800">CVE-2020-6800 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1163368">SUSE bug 1163368</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826903" comment="firefox-68.5.0-2.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826918" comment="thunderbird-68.5.0-1.el7_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6805</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6805" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6805" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6805" ref_url="https://www.suse.com/security/cve/CVE-2020-6805" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006628.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006599.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0340-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KHPFCQ63EOQXZDGBRU642ETLDYDU7FRW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0366-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M4XSGNQTGWEYYC34KIWMTBKR7IVQN3XO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    When removing data about an origin whose tab was recently closed, a use-after-free could occur in the Quota manager, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 68.6, Firefox &lt; 74, Firefox &lt; ESR68.6, and Firefox ESR &lt; 68.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6805/">CVE-2020-6805 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6805">CVE-2020-6805 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1166238">SUSE bug 1166238</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826932" comment="firefox-68.6.0-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826964" comment="thunderbird-68.6.0-1.el7_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6806</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6806" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6806" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6806" ref_url="https://www.suse.com/security/cve/CVE-2020-6806" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006628.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006599.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0340-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KHPFCQ63EOQXZDGBRU642ETLDYDU7FRW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0366-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M4XSGNQTGWEYYC34KIWMTBKR7IVQN3XO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    By carefully crafting promise resolutions, it was possible to cause an out-of-bounds read off the end of an array resized during script execution. This could have led to memory corruption and a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 68.6, Firefox &lt; 74, Firefox &lt; ESR68.6, and Firefox ESR &lt; 68.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6806/">CVE-2020-6806 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6806">CVE-2020-6806 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1166238">SUSE bug 1166238</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826932" comment="firefox-68.6.0-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826964" comment="thunderbird-68.6.0-1.el7_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206807" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6807</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6807" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6807" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6807" ref_url="https://www.suse.com/security/cve/CVE-2020-6807" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006628.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006599.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0340-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KHPFCQ63EOQXZDGBRU642ETLDYDU7FRW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0366-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M4XSGNQTGWEYYC34KIWMTBKR7IVQN3XO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    When a device was changed while a stream was about to be destroyed, the &lt;code&gt;stream-reinit&lt;/code&gt; task may have been executed after the stream was destroyed, causing a use-after-free and a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 68.6, Firefox &lt; 74, Firefox &lt; ESR68.6, and Firefox ESR &lt; 68.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6807/">CVE-2020-6807 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6807">CVE-2020-6807 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1166238">SUSE bug 1166238</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826932" comment="firefox-68.6.0-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826964" comment="thunderbird-68.6.0-1.el7_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206811" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6811</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6811" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6811" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6811" ref_url="https://www.suse.com/security/cve/CVE-2020-6811" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006628.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006599.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0340-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KHPFCQ63EOQXZDGBRU642ETLDYDU7FRW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0366-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M4XSGNQTGWEYYC34KIWMTBKR7IVQN3XO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    The 'Copy as cURL' feature of Devtools' network tab did not properly escape the HTTP method of a request, which can be controlled by the website. If a user used the 'Copy as Curl' feature and pasted the command into a terminal, it could have resulted in command injection and arbitrary command execution. This vulnerability affects Thunderbird &lt; 68.6, Firefox &lt; 74, Firefox &lt; ESR68.6, and Firefox ESR &lt; 68.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-6811/">CVE-2020-6811 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6811">CVE-2020-6811 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1166238">SUSE bug 1166238</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826932" comment="firefox-68.6.0-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826964" comment="thunderbird-68.6.0-1.el7_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206812" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6812</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6812" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6812" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6812" ref_url="https://www.suse.com/security/cve/CVE-2020-6812" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006628.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006599.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0340-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KHPFCQ63EOQXZDGBRU642ETLDYDU7FRW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0366-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M4XSGNQTGWEYYC34KIWMTBKR7IVQN3XO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    The first time AirPods are connected to an iPhone, they become named after the user's name by default (e.g. Jane Doe's AirPods.) Websites with camera or microphone permission are able to enumerate device names, disclosing the user's name. To resolve this issue, Firefox added a special case that renames devices containing the substring 'AirPods' to simply 'AirPods'. This vulnerability affects Thunderbird &lt; 68.6, Firefox &lt; 74, Firefox &lt; ESR68.6, and Firefox ESR &lt; 68.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6812/">CVE-2020-6812 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6812">CVE-2020-6812 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1166238">SUSE bug 1166238</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826932" comment="firefox-68.6.0-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826964" comment="thunderbird-68.6.0-1.el7_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6814</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6814" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6814" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6814" ref_url="https://www.suse.com/security/cve/CVE-2020-6814" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006628.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006599.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0340-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KHPFCQ63EOQXZDGBRU642ETLDYDU7FRW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0366-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M4XSGNQTGWEYYC34KIWMTBKR7IVQN3XO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Mozilla developers reported memory safety bugs present in Firefox and Thunderbird 68.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird &lt; 68.6, Firefox &lt; 74, Firefox &lt; ESR68.6, and Firefox ESR &lt; 68.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6814/">CVE-2020-6814 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6814">CVE-2020-6814 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1166238">SUSE bug 1166238</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826932" comment="firefox-68.6.0-1.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826964" comment="thunderbird-68.6.0-1.el7_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206819" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6819</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6819" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6819" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6819" ref_url="https://www.suse.com/security/cve/CVE-2020-6819" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006684.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0461-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/57OIK2N52C3ATBHHV6E33CGNCTQ6C4GH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0520-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FN6IIK5ALELZVRBAN75BE37AVPRLTHGY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0544-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PXGR4OU5ZZBQU47IZYFC336KLYA7XPJK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Under certain conditions, when running the nsDocShell destructor, a race condition can cause a use-after-free. We are aware of targeted attacks in the wild abusing this flaw. This vulnerability affects Thunderbird &lt; 68.7.0, Firefox &lt; 74.0.1, and Firefox ESR &lt; 68.6.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6819/">CVE-2020-6819 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6819">CVE-2020-6819 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1168630">SUSE bug 1168630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168874">SUSE bug 1168874</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827913" comment="firefox-68.6.1-1.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827915" comment="thunderbird-68.7.0-1.el7_8 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206820" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6820</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6820" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6820" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6820" ref_url="https://www.suse.com/security/cve/CVE-2020-6820" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006684.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0461-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/57OIK2N52C3ATBHHV6E33CGNCTQ6C4GH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0520-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FN6IIK5ALELZVRBAN75BE37AVPRLTHGY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0544-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PXGR4OU5ZZBQU47IZYFC336KLYA7XPJK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Under certain conditions, when handling a ReadableStream, a race condition can cause a use-after-free. We are aware of targeted attacks in the wild abusing this flaw. This vulnerability affects Thunderbird &lt; 68.7.0, Firefox &lt; 74.0.1, and Firefox ESR &lt; 68.6.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6820/">CVE-2020-6820 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6820">CVE-2020-6820 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1168630">SUSE bug 1168630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168874">SUSE bug 1168874</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827913" comment="firefox-68.6.1-1.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827915" comment="thunderbird-68.7.0-1.el7_8 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206821" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6821</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6821" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6821" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6821" ref_url="https://www.suse.com/security/cve/CVE-2020-6821" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0978-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006697.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0493-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PEPV5DHEVOPH4DSX3ID2NZZTDCDCRASS/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0520-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FN6IIK5ALELZVRBAN75BE37AVPRLTHGY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0544-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PXGR4OU5ZZBQU47IZYFC336KLYA7XPJK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    When reading from areas partially or fully outside the source resource with WebGL's &lt;code&gt;copyTexSubImage&lt;/code&gt; method, the specification requires the returned values be zero. Previously, this memory was uninitialized, leading to potentially sensitive data disclosure. This vulnerability affects Thunderbird &lt; 68.7.0, Firefox ESR &lt; 68.7, and Firefox &lt; 75.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6821/">CVE-2020-6821 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6821">CVE-2020-6821 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1168630">SUSE bug 1168630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168874">SUSE bug 1168874</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827914" comment="firefox-68.7.0-2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827915" comment="thunderbird-68.7.0-1.el7_8 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206822" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6822</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6822" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6822" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6822" ref_url="https://www.suse.com/security/cve/CVE-2020-6822" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0978-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006697.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0493-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PEPV5DHEVOPH4DSX3ID2NZZTDCDCRASS/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0520-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FN6IIK5ALELZVRBAN75BE37AVPRLTHGY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0544-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PXGR4OU5ZZBQU47IZYFC336KLYA7XPJK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    On 32-bit builds, an out of bounds write could have occurred when processing an image larger than 4 GB in &lt;code&gt;GMPDecodeData&lt;/code&gt;. It is possible that with enough effort this could have been exploited to run arbitrary code. This vulnerability affects Thunderbird &lt; 68.7.0, Firefox ESR &lt; 68.7, and Firefox &lt; 75.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-6822/">CVE-2020-6822 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6822">CVE-2020-6822 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1168630">SUSE bug 1168630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168874">SUSE bug 1168874</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827914" comment="firefox-68.7.0-2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827915" comment="thunderbird-68.7.0-1.el7_8 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206825" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6825</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6825" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6825" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6825" ref_url="https://www.suse.com/security/cve/CVE-2020-6825" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0978-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006697.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0493-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PEPV5DHEVOPH4DSX3ID2NZZTDCDCRASS/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0520-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FN6IIK5ALELZVRBAN75BE37AVPRLTHGY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0544-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PXGR4OU5ZZBQU47IZYFC336KLYA7XPJK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Mozilla developers and community members Tyson Smith and Christian Holler reported memory safety bugs present in Firefox 74 and Firefox ESR 68.6. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird &lt; 68.7.0, Firefox ESR &lt; 68.7, and Firefox &lt; 75.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6825/">CVE-2020-6825 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6825">CVE-2020-6825 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1168630">SUSE bug 1168630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168874">SUSE bug 1168874</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827914" comment="firefox-68.7.0-2.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827915" comment="thunderbird-68.7.0-1.el7_8 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206829" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6829</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6829" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6829" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6829" ref_url="https://www.suse.com/security/cve/CVE-2020-6829" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    When performing EC scalar point multiplication, the wNAF point multiplication algorithm was used; which leaked partial information about the nonce used during signature generation. Given an electro-magnetic trace of a few signature generations, the private key could have been computed. This vulnerability affects Firefox &lt; 80 and Firefox for Android &lt; 80.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6829/">CVE-2020-6829 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6829">CVE-2020-6829 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1174763">SUSE bug 1174763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175686">SUSE bug 1175686</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828558" comment="nspr-4.25.0-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828559" comment="nspr-devel-4.25.0-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828560" comment="nss-3.53.1-3.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828561" comment="nss-devel-3.53.1-3.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828562" comment="nss-pkcs11-devel-3.53.1-3.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828563" comment="nss-softokn-3.53.1-6.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828564" comment="nss-softokn-devel-3.53.1-6.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828565" comment="nss-softokn-freebl-3.53.1-6.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828566" comment="nss-softokn-freebl-devel-3.53.1-6.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828567" comment="nss-sysinit-3.53.1-3.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828568" comment="nss-tools-3.53.1-3.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828569" comment="nss-util-3.53.1-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828570" comment="nss-util-devel-3.53.1-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206831" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6831</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6831" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6831" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6831" ref_url="https://www.suse.com/security/cve/CVE-2020-6831" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1225-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006809.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0620-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JZWG67WLLGB24KQGFWLQCE4EILVX3YVP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0621-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EHIK2CEXF7KGEAHF2CFW2EEKLTCAFFXT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0643-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5YQSDU3MFHQWYW5DLTHJ4JOYHWTHCHMN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0648-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MZ2SKF2KGZ6HPXPWQGVRGGOFHMAFBYGT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0709-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R4ZOZMMUQJP7KX3R3SO652IBWIRTED2C/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0917-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/URGAZZH235MACHZERPNLFFODQWELZSF5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A buffer overflow could occur when parsing and validating SCTP chunks in WebRTC. This could have led to memory corruption and a potentially exploitable crash. This vulnerability affects Firefox ESR &lt; 68.8, Firefox &lt; 76, and Thunderbird &lt; 68.8.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6831/">CVE-2020-6831 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6831">CVE-2020-6831 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1171186">SUSE bug 1171186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171247">SUSE bug 1171247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827958" comment="firefox-68.8.0-1.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827962" comment="thunderbird-68.8.0-1.el7_8 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206851" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6851</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6851" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6851" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6851" ref_url="https://www.suse.com/security/cve/CVE-2020-6851" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:1252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010745.html" source="SUSE-SU"/>
    <description>
    OpenJPEG through 2.3.1 has a heap-based buffer overflow in opj_t1_clbl_decode_processor in openjp2/t1.c because of lack of opj_j2k_update_image_dimensions validation.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6851/">CVE-2020-6851 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6851">CVE-2020-6851 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1160782">SUSE bug 1160782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162090">SUSE bug 1162090</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826871" comment="openjpeg2-2.3.1-2.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826872" comment="openjpeg2-devel-2.3.1-2.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826873" comment="openjpeg2-devel-docs-2.3.1-2.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826874" comment="openjpeg2-tools-2.3.1-2.el7_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20207039" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-7039</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-7039" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7039" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-7039" ref_url="https://www.suse.com/security/cve/CVE-2020-7039" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1523-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008673.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0468-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S5VG234WOT345KSVGE32CW6SK7I55AZP/" source="SUSE-SU"/>
    <description>
    tcp_emu in tcp_subr.c in libslirp 4.1.0, as used in QEMU 4.2.0, mismanages memory, as demonstrated by IRC DCC commands in EMU_IRC. This can cause a heap-based buffer overflow or other out-of-bounds access which can lead to a DoS or potential execute arbitrary code.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-08"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-7039/">CVE-2020-7039 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7039">CVE-2020-7039 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1161066">SUSE bug 1161066</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827792" comment="qemu-img-1.5.3-173.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827793" comment="qemu-kvm-1.5.3-173.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827794" comment="qemu-kvm-common-1.5.3-173.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827795" comment="qemu-kvm-tools-1.5.3-173.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20207053" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-7053</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-7053" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7053" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-7053" ref_url="https://www.suse.com/security/cve/CVE-2020-7053" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0336-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LSSHQFX4IJH5UZIPQACYQ6RIWLLJPS6R/" source="SUSE-SU"/>
    <description>
    In the Linux kernel 4.14 longterm through 4.14.165 and 4.19 longterm through 4.19.96 (and 5.x before 5.2), there is a use-after-free (write) in the i915_ppgtt_close function in drivers/gpu/drm/i915/i915_gem_gtt.c, aka CID-7dc40713618c. This is related to i915_gem_context_destroy_ioctl in drivers/gpu/drm/i915/i915_gem_context.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-7053/">CVE-2020-7053 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7053">CVE-2020-7053 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1160966">SUSE bug 1160966</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828991" comment="bpftool-3.10.0-1160.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828992" comment="kernel-3.10.0-1160.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828993" comment="kernel-abi-whitelists-3.10.0-1160.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828994" comment="kernel-debug-3.10.0-1160.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828997" comment="kernel-doc-3.10.0-1160.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828998" comment="kernel-headers-3.10.0-1160.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828999" comment="kernel-tools-3.10.0-1160.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829000" comment="kernel-tools-libs-3.10.0-1160.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829002" comment="perf-3.10.0-1160.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829003" comment="python-perf-3.10.0-1160.21.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20207595" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-7595</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-7595" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7595" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-7595" ref_url="https://www.suse.com/security/cve/CVE-2020-7595" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008797.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0681-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/75OUBX7RPPAARGW2FKOWVC52NVIH42S5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14697-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U5YNW74OL2W7SH2XTAVN5TODNFIVFL3Y/" source="SUSE-SU"/>
    <description>
    xmlStringLenDecodeEntities in parser.c in libxml2 2.9.10 has an infinite loop in a certain end-of-file situation.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-7595/">CVE-2020-7595 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7595">CVE-2020-7595 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1161517">SUSE bug 1161517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191860">SUSE bug 1191860</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828403" comment="libxml2-2.9.1-6.el7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828404" comment="libxml2-devel-2.9.1-6.el7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828405" comment="libxml2-python-2.9.1-6.el7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828406" comment="libxml2-static-2.9.1-6.el7.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208112" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8112</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8112" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8112" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8112" ref_url="https://www.suse.com/security/cve/CVE-2020-8112" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:1129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010791.html" source="SUSE-SU"/>
    <description>
    opj_t1_clbl_decode_processor in openjp2/t1.c in OpenJPEG 2.3.1 through 2020-01-28 has a heap-based buffer overflow in the qmfbid==1 case, a different issue than CVE-2020-6851.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-8112/">CVE-2020-8112 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8112">CVE-2020-8112 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1162090">SUSE bug 1162090</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826913" comment="openjpeg2-2.3.1-3.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826914" comment="openjpeg2-devel-2.3.1-3.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826915" comment="openjpeg2-devel-docs-2.3.1-3.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826916" comment="openjpeg2-tools-2.3.1-3.el7_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208177" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8177</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8177" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8177" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8177" ref_url="https://www.suse.com/security/cve/CVE-2020-8177" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:356-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14409-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1734-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0883-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WOMRJVNHOQXH3HGQNKNOII35LAMOSNKQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0908-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GFJDBNWLSCZKQ5JEJ2A4C3FF2CBGRWWA/" source="SUSE-SU"/>
    <description>
    curl 7.20.0 through 7.70.0 is vulnerable to improper restriction of names for files and other resources that can lead too overwriting a local file when the -J flag is used.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8177/">CVE-2020-8177 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8177">CVE-2020-8177 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1173027">SUSE bug 1173027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186108">SUSE bug 1186108</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828622" comment="curl-7.29.0-59.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828623" comment="libcurl-7.29.0-59.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828624" comment="libcurl-devel-7.29.0-59.el7_9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208449" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8449</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8449" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8449" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8449" ref_url="https://www.suse.com/security/cve/CVE-2020-8449" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007289.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0307-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OSBD4IUE3J32BEBGOTEFYZCO2BC6SOBD/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0606-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AGFVFRNFEBM5GAYSO2Y6EUODQ7XBSWE3/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Squid before 4.10. Due to incorrect input validation, it can interpret crafted HTTP requests in unexpected ways to access server resources prohibited by earlier security filters.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-8449/">CVE-2020-8449 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8449">CVE-2020-8449 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1162687">SUSE bug 1162687</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828576" comment="squid-3.5.20-17.el7_9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828577" comment="squid-migration-script-3.5.20-17.el7_9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828578" comment="squid-sysvinit-3.5.20-17.el7_9.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208450" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8450</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8450" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8450" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8450" ref_url="https://www.suse.com/security/cve/CVE-2020-8450" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007289.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0307-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OSBD4IUE3J32BEBGOTEFYZCO2BC6SOBD/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0606-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AGFVFRNFEBM5GAYSO2Y6EUODQ7XBSWE3/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Squid before 4.10. Due to incorrect buffer management, a remote client can cause a buffer overflow in a Squid instance acting as a reverse proxy.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-8450/">CVE-2020-8450 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8450">CVE-2020-8450 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1162687">SUSE bug 1162687</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828576" comment="squid-3.5.20-17.el7_9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828577" comment="squid-migration-script-3.5.20-17.el7_9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828578" comment="squid-sysvinit-3.5.20-17.el7_9.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208492" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8492</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8492" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8492" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8492" ref_url="https://www.suse.com/security/cve/CVE-2020-8492" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:17-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0444-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0447-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0450-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0452-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0456-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3865-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013149.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0274-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KM6NAXPFOSRYBXLYJ4E6REOSYLCOBSFU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2332-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S3JTHM6LLDKL7VPNRJUSRPNZAD2FZ25H/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2333-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FLGERALYYFTBIX3ZKPM6EQ2WJVUXLOXY/" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/pipermail/neuvector-updates/2023-November/000021.html" source="SUSE-SU"/>
    <description>
    Python 2.7 through 2.7.17, 3.5 through 3.5.9, 3.6 through 3.6.10, 3.7 through 3.7.6, and 3.8 through 3.8.1 allows an HTTP server to conduct Regular Expression Denial of Service (ReDoS) attacks against a client because of urllib.request.AbstractBasicAuthHandler catastrophic backtracking.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8492/">CVE-2020-8492 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8492">CVE-2020-8492 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1162367">SUSE bug 1162367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828246" comment="python3-3.6.8-17.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828247" comment="python3-debug-3.6.8-17.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828248" comment="python3-devel-3.6.8-17.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828249" comment="python3-idle-3.6.8-17.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828250" comment="python3-libs-3.6.8-17.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828251" comment="python3-test-3.6.8-17.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828252" comment="python3-tkinter-3.6.8-17.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208597" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8597</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8597" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8597" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8597" ref_url="https://www.suse.com/security/cve/CVE-2020-8597" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006528.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0286-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IXJEFTCYMG4AFN6TH2WV44JAKZ2VVI3I/" source="SUSE-SU"/>
    <description>
    eap.c in pppd in ppp 2.4.2 through 2.4.8 has an rhostname buffer overflow in the eap_request and eap_response functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2020-8597/">CVE-2020-8597 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8597">CVE-2020-8597 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1162610">SUSE bug 1162610</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009826925" comment="ppp-2.4.5-34.el7_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009826926" comment="ppp-devel-2.4.5-34.el7_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208608" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8608</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8608" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8608" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8608" ref_url="https://www.suse.com/security/cve/CVE-2020-8608" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14448-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1523-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007243.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1942-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008990.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0468-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S5VG234WOT345KSVGE32CW6SK7I55AZP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1043-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SVDDMT7IUGYOEFTYO3UWD73PJMJL4FSY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1942-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IEKBDJBTGKO53MSKM3SRYVUQDWIJ2N5I/" source="SUSE-SU"/>
    <description>
    In libslirp 4.1.0, as used in QEMU 4.2.0, tcp_subr.c misuses snprintf return values, leading to a buffer overflow in later code.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-07"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-8608/">CVE-2020-8608 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8608">CVE-2020-8608 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1163018">SUSE bug 1163018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163019">SUSE bug 1163019</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827907" comment="qemu-img-1.5.3-173.el7_8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827908" comment="qemu-kvm-1.5.3-173.el7_8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827909" comment="qemu-kvm-common-1.5.3-173.el7_8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827910" comment="qemu-kvm-tools-1.5.3-173.el7_8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208616" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8616</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8616" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8616" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8616" ref_url="https://www.suse.com/security/cve/CVE-2020-8616" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14400-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007552.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1699-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VUOYW2V65CJWOTYJHZKJDB23QXG7SODU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1701-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5DSIJXYG3NFNRGFIFTMKBYDE6QWREQSP/" source="SUSE-SU"/>
    <description>
    A malicious actor who intentionally exploits this lack of effective limitation on the number of fetches performed when processing referrals can, through the use of specially crafted referrals, cause a recursing server to issue a very large number of fetches in an attempt to process the referral. This has at least two potential effects: The performance of the recursing server can potentially be degraded by the additional work required to perform these fetches, and The attacker can exploit this behavior to use the recursing server as a reflector in a reflection attack with a high amplification factor.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-02"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8616/">CVE-2020-8616 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8616">CVE-2020-8616 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1109160">SUSE bug 1109160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171740">SUSE bug 1171740</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827996" comment="bind-9.11.4-16.P2.el7_8.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827997" comment="bind-chroot-9.11.4-16.P2.el7_8.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827998" comment="bind-devel-9.11.4-16.P2.el7_8.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827999" comment="bind-export-devel-9.11.4-16.P2.el7_8.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828000" comment="bind-export-libs-9.11.4-16.P2.el7_8.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828001" comment="bind-libs-9.11.4-16.P2.el7_8.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828002" comment="bind-libs-lite-9.11.4-16.P2.el7_8.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828003" comment="bind-license-9.11.4-16.P2.el7_8.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828004" comment="bind-lite-devel-9.11.4-16.P2.el7_8.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828005" comment="bind-pkcs11-9.11.4-16.P2.el7_8.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828006" comment="bind-pkcs11-devel-9.11.4-16.P2.el7_8.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828007" comment="bind-pkcs11-libs-9.11.4-16.P2.el7_8.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828008" comment="bind-pkcs11-utils-9.11.4-16.P2.el7_8.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828009" comment="bind-sdb-9.11.4-16.P2.el7_8.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828010" comment="bind-sdb-chroot-9.11.4-16.P2.el7_8.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828011" comment="bind-utils-9.11.4-16.P2.el7_8.6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208617" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8617</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8617" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8617" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8617" ref_url="https://www.suse.com/security/cve/CVE-2020-8617" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14400-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007552.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1699-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VUOYW2V65CJWOTYJHZKJDB23QXG7SODU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1701-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5DSIJXYG3NFNRGFIFTMKBYDE6QWREQSP/" source="SUSE-SU"/>
    <description>
    Using a specially-crafted message, an attacker may potentially cause a BIND server to reach an inconsistent state if the attacker knows (or successfully guesses) the name of a TSIG key used by the server. Since BIND, by default, configures a local session key even on servers whose configuration does not otherwise make use of it, almost all current BIND servers are vulnerable. In releases of BIND dating from March 2018 and after, an assertion check in tsig.c detects this inconsistent state and deliberately exits. Prior to the introduction of the check the server would continue operating in an inconsistent state, with potentially harmful results.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-02"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8617/">CVE-2020-8617 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8617">CVE-2020-8617 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1109160">SUSE bug 1109160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171740">SUSE bug 1171740</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009827996" comment="bind-9.11.4-16.P2.el7_8.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827997" comment="bind-chroot-9.11.4-16.P2.el7_8.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827998" comment="bind-devel-9.11.4-16.P2.el7_8.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009827999" comment="bind-export-devel-9.11.4-16.P2.el7_8.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828000" comment="bind-export-libs-9.11.4-16.P2.el7_8.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828001" comment="bind-libs-9.11.4-16.P2.el7_8.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828002" comment="bind-libs-lite-9.11.4-16.P2.el7_8.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828003" comment="bind-license-9.11.4-16.P2.el7_8.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828004" comment="bind-lite-devel-9.11.4-16.P2.el7_8.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828005" comment="bind-pkcs11-9.11.4-16.P2.el7_8.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828006" comment="bind-pkcs11-devel-9.11.4-16.P2.el7_8.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828007" comment="bind-pkcs11-libs-9.11.4-16.P2.el7_8.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828008" comment="bind-pkcs11-utils-9.11.4-16.P2.el7_8.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828009" comment="bind-sdb-9.11.4-16.P2.el7_8.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828010" comment="bind-sdb-chroot-9.11.4-16.P2.el7_8.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828011" comment="bind-utils-9.11.4-16.P2.el7_8.6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208622" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8622</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8622" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8622" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8622" ref_url="https://www.suse.com/security/cve/CVE-2020-8622" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2020:2915-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-October/016400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009368.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1699-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VUOYW2V65CJWOTYJHZKJDB23QXG7SODU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1701-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5DSIJXYG3NFNRGFIFTMKBYDE6QWREQSP/" source="SUSE-SU"/>
    <description>
    In BIND 9.0.0 -&gt; 9.11.21, 9.12.0 -&gt; 9.16.5, 9.17.0 -&gt; 9.17.3, also affects 9.9.3-S1 -&gt; 9.11.21-S1 of the BIND 9 Supported Preview Edition, An attacker on the network path for a TSIG-signed request, or operating the server receiving the TSIG-signed request, could send a truncated response to that request, triggering an assertion failure, causing the server to exit. Alternately, an off-path attacker would have to correctly guess when a TSIG-signed request was sent, along with other characteristics of the packet and message, and spoof a truncated response to trigger an assertion failure, causing the server to exit.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8622/">CVE-2020-8622 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8622">CVE-2020-8622 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1175443">SUSE bug 1175443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188888">SUSE bug 1188888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191120">SUSE bug 1191120</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828683" comment="bind-9.11.4-26.P2.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828684" comment="bind-chroot-9.11.4-26.P2.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828685" comment="bind-devel-9.11.4-26.P2.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828686" comment="bind-export-devel-9.11.4-26.P2.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828687" comment="bind-export-libs-9.11.4-26.P2.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828688" comment="bind-libs-9.11.4-26.P2.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828689" comment="bind-libs-lite-9.11.4-26.P2.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828690" comment="bind-license-9.11.4-26.P2.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828691" comment="bind-lite-devel-9.11.4-26.P2.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828692" comment="bind-pkcs11-9.11.4-26.P2.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828693" comment="bind-pkcs11-devel-9.11.4-26.P2.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828694" comment="bind-pkcs11-libs-9.11.4-26.P2.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828695" comment="bind-pkcs11-utils-9.11.4-26.P2.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828696" comment="bind-sdb-9.11.4-26.P2.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828697" comment="bind-sdb-chroot-9.11.4-26.P2.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828698" comment="bind-utils-9.11.4-26.P2.el7_9.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208623" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8623</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8623" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8623" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8623" ref_url="https://www.suse.com/security/cve/CVE-2020-8623" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2020:2915-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-October/016400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007552.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1699-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VUOYW2V65CJWOTYJHZKJDB23QXG7SODU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1701-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5DSIJXYG3NFNRGFIFTMKBYDE6QWREQSP/" source="SUSE-SU"/>
    <description>
    In BIND 9.10.0 -&gt; 9.11.21, 9.12.0 -&gt; 9.16.5, 9.17.0 -&gt; 9.17.3, also affects 9.10.5-S1 -&gt; 9.11.21-S1 of the BIND 9 Supported Preview Edition, An attacker that can reach a vulnerable system with a specially crafted query packet can trigger a crash. To be vulnerable, the system must: * be running BIND that was built with "--enable-native-pkcs11" * be signing one or more zones with an RSA key * be able to receive queries from a possible attacker
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8623/">CVE-2020-8623 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8623">CVE-2020-8623 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1175443">SUSE bug 1175443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191120">SUSE bug 1191120</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828683" comment="bind-9.11.4-26.P2.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828684" comment="bind-chroot-9.11.4-26.P2.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828685" comment="bind-devel-9.11.4-26.P2.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828686" comment="bind-export-devel-9.11.4-26.P2.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828687" comment="bind-export-libs-9.11.4-26.P2.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828688" comment="bind-libs-9.11.4-26.P2.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828689" comment="bind-libs-lite-9.11.4-26.P2.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828690" comment="bind-license-9.11.4-26.P2.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828691" comment="bind-lite-devel-9.11.4-26.P2.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828692" comment="bind-pkcs11-9.11.4-26.P2.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828693" comment="bind-pkcs11-devel-9.11.4-26.P2.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828694" comment="bind-pkcs11-libs-9.11.4-26.P2.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828695" comment="bind-pkcs11-utils-9.11.4-26.P2.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828696" comment="bind-sdb-9.11.4-26.P2.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828697" comment="bind-sdb-chroot-9.11.4-26.P2.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828698" comment="bind-utils-9.11.4-26.P2.el7_9.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208624" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8624</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8624" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8624" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8624" ref_url="https://www.suse.com/security/cve/CVE-2020-8624" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2020:2915-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-October/016400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007552.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1699-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VUOYW2V65CJWOTYJHZKJDB23QXG7SODU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1701-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5DSIJXYG3NFNRGFIFTMKBYDE6QWREQSP/" source="SUSE-SU"/>
    <description>
    In BIND 9.9.12 -&gt; 9.9.13, 9.10.7 -&gt; 9.10.8, 9.11.3 -&gt; 9.11.21, 9.12.1 -&gt; 9.16.5, 9.17.0 -&gt; 9.17.3, also affects 9.9.12-S1 -&gt; 9.9.13-S1, 9.11.3-S1 -&gt; 9.11.21-S1 of the BIND 9 Supported Preview Edition, An attacker who has been granted privileges to change a specific subset of the zone's content could abuse these unintended additional privileges to update other contents of the zone.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-8624/">CVE-2020-8624 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8624">CVE-2020-8624 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1175443">SUSE bug 1175443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191120">SUSE bug 1191120</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828683" comment="bind-9.11.4-26.P2.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828684" comment="bind-chroot-9.11.4-26.P2.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828685" comment="bind-devel-9.11.4-26.P2.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828686" comment="bind-export-devel-9.11.4-26.P2.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828687" comment="bind-export-libs-9.11.4-26.P2.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828688" comment="bind-libs-9.11.4-26.P2.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828689" comment="bind-libs-lite-9.11.4-26.P2.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828690" comment="bind-license-9.11.4-26.P2.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828691" comment="bind-lite-devel-9.11.4-26.P2.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828692" comment="bind-pkcs11-9.11.4-26.P2.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828693" comment="bind-pkcs11-devel-9.11.4-26.P2.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828694" comment="bind-pkcs11-libs-9.11.4-26.P2.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828695" comment="bind-pkcs11-utils-9.11.4-26.P2.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828696" comment="bind-sdb-9.11.4-26.P2.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828697" comment="bind-sdb-chroot-9.11.4-26.P2.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828698" comment="bind-utils-9.11.4-26.P2.el7_9.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208625" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8625</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8625" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8625" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8625" ref_url="https://www.suse.com/security/cve/CVE-2020-8625" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008341.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0375-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WTREZMKE6OIOIY3CLBWV3GIOPB4EM4DX/" source="SUSE-SU"/>
    <description>
    BIND servers are vulnerable if they are running an affected version and are configured to use GSS-TSIG features. In a configuration which uses BIND's default settings the vulnerable code path is not exposed, but a server can be rendered vulnerable by explicitly setting valid values for the tkey-gssapi-keytab or tkey-gssapi-credentialconfiguration options. Although the default configuration is not vulnerable, GSS-TSIG is frequently used in networks where BIND is integrated with Samba, as well as in mixed-server environments that combine BIND servers with Active Directory domain controllers. The most likely outcome of a successful exploitation of the vulnerability is a crash of the named process. However, remote code execution, while unproven, is theoretically possible. Affects: BIND 9.5.0 -&gt; 9.11.27, 9.12.0 -&gt; 9.16.11, and versions BIND 9.11.3-S1 -&gt; 9.11.27-S1 and 9.16.8-S1 -&gt; 9.16.11-S1 of BIND Supported Preview Edition. Also release versions 9.17.0 -&gt; 9.17.1 of the BIND 9.17 development branch
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8625/">CVE-2020-8625 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8625">CVE-2020-8625 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1182246">SUSE bug 1182246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182483">SUSE bug 1182483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192708">SUSE bug 1192708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196172">SUSE bug 1196172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218478">SUSE bug 1218478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225626">SUSE bug 1225626</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828952" comment="bind-9.11.4-26.P2.el7_9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828953" comment="bind-chroot-9.11.4-26.P2.el7_9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828954" comment="bind-devel-9.11.4-26.P2.el7_9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828955" comment="bind-export-devel-9.11.4-26.P2.el7_9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828956" comment="bind-export-libs-9.11.4-26.P2.el7_9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828957" comment="bind-libs-9.11.4-26.P2.el7_9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828958" comment="bind-libs-lite-9.11.4-26.P2.el7_9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828959" comment="bind-license-9.11.4-26.P2.el7_9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828960" comment="bind-lite-devel-9.11.4-26.P2.el7_9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828961" comment="bind-pkcs11-9.11.4-26.P2.el7_9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828962" comment="bind-pkcs11-devel-9.11.4-26.P2.el7_9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828963" comment="bind-pkcs11-libs-9.11.4-26.P2.el7_9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828964" comment="bind-pkcs11-utils-9.11.4-26.P2.el7_9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828965" comment="bind-sdb-9.11.4-26.P2.el7_9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828966" comment="bind-sdb-chroot-9.11.4-26.P2.el7_9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828967" comment="bind-utils-9.11.4-26.P2.el7_9.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208631" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8631</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8631" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8631" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8631" ref_url="https://www.suse.com/security/cve/CVE-2020-8631" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006651.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0400-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HP4VDWEKECKD5KSKGQVLYNIVVMBFT5EB/" source="SUSE-SU"/>
    <description>
    cloud-init through 19.4 relies on Mersenne Twister for a random password, which makes it easier for attackers to predict passwords, because rand_str in cloudinit/util.py calls the random.choice function.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8631/">CVE-2020-8631 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8631">CVE-2020-8631 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1162937">SUSE bug 1162937</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828253" comment="cloud-init-19.4-7.el7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208632" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8632</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8632" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8632" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8632" ref_url="https://www.suse.com/security/cve/CVE-2020-8632" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006651.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0400-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HP4VDWEKECKD5KSKGQVLYNIVVMBFT5EB/" source="SUSE-SU"/>
    <description>
    In cloud-init through 19.4, rand_user_password in cloudinit/config/cc_set_passwords.py has a small default pwlen value, which makes it easier for attackers to guess passwords.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8632/">CVE-2020-8632 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8632">CVE-2020-8632 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1162936">SUSE bug 1162936</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828253" comment="cloud-init-19.4-7.el7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208647" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8647</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8647" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8647" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8647" ref_url="https://www.suse.com/security/cve/CVE-2020-8647" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0388-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6IRYS6743ISN3DBCZORC2AEZU7D7GZNC/" source="SUSE-SU"/>
    <description>
    There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the vc_do_resize function in drivers/tty/vt/vt.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-8647/">CVE-2020-8647 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8647">CVE-2020-8647 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1162929">SUSE bug 1162929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164078">SUSE bug 1164078</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828543" comment="bpftool-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828544" comment="kernel-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828545" comment="kernel-abi-whitelists-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828546" comment="kernel-debug-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828549" comment="kernel-doc-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828550" comment="kernel-headers-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828551" comment="kernel-tools-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828552" comment="kernel-tools-libs-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828554" comment="perf-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828555" comment="python-perf-3.10.0-1160.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208648" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8648</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8648" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8648" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8648" ref_url="https://www.suse.com/security/cve/CVE-2020-8648" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0336-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LSSHQFX4IJH5UZIPQACYQ6RIWLLJPS6R/" source="SUSE-SU"/>
    <description>
    There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the n_tty_receive_buf_common function in drivers/tty/n_tty.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8648/">CVE-2020-8648 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8648">CVE-2020-8648 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1162928">SUSE bug 1162928</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829154" comment="bpftool-3.10.0-1160.31.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829155" comment="kernel-3.10.0-1160.31.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829156" comment="kernel-abi-whitelists-3.10.0-1160.31.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829157" comment="kernel-debug-3.10.0-1160.31.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829160" comment="kernel-doc-3.10.0-1160.31.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829161" comment="kernel-headers-3.10.0-1160.31.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829162" comment="kernel-tools-3.10.0-1160.31.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829163" comment="kernel-tools-libs-3.10.0-1160.31.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829165" comment="perf-3.10.0-1160.31.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829166" comment="python-perf-3.10.0-1160.31.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208649" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8649</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8649" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8649" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8649" ref_url="https://www.suse.com/security/cve/CVE-2020-8649" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0388-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6IRYS6743ISN3DBCZORC2AEZU7D7GZNC/" source="SUSE-SU"/>
    <description>
    There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the vgacon_invert_region function in drivers/video/console/vgacon.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-8649/">CVE-2020-8649 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8649">CVE-2020-8649 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1162929">SUSE bug 1162929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162931">SUSE bug 1162931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828543" comment="bpftool-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828544" comment="kernel-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828545" comment="kernel-abi-whitelists-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828546" comment="kernel-debug-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828549" comment="kernel-doc-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828550" comment="kernel-headers-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828551" comment="kernel-tools-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828552" comment="kernel-tools-libs-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828554" comment="perf-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828555" comment="python-perf-3.10.0-1160.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208695" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8695</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8695" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8695" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8695" ref_url="https://www.suse.com/security/cve/CVE-2020-8695" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2024:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2024:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2024:20-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3271-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-November/016830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007796.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3457-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4936-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017510.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03540-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022860.html" source="SUSE-SU"/>
		<reference ref_id="TID000019778" ref_url="https://www.suse.com/support/kb/doc/?id=000019778" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1915-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RDFLVEOG7TX6Q4WKP6Q53CLGQ3KKC2GT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1923-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/L4M7N2LSLXLVXOCOXVRUDWN2YU7CBOGZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2075-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JAVL7PXBHMY5MEXAKSQM6PTNW6CHJJC2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2098-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TF4HQIBGSJ2IFTYIDCJW5IFFEG62DCU5/" source="SUSE-SU"/>
    <description>
    Observable discrepancy in the RAPL interface for some Intel(R) Processors may allow a privileged user to potentially enable information disclosure via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-10-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8695/">CVE-2020-8695 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8695">CVE-2020-8695 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1170415">SUSE bug 1170415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170446">SUSE bug 1170446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178591">SUSE bug 1178591</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829242" comment="microcode_ctl-2.1-73.11.el7_9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208696" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8696</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8696" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8696" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8696" ref_url="https://www.suse.com/security/cve/CVE-2020-8696" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007796.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3457-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007857.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2075-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JAVL7PXBHMY5MEXAKSQM6PTNW6CHJJC2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2098-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TF4HQIBGSJ2IFTYIDCJW5IFFEG62DCU5/" source="SUSE-SU"/>
    <description>
    Improper removal of sensitive information before storage or transfer in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-08"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8696/">CVE-2020-8696 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8696">CVE-2020-8696 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1173592">SUSE bug 1173592</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829242" comment="microcode_ctl-2.1-73.11.el7_9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208698" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8698</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8698" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8698" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8698" ref_url="https://www.suse.com/security/cve/CVE-2020-8698" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3271-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-November/016830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007796.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3457-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007857.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1915-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RDFLVEOG7TX6Q4WKP6Q53CLGQ3KKC2GT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1923-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/L4M7N2LSLXLVXOCOXVRUDWN2YU7CBOGZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2075-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JAVL7PXBHMY5MEXAKSQM6PTNW6CHJJC2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2098-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TF4HQIBGSJ2IFTYIDCJW5IFFEG62DCU5/" source="SUSE-SU"/>
    <description>
    Improper isolation of shared resources in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-07"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8698/">CVE-2020-8698 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8698">CVE-2020-8698 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1173594">SUSE bug 1173594</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829242" comment="microcode_ctl-2.1-73.11.el7_9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20209359" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-9359</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-9359" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9359" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-9359" ref_url="https://www.suse.com/security/cve/CVE-2020-9359" source="SUSE CVE"/>
    <description>
    KDE Okular before 1.10.0 allows code execution via an action link in a PDF document.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9359/">CVE-2020-9359 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9359">CVE-2020-9359 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1167435">SUSE bug 1167435</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828489" comment="okular-4.10.5-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828490" comment="okular-devel-4.10.5-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828491" comment="okular-libs-4.10.5-9.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828492" comment="okular-part-4.10.5-9.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20209383" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-9383</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-9383" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9383" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-9383" ref_url="https://www.suse.com/security/cve/CVE-2020-9383" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0388-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6IRYS6743ISN3DBCZORC2AEZU7D7GZNC/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel 3.16 through 5.5.6. set_fdc in drivers/block/floppy.c leads to a wait_til_ready out-of-bounds read because the FDC index is not checked for errors before assigning it, aka CID-2e90ca68b0d2.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-9383/">CVE-2020-9383 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9383">CVE-2020-9383 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1165111">SUSE bug 1165111</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828543" comment="bpftool-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828544" comment="kernel-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828545" comment="kernel-abi-whitelists-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828546" comment="kernel-debug-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828549" comment="kernel-doc-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828550" comment="kernel-headers-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828551" comment="kernel-tools-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828552" comment="kernel-tools-libs-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828554" comment="perf-3.10.0-1160.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828555" comment="python-perf-3.10.0-1160.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20209484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-9484</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-9484" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9484" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-9484" ref_url="https://www.suse.com/security/cve/CVE-2020-9484" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1363-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1365-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006867.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0711-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KEGFHXFDNNML32KIYPBCJAKPCF3Q6VJ6/" source="SUSE-SU"/>
    <description>
    When using Apache Tomcat versions 10.0.0-M1 to 10.0.0-M4, 9.0.0.M1 to 9.0.34, 8.5.0 to 8.5.54 and 7.0.0 to 7.0.103 if a) an attacker is able to control the contents and name of a file on the server; and b) the server is configured to use the PersistenceManager with a FileStore; and c) the PersistenceManager is configured with sessionAttributeValueClassNameFilter="null" (the default unless a SecurityManager is used) or a sufficiently lax filter to allow the attacker provided object to be deserialized; and d) the attacker knows the relative file path from the storage location used by FileStore to the file the attacker has control over; then, using a specifically crafted request, the attacker will be able to trigger remote code execution via deserialization of the file under their control. Note that all of conditions a) to d) must be true for the attack to succeed.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9484/">CVE-2020-9484 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9484">CVE-2020-9484 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1171928">SUSE bug 1171928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182909">SUSE bug 1182909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195255">SUSE bug 1195255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196395">SUSE bug 1196395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201081">SUSE bug 1201081</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828021" comment="tomcat-7.0.76-12.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828022" comment="tomcat-admin-webapps-7.0.76-12.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828023" comment="tomcat-docs-webapp-7.0.76-12.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828024" comment="tomcat-el-2.2-api-7.0.76-12.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828025" comment="tomcat-javadoc-7.0.76-12.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828026" comment="tomcat-jsp-2.2-api-7.0.76-12.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828027" comment="tomcat-jsvc-7.0.76-12.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828028" comment="tomcat-lib-7.0.76-12.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828029" comment="tomcat-servlet-3.0-api-7.0.76-12.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828030" comment="tomcat-webapps-7.0.76-12.el7_8 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20210920" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-0920</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-0920" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0920" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-0920" ref_url="https://www.suse.com/security/cve/CVE-2021-0920" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010327.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0668-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010328.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010401.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024506.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0366-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CFUCZRWH2IP7FOHVYO3TO3G5PFWQXLP6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1037-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YVOKHN5NCU57OGTEBU36WJRTWHRBUST7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1039-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWMVMDEM47CT6AQ4RWZEZZJSH2G2J4CV/" source="SUSE-SU"/>
    <description>
    In unix_scm_to_skb of af_unix.c, there is a possible use after free bug due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-196926917References: Upstream kernel
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0920/">CVE-2021-0920 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0920">CVE-2021-0920 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1193731">SUSE bug 1193731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194463">SUSE bug 1194463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195939">SUSE bug 1195939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199255">SUSE bug 1199255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200084">SUSE bug 1200084</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829589" comment="bpftool-3.10.0-1160.59.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829590" comment="kernel-3.10.0-1160.59.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829591" comment="kernel-abi-whitelists-3.10.0-1160.59.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829592" comment="kernel-debug-3.10.0-1160.59.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829595" comment="kernel-doc-3.10.0-1160.59.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829596" comment="kernel-headers-3.10.0-1160.59.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829597" comment="kernel-tools-3.10.0-1160.59.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829598" comment="kernel-tools-libs-3.10.0-1160.59.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829600" comment="perf-3.10.0-1160.59.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829601" comment="python-perf-3.10.0-1160.59.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120179" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20179</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20179" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20179" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20179" ref_url="https://www.suse.com/security/cve/CVE-2021-20179" source="SUSE CVE"/>
    <description>
    A flaw was found in pki-core. An attacker who has successfully compromised a key could use this flaw to renew the corresponding certificate over and over again, as long as it is not explicitly revoked. The highest threat from this vulnerability is to data confidentiality and integrity.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-20179/">CVE-2021-20179 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20179">CVE-2021-20179 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828983" comment="pki-base-10.5.18-12.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828984" comment="pki-base-java-10.5.18-12.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828985" comment="pki-ca-10.5.18-12.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828986" comment="pki-javadoc-10.5.18-12.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828987" comment="pki-kra-10.5.18-12.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828988" comment="pki-server-10.5.18-12.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828989" comment="pki-symkey-10.5.18-12.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828990" comment="pki-tools-10.5.18-12.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120225" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20225</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20225" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20225" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20225" ref_url="https://www.suse.com/security/cve/CVE-2021-20225" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0681-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008423.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008418.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-March/018162.html" source="SUSE-SU"/>
		<reference ref_id="TID000019892" ref_url="https://www.suse.com/support/kb/doc/?id=000019892" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0462-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XXPYL42MSKRB4D7LRFMW7PBGGLKSJKPS/" source="SUSE-SU"/>
    <description>
    A flaw was found in grub2 in versions prior to 2.06. The option parser allows an attacker to write past the end of a heap-allocated buffer by calling certain commands with a large number of specific short forms of options. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20225/">CVE-2021-20225 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20225">CVE-2021-20225 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1182262">SUSE bug 1182262</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828968" comment="grub2-2.02-0.87.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828969" comment="grub2-common-2.02-0.87.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828970" comment="grub2-efi-ia32-2.02-0.87.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828971" comment="grub2-efi-ia32-cdboot-2.02-0.87.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828972" comment="grub2-efi-ia32-modules-2.02-0.87.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828973" comment="grub2-efi-x64-2.02-0.87.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828974" comment="grub2-efi-x64-cdboot-2.02-0.87.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828975" comment="grub2-efi-x64-modules-2.02-0.87.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828976" comment="grub2-pc-2.02-0.87.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828977" comment="grub2-pc-modules-2.02-0.87.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828978" comment="grub2-tools-2.02-0.87.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828979" comment="grub2-tools-extra-2.02-0.87.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828980" comment="grub2-tools-minimal-2.02-0.87.el7_9.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120233" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20233</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20233" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20233" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20233" ref_url="https://www.suse.com/security/cve/CVE-2021-20233" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0681-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008423.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008418.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-March/018162.html" source="SUSE-SU"/>
		<reference ref_id="TID000019892" ref_url="https://www.suse.com/support/kb/doc/?id=000019892" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0462-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XXPYL42MSKRB4D7LRFMW7PBGGLKSJKPS/" source="SUSE-SU"/>
    <description>
    A flaw was found in grub2 in versions prior to 2.06. Setparam_prefix() in the menu rendering code performs a length calculation on the assumption that expressing a quoted single quote will require 3 characters, while it actually requires 4 characters which allows an attacker to corrupt memory by one byte for each quote in the input. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20233/">CVE-2021-20233 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20233">CVE-2021-20233 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1182263">SUSE bug 1182263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183135">SUSE bug 1183135</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828968" comment="grub2-2.02-0.87.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828969" comment="grub2-common-2.02-0.87.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828970" comment="grub2-efi-ia32-2.02-0.87.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828971" comment="grub2-efi-ia32-cdboot-2.02-0.87.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828972" comment="grub2-efi-ia32-modules-2.02-0.87.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828973" comment="grub2-efi-x64-2.02-0.87.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828974" comment="grub2-efi-x64-cdboot-2.02-0.87.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828975" comment="grub2-efi-x64-modules-2.02-0.87.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828976" comment="grub2-pc-2.02-0.87.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828977" comment="grub2-pc-modules-2.02-0.87.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828978" comment="grub2-tools-2.02-0.87.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828979" comment="grub2-tools-extra-2.02-0.87.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828980" comment="grub2-tools-minimal-2.02-0.87.el7_9.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120254" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20254</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20254" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20254" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20254" ref_url="https://www.suse.com/security/cve/CVE-2021-20254" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1445-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14709-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1492-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0361-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010209.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0636-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PJGQFNCBDL3CAZODHIFOKKWU3XGKLEKA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3187-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ANLZ3MSWRYNRTSO7FPC7CORZ4WAS3YKE/" source="SUSE-SU"/>
    <description>
    A flaw was found in samba. The Samba smbd file server must map Windows group identities (SIDs) into unix group ids (gids). The code that performs this had a flaw that could allow it to read data beyond the end of the array in the case where a negative cache entry had been added to the mapping cache. This could cause the calling code to return those values into the process token that stores the group membership for a user. The highest threat from this vulnerability is to data confidentiality and integrity.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-20254/">CVE-2021-20254 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20254">CVE-2021-20254 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1184677">SUSE bug 1184677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185886">SUSE bug 1185886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189860">SUSE bug 1189860</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829127" comment="ctdb-4.10.16-15.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829128" comment="ctdb-tests-4.10.16-15.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829129" comment="libsmbclient-4.10.16-15.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829130" comment="libsmbclient-devel-4.10.16-15.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829131" comment="libwbclient-4.10.16-15.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829132" comment="libwbclient-devel-4.10.16-15.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829133" comment="samba-4.10.16-15.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829134" comment="samba-client-4.10.16-15.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829135" comment="samba-client-libs-4.10.16-15.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829136" comment="samba-common-4.10.16-15.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829137" comment="samba-common-libs-4.10.16-15.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829138" comment="samba-common-tools-4.10.16-15.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829139" comment="samba-dc-4.10.16-15.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829140" comment="samba-dc-libs-4.10.16-15.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829141" comment="samba-devel-4.10.16-15.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829142" comment="samba-krb5-printing-4.10.16-15.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829143" comment="samba-libs-4.10.16-15.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829144" comment="samba-pidl-4.10.16-15.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829145" comment="samba-python-4.10.16-15.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829146" comment="samba-python-test-4.10.16-15.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829147" comment="samba-test-4.10.16-15.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829148" comment="samba-test-libs-4.10.16-15.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829149" comment="samba-vfs-glusterfs-4.10.16-15.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829150" comment="samba-winbind-4.10.16-15.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829151" comment="samba-winbind-clients-4.10.16-15.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829152" comment="samba-winbind-krb5-locator-4.10.16-15.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829153" comment="samba-winbind-modules-4.10.16-15.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120265" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20265</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20265" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20265" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20265" ref_url="https://www.suse.com/security/cve/CVE-2021-20265" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the way memory resources were freed in the unix_stream_recvmsg function in the Linux kernel when a signal was pending. This flaw allows an unprivileged local user to crash the system by exhausting available memory. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20265/">CVE-2021-20265 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20265">CVE-2021-20265 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1183089">SUSE bug 1183089</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214268">SUSE bug 1214268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218966">SUSE bug 1218966</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828991" comment="bpftool-3.10.0-1160.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828992" comment="kernel-3.10.0-1160.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828993" comment="kernel-abi-whitelists-3.10.0-1160.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828994" comment="kernel-debug-3.10.0-1160.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828997" comment="kernel-doc-3.10.0-1160.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828998" comment="kernel-headers-3.10.0-1160.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828999" comment="kernel-tools-3.10.0-1160.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829000" comment="kernel-tools-libs-3.10.0-1160.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829002" comment="perf-3.10.0-1160.21.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829003" comment="python-perf-3.10.0-1160.21.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120271" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20271</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20271" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20271" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20271" ref_url="https://www.suse.com/security/cve/CVE-2021-20271" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-May/023165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1356-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011327.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2938-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2974-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:52-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:53-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:55-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:56-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:57-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:590-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:592-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012871.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1366-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WOGLQWSIIR4HYRWXGETEIHB6SM6A2MNK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2682-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IQDL4MT3J7VM3IS3TI4EMLQJHDPTSZLZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2685-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PUJW4L55UGKEL4ROYV7WZNQDNBJXXLLG/" source="SUSE-SU"/>
    <description>
    A flaw was found in RPM's signature check functionality when reading a package file. This flaw allows an attacker who can convince a victim to install a seemingly verifiable package, whose signature header was modified, to cause RPM database corruption and execute code. The highest threat from this vulnerability is to data integrity, confidentiality, and system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-20271/">CVE-2021-20271 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20271">CVE-2021-20271 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1183545">SUSE bug 1183545</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829432" comment="rpm-4.11.3-48.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829433" comment="rpm-apidocs-4.11.3-48.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829434" comment="rpm-build-4.11.3-48.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829435" comment="rpm-build-libs-4.11.3-48.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829436" comment="rpm-cron-4.11.3-48.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829437" comment="rpm-devel-4.11.3-48.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829438" comment="rpm-libs-4.11.3-48.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829439" comment="rpm-plugin-systemd-inhibit-4.11.3-48.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829440" comment="rpm-python-4.11.3-48.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829441" comment="rpm-sign-4.11.3-48.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120277" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20277</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20277" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20277" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20277" ref_url="https://www.suse.com/security/cve/CVE-2021-20277" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1151-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010200.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:282-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0944-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009483.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0469-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QLNA72I7E6KKMIQOHXHYRPDYGMW5KH4K/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0636-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PJGQFNCBDL3CAZODHIFOKKWU3XGKLEKA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3187-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ANLZ3MSWRYNRTSO7FPC7CORZ4WAS3YKE/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0283-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/72ZRNFZ3DE3TJA7HFCVV476YJN6I4B5M/" source="SUSE-SU"/>
    <description>
    A flaw was found in Samba's libldb. Multiple, consecutive leading spaces in an LDAP attribute can lead to an out-of-bounds memory write, leading to a crash of the LDAP server process handling the request. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20277/">CVE-2021-20277 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20277">CVE-2021-20277 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1183574">SUSE bug 1183574</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829034" comment="ldb-tools-1.5.4-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829035" comment="libldb-1.5.4-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829036" comment="libldb-devel-1.5.4-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829037" comment="pyldb-1.5.4-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829038" comment="pyldb-devel-1.5.4-2.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120305" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20305</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20305" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20305" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20305" ref_url="https://www.suse.com/security/cve/CVE-2021-20305" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008693.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0635-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JEQQBLTWQPDTYRTWQZSXENUU6TSCBJ5R/" source="SUSE-SU"/>
    <description>
    A flaw was found in Nettle in versions before 3.7.2, where several Nettle signature verification functions (GOST DSA, EDDSA &amp; ECDSA) result in the Elliptic Curve Cryptography point (ECC) multiply function being called with out-of-range scalers, possibly resulting in incorrect results. This flaw allows an attacker to force an invalid signature, causing an assertion failure or possible validation. The highest threat to this vulnerability is to confidentiality, integrity, as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20305/">CVE-2021-20305 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20305">CVE-2021-20305 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1183835">SUSE bug 1183835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184401">SUSE bug 1184401</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829042" comment="nettle-2.7.1-9.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829043" comment="nettle-devel-2.7.1-9.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121261" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21261</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21261" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21261" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21261" ref_url="https://www.suse.com/security/cve/CVE-2021-21261" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012249.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0520-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4JRX7C3J3TJQXJODJCARSGDYY4AM57Q7/" source="SUSE-SU"/>
    <description>
    Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. A bug was discovered in the `flatpak-portal` service that can allow sandboxed applications to execute arbitrary code on the host system (a sandbox escape). This sandbox-escape bug is present in versions from 0.11.4 and before fixed versions 1.8.5 and 1.10.0. The Flatpak portal D-Bus service (`flatpak-portal`, also known by its D-Bus service name `org.freedesktop.portal.Flatpak`) allows apps in a Flatpak sandbox to launch their own subprocesses in a new sandbox instance, either with the same security settings as the caller or with more restrictive security settings. For example, this is used in Flatpak-packaged web browsers such as Chromium to launch subprocesses that will process untrusted web content, and give those subprocesses a more restrictive sandbox than the browser itself. In vulnerable versions, the Flatpak portal service passes caller-specified environment variables to non-sandboxed processes on the host system, and in particular to the `flatpak run` command that is used to launch the new sandbox instance. A malicious or compromised Flatpak app could set environment variables that are trusted by the `flatpak run` command, and use them to execute arbitrary code that is not in a sandbox. As a workaround, this vulnerability can be mitigated by preventing the `flatpak-portal` service from starting, but that mitigation will prevent many Flatpak apps from working correctly. This is fixed in versions 1.8.5 and 1.10.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-21261/">CVE-2021-21261 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21261">CVE-2021-21261 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1180996">SUSE bug 1180996</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828945" comment="flatpak-1.0.9-10.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828946" comment="flatpak-builder-1.0.0-10.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828947" comment="flatpak-devel-1.0.9-10.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828948" comment="flatpak-libs-1.0.9-10.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121344" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21344</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21344" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21344" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21344" ref_url="https://www.suse.com/security/cve/CVE-2021-21344" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1840-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009120.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0832-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KO2SBWPIR6ZPUOQHOD4PSDGYT53T5TZY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1840-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/APETSNTGJFG76V7J5X4K4LWA77F5743O/" source="SUSE-SU"/>
    <description>
    XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability which may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-21344/">CVE-2021-21344 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21344">CVE-2021-21344 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1184375">SUSE bug 1184375</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829063" comment="xstream-1.3.1-13.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829064" comment="xstream-javadoc-1.3.1-13.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121345" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21345</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21345" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21345" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21345" ref_url="https://www.suse.com/security/cve/CVE-2021-21345" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1840-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009120.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0832-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KO2SBWPIR6ZPUOQHOD4PSDGYT53T5TZY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1840-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/APETSNTGJFG76V7J5X4K4LWA77F5743O/" source="SUSE-SU"/>
    <description>
    XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability which may allow a remote attacker who has sufficient rights to execute commands of the host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21345/">CVE-2021-21345 at SUSE</cve>
	<cve impact="critical" cvss3="9.9/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21345">CVE-2021-21345 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1184372">SUSE bug 1184372</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829063" comment="xstream-1.3.1-13.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829064" comment="xstream-javadoc-1.3.1-13.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121346" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21346</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21346" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21346" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21346" ref_url="https://www.suse.com/security/cve/CVE-2021-21346" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1840-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009120.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0832-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KO2SBWPIR6ZPUOQHOD4PSDGYT53T5TZY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1840-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/APETSNTGJFG76V7J5X4K4LWA77F5743O/" source="SUSE-SU"/>
    <description>
    XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability which may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21346/">CVE-2021-21346 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21346">CVE-2021-21346 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1184373">SUSE bug 1184373</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829063" comment="xstream-1.3.1-13.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829064" comment="xstream-javadoc-1.3.1-13.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121347" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21347</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21347" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21347" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21347" ref_url="https://www.suse.com/security/cve/CVE-2021-21347" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1840-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009120.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0832-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KO2SBWPIR6ZPUOQHOD4PSDGYT53T5TZY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1840-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/APETSNTGJFG76V7J5X4K4LWA77F5743O/" source="SUSE-SU"/>
    <description>
    XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability which may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21347/">CVE-2021-21347 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21347">CVE-2021-21347 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1184378">SUSE bug 1184378</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829063" comment="xstream-1.3.1-13.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829064" comment="xstream-javadoc-1.3.1-13.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121350" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21350</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21350" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21350" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21350" ref_url="https://www.suse.com/security/cve/CVE-2021-21350" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1840-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009120.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0832-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KO2SBWPIR6ZPUOQHOD4PSDGYT53T5TZY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1840-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/APETSNTGJFG76V7J5X4K4LWA77F5743O/" source="SUSE-SU"/>
    <description>
    XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability which may allow a remote attacker to execute arbitrary code only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21350/">CVE-2021-21350 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21350">CVE-2021-21350 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1184380">SUSE bug 1184380</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829063" comment="xstream-1.3.1-13.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829064" comment="xstream-javadoc-1.3.1-13.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121381" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21381</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21381" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21381" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21381" ref_url="https://www.suse.com/security/cve/CVE-2021-21381" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:2990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012061.html" source="SUSE-SU"/>
    <description>
    Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. In Flatpack since version 0.9.4 and before version 1.10.2 has a vulnerability in the "file forwarding" feature which can be used by an attacker to gain access to files that would not ordinarily be allowed by the app's permissions. By putting the special tokens `@@` and/or `@@u` in the Exec field of a Flatpak app's .desktop file, a malicious app publisher can trick flatpak into behaving as though the user had chosen to open a target file with their Flatpak app, which automatically makes that file available to the Flatpak app. This is fixed in version 1.10.2. A minimal solution is the first commit "`Disallow @@ and @@U usage in desktop files`". The follow-up commits "`dir: Reserve the whole @@ prefix`" and "`dir: Refuse to export .desktop files with suspicious uses of @@ tokens`" are recommended, but not strictly required. As a workaround, avoid installing Flatpak apps from untrusted sources, or check the contents of the exported `.desktop` files in `exports/share/applications/*.desktop` (typically `~/.local/share/flatpak/exports/share/applications/*.desktop` and `/var/lib/flatpak/exports/share/applications/*.desktop`) to make sure that literal filenames do not follow `@@` or `@@u`.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-21381/">CVE-2021-21381 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21381">CVE-2021-21381 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1183459">SUSE bug 1183459</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829017" comment="flatpak-1.0.9-11.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829018" comment="flatpak-builder-1.0.0-11.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829019" comment="flatpak-devel-1.0.9-11.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829020" comment="flatpak-libs-1.0.9-11.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20212144" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-2144</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-2144" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2144" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-2144" ref_url="https://www.suse.com/security/cve/CVE-2021-2144" source="SUSE CVE"/>
    <description>
    Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Parser). Supported versions that are affected are 5.7.29 and prior and 8.0.19 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in takeover of MySQL Server. CVSS 3.1 Base Score 7.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-07"/>
	<updated date="2026-03-07"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2144/">CVE-2021-2144 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2144">CVE-2021-2144 at NVD</cve>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828504" comment="mariadb-5.5.68-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828505" comment="mariadb-bench-5.5.68-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828506" comment="mariadb-devel-5.5.68-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828507" comment="mariadb-embedded-5.5.68-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828508" comment="mariadb-embedded-devel-5.5.68-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828509" comment="mariadb-libs-5.5.68-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828510" comment="mariadb-server-5.5.68-1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828511" comment="mariadb-test-5.5.68-1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20212163" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-2163</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-2163" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2163" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-2163" ref_url="https://www.suse.com/security/cve/CVE-2021-2163" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008676.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1980-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1989-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14875-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0719-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KGMX3TVL2LOHFGYNJZIU2YSG4IKEZZAM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0776-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5NU2NP3UWZ4SXHVJIVENLSU4X5TAKTHL/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0933-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UP4BA2GSD3EW2BMQV2VFVG2F3GMETZ5M/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1455-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GRBHNCR5KDMAYD3N3CDRPQWW3T6HIBNY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1666-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CMIXIE2QCSQNEBZOFYWWIWYINHYQA6A5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1989-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BNSY4TLUBETGRMX7GD6NXLOWEVJP6B4Z/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3615-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VOJHYCWQ5VVLZ6J4OKIW2JS6MBT7VLM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0108-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5GEO4VASAXOQQYTQGGNCUBC3ZY3RFQT4/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u291, 8u281, 11.0.10, 16; Java SE Embedded: 8u281; Oracle GraalVM Enterprise Edition: 19.3.5, 20.3.1.2 and 21.0.0.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-2163/">CVE-2021-2163 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2163">CVE-2021-2163 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1185055">SUSE bug 1185055</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829054" comment="java-1.8.0-openjdk-1.8.0.292.b10-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829055" comment="java-1.8.0-openjdk-accessibility-1.8.0.292.b10-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829056" comment="java-1.8.0-openjdk-demo-1.8.0.292.b10-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829057" comment="java-1.8.0-openjdk-devel-1.8.0.292.b10-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829058" comment="java-1.8.0-openjdk-headless-1.8.0.292.b10-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829059" comment="java-1.8.0-openjdk-javadoc-1.8.0.292.b10-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829060" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.292.b10-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829061" comment="java-1.8.0-openjdk-src-1.8.0.292.b10-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829045" comment="java-11-openjdk-11.0.11.0.9-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829046" comment="java-11-openjdk-demo-11.0.11.0.9-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829047" comment="java-11-openjdk-devel-11.0.11.0.9-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829048" comment="java-11-openjdk-headless-11.0.11.0.9-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829049" comment="java-11-openjdk-javadoc-11.0.11.0.9-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829050" comment="java-11-openjdk-javadoc-zip-11.0.11.0.9-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829051" comment="java-11-openjdk-jmods-11.0.11.0.9-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829052" comment="java-11-openjdk-src-11.0.11.0.9-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829053" comment="java-11-openjdk-static-libs-11.0.11.0.9-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202122543" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-22543</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-22543" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22543" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-22543" ref_url="https://www.suse.com/security/cve/CVE-2021-22543" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:660-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-September/020142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2746-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020497.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1142-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BN7VVRY72WW4I46CQCFBKXWN6CBHKRXO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2645-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2WMUIJQF7RUSXDRXECLPMVDE6YOS5WIN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2687-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GDBOWLDJQ4K7JKRHIM7AOCKTJO5BY6C5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Linux: KVM through Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks and can lead to pages being freed while still accessible by the VMM and guest. This allows users with the ability to start and control a VM to read/write random pages of memory and can result in local privilege escalation.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22543/">CVE-2021-22543 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22543">CVE-2021-22543 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1186482">SUSE bug 1186482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186483">SUSE bug 1186483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190276">SUSE bug 1190276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197660">SUSE bug 1197660</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829348" comment="bpftool-3.10.0-1160.45.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829349" comment="kernel-3.10.0-1160.45.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829350" comment="kernel-abi-whitelists-3.10.0-1160.45.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829351" comment="kernel-debug-3.10.0-1160.45.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829354" comment="kernel-doc-3.10.0-1160.45.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829355" comment="kernel-headers-3.10.0-1160.45.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829356" comment="kernel-tools-3.10.0-1160.45.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829357" comment="kernel-tools-libs-3.10.0-1160.45.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829359" comment="perf-3.10.0-1160.45.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829360" comment="python-perf-3.10.0-1160.45.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202122555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-22555</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-22555" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22555" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-22555" ref_url="https://www.suse.com/security/cve/CVE-2021-22555" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2409-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-July/019639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009226.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-July/019748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2599-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009279.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1076-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WT3TYNEJZ7FKJMTYO3DX3Z7B2YCYPEJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2409-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PZY5AYK3E4EZBBTJOQXWCMRDFFYLM6EB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2415-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VDV3DHS5VRBTZIQXVKQML4UNTSCPJZZA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2427-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HJIMD6XIKYMKE35TUYXKKYPX4737LEVU/" source="SUSE-SU"/>
    <description>
    A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c. This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22555/">CVE-2021-22555 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22555">CVE-2021-22555 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1188116">SUSE bug 1188116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188117">SUSE bug 1188117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188411">SUSE bug 1188411</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829273" comment="bpftool-3.10.0-1160.41.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829274" comment="kernel-3.10.0-1160.41.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829275" comment="kernel-abi-whitelists-3.10.0-1160.41.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829276" comment="kernel-debug-3.10.0-1160.41.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829279" comment="kernel-doc-3.10.0-1160.41.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829280" comment="kernel-headers-3.10.0-1160.41.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829281" comment="kernel-tools-3.10.0-1160.41.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829282" comment="kernel-tools-libs-3.10.0-1160.41.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829284" comment="perf-3.10.0-1160.41.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829285" comment="python-perf-3.10.0-1160.41.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20212341" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-2341</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-2341" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2341" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-2341" ref_url="https://www.suse.com/security/cve/CVE-2021-2341" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14875-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1176-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/A3CHP6PJ4RPID7WVQKA2X34TN5RNEXQW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1233-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3QRLIMZTBL2C75CNGC2PCETJT2CPLMGD/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1455-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GRBHNCR5KDMAYD3N3CDRPQWW3T6HIBNY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2798-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QMTWQGCU5SAOKIQIUH6IN4LEQOIC2PS6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2952-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3MYQ74LF5AF2OGVK4O6UUAC44CWPGQGJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3615-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VOJHYCWQ5VVLZ6J4OKIW2JS6MBT7VLM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0108-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5GEO4VASAXOQQYTQGGNCUBC3ZY3RFQT4/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u301, 8u291, 11.0.11, 16.0.1; Oracle GraalVM Enterprise Edition: 20.3.2 and 21.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-05"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-2341/">CVE-2021-2341 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2341">CVE-2021-2341 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1188564">SUSE bug 1188564</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829230" comment="java-1.8.0-openjdk-1.8.0.302.b08-0.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829231" comment="java-1.8.0-openjdk-accessibility-1.8.0.302.b08-0.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829232" comment="java-1.8.0-openjdk-demo-1.8.0.302.b08-0.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829233" comment="java-1.8.0-openjdk-devel-1.8.0.302.b08-0.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829234" comment="java-1.8.0-openjdk-headless-1.8.0.302.b08-0.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829235" comment="java-1.8.0-openjdk-javadoc-1.8.0.302.b08-0.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829236" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.302.b08-0.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829237" comment="java-1.8.0-openjdk-src-1.8.0.302.b08-0.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829221" comment="java-11-openjdk-11.0.12.0.7-0.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829222" comment="java-11-openjdk-demo-11.0.12.0.7-0.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829223" comment="java-11-openjdk-devel-11.0.12.0.7-0.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829224" comment="java-11-openjdk-headless-11.0.12.0.7-0.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829225" comment="java-11-openjdk-javadoc-11.0.12.0.7-0.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829226" comment="java-11-openjdk-javadoc-zip-11.0.12.0.7-0.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829227" comment="java-11-openjdk-jmods-11.0.12.0.7-0.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829228" comment="java-11-openjdk-src-11.0.12.0.7-0.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829229" comment="java-11-openjdk-static-libs-11.0.12.0.7-0.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20212369" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-2369</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-2369" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2369" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-2369" ref_url="https://www.suse.com/security/cve/CVE-2021-2369" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14875-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1176-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/A3CHP6PJ4RPID7WVQKA2X34TN5RNEXQW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1233-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3QRLIMZTBL2C75CNGC2PCETJT2CPLMGD/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1455-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GRBHNCR5KDMAYD3N3CDRPQWW3T6HIBNY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2798-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QMTWQGCU5SAOKIQIUH6IN4LEQOIC2PS6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2952-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3MYQ74LF5AF2OGVK4O6UUAC44CWPGQGJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3615-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VOJHYCWQ5VVLZ6J4OKIW2JS6MBT7VLM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0108-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5GEO4VASAXOQQYTQGGNCUBC3ZY3RFQT4/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Library). Supported versions that are affected are Java SE: 7u301, 8u291, 11.0.11, 16.0.1; Oracle GraalVM Enterprise Edition: 20.3.2 and 21.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-2369/">CVE-2021-2369 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2369">CVE-2021-2369 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1188565">SUSE bug 1188565</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829230" comment="java-1.8.0-openjdk-1.8.0.302.b08-0.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829231" comment="java-1.8.0-openjdk-accessibility-1.8.0.302.b08-0.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829232" comment="java-1.8.0-openjdk-demo-1.8.0.302.b08-0.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829233" comment="java-1.8.0-openjdk-devel-1.8.0.302.b08-0.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829234" comment="java-1.8.0-openjdk-headless-1.8.0.302.b08-0.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829235" comment="java-1.8.0-openjdk-javadoc-1.8.0.302.b08-0.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829236" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.302.b08-0.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829237" comment="java-1.8.0-openjdk-src-1.8.0.302.b08-0.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829221" comment="java-11-openjdk-11.0.12.0.7-0.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829222" comment="java-11-openjdk-demo-11.0.12.0.7-0.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829223" comment="java-11-openjdk-devel-11.0.12.0.7-0.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829224" comment="java-11-openjdk-headless-11.0.12.0.7-0.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829225" comment="java-11-openjdk-javadoc-11.0.12.0.7-0.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829226" comment="java-11-openjdk-javadoc-zip-11.0.12.0.7-0.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829227" comment="java-11-openjdk-jmods-11.0.12.0.7-0.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829228" comment="java-11-openjdk-src-11.0.12.0.7-0.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829229" comment="java-11-openjdk-static-libs-11.0.12.0.7-0.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202123840" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-23840</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-23840" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23840" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-23840" ref_url="https://www.suse.com/security/cve/CVE-2021-23840" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:62-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0651-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0673-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0674-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0752-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0754-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0755-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008506.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14670-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008528.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0357-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AVDCMNKQUTQBM7Z7BU2BQ23WG4Y66BOY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0372-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZKKO266WHY2YSFJAVHWNM4DQSX4W7YZG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0427-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5XENZGXQLBAUUDBFPY2BZB3VBUOBHXA3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0430-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WKXW7QBBUUWYW6GTJATRSAAWOQW7PBVU/" source="SUSE-SU"/>
    <description>
    Calls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissable length for an integer on the platform. In such cases the return value from the function call will be 1 (indicating success), but the output length value will be negative. This could cause applications to behave incorrectly or crash. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-23840/">CVE-2021-23840 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23840">CVE-2021-23840 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1182333">SUSE bug 1182333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187743">SUSE bug 1187743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214334">SUSE bug 1214334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225628">SUSE bug 1225628</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829343" comment="openssl-1.0.2k-22.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829344" comment="openssl-devel-1.0.2k-22.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829345" comment="openssl-libs-1.0.2k-22.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829346" comment="openssl-perl-1.0.2k-22.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829347" comment="openssl-static-1.0.2k-22.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202123841" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-23841</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-23841" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23841" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-23841" ref_url="https://www.suse.com/security/cve/CVE-2021-23841" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:62-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0752-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0754-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0755-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008506.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14670-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008528.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0427-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5XENZGXQLBAUUDBFPY2BZB3VBUOBHXA3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0430-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WKXW7QBBUUWYW6GTJATRSAAWOQW7PBVU/" source="SUSE-SU"/>
    <description>
    The OpenSSL public API function X509_issuer_and_serial_hash() attempts to create a unique hash value based on the issuer and serial number data contained within an X509 certificate. However it fails to correctly handle any errors that may occur while parsing the issuer field (which might occur if the issuer field is maliciously constructed). This may subsequently result in a NULL pointer deref and a crash leading to a potential denial of service attack. The function X509_issuer_and_serial_hash() is never directly called by OpenSSL itself so applications are only vulnerable if they use this function directly and they use it on certificates that may have been obtained from untrusted sources. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-23841/">CVE-2021-23841 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23841">CVE-2021-23841 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1182331">SUSE bug 1182331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187743">SUSE bug 1187743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214334">SUSE bug 1214334</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829343" comment="openssl-1.0.2k-22.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829344" comment="openssl-devel-1.0.2k-22.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829345" comment="openssl-libs-1.0.2k-22.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829346" comment="openssl-perl-1.0.2k-22.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829347" comment="openssl-static-1.0.2k-22.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20212388" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-2388</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-2388" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2388" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-2388" ref_url="https://www.suse.com/security/cve/CVE-2021-2388" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1176-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/A3CHP6PJ4RPID7WVQKA2X34TN5RNEXQW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1233-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3QRLIMZTBL2C75CNGC2PCETJT2CPLMGD/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1455-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GRBHNCR5KDMAYD3N3CDRPQWW3T6HIBNY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2798-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QMTWQGCU5SAOKIQIUH6IN4LEQOIC2PS6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2952-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3MYQ74LF5AF2OGVK4O6UUAC44CWPGQGJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3615-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VOJHYCWQ5VVLZ6J4OKIW2JS6MBT7VLM/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 8u291, 11.0.11, 16.0.1; Oracle GraalVM Enterprise Edition: 20.3.2 and 21.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-2388/">CVE-2021-2388 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2388">CVE-2021-2388 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1188566">SUSE bug 1188566</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829230" comment="java-1.8.0-openjdk-1.8.0.302.b08-0.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829231" comment="java-1.8.0-openjdk-accessibility-1.8.0.302.b08-0.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829232" comment="java-1.8.0-openjdk-demo-1.8.0.302.b08-0.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829233" comment="java-1.8.0-openjdk-devel-1.8.0.302.b08-0.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829234" comment="java-1.8.0-openjdk-headless-1.8.0.302.b08-0.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829235" comment="java-1.8.0-openjdk-javadoc-1.8.0.302.b08-0.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829236" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.302.b08-0.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829237" comment="java-1.8.0-openjdk-src-1.8.0.302.b08-0.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829221" comment="java-11-openjdk-11.0.12.0.7-0.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829222" comment="java-11-openjdk-demo-11.0.12.0.7-0.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829223" comment="java-11-openjdk-devel-11.0.12.0.7-0.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829224" comment="java-11-openjdk-headless-11.0.12.0.7-0.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829225" comment="java-11-openjdk-javadoc-11.0.12.0.7-0.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829226" comment="java-11-openjdk-javadoc-zip-11.0.12.0.7-0.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829227" comment="java-11-openjdk-jmods-11.0.12.0.7-0.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829228" comment="java-11-openjdk-src-11.0.12.0.7-0.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829229" comment="java-11-openjdk-static-libs-11.0.12.0.7-0.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202123953" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-23953</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-23953" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23953" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-23953" ref_url="https://www.suse.com/security/cve/CVE-2021-23953" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008256.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0208-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PJ6EGWAN3STX7MVPJ6SXVNB6AQBHBJEA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0209-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LV6TQVT6324Y5SWHTL34EKZT7PFDOYE4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0222-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PYQVYICIBRGAYRG5HERVZ2YG2FAQSVAR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0223-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/52CRMXRMPMDDBTKZVMDMEO76I3JZEYGF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    If a user clicked into a specifically crafted PDF, the PDF reader could be confused into leaking cross-origin information, when said information is served as chunked data. This vulnerability affects Firefox &lt; 85, Thunderbird &lt; 78.7, and Firefox ESR &lt; 78.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23953/">CVE-2021-23953 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23953">CVE-2021-23953 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1181414">SUSE bug 1181414</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828884" comment="firefox-78.7.0-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828885" comment="thunderbird-78.7.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202123954" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-23954</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-23954" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23954" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-23954" ref_url="https://www.suse.com/security/cve/CVE-2021-23954" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008256.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0208-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PJ6EGWAN3STX7MVPJ6SXVNB6AQBHBJEA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0209-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LV6TQVT6324Y5SWHTL34EKZT7PFDOYE4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0222-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PYQVYICIBRGAYRG5HERVZ2YG2FAQSVAR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0223-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/52CRMXRMPMDDBTKZVMDMEO76I3JZEYGF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Using the new logical assignment operators in a JavaScript switch statement could have caused a type confusion, leading to a memory corruption and a potentially exploitable crash. This vulnerability affects Firefox &lt; 85, Thunderbird &lt; 78.7, and Firefox ESR &lt; 78.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23954/">CVE-2021-23954 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23954">CVE-2021-23954 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1181414">SUSE bug 1181414</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828884" comment="firefox-78.7.0-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828885" comment="thunderbird-78.7.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202123960" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-23960</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-23960" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23960" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-23960" ref_url="https://www.suse.com/security/cve/CVE-2021-23960" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008256.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0208-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PJ6EGWAN3STX7MVPJ6SXVNB6AQBHBJEA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0209-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LV6TQVT6324Y5SWHTL34EKZT7PFDOYE4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0222-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PYQVYICIBRGAYRG5HERVZ2YG2FAQSVAR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0223-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/52CRMXRMPMDDBTKZVMDMEO76I3JZEYGF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Performing garbage collection on re-declared JavaScript variables resulted in a user-after-poison, and a potentially exploitable crash. This vulnerability affects Firefox &lt; 85, Thunderbird &lt; 78.7, and Firefox ESR &lt; 78.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23960/">CVE-2021-23960 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23960">CVE-2021-23960 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1181414">SUSE bug 1181414</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828884" comment="firefox-78.7.0-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828885" comment="thunderbird-78.7.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202123961" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-23961</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-23961" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23961" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-23961" ref_url="https://www.suse.com/security/cve/CVE-2021-23961" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1307-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1432-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008691.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0621-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EAMQGZ2XSFHUQG4YR5BGYZEI5C3IGY4P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0644-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FZF7QZJOUTVUSU5SPVGG757XUPT3OVD3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Further techniques that built on the slipstream research combined with a malicious webpage could have exposed both an internal network's hosts as well as services running on the user's local machine. This vulnerability affects Firefox &lt; 85.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23961/">CVE-2021-23961 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23961">CVE-2021-23961 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1184960">SUSE bug 1184960</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829065" comment="firefox-78.10.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829062" comment="thunderbird-78.10.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202123964" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-23964</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-23964" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23964" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-23964" ref_url="https://www.suse.com/security/cve/CVE-2021-23964" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008256.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0208-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PJ6EGWAN3STX7MVPJ6SXVNB6AQBHBJEA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0209-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LV6TQVT6324Y5SWHTL34EKZT7PFDOYE4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0222-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PYQVYICIBRGAYRG5HERVZ2YG2FAQSVAR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0223-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/52CRMXRMPMDDBTKZVMDMEO76I3JZEYGF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Mozilla developers reported memory safety bugs present in Firefox 84 and Firefox ESR 78.6. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 85, Thunderbird &lt; 78.7, and Firefox ESR &lt; 78.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23964/">CVE-2021-23964 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23964">CVE-2021-23964 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1181414">SUSE bug 1181414</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828884" comment="firefox-78.7.0-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828885" comment="thunderbird-78.7.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202123968" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-23968</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-23968" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23968" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-23968" ref_url="https://www.suse.com/security/cve/CVE-2021-23968" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0676-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14657-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008409.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0373-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3JU7JWCNX3KH2TP7LILEHP3VXYK7BTLC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0387-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2REQ3DSH3BKY3CWSHN3VOQE3JTXUFINV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    If Content Security Policy blocked frame navigation, the full destination of a redirect served in the frame was reported in the violation report; as opposed to the original frame URI. This could be used to leak sensitive information contained in such URIs. This vulnerability affects Firefox &lt; 86, Thunderbird &lt; 78.8, and Firefox ESR &lt; 78.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23968/">CVE-2021-23968 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23968">CVE-2021-23968 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1182614">SUSE bug 1182614</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828950" comment="firefox-78.8.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828951" comment="thunderbird-78.8.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202123969" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-23969</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-23969" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23969" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-23969" ref_url="https://www.suse.com/security/cve/CVE-2021-23969" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0676-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14657-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008409.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0373-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3JU7JWCNX3KH2TP7LILEHP3VXYK7BTLC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0387-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2REQ3DSH3BKY3CWSHN3VOQE3JTXUFINV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    As specified in the W3C Content Security Policy draft, when creating a violation report, "User agents need to ensure that the source file is the URL requested by the page, pre-redirects. If that's not possible, user agents need to strip the URL down to an origin to avoid unintentional leakage." Under certain types of redirects, Firefox incorrectly set the source file to be the destination of the redirects. This was fixed to be the redirect destination's origin. This vulnerability affects Firefox &lt; 86, Thunderbird &lt; 78.8, and Firefox ESR &lt; 78.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-12-19"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23969/">CVE-2021-23969 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23969">CVE-2021-23969 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1182614">SUSE bug 1182614</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828950" comment="firefox-78.8.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828951" comment="thunderbird-78.8.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202123973" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-23973</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-23973" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23973" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-23973" ref_url="https://www.suse.com/security/cve/CVE-2021-23973" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0676-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14657-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008409.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0373-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3JU7JWCNX3KH2TP7LILEHP3VXYK7BTLC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0387-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2REQ3DSH3BKY3CWSHN3VOQE3JTXUFINV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    When trying to load a cross-origin resource in an audio/video context a decoding error may have resulted, and the content of that error may have revealed information about the resource. This vulnerability affects Firefox &lt; 86, Thunderbird &lt; 78.8, and Firefox ESR &lt; 78.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23973/">CVE-2021-23973 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23973">CVE-2021-23973 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1182614">SUSE bug 1182614</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828950" comment="firefox-78.8.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828951" comment="thunderbird-78.8.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202123978" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-23978</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-23978" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23978" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-23978" ref_url="https://www.suse.com/security/cve/CVE-2021-23978" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0676-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14657-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008409.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0373-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3JU7JWCNX3KH2TP7LILEHP3VXYK7BTLC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0387-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2REQ3DSH3BKY3CWSHN3VOQE3JTXUFINV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Mozilla developers reported memory safety bugs present in Firefox 85 and Firefox ESR 78.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 86, Thunderbird &lt; 78.8, and Firefox ESR &lt; 78.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23978/">CVE-2021-23978 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23978">CVE-2021-23978 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1182614">SUSE bug 1182614</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828950" comment="firefox-78.8.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828951" comment="thunderbird-78.8.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202123981" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-23981</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-23981" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23981" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-23981" ref_url="https://www.suse.com/security/cve/CVE-2021-23981" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0966-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008561.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008575.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0487-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FSNSOUV5NJGXTPEDI5OM2FZY66FY5LH2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0580-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/46S264KIM7ZLJMHW66XPM4XKEAJEZUEJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A texture upload of a Pixel Buffer Object could have confused the WebGL code to skip binding the buffer used to unpack it, resulting in memory corruption and a potentially exploitable information leak or crash. This vulnerability affects Firefox ESR &lt; 78.9, Firefox &lt; 87, and Thunderbird &lt; 78.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23981/">CVE-2021-23981 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23981">CVE-2021-23981 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1183942">SUSE bug 1183942</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829015" comment="firefox-78.9.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829016" comment="thunderbird-78.9.0-3.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202123982" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-23982</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-23982" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23982" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-23982" ref_url="https://www.suse.com/security/cve/CVE-2021-23982" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0966-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008561.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008575.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0487-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FSNSOUV5NJGXTPEDI5OM2FZY66FY5LH2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0580-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/46S264KIM7ZLJMHW66XPM4XKEAJEZUEJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Using techniques that built on the slipstream research, a malicious webpage could have scanned both an internal network's hosts as well as services running on the user's local machine utilizing WebRTC connections. This vulnerability affects Firefox ESR &lt; 78.9, Firefox &lt; 87, and Thunderbird &lt; 78.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23982/">CVE-2021-23982 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23982">CVE-2021-23982 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1183942">SUSE bug 1183942</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829015" comment="firefox-78.9.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829016" comment="thunderbird-78.9.0-3.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202123984" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-23984</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-23984" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23984" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-23984" ref_url="https://www.suse.com/security/cve/CVE-2021-23984" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0966-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008561.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008575.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0487-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FSNSOUV5NJGXTPEDI5OM2FZY66FY5LH2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0580-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/46S264KIM7ZLJMHW66XPM4XKEAJEZUEJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A malicious extension could have opened a popup window lacking an address bar. The title of the popup lacking an address bar should not be fully controllable, but in this situation was. This could have been used to spoof a website and attempt to trick the user into providing credentials. This vulnerability affects Firefox ESR &lt; 78.9, Firefox &lt; 87, and Thunderbird &lt; 78.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23984/">CVE-2021-23984 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23984">CVE-2021-23984 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1183942">SUSE bug 1183942</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829015" comment="firefox-78.9.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829016" comment="thunderbird-78.9.0-3.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202123987" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-23987</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-23987" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23987" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-23987" ref_url="https://www.suse.com/security/cve/CVE-2021-23987" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0966-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008561.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008575.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0487-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FSNSOUV5NJGXTPEDI5OM2FZY66FY5LH2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0580-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/46S264KIM7ZLJMHW66XPM4XKEAJEZUEJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Mozilla developers and community members reported memory safety bugs present in Firefox 86 and Firefox ESR 78.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR &lt; 78.9, Firefox &lt; 87, and Thunderbird &lt; 78.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23987/">CVE-2021-23987 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23987">CVE-2021-23987 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1183942">SUSE bug 1183942</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829015" comment="firefox-78.9.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829016" comment="thunderbird-78.9.0-3.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202123991" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-23991</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-23991" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23991" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-23991" ref_url="https://www.suse.com/security/cve/CVE-2021-23991" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008620.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0580-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/46S264KIM7ZLJMHW66XPM4XKEAJEZUEJ/" source="SUSE-SU"/>
    <description>
    If a Thunderbird user has previously imported Alice's OpenPGP key, and Alice has extended the validity period of her key, but Alice's updated key has not yet been imported, an attacker may send an email containing a crafted version of Alice's key with an invalid subkey, Thunderbird might subsequently attempt to use the invalid subkey, and will fail to send encrypted email to Alice. This vulnerability affects Thunderbird &lt; 78.9.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-23991/">CVE-2021-23991 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23991">CVE-2021-23991 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1184536">SUSE bug 1184536</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829044" comment="thunderbird-78.9.1-1.el7_9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202123992" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-23992</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-23992" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23992" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-23992" ref_url="https://www.suse.com/security/cve/CVE-2021-23992" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008620.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0580-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/46S264KIM7ZLJMHW66XPM4XKEAJEZUEJ/" source="SUSE-SU"/>
    <description>
    Thunderbird did not check if the user ID associated with an OpenPGP key has a valid self signature. An attacker may create a crafted version of an OpenPGP key, by either replacing the original user ID, or by adding another user ID. If Thunderbird imports and accepts the crafted key, the Thunderbird user may falsely conclude that the false user ID belongs to the correspondent. This vulnerability affects Thunderbird &lt; 78.9.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23992/">CVE-2021-23992 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23992">CVE-2021-23992 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1184536">SUSE bug 1184536</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829044" comment="thunderbird-78.9.1-1.el7_9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202123993" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-23993</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-23993" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23993" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-23993" ref_url="https://www.suse.com/security/cve/CVE-2021-23993" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0580-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/46S264KIM7ZLJMHW66XPM4XKEAJEZUEJ/" source="SUSE-SU"/>
    <description>
    An attacker may perform a DoS attack to prevent a user from sending encrypted email to a correspondent. If an attacker creates a crafted OpenPGP key with a subkey that has an invalid self signature, and the Thunderbird user imports the crafted key, then Thunderbird may try to use the invalid subkey, but the RNP library rejects it from being used, causing encryption to fail. This vulnerability affects Thunderbird &lt; 78.9.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-23993/">CVE-2021-23993 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23993">CVE-2021-23993 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1184536">SUSE bug 1184536</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829044" comment="thunderbird-78.9.1-1.el7_9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202123994" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-23994</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-23994" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23994" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-23994" ref_url="https://www.suse.com/security/cve/CVE-2021-23994" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1307-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1432-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008691.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0621-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EAMQGZ2XSFHUQG4YR5BGYZEI5C3IGY4P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0644-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FZF7QZJOUTVUSU5SPVGG757XUPT3OVD3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A WebGL framebuffer was not initialized early enough, resulting in memory corruption and an out of bound write. This vulnerability affects Firefox ESR &lt; 78.10, Thunderbird &lt; 78.10, and Firefox &lt; 88.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23994/">CVE-2021-23994 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23994">CVE-2021-23994 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1184960">SUSE bug 1184960</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829065" comment="firefox-78.10.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829062" comment="thunderbird-78.10.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202123995" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-23995</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-23995" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23995" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-23995" ref_url="https://www.suse.com/security/cve/CVE-2021-23995" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1307-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1432-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008691.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0621-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EAMQGZ2XSFHUQG4YR5BGYZEI5C3IGY4P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0644-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FZF7QZJOUTVUSU5SPVGG757XUPT3OVD3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    When Responsive Design Mode was enabled, it used references to objects that were previously freed. We presume that with enough effort this could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR &lt; 78.10, Thunderbird &lt; 78.10, and Firefox &lt; 88.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23995/">CVE-2021-23995 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23995">CVE-2021-23995 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1184960">SUSE bug 1184960</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829065" comment="firefox-78.10.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829062" comment="thunderbird-78.10.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202123998" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-23998</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-23998" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23998" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-23998" ref_url="https://www.suse.com/security/cve/CVE-2021-23998" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1307-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1432-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008691.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0621-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EAMQGZ2XSFHUQG4YR5BGYZEI5C3IGY4P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0644-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FZF7QZJOUTVUSU5SPVGG757XUPT3OVD3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Through complicated navigations with new windows, an HTTP page could have inherited a secure lock icon from an HTTPS page. This vulnerability affects Firefox ESR &lt; 78.10, Thunderbird &lt; 78.10, and Firefox &lt; 88.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23998/">CVE-2021-23998 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23998">CVE-2021-23998 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1184960">SUSE bug 1184960</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829065" comment="firefox-78.10.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829062" comment="thunderbird-78.10.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202123999" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-23999</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-23999" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23999" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-23999" ref_url="https://www.suse.com/security/cve/CVE-2021-23999" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1307-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1432-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008691.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0621-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EAMQGZ2XSFHUQG4YR5BGYZEI5C3IGY4P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0644-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FZF7QZJOUTVUSU5SPVGG757XUPT3OVD3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    If a Blob URL was loaded through some unusual user interaction, it could have been loaded by the System Principal and granted additional privileges that should not be granted to web content. This vulnerability affects Firefox ESR &lt; 78.10, Thunderbird &lt; 78.10, and Firefox &lt; 88.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23999/">CVE-2021-23999 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23999">CVE-2021-23999 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1184960">SUSE bug 1184960</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829065" comment="firefox-78.10.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829062" comment="thunderbird-78.10.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202124002" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-24002</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-24002" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24002" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-24002" ref_url="https://www.suse.com/security/cve/CVE-2021-24002" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1307-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1432-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008691.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0621-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EAMQGZ2XSFHUQG4YR5BGYZEI5C3IGY4P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0644-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FZF7QZJOUTVUSU5SPVGG757XUPT3OVD3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    When a user clicked on an FTP URL containing encoded newline characters (%0A and %0D), the newlines would have been interpreted as such and allowed arbitrary commands to be sent to the FTP server. This vulnerability affects Firefox ESR &lt; 78.10, Thunderbird &lt; 78.10, and Firefox &lt; 88.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-24002/">CVE-2021-24002 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-24002">CVE-2021-24002 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1184960">SUSE bug 1184960</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829065" comment="firefox-78.10.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829062" comment="thunderbird-78.10.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202125214" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-25214</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-25214" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25214" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-25214" ref_url="https://www.suse.com/security/cve/CVE-2021-25214" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008908.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0668-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UD5BSX5LOILOZXTGH6JJ7MLM4XBTKK6O/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1826-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HSDG2HIUJDFCATG54EOVCAT5D4AVXXKE/" source="SUSE-SU"/>
    <description>
    In BIND 9.8.5 -&gt; 9.8.8, 9.9.3 -&gt; 9.11.29, 9.12.0 -&gt; 9.16.13, and versions BIND 9.9.3-S1 -&gt; 9.11.29-S1 and 9.16.8-S1 -&gt; 9.16.13-S1 of BIND 9 Supported Preview Edition, as well as release versions 9.17.0 -&gt; 9.17.11 of the BIND 9.17 development branch, when a vulnerable version of named receives a malformed IXFR triggering the flaw described above, the named process will terminate due to a failed assertion the next time the transferred secondary zone is refreshed.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-25214/">CVE-2021-25214 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25214">CVE-2021-25214 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1185345">SUSE bug 1185345</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829257" comment="bind-9.11.4-26.P2.el7_9.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829258" comment="bind-chroot-9.11.4-26.P2.el7_9.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829259" comment="bind-devel-9.11.4-26.P2.el7_9.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829260" comment="bind-export-devel-9.11.4-26.P2.el7_9.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829261" comment="bind-export-libs-9.11.4-26.P2.el7_9.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829262" comment="bind-libs-9.11.4-26.P2.el7_9.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829263" comment="bind-libs-lite-9.11.4-26.P2.el7_9.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829264" comment="bind-license-9.11.4-26.P2.el7_9.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829265" comment="bind-lite-devel-9.11.4-26.P2.el7_9.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829266" comment="bind-pkcs11-9.11.4-26.P2.el7_9.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829267" comment="bind-pkcs11-devel-9.11.4-26.P2.el7_9.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829268" comment="bind-pkcs11-libs-9.11.4-26.P2.el7_9.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829269" comment="bind-pkcs11-utils-9.11.4-26.P2.el7_9.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829270" comment="bind-sdb-9.11.4-26.P2.el7_9.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829271" comment="bind-sdb-chroot-9.11.4-26.P2.el7_9.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829272" comment="bind-utils-9.11.4-26.P2.el7_9.7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202125215" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-25215</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-25215" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25215" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-25215" ref_url="https://www.suse.com/security/cve/CVE-2021-25215" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008908.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0668-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UD5BSX5LOILOZXTGH6JJ7MLM4XBTKK6O/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1826-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HSDG2HIUJDFCATG54EOVCAT5D4AVXXKE/" source="SUSE-SU"/>
    <description>
    In BIND 9.0.0 -&gt; 9.11.29, 9.12.0 -&gt; 9.16.13, and versions BIND 9.9.3-S1 -&gt; 9.11.29-S1 and 9.16.8-S1 -&gt; 9.16.13-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 -&gt; 9.17.11 of the BIND 9.17 development branch, when a vulnerable version of named receives a query for a record triggering the flaw described above, the named process will terminate due to a failed assertion check. The vulnerability affects all currently maintained BIND 9 branches (9.11, 9.11-S, 9.16, 9.16-S, 9.17) as well as all other versions of BIND 9.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-25215/">CVE-2021-25215 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25215">CVE-2021-25215 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1185345">SUSE bug 1185345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189848">SUSE bug 1189848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196172">SUSE bug 1196172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199298">SUSE bug 1199298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225626">SUSE bug 1225626</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829076" comment="bind-9.11.4-26.P2.el7_9.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829077" comment="bind-chroot-9.11.4-26.P2.el7_9.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829078" comment="bind-devel-9.11.4-26.P2.el7_9.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829079" comment="bind-export-devel-9.11.4-26.P2.el7_9.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829080" comment="bind-export-libs-9.11.4-26.P2.el7_9.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829081" comment="bind-libs-9.11.4-26.P2.el7_9.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829082" comment="bind-libs-lite-9.11.4-26.P2.el7_9.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829083" comment="bind-license-9.11.4-26.P2.el7_9.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829084" comment="bind-lite-devel-9.11.4-26.P2.el7_9.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829085" comment="bind-pkcs11-9.11.4-26.P2.el7_9.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829086" comment="bind-pkcs11-devel-9.11.4-26.P2.el7_9.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829087" comment="bind-pkcs11-libs-9.11.4-26.P2.el7_9.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829088" comment="bind-pkcs11-utils-9.11.4-26.P2.el7_9.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829089" comment="bind-sdb-9.11.4-26.P2.el7_9.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829090" comment="bind-sdb-chroot-9.11.4-26.P2.el7_9.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829091" comment="bind-utils-9.11.4-26.P2.el7_9.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202125217" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-25217</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-25217" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25217" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-25217" ref_url="https://www.suse.com/security/cve/CVE-2021-25217" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-June/019290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008914.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0834-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5DK63QGFHTXASYR656326B4ARJWN2LQV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1841-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/THX5XKYZAL23HUQMVLFS3L572S4DHQUX/" source="SUSE-SU"/>
    <description>
    In ISC DHCP 4.1-ESV-R1 -&gt; 4.1-ESV-R16, ISC DHCP 4.4.0 -&gt; 4.4.2 (Other branches of ISC DHCP (i.e., releases in the 4.0.x series or lower and releases in the 4.3.x series) are beyond their End-of-Life (EOL) and no longer supported by ISC. From inspection it is clear that the defect is also present in releases from those series, but they have not been officially tested for the vulnerability), The outcome of encountering the defect while reading a lease that will trigger it varies, according to: the component being affected (i.e., dhclient or dhcpd) whether the package was built as a 32-bit or 64-bit binary whether the compiler flag -fstack-protection-strong was used when compiling In dhclient, ISC has not successfully reproduced the error on a 64-bit system. However, on a 32-bit system it is possible to cause dhclient to crash when reading an improper lease, which could cause network connectivity problems for an affected system due to the absence of a running DHCP client process. In dhcpd, when run in DHCPv4 or DHCPv6 mode: if the dhcpd server binary was built for a 32-bit architecture AND the -fstack-protection-strong flag was specified to the compiler, dhcpd may exit while parsing a lease file containing an objectionable lease, resulting in lack of service to clients. Additionally, the offending lease and the lease immediately following it in the lease database may be improperly deleted. if the dhcpd server binary was built for a 64-bit architecture OR if the -fstack-protection-strong compiler flag was NOT specified, the crash will not occur, but it is possible for the offending lease and the lease which immediately followed it to be improperly deleted.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-25217/">CVE-2021-25217 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25217">CVE-2021-25217 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1186382">SUSE bug 1186382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189843">SUSE bug 1189843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189858">SUSE bug 1189858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199299">SUSE bug 1199299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214270">SUSE bug 1214270</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218485">SUSE bug 1218485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218969">SUSE bug 1218969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225674">SUSE bug 1225674</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829184" comment="dhclient-4.2.5-83.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829185" comment="dhcp-4.2.5-83.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829186" comment="dhcp-common-4.2.5-83.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829187" comment="dhcp-devel-4.2.5-83.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829188" comment="dhcp-libs-4.2.5-83.el7_9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202125220" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-25220</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-25220" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25220" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-25220" ref_url="https://www.suse.com/security/cve/CVE-2021-25220" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010510.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011832.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0945-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CMT7WJZ5DRHFL7RDXL4VX4ECRDHO6Z74/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0946-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H45VCAWRRO6SPMMAFDPU45PJLVOMA44Y/" source="SUSE-SU"/>
    <description>
    BIND 9.11.0 -&gt; 9.11.36 9.12.0 -&gt; 9.16.26 9.17.0 -&gt; 9.18.0 BIND Supported Preview Editions: 9.11.4-S1 -&gt; 9.11.36-S1 9.16.8-S1 -&gt; 9.16.26-S1 Versions of BIND 9 earlier than those shown - back to 9.1.0, including Supported Preview Editions - are also believed to be affected but have not been tested as they are EOL. The cache could become poisoned with incorrect records leading to queries being made to the wrong servers, which might also result in false information being returned to clients.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-25220/">CVE-2021-25220 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25220">CVE-2021-25220 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1197135">SUSE bug 1197135</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830003" comment="bind-9.11.4-26.P2.el7_9.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830004" comment="bind-chroot-9.11.4-26.P2.el7_9.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830005" comment="bind-devel-9.11.4-26.P2.el7_9.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830006" comment="bind-export-devel-9.11.4-26.P2.el7_9.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830007" comment="bind-export-libs-9.11.4-26.P2.el7_9.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830008" comment="bind-libs-9.11.4-26.P2.el7_9.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830009" comment="bind-libs-lite-9.11.4-26.P2.el7_9.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830010" comment="bind-license-9.11.4-26.P2.el7_9.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830011" comment="bind-lite-devel-9.11.4-26.P2.el7_9.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830012" comment="bind-pkcs11-9.11.4-26.P2.el7_9.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830013" comment="bind-pkcs11-devel-9.11.4-26.P2.el7_9.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830014" comment="bind-pkcs11-libs-9.11.4-26.P2.el7_9.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830015" comment="bind-pkcs11-utils-9.11.4-26.P2.el7_9.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830016" comment="bind-sdb-9.11.4-26.P2.el7_9.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830017" comment="bind-sdb-chroot-9.11.4-26.P2.el7_9.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830018" comment="bind-utils-9.11.4-26.P2.el7_9.13 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202126401" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-26401</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-26401" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26401" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-26401" ref_url="https://www.suse.com/security/cve/CVE-2021-26401" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0931-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010506.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010779.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010818.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010836.html" source="SUSE-SU"/>
		<reference ref_id="TID000020607" ref_url="https://www.suse.com/support/kb/doc/?id=000020607" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0940-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NXODJTCX5G5LLTBOEFVBOCIWYKEGYAMP/" source="SUSE-SU"/>
    <description>
    LFENCE/JMP (mitigation V2-2) may not sufficiently mitigate CVE-2017-5715 on some AMD CPUs.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-26401/">CVE-2021-26401 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26401">CVE-2021-26401 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1191580">SUSE bug 1191580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196901">SUSE bug 1196901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209630">SUSE bug 1209630</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829990" comment="bpftool-3.10.0-1160.83.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829991" comment="kernel-3.10.0-1160.83.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829992" comment="kernel-abi-whitelists-3.10.0-1160.83.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829993" comment="kernel-debug-3.10.0-1160.83.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829996" comment="kernel-doc-3.10.0-1160.83.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829997" comment="kernel-headers-3.10.0-1160.83.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829998" comment="kernel-tools-3.10.0-1160.83.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829999" comment="kernel-tools-libs-3.10.0-1160.83.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830001" comment="perf-3.10.0-1160.83.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830002" comment="python-perf-3.10.0-1160.83.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202126691" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-26691</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-26691" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26691" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-26691" ref_url="https://www.suse.com/security/cve/CVE-2021-26691" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2004-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009074.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0908-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/F32WQ7K6A45WOBEDFMGMRXDC2F2SL3IF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2127-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KAQGPGA6ZQQT3VO5WOYFSSTZFH57MPWK/" source="SUSE-SU"/>
    <description>
    In Apache HTTP Server versions 2.4.0 to 2.4.46 a specially crafted SessionHeader sent by an origin server could cause a heap overflow
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26691/">CVE-2021-26691 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26691">CVE-2021-26691 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1187017">SUSE bug 1187017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187933">SUSE bug 1187933</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829529" comment="httpd-2.4.6-97.el7_9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829530" comment="httpd-devel-2.4.6-97.el7_9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829531" comment="httpd-manual-2.4.6-97.el7_9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829532" comment="httpd-tools-2.4.6-97.el7_9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829533" comment="mod_ldap-2.4.6-97.el7_9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829534" comment="mod_proxy_html-2.4.6-97.el7_9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829535" comment="mod_session-2.4.6-97.el7_9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829536" comment="mod_ssl-2.4.6-97.el7_9.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202126937" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-26937</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-26937" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26937" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-26937" ref_url="https://www.suse.com/security/cve/CVE-2021-26937" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0492-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008337.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0304-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AYNLKAL7KI2RT6BUJQ25AIHB4Q2CRI2D/" source="SUSE-SU"/>
    <description>
    encoding.c in GNU Screen through 4.8.0 allows remote attackers to cause a denial of service (invalid write access and application crash) or possibly have unspecified other impact via a crafted UTF-8 character sequence.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26937/">CVE-2021-26937 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26937">CVE-2021-26937 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1182092">SUSE bug 1182092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184006">SUSE bug 1184006</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828981" comment="screen-4.1.0-0.27.20120314git3c2946.el7_9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202127135" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-27135</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-27135" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27135" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-27135" ref_url="https://www.suse.com/security/cve/CVE-2021-27135" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2013-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0900-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NA47BC6O5V73WVZQL44IERDWF2OCBQYV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2011-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TSHLMCUKP3HZEQVMO6GPO4MIFBHEZ53K/" source="SUSE-SU"/>
    <description>
    xterm before Patch #366 allows remote attackers to execute arbitrary code or cause a denial of service (segmentation fault) via a crafted UTF-8 combining character sequence.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27135/">CVE-2021-27135 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27135">CVE-2021-27135 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1182091">SUSE bug 1182091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189857">SUSE bug 1189857</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190262">SUSE bug 1190262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225632">SUSE bug 1225632</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828949" comment="xterm-295-3.el7_9.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202127219" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-27219</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-27219" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27219" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-27219" ref_url="https://www.suse.com/security/cve/CVE-2021-27219" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008514.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:80-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:83-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:99-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008532.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0406-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CEADQWIHFVNLBWNNAJUQIPQTZZU5U5A4/" source="SUSE-SU"/>
    <description>
    An issue was discovered in GNOME GLib before 2.66.6 and 2.67.x before 2.67.3. The function g_bytes_new has an integer overflow on 64-bit platforms due to an implicit cast from 64 bits to 32 bits. The overflow could potentially lead to memory corruption.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-27219/">CVE-2021-27219 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27219">CVE-2021-27219 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1182362">SUSE bug 1182362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194015">SUSE bug 1194015</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829114" comment="glib2-2.56.1-9.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829115" comment="glib2-devel-2.56.1-9.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829116" comment="glib2-doc-2.56.1-9.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829117" comment="glib2-fam-2.56.1-9.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829118" comment="glib2-static-2.56.1-9.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829119" comment="glib2-tests-2.56.1-9.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202127363" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-27363</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-27363" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27363" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-27363" ref_url="https://www.suse.com/security/cve/CVE-2021-27363" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1075-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1210-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009234.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0532-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZC652CKFCHQCNNU7MZKBTO27OZE22Q5U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0758-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BUQVIATUWQNZFSV6IFJENJSRWJSP2QHF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel through 5.11.3. A kernel pointer leak can be used to determine the address of the iscsi_transport structure. When an iSCSI transport is registered with the iSCSI subsystem, the transport's handle is available to unprivileged users via the sysfs file system, at /sys/class/iscsi_transport/$TRANSPORT_NAME/handle. When read, the show_transport_handle function (in drivers/scsi/scsi_transport_iscsi.c) is called, which leaks the handle. This handle is actually the pointer to an iscsi_transport struct in the kernel module's global variables.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27363/">CVE-2021-27363 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27363">CVE-2021-27363 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1182716">SUSE bug 1182716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182717">SUSE bug 1182717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183120">SUSE bug 1183120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200084">SUSE bug 1200084</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829021" comment="bpftool-3.10.0-1160.24.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829022" comment="kernel-3.10.0-1160.24.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829023" comment="kernel-abi-whitelists-3.10.0-1160.24.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829024" comment="kernel-debug-3.10.0-1160.24.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829027" comment="kernel-doc-3.10.0-1160.24.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829028" comment="kernel-headers-3.10.0-1160.24.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829029" comment="kernel-tools-3.10.0-1160.24.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829030" comment="kernel-tools-libs-3.10.0-1160.24.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829032" comment="perf-3.10.0-1160.24.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829033" comment="python-perf-3.10.0-1160.24.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202127364" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-27364</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-27364" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27364" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-27364" ref_url="https://www.suse.com/security/cve/CVE-2021-27364" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1075-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1210-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009234.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0532-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZC652CKFCHQCNNU7MZKBTO27OZE22Q5U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0758-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BUQVIATUWQNZFSV6IFJENJSRWJSP2QHF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel through 5.11.3. drivers/scsi/scsi_transport_iscsi.c is adversely affected by the ability of an unprivileged user to craft Netlink messages.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27364/">CVE-2021-27364 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27364">CVE-2021-27364 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1182715">SUSE bug 1182715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182716">SUSE bug 1182716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182717">SUSE bug 1182717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200084">SUSE bug 1200084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214268">SUSE bug 1214268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218966">SUSE bug 1218966</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829021" comment="bpftool-3.10.0-1160.24.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829022" comment="kernel-3.10.0-1160.24.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829023" comment="kernel-abi-whitelists-3.10.0-1160.24.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829024" comment="kernel-debug-3.10.0-1160.24.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829027" comment="kernel-doc-3.10.0-1160.24.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829028" comment="kernel-headers-3.10.0-1160.24.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829029" comment="kernel-tools-3.10.0-1160.24.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829030" comment="kernel-tools-libs-3.10.0-1160.24.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829032" comment="perf-3.10.0-1160.24.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829033" comment="python-perf-3.10.0-1160.24.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202127365" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-27365</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-27365" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27365" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-27365" ref_url="https://www.suse.com/security/cve/CVE-2021-27365" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1075-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1210-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009234.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0532-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZC652CKFCHQCNNU7MZKBTO27OZE22Q5U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0758-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BUQVIATUWQNZFSV6IFJENJSRWJSP2QHF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel through 5.11.3. Certain iSCSI data structures do not have appropriate length constraints or checks, and can exceed the PAGE_SIZE value. An unprivileged user can send a Netlink message that is associated with iSCSI, and has a length up to the maximum length of a Netlink message.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-27365/">CVE-2021-27365 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27365">CVE-2021-27365 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1182712">SUSE bug 1182712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182715">SUSE bug 1182715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183491">SUSE bug 1183491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200084">SUSE bug 1200084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214268">SUSE bug 1214268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218966">SUSE bug 1218966</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829021" comment="bpftool-3.10.0-1160.24.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829022" comment="kernel-3.10.0-1160.24.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829023" comment="kernel-abi-whitelists-3.10.0-1160.24.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829024" comment="kernel-debug-3.10.0-1160.24.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829027" comment="kernel-doc-3.10.0-1160.24.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829028" comment="kernel-headers-3.10.0-1160.24.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829029" comment="kernel-tools-3.10.0-1160.24.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829030" comment="kernel-tools-libs-3.10.0-1160.24.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829032" comment="perf-3.10.0-1160.24.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829033" comment="python-perf-3.10.0-1160.24.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202127803" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-27803</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-27803" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27803" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-27803" ref_url="https://www.suse.com/security/cve/CVE-2021-27803" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008451.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0404-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EN5W6CW6RWRS7CCRSXMP44CTJQY53RIS/" source="SUSE-SU"/>
    <description>
    A vulnerability was discovered in how p2p/p2p_pd.c in wpa_supplicant before 2.10 processes P2P (Wi-Fi Direct) provision discovery requests. It could result in denial of service or other impact (potentially execution of arbitrary code), for an attacker within radio range.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-27803/">CVE-2021-27803 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27803">CVE-2021-27803 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1182805">SUSE bug 1182805</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828982" comment="wpa_supplicant-2.6-12.el7_9.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128091" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28091</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28091" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28091" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28091" ref_url="https://www.suse.com/security/cve/CVE-2021-28091" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009242.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1057-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NVAZRUCJGDCHRY6W5ARRO5NRB27JQCR6/" source="SUSE-SU"/>
    <description>
    Lasso all versions prior to 2.7.0 has improper verification of a cryptographic signature.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28091/">CVE-2021-28091 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28091">CVE-2021-28091 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1186768">SUSE bug 1186768</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829239" comment="lasso-2.5.1-8.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829240" comment="lasso-devel-2.5.1-8.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829241" comment="lasso-python-2.5.1-8.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202129154" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-29154</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-29154" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29154" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-29154" ref_url="https://www.suse.com/security/cve/CVE-2021-29154" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1210-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1248-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1724-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-May/019049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1865-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009234.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0579-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6PH44XSVUZTRLJSGALUUATIQLKQWL4C5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0758-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BUQVIATUWQNZFSV6IFJENJSRWJSP2QHF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    BPF JIT compilers in the Linux kernel through 5.11.12 have incorrect computation of branch displacements, allowing them to execute arbitrary code within the kernel context. This affects arch/x86/net/bpf_jit_comp.c and arch/x86/net/bpf_jit_comp32.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29154/">CVE-2021-29154 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29154">CVE-2021-29154 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1184391">SUSE bug 1184391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184710">SUSE bug 1184710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186408">SUSE bug 1186408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829273" comment="bpftool-3.10.0-1160.41.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829274" comment="kernel-3.10.0-1160.41.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829275" comment="kernel-abi-whitelists-3.10.0-1160.41.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829276" comment="kernel-debug-3.10.0-1160.41.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829279" comment="kernel-doc-3.10.0-1160.41.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829280" comment="kernel-headers-3.10.0-1160.41.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829281" comment="kernel-tools-3.10.0-1160.41.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829282" comment="kernel-tools-libs-3.10.0-1160.41.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829284" comment="perf-3.10.0-1160.41.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829285" comment="python-perf-3.10.0-1160.41.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202129505" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-29505</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-29505" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29505" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-29505" ref_url="https://www.suse.com/security/cve/CVE-2021-29505" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1995-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0911-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H2CFEJOW6N5BGEB6UU3SEQ3UF5C2UWJL/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1995-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WKAZW7SPSOY6JEPAX2RCIZEGPKTEBUNC/" source="SUSE-SU"/>
    <description>
    XStream is software for serializing Java objects to XML and back again. A vulnerability in XStream versions prior to 1.4.17 may allow a remote attacker has sufficient rights to execute commands of the host only by manipulating the processed input stream. No user who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types is affected. The vulnerability is patched in version 1.4.17.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29505/">CVE-2021-29505 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29505">CVE-2021-29505 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1186651">SUSE bug 1186651</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829205" comment="xstream-1.3.1-14.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829206" comment="xstream-javadoc-1.3.1-14.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202129650" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-29650</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-29650" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29650" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-29650" ref_url="https://www.suse.com/security/cve/CVE-2021-29650" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-June/019290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1572-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-May/018906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1622-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008778.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2611-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2651-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030079.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0716-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VDF7UBOVWJVCBDNJIGAY445AXZJU4OOD/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0873-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/THW3Z3CCX5HRFD2KJ3A4TDO27FGBEKNN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.11.11. The netfilter subsystem allows attackers to cause a denial of service (panic) because net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h lack a full memory barrier upon the assignment of a new table value, aka CID-175e476b8cdf.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-29650/">CVE-2021-29650 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29650">CVE-2021-29650 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1184208">SUSE bug 1184208</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829273" comment="bpftool-3.10.0-1160.41.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829274" comment="kernel-3.10.0-1160.41.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829275" comment="kernel-abi-whitelists-3.10.0-1160.41.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829276" comment="kernel-debug-3.10.0-1160.41.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829279" comment="kernel-doc-3.10.0-1160.41.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829280" comment="kernel-headers-3.10.0-1160.41.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829281" comment="kernel-tools-3.10.0-1160.41.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829282" comment="kernel-tools-libs-3.10.0-1160.41.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829284" comment="perf-3.10.0-1160.41.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829285" comment="python-perf-3.10.0-1160.41.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202129945" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-29945</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-29945" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29945" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-29945" ref_url="https://www.suse.com/security/cve/CVE-2021-29945" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1307-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1432-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008691.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0621-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EAMQGZ2XSFHUQG4YR5BGYZEI5C3IGY4P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0644-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FZF7QZJOUTVUSU5SPVGG757XUPT3OVD3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    The WebAssembly JIT could miscalculate the size of a return type, which could lead to a null read and result in a crash. *Note: This issue only affected x86-32 platforms. Other platforms are unaffected.*. This vulnerability affects Firefox ESR &lt; 78.10, Thunderbird &lt; 78.10, and Firefox &lt; 88.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-29945/">CVE-2021-29945 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29945">CVE-2021-29945 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1184960">SUSE bug 1184960</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829065" comment="firefox-78.10.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829062" comment="thunderbird-78.10.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202129946" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-29946</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-29946" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29946" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-29946" ref_url="https://www.suse.com/security/cve/CVE-2021-29946" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1307-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1432-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008691.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0621-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EAMQGZ2XSFHUQG4YR5BGYZEI5C3IGY4P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0644-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FZF7QZJOUTVUSU5SPVGG757XUPT3OVD3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Ports that were written as an integer overflow above the bounds of a 16-bit integer could have bypassed port blocking restrictions when used in the Alt-Svc header. This vulnerability affects Firefox ESR &lt; 78.10, Thunderbird &lt; 78.10, and Firefox &lt; 88.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29946/">CVE-2021-29946 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29946">CVE-2021-29946 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1184960">SUSE bug 1184960</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829065" comment="firefox-78.10.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829062" comment="thunderbird-78.10.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202129948" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-29948</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-29948" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29948" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-29948" ref_url="https://www.suse.com/security/cve/CVE-2021-29948" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1432-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008698.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0644-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FZF7QZJOUTVUSU5SPVGG757XUPT3OVD3/" source="SUSE-SU"/>
    <description>
    Signatures are written to disk before and read during verification, which might be subject to a race condition when a malicious local process or user is replacing the file. This vulnerability affects Thunderbird &lt; 78.10.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-29948/">CVE-2021-29948 at SUSE</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29948">CVE-2021-29948 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1184960">SUSE bug 1184960</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829062" comment="thunderbird-78.10.0-1.el7_9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202129956" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-29956</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-29956" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29956" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-29956" ref_url="https://www.suse.com/security/cve/CVE-2021-29956" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008933.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1854-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7FGBREHMZI3UK2I6TGJZ75S4VSJHXVNF/" source="SUSE-SU"/>
    <description>
    OpenPGP secret keys that were imported using Thunderbird version 78.8.1 up to version 78.10.1 were stored unencrypted on the user's local disk. The master password protection was inactive for those keys. Version 78.10.2 will restore the protection mechanism for newly imported keys, and will automatically protect keys that had been imported using affected Thunderbird versions. This vulnerability affects Thunderbird &lt; 78.10.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-29956/">CVE-2021-29956 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29956">CVE-2021-29956 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1186199">SUSE bug 1186199</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829125" comment="thunderbird-78.11.0-1.el7_9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202129957" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-29957</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-29957" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29957" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-29957" ref_url="https://www.suse.com/security/cve/CVE-2021-29957" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008933.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1854-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7FGBREHMZI3UK2I6TGJZ75S4VSJHXVNF/" source="SUSE-SU"/>
    <description>
    If a MIME encoded email contains an OpenPGP inline signed or encrypted message part, but also contains an additional unprotected part, Thunderbird did not indicate that only parts of the message are protected. This vulnerability affects Thunderbird &lt; 78.10.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-29957/">CVE-2021-29957 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29957">CVE-2021-29957 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1186198">SUSE bug 1186198</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829125" comment="thunderbird-78.11.0-1.el7_9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202129967" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-29967</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-29967" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29967" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-29967" ref_url="https://www.suse.com/security/cve/CVE-2021-29967" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1884-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0858-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/E2JRSLMFXKIDH3M3V6MCQ6BEUR3XMG5L/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0910-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EMW3JK45XDOBEXEJG4EVDNIANAAYG46O/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1884-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3W363JYZFBDQRHIEBGR6T7LS65BG62JG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2003-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5ICXVMKW77QQMPCB3IHIGROEJNPYKPRO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Mozilla developers reported memory safety bugs present in Firefox 88 and Firefox ESR 78.11. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird &lt; 78.11, Firefox &lt; 89, and Firefox ESR &lt; 78.11.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29967/">CVE-2021-29967 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29967">CVE-2021-29967 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1186696">SUSE bug 1186696</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829120" comment="firefox-78.11.0-3.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829125" comment="thunderbird-78.11.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202129969" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-29969</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-29969" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29969" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-29969" ref_url="https://www.suse.com/security/cve/CVE-2021-29969" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009206.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1091-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ABQT6TDIB2IQ4ZZNUZXMHLE7ZDVD4YBM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2458-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AQOPHIOAWOQQLB7SCESJM5UI67QUVORM/" source="SUSE-SU"/>
    <description>
    If Thunderbird was configured to use STARTTLS for an IMAP connection, and an attacker injected IMAP server responses prior to the completion of the STARTTLS handshake, then Thunderbird didn't ignore the injected data. This could have resulted in Thunderbird showing incorrect information, for example the attacker could have tricked Thunderbird to show folders that didn't exist on the IMAP server. This vulnerability affects Thunderbird &lt; 78.12.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-06-18"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29969/">CVE-2021-29969 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29969">CVE-2021-29969 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1188275">SUSE bug 1188275</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829238" comment="thunderbird-78.12.0-2.el7_9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202129970" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-29970</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-29970" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29970" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-29970" ref_url="https://www.suse.com/security/cve/CVE-2021-29970" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2393-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-July/019626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009220.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/P253WUL63Q3NMRE2SIMFESB3E4L3KLVY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1091-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ABQT6TDIB2IQ4ZZNUZXMHLE7ZDVD4YBM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2393-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TZB4J5MBNEXABZ45GDK2VINW2XRUSLGX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2458-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AQOPHIOAWOQQLB7SCESJM5UI67QUVORM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A malicious webpage could have triggered a use-after-free, memory corruption, and a potentially exploitable crash. *This bug could only be triggered when accessibility was enabled.*. This vulnerability affects Thunderbird &lt; 78.12, Firefox ESR &lt; 78.12, and Firefox &lt; 90.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29970/">CVE-2021-29970 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29970">CVE-2021-29970 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1188275">SUSE bug 1188275</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829220" comment="firefox-78.12.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829238" comment="thunderbird-78.12.0-2.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202129976" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-29976</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-29976" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29976" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-29976" ref_url="https://www.suse.com/security/cve/CVE-2021-29976" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2393-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-July/019626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009220.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/P253WUL63Q3NMRE2SIMFESB3E4L3KLVY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1091-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ABQT6TDIB2IQ4ZZNUZXMHLE7ZDVD4YBM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2393-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TZB4J5MBNEXABZ45GDK2VINW2XRUSLGX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2458-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AQOPHIOAWOQQLB7SCESJM5UI67QUVORM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Mozilla developers reported memory safety bugs present in code shared between Firefox and Thunderbird. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird &lt; 78.12, Firefox ESR &lt; 78.12, and Firefox &lt; 90.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29976/">CVE-2021-29976 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29976">CVE-2021-29976 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1188275">SUSE bug 1188275</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829220" comment="firefox-78.12.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829238" comment="thunderbird-78.12.0-2.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202129980" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-29980</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-29980" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29980" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-29980" ref_url="https://www.suse.com/security/cve/CVE-2021-29980" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2691-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2874-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-August/019991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010974.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1184-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FG54RUGZYJQ2XDXZONDTLDFAZPF46KDK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1367-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PT6Q6PTCHFH4I5YOWCIRD4QLX24AR73I/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2774-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5XN72DL5K3ATW4V4J2NSOUICFIBM7P6U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2874-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PVP63YNT47WLZX6UE7WUKUN3AIGLJGWZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3331-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/INI43FXSUMMTXNS6C5B5BMMQ7XCYCZAV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3451-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NOOPOXVWYJPXPZIC3SK7MZFMWSQEQNPG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Uninitialized memory in a canvas object could have caused an incorrect free() leading to memory corruption and a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 78.13, Thunderbird &lt; 91, Firefox ESR &lt; 78.13, and Firefox &lt; 91.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-06-18"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29980/">CVE-2021-29980 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29980">CVE-2021-29980 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1188891">SUSE bug 1188891</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829243" comment="firefox-78.13.0-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829248" comment="thunderbird-78.13.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202129984" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-29984</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-29984" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29984" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-29984" ref_url="https://www.suse.com/security/cve/CVE-2021-29984" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2691-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2874-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-August/019991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010974.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1184-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FG54RUGZYJQ2XDXZONDTLDFAZPF46KDK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1367-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PT6Q6PTCHFH4I5YOWCIRD4QLX24AR73I/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2774-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5XN72DL5K3ATW4V4J2NSOUICFIBM7P6U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2874-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PVP63YNT47WLZX6UE7WUKUN3AIGLJGWZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3331-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/INI43FXSUMMTXNS6C5B5BMMQ7XCYCZAV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3451-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NOOPOXVWYJPXPZIC3SK7MZFMWSQEQNPG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Instruction reordering resulted in a sequence of instructions that would cause an object to be incorrectly considered during garbage collection. This led to memory corruption and a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 78.13, Thunderbird &lt; 91, Firefox ESR &lt; 78.13, and Firefox &lt; 91.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-06-18"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29984/">CVE-2021-29984 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29984">CVE-2021-29984 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1188891">SUSE bug 1188891</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829243" comment="firefox-78.13.0-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829248" comment="thunderbird-78.13.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202129985" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-29985</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-29985" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29985" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-29985" ref_url="https://www.suse.com/security/cve/CVE-2021-29985" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2691-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2874-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-August/019991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010974.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1184-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FG54RUGZYJQ2XDXZONDTLDFAZPF46KDK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1367-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PT6Q6PTCHFH4I5YOWCIRD4QLX24AR73I/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2774-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5XN72DL5K3ATW4V4J2NSOUICFIBM7P6U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2874-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PVP63YNT47WLZX6UE7WUKUN3AIGLJGWZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3331-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/INI43FXSUMMTXNS6C5B5BMMQ7XCYCZAV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3451-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NOOPOXVWYJPXPZIC3SK7MZFMWSQEQNPG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability in media channels could have led to memory corruption and a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 78.13, Thunderbird &lt; 91, Firefox ESR &lt; 78.13, and Firefox &lt; 91.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-06-18"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-29985/">CVE-2021-29985 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29985">CVE-2021-29985 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1188891">SUSE bug 1188891</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829243" comment="firefox-78.13.0-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829248" comment="thunderbird-78.13.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202129986" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-29986</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-29986" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29986" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-29986" ref_url="https://www.suse.com/security/cve/CVE-2021-29986" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2691-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2874-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-August/019991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010974.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1184-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FG54RUGZYJQ2XDXZONDTLDFAZPF46KDK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1367-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PT6Q6PTCHFH4I5YOWCIRD4QLX24AR73I/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2774-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5XN72DL5K3ATW4V4J2NSOUICFIBM7P6U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2874-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PVP63YNT47WLZX6UE7WUKUN3AIGLJGWZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3331-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/INI43FXSUMMTXNS6C5B5BMMQ7XCYCZAV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3451-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NOOPOXVWYJPXPZIC3SK7MZFMWSQEQNPG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A suspected race condition when calling getaddrinfo led to memory corruption and a potentially exploitable crash. *Note: This issue only affected Linux operating systems. Other operating systems are unaffected.* This vulnerability affects Thunderbird &lt; 78.13, Thunderbird &lt; 91, Firefox ESR &lt; 78.13, and Firefox &lt; 91.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-06-18"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29986/">CVE-2021-29986 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29986">CVE-2021-29986 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1188891">SUSE bug 1188891</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829243" comment="firefox-78.13.0-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829248" comment="thunderbird-78.13.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202129988" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-29988</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-29988" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29988" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-29988" ref_url="https://www.suse.com/security/cve/CVE-2021-29988" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2691-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2874-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-August/019991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010974.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1184-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FG54RUGZYJQ2XDXZONDTLDFAZPF46KDK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1367-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PT6Q6PTCHFH4I5YOWCIRD4QLX24AR73I/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2774-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5XN72DL5K3ATW4V4J2NSOUICFIBM7P6U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2874-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PVP63YNT47WLZX6UE7WUKUN3AIGLJGWZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3331-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/INI43FXSUMMTXNS6C5B5BMMQ7XCYCZAV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3451-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NOOPOXVWYJPXPZIC3SK7MZFMWSQEQNPG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Firefox incorrectly treated an inline list-item element as a block element, resulting in an out of bounds read or memory corruption, and a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 78.13, Thunderbird &lt; 91, Firefox ESR &lt; 78.13, and Firefox &lt; 91.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-06-18"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29988/">CVE-2021-29988 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29988">CVE-2021-29988 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1188891">SUSE bug 1188891</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829243" comment="firefox-78.13.0-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829248" comment="thunderbird-78.13.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202129989" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-29989</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-29989" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29989" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-29989" ref_url="https://www.suse.com/security/cve/CVE-2021-29989" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2691-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2874-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-August/019991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010974.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1184-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FG54RUGZYJQ2XDXZONDTLDFAZPF46KDK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1367-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PT6Q6PTCHFH4I5YOWCIRD4QLX24AR73I/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2774-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5XN72DL5K3ATW4V4J2NSOUICFIBM7P6U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2874-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PVP63YNT47WLZX6UE7WUKUN3AIGLJGWZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3331-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/INI43FXSUMMTXNS6C5B5BMMQ7XCYCZAV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3451-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NOOPOXVWYJPXPZIC3SK7MZFMWSQEQNPG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Mozilla developers reported memory safety bugs present in Firefox 90 and Firefox ESR 78.12. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird &lt; 78.13, Firefox ESR &lt; 78.13, and Firefox &lt; 91.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-06-18"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29989/">CVE-2021-29989 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29989">CVE-2021-29989 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1188891">SUSE bug 1188891</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829243" comment="firefox-78.13.0-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829248" comment="thunderbird-78.13.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30547</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30547" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30547" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30547" ref_url="https://www.suse.com/security/cve/CVE-2021-30547" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2393-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-July/019626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009220.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0881-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JKDHVVJH6V5YXSGWD7GDW62DQXQ22Y5E/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0938-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XFR7LUM6J45XO73B4GQD65J3TG3IDVJX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0948-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7KHAD4TPDMOCFFISFXM3O4TD6SK6KWAG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0949-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y5YMAC6DXOAQQEUSMY36JS76YC35PAXY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/P253WUL63Q3NMRE2SIMFESB3E4L3KLVY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1091-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ABQT6TDIB2IQ4ZZNUZXMHLE7ZDVD4YBM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2393-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TZB4J5MBNEXABZ45GDK2VINW2XRUSLGX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2458-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AQOPHIOAWOQQLB7SCESJM5UI67QUVORM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Out of bounds write in ANGLE in Google Chrome prior to 91.0.4472.101 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30547/">CVE-2021-30547 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30547">CVE-2021-30547 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1187141">SUSE bug 1187141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188275">SUSE bug 1188275</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829220" comment="firefox-78.12.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829238" comment="thunderbird-78.12.0-2.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130858" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30858</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30858" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30858" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30858" ref_url="https://www.suse.com/security/cve/CVE-2021-30858" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1369-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/X4HF2CMDLYL7MPNIXI64QMEMC75KZUZA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3353-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4KJIY3NX4MIKAMIQIFUSKB4JVJBMJUFI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FK6EK2KGH7KDPXCBN2Q3SSAVOCIXNCFX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IILRBHE4XKYN4SZKE6UX55V3HK54NAIK/" source="SUSE-SU"/>
    <description>
    A use after free issue was addressed with improved memory management. This issue is fixed in iOS 14.8 and iPadOS 14.8, macOS Big Sur 11.6. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30858/">CVE-2021-30858 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30858">CVE-2021-30858 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1190701">SUSE bug 1190701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191298">SUSE bug 1191298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191301">SUSE bug 1191301</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829504" comment="webkitgtk4-2.28.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829505" comment="webkitgtk4-devel-2.28.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829506" comment="webkitgtk4-doc-2.28.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829507" comment="webkitgtk4-jsc-2.28.2-3.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829508" comment="webkitgtk4-jsc-devel-2.28.2-3.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202131291" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-31291</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-31291" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31291" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-31291" ref_url="https://www.suse.com/security/cve/CVE-2021-31291" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:3543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3598-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-October/025597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013131.html" source="SUSE-SU"/>
    <description>
    DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2021-29457. Reason: This candidate is a duplicate of CVE-2021-29457. Notes: All CVE users should reference CVE-2021-29457 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-31291/">CVE-2021-31291 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-31291">CVE-2021-31291 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1188733">SUSE bug 1188733</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829250" comment="compat-exiv2-023-0.23-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829249" comment="compat-exiv2-026-0.26-3.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829244" comment="exiv2-0.27.0-4.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829245" comment="exiv2-devel-0.27.0-4.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829246" comment="exiv2-doc-0.27.0-4.el7_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829247" comment="exiv2-libs-0.27.0-4.el7_8 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202131535" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-31535</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-31535" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31535" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-31535" ref_url="https://www.suse.com/security/cve/CVE-2021-31535" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008960.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0807-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IHKZVFIFHF623NYTHXHM7GHY5WE7LCHT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0857-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6WUBWGS6GPACWAIGOVLE7UDHZ4HSXZVC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1897-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3TE4MZKP3FOYVRFOKL6QQUC77PHP2K76/" source="SUSE-SU"/>
    <description>
    LookupCol.c in X.Org X through X11R7.7 and libX11 before 1.7.1 might allow remote attackers to execute arbitrary code. The libX11 XLookupColor request (intended for server-side color lookup) contains a flaw allowing a client to send color-name requests with a name longer than the maximum size allowed by the protocol (and also longer than the maximum packet size for normal-sized packets). The user-controlled data exceeding the maximum size is then interpreted by the server as additional X protocol requests and executed, e.g., to disable X server authorization completely. For example, if the victim encounters malicious terminal control sequences for color codes, then the attacker may be able to take full control of the running graphical session.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-31535/">CVE-2021-31535 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31535">CVE-2021-31535 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1182506">SUSE bug 1182506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191879">SUSE bug 1191879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205051">SUSE bug 1205051</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829254" comment="libX11-1.6.7-4.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829255" comment="libX11-common-1.6.7-4.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829256" comment="libX11-devel-1.6.7-4.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213156" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3156</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3156" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3156" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3156" ref_url="https://www.suse.com/security/cve/CVE-2021-3156" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0225-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0227-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008250.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020038.html" source="SUSE-SU"/>
		<reference ref_id="TID000019841" ref_url="https://www.suse.com/support/kb/doc/?id=000019841" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0169-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7OQJUG5Z7K425IKZS5GT4KPIBGTT4JMW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0170-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3O463OUKAXLCUM74AUHUPVMQFXLLVAEH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0602-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JTRDPRKO2NDRVSH5UJJKLBDYJXGUBK6P/" source="SUSE-SU"/>
    <description>
    Sudo before 1.9.5p2 contains an off-by-one error that can result in a heap-based buffer overflow, which allows privilege escalation to root via "sudoedit -s" and a command-line argument that ends with a single backslash character.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3156/">CVE-2021-3156 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3156">CVE-2021-3156 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1180684">SUSE bug 1180684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181090">SUSE bug 1181090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181506">SUSE bug 1181506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181657">SUSE bug 1181657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183936">SUSE bug 1183936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218863">SUSE bug 1218863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225623">SUSE bug 1225623</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009828882" comment="sudo-1.8.23-10.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009828883" comment="sudo-devel-1.8.23-10.el7_9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213177" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3177</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3177" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3177" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3177" ref_url="https://www.suse.com/security/cve/CVE-2021-3177" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0444-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0447-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0450-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0452-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0456-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0432-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008350.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0270-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WUT6BSX5663NCXU3Y4KR3RA3RQHJMCFI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0331-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3AKEBUCTPHZWXJGF6EWK7HBTO726SP2Y/" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/pipermail/neuvector-updates/2023-November/000021.html" source="SUSE-SU"/>
    <description>
    Python 3.x through 3.9.1 has a buffer overflow in PyCArg_repr in _ctypes/callproc.c, which may lead to remote code execution in certain Python applications that accept floating-point numbers as untrusted input, as demonstrated by a 1e300 argument to c_double.from_param. This occurs because sprintf is used unsafely.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3177/">CVE-2021-3177 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3177">CVE-2021-3177 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1181126">SUSE bug 1181126</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829745" comment="python-2.7.5-92.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829746" comment="python-debug-2.7.5-92.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829747" comment="python-devel-2.7.5-92.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829748" comment="python-libs-2.7.5-92.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829749" comment="python-test-2.7.5-92.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829750" comment="python-tools-2.7.5-92.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829751" comment="tkinter-2.7.5-92.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202132027" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-32027</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-32027" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32027" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-32027" ref_url="https://www.suse.com/security/cve/CVE-2021-32027" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008873.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1785-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1970-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2958-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/012016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0894-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RIV3KJYAQTSSLGKE535SO3C2IEXHDPCN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1785-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YKAEBUWSUHMGHAQQGZGGJL4XNRQXGZEZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1970-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MVY7TKRUVVD5PT3ITLWLB2FFEX6JT7UW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1994-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6AKC5KVKWVYW4R23NQPYSXI57JD6CIYN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14360-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RSHH7GG3JERRES4WX7FTBWO2TZCAMJMP/" source="SUSE-SU"/>
    <description>
    A flaw was found in postgresql in versions before 13.3, before 12.7, before 11.12, before 10.17 and before 9.6.22. While modifying certain SQL array values, missing bounds checks let authenticated database users write arbitrary bytes to a wide area of server memory. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32027/">CVE-2021-32027 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32027">CVE-2021-32027 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1185924">SUSE bug 1185924</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829189" comment="postgresql-9.2.24-7.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829190" comment="postgresql-contrib-9.2.24-7.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829191" comment="postgresql-devel-9.2.24-7.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829192" comment="postgresql-docs-9.2.24-7.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829193" comment="postgresql-libs-9.2.24-7.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829194" comment="postgresql-plperl-9.2.24-7.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829195" comment="postgresql-plpython-9.2.24-7.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829196" comment="postgresql-pltcl-9.2.24-7.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829197" comment="postgresql-server-9.2.24-7.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829198" comment="postgresql-static-9.2.24-7.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829199" comment="postgresql-test-9.2.24-7.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829200" comment="postgresql-upgrade-9.2.24-7.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202132142" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-32142</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-32142" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32142" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-32142" ref_url="https://www.suse.com/security/cve/CVE-2021-32142" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:0510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013886.html" source="SUSE-SU"/>
    <description>
    Buffer Overflow vulnerability in LibRaw linux/unix v0.20.0 allows attacker to escalate privileges via the LibRaw_buffer_datastream::gets(char*, int) in /src/libraw/src/libraw_datastream.cpp.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-25"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-32142/">CVE-2021-32142 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32142">CVE-2021-32142 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208470">SUSE bug 1208470</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009844291" comment="LibRaw-0.19.4-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844292" comment="LibRaw-devel-0.19.4-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844293" comment="LibRaw-static-0.19.4-2.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202132399" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-32399</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-32399" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32399" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-32399" ref_url="https://www.suse.com/security/cve/CVE-2021-32399" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-June/019290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2042-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01982-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01995-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040364.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0843-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QHZZYSYX2W3FJK73UGT72F2DQ37IKCJY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0947-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M3WU4VH2HXVC3VLST5RWUW7LUFNSUEIN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    net/bluetooth/hci_request.c in the Linux kernel through 5.12.2 has a race condition for removal of the HCI controller.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32399/">CVE-2021-32399 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32399">CVE-2021-32399 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1184611">SUSE bug 1184611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185898">SUSE bug 1185898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185899">SUSE bug 1185899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196174">SUSE bug 1196174</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200084">SUSE bug 1200084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201734">SUSE bug 1201734</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829273" comment="bpftool-3.10.0-1160.41.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829274" comment="kernel-3.10.0-1160.41.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829275" comment="kernel-abi-whitelists-3.10.0-1160.41.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829276" comment="kernel-debug-3.10.0-1160.41.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829279" comment="kernel-doc-3.10.0-1160.41.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829280" comment="kernel-headers-3.10.0-1160.41.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829281" comment="kernel-tools-3.10.0-1160.41.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829282" comment="kernel-tools-libs-3.10.0-1160.41.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829284" comment="perf-3.10.0-1160.41.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829285" comment="python-perf-3.10.0-1160.41.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213246" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3246</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3246" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3246" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3246" ref_url="https://www.suse.com/security/cve/CVE-2021-3246" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009301.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1166-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VGFWRIIXBFCLA7GINXJUPUD7YVYB5UKO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2764-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y7PPP2MGW6YG46U25HVAXKQBMB2PV4XV/" source="SUSE-SU"/>
    <description>
    A heap buffer overflow vulnerability in msadpcm_decode_block of libsndfile 1.0.30 allows attackers to execute arbitrary code via a crafted WAV file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3246/">CVE-2021-3246 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3246">CVE-2021-3246 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1188540">SUSE bug 1188540</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829251" comment="libsndfile-1.0.25-12.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829252" comment="libsndfile-devel-1.0.25-12.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829253" comment="libsndfile-utils-1.0.25-12.el7_9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202132810" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-32810</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-32810" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32810" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-32810" ref_url="https://www.suse.com/security/cve/CVE-2021-32810" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3446-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009595.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009928.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1367-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PT6Q6PTCHFH4I5YOWCIRD4QLX24AR73I/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1635-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YVVRA5LXBWWHGQPQLJYZRWPCG4E2L7WQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3331-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/INI43FXSUMMTXNS6C5B5BMMQ7XCYCZAV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3451-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NOOPOXVWYJPXPZIC3SK7MZFMWSQEQNPG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4150-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OQOGFW6JISWI3PQR7AHD3OEX3SPELMFB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    crossbeam-deque is a package of work-stealing deques for building task schedulers when programming in Rust. In versions prior to 0.7.4 and 0.8.0, the result of the race condition is that one or more tasks in the worker queue can be popped twice instead of other tasks that are forgotten and never popped. If tasks are allocated on the heap, this can cause double free and a memory leak. If not, this still can cause a logical bug. Crates using `Stealer::steal`, `Stealer::steal_batch`, or `Stealer::steal_batch_and_pop` are affected by this issue. This has been fixed in crossbeam-deque 0.8.1 and 0.7.4.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32810/">CVE-2021-32810 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32810">CVE-2021-32810 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1191332">SUSE bug 1191332</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829342" comment="firefox-91.2.0-4.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829369" comment="thunderbird-91.2.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202133033" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-33033</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-33033" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33033" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-33033" ref_url="https://www.suse.com/security/cve/CVE-2021-33033" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3748-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-November/020791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009871.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1460-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MLGTNISZMAYBWA26GZHGZYQYWHM3VSZI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1477-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J325P6NPH7BF7P7B3LO6FGQNCTFNGKEW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3641-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RDPFUBRGNGPD3YZQTYFCSNGZKH75ZKUP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3655-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ET2XZDZ74SKULHCBR4GCFG3KJRMSHJQQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3675-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YKWZ52CYLL6JHU7XBR4T2MCMZQTD4U57/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
    <description>
    The Linux kernel before 5.11.14 has a use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c because the CIPSO and CALIPSO refcounting for the DOI definitions is mishandled, aka CID-ad5d07f4a9cd. This leads to writing an arbitrary value.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33033/">CVE-2021-33033 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33033">CVE-2021-33033 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1186109">SUSE bug 1186109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186283">SUSE bug 1186283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188876">SUSE bug 1188876</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829207" comment="bpftool-3.10.0-1160.36.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829208" comment="kernel-3.10.0-1160.36.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829209" comment="kernel-abi-whitelists-3.10.0-1160.36.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829210" comment="kernel-debug-3.10.0-1160.36.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829213" comment="kernel-doc-3.10.0-1160.36.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829214" comment="kernel-headers-3.10.0-1160.36.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829215" comment="kernel-tools-3.10.0-1160.36.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829216" comment="kernel-tools-libs-3.10.0-1160.36.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829218" comment="perf-3.10.0-1160.36.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829219" comment="python-perf-3.10.0-1160.36.2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202133034" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-33034</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-33034" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33034" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-33034" ref_url="https://www.suse.com/security/cve/CVE-2021-33034" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-June/019290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2042-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009234.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0843-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QHZZYSYX2W3FJK73UGT72F2DQ37IKCJY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0947-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M3WU4VH2HXVC3VLST5RWUW7LUFNSUEIN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 5.12.4, net/bluetooth/hci_event.c has a use-after-free when destroying an hci_chan, aka CID-5c4c8c954409. This leads to writing an arbitrary value.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33034/">CVE-2021-33034 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33034">CVE-2021-33034 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1186111">SUSE bug 1186111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186285">SUSE bug 1186285</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829207" comment="bpftool-3.10.0-1160.36.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829208" comment="kernel-3.10.0-1160.36.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829209" comment="kernel-abi-whitelists-3.10.0-1160.36.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829210" comment="kernel-debug-3.10.0-1160.36.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829213" comment="kernel-doc-3.10.0-1160.36.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829214" comment="kernel-headers-3.10.0-1160.36.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829215" comment="kernel-tools-3.10.0-1160.36.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829216" comment="kernel-tools-libs-3.10.0-1160.36.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829218" comment="perf-3.10.0-1160.36.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829219" comment="python-perf-3.10.0-1160.36.2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213347" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3347</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3347" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3347" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3347" ref_url="https://www.suse.com/security/cve/CVE-2021-3347" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0427-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0818-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-March/018289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008500.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008509.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008510.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008502.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0868-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008513.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0241-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GZRN6BW22C4S3GVCJVPHDT4HHTLVGVZE/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel through 5.10.11. PI futexes have a kernel stack use-after-free during fault handling, allowing local users to execute code in the kernel, aka CID-34b1a1ce1458.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3347/">CVE-2021-3347 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3347">CVE-2021-3347 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1181349">SUSE bug 1181349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181553">SUSE bug 1181553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190859">SUSE bug 1190859</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829154" comment="bpftool-3.10.0-1160.31.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829155" comment="kernel-3.10.0-1160.31.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829156" comment="kernel-abi-whitelists-3.10.0-1160.31.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829157" comment="kernel-debug-3.10.0-1160.31.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829160" comment="kernel-doc-3.10.0-1160.31.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829161" comment="kernel-headers-3.10.0-1160.31.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829162" comment="kernel-tools-3.10.0-1160.31.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829163" comment="kernel-tools-libs-3.10.0-1160.31.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829165" comment="perf-3.10.0-1160.31.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829166" comment="python-perf-3.10.0-1160.31.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202133516" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-33516</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-33516" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33516" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-33516" ref_url="https://www.suse.com/security/cve/CVE-2021-33516" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009082.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0917-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VQTLJKRQND7UED3XI3J3HC6A2XVGYC7H/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2153-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CWMAQ7IJUIENIJYPPEUVGYSZ473DP5EV/" source="SUSE-SU"/>
    <description>
    An issue was discovered in GUPnP before 1.0.7 and 1.1.x and 1.2.x before 1.2.5. It allows DNS rebinding. A remote web server can exploit this vulnerability to trick a victim's browser into triggering actions against local UPnP services implemented using this library. Depending on the affected service, this could be used for data exfiltration, data tempering, etc.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-33516/">CVE-2021-33516 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33516">CVE-2021-33516 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1186590">SUSE bug 1186590</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829201" comment="gupnp-1.0.2-6.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829202" comment="gupnp-devel-1.0.2-6.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829203" comment="gupnp-docs-1.0.2-6.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202133909" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-33909</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-33909" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33909" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-33909" ref_url="https://www.suse.com/security/cve/CVE-2021-33909" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2409-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-July/019639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009226.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-July/019748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="TID000020341" ref_url="https://www.suse.com/support/kb/doc/?id=000020341" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1076-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WT3TYNEJZ7FKJMTYO3DX3Z7B2YCYPEJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2409-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PZY5AYK3E4EZBBTJOQXWCMRDFFYLM6EB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2415-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VDV3DHS5VRBTZIQXVKQML4UNTSCPJZZA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2427-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HJIMD6XIKYMKE35TUYXKKYPX4737LEVU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
    <description>
    fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33909/">CVE-2021-33909 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33909">CVE-2021-33909 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1188062">SUSE bug 1188062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188063">SUSE bug 1188063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188257">SUSE bug 1188257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189302">SUSE bug 1189302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190859">SUSE bug 1190859</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829207" comment="bpftool-3.10.0-1160.36.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829208" comment="kernel-3.10.0-1160.36.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829209" comment="kernel-abi-whitelists-3.10.0-1160.36.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829210" comment="kernel-debug-3.10.0-1160.36.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829213" comment="kernel-doc-3.10.0-1160.36.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829214" comment="kernel-headers-3.10.0-1160.36.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829215" comment="kernel-tools-3.10.0-1160.36.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829216" comment="kernel-tools-libs-3.10.0-1160.36.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829218" comment="perf-3.10.0-1160.36.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829219" comment="python-perf-3.10.0-1160.36.2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213472" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3472</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3472" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3472" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3472" ref_url="https://www.suse.com/security/cve/CVE-2021-3472" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008628.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008631.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008626.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0554-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7CRPRB7NRFEWN4RTARQEO4ANKTCLF6AS/" source="SUSE-SU"/>
    <description>
    A flaw was found in xorg-x11-server in versions before 1.20.11. An integer underflow can occur in xserver which can lead to a local privilege escalation. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3472/">CVE-2021-3472 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3472">CVE-2021-3472 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1180128">SUSE bug 1180128</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829105" comment="xorg-x11-server-Xdmx-1.20.4-16.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829106" comment="xorg-x11-server-Xephyr-1.20.4-16.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829107" comment="xorg-x11-server-Xnest-1.20.4-16.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829108" comment="xorg-x11-server-Xorg-1.20.4-16.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829109" comment="xorg-x11-server-Xvfb-1.20.4-16.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829110" comment="xorg-x11-server-Xwayland-1.20.4-16.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829111" comment="xorg-x11-server-common-1.20.4-16.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829112" comment="xorg-x11-server-devel-1.20.4-16.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829113" comment="xorg-x11-server-source-1.20.4-16.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202134798" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-34798</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-34798" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34798" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-34798" ref_url="https://www.suse.com/security/cve/CVE-2021-34798" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3335-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009646.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1438-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H4TEWXB67RJ5IPKHZI6FBQ67CJEHGI3B/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3522-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JKKOECDBM5767TKS4AX32R26YLJDYTJT/" source="SUSE-SU"/>
    <description>
    Malformed requests may cause the server to dereference a NULL pointer. This issue affects Apache HTTP Server 2.4.48 and earlier.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-34798/">CVE-2021-34798 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-34798">CVE-2021-34798 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1190669">SUSE bug 1190669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191297">SUSE bug 1191297</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829529" comment="httpd-2.4.6-97.el7_9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829530" comment="httpd-devel-2.4.6-97.el7_9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829531" comment="httpd-manual-2.4.6-97.el7_9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829532" comment="httpd-tools-2.4.6-97.el7_9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829533" comment="mod_ldap-2.4.6-97.el7_9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829534" comment="mod_proxy_html-2.4.6-97.el7_9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829535" comment="mod_session-2.4.6-97.el7_9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829536" comment="mod_ssl-2.4.6-97.el7_9.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213480" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3480</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3480" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3480" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3480" ref_url="https://www.suse.com/security/cve/CVE-2021-3480" source="SUSE CVE"/>
    <description>
    A flaw was found in slapi-nis in versions before 0.56.7. A NULL pointer dereference during the parsing of the Binding DN could allow an unauthenticated attacker to crash the 389-ds-base directory server. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-3480/">CVE-2021-3480 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3480">CVE-2021-3480 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829104" comment="slapi-nis-0.56.5-4.el7_9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213504" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3504</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3504" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3504" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3504" ref_url="https://www.suse.com/security/cve/CVE-2021-3504" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008840.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0806-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CSGIA2DN2ELWOW2J5TFWNTMLKQDBQAH5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1761-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q55SWQQWWFLTPBSSMBPSJOSFUIHSY6H6/" source="SUSE-SU"/>
    <description>
    A flaw was found in the hivex library in versions before 1.3.20. It is caused due to a lack of bounds check within the hivex_open function. An attacker could input a specially crafted Windows Registry (hive) file which would cause hivex to read memory beyond its normal bounds or cause the program to crash. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3504/">CVE-2021-3504 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3504">CVE-2021-3504 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1185013">SUSE bug 1185013</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829167" comment="hivex-1.3.10-6.11.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829168" comment="hivex-devel-1.3.10-6.11.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829169" comment="ocaml-hivex-1.3.10-6.11.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829170" comment="ocaml-hivex-devel-1.3.10-6.11.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829171" comment="perl-hivex-1.3.10-6.11.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829172" comment="python-hivex-1.3.10-6.11.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829173" comment="ruby-hivex-1.3.10-6.11.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202135550" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-35550</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-35550" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-35550" ref_url="https://www.suse.com/security/cve/CVE-2021-35550" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009773.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1455-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GRBHNCR5KDMAYD3N3CDRPQWW3T6HIBNY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1480-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/443XZX47COH5AR2HZJWHHPFLGZ7FL7SI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VPYI4OMK4TI6UOJ2GUZST7WX2T6X7H6O/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3615-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VOJHYCWQ5VVLZ6J4OKIW2JS6MBT7VLM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3671-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CY22JAEBEGW675Z365MZJV47IFLWRYR4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3770-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XBTSKQFBRMEJYNB4FQDRGX4SHHFX2QSS/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 7u311, 8u301, 11.0.12; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via TLS to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35550/">CVE-2021-35550 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35550">CVE-2021-35550 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1191901">SUSE bug 1191901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193314">SUSE bug 1193314</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829378" comment="java-1.8.0-openjdk-1.8.0.312.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829379" comment="java-1.8.0-openjdk-accessibility-1.8.0.312.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829380" comment="java-1.8.0-openjdk-demo-1.8.0.312.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829381" comment="java-1.8.0-openjdk-devel-1.8.0.312.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829382" comment="java-1.8.0-openjdk-headless-1.8.0.312.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829383" comment="java-1.8.0-openjdk-javadoc-1.8.0.312.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829384" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.312.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829385" comment="java-1.8.0-openjdk-src-1.8.0.312.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829386" comment="java-11-openjdk-11.0.13.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829387" comment="java-11-openjdk-demo-11.0.13.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829388" comment="java-11-openjdk-devel-11.0.13.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829389" comment="java-11-openjdk-headless-11.0.13.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829390" comment="java-11-openjdk-javadoc-11.0.13.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829391" comment="java-11-openjdk-javadoc-zip-11.0.13.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829392" comment="java-11-openjdk-jmods-11.0.13.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829393" comment="java-11-openjdk-src-11.0.13.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829394" comment="java-11-openjdk-static-libs-11.0.13.0.8-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202135556" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-35556</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-35556" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-35556" ref_url="https://www.suse.com/security/cve/CVE-2021-35556" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009773.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14875-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1455-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GRBHNCR5KDMAYD3N3CDRPQWW3T6HIBNY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1480-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/443XZX47COH5AR2HZJWHHPFLGZ7FL7SI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VPYI4OMK4TI6UOJ2GUZST7WX2T6X7H6O/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3615-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VOJHYCWQ5VVLZ6J4OKIW2JS6MBT7VLM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3671-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CY22JAEBEGW675Z365MZJV47IFLWRYR4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3770-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XBTSKQFBRMEJYNB4FQDRGX4SHHFX2QSS/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0108-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5GEO4VASAXOQQYTQGGNCUBC3ZY3RFQT4/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Swing). Supported versions that are affected are Java SE: 7u311, 8u301, 11.0.12, 17; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35556/">CVE-2021-35556 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35556">CVE-2021-35556 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1191910">SUSE bug 1191910</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829378" comment="java-1.8.0-openjdk-1.8.0.312.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829379" comment="java-1.8.0-openjdk-accessibility-1.8.0.312.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829380" comment="java-1.8.0-openjdk-demo-1.8.0.312.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829381" comment="java-1.8.0-openjdk-devel-1.8.0.312.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829382" comment="java-1.8.0-openjdk-headless-1.8.0.312.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829383" comment="java-1.8.0-openjdk-javadoc-1.8.0.312.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829384" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.312.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829385" comment="java-1.8.0-openjdk-src-1.8.0.312.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829386" comment="java-11-openjdk-11.0.13.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829387" comment="java-11-openjdk-demo-11.0.13.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829388" comment="java-11-openjdk-devel-11.0.13.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829389" comment="java-11-openjdk-headless-11.0.13.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829390" comment="java-11-openjdk-javadoc-11.0.13.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829391" comment="java-11-openjdk-javadoc-zip-11.0.13.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829392" comment="java-11-openjdk-jmods-11.0.13.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829393" comment="java-11-openjdk-src-11.0.13.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829394" comment="java-11-openjdk-static-libs-11.0.13.0.8-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202135559" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-35559</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-35559" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-35559" ref_url="https://www.suse.com/security/cve/CVE-2021-35559" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009773.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14875-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1455-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GRBHNCR5KDMAYD3N3CDRPQWW3T6HIBNY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1480-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/443XZX47COH5AR2HZJWHHPFLGZ7FL7SI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VPYI4OMK4TI6UOJ2GUZST7WX2T6X7H6O/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3615-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VOJHYCWQ5VVLZ6J4OKIW2JS6MBT7VLM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3671-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CY22JAEBEGW675Z365MZJV47IFLWRYR4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3770-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XBTSKQFBRMEJYNB4FQDRGX4SHHFX2QSS/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0108-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5GEO4VASAXOQQYTQGGNCUBC3ZY3RFQT4/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Swing). Supported versions that are affected are Java SE: 7u311, 8u301, 11.0.12, 17; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35559/">CVE-2021-35559 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35559">CVE-2021-35559 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1191911">SUSE bug 1191911</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829378" comment="java-1.8.0-openjdk-1.8.0.312.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829379" comment="java-1.8.0-openjdk-accessibility-1.8.0.312.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829380" comment="java-1.8.0-openjdk-demo-1.8.0.312.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829381" comment="java-1.8.0-openjdk-devel-1.8.0.312.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829382" comment="java-1.8.0-openjdk-headless-1.8.0.312.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829383" comment="java-1.8.0-openjdk-javadoc-1.8.0.312.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829384" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.312.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829385" comment="java-1.8.0-openjdk-src-1.8.0.312.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829386" comment="java-11-openjdk-11.0.13.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829387" comment="java-11-openjdk-demo-11.0.13.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829388" comment="java-11-openjdk-devel-11.0.13.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829389" comment="java-11-openjdk-headless-11.0.13.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829390" comment="java-11-openjdk-javadoc-11.0.13.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829391" comment="java-11-openjdk-javadoc-zip-11.0.13.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829392" comment="java-11-openjdk-jmods-11.0.13.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829393" comment="java-11-openjdk-src-11.0.13.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829394" comment="java-11-openjdk-static-libs-11.0.13.0.8-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202135561" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-35561</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-35561" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-35561" ref_url="https://www.suse.com/security/cve/CVE-2021-35561" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009773.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2539-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2650-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011760.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1455-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GRBHNCR5KDMAYD3N3CDRPQWW3T6HIBNY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1480-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/443XZX47COH5AR2HZJWHHPFLGZ7FL7SI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VPYI4OMK4TI6UOJ2GUZST7WX2T6X7H6O/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3615-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VOJHYCWQ5VVLZ6J4OKIW2JS6MBT7VLM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3671-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CY22JAEBEGW675Z365MZJV47IFLWRYR4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3770-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XBTSKQFBRMEJYNB4FQDRGX4SHHFX2QSS/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Utility). Supported versions that are affected are Java SE: 7u311, 8u301, 11.0.12, 17; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35561/">CVE-2021-35561 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35561">CVE-2021-35561 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1191912">SUSE bug 1191912</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829378" comment="java-1.8.0-openjdk-1.8.0.312.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829379" comment="java-1.8.0-openjdk-accessibility-1.8.0.312.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829380" comment="java-1.8.0-openjdk-demo-1.8.0.312.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829381" comment="java-1.8.0-openjdk-devel-1.8.0.312.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829382" comment="java-1.8.0-openjdk-headless-1.8.0.312.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829383" comment="java-1.8.0-openjdk-javadoc-1.8.0.312.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829384" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.312.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829385" comment="java-1.8.0-openjdk-src-1.8.0.312.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829386" comment="java-11-openjdk-11.0.13.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829387" comment="java-11-openjdk-demo-11.0.13.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829388" comment="java-11-openjdk-devel-11.0.13.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829389" comment="java-11-openjdk-headless-11.0.13.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829390" comment="java-11-openjdk-javadoc-11.0.13.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829391" comment="java-11-openjdk-javadoc-zip-11.0.13.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829392" comment="java-11-openjdk-jmods-11.0.13.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829393" comment="java-11-openjdk-src-11.0.13.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829394" comment="java-11-openjdk-static-libs-11.0.13.0.8-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202135564" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-35564</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-35564" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-35564" ref_url="https://www.suse.com/security/cve/CVE-2021-35564" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009773.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14875-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1455-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GRBHNCR5KDMAYD3N3CDRPQWW3T6HIBNY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1480-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/443XZX47COH5AR2HZJWHHPFLGZ7FL7SI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VPYI4OMK4TI6UOJ2GUZST7WX2T6X7H6O/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3615-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VOJHYCWQ5VVLZ6J4OKIW2JS6MBT7VLM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3671-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CY22JAEBEGW675Z365MZJV47IFLWRYR4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3770-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XBTSKQFBRMEJYNB4FQDRGX4SHHFX2QSS/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0108-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5GEO4VASAXOQQYTQGGNCUBC3ZY3RFQT4/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Keytool). Supported versions that are affected are Java SE: 7u311, 8u301, 11.0.12, 17; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-35564/">CVE-2021-35564 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35564">CVE-2021-35564 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1191913">SUSE bug 1191913</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829378" comment="java-1.8.0-openjdk-1.8.0.312.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829379" comment="java-1.8.0-openjdk-accessibility-1.8.0.312.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829380" comment="java-1.8.0-openjdk-demo-1.8.0.312.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829381" comment="java-1.8.0-openjdk-devel-1.8.0.312.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829382" comment="java-1.8.0-openjdk-headless-1.8.0.312.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829383" comment="java-1.8.0-openjdk-javadoc-1.8.0.312.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829384" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.312.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829385" comment="java-1.8.0-openjdk-src-1.8.0.312.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829386" comment="java-11-openjdk-11.0.13.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829387" comment="java-11-openjdk-demo-11.0.13.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829388" comment="java-11-openjdk-devel-11.0.13.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829389" comment="java-11-openjdk-headless-11.0.13.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829390" comment="java-11-openjdk-javadoc-11.0.13.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829391" comment="java-11-openjdk-javadoc-zip-11.0.13.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829392" comment="java-11-openjdk-jmods-11.0.13.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829393" comment="java-11-openjdk-src-11.0.13.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829394" comment="java-11-openjdk-static-libs-11.0.13.0.8-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202135565" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-35565</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-35565" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-35565" ref_url="https://www.suse.com/security/cve/CVE-2021-35565" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009773.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14875-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1455-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GRBHNCR5KDMAYD3N3CDRPQWW3T6HIBNY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1480-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/443XZX47COH5AR2HZJWHHPFLGZ7FL7SI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VPYI4OMK4TI6UOJ2GUZST7WX2T6X7H6O/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3615-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VOJHYCWQ5VVLZ6J4OKIW2JS6MBT7VLM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3671-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CY22JAEBEGW675Z365MZJV47IFLWRYR4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3770-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XBTSKQFBRMEJYNB4FQDRGX4SHHFX2QSS/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0108-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5GEO4VASAXOQQYTQGGNCUBC3ZY3RFQT4/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 7u311, 8u301, 11.0.12; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via TLS to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35565/">CVE-2021-35565 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35565">CVE-2021-35565 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1191909">SUSE bug 1191909</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829378" comment="java-1.8.0-openjdk-1.8.0.312.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829379" comment="java-1.8.0-openjdk-accessibility-1.8.0.312.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829380" comment="java-1.8.0-openjdk-demo-1.8.0.312.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829381" comment="java-1.8.0-openjdk-devel-1.8.0.312.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829382" comment="java-1.8.0-openjdk-headless-1.8.0.312.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829383" comment="java-1.8.0-openjdk-javadoc-1.8.0.312.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829384" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.312.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829385" comment="java-1.8.0-openjdk-src-1.8.0.312.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829386" comment="java-11-openjdk-11.0.13.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829387" comment="java-11-openjdk-demo-11.0.13.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829388" comment="java-11-openjdk-devel-11.0.13.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829389" comment="java-11-openjdk-headless-11.0.13.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829390" comment="java-11-openjdk-javadoc-11.0.13.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829391" comment="java-11-openjdk-javadoc-zip-11.0.13.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829392" comment="java-11-openjdk-jmods-11.0.13.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829393" comment="java-11-openjdk-src-11.0.13.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829394" comment="java-11-openjdk-static-libs-11.0.13.0.8-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202135567" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-35567</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-35567" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-35567" ref_url="https://www.suse.com/security/cve/CVE-2021-35567" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009772.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1455-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GRBHNCR5KDMAYD3N3CDRPQWW3T6HIBNY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1480-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/443XZX47COH5AR2HZJWHHPFLGZ7FL7SI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VPYI4OMK4TI6UOJ2GUZST7WX2T6X7H6O/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3615-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VOJHYCWQ5VVLZ6J4OKIW2JS6MBT7VLM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3671-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CY22JAEBEGW675Z365MZJV47IFLWRYR4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3770-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XBTSKQFBRMEJYNB4FQDRGX4SHHFX2QSS/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 8u301, 11.0.12, 17; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Easily exploitable vulnerability allows low privileged attacker with network access via Kerberos to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Oracle GraalVM Enterprise Edition, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 6.8 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35567/">CVE-2021-35567 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35567">CVE-2021-35567 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1191903">SUSE bug 1191903</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829378" comment="java-1.8.0-openjdk-1.8.0.312.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829379" comment="java-1.8.0-openjdk-accessibility-1.8.0.312.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829380" comment="java-1.8.0-openjdk-demo-1.8.0.312.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829381" comment="java-1.8.0-openjdk-devel-1.8.0.312.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829382" comment="java-1.8.0-openjdk-headless-1.8.0.312.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829383" comment="java-1.8.0-openjdk-javadoc-1.8.0.312.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829384" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.312.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829385" comment="java-1.8.0-openjdk-src-1.8.0.312.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829386" comment="java-11-openjdk-11.0.13.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829387" comment="java-11-openjdk-demo-11.0.13.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829388" comment="java-11-openjdk-devel-11.0.13.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829389" comment="java-11-openjdk-headless-11.0.13.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829390" comment="java-11-openjdk-javadoc-11.0.13.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829391" comment="java-11-openjdk-javadoc-zip-11.0.13.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829392" comment="java-11-openjdk-jmods-11.0.13.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829393" comment="java-11-openjdk-src-11.0.13.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829394" comment="java-11-openjdk-static-libs-11.0.13.0.8-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202135578" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-35578</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-35578" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-35578" ref_url="https://www.suse.com/security/cve/CVE-2021-35578" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1455-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GRBHNCR5KDMAYD3N3CDRPQWW3T6HIBNY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1480-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/443XZX47COH5AR2HZJWHHPFLGZ7FL7SI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VPYI4OMK4TI6UOJ2GUZST7WX2T6X7H6O/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3615-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VOJHYCWQ5VVLZ6J4OKIW2JS6MBT7VLM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3671-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CY22JAEBEGW675Z365MZJV47IFLWRYR4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3770-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XBTSKQFBRMEJYNB4FQDRGX4SHHFX2QSS/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0108-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5GEO4VASAXOQQYTQGGNCUBC3ZY3RFQT4/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 8u301, 11.0.12, 17; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via TLS to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35578/">CVE-2021-35578 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35578">CVE-2021-35578 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1191904">SUSE bug 1191904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829378" comment="java-1.8.0-openjdk-1.8.0.312.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829379" comment="java-1.8.0-openjdk-accessibility-1.8.0.312.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829380" comment="java-1.8.0-openjdk-demo-1.8.0.312.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829381" comment="java-1.8.0-openjdk-devel-1.8.0.312.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829382" comment="java-1.8.0-openjdk-headless-1.8.0.312.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829383" comment="java-1.8.0-openjdk-javadoc-1.8.0.312.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829384" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.312.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829385" comment="java-1.8.0-openjdk-src-1.8.0.312.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829386" comment="java-11-openjdk-11.0.13.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829387" comment="java-11-openjdk-demo-11.0.13.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829388" comment="java-11-openjdk-devel-11.0.13.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829389" comment="java-11-openjdk-headless-11.0.13.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829390" comment="java-11-openjdk-javadoc-11.0.13.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829391" comment="java-11-openjdk-javadoc-zip-11.0.13.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829392" comment="java-11-openjdk-jmods-11.0.13.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829393" comment="java-11-openjdk-src-11.0.13.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829394" comment="java-11-openjdk-static-libs-11.0.13.0.8-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202135586" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-35586</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-35586" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-35586" ref_url="https://www.suse.com/security/cve/CVE-2021-35586" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009773.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14875-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1455-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GRBHNCR5KDMAYD3N3CDRPQWW3T6HIBNY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1480-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/443XZX47COH5AR2HZJWHHPFLGZ7FL7SI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VPYI4OMK4TI6UOJ2GUZST7WX2T6X7H6O/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3615-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VOJHYCWQ5VVLZ6J4OKIW2JS6MBT7VLM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3671-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CY22JAEBEGW675Z365MZJV47IFLWRYR4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3770-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XBTSKQFBRMEJYNB4FQDRGX4SHHFX2QSS/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0108-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5GEO4VASAXOQQYTQGGNCUBC3ZY3RFQT4/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: ImageIO). Supported versions that are affected are Java SE: 7u311, 8u301, 11.0.12, 17; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35586/">CVE-2021-35586 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35586">CVE-2021-35586 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1191914">SUSE bug 1191914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194928">SUSE bug 1194928</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829378" comment="java-1.8.0-openjdk-1.8.0.312.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829379" comment="java-1.8.0-openjdk-accessibility-1.8.0.312.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829380" comment="java-1.8.0-openjdk-demo-1.8.0.312.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829381" comment="java-1.8.0-openjdk-devel-1.8.0.312.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829382" comment="java-1.8.0-openjdk-headless-1.8.0.312.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829383" comment="java-1.8.0-openjdk-javadoc-1.8.0.312.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829384" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.312.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829385" comment="java-1.8.0-openjdk-src-1.8.0.312.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829386" comment="java-11-openjdk-11.0.13.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829387" comment="java-11-openjdk-demo-11.0.13.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829388" comment="java-11-openjdk-devel-11.0.13.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829389" comment="java-11-openjdk-headless-11.0.13.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829390" comment="java-11-openjdk-javadoc-11.0.13.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829391" comment="java-11-openjdk-javadoc-zip-11.0.13.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829392" comment="java-11-openjdk-jmods-11.0.13.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829393" comment="java-11-openjdk-src-11.0.13.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829394" comment="java-11-openjdk-static-libs-11.0.13.0.8-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202135588" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-35588</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-35588" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35588" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-35588" ref_url="https://www.suse.com/security/cve/CVE-2021-35588" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009773.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14875-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VPYI4OMK4TI6UOJ2GUZST7WX2T6X7H6O/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3770-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XBTSKQFBRMEJYNB4FQDRGX4SHHFX2QSS/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0108-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5GEO4VASAXOQQYTQGGNCUBC3ZY3RFQT4/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 7u311, 8u301; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35588/">CVE-2021-35588 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35588">CVE-2021-35588 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1191905">SUSE bug 1191905</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829378" comment="java-1.8.0-openjdk-1.8.0.312.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829379" comment="java-1.8.0-openjdk-accessibility-1.8.0.312.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829380" comment="java-1.8.0-openjdk-demo-1.8.0.312.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829381" comment="java-1.8.0-openjdk-devel-1.8.0.312.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829382" comment="java-1.8.0-openjdk-headless-1.8.0.312.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829383" comment="java-1.8.0-openjdk-javadoc-1.8.0.312.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829384" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.312.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829385" comment="java-1.8.0-openjdk-src-1.8.0.312.b07-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202135603" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-35603</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-35603" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-35603" ref_url="https://www.suse.com/security/cve/CVE-2021-35603" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009773.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1455-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GRBHNCR5KDMAYD3N3CDRPQWW3T6HIBNY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1480-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/443XZX47COH5AR2HZJWHHPFLGZ7FL7SI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VPYI4OMK4TI6UOJ2GUZST7WX2T6X7H6O/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3615-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VOJHYCWQ5VVLZ6J4OKIW2JS6MBT7VLM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3671-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CY22JAEBEGW675Z365MZJV47IFLWRYR4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3770-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XBTSKQFBRMEJYNB4FQDRGX4SHHFX2QSS/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 7u311, 8u301, 11.0.12, 17; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via TLS to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35603/">CVE-2021-35603 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35603">CVE-2021-35603 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1191906">SUSE bug 1191906</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829378" comment="java-1.8.0-openjdk-1.8.0.312.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829379" comment="java-1.8.0-openjdk-accessibility-1.8.0.312.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829380" comment="java-1.8.0-openjdk-demo-1.8.0.312.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829381" comment="java-1.8.0-openjdk-devel-1.8.0.312.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829382" comment="java-1.8.0-openjdk-headless-1.8.0.312.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829383" comment="java-1.8.0-openjdk-javadoc-1.8.0.312.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829384" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.312.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829385" comment="java-1.8.0-openjdk-src-1.8.0.312.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829386" comment="java-11-openjdk-11.0.13.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829387" comment="java-11-openjdk-demo-11.0.13.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829388" comment="java-11-openjdk-devel-11.0.13.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829389" comment="java-11-openjdk-headless-11.0.13.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829390" comment="java-11-openjdk-javadoc-11.0.13.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829391" comment="java-11-openjdk-javadoc-zip-11.0.13.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829392" comment="java-11-openjdk-jmods-11.0.13.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829393" comment="java-11-openjdk-src-11.0.13.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829394" comment="java-11-openjdk-static-libs-11.0.13.0.8-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213564" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3564</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3564" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3564" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3564" ref_url="https://www.suse.com/security/cve/CVE-2021-3564" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010290.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0366-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CFUCZRWH2IP7FOHVYO3TO3G5PFWQXLP6/" source="SUSE-SU"/>
    <description>
    A flaw double-free memory corruption in the Linux kernel HCI device initialization subsystem was found in the way user attach malicious HCI TTY Bluetooth device. A local user could use this flaw to crash the system. This flaw affects all the Linux kernel versions starting from 3.13.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3564/">CVE-2021-3564 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3564">CVE-2021-3564 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1186207">SUSE bug 1186207</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829589" comment="bpftool-3.10.0-1160.59.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829590" comment="kernel-3.10.0-1160.59.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829591" comment="kernel-abi-whitelists-3.10.0-1160.59.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829592" comment="kernel-debug-3.10.0-1160.59.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829595" comment="kernel-doc-3.10.0-1160.59.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829596" comment="kernel-headers-3.10.0-1160.59.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829597" comment="kernel-tools-3.10.0-1160.59.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829598" comment="kernel-tools-libs-3.10.0-1160.59.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829600" comment="perf-3.10.0-1160.59.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829601" comment="python-perf-3.10.0-1160.59.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213570" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3570</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3570" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3570" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3570" ref_url="https://www.suse.com/security/cve/CVE-2021-3570" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009496.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1102-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SID77H42G7M3XGNJH7J3TZVHCIZENMVJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3202-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WQJH6H27YAC2H2WM75ZCWCXIEK3AXNV3/" source="SUSE-SU"/>
    <description>
    A flaw was found in the ptp4l program of the linuxptp package. A missing length check when forwarding a PTP message between ports allows a remote attacker to cause an information leak, crash, or potentially remote code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. This flaw affects linuxptp versions before 3.1.1, before 2.0.1, before 1.9.3, before 1.8.1, before 1.7.1, before 1.6.1 and before 1.5.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3570/">CVE-2021-3570 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3570">CVE-2021-3570 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1187646">SUSE bug 1187646</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829204" comment="linuxptp-2.0-2.el7_9.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213573" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3573</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3573" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3573" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3573" ref_url="https://www.suse.com/security/cve/CVE-2021-3573" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3361-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009606.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2305-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BBGE5AIDX3NT46HPS2IYLFESAEFCTG6O/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2352-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2GU2EJMYFONMKDLPFYPCAPSOFXO5ZISM/" source="SUSE-SU"/>
    <description>
    A use-after-free in function hci_sock_bound_ioctl() of the Linux kernel HCI subsystem was found in the way user calls ioct HCIUNBLOCKADDR or other way triggers race condition of the call hci_unregister_dev() together with one of the calls hci_sock_blacklist_add(), hci_sock_blacklist_del(), hci_get_conn_info(), hci_get_auth_info(). A privileged local user could use this flaw to crash the system or escalate their privileges on the system. This flaw affects the Linux kernel versions prior to 5.13-rc5.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3573/">CVE-2021-3573 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3573">CVE-2021-3573 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1186666">SUSE bug 1186666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187054">SUSE bug 1187054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188172">SUSE bug 1188172</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829589" comment="bpftool-3.10.0-1160.59.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829590" comment="kernel-3.10.0-1160.59.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829591" comment="kernel-abi-whitelists-3.10.0-1160.59.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829592" comment="kernel-debug-3.10.0-1160.59.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829595" comment="kernel-doc-3.10.0-1160.59.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829596" comment="kernel-headers-3.10.0-1160.59.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829597" comment="kernel-tools-3.10.0-1160.59.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829598" comment="kernel-tools-libs-3.10.0-1160.59.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829600" comment="perf-3.10.0-1160.59.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829601" comment="python-perf-3.10.0-1160.59.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213621" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3621</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3621" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3621" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3621" ref_url="https://www.suse.com/security/cve/CVE-2021-3621" source="SUSE CVE"/>
		<reference ref_id="SUSE-RU-2021:3185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-September/020264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2941-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011887.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2941-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/32JUFL2YE6SH6B4KF762VVSDUIQI7ZKU/" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/pipermail/neuvector-updates/2023-November/000021.html" source="SUSE-SU"/>
    <description>
    A flaw was found in SSSD, where the sssctl command was vulnerable to shell command injection via the logs-fetch and cache-expire subcommands. This flaw allows an attacker to trick the root user into running a specially crafted sssctl command, such as via sudo, to gain root access. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3621/">CVE-2021-3621 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3621">CVE-2021-3621 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1189492">SUSE bug 1189492</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829286" comment="libipa_hbac-1.16.5-10.el7_9.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829287" comment="libipa_hbac-devel-1.16.5-10.el7_9.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829288" comment="libsss_autofs-1.16.5-10.el7_9.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829289" comment="libsss_certmap-1.16.5-10.el7_9.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829290" comment="libsss_certmap-devel-1.16.5-10.el7_9.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829291" comment="libsss_idmap-1.16.5-10.el7_9.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829292" comment="libsss_idmap-devel-1.16.5-10.el7_9.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829293" comment="libsss_nss_idmap-1.16.5-10.el7_9.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829294" comment="libsss_nss_idmap-devel-1.16.5-10.el7_9.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829295" comment="libsss_simpleifp-1.16.5-10.el7_9.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829296" comment="libsss_simpleifp-devel-1.16.5-10.el7_9.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829297" comment="libsss_sudo-1.16.5-10.el7_9.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829298" comment="python-libipa_hbac-1.16.5-10.el7_9.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829299" comment="python-libsss_nss_idmap-1.16.5-10.el7_9.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829300" comment="python-sss-1.16.5-10.el7_9.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829301" comment="python-sss-murmur-1.16.5-10.el7_9.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829302" comment="python-sssdconfig-1.16.5-10.el7_9.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829303" comment="sssd-1.16.5-10.el7_9.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829304" comment="sssd-ad-1.16.5-10.el7_9.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829305" comment="sssd-client-1.16.5-10.el7_9.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829306" comment="sssd-common-1.16.5-10.el7_9.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829307" comment="sssd-common-pac-1.16.5-10.el7_9.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829308" comment="sssd-dbus-1.16.5-10.el7_9.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829309" comment="sssd-ipa-1.16.5-10.el7_9.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829310" comment="sssd-kcm-1.16.5-10.el7_9.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829311" comment="sssd-krb5-1.16.5-10.el7_9.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829312" comment="sssd-krb5-common-1.16.5-10.el7_9.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829313" comment="sssd-ldap-1.16.5-10.el7_9.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829314" comment="sssd-libwbclient-1.16.5-10.el7_9.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829315" comment="sssd-libwbclient-devel-1.16.5-10.el7_9.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829316" comment="sssd-polkit-rules-1.16.5-10.el7_9.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829317" comment="sssd-proxy-1.16.5-10.el7_9.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829318" comment="sssd-tools-1.16.5-10.el7_9.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829319" comment="sssd-winbind-idmap-1.16.5-10.el7_9.10 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213622" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3622</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3622" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3622" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3622" ref_url="https://www.suse.com/security/cve/CVE-2021-3622" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3201-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009502.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1319-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZUSEK4W6EWPU4TCOU42FNZFNKGMKOJLZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3201-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5FC5F3EO3ROUN3SV32U3TNFWTKZ6B6TA/" source="SUSE-SU"/>
    <description>
    A flaw was found in the hivex library. This flaw allows an attacker to input a specially crafted Windows Registry (hive) file, which would cause hivex to recursively call the _get_children() function, leading to a stack overflow. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3622/">CVE-2021-3622 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3622">CVE-2021-3622 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1189060">SUSE bug 1189060</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829320" comment="hivex-1.3.10-6.12.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829321" comment="hivex-devel-1.3.10-6.12.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829322" comment="ocaml-hivex-1.3.10-6.12.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829323" comment="ocaml-hivex-devel-1.3.10-6.12.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829324" comment="perl-hivex-1.3.10-6.12.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829325" comment="python-hivex-1.3.10-6.12.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829326" comment="ruby-hivex-1.3.10-6.12.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213652" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3652</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3652" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3652" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3652" ref_url="https://www.suse.com/security/cve/CVE-2021-3652" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011338.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1211-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2ABU3X6UN2T7T6CM6IV43OUZVX56S5O3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2801-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/E6YUB5M37IM7IMXZ65R3QTW6TPO6B3OS/" source="SUSE-SU"/>
    <description>
    A flaw was found in 389-ds-base. If an asterisk is imported as password hashes, either accidentally or maliciously, then instead of being inactive, any password will successfully match during authentication. This flaw allows an attacker to successfully authenticate as a user whose password was disabled.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-3652/">CVE-2021-3652 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3652">CVE-2021-3652 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1188455">SUSE bug 1188455</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829361" comment="389-ds-base-1.3.10.2-13.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829362" comment="389-ds-base-devel-1.3.10.2-13.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829363" comment="389-ds-base-libs-1.3.10.2-13.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829364" comment="389-ds-base-snmp-1.3.10.2-13.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213653" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3653</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3653" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3653" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3653" ref_url="https://www.suse.com/security/cve/CVE-2021-3653" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3205-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009508.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3217-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-September/020289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1271-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TKO35W4C75JOXT46ZWC6Y4OFM23PXCNX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3179-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UNTKFNNFNHHX5QOW7C4SZXLANXGXQCYJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3205-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AUF5M64CM26PNMNFO4R3S57DLRRNSTVG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
    <description>
    A flaw was found in the KVM's AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the "int_ctl" field, this issue could allow a malicious L1 to enable AVIC support (Advanced Virtual Interrupt Controller) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape. This flaw affects Linux kernel versions prior to 5.14-rc7.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3653/">CVE-2021-3653 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3653">CVE-2021-3653 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1189399">SUSE bug 1189399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189420">SUSE bug 1189420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196914">SUSE bug 1196914</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829348" comment="bpftool-3.10.0-1160.45.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829349" comment="kernel-3.10.0-1160.45.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829350" comment="kernel-abi-whitelists-3.10.0-1160.45.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829351" comment="kernel-debug-3.10.0-1160.45.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829354" comment="kernel-doc-3.10.0-1160.45.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829355" comment="kernel-headers-3.10.0-1160.45.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829356" comment="kernel-tools-3.10.0-1160.45.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829357" comment="kernel-tools-libs-3.10.0-1160.45.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829359" comment="perf-3.10.0-1160.45.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829360" comment="python-perf-3.10.0-1160.45.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213656" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3656</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3656" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3656" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3656" ref_url="https://www.suse.com/security/cve/CVE-2021-3656" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3205-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009508.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3217-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-September/020289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1271-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TKO35W4C75JOXT46ZWC6Y4OFM23PXCNX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3179-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UNTKFNNFNHHX5QOW7C4SZXLANXGXQCYJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3205-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AUF5M64CM26PNMNFO4R3S57DLRRNSTVG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
    <description>
    A flaw was found in the KVM's AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the "virt_ext" field, this issue could allow a malicious L1 to disable both VMLOAD/VMSAVE intercepts and VLS (Virtual VMLOAD/VMSAVE) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3656/">CVE-2021-3656 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3656">CVE-2021-3656 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1189400">SUSE bug 1189400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189418">SUSE bug 1189418</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829348" comment="bpftool-3.10.0-1160.45.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829349" comment="kernel-3.10.0-1160.45.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829350" comment="kernel-abi-whitelists-3.10.0-1160.45.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829351" comment="kernel-debug-3.10.0-1160.45.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829354" comment="kernel-doc-3.10.0-1160.45.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829355" comment="kernel-headers-3.10.0-1160.45.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829356" comment="kernel-tools-3.10.0-1160.45.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829357" comment="kernel-tools-libs-3.10.0-1160.45.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829359" comment="perf-3.10.0-1160.45.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829360" comment="python-perf-3.10.0-1160.45.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213712" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3712</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3712" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3712" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3712" ref_url="https://www.suse.com/security/cve/CVE-2021-3712" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009410.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009412.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:304-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1151-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:52-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:53-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:55-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:56-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:57-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:660-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-September/020142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14792-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009347.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2966-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009420.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2966-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009418.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2968-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2995-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009423.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3019-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009467.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1188-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YXBKWFNVQ5GSDMIZHMMOGHRWWUOWZMJE/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1189-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JJMNXN2ETVF67Q4UKMXBSCF2LIA5HVUH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1248-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BTAMI3TGUD3BTSIO4MHIHCP2H4HJWRWI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1261-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UE6BERTPDDZTU2D7PHOS5VANHEPO7VG4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2827-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZXNTTGRCRZBMWGGU4UK4PHVAAZAFABI2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2830-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YOUNRN5SCBRRVEIYDG3G3PFLGVRXKDPG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2966-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZZPO3HVVYNS6WITBZKOQFXIVLJOK24MR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2994-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O65IINGUXDYQLSV7GD7SXFUKFY5WYUTA/" source="SUSE-SU"/>
    <description>
    ASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a strict requirement, ASN.1 strings that are parsed using OpenSSL's own "d2i" functions (and other similar parsing functions) as well as any string whose value has been set with the ASN1_STRING_set() function will additionally NUL terminate the byte array in the ASN1_STRING structure. However, it is possible for applications to directly construct valid ASN1_STRING structures which do not NUL terminate the byte array by directly setting the "data" and "length" fields in the ASN1_STRING array. This can also happen by using the ASN1_STRING_set0() function. Numerous OpenSSL functions that print ASN.1 data have been found to assume that the ASN1_STRING byte array will be NUL terminated, even though this is not guaranteed for strings that have been directly constructed. Where an application requests an ASN.1 structure to be printed, and where that ASN.1 structure contains ASN1_STRINGs that have been directly constructed by the application without NUL terminating the "data" field, then a read buffer overrun can occur. The same thing can also occur during name constraints processing of certificates (for example if a certificate has been directly constructed by the application instead of loading it via the OpenSSL parsing functions, and the certificate contains non NUL terminated ASN1_STRING structures). It can also occur in the X509_get1_email(), X509_REQ_get1_email() and X509_get1_ocsp() functions. If a malicious actor can cause an application to directly construct an ASN1_STRING and then process it through one of the affected OpenSSL functions then this issue could be hit. This might result in a crash (causing a Denial of Service attack). It could also result in the disclosure of private memory contents (such as private keys, or sensitive plaintext). Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k). Fixed in OpenSSL 1.0.2za (Affected 1.0.2-1.0.2y).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3712/">CVE-2021-3712 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3712">CVE-2021-3712 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1189521">SUSE bug 1189521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190129">SUSE bug 1190129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191640">SUSE bug 1191640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192100">SUSE bug 1192100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192787">SUSE bug 1192787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194948">SUSE bug 1194948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225628">SUSE bug 1225628</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829522" comment="openssl-1.0.2k-23.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829523" comment="openssl-devel-1.0.2k-23.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829524" comment="openssl-libs-1.0.2k-23.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829525" comment="openssl-perl-1.0.2k-23.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829526" comment="openssl-static-1.0.2k-23.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213715" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3715</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3715" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3715" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3715" ref_url="https://www.suse.com/security/cve/CVE-2021-3715" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3748-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-November/020791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3754-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1460-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MLGTNISZMAYBWA26GZHGZYQYWHM3VSZI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1477-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J325P6NPH7BF7P7B3LO6FGQNCTFNGKEW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3641-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RDPFUBRGNGPD3YZQTYFCSNGZKH75ZKUP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3655-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ET2XZDZ74SKULHCBR4GCFG3KJRMSHJQQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3675-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YKWZ52CYLL6JHU7XBR4T2MCMZQTD4U57/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
    <description>
    A flaw was found in the "Routing decision" classifier in the Linux kernel's Traffic Control networking subsystem in the way it handled changing of classification filters, leading to a use-after-free condition. This flaw allows unprivileged local users to escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3715/">CVE-2021-3715 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3715">CVE-2021-3715 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1190349">SUSE bug 1190349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190350">SUSE bug 1190350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196722">SUSE bug 1196722</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829327" comment="bpftool-3.10.0-1160.42.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829328" comment="kernel-3.10.0-1160.42.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829329" comment="kernel-abi-whitelists-3.10.0-1160.42.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829330" comment="kernel-debug-3.10.0-1160.42.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829333" comment="kernel-doc-3.10.0-1160.42.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829334" comment="kernel-headers-3.10.0-1160.42.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829335" comment="kernel-tools-3.10.0-1160.42.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829336" comment="kernel-tools-libs-3.10.0-1160.42.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829338" comment="perf-3.10.0-1160.42.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829339" comment="python-perf-3.10.0-1160.42.2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213752" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3752</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3752" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3752" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3752" ref_url="https://www.suse.com/security/cve/CVE-2021-3752" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:57-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:80-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:750-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3389-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-October/020461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3684-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-November/020771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1357-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SS5B6JL55TTUNHHOGTFHK5JQ6EZOF7ZV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1365-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JSK2K2OLYKIFCAMBX4QB7AGV6SKS3BTM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3338-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H64LCXMISTZ7YB7R4ABO2Y73X23DJFXU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3387-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MHXVHXC6JGHDS7W6EJQF3JKAPVYH3ES5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3447-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IAN74FTXJ7PFHCBV6YMLTPNW7VFYCPFV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
    <description>
    A use-after-free flaw was found in the Linux kernel's Bluetooth subsystem in the way user calls connect to the socket and disconnect simultaneously due to a race condition. This flaw allows a user to crash the system or escalate their privileges. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3752/">CVE-2021-3752 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3752">CVE-2021-3752 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1190023">SUSE bug 1190023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190432">SUSE bug 1190432</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829589" comment="bpftool-3.10.0-1160.59.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829590" comment="kernel-3.10.0-1160.59.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829591" comment="kernel-abi-whitelists-3.10.0-1160.59.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829592" comment="kernel-debug-3.10.0-1160.59.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829595" comment="kernel-doc-3.10.0-1160.59.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829596" comment="kernel-headers-3.10.0-1160.59.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829597" comment="kernel-tools-3.10.0-1160.59.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829598" comment="kernel-tools-libs-3.10.0-1160.59.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829600" comment="perf-3.10.0-1160.59.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829601" comment="python-perf-3.10.0-1160.59.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202137576" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-37576</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-37576" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37576" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-37576" ref_url="https://www.suse.com/security/cve/CVE-2021-37576" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:660-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-September/020142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2746-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009357.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009359.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1142-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BN7VVRY72WW4I46CQCFBKXWN6CBHKRXO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2645-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2WMUIJQF7RUSXDRXECLPMVDE6YOS5WIN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2687-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GDBOWLDJQ4K7JKRHIM7AOCKTJO5BY6C5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
    <description>
    arch/powerpc/kvm/book3s_rtas.c in the Linux kernel through 5.13.5 on the powerpc platform allows KVM guest OS users to cause host OS memory corruption via rtas_args.nargs, aka CID-f62f3c20647e.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37576/">CVE-2021-37576 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37576">CVE-2021-37576 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1188838">SUSE bug 1188838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188842">SUSE bug 1188842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190276">SUSE bug 1190276</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829348" comment="bpftool-3.10.0-1160.45.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829349" comment="kernel-3.10.0-1160.45.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829350" comment="kernel-abi-whitelists-3.10.0-1160.45.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829351" comment="kernel-debug-3.10.0-1160.45.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829354" comment="kernel-doc-3.10.0-1160.45.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829355" comment="kernel-headers-3.10.0-1160.45.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829356" comment="kernel-tools-3.10.0-1160.45.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829357" comment="kernel-tools-libs-3.10.0-1160.45.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829359" comment="perf-3.10.0-1160.45.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829360" comment="python-perf-3.10.0-1160.45.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202137750" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-37750</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-37750" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-37750" ref_url="https://www.suse.com/security/cve/CVE-2021-37750" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009607.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:417-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:419-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:52-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:53-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:55-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:56-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:57-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:80-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:83-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:750-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3454-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3454-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018557.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1411-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MHCRV6M5JSBYECPOLQFCUXBYMZFVXKCU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3454-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4LN5FUC4TZVB7GKLTDOBR7UQD6W4262A/" source="SUSE-SU"/>
    <description>
    The Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.18.5 and 1.19.x before 1.19.3 has a NULL pointer dereference in kdc/do_tgs_req.c via a FAST inner body that lacks a server field.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-37750/">CVE-2021-37750 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37750">CVE-2021-37750 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1189929">SUSE bug 1189929</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829442" comment="krb5-devel-1.15.1-51.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829443" comment="krb5-libs-1.15.1-51.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829444" comment="krb5-pkinit-1.15.1-51.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829445" comment="krb5-server-1.15.1-51.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829446" comment="krb5-server-ldap-1.15.1-51.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829447" comment="krb5-workstation-1.15.1-51.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829448" comment="libkadm5-1.15.1-51.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202138493" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-38493</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-38493" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38493" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-38493" ref_url="https://www.suse.com/security/cve/CVE-2021-38493" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:4150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009928.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1635-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YVVRA5LXBWWHGQPQLJYZRWPCG4E2L7WQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4150-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OQOGFW6JISWI3PQR7AHD3OEX3SPELMFB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Mozilla developers reported memory safety bugs present in Firefox 91 and Firefox ESR 78.13. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR &lt; 78.14, Thunderbird &lt; 78.14, and Firefox &lt; 92.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38493/">CVE-2021-38493 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38493">CVE-2021-38493 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1190269">SUSE bug 1190269</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829341" comment="firefox-78.14.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829340" comment="thunderbird-78.14.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202138496" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-38496</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-38496" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38496" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-38496" ref_url="https://www.suse.com/security/cve/CVE-2021-38496" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3446-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009595.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009928.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1367-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PT6Q6PTCHFH4I5YOWCIRD4QLX24AR73I/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1635-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YVVRA5LXBWWHGQPQLJYZRWPCG4E2L7WQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3331-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/INI43FXSUMMTXNS6C5B5BMMQ7XCYCZAV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3451-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NOOPOXVWYJPXPZIC3SK7MZFMWSQEQNPG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4150-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OQOGFW6JISWI3PQR7AHD3OEX3SPELMFB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    During operations on MessageTasks, a task may have been removed while it was still scheduled, resulting in memory corruption and a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 78.15, Thunderbird &lt; 91.2, Firefox ESR &lt; 91.2, Firefox ESR &lt; 78.15, and Firefox &lt; 93.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38496/">CVE-2021-38496 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38496">CVE-2021-38496 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1191332">SUSE bug 1191332</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829342" comment="firefox-91.2.0-4.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829369" comment="thunderbird-91.2.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202138497" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-38497</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-38497" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38497" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-38497" ref_url="https://www.suse.com/security/cve/CVE-2021-38497" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3446-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009595.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009928.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1367-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PT6Q6PTCHFH4I5YOWCIRD4QLX24AR73I/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1635-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YVVRA5LXBWWHGQPQLJYZRWPCG4E2L7WQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3331-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/INI43FXSUMMTXNS6C5B5BMMQ7XCYCZAV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3451-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NOOPOXVWYJPXPZIC3SK7MZFMWSQEQNPG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4150-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OQOGFW6JISWI3PQR7AHD3OEX3SPELMFB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Through use of reportValidity() and window.open(), a plain-text validation message could have been overlaid on another origin, leading to possible user confusion and spoofing attacks. This vulnerability affects Firefox &lt; 93, Thunderbird &lt; 91.2, and Firefox ESR &lt; 91.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38497/">CVE-2021-38497 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38497">CVE-2021-38497 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1191332">SUSE bug 1191332</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829342" comment="firefox-91.2.0-4.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829369" comment="thunderbird-91.2.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202138498" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-38498</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-38498" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38498" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-38498" ref_url="https://www.suse.com/security/cve/CVE-2021-38498" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3446-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009595.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009928.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1367-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PT6Q6PTCHFH4I5YOWCIRD4QLX24AR73I/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1635-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YVVRA5LXBWWHGQPQLJYZRWPCG4E2L7WQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3331-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/INI43FXSUMMTXNS6C5B5BMMQ7XCYCZAV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3451-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NOOPOXVWYJPXPZIC3SK7MZFMWSQEQNPG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4150-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OQOGFW6JISWI3PQR7AHD3OEX3SPELMFB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    During process shutdown, a document could have caused a use-after-free of a languages service object, leading to memory corruption and a potentially exploitable crash. This vulnerability affects Firefox &lt; 93, Thunderbird &lt; 91.2, and Firefox ESR &lt; 91.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38498/">CVE-2021-38498 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38498">CVE-2021-38498 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1191332">SUSE bug 1191332</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829342" comment="firefox-91.2.0-4.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829369" comment="thunderbird-91.2.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202138500" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-38500</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-38500" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38500" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-38500" ref_url="https://www.suse.com/security/cve/CVE-2021-38500" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3446-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009595.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009928.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1367-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PT6Q6PTCHFH4I5YOWCIRD4QLX24AR73I/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1635-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YVVRA5LXBWWHGQPQLJYZRWPCG4E2L7WQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3331-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/INI43FXSUMMTXNS6C5B5BMMQ7XCYCZAV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3451-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NOOPOXVWYJPXPZIC3SK7MZFMWSQEQNPG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4150-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OQOGFW6JISWI3PQR7AHD3OEX3SPELMFB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Mozilla developers reported memory safety bugs present in Firefox 92 and Firefox ESR 91.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird &lt; 78.15, Thunderbird &lt; 91.2, Firefox ESR &lt; 91.2, Firefox ESR &lt; 78.15, and Firefox &lt; 93.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38500/">CVE-2021-38500 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38500">CVE-2021-38500 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1191332">SUSE bug 1191332</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829342" comment="firefox-91.2.0-4.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829369" comment="thunderbird-91.2.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202138501" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-38501</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-38501" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38501" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-38501" ref_url="https://www.suse.com/security/cve/CVE-2021-38501" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3446-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009595.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009928.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1367-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PT6Q6PTCHFH4I5YOWCIRD4QLX24AR73I/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1635-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YVVRA5LXBWWHGQPQLJYZRWPCG4E2L7WQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3331-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/INI43FXSUMMTXNS6C5B5BMMQ7XCYCZAV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3451-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NOOPOXVWYJPXPZIC3SK7MZFMWSQEQNPG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4150-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OQOGFW6JISWI3PQR7AHD3OEX3SPELMFB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Mozilla developers reported memory safety bugs present in Firefox 92 and Firefox ESR 91.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 93, Thunderbird &lt; 91.2, and Firefox ESR &lt; 91.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38501/">CVE-2021-38501 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38501">CVE-2021-38501 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1191332">SUSE bug 1191332</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829342" comment="firefox-91.2.0-4.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829369" comment="thunderbird-91.2.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202138502" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-38502</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-38502" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38502" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-38502" ref_url="https://www.suse.com/security/cve/CVE-2021-38502" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:4150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009928.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1635-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YVVRA5LXBWWHGQPQLJYZRWPCG4E2L7WQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4150-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OQOGFW6JISWI3PQR7AHD3OEX3SPELMFB/" source="SUSE-SU"/>
    <description>
    Thunderbird ignored the configuration to require STARTTLS security for an SMTP connection. A MITM could perform a downgrade attack to intercept transmitted messages, or could take control of the authenticated session to execute SMTP commands chosen by the MITM. If an unprotected authentication method was configured, the MITM could obtain the authentication credentials, too. This vulnerability affects Thunderbird &lt; 91.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38502/">CVE-2021-38502 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38502">CVE-2021-38502 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829369" comment="thunderbird-91.2.0-1.el7_9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202138503" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-38503</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-38503" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38503" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-38503" ref_url="https://www.suse.com/security/cve/CVE-2021-38503" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3651-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009928.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1635-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YVVRA5LXBWWHGQPQLJYZRWPCG4E2L7WQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3745-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HANTLKSTN557DZ2MTOXFS2TQFKRJMZNC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4150-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OQOGFW6JISWI3PQR7AHD3OEX3SPELMFB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    The iframe sandbox rules were not correctly applied to XSLT stylesheets, allowing an iframe to bypass restrictions such as executing scripts or navigating the top-level frame. This vulnerability affects Firefox &lt; 94, Thunderbird &lt; 91.3, and Firefox ESR &lt; 91.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38503/">CVE-2021-38503 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38503">CVE-2021-38503 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1192250">SUSE bug 1192250</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829403" comment="firefox-91.3.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829404" comment="thunderbird-91.3.0-2.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202138504" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-38504</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-38504" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38504" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-38504" ref_url="https://www.suse.com/security/cve/CVE-2021-38504" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3651-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009928.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1635-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YVVRA5LXBWWHGQPQLJYZRWPCG4E2L7WQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3745-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HANTLKSTN557DZ2MTOXFS2TQFKRJMZNC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4150-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OQOGFW6JISWI3PQR7AHD3OEX3SPELMFB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    When interacting with an HTML input element's file picker dialog with webkitdirectory set, a use-after-free could have resulted, leading to memory corruption and a potentially exploitable crash. This vulnerability affects Firefox &lt; 94, Thunderbird &lt; 91.3, and Firefox ESR &lt; 91.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38504/">CVE-2021-38504 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38504">CVE-2021-38504 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1192250">SUSE bug 1192250</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829403" comment="firefox-91.3.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829404" comment="thunderbird-91.3.0-2.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202138506" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-38506</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-38506" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38506" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-38506" ref_url="https://www.suse.com/security/cve/CVE-2021-38506" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3651-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009928.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1635-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YVVRA5LXBWWHGQPQLJYZRWPCG4E2L7WQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3745-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HANTLKSTN557DZ2MTOXFS2TQFKRJMZNC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4150-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OQOGFW6JISWI3PQR7AHD3OEX3SPELMFB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Through a series of navigations, Firefox could have entered fullscreen mode without notification or warning to the user. This could lead to spoofing attacks on the browser UI including phishing. This vulnerability affects Firefox &lt; 94, Thunderbird &lt; 91.3, and Firefox ESR &lt; 91.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38506/">CVE-2021-38506 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38506">CVE-2021-38506 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1192250">SUSE bug 1192250</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829403" comment="firefox-91.3.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829404" comment="thunderbird-91.3.0-2.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202138507" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-38507</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-38507" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38507" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-38507" ref_url="https://www.suse.com/security/cve/CVE-2021-38507" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3651-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009928.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1635-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YVVRA5LXBWWHGQPQLJYZRWPCG4E2L7WQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3745-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HANTLKSTN557DZ2MTOXFS2TQFKRJMZNC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4150-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OQOGFW6JISWI3PQR7AHD3OEX3SPELMFB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    The Opportunistic Encryption feature of HTTP2 (RFC 8164) allows a connection to be transparently upgraded to TLS while retaining the visual properties of an HTTP connection, including being same-origin with unencrypted connections on port 80. However, if a second encrypted port on the same IP address (e.g. port 8443) did not opt-in to opportunistic encryption; a network attacker could forward a connection from the browser to port 443 to port 8443, causing the browser to treat the content of port 8443 as same-origin with HTTP. This was resolved by disabling the Opportunistic Encryption feature, which had low usage. This vulnerability affects Firefox &lt; 94, Thunderbird &lt; 91.3, and Firefox ESR &lt; 91.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38507/">CVE-2021-38507 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38507">CVE-2021-38507 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1192250">SUSE bug 1192250</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829403" comment="firefox-91.3.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829404" comment="thunderbird-91.3.0-2.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202138508" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-38508</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-38508" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38508" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-38508" ref_url="https://www.suse.com/security/cve/CVE-2021-38508" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3651-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009928.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1635-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YVVRA5LXBWWHGQPQLJYZRWPCG4E2L7WQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3745-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HANTLKSTN557DZ2MTOXFS2TQFKRJMZNC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4150-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OQOGFW6JISWI3PQR7AHD3OEX3SPELMFB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    By displaying a form validity message in the correct location at the same time as a permission prompt (such as for geolocation), the validity message could have obscured the prompt, resulting in the user potentially being tricked into granting the permission. This vulnerability affects Firefox &lt; 94, Thunderbird &lt; 91.3, and Firefox ESR &lt; 91.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38508/">CVE-2021-38508 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38508">CVE-2021-38508 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1192250">SUSE bug 1192250</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829403" comment="firefox-91.3.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829404" comment="thunderbird-91.3.0-2.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202138509" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-38509</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-38509" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38509" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-38509" ref_url="https://www.suse.com/security/cve/CVE-2021-38509" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3651-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009928.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1635-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YVVRA5LXBWWHGQPQLJYZRWPCG4E2L7WQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3745-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HANTLKSTN557DZ2MTOXFS2TQFKRJMZNC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4150-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OQOGFW6JISWI3PQR7AHD3OEX3SPELMFB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Due to an unusual sequence of attacker-controlled events, a Javascript alert() dialog with arbitrary (although unstyled) contents could be displayed over top an uncontrolled webpage of the attacker's choosing. This vulnerability affects Firefox &lt; 94, Thunderbird &lt; 91.3, and Firefox ESR &lt; 91.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38509/">CVE-2021-38509 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38509">CVE-2021-38509 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1192250">SUSE bug 1192250</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829403" comment="firefox-91.3.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829404" comment="thunderbird-91.3.0-2.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202139139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-39139</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-39139" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39139" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-39139" ref_url="https://www.suse.com/security/cve/CVE-2021-39139" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3476-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-October/020532.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1401-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PVLPNQBYDFG66KQSVPOIZDRX3AQEQYGU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3476-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VPBFWNADZPOCG7HFCC7XX4AVNU7NTF4P/" source="SUSE-SU"/>
    <description>
    XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. A user is only affected if using the version out of the box with JDK 1.7u21 or below. However, this scenario can be adjusted easily to an external Xalan that works regardless of the version of the Java runtime. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39139/">CVE-2021-39139 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39139">CVE-2021-39139 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1189798">SUSE bug 1189798</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829395" comment="xstream-1.3.1-16.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829396" comment="xstream-javadoc-1.3.1-16.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202139140" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-39140</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-39140" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39140" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-39140" ref_url="https://www.suse.com/security/cve/CVE-2021-39140" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3476-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-October/020532.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1401-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PVLPNQBYDFG66KQSVPOIZDRX3AQEQYGU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3476-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VPBFWNADZPOCG7HFCC7XX4AVNU7NTF4P/" source="SUSE-SU"/>
    <description>
    XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to allocate 100% CPU time on the target system depending on CPU type or parallel execution of such a payload resulting in a denial of service only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-39140/">CVE-2021-39140 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39140">CVE-2021-39140 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1189798">SUSE bug 1189798</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829395" comment="xstream-1.3.1-16.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829396" comment="xstream-javadoc-1.3.1-16.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202139141" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-39141</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-39141" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39141" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-39141" ref_url="https://www.suse.com/security/cve/CVE-2021-39141" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3476-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-October/020532.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1401-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PVLPNQBYDFG66KQSVPOIZDRX3AQEQYGU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3476-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VPBFWNADZPOCG7HFCC7XX4AVNU7NTF4P/" source="SUSE-SU"/>
    <description>
    XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39141/">CVE-2021-39141 at SUSE</cve>
	<cve impact="high" cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39141">CVE-2021-39141 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1189798">SUSE bug 1189798</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829395" comment="xstream-1.3.1-16.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829396" comment="xstream-javadoc-1.3.1-16.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202139144" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-39144</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-39144" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39144" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-39144" ref_url="https://www.suse.com/security/cve/CVE-2021-39144" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3476-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-October/020532.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1401-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PVLPNQBYDFG66KQSVPOIZDRX3AQEQYGU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3476-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VPBFWNADZPOCG7HFCC7XX4AVNU7NTF4P/" source="SUSE-SU"/>
    <description>
    XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker has sufficient rights to execute commands of the host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39144/">CVE-2021-39144 at SUSE</cve>
	<cve impact="high" cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39144">CVE-2021-39144 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1189798">SUSE bug 1189798</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829395" comment="xstream-1.3.1-16.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829396" comment="xstream-javadoc-1.3.1-16.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202139145" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-39145</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-39145" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39145" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-39145" ref_url="https://www.suse.com/security/cve/CVE-2021-39145" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3476-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-October/020532.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1401-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PVLPNQBYDFG66KQSVPOIZDRX3AQEQYGU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3476-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VPBFWNADZPOCG7HFCC7XX4AVNU7NTF4P/" source="SUSE-SU"/>
    <description>
    XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39145/">CVE-2021-39145 at SUSE</cve>
	<cve impact="high" cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39145">CVE-2021-39145 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1189798">SUSE bug 1189798</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829395" comment="xstream-1.3.1-16.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829396" comment="xstream-javadoc-1.3.1-16.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202139146" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-39146</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-39146" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39146" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-39146" ref_url="https://www.suse.com/security/cve/CVE-2021-39146" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3476-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-October/020532.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1401-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PVLPNQBYDFG66KQSVPOIZDRX3AQEQYGU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3476-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VPBFWNADZPOCG7HFCC7XX4AVNU7NTF4P/" source="SUSE-SU"/>
    <description>
    XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39146/">CVE-2021-39146 at SUSE</cve>
	<cve impact="high" cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39146">CVE-2021-39146 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1189798">SUSE bug 1189798</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829395" comment="xstream-1.3.1-16.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829396" comment="xstream-javadoc-1.3.1-16.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202139147" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-39147</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-39147" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39147" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-39147" ref_url="https://www.suse.com/security/cve/CVE-2021-39147" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3476-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-October/020532.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1401-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PVLPNQBYDFG66KQSVPOIZDRX3AQEQYGU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3476-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VPBFWNADZPOCG7HFCC7XX4AVNU7NTF4P/" source="SUSE-SU"/>
    <description>
    XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39147/">CVE-2021-39147 at SUSE</cve>
	<cve impact="high" cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39147">CVE-2021-39147 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1189798">SUSE bug 1189798</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829395" comment="xstream-1.3.1-16.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829396" comment="xstream-javadoc-1.3.1-16.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202139148" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-39148</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-39148" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39148" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-39148" ref_url="https://www.suse.com/security/cve/CVE-2021-39148" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3476-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-October/020532.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1401-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PVLPNQBYDFG66KQSVPOIZDRX3AQEQYGU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3476-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VPBFWNADZPOCG7HFCC7XX4AVNU7NTF4P/" source="SUSE-SU"/>
    <description>
    XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39148/">CVE-2021-39148 at SUSE</cve>
	<cve impact="high" cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39148">CVE-2021-39148 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1189798">SUSE bug 1189798</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829395" comment="xstream-1.3.1-16.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829396" comment="xstream-javadoc-1.3.1-16.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202139149" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-39149</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-39149" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39149" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-39149" ref_url="https://www.suse.com/security/cve/CVE-2021-39149" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3476-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-October/020532.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1401-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PVLPNQBYDFG66KQSVPOIZDRX3AQEQYGU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3476-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VPBFWNADZPOCG7HFCC7XX4AVNU7NTF4P/" source="SUSE-SU"/>
    <description>
    XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39149/">CVE-2021-39149 at SUSE</cve>
	<cve impact="high" cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39149">CVE-2021-39149 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1189798">SUSE bug 1189798</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829395" comment="xstream-1.3.1-16.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829396" comment="xstream-javadoc-1.3.1-16.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202139150" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-39150</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-39150" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39150" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-39150" ref_url="https://www.suse.com/security/cve/CVE-2021-39150" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3476-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-October/020532.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1401-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PVLPNQBYDFG66KQSVPOIZDRX3AQEQYGU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3476-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VPBFWNADZPOCG7HFCC7XX4AVNU7NTF4P/" source="SUSE-SU"/>
    <description>
    XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to request data from internal resources that are not publicly available only by manipulating the processed input stream with a Java runtime version 14 to 8. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.18.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-39150/">CVE-2021-39150 at SUSE</cve>
	<cve impact="high" cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39150">CVE-2021-39150 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1189798">SUSE bug 1189798</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829395" comment="xstream-1.3.1-16.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829396" comment="xstream-javadoc-1.3.1-16.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202139151" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-39151</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-39151" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39151" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-39151" ref_url="https://www.suse.com/security/cve/CVE-2021-39151" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3476-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-October/020532.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1401-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PVLPNQBYDFG66KQSVPOIZDRX3AQEQYGU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3476-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VPBFWNADZPOCG7HFCC7XX4AVNU7NTF4P/" source="SUSE-SU"/>
    <description>
    XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39151/">CVE-2021-39151 at SUSE</cve>
	<cve impact="high" cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39151">CVE-2021-39151 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1189798">SUSE bug 1189798</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829395" comment="xstream-1.3.1-16.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829396" comment="xstream-javadoc-1.3.1-16.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202139152" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-39152</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-39152" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39152" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-39152" ref_url="https://www.suse.com/security/cve/CVE-2021-39152" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3476-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-October/020532.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1401-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PVLPNQBYDFG66KQSVPOIZDRX3AQEQYGU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3476-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VPBFWNADZPOCG7HFCC7XX4AVNU7NTF4P/" source="SUSE-SU"/>
    <description>
    XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to request data from internal resources that are not publicly available only by manipulating the processed input stream with a Java runtime version 14 to 8. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.18.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-39152/">CVE-2021-39152 at SUSE</cve>
	<cve impact="high" cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39152">CVE-2021-39152 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1189798">SUSE bug 1189798</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829395" comment="xstream-1.3.1-16.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829396" comment="xstream-javadoc-1.3.1-16.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202139153" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-39153</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-39153" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39153" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-39153" ref_url="https://www.suse.com/security/cve/CVE-2021-39153" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3476-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-October/020532.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1401-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PVLPNQBYDFG66KQSVPOIZDRX3AQEQYGU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3476-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VPBFWNADZPOCG7HFCC7XX4AVNU7NTF4P/" source="SUSE-SU"/>
    <description>
    XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream, if using the version out of the box with Java runtime version 14 to 8 or with JavaFX installed. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39153/">CVE-2021-39153 at SUSE</cve>
	<cve impact="high" cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39153">CVE-2021-39153 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1189798">SUSE bug 1189798</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829395" comment="xstream-1.3.1-16.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829396" comment="xstream-javadoc-1.3.1-16.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202139154" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-39154</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-39154" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39154" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-39154" ref_url="https://www.suse.com/security/cve/CVE-2021-39154" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3476-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-October/020532.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1401-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PVLPNQBYDFG66KQSVPOIZDRX3AQEQYGU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3476-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VPBFWNADZPOCG7HFCC7XX4AVNU7NTF4P/" source="SUSE-SU"/>
    <description>
    XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39154/">CVE-2021-39154 at SUSE</cve>
	<cve impact="high" cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39154">CVE-2021-39154 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1189798">SUSE bug 1189798</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829395" comment="xstream-1.3.1-16.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829396" comment="xstream-javadoc-1.3.1-16.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202139275" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-39275</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-39275" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39275" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-39275" ref_url="https://www.suse.com/security/cve/CVE-2021-39275" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3335-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009646.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1438-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H4TEWXB67RJ5IPKHZI6FBQ67CJEHGI3B/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3522-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JKKOECDBM5767TKS4AX32R26YLJDYTJT/" source="SUSE-SU"/>
    <description>
    ap_escape_quotes() may write beyond the end of a buffer when given malicious input. No included modules pass untrusted data to these functions, but third-party / external modules may. This issue affects Apache HTTP Server 2.4.48 and earlier.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-39275/">CVE-2021-39275 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39275">CVE-2021-39275 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1190666">SUSE bug 1190666</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829529" comment="httpd-2.4.6-97.el7_9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829530" comment="httpd-devel-2.4.6-97.el7_9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829531" comment="httpd-manual-2.4.6-97.el7_9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829532" comment="httpd-tools-2.4.6-97.el7_9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829533" comment="mod_ldap-2.4.6-97.el7_9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829534" comment="mod_proxy_html-2.4.6-97.el7_9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829535" comment="mod_session-2.4.6-97.el7_9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829536" comment="mod_ssl-2.4.6-97.el7_9.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20214008" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-4008</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-4008" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4008" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-4008" ref_url="https://www.suse.com/security/cve/CVE-2021-4008" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14863-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009900.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1587-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7UNP5L7TX3N3YWCIHNMKXPR4ENMV7RHI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4070-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FDLLTDD27WXQ6WFOOCQT3PBFXVFGSQA5/" source="SUSE-SU"/>
    <description>
    A flaw was found in xorg-x11-server in versions before 21.1.2 and before 1.20.14. An out-of-bounds access can occur in the SProcRenderCompositeGlyphs function. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4008/">CVE-2021-4008 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4008">CVE-2021-4008 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1193030">SUSE bug 1193030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194308">SUSE bug 1194308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196656">SUSE bug 1196656</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829495" comment="xorg-x11-server-Xdmx-1.20.4-17.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829496" comment="xorg-x11-server-Xephyr-1.20.4-17.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829497" comment="xorg-x11-server-Xnest-1.20.4-17.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829498" comment="xorg-x11-server-Xorg-1.20.4-17.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829499" comment="xorg-x11-server-Xvfb-1.20.4-17.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829500" comment="xorg-x11-server-Xwayland-1.20.4-17.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829501" comment="xorg-x11-server-common-1.20.4-17.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829502" comment="xorg-x11-server-devel-1.20.4-17.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829503" comment="xorg-x11-server-source-1.20.4-17.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20214009" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-4009</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-4009" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4009" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-4009" ref_url="https://www.suse.com/security/cve/CVE-2021-4009" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:4119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4136-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4136-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010237.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1606-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RT7VTD4IRUBMN3UEKSRY3O2T37GG2HLZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UZYVYA6ZP6W2WXZYY7EDCELC7CJ7FSVU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4136-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T3CAZLVDCJF5S7L74XKKD3UFRYGUKDJ6/" source="SUSE-SU"/>
    <description>
    A flaw was found in xorg-x11-server in versions before 21.1.2 and before 1.20.14. An out-of-bounds access can occur in the SProcXFixesCreatePointerBarrier function. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4009/">CVE-2021-4009 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4009">CVE-2021-4009 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1190487">SUSE bug 1190487</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829495" comment="xorg-x11-server-Xdmx-1.20.4-17.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829496" comment="xorg-x11-server-Xephyr-1.20.4-17.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829497" comment="xorg-x11-server-Xnest-1.20.4-17.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829498" comment="xorg-x11-server-Xorg-1.20.4-17.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829499" comment="xorg-x11-server-Xvfb-1.20.4-17.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829500" comment="xorg-x11-server-Xwayland-1.20.4-17.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829501" comment="xorg-x11-server-common-1.20.4-17.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829502" comment="xorg-x11-server-devel-1.20.4-17.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829503" comment="xorg-x11-server-source-1.20.4-17.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20214010" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-4010</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-4010" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4010" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-4010" ref_url="https://www.suse.com/security/cve/CVE-2021-4010" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:4122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4136-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4136-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010237.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1606-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RT7VTD4IRUBMN3UEKSRY3O2T37GG2HLZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UZYVYA6ZP6W2WXZYY7EDCELC7CJ7FSVU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4136-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T3CAZLVDCJF5S7L74XKKD3UFRYGUKDJ6/" source="SUSE-SU"/>
    <description>
    A flaw was found in xorg-x11-server in versions before 21.1.2 and before 1.20.14. An out-of-bounds access can occur in the SProcScreenSaverSuspend function. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4010/">CVE-2021-4010 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4010">CVE-2021-4010 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1190488">SUSE bug 1190488</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829495" comment="xorg-x11-server-Xdmx-1.20.4-17.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829496" comment="xorg-x11-server-Xephyr-1.20.4-17.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829497" comment="xorg-x11-server-Xnest-1.20.4-17.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829498" comment="xorg-x11-server-Xorg-1.20.4-17.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829499" comment="xorg-x11-server-Xvfb-1.20.4-17.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829500" comment="xorg-x11-server-Xwayland-1.20.4-17.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829501" comment="xorg-x11-server-common-1.20.4-17.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829502" comment="xorg-x11-server-devel-1.20.4-17.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829503" comment="xorg-x11-server-source-1.20.4-17.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20214011" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-4011</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-4011" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4011" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-4011" ref_url="https://www.suse.com/security/cve/CVE-2021-4011" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4136-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4136-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010237.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1606-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RT7VTD4IRUBMN3UEKSRY3O2T37GG2HLZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UZYVYA6ZP6W2WXZYY7EDCELC7CJ7FSVU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4136-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T3CAZLVDCJF5S7L74XKKD3UFRYGUKDJ6/" source="SUSE-SU"/>
    <description>
    A flaw was found in xorg-x11-server in versions before 21.1.2 and before 1.20.14. An out-of-bounds access can occur in the SwapCreateRegister function. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4011/">CVE-2021-4011 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4011">CVE-2021-4011 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1190489">SUSE bug 1190489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196656">SUSE bug 1196656</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829495" comment="xorg-x11-server-Xdmx-1.20.4-17.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829496" comment="xorg-x11-server-Xephyr-1.20.4-17.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829497" comment="xorg-x11-server-Xnest-1.20.4-17.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829498" comment="xorg-x11-server-Xorg-1.20.4-17.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829499" comment="xorg-x11-server-Xvfb-1.20.4-17.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829500" comment="xorg-x11-server-Xwayland-1.20.4-17.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829501" comment="xorg-x11-server-common-1.20.4-17.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829502" comment="xorg-x11-server-devel-1.20.4-17.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829503" comment="xorg-x11-server-source-1.20.4-17.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202140211" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-40211</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-40211" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40211" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-40211" ref_url="https://www.suse.com/security/cve/CVE-2021-40211" source="SUSE CVE"/>
    <description>
    An issue was discovered with ImageMagick 7.1.0-4 via Division by zero in function ReadEnhMetaFile of coders/emf.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-40211/">CVE-2021-40211 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-40211">CVE-2021-40211 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830357" comment="ImageMagick-6.9.10.68-7.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830358" comment="ImageMagick-c++-6.9.10.68-7.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830359" comment="ImageMagick-c++-devel-6.9.10.68-7.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830360" comment="ImageMagick-devel-6.9.10.68-7.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830361" comment="ImageMagick-doc-6.9.10.68-7.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830362" comment="ImageMagick-perl-6.9.10.68-7.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20214028" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-4028</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-4028" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4028" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-4028" ref_url="https://www.suse.com/security/cve/CVE-2021-4028" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0295-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021589.html" source="SUSE-SU"/>
    <description>
    A flaw in the Linux kernel's implementation of RDMA communications manager listener code allowed an attacker with local access to setup a socket to listen on a high port allowing for a list element to be used after free. Given the ability to execute code, a local attacker could leverage this use-after-free to crash the system or possibly escalate privileges on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4028/">CVE-2021-4028 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4028">CVE-2021-4028 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1193167">SUSE bug 1193167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193529">SUSE bug 1193529</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829638" comment="bpftool-3.10.0-1160.62.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829639" comment="kernel-3.10.0-1160.62.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829640" comment="kernel-abi-whitelists-3.10.0-1160.62.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829641" comment="kernel-debug-3.10.0-1160.62.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829644" comment="kernel-doc-3.10.0-1160.62.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829645" comment="kernel-headers-3.10.0-1160.62.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829646" comment="kernel-tools-3.10.0-1160.62.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829647" comment="kernel-tools-libs-3.10.0-1160.62.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829649" comment="perf-3.10.0-1160.62.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829650" comment="python-perf-3.10.0-1160.62.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20214034" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-4034</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-4034" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4034" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-4034" ref_url="https://www.suse.com/security/cve/CVE-2021-4034" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010075.html" source="SUSE-SU"/>
		<reference ref_id="TID000020564" ref_url="https://www.suse.com/support/kb/doc/?id=000020564" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0190-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SGEROI6PUOTOXKFIH2MPKUQ3PI6VWLXQ/" source="SUSE-SU"/>
    <description>
    A local privilege escalation vulnerability was found on polkit's pkexec utility. The pkexec application is a setuid tool designed to allow unprivileged users to run commands as privileged users according predefined policies. The current version of pkexec doesn't handle the calling parameters count correctly and ends trying to execute environment variables as commands. An attacker can leverage this by crafting environment variables in such a way it'll induce pkexec to execute arbitrary code. When successfully executed the attack can cause a local privilege escalation given unprivileged users administrative rights on the target machine.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4034/">CVE-2021-4034 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4034">CVE-2021-4034 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1194568">SUSE bug 1194568</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195125">SUSE bug 1195125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195136">SUSE bug 1195136</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195246">SUSE bug 1195246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195265">SUSE bug 1195265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195278">SUSE bug 1195278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195528">SUSE bug 1195528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195541">SUSE bug 1195541</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196165">SUSE bug 1196165</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196388">SUSE bug 1196388</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225668">SUSE bug 1225668</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829542" comment="polkit-0.112-26.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829543" comment="polkit-devel-0.112-26.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829544" comment="polkit-docs-0.112-26.el7_9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202140438" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-40438</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-40438" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40438" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-40438" ref_url="https://www.suse.com/security/cve/CVE-2021-40438" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3335-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009646.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1438-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H4TEWXB67RJ5IPKHZI6FBQ67CJEHGI3B/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3522-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JKKOECDBM5767TKS4AX32R26YLJDYTJT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14708-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5RZA3QZZUTFNFHPJESYW5I7GDZGWBEQF/" source="SUSE-SU"/>
    <description>
    A crafted request uri-path can cause mod_proxy to forward the request to an origin server choosen by the remote user. This issue affects Apache HTTP Server 2.4.48 and earlier.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-40438/">CVE-2021-40438 at SUSE</cve>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-40438">CVE-2021-40438 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1190703">SUSE bug 1190703</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829370" comment="httpd-2.4.6-97.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829371" comment="httpd-devel-2.4.6-97.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829372" comment="httpd-manual-2.4.6-97.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829373" comment="httpd-tools-2.4.6-97.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829374" comment="mod_ldap-2.4.6-97.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829375" comment="mod_proxy_html-2.4.6-97.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829376" comment="mod_session-2.4.6-97.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829377" comment="mod_ssl-2.4.6-97.el7_9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20214083" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-4083</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-4083" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4083" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-4083" ref_url="https://www.suse.com/security/cve/CVE-2021-4083" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:31-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:36-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0289-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010228.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0552-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010290.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0169-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S44U3IKMS3KZS626YQ5ZYDHA2HLKQNER/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0198-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JVCSEXTJ2SI3QLMCUUQNNUT3HNZQJIML/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0366-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CFUCZRWH2IP7FOHVYO3TO3G5PFWQXLP6/" source="SUSE-SU"/>
    <description>
    A read-after-free memory flaw was found in the Linux kernel's garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system. This flaw affects Linux kernel versions prior to 5.16-rc4.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4083/">CVE-2021-4083 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4083">CVE-2021-4083 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1193727">SUSE bug 1193727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194460">SUSE bug 1194460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196722">SUSE bug 1196722</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829638" comment="bpftool-3.10.0-1160.62.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829639" comment="kernel-3.10.0-1160.62.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829640" comment="kernel-abi-whitelists-3.10.0-1160.62.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829641" comment="kernel-debug-3.10.0-1160.62.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829644" comment="kernel-doc-3.10.0-1160.62.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829645" comment="kernel-headers-3.10.0-1160.62.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829646" comment="kernel-tools-3.10.0-1160.62.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829647" comment="kernel-tools-libs-3.10.0-1160.62.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829649" comment="perf-3.10.0-1160.62.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829650" comment="python-perf-3.10.0-1160.62.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20214091" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-4091</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-4091" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4091" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-4091" ref_url="https://www.suse.com/security/cve/CVE-2021-4091" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011430.html" source="SUSE-SU"/>
    <description>
    A double-free was found in the way 389-ds-base handles virtual attributes context in persistent searches. An attacker could send a series of search requests, forcing the server to behave unexpectedly, and crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4091/">CVE-2021-4091 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4091">CVE-2021-4091 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1195324">SUSE bug 1195324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829607" comment="389-ds-base-1.3.10.2-15.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829608" comment="389-ds-base-devel-1.3.10.2-15.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829609" comment="389-ds-base-libs-1.3.10.2-15.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829610" comment="389-ds-base-snmp-1.3.10.2-15.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202141133" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-41133</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-41133" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41133" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-41133" ref_url="https://www.suse.com/security/cve/CVE-2021-41133" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012403.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1400-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O63MYUSWLBDBHWT5CBFN7YN5WUMCT6NS/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3472-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QXL4FA3WICXGFNYWHOG3GKOXZERBN6TL/" source="SUSE-SU"/>
    <description>
    Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. In versions prior to 1.10.4 and 1.12.0, Flatpak apps with direct access to AF_UNIX sockets such as those used by Wayland, Pipewire or pipewire-pulse can trick portals and other host-OS services into treating the Flatpak app as though it was an ordinary, non-sandboxed host-OS process. They can do this by manipulating the VFS using recent mount-related syscalls that are not blocked by Flatpak's denylist seccomp filter, in order to substitute a crafted `/.flatpak-info` or make that file disappear entirely. Flatpak apps that act as clients for AF_UNIX sockets such as those used by Wayland, Pipewire or pipewire-pulse can escalate the privileges that the corresponding services will believe the Flatpak app has. Note that protocols that operate entirely over the D-Bus session bus (user bus), system bus or accessibility bus are not affected by this. This is due to the use of a proxy process `xdg-dbus-proxy`, whose VFS cannot be manipulated by the Flatpak app, when interacting with these buses. Patches exist for versions 1.10.4 and 1.12.0, and as of time of publication, a patch for version 1.8.2 is being planned. There are no workarounds aside from upgrading to a patched version.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-41133/">CVE-2021-41133 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41133">CVE-2021-41133 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1191507">SUSE bug 1191507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191937">SUSE bug 1191937</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829399" comment="flatpak-1.0.9-12.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829400" comment="flatpak-builder-1.0.0-12.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829401" comment="flatpak-devel-1.0.9-12.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829402" comment="flatpak-libs-1.0.9-12.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202141159" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-41159</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-41159" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41159" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-41159" ref_url="https://www.suse.com/security/cve/CVE-2021-41159" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:2890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2993-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012063.html" source="SUSE-SU"/>
    <description>
    FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. All FreeRDP clients prior to version 2.4.1 using gateway connections (`/gt:rpc`) fail to validate input data. A malicious gateway might allow client memory to be written out of bounds. This issue has been resolved in version 2.4.1. If you are unable to update then use `/gt:http` rather than /gt:rdp connections if possible or use a direct connection without a gateway.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-41159/">CVE-2021-41159 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41159">CVE-2021-41159 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1191895">SUSE bug 1191895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829405" comment="freerdp-2.1.1-5.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829406" comment="freerdp-devel-2.1.1-5.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829407" comment="freerdp-libs-2.1.1-5.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829408" comment="libwinpr-2.1.1-5.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829409" comment="libwinpr-devel-2.1.1-5.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202141160" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-41160</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-41160" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41160" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-41160" ref_url="https://www.suse.com/security/cve/CVE-2021-41160" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:2993-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012063.html" source="SUSE-SU"/>
    <description>
    FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. In affected versions a malicious server might trigger out of bound writes in a connected client. Connections using GDI or SurfaceCommands to send graphics updates to the client might send `0` width/height or out of bound rectangles to trigger out of bound writes. With `0` width or heigth the memory allocation will be `0` but the missing bounds checks allow writing to the pointer at this (not allocated) region. This issue has been patched in FreeRDP 2.4.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-41160/">CVE-2021-41160 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41160">CVE-2021-41160 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1191895">SUSE bug 1191895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829405" comment="freerdp-2.1.1-5.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829406" comment="freerdp-devel-2.1.1-5.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829407" comment="freerdp-libs-2.1.1-5.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829408" comment="libwinpr-2.1.1-5.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829409" comment="libwinpr-devel-2.1.1-5.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20214140" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-4140</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-4140" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4140" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-4140" ref_url="https://www.suse.com/security/cve/CVE-2021-4140" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0136-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0137-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021405.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LO2K2OYJXIHKCXT4ZI6S7RGIOS27RIOY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0199-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VJHDOBPPHGJWIXDJDMLZUCHBBMTQIEIO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    It was possible to construct specific XSLT markup that would be able to bypass an iframe sandbox. This vulnerability affects Firefox ESR &lt; 91.5, Firefox &lt; 96, and Thunderbird &lt; 91.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-4140/">CVE-2021-4140 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4140">CVE-2021-4140 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1194547">SUSE bug 1194547</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829527" comment="firefox-91.5.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829528" comment="thunderbird-91.5.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20214155" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-4155</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-4155" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4155" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-4155" ref_url="https://www.suse.com/security/cve/CVE-2021-4155" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012771.html" source="SUSE-SU"/>
    <description>
    A data leak flaw was found in the way XFS_IOC_ALLOCSP IOCTL in the XFS filesystem allowed for size increase of files with unaligned size. A local attacker could use this flaw to leak data on the XFS filesystem otherwise not accessible to them.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-4155/">CVE-2021-4155 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4155">CVE-2021-4155 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1194272">SUSE bug 1194272</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199255">SUSE bug 1199255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200084">SUSE bug 1200084</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829589" comment="bpftool-3.10.0-1160.59.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829590" comment="kernel-3.10.0-1160.59.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829591" comment="kernel-abi-whitelists-3.10.0-1160.59.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829592" comment="kernel-debug-3.10.0-1160.59.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829595" comment="kernel-doc-3.10.0-1160.59.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829596" comment="kernel-headers-3.10.0-1160.59.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829597" comment="kernel-tools-3.10.0-1160.59.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829598" comment="kernel-tools-libs-3.10.0-1160.59.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829600" comment="perf-3.10.0-1160.59.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829601" comment="python-perf-3.10.0-1160.59.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202141617" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-41617</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-41617" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41617" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-41617" ref_url="https://www.suse.com/security/cve/CVE-2021-41617" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009807.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010415.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3950-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BEK24NI33V77MMNQQN72LO2RGAF23X76/" source="SUSE-SU"/>
    <description>
    sshd in OpenSSH 6.2 through 8.x before 8.8, when certain non-default configurations are used, allows privilege escalation because supplemental groups are not initialized as expected. Helper programs for AuthorizedKeysCommand and AuthorizedPrincipalsCommand may run with privileges associated with group memberships of the sshd process, if the configuration specifies running the command as a different user.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-41617/">CVE-2021-41617 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41617">CVE-2021-41617 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1190975">SUSE bug 1190975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193497">SUSE bug 1193497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196721">SUSE bug 1196721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200782">SUSE bug 1200782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205056">SUSE bug 1205056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212247">SUSE bug 1212247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212281">SUSE bug 1212281</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829423" comment="openssh-7.4p1-22.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829424" comment="openssh-askpass-7.4p1-22.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829425" comment="openssh-cavs-7.4p1-22.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829426" comment="openssh-clients-7.4p1-22.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829427" comment="openssh-keycat-7.4p1-22.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829428" comment="openssh-ldap-7.4p1-22.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829429" comment="openssh-server-7.4p1-22.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829430" comment="openssh-server-sysvinit-7.4p1-22.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829431" comment="pam_ssh_agent_auth-0.10.3-2.22.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202142097" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-42097</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-42097" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42097" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-42097" ref_url="https://www.suse.com/security/cve/CVE-2021-42097" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1436-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DSDRER3UF4R57ILYOQY7J63PNAP2LA73/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1452-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FJE7PQHJDJVNG4MP75G5GY65ABFE2RAP/" source="SUSE-SU"/>
    <description>
    GNU Mailman before 2.1.35 may allow remote Privilege Escalation. A csrf_token value is not specific to a single user account. An attacker can obtain a value within the context of an unprivileged user account, and then use that value in a CSRF attack against an admin (e.g., for account takeover).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-42097/">CVE-2021-42097 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42097">CVE-2021-42097 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1191960">SUSE bug 1191960</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829454" comment="mailman-2.1.15-30.el7_9.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202142574" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-42574</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-42574" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42574" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-42574" ref_url="https://www.suse.com/security/cve/CVE-2021-42574" source="SUSE CVE"/>
		<reference ref_id="TID000020535" ref_url="https://www.suse.com/support/kb/doc/?id=000020535" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Bidirectional Algorithm in the Unicode Specification through 14.0. It permits the visual reordering of characters via control sequences, which can be used to craft source code that renders different logic than the logical ordering of tokens ingested by compilers and interpreters. Adversaries can leverage this to encode source code for compilers accepting Unicode such that targeted vulnerabilities are introduced invisibly to human reviewers. NOTE: the Unicode Consortium offers the following alternative approach to presenting this concern. An issue is noted in the nature of international text that can affect applications that implement support for The Unicode Standard and the Unicode Bidirectional Algorithm (all versions). Due to text display behavior when text includes left-to-right and right-to-left characters, the visual order of tokens may be different from their logical order. Additionally, control characters needed to fully support the requirements of bidirectional text can further obfuscate the logical order of tokens. Unless mitigated, an adversary could craft source code such that the ordering of tokens perceived by human reviewers does not match what will be processed by a compiler/interpreter/etc. The Unicode Consortium has documented this class of vulnerability in its document, Unicode Technical Report #36, Unicode Security Considerations. The Unicode Consortium also provides guidance on mitigations for this class of issues in Unicode Technical Standard #39, Unicode Security Mechanisms, and in Unicode Standard Annex #31, Unicode Identifier and Pattern Syntax. Also, the BIDI specification allows applications to tailor the implementation in ways that can mitigate misleading visual reordering in program text; see HL4 in Unicode Standard Annex #9, Unicode Bidirectional Algorithm.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-08"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42574/">CVE-2021-42574 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42574">CVE-2021-42574 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1191820">SUSE bug 1191820</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829397" comment="binutils-2.27-44.base.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829398" comment="binutils-devel-2.27-44.base.el7_9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202142739" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-42739</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-42739" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42739" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-42739" ref_url="https://www.suse.com/security/cve/CVE-2021-42739" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3748-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-November/020791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3754-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0295-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010184.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1460-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MLGTNISZMAYBWA26GZHGZYQYWHM3VSZI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1477-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J325P6NPH7BF7P7B3LO6FGQNCTFNGKEW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3641-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RDPFUBRGNGPD3YZQTYFCSNGZKH75ZKUP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3655-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ET2XZDZ74SKULHCBR4GCFG3KJRMSHJQQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3675-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YKWZ52CYLL6JHU7XBR4T2MCMZQTD4U57/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
    <description>
    The firewire subsystem in the Linux kernel through 5.14.13 has a buffer overflow related to drivers/media/firewire/firedtv-avc.c and drivers/media/firewire/firedtv-ci.c, because avc_ca_pmt mishandles bounds checking.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42739/">CVE-2021-42739 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42739">CVE-2021-42739 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1184673">SUSE bug 1184673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192036">SUSE bug 1192036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196722">SUSE bug 1196722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196914">SUSE bug 1196914</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829509" comment="bpftool-3.10.0-1160.53.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829510" comment="kernel-3.10.0-1160.53.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829511" comment="kernel-abi-whitelists-3.10.0-1160.53.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829512" comment="kernel-debug-3.10.0-1160.53.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829515" comment="kernel-doc-3.10.0-1160.53.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829516" comment="kernel-headers-3.10.0-1160.53.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829517" comment="kernel-tools-3.10.0-1160.53.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829518" comment="kernel-tools-libs-3.10.0-1160.53.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829520" comment="perf-3.10.0-1160.53.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829521" comment="python-perf-3.10.0-1160.53.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202143527" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-43527</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-43527" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43527" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-43527" ref_url="https://www.suse.com/security/cve/CVE-2021-43527" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011642.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1622-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011644.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1709-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:80-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3934-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009847.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011639.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3934-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SZRKUBO5D2JZTQ5VCQBSEGXEMFC4D5FB/" source="SUSE-SU"/>
    <description>
    NSS (Network Security Services) versions prior to 3.73 or 3.68.1 ESR are vulnerable to a heap overflow when handling DER-encoded DSA or RSA-PSS signatures. Applications using NSS for handling signatures encoded within CMS, S/MIME, PKCS \#7, or PKCS \#12 are likely to be impacted. Applications using NSS for certificate validation or other TLS, X.509, OCSP or CRL functionality may be impacted, depending on how they configure NSS. *Note: This vulnerability does NOT impact Mozilla Firefox.* However, email clients and PDF viewers that use NSS for signature verification, such as Thunderbird, LibreOffice, Evolution and Evince are believed to be impacted. This vulnerability affects NSS &lt; 3.73 and NSS &lt; 3.68.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43527/">CVE-2021-43527 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43527">CVE-2021-43527 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1193170">SUSE bug 1193170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193331">SUSE bug 1193331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193378">SUSE bug 1193378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194288">SUSE bug 1194288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199301">SUSE bug 1199301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225630">SUSE bug 1225630</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829449" comment="nss-3.67.0-4.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829450" comment="nss-devel-3.67.0-4.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829451" comment="nss-pkcs11-devel-3.67.0-4.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829452" comment="nss-sysinit-3.67.0-4.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829453" comment="nss-tools-3.67.0-4.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202143528" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-43528</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-43528" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43528" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-43528" ref_url="https://www.suse.com/security/cve/CVE-2021-43528" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:4150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009928.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1635-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YVVRA5LXBWWHGQPQLJYZRWPCG4E2L7WQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4150-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OQOGFW6JISWI3PQR7AHD3OEX3SPELMFB/" source="SUSE-SU"/>
    <description>
    Thunderbird unexpectedly enabled JavaScript in the composition area. The JavaScript execution context was limited to this area and did not receive chrome-level privileges, but could be used as a stepping stone to further an attack with other vulnerabilities. This vulnerability affects Thunderbird &lt; 91.4.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-43528/">CVE-2021-43528 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43528">CVE-2021-43528 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1193485">SUSE bug 1193485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829456" comment="thunderbird-91.4.0-3.el7_9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202143536" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-43536</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-43536" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43536" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-43536" ref_url="https://www.suse.com/security/cve/CVE-2021-43536" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3993-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3995-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/021069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009928.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1575-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FLEQM2K3ZCTFEKZJ54PNOJLGV3BVHXBF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1635-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YVVRA5LXBWWHGQPQLJYZRWPCG4E2L7WQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3993-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6E3G2TI2MHN6NYMUDWREZ5V2SGZW63DZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4150-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OQOGFW6JISWI3PQR7AHD3OEX3SPELMFB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Under certain circumstances, asynchronous functions could have caused a navigation to fail but expose the target URL. This vulnerability affects Thunderbird &lt; 91.4.0, Firefox ESR &lt; 91.4.0, and Firefox &lt; 95.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43536/">CVE-2021-43536 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43536">CVE-2021-43536 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1193485">SUSE bug 1193485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829455" comment="firefox-91.4.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829456" comment="thunderbird-91.4.0-3.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202143537" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-43537</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-43537" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43537" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-43537" ref_url="https://www.suse.com/security/cve/CVE-2021-43537" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3993-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3995-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/021069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009928.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1575-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FLEQM2K3ZCTFEKZJ54PNOJLGV3BVHXBF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1635-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YVVRA5LXBWWHGQPQLJYZRWPCG4E2L7WQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3993-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6E3G2TI2MHN6NYMUDWREZ5V2SGZW63DZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4150-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OQOGFW6JISWI3PQR7AHD3OEX3SPELMFB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    An incorrect type conversion of sizes from 64bit to 32bit integers allowed an attacker to corrupt memory leading to a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 91.4.0, Firefox ESR &lt; 91.4.0, and Firefox &lt; 95.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43537/">CVE-2021-43537 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43537">CVE-2021-43537 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1193485">SUSE bug 1193485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829455" comment="firefox-91.4.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829456" comment="thunderbird-91.4.0-3.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202143538" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-43538</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-43538" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43538" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-43538" ref_url="https://www.suse.com/security/cve/CVE-2021-43538" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3993-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3995-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/021069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009928.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1575-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FLEQM2K3ZCTFEKZJ54PNOJLGV3BVHXBF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1635-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YVVRA5LXBWWHGQPQLJYZRWPCG4E2L7WQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3993-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6E3G2TI2MHN6NYMUDWREZ5V2SGZW63DZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4150-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OQOGFW6JISWI3PQR7AHD3OEX3SPELMFB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    By misusing a race in our notification code, an attacker could have forcefully hidden the notification for pages that had received full screen and pointer lock access, which could have been used for spoofing attacks. This vulnerability affects Thunderbird &lt; 91.4.0, Firefox ESR &lt; 91.4.0, and Firefox &lt; 95.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43538/">CVE-2021-43538 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43538">CVE-2021-43538 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1193485">SUSE bug 1193485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829455" comment="firefox-91.4.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829456" comment="thunderbird-91.4.0-3.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202143539" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-43539</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-43539" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43539" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-43539" ref_url="https://www.suse.com/security/cve/CVE-2021-43539" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3993-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3995-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/021069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009928.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1575-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FLEQM2K3ZCTFEKZJ54PNOJLGV3BVHXBF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1635-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YVVRA5LXBWWHGQPQLJYZRWPCG4E2L7WQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3993-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6E3G2TI2MHN6NYMUDWREZ5V2SGZW63DZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4150-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OQOGFW6JISWI3PQR7AHD3OEX3SPELMFB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Failure to correctly record the location of live pointers across wasm instance calls resulted in a GC occurring within the call not tracing those live pointers. This could have led to a use-after-free causing a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 91.4.0, Firefox ESR &lt; 91.4.0, and Firefox &lt; 95.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43539/">CVE-2021-43539 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43539">CVE-2021-43539 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1193485">SUSE bug 1193485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829455" comment="firefox-91.4.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829456" comment="thunderbird-91.4.0-3.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202143541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-43541</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-43541" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43541" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-43541" ref_url="https://www.suse.com/security/cve/CVE-2021-43541" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3993-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3995-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/021069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009928.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1575-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FLEQM2K3ZCTFEKZJ54PNOJLGV3BVHXBF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1635-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YVVRA5LXBWWHGQPQLJYZRWPCG4E2L7WQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3993-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6E3G2TI2MHN6NYMUDWREZ5V2SGZW63DZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4150-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OQOGFW6JISWI3PQR7AHD3OEX3SPELMFB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    When invoking protocol handlers for external protocols, a supplied parameter URL containing spaces was not properly escaped. This vulnerability affects Thunderbird &lt; 91.4.0, Firefox ESR &lt; 91.4.0, and Firefox &lt; 95.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-43541/">CVE-2021-43541 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43541">CVE-2021-43541 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1193485">SUSE bug 1193485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829455" comment="firefox-91.4.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829456" comment="thunderbird-91.4.0-3.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202143542" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-43542</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-43542" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43542" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-43542" ref_url="https://www.suse.com/security/cve/CVE-2021-43542" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3993-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3995-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/021069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009928.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1575-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FLEQM2K3ZCTFEKZJ54PNOJLGV3BVHXBF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1635-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YVVRA5LXBWWHGQPQLJYZRWPCG4E2L7WQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3993-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6E3G2TI2MHN6NYMUDWREZ5V2SGZW63DZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4150-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OQOGFW6JISWI3PQR7AHD3OEX3SPELMFB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Using XMLHttpRequest, an attacker could have identified installed applications by probing error messages for loading external protocols. This vulnerability affects Thunderbird &lt; 91.4.0, Firefox ESR &lt; 91.4.0, and Firefox &lt; 95.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-43542/">CVE-2021-43542 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43542">CVE-2021-43542 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1193485">SUSE bug 1193485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829455" comment="firefox-91.4.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829456" comment="thunderbird-91.4.0-3.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202143543" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-43543</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-43543" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43543" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-43543" ref_url="https://www.suse.com/security/cve/CVE-2021-43543" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3993-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3995-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/021069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009928.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1575-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FLEQM2K3ZCTFEKZJ54PNOJLGV3BVHXBF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1635-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YVVRA5LXBWWHGQPQLJYZRWPCG4E2L7WQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3993-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6E3G2TI2MHN6NYMUDWREZ5V2SGZW63DZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4150-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OQOGFW6JISWI3PQR7AHD3OEX3SPELMFB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Documents loaded with the CSP sandbox directive could have escaped the sandbox's script restriction by embedding additional content. This vulnerability affects Thunderbird &lt; 91.4.0, Firefox ESR &lt; 91.4.0, and Firefox &lt; 95.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-43543/">CVE-2021-43543 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43543">CVE-2021-43543 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1193485">SUSE bug 1193485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829455" comment="firefox-91.4.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829456" comment="thunderbird-91.4.0-3.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202143545" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-43545</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-43545" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43545" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-43545" ref_url="https://www.suse.com/security/cve/CVE-2021-43545" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3993-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3995-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/021069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009928.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1575-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FLEQM2K3ZCTFEKZJ54PNOJLGV3BVHXBF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1635-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YVVRA5LXBWWHGQPQLJYZRWPCG4E2L7WQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3993-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6E3G2TI2MHN6NYMUDWREZ5V2SGZW63DZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4150-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OQOGFW6JISWI3PQR7AHD3OEX3SPELMFB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Using the Location API in a loop could have caused severe application hangs and crashes. This vulnerability affects Thunderbird &lt; 91.4.0, Firefox ESR &lt; 91.4.0, and Firefox &lt; 95.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-43545/">CVE-2021-43545 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43545">CVE-2021-43545 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1193485">SUSE bug 1193485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829455" comment="firefox-91.4.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829456" comment="thunderbird-91.4.0-3.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202143546" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-43546</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-43546" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43546" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-43546" ref_url="https://www.suse.com/security/cve/CVE-2021-43546" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3993-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3995-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/021069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009928.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1575-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FLEQM2K3ZCTFEKZJ54PNOJLGV3BVHXBF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1635-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YVVRA5LXBWWHGQPQLJYZRWPCG4E2L7WQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3993-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6E3G2TI2MHN6NYMUDWREZ5V2SGZW63DZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4150-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OQOGFW6JISWI3PQR7AHD3OEX3SPELMFB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    It was possible to recreate previous cursor spoofing attacks against users with a zoomed native cursor. This vulnerability affects Thunderbird &lt; 91.4.0, Firefox ESR &lt; 91.4.0, and Firefox &lt; 95.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-43546/">CVE-2021-43546 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43546">CVE-2021-43546 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1193485">SUSE bug 1193485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829455" comment="firefox-91.4.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829456" comment="thunderbird-91.4.0-3.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202144142" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-44142</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-44142" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44142" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-44142" ref_url="https://www.suse.com/security/cve/CVE-2021-44142" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1151-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010192.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010200.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:282-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0361-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010209.html" source="SUSE-SU"/>
		<reference ref_id="TID000020570" ref_url="https://www.suse.com/support/kb/doc/?id=000020570" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0283-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/72ZRNFZ3DE3TJA7HFCVV476YJN6I4B5M/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0284-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K7LELM65YZ36YQVKZDECL77ZYNXAWR6D/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0287-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RB554CLNYEUAEMABV3LV3T5P4BYDLS7H/" source="SUSE-SU"/>
    <description>
    The Samba vfs_fruit module uses extended file attributes (EA, xattr) to provide "...enhanced compatibility with Apple SMB clients and interoperability with a Netatalk 3 AFP fileserver." Samba versions prior to 4.13.17, 4.14.12 and 4.15.5 with vfs_fruit configured allow out-of-bounds heap read and write via specially crafted extended file attributes. A remote attacker with write access to extended file attributes can execute arbitrary code with the privileges of smbd, typically root.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.9/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-44142/">CVE-2021-44142 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44142">CVE-2021-44142 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1194859">SUSE bug 1194859</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195611">SUSE bug 1195611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196455">SUSE bug 1196455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199646">SUSE bug 1199646</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829553" comment="ctdb-4.10.16-18.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829554" comment="ctdb-tests-4.10.16-18.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829555" comment="libsmbclient-4.10.16-18.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829556" comment="libsmbclient-devel-4.10.16-18.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829557" comment="libwbclient-4.10.16-18.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829558" comment="libwbclient-devel-4.10.16-18.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829559" comment="samba-4.10.16-18.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829560" comment="samba-client-4.10.16-18.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829561" comment="samba-client-libs-4.10.16-18.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829562" comment="samba-common-4.10.16-18.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829563" comment="samba-common-libs-4.10.16-18.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829564" comment="samba-common-tools-4.10.16-18.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829565" comment="samba-dc-4.10.16-18.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829566" comment="samba-dc-libs-4.10.16-18.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829567" comment="samba-devel-4.10.16-18.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829568" comment="samba-krb5-printing-4.10.16-18.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829569" comment="samba-libs-4.10.16-18.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829570" comment="samba-pidl-4.10.16-18.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829571" comment="samba-python-4.10.16-18.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829572" comment="samba-python-test-4.10.16-18.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829573" comment="samba-test-4.10.16-18.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829574" comment="samba-test-libs-4.10.16-18.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829575" comment="samba-vfs-glusterfs-4.10.16-18.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829576" comment="samba-winbind-4.10.16-18.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829577" comment="samba-winbind-clients-4.10.16-18.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829578" comment="samba-winbind-krb5-locator-4.10.16-18.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829579" comment="samba-winbind-modules-4.10.16-18.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202144227" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-44227</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-44227" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44227" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-44227" ref_url="https://www.suse.com/security/cve/CVE-2021-44227" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:1886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011201.html" source="SUSE-SU"/>
    <description>
    In GNU Mailman before 2.1.38, a list member or moderator can get a CSRF token and craft an admin request (using that token) to set a new admin password or make other changes.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-44227/">CVE-2021-44227 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44227">CVE-2021-44227 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1193316">SUSE bug 1193316</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829454" comment="mailman-2.1.15-30.el7_9.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202144790" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-44790</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-44790" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44790" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-44790" ref_url="https://www.suse.com/security/cve/CVE-2021-44790" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0091-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010231.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0091-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LQX4BVMFKUTV6DOPDTL26H5DQJJFUPXZ/" source="SUSE-SU"/>
    <description>
    A carefully crafted request body can cause a buffer overflow in the mod_lua multipart parser (r:parsebody() called from Lua scripts). The Apache httpd team is not aware of an exploit for the vulnerabilty though it might be possible to craft one. This issue affects Apache HTTP Server 2.4.51 and earlier.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-44790/">CVE-2021-44790 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44790">CVE-2021-44790 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1193942">SUSE bug 1193942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204730">SUSE bug 1204730</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829529" comment="httpd-2.4.6-97.el7_9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829530" comment="httpd-devel-2.4.6-97.el7_9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829531" comment="httpd-manual-2.4.6-97.el7_9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829532" comment="httpd-tools-2.4.6-97.el7_9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829533" comment="mod_ldap-2.4.6-97.el7_9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829534" comment="mod_proxy_html-2.4.6-97.el7_9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829535" comment="mod_session-2.4.6-97.el7_9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829536" comment="mod_ssl-2.4.6-97.el7_9.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202145417" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-45417</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-45417" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45417" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-45417" ref_url="https://www.suse.com/security/cve/CVE-2021-45417" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0150-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0150-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZEHXIWSI3LT73BE7YAXGYKT4HEXYVR3X/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0150-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IYI5YPQZJPKLABADGETPRMD6KTGPUFAZ/" source="SUSE-SU"/>
    <description>
    AIDE before 0.17.4 allows local users to obtain root privileges via crafted file metadata (such as XFS extended attributes or tmpfs ACLs), because of a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-45417/">CVE-2021-45417 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45417">CVE-2021-45417 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1194735">SUSE bug 1194735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196390">SUSE bug 1196390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225074">SUSE bug 1225074</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829580" comment="aide-0.15.1-13.el7_9.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202145463" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-45463</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-45463" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45463" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-45463" ref_url="https://www.suse.com/security/cve/CVE-2021-45463" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:4193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009960.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4209-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G3NMUTGIH3QYFBHM25LC7HLI7HKVOYCU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4210-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RX6HXJTBZCMRDZYVM6S3UTQCHL44WX35/" source="SUSE-SU"/>
    <description>
    load_cache in GEGL before 0.4.34 allows shell expansion when a pathname in a constructed command line is not escaped or filtered. This is caused by use of the system library function for execution of the ImageMagick convert fallback in magick-load. NOTE: GEGL releases before 0.4.34 are used in GIMP releases before 2.10.30; however, this does not imply that GIMP builds enable the vulnerable feature.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-45463/">CVE-2021-45463 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45463">CVE-2021-45463 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1194045">SUSE bug 1194045</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829537" comment="gegl-0.2.0-19.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829538" comment="gegl-devel-0.2.0-19.el7_9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202145960" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-45960</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-45960" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45960" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-45960" ref_url="https://www.suse.com/security/cve/CVE-2021-45960" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:58-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:60-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:80-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:31-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:36-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0178-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5POFOWWCWJ3SLTEUIQRMKXQB4GOECNOP/" source="SUSE-SU"/>
    <description>
    In Expat (aka libexpat) before 2.4.3, a left shift by 29 (or more) places in the storeAtts function in xmlparse.c can lead to realloc misbehavior (e.g., allocating too few bytes, or only freeing memory).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-45960/">CVE-2021-45960 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45960">CVE-2021-45960 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1194251">SUSE bug 1194251</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829635" comment="expat-2.1.0-14.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829636" comment="expat-devel-2.1.0-14.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829637" comment="expat-static-2.1.0-14.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146143" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46143</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46143" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46143" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46143" ref_url="https://www.suse.com/security/cve/CVE-2021-46143" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:58-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:60-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:80-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:31-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:36-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0178-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5POFOWWCWJ3SLTEUIQRMKXQB4GOECNOP/" source="SUSE-SU"/>
    <description>
    In doProlog in xmlparse.c in Expat (aka libexpat) before 2.4.3, an integer overflow exists for m_groupSize.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-46143/">CVE-2021-46143 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46143">CVE-2021-46143 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1194362">SUSE bug 1194362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195327">SUSE bug 1195327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196387">SUSE bug 1196387</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200038">SUSE bug 1200038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200198">SUSE bug 1200198</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829635" comment="expat-2.1.0-14.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829636" comment="expat-devel-2.1.0-14.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829637" comment="expat-static-2.1.0-14.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146784" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46784</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46784" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46784" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46784" ref_url="https://www.suse.com/security/cve/CVE-2021-46784" source="SUSE CVE"/>
		<reference ref_id="GHSA-f5cp-6rh3-284w" ref_url="https://github.com/squid-cache/squid/security/advisories//GHSA-f5cp-6rh3-284w" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011508.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011543.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011655.html" source="SUSE-SU"/>
    <description>
    In Squid 3.x through 3.5.28, 4.x through 4.17, and 5.x before 5.6, due to improper buffer management, a Denial of Service can occur when processing long Gopher server responses.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46784/">CVE-2021-46784 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46784">CVE-2021-46784 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1200907">SUSE bug 1200907</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829758" comment="squid-3.5.20-17.el7_9.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829759" comment="squid-migration-script-3.5.20-17.el7_9.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829760" comment="squid-sysvinit-3.5.20-17.el7_9.7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20220330" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-0330</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-0330" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0330" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-0330" ref_url="https://www.suse.com/security/cve/CVE-2022-0330" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:282-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0363-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0365-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010991.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0363-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K4ZJSATCJ2GMGCX6RSG2TU2YU4DDOMVQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0366-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CFUCZRWH2IP7FOHVYO3TO3G5PFWQXLP6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0370-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ASMTCFCDULHGAOBQUFJH4PHVCQSTF7S6/" source="SUSE-SU"/>
    <description>
    A random memory access flaw was found in the Linux kernel's GPU i915 kernel driver functionality in the way a user may run malicious code on the GPU. This flaw allows a local user to crash the system or escalate their privileges on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0330/">CVE-2022-0330 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0330">CVE-2022-0330 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1194880">SUSE bug 1194880</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195950">SUSE bug 1195950</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829589" comment="bpftool-3.10.0-1160.59.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829590" comment="kernel-3.10.0-1160.59.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829591" comment="kernel-abi-whitelists-3.10.0-1160.59.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829592" comment="kernel-debug-3.10.0-1160.59.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829595" comment="kernel-doc-3.10.0-1160.59.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829596" comment="kernel-headers-3.10.0-1160.59.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829597" comment="kernel-tools-3.10.0-1160.59.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829598" comment="kernel-tools-libs-3.10.0-1160.59.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829600" comment="perf-3.10.0-1160.59.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829601" comment="python-perf-3.10.0-1160.59.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20220492" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-0492</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-0492" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0492" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-0492" ref_url="https://www.suse.com/security/cve/CVE-2022-0492" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:357-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:358-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0755-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010393.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010401.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0757-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010397.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010395.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0978-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0991-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010550.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010561.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010396.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0755-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PDLUIZF7VQIB7OV6GCQHOPOBN2UU2POW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0760-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GIEQJF6RAZADJBWJQFLIHOBULB4E2C7K/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0768-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MWGLT5YBYSSX5MP2JBKT3N3QV2IWMC5F/" source="SUSE-SU"/>
    <description>
    A vulnerability was found in the Linux kernel's cgroup_release_agent_write in the kernel/cgroup/cgroup-v1.c function. This flaw, under certain circumstances, allows the use of the cgroups v1 release_agent feature to escalate privileges and bypass the namespace isolation unexpectedly.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0492/">CVE-2022-0492 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0492">CVE-2022-0492 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1195543">SUSE bug 1195543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195908">SUSE bug 1195908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196612">SUSE bug 1196612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196776">SUSE bug 1196776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198615">SUSE bug 1198615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199255">SUSE bug 1199255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199615">SUSE bug 1199615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200084">SUSE bug 1200084</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829678" comment="bpftool-3.10.0-1160.66.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829679" comment="kernel-3.10.0-1160.66.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829680" comment="kernel-abi-whitelists-3.10.0-1160.66.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829681" comment="kernel-debug-3.10.0-1160.66.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829684" comment="kernel-doc-3.10.0-1160.66.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829685" comment="kernel-headers-3.10.0-1160.66.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829686" comment="kernel-tools-3.10.0-1160.66.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829687" comment="kernel-tools-libs-3.10.0-1160.66.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829689" comment="perf-3.10.0-1160.66.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829690" comment="python-perf-3.10.0-1160.66.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20220566" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-0566</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-0566" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0566" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-0566" ref_url="https://www.suse.com/security/cve/CVE-2022-0566" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2022:0559-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GSM3MOVKIHQAE33NLCNX7MUULCOLEADF/" source="SUSE-SU"/>
    <description>
    It may be possible for an attacker to craft an email message that causes Thunderbird to perform an out-of-bounds write of one byte when processing the message. This vulnerability affects Thunderbird &lt; 91.6.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0566/">CVE-2022-0566 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0566">CVE-2022-0566 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1196072">SUSE bug 1196072</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829623" comment="thunderbird-91.7.0-2.el7_9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20220778" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-0778</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-0778" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-0778" ref_url="https://www.suse.com/security/cve/CVE-2022-0778" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010502.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1462-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010454.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010932.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0856-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/V7FRPEEZ7WUHWJ2PK7C5GZJJTXRGWJB2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14965-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DVFNM75TAEBUEYENWHOXMRWTJPWBKDFT/" source="SUSE-SU"/>
    <description>
    The BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters. Thus vulnerable situations include: - TLS clients consuming server certificates - TLS servers consuming client certificates - Hosting providers taking certificates or private keys from customers - Certificate authorities parsing certification requests from subscribers - Anything else which parses ASN.1 elliptic curve parameters Also any other applications that use the BN_mod_sqrt() where the attacker can control the parameter values are vulnerable to this DoS issue. In the OpenSSL 1.0.2 version the public key is not parsed during initial parsing of the certificate which makes it slightly harder to trigger the infinite loop. However any operation which requires the public key from the certificate will trigger the infinite loop. In particular the attacker can use a self-signed certificate to trigger the loop during verification of the certificate signature. This issue affects OpenSSL versions 1.0.2, 1.1.1 and 3.0. It was addressed in the releases of 1.1.1n and 3.0.2 on the 15th March 2022. Fixed in OpenSSL 3.0.2 (Affected 3.0.0,3.0.1). Fixed in OpenSSL 1.1.1n (Affected 1.1.1-1.1.1m). Fixed in OpenSSL 1.0.2zd (Affected 1.0.2-1.0.2zc).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-04-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0778/">CVE-2022-0778 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0778">CVE-2022-0778 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1196877">SUSE bug 1196877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197328">SUSE bug 1197328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197340">SUSE bug 1197340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199100">SUSE bug 1199100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199254">SUSE bug 1199254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199303">SUSE bug 1199303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199339">SUSE bug 1199339</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200090">SUSE bug 1200090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225670">SUSE bug 1225670</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829632" comment="openssl-1.0.2k-25.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829633" comment="openssl-devel-1.0.2k-25.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829634" comment="openssl-libs-1.0.2k-25.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20220918" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-0918</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-0918" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0918" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-0918" ref_url="https://www.suse.com/security/cve/CVE-2022-0918" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:1100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011338.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1100-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WUT5CGHERM6PDXKCM7Z3IJLGIYJ6V6AO/" source="SUSE-SU"/>
    <description>
    A vulnerability was discovered in the 389 Directory Server that allows an unauthenticated attacker with network access to the LDAP port to cause a denial of service. The denial of service is triggered by a single message sent over a TCP connection, no bind or other authentication is required. The message triggers a segmentation fault that results in slapd crashing.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-08"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0918/">CVE-2022-0918 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0918">CVE-2022-0918 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1197275">SUSE bug 1197275</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829752" comment="389-ds-base-1.3.10.2-16.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829753" comment="389-ds-base-devel-1.3.10.2-16.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829754" comment="389-ds-base-libs-1.3.10.2-16.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829755" comment="389-ds-base-snmp-1.3.10.2-16.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20220996" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-0996</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-0996" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0996" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-0996" ref_url="https://www.suse.com/security/cve/CVE-2022-0996" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:1100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011338.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1100-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WUT5CGHERM6PDXKCM7Z3IJLGIYJ6V6AO/" source="SUSE-SU"/>
    <description>
    A vulnerability was found in the 389 Directory Server that allows expired passwords to access the database to cause improper authentication.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0996/">CVE-2022-0996 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0996">CVE-2022-0996 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1197345">SUSE bug 1197345</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829752" comment="389-ds-base-1.3.10.2-16.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829753" comment="389-ds-base-devel-1.3.10.2-16.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829754" comment="389-ds-base-libs-1.3.10.2-16.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829755" comment="389-ds-base-snmp-1.3.10.2-16.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221011" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1011</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1011" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1011" ref_url="https://www.suse.com/security/cve/CVE-2022-1011" source="SUSE CVE"/>
		<reference ref_id="ESSA-2024:0618" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1329-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1335-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1593-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1634-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1651-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1668-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013765.html" source="SUSE-SU"/>
    <description>
    A use-after-free flaw was found in the Linux kernel's FUSE filesystem in the way a user triggers write(). This flaw allows a local user to gain unauthorized access to data from the FUSE filesystem, resulting in privilege escalation.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-19"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1011/">CVE-2022-1011 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1011">CVE-2022-1011 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1197343">SUSE bug 1197343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197344">SUSE bug 1197344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198687">SUSE bug 1198687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204132">SUSE bug 1204132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212322">SUSE bug 1212322</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009943012" comment="bpftool-3.10.0-1160.123.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943013" comment="kernel-3.10.0-1160.123.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943014" comment="kernel-abi-whitelists-3.10.0-1160.123.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943015" comment="kernel-debug-3.10.0-1160.123.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943018" comment="kernel-doc-3.10.0-1160.123.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943019" comment="kernel-headers-3.10.0-1160.123.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943020" comment="kernel-tools-3.10.0-1160.123.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943021" comment="kernel-tools-libs-3.10.0-1160.123.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943023" comment="perf-3.10.0-1160.123.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943024" comment="python-perf-3.10.0-1160.123.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221097" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1097</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1097" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1097" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1097" ref_url="https://www.suse.com/security/cve/CVE-2022-1097" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2022:1114-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-April/022464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2022:1125-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-April/022477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2022:14935-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-April/022462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14936-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010660.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1127-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/76BLKP3BHKRBWFX4VJKKQJQXQTYEOOSX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    &lt;code&gt;NSSToken&lt;/code&gt; objects were referenced via direct points, and could have been accessed in an unsafe way on different threads, leading to a use-after-free and potentially exploitable crash. This vulnerability affects Thunderbird &lt; 91.8, Firefox &lt; 99, and Firefox ESR &lt; 91.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1097/">CVE-2022-1097 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1097">CVE-2022-1097 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1197903">SUSE bug 1197903</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829651" comment="firefox-91.8.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829652" comment="thunderbird-91.8.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221196" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1196</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1196" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1196" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1196" ref_url="https://www.suse.com/security/cve/CVE-2022-1196" source="SUSE CVE"/>
		<reference ref_id="SUSE-RU-2022:1114-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-April/022464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2022:14935-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-April/022462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010699.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1127-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/76BLKP3BHKRBWFX4VJKKQJQXQTYEOOSX/" source="SUSE-SU"/>
    <description>
    After a VR Process is destroyed, a reference to it may have been retained and used, leading to a use-after-free and potentially exploitable crash. This vulnerability affects Thunderbird &lt; 91.8 and Firefox ESR &lt; 91.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-1196/">CVE-2022-1196 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1196">CVE-2022-1196 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1197903">SUSE bug 1197903</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829651" comment="firefox-91.8.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829652" comment="thunderbird-91.8.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221197" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1197</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1197" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1197" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1197" ref_url="https://www.suse.com/security/cve/CVE-2022-1197" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010699.html" source="SUSE-SU"/>
    <description>
    When importing a revoked key that specified key compromise as the revocation reason, Thunderbird did not update the existing copy of the key that was not yet revoked, and the existing key was kept as non-revoked. Revocation statements that used another revocation reason, or that didn't specify a revocation reason, were unaffected. This vulnerability affects Thunderbird &lt; 91.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-1197/">CVE-2022-1197 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1197">CVE-2022-1197 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1197903">SUSE bug 1197903</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829652" comment="thunderbird-91.8.0-1.el7_9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221271" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1271</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1271" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1271" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1271" ref_url="https://www.suse.com/security/cve/CVE-2022-1271" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-May/023165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1151-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1356-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011327.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:610-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:718-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:833-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-April/022888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010889.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010891.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:874-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:877-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:676-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:677-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:680-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:681-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:689-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010685.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14938-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010979.html" source="SUSE-SU"/>
    <description>
    An arbitrary file write vulnerability was found in GNU gzip's zgrep utility. When zgrep is applied on the attacker's chosen file name (for example, a crafted file name), this can overwrite an attacker's content to an arbitrary attacker-selected file. This flaw occurs due to insufficient validation when processing filenames with two or more newlines where selected content and the target file names are embedded in crafted multi-line file names. This flaw allows a remote, low privileged attacker to force zgrep to write arbitrary files on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1271/">CVE-2022-1271 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1271">CVE-2022-1271 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198062">SUSE bug 1198062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198812">SUSE bug 1198812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199107">SUSE bug 1199107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199108">SUSE bug 1199108</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829672" comment="gzip-1.5-11.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829714" comment="xz-5.2.2-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829715" comment="xz-compat-libs-5.2.2-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829716" comment="xz-devel-5.2.2-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829717" comment="xz-libs-5.2.2-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829718" comment="xz-lzma-compat-5.2.2-2.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221520" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1520</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1520" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1520" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1520" ref_url="https://www.suse.com/security/cve/CVE-2022-1520" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:1719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011060.html" source="SUSE-SU"/>
    <description>
    When viewing an email message A, which contains an attached message B, where B is encrypted or digitally signed or both, Thunderbird may show an incorrect encryption or signature status. After opening and viewing the attached message B, when returning to the display of message A, the message A might be shown with the security status of message B. This vulnerability affects Thunderbird &lt; 91.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-06-18"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-1520/">CVE-2022-1520 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1520">CVE-2022-1520 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198970">SUSE bug 1198970</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829671" comment="thunderbird-91.9.0-3.el7_9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221529" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1529</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1529" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1529" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1529" ref_url="https://www.suse.com/security/cve/CVE-2022-1529" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:1808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011274.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    An attacker could have sent a message to the parent process where the contents were used to double-index into a JavaScript object, leading to prototype pollution and ultimately attacker-controlled JavaScript executing in the privileged parent process. This vulnerability affects Firefox ESR &lt; 91.9.1, Firefox &lt; 100.0.2, Firefox for Android &lt; 100.3.0, and Thunderbird &lt; 91.9.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-06-18"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1529/">CVE-2022-1529 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1529">CVE-2022-1529 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1199768">SUSE bug 1199768</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829691" comment="firefox-91.9.1-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829692" comment="thunderbird-91.9.1-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221552" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1552</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1552" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1552" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1552" ref_url="https://www.suse.com/security/cve/CVE-2022-1552" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1874-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1908-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TZ5E6BLKCNZQZF3KYEYUXNMPDMMNYFCM/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2958-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/012016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14360-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RSHH7GG3JERRES4WX7FTBWO2TZCAMJMP/" source="SUSE-SU"/>
    <description>
    A flaw was found in PostgreSQL. There is an issue with incomplete efforts to operate safely when a privileged user is maintaining another user's objects. The Autovacuum, REINDEX, CREATE INDEX, REFRESH MATERIALIZED VIEW, CLUSTER, and pg_amcheck commands activated relevant protections too late or not at all during the process. This flaw allows an attacker with permission to create non-temporary objects in at least one schema to execute arbitrary SQL functions under a superuser identity.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1552/">CVE-2022-1552 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1552">CVE-2022-1552 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1199475">SUSE bug 1199475</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829719" comment="postgresql-9.2.24-8.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829720" comment="postgresql-contrib-9.2.24-8.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829721" comment="postgresql-devel-9.2.24-8.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829722" comment="postgresql-docs-9.2.24-8.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829723" comment="postgresql-libs-9.2.24-8.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829724" comment="postgresql-plperl-9.2.24-8.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829725" comment="postgresql-plpython-9.2.24-8.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829726" comment="postgresql-pltcl-9.2.24-8.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829727" comment="postgresql-server-9.2.24-8.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829728" comment="postgresql-static-9.2.24-8.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829729" comment="postgresql-test-9.2.24-8.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829730" comment="postgresql-upgrade-9.2.24-8.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221729" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1729</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1729" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1729" ref_url="https://www.suse.com/security/cve/CVE-2022-1729" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011596.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2445-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2446-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011744.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:2177-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S2QMD6CJ6PZDFYQ3RKSOGAZNRK7WC5W7/" source="SUSE-SU"/>
    <description>
    A race condition was found the Linux kernel in perf_event_open() which can be exploited by an unprivileged user to gain root privileges. The bug allows to build several exploit primitives such as kernel address information leak, arbitrary execution, etc.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1729/">CVE-2022-1729 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1729">CVE-2022-1729 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1199507">SUSE bug 1199507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199697">SUSE bug 1199697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201832">SUSE bug 1201832</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829731" comment="bpftool-3.10.0-1160.71.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829732" comment="kernel-3.10.0-1160.71.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829733" comment="kernel-abi-whitelists-3.10.0-1160.71.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829734" comment="kernel-debug-3.10.0-1160.71.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829737" comment="kernel-doc-3.10.0-1160.71.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829738" comment="kernel-headers-3.10.0-1160.71.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829739" comment="kernel-tools-3.10.0-1160.71.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829740" comment="kernel-tools-libs-3.10.0-1160.71.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829742" comment="perf-3.10.0-1160.71.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829743" comment="python-perf-3.10.0-1160.71.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221802" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1802</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1802" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1802" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1802" ref_url="https://www.suse.com/security/cve/CVE-2022-1802" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:1808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011274.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    If an attacker was able to corrupt the methods of an Array object in JavaScript via prototype pollution, they could have achieved execution of attacker-controlled JavaScript code in a privileged context. This vulnerability affects Firefox ESR &lt; 91.9.1, Firefox &lt; 100.0.2, Firefox for Android &lt; 100.3.0, and Thunderbird &lt; 91.9.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-06-18"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1802/">CVE-2022-1802 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1802">CVE-2022-1802 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1199768">SUSE bug 1199768</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829691" comment="firefox-91.9.1-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829692" comment="thunderbird-91.9.1-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221834" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1834</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1834" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1834" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1834" ref_url="https://www.suse.com/security/cve/CVE-2022-1834" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:2062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011274.html" source="SUSE-SU"/>
    <description>
    When displaying the sender of an email, and the sender name contained the Braille Pattern Blank space character multiple times, Thunderbird would have displayed all the spaces. This could have been used by an attacker to send an email message with the attacker's digital signature, that was shown with an arbitrary sender email address chosen by the attacker. If the sender name started with a false email address, followed by many Braille space characters, the attacker's email address was not visible. Because Thunderbird compared the invisible sender address with the signature's email address, if the signing key or certificate was accepted by Thunderbird, the email was shown as having a valid digital signature. This vulnerability affects Thunderbird &lt; 91.10.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1834/">CVE-2022-1834 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1834">CVE-2022-1834 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829712" comment="thunderbird-91.10.0-1.el7_9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221966" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1966</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1966" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1966" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1966" ref_url="https://www.suse.com/security/cve/CVE-2022-1966" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011347.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011401.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011744.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:2173-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CWOILJAA3L3ZOAEUSAUQRV4VH2BJEGVX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:2177-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S2QMD6CJ6PZDFYQ3RKSOGAZNRK7WC5W7/" source="SUSE-SU"/>
    <description>
    DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-32250. Reason: This candidate is a duplicate of CVE-2022-32250. Notes: All CVE users should reference CVE-2022-32250 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1966/">CVE-2022-1966 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1966">CVE-2022-1966 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1200015">SUSE bug 1200015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200268">SUSE bug 1200268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200494">SUSE bug 1200494</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200529">SUSE bug 1200529</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829731" comment="bpftool-3.10.0-1160.71.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829732" comment="kernel-3.10.0-1160.71.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829733" comment="kernel-abi-whitelists-3.10.0-1160.71.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829734" comment="kernel-debug-3.10.0-1160.71.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829737" comment="kernel-doc-3.10.0-1160.71.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829738" comment="kernel-headers-3.10.0-1160.71.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829739" comment="kernel-tools-3.10.0-1160.71.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829740" comment="kernel-tools-libs-3.10.0-1160.71.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829742" comment="perf-3.10.0-1160.71.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829743" comment="python-perf-3.10.0-1160.71.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221123" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21123</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21123" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21123" ref_url="https://www.suse.com/security/cve/CVE-2022-21123" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2599-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013765.html" source="SUSE-SU"/>
		<reference ref_id="TID000020669" ref_url="https://www.suse.com/support/kb/doc/?id=000020669" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:2177-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S2QMD6CJ6PZDFYQ3RKSOGAZNRK7WC5W7/" source="SUSE-SU"/>
    <description>
    Incomplete cleanup of multi-core shared buffers for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21123/">CVE-2022-21123 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21123">CVE-2022-21123 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1199650">SUSE bug 1199650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200549">SUSE bug 1200549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209075">SUSE bug 1209075</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829789" comment="bpftool-3.10.0-1160.76.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829790" comment="kernel-3.10.0-1160.76.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829791" comment="kernel-abi-whitelists-3.10.0-1160.76.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829792" comment="kernel-debug-3.10.0-1160.76.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829795" comment="kernel-doc-3.10.0-1160.76.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829796" comment="kernel-headers-3.10.0-1160.76.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829797" comment="kernel-tools-3.10.0-1160.76.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829798" comment="kernel-tools-libs-3.10.0-1160.76.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829800" comment="perf-3.10.0-1160.76.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829801" comment="python-perf-3.10.0-1160.76.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221125" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21125</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21125" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21125" ref_url="https://www.suse.com/security/cve/CVE-2022-21125" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2599-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013765.html" source="SUSE-SU"/>
		<reference ref_id="TID000020669" ref_url="https://www.suse.com/support/kb/doc/?id=000020669" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:2177-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S2QMD6CJ6PZDFYQ3RKSOGAZNRK7WC5W7/" source="SUSE-SU"/>
    <description>
    Incomplete cleanup of microarchitectural fill buffers on some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21125/">CVE-2022-21125 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21125">CVE-2022-21125 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1199650">SUSE bug 1199650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200549">SUSE bug 1200549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209074">SUSE bug 1209074</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829789" comment="bpftool-3.10.0-1160.76.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829790" comment="kernel-3.10.0-1160.76.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829791" comment="kernel-abi-whitelists-3.10.0-1160.76.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829792" comment="kernel-debug-3.10.0-1160.76.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829795" comment="kernel-doc-3.10.0-1160.76.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829796" comment="kernel-headers-3.10.0-1160.76.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829797" comment="kernel-tools-3.10.0-1160.76.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829798" comment="kernel-tools-libs-3.10.0-1160.76.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829800" comment="perf-3.10.0-1160.76.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829801" comment="python-perf-3.10.0-1160.76.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21166</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21166" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21166" ref_url="https://www.suse.com/security/cve/CVE-2022-21166" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2599-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013765.html" source="SUSE-SU"/>
		<reference ref_id="TID000020669" ref_url="https://www.suse.com/support/kb/doc/?id=000020669" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:2177-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S2QMD6CJ6PZDFYQ3RKSOGAZNRK7WC5W7/" source="SUSE-SU"/>
    <description>
    Incomplete cleanup in specific special register write operations for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21166/">CVE-2022-21166 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21166">CVE-2022-21166 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1199650">SUSE bug 1199650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200549">SUSE bug 1200549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209073">SUSE bug 1209073</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829789" comment="bpftool-3.10.0-1160.76.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829790" comment="kernel-3.10.0-1160.76.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829791" comment="kernel-abi-whitelists-3.10.0-1160.76.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829792" comment="kernel-debug-3.10.0-1160.76.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829795" comment="kernel-doc-3.10.0-1160.76.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829796" comment="kernel-headers-3.10.0-1160.76.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829797" comment="kernel-tools-3.10.0-1160.76.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829798" comment="kernel-tools-libs-3.10.0-1160.76.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829800" comment="perf-3.10.0-1160.76.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829801" comment="python-perf-3.10.0-1160.76.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221248" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21248</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21248" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21248" ref_url="https://www.suse.com/security/cve/CVE-2022-21248" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010560.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010559.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010505.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0816-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U6OQKLWM3DMDDCKHLY4KFE6NXSK5MSXV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0870-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K2HM7MZLDNJ2W6HOMDMSHAZDFGLK43HO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0873-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4IS5FMKDHHRO4IBOMDW2TOCFQJ7BOXCY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1027-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2EH4HQJU5VK7ZC3BHZTQT6QUXNTGNXVQ/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Serialization). Supported versions that are affected are Oracle Java SE: 7u321, 8u311, 11.0.13, 17.0.1; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-05"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21248/">CVE-2022-21248 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21248">CVE-2022-21248 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1194926">SUSE bug 1194926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197126">SUSE bug 1197126</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829545" comment="java-1.8.0-openjdk-1.8.0.322.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829546" comment="java-1.8.0-openjdk-accessibility-1.8.0.322.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829547" comment="java-1.8.0-openjdk-demo-1.8.0.322.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829548" comment="java-1.8.0-openjdk-devel-1.8.0.322.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829549" comment="java-1.8.0-openjdk-headless-1.8.0.322.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829550" comment="java-1.8.0-openjdk-javadoc-1.8.0.322.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829551" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.322.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829552" comment="java-1.8.0-openjdk-src-1.8.0.322.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829539" comment="java-11-openjdk-11.0.14.0.9-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829540" comment="java-11-openjdk-devel-11.0.14.0.9-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829541" comment="java-11-openjdk-headless-11.0.14.0.9-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221277" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21277</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21277" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21277" ref_url="https://www.suse.com/security/cve/CVE-2022-21277" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010560.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010559.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010505.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0816-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U6OQKLWM3DMDDCKHLY4KFE6NXSK5MSXV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0870-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K2HM7MZLDNJ2W6HOMDMSHAZDFGLK43HO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1027-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2EH4HQJU5VK7ZC3BHZTQT6QUXNTGNXVQ/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: ImageIO). Supported versions that are affected are Oracle Java SE: 11.0.13, 17.0.1; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21277/">CVE-2022-21277 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21277">CVE-2022-21277 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1194930">SUSE bug 1194930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197126">SUSE bug 1197126</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829539" comment="java-11-openjdk-11.0.14.0.9-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829540" comment="java-11-openjdk-devel-11.0.14.0.9-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829541" comment="java-11-openjdk-headless-11.0.14.0.9-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221282" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21282</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21282" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21282" ref_url="https://www.suse.com/security/cve/CVE-2022-21282" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010560.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010559.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010505.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0816-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U6OQKLWM3DMDDCKHLY4KFE6NXSK5MSXV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0870-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K2HM7MZLDNJ2W6HOMDMSHAZDFGLK43HO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0873-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4IS5FMKDHHRO4IBOMDW2TOCFQJ7BOXCY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1027-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2EH4HQJU5VK7ZC3BHZTQT6QUXNTGNXVQ/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JAXP). Supported versions that are affected are Oracle Java SE: 7u321, 8u311, 11.0.13, 17.0.1; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21282/">CVE-2022-21282 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21282">CVE-2022-21282 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1194933">SUSE bug 1194933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197126">SUSE bug 1197126</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829545" comment="java-1.8.0-openjdk-1.8.0.322.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829546" comment="java-1.8.0-openjdk-accessibility-1.8.0.322.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829547" comment="java-1.8.0-openjdk-demo-1.8.0.322.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829548" comment="java-1.8.0-openjdk-devel-1.8.0.322.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829549" comment="java-1.8.0-openjdk-headless-1.8.0.322.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829550" comment="java-1.8.0-openjdk-javadoc-1.8.0.322.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829551" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.322.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829552" comment="java-1.8.0-openjdk-src-1.8.0.322.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829539" comment="java-11-openjdk-11.0.14.0.9-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829540" comment="java-11-openjdk-devel-11.0.14.0.9-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829541" comment="java-11-openjdk-headless-11.0.14.0.9-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221283" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21283</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21283" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21283" ref_url="https://www.suse.com/security/cve/CVE-2022-21283" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010560.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010559.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010505.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0816-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U6OQKLWM3DMDDCKHLY4KFE6NXSK5MSXV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0873-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4IS5FMKDHHRO4IBOMDW2TOCFQJ7BOXCY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1027-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2EH4HQJU5VK7ZC3BHZTQT6QUXNTGNXVQ/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 11.0.13, 17.0.1; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21283/">CVE-2022-21283 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21283">CVE-2022-21283 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1194937">SUSE bug 1194937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197126">SUSE bug 1197126</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829545" comment="java-1.8.0-openjdk-1.8.0.322.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829546" comment="java-1.8.0-openjdk-accessibility-1.8.0.322.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829547" comment="java-1.8.0-openjdk-demo-1.8.0.322.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829548" comment="java-1.8.0-openjdk-devel-1.8.0.322.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829549" comment="java-1.8.0-openjdk-headless-1.8.0.322.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829550" comment="java-1.8.0-openjdk-javadoc-1.8.0.322.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829551" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.322.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829552" comment="java-1.8.0-openjdk-src-1.8.0.322.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829539" comment="java-11-openjdk-11.0.14.0.9-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829540" comment="java-11-openjdk-devel-11.0.14.0.9-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829541" comment="java-11-openjdk-headless-11.0.14.0.9-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221291" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21291</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21291" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21291" ref_url="https://www.suse.com/security/cve/CVE-2022-21291" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010560.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010559.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010505.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0816-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U6OQKLWM3DMDDCKHLY4KFE6NXSK5MSXV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0870-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K2HM7MZLDNJ2W6HOMDMSHAZDFGLK43HO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1027-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2EH4HQJU5VK7ZC3BHZTQT6QUXNTGNXVQ/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u321, 8u311, 11.0.13, 17.0.1; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21291/">CVE-2022-21291 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21291">CVE-2022-21291 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1194925">SUSE bug 1194925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197126">SUSE bug 1197126</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829539" comment="java-11-openjdk-11.0.14.0.9-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829540" comment="java-11-openjdk-devel-11.0.14.0.9-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829541" comment="java-11-openjdk-headless-11.0.14.0.9-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221293" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21293</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21293" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21293" ref_url="https://www.suse.com/security/cve/CVE-2022-21293" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010560.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010559.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010505.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0816-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U6OQKLWM3DMDDCKHLY4KFE6NXSK5MSXV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0870-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K2HM7MZLDNJ2W6HOMDMSHAZDFGLK43HO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0873-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4IS5FMKDHHRO4IBOMDW2TOCFQJ7BOXCY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1027-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2EH4HQJU5VK7ZC3BHZTQT6QUXNTGNXVQ/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 7u321, 8u311, 11.0.13, 17.0.1; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21293/">CVE-2022-21293 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21293">CVE-2022-21293 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1194935">SUSE bug 1194935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197126">SUSE bug 1197126</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829545" comment="java-1.8.0-openjdk-1.8.0.322.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829546" comment="java-1.8.0-openjdk-accessibility-1.8.0.322.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829547" comment="java-1.8.0-openjdk-demo-1.8.0.322.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829548" comment="java-1.8.0-openjdk-devel-1.8.0.322.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829549" comment="java-1.8.0-openjdk-headless-1.8.0.322.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829550" comment="java-1.8.0-openjdk-javadoc-1.8.0.322.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829551" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.322.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829552" comment="java-1.8.0-openjdk-src-1.8.0.322.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829539" comment="java-11-openjdk-11.0.14.0.9-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829540" comment="java-11-openjdk-devel-11.0.14.0.9-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829541" comment="java-11-openjdk-headless-11.0.14.0.9-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221294" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21294</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21294" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21294" ref_url="https://www.suse.com/security/cve/CVE-2022-21294" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010560.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010559.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010505.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0816-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U6OQKLWM3DMDDCKHLY4KFE6NXSK5MSXV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0870-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K2HM7MZLDNJ2W6HOMDMSHAZDFGLK43HO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0873-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4IS5FMKDHHRO4IBOMDW2TOCFQJ7BOXCY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1027-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2EH4HQJU5VK7ZC3BHZTQT6QUXNTGNXVQ/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 7u321, 8u311, 11.0.13, 17.0.1; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21294/">CVE-2022-21294 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21294">CVE-2022-21294 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1194934">SUSE bug 1194934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197126">SUSE bug 1197126</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829545" comment="java-1.8.0-openjdk-1.8.0.322.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829546" comment="java-1.8.0-openjdk-accessibility-1.8.0.322.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829547" comment="java-1.8.0-openjdk-demo-1.8.0.322.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829548" comment="java-1.8.0-openjdk-devel-1.8.0.322.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829549" comment="java-1.8.0-openjdk-headless-1.8.0.322.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829550" comment="java-1.8.0-openjdk-javadoc-1.8.0.322.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829551" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.322.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829552" comment="java-1.8.0-openjdk-src-1.8.0.322.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829539" comment="java-11-openjdk-11.0.14.0.9-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829540" comment="java-11-openjdk-devel-11.0.14.0.9-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829541" comment="java-11-openjdk-headless-11.0.14.0.9-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221296" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21296</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21296" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21296" ref_url="https://www.suse.com/security/cve/CVE-2022-21296" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010560.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010559.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010505.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0816-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U6OQKLWM3DMDDCKHLY4KFE6NXSK5MSXV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0870-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K2HM7MZLDNJ2W6HOMDMSHAZDFGLK43HO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0873-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4IS5FMKDHHRO4IBOMDW2TOCFQJ7BOXCY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1027-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2EH4HQJU5VK7ZC3BHZTQT6QUXNTGNXVQ/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JAXP). Supported versions that are affected are Oracle Java SE: 7u321, 8u311, 11.0.13, 17.0.1; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21296/">CVE-2022-21296 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21296">CVE-2022-21296 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1194932">SUSE bug 1194932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197126">SUSE bug 1197126</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829545" comment="java-1.8.0-openjdk-1.8.0.322.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829546" comment="java-1.8.0-openjdk-accessibility-1.8.0.322.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829547" comment="java-1.8.0-openjdk-demo-1.8.0.322.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829548" comment="java-1.8.0-openjdk-devel-1.8.0.322.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829549" comment="java-1.8.0-openjdk-headless-1.8.0.322.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829550" comment="java-1.8.0-openjdk-javadoc-1.8.0.322.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829551" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.322.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829552" comment="java-1.8.0-openjdk-src-1.8.0.322.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829539" comment="java-11-openjdk-11.0.14.0.9-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829540" comment="java-11-openjdk-devel-11.0.14.0.9-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829541" comment="java-11-openjdk-headless-11.0.14.0.9-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221299" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21299</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21299" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21299" ref_url="https://www.suse.com/security/cve/CVE-2022-21299" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010560.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010559.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2539-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2650-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011760.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0816-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U6OQKLWM3DMDDCKHLY4KFE6NXSK5MSXV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0870-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K2HM7MZLDNJ2W6HOMDMSHAZDFGLK43HO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0873-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4IS5FMKDHHRO4IBOMDW2TOCFQJ7BOXCY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1027-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2EH4HQJU5VK7ZC3BHZTQT6QUXNTGNXVQ/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JAXP). Supported versions that are affected are Oracle Java SE: 7u321, 8u311, 11.0.13, 17.0.1; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21299/">CVE-2022-21299 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21299">CVE-2022-21299 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1194931">SUSE bug 1194931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197126">SUSE bug 1197126</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829545" comment="java-1.8.0-openjdk-1.8.0.322.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829546" comment="java-1.8.0-openjdk-accessibility-1.8.0.322.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829547" comment="java-1.8.0-openjdk-demo-1.8.0.322.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829548" comment="java-1.8.0-openjdk-devel-1.8.0.322.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829549" comment="java-1.8.0-openjdk-headless-1.8.0.322.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829550" comment="java-1.8.0-openjdk-javadoc-1.8.0.322.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829551" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.322.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829552" comment="java-1.8.0-openjdk-src-1.8.0.322.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829539" comment="java-11-openjdk-11.0.14.0.9-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829540" comment="java-11-openjdk-devel-11.0.14.0.9-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829541" comment="java-11-openjdk-headless-11.0.14.0.9-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221305" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21305</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21305" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21305" ref_url="https://www.suse.com/security/cve/CVE-2022-21305" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010560.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010559.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010505.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0816-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U6OQKLWM3DMDDCKHLY4KFE6NXSK5MSXV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0870-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K2HM7MZLDNJ2W6HOMDMSHAZDFGLK43HO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0873-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4IS5FMKDHHRO4IBOMDW2TOCFQJ7BOXCY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1027-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2EH4HQJU5VK7ZC3BHZTQT6QUXNTGNXVQ/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u321, 8u311, 11.0.13, 17.0.1; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21305/">CVE-2022-21305 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21305">CVE-2022-21305 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1194939">SUSE bug 1194939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197126">SUSE bug 1197126</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829545" comment="java-1.8.0-openjdk-1.8.0.322.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829546" comment="java-1.8.0-openjdk-accessibility-1.8.0.322.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829547" comment="java-1.8.0-openjdk-demo-1.8.0.322.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829548" comment="java-1.8.0-openjdk-devel-1.8.0.322.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829549" comment="java-1.8.0-openjdk-headless-1.8.0.322.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829550" comment="java-1.8.0-openjdk-javadoc-1.8.0.322.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829551" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.322.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829552" comment="java-1.8.0-openjdk-src-1.8.0.322.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829539" comment="java-11-openjdk-11.0.14.0.9-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829540" comment="java-11-openjdk-devel-11.0.14.0.9-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829541" comment="java-11-openjdk-headless-11.0.14.0.9-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222132" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2132</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2132" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2132" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2132" ref_url="https://www.suse.com/security/cve/CVE-2022-2132" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:3341-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3356-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012405.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0531-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0576-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017983.html" source="SUSE-SU"/>
    <description>
    A permissive list of allowed inputs flaw was found in DPDK. This issue allows a remote attacker to cause a denial of service triggered by sending a crafted Vhost header to DPDK.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2132/">CVE-2022-2132 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2132">CVE-2022-2132 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1202903">SUSE bug 1202903</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829964" comment="dpdk-18.11.8-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829965" comment="dpdk-devel-18.11.8-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829966" comment="dpdk-doc-18.11.8-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829967" comment="dpdk-tools-18.11.8-2.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221340" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21340</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21340" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21340" ref_url="https://www.suse.com/security/cve/CVE-2022-21340" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010560.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010559.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010505.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0816-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U6OQKLWM3DMDDCKHLY4KFE6NXSK5MSXV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0870-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K2HM7MZLDNJ2W6HOMDMSHAZDFGLK43HO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0873-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4IS5FMKDHHRO4IBOMDW2TOCFQJ7BOXCY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1027-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2EH4HQJU5VK7ZC3BHZTQT6QUXNTGNXVQ/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 7u321, 8u311, 11.0.13, 17.0.1; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21340/">CVE-2022-21340 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21340">CVE-2022-21340 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1194940">SUSE bug 1194940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197126">SUSE bug 1197126</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829545" comment="java-1.8.0-openjdk-1.8.0.322.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829546" comment="java-1.8.0-openjdk-accessibility-1.8.0.322.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829547" comment="java-1.8.0-openjdk-demo-1.8.0.322.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829548" comment="java-1.8.0-openjdk-devel-1.8.0.322.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829549" comment="java-1.8.0-openjdk-headless-1.8.0.322.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829550" comment="java-1.8.0-openjdk-javadoc-1.8.0.322.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829551" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.322.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829552" comment="java-1.8.0-openjdk-src-1.8.0.322.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829539" comment="java-11-openjdk-11.0.14.0.9-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829540" comment="java-11-openjdk-devel-11.0.14.0.9-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829541" comment="java-11-openjdk-headless-11.0.14.0.9-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221341" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21341</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21341" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21341" ref_url="https://www.suse.com/security/cve/CVE-2022-21341" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010560.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010559.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010505.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0816-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U6OQKLWM3DMDDCKHLY4KFE6NXSK5MSXV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0870-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K2HM7MZLDNJ2W6HOMDMSHAZDFGLK43HO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0873-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4IS5FMKDHHRO4IBOMDW2TOCFQJ7BOXCY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1027-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2EH4HQJU5VK7ZC3BHZTQT6QUXNTGNXVQ/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Serialization). Supported versions that are affected are Oracle Java SE: 7u321, 8u311, 11.0.13, 17.0.1; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21341/">CVE-2022-21341 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21341">CVE-2022-21341 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1194941">SUSE bug 1194941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197126">SUSE bug 1197126</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829545" comment="java-1.8.0-openjdk-1.8.0.322.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829546" comment="java-1.8.0-openjdk-accessibility-1.8.0.322.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829547" comment="java-1.8.0-openjdk-demo-1.8.0.322.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829548" comment="java-1.8.0-openjdk-devel-1.8.0.322.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829549" comment="java-1.8.0-openjdk-headless-1.8.0.322.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829550" comment="java-1.8.0-openjdk-javadoc-1.8.0.322.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829551" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.322.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829552" comment="java-1.8.0-openjdk-src-1.8.0.322.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829539" comment="java-11-openjdk-11.0.14.0.9-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829540" comment="java-11-openjdk-devel-11.0.14.0.9-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829541" comment="java-11-openjdk-headless-11.0.14.0.9-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221360" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21360</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21360" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21360" ref_url="https://www.suse.com/security/cve/CVE-2022-21360" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010560.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010559.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010505.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0816-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U6OQKLWM3DMDDCKHLY4KFE6NXSK5MSXV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0870-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K2HM7MZLDNJ2W6HOMDMSHAZDFGLK43HO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0873-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4IS5FMKDHHRO4IBOMDW2TOCFQJ7BOXCY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1027-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2EH4HQJU5VK7ZC3BHZTQT6QUXNTGNXVQ/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: ImageIO). Supported versions that are affected are Oracle Java SE: 7u321, 8u311, 11.0.13, 17.0.1; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21360/">CVE-2022-21360 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21360">CVE-2022-21360 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1194929">SUSE bug 1194929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197126">SUSE bug 1197126</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829545" comment="java-1.8.0-openjdk-1.8.0.322.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829546" comment="java-1.8.0-openjdk-accessibility-1.8.0.322.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829547" comment="java-1.8.0-openjdk-demo-1.8.0.322.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829548" comment="java-1.8.0-openjdk-devel-1.8.0.322.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829549" comment="java-1.8.0-openjdk-headless-1.8.0.322.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829550" comment="java-1.8.0-openjdk-javadoc-1.8.0.322.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829551" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.322.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829552" comment="java-1.8.0-openjdk-src-1.8.0.322.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829539" comment="java-11-openjdk-11.0.14.0.9-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829540" comment="java-11-openjdk-devel-11.0.14.0.9-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829541" comment="java-11-openjdk-headless-11.0.14.0.9-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221365" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21365</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21365" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21365" ref_url="https://www.suse.com/security/cve/CVE-2022-21365" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010560.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010559.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010505.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0816-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U6OQKLWM3DMDDCKHLY4KFE6NXSK5MSXV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0870-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K2HM7MZLDNJ2W6HOMDMSHAZDFGLK43HO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0873-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4IS5FMKDHHRO4IBOMDW2TOCFQJ7BOXCY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1027-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2EH4HQJU5VK7ZC3BHZTQT6QUXNTGNXVQ/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: ImageIO). Supported versions that are affected are Oracle Java SE: 7u321, 8u311, 11.0.13, 17.0.1; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21365/">CVE-2022-21365 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21365">CVE-2022-21365 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1194928">SUSE bug 1194928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197126">SUSE bug 1197126</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829545" comment="java-1.8.0-openjdk-1.8.0.322.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829546" comment="java-1.8.0-openjdk-accessibility-1.8.0.322.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829547" comment="java-1.8.0-openjdk-demo-1.8.0.322.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829548" comment="java-1.8.0-openjdk-devel-1.8.0.322.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829549" comment="java-1.8.0-openjdk-headless-1.8.0.322.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829550" comment="java-1.8.0-openjdk-javadoc-1.8.0.322.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829551" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.322.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829552" comment="java-1.8.0-openjdk-src-1.8.0.322.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829539" comment="java-11-openjdk-11.0.14.0.9-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829540" comment="java-11-openjdk-devel-11.0.14.0.9-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829541" comment="java-11-openjdk-headless-11.0.14.0.9-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221366" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21366</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21366" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21366" ref_url="https://www.suse.com/security/cve/CVE-2022-21366" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010560.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010559.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010505.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0816-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U6OQKLWM3DMDDCKHLY4KFE6NXSK5MSXV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0870-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K2HM7MZLDNJ2W6HOMDMSHAZDFGLK43HO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1027-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2EH4HQJU5VK7ZC3BHZTQT6QUXNTGNXVQ/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: ImageIO). Supported versions that are affected are Oracle Java SE: 11.0.13, 17.0.1; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21366/">CVE-2022-21366 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21366">CVE-2022-21366 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1194927">SUSE bug 1194927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197126">SUSE bug 1197126</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829539" comment="java-11-openjdk-11.0.14.0.9-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829540" comment="java-11-openjdk-devel-11.0.14.0.9-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829541" comment="java-11-openjdk-headless-11.0.14.0.9-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221426" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21426</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21426" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21426" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21426" ref_url="https://www.suse.com/security/cve/CVE-2022-21426" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2531-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011635.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2539-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2650-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1850-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028817.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GS63GCBRVH7N4JEIZNQAPVFNNVB2OGSU/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JAXP). Supported versions that are affected are Oracle Java SE: 7u331, 8u321, 11.0.14, 17.0.2, 18; Oracle GraalVM Enterprise Edition: 20.3.5, 21.3.1 and 22.0.0.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21426/">CVE-2022-21426 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21426">CVE-2022-21426 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198672">SUSE bug 1198672</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201643">SUSE bug 1201643</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829662" comment="java-1.8.0-openjdk-1.8.0.332.b09-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829663" comment="java-1.8.0-openjdk-accessibility-1.8.0.332.b09-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829664" comment="java-1.8.0-openjdk-demo-1.8.0.332.b09-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829665" comment="java-1.8.0-openjdk-devel-1.8.0.332.b09-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829666" comment="java-1.8.0-openjdk-headless-1.8.0.332.b09-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829667" comment="java-1.8.0-openjdk-javadoc-1.8.0.332.b09-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829668" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.332.b09-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829669" comment="java-1.8.0-openjdk-src-1.8.0.332.b09-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829653" comment="java-11-openjdk-11.0.15.0.9-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829654" comment="java-11-openjdk-demo-11.0.15.0.9-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829655" comment="java-11-openjdk-devel-11.0.15.0.9-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829656" comment="java-11-openjdk-headless-11.0.15.0.9-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829657" comment="java-11-openjdk-javadoc-11.0.15.0.9-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829658" comment="java-11-openjdk-javadoc-zip-11.0.15.0.9-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829659" comment="java-11-openjdk-jmods-11.0.15.0.9-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829660" comment="java-11-openjdk-src-11.0.15.0.9-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829661" comment="java-11-openjdk-static-libs-11.0.15.0.9-2.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221434" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21434</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21434" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21434" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21434" ref_url="https://www.suse.com/security/cve/CVE-2022-21434" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2531-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011635.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2539-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2650-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012103.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GS63GCBRVH7N4JEIZNQAPVFNNVB2OGSU/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 7u331, 8u321, 11.0.14, 17.0.2, 18; Oracle GraalVM Enterprise Edition: 20.3.5, 21.3.1 and 22.0.0.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21434/">CVE-2022-21434 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21434">CVE-2022-21434 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198674">SUSE bug 1198674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201643">SUSE bug 1201643</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829662" comment="java-1.8.0-openjdk-1.8.0.332.b09-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829663" comment="java-1.8.0-openjdk-accessibility-1.8.0.332.b09-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829664" comment="java-1.8.0-openjdk-demo-1.8.0.332.b09-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829665" comment="java-1.8.0-openjdk-devel-1.8.0.332.b09-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829666" comment="java-1.8.0-openjdk-headless-1.8.0.332.b09-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829667" comment="java-1.8.0-openjdk-javadoc-1.8.0.332.b09-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829668" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.332.b09-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829669" comment="java-1.8.0-openjdk-src-1.8.0.332.b09-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829653" comment="java-11-openjdk-11.0.15.0.9-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829654" comment="java-11-openjdk-demo-11.0.15.0.9-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829655" comment="java-11-openjdk-devel-11.0.15.0.9-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829656" comment="java-11-openjdk-headless-11.0.15.0.9-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829657" comment="java-11-openjdk-javadoc-11.0.15.0.9-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829658" comment="java-11-openjdk-javadoc-zip-11.0.15.0.9-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829659" comment="java-11-openjdk-jmods-11.0.15.0.9-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829660" comment="java-11-openjdk-src-11.0.15.0.9-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829661" comment="java-11-openjdk-static-libs-11.0.15.0.9-2.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221443" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21443</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21443" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21443" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21443" ref_url="https://www.suse.com/security/cve/CVE-2022-21443" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2531-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011635.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2539-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2650-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012103.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GS63GCBRVH7N4JEIZNQAPVFNNVB2OGSU/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 7u331, 8u321, 11.0.14, 17.0.2, 18; Oracle GraalVM Enterprise Edition: 20.3.5, 21.3.1 and 22.0.0.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-19"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21443/">CVE-2022-21443 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21443">CVE-2022-21443 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198675">SUSE bug 1198675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201643">SUSE bug 1201643</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829662" comment="java-1.8.0-openjdk-1.8.0.332.b09-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829663" comment="java-1.8.0-openjdk-accessibility-1.8.0.332.b09-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829664" comment="java-1.8.0-openjdk-demo-1.8.0.332.b09-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829665" comment="java-1.8.0-openjdk-devel-1.8.0.332.b09-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829666" comment="java-1.8.0-openjdk-headless-1.8.0.332.b09-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829667" comment="java-1.8.0-openjdk-javadoc-1.8.0.332.b09-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829668" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.332.b09-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829669" comment="java-1.8.0-openjdk-src-1.8.0.332.b09-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829653" comment="java-11-openjdk-11.0.15.0.9-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829654" comment="java-11-openjdk-demo-11.0.15.0.9-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829655" comment="java-11-openjdk-devel-11.0.15.0.9-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829656" comment="java-11-openjdk-headless-11.0.15.0.9-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829657" comment="java-11-openjdk-javadoc-11.0.15.0.9-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829658" comment="java-11-openjdk-javadoc-zip-11.0.15.0.9-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829659" comment="java-11-openjdk-jmods-11.0.15.0.9-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829660" comment="java-11-openjdk-src-11.0.15.0.9-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829661" comment="java-11-openjdk-static-libs-11.0.15.0.9-2.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221476" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21476</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21476" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21476" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21476" ref_url="https://www.suse.com/security/cve/CVE-2022-21476" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2531-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011635.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2539-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2650-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012103.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GS63GCBRVH7N4JEIZNQAPVFNNVB2OGSU/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 7u331, 8u321, 11.0.14, 17.0.2, 18; Oracle GraalVM Enterprise Edition: 20.3.5, 21.3.1 and 22.0.0.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-19"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21476/">CVE-2022-21476 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21476">CVE-2022-21476 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198671">SUSE bug 1198671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201643">SUSE bug 1201643</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829662" comment="java-1.8.0-openjdk-1.8.0.332.b09-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829663" comment="java-1.8.0-openjdk-accessibility-1.8.0.332.b09-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829664" comment="java-1.8.0-openjdk-demo-1.8.0.332.b09-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829665" comment="java-1.8.0-openjdk-devel-1.8.0.332.b09-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829666" comment="java-1.8.0-openjdk-headless-1.8.0.332.b09-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829667" comment="java-1.8.0-openjdk-javadoc-1.8.0.332.b09-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829668" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.332.b09-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829669" comment="java-1.8.0-openjdk-src-1.8.0.332.b09-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829653" comment="java-11-openjdk-11.0.15.0.9-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829654" comment="java-11-openjdk-demo-11.0.15.0.9-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829655" comment="java-11-openjdk-devel-11.0.15.0.9-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829656" comment="java-11-openjdk-headless-11.0.15.0.9-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829657" comment="java-11-openjdk-javadoc-11.0.15.0.9-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829658" comment="java-11-openjdk-javadoc-zip-11.0.15.0.9-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829659" comment="java-11-openjdk-jmods-11.0.15.0.9-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829660" comment="java-11-openjdk-src-11.0.15.0.9-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829661" comment="java-11-openjdk-static-libs-11.0.15.0.9-2.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221496" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21496</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21496" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21496" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21496" ref_url="https://www.suse.com/security/cve/CVE-2022-21496" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2531-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011635.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2539-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2650-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012103.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GS63GCBRVH7N4JEIZNQAPVFNNVB2OGSU/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JNDI). Supported versions that are affected are Oracle Java SE: 7u331, 8u321, 11.0.14, 17.0.2, 18; Oracle GraalVM Enterprise Edition: 20.3.5, 21.3.1 and 22.0.0.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21496/">CVE-2022-21496 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21496">CVE-2022-21496 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198673">SUSE bug 1198673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201643">SUSE bug 1201643</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829662" comment="java-1.8.0-openjdk-1.8.0.332.b09-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829663" comment="java-1.8.0-openjdk-accessibility-1.8.0.332.b09-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829664" comment="java-1.8.0-openjdk-demo-1.8.0.332.b09-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829665" comment="java-1.8.0-openjdk-devel-1.8.0.332.b09-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829666" comment="java-1.8.0-openjdk-headless-1.8.0.332.b09-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829667" comment="java-1.8.0-openjdk-javadoc-1.8.0.332.b09-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829668" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.332.b09-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829669" comment="java-1.8.0-openjdk-src-1.8.0.332.b09-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829653" comment="java-11-openjdk-11.0.15.0.9-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829654" comment="java-11-openjdk-demo-11.0.15.0.9-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829655" comment="java-11-openjdk-devel-11.0.15.0.9-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829656" comment="java-11-openjdk-headless-11.0.15.0.9-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829657" comment="java-11-openjdk-javadoc-11.0.15.0.9-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829658" comment="java-11-openjdk-javadoc-zip-11.0.15.0.9-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829659" comment="java-11-openjdk-jmods-11.0.15.0.9-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829660" comment="java-11-openjdk-src-11.0.15.0.9-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829661" comment="java-11-openjdk-static-libs-11.0.15.0.9-2.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221540" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21540</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21540" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21540" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21540" ref_url="https://www.suse.com/security/cve/CVE-2022-21540" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2610-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2707-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/012014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GS63GCBRVH7N4JEIZNQAPVFNNVB2OGSU/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21540/">CVE-2022-21540 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21540">CVE-2022-21540 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1201694">SUSE bug 1201694</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202427">SUSE bug 1202427</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829770" comment="java-1.8.0-openjdk-1.8.0.342.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829771" comment="java-1.8.0-openjdk-accessibility-1.8.0.342.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829772" comment="java-1.8.0-openjdk-demo-1.8.0.342.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829773" comment="java-1.8.0-openjdk-devel-1.8.0.342.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829774" comment="java-1.8.0-openjdk-headless-1.8.0.342.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829775" comment="java-1.8.0-openjdk-javadoc-1.8.0.342.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829776" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.342.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829777" comment="java-1.8.0-openjdk-src-1.8.0.342.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829761" comment="java-11-openjdk-11.0.16.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829762" comment="java-11-openjdk-demo-11.0.16.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829763" comment="java-11-openjdk-devel-11.0.16.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829764" comment="java-11-openjdk-headless-11.0.16.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829765" comment="java-11-openjdk-javadoc-11.0.16.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829766" comment="java-11-openjdk-javadoc-zip-11.0.16.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829767" comment="java-11-openjdk-jmods-11.0.16.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829768" comment="java-11-openjdk-src-11.0.16.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829769" comment="java-11-openjdk-static-libs-11.0.16.0.8-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21541</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21541" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21541" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21541" ref_url="https://www.suse.com/security/cve/CVE-2022-21541" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2610-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2707-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/012014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GS63GCBRVH7N4JEIZNQAPVFNNVB2OGSU/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-21541/">CVE-2022-21541 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21541">CVE-2022-21541 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1201692">SUSE bug 1201692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202427">SUSE bug 1202427</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829770" comment="java-1.8.0-openjdk-1.8.0.342.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829771" comment="java-1.8.0-openjdk-accessibility-1.8.0.342.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829772" comment="java-1.8.0-openjdk-demo-1.8.0.342.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829773" comment="java-1.8.0-openjdk-devel-1.8.0.342.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829774" comment="java-1.8.0-openjdk-headless-1.8.0.342.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829775" comment="java-1.8.0-openjdk-javadoc-1.8.0.342.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829776" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.342.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829777" comment="java-1.8.0-openjdk-src-1.8.0.342.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829761" comment="java-11-openjdk-11.0.16.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829762" comment="java-11-openjdk-demo-11.0.16.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829763" comment="java-11-openjdk-devel-11.0.16.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829764" comment="java-11-openjdk-headless-11.0.16.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829765" comment="java-11-openjdk-javadoc-11.0.16.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829766" comment="java-11-openjdk-javadoc-zip-11.0.16.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829767" comment="java-11-openjdk-jmods-11.0.16.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829768" comment="java-11-openjdk-src-11.0.16.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829769" comment="java-11-openjdk-static-libs-11.0.16.0.8-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221618" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21618</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21618" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21618" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21618" ref_url="https://www.suse.com/security/cve/CVE-2022-21618" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:3046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3099-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-November/026431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013160.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GS63GCBRVH7N4JEIZNQAPVFNNVB2OGSU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0067-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XA5CCGSPUXUTQHDG25O5DM4G37BLRUMN/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JGSS). Supported versions that are affected are Oracle Java SE: 17.0.4.1, 19; Oracle GraalVM Enterprise Edition: 21.3.3 and 22.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via Kerberos to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21618/">CVE-2022-21618 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21618">CVE-2022-21618 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204468">SUSE bug 1204468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205302">SUSE bug 1205302</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829853" comment="java-11-openjdk-11.0.17.0.8-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829854" comment="java-11-openjdk-demo-11.0.17.0.8-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829855" comment="java-11-openjdk-devel-11.0.17.0.8-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829856" comment="java-11-openjdk-headless-11.0.17.0.8-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829857" comment="java-11-openjdk-javadoc-11.0.17.0.8-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829858" comment="java-11-openjdk-javadoc-zip-11.0.17.0.8-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829859" comment="java-11-openjdk-jmods-11.0.17.0.8-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829860" comment="java-11-openjdk-src-11.0.17.0.8-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829861" comment="java-11-openjdk-static-libs-11.0.17.0.8-2.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221619" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21619</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21619" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21619" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21619" ref_url="https://www.suse.com/security/cve/CVE-2022-21619" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:3046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3099-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-November/026431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013224.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GS63GCBRVH7N4JEIZNQAPVFNNVB2OGSU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0067-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XA5CCGSPUXUTQHDG25O5DM4G37BLRUMN/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Security). Supported versions that are affected are Oracle Java SE: 8u341, 8u345-perf, 11.0.16.1, 17.0.4.1, 19; Oracle GraalVM Enterprise Edition: 20.3.7, 21.3.3 and 22.2.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-21"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21619/">CVE-2022-21619 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21619">CVE-2022-21619 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204473">SUSE bug 1204473</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205302">SUSE bug 1205302</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829845" comment="java-1.8.0-openjdk-1.8.0.352.b08-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829846" comment="java-1.8.0-openjdk-accessibility-1.8.0.352.b08-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829847" comment="java-1.8.0-openjdk-demo-1.8.0.352.b08-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829848" comment="java-1.8.0-openjdk-devel-1.8.0.352.b08-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829849" comment="java-1.8.0-openjdk-headless-1.8.0.352.b08-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829850" comment="java-1.8.0-openjdk-javadoc-1.8.0.352.b08-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829851" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.352.b08-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829852" comment="java-1.8.0-openjdk-src-1.8.0.352.b08-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829853" comment="java-11-openjdk-11.0.17.0.8-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829854" comment="java-11-openjdk-demo-11.0.17.0.8-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829855" comment="java-11-openjdk-devel-11.0.17.0.8-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829856" comment="java-11-openjdk-headless-11.0.17.0.8-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829857" comment="java-11-openjdk-javadoc-11.0.17.0.8-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829858" comment="java-11-openjdk-javadoc-zip-11.0.17.0.8-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829859" comment="java-11-openjdk-jmods-11.0.17.0.8-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829860" comment="java-11-openjdk-src-11.0.17.0.8-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829861" comment="java-11-openjdk-static-libs-11.0.17.0.8-2.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221624" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21624</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21624" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21624" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21624" ref_url="https://www.suse.com/security/cve/CVE-2022-21624" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:3046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3099-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-November/026431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013224.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GS63GCBRVH7N4JEIZNQAPVFNNVB2OGSU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0067-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XA5CCGSPUXUTQHDG25O5DM4G37BLRUMN/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JNDI). Supported versions that are affected are Oracle Java SE: 8u341, 8u345-perf, 11.0.16.1, 17.0.4.1, 19; Oracle GraalVM Enterprise Edition: 20.3.7, 21.3.3 and 22.2.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-21"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21624/">CVE-2022-21624 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21624">CVE-2022-21624 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204475">SUSE bug 1204475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205302">SUSE bug 1205302</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829845" comment="java-1.8.0-openjdk-1.8.0.352.b08-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829846" comment="java-1.8.0-openjdk-accessibility-1.8.0.352.b08-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829847" comment="java-1.8.0-openjdk-demo-1.8.0.352.b08-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829848" comment="java-1.8.0-openjdk-devel-1.8.0.352.b08-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829849" comment="java-1.8.0-openjdk-headless-1.8.0.352.b08-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829850" comment="java-1.8.0-openjdk-javadoc-1.8.0.352.b08-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829851" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.352.b08-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829852" comment="java-1.8.0-openjdk-src-1.8.0.352.b08-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829853" comment="java-11-openjdk-11.0.17.0.8-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829854" comment="java-11-openjdk-demo-11.0.17.0.8-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829855" comment="java-11-openjdk-devel-11.0.17.0.8-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829856" comment="java-11-openjdk-headless-11.0.17.0.8-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829857" comment="java-11-openjdk-javadoc-11.0.17.0.8-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829858" comment="java-11-openjdk-javadoc-zip-11.0.17.0.8-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829859" comment="java-11-openjdk-jmods-11.0.17.0.8-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829860" comment="java-11-openjdk-src-11.0.17.0.8-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829861" comment="java-11-openjdk-static-libs-11.0.17.0.8-2.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221626" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21626</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21626" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21626" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21626" ref_url="https://www.suse.com/security/cve/CVE-2022-21626" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:3046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3099-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-November/026431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013224.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GS63GCBRVH7N4JEIZNQAPVFNNVB2OGSU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0067-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XA5CCGSPUXUTQHDG25O5DM4G37BLRUMN/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Security). Supported versions that are affected are Oracle Java SE: 8u341, 8u345-perf, 11.0.16.1; Oracle GraalVM Enterprise Edition: 20.3.7, 21.3.3 and 22.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21626/">CVE-2022-21626 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21626">CVE-2022-21626 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204471">SUSE bug 1204471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205302">SUSE bug 1205302</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829845" comment="java-1.8.0-openjdk-1.8.0.352.b08-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829846" comment="java-1.8.0-openjdk-accessibility-1.8.0.352.b08-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829847" comment="java-1.8.0-openjdk-demo-1.8.0.352.b08-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829848" comment="java-1.8.0-openjdk-devel-1.8.0.352.b08-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829849" comment="java-1.8.0-openjdk-headless-1.8.0.352.b08-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829850" comment="java-1.8.0-openjdk-javadoc-1.8.0.352.b08-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829851" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.352.b08-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829852" comment="java-1.8.0-openjdk-src-1.8.0.352.b08-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829853" comment="java-11-openjdk-11.0.17.0.8-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829854" comment="java-11-openjdk-demo-11.0.17.0.8-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829855" comment="java-11-openjdk-devel-11.0.17.0.8-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829856" comment="java-11-openjdk-headless-11.0.17.0.8-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829857" comment="java-11-openjdk-javadoc-11.0.17.0.8-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829858" comment="java-11-openjdk-javadoc-zip-11.0.17.0.8-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829859" comment="java-11-openjdk-jmods-11.0.17.0.8-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829860" comment="java-11-openjdk-src-11.0.17.0.8-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829861" comment="java-11-openjdk-static-libs-11.0.17.0.8-2.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221628" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21628</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21628" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21628" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21628" ref_url="https://www.suse.com/security/cve/CVE-2022-21628" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:3046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3099-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-November/026431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013224.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GS63GCBRVH7N4JEIZNQAPVFNNVB2OGSU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0067-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XA5CCGSPUXUTQHDG25O5DM4G37BLRUMN/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Lightweight HTTP Server). Supported versions that are affected are Oracle Java SE: 8u341, 8u345-perf, 11.0.16.1, 17.0.4.1, 19; Oracle GraalVM Enterprise Edition: 20.3.7, 21.3.3 and 22.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21628/">CVE-2022-21628 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21628">CVE-2022-21628 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204472">SUSE bug 1204472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205302">SUSE bug 1205302</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829845" comment="java-1.8.0-openjdk-1.8.0.352.b08-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829846" comment="java-1.8.0-openjdk-accessibility-1.8.0.352.b08-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829847" comment="java-1.8.0-openjdk-demo-1.8.0.352.b08-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829848" comment="java-1.8.0-openjdk-devel-1.8.0.352.b08-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829849" comment="java-1.8.0-openjdk-headless-1.8.0.352.b08-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829850" comment="java-1.8.0-openjdk-javadoc-1.8.0.352.b08-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829851" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.352.b08-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829852" comment="java-1.8.0-openjdk-src-1.8.0.352.b08-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829853" comment="java-11-openjdk-11.0.17.0.8-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829854" comment="java-11-openjdk-demo-11.0.17.0.8-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829855" comment="java-11-openjdk-devel-11.0.17.0.8-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829856" comment="java-11-openjdk-headless-11.0.17.0.8-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829857" comment="java-11-openjdk-javadoc-11.0.17.0.8-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829858" comment="java-11-openjdk-javadoc-zip-11.0.17.0.8-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829859" comment="java-11-openjdk-jmods-11.0.17.0.8-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829860" comment="java-11-openjdk-src-11.0.17.0.8-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829861" comment="java-11-openjdk-static-libs-11.0.17.0.8-2.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222200" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2200</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2200" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2200" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2200" ref_url="https://www.suse.com/security/cve/CVE-2022-2200" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:2279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011428.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3273-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-September/025151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012383.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    If an object prototype was corrupted by an attacker, they would have been able to set undesired attributes on a JavaScript object, leading to privileged code execution. This vulnerability affects Firefox &lt; 102, Firefox ESR &lt; 91.11, Thunderbird &lt; 102, and Thunderbird &lt; 91.11.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2200/">CVE-2022-2200 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2200">CVE-2022-2200 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829756" comment="firefox-91.11.0-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829757" comment="thunderbird-91.11.0-2.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222226" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2226</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2226" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2226" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2226" ref_url="https://www.suse.com/security/cve/CVE-2022-2226" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012251.html" source="SUSE-SU"/>
    <description>
    An OpenPGP digital signature includes information about the date when the signature was created. When displaying an email that contains a digital signature, the email's date will be shown. If the dates were different, then Thunderbird didn't report the email as having an invalid signature. If an attacker performed a replay attack, in which an old email with old contents are resent at a later time, it could lead the victim to believe that the statements in the email are current. Fixed versions of Thunderbird will require that the signature's date roughly matches the displayed date of the email. This vulnerability affects Thunderbird &lt; 102 and Thunderbird &lt; 91.11.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2226/">CVE-2022-2226 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2226">CVE-2022-2226 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829757" comment="thunderbird-91.11.0-2.el7_9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202222720" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-22720</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-22720" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22720" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-22720" ref_url="https://www.suse.com/security/cve/CVE-2022-22720" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010491.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1031-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4LVBWCEX7IVK73L73JHPXASP5AT5BZGS/" source="SUSE-SU"/>
    <description>
    Apache HTTP Server 2.4.52 and earlier fails to close inbound connection when errors are encountered discarding the request body, exposing the server to HTTP Request Smuggling
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-22720/">CVE-2022-22720 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22720">CVE-2022-22720 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1197095">SUSE bug 1197095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198430">SUSE bug 1198430</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198998">SUSE bug 1198998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199102">SUSE bug 1199102</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199495">SUSE bug 1199495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204730">SUSE bug 1204730</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225670">SUSE bug 1225670</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829624" comment="httpd-2.4.6-97.el7_9.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829625" comment="httpd-devel-2.4.6-97.el7_9.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829626" comment="httpd-manual-2.4.6-97.el7_9.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829627" comment="httpd-tools-2.4.6-97.el7_9.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829628" comment="mod_ldap-2.4.6-97.el7_9.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829629" comment="mod_proxy_html-2.4.6-97.el7_9.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829630" comment="mod_session-2.4.6-97.el7_9.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829631" comment="mod_ssl-2.4.6-97.el7_9.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202222737" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-22737</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-22737" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22737" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-22737" ref_url="https://www.suse.com/security/cve/CVE-2022-22737" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0136-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0137-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021405.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LO2K2OYJXIHKCXT4ZI6S7RGIOS27RIOY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0199-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VJHDOBPPHGJWIXDJDMLZUCHBBMTQIEIO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Constructing audio sinks could have lead to a race condition when playing audio files and closing windows. This could have lead to a use-after-free causing a potentially exploitable crash. This vulnerability affects Firefox ESR &lt; 91.5, Firefox &lt; 96, and Thunderbird &lt; 91.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22737/">CVE-2022-22737 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22737">CVE-2022-22737 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1194547">SUSE bug 1194547</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829527" comment="firefox-91.5.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829528" comment="thunderbird-91.5.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202222738" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-22738</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-22738" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22738" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-22738" ref_url="https://www.suse.com/security/cve/CVE-2022-22738" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0136-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0137-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021405.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LO2K2OYJXIHKCXT4ZI6S7RGIOS27RIOY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0199-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VJHDOBPPHGJWIXDJDMLZUCHBBMTQIEIO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Applying a CSS filter effect could have accessed out of bounds memory. This could have lead to a heap-buffer-overflow causing a potentially exploitable crash. This vulnerability affects Firefox ESR &lt; 91.5, Firefox &lt; 96, and Thunderbird &lt; 91.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22738/">CVE-2022-22738 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22738">CVE-2022-22738 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1194547">SUSE bug 1194547</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829527" comment="firefox-91.5.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829528" comment="thunderbird-91.5.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202222739" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-22739</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-22739" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22739" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-22739" ref_url="https://www.suse.com/security/cve/CVE-2022-22739" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0136-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0137-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021405.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LO2K2OYJXIHKCXT4ZI6S7RGIOS27RIOY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0199-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VJHDOBPPHGJWIXDJDMLZUCHBBMTQIEIO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Malicious websites could have tricked users into accepting launching a program to handle an external URL protocol. This vulnerability affects Firefox ESR &lt; 91.5, Firefox &lt; 96, and Thunderbird &lt; 91.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22739/">CVE-2022-22739 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22739">CVE-2022-22739 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1194547">SUSE bug 1194547</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829527" comment="firefox-91.5.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829528" comment="thunderbird-91.5.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202222740" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-22740</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-22740" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22740" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-22740" ref_url="https://www.suse.com/security/cve/CVE-2022-22740" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0136-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0137-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021405.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LO2K2OYJXIHKCXT4ZI6S7RGIOS27RIOY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0199-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VJHDOBPPHGJWIXDJDMLZUCHBBMTQIEIO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Certain network request objects were freed too early when releasing a network request handle. This could have lead to a use-after-free causing a potentially exploitable crash. This vulnerability affects Firefox ESR &lt; 91.5, Firefox &lt; 96, and Thunderbird &lt; 91.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22740/">CVE-2022-22740 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22740">CVE-2022-22740 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1194547">SUSE bug 1194547</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829527" comment="firefox-91.5.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829528" comment="thunderbird-91.5.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202222741" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-22741</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-22741" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22741" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-22741" ref_url="https://www.suse.com/security/cve/CVE-2022-22741" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0136-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0137-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021405.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LO2K2OYJXIHKCXT4ZI6S7RGIOS27RIOY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0199-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VJHDOBPPHGJWIXDJDMLZUCHBBMTQIEIO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    When resizing a popup while requesting fullscreen access, the popup would have become unable to leave fullscreen mode. This vulnerability affects Firefox ESR &lt; 91.5, Firefox &lt; 96, and Thunderbird &lt; 91.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22741/">CVE-2022-22741 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22741">CVE-2022-22741 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1194547">SUSE bug 1194547</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829527" comment="firefox-91.5.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829528" comment="thunderbird-91.5.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202222742" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-22742</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-22742" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22742" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-22742" ref_url="https://www.suse.com/security/cve/CVE-2022-22742" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0136-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0137-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021405.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LO2K2OYJXIHKCXT4ZI6S7RGIOS27RIOY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0199-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VJHDOBPPHGJWIXDJDMLZUCHBBMTQIEIO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    When inserting text while in edit mode, some characters might have lead to out-of-bounds memory access causing a potentially exploitable crash. This vulnerability affects Firefox ESR &lt; 91.5, Firefox &lt; 96, and Thunderbird &lt; 91.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22742/">CVE-2022-22742 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22742">CVE-2022-22742 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1194547">SUSE bug 1194547</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829527" comment="firefox-91.5.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829528" comment="thunderbird-91.5.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202222743" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-22743</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-22743" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22743" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-22743" ref_url="https://www.suse.com/security/cve/CVE-2022-22743" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0136-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0137-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021405.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LO2K2OYJXIHKCXT4ZI6S7RGIOS27RIOY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0199-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VJHDOBPPHGJWIXDJDMLZUCHBBMTQIEIO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    When navigating from inside an iframe while requesting fullscreen access, an attacker-controlled tab could have made the browser unable to leave fullscreen mode. This vulnerability affects Firefox ESR &lt; 91.5, Firefox &lt; 96, and Thunderbird &lt; 91.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22743/">CVE-2022-22743 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22743">CVE-2022-22743 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1194547">SUSE bug 1194547</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829527" comment="firefox-91.5.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829528" comment="thunderbird-91.5.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202222745" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-22745</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-22745" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22745" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-22745" ref_url="https://www.suse.com/security/cve/CVE-2022-22745" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0136-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0137-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021405.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LO2K2OYJXIHKCXT4ZI6S7RGIOS27RIOY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0199-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VJHDOBPPHGJWIXDJDMLZUCHBBMTQIEIO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Securitypolicyviolation events could have leaked cross-origin information for frame-ancestors violations. This vulnerability affects Firefox ESR &lt; 91.5, Firefox &lt; 96, and Thunderbird &lt; 91.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22745/">CVE-2022-22745 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22745">CVE-2022-22745 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1194547">SUSE bug 1194547</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829527" comment="firefox-91.5.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829528" comment="thunderbird-91.5.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202222747" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-22747</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-22747" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22747" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-22747" ref_url="https://www.suse.com/security/cve/CVE-2022-22747" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0136-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0137-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021405.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LO2K2OYJXIHKCXT4ZI6S7RGIOS27RIOY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0199-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VJHDOBPPHGJWIXDJDMLZUCHBBMTQIEIO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    After accepting an untrusted certificate, handling an empty pkcs7 sequence as part of the certificate data could have lead to a crash. This crash is believed to be unexploitable. This vulnerability affects Firefox ESR &lt; 91.5, Firefox &lt; 96, and Thunderbird &lt; 91.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-22747/">CVE-2022-22747 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22747">CVE-2022-22747 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1194547">SUSE bug 1194547</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829527" comment="firefox-91.5.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829528" comment="thunderbird-91.5.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202222748" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-22748</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-22748" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22748" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-22748" ref_url="https://www.suse.com/security/cve/CVE-2022-22748" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0136-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0137-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021405.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LO2K2OYJXIHKCXT4ZI6S7RGIOS27RIOY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0199-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VJHDOBPPHGJWIXDJDMLZUCHBBMTQIEIO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Malicious websites could have confused Firefox into showing the wrong origin when asking to launch a program and handling an external URL protocol. This vulnerability affects Firefox ESR &lt; 91.5, Firefox &lt; 96, and Thunderbird &lt; 91.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22748/">CVE-2022-22748 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22748">CVE-2022-22748 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1194547">SUSE bug 1194547</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829527" comment="firefox-91.5.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829528" comment="thunderbird-91.5.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202222751" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-22751</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-22751" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22751" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-22751" ref_url="https://www.suse.com/security/cve/CVE-2022-22751" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0136-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0137-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021405.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LO2K2OYJXIHKCXT4ZI6S7RGIOS27RIOY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0199-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VJHDOBPPHGJWIXDJDMLZUCHBBMTQIEIO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Mozilla developers Calixte Denizet, Kershaw Chang, Christian Holler, Jason Kratzer, Gabriele Svelto, Tyson Smith, Simon Giesecke, and Steve Fink reported memory safety bugs present in Firefox 95 and Firefox ESR 91.4. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR &lt; 91.5, Firefox &lt; 96, and Thunderbird &lt; 91.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22751/">CVE-2022-22751 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22751">CVE-2022-22751 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1194547">SUSE bug 1194547</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829527" comment="firefox-91.5.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829528" comment="thunderbird-91.5.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202222754" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-22754</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-22754" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22754" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-22754" ref_url="https://www.suse.com/security/cve/CVE-2022-22754" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0676-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010301.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0559-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GSM3MOVKIHQAE33NLCNX7MUULCOLEADF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:40696-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GLKBY66GKNX6KTZGJNPYOI7GCDSXWVYU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    If a user installed an extension of a particular type, the extension could have auto-updated itself and while doing so, bypass the prompt which grants the new version the new requested permissions. This vulnerability affects Firefox &lt; 97, Thunderbird &lt; 91.6, and Firefox ESR &lt; 91.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22754/">CVE-2022-22754 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22754">CVE-2022-22754 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1195682">SUSE bug 1195682</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829581" comment="firefox-91.6.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829582" comment="thunderbird-91.6.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202222756" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-22756</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-22756" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22756" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-22756" ref_url="https://www.suse.com/security/cve/CVE-2022-22756" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0676-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010301.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0559-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GSM3MOVKIHQAE33NLCNX7MUULCOLEADF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:40696-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GLKBY66GKNX6KTZGJNPYOI7GCDSXWVYU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    If a user was convinced to drag and drop an image to their desktop or other folder, the resulting object could have been changed into an executable script which would have run arbitrary code after the user clicked on it. This vulnerability affects Firefox &lt; 97, Thunderbird &lt; 91.6, and Firefox ESR &lt; 91.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22756/">CVE-2022-22756 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22756">CVE-2022-22756 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1195682">SUSE bug 1195682</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829581" comment="firefox-91.6.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829582" comment="thunderbird-91.6.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202222759" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-22759</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-22759" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22759" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-22759" ref_url="https://www.suse.com/security/cve/CVE-2022-22759" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0676-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010301.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0559-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GSM3MOVKIHQAE33NLCNX7MUULCOLEADF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:40696-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GLKBY66GKNX6KTZGJNPYOI7GCDSXWVYU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    If a document created a sandboxed iframe without &lt;code&gt;allow-scripts&lt;/code&gt;, and subsequently appended an element to the iframe's document that e.g. had a JavaScript event handler - the event handler would have run despite the iframe's sandbox. This vulnerability affects Firefox &lt; 97, Thunderbird &lt; 91.6, and Firefox ESR &lt; 91.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22759/">CVE-2022-22759 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22759">CVE-2022-22759 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1195682">SUSE bug 1195682</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829581" comment="firefox-91.6.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829582" comment="thunderbird-91.6.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202222760" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-22760</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-22760" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22760" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-22760" ref_url="https://www.suse.com/security/cve/CVE-2022-22760" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0676-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010301.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0559-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GSM3MOVKIHQAE33NLCNX7MUULCOLEADF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:40696-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GLKBY66GKNX6KTZGJNPYOI7GCDSXWVYU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    When importing resources using Web Workers, error messages would distinguish the difference between &lt;code&gt;application/javascript&lt;/code&gt; responses and non-script responses. This could have been abused to learn information cross-origin. This vulnerability affects Firefox &lt; 97, Thunderbird &lt; 91.6, and Firefox ESR &lt; 91.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22760/">CVE-2022-22760 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22760">CVE-2022-22760 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1195682">SUSE bug 1195682</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829581" comment="firefox-91.6.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829582" comment="thunderbird-91.6.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202222761" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-22761</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-22761" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22761" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-22761" ref_url="https://www.suse.com/security/cve/CVE-2022-22761" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0676-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010301.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0559-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GSM3MOVKIHQAE33NLCNX7MUULCOLEADF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:40696-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GLKBY66GKNX6KTZGJNPYOI7GCDSXWVYU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Web-accessible extension pages (pages with a moz-extension:// scheme) were not correctly enforcing the frame-ancestors directive when it was used in the Web Extension's Content Security Policy. This vulnerability affects Firefox &lt; 97, Thunderbird &lt; 91.6, and Firefox ESR &lt; 91.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22761/">CVE-2022-22761 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22761">CVE-2022-22761 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1195682">SUSE bug 1195682</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829581" comment="firefox-91.6.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829582" comment="thunderbird-91.6.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202222763" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-22763</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-22763" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22763" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-22763" ref_url="https://www.suse.com/security/cve/CVE-2022-22763" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0676-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010301.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0559-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GSM3MOVKIHQAE33NLCNX7MUULCOLEADF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:40696-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GLKBY66GKNX6KTZGJNPYOI7GCDSXWVYU/" source="SUSE-SU"/>
    <description>
    When a worker is shutdown, it was possible to cause script to run late in the lifecycle, at a point after where it should not be possible. This vulnerability affects Firefox &lt; 96, Thunderbird &lt; 91.6, and Firefox ESR &lt; 91.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22763/">CVE-2022-22763 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22763">CVE-2022-22763 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1195682">SUSE bug 1195682</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829581" comment="firefox-91.6.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829582" comment="thunderbird-91.6.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202222764" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-22764</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-22764" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22764" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-22764" ref_url="https://www.suse.com/security/cve/CVE-2022-22764" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0676-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010301.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0559-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GSM3MOVKIHQAE33NLCNX7MUULCOLEADF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:40696-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GLKBY66GKNX6KTZGJNPYOI7GCDSXWVYU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Mozilla developers Paul Adenot and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 96 and Firefox ESR 91.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 97, Thunderbird &lt; 91.6, and Firefox ESR &lt; 91.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22764/">CVE-2022-22764 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22764">CVE-2022-22764 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1195682">SUSE bug 1195682</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829581" comment="firefox-91.6.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829582" comment="thunderbird-91.6.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202222816" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-22816</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-22816" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22816" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-22816" ref_url="https://www.suse.com/security/cve/CVE-2022-22816" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:1729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1673-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1673-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018714.html" source="SUSE-SU"/>
    <description>
    path_getbbox in path.c in Pillow before 9.0.0 has a buffer over-read during initialization of ImagePath.Path.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-22816/">CVE-2022-22816 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22816">CVE-2022-22816 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1194551">SUSE bug 1194551</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829583" comment="python-pillow-2.0.0-23.gitd1c6db8.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829584" comment="python-pillow-devel-2.0.0-23.gitd1c6db8.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829585" comment="python-pillow-doc-2.0.0-23.gitd1c6db8.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829586" comment="python-pillow-qt-2.0.0-23.gitd1c6db8.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829587" comment="python-pillow-sane-2.0.0-23.gitd1c6db8.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829588" comment="python-pillow-tk-2.0.0-23.gitd1c6db8.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202222817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-22817</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-22817" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22817" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-22817" ref_url="https://www.suse.com/security/cve/CVE-2022-22817" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:1729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017823.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14645-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/44PI4DZ7YJFTM3VMZXVNEBF2OQQVHGKN/" source="SUSE-SU"/>
    <description>
    PIL.ImageMath.eval in Pillow before 9.0.0 allows evaluation of arbitrary expressions, such as ones that use the Python exec method. A lambda expression could also be used.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-22817/">CVE-2022-22817 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22817">CVE-2022-22817 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1194521">SUSE bug 1194521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219048">SUSE bug 1219048</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829583" comment="python-pillow-2.0.0-23.gitd1c6db8.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829584" comment="python-pillow-devel-2.0.0-23.gitd1c6db8.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829585" comment="python-pillow-doc-2.0.0-23.gitd1c6db8.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829586" comment="python-pillow-qt-2.0.0-23.gitd1c6db8.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829587" comment="python-pillow-sane-2.0.0-23.gitd1c6db8.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829588" comment="python-pillow-tk-2.0.0-23.gitd1c6db8.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202222822" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-22822</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-22822" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22822" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-22822" ref_url="https://www.suse.com/security/cve/CVE-2022-22822" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:58-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:60-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:80-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:31-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:36-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0178-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5POFOWWCWJ3SLTEUIQRMKXQB4GOECNOP/" source="SUSE-SU"/>
    <description>
    addBinding in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22822/">CVE-2022-22822 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22822">CVE-2022-22822 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1194474">SUSE bug 1194474</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195327">SUSE bug 1195327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200038">SUSE bug 1200038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200198">SUSE bug 1200198</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829635" comment="expat-2.1.0-14.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829636" comment="expat-devel-2.1.0-14.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829637" comment="expat-static-2.1.0-14.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202222823" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-22823</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-22823" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22823" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-22823" ref_url="https://www.suse.com/security/cve/CVE-2022-22823" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:58-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:60-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:80-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:31-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:36-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0178-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5POFOWWCWJ3SLTEUIQRMKXQB4GOECNOP/" source="SUSE-SU"/>
    <description>
    build_model in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22823/">CVE-2022-22823 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22823">CVE-2022-22823 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1194476">SUSE bug 1194476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195327">SUSE bug 1195327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200038">SUSE bug 1200038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200198">SUSE bug 1200198</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829635" comment="expat-2.1.0-14.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829636" comment="expat-devel-2.1.0-14.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829637" comment="expat-static-2.1.0-14.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202222824" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-22824</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-22824" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22824" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-22824" ref_url="https://www.suse.com/security/cve/CVE-2022-22824" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:58-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:60-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:80-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:31-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:36-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0178-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5POFOWWCWJ3SLTEUIQRMKXQB4GOECNOP/" source="SUSE-SU"/>
    <description>
    defineAttribute in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22824/">CVE-2022-22824 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22824">CVE-2022-22824 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1194477">SUSE bug 1194477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195327">SUSE bug 1195327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200038">SUSE bug 1200038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200198">SUSE bug 1200198</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829635" comment="expat-2.1.0-14.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829636" comment="expat-devel-2.1.0-14.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829637" comment="expat-static-2.1.0-14.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202222825" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-22825</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-22825" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22825" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-22825" ref_url="https://www.suse.com/security/cve/CVE-2022-22825" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:58-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:60-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:80-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:31-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:36-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0178-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5POFOWWCWJ3SLTEUIQRMKXQB4GOECNOP/" source="SUSE-SU"/>
    <description>
    lookup in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22825/">CVE-2022-22825 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22825">CVE-2022-22825 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1194478">SUSE bug 1194478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195327">SUSE bug 1195327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200038">SUSE bug 1200038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200198">SUSE bug 1200198</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829635" comment="expat-2.1.0-14.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829636" comment="expat-devel-2.1.0-14.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829637" comment="expat-static-2.1.0-14.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202222826" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-22826</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-22826" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22826" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-22826" ref_url="https://www.suse.com/security/cve/CVE-2022-22826" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:58-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:60-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:80-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:31-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:36-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0178-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5POFOWWCWJ3SLTEUIQRMKXQB4GOECNOP/" source="SUSE-SU"/>
    <description>
    nextScaffoldPart in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22826/">CVE-2022-22826 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22826">CVE-2022-22826 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1194479">SUSE bug 1194479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195327">SUSE bug 1195327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200038">SUSE bug 1200038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200198">SUSE bug 1200198</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829635" comment="expat-2.1.0-14.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829636" comment="expat-devel-2.1.0-14.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829637" comment="expat-static-2.1.0-14.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202222827" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-22827</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-22827" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22827" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-22827" ref_url="https://www.suse.com/security/cve/CVE-2022-22827" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:58-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:60-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:80-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:31-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:36-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0178-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5POFOWWCWJ3SLTEUIQRMKXQB4GOECNOP/" source="SUSE-SU"/>
    <description>
    storeAtts in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22827/">CVE-2022-22827 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22827">CVE-2022-22827 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1194480">SUSE bug 1194480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195327">SUSE bug 1195327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200038">SUSE bug 1200038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200198">SUSE bug 1200198</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829635" comment="expat-2.1.0-14.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829636" comment="expat-devel-2.1.0-14.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829637" comment="expat-static-2.1.0-14.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202222942" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-22942</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-22942" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22942" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-22942" ref_url="https://www.suse.com/security/cve/CVE-2022-22942" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:282-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0363-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0365-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010776.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1593-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2365-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0363-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K4ZJSATCJ2GMGCX6RSG2TU2YU4DDOMVQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0370-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ASMTCFCDULHGAOBQUFJH4PHVCQSTF7S6/" source="SUSE-SU"/>
    <description>
    The vmwgfx driver contains a local privilege escalation vulnerability that allows unprivileged users to gain access to files opened by other processes on the system through a dangling 'file' pointer.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22942/">CVE-2022-22942 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22942">CVE-2022-22942 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1195065">SUSE bug 1195065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195951">SUSE bug 1195951</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829589" comment="bpftool-3.10.0-1160.59.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829590" comment="kernel-3.10.0-1160.59.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829591" comment="kernel-abi-whitelists-3.10.0-1160.59.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829592" comment="kernel-debug-3.10.0-1160.59.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829595" comment="kernel-doc-3.10.0-1160.59.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829596" comment="kernel-headers-3.10.0-1160.59.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829597" comment="kernel-tools-3.10.0-1160.59.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829598" comment="kernel-tools-libs-3.10.0-1160.59.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829600" comment="perf-3.10.0-1160.59.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829601" comment="python-perf-3.10.0-1160.59.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222319" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2319</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2319" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2319" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2319" ref_url="https://www.suse.com/security/cve/CVE-2022-2319" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:2369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011514.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011513.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011517.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Xorg-x11-server. An out-of-bounds access issue can occur in the ProcXkbSetGeometry function due to improper validation of the request length.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2319/">CVE-2022-2319 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2319">CVE-2022-2319 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1194179">SUSE bug 1194179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204093">SUSE bug 1204093</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205071">SUSE bug 1205071</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206243">SUSE bug 1206243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829780" comment="xorg-x11-server-Xdmx-1.20.4-18.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829781" comment="xorg-x11-server-Xephyr-1.20.4-18.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829782" comment="xorg-x11-server-Xnest-1.20.4-18.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829783" comment="xorg-x11-server-Xorg-1.20.4-18.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829784" comment="xorg-x11-server-Xvfb-1.20.4-18.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829785" comment="xorg-x11-server-Xwayland-1.20.4-18.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829786" comment="xorg-x11-server-common-1.20.4-18.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829787" comment="xorg-x11-server-devel-1.20.4-18.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829788" comment="xorg-x11-server-source-1.20.4-18.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222320" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2320</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2320" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2320" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2320" ref_url="https://www.suse.com/security/cve/CVE-2022-2320" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:2369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011514.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011513.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011517.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Xorg-x11-server. The specific flaw exists within the handling of ProcXkbSetDeviceInfo requests. The issue results from the lack of proper validation of user-supplied data, which can result in a memory access past the end of an allocated buffer. This flaw allows an attacker to escalate privileges and execute arbitrary code in the context of root.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2320/">CVE-2022-2320 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2320">CVE-2022-2320 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1194181">SUSE bug 1194181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201793">SUSE bug 1201793</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204123">SUSE bug 1204123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205071">SUSE bug 1205071</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829780" comment="xorg-x11-server-Xdmx-1.20.4-18.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829781" comment="xorg-x11-server-Xephyr-1.20.4-18.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829782" comment="xorg-x11-server-Xnest-1.20.4-18.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829783" comment="xorg-x11-server-Xorg-1.20.4-18.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829784" comment="xorg-x11-server-Xvfb-1.20.4-18.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829785" comment="xorg-x11-server-Xwayland-1.20.4-18.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829786" comment="xorg-x11-server-common-1.20.4-18.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829787" comment="xorg-x11-server-devel-1.20.4-18.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829788" comment="xorg-x11-server-source-1.20.4-18.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202223521" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-23521</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-23521" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23521" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-23521" ref_url="https://www.suse.com/security/cve/CVE-2022-23521" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013500.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013486.html" source="SUSE-SU"/>
    <description>
    Git is distributed revision control system. gitattributes are a mechanism to allow defining attributes for paths. These attributes can be defined by adding a `.gitattributes` file to the repository, which contains a set of file patterns and the attributes that should be set for paths matching this pattern. When parsing gitattributes, multiple integer overflows can occur when there is a huge number of path patterns, a huge number of attributes for a single pattern, or when the declared attribute names are huge. These overflows can be triggered via a crafted `.gitattributes` file that may be part of the commit history. Git silently splits lines longer than 2KB when parsing gitattributes from a file, but not when parsing them from the index. Consequentially, the failure mode depends on whether the file exists in the working tree, the index or both. This integer overflow can result in arbitrary heap reads and writes, which may result in remote code execution. The problem has been patched in the versions published on 2023-01-17, going back to v2.30.7. Users are advised to upgrade. There are no known workarounds for this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23521/">CVE-2022-23521 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23521">CVE-2022-23521 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1207032">SUSE bug 1207032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207033">SUSE bug 1207033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208650">SUSE bug 1208650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209317">SUSE bug 1209317</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830075" comment="emacs-git-1.8.3.1-24.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830076" comment="emacs-git-el-1.8.3.1-24.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830077" comment="git-1.8.3.1-24.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830078" comment="git-all-1.8.3.1-24.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830079" comment="git-bzr-1.8.3.1-24.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830080" comment="git-cvs-1.8.3.1-24.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830081" comment="git-daemon-1.8.3.1-24.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830082" comment="git-email-1.8.3.1-24.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830083" comment="git-gnome-keyring-1.8.3.1-24.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830084" comment="git-gui-1.8.3.1-24.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830085" comment="git-hg-1.8.3.1-24.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830086" comment="git-instaweb-1.8.3.1-24.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830087" comment="git-p4-1.8.3.1-24.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830088" comment="git-svn-1.8.3.1-24.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830089" comment="gitk-1.8.3.1-24.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830090" comment="gitweb-1.8.3.1-24.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830091" comment="perl-Git-1.8.3.1-24.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830092" comment="perl-Git-SVN-1.8.3.1-24.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202223816" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-23816</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-23816" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23816" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-23816" ref_url="https://www.suse.com/security/cve/CVE-2022-23816" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2599-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011717.html" source="SUSE-SU"/>
    <description>
    DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate is unused by its CNA. Notes: none.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-23816/">CVE-2022-23816 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-23816">CVE-2022-23816 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1201456">SUSE bug 1201456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201469">SUSE bug 1201469</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829885" comment="bpftool-3.10.0-1160.80.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829886" comment="kernel-3.10.0-1160.80.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829887" comment="kernel-abi-whitelists-3.10.0-1160.80.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829888" comment="kernel-debug-3.10.0-1160.80.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829891" comment="kernel-doc-3.10.0-1160.80.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829892" comment="kernel-headers-3.10.0-1160.80.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829893" comment="kernel-tools-3.10.0-1160.80.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829894" comment="kernel-tools-libs-3.10.0-1160.80.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829896" comment="perf-3.10.0-1160.80.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829897" comment="python-perf-3.10.0-1160.80.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202223825" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-23825</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-23825" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23825" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-23825" ref_url="https://www.suse.com/security/cve/CVE-2022-23825" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2599-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011717.html" source="SUSE-SU"/>
		<reference ref_id="TID000020693" ref_url="https://www.suse.com/support/kb/doc/?id=000020693" source="SUSE-SU"/>
    <description>
    Aliases in the branch predictor may cause some AMD processors to predict the wrong branch type potentially leading to information disclosure.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-23825/">CVE-2022-23825 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23825">CVE-2022-23825 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1201457">SUSE bug 1201457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201469">SUSE bug 1201469</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205209">SUSE bug 1205209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829885" comment="bpftool-3.10.0-1160.80.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829886" comment="kernel-3.10.0-1160.80.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829887" comment="kernel-abi-whitelists-3.10.0-1160.80.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829888" comment="kernel-debug-3.10.0-1160.80.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829891" comment="kernel-doc-3.10.0-1160.80.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829892" comment="kernel-headers-3.10.0-1160.80.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829893" comment="kernel-tools-3.10.0-1160.80.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829894" comment="kernel-tools-libs-3.10.0-1160.80.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829896" comment="perf-3.10.0-1160.80.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829897" comment="python-perf-3.10.0-1160.80.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202223852" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-23852</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-23852" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23852" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-23852" ref_url="https://www.suse.com/security/cve/CVE-2022-23852" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:282-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14884-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010199.html" source="SUSE-SU"/>
		<reference ref_id="TID000020633" ref_url="https://www.suse.com/support/kb/doc/?id=000020633" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0498-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2BCJZG2PLWMYBP7YS7O3T6NSE3AKSEBB/" source="SUSE-SU"/>
    <description>
    Expat (aka libexpat) before 2.4.4 has a signed integer overflow in XML_GetBuffer, for configurations with a nonzero XML_CONTEXT_BYTES.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23852/">CVE-2022-23852 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23852">CVE-2022-23852 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1195054">SUSE bug 1195054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196480">SUSE bug 1196480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200038">SUSE bug 1200038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200198">SUSE bug 1200198</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829635" comment="expat-2.1.0-14.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829636" comment="expat-devel-2.1.0-14.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829637" comment="expat-static-2.1.0-14.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222393" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2393</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2393" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2393" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2393" ref_url="https://www.suse.com/security/cve/CVE-2022-2393" source="SUSE CVE"/>
    <description>
    A flaw was found in pki-core, which could allow a user to get a certificate for another user identity when directory-based authentication is enabled. This flaw allows an authenticated attacker on the adjacent network to impersonate another user within the scope of the domain, but they would not be able to decrypt message content.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2393/">CVE-2022-2393 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2393">CVE-2022-2393 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829863" comment="pki-base-10.5.18-23.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829864" comment="pki-base-java-10.5.18-23.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829865" comment="pki-ca-10.5.18-23.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829866" comment="pki-javadoc-10.5.18-23.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829867" comment="pki-kra-10.5.18-23.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829868" comment="pki-server-10.5.18-23.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829869" comment="pki-symkey-10.5.18-23.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829870" comment="pki-tools-10.5.18-23.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222414" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2414</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2414" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2414" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2414" ref_url="https://www.suse.com/security/cve/CVE-2022-2414" source="SUSE CVE"/>
    <description>
    Access to external entities when parsing XML documents can lead to XML external entity (XXE) attacks. This flaw allows a remote attacker to potentially retrieve the content of arbitrary files by sending specially crafted HTTP requests.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2414/">CVE-2022-2414 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2414">CVE-2022-2414 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829923" comment="pki-base-10.5.18-24.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829924" comment="pki-base-java-10.5.18-24.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829925" comment="pki-ca-10.5.18-24.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829926" comment="pki-javadoc-10.5.18-24.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829927" comment="pki-kra-10.5.18-24.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829928" comment="pki-server-10.5.18-24.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829929" comment="pki-symkey-10.5.18-24.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829930" comment="pki-tools-10.5.18-24.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202224407" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-24407</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-24407" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24407" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-24407" ref_url="https://www.suse.com/security/cve/CVE-2022-24407" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1151-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010513.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010514.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010526.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:363-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:404-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:405-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010543.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010544.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:492-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010635.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:357-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:358-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0653-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0743-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010287.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0743-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BPABQLPWLWVSDVE54YNNZUHMKWEV6F3X/" source="SUSE-SU"/>
    <description>
    In Cyrus SASL 2.1.17 through 2.1.27 before 2.1.28, plugins/sql.c does not escape the password for a SQL INSERT or UPDATE statement.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-24407/">CVE-2022-24407 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24407">CVE-2022-24407 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1196036">SUSE bug 1196036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198600">SUSE bug 1198600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199112">SUSE bug 1199112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199494">SUSE bug 1199494</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200197">SUSE bug 1200197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200200">SUSE bug 1200200</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225034">SUSE bug 1225034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225669">SUSE bug 1225669</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829611" comment="cyrus-sasl-2.1.26-24.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829612" comment="cyrus-sasl-devel-2.1.26-24.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829613" comment="cyrus-sasl-gs2-2.1.26-24.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829614" comment="cyrus-sasl-gssapi-2.1.26-24.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829615" comment="cyrus-sasl-ldap-2.1.26-24.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829616" comment="cyrus-sasl-lib-2.1.26-24.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829617" comment="cyrus-sasl-md5-2.1.26-24.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829618" comment="cyrus-sasl-ntlm-2.1.26-24.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829619" comment="cyrus-sasl-plain-2.1.26-24.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829620" comment="cyrus-sasl-scram-2.1.26-24.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829621" comment="cyrus-sasl-sql-2.1.26-24.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202224713" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-24713</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-24713" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24713" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-24713" ref_url="https://www.suse.com/security/cve/CVE-2022-24713" source="SUSE CVE"/>
		<reference ref_id="SUSE-RU-2022:1114-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-April/022464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2022:14935-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-April/022462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1844-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3783-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3784-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3785-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3786-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023135.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1127-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/76BLKP3BHKRBWFX4VJKKQJQXQTYEOOSX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:0294-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5D6EJD2U437T6U4EHNYRU44B2UOGLUUB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    regex is an implementation of regular expressions for the Rust language. The regex crate features built-in mitigations to prevent denial of service attacks caused by untrusted regexes, or untrusted input matched by trusted regexes. Those (tunable) mitigations already provide sane defaults to prevent attacks. This guarantee is documented and it's considered part of the crate's API. Unfortunately a bug was discovered in the mitigations designed to prevent untrusted regexes to take an arbitrary amount of time during parsing, and it's possible to craft regexes that bypass such mitigations. This makes it possible to perform denial of service attacks by sending specially crafted regexes to services accepting user-controlled, untrusted regexes. All versions of the regex crate before or equal to 1.5.4 are affected by this issue. The fix is include starting from regex 1.5.5. All users accepting user-controlled regexes are recommended to upgrade immediately to the latest version of the regex crate. Unfortunately there is no fixed set of problematic regexes, as there are practically infinite regexes that could be crafted to exploit this vulnerability. Because of this, it us not recommend to deny known problematic regexes.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-11-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-24713/">CVE-2022-24713 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24713">CVE-2022-24713 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1196972">SUSE bug 1196972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197903">SUSE bug 1197903</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829651" comment="firefox-91.8.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829652" comment="thunderbird-91.8.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202224801" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-24801</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-24801" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24801" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-24801" ref_url="https://www.suse.com/security/cve/CVE-2022-24801" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:1477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010948.html" source="SUSE-SU"/>
    <description>
    Twisted is an event-based framework for internet applications, supporting Python 3.6+. Prior to version 22.4.0rc1, the Twisted Web HTTP 1.1 server, located in the `twisted.web.http` module, parsed several HTTP request constructs more leniently than permitted by RFC 7230. This non-conformant parsing can lead to desync if requests pass through multiple HTTP parsers, potentially resulting in HTTP request smuggling. Users who may be affected use Twisted Web's HTTP 1.1 server and/or proxy and also pass requests through a different HTTP server and/or proxy. The Twisted Web client is not affected. The HTTP 2.0 server uses a different parser, so it is not affected. The issue has been addressed in Twisted 22.4.0rc1. Two workarounds are available: Ensure any vulnerabilities in upstream proxies have been addressed, such as by upgrading them; or filter malformed requests by other means, such as configuration of an upstream proxy.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-24801/">CVE-2022-24801 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24801">CVE-2022-24801 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198086">SUSE bug 1198086</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829713" comment="python-twisted-web-12.1.0-8.el7_9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202224903" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-24903</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-24903" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24903" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-24903" ref_url="https://www.suse.com/security/cve/CVE-2022-24903" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1583-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011484.html" source="SUSE-SU"/>
    <description>
    Rsyslog is a rocket-fast system for log processing. Modules for TCP syslog reception have a potential heap buffer overflow when octet-counted framing is used. This can result in a segfault or some other malfunction. As of our understanding, this vulnerability can not be used for remote code execution. But there may still be a slight chance for experts to do that. The bug occurs when the octet count is read. While there is a check for the maximum number of octets, digits are written to a heap buffer even when the octet count is over the maximum, This can be used to overrun the memory buffer. However, once the sequence of digits stop, no additional characters can be added to the buffer. In our opinion, this makes remote exploits impossible or at least highly complex. Octet-counted framing is one of two potential framing modes. It is relatively uncommon, but enabled by default on receivers. Modules `imtcp`, `imptcp`, `imgssapi`, and `imhttp` are used for regular syslog message reception. It is best practice not to directly expose them to the public. When this practice is followed, the risk is considerably lower. Module `imdiag` is a diagnostics module primarily intended for testbench runs. We do not expect it to be present on any production installation. Octet-counted framing is not very common. Usually, it needs to be specifically enabled at senders. If users do not need it, they can turn it off for the most important modules. This will mitigate the vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-24903/">CVE-2022-24903 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24903">CVE-2022-24903 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1199061">SUSE bug 1199061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201736">SUSE bug 1201736</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206201">SUSE bug 1206201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225528">SUSE bug 1225528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225631">SUSE bug 1225631</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829693" comment="rsyslog-8.24.0-57.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829694" comment="rsyslog-crypto-8.24.0-57.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829695" comment="rsyslog-doc-8.24.0-57.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829696" comment="rsyslog-elasticsearch-8.24.0-57.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829697" comment="rsyslog-gnutls-8.24.0-57.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829698" comment="rsyslog-gssapi-8.24.0-57.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829699" comment="rsyslog-kafka-8.24.0-57.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829700" comment="rsyslog-libdbi-8.24.0-57.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829701" comment="rsyslog-mmaudit-8.24.0-57.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829702" comment="rsyslog-mmjsonparse-8.24.0-57.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829703" comment="rsyslog-mmkubernetes-8.24.0-57.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829704" comment="rsyslog-mmnormalize-8.24.0-57.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829705" comment="rsyslog-mmsnmptrapd-8.24.0-57.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829706" comment="rsyslog-mysql-8.24.0-57.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829707" comment="rsyslog-pgsql-8.24.0-57.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829708" comment="rsyslog-relp-8.24.0-57.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829709" comment="rsyslog-snmp-8.24.0-57.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829710" comment="rsyslog-udpspoof-8.24.0-57.el7_9.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222505" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2505</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2505" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2505" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2505" ref_url="https://www.suse.com/security/cve/CVE-2022-2505" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:3272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3273-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-September/025151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012383.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Mozilla developers and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 102. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR &lt; 102.1, Firefox &lt; 103, and Thunderbird &lt; 102.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-06-18"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2505/">CVE-2022-2505 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2505">CVE-2022-2505 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1201758">SUSE bug 1201758</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829779" comment="firefox-91.12.0-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829778" comment="thunderbird-91.12.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202225147" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-25147</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-25147" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25147" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-25147" ref_url="https://www.suse.com/security/cve/CVE-2022-25147" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013744.html" source="SUSE-SU"/>
    <description>
    Integer Overflow or Wraparound vulnerability in apr_base64 functions of Apache Portable Runtime Utility (APR-util) allows an attacker to write beyond bounds of a buffer.




This issue affects Apache Portable Runtime Utility (APR-util) 1.6.1 and prior versions.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-08"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25147/">CVE-2022-25147 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25147">CVE-2022-25147 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1207866">SUSE bug 1207866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209320">SUSE bug 1209320</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830212" comment="apr-util-1.5.2-6.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830213" comment="apr-util-devel-1.5.2-6.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830214" comment="apr-util-ldap-1.5.2-6.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830215" comment="apr-util-mysql-1.5.2-6.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830216" comment="apr-util-nss-1.5.2-6.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830217" comment="apr-util-odbc-1.5.2-6.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830218" comment="apr-util-openssl-1.5.2-6.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830219" comment="apr-util-pgsql-1.5.2-6.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830220" comment="apr-util-sqlite-1.5.2-6.el7_9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202225235" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-25235</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-25235" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25235" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-25235" ref_url="https://www.suse.com/security/cve/CVE-2022-25235" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1425-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011454.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1427-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011507.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:357-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:358-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010357.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011419.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0713-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6H3EOIG3ASUYP7RIHFPOJG3PFJYN54WT/" source="SUSE-SU"/>
    <description>
    xmltok_impl.c in Expat (aka libexpat) before 2.4.5 lacks certain validation of encoding, such as checks for whether a UTF-8 character is valid in a certain context.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25235/">CVE-2022-25235 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25235">CVE-2022-25235 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1196026">SUSE bug 1196026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197217">SUSE bug 1197217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198587">SUSE bug 1198587</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200038">SUSE bug 1200038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200198">SUSE bug 1200198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201735">SUSE bug 1201735</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829635" comment="expat-2.1.0-14.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829636" comment="expat-devel-2.1.0-14.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829637" comment="expat-static-2.1.0-14.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829622" comment="firefox-91.7.0-3.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829623" comment="thunderbird-91.7.0-2.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202225236" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-25236</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-25236" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25236" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-25236" ref_url="https://www.suse.com/security/cve/CVE-2022-25236" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1425-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011454.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1427-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011507.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:363-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:365-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:357-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:358-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010357.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0844-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14934-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0782-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021358.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20374-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024203.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0713-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6H3EOIG3ASUYP7RIHFPOJG3PFJYN54WT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0844-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WAE6CSZY5X5K62OKNSD5W35BIQQRELP4/" source="SUSE-SU"/>
    <description>
    xmlparse.c in Expat (aka libexpat) before 2.4.5 allows attackers to insert namespace-separator characters into namespace URIs.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-02-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25236/">CVE-2022-25236 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25236">CVE-2022-25236 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1196025">SUSE bug 1196025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196784">SUSE bug 1196784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197217">SUSE bug 1197217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200038">SUSE bug 1200038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201735">SUSE bug 1201735</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829635" comment="expat-2.1.0-14.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829636" comment="expat-devel-2.1.0-14.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829637" comment="expat-static-2.1.0-14.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829622" comment="firefox-91.7.0-3.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829623" comment="thunderbird-91.7.0-2.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222526" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2526</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2526" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2526" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2526" ref_url="https://www.suse.com/security/cve/CVE-2022-2526" source="SUSE CVE"/>
    <description>
    A use-after-free vulnerability was found in systemd. This issue occurs due to the on_stream_io() function and dns_stream_complete() function in 'resolved-dns-stream.c' not incrementing the reference counting for the DnsStream object. Therefore, other functions and callbacks called can dereference the DNSStream object, causing the use-after-free when the reference is still used later.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2526/">CVE-2022-2526 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2526">CVE-2022-2526 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1202574">SUSE bug 1202574</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829802" comment="libgudev1-219-78.el7_9.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829803" comment="libgudev1-devel-219-78.el7_9.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829804" comment="systemd-219-78.el7_9.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829805" comment="systemd-devel-219-78.el7_9.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829806" comment="systemd-journal-gateway-219-78.el7_9.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829807" comment="systemd-libs-219-78.el7_9.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829808" comment="systemd-networkd-219-78.el7_9.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829809" comment="systemd-python-219-78.el7_9.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829810" comment="systemd-resolved-219-78.el7_9.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829811" comment="systemd-sysv-219-78.el7_9.7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202225315" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-25315</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-25315" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25315" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-25315" ref_url="https://www.suse.com/security/cve/CVE-2022-25315" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1425-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011454.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1427-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011507.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:357-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:358-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010357.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011419.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0713-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6H3EOIG3ASUYP7RIHFPOJG3PFJYN54WT/" source="SUSE-SU"/>
    <description>
    In Expat (aka libexpat) before 2.4.5, there is an integer overflow in storeRawNames.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25315/">CVE-2022-25315 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25315">CVE-2022-25315 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1196171">SUSE bug 1196171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197217">SUSE bug 1197217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198587">SUSE bug 1198587</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200038">SUSE bug 1200038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200198">SUSE bug 1200198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201735">SUSE bug 1201735</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829635" comment="expat-2.1.0-14.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829636" comment="expat-devel-2.1.0-14.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829637" comment="expat-static-2.1.0-14.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829622" comment="firefox-91.7.0-3.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829623" comment="thunderbird-91.7.0-2.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222588" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2588</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2588" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2588" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2588" ref_url="https://www.suse.com/security/cve/CVE-2022-2588" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3265-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-September/025152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012250.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012397.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
		<reference ref_id="TID000021529" ref_url="https://www.suse.com/support/kb/doc/?id=000021529" source="SUSE-SU"/>
    <description>
    It was discovered that the cls_route filter implementation in the Linux kernel would not remove an old filter from the hashtable before freeing it if its handle had the value 0.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2588/">CVE-2022-2588 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2588">CVE-2022-2588 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1202096">SUSE bug 1202096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203613">SUSE bug 1203613</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204183">SUSE bug 1204183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209225">SUSE bug 1209225</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829885" comment="bpftool-3.10.0-1160.80.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829886" comment="kernel-3.10.0-1160.80.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829887" comment="kernel-abi-whitelists-3.10.0-1160.80.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829888" comment="kernel-debug-3.10.0-1160.80.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829891" comment="kernel-doc-3.10.0-1160.80.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829892" comment="kernel-headers-3.10.0-1160.80.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829893" comment="kernel-tools-3.10.0-1160.80.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829894" comment="kernel-tools-libs-3.10.0-1160.80.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829896" comment="perf-3.10.0-1160.80.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829897" comment="python-perf-3.10.0-1160.80.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222601" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2601</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2601" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2601" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2601" ref_url="https://www.suse.com/security/cve/CVE-2022-2601" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1701-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014265.html" source="SUSE-SU"/>
		<reference ref_id="TID000021048" ref_url="https://www.suse.com/support/kb/doc/?id=000021048" source="SUSE-SU"/>
    <description>
    A buffer overflow was found in grub_font_construct_glyph(). A malicious crafted pf2 font can lead to an overflow when calculating the max_glyph_size value, allocating a smaller than needed buffer for the glyph, this further leads to a buffer overflow and a heap based out-of-bounds write. An attacker may use this vulnerability to circumvent the secure boot mechanism.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-01"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2601/">CVE-2022-2601 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2601">CVE-2022-2601 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1205178">SUSE bug 1205178</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009858415" comment="grub2-2.02-0.87.el7_9.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858416" comment="grub2-common-2.02-0.87.el7_9.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858417" comment="grub2-efi-ia32-2.02-0.87.el7_9.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858418" comment="grub2-efi-ia32-cdboot-2.02-0.87.el7_9.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858419" comment="grub2-efi-ia32-modules-2.02-0.87.el7_9.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858420" comment="grub2-efi-x64-2.02-0.87.el7_9.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858421" comment="grub2-efi-x64-cdboot-2.02-0.87.el7_9.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858422" comment="grub2-efi-x64-modules-2.02-0.87.el7_9.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858423" comment="grub2-pc-2.02-0.87.el7_9.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858424" comment="grub2-pc-modules-2.02-0.87.el7_9.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858425" comment="grub2-tools-2.02-0.87.el7_9.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858426" comment="grub2-tools-extra-2.02-0.87.el7_9.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858427" comment="grub2-tools-minimal-2.02-0.87.el7_9.14 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202226373" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-26373</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-26373" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26373" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-26373" ref_url="https://www.suse.com/security/cve/CVE-2022-26373" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3265-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-September/025152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012250.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012397.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1293-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039011.html" source="SUSE-SU"/>
    <description>
    Non-transparent sharing of return predictor targets between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-26373/">CVE-2022-26373 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26373">CVE-2022-26373 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1201726">SUSE bug 1201726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209619">SUSE bug 1209619</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829885" comment="bpftool-3.10.0-1160.80.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829886" comment="kernel-3.10.0-1160.80.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829887" comment="kernel-abi-whitelists-3.10.0-1160.80.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829888" comment="kernel-debug-3.10.0-1160.80.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829891" comment="kernel-doc-3.10.0-1160.80.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829892" comment="kernel-headers-3.10.0-1160.80.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829893" comment="kernel-tools-3.10.0-1160.80.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829894" comment="kernel-tools-libs-3.10.0-1160.80.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829896" comment="perf-3.10.0-1160.80.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829897" comment="python-perf-3.10.0-1160.80.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202226381" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-26381</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-26381" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26381" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-26381" ref_url="https://www.suse.com/security/cve/CVE-2022-26381" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010417.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0821-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6422VZTPHB75VR6MKMLREZ5FDX6SVNHY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0906-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AEEZYLQCKGYXDK76SYT5EY7XJEDGTHAW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    An attacker could have caused a use-after-free by forcing a text reflow in an SVG object leading to a potentially exploitable crash. This vulnerability affects Firefox &lt; 98, Firefox ESR &lt; 91.7, and Thunderbird &lt; 91.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26381/">CVE-2022-26381 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26381">CVE-2022-26381 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1196900">SUSE bug 1196900</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829622" comment="firefox-91.7.0-3.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829623" comment="thunderbird-91.7.0-2.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202226383" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-26383</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-26383" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26383" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-26383" ref_url="https://www.suse.com/security/cve/CVE-2022-26383" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010417.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0821-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6422VZTPHB75VR6MKMLREZ5FDX6SVNHY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0906-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AEEZYLQCKGYXDK76SYT5EY7XJEDGTHAW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    When resizing a popup after requesting fullscreen access, the popup would not display the fullscreen notification. This vulnerability affects Firefox &lt; 98, Firefox ESR &lt; 91.7, and Thunderbird &lt; 91.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-26383/">CVE-2022-26383 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26383">CVE-2022-26383 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1196900">SUSE bug 1196900</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829622" comment="firefox-91.7.0-3.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829623" comment="thunderbird-91.7.0-2.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202226384" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-26384</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-26384" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26384" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-26384" ref_url="https://www.suse.com/security/cve/CVE-2022-26384" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010417.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0821-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6422VZTPHB75VR6MKMLREZ5FDX6SVNHY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0906-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AEEZYLQCKGYXDK76SYT5EY7XJEDGTHAW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    If an attacker could control the contents of an iframe sandboxed with &lt;code&gt;allow-popups&lt;/code&gt; but not &lt;code&gt;allow-scripts&lt;/code&gt;, they were able to craft a link that, when clicked, would lead to JavaScript execution in violation of the sandbox. This vulnerability affects Firefox &lt; 98, Firefox ESR &lt; 91.7, and Thunderbird &lt; 91.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26384/">CVE-2022-26384 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26384">CVE-2022-26384 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1196900">SUSE bug 1196900</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829622" comment="firefox-91.7.0-3.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829623" comment="thunderbird-91.7.0-2.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202226386" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-26386</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-26386" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26386" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-26386" ref_url="https://www.suse.com/security/cve/CVE-2022-26386" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010417.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0821-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6422VZTPHB75VR6MKMLREZ5FDX6SVNHY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0906-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AEEZYLQCKGYXDK76SYT5EY7XJEDGTHAW/" source="SUSE-SU"/>
    <description>
    Previously Firefox for macOS and Linux would download temporary files to a user-specific directory in &lt;code&gt;/tmp&lt;/code&gt;, but this behavior was changed to download them to &lt;code&gt;/tmp&lt;/code&gt; where they could be affected by other local users. This behavior was reverted to the original, user-specific directory. &lt;br&gt;*This bug only affects Firefox for macOS and Linux. Other operating systems are unaffected.*. This vulnerability affects Firefox ESR &lt; 91.7 and Thunderbird &lt; 91.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-26386/">CVE-2022-26386 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26386">CVE-2022-26386 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1196900">SUSE bug 1196900</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829622" comment="firefox-91.7.0-3.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829623" comment="thunderbird-91.7.0-2.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202226387" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-26387</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-26387" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26387" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-26387" ref_url="https://www.suse.com/security/cve/CVE-2022-26387" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010417.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0821-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6422VZTPHB75VR6MKMLREZ5FDX6SVNHY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0906-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AEEZYLQCKGYXDK76SYT5EY7XJEDGTHAW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    When installing an add-on, Firefox verified the signature before prompting the user; but while the user was confirming the prompt, the underlying add-on file could have been modified and Firefox would not have noticed. This vulnerability affects Firefox &lt; 98, Firefox ESR &lt; 91.7, and Thunderbird &lt; 91.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-26387/">CVE-2022-26387 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26387">CVE-2022-26387 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1196900">SUSE bug 1196900</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829622" comment="firefox-91.7.0-3.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829623" comment="thunderbird-91.7.0-2.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202226485" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-26485</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-26485" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26485" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-26485" ref_url="https://www.suse.com/security/cve/CVE-2022-26485" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010417.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0783-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IZLR36GLK5UWW34Z6YUDXKWIHXMQEYSY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0804-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2QKMX6IGL25P7OFW2JTNRZ4AD2EN4OAZ/" source="SUSE-SU"/>
    <description>
    Removing an XSLT parameter during processing could have lead to an exploitable use-after-free. We have had reports of attacks in the wild abusing this flaw. This vulnerability affects Firefox &lt; 97.0.2, Firefox ESR &lt; 91.6.1, Firefox for Android &lt; 97.3.0, Thunderbird &lt; 91.6.2, and Focus &lt; 97.3.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26485/">CVE-2022-26485 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26485">CVE-2022-26485 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1196809">SUSE bug 1196809</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829622" comment="firefox-91.7.0-3.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829623" comment="thunderbird-91.7.0-2.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202226486" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-26486</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-26486" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26486" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-26486" ref_url="https://www.suse.com/security/cve/CVE-2022-26486" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010417.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0783-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IZLR36GLK5UWW34Z6YUDXKWIHXMQEYSY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0804-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2QKMX6IGL25P7OFW2JTNRZ4AD2EN4OAZ/" source="SUSE-SU"/>
    <description>
    An unexpected message in the WebGPU IPC framework could lead to a use-after-free and exploitable sandbox escape. We have had reports of attacks in the wild abusing this flaw. This vulnerability affects Firefox &lt; 97.0.2, Firefox ESR &lt; 91.6.1, Firefox for Android &lt; 97.3.0, Thunderbird &lt; 91.6.2, and Focus &lt; 97.3.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26486/">CVE-2022-26486 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26486">CVE-2022-26486 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1196809">SUSE bug 1196809</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829622" comment="firefox-91.7.0-3.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829623" comment="thunderbird-91.7.0-2.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202227635" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-27635</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-27635" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27635" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-27635" ref_url="https://www.suse.com/security/cve/CVE-2022-27635" source="SUSE CVE"/>
    <description>
    Improper access control for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software may allow a privileged user to potentially enable escalation of privilege via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-18"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-27635/">CVE-2022-27635 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27635">CVE-2022-27635 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009867116" comment="iwl100-firmware-39.31.5.1-83.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867117" comment="iwl1000-firmware-39.31.5.1-83.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867118" comment="iwl105-firmware-18.168.6.1-83.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867119" comment="iwl135-firmware-18.168.6.1-83.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867120" comment="iwl2000-firmware-18.168.6.1-83.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867121" comment="iwl2030-firmware-18.168.6.1-83.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867122" comment="iwl3160-firmware-25.30.13.0-83.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867123" comment="iwl3945-firmware-15.32.2.9-83.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867124" comment="iwl4965-firmware-228.61.2.24-83.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867125" comment="iwl5000-firmware-8.83.5.1_1-83.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867126" comment="iwl5150-firmware-8.24.2.2-83.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867127" comment="iwl6000-firmware-9.221.4.1-83.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867128" comment="iwl6000g2a-firmware-18.168.6.1-83.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867129" comment="iwl6000g2b-firmware-18.168.6.1-83.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867130" comment="iwl6050-firmware-41.28.5.1-83.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867131" comment="iwl7260-firmware-25.30.13.0-83.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867132" comment="linux-firmware-20200421-83.git78c0348.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222795" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2795</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2795" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2795" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2795" ref_url="https://www.suse.com/security/cve/CVE-2022-2795" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012698.html" source="SUSE-SU"/>
    <description>
    By flooding the target resolver with queries exploiting this flaw an attacker can significantly impair the resolver's performance, effectively denying legitimate clients access to the DNS resolution service.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2795/">CVE-2022-2795 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2795">CVE-2022-2795 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1203614">SUSE bug 1203614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205842">SUSE bug 1205842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209913">SUSE bug 1209913</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830003" comment="bind-9.11.4-26.P2.el7_9.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830004" comment="bind-chroot-9.11.4-26.P2.el7_9.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830005" comment="bind-devel-9.11.4-26.P2.el7_9.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830006" comment="bind-export-devel-9.11.4-26.P2.el7_9.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830007" comment="bind-export-libs-9.11.4-26.P2.el7_9.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830008" comment="bind-libs-9.11.4-26.P2.el7_9.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830009" comment="bind-libs-lite-9.11.4-26.P2.el7_9.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830010" comment="bind-license-9.11.4-26.P2.el7_9.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830011" comment="bind-lite-devel-9.11.4-26.P2.el7_9.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830012" comment="bind-pkcs11-9.11.4-26.P2.el7_9.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830013" comment="bind-pkcs11-devel-9.11.4-26.P2.el7_9.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830014" comment="bind-pkcs11-libs-9.11.4-26.P2.el7_9.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830015" comment="bind-pkcs11-utils-9.11.4-26.P2.el7_9.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830016" comment="bind-sdb-9.11.4-26.P2.el7_9.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830017" comment="bind-sdb-chroot-9.11.4-26.P2.el7_9.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830018" comment="bind-utils-9.11.4-26.P2.el7_9.13 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202228281" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-28281</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-28281" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28281" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-28281" ref_url="https://www.suse.com/security/cve/CVE-2022-28281" source="SUSE CVE"/>
		<reference ref_id="SUSE-RU-2022:1114-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-April/022464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2022:14935-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-April/022462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010699.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1127-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/76BLKP3BHKRBWFX4VJKKQJQXQTYEOOSX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    If a compromised content process sent an unexpected number of WebAuthN Extensions in a Register command to the parent process, an out of bounds write would have occurred leading to memory corruption and a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 91.8, Firefox &lt; 99, and Firefox ESR &lt; 91.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28281/">CVE-2022-28281 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28281">CVE-2022-28281 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1197903">SUSE bug 1197903</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829651" comment="firefox-91.8.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829652" comment="thunderbird-91.8.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202228282" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-28282</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-28282" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28282" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-28282" ref_url="https://www.suse.com/security/cve/CVE-2022-28282" source="SUSE CVE"/>
		<reference ref_id="SUSE-RU-2022:1114-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-April/022464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2022:14935-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-April/022462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010699.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1127-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/76BLKP3BHKRBWFX4VJKKQJQXQTYEOOSX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    By using a link with &lt;code&gt;rel="localization"&lt;/code&gt; a use-after-free could have been triggered by destroying an object during JavaScript execution and then referencing the object through a freed pointer, leading to a potential exploitable crash. This vulnerability affects Thunderbird &lt; 91.8, Firefox &lt; 99, and Firefox ESR &lt; 91.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-28282/">CVE-2022-28282 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28282">CVE-2022-28282 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1197903">SUSE bug 1197903</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829651" comment="firefox-91.8.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829652" comment="thunderbird-91.8.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202228285" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-28285</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-28285" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28285" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-28285" ref_url="https://www.suse.com/security/cve/CVE-2022-28285" source="SUSE CVE"/>
		<reference ref_id="SUSE-RU-2022:1114-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-April/022464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2022:14935-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-April/022462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010699.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1127-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/76BLKP3BHKRBWFX4VJKKQJQXQTYEOOSX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    When generating the assembly code for &lt;code&gt;MLoadTypedArrayElementHole&lt;/code&gt;, an incorrect AliasSet was used. In conjunction with another vulnerability this could have been used for an out of bounds memory read. This vulnerability affects Thunderbird &lt; 91.8, Firefox &lt; 99, and Firefox ESR &lt; 91.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-28285/">CVE-2022-28285 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28285">CVE-2022-28285 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1197903">SUSE bug 1197903</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829651" comment="firefox-91.8.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829652" comment="thunderbird-91.8.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202228286" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-28286</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-28286" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28286" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-28286" ref_url="https://www.suse.com/security/cve/CVE-2022-28286" source="SUSE CVE"/>
		<reference ref_id="SUSE-RU-2022:1114-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-April/022464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2022:14935-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-April/022462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010699.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1127-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/76BLKP3BHKRBWFX4VJKKQJQXQTYEOOSX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Due to a layout change, iframe contents could have been rendered outside of its border. This could have led to user confusion or spoofing attacks. This vulnerability affects Thunderbird &lt; 91.8, Firefox &lt; 99, and Firefox ESR &lt; 91.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-28286/">CVE-2022-28286 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28286">CVE-2022-28286 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1197903">SUSE bug 1197903</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829651" comment="firefox-91.8.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829652" comment="thunderbird-91.8.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202228289" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-28289</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-28289" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28289" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-28289" ref_url="https://www.suse.com/security/cve/CVE-2022-28289" source="SUSE CVE"/>
		<reference ref_id="SUSE-RU-2022:1114-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-April/022464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2022:14935-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-April/022462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010699.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1127-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/76BLKP3BHKRBWFX4VJKKQJQXQTYEOOSX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Mozilla developers and community members Nika Layzell, Andrew McCreight, Gabriele Svelto, and the Mozilla Fuzzing Team reported memory safety bugs present in Thunderbird 91.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird &lt; 91.8, Firefox &lt; 99, and Firefox ESR &lt; 91.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28289/">CVE-2022-28289 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28289">CVE-2022-28289 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1197903">SUSE bug 1197903</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829651" comment="firefox-91.8.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829652" comment="thunderbird-91.8.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222850" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2850</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2850" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2850" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2850" ref_url="https://www.suse.com/security/cve/CVE-2022-2850" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2361-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012268.html" source="SUSE-SU"/>
    <description>
    A flaw was found In 389-ds-base. When the Content Synchronization plugin is enabled, an authenticated user can reach a NULL pointer dereference using a specially crafted query. This flaw allows an authenticated attacker to cause a denial of service. This CVE is assigned against an incomplete fix of CVE-2021-3514.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2850/">CVE-2022-2850 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2850">CVE-2022-2850 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1202470">SUSE bug 1202470</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829871" comment="389-ds-base-1.3.10.2-17.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829872" comment="389-ds-base-devel-1.3.10.2-17.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829873" comment="389-ds-base-libs-1.3.10.2-17.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829874" comment="389-ds-base-snmp-1.3.10.2-17.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202228733" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-28733</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-28733" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28733" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-28733" ref_url="https://www.suse.com/security/cve/CVE-2022-28733" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011278.html" source="SUSE-SU"/>
		<reference ref_id="TID000020668" ref_url="https://www.suse.com/support/kb/doc/?id=000020668" source="SUSE-SU"/>
    <description>
    Integer underflow in grub_net_recv_ip4_packets; A malicious crafted IP packet can lead to an integer underflow in grub_net_recv_ip4_packets() function on rsm-&gt;total_len value. Under certain circumstances the total_len value may end up wrapping around to a small integer number which will be used in memory allocation. If the attack succeeds in such way, subsequent operations can write past the end of the buffer.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28733/">CVE-2022-28733 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28733">CVE-2022-28733 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198460">SUSE bug 1198460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203445">SUSE bug 1203445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205057">SUSE bug 1205057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227915">SUSE bug 1227915</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829931" comment="grub2-2.02-0.87.el7_9.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829932" comment="grub2-common-2.02-0.87.el7_9.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829933" comment="grub2-efi-ia32-2.02-0.87.el7_9.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829934" comment="grub2-efi-ia32-cdboot-2.02-0.87.el7_9.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829935" comment="grub2-efi-ia32-modules-2.02-0.87.el7_9.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829936" comment="grub2-efi-x64-2.02-0.87.el7_9.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829937" comment="grub2-efi-x64-cdboot-2.02-0.87.el7_9.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829938" comment="grub2-efi-x64-modules-2.02-0.87.el7_9.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829939" comment="grub2-pc-2.02-0.87.el7_9.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829940" comment="grub2-pc-modules-2.02-0.87.el7_9.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829941" comment="grub2-tools-2.02-0.87.el7_9.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829942" comment="grub2-tools-extra-2.02-0.87.el7_9.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829943" comment="grub2-tools-minimal-2.02-0.87.el7_9.11 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202229154" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-29154</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-29154" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29154" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-29154" ref_url="https://www.suse.com/security/cve/CVE-2022-29154" source="SUSE CVE"/>
		<reference ref_id="SUSE-RU-2023:3370-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2959-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/012015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2959-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012056.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in rsync before 3.2.5 that allows malicious remote servers to write arbitrary files inside the directories of connecting peers. The server chooses which files/directories are sent to the client. However, the rsync client performs insufficient validation of file names. A malicious rsync server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the rsync client target directory and subdirectories (for example, overwrite the .ssh/authorized_keys file).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29154/">CVE-2022-29154 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29154">CVE-2022-29154 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1201840">SUSE bug 1201840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202970">SUSE bug 1202970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202998">SUSE bug 1202998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203401">SUSE bug 1203401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203727">SUSE bug 1203727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203789">SUSE bug 1203789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204119">SUSE bug 1204119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205072">SUSE bug 1205072</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829813" comment="rsync-3.1.2-11.el7_9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222964" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2964</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2964" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2964" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2964" ref_url="https://www.suse.com/security/cve/CVE-2022-2964" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4273-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-November/026621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3499-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037117.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel's driver for the ASIX AX88179_178A-based USB 2.0/3.0 Gigabit Ethernet Devices. The vulnerability contains multiple out-of-bounds reads and possible out-of-bounds writes.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2964/">CVE-2022-2964 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2964">CVE-2022-2964 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1202686">SUSE bug 1202686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203008">SUSE bug 1203008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208044">SUSE bug 1208044</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829990" comment="bpftool-3.10.0-1160.83.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829991" comment="kernel-3.10.0-1160.83.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829992" comment="kernel-abi-whitelists-3.10.0-1160.83.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829993" comment="kernel-debug-3.10.0-1160.83.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829996" comment="kernel-doc-3.10.0-1160.83.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829997" comment="kernel-headers-3.10.0-1160.83.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829998" comment="kernel-tools-3.10.0-1160.83.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829999" comment="kernel-tools-libs-3.10.0-1160.83.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830001" comment="perf-3.10.0-1160.83.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830002" comment="python-perf-3.10.0-1160.83.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202229900" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-29900</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-29900" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-29900" ref_url="https://www.suse.com/security/cve/CVE-2022-29900" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011558.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2424-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2599-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013765.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03310-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020707.html" source="SUSE-SU"/>
		<reference ref_id="TID000020693" ref_url="https://www.suse.com/support/kb/doc/?id=000020693" source="SUSE-SU"/>
		<reference ref_id="TID000021148" ref_url="https://www.suse.com/support/kb/doc/?id=000021148" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:2422-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UCV6OZAODHO3XSCOPNA6KBP5EOWSRH4L/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:2549-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YODNNJY6VGTGGVMUQLFLWV5FFYHIFW3C/" source="SUSE-SU"/>
    <description>
    Mis-trained branch predictions for return instructions may allow arbitrary speculative code execution under certain microarchitecture-dependent conditions.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-29900/">CVE-2022-29900 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29900">CVE-2022-29900 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1199657">SUSE bug 1199657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201469">SUSE bug 1201469</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207894">SUSE bug 1207894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829885" comment="bpftool-3.10.0-1160.80.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829886" comment="kernel-3.10.0-1160.80.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829887" comment="kernel-abi-whitelists-3.10.0-1160.80.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829888" comment="kernel-debug-3.10.0-1160.80.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829891" comment="kernel-doc-3.10.0-1160.80.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829892" comment="kernel-headers-3.10.0-1160.80.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829893" comment="kernel-tools-3.10.0-1160.80.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829894" comment="kernel-tools-libs-3.10.0-1160.80.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829896" comment="perf-3.10.0-1160.80.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829897" comment="python-perf-3.10.0-1160.80.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202229901" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-29901</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-29901" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29901" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-29901" ref_url="https://www.suse.com/security/cve/CVE-2022-29901" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011558.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2424-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013765.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03310-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020707.html" source="SUSE-SU"/>
		<reference ref_id="TID000020693" ref_url="https://www.suse.com/support/kb/doc/?id=000020693" source="SUSE-SU"/>
		<reference ref_id="TID000021148" ref_url="https://www.suse.com/support/kb/doc/?id=000021148" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:2422-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UCV6OZAODHO3XSCOPNA6KBP5EOWSRH4L/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:2549-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YODNNJY6VGTGGVMUQLFLWV5FFYHIFW3C/" source="SUSE-SU"/>
    <description>
    Intel microprocessor generations 6 to 8 are affected by a new Spectre variant that is able to bypass their retpoline mitigation in the kernel to leak arbitrary data. An attacker with unprivileged user access can hijack return instructions to achieve arbitrary speculative code execution under certain microarchitecture-dependent conditions.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-29901/">CVE-2022-29901 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29901">CVE-2022-29901 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1199657">SUSE bug 1199657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201469">SUSE bug 1201469</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207894">SUSE bug 1207894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829885" comment="bpftool-3.10.0-1160.80.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829886" comment="kernel-3.10.0-1160.80.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829887" comment="kernel-abi-whitelists-3.10.0-1160.80.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829888" comment="kernel-debug-3.10.0-1160.80.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829891" comment="kernel-doc-3.10.0-1160.80.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829892" comment="kernel-headers-3.10.0-1160.80.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829893" comment="kernel-tools-3.10.0-1160.80.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829894" comment="kernel-tools-libs-3.10.0-1160.80.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829896" comment="perf-3.10.0-1160.80.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829897" comment="python-perf-3.10.0-1160.80.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202229909" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-29909</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-29909" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29909" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-29909" ref_url="https://www.suse.com/security/cve/CVE-2022-29909" source="SUSE CVE"/>
		<reference ref_id="SUSE-RU-2022:1579-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-May/023039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1757-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011097.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Documents in deeply-nested cross-origin browsing contexts could have obtained permissions granted to the top-level origin, bypassing the existing prompt and wrongfully inheriting the top-level permissions. This vulnerability affects Thunderbird &lt; 91.9, Firefox ESR &lt; 91.9, and Firefox &lt; 100.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-06-18"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29909/">CVE-2022-29909 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29909">CVE-2022-29909 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198970">SUSE bug 1198970</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829670" comment="firefox-91.9.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829671" comment="thunderbird-91.9.0-3.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202229911" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-29911</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-29911" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29911" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-29911" ref_url="https://www.suse.com/security/cve/CVE-2022-29911" source="SUSE CVE"/>
		<reference ref_id="SUSE-RU-2022:1579-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-May/023039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1757-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011097.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    An improper implementation of the new iframe sandbox keyword &lt;code&gt;allow-top-navigation-by-user-activation&lt;/code&gt; could lead to script execution without &lt;code&gt;allow-scripts&lt;/code&gt; being present. This vulnerability affects Thunderbird &lt; 91.9, Firefox ESR &lt; 91.9, and Firefox &lt; 100.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-06-18"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29911/">CVE-2022-29911 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29911">CVE-2022-29911 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198970">SUSE bug 1198970</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829670" comment="firefox-91.9.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829671" comment="thunderbird-91.9.0-3.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202229912" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-29912</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-29912" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29912" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-29912" ref_url="https://www.suse.com/security/cve/CVE-2022-29912" source="SUSE CVE"/>
		<reference ref_id="SUSE-RU-2022:1579-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-May/023039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1757-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011097.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Requests initiated through reader mode did not properly omit cookies with a SameSite attribute. This vulnerability affects Thunderbird &lt; 91.9, Firefox ESR &lt; 91.9, and Firefox &lt; 100.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-06-18"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-29912/">CVE-2022-29912 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29912">CVE-2022-29912 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198970">SUSE bug 1198970</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829670" comment="firefox-91.9.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829671" comment="thunderbird-91.9.0-3.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202229913" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-29913</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-29913" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29913" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-29913" ref_url="https://www.suse.com/security/cve/CVE-2022-29913" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:1719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011060.html" source="SUSE-SU"/>
    <description>
    The parent process would not properly check whether the Speech Synthesis feature is enabled, when receiving instructions from a child process. This vulnerability affects Thunderbird &lt; 91.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-06-18"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-29913/">CVE-2022-29913 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29913">CVE-2022-29913 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198970">SUSE bug 1198970</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829671" comment="thunderbird-91.9.0-3.el7_9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202229914" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-29914</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-29914" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29914" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-29914" ref_url="https://www.suse.com/security/cve/CVE-2022-29914" source="SUSE CVE"/>
		<reference ref_id="SUSE-RU-2022:1579-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-May/023039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1757-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011097.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    When reusing existing popups Firefox would have allowed them to cover the fullscreen notification UI, which could have enabled browser spoofing attacks. This vulnerability affects Thunderbird &lt; 91.9, Firefox ESR &lt; 91.9, and Firefox &lt; 100.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-06-18"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29914/">CVE-2022-29914 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29914">CVE-2022-29914 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198970">SUSE bug 1198970</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829670" comment="firefox-91.9.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829671" comment="thunderbird-91.9.0-3.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202229916" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-29916</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-29916" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29916" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-29916" ref_url="https://www.suse.com/security/cve/CVE-2022-29916" source="SUSE CVE"/>
		<reference ref_id="SUSE-RU-2022:1579-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-May/023039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1757-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011097.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Firefox behaved slightly differently for already known resources when loading CSS resources involving CSS variables. This could have been used to probe the browser history. This vulnerability affects Thunderbird &lt; 91.9, Firefox ESR &lt; 91.9, and Firefox &lt; 100.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-06-18"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29916/">CVE-2022-29916 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29916">CVE-2022-29916 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198970">SUSE bug 1198970</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829670" comment="firefox-91.9.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829671" comment="thunderbird-91.9.0-3.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202229917" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-29917</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-29917" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29917" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-29917" ref_url="https://www.suse.com/security/cve/CVE-2022-29917" source="SUSE CVE"/>
		<reference ref_id="SUSE-RU-2022:1579-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-May/023039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1757-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011097.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Mozilla developers Andrew McCreight, Gabriele Svelto, Tom Ritter and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 99 and Firefox ESR 91.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird &lt; 91.9, Firefox ESR &lt; 91.9, and Firefox &lt; 100.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-06-18"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29917/">CVE-2022-29917 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29917">CVE-2022-29917 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198970">SUSE bug 1198970</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829670" comment="firefox-91.9.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829671" comment="thunderbird-91.9.0-3.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202230123" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-30123</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-30123" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30123" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-30123" ref_url="https://www.suse.com/security/cve/CVE-2022-30123" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:2192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011630.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14811-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FLQ74D2IZAJC5KD6QXVUZAQ6O5LNAWZX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14875-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MOZFATD6SCQREBY3SZW5KQJPN6KN7A6D/" source="SUSE-SU"/>
    <description>
    A sequence injection vulnerability exists in Rack &lt;2.0.9.1, &lt;2.1.4.1 and &lt;2.2.3.1 which could allow is a possible shell escape in the Lint and CommonLogger components of Rack.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-03-13"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-30123/">CVE-2022-30123 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30123">CVE-2022-30123 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1200750">SUSE bug 1200750</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829899" comment="pcs-0.9.169-3.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829900" comment="pcs-snmp-0.9.169-3.el7_9.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223032" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3032</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3032" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3032" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3032" ref_url="https://www.suse.com/security/cve/CVE-2022-3032" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:3281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012251.html" source="SUSE-SU"/>
    <description>
    When receiving an HTML email that contained an &lt;code&gt;iframe&lt;/code&gt; element, which used a &lt;code&gt;srcdoc&lt;/code&gt; attribute to define the inner HTML document, remote objects specified in the nested document, for example images or videos, were not blocked. Rather, the network was accessed, the objects were loaded and displayed. This vulnerability affects Thunderbird &lt; 102.2.1 and Thunderbird &lt; 91.13.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-3032/">CVE-2022-3032 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3032">CVE-2022-3032 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1203007">SUSE bug 1203007</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829819" comment="thunderbird-102.3.0-3.el7_9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223033" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3033</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3033" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3033" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3033" ref_url="https://www.suse.com/security/cve/CVE-2022-3033" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:3281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012251.html" source="SUSE-SU"/>
    <description>
    If a Thunderbird user replied to a crafted HTML email containing a &lt;code&gt;meta&lt;/code&gt; tag, with the &lt;code&gt;meta&lt;/code&gt; tag having the &lt;code&gt;http-equiv="refresh"&lt;/code&gt; attribute, and the content attribute specifying an URL, then Thunderbird started a network request to that URL, regardless of the configuration to block remote content. In combination with certain other HTML elements and attributes in the email, it was possible to execute JavaScript code included in the message in the context of the message compose document. The JavaScript code was able to perform actions including, but probably not limited to, read and modify the contents of the message compose document, including the quoted original message, which could potentially contain the decrypted plaintext of encrypted data in the crafted email. The contents could then be transmitted to the network, either to the URL specified in the META refresh tag, or to a different URL, as the JavaScript code could modify the URL specified in the document. This bug doesn't affect users who have changed the default Message Body display setting to 'simple html' or 'plain text'. This vulnerability affects Thunderbird &lt; 102.2.1 and Thunderbird &lt; 91.13.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3033/">CVE-2022-3033 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3033">CVE-2022-3033 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1203007">SUSE bug 1203007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205941">SUSE bug 1205941</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829819" comment="thunderbird-102.3.0-3.el7_9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223034" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3034</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3034" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3034" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3034" ref_url="https://www.suse.com/security/cve/CVE-2022-3034" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:3281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012251.html" source="SUSE-SU"/>
    <description>
    When receiving an HTML email that specified to load an &lt;code&gt;iframe&lt;/code&gt; element from a remote location, a request to the remote document was sent. However, Thunderbird didn't display the document. This vulnerability affects Thunderbird &lt; 102.2.1 and Thunderbird &lt; 91.13.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-3034/">CVE-2022-3034 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3034">CVE-2022-3034 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1203007">SUSE bug 1203007</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829819" comment="thunderbird-102.3.0-3.el7_9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202231676" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-31676</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-31676" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31676" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-31676" ref_url="https://www.suse.com/security/cve/CVE-2022-31676" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:2935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/012008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2936-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/012007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2936-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/012009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/012019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012049.html" source="SUSE-SU"/>
    <description>
    VMware Tools (12.0.0, 11.x.y and 10.x.y) contains a local privilege escalation vulnerability. A malicious actor with local non-administrative access to the Guest OS can escalate privileges as a root user in the virtual machine.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31676/">CVE-2022-31676 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31676">CVE-2022-31676 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1202657">SUSE bug 1202657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202733">SUSE bug 1202733</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202834">SUSE bug 1202834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202995">SUSE bug 1202995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204044">SUSE bug 1204044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205471">SUSE bug 1205471</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829815" comment="open-vm-tools-11.0.5-3.el7_9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829816" comment="open-vm-tools-desktop-11.0.5-3.el7_9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829817" comment="open-vm-tools-devel-11.0.5-3.el7_9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829818" comment="open-vm-tools-test-11.0.5-3.el7_9.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202231736" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-31736</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-31736" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31736" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-31736" ref_url="https://www.suse.com/security/cve/CVE-2022-31736" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:1920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011274.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A malicious website could have learned the size of a cross-origin resource that supported Range requests. This vulnerability affects Thunderbird &lt; 91.10, Firefox &lt; 101, and Firefox ESR &lt; 91.10.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31736/">CVE-2022-31736 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31736">CVE-2022-31736 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1200027">SUSE bug 1200027</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829711" comment="firefox-91.10.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829712" comment="thunderbird-91.10.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202231737" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-31737</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-31737" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31737" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-31737" ref_url="https://www.suse.com/security/cve/CVE-2022-31737" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:1920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011274.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A malicious webpage could have caused an out-of-bounds write in WebGL, leading to memory corruption and a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 91.10, Firefox &lt; 101, and Firefox ESR &lt; 91.10.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31737/">CVE-2022-31737 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31737">CVE-2022-31737 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1200027">SUSE bug 1200027</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829711" comment="firefox-91.10.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829712" comment="thunderbird-91.10.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202231738" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-31738</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-31738" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31738" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-31738" ref_url="https://www.suse.com/security/cve/CVE-2022-31738" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:1920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011274.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    When exiting fullscreen mode, an iframe could have confused the browser about the current state of fullscreen, resulting in potential user confusion or spoofing attacks. This vulnerability affects Thunderbird &lt; 91.10, Firefox &lt; 101, and Firefox ESR &lt; 91.10.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31738/">CVE-2022-31738 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31738">CVE-2022-31738 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1200027">SUSE bug 1200027</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829711" comment="firefox-91.10.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829712" comment="thunderbird-91.10.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202231740" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-31740</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-31740" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31740" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-31740" ref_url="https://www.suse.com/security/cve/CVE-2022-31740" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:1920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011274.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    On arm64, WASM code could have resulted in incorrect assembly generation leading to a register allocation problem, and a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 91.10, Firefox &lt; 101, and Firefox ESR &lt; 91.10.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31740/">CVE-2022-31740 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31740">CVE-2022-31740 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1200027">SUSE bug 1200027</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829711" comment="firefox-91.10.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829712" comment="thunderbird-91.10.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202231741" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-31741</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-31741" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31741" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-31741" ref_url="https://www.suse.com/security/cve/CVE-2022-31741" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011642.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1622-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011644.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1709-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2533-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011716.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A crafted CMS message could have been processed incorrectly, leading to an invalid memory read, and potentially further memory corruption. This vulnerability affects Thunderbird &lt; 91.10, Firefox &lt; 101, and Firefox ESR &lt; 91.10.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31741/">CVE-2022-31741 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31741">CVE-2022-31741 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1200027">SUSE bug 1200027</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829711" comment="firefox-91.10.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829712" comment="thunderbird-91.10.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202231742" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-31742</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-31742" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31742" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-31742" ref_url="https://www.suse.com/security/cve/CVE-2022-31742" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:1920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011274.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    An attacker could have exploited a timing attack by sending a large number of allowCredential entries and detecting the difference between invalid key handles and cross-origin key handles. This could have led to cross-origin account linking in violation of WebAuthn goals. This vulnerability affects Thunderbird &lt; 91.10, Firefox &lt; 101, and Firefox ESR &lt; 91.10.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-31742/">CVE-2022-31742 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31742">CVE-2022-31742 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1200027">SUSE bug 1200027</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829711" comment="firefox-91.10.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829712" comment="thunderbird-91.10.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202231744" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-31744</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-31744" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31744" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-31744" ref_url="https://www.suse.com/security/cve/CVE-2022-31744" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:2279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011428.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012251.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    An attacker could have injected CSS into stylesheets accessible via internal URIs, such as resource:, and in doing so bypass a page's Content Security Policy. This vulnerability affects Firefox ESR &lt; 91.11, Thunderbird &lt; 102, Thunderbird &lt; 91.11, and Firefox &lt; 101.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-31744/">CVE-2022-31744 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31744">CVE-2022-31744 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1200027">SUSE bug 1200027</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829756" comment="firefox-91.11.0-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829757" comment="thunderbird-91.11.0-2.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202231747" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-31747</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-31747" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31747" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-31747" ref_url="https://www.suse.com/security/cve/CVE-2022-31747" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:1920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011274.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Mozilla developers Andrew McCreight, Nicolas B. Pierron, and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 100 and Firefox ESR 91.9. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird &lt; 91.10, Firefox &lt; 101, and Firefox ESR &lt; 91.10.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31747/">CVE-2022-31747 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31747">CVE-2022-31747 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1200027">SUSE bug 1200027</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829711" comment="firefox-91.10.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829712" comment="thunderbird-91.10.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202234169" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-34169</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-34169" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34169" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-34169" ref_url="https://www.suse.com/security/cve/CVE-2022-34169" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2610-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2707-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/012014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GS63GCBRVH7N4JEIZNQAPVFNNVB2OGSU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14697-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U5YNW74OL2W7SH2XTAVN5TODNFIVFL3Y/" source="SUSE-SU"/>
    <description>
    The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-19"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-34169/">CVE-2022-34169 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34169">CVE-2022-34169 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1201684">SUSE bug 1201684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202427">SUSE bug 1202427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207688">SUSE bug 1207688</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829770" comment="java-1.8.0-openjdk-1.8.0.342.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829771" comment="java-1.8.0-openjdk-accessibility-1.8.0.342.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829772" comment="java-1.8.0-openjdk-demo-1.8.0.342.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829773" comment="java-1.8.0-openjdk-devel-1.8.0.342.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829774" comment="java-1.8.0-openjdk-headless-1.8.0.342.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829775" comment="java-1.8.0-openjdk-javadoc-1.8.0.342.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829776" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.342.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829777" comment="java-1.8.0-openjdk-src-1.8.0.342.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829761" comment="java-11-openjdk-11.0.16.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829762" comment="java-11-openjdk-demo-11.0.16.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829763" comment="java-11-openjdk-devel-11.0.16.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829764" comment="java-11-openjdk-headless-11.0.16.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829765" comment="java-11-openjdk-javadoc-11.0.16.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829766" comment="java-11-openjdk-javadoc-zip-11.0.16.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829767" comment="java-11-openjdk-jmods-11.0.16.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829768" comment="java-11-openjdk-src-11.0.16.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829769" comment="java-11-openjdk-static-libs-11.0.16.0.8-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202234468" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-34468</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-34468" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34468" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-34468" ref_url="https://www.suse.com/security/cve/CVE-2022-34468" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:2279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011428.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3273-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-September/025151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012383.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    An iframe that was not permitted to run scripts could do so if the user clicked on a &lt;code&gt;javascript:&lt;/code&gt; link. This vulnerability affects Firefox &lt; 102, Firefox ESR &lt; 91.11, Thunderbird &lt; 102, and Thunderbird &lt; 91.11.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-06-18"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34468/">CVE-2022-34468 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34468">CVE-2022-34468 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1200793">SUSE bug 1200793</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829756" comment="firefox-91.11.0-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829757" comment="thunderbird-91.11.0-2.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202234470" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-34470</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-34470" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34470" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-34470" ref_url="https://www.suse.com/security/cve/CVE-2022-34470" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:2279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011428.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3273-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-September/025151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012383.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Session history navigations may have led to a use-after-free and potentially exploitable crash. This vulnerability affects Firefox &lt; 102, Firefox ESR &lt; 91.11, Thunderbird &lt; 102, and Thunderbird &lt; 91.11.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-06-18"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34470/">CVE-2022-34470 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34470">CVE-2022-34470 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1200793">SUSE bug 1200793</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829756" comment="firefox-91.11.0-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829757" comment="thunderbird-91.11.0-2.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202234472" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-34472</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-34472" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34472" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-34472" ref_url="https://www.suse.com/security/cve/CVE-2022-34472" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:2279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011428.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3273-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-September/025151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012383.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    If there was a PAC URL set and the server that hosts the PAC was not reachable, OCSP requests would have been blocked, resulting in incorrect error pages being shown. This vulnerability affects Firefox &lt; 102, Firefox ESR &lt; 91.11, Thunderbird &lt; 102, and Thunderbird &lt; 91.11.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-06-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-34472/">CVE-2022-34472 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34472">CVE-2022-34472 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1200793">SUSE bug 1200793</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829756" comment="firefox-91.11.0-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829757" comment="thunderbird-91.11.0-2.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202234479" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-34479</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-34479" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34479" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-34479" ref_url="https://www.suse.com/security/cve/CVE-2022-34479" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:2279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011428.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3273-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-September/025151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012383.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A malicious website that could create a popup could have resized the popup to overlay the address bar with its own content, resulting in potential user confusion or spoofing attacks. &lt;br&gt;*This bug only affects Thunderbird for Linux. Other operating systems are unaffected.*. This vulnerability affects Firefox &lt; 102, Firefox ESR &lt; 91.11, Thunderbird &lt; 102, and Thunderbird &lt; 91.11.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-06-18"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34479/">CVE-2022-34479 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34479">CVE-2022-34479 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1200793">SUSE bug 1200793</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829756" comment="firefox-91.11.0-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829757" comment="thunderbird-91.11.0-2.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202234481" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-34481</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-34481" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34481" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-34481" ref_url="https://www.suse.com/security/cve/CVE-2022-34481" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:2279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011428.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3273-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-September/025151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012383.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    In the &lt;code&gt;nsTArray_Impl::ReplaceElementsAt()&lt;/code&gt; function, an integer overflow could have occurred when the number of elements to replace was too large for the container. This vulnerability affects Firefox &lt; 102, Firefox ESR &lt; 91.11, Thunderbird &lt; 102, and Thunderbird &lt; 91.11.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-06-18"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34481/">CVE-2022-34481 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34481">CVE-2022-34481 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1200793">SUSE bug 1200793</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829756" comment="firefox-91.11.0-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829757" comment="thunderbird-91.11.0-2.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202234484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-34484</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-34484" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34484" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-34484" ref_url="https://www.suse.com/security/cve/CVE-2022-34484" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:2279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011428.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3273-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-September/025151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012383.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    The Mozilla Fuzzing Team reported potential vulnerabilities present in Thunderbird 91.10. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 102, Firefox ESR &lt; 91.11, Thunderbird &lt; 102, and Thunderbird &lt; 91.11.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-06-18"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34484/">CVE-2022-34484 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34484">CVE-2022-34484 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1200793">SUSE bug 1200793</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829756" comment="firefox-91.11.0-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829757" comment="thunderbird-91.11.0-2.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223515" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3515</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3515" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3515" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3515" ref_url="https://www.suse.com/security/cve/CVE-2022-3515" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012607.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2636-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2666-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2701-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2707-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012676.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012798.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3681-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012596.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012597.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in the Libksba library due to an integer overflow within the CRL parser. The vulnerability can be exploited remotely for code execution on the target system by passing specially crafted data to the application, for example, a malicious S/MIME attachment.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3515/">CVE-2022-3515 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3515">CVE-2022-3515 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204357">SUSE bug 1204357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204806">SUSE bug 1204806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205080">SUSE bug 1205080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205592">SUSE bug 1205592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205627">SUSE bug 1205627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206244">SUSE bug 1206244</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829875" comment="libksba-1.3.0-6.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829876" comment="libksba-devel-1.3.0-6.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223550" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3550</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3550" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3550" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3550" ref_url="https://www.suse.com/security/cve/CVE-2022-3550" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:3840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012790.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012801.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3863-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3941-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012874.html" source="SUSE-SU"/>
    <description>
    A vulnerability classified as critical was found in X.org Server. Affected by this vulnerability is the function _GetCountedString of the file xkb/xkb.c. The manipulation leads to buffer overflow. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211051.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3550/">CVE-2022-3550 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3550">CVE-2022-3550 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204412">SUSE bug 1204412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204808">SUSE bug 1204808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205071">SUSE bug 1205071</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206243">SUSE bug 1206243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208344">SUSE bug 1208344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209331">SUSE bug 1209331</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829901" comment="xorg-x11-server-Xdmx-1.20.4-19.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829902" comment="xorg-x11-server-Xephyr-1.20.4-19.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829903" comment="xorg-x11-server-Xnest-1.20.4-19.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829904" comment="xorg-x11-server-Xorg-1.20.4-19.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829905" comment="xorg-x11-server-Xvfb-1.20.4-19.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829906" comment="xorg-x11-server-Xwayland-1.20.4-19.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829907" comment="xorg-x11-server-common-1.20.4-19.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829908" comment="xorg-x11-server-devel-1.20.4-19.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829909" comment="xorg-x11-server-source-1.20.4-19.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223551" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3551</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3551" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3551" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3551" ref_url="https://www.suse.com/security/cve/CVE-2022-3551" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:3840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012790.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012801.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3863-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3941-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012874.html" source="SUSE-SU"/>
    <description>
    A vulnerability, which was classified as problematic, has been found in X.org Server. Affected by this issue is the function ProcXkbGetKbdByName of the file xkb/xkb.c. The manipulation leads to memory leak. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211052.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3551/">CVE-2022-3551 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3551">CVE-2022-3551 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204416">SUSE bug 1204416</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829901" comment="xorg-x11-server-Xdmx-1.20.4-19.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829902" comment="xorg-x11-server-Xephyr-1.20.4-19.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829903" comment="xorg-x11-server-Xnest-1.20.4-19.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829904" comment="xorg-x11-server-Xorg-1.20.4-19.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829905" comment="xorg-x11-server-Xvfb-1.20.4-19.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829906" comment="xorg-x11-server-Xwayland-1.20.4-19.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829907" comment="xorg-x11-server-common-1.20.4-19.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829908" comment="xorg-x11-server-devel-1.20.4-19.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829909" comment="xorg-x11-server-source-1.20.4-19.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223560" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3560</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3560" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3560" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3560" ref_url="https://www.suse.com/security/cve/CVE-2022-3560" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:0484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013879.html" source="SUSE-SU"/>
    <description>
    A flaw was found in pesign. The pesign package provides a systemd service used to start the pesign daemon. This service unit runs a script to set ACLs for /etc/pki/pesign and /run/pesign directories to grant access privileges to users in the 'pesign' group. However, the script doesn't check for symbolic links. This could allow an attacker to gain access to privileged files and directories via a path traversal attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3560/">CVE-2022-3560 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3560">CVE-2022-3560 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1202933">SUSE bug 1202933</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830133" comment="pesign-0.109-11.el7_9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223564" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3564</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3564" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3564" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3564" ref_url="https://www.suse.com/security/cve/CVE-2022-3564" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013526.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0410-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0420-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013889.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0547-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0552-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0618-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01966-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01982-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01995-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02173-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02262-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023783.html" source="SUSE-SU"/>
    <description>
    A vulnerability classified as critical was found in Linux Kernel. Affected by this vulnerability is the function l2cap_reassemble_sdu of the file net/bluetooth/l2cap_core.c of the component Bluetooth. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211087.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3564/">CVE-2022-3564 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3564">CVE-2022-3564 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1206073">SUSE bug 1206073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206314">SUSE bug 1206314</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208030">SUSE bug 1208030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208044">SUSE bug 1208044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208085">SUSE bug 1208085</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830270" comment="bpftool-3.10.0-1160.95.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830271" comment="kernel-3.10.0-1160.95.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830272" comment="kernel-abi-whitelists-3.10.0-1160.95.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830273" comment="kernel-debug-3.10.0-1160.95.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830276" comment="kernel-doc-3.10.0-1160.95.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830277" comment="kernel-headers-3.10.0-1160.95.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830278" comment="kernel-tools-3.10.0-1160.95.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830279" comment="kernel-tools-libs-3.10.0-1160.95.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830281" comment="perf-3.10.0-1160.95.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830282" comment="python-perf-3.10.0-1160.95.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202236059" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-36059</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-36059" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36059" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-36059" ref_url="https://www.suse.com/security/cve/CVE-2022-36059" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:3281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012251.html" source="SUSE-SU"/>
    <description>
    matrix-js-sdk is a Matrix messaging protocol Client-Server SDK for JavaScript. In versions prior to 19.4.0 events sent with special strings in key places can temporarily disrupt or impede the matrix-js-sdk from functioning properly, potentially impacting the consumer's ability to process data safely. Note that the matrix-js-sdk can appear to be operating normally but be excluding or corrupting runtime data presented to the consumer. This issue has been fixed in matrix-js-sdk 19.4.0 and users are advised to upgrade. Users unable to upgrade may mitigate this issue by redacting applicable events, waiting for the sync processor to store data, and restarting the client. Alternatively, redacting the applicable events and clearing all storage will often fix most perceived issues. In some cases, no workarounds are possible.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-36059/">CVE-2022-36059 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36059">CVE-2022-36059 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1203007">SUSE bug 1203007</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829819" comment="thunderbird-102.3.0-3.el7_9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202236318" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-36318</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-36318" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36318" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-36318" ref_url="https://www.suse.com/security/cve/CVE-2022-36318" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:2596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3273-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-September/025151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012383.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    When visiting directory listings for `chrome://` URLs as source text, some parameters were reflected. This vulnerability affects Firefox ESR &lt; 102.1, Firefox ESR &lt; 91.12, Firefox &lt; 103, Thunderbird &lt; 102.1, and Thunderbird &lt; 91.12.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-06-18"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-36318/">CVE-2022-36318 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36318">CVE-2022-36318 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1201758">SUSE bug 1201758</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829779" comment="firefox-91.12.0-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829778" comment="thunderbird-91.12.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202236319" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-36319</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-36319" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36319" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-36319" ref_url="https://www.suse.com/security/cve/CVE-2022-36319" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:2596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3273-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-September/025151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012383.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    When combining CSS properties for overflow and transform, the mouse cursor could interact with different coordinates than displayed. This vulnerability affects Firefox ESR &lt; 102.1, Firefox ESR &lt; 91.12, Firefox &lt; 103, Thunderbird &lt; 102.1, and Thunderbird &lt; 91.12.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-06-18"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-36319/">CVE-2022-36319 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36319">CVE-2022-36319 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1201758">SUSE bug 1201758</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829779" comment="firefox-91.12.0-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829778" comment="thunderbird-91.12.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202236351" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-36351</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-36351" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36351" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-36351" ref_url="https://www.suse.com/security/cve/CVE-2022-36351" source="SUSE CVE"/>
    <description>
    Improper input validation in some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software may allow an unauthenticated user to potentially enable denial of service via adjacent access.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-18"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-36351/">CVE-2022-36351 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36351">CVE-2022-36351 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009867116" comment="iwl100-firmware-39.31.5.1-83.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867117" comment="iwl1000-firmware-39.31.5.1-83.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867118" comment="iwl105-firmware-18.168.6.1-83.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867119" comment="iwl135-firmware-18.168.6.1-83.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867120" comment="iwl2000-firmware-18.168.6.1-83.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867121" comment="iwl2030-firmware-18.168.6.1-83.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867122" comment="iwl3160-firmware-25.30.13.0-83.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867123" comment="iwl3945-firmware-15.32.2.9-83.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867124" comment="iwl4965-firmware-228.61.2.24-83.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867125" comment="iwl5000-firmware-8.83.5.1_1-83.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867126" comment="iwl5150-firmware-8.24.2.2-83.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867127" comment="iwl6000-firmware-9.221.4.1-83.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867128" comment="iwl6000g2a-firmware-18.168.6.1-83.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867129" comment="iwl6000g2b-firmware-18.168.6.1-83.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867130" comment="iwl6050-firmware-41.28.5.1-83.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867131" comment="iwl7260-firmware-25.30.13.0-83.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867132" comment="linux-firmware-20200421-83.git78c0348.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3640</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3640" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3640" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3640" ref_url="https://www.suse.com/security/cve/CVE-2022-3640" source="SUSE CVE"/>
		<reference ref_id="ESSA-2026:0024" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002461.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22910" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4560-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-December/026940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01966-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02173-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02262-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023783.html" source="SUSE-SU"/>
    <description>
    A vulnerability, which was classified as critical, was found in Linux Kernel. Affected is the function l2cap_conn_del of the file net/bluetooth/l2cap_core.c of the component Bluetooth. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211944.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-13"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3640/">CVE-2022-3640 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3640">CVE-2022-3640 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204619">SUSE bug 1204619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204624">SUSE bug 1204624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209225">SUSE bug 1209225</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010037040" comment="bpftool-3.10.0-1160.143.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037041" comment="kernel-3.10.0-1160.143.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037042" comment="kernel-abi-whitelists-3.10.0-1160.143.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037043" comment="kernel-debug-3.10.0-1160.143.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037046" comment="kernel-doc-3.10.0-1160.143.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037047" comment="kernel-headers-3.10.0-1160.143.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037048" comment="kernel-tools-3.10.0-1160.143.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037049" comment="kernel-tools-libs-3.10.0-1160.143.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037051" comment="perf-3.10.0-1160.143.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037052" comment="python-perf-3.10.0-1160.143.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202237434" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-37434</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-37434" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37434" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-37434" ref_url="https://www.suse.com/security/cve/CVE-2022-37434" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1863-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1995-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2004-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2005-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2007-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-September/024703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2039-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-September/024833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2040-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-September/024834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2041-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-September/024835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2042-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-September/024836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2054-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/012012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:2947-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LMMKD42M3DCS4RHRGODUBFFD77ISKBSG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2023:0365-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4PHTZYGRNV6PDZMHUALPCK2YD6IRL3XD/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2023:0366-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M45KVAFI32X55HONDKLE2FBN6GETMIUL/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14386-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PKKBG67OWZPTTVUGMVOGNMHRKFBIQJ4M/" source="SUSE-SU"/>
    <description>
    zlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applications that call inflateGetHeader are affected. Some common applications bundle the affected zlib source code but may be unable to call inflateGetHeader (e.g., see the nodejs/node reference).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-37434/">CVE-2022-37434 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-37434">CVE-2022-37434 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1202175">SUSE bug 1202175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203030">SUSE bug 1203030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205074">SUSE bug 1205074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205289">SUSE bug 1205289</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216542">SUSE bug 1216542</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225671">SUSE bug 1225671</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830134" comment="minizip-1.2.7-21.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830135" comment="minizip-devel-1.2.7-21.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830136" comment="zlib-1.2.7-21.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830137" comment="zlib-devel-1.2.7-21.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830138" comment="zlib-static-1.2.7-21.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202238023" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-38023</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-38023" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38023" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-38023" ref_url="https://www.suse.com/security/cve/CVE-2022-38023" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013509.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013514.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013547.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013544.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0222-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/V3YTRBE2CLOHDFXSGJQCTU4DTNHNRTBU/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013975.html" source="SUSE-SU"/>
		<reference ref_id="TID000021140" ref_url="https://www.suse.com/support/kb/doc/?id=000021140" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-08"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-38023/">CVE-2022-38023 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38023">CVE-2022-38023 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1206504">SUSE bug 1206504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209664">SUSE bug 1209664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213694">SUSE bug 1213694</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830093" comment="ctdb-4.10.16-24.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830094" comment="ctdb-tests-4.10.16-24.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830095" comment="libsmbclient-4.10.16-24.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830096" comment="libsmbclient-devel-4.10.16-24.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830097" comment="libwbclient-4.10.16-24.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830098" comment="libwbclient-devel-4.10.16-24.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830099" comment="samba-4.10.16-24.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830100" comment="samba-client-4.10.16-24.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830101" comment="samba-client-libs-4.10.16-24.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830102" comment="samba-common-4.10.16-24.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830103" comment="samba-common-libs-4.10.16-24.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830104" comment="samba-common-tools-4.10.16-24.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830105" comment="samba-dc-4.10.16-24.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830106" comment="samba-dc-libs-4.10.16-24.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830107" comment="samba-devel-4.10.16-24.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830108" comment="samba-krb5-printing-4.10.16-24.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830109" comment="samba-libs-4.10.16-24.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830110" comment="samba-pidl-4.10.16-24.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830111" comment="samba-python-4.10.16-24.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830112" comment="samba-python-test-4.10.16-24.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830113" comment="samba-test-4.10.16-24.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830114" comment="samba-test-libs-4.10.16-24.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830115" comment="samba-vfs-glusterfs-4.10.16-24.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830116" comment="samba-winbind-4.10.16-24.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830117" comment="samba-winbind-clients-4.10.16-24.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830118" comment="samba-winbind-krb5-locator-4.10.16-24.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830119" comment="samba-winbind-modules-4.10.16-24.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202238076" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-38076</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-38076" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38076" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-38076" ref_url="https://www.suse.com/security/cve/CVE-2022-38076" source="SUSE CVE"/>
    <description>
    Improper input validation in some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software may allow an authenticated user to potentially enable escalation of privilege via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-18"/>
	<updated date="2026-04-11"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-38076/">CVE-2022-38076 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38076">CVE-2022-38076 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009867116" comment="iwl100-firmware-39.31.5.1-83.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867117" comment="iwl1000-firmware-39.31.5.1-83.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867118" comment="iwl105-firmware-18.168.6.1-83.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867119" comment="iwl135-firmware-18.168.6.1-83.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867120" comment="iwl2000-firmware-18.168.6.1-83.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867121" comment="iwl2030-firmware-18.168.6.1-83.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867122" comment="iwl3160-firmware-25.30.13.0-83.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867123" comment="iwl3945-firmware-15.32.2.9-83.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867124" comment="iwl4965-firmware-228.61.2.24-83.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867125" comment="iwl5000-firmware-8.83.5.1_1-83.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867126" comment="iwl5150-firmware-8.24.2.2-83.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867127" comment="iwl6000-firmware-9.221.4.1-83.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867128" comment="iwl6000g2a-firmware-18.168.6.1-83.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867129" comment="iwl6000g2b-firmware-18.168.6.1-83.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867130" comment="iwl6050-firmware-41.28.5.1-83.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867131" comment="iwl7260-firmware-25.30.13.0-83.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867132" comment="linux-firmware-20200421-83.git78c0348.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202238177" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-38177</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-38177" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38177" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-38177" ref_url="https://www.suse.com/security/cve/CVE-2022-38177" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012698.html" source="SUSE-SU"/>
    <description>
    By spoofing the target resolver with responses that have a malformed ECDSA signature, an attacker can trigger a small memory leak. It is possible to gradually erode available memory to the point where named crashes for lack of resources.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-38177/">CVE-2022-38177 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38177">CVE-2022-38177 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1203619">SUSE bug 1203619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204101">SUSE bug 1204101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205078">SUSE bug 1205078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205219">SUSE bug 1205219</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829821" comment="bind-9.11.4-26.P2.el7_9.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829822" comment="bind-chroot-9.11.4-26.P2.el7_9.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829823" comment="bind-devel-9.11.4-26.P2.el7_9.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829824" comment="bind-export-devel-9.11.4-26.P2.el7_9.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829825" comment="bind-export-libs-9.11.4-26.P2.el7_9.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829826" comment="bind-libs-9.11.4-26.P2.el7_9.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829827" comment="bind-libs-lite-9.11.4-26.P2.el7_9.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829828" comment="bind-license-9.11.4-26.P2.el7_9.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829829" comment="bind-lite-devel-9.11.4-26.P2.el7_9.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829830" comment="bind-pkcs11-9.11.4-26.P2.el7_9.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829831" comment="bind-pkcs11-devel-9.11.4-26.P2.el7_9.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829832" comment="bind-pkcs11-libs-9.11.4-26.P2.el7_9.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829833" comment="bind-pkcs11-utils-9.11.4-26.P2.el7_9.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829834" comment="bind-sdb-9.11.4-26.P2.el7_9.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829835" comment="bind-sdb-chroot-9.11.4-26.P2.el7_9.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829836" comment="bind-utils-9.11.4-26.P2.el7_9.10 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202238178" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-38178</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-38178" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38178" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-38178" ref_url="https://www.suse.com/security/cve/CVE-2022-38178" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012698.html" source="SUSE-SU"/>
    <description>
    By spoofing the target resolver with responses that have a malformed EdDSA signature, an attacker can trigger a small memory leak. It is possible to gradually erode available memory to the point where named crashes for lack of resources.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-38178/">CVE-2022-38178 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38178">CVE-2022-38178 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1203620">SUSE bug 1203620</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829821" comment="bind-9.11.4-26.P2.el7_9.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829822" comment="bind-chroot-9.11.4-26.P2.el7_9.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829823" comment="bind-devel-9.11.4-26.P2.el7_9.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829824" comment="bind-export-devel-9.11.4-26.P2.el7_9.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829825" comment="bind-export-libs-9.11.4-26.P2.el7_9.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829826" comment="bind-libs-9.11.4-26.P2.el7_9.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829827" comment="bind-libs-lite-9.11.4-26.P2.el7_9.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829828" comment="bind-license-9.11.4-26.P2.el7_9.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829829" comment="bind-lite-devel-9.11.4-26.P2.el7_9.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829830" comment="bind-pkcs11-9.11.4-26.P2.el7_9.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829831" comment="bind-pkcs11-devel-9.11.4-26.P2.el7_9.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829832" comment="bind-pkcs11-libs-9.11.4-26.P2.el7_9.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829833" comment="bind-pkcs11-utils-9.11.4-26.P2.el7_9.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829834" comment="bind-sdb-9.11.4-26.P2.el7_9.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829835" comment="bind-sdb-chroot-9.11.4-26.P2.el7_9.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829836" comment="bind-utils-9.11.4-26.P2.el7_9.10 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202238472" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-38472</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-38472" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38472" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-38472" ref_url="https://www.suse.com/security/cve/CVE-2022-38472" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3273-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-September/025151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012383.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    An attacker could have abused XSLT error handling to associate attacker-controlled content with another origin which was displayed in the address bar. This could have been used to fool the user into submitting data intended for the spoofed origin. This vulnerability affects Thunderbird &lt; 102.2, Thunderbird &lt; 91.13, Firefox ESR &lt; 91.13, Firefox ESR &lt; 102.2, and Firefox &lt; 104.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-38472/">CVE-2022-38472 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38472">CVE-2022-38472 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1202645">SUSE bug 1202645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205832">SUSE bug 1205832</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829814" comment="firefox-91.13.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829812" comment="thunderbird-91.13.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202238473" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-38473</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-38473" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38473" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-38473" ref_url="https://www.suse.com/security/cve/CVE-2022-38473" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3273-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-September/025151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012383.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A cross-origin iframe referencing an XSLT document would inherit the parent domain's permissions (such as microphone or camera access). This vulnerability affects Thunderbird &lt; 102.2, Thunderbird &lt; 91.13, Firefox ESR &lt; 91.13, Firefox ESR &lt; 102.2, and Firefox &lt; 104.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-38473/">CVE-2022-38473 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38473">CVE-2022-38473 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1202645">SUSE bug 1202645</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829814" comment="firefox-91.13.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829812" comment="thunderbird-91.13.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202238476" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-38476</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-38476" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38476" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-38476" ref_url="https://www.suse.com/security/cve/CVE-2022-38476" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:3272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3273-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-September/025151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012383.html" source="SUSE-SU"/>
    <description>
    A data race could occur in the &lt;code&gt;PK11_ChangePW&lt;/code&gt; function, potentially leading to a use-after-free vulnerability. In Firefox, this lock protected the data when a user changed their master password. This vulnerability affects Firefox ESR &lt; 102.2 and Thunderbird &lt; 102.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-38476/">CVE-2022-38476 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38476">CVE-2022-38476 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1202645">SUSE bug 1202645</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829814" comment="firefox-91.13.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829812" comment="thunderbird-91.13.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202238477" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-38477</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-38477" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38477" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-38477" ref_url="https://www.suse.com/security/cve/CVE-2022-38477" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:3272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3273-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-September/025151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012383.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Mozilla developer Nika Layzell and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 103 and Firefox ESR 102.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR &lt; 102.2, Thunderbird &lt; 102.2, and Firefox &lt; 104.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-38477/">CVE-2022-38477 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38477">CVE-2022-38477 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1202645">SUSE bug 1202645</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829814" comment="firefox-91.13.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829812" comment="thunderbird-91.13.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202238478" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-38478</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-38478" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38478" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-38478" ref_url="https://www.suse.com/security/cve/CVE-2022-38478" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3273-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-September/025151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012383.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Members the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 103, Firefox ESR 102.1, and Firefox ESR 91.12. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird &lt; 102.2, Thunderbird &lt; 91.13, Firefox ESR &lt; 91.13, Firefox ESR &lt; 102.2, and Firefox &lt; 104.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-38478/">CVE-2022-38478 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38478">CVE-2022-38478 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1202645">SUSE bug 1202645</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829814" comment="firefox-91.13.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829812" comment="thunderbird-91.13.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202239236" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-39236</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-39236" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39236" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-39236" ref_url="https://www.suse.com/security/cve/CVE-2022-39236" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:3800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012724.html" source="SUSE-SU"/>
    <description>
    Matrix Javascript SDK is the Matrix Client-Server SDK for JavaScript. Starting with version 17.1.0-rc.1, improperly formed beacon events can disrupt or impede the matrix-js-sdk from functioning properly, potentially impacting the consumer's ability to process data safely. Note that the matrix-js-sdk can appear to be operating normally but be excluding or corrupting runtime data presented to the consumer. This is patched in matrix-js-sdk v19.7.0. Redacting applicable events, waiting for the sync processor to store data, and restarting the client are possible workarounds. Alternatively, redacting the applicable events and clearing all storage will fix the further perceived issues. Downgrading to an unaffected version, noting that such a version may be subject to other vulnerabilities, will additionally resolve the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-39236/">CVE-2022-39236 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39236">CVE-2022-39236 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204411">SUSE bug 1204411</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829877" comment="thunderbird-102.4.0-1.el7_9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202239249" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-39249</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-39249" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39249" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-39249" ref_url="https://www.suse.com/security/cve/CVE-2022-39249" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:3800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012724.html" source="SUSE-SU"/>
    <description>
    Matrix Javascript SDK is the Matrix Client-Server SDK for JavaScript. Prior to version 19.7.0, an attacker cooperating with a malicious homeserver can construct messages appearing to have come from another person. Such messages will be marked with a grey shield on some platforms, but this may be missing in others. This attack is possible due to the matrix-js-sdk implementing a too permissive key forwarding strategy on the receiving end. Starting with version 19.7.0, the default policy for accepting key forwards has been made more strict in the matrix-js-sdk. matrix-js-sdk will now only accept forwarded keys in response to previously issued requests and only from own, verified devices. The SDK now sets a `trusted` flag on the decrypted message upon decryption, based on whether the key used to decrypt the message was received from a trusted source. Clients need to ensure that messages decrypted with a key with `trusted = false` are decorated appropriately, for example, by showing a warning for such messages. This attack requires coordination between a malicious homeserver and an attacker, and those who trust your homeservers do not need a workaround.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-39249/">CVE-2022-39249 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39249">CVE-2022-39249 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204411">SUSE bug 1204411</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829877" comment="thunderbird-102.4.0-1.el7_9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202239250" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-39250</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-39250" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39250" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-39250" ref_url="https://www.suse.com/security/cve/CVE-2022-39250" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:3800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012724.html" source="SUSE-SU"/>
    <description>
    Matrix JavaScript SDK is the Matrix Client-Server software development kit (SDK) for JavaScript. Prior to version 19.7.0, an attacker cooperating with a malicious homeserver could interfere with the verification flow between two users, injecting its own cross-signing user identity in place of one of the users' identities. This would lead to the other device trusting/verifying the user identity under the control of the homeserver instead of the intended one. The vulnerability is a bug in the matrix-js-sdk, caused by checking and signing user identities and devices in two separate steps, and inadequately fixing the keys to be signed between those steps. Even though the attack is partly made possible due to the design decision of treating cross-signing user identities as Matrix devices on the server side (with their device ID set to the public part of the user identity key), no other examined implementations were vulnerable. Starting with version 19.7.0, the matrix-js-sdk has been modified to double check that the key signed is the one that was verified instead of just referencing the key by ID. An additional check has been made to report an error when one of the device ID matches a cross-signing key. As this attack requires coordination between a malicious homeserver and an attacker, those who trust their homeservers do not need a particular workaround.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-12-19"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-39250/">CVE-2022-39250 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39250">CVE-2022-39250 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204411">SUSE bug 1204411</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829877" comment="thunderbird-102.4.0-1.el7_9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202239251" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-39251</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-39251" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39251" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-39251" ref_url="https://www.suse.com/security/cve/CVE-2022-39251" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:3800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012724.html" source="SUSE-SU"/>
    <description>
    Matrix Javascript SDK is the Matrix Client-Server SDK for JavaScript. Prior to version 19.7.0, an attacker cooperating with a malicious homeserver can construct messages that legitimately appear to have come from another person, without any indication such as a grey shield. Additionally, a sophisticated attacker cooperating with a malicious homeserver could employ this vulnerability to perform a targeted attack in order to send fake to-device messages appearing to originate from another user. This can allow, for example, to inject the key backup secret during a self-verification, to make a targeted device start using a malicious key backup spoofed by the homeserver. These attacks are possible due to a protocol confusion vulnerability that accepts to-device messages encrypted with Megolm instead of Olm. Starting with version 19.7.0, matrix-js-sdk has been modified to only accept Olm-encrypted to-device messages. Out of caution, several other checks have been audited or added. This attack requires coordination between a malicious home server and an attacker, so those who trust their home servers do not need a workaround.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-39251/">CVE-2022-39251 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39251">CVE-2022-39251 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204411">SUSE bug 1204411</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829877" comment="thunderbird-102.4.0-1.el7_9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202239399" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-39399</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-39399" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39399" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-39399" ref_url="https://www.suse.com/security/cve/CVE-2022-39399" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:3046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3099-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-November/026431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013160.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GS63GCBRVH7N4JEIZNQAPVFNNVB2OGSU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0067-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XA5CCGSPUXUTQHDG25O5DM4G37BLRUMN/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Networking). Supported versions that are affected are Oracle Java SE: 11.0.16.1, 17.0.4.1, 19; Oracle GraalVM Enterprise Edition: 20.3.7, 21.3.3 and 22.2.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-21"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-39399/">CVE-2022-39399 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39399">CVE-2022-39399 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204480">SUSE bug 1204480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205302">SUSE bug 1205302</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829853" comment="java-11-openjdk-11.0.17.0.8-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829854" comment="java-11-openjdk-demo-11.0.17.0.8-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829855" comment="java-11-openjdk-devel-11.0.17.0.8-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829856" comment="java-11-openjdk-headless-11.0.17.0.8-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829857" comment="java-11-openjdk-javadoc-11.0.17.0.8-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829858" comment="java-11-openjdk-javadoc-zip-11.0.17.0.8-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829859" comment="java-11-openjdk-jmods-11.0.17.0.8-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829860" comment="java-11-openjdk-src-11.0.17.0.8-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829861" comment="java-11-openjdk-static-libs-11.0.17.0.8-2.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202240674" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-40674</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-40674" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40674" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-40674" ref_url="https://www.suse.com/security/cve/CVE-2022-40674" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2425-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2445-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2446-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2457-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012526.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2650-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012629.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2722-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012586.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012544.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    libexpat before 2.4.9 has a use-after-free in the doContent function in xmlparse.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-40674/">CVE-2022-40674 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40674">CVE-2022-40674 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1203438">SUSE bug 1203438</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204099">SUSE bug 1204099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204177">SUSE bug 1204177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204509">SUSE bug 1204509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205077">SUSE bug 1205077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205285">SUSE bug 1205285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205527">SUSE bug 1205527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205598">SUSE bug 1205598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208339">SUSE bug 1208339</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208753">SUSE bug 1208753</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829840" comment="expat-2.1.0-15.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829841" comment="expat-devel-2.1.0-15.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829842" comment="expat-static-2.1.0-15.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829843" comment="firefox-102.3.0-7.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829844" comment="thunderbird-102.3.0-4.el7_9 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829840" comment="expat-2.1.0-15.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829841" comment="expat-devel-2.1.0-15.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829842" comment="expat-static-2.1.0-15.el7_9 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202240956" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-40956</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-40956" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40956" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-40956" ref_url="https://www.suse.com/security/cve/CVE-2022-40956" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:3396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012724.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    When injecting an HTML base element, some requests would ignore the CSP's base-uri settings and accept the injected element's base instead. This vulnerability affects Firefox ESR &lt; 102.3, Thunderbird &lt; 102.3, and Firefox &lt; 105.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-06-18"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-40956/">CVE-2022-40956 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40956">CVE-2022-40956 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1203477">SUSE bug 1203477</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829820" comment="firefox-102.3.0-6.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829819" comment="thunderbird-102.3.0-3.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202240957" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-40957</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-40957" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40957" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-40957" ref_url="https://www.suse.com/security/cve/CVE-2022-40957" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:3396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012724.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Inconsistent data in instruction and data cache when creating wasm code could lead to a potentially exploitable crash.&lt;br&gt;*This bug only affects Firefox on ARM64 platforms.*. This vulnerability affects Firefox ESR &lt; 102.3, Thunderbird &lt; 102.3, and Firefox &lt; 105.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-06-18"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-40957/">CVE-2022-40957 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40957">CVE-2022-40957 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1203477">SUSE bug 1203477</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829820" comment="firefox-102.3.0-6.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829819" comment="thunderbird-102.3.0-3.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202240958" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-40958</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-40958" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40958" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-40958" ref_url="https://www.suse.com/security/cve/CVE-2022-40958" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:3396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012724.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    By injecting a cookie with certain special characters, an attacker on a shared subdomain which is not a secure context could set and thus overwrite cookies from a secure context, leading to session fixation and other attacks. This vulnerability affects Firefox ESR &lt; 102.3, Thunderbird &lt; 102.3, and Firefox &lt; 105.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-06-18"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-40958/">CVE-2022-40958 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40958">CVE-2022-40958 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1203477">SUSE bug 1203477</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829820" comment="firefox-102.3.0-6.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829819" comment="thunderbird-102.3.0-3.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202240959" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-40959</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-40959" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40959" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-40959" ref_url="https://www.suse.com/security/cve/CVE-2022-40959" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:3396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012724.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    During iframe navigation, certain pages did not have their FeaturePolicy fully initialized leading to a bypass that leaked device permissions into untrusted subdocuments. This vulnerability affects Firefox ESR &lt; 102.3, Thunderbird &lt; 102.3, and Firefox &lt; 105.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-06-18"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-40959/">CVE-2022-40959 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40959">CVE-2022-40959 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1203477">SUSE bug 1203477</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829820" comment="firefox-102.3.0-6.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829819" comment="thunderbird-102.3.0-3.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202240960" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-40960</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-40960" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40960" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-40960" ref_url="https://www.suse.com/security/cve/CVE-2022-40960" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:3396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012724.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Concurrent use of the URL parser with non-UTF-8 data was not thread-safe. This could lead to a use-after-free causing a potentially exploitable crash. This vulnerability affects Firefox ESR &lt; 102.3, Thunderbird &lt; 102.3, and Firefox &lt; 105.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-06-18"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-40960/">CVE-2022-40960 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40960">CVE-2022-40960 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1203477">SUSE bug 1203477</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829820" comment="firefox-102.3.0-6.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829819" comment="thunderbird-102.3.0-3.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202240962" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-40962</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-40962" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40962" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-40962" ref_url="https://www.suse.com/security/cve/CVE-2022-40962" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:3396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012724.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Mozilla developers Nika Layzell, Timothy Nikkel, Sebastian Hengst, Andreas Pehrson, and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 104 and Firefox ESR 102.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR &lt; 102.3, Thunderbird &lt; 102.3, and Firefox &lt; 105.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-06-18"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-40962/">CVE-2022-40962 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40962">CVE-2022-40962 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1203477">SUSE bug 1203477</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829820" comment="firefox-102.3.0-6.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829819" comment="thunderbird-102.3.0-3.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202240964" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-40964</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-40964" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40964" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-40964" ref_url="https://www.suse.com/security/cve/CVE-2022-40964" source="SUSE CVE"/>
    <description>
    Improper access control for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software may allow a privileged user to potentially enable escalation of privilege via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-18"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-40964/">CVE-2022-40964 at SUSE</cve>
	<cve impact="high" cvss3="7.9/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40964">CVE-2022-40964 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009867116" comment="iwl100-firmware-39.31.5.1-83.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867117" comment="iwl1000-firmware-39.31.5.1-83.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867118" comment="iwl105-firmware-18.168.6.1-83.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867119" comment="iwl135-firmware-18.168.6.1-83.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867120" comment="iwl2000-firmware-18.168.6.1-83.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867121" comment="iwl2030-firmware-18.168.6.1-83.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867122" comment="iwl3160-firmware-25.30.13.0-83.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867123" comment="iwl3945-firmware-15.32.2.9-83.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867124" comment="iwl4965-firmware-228.61.2.24-83.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867125" comment="iwl5000-firmware-8.83.5.1_1-83.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867126" comment="iwl5150-firmware-8.24.2.2-83.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867127" comment="iwl6000-firmware-9.221.4.1-83.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867128" comment="iwl6000g2a-firmware-18.168.6.1-83.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867129" comment="iwl6000g2b-firmware-18.168.6.1-83.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867130" comment="iwl6050-firmware-41.28.5.1-83.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867131" comment="iwl7260-firmware-25.30.13.0-83.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867132" comment="linux-firmware-20200421-83.git78c0348.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202240982" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-40982</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-40982" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40982" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-40982" ref_url="https://www.suse.com/security/cve/CVE-2022-40982" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015879.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3302-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3311-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3318-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3324-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3329-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3349-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3359-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3391-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3395-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3421-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3446-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3447-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020609.html" source="SUSE-SU"/>
		<reference ref_id="TID000021170" ref_url="https://www.suse.com/support/kb/doc/?id=000021170" source="SUSE-SU"/>
    <description>
    Information exposure through microarchitectural state after transient execution in certain vector execution units for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-40982/">CVE-2022-40982 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40982">CVE-2022-40982 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1206418">SUSE bug 1206418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215674">SUSE bug 1215674</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830450" comment="bpftool-3.10.0-1160.105.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830451" comment="kernel-3.10.0-1160.105.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830452" comment="kernel-abi-whitelists-3.10.0-1160.105.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830453" comment="kernel-debug-3.10.0-1160.105.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830456" comment="kernel-doc-3.10.0-1160.105.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830457" comment="kernel-headers-3.10.0-1160.105.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830458" comment="kernel-tools-3.10.0-1160.105.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830459" comment="kernel-tools-libs-3.10.0-1160.105.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830461" comment="perf-3.10.0-1160.105.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830462" comment="python-perf-3.10.0-1160.105.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202241318" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-41318</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-41318" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41318" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-41318" ref_url="https://www.suse.com/security/cve/CVE-2022-41318" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:3531-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012509.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012508.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012502.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012545.html" source="SUSE-SU"/>
    <description>
    A buffer over-read was discovered in libntlmauth in Squid 2.5 through 5.6. Due to incorrect integer-overflow protection, the SSPI and SMB authentication helpers are vulnerable to reading unintended memory locations. In some configurations, cleartext credentials from these locations are sent to a client. This is fixed in 5.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-41318/">CVE-2022-41318 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41318">CVE-2022-41318 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1203680">SUSE bug 1203680</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829837" comment="squid-3.5.20-17.el7_9.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829838" comment="squid-migration-script-3.5.20-17.el7_9.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829839" comment="squid-sysvinit-3.5.20-17.el7_9.8 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202241853" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-41853</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-41853" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41853" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-41853" ref_url="https://www.suse.com/security/cve/CVE-2022-41853" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:3823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012804.html" source="SUSE-SU"/>
    <description>
    Those using java.sql.Statement or java.sql.PreparedStatement in hsqldb (HyperSQL DataBase) to process untrusted input may be vulnerable to a remote code execution attack. By default it is allowed to call any static method of any Java class in the classpath resulting in code execution. The issue can be prevented by updating to 2.7.1 or by setting the system property "hsqldb.method_class_names" to classes which are allowed to be called. For example, System.setProperty("hsqldb.method_class_names", "abc") or Java argument -Dhsqldb.method_class_names="abc" can be used. From version 2.7.1 all classes by default are not accessible except those in java.lang.Math and need to be manually enabled.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-41853/">CVE-2022-41853 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41853">CVE-2022-41853 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204521">SUSE bug 1204521</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829912" comment="hsqldb-1.8.1.3-15.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829913" comment="hsqldb-demo-1.8.1.3-15.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829914" comment="hsqldb-javadoc-1.8.1.3-15.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829915" comment="hsqldb-manual-1.8.1.3-15.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202241903" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-41903</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-41903" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41903" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-41903" ref_url="https://www.suse.com/security/cve/CVE-2022-41903" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013500.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013486.html" source="SUSE-SU"/>
    <description>
    Git is distributed revision control system. `git log` can display commits in an arbitrary format using its `--format` specifiers. This functionality is also exposed to `git archive` via the `export-subst` gitattribute. When processing the padding operators, there is a integer overflow in `pretty.c::format_and_pad_commit()` where a `size_t` is stored improperly as an `int`, and then added as an offset to a `memcpy()`. This overflow can be triggered directly by a user running a command which invokes the commit formatting machinery (e.g., `git log --format=...`). It may also be triggered indirectly through git archive via the export-subst mechanism, which expands format specifiers inside of files within the repository during a git archive. This integer overflow can result in arbitrary heap writes, which may result in arbitrary code execution. The problem has been patched in the versions published on 2023-01-17, going back to v2.30.7. Users are advised to upgrade. Users who are unable to upgrade should disable `git archive` in untrusted repositories. If you expose git archive via `git daemon`, disable it by running `git config --global daemon.uploadArch false`.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-41903/">CVE-2022-41903 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41903">CVE-2022-41903 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1207032">SUSE bug 1207032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207033">SUSE bug 1207033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208650">SUSE bug 1208650</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830075" comment="emacs-git-1.8.3.1-24.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830076" comment="emacs-git-el-1.8.3.1-24.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830077" comment="git-1.8.3.1-24.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830078" comment="git-all-1.8.3.1-24.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830079" comment="git-bzr-1.8.3.1-24.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830080" comment="git-cvs-1.8.3.1-24.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830081" comment="git-daemon-1.8.3.1-24.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830082" comment="git-email-1.8.3.1-24.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830083" comment="git-gnome-keyring-1.8.3.1-24.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830084" comment="git-gui-1.8.3.1-24.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830085" comment="git-hg-1.8.3.1-24.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830086" comment="git-instaweb-1.8.3.1-24.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830087" comment="git-p4-1.8.3.1-24.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830088" comment="git-svn-1.8.3.1-24.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830089" comment="gitk-1.8.3.1-24.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830090" comment="gitweb-1.8.3.1-24.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830091" comment="perl-Git-1.8.3.1-24.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830092" comment="perl-Git-SVN-1.8.3.1-24.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202241974" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-41974</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-41974" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41974" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-41974" ref_url="https://www.suse.com/security/cve/CVE-2022-41974" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:3707-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012644.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3709-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012641.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012642.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012645.html" source="SUSE-SU"/>
    <description>
    multipath-tools 0.7.0 through 0.9.x before 0.9.2 allows local users to obtain root access, as exploited alone or in conjunction with CVE-2022-41973. Local users able to write to UNIX domain sockets can bypass access controls and manipulate the multipath setup. This can lead to local privilege escalation to root. This occurs because an attacker can repeat a keyword, which is mishandled because arithmetic ADD is used instead of bitwise OR.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-41974/">CVE-2022-41974 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41974">CVE-2022-41974 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1205472">SUSE bug 1205472</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829878" comment="device-mapper-multipath-0.4.9-136.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829879" comment="device-mapper-multipath-devel-0.4.9-136.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829880" comment="device-mapper-multipath-libs-0.4.9-136.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829881" comment="device-mapper-multipath-sysvinit-0.4.9-136.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829882" comment="kpartx-0.4.9-136.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829883" comment="libdmmp-0.4.9-136.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829884" comment="libdmmp-devel-0.4.9-136.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20224254" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-4254</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-4254" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4254" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-4254" ref_url="https://www.suse.com/security/cve/CVE-2022-4254" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:0200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013642.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013652.html" source="SUSE-SU"/>
    <description>
    sssd: libsss_certmap fails to sanitise certificate data used in LDAP filters
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4254/">CVE-2022-4254 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4254">CVE-2022-4254 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1207474">SUSE bug 1207474</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830019" comment="libipa_hbac-1.16.5-10.el7_9.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830020" comment="libipa_hbac-devel-1.16.5-10.el7_9.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830021" comment="libsss_autofs-1.16.5-10.el7_9.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830022" comment="libsss_certmap-1.16.5-10.el7_9.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830023" comment="libsss_certmap-devel-1.16.5-10.el7_9.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830024" comment="libsss_idmap-1.16.5-10.el7_9.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830025" comment="libsss_idmap-devel-1.16.5-10.el7_9.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830026" comment="libsss_nss_idmap-1.16.5-10.el7_9.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830027" comment="libsss_nss_idmap-devel-1.16.5-10.el7_9.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830028" comment="libsss_simpleifp-1.16.5-10.el7_9.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830029" comment="libsss_simpleifp-devel-1.16.5-10.el7_9.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830030" comment="libsss_sudo-1.16.5-10.el7_9.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830031" comment="python-libipa_hbac-1.16.5-10.el7_9.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830032" comment="python-libsss_nss_idmap-1.16.5-10.el7_9.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830033" comment="python-sss-1.16.5-10.el7_9.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830034" comment="python-sss-murmur-1.16.5-10.el7_9.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830035" comment="python-sssdconfig-1.16.5-10.el7_9.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830036" comment="sssd-1.16.5-10.el7_9.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830037" comment="sssd-ad-1.16.5-10.el7_9.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830038" comment="sssd-client-1.16.5-10.el7_9.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830039" comment="sssd-common-1.16.5-10.el7_9.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830040" comment="sssd-common-pac-1.16.5-10.el7_9.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830041" comment="sssd-dbus-1.16.5-10.el7_9.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830042" comment="sssd-ipa-1.16.5-10.el7_9.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830043" comment="sssd-kcm-1.16.5-10.el7_9.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830044" comment="sssd-krb5-1.16.5-10.el7_9.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830045" comment="sssd-krb5-common-1.16.5-10.el7_9.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830046" comment="sssd-ldap-1.16.5-10.el7_9.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830047" comment="sssd-libwbclient-1.16.5-10.el7_9.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830048" comment="sssd-libwbclient-devel-1.16.5-10.el7_9.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830049" comment="sssd-polkit-rules-1.16.5-10.el7_9.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830050" comment="sssd-proxy-1.16.5-10.el7_9.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830051" comment="sssd-tools-1.16.5-10.el7_9.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830052" comment="sssd-winbind-idmap-1.16.5-10.el7_9.15 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202242703" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-42703</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-42703" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42703" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-42703" ref_url="https://www.suse.com/security/cve/CVE-2022-42703" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4273-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-November/026621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
    <description>
    mm/rmap.c in the Linux kernel before 5.19.7 has a use-after-free related to leaf anon_vma double reuse.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42703/">CVE-2022-42703 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42703">CVE-2022-42703 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1202096">SUSE bug 1202096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204168">SUSE bug 1204168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204170">SUSE bug 1204170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206463">SUSE bug 1206463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208044">SUSE bug 1208044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209225">SUSE bug 1209225</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830120" comment="bpftool-3.10.0-1160.88.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830121" comment="kernel-3.10.0-1160.88.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830122" comment="kernel-abi-whitelists-3.10.0-1160.88.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830123" comment="kernel-debug-3.10.0-1160.88.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830126" comment="kernel-doc-3.10.0-1160.88.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830127" comment="kernel-headers-3.10.0-1160.88.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830128" comment="kernel-tools-3.10.0-1160.88.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830129" comment="kernel-tools-libs-3.10.0-1160.88.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830131" comment="perf-3.10.0-1160.88.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830132" comment="python-perf-3.10.0-1160.88.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20224283" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-4283</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-4283" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4283" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-4283" ref_url="https://www.suse.com/security/cve/CVE-2022-4283" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:4479-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-December/026893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013242.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4482-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-December/026895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4483-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013241.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in X.Org. This security flaw occurs because the XkbCopyNames function left a dangling pointer to freed memory, resulting in out-of-bounds memory access on subsequent XkbGetKbdByName requests.. This issue can lead to local privileges elevation on systems where the X server is running privileged and remote code execution for ssh X forwarding sessions.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4283/">CVE-2022-4283 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4283">CVE-2022-4283 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1206017">SUSE bug 1206017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208344">SUSE bug 1208344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208653">SUSE bug 1208653</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829948" comment="tigervnc-1.8.0-23.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829949" comment="tigervnc-icons-1.8.0-23.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829950" comment="tigervnc-license-1.8.0-23.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829951" comment="tigervnc-server-1.8.0-23.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829952" comment="tigervnc-server-applet-1.8.0-23.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829953" comment="tigervnc-server-minimal-1.8.0-23.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829954" comment="tigervnc-server-module-1.8.0-23.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829955" comment="xorg-x11-server-Xdmx-1.20.4-21.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829956" comment="xorg-x11-server-Xephyr-1.20.4-21.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829957" comment="xorg-x11-server-Xnest-1.20.4-21.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829958" comment="xorg-x11-server-Xorg-1.20.4-21.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829959" comment="xorg-x11-server-Xvfb-1.20.4-21.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829960" comment="xorg-x11-server-Xwayland-1.20.4-21.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829961" comment="xorg-x11-server-common-1.20.4-21.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829962" comment="xorg-x11-server-devel-1.20.4-21.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829963" comment="xorg-x11-server-source-1.20.4-21.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202242896" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-42896</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-42896" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42896" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-42896" ref_url="https://www.suse.com/security/cve/CVE-2022-42896" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:8-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:9-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013250.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0420-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013767.html" source="SUSE-SU"/>
    <description>
    There are use-after-free vulnerabilities in the Linux kernel's net/bluetooth/l2cap_core.c's l2cap_connect and l2cap_le_connect_req functions which may allow code execution and leaking kernel memory (respectively) remotely via Bluetooth.  A remote attacker could execute code leaking kernel memory via Bluetooth if within proximity of the victim.

We recommend upgrading past commit    https://www.google.com/url  https://github.com/torvalds/linux/commit/711f8c3fb3db61897080468586b970c87c61d9e4 https://www.google.com/url 


    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-22"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-42896/">CVE-2022-42896 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42896">CVE-2022-42896 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1205709">SUSE bug 1205709</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009851792" comment="bpftool-3.10.0-1160.114.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851793" comment="kernel-3.10.0-1160.114.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851794" comment="kernel-abi-whitelists-3.10.0-1160.114.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851795" comment="kernel-debug-3.10.0-1160.114.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851798" comment="kernel-doc-3.10.0-1160.114.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851799" comment="kernel-headers-3.10.0-1160.114.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851800" comment="kernel-tools-3.10.0-1160.114.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851801" comment="kernel-tools-libs-3.10.0-1160.114.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851803" comment="perf-3.10.0-1160.114.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851804" comment="python-perf-3.10.0-1160.114.2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202242898" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-42898</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-42898" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42898" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-42898" ref_url="https://www.suse.com/security/cve/CVE-2022-42898" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:3071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3075-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3099-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-November/026431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3100-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-November/026432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3151-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013198.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013233.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013635.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4335-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013559.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2023:0019-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WO45C5LQHPOWEJHKWCXPWLI54XMTTYQP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2023:0020-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VCW7YX6RG5EAFBRU3SLTXKN5NWVODXTH/" source="SUSE-SU"/>
    <description>
    PAC parsing in MIT Kerberos 5 (aka krb5) before 1.19.4 and 1.20.x before 1.20.1 has integer overflows that may lead to remote code execution (in KDC, kadmind, or a GSS or Kerberos application server) on 32-bit platforms (which have a resultant heap-based buffer overflow), and cause a denial of service on other platforms. This occurs in krb5_pac_parse in lib/krb5/krb/pac.c. Heimdal before 7.7.1 has "a similar bug."
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-42898/">CVE-2022-42898 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42898">CVE-2022-42898 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1205126">SUSE bug 1205126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205667">SUSE bug 1205667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207423">SUSE bug 1207423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207690">SUSE bug 1207690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211487">SUSE bug 1211487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225675">SUSE bug 1225675</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829916" comment="krb5-devel-1.15.1-55.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829917" comment="krb5-libs-1.15.1-55.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829918" comment="krb5-pkinit-1.15.1-55.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829919" comment="krb5-server-1.15.1-55.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829920" comment="krb5-server-ldap-1.15.1-55.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829921" comment="krb5-workstation-1.15.1-55.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829922" comment="libkadm5-1.15.1-55.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202242920" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-42920</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-42920" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42920" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-42920" ref_url="https://www.suse.com/security/cve/CVE-2022-42920" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:4306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013192.html" source="SUSE-SU"/>
    <description>
    Apache Commons BCEL has a number of APIs that would normally only allow changing specific class characteristics. However, due to an out-of-bounds writing issue, these APIs can be used to produce arbitrary bytecode. This could be abused in applications that pass attacker-controllable data to those APIs, giving the attacker more control over the resulting bytecode than otherwise expected. Update to Apache Commons BCEL 6.6.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42920/">CVE-2022-42920 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42920">CVE-2022-42920 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1205125">SUSE bug 1205125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209316">SUSE bug 1209316</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829944" comment="bcel-5.2-19.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829945" comment="bcel-javadoc-5.2-19.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202242927" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-42927</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-42927" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42927" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-42927" ref_url="https://www.suse.com/security/cve/CVE-2022-42927" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:3698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012635.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3726-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012993.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A same-origin policy violation could have allowed the theft of cross-origin URL entries, leaking the result of a redirect, via `performance.getEntries()`. This vulnerability affects Firefox &lt; 106, Firefox ESR &lt; 102.4, and Thunderbird &lt; 102.4.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-06-18"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42927/">CVE-2022-42927 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42927">CVE-2022-42927 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204421">SUSE bug 1204421</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829862" comment="firefox-102.4.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829877" comment="thunderbird-102.4.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202242928" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-42928</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-42928" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42928" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-42928" ref_url="https://www.suse.com/security/cve/CVE-2022-42928" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:3698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012635.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3726-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012993.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Certain types of allocations were missing annotations that, if the Garbage Collector was in a specific state, could have lead to memory corruption and a potentially exploitable crash. This vulnerability affects Firefox &lt; 106, Firefox ESR &lt; 102.4, and Thunderbird &lt; 102.4.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-12-19"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42928/">CVE-2022-42928 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42928">CVE-2022-42928 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204421">SUSE bug 1204421</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829862" comment="firefox-102.4.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829877" comment="thunderbird-102.4.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202242929" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-42929</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-42929" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42929" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-42929" ref_url="https://www.suse.com/security/cve/CVE-2022-42929" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:3698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012635.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3726-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012993.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    If a website called `window.print()` in a particular way, it could cause a denial of service of the browser, which may persist beyond browser restart depending on the user's session restore settings. This vulnerability affects Firefox &lt; 106, Firefox ESR &lt; 102.4, and Thunderbird &lt; 102.4.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-06-18"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-42929/">CVE-2022-42929 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42929">CVE-2022-42929 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204421">SUSE bug 1204421</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829862" comment="firefox-102.4.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829877" comment="thunderbird-102.4.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202242932" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-42932</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-42932" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42932" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-42932" ref_url="https://www.suse.com/security/cve/CVE-2022-42932" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:3698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012635.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3726-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012993.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Mozilla developers Ashley Hale and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 105 and Firefox ESR 102.3. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 106, Firefox ESR &lt; 102.4, and Thunderbird &lt; 102.4.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-06-18"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-42932/">CVE-2022-42932 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42932">CVE-2022-42932 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204421">SUSE bug 1204421</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829862" comment="firefox-102.4.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829877" comment="thunderbird-102.4.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202243552" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-43552</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-43552" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43552" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-43552" ref_url="https://www.suse.com/security/cve/CVE-2022-43552" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:3421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3427-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013307.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3432-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3438-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-December/027005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3439-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-December/027006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3445-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3448-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013328.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013332.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3454-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013359.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:8-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:9-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2226-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2228-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029437.html" source="SUSE-SU"/>
    <description>
    A use after free vulnerability exists in curl &lt;7.87.0. Curl can be asked to *tunnel* virtually all protocols it supports through an HTTP proxy. HTTP proxies can (and often do) deny such tunnel operations. When getting denied to tunnel the specific protocols SMB or TELNET, curl would use a heap-allocated struct after it had been freed, in its transfer shutdown code path.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-43552/">CVE-2022-43552 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-43552">CVE-2022-43552 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1206309">SUSE bug 1206309</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830489" comment="curl-7.29.0-59.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830490" comment="libcurl-7.29.0-59.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830491" comment="libcurl-devel-7.29.0-59.el7_9.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202243750" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-43750</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-43750" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43750" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-43750" ref_url="https://www.suse.com/security/cve/CVE-2022-43750" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4273-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-November/026621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013765.html" source="SUSE-SU"/>
    <description>
    drivers/usb/mon/mon_bin.c in usbmon in the Linux kernel before 5.19.15 and 6.x before 6.0.1 allows a user-space client to corrupt the monitor's internal memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-43750/">CVE-2022-43750 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-43750">CVE-2022-43750 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204653">SUSE bug 1204653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211484">SUSE bug 1211484</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830194" comment="bpftool-3.10.0-1160.90.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830195" comment="kernel-3.10.0-1160.90.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830196" comment="kernel-abi-whitelists-3.10.0-1160.90.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830197" comment="kernel-debug-3.10.0-1160.90.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830200" comment="kernel-doc-3.10.0-1160.90.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830201" comment="kernel-headers-3.10.0-1160.90.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830202" comment="kernel-tools-3.10.0-1160.90.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830203" comment="kernel-tools-libs-3.10.0-1160.90.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830205" comment="perf-3.10.0-1160.90.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830206" comment="python-perf-3.10.0-1160.90.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20224378" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-4378</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-4378" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4378" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-4378" ref_url="https://www.suse.com/security/cve/CVE-2022-4378" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:8-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:9-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013250.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4539-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4560-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-December/026940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4569-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-December/026938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4572-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
    <description>
    A stack overflow flaw was found in the Linux kernel's SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4378/">CVE-2022-4378 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4378">CVE-2022-4378 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1206207">SUSE bug 1206207</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206228">SUSE bug 1206228</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208030">SUSE bug 1208030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208085">SUSE bug 1208085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209225">SUSE bug 1209225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211118">SUSE bug 1211118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214268">SUSE bug 1214268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218483">SUSE bug 1218483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218966">SUSE bug 1218966</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830120" comment="bpftool-3.10.0-1160.88.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830121" comment="kernel-3.10.0-1160.88.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830122" comment="kernel-abi-whitelists-3.10.0-1160.88.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830123" comment="kernel-debug-3.10.0-1160.88.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830126" comment="kernel-doc-3.10.0-1160.88.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830127" comment="kernel-headers-3.10.0-1160.88.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830128" comment="kernel-tools-3.10.0-1160.88.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830129" comment="kernel-tools-libs-3.10.0-1160.88.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830131" comment="perf-3.10.0-1160.88.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830132" comment="python-perf-3.10.0-1160.88.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202245403" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-45403</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-45403" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45403" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-45403" ref_url="https://www.suse.com/security/cve/CVE-2022-45403" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:4058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013128.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Service Workers should not be able to infer information about opaque cross-origin responses; but timing information for cross-origin media combined with Range requests might have allowed them to determine the presence or length of a media file. This vulnerability affects Firefox ESR &lt; 102.5, Thunderbird &lt; 102.5, and Firefox &lt; 107.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-06-18"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45403/">CVE-2022-45403 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45403">CVE-2022-45403 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1205270">SUSE bug 1205270</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829910" comment="firefox-102.5.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829911" comment="thunderbird-102.5.0-2.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202245404" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-45404</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-45404" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45404" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-45404" ref_url="https://www.suse.com/security/cve/CVE-2022-45404" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:4058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013128.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Through a series of popup and &lt;code&gt;window.print()&lt;/code&gt; calls, an attacker can cause a window to go fullscreen without the user seeing the notification prompt, resulting in potential user confusion or spoofing attacks. This vulnerability affects Firefox ESR &lt; 102.5, Thunderbird &lt; 102.5, and Firefox &lt; 107.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-06-18"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45404/">CVE-2022-45404 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45404">CVE-2022-45404 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1205270">SUSE bug 1205270</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829910" comment="firefox-102.5.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829911" comment="thunderbird-102.5.0-2.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202245405" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-45405</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-45405" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45405" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-45405" ref_url="https://www.suse.com/security/cve/CVE-2022-45405" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:4058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013128.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Freeing arbitrary &lt;code&gt;nsIInputStream&lt;/code&gt;'s on a different thread than creation could have led to a use-after-free and potentially exploitable crash. This vulnerability affects Firefox ESR &lt; 102.5, Thunderbird &lt; 102.5, and Firefox &lt; 107.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-06-18"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45405/">CVE-2022-45405 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45405">CVE-2022-45405 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1205270">SUSE bug 1205270</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829910" comment="firefox-102.5.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829911" comment="thunderbird-102.5.0-2.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202245406" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-45406</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-45406" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45406" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-45406" ref_url="https://www.suse.com/security/cve/CVE-2022-45406" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:4058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013128.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    If an out-of-memory condition occurred when creating a JavaScript global, a JavaScript realm may be deleted while references to it lived on in a BaseShape. This could lead to a use-after-free causing a potentially exploitable crash. This vulnerability affects Firefox ESR &lt; 102.5, Thunderbird &lt; 102.5, and Firefox &lt; 107.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-06-18"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45406/">CVE-2022-45406 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45406">CVE-2022-45406 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1205270">SUSE bug 1205270</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829910" comment="firefox-102.5.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829911" comment="thunderbird-102.5.0-2.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202245408" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-45408</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-45408" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45408" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-45408" ref_url="https://www.suse.com/security/cve/CVE-2022-45408" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:4058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013128.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Through a series of popups that reuse windowName, an attacker can cause a window to go fullscreen without the user seeing the notification prompt, resulting in potential user confusion or spoofing attacks. This vulnerability affects Firefox ESR &lt; 102.5, Thunderbird &lt; 102.5, and Firefox &lt; 107.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-06-18"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45408/">CVE-2022-45408 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45408">CVE-2022-45408 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1205270">SUSE bug 1205270</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829910" comment="firefox-102.5.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829911" comment="thunderbird-102.5.0-2.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202245409" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-45409</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-45409" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45409" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-45409" ref_url="https://www.suse.com/security/cve/CVE-2022-45409" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:4058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013128.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    The garbage collector could have been aborted in several states and zones and &lt;code&gt;GCRuntime::finishCollection&lt;/code&gt; may not have been called, leading to a use-after-free and potentially exploitable crash. This vulnerability affects Firefox ESR &lt; 102.5, Thunderbird &lt; 102.5, and Firefox &lt; 107.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-06-18"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45409/">CVE-2022-45409 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45409">CVE-2022-45409 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1205270">SUSE bug 1205270</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829910" comment="firefox-102.5.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829911" comment="thunderbird-102.5.0-2.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202245410" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-45410</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-45410" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45410" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-45410" ref_url="https://www.suse.com/security/cve/CVE-2022-45410" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:4058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013128.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    When a ServiceWorker intercepted a request with &lt;code&gt;FetchEvent&lt;/code&gt;, the origin of the request was lost after the ServiceWorker took ownership of it. This had the effect of negating SameSite cookie protections. This was addressed in the spec and then in browsers. This vulnerability affects Firefox ESR &lt; 102.5, Thunderbird &lt; 102.5, and Firefox &lt; 107.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-06-18"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45410/">CVE-2022-45410 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45410">CVE-2022-45410 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1205270">SUSE bug 1205270</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829910" comment="firefox-102.5.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829911" comment="thunderbird-102.5.0-2.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202245411" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-45411</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-45411" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45411" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-45411" ref_url="https://www.suse.com/security/cve/CVE-2022-45411" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:4058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013128.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Cross-Site Tracing occurs when a server will echo a request back via the Trace method, allowing an XSS attack to access to authorization headers and cookies inaccessible to JavaScript (such as cookies protected by HTTPOnly). To mitigate this attack, browsers placed limits on &lt;code&gt;fetch()&lt;/code&gt; and XMLHttpRequest; however some webservers have implemented non-standard headers such as &lt;code&gt;X-Http-Method-Override&lt;/code&gt; that override the HTTP method, and made this attack possible again. Thunderbird has applied the same mitigations to the use of this and similar headers. This vulnerability affects Firefox ESR &lt; 102.5, Thunderbird &lt; 102.5, and Firefox &lt; 107.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-06-18"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45411/">CVE-2022-45411 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45411">CVE-2022-45411 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1205270">SUSE bug 1205270</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829910" comment="firefox-102.5.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829911" comment="thunderbird-102.5.0-2.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202245412" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-45412</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-45412" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45412" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-45412" ref_url="https://www.suse.com/security/cve/CVE-2022-45412" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:4058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013128.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    When resolving a symlink such as &lt;code&gt;file:///proc/self/fd/1&lt;/code&gt;, an error message may be produced where the symlink was resolved to a string containing unitialized memory in the buffer. &lt;br&gt;*This bug only affects Thunderbird on Unix-based operated systems (Android, Linux, MacOS). Windows is unaffected.*. This vulnerability affects Firefox ESR &lt; 102.5, Thunderbird &lt; 102.5, and Firefox &lt; 107.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-06-18"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45412/">CVE-2022-45412 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45412">CVE-2022-45412 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1205270">SUSE bug 1205270</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829910" comment="firefox-102.5.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829911" comment="thunderbird-102.5.0-2.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202245414" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-45414</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-45414" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45414" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-45414" ref_url="https://www.suse.com/security/cve/CVE-2022-45414" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:4334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013195.html" source="SUSE-SU"/>
    <description>
    If a Thunderbird user quoted from an HTML email, for example by replying to the email, and the email contained either a VIDEO tag with the POSTER attribute or an OBJECT tag with a DATA attribute, a network request to the referenced remote URL was performed, regardless of a configuration to block remote content. An image loaded from the POSTER attribute was shown in the composer window. These issues could have given an attacker additional capabilities when targetting releases that did not yet have a fix for CVE-2022-3033 which was reported around three months ago. This vulnerability affects Thunderbird &lt; 102.5.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-45414/">CVE-2022-45414 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45414">CVE-2022-45414 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1205941">SUSE bug 1205941</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829947" comment="thunderbird-102.6.0-2.el7_9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202245416" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-45416</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-45416" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45416" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-45416" ref_url="https://www.suse.com/security/cve/CVE-2022-45416" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:4058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013128.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Keyboard events reference strings like "KeyA" that were at fixed, known, and widely-spread addresses. Cache-based timing attacks such as Prime+Probe could have possibly figured out which keys were being pressed. This vulnerability affects Firefox ESR &lt; 102.5, Thunderbird &lt; 102.5, and Firefox &lt; 107.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-06-18"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45416/">CVE-2022-45416 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45416">CVE-2022-45416 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1205270">SUSE bug 1205270</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829910" comment="firefox-102.5.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829911" comment="thunderbird-102.5.0-2.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202245418" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-45418</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-45418" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45418" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-45418" ref_url="https://www.suse.com/security/cve/CVE-2022-45418" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:4058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013128.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    If a custom mouse cursor is specified in CSS, under certain circumstances the cursor could have been drawn over the browser UI, resulting in potential user confusion or spoofing attacks. This vulnerability affects Firefox ESR &lt; 102.5, Thunderbird &lt; 102.5, and Firefox &lt; 107.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-06-18"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45418/">CVE-2022-45418 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45418">CVE-2022-45418 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1205270">SUSE bug 1205270</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829910" comment="firefox-102.5.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829911" comment="thunderbird-102.5.0-2.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202245420" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-45420</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-45420" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45420" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-45420" ref_url="https://www.suse.com/security/cve/CVE-2022-45420" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:4058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013128.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Use tables inside of an iframe, an attacker could have caused iframe contents to be rendered outside the boundaries of the iframe, resulting in potential user confusion or spoofing attacks. This vulnerability affects Firefox ESR &lt; 102.5, Thunderbird &lt; 102.5, and Firefox &lt; 107.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-06-18"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45420/">CVE-2022-45420 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45420">CVE-2022-45420 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1205270">SUSE bug 1205270</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829910" comment="firefox-102.5.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829911" comment="thunderbird-102.5.0-2.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202245421" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-45421</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-45421" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45421" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-45421" ref_url="https://www.suse.com/security/cve/CVE-2022-45421" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:4058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013128.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Mozilla developers Andrew McCreight and Gabriele Svelto reported memory safety bugs present in Thunderbird 102.4. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR &lt; 102.5, Thunderbird &lt; 102.5, and Firefox &lt; 107.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-06-18"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45421/">CVE-2022-45421 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45421">CVE-2022-45421 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1205270">SUSE bug 1205270</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206343">SUSE bug 1206343</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829910" comment="firefox-102.5.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829911" comment="thunderbird-102.5.0-2.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202246329" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-46329</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-46329" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46329" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-46329" ref_url="https://www.suse.com/security/cve/CVE-2022-46329" source="SUSE CVE"/>
    <description>
    Protection mechanism failure for some Intel(R) PROSet/Wireless WiFi software may allow a privileged user to potentially enable escalation of privilege via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-18"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46329/">CVE-2022-46329 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46329">CVE-2022-46329 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009867116" comment="iwl100-firmware-39.31.5.1-83.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867117" comment="iwl1000-firmware-39.31.5.1-83.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867118" comment="iwl105-firmware-18.168.6.1-83.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867119" comment="iwl135-firmware-18.168.6.1-83.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867120" comment="iwl2000-firmware-18.168.6.1-83.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867121" comment="iwl2030-firmware-18.168.6.1-83.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867122" comment="iwl3160-firmware-25.30.13.0-83.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867123" comment="iwl3945-firmware-15.32.2.9-83.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867124" comment="iwl4965-firmware-228.61.2.24-83.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867125" comment="iwl5000-firmware-8.83.5.1_1-83.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867126" comment="iwl5150-firmware-8.24.2.2-83.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867127" comment="iwl6000-firmware-9.221.4.1-83.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867128" comment="iwl6000g2a-firmware-18.168.6.1-83.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867129" comment="iwl6000g2b-firmware-18.168.6.1-83.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867130" comment="iwl6050-firmware-41.28.5.1-83.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867131" comment="iwl7260-firmware-25.30.13.0-83.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867132" comment="linux-firmware-20200421-83.git78c0348.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202246340" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-46340</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-46340" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46340" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-46340" ref_url="https://www.suse.com/security/cve/CVE-2022-46340" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:4479-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-December/026893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013242.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4482-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-December/026895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4483-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013241.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0653-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0654-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0657-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014039.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in X.Org. This security flaw occurs becuase the swap handler for the XTestFakeInput request of the XTest extension may corrupt the stack if GenericEvents with lengths larger than 32 bytes are sent through a the XTestFakeInput request. This issue can lead to local privileges elevation on systems where the X server is running privileged and remote code execution for ssh X forwarding sessions. This issue does not affect systems where client and server use the same byte order.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-46340/">CVE-2022-46340 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46340">CVE-2022-46340 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1205874">SUSE bug 1205874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206822">SUSE bug 1206822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208344">SUSE bug 1208344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208653">SUSE bug 1208653</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829948" comment="tigervnc-1.8.0-23.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829949" comment="tigervnc-icons-1.8.0-23.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829950" comment="tigervnc-license-1.8.0-23.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829951" comment="tigervnc-server-1.8.0-23.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829952" comment="tigervnc-server-applet-1.8.0-23.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829953" comment="tigervnc-server-minimal-1.8.0-23.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829954" comment="tigervnc-server-module-1.8.0-23.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829955" comment="xorg-x11-server-Xdmx-1.20.4-21.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829956" comment="xorg-x11-server-Xephyr-1.20.4-21.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829957" comment="xorg-x11-server-Xnest-1.20.4-21.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829958" comment="xorg-x11-server-Xorg-1.20.4-21.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829959" comment="xorg-x11-server-Xvfb-1.20.4-21.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829960" comment="xorg-x11-server-Xwayland-1.20.4-21.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829961" comment="xorg-x11-server-common-1.20.4-21.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829962" comment="xorg-x11-server-devel-1.20.4-21.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829963" comment="xorg-x11-server-source-1.20.4-21.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202246341" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-46341</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-46341" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46341" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-46341" ref_url="https://www.suse.com/security/cve/CVE-2022-46341" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:4479-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-December/026893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013242.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4482-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-December/026895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4483-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013241.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in X.Org. This security flaw occurs because the handler for the XIPassiveUngrab request accesses out-of-bounds memory when invoked with a high keycode or button code. This issue can lead to local privileges elevation on systems where the X server is running privileged and remote code execution for ssh X forwarding sessions.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-46341/">CVE-2022-46341 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46341">CVE-2022-46341 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1205877">SUSE bug 1205877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208653">SUSE bug 1208653</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829948" comment="tigervnc-1.8.0-23.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829949" comment="tigervnc-icons-1.8.0-23.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829950" comment="tigervnc-license-1.8.0-23.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829951" comment="tigervnc-server-1.8.0-23.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829952" comment="tigervnc-server-applet-1.8.0-23.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829953" comment="tigervnc-server-minimal-1.8.0-23.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829954" comment="tigervnc-server-module-1.8.0-23.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829955" comment="xorg-x11-server-Xdmx-1.20.4-21.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829956" comment="xorg-x11-server-Xephyr-1.20.4-21.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829957" comment="xorg-x11-server-Xnest-1.20.4-21.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829958" comment="xorg-x11-server-Xorg-1.20.4-21.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829959" comment="xorg-x11-server-Xvfb-1.20.4-21.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829960" comment="xorg-x11-server-Xwayland-1.20.4-21.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829961" comment="xorg-x11-server-common-1.20.4-21.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829962" comment="xorg-x11-server-devel-1.20.4-21.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829963" comment="xorg-x11-server-source-1.20.4-21.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202246342" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-46342</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-46342" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46342" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-46342" ref_url="https://www.suse.com/security/cve/CVE-2022-46342" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:4479-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-December/026893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013242.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4482-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-December/026895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4483-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013241.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in X.Org. This security flaw occurs because the handler for the XvdiSelectVideoNotify request may write to memory after it has been freed. This issue can lead to local privileges elevation on systems where the X se
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-46342/">CVE-2022-46342 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46342">CVE-2022-46342 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1205879">SUSE bug 1205879</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829948" comment="tigervnc-1.8.0-23.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829949" comment="tigervnc-icons-1.8.0-23.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829950" comment="tigervnc-license-1.8.0-23.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829951" comment="tigervnc-server-1.8.0-23.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829952" comment="tigervnc-server-applet-1.8.0-23.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829953" comment="tigervnc-server-minimal-1.8.0-23.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829954" comment="tigervnc-server-module-1.8.0-23.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829955" comment="xorg-x11-server-Xdmx-1.20.4-21.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829956" comment="xorg-x11-server-Xephyr-1.20.4-21.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829957" comment="xorg-x11-server-Xnest-1.20.4-21.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829958" comment="xorg-x11-server-Xorg-1.20.4-21.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829959" comment="xorg-x11-server-Xvfb-1.20.4-21.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829960" comment="xorg-x11-server-Xwayland-1.20.4-21.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829961" comment="xorg-x11-server-common-1.20.4-21.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829962" comment="xorg-x11-server-devel-1.20.4-21.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829963" comment="xorg-x11-server-source-1.20.4-21.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202246343" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-46343</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-46343" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46343" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-46343" ref_url="https://www.suse.com/security/cve/CVE-2022-46343" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:4479-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-December/026893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013242.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4482-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-December/026895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4483-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013241.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in X.Org. This security flaw occurs because the handler for the ScreenSaverSetAttributes request may write to memory after it has been freed. This issue can lead to local privileges elevation on systems where the X server is running privileged and remote code execution for ssh X forwarding sessions.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-46343/">CVE-2022-46343 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46343">CVE-2022-46343 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1205878">SUSE bug 1205878</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829948" comment="tigervnc-1.8.0-23.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829949" comment="tigervnc-icons-1.8.0-23.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829950" comment="tigervnc-license-1.8.0-23.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829951" comment="tigervnc-server-1.8.0-23.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829952" comment="tigervnc-server-applet-1.8.0-23.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829953" comment="tigervnc-server-minimal-1.8.0-23.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829954" comment="tigervnc-server-module-1.8.0-23.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829955" comment="xorg-x11-server-Xdmx-1.20.4-21.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829956" comment="xorg-x11-server-Xephyr-1.20.4-21.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829957" comment="xorg-x11-server-Xnest-1.20.4-21.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829958" comment="xorg-x11-server-Xorg-1.20.4-21.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829959" comment="xorg-x11-server-Xvfb-1.20.4-21.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829960" comment="xorg-x11-server-Xwayland-1.20.4-21.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829961" comment="xorg-x11-server-common-1.20.4-21.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829962" comment="xorg-x11-server-devel-1.20.4-21.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829963" comment="xorg-x11-server-source-1.20.4-21.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202246344" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-46344</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-46344" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46344" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-46344" ref_url="https://www.suse.com/security/cve/CVE-2022-46344" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:4479-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-December/026893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013242.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4482-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-December/026895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4483-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013241.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in X.Org. This security flaw occurs because the handler for the XIChangeProperty request has a length-validation issues, resulting in out-of-bounds memory reads and potential information disclosure. This issue can lead to local privileges elevation on systems where the X server is running privileged and remote code execution for ssh X forwarding sessions.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-46344/">CVE-2022-46344 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46344">CVE-2022-46344 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1205876">SUSE bug 1205876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217766">SUSE bug 1217766</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829948" comment="tigervnc-1.8.0-23.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829949" comment="tigervnc-icons-1.8.0-23.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829950" comment="tigervnc-license-1.8.0-23.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829951" comment="tigervnc-server-1.8.0-23.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829952" comment="tigervnc-server-applet-1.8.0-23.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829953" comment="tigervnc-server-minimal-1.8.0-23.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829954" comment="tigervnc-server-module-1.8.0-23.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829955" comment="xorg-x11-server-Xdmx-1.20.4-21.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829956" comment="xorg-x11-server-Xephyr-1.20.4-21.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829957" comment="xorg-x11-server-Xnest-1.20.4-21.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829958" comment="xorg-x11-server-Xorg-1.20.4-21.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829959" comment="xorg-x11-server-Xvfb-1.20.4-21.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829960" comment="xorg-x11-server-Xwayland-1.20.4-21.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829961" comment="xorg-x11-server-common-1.20.4-21.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829962" comment="xorg-x11-server-devel-1.20.4-21.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829963" comment="xorg-x11-server-source-1.20.4-21.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202246871" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-46871</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-46871" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46871" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-46871" ref_url="https://www.suse.com/security/cve/CVE-2022-46871" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:0111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0329-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013713.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    An out of date library (libusrsctp) contained vulnerabilities that could potentially be exploited. This vulnerability affects Firefox &lt; 108.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-02"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-46871/">CVE-2022-46871 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46871">CVE-2022-46871 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1206242">SUSE bug 1206242</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829987" comment="firefox-102.7.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830053" comment="thunderbird-102.7.1-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202246872" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-46872</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-46872" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46872" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-46872" ref_url="https://www.suse.com/security/cve/CVE-2022-46872" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:4460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4462-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013290.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    An attacker who compromised a content process could have partially escaped the sandbox to read arbitrary files via clipboard-related IPC messages.&lt;br&gt;*This bug only affects Thunderbird for Linux. Other operating systems are unaffected.*. This vulnerability affects Firefox &lt; 108, Firefox ESR &lt; 102.6, and Thunderbird &lt; 102.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-05"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46872/">CVE-2022-46872 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46872">CVE-2022-46872 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1206242">SUSE bug 1206242</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829946" comment="firefox-102.6.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829947" comment="thunderbird-102.6.0-2.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202246874" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-46874</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-46874" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46874" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-46874" ref_url="https://www.suse.com/security/cve/CVE-2022-46874" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:4460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4462-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4636-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013380.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A file with a long filename could have had its filename truncated to remove the valid extension, leaving a malicious extension in its place. This could potentially led to user confusion and the execution of malicious code.&lt;br/&gt;*Note*: This issue was originally included in the advisories for Thunderbird 102.6, but a patch (specific to Thunderbird) was omitted, resulting in it actually being fixed in Thunderbird 102.6.1. This vulnerability affects Firefox &lt; 108, Thunderbird &lt; 102.6.1, Thunderbird &lt; 102.6, and Firefox ESR &lt; 102.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46874/">CVE-2022-46874 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46874">CVE-2022-46874 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1206242">SUSE bug 1206242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206653">SUSE bug 1206653</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829946" comment="firefox-102.6.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829947" comment="thunderbird-102.6.0-2.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202246877" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-46877</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-46877" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46877" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-46877" ref_url="https://www.suse.com/security/cve/CVE-2022-46877" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:0111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0329-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013713.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    By confusing the browser, the fullscreen notification could have been delayed or suppressed, resulting in potential user confusion or spoofing attacks. This vulnerability affects Firefox &lt; 108.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-02"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46877/">CVE-2022-46877 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46877">CVE-2022-46877 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1206242">SUSE bug 1206242</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829987" comment="firefox-102.7.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830053" comment="thunderbird-102.7.1-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202246878" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-46878</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-46878" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46878" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-46878" ref_url="https://www.suse.com/security/cve/CVE-2022-46878" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:4460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4462-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013290.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Mozilla developers Randell Jesup, Valentin Gosu, Olli Pettay, and the Mozilla Fuzzing Team reported memory safety bugs present in Thunderbird 102.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 108, Firefox ESR &lt; 102.6, and Thunderbird &lt; 102.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-02"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46878/">CVE-2022-46878 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46878">CVE-2022-46878 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1206242">SUSE bug 1206242</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829946" comment="firefox-102.6.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829947" comment="thunderbird-102.6.0-2.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202246880" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-46880</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-46880" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46880" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-46880" ref_url="https://www.suse.com/security/cve/CVE-2022-46880" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:4460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4462-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013290.html" source="SUSE-SU"/>
    <description>
    A missing check related to tex units could have led to a use-after-free and potentially exploitable crash.&lt;br /&gt;*Note*: This advisory was added on December 13th, 2022 after we better understood the impact of the issue. The fix was included in the original release of Firefox 105. This vulnerability affects Firefox ESR &lt; 102.6, Firefox &lt; 105, and Thunderbird &lt; 102.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-02"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46880/">CVE-2022-46880 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46880">CVE-2022-46880 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1206242">SUSE bug 1206242</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829946" comment="firefox-102.6.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829947" comment="thunderbird-102.6.0-2.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202246881" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-46881</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-46881" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46881" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-46881" ref_url="https://www.suse.com/security/cve/CVE-2022-46881" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:4460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4462-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013290.html" source="SUSE-SU"/>
    <description>
    An optimization in WebGL was incorrect in some cases, and could have led to memory corruption and a potentially exploitable crash.
*Note*: This advisory was added on December 13th, 2022 after we better understood the impact of the issue. The fix was included in the original release of Firefox 106. This vulnerability affects Firefox &lt; 106, Firefox ESR &lt; 102.6, and Thunderbird &lt; 102.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-02"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46881/">CVE-2022-46881 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46881">CVE-2022-46881 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1206242">SUSE bug 1206242</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829946" comment="firefox-102.6.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829947" comment="thunderbird-102.6.0-2.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202246882" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-46882</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-46882" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46882" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-46882" ref_url="https://www.suse.com/security/cve/CVE-2022-46882" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:4460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4462-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013290.html" source="SUSE-SU"/>
    <description>
    A use-after-free in WebGL extensions could have led to a potentially exploitable crash. This vulnerability affects Firefox &lt; 107, Firefox ESR &lt; 102.6, and Thunderbird &lt; 102.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-02"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46882/">CVE-2022-46882 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46882">CVE-2022-46882 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1206242">SUSE bug 1206242</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829946" comment="firefox-102.6.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829947" comment="thunderbird-102.6.0-2.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202247629" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-47629</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-47629" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47629" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-47629" ref_url="https://www.suse.com/security/cve/CVE-2022-47629" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013428.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:8-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:9-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013423.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0031-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0056-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013779.html" source="SUSE-SU"/>
    <description>
    Libksba before 1.6.3 is prone to an integer overflow vulnerability in the CRL signature parser.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-47629/">CVE-2022-47629 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-47629">CVE-2022-47629 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1206579">SUSE bug 1206579</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830054" comment="libksba-1.3.0-7.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830055" comment="libksba-devel-1.3.0-7.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248339" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48339</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48339" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48339" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48339" ref_url="https://www.suse.com/security/cve/CVE-2022-48339" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:0597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013997.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in GNU Emacs through 28.2. htmlfontify.el has a command injection vulnerability. In the hfy-istext-command function, the parameter file and parameter srcdir come from external input, and parameters are not escaped. If a file name or directory name contains shell metacharacters, code may be executed.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48339/">CVE-2022-48339 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48339">CVE-2022-48339 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208512">SUSE bug 1208512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211512">SUSE bug 1211512</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830240" comment="emacs-24.3-23.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830241" comment="emacs-common-24.3-23.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830242" comment="emacs-el-24.3-23.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830243" comment="emacs-filesystem-24.3-23.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830244" comment="emacs-nox-24.3-23.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830245" comment="emacs-terminal-24.3-23.el7_9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248701" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48701</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48701" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48701" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48701" ref_url="https://www.suse.com/security/cve/CVE-2022-48701" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:17161" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: usb-audio: Fix an out-of-bounds bug in __snd_usb_parse_audio_interface()

There may be a bad USB audio device with a USB ID of (0x04fa, 0x4201) and
the number of it's interfaces less than 4, an out-of-bounds read bug occurs
when parsing the interface descriptor for this device.

Fix this by checking the number of interfaces.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-10-21"/>
	<updated date="2026-03-05"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-48701/">CVE-2022-48701 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48701">CVE-2022-48701 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223921">SUSE bug 1223921</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010022317" comment="bpftool-3.10.0-1160.141.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022318" comment="kernel-3.10.0-1160.141.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022319" comment="kernel-abi-whitelists-3.10.0-1160.141.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022320" comment="kernel-debug-3.10.0-1160.141.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022323" comment="kernel-doc-3.10.0-1160.141.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022324" comment="kernel-headers-3.10.0-1160.141.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022325" comment="kernel-tools-3.10.0-1160.141.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022326" comment="kernel-tools-libs-3.10.0-1160.141.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022328" comment="perf-3.10.0-1160.141.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022329" comment="python-perf-3.10.0-1160.141.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20224883" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-4883</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-4883" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4883" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-4883" ref_url="https://www.suse.com/security/cve/CVE-2022-4883" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013549.html" source="SUSE-SU"/>
    <description>
    A flaw was found in libXpm. When processing files with .Z or .gz extensions, the library calls external programs to compress and uncompress files, relying on the PATH environment variable to find these programs, which could allow a malicious user to execute other programs by manipulating the PATH environment variable.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4883/">CVE-2022-4883 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4883">CVE-2022-4883 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1207031">SUSE bug 1207031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208055">SUSE bug 1208055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208351">SUSE bug 1208351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208654">SUSE bug 1208654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209322">SUSE bug 1209322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209940">SUSE bug 1209940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829988" comment="libXpm-3.5.12-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829989" comment="libXpm-devel-3.5.12-2.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248978" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48978</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48978" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48978" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48978" ref_url="https://www.suse.com/security/cve/CVE-2022-48978" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:21063" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

HID: core: fix shift-out-of-bounds in hid_report_raw_event

Syzbot reported shift-out-of-bounds in hid_report_raw_event.

microsoft 0003:045E:07DA.0001: hid_field_extract() called with n (128) &gt;
32! (swapper/0)
======================================================================
UBSAN: shift-out-of-bounds in drivers/hid/hid-core.c:1323:20
shift exponent 127 is too large for 32-bit type 'int'
CPU: 0 PID: 0 Comm: swapper/0 Not tainted
6.1.0-rc4-syzkaller-00159-g4bbf3422df78 #0
Hardware name: Google Compute Engine/Google Compute Engine, BIOS
Google 10/26/2022
Call Trace:
 &lt;IRQ&gt;
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0x1e3/0x2cb lib/dump_stack.c:106
 ubsan_epilogue lib/ubsan.c:151 [inline]
 __ubsan_handle_shift_out_of_bounds+0x3a6/0x420 lib/ubsan.c:322
 snto32 drivers/hid/hid-core.c:1323 [inline]
 hid_input_fetch_field drivers/hid/hid-core.c:1572 [inline]
 hid_process_report drivers/hid/hid-core.c:1665 [inline]
 hid_report_raw_event+0xd56/0x18b0 drivers/hid/hid-core.c:1998
 hid_input_report+0x408/0x4f0 drivers/hid/hid-core.c:2066
 hid_irq_in+0x459/0x690 drivers/hid/usbhid/hid-core.c:284
 __usb_hcd_giveback_urb+0x369/0x530 drivers/usb/core/hcd.c:1671
 dummy_timer+0x86b/0x3110 drivers/usb/gadget/udc/dummy_hcd.c:1988
 call_timer_fn+0xf5/0x210 kernel/time/timer.c:1474
 expire_timers kernel/time/timer.c:1519 [inline]
 __run_timers+0x76a/0x980 kernel/time/timer.c:1790
 run_timer_softirq+0x63/0xf0 kernel/time/timer.c:1803
 __do_softirq+0x277/0x75b kernel/softirq.c:571
 __irq_exit_rcu+0xec/0x170 kernel/softirq.c:650
 irq_exit_rcu+0x5/0x20 kernel/softirq.c:662
 sysvec_apic_timer_interrupt+0x91/0xb0 arch/x86/kernel/apic/apic.c:1107
======================================================================

If the size of the integer (unsigned n) is bigger than 32 in snto32(),
shift exponent will be too large for 32-bit type 'int', resulting in a
shift-out-of-bounds bug.
Fix this by adding a check on the size of the integer (unsigned n) in
snto32(). To add support for n greater than 32 bits, set n to 32, if n
is greater than 32.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-05"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48978/">CVE-2022-48978 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48978">CVE-2022-48978 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232038">SUSE bug 1232038</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010032439" comment="bpftool-3.10.0-1160.142.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032440" comment="kernel-3.10.0-1160.142.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032441" comment="kernel-abi-whitelists-3.10.0-1160.142.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032442" comment="kernel-debug-3.10.0-1160.142.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032445" comment="kernel-doc-3.10.0-1160.142.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032446" comment="kernel-headers-3.10.0-1160.142.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032447" comment="kernel-tools-3.10.0-1160.142.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032448" comment="kernel-tools-libs-3.10.0-1160.142.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032450" comment="perf-3.10.0-1160.142.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032451" comment="python-perf-3.10.0-1160.142.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249788" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49788</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49788" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49788" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49788" ref_url="https://www.suse.com/security/cve/CVE-2022-49788" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:11298" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001807.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:12746" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001874.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:14748" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01966-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01982-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01995-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02173-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02262-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023783.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

misc/vmw_vmci: fix an infoleak in vmci_host_do_receive_datagram()

`struct vmci_event_qp` allocated by qp_notify_peer() contains padding,
which may carry uninitialized data to the userspace, as observed by
KMSAN:

  BUG: KMSAN: kernel-infoleak in instrument_copy_to_user ./include/linux/instrumented.h:121
   instrument_copy_to_user ./include/linux/instrumented.h:121
   _copy_to_user+0x5f/0xb0 lib/usercopy.c:33
   copy_to_user ./include/linux/uaccess.h:169
   vmci_host_do_receive_datagram drivers/misc/vmw_vmci/vmci_host.c:431
   vmci_host_unlocked_ioctl+0x33d/0x43d0 drivers/misc/vmw_vmci/vmci_host.c:925
   vfs_ioctl fs/ioctl.c:51
  ...

  Uninit was stored to memory at:
   kmemdup+0x74/0xb0 mm/util.c:131
   dg_dispatch_as_host drivers/misc/vmw_vmci/vmci_datagram.c:271
   vmci_datagram_dispatch+0x4f8/0xfc0 drivers/misc/vmw_vmci/vmci_datagram.c:339
   qp_notify_peer+0x19a/0x290 drivers/misc/vmw_vmci/vmci_queue_pair.c:1479
   qp_broker_attach drivers/misc/vmw_vmci/vmci_queue_pair.c:1662
   qp_broker_alloc+0x2977/0x2f30 drivers/misc/vmw_vmci/vmci_queue_pair.c:1750
   vmci_qp_broker_alloc+0x96/0xd0 drivers/misc/vmw_vmci/vmci_queue_pair.c:1940
   vmci_host_do_alloc_queuepair drivers/misc/vmw_vmci/vmci_host.c:488
   vmci_host_unlocked_ioctl+0x24fd/0x43d0 drivers/misc/vmw_vmci/vmci_host.c:927
  ...

  Local variable ev created at:
   qp_notify_peer+0x54/0x290 drivers/misc/vmw_vmci/vmci_queue_pair.c:1456
   qp_broker_attach drivers/misc/vmw_vmci/vmci_queue_pair.c:1662
   qp_broker_alloc+0x2977/0x2f30 drivers/misc/vmw_vmci/vmci_queue_pair.c:1750

  Bytes 28-31 of 48 are uninitialized
  Memory access of size 48 starts at ffff888035155e00
  Data copied to user address 0000000020000100

Use memset() to prevent the infoleaks.

Also speculatively fix qp_notify_peer_local(), which may suffer from the
same problem.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-09-05"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49788/">CVE-2022-49788 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49788">CVE-2022-49788 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242353">SUSE bug 1242353</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010016960" comment="bpftool-3.10.0-1160.137.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016961" comment="kernel-3.10.0-1160.137.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016962" comment="kernel-abi-whitelists-3.10.0-1160.137.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016963" comment="kernel-debug-3.10.0-1160.137.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016966" comment="kernel-doc-3.10.0-1160.137.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016967" comment="kernel-headers-3.10.0-1160.137.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016968" comment="kernel-tools-3.10.0-1160.137.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016969" comment="kernel-tools-libs-3.10.0-1160.137.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016971" comment="perf-3.10.0-1160.137.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016972" comment="python-perf-3.10.0-1160.137.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250020" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50020</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50020" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50020" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50020" ref_url="https://www.suse.com/security/cve/CVE-2022-50020" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:12752" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001879.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:14748" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02308-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-July/021812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02334-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: avoid resizing to a partial cluster size

This patch avoids an attempt to resize the filesystem to an
unaligned cluster boundary.  An online resize to a size that is not
integral to cluster size results in the last iteration attempting to
grow the fs by a negative amount, which trips a BUG_ON and leaves the fs
with a corrupted in-memory superblock.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-09-05"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50020/">CVE-2022-50020 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50020">CVE-2022-50020 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245129">SUSE bug 1245129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245130">SUSE bug 1245130</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010016960" comment="bpftool-3.10.0-1160.137.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016961" comment="kernel-3.10.0-1160.137.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016962" comment="kernel-abi-whitelists-3.10.0-1160.137.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016963" comment="kernel-debug-3.10.0-1160.137.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016966" comment="kernel-doc-3.10.0-1160.137.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016967" comment="kernel-headers-3.10.0-1160.137.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016968" comment="kernel-tools-3.10.0-1160.137.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016969" comment="kernel-tools-libs-3.10.0-1160.137.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016971" comment="perf-3.10.0-1160.137.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016972" comment="python-perf-3.10.0-1160.137.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250022" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50022</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50022" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50022" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50022" ref_url="https://www.suse.com/security/cve/CVE-2022-50022" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:14748" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02308-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-July/021812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02334-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drivers:md:fix a potential use-after-free bug

In line 2884, "raid5_release_stripe(sh);" drops the reference to sh and
may cause sh to be released. However, sh is subsequently used in lines
2886 "if (sh-&gt;batch_head &amp;&amp; sh != sh-&gt;batch_head)". This may result in an
use-after-free bug.

It can be fixed by moving "raid5_release_stripe(sh);" to the bottom of
the function.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-09-05"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50022/">CVE-2022-50022 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50022">CVE-2022-50022 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245131">SUSE bug 1245131</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010016960" comment="bpftool-3.10.0-1160.137.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016961" comment="kernel-3.10.0-1160.137.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016962" comment="kernel-abi-whitelists-3.10.0-1160.137.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016963" comment="kernel-debug-3.10.0-1160.137.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016966" comment="kernel-doc-3.10.0-1160.137.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016967" comment="kernel-headers-3.10.0-1160.137.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016968" comment="kernel-tools-3.10.0-1160.137.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016969" comment="kernel-tools-libs-3.10.0-1160.137.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016971" comment="perf-3.10.0-1160.137.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016972" comment="python-perf-3.10.0-1160.137.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250066" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50066</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50066" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50066" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50066" ref_url="https://www.suse.com/security/cve/CVE-2022-50066" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:11358" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001818.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: atlantic: fix aq_vec index out of range error

The final update statement of the for loop exceeds the array range, the
dereference of self-&gt;aq_vec[i] is not checked and then leads to the
index out of range error.
Also fixed this kind of coding style in other for loop.

[   97.937604] UBSAN: array-index-out-of-bounds in drivers/net/ethernet/aquantia/atlantic/aq_nic.c:1404:48
[   97.937607] index 8 is out of range for type 'aq_vec_s *[8]'
[   97.937608] CPU: 38 PID: 3767 Comm: kworker/u256:18 Not tainted 5.19.0+ #2
[   97.937610] Hardware name: Dell Inc. Precision 7865 Tower/, BIOS 1.0.0 06/12/2022
[   97.937611] Workqueue: events_unbound async_run_entry_fn
[   97.937616] Call Trace:
[   97.937617]  &lt;TASK&gt;
[   97.937619]  dump_stack_lvl+0x49/0x63
[   97.937624]  dump_stack+0x10/0x16
[   97.937626]  ubsan_epilogue+0x9/0x3f
[   97.937627]  __ubsan_handle_out_of_bounds.cold+0x44/0x49
[   97.937629]  ? __scm_send+0x348/0x440
[   97.937632]  ? aq_vec_stop+0x72/0x80 [atlantic]
[   97.937639]  aq_nic_stop+0x1b6/0x1c0 [atlantic]
[   97.937644]  aq_suspend_common+0x88/0x90 [atlantic]
[   97.937648]  aq_pm_suspend_poweroff+0xe/0x20 [atlantic]
[   97.937653]  pci_pm_suspend+0x7e/0x1a0
[   97.937655]  ? pci_pm_suspend_noirq+0x2b0/0x2b0
[   97.937657]  dpm_run_callback+0x54/0x190
[   97.937660]  __device_suspend+0x14c/0x4d0
[   97.937661]  async_suspend+0x23/0x70
[   97.937663]  async_run_entry_fn+0x33/0x120
[   97.937664]  process_one_work+0x21f/0x3f0
[   97.937666]  worker_thread+0x4a/0x3c0
[   97.937668]  ? process_one_work+0x3f0/0x3f0
[   97.937669]  kthread+0xf0/0x120
[   97.937671]  ? kthread_complete_and_exit+0x20/0x20
[   97.937672]  ret_from_fork+0x22/0x30
[   97.937676]  &lt;/TASK&gt;

v2. fixed "warning: variable 'aq_vec' set but not used"

v3. simplified a for loop
    </description>
<advisory from="security@suse.de">
	<issued date="2025-07-19"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50066/">CVE-2022-50066 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50066">CVE-2022-50066 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244985">SUSE bug 1244985</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010008281" comment="bpftool-3.10.0-1160.136.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008282" comment="kernel-3.10.0-1160.136.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008283" comment="kernel-abi-whitelists-3.10.0-1160.136.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008284" comment="kernel-debug-3.10.0-1160.136.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008287" comment="kernel-doc-3.10.0-1160.136.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008288" comment="kernel-headers-3.10.0-1160.136.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008289" comment="kernel-tools-3.10.0-1160.136.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008290" comment="kernel-tools-libs-3.10.0-1160.136.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008292" comment="perf-3.10.0-1160.136.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008293" comment="python-perf-3.10.0-1160.136.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250211" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50211</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50211" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50211" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50211" ref_url="https://www.suse.com/security/cve/CVE-2022-50211" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:17161" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02308-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-July/021812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02334-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02844-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02844-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02848-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

md-raid10: fix KASAN warning

There's a KASAN warning in raid10_remove_disk when running the lvm
test lvconvert-raid-reshape.sh. We fix this warning by verifying that the
value "number" is valid.

BUG: KASAN: slab-out-of-bounds in raid10_remove_disk+0x61/0x2a0 [raid10]
Read of size 8 at addr ffff889108f3d300 by task mdX_raid10/124682

CPU: 3 PID: 124682 Comm: mdX_raid10 Not tainted 5.19.0-rc6 #1
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-2 04/01/2014
Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl+0x34/0x44
 print_report.cold+0x45/0x57a
 ? __lock_text_start+0x18/0x18
 ? raid10_remove_disk+0x61/0x2a0 [raid10]
 kasan_report+0xa8/0xe0
 ? raid10_remove_disk+0x61/0x2a0 [raid10]
 raid10_remove_disk+0x61/0x2a0 [raid10]
Buffer I/O error on dev dm-76, logical block 15344, async page read
 ? __mutex_unlock_slowpath.constprop.0+0x1e0/0x1e0
 remove_and_add_spares+0x367/0x8a0 [md_mod]
 ? super_written+0x1c0/0x1c0 [md_mod]
 ? mutex_trylock+0xac/0x120
 ? _raw_spin_lock+0x72/0xc0
 ? _raw_spin_lock_bh+0xc0/0xc0
 md_check_recovery+0x848/0x960 [md_mod]
 raid10d+0xcf/0x3360 [raid10]
 ? sched_clock_cpu+0x185/0x1a0
 ? rb_erase+0x4d4/0x620
 ? var_wake_function+0xe0/0xe0
 ? psi_group_change+0x411/0x500
 ? preempt_count_sub+0xf/0xc0
 ? _raw_spin_lock_irqsave+0x78/0xc0
 ? __lock_text_start+0x18/0x18
 ? raid10_sync_request+0x36c0/0x36c0 [raid10]
 ? preempt_count_sub+0xf/0xc0
 ? _raw_spin_unlock_irqrestore+0x19/0x40
 ? del_timer_sync+0xa9/0x100
 ? try_to_del_timer_sync+0xc0/0xc0
 ? _raw_spin_lock_irqsave+0x78/0xc0
 ? __lock_text_start+0x18/0x18
 ? _raw_spin_unlock_irq+0x11/0x24
 ? __list_del_entry_valid+0x68/0xa0
 ? finish_wait+0xa3/0x100
 md_thread+0x161/0x260 [md_mod]
 ? unregister_md_personality+0xa0/0xa0 [md_mod]
 ? _raw_spin_lock_irqsave+0x78/0xc0
 ? prepare_to_wait_event+0x2c0/0x2c0
 ? unregister_md_personality+0xa0/0xa0 [md_mod]
 kthread+0x148/0x180
 ? kthread_complete_and_exit+0x20/0x20
 ret_from_fork+0x1f/0x30
 &lt;/TASK&gt;

Allocated by task 124495:
 kasan_save_stack+0x1e/0x40
 __kasan_kmalloc+0x80/0xa0
 setup_conf+0x140/0x5c0 [raid10]
 raid10_run+0x4cd/0x740 [raid10]
 md_run+0x6f9/0x1300 [md_mod]
 raid_ctr+0x2531/0x4ac0 [dm_raid]
 dm_table_add_target+0x2b0/0x620 [dm_mod]
 table_load+0x1c8/0x400 [dm_mod]
 ctl_ioctl+0x29e/0x560 [dm_mod]
 dm_compat_ctl_ioctl+0x7/0x20 [dm_mod]
 __do_compat_sys_ioctl+0xfa/0x160
 do_syscall_64+0x90/0xc0
 entry_SYSCALL_64_after_hwframe+0x46/0xb0

Last potentially related work creation:
 kasan_save_stack+0x1e/0x40
 __kasan_record_aux_stack+0x9e/0xc0
 kvfree_call_rcu+0x84/0x480
 timerfd_release+0x82/0x140
L __fput+0xfa/0x400
 task_work_run+0x80/0xc0
 exit_to_user_mode_prepare+0x155/0x160
 syscall_exit_to_user_mode+0x12/0x40
 do_syscall_64+0x42/0xc0
 entry_SYSCALL_64_after_hwframe+0x46/0xb0

Second to last potentially related work creation:
 kasan_save_stack+0x1e/0x40
 __kasan_record_aux_stack+0x9e/0xc0
 kvfree_call_rcu+0x84/0x480
 timerfd_release+0x82/0x140
 __fput+0xfa/0x400
 task_work_run+0x80/0xc0
 exit_to_user_mode_prepare+0x155/0x160
 syscall_exit_to_user_mode+0x12/0x40
 do_syscall_64+0x42/0xc0
 entry_SYSCALL_64_after_hwframe+0x46/0xb0

The buggy address belongs to the object at ffff889108f3d200
 which belongs to the cache kmalloc-256 of size 256
The buggy address is located 0 bytes to the right of
 256-byte region [ffff889108f3d200, ffff889108f3d300)

The buggy address belongs to the physical page:
page:000000007ef2a34c refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1108f3c
head:000000007ef2a34c order:2 compound_mapcount:0 compound_pincount:0
flags: 0x4000000000010200(slab|head|zone=2)
raw: 4000000000010200 0000000000000000 dead000000000001 ffff889100042b40
raw: 0000000000000000 0000000080200020 00000001ffffffff 0000000000000000
page dumped because: kasan: bad access detected

Memory state around the buggy address:
 ffff889108f3d200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
 ffff889108f3d280: 00 00
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-10-21"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50211/">CVE-2022-50211 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50211">CVE-2022-50211 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245140">SUSE bug 1245140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245141">SUSE bug 1245141</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010022317" comment="bpftool-3.10.0-1160.141.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022318" comment="kernel-3.10.0-1160.141.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022319" comment="kernel-abi-whitelists-3.10.0-1160.141.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022320" comment="kernel-debug-3.10.0-1160.141.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022323" comment="kernel-doc-3.10.0-1160.141.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022324" comment="kernel-headers-3.10.0-1160.141.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022325" comment="kernel-tools-3.10.0-1160.141.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022326" comment="kernel-tools-libs-3.10.0-1160.141.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022328" comment="perf-3.10.0-1160.141.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022329" comment="python-perf-3.10.0-1160.141.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250229" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50229</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50229" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50229" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50229" ref_url="https://www.suse.com/security/cve/CVE-2022-50229" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:17161" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02308-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-July/021812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: bcd2000: Fix a UAF bug on the error path of probing

When the driver fails in snd_card_register() at probe time, it will free
the 'bcd2k-&gt;midi_out_urb' before killing it, which may cause a UAF bug.

The following log can reveal it:

[   50.727020] BUG: KASAN: use-after-free in bcd2000_input_complete+0x1f1/0x2e0 [snd_bcd2000]
[   50.727623] Read of size 8 at addr ffff88810fab0e88 by task swapper/4/0
[   50.729530] Call Trace:
[   50.732899]  bcd2000_input_complete+0x1f1/0x2e0 [snd_bcd2000]

Fix this by adding usb_kill_urb() before usb_free_urb().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-10-21"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50229/">CVE-2022-50229 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50229">CVE-2022-50229 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244856">SUSE bug 1244856</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010022317" comment="bpftool-3.10.0-1160.141.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022318" comment="kernel-3.10.0-1160.141.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022319" comment="kernel-abi-whitelists-3.10.0-1160.141.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022320" comment="kernel-debug-3.10.0-1160.141.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022323" comment="kernel-doc-3.10.0-1160.141.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022324" comment="kernel-headers-3.10.0-1160.141.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022325" comment="kernel-tools-3.10.0-1160.141.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022326" comment="kernel-tools-libs-3.10.0-1160.141.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022328" comment="perf-3.10.0-1160.141.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022329" comment="python-perf-3.10.0-1160.141.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250341" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50341</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50341" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50341" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50341" ref_url="https://www.suse.com/security/cve/CVE-2022-50341" source="SUSE CVE"/>
		<reference ref_id="ESSA-2026:0024" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002461.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22910" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002362.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cifs: fix oops during encryption

When running xfstests against Azure the following oops occurred on an
arm64 system

  Unable to handle kernel write to read-only memory at virtual address
  ffff0001221cf000
  Mem abort info:
    ESR = 0x9600004f
    EC = 0x25: DABT (current EL), IL = 32 bits
    SET = 0, FnV = 0
    EA = 0, S1PTW = 0
    FSC = 0x0f: level 3 permission fault
  Data abort info:
    ISV = 0, ISS = 0x0000004f
    CM = 0, WnR = 1
  swapper pgtable: 4k pages, 48-bit VAs, pgdp=00000000294f3000
  [ffff0001221cf000] pgd=18000001ffff8003, p4d=18000001ffff8003,
  pud=18000001ff82e003, pmd=18000001ff71d003, pte=00600001221cf787
  Internal error: Oops: 9600004f [#1] PREEMPT SMP
  ...
  pstate: 80000005 (Nzcv daif -PAN -UAO -TCO BTYPE=--)
  pc : __memcpy+0x40/0x230
  lr : scatterwalk_copychunks+0xe0/0x200
  sp : ffff800014e92de0
  x29: ffff800014e92de0 x28: ffff000114f9de80 x27: 0000000000000008
  x26: 0000000000000008 x25: ffff800014e92e78 x24: 0000000000000008
  x23: 0000000000000001 x22: 0000040000000000 x21: ffff000000000000
  x20: 0000000000000001 x19: ffff0001037c4488 x18: 0000000000000014
  x17: 235e1c0d6efa9661 x16: a435f9576b6edd6c x15: 0000000000000058
  x14: 0000000000000001 x13: 0000000000000008 x12: ffff000114f2e590
  x11: ffffffffffffffff x10: 0000040000000000 x9 : ffff8000105c3580
  x8 : 2e9413b10000001a x7 : 534b4410fb86b005 x6 : 534b4410fb86b005
  x5 : ffff0001221cf008 x4 : ffff0001037c4490 x3 : 0000000000000001
  x2 : 0000000000000008 x1 : ffff0001037c4488 x0 : ffff0001221cf000
  Call trace:
   __memcpy+0x40/0x230
   scatterwalk_map_and_copy+0x98/0x100
   crypto_ccm_encrypt+0x150/0x180
   crypto_aead_encrypt+0x2c/0x40
   crypt_message+0x750/0x880
   smb3_init_transform_rq+0x298/0x340
   smb_send_rqst.part.11+0xd8/0x180
   smb_send_rqst+0x3c/0x100
   compound_send_recv+0x534/0xbc0
   smb2_query_info_compound+0x32c/0x440
   smb2_set_ea+0x438/0x4c0
   cifs_xattr_set+0x5d4/0x7c0

This is because in scatterwalk_copychunks(), we attempted to write to
a buffer (@sign) that was allocated in the stack (vmalloc area) by
crypt_message() and thus accessing its remaining 8 (x2) bytes ended up
crossing a page boundary.

To simply fix it, we could just pass @sign kmalloc'd from
crypt_message() and then we're done.  Luckily, we don't seem to pass
any other vmalloc'd buffers in smb_rqst::rq_iov...

Instead, let's map the correct pages and offsets from vmalloc buffers
as well in cifs_sg_set_buf() and then avoiding such oopses.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-13"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50341/">CVE-2022-50341 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50341">CVE-2022-50341 at NVD</cve>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010037040" comment="bpftool-3.10.0-1160.143.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037041" comment="kernel-3.10.0-1160.143.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037042" comment="kernel-abi-whitelists-3.10.0-1160.143.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037043" comment="kernel-debug-3.10.0-1160.143.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037046" comment="kernel-doc-3.10.0-1160.143.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037047" comment="kernel-headers-3.10.0-1160.143.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037048" comment="kernel-tools-3.10.0-1160.143.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037049" comment="kernel-tools-libs-3.10.0-1160.143.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037051" comment="perf-3.10.0-1160.143.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037052" comment="python-perf-3.10.0-1160.143.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250356" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50356</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50356" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50356" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50356" ref_url="https://www.suse.com/security/cve/CVE-2022-50356" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:23947" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: sched: sfb: fix null pointer access issue when sfb_init() fails

When the default qdisc is sfb, if the qdisc of dev_queue fails to be
inited during mqprio_init(), sfb_reset() is invoked to clear resources.
In this case, the q-&gt;qdisc is NULL, and it will cause gpf issue.

The process is as follows:
qdisc_create_dflt()
	sfb_init()
		tcf_block_get()          ---&gt;failed, q-&gt;qdisc is NULL
	...
	qdisc_put()
		...
		sfb_reset()
			qdisc_reset(q-&gt;qdisc)    ---&gt;q-&gt;qdisc is NULL
				ops = qdisc-&gt;ops

The following is the Call Trace information:
general protection fault, probably for non-canonical address
0xdffffc0000000003: 0000 [#1] PREEMPT SMP KASAN
KASAN: null-ptr-deref in range [0x0000000000000018-0x000000000000001f]
RIP: 0010:qdisc_reset+0x2b/0x6f0
Call Trace:
&lt;TASK&gt;
sfb_reset+0x37/0xd0
qdisc_reset+0xed/0x6f0
qdisc_destroy+0x82/0x4c0
qdisc_put+0x9e/0xb0
qdisc_create_dflt+0x2c3/0x4a0
mqprio_init+0xa71/0x1760
qdisc_create+0x3eb/0x1000
tc_modify_qdisc+0x408/0x1720
rtnetlink_rcv_msg+0x38e/0xac0
netlink_rcv_skb+0x12d/0x3a0
netlink_unicast+0x4a2/0x740
netlink_sendmsg+0x826/0xcc0
sock_sendmsg+0xc5/0x100
____sys_sendmsg+0x583/0x690
___sys_sendmsg+0xe8/0x160
__sys_sendmsg+0xbf/0x160
do_syscall_64+0x35/0x80
entry_SYSCALL_64_after_hwframe+0x46/0xb0
RIP: 0033:0x7f2164122d04
&lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-15"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50356/">CVE-2022-50356 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50356">CVE-2022-50356 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250040">SUSE bug 1250040</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010037313" comment="bpftool-3.10.0-1160.144.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037314" comment="kernel-3.10.0-1160.144.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037315" comment="kernel-abi-whitelists-3.10.0-1160.144.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037316" comment="kernel-debug-3.10.0-1160.144.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037319" comment="kernel-doc-3.10.0-1160.144.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037320" comment="kernel-headers-3.10.0-1160.144.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037321" comment="kernel-tools-3.10.0-1160.144.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037322" comment="kernel-tools-libs-3.10.0-1160.144.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037324" comment="perf-3.10.0-1160.144.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037325" comment="python-perf-3.10.0-1160.144.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250367" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50367</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50367" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50367" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50367" ref_url="https://www.suse.com/security/cve/CVE-2022-50367" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:19409" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002196.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19931" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002216.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23947" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03626-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023796.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023840.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fs: fix UAF/GPF bug in nilfs_mdt_destroy

In alloc_inode, inode_init_always() could return -ENOMEM if
security_inode_alloc() fails, which causes inode-&gt;i_private
uninitialized. Then nilfs_is_metadata_file_inode() returns
true and nilfs_free_inode() wrongly calls nilfs_mdt_destroy(),
which frees the uninitialized inode-&gt;i_private
and leads to crashes(e.g., UAF/GPF).

Fix this by moving security_inode_alloc just prior to
this_cpu_inc(nr_inodes)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-15"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50367/">CVE-2022-50367 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50367">CVE-2022-50367 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247374">SUSE bug 1247374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250277">SUSE bug 1250277</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010037313" comment="bpftool-3.10.0-1160.144.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037314" comment="kernel-3.10.0-1160.144.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037315" comment="kernel-abi-whitelists-3.10.0-1160.144.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037316" comment="kernel-debug-3.10.0-1160.144.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037319" comment="kernel-doc-3.10.0-1160.144.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037320" comment="kernel-headers-3.10.0-1160.144.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037321" comment="kernel-tools-3.10.0-1160.144.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037322" comment="kernel-tools-libs-3.10.0-1160.144.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037324" comment="perf-3.10.0-1160.144.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037325" comment="python-perf-3.10.0-1160.144.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250386" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50386</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50386" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50386" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50386" ref_url="https://www.suse.com/security/cve/CVE-2022-50386" source="SUSE CVE"/>
		<reference ref_id="ESSA-2026:0024" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002461.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19102" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002136.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22910" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03626-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03652-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03656-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03662-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3684-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3703-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023296.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: L2CAP: Fix user-after-free

This uses l2cap_chan_hold_unless_zero() after calling
__l2cap_get_chan_blah() to prevent the following trace:

Bluetooth: l2cap_core.c:static void l2cap_chan_destroy(struct kref
*kref)
Bluetooth: chan 0000000023c4974d
Bluetooth: parent 00000000ae861c08
==================================================================
BUG: KASAN: use-after-free in __mutex_waiter_is_first
kernel/locking/mutex.c:191 [inline]
BUG: KASAN: use-after-free in __mutex_lock_common
kernel/locking/mutex.c:671 [inline]
BUG: KASAN: use-after-free in __mutex_lock+0x278/0x400
kernel/locking/mutex.c:729
Read of size 8 at addr ffff888006a49b08 by task kworker/u3:2/389
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-13"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50386/">CVE-2022-50386 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50386">CVE-2022-50386 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247374">SUSE bug 1247374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250301">SUSE bug 1250301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250302">SUSE bug 1250302</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010037040" comment="bpftool-3.10.0-1160.143.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037041" comment="kernel-3.10.0-1160.143.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037042" comment="kernel-abi-whitelists-3.10.0-1160.143.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037043" comment="kernel-debug-3.10.0-1160.143.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037046" comment="kernel-doc-3.10.0-1160.143.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037047" comment="kernel-headers-3.10.0-1160.143.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037048" comment="kernel-tools-3.10.0-1160.143.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037049" comment="kernel-tools-libs-3.10.0-1160.143.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037051" comment="perf-3.10.0-1160.143.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037052" comment="python-perf-3.10.0-1160.143.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250403" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50403</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50403" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50403" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50403" ref_url="https://www.suse.com/security/cve/CVE-2022-50403" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:23947" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002373.html" source="SUSE-SU"/>
    <description>
    This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-15"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50403/">CVE-2022-50403 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50403">CVE-2022-50403 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250143">SUSE bug 1250143</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010037313" comment="bpftool-3.10.0-1160.144.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037314" comment="kernel-3.10.0-1160.144.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037315" comment="kernel-abi-whitelists-3.10.0-1160.144.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037316" comment="kernel-debug-3.10.0-1160.144.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037319" comment="kernel-doc-3.10.0-1160.144.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037320" comment="kernel-headers-3.10.0-1160.144.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037321" comment="kernel-tools-3.10.0-1160.144.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037322" comment="kernel-tools-libs-3.10.0-1160.144.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037324" comment="perf-3.10.0-1160.144.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037325" comment="python-perf-3.10.0-1160.144.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250406" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50406</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50406" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50406" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50406" ref_url="https://www.suse.com/security/cve/CVE-2022-50406" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:23947" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iomap: iomap: fix memory corruption when recording errors during writeback

Every now and then I see this crash on arm64:

Unable to handle kernel NULL pointer dereference at virtual address 00000000000000f8
Buffer I/O error on dev dm-0, logical block 8733687, async page read
Mem abort info:
  ESR = 0x0000000096000006
  EC = 0x25: DABT (current EL), IL = 32 bits
  SET = 0, FnV = 0
  EA = 0, S1PTW = 0
  FSC = 0x06: level 2 translation fault
Data abort info:
  ISV = 0, ISS = 0x00000006
  CM = 0, WnR = 0
user pgtable: 64k pages, 42-bit VAs, pgdp=0000000139750000
[00000000000000f8] pgd=0000000000000000, p4d=0000000000000000, pud=0000000000000000, pmd=0000000000000000
Internal error: Oops: 96000006 [#1] PREEMPT SMP
Buffer I/O error on dev dm-0, logical block 8733688, async page read
Dumping ftrace buffer:
Buffer I/O error on dev dm-0, logical block 8733689, async page read
   (ftrace buffer empty)
XFS (dm-0): log I/O error -5
Modules linked in: dm_thin_pool dm_persistent_data
XFS (dm-0): Metadata I/O Error (0x1) detected at xfs_trans_read_buf_map+0x1ec/0x590 [xfs] (fs/xfs/xfs_trans_buf.c:296).
 dm_bio_prison
XFS (dm-0): Please unmount the filesystem and rectify the problem(s)
XFS (dm-0): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -5, agno 0
 dm_bufio dm_log_writes xfs nft_chain_nat xt_REDIRECT nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip6t_REJECT
potentially unexpected fatal signal 6.
 nf_reject_ipv6
potentially unexpected fatal signal 6.
 ipt_REJECT nf_reject_ipv4
CPU: 1 PID: 122166 Comm: fsstress Tainted: G        W          6.0.0-rc5-djwa #rc5 3004c9f1de887ebae86015f2677638ce51ee7
 rpcsec_gss_krb5 auth_rpcgss xt_tcpudp ip_set_hash_ip ip_set_hash_net xt_set nft_compat ip_set_hash_mac ip_set nf_tables
Hardware name: QEMU KVM Virtual Machine, BIOS 1.5.1 06/16/2021
pstate: 60001000 (nZCv daif -PAN -UAO -TCO -DIT +SSBS BTYPE=--)
 ip_tables
pc : 000003fd6d7df200
 x_tables
lr : 000003fd6d7df1ec
 overlay nfsv4
CPU: 0 PID: 54031 Comm: u4:3 Tainted: G        W          6.0.0-rc5-djwa #rc5 3004c9f1de887ebae86015f2677638ce51ee7405
Hardware name: QEMU KVM Virtual Machine, BIOS 1.5.1 06/16/2021
Workqueue: writeback wb_workfn
sp : 000003ffd9522fd0
 (flush-253:0)
pstate: 60401005 (nZCv daif +PAN -UAO -TCO -DIT +SSBS BTYPE=--)
pc : errseq_set+0x1c/0x100
x29: 000003ffd9522fd0 x28: 0000000000000023 x27: 000002acefeb6780
x26: 0000000000000005 x25: 0000000000000001 x24: 0000000000000000
x23: 00000000ffffffff x22: 0000000000000005
lr : __filemap_set_wb_err+0x24/0xe0
 x21: 0000000000000006
sp : fffffe000f80f760
x29: fffffe000f80f760 x28: 0000000000000003 x27: fffffe000f80f9f8
x26: 0000000002523000 x25: 00000000fffffffb x24: fffffe000f80f868
x23: fffffe000f80fbb0 x22: fffffc0180c26a78 x21: 0000000002530000
x20: 0000000000000000 x19: 0000000000000000 x18: 0000000000000000

x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
x14: 0000000000000001 x13: 0000000000470af3 x12: fffffc0058f70000
x11: 0000000000000040 x10: 0000000000001b20 x9 : fffffe000836b288
x8 : fffffc00eb9fd480 x7 : 0000000000f83659 x6 : 0000000000000000
x5 : 0000000000000869 x4 : 0000000000000005 x3 : 00000000000000f8
x20: 000003fd6d740020 x19: 000000000001dd36 x18: 0000000000000001
x17: 000003fd6d78704c x16: 0000000000000001 x15: 000002acfac87668
x2 : 0000000000000ffa x1 : 00000000fffffffb x0 : 00000000000000f8
Call trace:
 errseq_set+0x1c/0x100
 __filemap_set_wb_err+0x24/0xe0
 iomap_do_writepage+0x5e4/0xd5c
 write_cache_pages+0x208/0x674
 iomap_writepages+0x34/0x60
 xfs_vm_writepages+0x8c/0xcc [xfs 7a861f39c43631f15d3a5884246ba5035d4ca78b]
x14: 0000000000000000 x13: 2064656e72757465 x12: 0000000000002180
x11: 000003fd6d8a82d0 x10: 0000000000000000 x9 : 000003fd6d8ae288
x8 : 0000000000000083 x7 : 00000000ffffffff x6 : 00000000ffffffee
x5 : 00000000fbad2887 x4 : 000003fd6d9abb58 x3 : 000003fd6d740020
x2 : 0000000000000006 x1 : 000000000001dd36 x0 : 0000000000000000
CPU: 
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-15"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50406/">CVE-2022-50406 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50406">CVE-2022-50406 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250165">SUSE bug 1250165</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010037313" comment="bpftool-3.10.0-1160.144.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037314" comment="kernel-3.10.0-1160.144.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037315" comment="kernel-abi-whitelists-3.10.0-1160.144.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037316" comment="kernel-debug-3.10.0-1160.144.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037319" comment="kernel-doc-3.10.0-1160.144.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037320" comment="kernel-headers-3.10.0-1160.144.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037321" comment="kernel-tools-3.10.0-1160.144.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037322" comment="kernel-tools-libs-3.10.0-1160.144.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037324" comment="perf-3.10.0-1160.144.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037325" comment="python-perf-3.10.0-1160.144.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250408" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50408</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50408" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50408" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50408" ref_url="https://www.suse.com/security/cve/CVE-2022-50408" source="SUSE CVE"/>
		<reference ref_id="ESSA-2026:0024" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002461.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22910" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03626-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: brcmfmac: fix use-after-free bug in brcmf_netdev_start_xmit()

&gt; ret = brcmf_proto_tx_queue_data(drvr, ifp-&gt;ifidx, skb);

may be schedule, and then complete before the line

&gt; ndev-&gt;stats.tx_bytes += skb-&gt;len;

[   46.912801] ==================================================================
[   46.920552] BUG: KASAN: use-after-free in brcmf_netdev_start_xmit+0x718/0x8c8 [brcmfmac]
[   46.928673] Read of size 4 at addr ffffff803f5882e8 by task systemd-resolve/328
[   46.935991]
[   46.937514] CPU: 1 PID: 328 Comm: systemd-resolve Tainted: G           O      5.4.199-[REDACTED] #1
[   46.947255] Hardware name: [REDACTED]
[   46.954568] Call trace:
[   46.957037]  dump_backtrace+0x0/0x2b8
[   46.960719]  show_stack+0x24/0x30
[   46.964052]  dump_stack+0x128/0x194
[   46.967557]  print_address_description.isra.0+0x64/0x380
[   46.972877]  __kasan_report+0x1d4/0x240
[   46.976723]  kasan_report+0xc/0x18
[   46.980138]  __asan_report_load4_noabort+0x18/0x20
[   46.985027]  brcmf_netdev_start_xmit+0x718/0x8c8 [brcmfmac]
[   46.990613]  dev_hard_start_xmit+0x1bc/0xda0
[   46.994894]  sch_direct_xmit+0x198/0xd08
[   46.998827]  __qdisc_run+0x37c/0x1dc0
[   47.002500]  __dev_queue_xmit+0x1528/0x21f8
[   47.006692]  dev_queue_xmit+0x24/0x30
[   47.010366]  neigh_resolve_output+0x37c/0x678
[   47.014734]  ip_finish_output2+0x598/0x2458
[   47.018927]  __ip_finish_output+0x300/0x730
[   47.023118]  ip_output+0x2e0/0x430
[   47.026530]  ip_local_out+0x90/0x140
[   47.030117]  igmpv3_sendpack+0x14c/0x228
[   47.034049]  igmpv3_send_cr+0x384/0x6b8
[   47.037895]  igmp_ifc_timer_expire+0x4c/0x118
[   47.042262]  call_timer_fn+0x1cc/0xbe8
[   47.046021]  __run_timers+0x4d8/0xb28
[   47.049693]  run_timer_softirq+0x24/0x40
[   47.053626]  __do_softirq+0x2c0/0x117c
[   47.057387]  irq_exit+0x2dc/0x388
[   47.060715]  __handle_domain_irq+0xb4/0x158
[   47.064908]  gic_handle_irq+0x58/0xb0
[   47.068581]  el0_irq_naked+0x50/0x5c
[   47.072162]
[   47.073665] Allocated by task 328:
[   47.077083]  save_stack+0x24/0xb0
[   47.080410]  __kasan_kmalloc.isra.0+0xc0/0xe0
[   47.084776]  kasan_slab_alloc+0x14/0x20
[   47.088622]  kmem_cache_alloc+0x15c/0x468
[   47.092643]  __alloc_skb+0xa4/0x498
[   47.096142]  igmpv3_newpack+0x158/0xd78
[   47.099987]  add_grhead+0x210/0x288
[   47.103485]  add_grec+0x6b0/0xb70
[   47.106811]  igmpv3_send_cr+0x2e0/0x6b8
[   47.110657]  igmp_ifc_timer_expire+0x4c/0x118
[   47.115027]  call_timer_fn+0x1cc/0xbe8
[   47.118785]  __run_timers+0x4d8/0xb28
[   47.122457]  run_timer_softirq+0x24/0x40
[   47.126389]  __do_softirq+0x2c0/0x117c
[   47.130142]
[   47.131643] Freed by task 180:
[   47.134712]  save_stack+0x24/0xb0
[   47.138041]  __kasan_slab_free+0x108/0x180
[   47.142146]  kasan_slab_free+0x10/0x18
[   47.145904]  slab_free_freelist_hook+0xa4/0x1b0
[   47.150444]  kmem_cache_free+0x8c/0x528
[   47.154292]  kfree_skbmem+0x94/0x108
[   47.157880]  consume_skb+0x10c/0x5a8
[   47.161466]  __dev_kfree_skb_any+0x88/0xa0
[   47.165598]  brcmu_pkt_buf_free_skb+0x44/0x68 [brcmutil]
[   47.171023]  brcmf_txfinalize+0xec/0x190 [brcmfmac]
[   47.176016]  brcmf_proto_bcdc_txcomplete+0x1c0/0x210 [brcmfmac]
[   47.182056]  brcmf_sdio_sendfromq+0x8dc/0x1e80 [brcmfmac]
[   47.187568]  brcmf_sdio_dpc+0xb48/0x2108 [brcmfmac]
[   47.192529]  brcmf_sdio_dataworker+0xc8/0x238 [brcmfmac]
[   47.197859]  process_one_work+0x7fc/0x1a80
[   47.201965]  worker_thread+0x31c/0xc40
[   47.205726]  kthread+0x2d8/0x370
[   47.208967]  ret_from_fork+0x10/0x18
[   47.212546]
[   47.214051] The buggy address belongs to the object at ffffff803f588280
[   47.214051]  which belongs to the cache skbuff_head_cache of size 208
[   47.227086] The buggy address is located 104 bytes inside of
[   47.227086]  208-byte region [ffffff803f588280, ffffff803f588350)
[   47.238814] The buggy address belongs to the page:
[   47.243618] page:ffffffff00dd6200 refcount:1 mapcou
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-13"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50408/">CVE-2022-50408 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50408">CVE-2022-50408 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250391">SUSE bug 1250391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250419">SUSE bug 1250419</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010037040" comment="bpftool-3.10.0-1160.143.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037041" comment="kernel-3.10.0-1160.143.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037042" comment="kernel-abi-whitelists-3.10.0-1160.143.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037043" comment="kernel-debug-3.10.0-1160.143.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037046" comment="kernel-doc-3.10.0-1160.143.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037047" comment="kernel-headers-3.10.0-1160.143.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037048" comment="kernel-tools-3.10.0-1160.143.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037049" comment="kernel-tools-libs-3.10.0-1160.143.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037051" comment="perf-3.10.0-1160.143.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037052" comment="python-perf-3.10.0-1160.143.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250410" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50410</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50410" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50410" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50410" ref_url="https://www.suse.com/security/cve/CVE-2022-50410" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:23947" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03626-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

NFSD: Protect against send buffer overflow in NFSv2 READ

Since before the git era, NFSD has conserved the number of pages
held by each nfsd thread by combining the RPC receive and send
buffers into a single array of pages. This works because there are
no cases where an operation needs a large RPC Call message and a
large RPC Reply at the same time.

Once an RPC Call has been received, svc_process() updates
svc_rqst::rq_res to describe the part of rq_pages that can be
used for constructing the Reply. This means that the send buffer
(rq_res) shrinks when the received RPC record containing the RPC
Call is large.

A client can force this shrinkage on TCP by sending a correctly-
formed RPC Call header contained in an RPC record that is
excessively large. The full maximum payload size cannot be
constructed in that case.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-15"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50410/">CVE-2022-50410 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50410">CVE-2022-50410 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250187">SUSE bug 1250187</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010037313" comment="bpftool-3.10.0-1160.144.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037314" comment="kernel-3.10.0-1160.144.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037315" comment="kernel-abi-whitelists-3.10.0-1160.144.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037316" comment="kernel-debug-3.10.0-1160.144.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037319" comment="kernel-doc-3.10.0-1160.144.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037320" comment="kernel-headers-3.10.0-1160.144.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037321" comment="kernel-tools-3.10.0-1160.144.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037322" comment="kernel-tools-libs-3.10.0-1160.144.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037324" comment="perf-3.10.0-1160.144.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037325" comment="python-perf-3.10.0-1160.144.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250673" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50673</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50673" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50673" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50673" ref_url="https://www.suse.com/security/cve/CVE-2022-50673" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2264" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002483.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3685" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: fix use-after-free in ext4_orphan_cleanup

I caught a issue as follows:
==================================================================
 BUG: KASAN: use-after-free in __list_add_valid+0x28/0x1a0
 Read of size 8 at addr ffff88814b13f378 by task mount/710

 CPU: 1 PID: 710 Comm: mount Not tainted 6.1.0-rc3-next #370
 Call Trace:
  &lt;TASK&gt;
  dump_stack_lvl+0x73/0x9f
  print_report+0x25d/0x759
  kasan_report+0xc0/0x120
  __asan_load8+0x99/0x140
  __list_add_valid+0x28/0x1a0
  ext4_orphan_cleanup+0x564/0x9d0 [ext4]
  __ext4_fill_super+0x48e2/0x5300 [ext4]
  ext4_fill_super+0x19f/0x3a0 [ext4]
  get_tree_bdev+0x27b/0x450
  ext4_get_tree+0x19/0x30 [ext4]
  vfs_get_tree+0x49/0x150
  path_mount+0xaae/0x1350
  do_mount+0xe2/0x110
  __x64_sys_mount+0xf0/0x190
  do_syscall_64+0x35/0x80
  entry_SYSCALL_64_after_hwframe+0x63/0xcd
  &lt;/TASK&gt;
 [...]
==================================================================

Above issue may happen as follows:
-------------------------------------
ext4_fill_super
  ext4_orphan_cleanup
   --- loop1: assume last_orphan is 12 ---
    list_add(&amp;EXT4_I(inode)-&gt;i_orphan, &amp;EXT4_SB(sb)-&gt;s_orphan)
    ext4_truncate --&gt; return 0
      ext4_inode_attach_jinode --&gt; return -ENOMEM
    iput(inode) --&gt; free inode&lt;12&gt;
   --- loop2: last_orphan is still 12 ---
    list_add(&amp;EXT4_I(inode)-&gt;i_orphan, &amp;EXT4_SB(sb)-&gt;s_orphan);
    // use inode&lt;12&gt; and trigger UAF

To solve this issue, we need to propagate the return value of
ext4_inode_attach_jinode() appropriately.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-27"/>
	<updated date="2026-03-27"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50673/">CVE-2022-50673 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50673">CVE-2022-50673 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255521">SUSE bug 1255521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255522">SUSE bug 1255522</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010050974" comment="bpftool-3.10.0-1160.147.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050975" comment="kernel-3.10.0-1160.147.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050976" comment="kernel-abi-whitelists-3.10.0-1160.147.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050977" comment="kernel-debug-3.10.0-1160.147.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050978" comment="kernel-doc-3.10.0-1160.147.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050979" comment="kernel-headers-3.10.0-1160.147.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050980" comment="kernel-tools-3.10.0-1160.147.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050981" comment="kernel-tools-libs-3.10.0-1160.147.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050982" comment="perf-3.10.0-1160.147.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050983" comment="python-perf-3.10.0-1160.147.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20230286" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-0286</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-0286" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0286" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-0286" ref_url="https://www.suse.com/security/cve/CVE-2023-0286" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:7895" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001151.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7937" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013665.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013668.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013669.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:304-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013676.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:307-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013685.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013807.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0305-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0307-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14821-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RIPOSWR7VD36W5GUHTZAEDEWEJLAEQ4X/" source="SUSE-SU"/>
    <description>
    There is a type confusion vulnerability relating to X.400 address processing
inside an X.509 GeneralName. X.400 addresses were parsed as an ASN1_STRING but
the public structure definition for GENERAL_NAME incorrectly specified the type
of the x400Address field as ASN1_TYPE. This field is subsequently interpreted by
the OpenSSL function GENERAL_NAME_cmp as an ASN1_TYPE rather than an
ASN1_STRING.

When CRL checking is enabled (i.e. the application sets the
X509_V_FLAG_CRL_CHECK flag), this vulnerability may allow an attacker to pass
arbitrary pointers to a memcmp call, enabling them to read memory contents or
enact a denial of service. In most cases, the attack requires the attacker to
provide both the certificate chain and CRL, neither of which need to have a
valid signature. If the attacker only controls one of these inputs, the other
input must already contain an X.400 address as a CRL distribution point, which
is uncommon. As such, this vulnerability is most likely to only affect
applications which have implemented their own functionality for retrieving CRLs
over a network.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-08"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0286/">CVE-2023-0286 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0286">CVE-2023-0286 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1207533">SUSE bug 1207533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207569">SUSE bug 1207569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211136">SUSE bug 1211136</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211503">SUSE bug 1211503</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213146">SUSE bug 1213146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214269">SUSE bug 1214269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218477">SUSE bug 1218477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218967">SUSE bug 1218967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225677">SUSE bug 1225677</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830145" comment="openssl-1.0.2k-26.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830146" comment="openssl-devel-1.0.2k-26.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830147" comment="openssl-libs-1.0.2k-26.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830148" comment="openssl-perl-1.0.2k-26.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830149" comment="openssl-static-1.0.2k-26.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20230430" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-0430</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-0430" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0430" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-0430" ref_url="https://www.suse.com/security/cve/CVE-2023-0430" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:0329-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013713.html" source="SUSE-SU"/>
    <description>
    Certificate OCSP revocation status was not checked when verifying S/Mime signatures. Mail signed with a revoked certificate would be displayed as having a valid signature. Thunderbird versions from 68 to 102.7.0 were affected by this bug. This vulnerability affects Thunderbird &lt; 102.7.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-0430/">CVE-2023-0430 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0430">CVE-2023-0430 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1207858">SUSE bug 1207858</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830056" comment="thunderbird-102.7.1-2.el7_9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20230494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-0494</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-0494" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0494" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-0494" ref_url="https://www.suse.com/security/cve/CVE-2023-0494" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:0282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013645.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in X.Org. This issue occurs due to a dangling pointer in DeepCopyPointerClasses that can be exploited by ProcXkbSetDeviceInfo() and ProcXkbGetDeviceInfo() to read and write into freed memory. This can lead to local privilege elevation on systems where the X server runs privileged and remote code execution for ssh X forwarding sessions.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-0494/">CVE-2023-0494 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0494">CVE-2023-0494 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1207783">SUSE bug 1207783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208344">SUSE bug 1208344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209331">SUSE bug 1209331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211551">SUSE bug 1211551</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830057" comment="tigervnc-1.8.0-24.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830058" comment="tigervnc-icons-1.8.0-24.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830059" comment="tigervnc-license-1.8.0-24.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830060" comment="tigervnc-server-1.8.0-24.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830061" comment="tigervnc-server-applet-1.8.0-24.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830062" comment="tigervnc-server-minimal-1.8.0-24.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830063" comment="tigervnc-server-module-1.8.0-24.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830064" comment="xorg-x11-server-Xdmx-1.20.4-22.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830065" comment="xorg-x11-server-Xephyr-1.20.4-22.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830066" comment="xorg-x11-server-Xnest-1.20.4-22.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830067" comment="xorg-x11-server-Xorg-1.20.4-22.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830068" comment="xorg-x11-server-Xvfb-1.20.4-22.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830069" comment="xorg-x11-server-Xwayland-1.20.4-22.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830070" comment="xorg-x11-server-common-1.20.4-22.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830071" comment="xorg-x11-server-devel-1.20.4-22.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830072" comment="xorg-x11-server-source-1.20.4-22.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20230547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-0547</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-0547" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0547" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-0547" ref_url="https://www.suse.com/security/cve/CVE-2023-0547" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:2064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014672.html" source="SUSE-SU"/>
    <description>
    OCSP revocation status of recipient certificates was not checked when sending S/Mime encrypted email, and revoked certificates would be accepted. Thunderbird versions from 68 to 102.9.1 were affected by this bug. This vulnerability affects Thunderbird &lt; 102.10.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0547/">CVE-2023-0547 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0547">CVE-2023-0547 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210212">SUSE bug 1210212</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830176" comment="thunderbird-102.10.0-2.el7_9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20230616" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-0616</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-0616" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0616" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-0616" ref_url="https://www.suse.com/security/cve/CVE-2023-0616" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013965.html" source="SUSE-SU"/>
    <description>
    If a MIME email combines OpenPGP and OpenPGP MIME data in a certain way Thunderbird repeatedly attempts to process and display the message, which could cause Thunderbird's user interface to lock up and no longer respond to the user's actions. An attacker could send a crafted message with this structure to attempt a DoS attack. This vulnerability affects Thunderbird &lt; 102.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0616/">CVE-2023-0616 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0616">CVE-2023-0616 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208144">SUSE bug 1208144</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830074" comment="thunderbird-102.8.0-2.el7_9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20230767" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-0767</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-0767" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0767" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-0767" ref_url="https://www.suse.com/security/cve/CVE-2023-0767" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013818.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0434-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-February/027713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013965.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    An attacker could construct a PKCS 12 cert bundle in such a way that could allow for arbitrary memory writes via PKCS 12 Safe Bag attributes being mishandled. This vulnerability affects Firefox &lt; 110, Thunderbird &lt; 102.8, and Firefox ESR &lt; 102.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-0767/">CVE-2023-0767 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0767">CVE-2023-0767 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208138">SUSE bug 1208138</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213200">SUSE bug 1213200</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213818">SUSE bug 1213818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214271">SUSE bug 1214271</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218481">SUSE bug 1218481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218964">SUSE bug 1218964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225630">SUSE bug 1225630</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830073" comment="firefox-102.8.0-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830139" comment="nss-3.79.0-5.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830140" comment="nss-devel-3.79.0-5.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830141" comment="nss-pkcs11-devel-3.79.0-5.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830142" comment="nss-sysinit-3.79.0-5.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830143" comment="nss-tools-3.79.0-5.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830074" comment="thunderbird-102.8.0-2.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20231393" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-1393</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-1393" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1393" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-1393" ref_url="https://www.suse.com/security/cve/CVE-2023-1393" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:1674-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1675-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1677-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1678-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1680-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1716-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028536.html" source="SUSE-SU"/>
    <description>
    A flaw was found in X.Org Server Overlay Window. A Use-After-Free may lead to local privilege escalation. If a client explicitly destroys the compositor overlay window (aka COW), the Xserver would leave a dangling pointer to that window in the CompScreen structure, which will trigger a use-after-free later.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1393/">CVE-2023-1393 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1393">CVE-2023-1393 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1209543">SUSE bug 1209543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210895">SUSE bug 1210895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211551">SUSE bug 1211551</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830159" comment="tigervnc-1.8.0-25.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830160" comment="tigervnc-icons-1.8.0-25.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830161" comment="tigervnc-license-1.8.0-25.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830162" comment="tigervnc-server-1.8.0-25.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830163" comment="tigervnc-server-applet-1.8.0-25.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830164" comment="tigervnc-server-minimal-1.8.0-25.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830165" comment="tigervnc-server-module-1.8.0-25.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830166" comment="xorg-x11-server-Xdmx-1.20.4-23.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830167" comment="xorg-x11-server-Xephyr-1.20.4-23.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830168" comment="xorg-x11-server-Xnest-1.20.4-23.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830169" comment="xorg-x11-server-Xorg-1.20.4-23.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830170" comment="xorg-x11-server-Xvfb-1.20.4-23.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830171" comment="xorg-x11-server-Xwayland-1.20.4-23.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830172" comment="xorg-x11-server-common-1.20.4-23.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830173" comment="xorg-x11-server-devel-1.20.4-23.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830174" comment="xorg-x11-server-source-1.20.4-23.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20231945" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-1945</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-1945" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1945" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-1945" ref_url="https://www.suse.com/security/cve/CVE-2023-1945" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:1817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1855-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014672.html" source="SUSE-SU"/>
    <description>
    Unexpected data returned from the Safe Browsing API could have led to memory corruption and a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 102.10 and Firefox ESR &lt; 102.10.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-1945/">CVE-2023-1945 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1945">CVE-2023-1945 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210212">SUSE bug 1210212</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830175" comment="firefox-102.10.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830176" comment="thunderbird-102.10.0-2.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20231999" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-1999</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-1999" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1999" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-1999" ref_url="https://www.suse.com/security/cve/CVE-2023-1999" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:2064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2467-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029773.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2552-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015241.html" source="SUSE-SU"/>
    <description>
    There exists a use after free/double free in libwebp. An attacker can use the  ApplyFiltersAndEncode() function and loop through to free best.bw and assign best = trial pointer. The second loop will then return 0 because of an Out of memory error in VP8 encoder, the pointer is still assigned to trial and the AddressSanitizer will attempt a double free.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-12-19"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1999/">CVE-2023-1999 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1999">CVE-2023-1999 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213054">SUSE bug 1213054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217159">SUSE bug 1217159</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830207" comment="libwebp-0.3.0-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830208" comment="libwebp-devel-0.3.0-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830209" comment="libwebp-java-0.3.0-11.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830210" comment="libwebp-tools-0.3.0-11.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20232002" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-2002</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-2002" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-2002" ref_url="https://www.suse.com/security/cve/CVE-2023-2002" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2500-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2782-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2804-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2808-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2810-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3075-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015755.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in the HCI sockets implementation due to a missing capability check in net/bluetooth/hci_sock.c in the Linux Kernel. This flaw allows an attacker to unauthorized execution of management commands, compromising the confidentiality, integrity, and availability of Bluetooth communication.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-02"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2002/">CVE-2023-2002 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2002">CVE-2023-2002 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210533">SUSE bug 1210533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210566">SUSE bug 1210566</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009858640" comment="bpftool-3.10.0-1160.118.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858641" comment="kernel-3.10.0-1160.118.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858642" comment="kernel-abi-whitelists-3.10.0-1160.118.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858643" comment="kernel-debug-3.10.0-1160.118.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858646" comment="kernel-doc-3.10.0-1160.118.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858647" comment="kernel-headers-3.10.0-1160.118.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858648" comment="kernel-tools-3.10.0-1160.118.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858649" comment="kernel-tools-libs-3.10.0-1160.118.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858651" comment="perf-3.10.0-1160.118.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858652" comment="python-perf-3.10.0-1160.118.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202320569" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-20569</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-20569" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20569" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-20569" ref_url="https://www.suse.com/security/cve/CVE-2023-20569" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3302-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3311-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3318-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3324-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3329-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3349-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3361-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3389-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3391-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3395-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3421-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3446-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3447-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14770-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WU6USOH6Z5LBH65E37F7SXQ2ZCYMYO4C/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14775-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IDYBISXNIKR4JQNKOAZNM4IWBORGXDGT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14776-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VY6LKWXFA5DZKFFJWA52HJLZ3GJXUDB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14777-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K4CQIJEA5UAOBWUSUVTBHDHKQNBQURQG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14778-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/E3XCURBMJRRPRVU3EVKDNACDUEBSYOCK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14787-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FWMIURVH3RGSXYDDHGU2A5NU4OI3OLPB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14791-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7ILZHMVR4NNCE6NWCEPZ2BVWZXYSWRTS/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14796-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JRVYJFDMGL4ZFIAYJKJTQHRR5SPMPZJ2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14797-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RLB6EQ4PQFULA6326VPRQRWW66T32SST/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14800-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XIORKETHKWBJRRYF55G3J3DL3T7QGOEL/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14804-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EISBLM6MW64JFKX5G6QNSKXKI34QXKQ4/" source="SUSE-SU"/>
    <description>
    


A side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled address, potentially leading to information disclosure.




















    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20569/">CVE-2023-20569 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20569">CVE-2023-20569 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213287">SUSE bug 1213287</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830472" comment="iwl100-firmware-39.31.5.1-81.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830473" comment="iwl1000-firmware-39.31.5.1-81.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830474" comment="iwl105-firmware-18.168.6.1-81.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830475" comment="iwl135-firmware-18.168.6.1-81.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830476" comment="iwl2000-firmware-18.168.6.1-81.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830477" comment="iwl2030-firmware-18.168.6.1-81.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830478" comment="iwl3160-firmware-25.30.13.0-81.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830479" comment="iwl3945-firmware-15.32.2.9-81.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830480" comment="iwl4965-firmware-228.61.2.24-81.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830481" comment="iwl5000-firmware-8.83.5.1_1-81.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830482" comment="iwl5150-firmware-8.24.2.2-81.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830483" comment="iwl6000-firmware-9.221.4.1-81.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830484" comment="iwl6000g2a-firmware-18.168.6.1-81.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830485" comment="iwl6000g2b-firmware-18.168.6.1-81.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830486" comment="iwl6050-firmware-41.28.5.1-81.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830487" comment="iwl7260-firmware-25.30.13.0-81.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830488" comment="linux-firmware-20200421-81.git78c0348.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202320592" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-20592</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-20592" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20592" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-20592" ref_url="https://www.suse.com/security/cve/CVE-2023-20592" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4654-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017401.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4665-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2376-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035892.html" source="SUSE-SU"/>
    <description>
    Improper or unexpected behavior of the INVD instruction in some AMD CPUs may allow an attacker with a malicious hypervisor to affect cache line write-back behavior of the CPU leading to a potential loss of guest virtual machine (VM) memory integrity.













    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-11"/>
	<updated date="2025-12-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-20592/">CVE-2023-20592 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20592">CVE-2023-20592 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215823">SUSE bug 1215823</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009846124" comment="iwl100-firmware-39.31.5.1-82.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846125" comment="iwl1000-firmware-39.31.5.1-82.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846126" comment="iwl105-firmware-18.168.6.1-82.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846127" comment="iwl135-firmware-18.168.6.1-82.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846128" comment="iwl2000-firmware-18.168.6.1-82.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846129" comment="iwl2030-firmware-18.168.6.1-82.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846130" comment="iwl3160-firmware-25.30.13.0-82.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846131" comment="iwl3945-firmware-15.32.2.9-82.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846132" comment="iwl4965-firmware-228.61.2.24-82.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846133" comment="iwl5000-firmware-8.83.5.1_1-82.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846134" comment="iwl5150-firmware-8.24.2.2-82.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846135" comment="iwl6000-firmware-9.221.4.1-82.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846136" comment="iwl6000g2a-firmware-18.168.6.1-82.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846137" comment="iwl6000g2b-firmware-18.168.6.1-82.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846138" comment="iwl6050-firmware-41.28.5.1-82.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846139" comment="iwl7260-firmware-25.30.13.0-82.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846140" comment="linux-firmware-20200421-82.git78c0348.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202320593" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-20593</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-20593" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20593" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-20593" ref_url="https://www.suse.com/security/cve/CVE-2023-20593" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3020-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3022-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3180-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030786.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3182-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3206-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3302-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3318-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3324-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3349-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3391-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3395-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3421-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3446-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3447-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0884-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0885-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018178.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14770-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WU6USOH6Z5LBH65E37F7SXQ2ZCYMYO4C/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14775-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IDYBISXNIKR4JQNKOAZNM4IWBORGXDGT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14776-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VY6LKWXFA5DZKFFJWA52HJLZ3GJXUDB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14777-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K4CQIJEA5UAOBWUSUVTBHDHKQNBQURQG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14778-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/E3XCURBMJRRPRVU3EVKDNACDUEBSYOCK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14787-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FWMIURVH3RGSXYDDHGU2A5NU4OI3OLPB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14791-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7ILZHMVR4NNCE6NWCEPZ2BVWZXYSWRTS/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14796-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JRVYJFDMGL4ZFIAYJKJTQHRR5SPMPZJ2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14797-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RLB6EQ4PQFULA6326VPRQRWW66T32SST/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14800-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XIORKETHKWBJRRYF55G3J3DL3T7QGOEL/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14804-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EISBLM6MW64JFKX5G6QNSKXKI34QXKQ4/" source="SUSE-SU"/>
    <description>
    An issue in “Zen 2” CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20593/">CVE-2023-20593 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20593">CVE-2023-20593 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213286">SUSE bug 1213286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213616">SUSE bug 1213616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215674">SUSE bug 1215674</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830336" comment="bpftool-3.10.0-1160.99.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830472" comment="iwl100-firmware-39.31.5.1-81.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830473" comment="iwl1000-firmware-39.31.5.1-81.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830474" comment="iwl105-firmware-18.168.6.1-81.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830475" comment="iwl135-firmware-18.168.6.1-81.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830476" comment="iwl2000-firmware-18.168.6.1-81.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830477" comment="iwl2030-firmware-18.168.6.1-81.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830478" comment="iwl3160-firmware-25.30.13.0-81.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830479" comment="iwl3945-firmware-15.32.2.9-81.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830480" comment="iwl4965-firmware-228.61.2.24-81.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830481" comment="iwl5000-firmware-8.83.5.1_1-81.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830482" comment="iwl5150-firmware-8.24.2.2-81.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830483" comment="iwl6000-firmware-9.221.4.1-81.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830484" comment="iwl6000g2a-firmware-18.168.6.1-81.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830485" comment="iwl6000g2b-firmware-18.168.6.1-81.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830486" comment="iwl6050-firmware-41.28.5.1-81.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830487" comment="iwl7260-firmware-25.30.13.0-81.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830337" comment="kernel-3.10.0-1160.99.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830338" comment="kernel-abi-whitelists-3.10.0-1160.99.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830339" comment="kernel-debug-3.10.0-1160.99.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830342" comment="kernel-doc-3.10.0-1160.99.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830343" comment="kernel-headers-3.10.0-1160.99.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830344" comment="kernel-tools-3.10.0-1160.99.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830345" comment="kernel-tools-libs-3.10.0-1160.99.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830488" comment="linux-firmware-20200421-81.git78c0348.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830347" comment="perf-3.10.0-1160.99.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830348" comment="python-perf-3.10.0-1160.99.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202320867" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-20867</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-20867" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20867" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-20867" ref_url="https://www.suse.com/security/cve/CVE-2023-20867" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:2530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2604-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2604-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3504-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016067.html" source="SUSE-SU"/>
    <description>
    A fully compromised ESXi host can force VMware Tools to fail to authenticate host-to-guest operations, impacting the confidentiality and integrity of the guest virtual machine.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-05"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-20867/">CVE-2023-20867 at SUSE</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20867">CVE-2023-20867 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212143">SUSE bug 1212143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214402">SUSE bug 1214402</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830264" comment="open-vm-tools-11.0.5-3.el7_9.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830265" comment="open-vm-tools-desktop-11.0.5-3.el7_9.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830266" comment="open-vm-tools-devel-11.0.5-3.el7_9.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830267" comment="open-vm-tools-test-11.0.5-3.el7_9.6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202320900" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-20900</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-20900" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20900" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-20900" ref_url="https://www.suse.com/security/cve/CVE-2023-20900" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3504-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3795-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3835-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031730.html" source="SUSE-SU"/>
    <description>
    A malicious actor that has been granted  Guest Operation Privileges https://docs.vmware.com/en/VMware-vSphere/8.0/vsphere-security/GUID-6A952214-0E5E-4CCF-9D2A-90948FF643EC.html   in a target virtual machine may be able to elevate their privileges if that target virtual machine has been assigned a more privileged  Guest Alias https://vdc-download.vmware.com/vmwb-repository/dcr-public/d1902b0e-d479-46bf-8ac9-cee0e31e8ec0/07ce8dbd-db48-4261-9b8f-c6d3ad8ba472/vim.vm.guest.AliasManager.html .
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-12-19"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-20900/">CVE-2023-20900 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20900">CVE-2023-20900 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214566">SUSE bug 1214566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216432">SUSE bug 1216432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216433">SUSE bug 1216433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225628">SUSE bug 1225628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228309">SUSE bug 1228309</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830353" comment="open-vm-tools-11.0.5-3.el7_9.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830354" comment="open-vm-tools-desktop-11.0.5-3.el7_9.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830355" comment="open-vm-tools-devel-11.0.5-3.el7_9.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830356" comment="open-vm-tools-test-11.0.5-3.el7_9.7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202321830" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-21830</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-21830" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21830" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-21830" ref_url="https://www.suse.com/security/cve/CVE-2023-21830" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1850-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028817.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-21830/">CVE-2023-21830 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21830">CVE-2023-21830 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1207249">SUSE bug 1207249</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829977" comment="java-1.8.0-openjdk-1.8.0.362.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829978" comment="java-1.8.0-openjdk-accessibility-1.8.0.362.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829979" comment="java-1.8.0-openjdk-demo-1.8.0.362.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829980" comment="java-1.8.0-openjdk-devel-1.8.0.362.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829981" comment="java-1.8.0-openjdk-headless-1.8.0.362.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829982" comment="java-1.8.0-openjdk-javadoc-1.8.0.362.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829983" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.362.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829984" comment="java-1.8.0-openjdk-src-1.8.0.362.b08-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202321835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-21835</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-21835" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21835" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-21835" ref_url="https://www.suse.com/security/cve/CVE-2023-21835" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013818.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0752-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1850-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028817.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GS63GCBRVH7N4JEIZNQAPVFNNVB2OGSU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0067-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XA5CCGSPUXUTQHDG25O5DM4G37BLRUMN/" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-21835/">CVE-2023-21835 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21835">CVE-2023-21835 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1207246">SUSE bug 1207246</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829968" comment="java-11-openjdk-11.0.18.0.10-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829969" comment="java-11-openjdk-demo-11.0.18.0.10-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829970" comment="java-11-openjdk-devel-11.0.18.0.10-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829971" comment="java-11-openjdk-headless-11.0.18.0.10-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829972" comment="java-11-openjdk-javadoc-11.0.18.0.10-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829973" comment="java-11-openjdk-javadoc-zip-11.0.18.0.10-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829974" comment="java-11-openjdk-jmods-11.0.18.0.10-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829975" comment="java-11-openjdk-src-11.0.18.0.10-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829976" comment="java-11-openjdk-static-libs-11.0.18.0.10-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202321843" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-21843</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-21843" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21843" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-21843" ref_url="https://www.suse.com/security/cve/CVE-2023-21843" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013818.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0752-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1850-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028817.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GS63GCBRVH7N4JEIZNQAPVFNNVB2OGSU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0067-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XA5CCGSPUXUTQHDG25O5DM4G37BLRUMN/" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-08"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-21843/">CVE-2023-21843 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21843">CVE-2023-21843 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1207248">SUSE bug 1207248</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829977" comment="java-1.8.0-openjdk-1.8.0.362.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829978" comment="java-1.8.0-openjdk-accessibility-1.8.0.362.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829979" comment="java-1.8.0-openjdk-demo-1.8.0.362.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829980" comment="java-1.8.0-openjdk-devel-1.8.0.362.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829981" comment="java-1.8.0-openjdk-headless-1.8.0.362.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829982" comment="java-1.8.0-openjdk-javadoc-1.8.0.362.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829983" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.362.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829984" comment="java-1.8.0-openjdk-src-1.8.0.362.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829968" comment="java-11-openjdk-11.0.18.0.10-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829969" comment="java-11-openjdk-demo-11.0.18.0.10-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829970" comment="java-11-openjdk-devel-11.0.18.0.10-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829971" comment="java-11-openjdk-headless-11.0.18.0.10-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829972" comment="java-11-openjdk-javadoc-11.0.18.0.10-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829973" comment="java-11-openjdk-javadoc-zip-11.0.18.0.10-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829974" comment="java-11-openjdk-jmods-11.0.18.0.10-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829975" comment="java-11-openjdk-src-11.0.18.0.10-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829976" comment="java-11-openjdk-static-libs-11.0.18.0.10-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202321930" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-21930</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-21930" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-21930" ref_url="https://www.suse.com/security/cve/CVE-2023-21930" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014839.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1596-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2238-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2242-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2242-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3305-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GS63GCBRVH7N4JEIZNQAPVFNNVB2OGSU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0067-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XA5CCGSPUXUTQHDG25O5DM4G37BLRUMN/" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-08"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-21930/">CVE-2023-21930 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21930">CVE-2023-21930 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210628">SUSE bug 1210628</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830186" comment="java-1.8.0-openjdk-1.8.0.372.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830187" comment="java-1.8.0-openjdk-accessibility-1.8.0.372.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830188" comment="java-1.8.0-openjdk-demo-1.8.0.372.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830189" comment="java-1.8.0-openjdk-devel-1.8.0.372.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830190" comment="java-1.8.0-openjdk-headless-1.8.0.372.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830191" comment="java-1.8.0-openjdk-javadoc-1.8.0.372.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830192" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.372.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830193" comment="java-1.8.0-openjdk-src-1.8.0.372.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830177" comment="java-11-openjdk-11.0.19.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830178" comment="java-11-openjdk-demo-11.0.19.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830179" comment="java-11-openjdk-devel-11.0.19.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830180" comment="java-11-openjdk-headless-11.0.19.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830181" comment="java-11-openjdk-javadoc-11.0.19.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830182" comment="java-11-openjdk-javadoc-zip-11.0.19.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830183" comment="java-11-openjdk-jmods-11.0.19.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830184" comment="java-11-openjdk-src-11.0.19.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830185" comment="java-11-openjdk-static-libs-11.0.19.0.7-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202321937" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-21937</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-21937" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21937" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-21937" ref_url="https://www.suse.com/security/cve/CVE-2023-21937" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014839.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1596-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2238-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2242-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2242-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3305-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GS63GCBRVH7N4JEIZNQAPVFNNVB2OGSU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0067-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XA5CCGSPUXUTQHDG25O5DM4G37BLRUMN/" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-08"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-21937/">CVE-2023-21937 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21937">CVE-2023-21937 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210631">SUSE bug 1210631</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830186" comment="java-1.8.0-openjdk-1.8.0.372.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830187" comment="java-1.8.0-openjdk-accessibility-1.8.0.372.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830188" comment="java-1.8.0-openjdk-demo-1.8.0.372.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830189" comment="java-1.8.0-openjdk-devel-1.8.0.372.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830190" comment="java-1.8.0-openjdk-headless-1.8.0.372.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830191" comment="java-1.8.0-openjdk-javadoc-1.8.0.372.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830192" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.372.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830193" comment="java-1.8.0-openjdk-src-1.8.0.372.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830177" comment="java-11-openjdk-11.0.19.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830178" comment="java-11-openjdk-demo-11.0.19.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830179" comment="java-11-openjdk-devel-11.0.19.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830180" comment="java-11-openjdk-headless-11.0.19.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830181" comment="java-11-openjdk-javadoc-11.0.19.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830182" comment="java-11-openjdk-javadoc-zip-11.0.19.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830183" comment="java-11-openjdk-jmods-11.0.19.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830184" comment="java-11-openjdk-src-11.0.19.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830185" comment="java-11-openjdk-static-libs-11.0.19.0.7-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202321938" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-21938</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-21938" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21938" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-21938" ref_url="https://www.suse.com/security/cve/CVE-2023-21938" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014839.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1596-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2238-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2242-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2242-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3305-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GS63GCBRVH7N4JEIZNQAPVFNNVB2OGSU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0067-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XA5CCGSPUXUTQHDG25O5DM4G37BLRUMN/" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-08"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-21938/">CVE-2023-21938 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21938">CVE-2023-21938 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210632">SUSE bug 1210632</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830186" comment="java-1.8.0-openjdk-1.8.0.372.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830187" comment="java-1.8.0-openjdk-accessibility-1.8.0.372.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830188" comment="java-1.8.0-openjdk-demo-1.8.0.372.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830189" comment="java-1.8.0-openjdk-devel-1.8.0.372.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830190" comment="java-1.8.0-openjdk-headless-1.8.0.372.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830191" comment="java-1.8.0-openjdk-javadoc-1.8.0.372.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830192" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.372.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830193" comment="java-1.8.0-openjdk-src-1.8.0.372.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830177" comment="java-11-openjdk-11.0.19.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830178" comment="java-11-openjdk-demo-11.0.19.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830179" comment="java-11-openjdk-devel-11.0.19.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830180" comment="java-11-openjdk-headless-11.0.19.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830181" comment="java-11-openjdk-javadoc-11.0.19.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830182" comment="java-11-openjdk-javadoc-zip-11.0.19.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830183" comment="java-11-openjdk-jmods-11.0.19.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830184" comment="java-11-openjdk-src-11.0.19.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830185" comment="java-11-openjdk-static-libs-11.0.19.0.7-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202321939" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-21939</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-21939" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-21939" ref_url="https://www.suse.com/security/cve/CVE-2023-21939" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014839.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1596-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2238-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2242-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2242-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3305-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GS63GCBRVH7N4JEIZNQAPVFNNVB2OGSU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0067-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XA5CCGSPUXUTQHDG25O5DM4G37BLRUMN/" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-21939/">CVE-2023-21939 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21939">CVE-2023-21939 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210634">SUSE bug 1210634</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830186" comment="java-1.8.0-openjdk-1.8.0.372.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830187" comment="java-1.8.0-openjdk-accessibility-1.8.0.372.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830188" comment="java-1.8.0-openjdk-demo-1.8.0.372.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830189" comment="java-1.8.0-openjdk-devel-1.8.0.372.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830190" comment="java-1.8.0-openjdk-headless-1.8.0.372.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830191" comment="java-1.8.0-openjdk-javadoc-1.8.0.372.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830192" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.372.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830193" comment="java-1.8.0-openjdk-src-1.8.0.372.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830177" comment="java-11-openjdk-11.0.19.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830178" comment="java-11-openjdk-demo-11.0.19.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830179" comment="java-11-openjdk-devel-11.0.19.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830180" comment="java-11-openjdk-headless-11.0.19.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830181" comment="java-11-openjdk-javadoc-11.0.19.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830182" comment="java-11-openjdk-javadoc-zip-11.0.19.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830183" comment="java-11-openjdk-jmods-11.0.19.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830184" comment="java-11-openjdk-src-11.0.19.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830185" comment="java-11-openjdk-static-libs-11.0.19.0.7-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202321954" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-21954</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-21954" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-21954" ref_url="https://www.suse.com/security/cve/CVE-2023-21954" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014839.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1596-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2238-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2242-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2242-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3305-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GS63GCBRVH7N4JEIZNQAPVFNNVB2OGSU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0067-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XA5CCGSPUXUTQHDG25O5DM4G37BLRUMN/" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-21954/">CVE-2023-21954 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21954">CVE-2023-21954 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210635">SUSE bug 1210635</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830186" comment="java-1.8.0-openjdk-1.8.0.372.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830187" comment="java-1.8.0-openjdk-accessibility-1.8.0.372.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830188" comment="java-1.8.0-openjdk-demo-1.8.0.372.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830189" comment="java-1.8.0-openjdk-devel-1.8.0.372.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830190" comment="java-1.8.0-openjdk-headless-1.8.0.372.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830191" comment="java-1.8.0-openjdk-javadoc-1.8.0.372.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830192" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.372.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830193" comment="java-1.8.0-openjdk-src-1.8.0.372.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830177" comment="java-11-openjdk-11.0.19.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830178" comment="java-11-openjdk-demo-11.0.19.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830179" comment="java-11-openjdk-devel-11.0.19.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830180" comment="java-11-openjdk-headless-11.0.19.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830181" comment="java-11-openjdk-javadoc-11.0.19.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830182" comment="java-11-openjdk-javadoc-zip-11.0.19.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830183" comment="java-11-openjdk-jmods-11.0.19.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830184" comment="java-11-openjdk-src-11.0.19.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830185" comment="java-11-openjdk-static-libs-11.0.19.0.7-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202321967" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-21967</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-21967" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-21967" ref_url="https://www.suse.com/security/cve/CVE-2023-21967" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014839.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1596-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2238-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2242-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2242-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3305-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GS63GCBRVH7N4JEIZNQAPVFNNVB2OGSU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0067-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XA5CCGSPUXUTQHDG25O5DM4G37BLRUMN/" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-21967/">CVE-2023-21967 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21967">CVE-2023-21967 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210636">SUSE bug 1210636</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830186" comment="java-1.8.0-openjdk-1.8.0.372.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830187" comment="java-1.8.0-openjdk-accessibility-1.8.0.372.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830188" comment="java-1.8.0-openjdk-demo-1.8.0.372.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830189" comment="java-1.8.0-openjdk-devel-1.8.0.372.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830190" comment="java-1.8.0-openjdk-headless-1.8.0.372.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830191" comment="java-1.8.0-openjdk-javadoc-1.8.0.372.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830192" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.372.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830193" comment="java-1.8.0-openjdk-src-1.8.0.372.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830177" comment="java-11-openjdk-11.0.19.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830178" comment="java-11-openjdk-demo-11.0.19.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830179" comment="java-11-openjdk-devel-11.0.19.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830180" comment="java-11-openjdk-headless-11.0.19.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830181" comment="java-11-openjdk-javadoc-11.0.19.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830182" comment="java-11-openjdk-javadoc-zip-11.0.19.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830183" comment="java-11-openjdk-jmods-11.0.19.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830184" comment="java-11-openjdk-src-11.0.19.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830185" comment="java-11-openjdk-static-libs-11.0.19.0.7-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202321968" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-21968</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-21968" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21968" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-21968" ref_url="https://www.suse.com/security/cve/CVE-2023-21968" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014839.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1596-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2238-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2242-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2242-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3305-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GS63GCBRVH7N4JEIZNQAPVFNNVB2OGSU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0067-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XA5CCGSPUXUTQHDG25O5DM4G37BLRUMN/" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-08"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-21968/">CVE-2023-21968 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21968">CVE-2023-21968 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210637">SUSE bug 1210637</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830186" comment="java-1.8.0-openjdk-1.8.0.372.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830187" comment="java-1.8.0-openjdk-accessibility-1.8.0.372.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830188" comment="java-1.8.0-openjdk-demo-1.8.0.372.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830189" comment="java-1.8.0-openjdk-devel-1.8.0.372.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830190" comment="java-1.8.0-openjdk-headless-1.8.0.372.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830191" comment="java-1.8.0-openjdk-javadoc-1.8.0.372.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830192" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.372.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830193" comment="java-1.8.0-openjdk-src-1.8.0.372.b07-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830177" comment="java-11-openjdk-11.0.19.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830178" comment="java-11-openjdk-demo-11.0.19.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830179" comment="java-11-openjdk-devel-11.0.19.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830180" comment="java-11-openjdk-headless-11.0.19.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830181" comment="java-11-openjdk-javadoc-11.0.19.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830182" comment="java-11-openjdk-javadoc-zip-11.0.19.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830183" comment="java-11-openjdk-jmods-11.0.19.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830184" comment="java-11-openjdk-src-11.0.19.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830185" comment="java-11-openjdk-static-libs-11.0.19.0.7-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202322006" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-22006</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-22006" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22006" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-22006" ref_url="https://www.suse.com/security/cve/CVE-2023-22006" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015891.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3406-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GS63GCBRVH7N4JEIZNQAPVFNNVB2OGSU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0067-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XA5CCGSPUXUTQHDG25O5DM4G37BLRUMN/" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-08"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-22006/">CVE-2023-22006 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22006">CVE-2023-22006 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213473">SUSE bug 1213473</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830307" comment="java-11-openjdk-11.0.20.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830308" comment="java-11-openjdk-demo-11.0.20.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830309" comment="java-11-openjdk-devel-11.0.20.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830310" comment="java-11-openjdk-headless-11.0.20.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830311" comment="java-11-openjdk-javadoc-11.0.20.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830312" comment="java-11-openjdk-javadoc-zip-11.0.20.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830313" comment="java-11-openjdk-jmods-11.0.20.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830314" comment="java-11-openjdk-src-11.0.20.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830315" comment="java-11-openjdk-static-libs-11.0.20.0.8-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202322036" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-22036</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-22036" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22036" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-22036" ref_url="https://www.suse.com/security/cve/CVE-2023-22036" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015891.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3406-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GS63GCBRVH7N4JEIZNQAPVFNNVB2OGSU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0067-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XA5CCGSPUXUTQHDG25O5DM4G37BLRUMN/" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-08"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-22036/">CVE-2023-22036 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22036">CVE-2023-22036 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213474">SUSE bug 1213474</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830307" comment="java-11-openjdk-11.0.20.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830308" comment="java-11-openjdk-demo-11.0.20.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830309" comment="java-11-openjdk-devel-11.0.20.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830310" comment="java-11-openjdk-headless-11.0.20.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830311" comment="java-11-openjdk-javadoc-11.0.20.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830312" comment="java-11-openjdk-javadoc-zip-11.0.20.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830313" comment="java-11-openjdk-jmods-11.0.20.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830314" comment="java-11-openjdk-src-11.0.20.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830315" comment="java-11-openjdk-static-libs-11.0.20.0.8-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202322041" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-22041</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-22041" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22041" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-22041" ref_url="https://www.suse.com/security/cve/CVE-2023-22041" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015891.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3406-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GS63GCBRVH7N4JEIZNQAPVFNNVB2OGSU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0067-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XA5CCGSPUXUTQHDG25O5DM4G37BLRUMN/" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-22041/">CVE-2023-22041 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22041">CVE-2023-22041 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213475">SUSE bug 1213475</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830307" comment="java-11-openjdk-11.0.20.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830308" comment="java-11-openjdk-demo-11.0.20.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830309" comment="java-11-openjdk-devel-11.0.20.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830310" comment="java-11-openjdk-headless-11.0.20.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830311" comment="java-11-openjdk-javadoc-11.0.20.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830312" comment="java-11-openjdk-javadoc-zip-11.0.20.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830313" comment="java-11-openjdk-jmods-11.0.20.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830314" comment="java-11-openjdk-src-11.0.20.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830315" comment="java-11-openjdk-static-libs-11.0.20.0.8-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202322045" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-22045</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-22045" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22045" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-22045" ref_url="https://www.suse.com/security/cve/CVE-2023-22045" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015891.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3406-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3442-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3443-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031211.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GS63GCBRVH7N4JEIZNQAPVFNNVB2OGSU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0067-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XA5CCGSPUXUTQHDG25O5DM4G37BLRUMN/" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-08"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-22045/">CVE-2023-22045 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22045">CVE-2023-22045 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213481">SUSE bug 1213481</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830299" comment="java-1.8.0-openjdk-1.8.0.382.b05-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830300" comment="java-1.8.0-openjdk-accessibility-1.8.0.382.b05-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830301" comment="java-1.8.0-openjdk-demo-1.8.0.382.b05-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830302" comment="java-1.8.0-openjdk-devel-1.8.0.382.b05-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830303" comment="java-1.8.0-openjdk-headless-1.8.0.382.b05-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830304" comment="java-1.8.0-openjdk-javadoc-1.8.0.382.b05-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830305" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.382.b05-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830306" comment="java-1.8.0-openjdk-src-1.8.0.382.b05-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830307" comment="java-11-openjdk-11.0.20.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830308" comment="java-11-openjdk-demo-11.0.20.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830309" comment="java-11-openjdk-devel-11.0.20.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830310" comment="java-11-openjdk-headless-11.0.20.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830311" comment="java-11-openjdk-javadoc-11.0.20.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830312" comment="java-11-openjdk-javadoc-zip-11.0.20.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830313" comment="java-11-openjdk-jmods-11.0.20.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830314" comment="java-11-openjdk-src-11.0.20.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830315" comment="java-11-openjdk-static-libs-11.0.20.0.8-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202322049" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-22049</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-22049" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22049" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-22049" ref_url="https://www.suse.com/security/cve/CVE-2023-22049" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015891.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3406-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3442-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3443-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031211.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GS63GCBRVH7N4JEIZNQAPVFNNVB2OGSU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0067-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XA5CCGSPUXUTQHDG25O5DM4G37BLRUMN/" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-08"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-22049/">CVE-2023-22049 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22049">CVE-2023-22049 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213482">SUSE bug 1213482</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830299" comment="java-1.8.0-openjdk-1.8.0.382.b05-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830300" comment="java-1.8.0-openjdk-accessibility-1.8.0.382.b05-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830301" comment="java-1.8.0-openjdk-demo-1.8.0.382.b05-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830302" comment="java-1.8.0-openjdk-devel-1.8.0.382.b05-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830303" comment="java-1.8.0-openjdk-headless-1.8.0.382.b05-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830304" comment="java-1.8.0-openjdk-javadoc-1.8.0.382.b05-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830305" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.382.b05-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830306" comment="java-1.8.0-openjdk-src-1.8.0.382.b05-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830307" comment="java-11-openjdk-11.0.20.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830308" comment="java-11-openjdk-demo-11.0.20.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830309" comment="java-11-openjdk-devel-11.0.20.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830310" comment="java-11-openjdk-headless-11.0.20.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830311" comment="java-11-openjdk-javadoc-11.0.20.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830312" comment="java-11-openjdk-javadoc-zip-11.0.20.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830313" comment="java-11-openjdk-jmods-11.0.20.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830314" comment="java-11-openjdk-src-11.0.20.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830315" comment="java-11-openjdk-static-libs-11.0.20.0.8-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202322067" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-22067</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-22067" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22067" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-22067" ref_url="https://www.suse.com/security/cve/CVE-2023-22067" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4572-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017258.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-22067/">CVE-2023-22067 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22067">CVE-2023-22067 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216379">SUSE bug 1216379</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830408" comment="java-1.8.0-openjdk-1.8.0.392.b08-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830409" comment="java-1.8.0-openjdk-accessibility-1.8.0.392.b08-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830410" comment="java-1.8.0-openjdk-demo-1.8.0.392.b08-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830411" comment="java-1.8.0-openjdk-devel-1.8.0.392.b08-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830412" comment="java-1.8.0-openjdk-headless-1.8.0.392.b08-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830413" comment="java-1.8.0-openjdk-javadoc-1.8.0.392.b08-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830414" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.392.b08-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830415" comment="java-1.8.0-openjdk-src-1.8.0.392.b08-2.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202322081" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-22081</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-22081" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22081" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-22081" ref_url="https://www.suse.com/security/cve/CVE-2023-22081" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3568-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3666-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4572-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017258.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GS63GCBRVH7N4JEIZNQAPVFNNVB2OGSU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0067-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XA5CCGSPUXUTQHDG25O5DM4G37BLRUMN/" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-22081/">CVE-2023-22081 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22081">CVE-2023-22081 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216374">SUSE bug 1216374</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830408" comment="java-1.8.0-openjdk-1.8.0.392.b08-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830409" comment="java-1.8.0-openjdk-accessibility-1.8.0.392.b08-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830410" comment="java-1.8.0-openjdk-demo-1.8.0.392.b08-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830411" comment="java-1.8.0-openjdk-devel-1.8.0.392.b08-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830412" comment="java-1.8.0-openjdk-headless-1.8.0.392.b08-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830413" comment="java-1.8.0-openjdk-javadoc-1.8.0.392.b08-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830414" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.392.b08-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830415" comment="java-1.8.0-openjdk-src-1.8.0.392.b08-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830399" comment="java-11-openjdk-11.0.21.0.9-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830400" comment="java-11-openjdk-demo-11.0.21.0.9-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830401" comment="java-11-openjdk-devel-11.0.21.0.9-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830402" comment="java-11-openjdk-headless-11.0.21.0.9-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830403" comment="java-11-openjdk-javadoc-11.0.21.0.9-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830404" comment="java-11-openjdk-javadoc-zip-11.0.21.0.9-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830405" comment="java-11-openjdk-jmods-11.0.21.0.9-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830406" comment="java-11-openjdk-src-11.0.21.0.9-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830407" comment="java-11-openjdk-static-libs-11.0.21.0.9-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202322809" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-22809</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-22809" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22809" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-22809" ref_url="https://www.suse.com/security/cve/CVE-2023-22809" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013506.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013507.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013508.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013513.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013484.html" source="SUSE-SU"/>
    <description>
    In Sudo before 1.9.12p2, the sudoedit (aka -e) feature mishandles extra arguments passed in the user-provided environment variables (SUDO_EDITOR, VISUAL, and EDITOR), allowing a local attacker to append arbitrary entries to the list of files to process. This can lead to privilege escalation. Affected versions are 1.8.0 through 1.9.12.p1. The problem exists because a user-specified editor may contain a "--" argument that defeats a protection mechanism, e.g., an EDITOR='vim -- /path/to/extra/file' value.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-22809/">CVE-2023-22809 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22809">CVE-2023-22809 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1207082">SUSE bug 1207082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208053">SUSE bug 1208053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209326">SUSE bug 1209326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214446">SUSE bug 1214446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225623">SUSE bug 1225623</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829985" comment="sudo-1.8.23-10.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009829986" comment="sudo-devel-1.8.23-10.el7_9.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202323598" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-23598</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-23598" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23598" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-23598" ref_url="https://www.suse.com/security/cve/CVE-2023-23598" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:0111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0329-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013713.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Due to the Firefox GTK wrapper code's use of text/plain for drag data and GTK treating all text/plain MIMEs containing file URLs as being dragged a website could arbitrarily read a file via a call to `DataTransfer.setData`. This vulnerability affects Firefox &lt; 109, Firefox ESR &lt; 102.7, and Thunderbird &lt; 102.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-12-19"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-23598/">CVE-2023-23598 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23598">CVE-2023-23598 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1207119">SUSE bug 1207119</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829987" comment="firefox-102.7.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830053" comment="thunderbird-102.7.1-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202323599" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-23599</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-23599" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23599" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-23599" ref_url="https://www.suse.com/security/cve/CVE-2023-23599" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:0329-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013713.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    When copying a network request from the developer tools panel as a curl command the output was not being properly sanitized and could allow arbitrary commands to be hidden within. This vulnerability affects Firefox &lt; 109, Firefox ESR &lt; 102.7, and Thunderbird &lt; 102.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-12-19"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-23599/">CVE-2023-23599 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23599">CVE-2023-23599 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1207119">SUSE bug 1207119</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829987" comment="firefox-102.7.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830053" comment="thunderbird-102.7.1-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202323601" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-23601</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-23601" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23601" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-23601" ref_url="https://www.suse.com/security/cve/CVE-2023-23601" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:0111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0329-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013713.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Navigations were being allowed when dragging a URL from a cross-origin iframe into the same tab which could lead to website spoofing attacks This vulnerability affects Firefox &lt; 109, Firefox ESR &lt; 102.7, and Thunderbird &lt; 102.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-12-19"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-23601/">CVE-2023-23601 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23601">CVE-2023-23601 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1207119">SUSE bug 1207119</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829987" comment="firefox-102.7.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830053" comment="thunderbird-102.7.1-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202323602" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-23602</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-23602" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23602" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-23602" ref_url="https://www.suse.com/security/cve/CVE-2023-23602" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:0111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0329-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013713.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A mishandled security check when creating a WebSocket in a WebWorker caused the Content Security Policy connect-src header to be ignored. This could lead to connections to restricted origins from inside WebWorkers. This vulnerability affects Firefox &lt; 109, Firefox ESR &lt; 102.7, and Thunderbird &lt; 102.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-12-19"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-23602/">CVE-2023-23602 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23602">CVE-2023-23602 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1207119">SUSE bug 1207119</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829987" comment="firefox-102.7.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830053" comment="thunderbird-102.7.1-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202323603" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-23603</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-23603" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23603" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-23603" ref_url="https://www.suse.com/security/cve/CVE-2023-23603" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:0111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0329-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013713.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Regular expressions used to filter out forbidden properties and values from style directives in calls to `console.log` weren't accounting for external URLs. Data could then be potentially exfiltrated from the browser. This vulnerability affects Firefox &lt; 109, Firefox ESR &lt; 102.7, and Thunderbird &lt; 102.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-12-19"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-23603/">CVE-2023-23603 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23603">CVE-2023-23603 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1207119">SUSE bug 1207119</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829987" comment="firefox-102.7.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830053" comment="thunderbird-102.7.1-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202323605" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-23605</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-23605" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23605" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-23605" ref_url="https://www.suse.com/security/cve/CVE-2023-23605" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:0111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0329-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013713.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Mozilla developers and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 108 and Firefox ESR 102.6. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 109, Firefox ESR &lt; 102.7, and Thunderbird &lt; 102.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-12-19"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-23605/">CVE-2023-23605 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23605">CVE-2023-23605 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1207119">SUSE bug 1207119</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009829987" comment="firefox-102.7.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830053" comment="thunderbird-102.7.1-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202324329" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-24329</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-24329" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24329" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-24329" ref_url="https://www.suse.com/security/cve/CVE-2023-24329" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2400-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015596.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014192.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0707-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0868-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0868-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/029039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2639-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2884-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2937-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2957-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015621.html" source="SUSE-SU"/>
    <description>
    An issue in the urllib.parse component of Python before 3.11.4 allows attackers to bypass blocklisting methods by supplying a URL that starts with blank characters.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-24329/">CVE-2023-24329 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24329">CVE-2023-24329 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208471">SUSE bug 1208471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213553">SUSE bug 1213553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213554">SUSE bug 1213554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213839">SUSE bug 1213839</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225672">SUSE bug 1225672</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830246" comment="python-2.7.5-93.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830247" comment="python-debug-2.7.5-93.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830248" comment="python-devel-2.7.5-93.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830249" comment="python-libs-2.7.5-93.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830250" comment="python-test-2.7.5-93.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830251" comment="python-tools-2.7.5-93.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830253" comment="python3-3.6.8-19.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830254" comment="python3-debug-3.6.8-19.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830255" comment="python3-devel-3.6.8-19.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830256" comment="python3-idle-3.6.8-19.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830257" comment="python3-libs-3.6.8-19.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830258" comment="python3-test-3.6.8-19.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830259" comment="python3-tkinter-3.6.8-19.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830252" comment="tkinter-2.7.5-93.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202325193" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-25193</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-25193" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25193" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-25193" ref_url="https://www.suse.com/security/cve/CVE-2023-25193" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015891.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1852-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3406-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GS63GCBRVH7N4JEIZNQAPVFNNVB2OGSU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0067-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XA5CCGSPUXUTQHDG25O5DM4G37BLRUMN/" source="SUSE-SU"/>
    <description>
    hb-ot-layout-gsubgpos.hh in HarfBuzz through 6.0.0 allows attackers to trigger O(n^2) growth via consecutive marks during the process of looking back for base glyphs when attaching marks.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-21"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-25193/">CVE-2023-25193 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25193">CVE-2023-25193 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1207922">SUSE bug 1207922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213939">SUSE bug 1213939</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830307" comment="java-11-openjdk-11.0.20.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830308" comment="java-11-openjdk-demo-11.0.20.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830309" comment="java-11-openjdk-devel-11.0.20.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830310" comment="java-11-openjdk-headless-11.0.20.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830311" comment="java-11-openjdk-javadoc-11.0.20.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830312" comment="java-11-openjdk-javadoc-zip-11.0.20.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830313" comment="java-11-openjdk-jmods-11.0.20.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830314" comment="java-11-openjdk-src-11.0.20.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830315" comment="java-11-openjdk-static-libs-11.0.20.0.8-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202325652" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-25652</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-25652" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25652" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-25652" ref_url="https://www.suse.com/security/cve/CVE-2023-25652" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014601.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014607.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2038-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/029003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2038-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014775.html" source="SUSE-SU"/>
    <description>
    Git is a revision control system. Prior to versions 2.30.9, 2.31.8, 2.32.7, 2.33.8, 2.34.8, 2.35.8, 2.36.6, 2.37.7, 2.38.5, 2.39.3, and 2.40.1, by feeding specially crafted input to `git apply --reject`, a path outside the working tree can be overwritten with partially controlled contents (corresponding to the rejected hunk(s) from the given patch). A fix is available in versions 2.30.9, 2.31.8, 2.32.7, 2.33.8, 2.34.8, 2.35.8, 2.36.6, 2.37.7, 2.38.5, 2.39.3, and 2.40.1. As a workaround, avoid using `git apply` with `--reject` when applying patches from an untrusted source. Use `git apply --stat` to inspect a patch before applying; avoid applying one that create a conflict where a link corresponding to the `*.rej` file exists.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-25652/">CVE-2023-25652 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25652">CVE-2023-25652 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210686">SUSE bug 1210686</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830222" comment="emacs-git-1.8.3.1-25.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830223" comment="emacs-git-el-1.8.3.1-25.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830224" comment="git-1.8.3.1-25.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830225" comment="git-all-1.8.3.1-25.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830226" comment="git-bzr-1.8.3.1-25.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830227" comment="git-cvs-1.8.3.1-25.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830228" comment="git-daemon-1.8.3.1-25.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830229" comment="git-email-1.8.3.1-25.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830230" comment="git-gnome-keyring-1.8.3.1-25.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830231" comment="git-gui-1.8.3.1-25.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830232" comment="git-hg-1.8.3.1-25.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830233" comment="git-instaweb-1.8.3.1-25.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830234" comment="git-p4-1.8.3.1-25.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830235" comment="git-svn-1.8.3.1-25.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830236" comment="gitk-1.8.3.1-25.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830237" comment="gitweb-1.8.3.1-25.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830238" comment="perl-Git-1.8.3.1-25.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830239" comment="perl-Git-SVN-1.8.3.1-25.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202325690" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-25690</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-25690" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25690" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-25690" ref_url="https://www.suse.com/security/cve/CVE-2023-25690" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014223.html" source="SUSE-SU"/>
    <description>
    Some mod_proxy configurations on Apache HTTP Server versions 2.4.0 through 2.4.55 allow a HTTP Request Smuggling attack.




Configurations are affected when mod_proxy is enabled along with some form of RewriteRule
 or ProxyPassMatch in which a non-specific pattern matches
 some portion of the user-supplied request-target (URL) data and is then
 re-inserted into the proxied request-target using variable 
substitution. For example, something like:




RewriteEngine on
RewriteRule "^/here/(.*)" "http://example.com:8080/elsewhere?$1"; [P]
ProxyPassReverse /here/ http://example.com:8080/


Request splitting/smuggling could result in bypass of access controls in the proxy server, proxying unintended URLs to existing origin servers, and cache poisoning. Users are recommended to update to at least version 2.4.56 of Apache HTTP Server.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-08"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-25690/">CVE-2023-25690 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25690">CVE-2023-25690 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1209047">SUSE bug 1209047</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212409">SUSE bug 1212409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212865">SUSE bug 1212865</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830151" comment="httpd-2.4.6-98.el7_9.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830152" comment="httpd-devel-2.4.6-98.el7_9.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830153" comment="httpd-manual-2.4.6-98.el7_9.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830154" comment="httpd-tools-2.4.6-98.el7_9.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830155" comment="mod_ldap-2.4.6-98.el7_9.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830156" comment="mod_proxy_html-2.4.6-98.el7_9.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830157" comment="mod_session-2.4.6-98.el7_9.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830158" comment="mod_ssl-2.4.6-98.el7_9.7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202325728" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-25728</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-25728" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25728" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-25728" ref_url="https://www.suse.com/security/cve/CVE-2023-25728" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:0461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013965.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    The &lt;code&gt;Content-Security-Policy-Report-Only&lt;/code&gt; header could allow an attacker to leak a child iframe's unredacted URI when interaction with that iframe triggers a redirect. This vulnerability affects Firefox &lt; 110, Thunderbird &lt; 102.8, and Firefox ESR &lt; 102.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25728/">CVE-2023-25728 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25728">CVE-2023-25728 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208144">SUSE bug 1208144</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830073" comment="firefox-102.8.0-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830074" comment="thunderbird-102.8.0-2.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202325729" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-25729</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-25729" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25729" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-25729" ref_url="https://www.suse.com/security/cve/CVE-2023-25729" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:0461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013965.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Permission prompts for opening external schemes were only shown for &lt;code&gt;ContentPrincipals&lt;/code&gt; resulting in extensions being able to open them without user interaction via &lt;code&gt;ExpandedPrincipals&lt;/code&gt;. This could lead to further malicious actions such as downloading files or interacting with software already installed on the system. This vulnerability affects Firefox &lt; 110, Thunderbird &lt; 102.8, and Firefox ESR &lt; 102.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25729/">CVE-2023-25729 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25729">CVE-2023-25729 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208144">SUSE bug 1208144</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830073" comment="firefox-102.8.0-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830074" comment="thunderbird-102.8.0-2.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202325730" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-25730</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-25730" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25730" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-25730" ref_url="https://www.suse.com/security/cve/CVE-2023-25730" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:0461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013965.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A background script invoking &lt;code&gt;requestFullscreen&lt;/code&gt; and then blocking the main thread could force the browser into fullscreen mode indefinitely, resulting in potential user confusion or spoofing attacks. This vulnerability affects Firefox &lt; 110, Thunderbird &lt; 102.8, and Firefox ESR &lt; 102.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25730/">CVE-2023-25730 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25730">CVE-2023-25730 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208144">SUSE bug 1208144</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830073" comment="firefox-102.8.0-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830074" comment="thunderbird-102.8.0-2.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202325732" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-25732</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-25732" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25732" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-25732" ref_url="https://www.suse.com/security/cve/CVE-2023-25732" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:0461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013965.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    When encoding data from an &lt;code&gt;inputStream&lt;/code&gt; in &lt;code&gt;xpcom&lt;/code&gt; the size of the input being encoded was not correctly calculated potentially leading to an out of bounds memory write. This vulnerability affects Firefox &lt; 110, Thunderbird &lt; 102.8, and Firefox ESR &lt; 102.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25732/">CVE-2023-25732 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25732">CVE-2023-25732 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208144">SUSE bug 1208144</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830073" comment="firefox-102.8.0-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830074" comment="thunderbird-102.8.0-2.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202325735" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-25735</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-25735" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25735" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-25735" ref_url="https://www.suse.com/security/cve/CVE-2023-25735" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:0461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013965.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Cross-compartment wrappers wrapping a scripted proxy could have caused objects from other compartments to be stored in the main compartment resulting in a use-after-free after unwrapping the proxy. This vulnerability affects Firefox &lt; 110, Thunderbird &lt; 102.8, and Firefox ESR &lt; 102.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25735/">CVE-2023-25735 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25735">CVE-2023-25735 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208144">SUSE bug 1208144</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830073" comment="firefox-102.8.0-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830074" comment="thunderbird-102.8.0-2.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202325737" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-25737</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-25737" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25737" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-25737" ref_url="https://www.suse.com/security/cve/CVE-2023-25737" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:0461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013965.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    An invalid downcast from &lt;code&gt;nsTextNode&lt;/code&gt; to &lt;code&gt;SVGElement&lt;/code&gt; could have lead to undefined behavior. This vulnerability affects Firefox &lt; 110, Thunderbird &lt; 102.8, and Firefox ESR &lt; 102.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25737/">CVE-2023-25737 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25737">CVE-2023-25737 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208144">SUSE bug 1208144</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830073" comment="firefox-102.8.0-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830074" comment="thunderbird-102.8.0-2.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202325739" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-25739</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-25739" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25739" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-25739" ref_url="https://www.suse.com/security/cve/CVE-2023-25739" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:0461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013965.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Module load requests that failed were not being checked as to whether or not they were cancelled causing a use-after-free in &lt;code&gt;ScriptLoadContext&lt;/code&gt;. This vulnerability affects Firefox &lt; 110, Thunderbird &lt; 102.8, and Firefox ESR &lt; 102.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25739/">CVE-2023-25739 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25739">CVE-2023-25739 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208144">SUSE bug 1208144</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830073" comment="firefox-102.8.0-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830074" comment="thunderbird-102.8.0-2.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202325742" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-25742</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-25742" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25742" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-25742" ref_url="https://www.suse.com/security/cve/CVE-2023-25742" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:0461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013965.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    When importing a SPKI RSA public key as ECDSA P-256, the key would be handled incorrectly causing the tab to crash. This vulnerability affects Firefox &lt; 110, Thunderbird &lt; 102.8, and Firefox ESR &lt; 102.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25742/">CVE-2023-25742 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25742">CVE-2023-25742 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208144">SUSE bug 1208144</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830073" comment="firefox-102.8.0-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830074" comment="thunderbird-102.8.0-2.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202325743" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-25743</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-25743" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25743" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-25743" ref_url="https://www.suse.com/security/cve/CVE-2023-25743" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:0461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013850.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A lack of in app notification for entering fullscreen mode could have lead to a malicious website spoofing browser chrome.&lt;br&gt;*This bug only affects Firefox Focus. Other versions of Firefox are unaffected.*. This vulnerability affects Firefox &lt; 110 and Firefox ESR &lt; 102.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25743/">CVE-2023-25743 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25743">CVE-2023-25743 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208144">SUSE bug 1208144</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830073" comment="firefox-102.8.0-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830074" comment="thunderbird-102.8.0-2.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202325744" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-25744</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-25744" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25744" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-25744" ref_url="https://www.suse.com/security/cve/CVE-2023-25744" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:0461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013850.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Mmemory safety bugs present in Firefox 109 and Firefox ESR 102.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 110 and Firefox ESR &lt; 102.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-08"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25744/">CVE-2023-25744 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25744">CVE-2023-25744 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208144">SUSE bug 1208144</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830073" comment="firefox-102.8.0-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830074" comment="thunderbird-102.8.0-2.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202325746" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-25746</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-25746" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25746" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-25746" ref_url="https://www.suse.com/security/cve/CVE-2023-25746" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:0461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013965.html" source="SUSE-SU"/>
    <description>
    Memory safety bugs present in Firefox ESR 102.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird &lt; 102.8 and Firefox ESR &lt; 102.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-08"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25746/">CVE-2023-25746 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25746">CVE-2023-25746 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208144">SUSE bug 1208144</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830073" comment="firefox-102.8.0-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830074" comment="thunderbird-102.8.0-2.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202325751" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-25751</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-25751" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25751" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-25751" ref_url="https://www.suse.com/security/cve/CVE-2023-25751" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:0728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014339.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Sometimes, when invalidating JIT code while following an iterator, the newly generated code could be overwritten incorrectly. This could lead to a potentially exploitable crash. This vulnerability affects Firefox &lt; 111, Firefox ESR &lt; 102.9, and Thunderbird &lt; 102.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-06-18"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25751/">CVE-2023-25751 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25751">CVE-2023-25751 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1209173">SUSE bug 1209173</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830144" comment="firefox-102.9.0-3.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830150" comment="thunderbird-102.9.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202325752" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-25752</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-25752" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25752" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-25752" ref_url="https://www.suse.com/security/cve/CVE-2023-25752" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:0728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014339.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    When accessing throttled streams, the count of available bytes needed to be checked in the calling function to be within bounds. This may have lead future code to be incorrect and vulnerable. This vulnerability affects Firefox &lt; 111, Firefox ESR &lt; 102.9, and Thunderbird &lt; 102.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-06-18"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25752/">CVE-2023-25752 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25752">CVE-2023-25752 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1209173">SUSE bug 1209173</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830144" comment="firefox-102.9.0-3.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830150" comment="thunderbird-102.9.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202325775" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-25775</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-25775" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25775" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-25775" ref_url="https://www.suse.com/security/cve/CVE-2023-25775" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4734-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017341.html" source="SUSE-SU"/>
    <description>
    Improper access control in the Intel(R) Ethernet Controller RDMA driver for linux before version 1.9.30 may allow an unauthenticated user to potentially enable escalation of privilege via network access.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-02"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-25775/">CVE-2023-25775 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25775">CVE-2023-25775 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216959">SUSE bug 1216959</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009858640" comment="bpftool-3.10.0-1160.118.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858641" comment="kernel-3.10.0-1160.118.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858642" comment="kernel-abi-whitelists-3.10.0-1160.118.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858643" comment="kernel-debug-3.10.0-1160.118.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858646" comment="kernel-doc-3.10.0-1160.118.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858647" comment="kernel-headers-3.10.0-1160.118.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858648" comment="kernel-tools-3.10.0-1160.118.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858649" comment="kernel-tools-libs-3.10.0-1160.118.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858651" comment="perf-3.10.0-1160.118.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858652" comment="python-perf-3.10.0-1160.118.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202326604" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-26604</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-26604" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-26604" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-26604" ref_url="https://www.suse.com/security/cve/CVE-2023-26604" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7705" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:963-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1622-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040371.html" source="SUSE-SU"/>
    <description>
    systemd before 247 does not adequately block local privilege escalation for some Sudo configurations, e.g., plausible sudoers files in which the "systemctl status" command may be executed. Specifically, systemd does not set LESSSECURE to 1, and thus other programs may be launched from the less program. This presents a substantial security risk when running systemctl from Sudo, because less executes as root when the terminal size is too small to show the complete systemctl output.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-26"/>
	<updated date="2025-06-20"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-26604/">CVE-2023-26604 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-26604">CVE-2023-26604 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208958">SUSE bug 1208958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210451">SUSE bug 1210451</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009948422" comment="libgudev1-219-78.el7_9.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948423" comment="libgudev1-devel-219-78.el7_9.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948424" comment="systemd-219-78.el7_9.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948425" comment="systemd-devel-219-78.el7_9.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948426" comment="systemd-journal-gateway-219-78.el7_9.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948427" comment="systemd-libs-219-78.el7_9.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948428" comment="systemd-networkd-219-78.el7_9.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948429" comment="systemd-python-219-78.el7_9.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948430" comment="systemd-resolved-219-78.el7_9.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948431" comment="systemd-sysv-219-78.el7_9.11 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202328162" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-28162</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-28162" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28162" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-28162" ref_url="https://www.suse.com/security/cve/CVE-2023-28162" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:0728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014339.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    While implementing AudioWorklets, some code may have casted one type to another, invalid, dynamic type. This could have led to a potentially exploitable crash. This vulnerability affects Firefox &lt; 111, Firefox ESR &lt; 102.9, and Thunderbird &lt; 102.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-06-18"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-28162/">CVE-2023-28162 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28162">CVE-2023-28162 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1209173">SUSE bug 1209173</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830144" comment="firefox-102.9.0-3.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830150" comment="thunderbird-102.9.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202328164" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-28164</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-28164" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28164" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-28164" ref_url="https://www.suse.com/security/cve/CVE-2023-28164" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:0728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014339.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Dragging a URL from a cross-origin iframe that was removed during the drag could have led to user confusion and website spoofing attacks. This vulnerability affects Firefox &lt; 111, Firefox ESR &lt; 102.9, and Thunderbird &lt; 102.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-06-18"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-28164/">CVE-2023-28164 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28164">CVE-2023-28164 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1209173">SUSE bug 1209173</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830144" comment="firefox-102.9.0-3.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830150" comment="thunderbird-102.9.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202328176" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-28176</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-28176" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28176" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-28176" ref_url="https://www.suse.com/security/cve/CVE-2023-28176" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:0728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014339.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Memory safety bugs present in Firefox 110 and Firefox ESR 102.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 111, Firefox ESR &lt; 102.9, and Thunderbird &lt; 102.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-08"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-28176/">CVE-2023-28176 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28176">CVE-2023-28176 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1209173">SUSE bug 1209173</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830144" comment="firefox-102.9.0-3.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830150" comment="thunderbird-102.9.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20232828" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-2828</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-2828" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2828" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-2828" ref_url="https://www.suse.com/security/cve/CVE-2023-2828" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015348.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018035.html" source="SUSE-SU"/>
    <description>
    Every `named` instance configured to run as a recursive resolver maintains a cache database holding the responses to the queries it has recently sent to authoritative servers. The size limit for that cache database can be configured using the `max-cache-size` statement in the configuration file; it defaults to 90% of the total amount of memory available on the host. When the size of the cache reaches 7/8 of the configured limit, a cache-cleaning algorithm starts to remove expired and/or least-recently used RRsets from the cache, to keep memory use below the configured limit.

It has been discovered that the effectiveness of the cache-cleaning algorithm used in `named` can be severely diminished by querying the resolver for specific RRsets in a certain order, effectively allowing the configured `max-cache-size` limit to be significantly exceeded.
This issue affects BIND 9 versions 9.11.0 through 9.16.41, 9.18.0 through 9.18.15, 9.19.0 through 9.19.13, 9.11.3-S1 through 9.16.41-S1, and 9.18.11-S1 through 9.18.15-S1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2828/">CVE-2023-2828 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2828">CVE-2023-2828 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212544">SUSE bug 1212544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216764">SUSE bug 1216764</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830283" comment="bind-9.11.4-26.P2.el7_9.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830284" comment="bind-chroot-9.11.4-26.P2.el7_9.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830285" comment="bind-devel-9.11.4-26.P2.el7_9.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830286" comment="bind-export-devel-9.11.4-26.P2.el7_9.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830287" comment="bind-export-libs-9.11.4-26.P2.el7_9.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830288" comment="bind-libs-9.11.4-26.P2.el7_9.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830289" comment="bind-libs-lite-9.11.4-26.P2.el7_9.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830290" comment="bind-license-9.11.4-26.P2.el7_9.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830291" comment="bind-lite-devel-9.11.4-26.P2.el7_9.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830292" comment="bind-pkcs11-9.11.4-26.P2.el7_9.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830293" comment="bind-pkcs11-devel-9.11.4-26.P2.el7_9.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830294" comment="bind-pkcs11-libs-9.11.4-26.P2.el7_9.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830295" comment="bind-pkcs11-utils-9.11.4-26.P2.el7_9.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830296" comment="bind-sdb-9.11.4-26.P2.el7_9.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830297" comment="bind-sdb-chroot-9.11.4-26.P2.el7_9.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830298" comment="bind-utils-9.11.4-26.P2.el7_9.14 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202328427" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-28427</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-28427" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28427" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-28427" ref_url="https://www.suse.com/security/cve/CVE-2023-28427" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:1736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014339.html" source="SUSE-SU"/>
    <description>
    matrix-js-sdk is a Matrix messaging protocol Client-Server SDK for JavaScript. In versions prior to 24.0.0 events sent with special strings in key places can temporarily disrupt or impede the matrix-js-sdk from functioning properly, potentially impacting the consumer's ability to process data safely. Note that the matrix-js-sdk can appear to be operating normally but be excluding or corrupting runtime data presented to the consumer. This vulnerability is distinct from GHSA-rfv9-x7hh-xc32 which covers a similar issue. The issue has been patched in matrix-js-sdk 24.0.0 and users are advised to upgrade. There are no known workarounds for this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-28427/">CVE-2023-28427 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28427">CVE-2023-28427 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1209953">SUSE bug 1209953</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830176" comment="thunderbird-102.10.0-2.el7_9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202329007" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-29007</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-29007" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29007" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-29007" ref_url="https://www.suse.com/security/cve/CVE-2023-29007" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014601.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014607.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2038-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/029003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2038-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014775.html" source="SUSE-SU"/>
    <description>
    Git is a revision control system. Prior to versions 2.30.9, 2.31.8, 2.32.7, 2.33.8, 2.34.8, 2.35.8, 2.36.6, 2.37.7, 2.38.5, 2.39.3, and 2.40.1, a specially crafted `.gitmodules` file with submodule URLs that are longer than 1024 characters can used to exploit a bug in `config.c::git_config_copy_or_rename_section_in_file()`. This bug can be used to inject arbitrary configuration into a user's `$GIT_DIR/config` when attempting to remove the configuration section associated with that submodule. When the attacker injects configuration values which specify executables to run (such as `core.pager`, `core.editor`, `core.sshCommand`, etc.) this can lead to a remote code execution. A fix A fix is available in versions 2.30.9, 2.31.8, 2.32.7, 2.33.8, 2.34.8, 2.35.8, 2.36.6, 2.37.7, 2.38.5, 2.39.3, and 2.40.1. As a workaround, avoid running `git submodule deinit` on untrusted repositories or without prior inspection of any submodule sections in `$GIT_DIR/config`.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2023-29007/">CVE-2023-29007 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29007">CVE-2023-29007 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210686">SUSE bug 1210686</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830222" comment="emacs-git-1.8.3.1-25.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830223" comment="emacs-git-el-1.8.3.1-25.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830224" comment="git-1.8.3.1-25.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830225" comment="git-all-1.8.3.1-25.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830226" comment="git-bzr-1.8.3.1-25.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830227" comment="git-cvs-1.8.3.1-25.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830228" comment="git-daemon-1.8.3.1-25.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830229" comment="git-email-1.8.3.1-25.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830230" comment="git-gnome-keyring-1.8.3.1-25.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830231" comment="git-gui-1.8.3.1-25.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830232" comment="git-hg-1.8.3.1-25.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830233" comment="git-instaweb-1.8.3.1-25.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830234" comment="git-p4-1.8.3.1-25.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830235" comment="git-svn-1.8.3.1-25.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830236" comment="gitk-1.8.3.1-25.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830237" comment="gitweb-1.8.3.1-25.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830238" comment="perl-Git-1.8.3.1-25.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830239" comment="perl-Git-SVN-1.8.3.1-25.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202329479" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-29479</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-29479" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29479" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-29479" ref_url="https://www.suse.com/security/cve/CVE-2023-29479" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:2064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014672.html" source="SUSE-SU"/>
    <description>
    Ribose RNP before 0.16.3 may hang when the input is malformed.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29479/">CVE-2023-29479 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29479">CVE-2023-29479 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210212">SUSE bug 1210212</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830176" comment="thunderbird-102.10.0-2.el7_9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202329533" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-29533</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-29533" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29533" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-29533" ref_url="https://www.suse.com/security/cve/CVE-2023-29533" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:1817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1855-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014672.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A website could have obscured the fullscreen notification by using a combination of &lt;code&gt;window.open&lt;/code&gt;, fullscreen requests, &lt;code&gt;window.name&lt;/code&gt; assignments, and &lt;code&gt;setInterval&lt;/code&gt; calls. This could have led to user confusion and possible spoofing attacks. This vulnerability affects Firefox &lt; 112, Focus for Android &lt; 112, Firefox ESR &lt; 102.10, Firefox for Android &lt; 112, and Thunderbird &lt; 102.10.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29533/">CVE-2023-29533 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29533">CVE-2023-29533 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210212">SUSE bug 1210212</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830175" comment="firefox-102.10.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830176" comment="thunderbird-102.10.0-2.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202329535" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-29535</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-29535" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29535" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-29535" ref_url="https://www.suse.com/security/cve/CVE-2023-29535" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:1817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1855-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014672.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Following a Garbage Collector compaction, weak maps may have been accessed before they were correctly traced. This resulted in memory corruption and a potentially exploitable crash. This vulnerability affects Firefox &lt; 112, Focus for Android &lt; 112, Firefox ESR &lt; 102.10, Firefox for Android &lt; 112, and Thunderbird &lt; 102.10.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29535/">CVE-2023-29535 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29535">CVE-2023-29535 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210212">SUSE bug 1210212</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830175" comment="firefox-102.10.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830176" comment="thunderbird-102.10.0-2.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202329536" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-29536</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-29536" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29536" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-29536" ref_url="https://www.suse.com/security/cve/CVE-2023-29536" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:1817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1855-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014672.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    An attacker could cause the memory manager to incorrectly free a pointer that addresses attacker-controlled memory, resulting in an assertion, memory corruption, or a potentially exploitable crash. This vulnerability affects Firefox &lt; 112, Focus for Android &lt; 112, Firefox ESR &lt; 102.10, Firefox for Android &lt; 112, and Thunderbird &lt; 102.10.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29536/">CVE-2023-29536 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29536">CVE-2023-29536 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210212">SUSE bug 1210212</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830175" comment="firefox-102.10.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830176" comment="thunderbird-102.10.0-2.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202329539" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-29539</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-29539" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29539" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-29539" ref_url="https://www.suse.com/security/cve/CVE-2023-29539" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:1817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1855-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014672.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    When handling the filename directive in the Content-Disposition header, the filename would be truncated if the filename contained a NULL character. This could have led to reflected file download attacks potentially tricking users to install malware. This vulnerability affects Firefox &lt; 112, Focus for Android &lt; 112, Firefox ESR &lt; 102.10, Firefox for Android &lt; 112, and Thunderbird &lt; 102.10.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29539/">CVE-2023-29539 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29539">CVE-2023-29539 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210212">SUSE bug 1210212</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830175" comment="firefox-102.10.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830176" comment="thunderbird-102.10.0-2.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202329541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-29541</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-29541" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29541" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-29541" ref_url="https://www.suse.com/security/cve/CVE-2023-29541" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:1817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1855-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014672.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Firefox did not properly handle downloads of files ending in &lt;code&gt;.desktop&lt;/code&gt;, which can be interpreted to run attacker-controlled commands. &lt;br&gt;*This bug only affects Firefox for Linux on certain Distributions. Other operating systems are unaffected, and Mozilla is unable to enumerate all affected Linux Distributions.*. This vulnerability affects Firefox &lt; 112, Focus for Android &lt; 112, Firefox ESR &lt; 102.10, Firefox for Android &lt; 112, and Thunderbird &lt; 102.10.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29541/">CVE-2023-29541 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29541">CVE-2023-29541 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210212">SUSE bug 1210212</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830175" comment="firefox-102.10.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830176" comment="thunderbird-102.10.0-2.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202329548" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-29548</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-29548" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29548" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-29548" ref_url="https://www.suse.com/security/cve/CVE-2023-29548" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:1817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1855-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014672.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A wrong lowering instruction in the ARM64 Ion compiler resulted in a wrong optimization result. This vulnerability affects Firefox &lt; 112, Focus for Android &lt; 112, Firefox ESR &lt; 102.10, Firefox for Android &lt; 112, and Thunderbird &lt; 102.10.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29548/">CVE-2023-29548 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29548">CVE-2023-29548 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210212">SUSE bug 1210212</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830175" comment="firefox-102.10.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830176" comment="thunderbird-102.10.0-2.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202329550" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-29550</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-29550" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29550" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-29550" ref_url="https://www.suse.com/security/cve/CVE-2023-29550" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:1817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1855-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014672.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Memory safety bugs present in Firefox 111 and Firefox ESR 102.9. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 112, Focus for Android &lt; 112, Firefox ESR &lt; 102.10, Firefox for Android &lt; 112, and Thunderbird &lt; 102.10.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29550/">CVE-2023-29550 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29550">CVE-2023-29550 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210212">SUSE bug 1210212</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830175" comment="firefox-102.10.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830176" comment="thunderbird-102.10.0-2.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202331315" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-31315</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-31315" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31315" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-31315" ref_url="https://www.suse.com/security/cve/CVE-2023-31315" source="SUSE CVE"/>
		<reference ref_id="ESSA-2024:0627" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2943-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2944-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2980-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3081-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20227-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021095.html" source="SUSE-SU"/>
    <description>
    Improper validation in a model specific register (MSR) could allow a malicious program with ring0 access to modify SMM configuration while SMI lock is enabled, potentially leading to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-25"/>
	<updated date="2025-12-19"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-31315/">CVE-2023-31315 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-31315">CVE-2023-31315 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229069">SUSE bug 1229069</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009944402" comment="iwl100-firmware-39.31.5.1-999.34.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944403" comment="iwl1000-firmware-39.31.5.1-999.34.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944404" comment="iwl105-firmware-18.168.6.1-999.34.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944405" comment="iwl135-firmware-18.168.6.1-999.34.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944406" comment="iwl2000-firmware-18.168.6.1-999.34.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944407" comment="iwl2030-firmware-18.168.6.1-999.34.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944408" comment="iwl3160-firmware-22.0.7.0-999.34.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944409" comment="iwl3945-firmware-15.32.2.9-999.34.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944410" comment="iwl4965-firmware-228.61.2.24-999.34.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944411" comment="iwl5000-firmware-8.83.5.1_1-999.34.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944412" comment="iwl5150-firmware-8.24.2.2-999.34.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944413" comment="iwl6000-firmware-9.221.4.1-999.34.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944414" comment="iwl6000g2a-firmware-17.168.5.3-999.34.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944415" comment="iwl6000g2b-firmware-17.168.5.2-999.34.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944416" comment="iwl6050-firmware-41.28.5.1-999.34.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944417" comment="iwl7260-firmware-22.0.7.0-999.34.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944933" comment="iwlax2xx-firmware-20240715-999.34.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947247" comment="linux-firmware-20240715-999.34.git4c8fb21e.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202331484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-31484</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-31484" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31484" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-31484" ref_url="https://www.suse.com/security/cve/CVE-2023-31484" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0079" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2356-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015559.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015560.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015561.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2363-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2365-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2366-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015586.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2397-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015595.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2402-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2403-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2404-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2405-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015601.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015613.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015765.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3075-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016763.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2881-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-February/034274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018518.html" source="SUSE-SU"/>
    <description>
    CPAN.pm before 2.35 does not verify TLS certificates when downloading distributions over HTTPS.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-15"/>
	<updated date="2026-01-15"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-31484/">CVE-2023-31484 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31484">CVE-2023-31484 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210999">SUSE bug 1210999</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010037326" comment="perl-5.16.3-299.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037327" comment="perl-CPAN-1.9800-299.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037328" comment="perl-ExtUtils-CBuilder-0.28.2.6-299.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037329" comment="perl-ExtUtils-Embed-1.30-299.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037330" comment="perl-ExtUtils-Install-1.58-299.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037331" comment="perl-IO-Zlib-1.10-299.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037332" comment="perl-Locale-Maketext-Simple-0.21-299.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037333" comment="perl-Module-CoreList-2.76.02-299.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037334" comment="perl-Module-Loaded-0.08-299.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037335" comment="perl-Object-Accessor-0.42-299.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037336" comment="perl-Package-Constants-0.02-299.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037337" comment="perl-Pod-Escapes-1.04-299.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037338" comment="perl-Time-Piece-1.20.1-299.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037339" comment="perl-core-5.16.3-299.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037340" comment="perl-devel-5.16.3-299.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037341" comment="perl-libs-5.16.3-299.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037342" comment="perl-macros-5.16.3-299.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037343" comment="perl-tests-5.16.3-299.el7_9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202332067" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-32067</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-32067" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32067" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-32067" ref_url="https://www.suse.com/security/cve/CVE-2023-32067" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/015026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/015027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:337-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:338-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029798.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/015004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2655-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015510.html" source="SUSE-SU"/>
    <description>
    c-ares is an asynchronous resolver library. c-ares is vulnerable to denial of service. If a target resolver sends a query, the attacker forges a malformed UDP packet with a length of 0 and returns them to the target resolver. The target resolver erroneously interprets the 0 length as a graceful shutdown of the connection. This issue has been patched in version 1.19.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-32067/">CVE-2023-32067 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32067">CVE-2023-32067 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211604">SUSE bug 1211604</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830262" comment="c-ares-1.10.0-3.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830263" comment="c-ares-devel-1.10.0-3.el7_9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202332205" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-32205</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-32205" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32205" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-32205" ref_url="https://www.suse.com/security/cve/CVE-2023-32205" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:2173-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2175-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2176-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029422.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    In multiple cases browser prompts could have been obscured by popups controlled by content. These could have led to potential user confusion and spoofing attacks. This vulnerability affects Firefox &lt; 113, Firefox ESR &lt; 102.11, and Thunderbird &lt; 102.11.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-06-18"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32205/">CVE-2023-32205 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32205">CVE-2023-32205 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211175">SUSE bug 1211175</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830211" comment="firefox-102.11.0-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830221" comment="thunderbird-102.11.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202332206" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-32206</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-32206" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32206" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-32206" ref_url="https://www.suse.com/security/cve/CVE-2023-32206" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:2173-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2175-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2176-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029422.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    An out-of-bound read could have led to a crash in the RLBox Expat driver. This vulnerability affects Firefox &lt; 113, Firefox ESR &lt; 102.11, and Thunderbird &lt; 102.11.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-06-18"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32206/">CVE-2023-32206 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32206">CVE-2023-32206 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211175">SUSE bug 1211175</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830211" comment="firefox-102.11.0-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830221" comment="thunderbird-102.11.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202332207" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-32207</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-32207" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32207" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-32207" ref_url="https://www.suse.com/security/cve/CVE-2023-32207" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:2173-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2175-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2176-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029422.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A missing delay in popup notifications could have made it possible for an attacker to trick a user into granting permissions. This vulnerability affects Firefox &lt; 113, Firefox ESR &lt; 102.11, and Thunderbird &lt; 102.11.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-06-18"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32207/">CVE-2023-32207 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32207">CVE-2023-32207 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211175">SUSE bug 1211175</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830211" comment="firefox-102.11.0-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830221" comment="thunderbird-102.11.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202332211" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-32211</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-32211" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32211" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-32211" ref_url="https://www.suse.com/security/cve/CVE-2023-32211" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:2173-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2175-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2176-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029422.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A type checking bug would have led to invalid code being compiled. This vulnerability affects Firefox &lt; 113, Firefox ESR &lt; 102.11, and Thunderbird &lt; 102.11.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-06-18"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32211/">CVE-2023-32211 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32211">CVE-2023-32211 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211175">SUSE bug 1211175</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830211" comment="firefox-102.11.0-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830221" comment="thunderbird-102.11.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202332212" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-32212</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-32212" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32212" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-32212" ref_url="https://www.suse.com/security/cve/CVE-2023-32212" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:2173-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2175-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2176-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029422.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    An attacker could have positioned a `datalist` element to obscure the address bar. This vulnerability affects Firefox &lt; 113, Firefox ESR &lt; 102.11, and Thunderbird &lt; 102.11.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-06-18"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32212/">CVE-2023-32212 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32212">CVE-2023-32212 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211175">SUSE bug 1211175</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830211" comment="firefox-102.11.0-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830221" comment="thunderbird-102.11.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202332213" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-32213</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-32213" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32213" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-32213" ref_url="https://www.suse.com/security/cve/CVE-2023-32213" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:2173-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2175-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2176-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029422.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    When reading a file, an uninitialized value could have been used as read limit. This vulnerability affects Firefox &lt; 113, Firefox ESR &lt; 102.11, and Thunderbird &lt; 102.11.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-06-18"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32213/">CVE-2023-32213 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32213">CVE-2023-32213 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211175">SUSE bug 1211175</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830211" comment="firefox-102.11.0-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830221" comment="thunderbird-102.11.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202332215" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-32215</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-32215" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32215" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-32215" ref_url="https://www.suse.com/security/cve/CVE-2023-32215" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:2173-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2175-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2176-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029422.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Mozilla developers and community members Gabriele Svelto, Andrew Osmond, Emily McDonough, Sebastian Hengst, Andrew McCreight and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 112 and Firefox ESR 102.10. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 113, Firefox ESR &lt; 102.11, and Thunderbird &lt; 102.11.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-06-18"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32215/">CVE-2023-32215 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32215">CVE-2023-32215 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211175">SUSE bug 1211175</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830211" comment="firefox-102.11.0-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830221" comment="thunderbird-102.11.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202332233" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-32233</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-32233" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32233" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-32233" ref_url="https://www.suse.com/security/cve/CVE-2023-32233" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2500-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2502-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2611-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2651-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2782-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3594-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3668-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3671-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031547.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3675-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031546.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel through 6.3.1, a use-after-free in Netfilter nf_tables when processing batch requests can be abused to perform arbitrary read and write operations on kernel memory. Unprivileged local users can obtain root privileges. This occurs because anonymous sets are mishandled.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-32233/">CVE-2023-32233 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32233">CVE-2023-32233 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211043">SUSE bug 1211043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211187">SUSE bug 1211187</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830370" comment="bpftool-3.10.0-1160.102.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830371" comment="kernel-3.10.0-1160.102.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830372" comment="kernel-abi-whitelists-3.10.0-1160.102.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830373" comment="kernel-debug-3.10.0-1160.102.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830376" comment="kernel-doc-3.10.0-1160.102.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830377" comment="kernel-headers-3.10.0-1160.102.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830378" comment="kernel-tools-3.10.0-1160.102.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830379" comment="kernel-tools-libs-3.10.0-1160.102.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830381" comment="perf-3.10.0-1160.102.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830382" comment="python-perf-3.10.0-1160.102.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202332360" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-32360</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-32360" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32360" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-32360" ref_url="https://www.suse.com/security/cve/CVE-2023-32360" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3707-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3707-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021226.html" source="SUSE-SU"/>
    <description>
    An authentication issue was addressed with improved state management. This issue is fixed in macOS Big Sur 11.7.7, macOS Monterey 12.6.6, macOS Ventura 13.4. An unauthenticated user may be able to access recently printed documents.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-06-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-32360/">CVE-2023-32360 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32360">CVE-2023-32360 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214254">SUSE bug 1214254</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830329" comment="cups-1.6.3-52.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830330" comment="cups-client-1.6.3-52.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830331" comment="cups-devel-1.6.3-52.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830332" comment="cups-filesystem-1.6.3-52.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830333" comment="cups-ipptool-1.6.3-52.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830334" comment="cups-libs-1.6.3-52.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830335" comment="cups-lpd-1.6.3-52.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20233341" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-3341</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-3341" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3341" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-3341" ref_url="https://www.suse.com/security/cve/CVE-2023-3341" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016332.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3821-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3934-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031872.html" source="SUSE-SU"/>
    <description>
    The code that processes control channel messages sent to `named` calls certain functions recursively during packet parsing. Recursion depth is only limited by the maximum accepted packet size; depending on the environment, this may cause the packet-parsing code to run out of available stack memory, causing `named` to terminate unexpectedly. Since each incoming control channel message is fully parsed before its contents are authenticated, exploiting this flaw does not require the attacker to hold a valid RNDC key; only network access to the control channel's configured TCP port is necessary.
This issue affects BIND 9 versions 9.2.0 through 9.16.43, 9.18.0 through 9.18.18, 9.19.0 through 9.19.16, 9.9.3-S1 through 9.16.43-S1, and 9.18.0-S1 through 9.18.18-S1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3341/">CVE-2023-3341 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3341">CVE-2023-3341 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215472">SUSE bug 1215472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216764">SUSE bug 1216764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217453">SUSE bug 1217453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217551">SUSE bug 1217551</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217600">SUSE bug 1217600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221586">SUSE bug 1221586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223092">SUSE bug 1223092</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830383" comment="bind-9.11.4-26.P2.el7_9.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830384" comment="bind-chroot-9.11.4-26.P2.el7_9.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830385" comment="bind-devel-9.11.4-26.P2.el7_9.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830386" comment="bind-export-devel-9.11.4-26.P2.el7_9.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830387" comment="bind-export-libs-9.11.4-26.P2.el7_9.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830388" comment="bind-libs-9.11.4-26.P2.el7_9.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830389" comment="bind-libs-lite-9.11.4-26.P2.el7_9.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830390" comment="bind-license-9.11.4-26.P2.el7_9.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830391" comment="bind-lite-devel-9.11.4-26.P2.el7_9.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830392" comment="bind-pkcs11-9.11.4-26.P2.el7_9.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830393" comment="bind-pkcs11-devel-9.11.4-26.P2.el7_9.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830394" comment="bind-pkcs11-libs-9.11.4-26.P2.el7_9.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830395" comment="bind-pkcs11-utils-9.11.4-26.P2.el7_9.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830396" comment="bind-sdb-9.11.4-26.P2.el7_9.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830397" comment="bind-sdb-chroot-9.11.4-26.P2.el7_9.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830398" comment="bind-utils-9.11.4-26.P2.el7_9.15 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202334058" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-34058</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-34058" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34058" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-34058" ref_url="https://www.suse.com/security/cve/CVE-2023-34058" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4227-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016889.html" source="SUSE-SU"/>
    <description>
    VMware Tools contains a SAML token signature bypass vulnerability.  A malicious actor that has been granted  Guest Operation Privileges https://docs.vmware.com/en/VMware-vSphere/8.0/vsphere-security/GUID-6A952214-0E5E-4CCF-9D2A-90948FF643EC.html   in a target virtual machine may be able to elevate their privileges if that target virtual machine has been assigned a more privileged  Guest Alias https://vdc-download.vmware.com/vmwb-repository/dcr-public/d1902b0e-d479-46bf-8ac9-cee0e31e8ec0/07ce8dbd-db48-4261-9b8f-c6d3ad8ba472/vim.vm.guest.AliasManager.html .
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-12-19"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-34058/">CVE-2023-34058 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34058">CVE-2023-34058 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216432">SUSE bug 1216432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216433">SUSE bug 1216433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228309">SUSE bug 1228309</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830446" comment="open-vm-tools-11.0.5-3.el7_9.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830447" comment="open-vm-tools-desktop-11.0.5-3.el7_9.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830448" comment="open-vm-tools-devel-11.0.5-3.el7_9.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830449" comment="open-vm-tools-test-11.0.5-3.el7_9.9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202334059" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-34059</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-34059" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34059" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-34059" ref_url="https://www.suse.com/security/cve/CVE-2023-34059" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4227-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016889.html" source="SUSE-SU"/>
    <description>
    open-vm-tools contains a file descriptor hijack vulnerability in the vmware-user-suid-wrapper.  A malicious actor with non-root privileges may be able to hijack the 
/dev/uinput file descriptor allowing them to simulate user inputs.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-12-19"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-34059/">CVE-2023-34059 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34059">CVE-2023-34059 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216433">SUSE bug 1216433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225967">SUSE bug 1225967</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830446" comment="open-vm-tools-11.0.5-3.el7_9.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830447" comment="open-vm-tools-desktop-11.0.5-3.el7_9.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830448" comment="open-vm-tools-devel-11.0.5-3.el7_9.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830449" comment="open-vm-tools-test-11.0.5-3.el7_9.9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20233417" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-3417</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-3417" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3417" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-3417" ref_url="https://www.suse.com/security/cve/CVE-2023-3417" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3059-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030640.html" source="SUSE-SU"/>
    <description>
    Thunderbird allowed the Text Direction Override Unicode Character in filenames. An email attachment could be incorrectly shown as being a document file, while in  fact it was an executable file. Newer versions of Thunderbird will strip the character and show the correct file extension. This vulnerability affects Thunderbird &lt; 115.0.1 and Thunderbird &lt; 102.13.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-12-19"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3417/">CVE-2023-3417 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3417">CVE-2023-3417 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213658">SUSE bug 1213658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830328" comment="thunderbird-102.14.0-1.el7_9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202334414" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-34414</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-34414" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34414" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-34414" ref_url="https://www.suse.com/security/cve/CVE-2023-34414" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:2440-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2441-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    The error page for sites with invalid TLS certificates was missing the
activation-delay Firefox uses to protect prompts and permission dialogs
from attacks that exploit human response time delays. If a malicious
page elicited user clicks in precise locations immediately before
navigating to a site with a certificate error and made the renderer
extremely busy at the same time, it could create a gap between when
the error page was loaded and when the display actually refreshed.
With the right timing the elicited clicks could land in that gap and 
activate the button that overrides the certificate error for that site. This vulnerability affects Firefox ESR &lt; 102.12, Firefox &lt; 114, and Thunderbird &lt; 102.12.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-34414/">CVE-2023-34414 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34414">CVE-2023-34414 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211922">SUSE bug 1211922</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830261" comment="firefox-102.12.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830260" comment="thunderbird-102.12.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202334416" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-34416</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-34416" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34416" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-34416" ref_url="https://www.suse.com/security/cve/CVE-2023-34416" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:2440-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2441-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Memory safety bugs present in Firefox 113, Firefox ESR 102.11, and Thunderbird 102.12. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR &lt; 102.12, Firefox &lt; 114, and Thunderbird &lt; 102.12.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-08"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-34416/">CVE-2023-34416 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34416">CVE-2023-34416 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211922">SUSE bug 1211922</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830261" comment="firefox-102.12.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830260" comment="thunderbird-102.12.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202334440" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-34440</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-34440" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34440" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-34440" ref_url="https://www.suse.com/security/cve/CVE-2023-34440" source="SUSE CVE"/>
    <description>
    Improper input validation in UEFI firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-31"/>
	<updated date="2026-01-31"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-34440/">CVE-2023-34440 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-34440">CVE-2023-34440 at NVD</cve>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040954" comment="microcode_ctl-2.1-73.23.el7_9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202335001" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-35001</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-35001" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35001" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-35001" ref_url="https://www.suse.com/security/cve/CVE-2023-35001" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3180-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030786.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3182-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3302-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3318-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3324-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3349-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3391-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3421-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3572-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3576-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3592-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3594-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3622-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3653-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3657-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3668-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3671-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031547.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3675-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3676-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3677-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031544.html" source="SUSE-SU"/>
    <description>
    Linux Kernel nftables Out-Of-Bounds Read/Write Vulnerability; nft_byteorder poorly handled vm register contents when CAP_NET_ADMIN is in any user or network namespace
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-35001/">CVE-2023-35001 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-35001">CVE-2023-35001 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213059">SUSE bug 1213059</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213063">SUSE bug 1213063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217531">SUSE bug 1217531</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830370" comment="bpftool-3.10.0-1160.102.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830371" comment="kernel-3.10.0-1160.102.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830372" comment="kernel-abi-whitelists-3.10.0-1160.102.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830373" comment="kernel-debug-3.10.0-1160.102.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830376" comment="kernel-doc-3.10.0-1160.102.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830377" comment="kernel-headers-3.10.0-1160.102.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830378" comment="kernel-tools-3.10.0-1160.102.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830379" comment="kernel-tools-libs-3.10.0-1160.102.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830381" comment="perf-3.10.0-1160.102.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830382" comment="python-perf-3.10.0-1160.102.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202335788" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-35788</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-35788" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-35788" ref_url="https://www.suse.com/security/cve/CVE-2023-35788" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2782-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2810-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3075-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015755.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in fl_set_geneve_opt in net/sched/cls_flower.c in the Linux kernel before 6.3.7. It allows an out-of-bounds write in the flower classifier code via TCA_FLOWER_KEY_ENC_OPTS_GENEVE packets. This may result in denial of service or privilege escalation.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-35788/">CVE-2023-35788 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-35788">CVE-2023-35788 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212504">SUSE bug 1212504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212509">SUSE bug 1212509</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830336" comment="bpftool-3.10.0-1160.99.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830337" comment="kernel-3.10.0-1160.99.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830338" comment="kernel-abi-whitelists-3.10.0-1160.99.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830339" comment="kernel-debug-3.10.0-1160.99.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830342" comment="kernel-doc-3.10.0-1160.99.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830343" comment="kernel-headers-3.10.0-1160.99.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830344" comment="kernel-tools-3.10.0-1160.99.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830345" comment="kernel-tools-libs-3.10.0-1160.99.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830347" comment="perf-3.10.0-1160.99.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830348" comment="python-perf-3.10.0-1160.99.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20233600" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-3600</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-3600" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3600" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-3600" ref_url="https://www.suse.com/security/cve/CVE-2023-3600" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:2958-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2959-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3059-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030640.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    During the worker lifecycle, a use-after-free condition could have occurred, which could have led to a potentially exploitable crash. This vulnerability affects Firefox &lt; 115.0.2, Firefox ESR &lt; 115.0.2, and Thunderbird &lt; 115.0.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-12-19"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3600/">CVE-2023-3600 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3600">CVE-2023-3600 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213230">SUSE bug 1213230</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830364" comment="firefox-115.3.1-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830363" comment="thunderbird-115.3.1-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20233609" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-3609</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-3609" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-3609" ref_url="https://www.suse.com/security/cve/CVE-2023-3609" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3182-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3302-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3311-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3318-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3329-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3349-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3391-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3421-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016349.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3922-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016475.html" source="SUSE-SU"/>
		<reference ref_id="TID000021529" ref_url="https://www.suse.com/support/kb/doc/?id=000021529" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability in the Linux kernel's net/sched: cls_u32 component can be exploited to achieve local privilege escalation.

If tcf_change_indev() fails, u32_set_parms() will immediately return an error after incrementing or decrementing the reference counter in tcf_bind_filter(). If an attacker can control the reference counter and set it to zero, they can cause the reference to be freed, leading to a use-after-free vulnerability.

We recommend upgrading past commit 04c55383fa5689357bcdd2c8036725a55ed632bc.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3609/">CVE-2023-3609 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3609">CVE-2023-3609 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213586">SUSE bug 1213586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213587">SUSE bug 1213587</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217444">SUSE bug 1217444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217531">SUSE bug 1217531</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830370" comment="bpftool-3.10.0-1160.102.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830371" comment="kernel-3.10.0-1160.102.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830372" comment="kernel-abi-whitelists-3.10.0-1160.102.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830373" comment="kernel-debug-3.10.0-1160.102.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830376" comment="kernel-doc-3.10.0-1160.102.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830377" comment="kernel-headers-3.10.0-1160.102.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830378" comment="kernel-tools-3.10.0-1160.102.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830379" comment="kernel-tools-libs-3.10.0-1160.102.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830381" comment="perf-3.10.0-1160.102.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830382" comment="python-perf-3.10.0-1160.102.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20233611" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-3611</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-3611" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-3611" ref_url="https://www.suse.com/security/cve/CVE-2023-3611" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3182-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3302-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3311-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3318-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3324-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3329-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3349-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3391-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3421-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031178.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds write vulnerability in the Linux kernel's net/sched: sch_qfq component can be exploited to achieve local privilege escalation.

The qfq_change_agg() function in net/sched/sch_qfq.c allows an out-of-bounds write because lmax is updated according to packet sizes without bounds checks.

We recommend upgrading past commit 3e337087c3b5805fe0b8a46ba622a962880b5d64.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3611/">CVE-2023-3611 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3611">CVE-2023-3611 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213585">SUSE bug 1213585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223091">SUSE bug 1223091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223973">SUSE bug 1223973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830450" comment="bpftool-3.10.0-1160.105.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830451" comment="kernel-3.10.0-1160.105.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830452" comment="kernel-abi-whitelists-3.10.0-1160.105.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830453" comment="kernel-debug-3.10.0-1160.105.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830456" comment="kernel-doc-3.10.0-1160.105.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830457" comment="kernel-headers-3.10.0-1160.105.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830458" comment="kernel-tools-3.10.0-1160.105.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830459" comment="kernel-tools-libs-3.10.0-1160.105.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830461" comment="perf-3.10.0-1160.105.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830462" comment="python-perf-3.10.0-1160.105.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202337201" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-37201</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-37201" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37201" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-37201" ref_url="https://www.suse.com/security/cve/CVE-2023-37201" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:2849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015502.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2886-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030408.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    An attacker could have triggered a use-after-free condition when creating a WebRTC connection over HTTPS. This vulnerability affects Firefox &lt; 115, Firefox ESR &lt; 102.13, and Thunderbird &lt; 102.13.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-37201/">CVE-2023-37201 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37201">CVE-2023-37201 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212438">SUSE bug 1212438</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830269" comment="firefox-102.13.0-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830268" comment="thunderbird-102.13.0-2.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202337202" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-37202</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-37202" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37202" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-37202" ref_url="https://www.suse.com/security/cve/CVE-2023-37202" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:2849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015502.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2886-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030408.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Cross-compartment wrappers wrapping a scripted proxy could have caused objects from other compartments to be stored in the main compartment resulting in a use-after-free. This vulnerability affects Firefox &lt; 115, Firefox ESR &lt; 102.13, and Thunderbird &lt; 102.13.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-37202/">CVE-2023-37202 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37202">CVE-2023-37202 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212438">SUSE bug 1212438</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830269" comment="firefox-102.13.0-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830268" comment="thunderbird-102.13.0-2.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202337207" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-37207</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-37207" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37207" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-37207" ref_url="https://www.suse.com/security/cve/CVE-2023-37207" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:2849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015502.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2886-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030408.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A website could have obscured the fullscreen notification by using a URL with a scheme handled by an external program, such as a mailto URL. This could have led to user confusion and possible spoofing attacks. This vulnerability affects Firefox &lt; 115, Firefox ESR &lt; 102.13, and Thunderbird &lt; 102.13.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-37207/">CVE-2023-37207 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37207">CVE-2023-37207 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212438">SUSE bug 1212438</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830269" comment="firefox-102.13.0-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830268" comment="thunderbird-102.13.0-2.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202337208" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-37208</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-37208" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37208" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-37208" ref_url="https://www.suse.com/security/cve/CVE-2023-37208" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:2849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015502.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2886-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030408.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    When opening Diagcab files, Firefox did not warn the user that these files may contain malicious code. This vulnerability affects Firefox &lt; 115, Firefox ESR &lt; 102.13, and Thunderbird &lt; 102.13.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-37208/">CVE-2023-37208 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37208">CVE-2023-37208 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212438">SUSE bug 1212438</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830269" comment="firefox-102.13.0-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830268" comment="thunderbird-102.13.0-2.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202337211" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-37211</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-37211" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37211" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-37211" ref_url="https://www.suse.com/security/cve/CVE-2023-37211" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:2849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015502.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2886-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030408.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Memory safety bugs present in Firefox 114, Firefox ESR 102.12, and Thunderbird 102.12. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 115, Firefox ESR &lt; 102.13, and Thunderbird &lt; 102.13.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-37211/">CVE-2023-37211 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37211">CVE-2023-37211 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212438">SUSE bug 1212438</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830269" comment="firefox-102.13.0-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830268" comment="thunderbird-102.13.0-2.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202337460" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-37460</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-37460" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37460" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-37460" ref_url="https://www.suse.com/security/cve/CVE-2023-37460" source="SUSE CVE"/>
		<reference ref_id="SUSE-RU-2024:0560-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-February/034327.html" source="SUSE-SU"/>
    <description>
    Plexis Archiver is a collection of Plexus components to create archives or extract archives to a directory with a unified `Archiver`/`UnArchiver` API. Prior to version 4.8.0, using AbstractUnArchiver for extracting an archive might lead to an arbitrary file creation and possibly remote code execution. When extracting an archive with an entry that already exists in the destination directory as a symbolic link whose target does not exist - the `resolveFile()` function will return the symlink's source instead of its target, which will pass the verification that ensures the file will not be extracted outside of the destination directory. Later `Files.newOutputStream()`, that follows symlinks by default,  will actually write the entry's content to the symlink's target. Whoever uses plexus archiver to extract an untrusted archive is vulnerable to an arbitrary file creation and possibly remote code execution. Version 4.8.0 contains a patch for this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-37460/">CVE-2023-37460 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37460">CVE-2023-37460 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215973">SUSE bug 1215973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830444" comment="plexus-archiver-2.4.2-6.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830445" comment="plexus-archiver-javadoc-2.4.2-6.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202337536" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-37536</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-37536" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37536" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-37536" ref_url="https://www.suse.com/security/cve/CVE-2023-37536" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8795" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000763.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4715-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033062.html" source="SUSE-SU"/>
    <description>
    An integer overflow in xerces-c++ 3.2.3 in BigFix Platform allows remote attackers to cause out-of-bound access via HTTP request.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-22"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-37536/">CVE-2023-37536 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37536">CVE-2023-37536 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216156">SUSE bug 1216156</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219472">SUSE bug 1219472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219708">SUSE bug 1219708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221037">SUSE bug 1221037</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009960784" comment="xerces-c-3.1.1-10.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960785" comment="xerces-c-devel-3.1.1-10.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960786" comment="xerces-c-doc-3.1.1-10.el7_9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20233776" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-3776</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-3776" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-3776" ref_url="https://www.suse.com/security/cve/CVE-2023-3776" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3302-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3311-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3318-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3324-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3329-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3349-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3391-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3421-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016349.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3922-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016475.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability in the Linux kernel's net/sched: cls_fw component can be exploited to achieve local privilege escalation.

If tcf_change_indev() fails, fw_set_parms() will immediately return an error after incrementing or decrementing the reference counter in tcf_bind_filter(). If an attacker can control the reference counter and set it to zero, they can cause the reference to be freed, leading to a use-after-free vulnerability.

We recommend upgrading past commit 0323bce598eea038714f941ce2b22541c46d488f.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3776/">CVE-2023-3776 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3776">CVE-2023-3776 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213588">SUSE bug 1213588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215119">SUSE bug 1215119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215674">SUSE bug 1215674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217444">SUSE bug 1217444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217531">SUSE bug 1217531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221578">SUSE bug 1221578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221598">SUSE bug 1221598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223091">SUSE bug 1223091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223973">SUSE bug 1223973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830450" comment="bpftool-3.10.0-1160.105.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830451" comment="kernel-3.10.0-1160.105.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830452" comment="kernel-abi-whitelists-3.10.0-1160.105.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830453" comment="kernel-debug-3.10.0-1160.105.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830456" comment="kernel-doc-3.10.0-1160.105.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830457" comment="kernel-headers-3.10.0-1160.105.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830458" comment="kernel-tools-3.10.0-1160.105.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830459" comment="kernel-tools-libs-3.10.0-1160.105.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830461" comment="perf-3.10.0-1160.105.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830462" comment="python-perf-3.10.0-1160.105.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202338403" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-38403</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-38403" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38403" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-38403" ref_url="https://www.suse.com/security/cve/CVE-2023-38403" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:2987-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015669.html" source="SUSE-SU"/>
    <description>
    iperf3 before 3.14 allows peers to cause an integer overflow and heap corruption via a crafted length field.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-38403/">CVE-2023-38403 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38403">CVE-2023-38403 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213430">SUSE bug 1213430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830316" comment="iperf3-3.1.7-3.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830317" comment="iperf3-devel-3.1.7-3.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202338408" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-38408</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-38408" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38408" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-38408" ref_url="https://www.suse.com/security/cve/CVE-2023-38408" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2417-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2420-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015607.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015603.html" source="SUSE-SU"/>
		<reference ref_id="TID000021143" ref_url="https://www.suse.com/support/kb/doc/?id=000021143" source="SUSE-SU"/>
    <description>
    The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-38408/">CVE-2023-38408 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38408">CVE-2023-38408 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213504">SUSE bug 1213504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217034">SUSE bug 1217034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217035">SUSE bug 1217035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218970">SUSE bug 1218970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225676">SUSE bug 1225676</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830318" comment="openssh-7.4p1-23.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830319" comment="openssh-askpass-7.4p1-23.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830320" comment="openssh-cavs-7.4p1-23.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830321" comment="openssh-clients-7.4p1-23.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830322" comment="openssh-keycat-7.4p1-23.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830323" comment="openssh-ldap-7.4p1-23.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830324" comment="openssh-server-7.4p1-23.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830325" comment="openssh-server-sysvinit-7.4p1-23.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830326" comment="pam_ssh_agent_auth-0.10.3-2.23.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202338409" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-38409</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-38409" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38409" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-38409" ref_url="https://www.suse.com/security/cve/CVE-2023-38409" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3302-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3311-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015987.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in set_con2fb_map in drivers/video/fbdev/core/fbcon.c in the Linux kernel before 6.2.12. Because an assignment occurs only for the first vc, the fbcon_registered_fb and fbcon_display arrays can be desynchronized in fbcon_mode_deleted (the con2fb_map points at the old fb_info).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-22"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-38409/">CVE-2023-38409 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38409">CVE-2023-38409 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213417">SUSE bug 1213417</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009851792" comment="bpftool-3.10.0-1160.114.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851793" comment="kernel-3.10.0-1160.114.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851794" comment="kernel-abi-whitelists-3.10.0-1160.114.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851795" comment="kernel-debug-3.10.0-1160.114.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851798" comment="kernel-doc-3.10.0-1160.114.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851799" comment="kernel-headers-3.10.0-1160.114.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851800" comment="kernel-tools-3.10.0-1160.114.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851801" comment="kernel-tools-libs-3.10.0-1160.114.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851803" comment="perf-3.10.0-1160.114.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851804" comment="python-perf-3.10.0-1160.114.2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202340217" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-40217</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-40217" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40217" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-40217" ref_url="https://www.suse.com/security/cve/CVE-2023-40217" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016418.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016421.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016423.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3804-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3824-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3828-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3828-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3933-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3943-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031897.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018102.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Python before 3.8.18, 3.9.x before 3.9.18, 3.10.x before 3.10.13, and 3.11.x before 3.11.5. It primarily affects servers (such as HTTP servers) that use TLS client authentication. If a TLS server-side socket is created, receives data into the socket buffer, and then is closed quickly, there is a brief window where the SSLSocket instance will detect the socket as "not connected" and won't initiate a handshake, but buffered data will still be readable from the socket buffer. This data will not be authenticated if the server-side TLS peer is expecting client certificate authentication, and is indistinguishable from valid TLS stream data. Data is limited in size to the amount that will fit in the buffer. (The TLS connection cannot directly be used for data exfiltration because the vulnerable code path requires that the connection be closed on initialization of the SSLSocket.)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-40217/">CVE-2023-40217 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40217">CVE-2023-40217 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214692">SUSE bug 1214692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217524">SUSE bug 1217524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218319">SUSE bug 1218319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218476">SUSE bug 1218476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218965">SUSE bug 1218965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219472">SUSE bug 1219472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219713">SUSE bug 1219713</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221582">SUSE bug 1221582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224883">SUSE bug 1224883</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830437" comment="python-2.7.5-94.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830438" comment="python-debug-2.7.5-94.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830439" comment="python-devel-2.7.5-94.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830440" comment="python-libs-2.7.5-94.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830441" comment="python-test-2.7.5-94.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830442" comment="python-tools-2.7.5-94.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830430" comment="python3-3.6.8-21.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830431" comment="python3-debug-3.6.8-21.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830432" comment="python3-devel-3.6.8-21.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830433" comment="python3-idle-3.6.8-21.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830434" comment="python3-libs-3.6.8-21.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830435" comment="python3-test-3.6.8-21.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830436" comment="python3-tkinter-3.6.8-21.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830443" comment="tkinter-2.7.5-94.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234045" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4045</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4045" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4045" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4045" ref_url="https://www.suse.com/security/cve/CVE-2023-4045" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3161-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3162-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015804.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Offscreen Canvas did not properly track cross-origin tainting, which could have been used to access image data from another site in violation of same-origin policy. This vulnerability affects Firefox &lt; 116, Firefox ESR &lt; 102.14, and Firefox ESR &lt; 115.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-4045/">CVE-2023-4045 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4045">CVE-2023-4045 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213746">SUSE bug 1213746</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830327" comment="firefox-102.14.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830328" comment="thunderbird-102.14.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234046" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4046</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4046" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4046" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4046" ref_url="https://www.suse.com/security/cve/CVE-2023-4046" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3161-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3162-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015804.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    In some circumstances, a stale value could have been used for a global variable in WASM JIT analysis. This resulted in incorrect compilation and a potentially exploitable crash in the content process. This vulnerability affects Firefox &lt; 116, Firefox ESR &lt; 102.14, and Firefox ESR &lt; 115.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4046/">CVE-2023-4046 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4046">CVE-2023-4046 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213746">SUSE bug 1213746</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830327" comment="firefox-102.14.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830328" comment="thunderbird-102.14.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234047" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4047</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4047" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4047" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4047" ref_url="https://www.suse.com/security/cve/CVE-2023-4047" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3161-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3162-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015804.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A bug in popup notifications delay calculation could have made it possible for an attacker to trick a user into granting permissions. This vulnerability affects Firefox &lt; 116, Firefox ESR &lt; 102.14, and Firefox ESR &lt; 115.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4047/">CVE-2023-4047 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4047">CVE-2023-4047 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213746">SUSE bug 1213746</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830327" comment="firefox-102.14.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830328" comment="thunderbird-102.14.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234048" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4048</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4048" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4048" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4048" ref_url="https://www.suse.com/security/cve/CVE-2023-4048" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3161-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3162-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015804.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    An out-of-bounds read could have led to an exploitable crash when parsing HTML with DOMParser in low memory situations. This vulnerability affects Firefox &lt; 116, Firefox ESR &lt; 102.14, and Firefox ESR &lt; 115.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4048/">CVE-2023-4048 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4048">CVE-2023-4048 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213746">SUSE bug 1213746</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830327" comment="firefox-102.14.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830328" comment="thunderbird-102.14.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234049" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4049</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4049" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4049" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4049" ref_url="https://www.suse.com/security/cve/CVE-2023-4049" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3161-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3162-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015804.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Race conditions in reference counting code were found through code inspection. These could have resulted in potentially exploitable use-after-free vulnerabilities. This vulnerability affects Firefox &lt; 116, Firefox ESR &lt; 102.14, and Firefox ESR &lt; 115.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4049/">CVE-2023-4049 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4049">CVE-2023-4049 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213746">SUSE bug 1213746</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830327" comment="firefox-102.14.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830328" comment="thunderbird-102.14.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234050" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4050</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4050" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4050" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4050" ref_url="https://www.suse.com/security/cve/CVE-2023-4050" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3161-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3162-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015804.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    In some cases, an untrusted input stream was copied to a stack buffer without checking its size. This resulted in a potentially exploitable crash which could have led to a sandbox escape. This vulnerability affects Firefox &lt; 116, Firefox ESR &lt; 102.14, and Firefox ESR &lt; 115.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4050/">CVE-2023-4050 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4050">CVE-2023-4050 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213746">SUSE bug 1213746</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830327" comment="firefox-102.14.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830328" comment="thunderbird-102.14.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234051" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4051</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4051" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4051" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4051" ref_url="https://www.suse.com/security/cve/CVE-2023-4051" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016188.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A website could have obscured the full screen notification by using the file open dialog. This could have led to user confusion and possible spoofing attacks. This vulnerability affects Firefox &lt; 116, Firefox ESR &lt; 115.2, and Thunderbird &lt; 115.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4051/">CVE-2023-4051 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4051">CVE-2023-4051 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213746">SUSE bug 1213746</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830350" comment="firefox-102.15.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830349" comment="thunderbird-102.15.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234053" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4053</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4053" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4053" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4053" ref_url="https://www.suse.com/security/cve/CVE-2023-4053" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016188.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A website could have obscured the full screen notification by using a URL with a scheme handled by an external program, such as a mailto URL. This could have led to user confusion and possible spoofing attacks. This vulnerability affects Firefox &lt; 116, Firefox ESR &lt; 115.2, and Thunderbird &lt; 115.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4053/">CVE-2023-4053 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4053">CVE-2023-4053 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213746">SUSE bug 1213746</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830350" comment="firefox-102.15.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830349" comment="thunderbird-102.15.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202340546" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-40546</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-40546" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40546" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-40546" ref_url="https://www.suse.com/security/cve/CVE-2023-40546" source="SUSE CVE"/>
		<reference ref_id="ESSA-2025:0001" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1368-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1461-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1462-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20136-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021195.html" source="SUSE-SU"/>
    <description>
    A flaw was found in Shim when an error happened while creating a new ESL variable. If Shim fails to create the new variable, it tries to print an error message to the user; however, the number of parameters used by the logging function doesn't match the format string used by it, leading to a crash under certain circumstances.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-22"/>
	<updated date="2025-06-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-40546/">CVE-2023-40546 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40546">CVE-2023-40546 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215099">SUSE bug 1215099</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009960781" comment="mokutil-15.8-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960782" comment="shim-ia32-15.8-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960783" comment="shim-x64-15.8-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202340547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-40547</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-40547" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40547" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-40547" ref_url="https://www.suse.com/security/cve/CVE-2023-40547" source="SUSE CVE"/>
		<reference ref_id="ESSA-2025:0001" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1368-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1461-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1462-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20136-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021195.html" source="SUSE-SU"/>
    <description>
    A remote code execution vulnerability was found in Shim. The Shim boot support trusts attacker-controlled values when parsing an HTTP response. This flaw allows an attacker to craft a specific malicious HTTP request, leading to a completely controlled out-of-bounds write primitive and complete system compromise. This flaw is only exploitable during the early boot phase, an attacker needs to perform a Man-in-the-Middle or compromise the boot server to be able to exploit this vulnerability successfully.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-22"/>
	<updated date="2025-12-19"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-40547/">CVE-2023-40547 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40547">CVE-2023-40547 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215098">SUSE bug 1215098</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009960781" comment="mokutil-15.8-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960782" comment="shim-ia32-15.8-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960783" comment="shim-x64-15.8-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202340548" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-40548</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-40548" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40548" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-40548" ref_url="https://www.suse.com/security/cve/CVE-2023-40548" source="SUSE CVE"/>
		<reference ref_id="ESSA-2025:0001" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1368-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1461-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1462-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20136-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021195.html" source="SUSE-SU"/>
    <description>
    A buffer overflow was found in Shim in the 32-bit system. The overflow happens due to an addition operation involving a user-controlled value parsed from the PE binary being used by Shim. This value is further used for memory allocation operations, leading to a heap-based buffer overflow. This flaw causes memory corruption and can lead to a crash or data integrity issues during the boot phase.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-22"/>
	<updated date="2025-06-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-40548/">CVE-2023-40548 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40548">CVE-2023-40548 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215100">SUSE bug 1215100</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009960781" comment="mokutil-15.8-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960782" comment="shim-ia32-15.8-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960783" comment="shim-x64-15.8-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202340549" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-40549</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-40549" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40549" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-40549" ref_url="https://www.suse.com/security/cve/CVE-2023-40549" source="SUSE CVE"/>
		<reference ref_id="ESSA-2025:0001" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1368-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1461-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1462-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20136-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021195.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds read flaw was found in Shim due to the lack of proper boundary verification during the load of a PE binary. This flaw allows an attacker to load a crafted PE binary, triggering the issue and crashing Shim, resulting in a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-22"/>
	<updated date="2025-06-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-40549/">CVE-2023-40549 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40549">CVE-2023-40549 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215101">SUSE bug 1215101</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009960781" comment="mokutil-15.8-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960782" comment="shim-ia32-15.8-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960783" comment="shim-x64-15.8-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234055" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4055</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4055" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4055" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4055" ref_url="https://www.suse.com/security/cve/CVE-2023-4055" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3161-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3162-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015804.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    When the number of cookies per domain was exceeded in `document.cookie`, the actual cookie jar sent to the host was no longer consistent with expected cookie jar state. This could have caused requests to be sent with some cookies missing. This vulnerability affects Firefox &lt; 116, Firefox ESR &lt; 102.14, and Firefox ESR &lt; 115.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4055/">CVE-2023-4055 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4055">CVE-2023-4055 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213746">SUSE bug 1213746</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830327" comment="firefox-102.14.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830328" comment="thunderbird-102.14.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202340550" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-40550</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-40550" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40550" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-40550" ref_url="https://www.suse.com/security/cve/CVE-2023-40550" source="SUSE CVE"/>
		<reference ref_id="ESSA-2025:0001" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1368-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1461-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1462-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20136-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021195.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds read flaw was found in Shim when it tried to validate the SBAT information. This issue may expose sensitive data during the system's boot phase.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-22"/>
	<updated date="2025-06-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-40550/">CVE-2023-40550 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40550">CVE-2023-40550 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215102">SUSE bug 1215102</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009960781" comment="mokutil-15.8-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960782" comment="shim-ia32-15.8-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960783" comment="shim-x64-15.8-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202340551" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-40551</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-40551" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40551" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-40551" ref_url="https://www.suse.com/security/cve/CVE-2023-40551" source="SUSE CVE"/>
		<reference ref_id="ESSA-2025:0001" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1368-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1461-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1462-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20136-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021195.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the MZ binary format in Shim. An out-of-bounds read may occur, leading to a crash or possible exposure of sensitive data during the system's boot phase.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-22"/>
	<updated date="2025-06-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-40551/">CVE-2023-40551 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40551">CVE-2023-40551 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215103">SUSE bug 1215103</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009960781" comment="mokutil-15.8-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960782" comment="shim-ia32-15.8-2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960783" comment="shim-x64-15.8-2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234056" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4056</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4056" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4056" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4056" ref_url="https://www.suse.com/security/cve/CVE-2023-4056" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3161-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3162-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015804.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Memory safety bugs present in Firefox 115, Firefox ESR 115.0, Firefox ESR 102.13, Thunderbird 115.0, and Thunderbird 102.13. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 116, Firefox ESR &lt; 102.14, and Firefox ESR &lt; 115.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4056/">CVE-2023-4056 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4056">CVE-2023-4056 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213746">SUSE bug 1213746</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830327" comment="firefox-102.14.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830328" comment="thunderbird-102.14.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234057" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4057</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4057" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4057" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4057" ref_url="https://www.suse.com/security/cve/CVE-2023-4057" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3161-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3162-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015804.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Memory safety bugs present in Firefox 115, Firefox ESR 115.0, and Thunderbird 115.0. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 116, Firefox ESR &lt; 115.1, and Thunderbird &lt; 115.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4057/">CVE-2023-4057 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4057">CVE-2023-4057 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213746">SUSE bug 1213746</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830327" comment="firefox-102.14.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830328" comment="thunderbird-102.14.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234128" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4128</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4128" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4128" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4128" ref_url="https://www.suse.com/security/cve/CVE-2023-4128" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3599-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3599-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3600-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3600-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3656-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3680-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3681-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031543.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3682-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3683-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3683-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3704-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3704-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016233.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3964-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016554.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** DO NOT USE THIS CVE RECORD. ConsultIDs: CVE-2023-4206, CVE-2023-4207, CVE-2023-4208.  Reason: This record is a duplicate of CVE-2023-4206, CVE-2023-4207, CVE-2023-4208. Notes: All CVE users should reference CVE-2023-4206, CVE-2023-4207, CVE-2023-4208 instead of this record. All references and descriptions in this record have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4128/">CVE-2023-4128 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4128">CVE-2023-4128 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214149">SUSE bug 1214149</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830450" comment="bpftool-3.10.0-1160.105.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830451" comment="kernel-3.10.0-1160.105.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830452" comment="kernel-abi-whitelists-3.10.0-1160.105.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830453" comment="kernel-debug-3.10.0-1160.105.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830456" comment="kernel-doc-3.10.0-1160.105.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830457" comment="kernel-headers-3.10.0-1160.105.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830458" comment="kernel-tools-3.10.0-1160.105.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830459" comment="kernel-tools-libs-3.10.0-1160.105.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830461" comment="perf-3.10.0-1160.105.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830462" comment="python-perf-3.10.0-1160.105.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234206" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4206</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4206" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4206" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4206" ref_url="https://www.suse.com/security/cve/CVE-2023-4206" source="SUSE CVE"/>
    <description>
    A use-after-free vulnerability in the Linux kernel's net/sched: cls_route component can be exploited to achieve local privilege escalation.

When route4_change() is called on an existing filter, the whole tcf_result struct is always copied into the new instance of the filter. This causes a problem when updating a filter bound to a class, as tcf_unbind_filter() is always called on the old instance in the success path, decreasing filter_cnt of the still referenced class and allowing it to be deleted, leading to a use-after-free.

We recommend upgrading past commit b80b829e9e2c1b3f7aae34855e04d8f6ecaf13c8.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4206/">CVE-2023-4206 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4206">CVE-2023-4206 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215110">SUSE bug 1215110</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830450" comment="bpftool-3.10.0-1160.105.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830451" comment="kernel-3.10.0-1160.105.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830452" comment="kernel-abi-whitelists-3.10.0-1160.105.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830453" comment="kernel-debug-3.10.0-1160.105.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830456" comment="kernel-doc-3.10.0-1160.105.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830457" comment="kernel-headers-3.10.0-1160.105.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830458" comment="kernel-tools-3.10.0-1160.105.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830459" comment="kernel-tools-libs-3.10.0-1160.105.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830461" comment="perf-3.10.0-1160.105.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830462" comment="python-perf-3.10.0-1160.105.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234207" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4207</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4207" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4207" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4207" ref_url="https://www.suse.com/security/cve/CVE-2023-4207" source="SUSE CVE"/>
    <description>
    A use-after-free vulnerability in the Linux kernel's net/sched: cls_fw component can be exploited to achieve local privilege escalation.

When fw_change() is called on an existing filter, the whole tcf_result struct is always copied into the new instance of the filter. This causes a problem when updating a filter bound to a class, as tcf_unbind_filter() is always called on the old instance in the success path, decreasing filter_cnt of the still referenced class and allowing it to be deleted, leading to a use-after-free.

We recommend upgrading past commit 76e42ae831991c828cffa8c37736ebfb831ad5ec.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4207/">CVE-2023-4207 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4207">CVE-2023-4207 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215113">SUSE bug 1215113</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830450" comment="bpftool-3.10.0-1160.105.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830451" comment="kernel-3.10.0-1160.105.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830452" comment="kernel-abi-whitelists-3.10.0-1160.105.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830453" comment="kernel-debug-3.10.0-1160.105.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830456" comment="kernel-doc-3.10.0-1160.105.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830457" comment="kernel-headers-3.10.0-1160.105.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830458" comment="kernel-tools-3.10.0-1160.105.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830459" comment="kernel-tools-libs-3.10.0-1160.105.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830461" comment="perf-3.10.0-1160.105.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830462" comment="python-perf-3.10.0-1160.105.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234208" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4208</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4208" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4208" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4208" ref_url="https://www.suse.com/security/cve/CVE-2023-4208" source="SUSE CVE"/>
    <description>
    A use-after-free vulnerability in the Linux kernel's net/sched: cls_u32 component can be exploited to achieve local privilege escalation.

When u32_change() is called on an existing filter, the whole tcf_result struct is always copied into the new instance of the filter. This causes a problem when updating a filter bound to a class, as tcf_unbind_filter() is always called on the old instance in the success path, decreasing filter_cnt of the still referenced class and allowing it to be deleted, leading to a use-after-free.

We recommend upgrading past commit 3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4208/">CVE-2023-4208 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4208">CVE-2023-4208 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215114">SUSE bug 1215114</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830450" comment="bpftool-3.10.0-1160.105.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830451" comment="kernel-3.10.0-1160.105.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830452" comment="kernel-abi-whitelists-3.10.0-1160.105.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830453" comment="kernel-debug-3.10.0-1160.105.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830456" comment="kernel-doc-3.10.0-1160.105.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830457" comment="kernel-headers-3.10.0-1160.105.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830458" comment="kernel-tools-3.10.0-1160.105.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830459" comment="kernel-tools-libs-3.10.0-1160.105.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830461" comment="perf-3.10.0-1160.105.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830462" comment="python-perf-3.10.0-1160.105.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202342753" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-42753</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-42753" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42753" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-42753" ref_url="https://www.suse.com/security/cve/CVE-2023-42753" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4072-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4095-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1181-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1236-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1246-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1257-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1299-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1312-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03626-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
    <description>
    An array indexing vulnerability was found in the netfilter subsystem of the Linux kernel. A missing macro could lead to a miscalculation of the `h-&gt;nets` array offset, providing attackers with the primitive to arbitrarily increment/decrement a memory buffer out-of-bound. This issue may allow a local user to crash the system or potentially escalate their privileges on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-26"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-42753/">CVE-2023-42753 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42753">CVE-2023-42753 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215150">SUSE bug 1215150</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218613">SUSE bug 1218613</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009844447" comment="bpftool-3.10.0-1160.108.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844448" comment="kernel-3.10.0-1160.108.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844449" comment="kernel-abi-whitelists-3.10.0-1160.108.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844450" comment="kernel-debug-3.10.0-1160.108.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844453" comment="kernel-doc-3.10.0-1160.108.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844454" comment="kernel-headers-3.10.0-1160.108.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844455" comment="kernel-tools-3.10.0-1160.108.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844456" comment="kernel-tools-libs-3.10.0-1160.108.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844458" comment="perf-3.10.0-1160.108.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844459" comment="python-perf-3.10.0-1160.108.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202343758" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-43758</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-43758" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43758" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-43758" ref_url="https://www.suse.com/security/cve/CVE-2023-43758" source="SUSE CVE"/>
    <description>
    Improper input validation in UEFI firmware for some Intel(R) processors may allow a privileged user to potentially enable escalation of privilege via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-31"/>
	<updated date="2026-01-31"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-43758/">CVE-2023-43758 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-43758">CVE-2023-43758 at NVD</cve>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040954" comment="microcode_ctl-2.1-73.23.el7_9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234408" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4408</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4408" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4408" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4408" ref_url="https://www.suse.com/security/cve/CVE-2023-4408" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0590-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1982-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2033-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035606.html" source="SUSE-SU"/>
    <description>
    The DNS message parsing code in `named` includes a section whose computational complexity is overly high. It does not cause problems for typical DNS traffic, but crafted queries and responses may cause excessive CPU load on the affected `named` instance by exploiting this flaw. This issue affects both authoritative servers and recursive resolvers.
This issue affects BIND 9 versions 9.0.0 through 9.16.45, 9.18.0 through 9.18.21, 9.19.0 through 9.19.19, 9.9.3-S1 through 9.11.37-S1, 9.16.8-S1 through 9.16.45-S1, and 9.18.11-S1 through 9.18.21-S1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-4408/">CVE-2023-4408 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-4408">CVE-2023-4408 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219823">SUSE bug 1219823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219851">SUSE bug 1219851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221586">SUSE bug 1221586</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009865880" comment="bind-9.11.4-26.P2.el7_9.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865881" comment="bind-chroot-9.11.4-26.P2.el7_9.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865882" comment="bind-devel-9.11.4-26.P2.el7_9.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865883" comment="bind-dyndb-ldap-11.1-7.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865884" comment="bind-export-devel-9.11.4-26.P2.el7_9.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865885" comment="bind-export-libs-9.11.4-26.P2.el7_9.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865886" comment="bind-libs-9.11.4-26.P2.el7_9.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865887" comment="bind-libs-lite-9.11.4-26.P2.el7_9.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865888" comment="bind-license-9.11.4-26.P2.el7_9.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865889" comment="bind-lite-devel-9.11.4-26.P2.el7_9.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865890" comment="bind-pkcs11-9.11.4-26.P2.el7_9.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865891" comment="bind-pkcs11-devel-9.11.4-26.P2.el7_9.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865892" comment="bind-pkcs11-libs-9.11.4-26.P2.el7_9.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865893" comment="bind-pkcs11-utils-9.11.4-26.P2.el7_9.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865894" comment="bind-sdb-9.11.4-26.P2.el7_9.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865895" comment="bind-sdb-chroot-9.11.4-26.P2.el7_9.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865896" comment="bind-utils-9.11.4-26.P2.el7_9.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865897" comment="dhclient-4.2.5-83.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865898" comment="dhcp-4.2.5-83.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865899" comment="dhcp-common-4.2.5-83.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865900" comment="dhcp-devel-4.2.5-83.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865901" comment="dhcp-libs-4.2.5-83.el7_9.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202344271" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-44271</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-44271" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44271" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-44271" ref_url="https://www.suse.com/security/cve/CVE-2023-44271" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017271.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Pillow before 10.0.0. It is a Denial of Service that uncontrollably allocates memory to process a given task, potentially causing a service to crash by having it run out of memory. This occurs for truetype in ImageFont when textlength in an ImageDraw instance operates on a long text argument.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-06"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-44271/">CVE-2023-44271 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-44271">CVE-2023-44271 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216894">SUSE bug 1216894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009849764" comment="python-pillow-2.0.0-24.gitd1c6db8.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849765" comment="python-pillow-devel-2.0.0-24.gitd1c6db8.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849766" comment="python-pillow-doc-2.0.0-24.gitd1c6db8.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849767" comment="python-pillow-qt-2.0.0-24.gitd1c6db8.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849768" comment="python-pillow-sane-2.0.0-24.gitd1c6db8.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849769" comment="python-pillow-tk-2.0.0-24.gitd1c6db8.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202344446" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-44446</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-44446" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44446" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-44446" ref_url="https://www.suse.com/security/cve/CVE-2023-44446" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0005-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0780-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-March/034548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018110.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:0305-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/73CSYYN6KCRAUIBATMXYYKQT4I5PVKDJ/" source="SUSE-SU"/>
    <description>
    GStreamer MXF File Parsing Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GStreamer. Interaction with this library is required to exploit this vulnerability but attack vectors may vary depending on the implementation.

The specific flaw exists within the parsing of MXF video files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-22299.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-44446/">CVE-2023-44446 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-44446">CVE-2023-44446 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217213">SUSE bug 1217213</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830547" comment="gstreamer-plugins-bad-free-0.10.23-24.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830548" comment="gstreamer-plugins-bad-free-devel-0.10.23-24.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830549" comment="gstreamer-plugins-bad-free-devel-docs-0.10.23-24.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830520" comment="gstreamer1-plugins-bad-free-1.10.4-4.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830521" comment="gstreamer1-plugins-bad-free-devel-1.10.4-4.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830522" comment="gstreamer1-plugins-bad-free-gtk-1.10.4-4.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202344488" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-44488</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-44488" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44488" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-44488" ref_url="https://www.suse.com/security/cve/CVE-2023-44488" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2409-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035913.html" source="SUSE-SU"/>
    <description>
    VP9 in libvpx before 1.13.1 mishandles widths, leading to a crash related to encoding.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-44488/">CVE-2023-44488 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-44488">CVE-2023-44488 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216879">SUSE bug 1216879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217559">SUSE bug 1217559</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830416" comment="firefox-115.4.0-1.el7_9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234573" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4573</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4573" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4573" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4573" ref_url="https://www.suse.com/security/cve/CVE-2023-4573" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016188.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    When receiving rendering data over IPC `mStream` could have been destroyed when initialized, which could have led to a use-after-free causing a potentially exploitable crash. This vulnerability affects Firefox &lt; 117, Firefox ESR &lt; 102.15, Firefox ESR &lt; 115.2, Thunderbird &lt; 102.15, and Thunderbird &lt; 115.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4573/">CVE-2023-4573 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4573">CVE-2023-4573 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214606">SUSE bug 1214606</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830350" comment="firefox-102.15.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830349" comment="thunderbird-102.15.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234574" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4574</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4574" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4574" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4574" ref_url="https://www.suse.com/security/cve/CVE-2023-4574" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016188.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    When creating a callback over IPC for showing the Color Picker window, multiple of the same callbacks could have been created at a time and eventually all simultaneously destroyed as soon as one of the callbacks finished. This could have led to a use-after-free causing a potentially exploitable crash. This vulnerability affects Firefox &lt; 117, Firefox ESR &lt; 102.15, Firefox ESR &lt; 115.2, Thunderbird &lt; 102.15, and Thunderbird &lt; 115.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4574/">CVE-2023-4574 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4574">CVE-2023-4574 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214606">SUSE bug 1214606</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830350" comment="firefox-102.15.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830349" comment="thunderbird-102.15.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234575" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4575</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4575" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4575" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4575" ref_url="https://www.suse.com/security/cve/CVE-2023-4575" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016188.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    When creating a callback over IPC for showing the File Picker window, multiple of the same callbacks could have been created at a time and eventually all simultaneously destroyed as soon as one of the callbacks finished. This could have led to a use-after-free causing a potentially exploitable crash. This vulnerability affects Firefox &lt; 117, Firefox ESR &lt; 102.15, Firefox ESR &lt; 115.2, Thunderbird &lt; 102.15, and Thunderbird &lt; 115.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4575/">CVE-2023-4575 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4575">CVE-2023-4575 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214606">SUSE bug 1214606</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830350" comment="firefox-102.15.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830349" comment="thunderbird-102.15.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234577" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4577</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4577" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4577" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4577" ref_url="https://www.suse.com/security/cve/CVE-2023-4577" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016188.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    When `UpdateRegExpStatics` attempted to access `initialStringHeap` it could already have been garbage collected prior to entering the function, which could potentially have led to an exploitable crash. This vulnerability affects Firefox &lt; 117, Firefox ESR &lt; 115.2, and Thunderbird &lt; 115.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4577/">CVE-2023-4577 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4577">CVE-2023-4577 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214606">SUSE bug 1214606</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830350" comment="firefox-102.15.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830349" comment="thunderbird-102.15.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234578" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4578</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4578" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4578" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4578" ref_url="https://www.suse.com/security/cve/CVE-2023-4578" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016188.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    When calling `JS::CheckRegExpSyntax` a Syntax Error could have been set which would end in calling `convertToRuntimeErrorAndClear`. A path in the function could attempt to allocate memory when none is available which would have caused a newly created Out of Memory exception to be mishandled as a Syntax Error. This vulnerability affects Firefox &lt; 117, Firefox ESR &lt; 115.2, and Thunderbird &lt; 115.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4578/">CVE-2023-4578 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4578">CVE-2023-4578 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214606">SUSE bug 1214606</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830350" comment="firefox-102.15.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830349" comment="thunderbird-102.15.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234580" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4580</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4580" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4580" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4580" ref_url="https://www.suse.com/security/cve/CVE-2023-4580" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016188.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Push notifications stored on disk in private browsing mode were not being encrypted potentially allowing the leak of sensitive information. This vulnerability affects Firefox &lt; 117, Firefox ESR &lt; 115.2, and Thunderbird &lt; 115.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4580/">CVE-2023-4580 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4580">CVE-2023-4580 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214606">SUSE bug 1214606</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830350" comment="firefox-102.15.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830349" comment="thunderbird-102.15.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234581" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4581</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4581" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4581" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4581" ref_url="https://www.suse.com/security/cve/CVE-2023-4581" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016188.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Excel `.xll` add-in files did not have a blocklist entry in Firefox's executable blocklist which allowed them to be downloaded without any warning of their potential harm. This vulnerability affects Firefox &lt; 117, Firefox ESR &lt; 102.15, Firefox ESR &lt; 115.2, Thunderbird &lt; 102.15, and Thunderbird &lt; 115.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4581/">CVE-2023-4581 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4581">CVE-2023-4581 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214606">SUSE bug 1214606</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830350" comment="firefox-102.15.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830349" comment="thunderbird-102.15.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234583" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4583</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4583" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4583" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4583" ref_url="https://www.suse.com/security/cve/CVE-2023-4583" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016188.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    When checking if the Browsing Context had been discarded in `HttpBaseChannel`, if the load group was not available then it was assumed to have already been discarded which was not always the case for private channels after the private session had ended. This vulnerability affects Firefox &lt; 117, Firefox ESR &lt; 115.2, and Thunderbird &lt; 115.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4583/">CVE-2023-4583 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4583">CVE-2023-4583 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214606">SUSE bug 1214606</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830350" comment="firefox-102.15.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830349" comment="thunderbird-102.15.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234584" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4584</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4584" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4584" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4584" ref_url="https://www.suse.com/security/cve/CVE-2023-4584" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016188.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Memory safety bugs present in Firefox 116, Firefox ESR 102.14, Firefox ESR 115.1, Thunderbird 102.14, and Thunderbird 115.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 117, Firefox ESR &lt; 102.15, Firefox ESR &lt; 115.2, Thunderbird &lt; 102.15, and Thunderbird &lt; 115.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4584/">CVE-2023-4584 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4584">CVE-2023-4584 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214606">SUSE bug 1214606</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830350" comment="firefox-102.15.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830349" comment="thunderbird-102.15.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234585" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4585</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4585" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4585" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4585" ref_url="https://www.suse.com/security/cve/CVE-2023-4585" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016188.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Memory safety bugs present in Firefox 116, Firefox ESR 115.1, and Thunderbird 115.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 117, Firefox ESR &lt; 115.2, and Thunderbird &lt; 115.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4585/">CVE-2023-4585 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4585">CVE-2023-4585 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214606">SUSE bug 1214606</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830350" comment="firefox-102.15.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830349" comment="thunderbird-102.15.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202345871" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-45871</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-45871" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45871" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-45871" ref_url="https://www.suse.com/security/cve/CVE-2023-45871" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4733-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4734-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4883-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017435.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in drivers/net/ethernet/intel/igb/igb_main.c in the IGB driver in the Linux kernel before 6.5.3. A buffer size may not be adequate for frames larger than the MTU.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-22"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-45871/">CVE-2023-45871 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45871">CVE-2023-45871 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216259">SUSE bug 1216259</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009851792" comment="bpftool-3.10.0-1160.114.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851793" comment="kernel-3.10.0-1160.114.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851794" comment="kernel-abi-whitelists-3.10.0-1160.114.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851795" comment="kernel-debug-3.10.0-1160.114.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851798" comment="kernel-doc-3.10.0-1160.114.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851799" comment="kernel-headers-3.10.0-1160.114.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851800" comment="kernel-tools-3.10.0-1160.114.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851801" comment="kernel-tools-libs-3.10.0-1160.114.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851803" comment="perf-3.10.0-1160.114.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851804" comment="python-perf-3.10.0-1160.114.2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234622" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4622</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4622" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4622" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4622" ref_url="https://www.suse.com/security/cve/CVE-2023-4622" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4072-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4095-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4347-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4795-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017351.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017359.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017358.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017418.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4863-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4866-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017423.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability in the Linux kernel's af_unix component can be exploited to achieve local privilege escalation.

The unix_stream_sendpage() function tries to add data to the last skb in the peer's recv queue without locking the queue. Thus there is a race where unix_stream_sendpage() could access an skb locklessly that is being released by garbage collection, resulting in use-after-free.

We recommend upgrading past commit 790c2f9d15b594350ae9bca7b236f2b1859de02c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-02"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4622/">CVE-2023-4622 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4622">CVE-2023-4622 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215117">SUSE bug 1215117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215442">SUSE bug 1215442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217531">SUSE bug 1217531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219699">SUSE bug 1219699</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009858640" comment="bpftool-3.10.0-1160.118.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858641" comment="kernel-3.10.0-1160.118.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858642" comment="kernel-abi-whitelists-3.10.0-1160.118.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858643" comment="kernel-debug-3.10.0-1160.118.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858646" comment="kernel-doc-3.10.0-1160.118.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858647" comment="kernel-headers-3.10.0-1160.118.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858648" comment="kernel-tools-3.10.0-1160.118.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858649" comment="kernel-tools-libs-3.10.0-1160.118.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858651" comment="perf-3.10.0-1160.118.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858652" comment="python-perf-3.10.0-1160.118.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234623" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4623</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4623" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4623" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4623" ref_url="https://www.suse.com/security/cve/CVE-2023-4623" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4072-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4095-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4347-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032577.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability in the Linux kernel's net/sched: sch_hfsc (HFSC qdisc traffic control) component can be exploited to achieve local privilege escalation.

If a class with a link-sharing curve (i.e. with the HFSC_FSC flag set) has a parent without a link-sharing curve, then init_vf() will call vttree_insert() on the parent, but vttree_remove() will be skipped in update_vf(). This leaves a dangling pointer that can cause a use-after-free.

We recommend upgrading past commit b3d26c5702c7d6c45456326e56d2ccf3f103e60f.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-02"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4623/">CVE-2023-4623 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4623">CVE-2023-4623 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215115">SUSE bug 1215115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215440">SUSE bug 1215440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217444">SUSE bug 1217444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217531">SUSE bug 1217531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219698">SUSE bug 1219698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221578">SUSE bug 1221578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221598">SUSE bug 1221598</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009858640" comment="bpftool-3.10.0-1160.118.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858641" comment="kernel-3.10.0-1160.118.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858642" comment="kernel-abi-whitelists-3.10.0-1160.118.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858643" comment="kernel-debug-3.10.0-1160.118.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858646" comment="kernel-doc-3.10.0-1160.118.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858647" comment="kernel-headers-3.10.0-1160.118.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858648" comment="kernel-tools-3.10.0-1160.118.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858649" comment="kernel-tools-libs-3.10.0-1160.118.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858651" comment="perf-3.10.0-1160.118.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858652" comment="python-perf-3.10.0-1160.118.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202346724" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-46724</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-46724" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46724" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-46724" ref_url="https://www.suse.com/security/cve/CVE-2023-46724" source="SUSE CVE"/>
		<reference ref_id="GHSA-73m6-jm96-c6r3" ref_url="https://github.com/squid-cache/squid/security/advisories//GHSA-73m6-jm96-c6r3" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017008.html" source="SUSE-SU"/>
    <description>
    Squid is a caching proxy for the Web. Due to an Improper Validation of Specified Index bug, Squid versions 3.3.0.1 through 5.9 and 6.0 prior to 6.4 compiled using `--with-openssl` are vulnerable to a Denial of Service attack against SSL Certificate validation. This problem allows a remote server to perform Denial of Service against Squid Proxy by initiating a TLS Handshake with a specially crafted SSL Certificate in a server certificate chain. This attack is limited to HTTPS and SSL-Bump. This bug is fixed in Squid version 6.4. In addition, patches addressing this problem for the stable releases can be found in Squid's patch archives. Those who you use a prepackaged version of Squid should refer to the package vendor for availability information on updated packages.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-13"/>
	<updated date="2025-07-08"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46724/">CVE-2023-46724 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46724">CVE-2023-46724 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216803">SUSE bug 1216803</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009854317" comment="squid-3.5.20-17.el7_9.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009854318" comment="squid-migration-script-3.5.20-17.el7_9.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009854319" comment="squid-sysvinit-3.5.20-17.el7_9.10 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202346728" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-46728</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-46728" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46728" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-46728" ref_url="https://www.suse.com/security/cve/CVE-2023-46728" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017237.html" source="SUSE-SU"/>
    <description>
    Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. Due to a NULL pointer dereference bug Squid is vulnerable to a Denial of Service attack against Squid's Gopher gateway. The gopher protocol is always available and enabled in Squid prior to Squid 6.0.1. Responses triggering this bug are possible to be received from any gopher server, even those without malicious intent. Gopher support has been removed in Squid version 6.0.1. Users are advised to upgrade. Users unable to upgrade should reject all gopher URL requests.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-13"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46728/">CVE-2023-46728 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46728">CVE-2023-46728 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216926">SUSE bug 1216926</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009854317" comment="squid-3.5.20-17.el7_9.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009854318" comment="squid-migration-script-3.5.20-17.el7_9.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009854319" comment="squid-sysvinit-3.5.20-17.el7_9.10 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202346847" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-46847</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-46847" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46847" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-46847" ref_url="https://www.suse.com/security/cve/CVE-2023-46847" source="SUSE CVE"/>
		<reference ref_id="GHSA-phqj-m8gv-cq4g" ref_url="https://github.com/squid-cache/squid/security/advisories//GHSA-phqj-m8gv-cq4g" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017008.html" source="SUSE-SU"/>
    <description>
    Squid is vulnerable to a Denial of Service,  where a remote attacker can perform buffer overflow attack by writing up to 2 MB of arbitrary data to heap memory when Squid is configured to accept HTTP Digest Authentication.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46847/">CVE-2023-46847 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46847">CVE-2023-46847 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216495">SUSE bug 1216495</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830427" comment="squid-3.5.20-17.el7_9.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830428" comment="squid-migration-script-3.5.20-17.el7_9.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830429" comment="squid-sysvinit-3.5.20-17.el7_9.9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234727" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4727</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4727" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4727" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4727" ref_url="https://www.suse.com/security/cve/CVE-2023-4727" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:4222" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000001.html" source="SUSE-SU"/>
    <description>
    A flaw was found in dogtag-pki and pki-core. The token authentication scheme can be bypassed with a LDAP injection. By passing the query string parameter sessionID=*, an attacker can authenticate with an existing session saved in the LDAP directory server, which may lead to escalation of privilege.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-16"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4727/">CVE-2023-4727 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-4727">CVE-2023-4727 at NVD</cve>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009873474" comment="pki-base-10.5.18-32.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009873475" comment="pki-base-java-10.5.18-32.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009873476" comment="pki-ca-10.5.18-32.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009873477" comment="pki-javadoc-10.5.18-32.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009873478" comment="pki-kra-10.5.18-32.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009873479" comment="pki-server-10.5.18-32.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009873480" comment="pki-symkey-10.5.18-32.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009873481" comment="pki-tools-10.5.18-32.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234863" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4863</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4863" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4863" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4863" ref_url="https://www.suse.com/security/cve/CVE-2023-4863" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3610-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3829-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031736.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2023:0246-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MR7EQOG2DAHINLCMYHZGRM66IUNSTTSW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2023:0247-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/452ZGDR435PX435CLL4M7OFR4DCKZZWI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2023:0278-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5SOOP74GTYPZCPPWK473Q6QVJGSGCJQL/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Heap buffer overflow in libwebp in Google Chrome prior to 116.0.5845.187 and libwebp 1.3.2 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: Critical)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4863/">CVE-2023-4863 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4863">CVE-2023-4863 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215231">SUSE bug 1215231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217115">SUSE bug 1217115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217117">SUSE bug 1217117</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830352" comment="firefox-102.15.1-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830351" comment="thunderbird-102.15.1-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234921" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4921</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4921" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4921" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4921" ref_url="https://www.suse.com/security/cve/CVE-2023-4921" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4072-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4095-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4347-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0622-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0666-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018072.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability in the Linux kernel's net/sched: sch_qfq component can be exploited to achieve local privilege escalation.

When the plug qdisc is used as a class of the qfq qdisc, sending network packets triggers use-after-free in qfq_dequeue() due to the incorrect .peek handler of sch_plug and lack of error checking in agg_dequeue().

We recommend upgrading past commit 8fc134fee27f2263988ae38920bc03da416b03d8.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-22"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4921/">CVE-2023-4921 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4921">CVE-2023-4921 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215275">SUSE bug 1215275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215300">SUSE bug 1215300</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217444">SUSE bug 1217444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217531">SUSE bug 1217531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220906">SUSE bug 1220906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223091">SUSE bug 1223091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224418">SUSE bug 1224418</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009851792" comment="bpftool-3.10.0-1160.114.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851793" comment="kernel-3.10.0-1160.114.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851794" comment="kernel-abi-whitelists-3.10.0-1160.114.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851795" comment="kernel-debug-3.10.0-1160.114.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851798" comment="kernel-doc-3.10.0-1160.114.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851799" comment="kernel-headers-3.10.0-1160.114.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851800" comment="kernel-tools-3.10.0-1160.114.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851801" comment="kernel-tools-libs-3.10.0-1160.114.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851803" comment="perf-3.10.0-1160.114.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851804" comment="python-perf-3.10.0-1160.114.2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202349285" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-49285</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-49285" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49285" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-49285" ref_url="https://www.suse.com/security/cve/CVE-2023-49285" source="SUSE CVE"/>
		<reference ref_id="GHSA-8w9r-p88v-mmx9" ref_url="https://github.com/squid-cache/squid/security/advisories//GHSA-8w9r-p88v-mmx9" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017368.html" source="SUSE-SU"/>
    <description>
    Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. Due to a Buffer Overread bug Squid is vulnerable to a Denial of Service attack against Squid HTTP Message processing. This bug is fixed by Squid version 6.5. Users are advised to upgrade. There are no known workarounds for this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-13"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-49285/">CVE-2023-49285 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49285">CVE-2023-49285 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217813">SUSE bug 1217813</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009854317" comment="squid-3.5.20-17.el7_9.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009854318" comment="squid-migration-script-3.5.20-17.el7_9.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009854319" comment="squid-sysvinit-3.5.20-17.el7_9.10 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202349286" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-49286</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-49286" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49286" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-49286" ref_url="https://www.suse.com/security/cve/CVE-2023-49286" source="SUSE CVE"/>
		<reference ref_id="GHSA-xggx-9329-3c27" ref_url="https://github.com/squid-cache/squid/security/advisories//GHSA-xggx-9329-3c27" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017368.html" source="SUSE-SU"/>
    <description>
    Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. Due to an Incorrect Check of Function Return Value bug Squid is vulnerable to a Denial of Service attack against its Helper process management. This bug is fixed by Squid version 6.5. Users are advised to upgrade. There are no known workarounds for this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-13"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-49286/">CVE-2023-49286 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49286">CVE-2023-49286 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217815">SUSE bug 1217815</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009854317" comment="squid-3.5.20-17.el7_9.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009854318" comment="squid-migration-script-3.5.20-17.el7_9.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009854319" comment="squid-sysvinit-3.5.20-17.el7_9.10 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202350269" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-50269</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-50269" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50269" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-50269" ref_url="https://www.suse.com/security/cve/CVE-2023-50269" source="SUSE CVE"/>
		<reference ref_id="GHSA-wgq4-4cfg-c4x3" ref_url="https://github.com/squid-cache/squid/security/advisories//GHSA-wgq4-4cfg-c4x3" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017906.html" source="SUSE-SU"/>
    <description>
    Squid is a caching proxy for the Web. Due to an Uncontrolled Recursion bug in versions 2.6 through 2.7.STABLE9, versions 3.1 through 5.9, and versions 6.0.1 through 6.5, Squid may be vulnerable to a Denial of Service attack against HTTP Request parsing. This problem allows a remote client to perform Denial of Service attack by sending a large X-Forwarded-For header when the follow_x_forwarded_for feature is configured. This bug is fixed by Squid version 6.6. In addition, patches addressing this problem for the stable releases can be found in Squid's patch archives.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-13"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-50269/">CVE-2023-50269 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50269">CVE-2023-50269 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217654">SUSE bug 1217654</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009854317" comment="squid-3.5.20-17.el7_9.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009854318" comment="squid-migration-script-3.5.20-17.el7_9.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009854319" comment="squid-sysvinit-3.5.20-17.el7_9.10 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202350387" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-50387</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-50387" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50387" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-50387" ref_url="https://www.suse.com/security/cve/CVE-2023-50387" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:11003" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0590-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1982-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1991-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1991-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2033-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021209.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:0048-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KZPNQJJ7XX3KPQTYPFVQXAGEDZZNY73R/" source="SUSE-SU"/>
    <description>
    Certain DNSSEC aspects of the DNS protocol (in RFC 4033, 4034, 4035, 6840, and related RFCs) allow remote attackers to cause a denial of service (CPU consumption) via one or more DNSSEC responses, aka the "KeyTrap" issue. One of the concerns is that, when there is a zone with many DNSKEY and RRSIG records, the protocol specification implies that an algorithm must evaluate all combinations of DNSKEY and RRSIG records.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-06-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-50387/">CVE-2023-50387 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50387">CVE-2023-50387 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219823">SUSE bug 1219823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220717">SUSE bug 1220717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221586">SUSE bug 1221586</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009865880" comment="bind-9.11.4-26.P2.el7_9.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865881" comment="bind-chroot-9.11.4-26.P2.el7_9.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865882" comment="bind-devel-9.11.4-26.P2.el7_9.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865883" comment="bind-dyndb-ldap-11.1-7.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865884" comment="bind-export-devel-9.11.4-26.P2.el7_9.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865885" comment="bind-export-libs-9.11.4-26.P2.el7_9.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865886" comment="bind-libs-9.11.4-26.P2.el7_9.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865887" comment="bind-libs-lite-9.11.4-26.P2.el7_9.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865888" comment="bind-license-9.11.4-26.P2.el7_9.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865889" comment="bind-lite-devel-9.11.4-26.P2.el7_9.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865890" comment="bind-pkcs11-9.11.4-26.P2.el7_9.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865891" comment="bind-pkcs11-devel-9.11.4-26.P2.el7_9.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865892" comment="bind-pkcs11-libs-9.11.4-26.P2.el7_9.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865893" comment="bind-pkcs11-utils-9.11.4-26.P2.el7_9.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865894" comment="bind-sdb-9.11.4-26.P2.el7_9.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865895" comment="bind-sdb-chroot-9.11.4-26.P2.el7_9.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865896" comment="bind-utils-9.11.4-26.P2.el7_9.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865897" comment="dhclient-4.2.5-83.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865898" comment="dhcp-4.2.5-83.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865899" comment="dhcp-common-4.2.5-83.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865900" comment="dhcp-devel-4.2.5-83.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865901" comment="dhcp-libs-4.2.5-83.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959700" comment="unbound-1.6.6-5.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959701" comment="unbound-devel-1.6.6-5.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959702" comment="unbound-libs-1.6.6-5.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959703" comment="unbound-python-1.6.6-5.el7_9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009865880" comment="bind-9.11.4-26.P2.el7_9.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865881" comment="bind-chroot-9.11.4-26.P2.el7_9.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865882" comment="bind-devel-9.11.4-26.P2.el7_9.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865883" comment="bind-dyndb-ldap-11.1-7.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865884" comment="bind-export-devel-9.11.4-26.P2.el7_9.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865885" comment="bind-export-libs-9.11.4-26.P2.el7_9.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865886" comment="bind-libs-9.11.4-26.P2.el7_9.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865887" comment="bind-libs-lite-9.11.4-26.P2.el7_9.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865888" comment="bind-license-9.11.4-26.P2.el7_9.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865889" comment="bind-lite-devel-9.11.4-26.P2.el7_9.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865890" comment="bind-pkcs11-9.11.4-26.P2.el7_9.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865891" comment="bind-pkcs11-devel-9.11.4-26.P2.el7_9.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865892" comment="bind-pkcs11-libs-9.11.4-26.P2.el7_9.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865893" comment="bind-pkcs11-utils-9.11.4-26.P2.el7_9.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865894" comment="bind-sdb-9.11.4-26.P2.el7_9.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865895" comment="bind-sdb-chroot-9.11.4-26.P2.el7_9.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865896" comment="bind-utils-9.11.4-26.P2.el7_9.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865897" comment="dhclient-4.2.5-83.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865898" comment="dhcp-4.2.5-83.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865899" comment="dhcp-common-4.2.5-83.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865900" comment="dhcp-devel-4.2.5-83.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865901" comment="dhcp-libs-4.2.5-83.el7_9.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202350447" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-50447</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-50447" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50447" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-50447" ref_url="https://www.suse.com/security/cve/CVE-2023-50447" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017897.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:0125-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GYSVBJPZSCRQ4QL45BINOZYP7XXBBK3C/" source="SUSE-SU"/>
    <description>
    Pillow through 10.1.0 allows PIL.ImageMath.eval Arbitrary Code Execution via the environment parameter, a different vulnerability than CVE-2022-22817 (which was about the expression parameter).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-06"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-50447/">CVE-2023-50447 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50447">CVE-2023-50447 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219048">SUSE bug 1219048</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009849770" comment="python-pillow-2.0.0-25.gitd1c6db8.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849771" comment="python-pillow-devel-2.0.0-25.gitd1c6db8.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849772" comment="python-pillow-doc-2.0.0-25.gitd1c6db8.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849773" comment="python-pillow-qt-2.0.0-25.gitd1c6db8.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849774" comment="python-pillow-sane-2.0.0-25.gitd1c6db8.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849775" comment="python-pillow-tk-2.0.0-25.gitd1c6db8.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202350761" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-50761</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-50761" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-50761" ref_url="https://www.suse.com/security/cve/CVE-2023-50761" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017601.html" source="SUSE-SU"/>
    <description>
    The signature of a digitally signed S/MIME email message may optionally specify the signature creation date and time. If present, Thunderbird did not compare the signature creation date with the message date and time, and displayed a valid signature despite a date or time mismatch. This could be used to give recipients the impression that a message was sent at a different date or time. This vulnerability affects Thunderbird &lt; 115.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-50761/">CVE-2023-50761 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50761">CVE-2023-50761 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217974">SUSE bug 1217974</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830524" comment="thunderbird-115.6.0-1.el7_9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202350762" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-50762</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-50762" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-50762" ref_url="https://www.suse.com/security/cve/CVE-2023-50762" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017601.html" source="SUSE-SU"/>
    <description>
    When processing a PGP/MIME payload that contains digitally signed text, the first paragraph of the text was never shown to the user. This is because the text was interpreted as a MIME message and the first paragraph was always treated as an email header section. A digitally signed text from a different context, such as a signed GIT commit, could be used to spoof an email message. This vulnerability affects Thunderbird &lt; 115.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-50762/">CVE-2023-50762 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50762">CVE-2023-50762 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217974">SUSE bug 1217974</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830524" comment="thunderbird-115.6.0-1.el7_9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202350868" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-50868</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-50868" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50868" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-50868" ref_url="https://www.suse.com/security/cve/CVE-2023-50868" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:11003" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0590-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1982-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1991-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1991-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2033-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021209.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:0048-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KZPNQJJ7XX3KPQTYPFVQXAGEDZZNY73R/" source="SUSE-SU"/>
    <description>
    The Closest Encloser Proof aspect of the DNS protocol (in RFC 5155 when RFC 9276 guidance is skipped) allows remote attackers to cause a denial of service (CPU consumption for SHA-1 computations) via DNSSEC responses in a random subdomain attack, aka the "NSEC3" issue. The RFC 5155 specification implies that an algorithm must perform thousands of iterations of a hash function in certain situations.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-12-24"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-50868/">CVE-2023-50868 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50868">CVE-2023-50868 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219823">SUSE bug 1219823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219826">SUSE bug 1219826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221586">SUSE bug 1221586</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009865880" comment="bind-9.11.4-26.P2.el7_9.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865881" comment="bind-chroot-9.11.4-26.P2.el7_9.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865882" comment="bind-devel-9.11.4-26.P2.el7_9.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865883" comment="bind-dyndb-ldap-11.1-7.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865884" comment="bind-export-devel-9.11.4-26.P2.el7_9.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865885" comment="bind-export-libs-9.11.4-26.P2.el7_9.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865886" comment="bind-libs-9.11.4-26.P2.el7_9.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865887" comment="bind-libs-lite-9.11.4-26.P2.el7_9.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865888" comment="bind-license-9.11.4-26.P2.el7_9.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865889" comment="bind-lite-devel-9.11.4-26.P2.el7_9.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865890" comment="bind-pkcs11-9.11.4-26.P2.el7_9.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865891" comment="bind-pkcs11-devel-9.11.4-26.P2.el7_9.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865892" comment="bind-pkcs11-libs-9.11.4-26.P2.el7_9.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865893" comment="bind-pkcs11-utils-9.11.4-26.P2.el7_9.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865894" comment="bind-sdb-9.11.4-26.P2.el7_9.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865895" comment="bind-sdb-chroot-9.11.4-26.P2.el7_9.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865896" comment="bind-utils-9.11.4-26.P2.el7_9.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865897" comment="dhclient-4.2.5-83.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865898" comment="dhcp-4.2.5-83.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865899" comment="dhcp-common-4.2.5-83.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865900" comment="dhcp-devel-4.2.5-83.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865901" comment="dhcp-libs-4.2.5-83.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959700" comment="unbound-1.6.6-5.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959701" comment="unbound-devel-1.6.6-5.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959702" comment="unbound-libs-1.6.6-5.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959703" comment="unbound-python-1.6.6-5.el7_9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009865880" comment="bind-9.11.4-26.P2.el7_9.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865881" comment="bind-chroot-9.11.4-26.P2.el7_9.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865882" comment="bind-devel-9.11.4-26.P2.el7_9.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865883" comment="bind-dyndb-ldap-11.1-7.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865884" comment="bind-export-devel-9.11.4-26.P2.el7_9.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865885" comment="bind-export-libs-9.11.4-26.P2.el7_9.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865886" comment="bind-libs-9.11.4-26.P2.el7_9.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865887" comment="bind-libs-lite-9.11.4-26.P2.el7_9.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865888" comment="bind-license-9.11.4-26.P2.el7_9.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865889" comment="bind-lite-devel-9.11.4-26.P2.el7_9.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865890" comment="bind-pkcs11-9.11.4-26.P2.el7_9.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865891" comment="bind-pkcs11-devel-9.11.4-26.P2.el7_9.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865892" comment="bind-pkcs11-libs-9.11.4-26.P2.el7_9.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865893" comment="bind-pkcs11-utils-9.11.4-26.P2.el7_9.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865894" comment="bind-sdb-9.11.4-26.P2.el7_9.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865895" comment="bind-sdb-chroot-9.11.4-26.P2.el7_9.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865896" comment="bind-utils-9.11.4-26.P2.el7_9.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865897" comment="dhclient-4.2.5-83.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865898" comment="dhcp-4.2.5-83.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865899" comment="dhcp-common-4.2.5-83.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865900" comment="dhcp-devel-4.2.5-83.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865901" comment="dhcp-libs-4.2.5-83.el7_9.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20235169" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-5169</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-5169" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5169" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-5169" ref_url="https://www.suse.com/security/cve/CVE-2023-5169" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3837-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4016-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016575.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A compromised content process could have provided malicious data in a `PathRecording` resulting in an out-of-bounds write, leading to a potentially exploitable crash in a privileged process. This vulnerability affects Firefox &lt; 118, Firefox ESR &lt; 115.3, and Thunderbird &lt; 115.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5169/">CVE-2023-5169 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5169">CVE-2023-5169 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215575">SUSE bug 1215575</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830364" comment="firefox-115.3.1-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830363" comment="thunderbird-115.3.1-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20235171" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-5171</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-5171" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5171" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-5171" ref_url="https://www.suse.com/security/cve/CVE-2023-5171" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3837-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4016-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016575.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    During Ion compilation, a Garbage Collection could have resulted in a use-after-free condition, allowing an attacker to write two NUL bytes, and cause a potentially exploitable crash. This vulnerability affects Firefox &lt; 118, Firefox ESR &lt; 115.3, and Thunderbird &lt; 115.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5171/">CVE-2023-5171 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5171">CVE-2023-5171 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215575">SUSE bug 1215575</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830364" comment="firefox-115.3.1-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830363" comment="thunderbird-115.3.1-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20235176" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-5176</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-5176" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5176" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-5176" ref_url="https://www.suse.com/security/cve/CVE-2023-5176" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3837-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4016-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016575.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Memory safety bugs present in Firefox 117, Firefox ESR 115.2, and Thunderbird 115.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 118, Firefox ESR &lt; 115.3, and Thunderbird &lt; 115.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-12-19"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5176/">CVE-2023-5176 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5176">CVE-2023-5176 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215575">SUSE bug 1215575</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830364" comment="firefox-115.3.1-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830363" comment="thunderbird-115.3.1-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20235217" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-5217</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-5217" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5217" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-5217" ref_url="https://www.suse.com/security/cve/CVE-2023-5217" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3941-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3946-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4016-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016575.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2023:0277-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XVWTK2X25FKSQAO2JO5SKRXBOHGOHPUO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2023:0297-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SA3UIF6YUP4F422WZCCPKQ6TLSBG7YAK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2023:0298-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/V5KRGLOBRAIYNFCNZH4YM2ETGNMPQEKZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2023:0365-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4PHTZYGRNV6PDZMHUALPCK2YD6IRL3XD/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2023:0366-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M45KVAFI32X55HONDKLE2FBN6GETMIUL/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Heap buffer overflow in vp8 encoding in libvpx in Google Chrome prior to 117.0.5938.132 and libvpx 1.13.1 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5217/">CVE-2023-5217 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5217">CVE-2023-5217 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215776">SUSE bug 1215776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215778">SUSE bug 1215778</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215814">SUSE bug 1215814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217559">SUSE bug 1217559</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830364" comment="firefox-115.3.1-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830363" comment="thunderbird-115.3.1-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352922" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52922</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52922" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52922" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52922" ref_url="https://www.suse.com/security/cve/CVE-2023-52922" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:2501" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000989.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:2627" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000972.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:3026" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

can: bcm: Fix UAF in bcm_proc_show()

BUG: KASAN: slab-use-after-free in bcm_proc_show+0x969/0xa80
Read of size 8 at addr ffff888155846230 by task cat/7862

CPU: 1 PID: 7862 Comm: cat Not tainted 6.5.0-rc1-00153-gc8746099c197 #230
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014
Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl+0xd5/0x150
 print_report+0xc1/0x5e0
 kasan_report+0xba/0xf0
 bcm_proc_show+0x969/0xa80
 seq_read_iter+0x4f6/0x1260
 seq_read+0x165/0x210
 proc_reg_read+0x227/0x300
 vfs_read+0x1d5/0x8d0
 ksys_read+0x11e/0x240
 do_syscall_64+0x35/0xb0
 entry_SYSCALL_64_after_hwframe+0x63/0xcd

Allocated by task 7846:
 kasan_save_stack+0x1e/0x40
 kasan_set_track+0x21/0x30
 __kasan_kmalloc+0x9e/0xa0
 bcm_sendmsg+0x264b/0x44e0
 sock_sendmsg+0xda/0x180
 ____sys_sendmsg+0x735/0x920
 ___sys_sendmsg+0x11d/0x1b0
 __sys_sendmsg+0xfa/0x1d0
 do_syscall_64+0x35/0xb0
 entry_SYSCALL_64_after_hwframe+0x63/0xcd

Freed by task 7846:
 kasan_save_stack+0x1e/0x40
 kasan_set_track+0x21/0x30
 kasan_save_free_info+0x27/0x40
 ____kasan_slab_free+0x161/0x1c0
 slab_free_freelist_hook+0x119/0x220
 __kmem_cache_free+0xb4/0x2e0
 rcu_core+0x809/0x1bd0

bcm_op is freed before procfs entry be removed in bcm_release(),
this lead to bcm_proc_show() may read the freed bcm_op.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-03-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-52922/">CVE-2023-52922 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52922">CVE-2023-52922 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233977">SUSE bug 1233977</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009969081" comment="bpftool-3.10.0-1160.133.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009969082" comment="kernel-3.10.0-1160.133.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009969083" comment="kernel-abi-whitelists-3.10.0-1160.133.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009969084" comment="kernel-debug-3.10.0-1160.133.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009969087" comment="kernel-doc-3.10.0-1160.133.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009969088" comment="kernel-headers-3.10.0-1160.133.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009969089" comment="kernel-tools-3.10.0-1160.133.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009969090" comment="kernel-tools-libs-3.10.0-1160.133.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009969092" comment="perf-3.10.0-1160.133.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009969093" comment="python-perf-3.10.0-1160.133.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353125" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53125</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53125" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53125" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53125" ref_url="https://www.suse.com/security/cve/CVE-2023-53125" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:15785" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002022.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16398" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002042.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:17161" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01966-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02173-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02262-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023783.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: usb: smsc75xx: Limit packet length to skb-&gt;len

Packet length retrieved from skb data may be larger than
the actual socket buffer length (up to 9026 bytes). In such
case the cloned skb passed up the network stack will leak
kernel memory contents.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-10-21"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53125/">CVE-2023-53125 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53125">CVE-2023-53125 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242285">SUSE bug 1242285</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010022317" comment="bpftool-3.10.0-1160.141.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022318" comment="kernel-3.10.0-1160.141.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022319" comment="kernel-abi-whitelists-3.10.0-1160.141.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022320" comment="kernel-debug-3.10.0-1160.141.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022323" comment="kernel-doc-3.10.0-1160.141.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022324" comment="kernel-headers-3.10.0-1160.141.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022325" comment="kernel-tools-3.10.0-1160.141.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022326" comment="kernel-tools-libs-3.10.0-1160.141.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022328" comment="perf-3.10.0-1160.141.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022329" comment="python-perf-3.10.0-1160.141.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353178" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53178</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53178" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53178" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53178" ref_url="https://www.suse.com/security/cve/CVE-2023-53178" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:19931" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002216.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23947" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03626-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1131-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045154.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm: fix zswap writeback race condition

The zswap writeback mechanism can cause a race condition resulting in
memory corruption, where a swapped out page gets swapped in with data that
was written to a different page.

The race unfolds like this:
1. a page with data A and swap offset X is stored in zswap
2. page A is removed off the LRU by zpool driver for writeback in
   zswap-shrink work, data for A is mapped by zpool driver
3. user space program faults and invalidates page entry A, offset X is
   considered free
4. kswapd stores page B at offset X in zswap (zswap could also be
   full, if so, page B would then be IOed to X, then skip step 5.)
5. entry A is replaced by B in tree-&gt;rbroot, this doesn't affect the
   local reference held by zswap-shrink work
6. zswap-shrink work writes back A at X, and frees zswap entry A
7. swapin of slot X brings A in memory instead of B

The fix:
Once the swap page cache has been allocated (case ZSWAP_SWAPCACHE_NEW),
zswap-shrink work just checks that the local zswap_entry reference is
still the same as the one in the tree.  If it's not the same it means that
it's either been invalidated or replaced, in both cases the writeback is
aborted because the local entry contains stale data.

Reproducer:
I originally found this by running `stress` overnight to validate my work
on the zswap writeback mechanism, it manifested after hours on my test
machine.  The key to make it happen is having zswap writebacks, so
whatever setup pumps /sys/kernel/debug/zswap/written_back_pages should do
the trick.

In order to reproduce this faster on a vm, I setup a system with ~100M of
available memory and a 500M swap file, then running `stress --vm 1
--vm-bytes 300000000 --vm-stride 4000` makes it happen in matter of tens
of minutes.  One can speed things up even more by swinging
/sys/module/zswap/parameters/max_pool_percent up and down between, say, 20
and 1; this makes it reproduce in tens of seconds.  It's crucial to set
`--vm-stride` to something other than 4096 otherwise `stress` won't
realize that memory has been corrupted because all pages would have the
same data.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-15"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53178/">CVE-2023-53178 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53178">CVE-2023-53178 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249827">SUSE bug 1249827</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010037313" comment="bpftool-3.10.0-1160.144.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037314" comment="kernel-3.10.0-1160.144.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037315" comment="kernel-abi-whitelists-3.10.0-1160.144.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037316" comment="kernel-debug-3.10.0-1160.144.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037319" comment="kernel-doc-3.10.0-1160.144.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037320" comment="kernel-headers-3.10.0-1160.144.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037321" comment="kernel-tools-3.10.0-1160.144.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037322" comment="kernel-tools-libs-3.10.0-1160.144.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037324" comment="perf-3.10.0-1160.144.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037325" comment="python-perf-3.10.0-1160.144.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353297" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53297</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53297" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53297" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53297" ref_url="https://www.suse.com/security/cve/CVE-2023-53297" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:19102" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002136.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23947" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: L2CAP: fix "bad unlock balance" in l2cap_disconnect_rsp

conn-&gt;chan_lock isn't acquired before l2cap_get_chan_by_scid,
if l2cap_get_chan_by_scid returns NULL, then 'bad unlock balance'
is triggered.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-15"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53297/">CVE-2023-53297 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53297">CVE-2023-53297 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250322">SUSE bug 1250322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250728">SUSE bug 1250728</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010037313" comment="bpftool-3.10.0-1160.144.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037314" comment="kernel-3.10.0-1160.144.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037315" comment="kernel-abi-whitelists-3.10.0-1160.144.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037316" comment="kernel-debug-3.10.0-1160.144.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037319" comment="kernel-doc-3.10.0-1160.144.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037320" comment="kernel-headers-3.10.0-1160.144.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037321" comment="kernel-tools-3.10.0-1160.144.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037322" comment="kernel-tools-libs-3.10.0-1160.144.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037324" comment="perf-3.10.0-1160.144.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037325" comment="python-perf-3.10.0-1160.144.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353305" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53305</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53305" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53305" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53305" ref_url="https://www.suse.com/security/cve/CVE-2023-53305" source="SUSE CVE"/>
		<reference ref_id="ESSA-2026:0024" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002461.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:17797" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002097.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22910" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: L2CAP: Fix use-after-free

Fix potential use-after-free in l2cap_le_command_rej.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-13"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53305/">CVE-2023-53305 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53305">CVE-2023-53305 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250049">SUSE bug 1250049</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010037040" comment="bpftool-3.10.0-1160.143.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037041" comment="kernel-3.10.0-1160.143.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037042" comment="kernel-abi-whitelists-3.10.0-1160.143.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037043" comment="kernel-debug-3.10.0-1160.143.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037046" comment="kernel-doc-3.10.0-1160.143.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037047" comment="kernel-headers-3.10.0-1160.143.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037048" comment="kernel-tools-3.10.0-1160.143.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037049" comment="kernel-tools-libs-3.10.0-1160.143.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037051" comment="perf-3.10.0-1160.143.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037052" comment="python-perf-3.10.0-1160.143.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353322" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53322</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53322" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53322" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53322" ref_url="https://www.suse.com/security/cve/CVE-2023-53322" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:23947" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: qla2xxx: Wait for io return on terminate rport

System crash due to use after free.
Current code allows terminate_rport_io to exit before making
sure all IOs has returned. For FCP-2 device, IO's can hang
on in HW because driver has not tear down the session in FW at
first sign of cable pull. When dev_loss_tmo timer pops,
terminate_rport_io is called and upper layer is about to
free various resources. Terminate_rport_io trigger qla to do
the final cleanup, but the cleanup might not be fast enough where it
leave qla still holding on to the same resource.

Wait for IO's to return to upper layer before resources are freed.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-15"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="5.4/CVSS:4.0/AV:P/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53322/">CVE-2023-53322 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53322">CVE-2023-53322 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250323">SUSE bug 1250323</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010037313" comment="bpftool-3.10.0-1160.144.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037314" comment="kernel-3.10.0-1160.144.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037315" comment="kernel-abi-whitelists-3.10.0-1160.144.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037316" comment="kernel-debug-3.10.0-1160.144.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037319" comment="kernel-doc-3.10.0-1160.144.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037320" comment="kernel-headers-3.10.0-1160.144.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037321" comment="kernel-tools-3.10.0-1160.144.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037322" comment="kernel-tools-libs-3.10.0-1160.144.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037324" comment="perf-3.10.0-1160.144.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037325" comment="python-perf-3.10.0-1160.144.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353365" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53365</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53365" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53365" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53365" ref_url="https://www.suse.com/security/cve/CVE-2023-53365" source="SUSE CVE"/>
		<reference ref_id="ESSA-2026:0024" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002461.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22910" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ip6mr: Fix skb_under_panic in ip6mr_cache_report()

skbuff: skb_under_panic: text:ffffffff88771f69 len:56 put:-4
 head:ffff88805f86a800 data:ffff887f5f86a850 tail:0x88 end:0x2c0 dev:pim6reg
 ------------[ cut here ]------------
 kernel BUG at net/core/skbuff.c:192!
 invalid opcode: 0000 [#1] PREEMPT SMP KASAN
 CPU: 2 PID: 22968 Comm: kworker/2:11 Not tainted 6.5.0-rc3-00044-g0a8db05b571a #236
 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014
 Workqueue: ipv6_addrconf addrconf_dad_work
 RIP: 0010:skb_panic+0x152/0x1d0
 Call Trace:
  &lt;TASK&gt;
  skb_push+0xc4/0xe0
  ip6mr_cache_report+0xd69/0x19b0
  reg_vif_xmit+0x406/0x690
  dev_hard_start_xmit+0x17e/0x6e0
  __dev_queue_xmit+0x2d6a/0x3d20
  vlan_dev_hard_start_xmit+0x3ab/0x5c0
  dev_hard_start_xmit+0x17e/0x6e0
  __dev_queue_xmit+0x2d6a/0x3d20
  neigh_connected_output+0x3ed/0x570
  ip6_finish_output2+0x5b5/0x1950
  ip6_finish_output+0x693/0x11c0
  ip6_output+0x24b/0x880
  NF_HOOK.constprop.0+0xfd/0x530
  ndisc_send_skb+0x9db/0x1400
  ndisc_send_rs+0x12a/0x6c0
  addrconf_dad_completed+0x3c9/0xea0
  addrconf_dad_work+0x849/0x1420
  process_one_work+0xa22/0x16e0
  worker_thread+0x679/0x10c0
  ret_from_fork+0x28/0x60
  ret_from_fork_asm+0x11/0x20

When setup a vlan device on dev pim6reg, DAD ns packet may sent on reg_vif_xmit().
reg_vif_xmit()
    ip6mr_cache_report()
        skb_push(skb, -skb_network_offset(pkt));//skb_network_offset(pkt) is 4
And skb_push declared as:
	void *skb_push(struct sk_buff *skb, unsigned int len);
		skb-&gt;data -= len;
		//0xffff88805f86a84c - 0xfffffffc = 0xffff887f5f86a850
skb-&gt;data is set to 0xffff887f5f86a850, which is invalid mem addr, lead to skb_push() fails.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-13"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53365/">CVE-2023-53365 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53365">CVE-2023-53365 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249988">SUSE bug 1249988</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010037040" comment="bpftool-3.10.0-1160.143.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037041" comment="kernel-3.10.0-1160.143.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037042" comment="kernel-abi-whitelists-3.10.0-1160.143.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037043" comment="kernel-debug-3.10.0-1160.143.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037046" comment="kernel-doc-3.10.0-1160.143.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037047" comment="kernel-headers-3.10.0-1160.143.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037048" comment="kernel-tools-3.10.0-1160.143.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037049" comment="kernel-tools-libs-3.10.0-1160.143.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037051" comment="perf-3.10.0-1160.143.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037052" comment="python-perf-3.10.0-1160.143.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353373" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53373</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53373" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53373" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53373" ref_url="https://www.suse.com/security/cve/CVE-2023-53373" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:17760" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002101.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:18297" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002123.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21063" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: seqiv - Handle EBUSY correctly

As it is seqiv only handles the special return value of EINPROGERSS,
which means that in all other cases it will free data related to the
request.

However, as the caller of seqiv may specify MAY_BACKLOG, we also need
to expect EBUSY and treat it in the same way.  Otherwise backlogged
requests will trigger a use-after-free.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-05"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53373/">CVE-2023-53373 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53373">CVE-2023-53373 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250137">SUSE bug 1250137</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010032439" comment="bpftool-3.10.0-1160.142.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032440" comment="kernel-3.10.0-1160.142.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032441" comment="kernel-abi-whitelists-3.10.0-1160.142.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032442" comment="kernel-debug-3.10.0-1160.142.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032445" comment="kernel-doc-3.10.0-1160.142.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032446" comment="kernel-headers-3.10.0-1160.142.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032447" comment="kernel-tools-3.10.0-1160.142.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032448" comment="kernel-tools-libs-3.10.0-1160.142.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032450" comment="perf-3.10.0-1160.142.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032451" comment="python-perf-3.10.0-1160.142.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20235367" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-5367</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-5367" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5367" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-5367" ref_url="https://www.suse.com/security/cve/CVE-2023-5367" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016932.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4306-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3DLU3SRCIDHQQAZA4SYMSJKDW6AWQV4B/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016985.html" source="SUSE-SU"/>
    <description>
    A out-of-bounds write flaw was found in the xorg-x11-server. This issue occurs due to an incorrect calculation of a buffer offset when copying data stored in the heap in the XIChangeDeviceProperty function in Xi/xiproperty.c and in RRChangeOutputProperty function in randr/rrproperty.c, allowing for possible escalation of privileges or denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5367/">CVE-2023-5367 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5367">CVE-2023-5367 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216135">SUSE bug 1216135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217447">SUSE bug 1217447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221590">SUSE bug 1221590</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830463" comment="tigervnc-1.8.0-26.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830464" comment="tigervnc-icons-1.8.0-26.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830465" comment="tigervnc-license-1.8.0-26.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830466" comment="tigervnc-server-1.8.0-26.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830467" comment="tigervnc-server-applet-1.8.0-26.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830468" comment="tigervnc-server-minimal-1.8.0-26.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830469" comment="tigervnc-server-module-1.8.0-26.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830418" comment="xorg-x11-server-Xdmx-1.20.4-24.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830419" comment="xorg-x11-server-Xephyr-1.20.4-24.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830420" comment="xorg-x11-server-Xnest-1.20.4-24.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830421" comment="xorg-x11-server-Xorg-1.20.4-24.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830422" comment="xorg-x11-server-Xvfb-1.20.4-24.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830423" comment="xorg-x11-server-Xwayland-1.20.4-24.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830424" comment="xorg-x11-server-common-1.20.4-24.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830425" comment="xorg-x11-server-devel-1.20.4-24.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830426" comment="xorg-x11-server-source-1.20.4-24.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353675" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53675</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53675" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53675" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53675" ref_url="https://www.suse.com/security/cve/CVE-2023-53675" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0755" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002421.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: ses: Fix possible desc_ptr out-of-bounds accesses

Sanitize possible desc_ptr out-of-bounds accesses in
ses_enclosure_data_process().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53675/">CVE-2023-53675 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53675">CVE-2023-53675 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251325">SUSE bug 1251325</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010039005" comment="bpftool-3.10.0-1160.145.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039006" comment="kernel-3.10.0-1160.145.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039007" comment="kernel-abi-whitelists-3.10.0-1160.145.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039008" comment="kernel-debug-3.10.0-1160.145.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039011" comment="kernel-doc-3.10.0-1160.145.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039012" comment="kernel-headers-3.10.0-1160.145.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039013" comment="kernel-tools-3.10.0-1160.145.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039014" comment="kernel-tools-libs-3.10.0-1160.145.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039016" comment="perf-3.10.0-1160.145.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039017" comment="python-perf-3.10.0-1160.145.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353705" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53705</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53705" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53705" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53705" ref_url="https://www.suse.com/security/cve/CVE-2023-53705" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0755" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002421.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipv6: Fix out-of-bounds access in ipv6_find_tlv()

optlen is fetched without checking whether there is more than one byte to parse.
It can lead to out-of-bounds access.

Found by InfoTeCS on behalf of Linux Verification Center
(linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53705/">CVE-2023-53705 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53705">CVE-2023-53705 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252554">SUSE bug 1252554</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010039005" comment="bpftool-3.10.0-1160.145.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039006" comment="kernel-3.10.0-1160.145.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039007" comment="kernel-abi-whitelists-3.10.0-1160.145.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039008" comment="kernel-debug-3.10.0-1160.145.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039011" comment="kernel-doc-3.10.0-1160.145.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039012" comment="kernel-headers-3.10.0-1160.145.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039013" comment="kernel-tools-3.10.0-1160.145.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039014" comment="kernel-tools-libs-3.10.0-1160.145.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039016" comment="perf-3.10.0-1160.145.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039017" comment="python-perf-3.10.0-1160.145.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20235380" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-5380</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-5380" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5380" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-5380" ref_url="https://www.suse.com/security/cve/CVE-2023-5380" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016932.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016985.html" source="SUSE-SU"/>
    <description>
    A use-after-free flaw was found in the xorg-x11-server. An X server crash may occur in a very specific and legacy configuration (a multi-screen setup with multiple protocol screens, also known as Zaphod mode) if the pointer is warped from within a window on one screen to the root window of the other screen and if the original window is destroyed followed by another window being destroyed.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-08-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-5380/">CVE-2023-5380 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5380">CVE-2023-5380 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216133">SUSE bug 1216133</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830463" comment="tigervnc-1.8.0-26.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830464" comment="tigervnc-icons-1.8.0-26.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830465" comment="tigervnc-license-1.8.0-26.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830466" comment="tigervnc-server-1.8.0-26.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830467" comment="tigervnc-server-applet-1.8.0-26.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830468" comment="tigervnc-server-minimal-1.8.0-26.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830469" comment="tigervnc-server-module-1.8.0-26.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20235388" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-5388</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-5388" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5388" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-5388" ref_url="https://www.suse.com/security/cve/CVE-2023-5388" source="SUSE CVE"/>
		<reference ref_id="SUSE-RU-2024:2564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2024:2684-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1147-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021346.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    NSS was susceptible to a timing side-channel attack when performing RSA decryption. This attack could potentially allow an attacker to recover the private data. This vulnerability affects Firefox &lt; 124, Firefox ESR &lt; 115.9, and Thunderbird &lt; 115.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-28"/>
	<updated date="2025-06-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-5388/">CVE-2023-5388 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-5388">CVE-2023-5388 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216198">SUSE bug 1216198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221327">SUSE bug 1221327</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851985" comment="thunderbird-115.9.0-1.el7_9 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009852714" comment="firefox-115.9.1-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851985" comment="thunderbird-115.9.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20235455" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-5455</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-5455" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5455" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-5455" ref_url="https://www.suse.com/security/cve/CVE-2023-5455" source="SUSE CVE"/>
    <description>
    A Cross-site request forgery vulnerability exists in ipa/session/login_password in all supported versions of IPA. This flaw allows an attacker to trick the user into submitting a request that could perform actions as the user, resulting in a loss of confidentiality and system integrity. During community penetration testing it was found that for certain HTTP end-points FreeIPA does not ensure CSRF protection. Due to implementation details one cannot use this flaw for reflection of a cookie representing already logged-in user. An attacker would always have to go through a new authentication attempt.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-24"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5455/">CVE-2023-5455 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5455">CVE-2023-5455 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830525" comment="ipa-client-4.6.8-5.el7_9.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830526" comment="ipa-client-common-4.6.8-5.el7_9.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830527" comment="ipa-common-4.6.8-5.el7_9.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830528" comment="ipa-python-compat-4.6.8-5.el7_9.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830529" comment="ipa-server-4.6.8-5.el7_9.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830530" comment="ipa-server-common-4.6.8-5.el7_9.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830531" comment="ipa-server-dns-4.6.8-5.el7_9.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830532" comment="ipa-server-trust-ad-4.6.8-5.el7_9.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830533" comment="python2-ipaclient-4.6.8-5.el7_9.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830534" comment="python2-ipalib-4.6.8-5.el7_9.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830535" comment="python2-ipaserver-4.6.8-5.el7_9.16 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20235721" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-5721</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-5721" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5721" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-5721" ref_url="https://www.suse.com/security/cve/CVE-2023-5721" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4212-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017199.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    It was possible for certain browser prompts and dialogs to be activated or dismissed unintentionally by the user due to an insufficient activation-delay. This vulnerability affects Firefox &lt; 119, Firefox ESR &lt; 115.4, and Thunderbird &lt; 115.4.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5721/">CVE-2023-5721 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5721">CVE-2023-5721 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216338">SUSE bug 1216338</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830416" comment="firefox-115.4.0-1.el7_9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20235724" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-5724</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-5724" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5724" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-5724" ref_url="https://www.suse.com/security/cve/CVE-2023-5724" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4212-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017199.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Drivers are not always robust to extremely large draw calls and in some cases this scenario could have led to a crash. This vulnerability affects Firefox &lt; 119, Firefox ESR &lt; 115.4, and Thunderbird &lt; 115.4.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-5724/">CVE-2023-5724 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5724">CVE-2023-5724 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216338">SUSE bug 1216338</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830416" comment="firefox-115.4.0-1.el7_9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20235725" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-5725</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-5725" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5725" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-5725" ref_url="https://www.suse.com/security/cve/CVE-2023-5725" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4212-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017199.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A malicious installed WebExtension could open arbitrary URLs, which under the right circumstance could be leveraged to collect sensitive user data. This vulnerability affects Firefox &lt; 119, Firefox ESR &lt; 115.4, and Thunderbird &lt; 115.4.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-5725/">CVE-2023-5725 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5725">CVE-2023-5725 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216338">SUSE bug 1216338</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830416" comment="firefox-115.4.0-1.el7_9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20235728" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-5728</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-5728" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5728" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-5728" ref_url="https://www.suse.com/security/cve/CVE-2023-5728" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4212-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017199.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    During garbage collection extra operations were performed on a object that should not be. This could have led to a potentially exploitable crash. This vulnerability affects Firefox &lt; 119, Firefox ESR &lt; 115.4, and Thunderbird &lt; 115.4.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-5728/">CVE-2023-5728 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5728">CVE-2023-5728 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216338">SUSE bug 1216338</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830416" comment="firefox-115.4.0-1.el7_9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20235730" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-5730</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-5730" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5730" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-5730" ref_url="https://www.suse.com/security/cve/CVE-2023-5730" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4212-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017199.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Memory safety bugs present in Firefox 118, Firefox ESR 115.3, and Thunderbird 115.3. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 119, Firefox ESR &lt; 115.4, and Thunderbird &lt; 115.4.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5730/">CVE-2023-5730 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5730">CVE-2023-5730 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216338">SUSE bug 1216338</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830416" comment="firefox-115.4.0-1.el7_9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20235732" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-5732</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-5732" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5732" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-5732" ref_url="https://www.suse.com/security/cve/CVE-2023-5732" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017199.html" source="SUSE-SU"/>
    <description>
    An attacker could have created a malicious link using bidirectional characters to spoof the location in the address bar when visited. This vulnerability affects Firefox &lt; 117, Firefox ESR &lt; 115.4, and Thunderbird &lt; 115.4.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-5732/">CVE-2023-5732 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5732">CVE-2023-5732 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216338">SUSE bug 1216338</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830416" comment="firefox-115.4.0-1.el7_9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20235869" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-5869</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-5869" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5869" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-5869" ref_url="https://www.suse.com/security/cve/CVE-2023-5869" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4425-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4454-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017657.html" source="SUSE-SU"/>
    <description>
    A flaw was found in PostgreSQL that allows authenticated database users to execute arbitrary code through missing overflow checks during SQL array value modification. This issue exists due to an integer overflow during array modification where a remote user can trigger the overflow by providing specially crafted data. This enables the execution of arbitrary code on the target system, allowing users to write arbitrary bytes to memory and extensively read the server's memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5869/">CVE-2023-5869 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5869">CVE-2023-5869 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216961">SUSE bug 1216961</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830492" comment="postgresql-9.2.24-9.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830493" comment="postgresql-contrib-9.2.24-9.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830494" comment="postgresql-devel-9.2.24-9.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830495" comment="postgresql-docs-9.2.24-9.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830496" comment="postgresql-libs-9.2.24-9.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830497" comment="postgresql-plperl-9.2.24-9.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830498" comment="postgresql-plpython-9.2.24-9.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830499" comment="postgresql-pltcl-9.2.24-9.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830500" comment="postgresql-server-9.2.24-9.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830501" comment="postgresql-static-9.2.24-9.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830502" comment="postgresql-test-9.2.24-9.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830503" comment="postgresql-upgrade-9.2.24-9.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236204" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6204</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6204" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6204" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6204" ref_url="https://www.suse.com/security/cve/CVE-2023-6204" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017506.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017505.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    On some systems-depending on the graphics settings and drivers-it was possible to force an out-of-bounds read and leak memory data into the images created on the canvas element. This vulnerability affects Firefox &lt; 120, Firefox ESR &lt; 115.5.0, and Thunderbird &lt; 115.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-12-19"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6204/">CVE-2023-6204 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6204">CVE-2023-6204 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217230">SUSE bug 1217230</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830471" comment="firefox-115.5.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830470" comment="thunderbird-115.5.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236205" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6205</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6205" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6205" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6205" ref_url="https://www.suse.com/security/cve/CVE-2023-6205" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017506.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017505.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    It was possible to cause the use of a MessagePort after it had already been freed, which could potentially have led to an exploitable crash. This vulnerability affects Firefox &lt; 120, Firefox ESR &lt; 115.5.0, and Thunderbird &lt; 115.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6205/">CVE-2023-6205 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6205">CVE-2023-6205 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217230">SUSE bug 1217230</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830471" comment="firefox-115.5.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830470" comment="thunderbird-115.5.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236206" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6206</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6206" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6206" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6206" ref_url="https://www.suse.com/security/cve/CVE-2023-6206" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017506.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017505.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    The black fade animation when exiting fullscreen is roughly the length of the anti-clickjacking delay on permission prompts. It was possible to use this fact to surprise users by luring them to click where the permission grant button would be about to appear. This vulnerability affects Firefox &lt; 120, Firefox ESR &lt; 115.5.0, and Thunderbird &lt; 115.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6206/">CVE-2023-6206 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6206">CVE-2023-6206 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217230">SUSE bug 1217230</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830471" comment="firefox-115.5.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830470" comment="thunderbird-115.5.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236207" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6207</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6207" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6207" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6207" ref_url="https://www.suse.com/security/cve/CVE-2023-6207" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017506.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017505.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Ownership mismanagement led to a use-after-free in ReadableByteStreams This vulnerability affects Firefox &lt; 120, Firefox ESR &lt; 115.5.0, and Thunderbird &lt; 115.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6207/">CVE-2023-6207 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6207">CVE-2023-6207 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217230">SUSE bug 1217230</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830471" comment="firefox-115.5.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830470" comment="thunderbird-115.5.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236208" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6208</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6208" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6208" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6208" ref_url="https://www.suse.com/security/cve/CVE-2023-6208" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017506.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017505.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    When using X11, text selected by the page using the Selection API was erroneously copied into the primary selection, a temporary storage not unlike the clipboard.
*This bug only affects Firefox on X11. Other systems are unaffected.* This vulnerability affects Firefox &lt; 120, Firefox ESR &lt; 115.5.0, and Thunderbird &lt; 115.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6208/">CVE-2023-6208 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6208">CVE-2023-6208 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217230">SUSE bug 1217230</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830471" comment="firefox-115.5.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830470" comment="thunderbird-115.5.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236209" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6209</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6209" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6209" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6209" ref_url="https://www.suse.com/security/cve/CVE-2023-6209" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017506.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017505.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Relative URLs starting with three slashes were incorrectly parsed, and a path-traversal "/../" part in the path could be used to override the specified host. This could contribute to security problems in web sites. This vulnerability affects Firefox &lt; 120, Firefox ESR &lt; 115.5.0, and Thunderbird &lt; 115.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6209/">CVE-2023-6209 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6209">CVE-2023-6209 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217230">SUSE bug 1217230</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830471" comment="firefox-115.5.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830470" comment="thunderbird-115.5.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236212" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6212</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6212" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6212" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6212" ref_url="https://www.suse.com/security/cve/CVE-2023-6212" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017506.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017505.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Memory safety bugs present in Firefox 119, Firefox ESR 115.4, and Thunderbird 115.4. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 120, Firefox ESR &lt; 115.5.0, and Thunderbird &lt; 115.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6212/">CVE-2023-6212 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6212">CVE-2023-6212 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217230">SUSE bug 1217230</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830471" comment="firefox-115.5.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830470" comment="thunderbird-115.5.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236377" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6377</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6377" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6377" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6377" ref_url="https://www.suse.com/security/cve/CVE-2023-6377" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017332.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017328.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4792-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017327.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4934-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017528.html" source="SUSE-SU"/>
    <description>
    A flaw was found in xorg-server. Querying or changing XKB button actions such as moving from a touchpad to a mouse can result in out-of-bounds memory reads and writes. This may allow local privilege escalation or possible remote code execution in cases where X11 forwarding is involved.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6377/">CVE-2023-6377 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6377">CVE-2023-6377 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217765">SUSE bug 1217765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221590">SUSE bug 1221590</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830504" comment="tigervnc-1.8.0-28.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830505" comment="tigervnc-icons-1.8.0-28.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830506" comment="tigervnc-license-1.8.0-28.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830507" comment="tigervnc-server-1.8.0-28.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830508" comment="tigervnc-server-applet-1.8.0-28.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830509" comment="tigervnc-server-minimal-1.8.0-28.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830510" comment="tigervnc-server-module-1.8.0-28.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830511" comment="xorg-x11-server-Xdmx-1.20.4-25.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830512" comment="xorg-x11-server-Xephyr-1.20.4-25.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830513" comment="xorg-x11-server-Xnest-1.20.4-25.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830514" comment="xorg-x11-server-Xorg-1.20.4-25.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830515" comment="xorg-x11-server-Xvfb-1.20.4-25.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830516" comment="xorg-x11-server-Xwayland-1.20.4-25.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830517" comment="xorg-x11-server-common-1.20.4-25.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830518" comment="xorg-x11-server-devel-1.20.4-25.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830519" comment="xorg-x11-server-source-1.20.4-25.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236478" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6478</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6478" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6478" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6478" ref_url="https://www.suse.com/security/cve/CVE-2023-6478" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017332.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017328.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4792-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017327.html" source="SUSE-SU"/>
    <description>
    A flaw was found in xorg-server. A specially crafted request to RRChangeProviderProperty or RRChangeOutputProperty can trigger an integer overflow which may lead to a disclosure of sensitive information.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-6478/">CVE-2023-6478 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6478">CVE-2023-6478 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217766">SUSE bug 1217766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222096">SUSE bug 1222096</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830504" comment="tigervnc-1.8.0-28.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830505" comment="tigervnc-icons-1.8.0-28.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830506" comment="tigervnc-license-1.8.0-28.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830507" comment="tigervnc-server-1.8.0-28.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830508" comment="tigervnc-server-applet-1.8.0-28.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830509" comment="tigervnc-server-minimal-1.8.0-28.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830510" comment="tigervnc-server-module-1.8.0-28.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830511" comment="xorg-x11-server-Xdmx-1.20.4-25.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830512" comment="xorg-x11-server-Xephyr-1.20.4-25.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830513" comment="xorg-x11-server-Xnest-1.20.4-25.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830514" comment="xorg-x11-server-Xorg-1.20.4-25.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830515" comment="xorg-x11-server-Xvfb-1.20.4-25.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830516" comment="xorg-x11-server-Xwayland-1.20.4-25.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830517" comment="xorg-x11-server-common-1.20.4-25.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830518" comment="xorg-x11-server-devel-1.20.4-25.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830519" comment="xorg-x11-server-source-1.20.4-25.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236816" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6816</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6816" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6816" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6816" ref_url="https://www.suse.com/security/cve/CVE-2023-6816" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017669.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017712.html" source="SUSE-SU"/>
    <description>
    A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device's particular number of buttons, leading to a heap overflow if a bigger value was used.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6816/">CVE-2023-6816 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6816">CVE-2023-6816 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218582">SUSE bug 1218582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221590">SUSE bug 1221590</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009846117" comment="tigervnc-1.8.0-31.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846118" comment="tigervnc-icons-1.8.0-31.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846119" comment="tigervnc-license-1.8.0-31.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846120" comment="tigervnc-server-1.8.0-31.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846121" comment="tigervnc-server-applet-1.8.0-31.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846122" comment="tigervnc-server-minimal-1.8.0-31.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846123" comment="tigervnc-server-module-1.8.0-31.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830550" comment="xorg-x11-server-Xdmx-1.20.4-27.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830551" comment="xorg-x11-server-Xephyr-1.20.4-27.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830552" comment="xorg-x11-server-Xnest-1.20.4-27.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830553" comment="xorg-x11-server-Xorg-1.20.4-27.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830554" comment="xorg-x11-server-Xvfb-1.20.4-27.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830555" comment="xorg-x11-server-Xwayland-1.20.4-27.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830556" comment="xorg-x11-server-common-1.20.4-27.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830557" comment="xorg-x11-server-devel-1.20.4-27.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830558" comment="xorg-x11-server-source-1.20.4-27.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236856" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6856</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6856" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6856" ref_url="https://www.suse.com/security/cve/CVE-2023-6856" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017506.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017601.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    The WebGL `DrawElementsInstanced` method was susceptible to a heap buffer overflow when used on systems with the Mesa VM driver.  This issue could allow an attacker to perform remote code execution and sandbox escape. This vulnerability affects Firefox ESR &lt; 115.6, Thunderbird &lt; 115.6, and Firefox &lt; 121.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6856/">CVE-2023-6856 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6856">CVE-2023-6856 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217974">SUSE bug 1217974</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830523" comment="firefox-115.6.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830524" comment="thunderbird-115.6.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236857" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6857</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6857" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6857" ref_url="https://www.suse.com/security/cve/CVE-2023-6857" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017506.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017601.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    When resolving a symlink, a race may occur where the buffer passed to `readlink` may actually be smaller than necessary. 
*This bug only affects Firefox on Unix-based operating systems (Android, Linux, MacOS). Windows is unaffected.* This vulnerability affects Firefox ESR &lt; 115.6, Thunderbird &lt; 115.6, and Firefox &lt; 121.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6857/">CVE-2023-6857 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6857">CVE-2023-6857 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217974">SUSE bug 1217974</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830523" comment="firefox-115.6.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830524" comment="thunderbird-115.6.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236858" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6858</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6858" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6858" ref_url="https://www.suse.com/security/cve/CVE-2023-6858" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017506.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017601.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Firefox was susceptible to a heap buffer overflow in `nsTextFragment` due to insufficient OOM handling. This vulnerability affects Firefox ESR &lt; 115.6, Thunderbird &lt; 115.6, and Firefox &lt; 121.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6858/">CVE-2023-6858 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6858">CVE-2023-6858 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217974">SUSE bug 1217974</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830523" comment="firefox-115.6.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830524" comment="thunderbird-115.6.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236859" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6859</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6859" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6859" ref_url="https://www.suse.com/security/cve/CVE-2023-6859" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017506.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017601.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A use-after-free condition affected TLS socket creation when under memory pressure. This vulnerability affects Firefox ESR &lt; 115.6, Thunderbird &lt; 115.6, and Firefox &lt; 121.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6859/">CVE-2023-6859 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6859">CVE-2023-6859 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217974">SUSE bug 1217974</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830523" comment="firefox-115.6.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830524" comment="thunderbird-115.6.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236860" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6860</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6860" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6860" ref_url="https://www.suse.com/security/cve/CVE-2023-6860" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017506.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017601.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    The `VideoBridge` allowed any content process to use textures produced by remote decoders.  This could be abused to escape the sandbox. This vulnerability affects Firefox ESR &lt; 115.6, Thunderbird &lt; 115.6, and Firefox &lt; 121.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6860/">CVE-2023-6860 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6860">CVE-2023-6860 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217974">SUSE bug 1217974</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830523" comment="firefox-115.6.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830524" comment="thunderbird-115.6.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236861" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6861</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6861" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6861" ref_url="https://www.suse.com/security/cve/CVE-2023-6861" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017506.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017601.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    The `nsWindow::PickerOpen(void)` method was susceptible to a heap buffer overflow when running in headless mode. This vulnerability affects Firefox ESR &lt; 115.6, Thunderbird &lt; 115.6, and Firefox &lt; 121.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6861/">CVE-2023-6861 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6861">CVE-2023-6861 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217974">SUSE bug 1217974</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830523" comment="firefox-115.6.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830524" comment="thunderbird-115.6.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236862" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6862</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6862" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6862" ref_url="https://www.suse.com/security/cve/CVE-2023-6862" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017506.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017601.html" source="SUSE-SU"/>
    <description>
    A use-after-free was identified in the `nsDNSService::Init`.  This issue appears to manifest rarely during start-up. This vulnerability affects Firefox ESR &lt; 115.6 and Thunderbird &lt; 115.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6862/">CVE-2023-6862 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6862">CVE-2023-6862 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217974">SUSE bug 1217974</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830523" comment="firefox-115.6.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830524" comment="thunderbird-115.6.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236863" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6863</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6863" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6863" ref_url="https://www.suse.com/security/cve/CVE-2023-6863" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017506.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017601.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    The `ShutdownObserver()` was susceptible to potentially undefined behavior due to its reliance on a dynamic type that lacked a virtual destructor. This vulnerability affects Firefox ESR &lt; 115.6, Thunderbird &lt; 115.6, and Firefox &lt; 121.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6863/">CVE-2023-6863 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6863">CVE-2023-6863 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217974">SUSE bug 1217974</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830523" comment="firefox-115.6.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830524" comment="thunderbird-115.6.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236864" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6864</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6864" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6864" ref_url="https://www.suse.com/security/cve/CVE-2023-6864" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017506.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017601.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Memory safety bugs present in Firefox 120, Firefox ESR 115.5, and Thunderbird 115.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR &lt; 115.6, Thunderbird &lt; 115.6, and Firefox &lt; 121.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6864/">CVE-2023-6864 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6864">CVE-2023-6864 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217974">SUSE bug 1217974</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830523" comment="firefox-115.6.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830524" comment="thunderbird-115.6.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236865" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6865</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6865" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6865" ref_url="https://www.suse.com/security/cve/CVE-2023-6865" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017506.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017505.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    `EncryptingOutputStream` was susceptible to exposing uninitialized data.  This issue could only be abused in order to write data to a local disk which may have implications for private browsing mode. This vulnerability affects Firefox ESR &lt; 115.6 and Firefox &lt; 121.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6865/">CVE-2023-6865 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6865">CVE-2023-6865 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217974">SUSE bug 1217974</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830523" comment="firefox-115.6.0-1.el7_9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236867" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6867</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6867" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6867" ref_url="https://www.suse.com/security/cve/CVE-2023-6867" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017506.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017505.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    The timing of a button click causing a popup to disappear was approximately the same length as the anti-clickjacking delay on permission prompts. It was possible to use this fact to surprise users by luring them to click where the permission grant button would be about to appear. This vulnerability affects Firefox ESR &lt; 115.6 and Firefox &lt; 121.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6867/">CVE-2023-6867 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6867">CVE-2023-6867 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217974">SUSE bug 1217974</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830523" comment="firefox-115.6.0-1.el7_9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20240229" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-0229</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-0229" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0229" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-0229" ref_url="https://www.suse.com/security/cve/CVE-2024-0229" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017669.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017712.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds memory access flaw was found in the X.Org server. This issue can be triggered when a device frozen by a sync grab is reattached to a different master device. This issue may lead to an application crash, local privilege escalation (if the server runs with extended privileges), or remote code execution in SSH X11 forwarding environments.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-0229/">CVE-2024-0229 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0229">CVE-2024-0229 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218583">SUSE bug 1218583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221590">SUSE bug 1221590</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009846117" comment="tigervnc-1.8.0-31.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846118" comment="tigervnc-icons-1.8.0-31.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846119" comment="tigervnc-license-1.8.0-31.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846120" comment="tigervnc-server-1.8.0-31.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846121" comment="tigervnc-server-applet-1.8.0-31.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846122" comment="tigervnc-server-minimal-1.8.0-31.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846123" comment="tigervnc-server-module-1.8.0-31.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830550" comment="xorg-x11-server-Xdmx-1.20.4-27.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830551" comment="xorg-x11-server-Xephyr-1.20.4-27.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830552" comment="xorg-x11-server-Xnest-1.20.4-27.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830553" comment="xorg-x11-server-Xorg-1.20.4-27.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830554" comment="xorg-x11-server-Xvfb-1.20.4-27.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830555" comment="xorg-x11-server-Xwayland-1.20.4-27.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830556" comment="xorg-x11-server-common-1.20.4-27.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830557" comment="xorg-x11-server-devel-1.20.4-27.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830558" comment="xorg-x11-server-source-1.20.4-27.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20240408" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-0408</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-0408" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0408" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-0408" ref_url="https://www.suse.com/security/cve/CVE-2024-0408" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017767.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the X.Org server. The GLX PBuffer code does not call the XACE hook when creating the buffer, leaving it unlabeled. When the client issues another request to access that resource (as with a GetGeometry) or when it creates another resource that needs to access that buffer, such as a GC, the XSELINUX code will try to use an object that was never labeled and crash because the SID is NULL.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-0408/">CVE-2024-0408 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0408">CVE-2024-0408 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218845">SUSE bug 1218845</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830550" comment="xorg-x11-server-Xdmx-1.20.4-27.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830551" comment="xorg-x11-server-Xephyr-1.20.4-27.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830552" comment="xorg-x11-server-Xnest-1.20.4-27.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830553" comment="xorg-x11-server-Xorg-1.20.4-27.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830554" comment="xorg-x11-server-Xvfb-1.20.4-27.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830555" comment="xorg-x11-server-Xwayland-1.20.4-27.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830556" comment="xorg-x11-server-common-1.20.4-27.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830557" comment="xorg-x11-server-devel-1.20.4-27.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830558" comment="xorg-x11-server-source-1.20.4-27.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20240409" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-0409</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-0409" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0409" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-0409" ref_url="https://www.suse.com/security/cve/CVE-2024-0409" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017767.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the X.Org server. The cursor code in both Xephyr and Xwayland uses the wrong type of private at creation. It uses the cursor bits type with the cursor as private, and when initiating the cursor, that overwrites the XSELINUX context.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-0409/">CVE-2024-0409 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0409">CVE-2024-0409 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218846">SUSE bug 1218846</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830550" comment="xorg-x11-server-Xdmx-1.20.4-27.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830551" comment="xorg-x11-server-Xephyr-1.20.4-27.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830552" comment="xorg-x11-server-Xnest-1.20.4-27.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830553" comment="xorg-x11-server-Xorg-1.20.4-27.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830554" comment="xorg-x11-server-Xvfb-1.20.4-27.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830555" comment="xorg-x11-server-Xwayland-1.20.4-27.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830556" comment="xorg-x11-server-common-1.20.4-27.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830557" comment="xorg-x11-server-devel-1.20.4-27.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830558" comment="xorg-x11-server-source-1.20.4-27.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20240741" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-0741</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-0741" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0741" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-0741" ref_url="https://www.suse.com/security/cve/CVE-2024-0741" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017761.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    An out of bounds write in ANGLE could have allowed an attacker to corrupt memory leading to a potentially exploitable crash. This vulnerability affects Firefox &lt; 122, Firefox ESR &lt; 115.7, and Thunderbird &lt; 115.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-02"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0741/">CVE-2024-0741 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0741">CVE-2024-0741 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218955">SUSE bug 1218955</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009845118" comment="firefox-115.7.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846116" comment="thunderbird-115.7.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20240742" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-0742</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-0742" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0742" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-0742" ref_url="https://www.suse.com/security/cve/CVE-2024-0742" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017761.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    It was possible for certain browser prompts and dialogs to be activated or dismissed unintentionally by the user due to an incorrect timestamp used to prevent input after page load. This vulnerability affects Firefox &lt; 122, Firefox ESR &lt; 115.7, and Thunderbird &lt; 115.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-02"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0742/">CVE-2024-0742 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0742">CVE-2024-0742 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218955">SUSE bug 1218955</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009845118" comment="firefox-115.7.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846116" comment="thunderbird-115.7.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20240743" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-0743</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-0743" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0743" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-0743" ref_url="https://www.suse.com/security/cve/CVE-2024-0743" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1147-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034875.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    An unchecked return value in TLS handshake code could have caused a potentially exploitable crash. This vulnerability affects Firefox &lt; 122, Firefox ESR &lt; 115.9, and Thunderbird &lt; 115.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-28"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0743/">CVE-2024-0743 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0743">CVE-2024-0743 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218955">SUSE bug 1218955</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851985" comment="thunderbird-115.9.0-1.el7_9 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009852714" comment="firefox-115.9.1-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851985" comment="thunderbird-115.9.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20240746" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-0746</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-0746" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0746" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-0746" ref_url="https://www.suse.com/security/cve/CVE-2024-0746" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017761.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A Linux user opening the print preview dialog could have caused the browser to crash. This vulnerability affects Firefox &lt; 122, Firefox ESR &lt; 115.7, and Thunderbird &lt; 115.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-02"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0746/">CVE-2024-0746 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0746">CVE-2024-0746 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218955">SUSE bug 1218955</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009845118" comment="firefox-115.7.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846116" comment="thunderbird-115.7.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20240747" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-0747</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-0747" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0747" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-0747" ref_url="https://www.suse.com/security/cve/CVE-2024-0747" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017761.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    When a parent page loaded a child in an iframe with `unsafe-inline`, the parent Content Security Policy could have overridden the child Content Security Policy. This vulnerability affects Firefox &lt; 122, Firefox ESR &lt; 115.7, and Thunderbird &lt; 115.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-02"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0747/">CVE-2024-0747 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0747">CVE-2024-0747 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218955">SUSE bug 1218955</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009845118" comment="firefox-115.7.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846116" comment="thunderbird-115.7.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20240749" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-0749</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-0749" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0749" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-0749" ref_url="https://www.suse.com/security/cve/CVE-2024-0749" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017761.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A phishing site could have repurposed an `about:` dialog to show phishing content with an incorrect origin in the address bar. This vulnerability affects Firefox &lt; 122 and Thunderbird &lt; 115.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-02"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0749/">CVE-2024-0749 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0749">CVE-2024-0749 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218955">SUSE bug 1218955</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009845118" comment="firefox-115.7.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846116" comment="thunderbird-115.7.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20240750" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-0750</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-0750" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0750" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-0750" ref_url="https://www.suse.com/security/cve/CVE-2024-0750" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017761.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A bug in popup notifications delay calculation could have made it possible for an attacker to trick a user into granting permissions. This vulnerability affects Firefox &lt; 122, Firefox ESR &lt; 115.7, and Thunderbird &lt; 115.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-02"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0750/">CVE-2024-0750 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0750">CVE-2024-0750 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218955">SUSE bug 1218955</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009845118" comment="firefox-115.7.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846116" comment="thunderbird-115.7.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20240751" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-0751</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-0751" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0751" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-0751" ref_url="https://www.suse.com/security/cve/CVE-2024-0751" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017761.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A malicious devtools extension could have been used to escalate privileges. This vulnerability affects Firefox &lt; 122, Firefox ESR &lt; 115.7, and Thunderbird &lt; 115.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-02"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0751/">CVE-2024-0751 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0751">CVE-2024-0751 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218955">SUSE bug 1218955</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009845118" comment="firefox-115.7.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846116" comment="thunderbird-115.7.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20240753" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-0753</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-0753" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0753" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-0753" ref_url="https://www.suse.com/security/cve/CVE-2024-0753" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017761.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    In specific HSTS configurations an attacker could have bypassed HSTS on a subdomain. This vulnerability affects Firefox &lt; 122, Firefox ESR &lt; 115.7, and Thunderbird &lt; 115.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-02"/>
	<updated date="2025-12-19"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0753/">CVE-2024-0753 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0753">CVE-2024-0753 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218955">SUSE bug 1218955</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009845118" comment="firefox-115.7.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846116" comment="thunderbird-115.7.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20240755" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-0755</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-0755" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0755" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-0755" ref_url="https://www.suse.com/security/cve/CVE-2024-0755" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017761.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Memory safety bugs present in Firefox 121, Firefox ESR 115.6, and Thunderbird 115.6. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 122, Firefox ESR &lt; 115.7, and Thunderbird &lt; 115.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-02"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0755/">CVE-2024-0755 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0755">CVE-2024-0755 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218955">SUSE bug 1218955</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009845118" comment="firefox-115.7.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846116" comment="thunderbird-115.7.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20241086" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-1086</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-1086" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1086" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-1086" ref_url="https://www.suse.com/security/cve/CVE-2024-1086" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0483-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1358-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1359-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018387.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1373-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1380-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1386-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1388-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1390-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1400-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1401-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1405-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1406-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1410-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1537-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1558-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1580-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1582-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018504.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation.

The nft_verdict_init() function allows positive values as drop error within the hook verdict, and hence the nf_hook_slow() function can cause a double free vulnerability when NF_DROP is issued with a drop error which resembles NF_ACCEPT.

We recommend upgrading past commit f342de4e2f33e0e39165d8639387aa6c19dff660.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-22"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-1086/">CVE-2024-1086 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1086">CVE-2024-1086 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219434">SUSE bug 1219434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219435">SUSE bug 1219435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224298">SUSE bug 1224298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224878">SUSE bug 1224878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226066">SUSE bug 1226066</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009851792" comment="bpftool-3.10.0-1160.114.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851793" comment="kernel-3.10.0-1160.114.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851794" comment="kernel-abi-whitelists-3.10.0-1160.114.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851795" comment="kernel-debug-3.10.0-1160.114.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851798" comment="kernel-doc-3.10.0-1160.114.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851799" comment="kernel-headers-3.10.0-1160.114.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851800" comment="kernel-tools-3.10.0-1160.114.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851801" comment="kernel-tools-libs-3.10.0-1160.114.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851803" comment="perf-3.10.0-1160.114.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851804" comment="python-perf-3.10.0-1160.114.2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202410979" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-10979</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-10979" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10979" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-10979" ref_url="https://www.suse.com/security/cve/CVE-2024-10979" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:10791" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000717.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:10831" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000639.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:10882" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4099-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01799-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039507.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14502-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AKWDFN2C7BDHNEIL7UAMUE2QLH322LIK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14505-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RB4KENPNXIDYL7D4OSLN7SICCC2ASXXP/" source="SUSE-SU"/>
    <description>
    Incorrect control of environment variables in PostgreSQL PL/Perl allows an unprivileged database user to change sensitive process environment variables (e.g. PATH).  That often suffices to enable arbitrary code execution, even if the attacker lacks a database server operating system user.  Versions before PostgreSQL 17.1, 16.5, 15.9, 14.14, 13.17, and 12.21 are affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-02"/>
	<updated date="2025-06-03"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-10979/">CVE-2024-10979 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10979">CVE-2024-10979 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233327">SUSE bug 1233327</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009958972" comment="postgresql-9.2.24-9.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009958973" comment="postgresql-contrib-9.2.24-9.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009958974" comment="postgresql-devel-9.2.24-9.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009958975" comment="postgresql-docs-9.2.24-9.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009958976" comment="postgresql-libs-9.2.24-9.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009958977" comment="postgresql-plperl-9.2.24-9.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009958978" comment="postgresql-plpython-9.2.24-9.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009958979" comment="postgresql-pltcl-9.2.24-9.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009958980" comment="postgresql-server-9.2.24-9.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009958981" comment="postgresql-static-9.2.24-9.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009958982" comment="postgresql-test-9.2.24-9.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009958983" comment="postgresql-upgrade-9.2.24-9.el7_9.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202411187" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-11187</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-11187" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11187" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-11187" ref_url="https://www.suse.com/security/cve/CVE-2024-11187" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:1675" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000905.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1676" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000906.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1681" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000889.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1718" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-May/020995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0427-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020309.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14719-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U3SN2G4DQTD5LI632EWUNITUPW44ZK6V/" source="SUSE-SU"/>
    <description>
    It is possible to construct a zone such that some queries to it will generate responses containing numerous records in the Additional section. An attacker sending many such queries can cause either the authoritative server itself or an independent resolver to use disproportionate resources processing the queries. Zones will usually need to have been deliberately crafted to attack this exposure.
This issue affects BIND 9 versions 9.11.0 through 9.11.37, 9.16.0 through 9.16.50, 9.18.0 through 9.18.32, 9.20.0 through 9.20.4, 9.21.0 through 9.21.3, 9.11.3-S1 through 9.11.37-S1, 9.16.8-S1 through 9.16.50-S1, and 9.18.11-S1 through 9.18.32-S1.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-02-25"/>
	<updated date="2025-05-31"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-11187/">CVE-2024-11187 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11187">CVE-2024-11187 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236596">SUSE bug 1236596</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009966015" comment="bind-9.11.4-26.P2.el7_9.18 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009966016" comment="bind-chroot-9.11.4-26.P2.el7_9.18 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009966017" comment="bind-devel-9.11.4-26.P2.el7_9.18 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009966018" comment="bind-export-devel-9.11.4-26.P2.el7_9.18 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009966019" comment="bind-export-libs-9.11.4-26.P2.el7_9.18 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009966020" comment="bind-libs-9.11.4-26.P2.el7_9.18 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009966021" comment="bind-libs-lite-9.11.4-26.P2.el7_9.18 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009966022" comment="bind-license-9.11.4-26.P2.el7_9.18 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009966023" comment="bind-lite-devel-9.11.4-26.P2.el7_9.18 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009966024" comment="bind-pkcs11-9.11.4-26.P2.el7_9.18 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009966025" comment="bind-pkcs11-devel-9.11.4-26.P2.el7_9.18 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009966026" comment="bind-pkcs11-libs-9.11.4-26.P2.el7_9.18 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009966027" comment="bind-pkcs11-utils-9.11.4-26.P2.el7_9.18 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009966028" comment="bind-sdb-9.11.4-26.P2.el7_9.18 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009966029" comment="bind-sdb-chroot-9.11.4-26.P2.el7_9.18 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009966030" comment="bind-utils-9.11.4-26.P2.el7_9.18 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202412085" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-12085</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-12085" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-12085" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-12085" ref_url="https://www.suse.com/security/cve/CVE-2024-12085" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:0324" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000762.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:0325" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000761.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:0714" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0118-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0120-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0121-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0122-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021107.html" source="SUSE-SU"/>
    <description>
    A flaw was found in rsync which could be triggered when rsync compares file checksums. This flaw allows an attacker to manipulate the checksum length (s2length) to cause a comparison between a checksum and uninitialized memory and leak one byte of uninitialized stack data at a time.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-02-07"/>
	<updated date="2025-06-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-12085/">CVE-2024-12085 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-12085">CVE-2024-12085 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233760">SUSE bug 1233760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1234101">SUSE bug 1234101</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009962649" comment="rsync-3.1.2-12.el7_9.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202412087" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-12087</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-12087" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-12087" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-12087" ref_url="https://www.suse.com/security/cve/CVE-2024-12087" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:23415" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002302.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:2600" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000939.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7050" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0118-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0120-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0121-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0122-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021107.html" source="SUSE-SU"/>
    <description>
    A path traversal vulnerability exists in rsync. It stems from behavior enabled by the `--inc-recursive` option, a default-enabled option for many client options and can be enabled by the server even if not explicitly enabled by the client. When using the `--inc-recursive` option, a lack of proper symlink verification coupled with deduplication checks occurring on a per-file-list basis could allow a server to write files outside of the client's intended destination directory. A malicious server could write malicious files to arbitrary locations named after valid directories/paths on the client.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-19"/>
	<updated date="2025-12-20"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-12087/">CVE-2024-12087 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-12087">CVE-2024-12087 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233760">SUSE bug 1233760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1234103">SUSE bug 1234103</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010034202" comment="rsync-3.1.2-12.el7_9.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20241546" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-1546</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-1546" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1546" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-1546" ref_url="https://www.suse.com/security/cve/CVE-2024-1546" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018221.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    When storing and re-accessing data on a networking channel, the length of buffers may have been confused, resulting in an out-of-bounds memory read. This vulnerability affects Firefox &lt; 123, Firefox ESR &lt; 115.8, and Thunderbird &lt; 115.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-06"/>
	<updated date="2025-04-03"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1546/">CVE-2024-1546 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1546">CVE-2024-1546 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220048">SUSE bug 1220048</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009849777" comment="firefox-115.8.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849776" comment="thunderbird-115.8.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20241547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-1547</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-1547" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1547" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-1547" ref_url="https://www.suse.com/security/cve/CVE-2024-1547" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018221.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Through a series of API calls and redirects, an attacker-controlled alert dialog could have been displayed on another website (with the victim website's URL shown). This vulnerability affects Firefox &lt; 123, Firefox ESR &lt; 115.8, and Thunderbird &lt; 115.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-06"/>
	<updated date="2025-04-04"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1547/">CVE-2024-1547 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1547">CVE-2024-1547 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220048">SUSE bug 1220048</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009849777" comment="firefox-115.8.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849776" comment="thunderbird-115.8.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20241548" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-1548</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-1548" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1548" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-1548" ref_url="https://www.suse.com/security/cve/CVE-2024-1548" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018221.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A website could have obscured the fullscreen notification by using a dropdown select input element. This could have led to user confusion and possible spoofing attacks. This vulnerability affects Firefox &lt; 123, Firefox ESR &lt; 115.8, and Thunderbird &lt; 115.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-06"/>
	<updated date="2025-04-04"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1548/">CVE-2024-1548 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1548">CVE-2024-1548 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220048">SUSE bug 1220048</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009849777" comment="firefox-115.8.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849776" comment="thunderbird-115.8.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20241549" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-1549</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-1549" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1549" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-1549" ref_url="https://www.suse.com/security/cve/CVE-2024-1549" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018221.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    If a website set a large custom cursor, portions of the cursor could have overlapped with the permission dialog, potentially resulting in user confusion and unexpected granted permissions. This vulnerability affects Firefox &lt; 123, Firefox ESR &lt; 115.8, and Thunderbird &lt; 115.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-06"/>
	<updated date="2025-04-04"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1549/">CVE-2024-1549 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1549">CVE-2024-1549 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220048">SUSE bug 1220048</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009849777" comment="firefox-115.8.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849776" comment="thunderbird-115.8.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20241550" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-1550</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-1550" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1550" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-1550" ref_url="https://www.suse.com/security/cve/CVE-2024-1550" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018221.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A malicious website could have used a combination of exiting fullscreen mode and `requestPointerLock` to cause the user's mouse to be re-positioned unexpectedly, which could have led to user confusion and inadvertently granting permissions they did not intend to grant. This vulnerability affects Firefox &lt; 123, Firefox ESR &lt; 115.8, and Thunderbird &lt; 115.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-06"/>
	<updated date="2025-04-03"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1550/">CVE-2024-1550 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1550">CVE-2024-1550 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220048">SUSE bug 1220048</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009849777" comment="firefox-115.8.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849776" comment="thunderbird-115.8.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20241551" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-1551</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-1551" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1551" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-1551" ref_url="https://www.suse.com/security/cve/CVE-2024-1551" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018221.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Set-Cookie response headers were being incorrectly honored in multipart HTTP responses. If an attacker could control the Content-Type response header, as well as control part of the response body, they could inject Set-Cookie response headers that would have been honored by the browser. This vulnerability affects Firefox &lt; 123, Firefox ESR &lt; 115.8, and Thunderbird &lt; 115.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-06"/>
	<updated date="2025-04-03"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1551/">CVE-2024-1551 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1551">CVE-2024-1551 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220048">SUSE bug 1220048</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009849777" comment="firefox-115.8.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849776" comment="thunderbird-115.8.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20241552" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-1552</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-1552" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1552" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-1552" ref_url="https://www.suse.com/security/cve/CVE-2024-1552" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018221.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Incorrect code generation could have led to unexpected numeric conversions and potential undefined behavior.*Note:* This issue only affects 32-bit ARM devices. This vulnerability affects Firefox &lt; 123, Firefox ESR &lt; 115.8, and Thunderbird &lt; 115.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-06"/>
	<updated date="2025-04-06"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1552/">CVE-2024-1552 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1552">CVE-2024-1552 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220048">SUSE bug 1220048</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009849777" comment="firefox-115.8.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849776" comment="thunderbird-115.8.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20241553" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-1553</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-1553" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1553" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-1553" ref_url="https://www.suse.com/security/cve/CVE-2024-1553" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018221.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Memory safety bugs present in Firefox 122, Firefox ESR 115.7, and Thunderbird 115.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 123, Firefox ESR &lt; 115.8, and Thunderbird &lt; 115.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-06"/>
	<updated date="2025-04-04"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1553/">CVE-2024-1553 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1553">CVE-2024-1553 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220048">SUSE bug 1220048</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009849777" comment="firefox-115.8.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849776" comment="thunderbird-115.8.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20241737" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-1737</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-1737" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1737" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-1737" ref_url="https://www.suse.com/security/cve/CVE-2024-1737" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7349" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000100.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:7505" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2636-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2810-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2811-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2863-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2868-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019165.html" source="SUSE-SU"/>
    <description>
    Resolver caches and authoritative zone databases that hold significant numbers of RRs for the same hostname (of any RTYPE) can suffer from degraded performance as content is being added or updated, and also when handling client queries for this name.
This issue affects BIND 9 versions 9.11.0 through 9.11.37, 9.16.0 through 9.16.50, 9.18.0 through 9.18.27, 9.19.0 through 9.19.24, 9.11.4-S1 through 9.11.37-S1, 9.16.8-S1 through 9.16.50-S1, and 9.18.11-S1 through 9.18.27-S1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-02"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-1737/">CVE-2024-1737 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1737">CVE-2024-1737 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228256">SUSE bug 1228256</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009945509" comment="bind-9.11.4-26.P2.el7_9.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945510" comment="bind-chroot-9.11.4-26.P2.el7_9.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009946141" comment="bind-devel-9.11.4-26.P2.el7_9.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009946142" comment="bind-export-devel-9.11.4-26.P2.el7_9.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009946143" comment="bind-export-libs-9.11.4-26.P2.el7_9.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945514" comment="bind-libs-9.11.4-26.P2.el7_9.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009946144" comment="bind-libs-lite-9.11.4-26.P2.el7_9.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945516" comment="bind-license-9.11.4-26.P2.el7_9.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009946145" comment="bind-lite-devel-9.11.4-26.P2.el7_9.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009946146" comment="bind-pkcs11-9.11.4-26.P2.el7_9.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009946147" comment="bind-pkcs11-devel-9.11.4-26.P2.el7_9.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009946148" comment="bind-pkcs11-libs-9.11.4-26.P2.el7_9.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945521" comment="bind-pkcs11-utils-9.11.4-26.P2.el7_9.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945522" comment="bind-sdb-9.11.4-26.P2.el7_9.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945523" comment="bind-sdb-chroot-9.11.4-26.P2.el7_9.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945524" comment="bind-utils-9.11.4-26.P2.el7_9.17 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20241936" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-1936</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-1936" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1936" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-1936" ref_url="https://www.suse.com/security/cve/CVE-2024-1936" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018174.html" source="SUSE-SU"/>
    <description>
    The encrypted subject of an email message could be incorrectly and permanently assigned to an arbitrary other email message in Thunderbird's local cache. Consequently, when replying to the contaminated email message, the user might accidentally leak the confidential subject to a third-party. While this update fixes the bug and avoids future message contamination, it does not automatically repair existing contaminations. Users are advised to use the repair folder functionality, which is available from the context menu of email folders, which will erase incorrect subject assignments. This vulnerability affects Thunderbird &lt; 115.8.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-28"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-1936/">CVE-2024-1936 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1936">CVE-2024-1936 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221054">SUSE bug 1221054</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851985" comment="thunderbird-115.9.0-1.el7_9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20241975" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-1975</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-1975" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1975" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-1975" ref_url="https://www.suse.com/security/cve/CVE-2024-1975" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7349" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000100.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:7505" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2636-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2810-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2811-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2863-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2868-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019165.html" source="SUSE-SU"/>
    <description>
    If a server hosts a zone containing a "KEY" Resource Record, or a resolver DNSSEC-validates a "KEY" Resource Record from a DNSSEC-signed domain in cache, a client can exhaust resolver CPU resources by sending a stream of SIG(0) signed requests.
This issue affects BIND 9 versions 9.0.0 through 9.11.37, 9.16.0 through 9.16.50, 9.18.0 through 9.18.27, 9.19.0 through 9.19.24, 9.9.3-S1 through 9.11.37-S1, 9.16.8-S1 through 9.16.49-S1, and 9.18.11-S1 through 9.18.27-S1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-02"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-1975/">CVE-2024-1975 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1975">CVE-2024-1975 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228257">SUSE bug 1228257</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009945509" comment="bind-9.11.4-26.P2.el7_9.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945510" comment="bind-chroot-9.11.4-26.P2.el7_9.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009946141" comment="bind-devel-9.11.4-26.P2.el7_9.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009946142" comment="bind-export-devel-9.11.4-26.P2.el7_9.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009946143" comment="bind-export-libs-9.11.4-26.P2.el7_9.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945514" comment="bind-libs-9.11.4-26.P2.el7_9.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009946144" comment="bind-libs-lite-9.11.4-26.P2.el7_9.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945516" comment="bind-license-9.11.4-26.P2.el7_9.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009946145" comment="bind-lite-devel-9.11.4-26.P2.el7_9.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009946146" comment="bind-pkcs11-9.11.4-26.P2.el7_9.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009946147" comment="bind-pkcs11-devel-9.11.4-26.P2.el7_9.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009946148" comment="bind-pkcs11-libs-9.11.4-26.P2.el7_9.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945521" comment="bind-pkcs11-utils-9.11.4-26.P2.el7_9.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945522" comment="bind-sdb-9.11.4-26.P2.el7_9.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945523" comment="bind-sdb-chroot-9.11.4-26.P2.el7_9.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945524" comment="bind-utils-9.11.4-26.P2.el7_9.17 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202420918" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-20918</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-20918" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20918" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-20918" ref_url="https://www.suse.com/security/cve/CVE-2024-20918" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0479-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-February/034224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018149.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GS63GCBRVH7N4JEIZNQAPVFNNVB2OGSU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0067-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XA5CCGSPUXUTQHDG25O5DM4G37BLRUMN/" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-08"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-20918/">CVE-2024-20918 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20918">CVE-2024-20918 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218907">SUSE bug 1218907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219843">SUSE bug 1219843</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830536" comment="java-1.8.0-openjdk-1.8.0.402.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830537" comment="java-1.8.0-openjdk-accessibility-1.8.0.402.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830538" comment="java-1.8.0-openjdk-demo-1.8.0.402.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830539" comment="java-1.8.0-openjdk-devel-1.8.0.402.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830540" comment="java-1.8.0-openjdk-headless-1.8.0.402.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830541" comment="java-1.8.0-openjdk-javadoc-1.8.0.402.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830542" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.402.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830543" comment="java-1.8.0-openjdk-src-1.8.0.402.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830544" comment="java-11-openjdk-11.0.22.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830545" comment="java-11-openjdk-devel-11.0.22.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830546" comment="java-11-openjdk-headless-11.0.22.0.7-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202420919" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-20919</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-20919" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20919" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-20919" ref_url="https://www.suse.com/security/cve/CVE-2024-20919" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0479-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-February/034224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018149.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GS63GCBRVH7N4JEIZNQAPVFNNVB2OGSU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0067-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XA5CCGSPUXUTQHDG25O5DM4G37BLRUMN/" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-20919/">CVE-2024-20919 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20919">CVE-2024-20919 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218903">SUSE bug 1218903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219843">SUSE bug 1219843</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830536" comment="java-1.8.0-openjdk-1.8.0.402.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830537" comment="java-1.8.0-openjdk-accessibility-1.8.0.402.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830538" comment="java-1.8.0-openjdk-demo-1.8.0.402.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830539" comment="java-1.8.0-openjdk-devel-1.8.0.402.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830540" comment="java-1.8.0-openjdk-headless-1.8.0.402.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830541" comment="java-1.8.0-openjdk-javadoc-1.8.0.402.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830542" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.402.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830543" comment="java-1.8.0-openjdk-src-1.8.0.402.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830544" comment="java-11-openjdk-11.0.22.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830545" comment="java-11-openjdk-devel-11.0.22.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830546" comment="java-11-openjdk-headless-11.0.22.0.7-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202420921" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-20921</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-20921" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20921" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-20921" ref_url="https://www.suse.com/security/cve/CVE-2024-20921" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0479-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-February/034224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018149.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GS63GCBRVH7N4JEIZNQAPVFNNVB2OGSU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0067-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XA5CCGSPUXUTQHDG25O5DM4G37BLRUMN/" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-20921/">CVE-2024-20921 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20921">CVE-2024-20921 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218905">SUSE bug 1218905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219843">SUSE bug 1219843</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830536" comment="java-1.8.0-openjdk-1.8.0.402.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830537" comment="java-1.8.0-openjdk-accessibility-1.8.0.402.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830538" comment="java-1.8.0-openjdk-demo-1.8.0.402.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830539" comment="java-1.8.0-openjdk-devel-1.8.0.402.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830540" comment="java-1.8.0-openjdk-headless-1.8.0.402.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830541" comment="java-1.8.0-openjdk-javadoc-1.8.0.402.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830542" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.402.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830543" comment="java-1.8.0-openjdk-src-1.8.0.402.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830544" comment="java-11-openjdk-11.0.22.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830545" comment="java-11-openjdk-devel-11.0.22.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830546" comment="java-11-openjdk-headless-11.0.22.0.7-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202420926" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-20926</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-20926" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20926" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-20926" ref_url="https://www.suse.com/security/cve/CVE-2024-20926" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0479-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-February/034224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018149.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GS63GCBRVH7N4JEIZNQAPVFNNVB2OGSU/" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-20926/">CVE-2024-20926 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20926">CVE-2024-20926 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218906">SUSE bug 1218906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219843">SUSE bug 1219843</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830536" comment="java-1.8.0-openjdk-1.8.0.402.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830537" comment="java-1.8.0-openjdk-accessibility-1.8.0.402.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830538" comment="java-1.8.0-openjdk-demo-1.8.0.402.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830539" comment="java-1.8.0-openjdk-devel-1.8.0.402.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830540" comment="java-1.8.0-openjdk-headless-1.8.0.402.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830541" comment="java-1.8.0-openjdk-javadoc-1.8.0.402.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830542" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.402.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830543" comment="java-1.8.0-openjdk-src-1.8.0.402.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830544" comment="java-11-openjdk-11.0.22.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830545" comment="java-11-openjdk-devel-11.0.22.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830546" comment="java-11-openjdk-headless-11.0.22.0.7-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202420945" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-20945</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-20945" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20945" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-20945" ref_url="https://www.suse.com/security/cve/CVE-2024-20945" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0479-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-February/034224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018149.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GS63GCBRVH7N4JEIZNQAPVFNNVB2OGSU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0067-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XA5CCGSPUXUTQHDG25O5DM4G37BLRUMN/" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-20945/">CVE-2024-20945 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20945">CVE-2024-20945 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218909">SUSE bug 1218909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219843">SUSE bug 1219843</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830536" comment="java-1.8.0-openjdk-1.8.0.402.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830537" comment="java-1.8.0-openjdk-accessibility-1.8.0.402.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830538" comment="java-1.8.0-openjdk-demo-1.8.0.402.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830539" comment="java-1.8.0-openjdk-devel-1.8.0.402.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830540" comment="java-1.8.0-openjdk-headless-1.8.0.402.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830541" comment="java-1.8.0-openjdk-javadoc-1.8.0.402.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830542" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.402.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830543" comment="java-1.8.0-openjdk-src-1.8.0.402.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830544" comment="java-11-openjdk-11.0.22.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830545" comment="java-11-openjdk-devel-11.0.22.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830546" comment="java-11-openjdk-headless-11.0.22.0.7-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202420952" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-20952</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-20952" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20952" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-20952" ref_url="https://www.suse.com/security/cve/CVE-2024-20952" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0479-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-February/034224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018149.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GS63GCBRVH7N4JEIZNQAPVFNNVB2OGSU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0067-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XA5CCGSPUXUTQHDG25O5DM4G37BLRUMN/" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-07-08"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-20952/">CVE-2024-20952 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20952">CVE-2024-20952 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218911">SUSE bug 1218911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219843">SUSE bug 1219843</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009830536" comment="java-1.8.0-openjdk-1.8.0.402.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830537" comment="java-1.8.0-openjdk-accessibility-1.8.0.402.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830538" comment="java-1.8.0-openjdk-demo-1.8.0.402.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830539" comment="java-1.8.0-openjdk-devel-1.8.0.402.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830540" comment="java-1.8.0-openjdk-headless-1.8.0.402.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830541" comment="java-1.8.0-openjdk-javadoc-1.8.0.402.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830542" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.402.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830543" comment="java-1.8.0-openjdk-src-1.8.0.402.b06-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830544" comment="java-11-openjdk-11.0.22.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830545" comment="java-11-openjdk-devel-11.0.22.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830546" comment="java-11-openjdk-headless-11.0.22.0.7-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202421011" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-21011</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-21011" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21011" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-21011" ref_url="https://www.suse.com/security/cve/CVE-2024-21011" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1450-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1451-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1452-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1498-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1498-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1499-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1845-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019263.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GS63GCBRVH7N4JEIZNQAPVFNNVB2OGSU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0067-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XA5CCGSPUXUTQHDG25O5DM4G37BLRUMN/" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-25"/>
	<updated date="2025-07-08"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-21011/">CVE-2024-21011 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21011">CVE-2024-21011 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222979">SUSE bug 1222979</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009858056" comment="java-1.8.0-openjdk-1.8.0.412.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858057" comment="java-1.8.0-openjdk-accessibility-1.8.0.412.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858058" comment="java-1.8.0-openjdk-demo-1.8.0.412.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858059" comment="java-1.8.0-openjdk-devel-1.8.0.412.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858060" comment="java-1.8.0-openjdk-headless-1.8.0.412.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858061" comment="java-1.8.0-openjdk-javadoc-1.8.0.412.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858062" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.412.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858063" comment="java-1.8.0-openjdk-src-1.8.0.412.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856119" comment="java-11-openjdk-11.0.23.0.9-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856120" comment="java-11-openjdk-demo-11.0.23.0.9-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856121" comment="java-11-openjdk-devel-11.0.23.0.9-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856122" comment="java-11-openjdk-headless-11.0.23.0.9-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856123" comment="java-11-openjdk-javadoc-11.0.23.0.9-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856124" comment="java-11-openjdk-javadoc-zip-11.0.23.0.9-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856125" comment="java-11-openjdk-jmods-11.0.23.0.9-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856126" comment="java-11-openjdk-src-11.0.23.0.9-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856127" comment="java-11-openjdk-static-libs-11.0.23.0.9-2.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202421012" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-21012</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-21012" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21012" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-21012" ref_url="https://www.suse.com/security/cve/CVE-2024-21012" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1452-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1498-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1498-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1499-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1845-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019263.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GS63GCBRVH7N4JEIZNQAPVFNNVB2OGSU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0067-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XA5CCGSPUXUTQHDG25O5DM4G37BLRUMN/" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-25"/>
	<updated date="2025-07-08"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21012/">CVE-2024-21012 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21012">CVE-2024-21012 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222987">SUSE bug 1222987</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009856119" comment="java-11-openjdk-11.0.23.0.9-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856120" comment="java-11-openjdk-demo-11.0.23.0.9-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856121" comment="java-11-openjdk-devel-11.0.23.0.9-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856122" comment="java-11-openjdk-headless-11.0.23.0.9-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856123" comment="java-11-openjdk-javadoc-11.0.23.0.9-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856124" comment="java-11-openjdk-javadoc-zip-11.0.23.0.9-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856125" comment="java-11-openjdk-jmods-11.0.23.0.9-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856126" comment="java-11-openjdk-src-11.0.23.0.9-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856127" comment="java-11-openjdk-static-libs-11.0.23.0.9-2.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202421068" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-21068</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-21068" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21068" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-21068" ref_url="https://www.suse.com/security/cve/CVE-2024-21068" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1450-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1451-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1452-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1498-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1498-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1499-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1845-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019263.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GS63GCBRVH7N4JEIZNQAPVFNNVB2OGSU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0067-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XA5CCGSPUXUTQHDG25O5DM4G37BLRUMN/" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-25"/>
	<updated date="2025-07-08"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21068/">CVE-2024-21068 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21068">CVE-2024-21068 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222983">SUSE bug 1222983</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009858056" comment="java-1.8.0-openjdk-1.8.0.412.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858057" comment="java-1.8.0-openjdk-accessibility-1.8.0.412.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858058" comment="java-1.8.0-openjdk-demo-1.8.0.412.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858059" comment="java-1.8.0-openjdk-devel-1.8.0.412.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858060" comment="java-1.8.0-openjdk-headless-1.8.0.412.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858061" comment="java-1.8.0-openjdk-javadoc-1.8.0.412.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858062" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.412.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858063" comment="java-1.8.0-openjdk-src-1.8.0.412.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856119" comment="java-11-openjdk-11.0.23.0.9-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856120" comment="java-11-openjdk-demo-11.0.23.0.9-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856121" comment="java-11-openjdk-devel-11.0.23.0.9-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856122" comment="java-11-openjdk-headless-11.0.23.0.9-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856123" comment="java-11-openjdk-javadoc-11.0.23.0.9-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856124" comment="java-11-openjdk-javadoc-zip-11.0.23.0.9-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856125" comment="java-11-openjdk-jmods-11.0.23.0.9-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856126" comment="java-11-openjdk-src-11.0.23.0.9-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856127" comment="java-11-openjdk-static-libs-11.0.23.0.9-2.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202421085" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-21085</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-21085" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21085" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-21085" ref_url="https://www.suse.com/security/cve/CVE-2024-21085" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1450-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1451-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1452-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1498-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1498-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1845-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019263.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GS63GCBRVH7N4JEIZNQAPVFNNVB2OGSU/" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-25"/>
	<updated date="2025-07-08"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-21085/">CVE-2024-21085 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21085">CVE-2024-21085 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222984">SUSE bug 1222984</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009858056" comment="java-1.8.0-openjdk-1.8.0.412.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858057" comment="java-1.8.0-openjdk-accessibility-1.8.0.412.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858058" comment="java-1.8.0-openjdk-demo-1.8.0.412.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858059" comment="java-1.8.0-openjdk-devel-1.8.0.412.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858060" comment="java-1.8.0-openjdk-headless-1.8.0.412.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858061" comment="java-1.8.0-openjdk-javadoc-1.8.0.412.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858062" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.412.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858063" comment="java-1.8.0-openjdk-src-1.8.0.412.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856119" comment="java-11-openjdk-11.0.23.0.9-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856120" comment="java-11-openjdk-demo-11.0.23.0.9-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856121" comment="java-11-openjdk-devel-11.0.23.0.9-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856122" comment="java-11-openjdk-headless-11.0.23.0.9-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856123" comment="java-11-openjdk-javadoc-11.0.23.0.9-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856124" comment="java-11-openjdk-javadoc-zip-11.0.23.0.9-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856125" comment="java-11-openjdk-jmods-11.0.23.0.9-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856126" comment="java-11-openjdk-src-11.0.23.0.9-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856127" comment="java-11-openjdk-static-libs-11.0.23.0.9-2.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202421094" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-21094</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-21094" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21094" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-21094" ref_url="https://www.suse.com/security/cve/CVE-2024-21094" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1450-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1451-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1452-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1498-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1498-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1499-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1845-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019263.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GS63GCBRVH7N4JEIZNQAPVFNNVB2OGSU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0067-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XA5CCGSPUXUTQHDG25O5DM4G37BLRUMN/" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-25"/>
	<updated date="2025-07-08"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21094/">CVE-2024-21094 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21094">CVE-2024-21094 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222986">SUSE bug 1222986</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009858056" comment="java-1.8.0-openjdk-1.8.0.412.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858057" comment="java-1.8.0-openjdk-accessibility-1.8.0.412.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858058" comment="java-1.8.0-openjdk-demo-1.8.0.412.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858059" comment="java-1.8.0-openjdk-devel-1.8.0.412.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858060" comment="java-1.8.0-openjdk-headless-1.8.0.412.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858061" comment="java-1.8.0-openjdk-javadoc-1.8.0.412.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858062" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.412.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858063" comment="java-1.8.0-openjdk-src-1.8.0.412.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856119" comment="java-11-openjdk-11.0.23.0.9-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856120" comment="java-11-openjdk-demo-11.0.23.0.9-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856121" comment="java-11-openjdk-devel-11.0.23.0.9-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856122" comment="java-11-openjdk-headless-11.0.23.0.9-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856123" comment="java-11-openjdk-javadoc-11.0.23.0.9-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856124" comment="java-11-openjdk-javadoc-zip-11.0.23.0.9-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856125" comment="java-11-openjdk-jmods-11.0.23.0.9-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856126" comment="java-11-openjdk-src-11.0.23.0.9-2.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856127" comment="java-11-openjdk-static-libs-11.0.23.0.9-2.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202421131" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-21131</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-21131" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21131" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-21131" ref_url="https://www.suse.com/security/cve/CVE-2024-21131" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:4560" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000000.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:4564" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2590-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2766-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2786-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036834.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GS63GCBRVH7N4JEIZNQAPVFNNVB2OGSU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0067-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XA5CCGSPUXUTQHDG25O5DM4G37BLRUMN/" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-23"/>
	<updated date="2025-07-08"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21131/">CVE-2024-21131 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21131">CVE-2024-21131 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228046">SUSE bug 1228046</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009941589" comment="java-1.8.0-openjdk-1.8.0.422.b05-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009941590" comment="java-1.8.0-openjdk-accessibility-1.8.0.422.b05-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009941591" comment="java-1.8.0-openjdk-demo-1.8.0.422.b05-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009941592" comment="java-1.8.0-openjdk-devel-1.8.0.422.b05-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009941593" comment="java-1.8.0-openjdk-headless-1.8.0.422.b05-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009941594" comment="java-1.8.0-openjdk-javadoc-1.8.0.422.b05-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009941595" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.422.b05-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009941596" comment="java-1.8.0-openjdk-src-1.8.0.422.b05-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009880848" comment="java-11-openjdk-11.0.24.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009880849" comment="java-11-openjdk-demo-11.0.24.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009880850" comment="java-11-openjdk-devel-11.0.24.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009880851" comment="java-11-openjdk-headless-11.0.24.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009880852" comment="java-11-openjdk-javadoc-11.0.24.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009880853" comment="java-11-openjdk-javadoc-zip-11.0.24.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009880854" comment="java-11-openjdk-jmods-11.0.24.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009880855" comment="java-11-openjdk-src-11.0.24.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009880856" comment="java-11-openjdk-static-libs-11.0.24.0.8-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202421138" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-21138</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-21138" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21138" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-21138" ref_url="https://www.suse.com/security/cve/CVE-2024-21138" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:4560" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000000.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:4564" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2590-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2766-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2786-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036834.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GS63GCBRVH7N4JEIZNQAPVFNNVB2OGSU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0067-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XA5CCGSPUXUTQHDG25O5DM4G37BLRUMN/" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-23"/>
	<updated date="2025-07-08"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-21138/">CVE-2024-21138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21138">CVE-2024-21138 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228047">SUSE bug 1228047</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009941589" comment="java-1.8.0-openjdk-1.8.0.422.b05-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009941590" comment="java-1.8.0-openjdk-accessibility-1.8.0.422.b05-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009941591" comment="java-1.8.0-openjdk-demo-1.8.0.422.b05-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009941592" comment="java-1.8.0-openjdk-devel-1.8.0.422.b05-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009941593" comment="java-1.8.0-openjdk-headless-1.8.0.422.b05-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009941594" comment="java-1.8.0-openjdk-javadoc-1.8.0.422.b05-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009941595" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.422.b05-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009941596" comment="java-1.8.0-openjdk-src-1.8.0.422.b05-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009880848" comment="java-11-openjdk-11.0.24.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009880849" comment="java-11-openjdk-demo-11.0.24.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009880850" comment="java-11-openjdk-devel-11.0.24.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009880851" comment="java-11-openjdk-headless-11.0.24.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009880852" comment="java-11-openjdk-javadoc-11.0.24.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009880853" comment="java-11-openjdk-javadoc-zip-11.0.24.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009880854" comment="java-11-openjdk-jmods-11.0.24.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009880855" comment="java-11-openjdk-src-11.0.24.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009880856" comment="java-11-openjdk-static-libs-11.0.24.0.8-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202421140" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-21140</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-21140" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21140" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-21140" ref_url="https://www.suse.com/security/cve/CVE-2024-21140" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:4560" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000000.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:4564" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2590-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2766-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2786-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036834.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GS63GCBRVH7N4JEIZNQAPVFNNVB2OGSU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0067-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XA5CCGSPUXUTQHDG25O5DM4G37BLRUMN/" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-23"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21140/">CVE-2024-21140 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21140">CVE-2024-21140 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228048">SUSE bug 1228048</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009941589" comment="java-1.8.0-openjdk-1.8.0.422.b05-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009941590" comment="java-1.8.0-openjdk-accessibility-1.8.0.422.b05-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009941591" comment="java-1.8.0-openjdk-demo-1.8.0.422.b05-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009941592" comment="java-1.8.0-openjdk-devel-1.8.0.422.b05-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009941593" comment="java-1.8.0-openjdk-headless-1.8.0.422.b05-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009941594" comment="java-1.8.0-openjdk-javadoc-1.8.0.422.b05-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009941595" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.422.b05-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009941596" comment="java-1.8.0-openjdk-src-1.8.0.422.b05-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009880848" comment="java-11-openjdk-11.0.24.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009880849" comment="java-11-openjdk-demo-11.0.24.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009880850" comment="java-11-openjdk-devel-11.0.24.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009880851" comment="java-11-openjdk-headless-11.0.24.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009880852" comment="java-11-openjdk-javadoc-11.0.24.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009880853" comment="java-11-openjdk-javadoc-zip-11.0.24.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009880854" comment="java-11-openjdk-jmods-11.0.24.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009880855" comment="java-11-openjdk-src-11.0.24.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009880856" comment="java-11-openjdk-static-libs-11.0.24.0.8-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202421144" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-21144</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-21144" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21144" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-21144" ref_url="https://www.suse.com/security/cve/CVE-2024-21144" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:4560" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000000.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:4564" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2590-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2766-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2786-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036834.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GS63GCBRVH7N4JEIZNQAPVFNNVB2OGSU/" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-23"/>
	<updated date="2025-08-05"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-21144/">CVE-2024-21144 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-21144">CVE-2024-21144 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228050">SUSE bug 1228050</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009941589" comment="java-1.8.0-openjdk-1.8.0.422.b05-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009941590" comment="java-1.8.0-openjdk-accessibility-1.8.0.422.b05-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009941591" comment="java-1.8.0-openjdk-demo-1.8.0.422.b05-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009941592" comment="java-1.8.0-openjdk-devel-1.8.0.422.b05-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009941593" comment="java-1.8.0-openjdk-headless-1.8.0.422.b05-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009941594" comment="java-1.8.0-openjdk-javadoc-1.8.0.422.b05-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009941595" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.422.b05-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009941596" comment="java-1.8.0-openjdk-src-1.8.0.422.b05-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009880848" comment="java-11-openjdk-11.0.24.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009880849" comment="java-11-openjdk-demo-11.0.24.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009880850" comment="java-11-openjdk-devel-11.0.24.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009880851" comment="java-11-openjdk-headless-11.0.24.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009880852" comment="java-11-openjdk-javadoc-11.0.24.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009880853" comment="java-11-openjdk-javadoc-zip-11.0.24.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009880854" comment="java-11-openjdk-jmods-11.0.24.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009880855" comment="java-11-openjdk-src-11.0.24.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009880856" comment="java-11-openjdk-static-libs-11.0.24.0.8-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202421145" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-21145</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-21145" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21145" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-21145" ref_url="https://www.suse.com/security/cve/CVE-2024-21145" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:4560" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000000.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:4564" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2590-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2766-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2786-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3987-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019817.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GS63GCBRVH7N4JEIZNQAPVFNNVB2OGSU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0067-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XA5CCGSPUXUTQHDG25O5DM4G37BLRUMN/" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-23"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21145/">CVE-2024-21145 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-21145">CVE-2024-21145 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228051">SUSE bug 1228051</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009941589" comment="java-1.8.0-openjdk-1.8.0.422.b05-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009941590" comment="java-1.8.0-openjdk-accessibility-1.8.0.422.b05-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009941591" comment="java-1.8.0-openjdk-demo-1.8.0.422.b05-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009941592" comment="java-1.8.0-openjdk-devel-1.8.0.422.b05-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009941593" comment="java-1.8.0-openjdk-headless-1.8.0.422.b05-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009941594" comment="java-1.8.0-openjdk-javadoc-1.8.0.422.b05-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009941595" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.422.b05-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009941596" comment="java-1.8.0-openjdk-src-1.8.0.422.b05-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009880848" comment="java-11-openjdk-11.0.24.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009880849" comment="java-11-openjdk-demo-11.0.24.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009880850" comment="java-11-openjdk-devel-11.0.24.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009880851" comment="java-11-openjdk-headless-11.0.24.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009880852" comment="java-11-openjdk-javadoc-11.0.24.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009880853" comment="java-11-openjdk-javadoc-zip-11.0.24.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009880854" comment="java-11-openjdk-jmods-11.0.24.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009880855" comment="java-11-openjdk-src-11.0.24.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009880856" comment="java-11-openjdk-static-libs-11.0.24.0.8-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202421147" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-21147</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-21147" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21147" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-21147" ref_url="https://www.suse.com/security/cve/CVE-2024-21147" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:4560" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000000.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:4564" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2590-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2766-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2786-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036834.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GS63GCBRVH7N4JEIZNQAPVFNNVB2OGSU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0067-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XA5CCGSPUXUTQHDG25O5DM4G37BLRUMN/" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-23"/>
	<updated date="2025-07-08"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-21147/">CVE-2024-21147 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21147">CVE-2024-21147 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228052">SUSE bug 1228052</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009941589" comment="java-1.8.0-openjdk-1.8.0.422.b05-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009941590" comment="java-1.8.0-openjdk-accessibility-1.8.0.422.b05-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009941591" comment="java-1.8.0-openjdk-demo-1.8.0.422.b05-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009941592" comment="java-1.8.0-openjdk-devel-1.8.0.422.b05-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009941593" comment="java-1.8.0-openjdk-headless-1.8.0.422.b05-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009941594" comment="java-1.8.0-openjdk-javadoc-1.8.0.422.b05-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009941595" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.422.b05-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009941596" comment="java-1.8.0-openjdk-src-1.8.0.422.b05-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009880848" comment="java-11-openjdk-11.0.24.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009880849" comment="java-11-openjdk-demo-11.0.24.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009880850" comment="java-11-openjdk-devel-11.0.24.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009880851" comment="java-11-openjdk-headless-11.0.24.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009880852" comment="java-11-openjdk-javadoc-11.0.24.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009880853" comment="java-11-openjdk-javadoc-zip-11.0.24.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009880854" comment="java-11-openjdk-jmods-11.0.24.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009880855" comment="java-11-openjdk-src-11.0.24.0.8-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009880856" comment="java-11-openjdk-static-libs-11.0.24.0.8-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202421626" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-21626</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-21626" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21626" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-21626" ref_url="https://www.suse.com/security/cve/CVE-2024-21626" source="SUSE CVE"/>
		<reference ref_id="ESSA-2024:0027" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001077.html" source="SUSE-SU"/>
		<reference ref_id="ESSA-2024:0037" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017910.html" source="SUSE-SU"/>
		<reference ref_id="TID000021363" ref_url="https://www.suse.com/support/kb/doc/?id=000021363" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0074-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MFFSKUX256PEK52RLQGT33MIN3ZQO27D/" source="SUSE-SU"/>
    <description>
    runc is a CLI tool for spawning and running containers on Linux according to the OCI specification. In runc 1.1.11 and earlier, due to an internal file descriptor leak, an attacker could cause a newly-spawned container process (from runc exec) to have a working directory in the host filesystem namespace, allowing for a container escape by giving access to the host filesystem ("attack 2"). The same attack could be used by a malicious image to allow a container process to gain access to the host filesystem through runc run ("attack 1"). Variants of attacks 1 and 2 could be also be used to overwrite semi-arbitrary host binaries, allowing for complete container escapes ("attack 3a" and "attack 3b"). runc 1.1.12 includes patches for this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-04-25"/>
	<updated date="2025-07-08"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-21626/">CVE-2024-21626 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-21626">CVE-2024-21626 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218894">SUSE bug 1218894</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009976233" comment="docker-1.13.1-210.git7d71120.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976234" comment="docker-client-1.13.1-210.git7d71120.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976235" comment="docker-common-1.13.1-210.git7d71120.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976236" comment="docker-logrotate-1.13.1-210.git7d71120.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976237" comment="docker-lvm-plugin-1.13.1-210.git7d71120.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976238" comment="docker-novolume-plugin-1.13.1-210.git7d71120.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976239" comment="docker-v1.10-migrator-1.13.1-210.git7d71120.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976232" comment="runc-1.0.0-70.rc10.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202421885" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-21885</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-21885" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21885" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-21885" ref_url="https://www.suse.com/security/cve/CVE-2024-21885" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017669.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017712.html" source="SUSE-SU"/>
    <description>
    A flaw was found in X.Org server. In the XISendDeviceHierarchyEvent function, it is possible to exceed the allocated array length when certain new device IDs are added to the xXIHierarchyInfo struct. This can trigger a heap buffer overflow condition, which may lead to an application crash or remote code execution in SSH X11 forwarding environments.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-21885/">CVE-2024-21885 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21885">CVE-2024-21885 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218584">SUSE bug 1218584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221590">SUSE bug 1221590</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009846117" comment="tigervnc-1.8.0-31.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846118" comment="tigervnc-icons-1.8.0-31.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846119" comment="tigervnc-license-1.8.0-31.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846120" comment="tigervnc-server-1.8.0-31.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846121" comment="tigervnc-server-applet-1.8.0-31.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846122" comment="tigervnc-server-minimal-1.8.0-31.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846123" comment="tigervnc-server-module-1.8.0-31.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830550" comment="xorg-x11-server-Xdmx-1.20.4-27.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830551" comment="xorg-x11-server-Xephyr-1.20.4-27.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830552" comment="xorg-x11-server-Xnest-1.20.4-27.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830553" comment="xorg-x11-server-Xorg-1.20.4-27.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830554" comment="xorg-x11-server-Xvfb-1.20.4-27.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830555" comment="xorg-x11-server-Xwayland-1.20.4-27.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830556" comment="xorg-x11-server-common-1.20.4-27.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830557" comment="xorg-x11-server-devel-1.20.4-27.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830558" comment="xorg-x11-server-source-1.20.4-27.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202421886" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-21886</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-21886" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21886" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-21886" ref_url="https://www.suse.com/security/cve/CVE-2024-21886" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017669.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017712.html" source="SUSE-SU"/>
    <description>
    A heap buffer overflow flaw was found in the DisableDevice function in the X.Org server. This issue may lead to an application crash or, in some circumstances, remote code execution in SSH X11 forwarding environments.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-21886/">CVE-2024-21886 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21886">CVE-2024-21886 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218585">SUSE bug 1218585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221590">SUSE bug 1221590</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009846117" comment="tigervnc-1.8.0-31.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846118" comment="tigervnc-icons-1.8.0-31.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846119" comment="tigervnc-license-1.8.0-31.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846120" comment="tigervnc-server-1.8.0-31.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846121" comment="tigervnc-server-applet-1.8.0-31.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846122" comment="tigervnc-server-minimal-1.8.0-31.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846123" comment="tigervnc-server-module-1.8.0-31.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830550" comment="xorg-x11-server-Xdmx-1.20.4-27.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830551" comment="xorg-x11-server-Xephyr-1.20.4-27.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830552" comment="xorg-x11-server-Xnest-1.20.4-27.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830553" comment="xorg-x11-server-Xorg-1.20.4-27.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830554" comment="xorg-x11-server-Xvfb-1.20.4-27.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830555" comment="xorg-x11-server-Xwayland-1.20.4-27.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830556" comment="xorg-x11-server-common-1.20.4-27.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830557" comment="xorg-x11-server-devel-1.20.4-27.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009830558" comment="xorg-x11-server-source-1.20.4-27.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20242199" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-2199</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-2199" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2199" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-2199" ref_url="https://www.suse.com/security/cve/CVE-2024-2199" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019198.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3082-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019745.html" source="SUSE-SU"/>
    <description>
    A denial of service vulnerability was found in 389-ds-base ldap server. This issue may allow an authenticated user to cause a server crash while modifying `userPassword` using malformed input.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-11"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-2199/">CVE-2024-2199 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2199">CVE-2024-2199 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225507">SUSE bug 1225507</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009865172" comment="389-ds-base-1.3.11.1-5.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865173" comment="389-ds-base-devel-1.3.11.1-5.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865174" comment="389-ds-base-libs-1.3.11.1-5.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865175" comment="389-ds-base-snmp-1.3.11.1-5.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20242201" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-2201</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-2201" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2201" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-2201" ref_url="https://www.suse.com/security/cve/CVE-2024-2201" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6994" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000110.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8617" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1259-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1295-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019508.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="TID000021421" ref_url="https://www.suse.com/support/kb/doc/?id=000021421" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    A cross-privilege Spectre v2 vulnerability allows attackers to bypass all deployed mitigations, including the recent Fine(IBT), and to leak arbitrary Linux kernel memory on Intel systems.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-04"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-2201/">CVE-2024-2201 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2201">CVE-2024-2201 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212111">SUSE bug 1212111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217339">SUSE bug 1217339</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009945459" comment="bpftool-3.10.0-1160.125.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945460" comment="kernel-3.10.0-1160.125.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945461" comment="kernel-abi-whitelists-3.10.0-1160.125.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945462" comment="kernel-debug-3.10.0-1160.125.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945465" comment="kernel-doc-3.10.0-1160.125.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945466" comment="kernel-headers-3.10.0-1160.125.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945467" comment="kernel-tools-3.10.0-1160.125.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945468" comment="kernel-tools-libs-3.10.0-1160.125.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945470" comment="perf-3.10.0-1160.125.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945471" comment="python-perf-3.10.0-1160.125.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202424582" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-24582</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-24582" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24582" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-24582" ref_url="https://www.suse.com/security/cve/CVE-2024-24582" source="SUSE CVE"/>
    <description>
    Improper input validation in XmlCli feature for UEFI firmware for some Intel(R) processors may allow privileged user to potentially enable escalation of privilege via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-31"/>
	<updated date="2026-01-31"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-24582/">CVE-2024-24582 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24582">CVE-2024-24582 at NVD</cve>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040954" comment="microcode_ctl-2.1-73.23.el7_9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202425617" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-25617</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-25617" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25617" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-25617" ref_url="https://www.suse.com/security/cve/CVE-2024-25617" source="SUSE CVE"/>
		<reference ref_id="GHSA-h5x6-w8mv-xfpr" ref_url="https://github.com/squid-cache/squid/security/advisories//GHSA-h5x6-w8mv-xfpr" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1113-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034847.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1114-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1115-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034845.html" source="SUSE-SU"/>
    <description>
    Squid is an open source caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. Due to a Collapse of Data into Unsafe Value bug ,Squid may be vulnerable to a Denial of Service attack against HTTP header parsing. This problem allows a remote client or a remote server to perform Denial of Service when sending oversized headers in HTTP messages. In versions of Squid prior to 6.5 this can be achieved if the request_header_max_size or reply_header_max_size settings are unchanged from the default. In Squid version 6.5 and later, the default setting of these parameters is safe. Squid will emit a critical warning in cache.log if the administrator is setting these parameters to unsafe values. Squid will not at this time prevent these settings from being changed to unsafe values. Users are advised to upgrade to version 6.5. There are no known workarounds for this vulnerability. This issue is also tracked as SQUID-2024:2
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-13"/>
	<updated date="2025-07-08"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-25617/">CVE-2024-25617 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-25617">CVE-2024-25617 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219960">SUSE bug 1219960</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009854317" comment="squid-3.5.20-17.el7_9.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009854318" comment="squid-migration-script-3.5.20-17.el7_9.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009854319" comment="squid-sysvinit-3.5.20-17.el7_9.10 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20242607" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-2607</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-2607" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2607" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-2607" ref_url="https://www.suse.com/security/cve/CVE-2024-2607" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1147-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034875.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Return registers were overwritten which could have allowed an attacker to execute arbitrary code. *Note:* This issue only affected Armv7-A systems. Other operating systems are unaffected. This vulnerability affects Firefox &lt; 124, Firefox ESR &lt; 115.9, and Thunderbird &lt; 115.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-28"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-2607/">CVE-2024-2607 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2607">CVE-2024-2607 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221327">SUSE bug 1221327</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851985" comment="thunderbird-115.9.0-1.el7_9 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009852714" comment="firefox-115.9.1-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851985" comment="thunderbird-115.9.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20242608" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-2608</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-2608" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2608" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-2608" ref_url="https://www.suse.com/security/cve/CVE-2024-2608" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1147-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034875.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    `AppendEncodedAttributeValue(), ExtraSpaceNeededForAttrEncoding()` and `AppendEncodedCharacters()` could have experienced integer overflows, causing underallocation of an output buffer leading to an out of bounds write. This vulnerability affects Firefox &lt; 124, Firefox ESR &lt; 115.9, and Thunderbird &lt; 115.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-28"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-2608/">CVE-2024-2608 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2608">CVE-2024-2608 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221327">SUSE bug 1221327</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851985" comment="thunderbird-115.9.0-1.el7_9 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009852714" comment="firefox-115.9.1-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851985" comment="thunderbird-115.9.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20242609" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-2609</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-2609" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2609" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-2609" ref_url="https://www.suse.com/security/cve/CVE-2024-2609" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1437-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1676-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018597.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    The permission prompt input delay could expire while the window is not in focus. This makes it vulnerable to clickjacking by malicious websites. This vulnerability affects Firefox &lt; 124, Firefox ESR &lt; 115.10, and Thunderbird &lt; 115.10.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-2609/">CVE-2024-2609 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2609">CVE-2024-2609 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221327">SUSE bug 1221327</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855857" comment="firefox-115.10.0-1.el7_9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20242610" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-2610</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-2610" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2610" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-2610" ref_url="https://www.suse.com/security/cve/CVE-2024-2610" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1147-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034875.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Using a markup injection an attacker could have stolen nonce values. This could have been used to bypass strict content security policies. This vulnerability affects Firefox &lt; 124, Firefox ESR &lt; 115.9, and Thunderbird &lt; 115.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-28"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-2610/">CVE-2024-2610 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2610">CVE-2024-2610 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221327">SUSE bug 1221327</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851985" comment="thunderbird-115.9.0-1.el7_9 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009852714" comment="firefox-115.9.1-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851985" comment="thunderbird-115.9.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20242611" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-2611</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-2611" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2611" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-2611" ref_url="https://www.suse.com/security/cve/CVE-2024-2611" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1147-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034875.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A missing delay on when pointer lock was used could have allowed a malicious page to trick a user into granting permissions. This vulnerability affects Firefox &lt; 124, Firefox ESR &lt; 115.9, and Thunderbird &lt; 115.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-28"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-2611/">CVE-2024-2611 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2611">CVE-2024-2611 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221327">SUSE bug 1221327</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851985" comment="thunderbird-115.9.0-1.el7_9 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009852714" comment="firefox-115.9.1-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851985" comment="thunderbird-115.9.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20242612" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-2612</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-2612" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2612" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-2612" ref_url="https://www.suse.com/security/cve/CVE-2024-2612" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1147-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034875.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    If an attacker could find a way to trigger a particular code path in `SafeRefPtr`, it could have triggered a crash or potentially be leveraged to achieve code execution. This vulnerability affects Firefox &lt; 124, Firefox ESR &lt; 115.9, and Thunderbird &lt; 115.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-28"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-2612/">CVE-2024-2612 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2612">CVE-2024-2612 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221327">SUSE bug 1221327</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851985" comment="thunderbird-115.9.0-1.el7_9 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009852714" comment="firefox-115.9.1-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851985" comment="thunderbird-115.9.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20242614" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-2614</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-2614" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2614" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-2614" ref_url="https://www.suse.com/security/cve/CVE-2024-2614" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1147-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034875.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Memory safety bugs present in Firefox 123, Firefox ESR 115.8, and Thunderbird 115.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 124, Firefox ESR &lt; 115.9, and Thunderbird &lt; 115.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-28"/>
	<updated date="2025-02-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-2614/">CVE-2024-2614 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-2614">CVE-2024-2614 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221327">SUSE bug 1221327</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851985" comment="thunderbird-115.9.0-1.el7_9 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009852714" comment="firefox-115.9.1-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851985" comment="thunderbird-115.9.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20242616" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-2616</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-2616" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2616" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-2616" ref_url="https://www.suse.com/security/cve/CVE-2024-2616" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1147-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034875.html" source="SUSE-SU"/>
    <description>
    To harden ICU against exploitation, the behavior for out-of-memory conditions was changed to crash instead of attempt to continue. This vulnerability affects Firefox ESR &lt; 115.9 and Thunderbird &lt; 115.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-04"/>
	<updated date="2025-02-26"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-2616/">CVE-2024-2616 at SUSE</cve>
	<cve impact="low" cvss3="2.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-2616">CVE-2024-2616 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221327">SUSE bug 1221327</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009852714" comment="firefox-115.9.1-1.el7_9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426602" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26602</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26602" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26602" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26602" ref_url="https://www.suse.com/security/cve/CVE-2024-26602" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sched/membarrier: reduce the ability to hammer on sys_membarrier

On some systems, sys_membarrier can be very expensive, causing overall
slowdowns for everything.  So put a lock on the path in order to
serialize the accesses to prevent the ability for this to be called at
too high of a frequency and saturate the machine.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-22"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26602/">CVE-2024-26602 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26602">CVE-2024-26602 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220398">SUSE bug 1220398</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009851792" comment="bpftool-3.10.0-1160.114.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851793" comment="kernel-3.10.0-1160.114.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851794" comment="kernel-abi-whitelists-3.10.0-1160.114.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851795" comment="kernel-debug-3.10.0-1160.114.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851798" comment="kernel-doc-3.10.0-1160.114.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851799" comment="kernel-headers-3.10.0-1160.114.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851800" comment="kernel-tools-3.10.0-1160.114.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851801" comment="kernel-tools-libs-3.10.0-1160.114.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851803" comment="perf-3.10.0-1160.114.2.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851804" comment="python-perf-3.10.0-1160.114.2.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202428127" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-28127</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-28127" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28127" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-28127" ref_url="https://www.suse.com/security/cve/CVE-2024-28127" source="SUSE CVE"/>
    <description>
    Improper input validation in UEFI firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-31"/>
	<updated date="2026-01-31"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-28127/">CVE-2024-28127 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28127">CVE-2024-28127 at NVD</cve>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040954" comment="microcode_ctl-2.1-73.23.el7_9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202428956" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-28956</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-28956" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28956" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-28956" ref_url="https://www.suse.com/security/cve/CVE-2024-28956" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:10108" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001787.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:10991" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001789.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:13962" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039307.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01651-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01651-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039391.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01703-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01707-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01850-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040198.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01860-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01951-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01965-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01972-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02000-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02030-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02173-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02326-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1567-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-May/020842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20343-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20344-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20354-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20355-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20410-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20424-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040391.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024168.html" source="SUSE-SU"/>
		<reference ref_id="TID000021845" ref_url="https://www.suse.com/support/kb/doc/?id=000021845" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15086-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ANGNTGSZ5LTAKIQQHL254Y6BCBTC33W2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15093-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IDMNMRHOEJBKOC4ZPMYVNMKT2SGRVB7Q/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15142-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KEACKX57LEHS2YKZ4PO5DYNOQRGQSDO2/" source="SUSE-SU"/>
    <description>
    Exposure of Sensitive Information in Shared Microarchitectural Structures during Transient Execution for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-07-11"/>
	<updated date="2026-02-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-28956/">CVE-2024-28956 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28956">CVE-2024-28956 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242006">SUSE bug 1242006</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999889" comment="microcode_ctl-2.1-73.24.el7_9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202429214" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-29214</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-29214" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29214" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-29214" ref_url="https://www.suse.com/security/cve/CVE-2024-29214" source="SUSE CVE"/>
    <description>
    Improper input validation in UEFI firmware CseVariableStorageSmm for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-31"/>
	<updated date="2026-01-31"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-29214/">CVE-2024-29214 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-29214">CVE-2024-29214 at NVD</cve>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040954" comment="microcode_ctl-2.1-73.23.el7_9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20242961" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-2961</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-2961" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2961" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-2961" ref_url="https://www.suse.com/security/cve/CVE-2024-2961" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1375-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1728-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1977-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021353.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0081-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/472PX6IZ26ALBE66YKBJD3XTN7M34U4L/" source="SUSE-SU"/>
    <description>
    The iconv() function in the GNU C Library versions 2.39 and older may overflow the output buffer passed to it by up to 4 bytes when converting strings to the ISO-2022-CN-EXT character set, which may be used to crash an application or overwrite a neighbouring variable.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-07-08"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-2961/">CVE-2024-2961 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2961">CVE-2024-2961 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222992">SUSE bug 1222992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223019">SUSE bug 1223019</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009865873" comment="glibc-2.17-326.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865874" comment="glibc-common-2.17-326.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865875" comment="glibc-devel-2.17-326.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865876" comment="glibc-headers-2.17-326.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865877" comment="glibc-static-2.17-326.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865878" comment="glibc-utils-2.17-326.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865879" comment="nscd-2.17-326.el7_9.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202429944" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-29944</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-29944" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29944" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-29944" ref_url="https://www.suse.com/security/cve/CVE-2024-29944" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018221.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    An attacker was able to inject an event handler into a privileged object that would allow arbitrary JavaScript execution in the parent process. Note: This vulnerability affects Desktop Firefox only, it does not affect mobile versions of Firefox. This vulnerability affects Firefox &lt; 124.0.1 and Firefox ESR &lt; 115.9.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-04"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-29944/">CVE-2024-29944 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-29944">CVE-2024-29944 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221850">SUSE bug 1221850</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009852714" comment="firefox-115.9.1-1.el7_9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202431080" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-31080</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-31080" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31080" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-31080" ref_url="https://www.suse.com/security/cve/CVE-2024-31080" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9093" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000596.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9122" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1199-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1260-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1261-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1262-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1265-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019222.html" source="SUSE-SU"/>
    <description>
    A heap-based buffer over-read vulnerability was found in the X.org server's ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker's inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-13"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-31080/">CVE-2024-31080 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31080">CVE-2024-31080 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222309">SUSE bug 1222309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222312">SUSE bug 1222312</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009858653" comment="tigervnc-1.8.0-33.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858654" comment="tigervnc-icons-1.8.0-33.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858655" comment="tigervnc-license-1.8.0-33.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858656" comment="tigervnc-server-1.8.0-33.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858657" comment="tigervnc-server-applet-1.8.0-33.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858658" comment="tigervnc-server-minimal-1.8.0-33.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858659" comment="tigervnc-server-module-1.8.0-33.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009854308" comment="xorg-x11-server-Xdmx-1.20.4-29.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009854309" comment="xorg-x11-server-Xephyr-1.20.4-29.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009854310" comment="xorg-x11-server-Xnest-1.20.4-29.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009854311" comment="xorg-x11-server-Xorg-1.20.4-29.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009854312" comment="xorg-x11-server-Xvfb-1.20.4-29.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009854313" comment="xorg-x11-server-Xwayland-1.20.4-29.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009854314" comment="xorg-x11-server-common-1.20.4-29.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009854315" comment="xorg-x11-server-devel-1.20.4-29.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009854316" comment="xorg-x11-server-source-1.20.4-29.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202431081" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-31081</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-31081" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31081" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-31081" ref_url="https://www.suse.com/security/cve/CVE-2024-31081" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9093" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000596.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9122" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1199-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1260-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1261-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1262-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1265-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019222.html" source="SUSE-SU"/>
    <description>
    A heap-based buffer over-read vulnerability was found in the X.org server's ProcXIPassiveGrabDevice() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker's inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-13"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-31081/">CVE-2024-31081 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31081">CVE-2024-31081 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222310">SUSE bug 1222310</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222312">SUSE bug 1222312</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009858653" comment="tigervnc-1.8.0-33.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858654" comment="tigervnc-icons-1.8.0-33.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858655" comment="tigervnc-license-1.8.0-33.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858656" comment="tigervnc-server-1.8.0-33.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858657" comment="tigervnc-server-applet-1.8.0-33.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858658" comment="tigervnc-server-minimal-1.8.0-33.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858659" comment="tigervnc-server-module-1.8.0-33.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009854308" comment="xorg-x11-server-Xdmx-1.20.4-29.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009854309" comment="xorg-x11-server-Xephyr-1.20.4-29.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009854310" comment="xorg-x11-server-Xnest-1.20.4-29.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009854311" comment="xorg-x11-server-Xorg-1.20.4-29.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009854312" comment="xorg-x11-server-Xvfb-1.20.4-29.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009854313" comment="xorg-x11-server-Xwayland-1.20.4-29.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009854314" comment="xorg-x11-server-common-1.20.4-29.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009854315" comment="xorg-x11-server-devel-1.20.4-29.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009854316" comment="xorg-x11-server-source-1.20.4-29.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202431083" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-31083</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-31083" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31083" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-31083" ref_url="https://www.suse.com/security/cve/CVE-2024-31083" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9093" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000596.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9122" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1199-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1260-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1261-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1262-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1263-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1265-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019222.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability was found in the ProcRenderAddGlyphs() function of Xorg servers. This issue occurs when AllocateGlyph() is called to store new glyphs sent by the client to the X server, potentially resulting in multiple entries pointing to the same non-refcounted glyphs. Consequently, ProcRenderAddGlyphs() may free a glyph, leading to a use-after-free scenario when the same glyph pointer is subsequently accessed. This flaw allows an authenticated attacker to execute arbitrary code on the system by sending a specially crafted request.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-13"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-31083/">CVE-2024-31083 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31083">CVE-2024-31083 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222312">SUSE bug 1222312</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009858653" comment="tigervnc-1.8.0-33.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858654" comment="tigervnc-icons-1.8.0-33.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858655" comment="tigervnc-license-1.8.0-33.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858656" comment="tigervnc-server-1.8.0-33.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858657" comment="tigervnc-server-applet-1.8.0-33.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858658" comment="tigervnc-server-minimal-1.8.0-33.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858659" comment="tigervnc-server-module-1.8.0-33.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009854308" comment="xorg-x11-server-Xdmx-1.20.4-29.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009854309" comment="xorg-x11-server-Xephyr-1.20.4-29.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009854310" comment="xorg-x11-server-Xnest-1.20.4-29.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009854311" comment="xorg-x11-server-Xorg-1.20.4-29.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009854312" comment="xorg-x11-server-Xvfb-1.20.4-29.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009854313" comment="xorg-x11-server-Xwayland-1.20.4-29.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009854314" comment="xorg-x11-server-common-1.20.4-29.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009854315" comment="xorg-x11-server-devel-1.20.4-29.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009854316" comment="xorg-x11-server-source-1.20.4-29.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20243183" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-3183</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-3183" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3183" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-3183" ref_url="https://www.suse.com/security/cve/CVE-2024-3183" source="SUSE CVE"/>
    <description>
    A vulnerability was found in FreeIPA in a way when a Kerberos TGS-REQ is encrypted using the client's session key. This key is different for each new session, which protects it from brute force attacks. However, the ticket it contains is encrypted using the target principal key directly. For user principals, this key is a hash of a public per-principal randomly-generated salt and the user's password.

If a principal is compromised it means the attacker would be able to retrieve tickets encrypted to any principal, all of them being encrypted by their own key directly. By taking these tickets and salts offline, the attacker could run brute force attacks to find character strings able to decrypt tickets when combined to a principal salt (i.e. find the principal's password).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-12-19"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-3183/">CVE-2024-3183 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3183">CVE-2024-3183 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009865902" comment="ipa-client-4.6.8-5.el7_9.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865903" comment="ipa-client-common-4.6.8-5.el7_9.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865904" comment="ipa-common-4.6.8-5.el7_9.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865905" comment="ipa-python-compat-4.6.8-5.el7_9.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865906" comment="ipa-server-4.6.8-5.el7_9.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865907" comment="ipa-server-common-4.6.8-5.el7_9.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865908" comment="ipa-server-dns-4.6.8-5.el7_9.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865909" comment="ipa-server-trust-ad-4.6.8-5.el7_9.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865910" comment="python2-ipaclient-4.6.8-5.el7_9.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865911" comment="python2-ipalib-4.6.8-5.el7_9.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865912" comment="python2-ipaserver-4.6.8-5.el7_9.17 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202432462" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-32462</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-32462" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32462" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-32462" ref_url="https://www.suse.com/security/cve/CVE-2024-32462" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1535-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1536-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1547-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1548-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1803-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1806-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2067-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035613.html" source="SUSE-SU"/>
    <description>
    Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. in versions before 1.10.9, 1.12.9, 1.14.6, and 1.15.8, a malicious or compromised Flatpak app could execute arbitrary code outside its sandbox. Normally, the `--command` argument of `flatpak run` expects to be given a command to run in the specified Flatpak app, optionally along with some arguments. However it is possible to instead pass `bwrap` arguments to `--command=`, such as `--bind`. It's possible to pass an arbitrary `commandline` to the portal interface `org.freedesktop.portal.Background.RequestBackground` from within a Flatpak app. When this is converted into a `--command` and arguments, it achieves the same effect of passing arguments directly to `bwrap`, and thus can be used for a sandbox escape. The solution is to pass the `--` argument to `bwrap`, which makes it stop processing options. This has been supported since bubblewrap 0.3.0. All supported versions of Flatpak require at least that version of bubblewrap. xdg-desktop-portal version 1.18.4 will mitigate this vulnerability by only allowing Flatpak apps to create .desktop files for commands that do not start with --. The vulnerability is patched in 1.15.8, 1.10.9, 1.12.9, and 1.14.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-20"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-32462/">CVE-2024-32462 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-32462">CVE-2024-32462 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223110">SUSE bug 1223110</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009868190" comment="flatpak-1.0.9-13.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868191" comment="flatpak-builder-1.0.0-13.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868192" comment="flatpak-devel-1.0.9-13.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868193" comment="flatpak-libs-1.0.9-13.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202432487" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-32487</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-32487" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32487" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-32487" ref_url="https://www.suse.com/security/cve/CVE-2024-32487" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1534-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1598-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1598-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2060-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021387.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040305.html" source="SUSE-SU"/>
    <description>
    less through 653 allows OS command execution via a newline character in the name of a file, because quoting is mishandled in filename.c. Exploitation typically requires use with attacker-controlled file names, such as the files extracted from an untrusted archive. Exploitation also requires the LESSOPEN environment variable, but this is set by default in many common cases.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-11"/>
	<updated date="2025-06-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-32487/">CVE-2024-32487 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-32487">CVE-2024-32487 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222849">SUSE bug 1222849</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865176" comment="less-458-10.el7_9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20243302" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-3302</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-3302" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3302" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-3302" ref_url="https://www.suse.com/security/cve/CVE-2024-3302" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1437-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1676-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018597.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    There was no limit to the number of HTTP/2 CONTINUATION frames that would be processed. A server could abuse this to create an Out of Memory condition in the browser. This vulnerability affects Firefox &lt; 125, Firefox ESR &lt; 115.10, and Thunderbird &lt; 115.10.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-07"/>
	<updated date="2026-03-07"/>
	<severity>Important</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-3302/">CVE-2024-3302 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3302">CVE-2024-3302 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222535">SUSE bug 1222535</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855857" comment="firefox-115.10.0-1.el7_9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202433599" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-33599</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-33599" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33599" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-33599" ref_url="https://www.suse.com/security/cve/CVE-2024-33599" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1895-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1977-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021353.html" source="SUSE-SU"/>
    <description>
    nscd: Stack-based buffer overflow in netgroup cache

If the Name Service Cache Daemon's (nscd) fixed size cache is exhausted
by client requests then a subsequent client request for netgroup data
may result in a stack-based buffer overflow.  This flaw was introduced
in glibc 2.15 when the cache was added to nscd.

This vulnerability is only present in the nscd binary.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-07-08"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-33599/">CVE-2024-33599 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-33599">CVE-2024-33599 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223423">SUSE bug 1223423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223530">SUSE bug 1223530</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009865873" comment="glibc-2.17-326.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865874" comment="glibc-common-2.17-326.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865875" comment="glibc-devel-2.17-326.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865876" comment="glibc-headers-2.17-326.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865877" comment="glibc-static-2.17-326.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865878" comment="glibc-utils-2.17-326.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865879" comment="nscd-2.17-326.el7_9.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202433600" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-33600</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-33600" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33600" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-33600" ref_url="https://www.suse.com/security/cve/CVE-2024-33600" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1895-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1977-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021353.html" source="SUSE-SU"/>
    <description>
    nscd: Null pointer crashes after notfound response

If the Name Service Cache Daemon's (nscd) cache fails to add a not-found
netgroup response to the cache, the client request can result in a null
pointer dereference.  This flaw was introduced in glibc 2.15 when the
cache was added to nscd.

This vulnerability is only present in the nscd binary.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-07-08"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-33600/">CVE-2024-33600 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-33600">CVE-2024-33600 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222992">SUSE bug 1222992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223424">SUSE bug 1223424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223589">SUSE bug 1223589</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009865873" comment="glibc-2.17-326.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865874" comment="glibc-common-2.17-326.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865875" comment="glibc-devel-2.17-326.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865876" comment="glibc-headers-2.17-326.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865877" comment="glibc-static-2.17-326.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865878" comment="glibc-utils-2.17-326.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865879" comment="nscd-2.17-326.el7_9.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202433601" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-33601</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-33601" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33601" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-33601" ref_url="https://www.suse.com/security/cve/CVE-2024-33601" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1895-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1977-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021353.html" source="SUSE-SU"/>
    <description>
    nscd: netgroup cache may terminate daemon on memory allocation failure

The Name Service Cache Daemon's (nscd) netgroup cache uses xmalloc or
xrealloc and these functions may terminate the process due to a memory
allocation failure resulting in a denial of service to the clients.  The
flaw was introduced in glibc 2.15 when the cache was added to nscd.

This vulnerability is only present in the nscd binary.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-33601/">CVE-2024-33601 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-33601">CVE-2024-33601 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223426">SUSE bug 1223426</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009865873" comment="glibc-2.17-326.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865874" comment="glibc-common-2.17-326.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865875" comment="glibc-devel-2.17-326.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865876" comment="glibc-headers-2.17-326.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865877" comment="glibc-static-2.17-326.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865878" comment="glibc-utils-2.17-326.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865879" comment="nscd-2.17-326.el7_9.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202433602" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-33602</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-33602" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33602" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-33602" ref_url="https://www.suse.com/security/cve/CVE-2024-33602" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1895-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1977-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021353.html" source="SUSE-SU"/>
    <description>
    nscd: netgroup cache assumes NSS callback uses in-buffer strings

The Name Service Cache Daemon's (nscd) netgroup cache can corrupt memory
when the NSS callback does not store all strings in the provided buffer.
The flaw was introduced in glibc 2.15 when the cache was added to nscd.

This vulnerability is only present in the nscd binary.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-08-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-33602/">CVE-2024-33602 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-33602">CVE-2024-33602 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223425">SUSE bug 1223425</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009865873" comment="glibc-2.17-326.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865874" comment="glibc-common-2.17-326.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865875" comment="glibc-devel-2.17-326.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865876" comment="glibc-headers-2.17-326.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865877" comment="glibc-static-2.17-326.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865878" comment="glibc-utils-2.17-326.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865879" comment="nscd-2.17-326.el7_9.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202433871" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-33871</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-33871" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33871" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-33871" ref_url="https://www.suse.com/security/cve/CVE-2024-33871" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:4549" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2198-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2199-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035725.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Artifex Ghostscript before 10.03.1. contrib/opvp/gdevopvp.c allows arbitrary code execution via a custom Driver library, exploitable via a crafted PostScript document. This occurs because the Driver parameter for opvp (and oprp) devices can have an arbitrary name for a dynamic library; this library is then loaded.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-31"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-33871/">CVE-2024-33871 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-33871">CVE-2024-33871 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225491">SUSE bug 1225491</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009877712" comment="ghostscript-9.25-5.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877713" comment="ghostscript-cups-9.25-5.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877714" comment="ghostscript-doc-9.25-5.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877715" comment="ghostscript-gtk-9.25-5.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877716" comment="libgs-9.25-5.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877717" comment="libgs-devel-9.25-5.el7_9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20243596" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-3596</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-3596" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3596" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-3596" ref_url="https://www.suse.com/security/cve/CVE-2024-3596" source="SUSE CVE"/>
		<reference ref_id="ESSA-2024:0650" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000163.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8788" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000634.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8860" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000199.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9474" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2359-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2361-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035873.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2366-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2367-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035870.html" source="SUSE-SU"/>
    <description>
    RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-06"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-3596/">CVE-2024-3596 at SUSE</cve>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-3596">CVE-2024-3596 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223414">SUSE bug 1223414</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009950973" comment="freeradius-3.0.13-15.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950974" comment="freeradius-devel-3.0.13-15.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950975" comment="freeradius-doc-3.0.13-15.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950976" comment="freeradius-krb5-3.0.13-15.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950977" comment="freeradius-ldap-3.0.13-15.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950978" comment="freeradius-mysql-3.0.13-15.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950979" comment="freeradius-perl-3.0.13-15.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950980" comment="freeradius-postgresql-3.0.13-15.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950981" comment="freeradius-python-3.0.13-15.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950982" comment="freeradius-sqlite-3.0.13-15.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950983" comment="freeradius-unixODBC-3.0.13-15.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950984" comment="freeradius-utils-3.0.13-15.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009956539" comment="krb5-devel-1.15.1-55.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009956540" comment="krb5-libs-1.15.1-55.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009956541" comment="krb5-pkinit-1.15.1-55.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009956542" comment="krb5-server-1.15.1-55.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009956543" comment="krb5-server-ldap-1.15.1-55.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009956544" comment="krb5-workstation-1.15.1-55.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009956545" comment="libkadm5-1.15.1-55.el7_9.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20243651" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-3651</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-3651" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3651" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-3651" ref_url="https://www.suse.com/security/cve/CVE-2024-3651" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8365" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-202410:15282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-202410:15283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1428-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1439-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1439-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1939-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021036.html" source="SUSE-SU"/>
    <description>
    A vulnerability was identified in the kjd/idna library, specifically within the `idna.encode()` function, affecting version 3.6. The issue arises from the function's handling of crafted input strings, which can lead to quadratic complexity and consequently, a denial of service condition. This vulnerability is triggered by a crafted input that causes the `idna.encode()` function to process the input with considerable computational load, significantly increasing the processing time in a quadratic manner relative to the input size.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-06"/>
	<updated date="2025-06-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-3651/">CVE-2024-3651 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-3651">CVE-2024-3651 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222842">SUSE bug 1222842</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950985" comment="python-idna-2.4-2.el7_9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20243657" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-3657</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-3657" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3657" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-3657" ref_url="https://www.suse.com/security/cve/CVE-2024-3657" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019198.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3082-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019745.html" source="SUSE-SU"/>
    <description>
    A flaw was found in 389-ds-base. A specially-crafted LDAP query can potentially cause a failure on the directory server, leading to a denial of service
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-11"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-3657/">CVE-2024-3657 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3657">CVE-2024-3657 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225512">SUSE bug 1225512</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009865172" comment="389-ds-base-1.3.11.1-5.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865173" comment="389-ds-base-devel-1.3.11.1-5.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865174" comment="389-ds-base-libs-1.3.11.1-5.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009865175" comment="389-ds-base-snmp-1.3.11.1-5.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436971" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36971</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36971" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36971" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36971" ref_url="https://www.suse.com/security/cve/CVE-2024-36971" source="SUSE CVE"/>
		<reference ref_id="ESSA-2024:0618" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2385-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3585-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0254-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TXXGNAJF6LIQZ33Z2TGQJBQXVAR577Z4/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
		<reference ref_id="TID000021562" ref_url="https://www.suse.com/support/kb/doc/?id=000021562" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: fix __dst_negative_advice() race

__dst_negative_advice() does not enforce proper RCU rules when
sk-&gt;dst_cache must be cleared, leading to possible UAF.

RCU rules are that we must first clear sk-&gt;sk_dst_cache,
then call dst_release(old_dst).

Note that sk_dst_reset(sk) is implementing this protocol correctly,
while __dst_negative_advice() uses the wrong order.

Given that ip6_negative_advice() has special logic
against RTF_CACHE, this means each of the three -&gt;negative_advice()
existing methods must perform the sk_dst_reset() themselves.

Note the check against NULL dst is centralized in
__dst_negative_advice(), there is no need to duplicate
it in various callbacks.

Many thanks to Clement Lecigne for tracking this issue.

This old bug became visible after the blamed commit, using UDP sockets.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-19"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36971/">CVE-2024-36971 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36971">CVE-2024-36971 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226145">SUSE bug 1226145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226324">SUSE bug 1226324</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009943012" comment="bpftool-3.10.0-1160.123.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943013" comment="kernel-3.10.0-1160.123.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943014" comment="kernel-abi-whitelists-3.10.0-1160.123.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943015" comment="kernel-debug-3.10.0-1160.123.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943018" comment="kernel-doc-3.10.0-1160.123.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943019" comment="kernel-headers-3.10.0-1160.123.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943020" comment="kernel-tools-3.10.0-1160.123.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943021" comment="kernel-tools-libs-3.10.0-1160.123.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943023" comment="perf-3.10.0-1160.123.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943024" comment="python-perf-3.10.0-1160.123.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202437370" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-37370</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-37370" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37370" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-37370" ref_url="https://www.suse.com/security/cve/CVE-2024-37370" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:5076" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000004.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:6166" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2302-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2303-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2307-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024200.html" source="SUSE-SU"/>
    <description>
    In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can modify the plaintext Extra Count field of a confidential GSS krb5 wrap token, causing the unwrapped token to appear truncated to the application.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2026-02-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-37370/">CVE-2024-37370 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-37370">CVE-2024-37370 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227186">SUSE bug 1227186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227187">SUSE bug 1227187</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009880203" comment="krb5-devel-1.15.1-55.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009880204" comment="krb5-libs-1.15.1-55.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009880205" comment="krb5-pkinit-1.15.1-55.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009880206" comment="krb5-server-1.15.1-55.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009880207" comment="krb5-server-ldap-1.15.1-55.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009880208" comment="krb5-workstation-1.15.1-55.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009880209" comment="libkadm5-1.15.1-55.el7_9.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202437371" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-37371</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-37371" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37371" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-37371" ref_url="https://www.suse.com/security/cve/CVE-2024-37371" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:5076" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000004.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:6166" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000010.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1671" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000898.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1673" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2302-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2303-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2307-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024200.html" source="SUSE-SU"/>
    <description>
    In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can cause invalid memory reads during GSS message token handling by sending message tokens with invalid length fields.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2026-02-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-37371/">CVE-2024-37371 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-37371">CVE-2024-37371 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227186">SUSE bug 1227186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227187">SUSE bug 1227187</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009880203" comment="krb5-devel-1.15.1-55.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009880204" comment="krb5-libs-1.15.1-55.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009880205" comment="krb5-pkinit-1.15.1-55.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009880206" comment="krb5-server-1.15.1-55.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009880207" comment="krb5-server-ldap-1.15.1-55.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009880208" comment="krb5-workstation-1.15.1-55.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009880209" comment="libkadm5-1.15.1-55.el7_9.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438474" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38474</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38474" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38474" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38474" ref_url="https://www.suse.com/security/cve/CVE-2024-38474" source="SUSE CVE"/>
		<reference ref_id="ESSA-2024:0620" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000036.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:4943" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3172-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3173-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036816.html" source="SUSE-SU"/>
    <description>
    Substitution encoding issue in mod_rewrite in Apache HTTP Server 2.4.59 and earlier allows attacker to execute scripts in
directories permitted by the configuration but not directly reachable by any  URL or source disclosure of scripts meant to only to be executed as CGI.

Users are recommended to upgrade to version 2.4.60, which fixes this issue.

Some RewriteRules that capture and substitute unsafely will now fail unless rewrite flag "UnsafeAllow3F" is specified.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-18"/>
	<updated date="2025-12-19"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-38474/">CVE-2024-38474 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38474">CVE-2024-38474 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227278">SUSE bug 1227278</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009942736" comment="httpd-2.4.6-99.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942737" comment="httpd-devel-2.4.6-99.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942738" comment="httpd-manual-2.4.6-99.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942739" comment="httpd-tools-2.4.6-99.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942740" comment="mod_ldap-2.4.6-99.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942741" comment="mod_proxy_html-2.4.6-99.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942742" comment="mod_session-2.4.6-99.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942743" comment="mod_ssl-2.4.6-99.el7_9.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438475" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38475</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38475" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38475" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38475" ref_url="https://www.suse.com/security/cve/CVE-2024-38475" source="SUSE CVE"/>
		<reference ref_id="ESSA-2024:0620" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000036.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:4943" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2436-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2597-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019050.html" source="SUSE-SU"/>
    <description>
    Improper escaping of output in mod_rewrite in Apache HTTP Server 2.4.59 and earlier allows an attacker to map URLs to filesystem locations that are  permitted to be served by the server but are not intentionally/directly reachable by any URL, resulting in code execution or source code disclosure. 

Substitutions in  server context that use a backreferences or variables as the first segment of the substitution are affected.   Some unsafe RewiteRules will be broken by this change and the rewrite flag "UnsafePrefixStat" can be used to opt back in once ensuring the substitution is appropriately constrained.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-18"/>
	<updated date="2025-12-19"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-38475/">CVE-2024-38475 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38475">CVE-2024-38475 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227268">SUSE bug 1227268</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009942736" comment="httpd-2.4.6-99.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942737" comment="httpd-devel-2.4.6-99.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942738" comment="httpd-manual-2.4.6-99.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942739" comment="httpd-tools-2.4.6-99.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942740" comment="mod_ldap-2.4.6-99.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942741" comment="mod_proxy_html-2.4.6-99.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942742" comment="mod_session-2.4.6-99.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942743" comment="mod_ssl-2.4.6-99.el7_9.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438476" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38476</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38476" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38476" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38476" ref_url="https://www.suse.com/security/cve/CVE-2024-38476" source="SUSE CVE"/>
		<reference ref_id="ESSA-2024:0630" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2597-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019050.html" source="SUSE-SU"/>
    <description>
    Vulnerability in core of Apache HTTP Server 2.4.59 and earlier are vulnerably to information disclosure, SSRF or local script execution via  backend applications whose response headers are malicious or exploitable.

Users are recommended to upgrade to version 2.4.60, which fixes this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-17"/>
	<updated date="2025-12-19"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-38476/">CVE-2024-38476 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38476">CVE-2024-38476 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227269">SUSE bug 1227269</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009947472" comment="httpd-2.4.6-99.el7_9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947473" comment="httpd-devel-2.4.6-99.el7_9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947474" comment="httpd-manual-2.4.6-99.el7_9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947475" comment="httpd-tools-2.4.6-99.el7_9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947476" comment="mod_ldap-2.4.6-99.el7_9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947477" comment="mod_proxy_html-2.4.6-99.el7_9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947478" comment="mod_session-2.4.6-99.el7_9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947479" comment="mod_ssl-2.4.6-99.el7_9.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438477" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38477</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38477" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38477" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38477" ref_url="https://www.suse.com/security/cve/CVE-2024-38477" source="SUSE CVE"/>
		<reference ref_id="ESSA-2024:0620" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000036.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:4943" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2405-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2436-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02241-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040632.html" source="SUSE-SU"/>
    <description>
    null pointer dereference in mod_proxy in Apache HTTP Server 2.4.59 and earlier allows an attacker to crash the server via a malicious request.
Users are recommended to upgrade to version 2.4.60, which fixes this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-18"/>
	<updated date="2025-07-09"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38477/">CVE-2024-38477 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38477">CVE-2024-38477 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227270">SUSE bug 1227270</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009942736" comment="httpd-2.4.6-99.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942737" comment="httpd-devel-2.4.6-99.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942738" comment="httpd-manual-2.4.6-99.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942739" comment="httpd-tools-2.4.6-99.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942740" comment="mod_ldap-2.4.6-99.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942741" comment="mod_proxy_html-2.4.6-99.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942742" comment="mod_session-2.4.6-99.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942743" comment="mod_ssl-2.4.6-99.el7_9.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20243852" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-3852</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-3852" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3852" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-3852" ref_url="https://www.suse.com/security/cve/CVE-2024-3852" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1437-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1676-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018597.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    GetBoundName could return the wrong version of an object when JIT optimizations were applied. This vulnerability affects Firefox &lt; 125, Firefox ESR &lt; 115.10, and Thunderbird &lt; 115.10.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-3852/">CVE-2024-3852 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3852">CVE-2024-3852 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222535">SUSE bug 1222535</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855857" comment="firefox-115.10.0-1.el7_9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20243854" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-3854</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-3854" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3854" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-3854" ref_url="https://www.suse.com/security/cve/CVE-2024-3854" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1437-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1676-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018597.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    In some code patterns the JIT incorrectly optimized switch statements and generated code with out-of-bounds-reads. This vulnerability affects Firefox &lt; 125, Firefox ESR &lt; 115.10, and Thunderbird &lt; 115.10.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-3854/">CVE-2024-3854 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3854">CVE-2024-3854 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222535">SUSE bug 1222535</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855857" comment="firefox-115.10.0-1.el7_9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20243857" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-3857</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-3857" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3857" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-3857" ref_url="https://www.suse.com/security/cve/CVE-2024-3857" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1437-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1676-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018597.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    The JIT created incorrect code for arguments in certain cases. This led to potential use-after-free crashes during garbage collection. This vulnerability affects Firefox &lt; 125, Firefox ESR &lt; 115.10, and Thunderbird &lt; 115.10.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-3857/">CVE-2024-3857 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3857">CVE-2024-3857 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222535">SUSE bug 1222535</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855857" comment="firefox-115.10.0-1.el7_9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20243859" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-3859</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-3859" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3859" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-3859" ref_url="https://www.suse.com/security/cve/CVE-2024-3859" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1437-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1676-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018597.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    On 32-bit versions there were integer-overflows that led to an out-of-bounds-read that potentially could be triggered by a malformed OpenType font. This vulnerability affects Firefox &lt; 125, Firefox ESR &lt; 115.10, and Thunderbird &lt; 115.10.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-3859/">CVE-2024-3859 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3859">CVE-2024-3859 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222535">SUSE bug 1222535</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855857" comment="firefox-115.10.0-1.el7_9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20243861" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-3861</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-3861" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3861" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-3861" ref_url="https://www.suse.com/security/cve/CVE-2024-3861" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1437-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1676-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018597.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    If an AlignedBuffer were assigned to itself, the subsequent self-move could result in an incorrect reference count and later use-after-free. This vulnerability affects Firefox &lt; 125, Firefox ESR &lt; 115.10, and Thunderbird &lt; 115.10.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-3861/">CVE-2024-3861 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3861">CVE-2024-3861 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222535">SUSE bug 1222535</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855857" comment="firefox-115.10.0-1.el7_9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20243864" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-3864</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-3864" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3864" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-3864" ref_url="https://www.suse.com/security/cve/CVE-2024-3864" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1437-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1676-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018597.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Memory safety bug present in Firefox 124, Firefox ESR 115.9, and Thunderbird 115.9. This bug showed evidence of memory corruption and we presume that with enough effort this could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 125, Firefox ESR &lt; 115.10, and Thunderbird &lt; 115.10.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-24"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-3864/">CVE-2024-3864 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3864">CVE-2024-3864 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222535">SUSE bug 1222535</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855857" comment="firefox-115.10.0-1.el7_9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202439936" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-39936</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-39936" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39936" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-39936" ref_url="https://www.suse.com/security/cve/CVE-2024-39936" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:4647" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2873-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2875-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2883-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2946-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036479.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in HTTP2 in Qt before 5.15.18, 6.x before 6.2.13, 6.3.x through 6.5.x before 6.5.7, and 6.6.x through 6.7.x before 6.7.3. Code to make security-relevant decisions about an established connection may execute too early, because the encrypted() signal has not yet been emitted and processed..
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-25"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-39936/">CVE-2024-39936 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39936">CVE-2024-39936 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227426">SUSE bug 1227426</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009944418" comment="qt5-qtbase-5.9.7-6.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944419" comment="qt5-qtbase-common-5.9.7-6.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944420" comment="qt5-qtbase-devel-5.9.7-6.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944421" comment="qt5-qtbase-doc-5.9.7-6.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944422" comment="qt5-qtbase-examples-5.9.7-6.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944423" comment="qt5-qtbase-gui-5.9.7-6.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944424" comment="qt5-qtbase-mysql-5.9.7-6.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944425" comment="qt5-qtbase-odbc-5.9.7-6.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944426" comment="qt5-qtbase-postgresql-5.9.7-6.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944427" comment="qt5-qtbase-static-5.9.7-6.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944428" comment="qt5-rpm-macros-5.9.7-6.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441071" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41071</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41071" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41071" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41071" ref_url="https://www.suse.com/security/cve/CVE-2024-41071" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6994" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000110.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:6997" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000081.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024175.html" source="SUSE-SU"/>
    <description>
    This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-04"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-41071/">CVE-2024-41071 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41071">CVE-2024-41071 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228625">SUSE bug 1228625</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009945459" comment="bpftool-3.10.0-1160.125.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945460" comment="kernel-3.10.0-1160.125.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945461" comment="kernel-abi-whitelists-3.10.0-1160.125.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945462" comment="kernel-debug-3.10.0-1160.125.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945465" comment="kernel-doc-3.10.0-1160.125.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945466" comment="kernel-headers-3.10.0-1160.125.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945467" comment="kernel-tools-3.10.0-1160.125.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945468" comment="kernel-tools-libs-3.10.0-1160.125.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945470" comment="perf-3.10.0-1160.125.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945471" comment="python-perf-3.10.0-1160.125.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442472" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42472</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42472" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42472" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42472" ref_url="https://www.suse.com/security/cve/CVE-2024-42472" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6356" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000024.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:6417" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000034.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9449" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3073-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3104-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019388.html" source="SUSE-SU"/>
    <description>
    Flatpak is a Linux application sandboxing and distribution framework. Prior to versions 1.14.0 and 1.15.10, a malicious or compromised Flatpak app using persistent directories could access and write files outside of what it would otherwise have access to, which is an attack on integrity and confidentiality.

When `persistent=subdir` is used in the application permissions (represented as `--persist=subdir` in the command-line interface), that means that an application which otherwise doesn't have access to the real user home directory will see an empty home directory with a writeable subdirectory `subdir`. Behind the scenes, this directory is actually a bind mount and the data is stored in the per-application directory as `~/.var/app/$APPID/subdir`. This allows existing apps that are not aware of the per-application directory to still work as intended without general home directory access.

However, the application does have write access to the application directory `~/.var/app/$APPID` where this directory is stored. If the source directory for the `persistent`/`--persist` option is replaced by a symlink, then the next time the application is started, the bind mount will follow the symlink and mount whatever it points to into the sandbox.

Partial protection against this vulnerability can be provided by patching Flatpak using the patches in commits ceec2ffc and 98f79773. However, this leaves a race condition that could be exploited by two instances of a malicious app running in parallel. Closing the race condition requires updating or patching the version of bubblewrap that is used by Flatpak to add the new `--bind-fd` option using the patch and then patching Flatpak to use it. If Flatpak has been configured at build-time with `-Dsystem_bubblewrap=bwrap` (1.15.x) or `--with-system-bubblewrap=bwrap` (1.14.x or older), or a similar option, then the version of bubblewrap that needs to be patched is a system copy that is distributed separately, typically `/usr/bin/bwrap`. This configuration is the one that is typically used in Linux distributions. If Flatpak has been configured at build-time with `-Dsystem_bubblewrap=` (1.15.x) or with `--without-system-bubblewrap` (1.14.x or older), then it is the bundled version of bubblewrap that is included with Flatpak that must be patched. This is typically installed as `/usr/libexec/flatpak-bwrap`. This configuration is the default when building from source code.

For the 1.14.x stable branch, these changes are included in Flatpak 1.14.10. The bundled version of bubblewrap included in this release has been updated to 0.6.3. For the 1.15.x development branch, these changes are included in Flatpak 1.15.10. The bundled version of bubblewrap in this release is a Meson "wrap" subproject, which has been updated to 0.10.0. The 1.12.x and 1.10.x branches will not be updated for this vulnerability. Long-term support OS distributions should backport the individual changes into their versions of Flatpak and bubblewrap, or update to newer versions if their stability policy allows it. As a workaround, avoid using applications using the `persistent` (`--persist`) permission.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-18"/>
	<updated date="2025-07-24"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N" cvss4="9.2/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42472/">CVE-2024-42472 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42472">CVE-2024-42472 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229157">SUSE bug 1229157</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009942748" comment="flatpak-1.0.9-15.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942749" comment="flatpak-builder-1.0.0-15.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942750" comment="flatpak-devel-1.0.9-15.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942751" comment="flatpak-libs-1.0.9-15.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443420" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43420</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43420" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43420" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43420" ref_url="https://www.suse.com/security/cve/CVE-2024-43420" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039307.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01651-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01651-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039391.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1567-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-May/020842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20410-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20424-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040391.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15093-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IDMNMRHOEJBKOC4ZPMYVNMKT2SGRVB7Q/" source="SUSE-SU"/>
    <description>
    Exposure of sensitive information caused by shared microarchitectural predictor state that influences transient execution for some Intel Atom(R) processors may allow an authenticated user to potentially enable information disclosure via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-18"/>
	<updated date="2025-12-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2024-43420/">CVE-2024-43420 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43420">CVE-2024-43420 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242006">SUSE bug 1242006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1243451">SUSE bug 1243451</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999889" comment="microcode_ctl-2.1-73.24.el7_9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20244367" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-4367</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-4367" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4367" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-4367" ref_url="https://www.suse.com/security/cve/CVE-2024-4367" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1676-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019264.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A type check was missing when handling fonts in PDF.js, which would allow arbitrary JavaScript execution in the PDF.js context. This vulnerability affects Firefox &lt; 126, Firefox ESR &lt; 115.11, and Thunderbird &lt; 115.11.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-31"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-4367/">CVE-2024-4367 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-4367">CVE-2024-4367 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224056">SUSE bug 1224056</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009863197" comment="firefox-115.11.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009863198" comment="thunderbird-115.11.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202445332" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-45332</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-45332" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45332" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-45332" ref_url="https://www.suse.com/security/cve/CVE-2024-45332" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039307.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01651-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01651-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039391.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1567-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-May/020842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20410-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20424-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040391.html" source="SUSE-SU"/>
		<reference ref_id="TID000021844" ref_url="https://www.suse.com/support/kb/doc/?id=000021844" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15093-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IDMNMRHOEJBKOC4ZPMYVNMKT2SGRVB7Q/" source="SUSE-SU"/>
    <description>
    Exposure of sensitive information caused by shared microarchitectural predictor state that influences transient execution in the indirect branch predictors for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-18"/>
	<updated date="2025-12-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2024-45332/">CVE-2024-45332 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45332">CVE-2024-45332 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242006">SUSE bug 1242006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1243180">SUSE bug 1243180</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999889" comment="microcode_ctl-2.1-73.24.el7_9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202445781" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-45781</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-45781" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45781" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-45781" ref_url="https://www.suse.com/security/cve/CVE-2024-45781" source="SUSE CVE"/>
		<reference ref_id="ESSA-2025:2835" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001028.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:6990" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01961-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20511-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20863-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042315.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14822-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ASOEHBP5LS2I6OPV4KMUZIY2AF7IGH4E/" source="SUSE-SU"/>
    <description>
    A flaw was found in grub2. When reading a symbolic link's name from a UFS filesystem, grub2 fails to validate the string length taken as an input. The lack of validation may lead to a heap out-of-bounds write, causing data integrity issues and eventually allowing an attacker to circumvent secure boot protections.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-04-10"/>
	<updated date="2025-10-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-45781/">CVE-2024-45781 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45781">CVE-2024-45781 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233617">SUSE bug 1233617</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009974746" comment="grub2-2.02-0.87.0.4.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974747" comment="grub2-common-2.02-0.87.0.4.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974748" comment="grub2-efi-ia32-2.02-0.87.0.4.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974749" comment="grub2-efi-ia32-cdboot-2.02-0.87.0.4.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974750" comment="grub2-efi-ia32-modules-2.02-0.87.0.4.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974751" comment="grub2-efi-x64-2.02-0.87.0.4.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974752" comment="grub2-efi-x64-cdboot-2.02-0.87.0.4.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974753" comment="grub2-efi-x64-modules-2.02-0.87.0.4.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974754" comment="grub2-pc-2.02-0.87.0.4.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974755" comment="grub2-pc-modules-2.02-0.87.0.4.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974756" comment="grub2-tools-2.02-0.87.0.4.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974757" comment="grub2-tools-extra-2.02-0.87.0.4.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974758" comment="grub2-tools-minimal-2.02-0.87.0.4.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202445782" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-45782</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-45782" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45782" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-45782" ref_url="https://www.suse.com/security/cve/CVE-2024-45782" source="SUSE CVE"/>
		<reference ref_id="ESSA-2025:2835" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01961-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20511-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20863-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042315.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14822-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ASOEHBP5LS2I6OPV4KMUZIY2AF7IGH4E/" source="SUSE-SU"/>
    <description>
    A flaw was found in the HFS filesystem. When reading an HFS volume's name at grub_fs_mount(), the HFS filesystem driver performs a strcpy() using the user-provided volume name as input without properly validating the volume name's length. This issue may read to a heap-based out-of-bounds writer, impacting grub's sensitive data integrity and eventually leading to a secure boot protection bypass.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-04-10"/>
	<updated date="2025-10-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-45782/">CVE-2024-45782 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45782">CVE-2024-45782 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233615">SUSE bug 1233615</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009974746" comment="grub2-2.02-0.87.0.4.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974747" comment="grub2-common-2.02-0.87.0.4.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974748" comment="grub2-efi-ia32-2.02-0.87.0.4.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974749" comment="grub2-efi-ia32-cdboot-2.02-0.87.0.4.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974750" comment="grub2-efi-ia32-modules-2.02-0.87.0.4.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974751" comment="grub2-efi-x64-2.02-0.87.0.4.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974752" comment="grub2-efi-x64-cdboot-2.02-0.87.0.4.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974753" comment="grub2-efi-x64-modules-2.02-0.87.0.4.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974754" comment="grub2-pc-2.02-0.87.0.4.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974755" comment="grub2-pc-modules-2.02-0.87.0.4.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974756" comment="grub2-tools-2.02-0.87.0.4.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974757" comment="grub2-tools-extra-2.02-0.87.0.4.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974758" comment="grub2-tools-minimal-2.02-0.87.0.4.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202445802" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-45802</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-45802" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45802" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-45802" ref_url="https://www.suse.com/security/cve/CVE-2024-45802" source="SUSE CVE"/>
		<reference ref_id="GHSA-f975-v7qw-q7hj" ref_url="https://github.com/squid-cache/squid/security/advisories//GHSA-f975-v7qw-q7hj" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9625" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000501.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9644" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000622.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9738" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000647.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14566-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2MQUZAQT5UXLCPYAFDZWWXOJDXWWESAT/" source="SUSE-SU"/>
    <description>
    Squid is an open source caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. Due to Input Validation, Premature Release of Resource During Expected Lifetime, and Missing Release of Resource after Effective Lifetime bugs, Squid is vulnerable to Denial of Service attacks by a trusted server against all clients using the proxy. This bug is fixed in the default build configuration of Squid version 6.10.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-11"/>
	<updated date="2025-08-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" cvss4="8.9/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2024-45802/">CVE-2024-45802 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45802">CVE-2024-45802 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232485">SUSE bug 1232485</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009957237" comment="squid-3.5.20-17.el7_9.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957238" comment="squid-migration-script-3.5.20-17.el7_9.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957239" comment="squid-sysvinit-3.5.20-17.el7_9.11 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447076" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47076</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47076" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47076" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47076" ref_url="https://www.suse.com/security/cve/CVE-2024-47076" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7346" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000099.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:7463" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000104.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:7553" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3863-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019765.html" source="SUSE-SU"/>
		<reference ref_id="TID000021571" ref_url="https://www.suse.com/support/kb/doc/?id=000021571" source="SUSE-SU"/>
    <description>
    CUPS is a standards-based, open-source printing system, and `libcupsfilters` contains the code of the filters of the former `cups-filters` package as library functions to be used for the data format conversion tasks needed in Printer Applications. The `cfGetPrinterAttributes5` function in `libcupsfilters` does not sanitize IPP attributes returned from an IPP server. When these IPP attributes are used, for instance, to generate a PPD file, this can lead to attacker controlled data to be provided to the rest of the CUPS system.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-12"/>
	<updated date="2025-09-30"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="9.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2024-47076/">CVE-2024-47076 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47076">CVE-2024-47076 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230932">SUSE bug 1230932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230937">SUSE bug 1230937</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009947248" comment="cups-filters-1.0.35-29.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947249" comment="cups-filters-devel-1.0.35-29.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947250" comment="cups-filters-libs-1.0.35-29.el7_9.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447175" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47175</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47175" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47175" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47175" ref_url="https://www.suse.com/security/cve/CVE-2024-47175" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7346" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000099.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:7463" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000104.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:7553" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000124.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9470" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000555.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:0083" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03261-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041765.html" source="SUSE-SU"/>
		<reference ref_id="TID000021571" ref_url="https://www.suse.com/support/kb/doc/?id=000021571" source="SUSE-SU"/>
    <description>
    CUPS is a standards-based, open-source printing system, and `libppd` can be used for legacy PPD file support. The `libppd` function `ppdCreatePPDFromIPP2` does not sanitize IPP attributes when creating the PPD buffer. When used in combination with other functions such as `cfGetPrinterAttributes5`, can result in user controlled input and ultimately code execution via Foomatic. This vulnerability can be part of an exploit chain leading to remote code execution (RCE), as described in CVE-2024-47176.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-12"/>
	<updated date="2025-10-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2024-47175/">CVE-2024-47175 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47175">CVE-2024-47175 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230932">SUSE bug 1230932</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009947248" comment="cups-filters-1.0.35-29.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947249" comment="cups-filters-devel-1.0.35-29.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947250" comment="cups-filters-libs-1.0.35-29.el7_9.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447176" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47176</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47176" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47176" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47176" ref_url="https://www.suse.com/security/cve/CVE-2024-47176" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7346" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000099.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:7463" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000104.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:7553" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3523-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019654.html" source="SUSE-SU"/>
		<reference ref_id="TID000021571" ref_url="https://www.suse.com/support/kb/doc/?id=000021571" source="SUSE-SU"/>
    <description>
    CUPS is a standards-based, open-source printing system, and `cups-browsed` contains network printing functionality including, but not limited to, auto-discovering print services and shared printers. `cups-browsed` binds to `INADDR_ANY:631`, causing it to trust any packet from any source, and can cause the `Get-Printer-Attributes` IPP request to an attacker controlled URL. When combined with other vulnerabilities, such as CVE-2024-47076, CVE-2024-47175, and CVE-2024-47177, an attacker can execute arbitrary commands remotely on the target machine without authentication when a malicious printer is printed to.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-12"/>
	<updated date="2025-07-24"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="9.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2024-47176/">CVE-2024-47176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-47176">CVE-2024-47176 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230932">SUSE bug 1230932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230939">SUSE bug 1230939</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009947248" comment="cups-filters-1.0.35-29.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947249" comment="cups-filters-devel-1.0.35-29.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947250" comment="cups-filters-libs-1.0.35-29.el7_9.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447252" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47252</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47252" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47252" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47252" ref_url="https://www.suse.com/security/cve/CVE-2024-47252" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:14997" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001981.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:15023" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001973.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:15123" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02565-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02682-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02683-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02684-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02685-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041070.html" source="SUSE-SU"/>
    <description>
    Insufficient escaping of user-supplied data in mod_ssl in Apache HTTP Server 2.4.63 and earlier allows an untrusted SSL/TLS client to insert escape characters into log files in some configurations.

In a logging configuration where CustomLog is used with "%{varname}x" or "%{varname}c" to log variables provided by mod_ssl such as SSL_TLS_SNI, no escaping is performed by either mod_log_config or mod_ssl and unsanitized data provided by the client may appear in log files.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-09-09"/>
	<updated date="2025-09-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47252/">CVE-2024-47252 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-47252">CVE-2024-47252 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246303">SUSE bug 1246303</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010017223" comment="httpd-2.4.6-99.el7_9.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017224" comment="httpd-devel-2.4.6-99.el7_9.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017225" comment="httpd-manual-2.4.6-99.el7_9.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017226" comment="httpd-tools-2.4.6-99.el7_9.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017227" comment="mod_ldap-2.4.6-99.el7_9.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017228" comment="mod_proxy_html-2.4.6-99.el7_9.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017229" comment="mod_session-2.4.6-99.el7_9.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017230" comment="mod_ssl-2.4.6-99.el7_9.6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20244767" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-4767</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-4767" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4767" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-4767" ref_url="https://www.suse.com/security/cve/CVE-2024-4767" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1676-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019264.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    If the `browser.privatebrowsing.autostart` preference is enabled, IndexedDB files were not properly deleted when the window was closed. This preference is disabled by default in Firefox. This vulnerability affects Firefox &lt; 126, Firefox ESR &lt; 115.11, and Thunderbird &lt; 115.11.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-31"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-4767/">CVE-2024-4767 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4767">CVE-2024-4767 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224056">SUSE bug 1224056</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009863197" comment="firefox-115.11.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009863198" comment="thunderbird-115.11.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20244768" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-4768</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-4768" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4768" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-4768" ref_url="https://www.suse.com/security/cve/CVE-2024-4768" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1676-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019264.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A bug in popup notifications' interaction with WebAuthn made it easier for an attacker to trick a user into granting permissions. This vulnerability affects Firefox &lt; 126, Firefox ESR &lt; 115.11, and Thunderbird &lt; 115.11.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-31"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-4768/">CVE-2024-4768 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4768">CVE-2024-4768 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224056">SUSE bug 1224056</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009863197" comment="firefox-115.11.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009863198" comment="thunderbird-115.11.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20244769" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-4769</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-4769" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4769" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-4769" ref_url="https://www.suse.com/security/cve/CVE-2024-4769" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1676-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019264.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    When importing resources using Web Workers, error messages would distinguish the difference between `application/javascript` responses and non-script responses.  This could have been abused to learn information cross-origin. This vulnerability affects Firefox &lt; 126, Firefox ESR &lt; 115.11, and Thunderbird &lt; 115.11.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-31"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-4769/">CVE-2024-4769 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4769">CVE-2024-4769 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224056">SUSE bug 1224056</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009863197" comment="firefox-115.11.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009863198" comment="thunderbird-115.11.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20244770" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-4770</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-4770" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4770" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-4770" ref_url="https://www.suse.com/security/cve/CVE-2024-4770" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1676-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019264.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    When saving a page to PDF, certain font styles could have led to a potential use-after-free crash. This vulnerability affects Firefox &lt; 126, Firefox ESR &lt; 115.11, and Thunderbird &lt; 115.11.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-31"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-4770/">CVE-2024-4770 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4770">CVE-2024-4770 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224056">SUSE bug 1224056</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009863197" comment="firefox-115.11.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009863198" comment="thunderbird-115.11.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20244777" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-4777</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-4777" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4777" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-4777" ref_url="https://www.suse.com/security/cve/CVE-2024-4777" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1676-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019264.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Memory safety bugs present in Firefox 125, Firefox ESR 115.10, and Thunderbird 115.10. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 126, Firefox ESR &lt; 115.11, and Thunderbird &lt; 115.11.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-31"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-4777/">CVE-2024-4777 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-4777">CVE-2024-4777 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224056">SUSE bug 1224056</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009863197" comment="firefox-115.11.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009863198" comment="thunderbird-115.11.0-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447850" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47850</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47850" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47850" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47850" ref_url="https://www.suse.com/security/cve/CVE-2024-47850" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3863-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019765.html" source="SUSE-SU"/>
    <description>
    CUPS cups-browsed before 2.5b1 will send an HTTP POST request to an arbitrary destination and port in response to a single IPP UDP packet requesting a printer to be added, a different vulnerability than CVE-2024-47176. (The request is meant to probe the new printer but can be used to create DDoS amplification attacks.)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-18"/>
	<updated date="2025-12-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2024-47850/">CVE-2024-47850 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-47850">CVE-2024-47850 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231294">SUSE bug 1231294</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009947248" comment="cups-filters-1.0.35-29.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947249" comment="cups-filters-devel-1.0.35-29.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947250" comment="cups-filters-libs-1.0.35-29.el7_9.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450302" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50302</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50302" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50302" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50302" ref_url="https://www.suse.com/security/cve/CVE-2024-50302" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:2473" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000922.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:2501" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000989.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:2627" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0885-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020526.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020544.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0922-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020550.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0942-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0944-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020558.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0952-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6AJSXTJOJBIIV5HSF53W7LDQI5JZTS3M/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020561.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

HID: core: zero-initialize the report buffer

Since the report buffer is used by all kinds of drivers in various ways, let's
zero-initialize it during allocation to make sure that it can't be ever used
to leak kernel memory via specially-crafted report.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-03-25"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50302/">CVE-2024-50302 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50302">CVE-2024-50302 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233491">SUSE bug 1233491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233679">SUSE bug 1233679</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009969081" comment="bpftool-3.10.0-1160.133.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009969082" comment="kernel-3.10.0-1160.133.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009969083" comment="kernel-abi-whitelists-3.10.0-1160.133.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009969084" comment="kernel-debug-3.10.0-1160.133.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009969087" comment="kernel-doc-3.10.0-1160.133.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009969088" comment="kernel-headers-3.10.0-1160.133.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009969089" comment="kernel-tools-3.10.0-1160.133.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009969090" comment="kernel-tools-libs-3.10.0-1160.133.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009969092" comment="perf-3.10.0-1160.133.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009969093" comment="python-perf-3.10.0-1160.133.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202452337" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-52337</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-52337" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52337" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-52337" ref_url="https://www.suse.com/security/cve/CVE-2024-52337" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:10381" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000635.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:10384" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000626.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:11161" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000676.html" source="SUSE-SU"/>
    <description>
    A log spoofing flaw was found in the Tuned package due to improper sanitization of some API arguments. This flaw allows an attacker to pass a controlled sequence of characters; newlines can be inserted into the log. Instead of the 'evil' the attacker could mimic a valid TuneD log line and trick the administrator. The quotes '' are usually used in TuneD logs citing raw user input, so there will always be the ' character ending the spoofed input, and the administrator can easily overlook this. This logged string is later used in logging and in the output of utilities, for example, `tuned-adm get_instances` or other third-party programs that use Tuned's D-Bus interface for such operations.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-07"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-52337/">CVE-2024-52337 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52337">CVE-2024-52337 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233807">SUSE bug 1233807</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009956837" comment="tuned-2.11.0-13.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009956838" comment="tuned-gtk-2.11.0-13.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009956839" comment="tuned-profiles-atomic-2.11.0-13.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009956840" comment="tuned-profiles-compat-2.11.0-13.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009956841" comment="tuned-profiles-cpu-partitioning-2.11.0-13.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009956842" comment="tuned-profiles-mssql-2.11.0-13.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009956843" comment="tuned-profiles-oracle-2.11.0-13.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009956844" comment="tuned-utils-2.11.0-13.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009956845" comment="tuned-utils-systemtap-2.11.0-13.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202452530" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-52530</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-52530" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52530" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-52530" ref_url="https://www.suse.com/security/cve/CVE-2024-52530" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9559" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000500.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9573" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000597.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9654" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4365-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1518-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14489-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XPGNGXYLDM752SEEDHAXAPSLNGZIY5CP/" source="SUSE-SU"/>
    <description>
    GNOME libsoup before 3.6.0 allows HTTP request smuggling in some configurations because '\0' characters at the end of header names are ignored, i.e., a "Transfer-Encoding\0: chunked" header is treated the same as a "Transfer-Encoding: chunked" header.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-29"/>
	<updated date="2025-06-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-52530/">CVE-2024-52530 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52530">CVE-2024-52530 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233285">SUSE bug 1233285</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009955234" comment="libsoup-2.62.2-3.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955235" comment="libsoup-devel-2.62.2-3.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453104" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53104</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53104" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53104" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53104" ref_url="https://www.suse.com/security/cve/CVE-2024-53104" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:1262" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000853.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1266" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000860.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1281" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0517-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0576-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0577-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020500.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020412.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0650-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020410.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0681-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020418.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020428.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0707-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0709-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020514.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format

This can lead to out of bounds writes since frames of this type were not
taken into account when calculating the size of the frames buffer in
uvc_parse_streaming.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-02-19"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-53104/">CVE-2024-53104 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53104">CVE-2024-53104 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234025">SUSE bug 1234025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1236783">SUSE bug 1236783</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009964251" comment="bpftool-3.10.0-1160.132.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009964252" comment="kernel-3.10.0-1160.132.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009964253" comment="kernel-abi-whitelists-3.10.0-1160.132.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009964254" comment="kernel-debug-3.10.0-1160.132.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009964257" comment="kernel-doc-3.10.0-1160.132.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009964258" comment="kernel-headers-3.10.0-1160.132.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009964259" comment="kernel-tools-3.10.0-1160.132.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009964260" comment="kernel-tools-libs-3.10.0-1160.132.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009964262" comment="perf-3.10.0-1160.132.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009964263" comment="python-perf-3.10.0-1160.132.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453141" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53141</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53141" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53141" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53141" ref_url="https://www.suse.com/security/cve/CVE-2024-53141" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:7531" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001136.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7898" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02099-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02308-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-July/021812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0577-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020500.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023327.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023347.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4227-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023351.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023357.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023410.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: ipset: add missing range check in bitmap_ip_uadt

When tb[IPSET_ATTR_IP_TO] is not present but tb[IPSET_ATTR_CIDR] exists,
the values of ip and ip_to are slightly swapped. Therefore, the range check
for ip should be done later, but this part is missing and it seems that the
vulnerability occurs.

So we should add missing range checks and remove unnecessary range checks.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-05-30"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53141/">CVE-2024-53141 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53141">CVE-2024-53141 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234381">SUSE bug 1234381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245778">SUSE bug 1245778</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009983821" comment="bpftool-3.10.0-1160.135.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983822" comment="kernel-3.10.0-1160.135.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983823" comment="kernel-abi-whitelists-3.10.0-1160.135.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983824" comment="kernel-debug-3.10.0-1160.135.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983827" comment="kernel-doc-3.10.0-1160.135.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983828" comment="kernel-headers-3.10.0-1160.135.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983829" comment="kernel-tools-3.10.0-1160.135.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983830" comment="kernel-tools-libs-3.10.0-1160.135.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983832" comment="perf-3.10.0-1160.135.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983833" comment="python-perf-3.10.0-1160.135.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453150" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53150</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53150" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53150" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53150" ref_url="https://www.suse.com/security/cve/CVE-2024-53150" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:3880" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001080.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:3893" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001038.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:3937" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: usb-audio: Fix out of bounds reads when finding clock sources

The current USB-audio driver code doesn't check bLength of each
descriptor at traversing for clock descriptors.  That is, when a
device provides a bogus descriptor with a shorter bLength, the driver
might hit out-of-bounds reads.

For addressing it, this patch adds sanity checks to the validator
functions for the clock descriptor traversal.  When the descriptor
length is shorter than expected, it's skipped in the loop.

For the clock source and clock multiplier descriptors, we can just
check bLength against the sizeof() of each descriptor type.
OTOH, the clock selector descriptor of UAC2 and UAC3 has an array
of bNrInPins elements and two more fields at its tail, hence those
have to be checked in addition to the sizeof() check.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-04-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53150/">CVE-2024-53150 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53150">CVE-2024-53150 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234834">SUSE bug 1234834</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009976240" comment="bpftool-3.10.0-1160.134.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976241" comment="kernel-3.10.0-1160.134.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976242" comment="kernel-abi-whitelists-3.10.0-1160.134.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976243" comment="kernel-debug-3.10.0-1160.134.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976246" comment="kernel-doc-3.10.0-1160.134.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976247" comment="kernel-headers-3.10.0-1160.134.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976248" comment="kernel-tools-3.10.0-1160.134.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976249" comment="kernel-tools-libs-3.10.0-1160.134.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976251" comment="perf-3.10.0-1160.134.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976252" comment="python-perf-3.10.0-1160.134.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453197" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53197</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53197" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53197" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53197" ref_url="https://www.suse.com/security/cve/CVE-2024-53197" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:2473" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000922.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:2501" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000989.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:2627" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: usb-audio: Fix potential out-of-bound accesses for Extigy and Mbox devices

A bogus device can provide a bNumConfigurations value that exceeds the
initial value used in usb_get_configuration for allocating dev-&gt;config.

This can lead to out-of-bounds accesses later, e.g. in
usb_destroy_configuration.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-03-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" cvss4="5.6/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53197/">CVE-2024-53197 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53197">CVE-2024-53197 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235464">SUSE bug 1235464</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009969081" comment="bpftool-3.10.0-1160.133.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009969082" comment="kernel-3.10.0-1160.133.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009969083" comment="kernel-abi-whitelists-3.10.0-1160.133.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009969084" comment="kernel-debug-3.10.0-1160.133.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009969087" comment="kernel-doc-3.10.0-1160.133.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009969088" comment="kernel-headers-3.10.0-1160.133.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009969089" comment="kernel-tools-3.10.0-1160.133.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009969090" comment="kernel-tools-libs-3.10.0-1160.133.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009969092" comment="perf-3.10.0-1160.133.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009969093" comment="python-perf-3.10.0-1160.133.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453580" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53580</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53580" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53580" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53580" ref_url="https://www.suse.com/security/cve/CVE-2024-53580" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:0161" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000744.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:0168" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000746.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:0402" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000790.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024192.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20403-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024291.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14700-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AUDDPLGQCTFI55SRG3SYJVCTOHHNA37T/" source="SUSE-SU"/>
    <description>
    iperf v3.17.1 was discovered to contain a segmentation violation via the iperf_exchange_parameters() function.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-29"/>
	<updated date="2026-02-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53580/">CVE-2024-53580 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53580">CVE-2024-53580 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234705">SUSE bug 1234705</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009961526" comment="iperf3-3.1.7-3.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961527" comment="iperf3-devel-3.1.7-3.el7_9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453899" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53899</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53899" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53899" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53899" ref_url="https://www.suse.com/security/cve/CVE-2024-53899" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:10953" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000658.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:11048" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019895.html" source="SUSE-SU"/>
    <description>
    virtualenv before 20.26.6 allows command injection through the activation scripts for a virtual environment. Magic template strings are not quoted correctly when replacing. NOTE: this is not the same as CVE-2024-9287.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-17"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53899/">CVE-2024-53899 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53899">CVE-2024-53899 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233706">SUSE bug 1233706</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009958158" comment="python-virtualenv-15.1.0-7.el7_9.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202455549" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-55549</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-55549" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-55549" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-55549" ref_url="https://www.suse.com/security/cve/CVE-2024-55549" source="SUSE CVE"/>
		<reference ref_id="ESSA-2025:2931" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001142.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:3612" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001029.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:3615" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001021.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:4025" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001046.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7410" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020595.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1125-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1494-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14894-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZKCQGOW24ZBKSYCIKDUG4KKITEGCJKY2/" source="SUSE-SU"/>
    <description>
    xsltGetInheritedNsList in libxslt before 1.1.43 has a use-after-free issue related to exclusion of result prefixes.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-04-11"/>
	<updated date="2025-10-24"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-55549/">CVE-2024-55549 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-55549">CVE-2024-55549 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1239637">SUSE bug 1239637</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009982178" comment="libxslt-1.1.28-9.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009982179" comment="libxslt-devel-1.1.28-9.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009982180" comment="libxslt-python-1.1.28-9.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20245564" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-5564</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-5564" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5564" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-5564" ref_url="https://www.suse.com/security/cve/CVE-2024-5564" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2283-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021228.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in libndp. This flaw allows a local malicious user to cause a buffer overflow in NetworkManager, triggered by sending a malformed IPv6 router advertisement packet. This issue occurred as libndp was not correctly validating the route length information.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2025-06-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-5564/">CVE-2024-5564 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5564">CVE-2024-5564 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225771">SUSE bug 1225771</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009879076" comment="libndp-1.2-10.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879077" comment="libndp-devel-1.2-10.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456171" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56171</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56171" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56171" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56171" ref_url="https://www.suse.com/security/cve/CVE-2024-56171" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:2673" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000996.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:2679" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000965.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:2686" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0746-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021047.html" source="SUSE-SU"/>
    <description>
    libxml2 before 2.12.10 and 2.13.x before 2.13.6 has a use-after-free in xmlSchemaIDCFillNodeTables and xmlSchemaBubbleIDCNodeTables in xmlschemas.c. To exploit this, a crafted XML document must be validated against an XML schema with certain identity constraints, or a crafted XML schema must be used.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-03-27"/>
	<updated date="2025-10-17"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56171/">CVE-2024-56171 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56171">CVE-2024-56171 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237363">SUSE bug 1237363</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009969739" comment="libxml2-2.9.1-6.el7_9.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009969740" comment="libxml2-devel-2.9.1-6.el7_9.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009969741" comment="libxml2-python-2.9.1-6.el7_9.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009969742" comment="libxml2-static-2.9.1-6.el7_9.9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456326" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56326</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56326" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56326" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56326" ref_url="https://www.suse.com/security/cve/CVE-2024-56326" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:0308" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000759.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:0667" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000774.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:0711" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000805.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1250" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000897.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0006-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HPNJF5YIZCFWIYFLQBGRUQ2IHXCRQPMO/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0016-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14997-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RJHTSZ2BBTEOR5VWX6IPMTWJ5V4265YW/" source="SUSE-SU"/>
    <description>
    Jinja is an extensible templating engine. Prior to 3.1.5, An oversight in how the Jinja sandboxed environment detects calls to str.format allows an attacker that controls the content of a template to execute arbitrary Python code. To exploit the vulnerability, an attacker needs to control the content of a template. Whether that is the case depends on the type of application using Jinja. This vulnerability impacts users of applications which execute untrusted templates. Jinja's sandbox does catch calls to str.format and ensures they don't escape the sandbox. However, it's possible to store a reference to a malicious string's format method, then pass that to a filter that calls it. No such filters are built-in to Jinja, but could be present through custom filters in an application. After the fix, such indirect calls are also handled by the sandbox. This vulnerability is fixed in 3.1.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-02-20"/>
	<updated date="2025-06-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-56326/">CVE-2024-56326 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56326">CVE-2024-56326 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234809">SUSE bug 1234809</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009964798" comment="python-jinja2-2.7.2-5.el7_9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456737" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56737</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56737" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56737" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56737" ref_url="https://www.suse.com/security/cve/CVE-2024-56737" source="SUSE CVE"/>
		<reference ref_id="ESSA-2025:2835" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01961-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20511-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20863-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042315.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14822-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ASOEHBP5LS2I6OPV4KMUZIY2AF7IGH4E/" source="SUSE-SU"/>
    <description>
    GNU GRUB (aka GRUB2) through 2.12 has a heap-based buffer overflow in fs/hfs.c via crafted sblock data in an HFS filesystem.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-04-10"/>
	<updated date="2025-10-25"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56737/">CVE-2024-56737 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56737">CVE-2024-56737 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234958">SUSE bug 1234958</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009974746" comment="grub2-2.02-0.87.0.4.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974747" comment="grub2-common-2.02-0.87.0.4.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974748" comment="grub2-efi-ia32-2.02-0.87.0.4.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974749" comment="grub2-efi-ia32-cdboot-2.02-0.87.0.4.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974750" comment="grub2-efi-ia32-modules-2.02-0.87.0.4.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974751" comment="grub2-efi-x64-2.02-0.87.0.4.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974752" comment="grub2-efi-x64-cdboot-2.02-0.87.0.4.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974753" comment="grub2-efi-x64-modules-2.02-0.87.0.4.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974754" comment="grub2-pc-2.02-0.87.0.4.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974755" comment="grub2-pc-modules-2.02-0.87.0.4.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974756" comment="grub2-tools-2.02-0.87.0.4.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974757" comment="grub2-tools-extra-2.02-0.87.0.4.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974758" comment="grub2-tools-minimal-2.02-0.87.0.4.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20245688" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-5688</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-5688" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5688" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-5688" ref_url="https://www.suse.com/security/cve/CVE-2024-5688" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2012-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2061-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2073-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035629.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2371-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2399-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035931.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    If a garbage collection was triggered at the right time, a use-after-free could have occurred during object transplant. This vulnerability affects Firefox &lt; 127, Firefox ESR &lt; 115.12, and Thunderbird &lt; 115.12.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-29"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5688/">CVE-2024-5688 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5688">CVE-2024-5688 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226027">SUSE bug 1226027</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870202" comment="firefox-115.12.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869887" comment="thunderbird-115.12.1-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20245690" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-5690</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-5690" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5690" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-5690" ref_url="https://www.suse.com/security/cve/CVE-2024-5690" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2012-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2061-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2073-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035629.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2371-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2399-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035931.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    By monitoring the time certain operations take, an attacker could have guessed which external protocol handlers were functional on a user's system. This vulnerability affects Firefox &lt; 127, Firefox ESR &lt; 115.12, and Thunderbird &lt; 115.12.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-29"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5690/">CVE-2024-5690 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5690">CVE-2024-5690 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226027">SUSE bug 1226027</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870202" comment="firefox-115.12.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869887" comment="thunderbird-115.12.1-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20245691" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-5691</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-5691" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5691" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-5691" ref_url="https://www.suse.com/security/cve/CVE-2024-5691" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2012-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2061-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2073-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035629.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2371-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2399-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035931.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    By tricking the browser with a `X-Frame-Options` header, a sandboxed iframe could have presented a button that, if clicked by a user, would bypass restrictions to open a new window. This vulnerability affects Firefox &lt; 127, Firefox ESR &lt; 115.12, and Thunderbird &lt; 115.12.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-29"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5691/">CVE-2024-5691 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5691">CVE-2024-5691 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226027">SUSE bug 1226027</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870202" comment="firefox-115.12.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869887" comment="thunderbird-115.12.1-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20245693" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-5693</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-5693" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5693" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-5693" ref_url="https://www.suse.com/security/cve/CVE-2024-5693" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2012-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2061-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2073-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035629.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2371-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2399-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035931.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Offscreen Canvas did not properly track cross-origin tainting, which could be used to access image data from another site in violation of same-origin policy. This vulnerability affects Firefox &lt; 127, Firefox ESR &lt; 115.12, and Thunderbird &lt; 115.12.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-29"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5693/">CVE-2024-5693 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5693">CVE-2024-5693 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226027">SUSE bug 1226027</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870202" comment="firefox-115.12.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869887" comment="thunderbird-115.12.1-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20245696" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-5696</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-5696" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5696" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-5696" ref_url="https://www.suse.com/security/cve/CVE-2024-5696" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2012-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2061-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2073-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035629.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2371-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2399-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035931.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    By manipulating the text in an `&amp;lt;input&amp;gt;` tag, an attacker could have caused corrupt memory leading to a potentially exploitable crash. This vulnerability affects Firefox &lt; 127, Firefox ESR &lt; 115.12, and Thunderbird &lt; 115.12.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-29"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5696/">CVE-2024-5696 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5696">CVE-2024-5696 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226027">SUSE bug 1226027</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870202" comment="firefox-115.12.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869887" comment="thunderbird-115.12.1-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20245700" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-5700</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-5700" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5700" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-5700" ref_url="https://www.suse.com/security/cve/CVE-2024-5700" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2012-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2061-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2073-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035629.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2371-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2399-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035931.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Memory safety bugs present in Firefox 126, Firefox ESR 115.11, and Thunderbird 115.11. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 127, Firefox ESR &lt; 115.12, and Thunderbird &lt; 115.12.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-29"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5700/">CVE-2024-5700 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5700">CVE-2024-5700 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226027">SUSE bug 1226027</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870202" comment="firefox-115.12.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869887" comment="thunderbird-115.12.1-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20245702" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-5702</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-5702" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5702" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-5702" ref_url="https://www.suse.com/security/cve/CVE-2024-5702" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2012-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2061-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2073-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035629.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2371-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2399-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035931.html" source="SUSE-SU"/>
    <description>
    Memory corruption in the networking stack could have led to a potentially exploitable crash. This vulnerability affects Firefox &lt; 125, Firefox ESR &lt; 115.12, and Thunderbird &lt; 115.12.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-29"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5702/">CVE-2024-5702 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5702">CVE-2024-5702 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226027">SUSE bug 1226027</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870202" comment="firefox-115.12.0-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869887" comment="thunderbird-115.12.1-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457656" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57656</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57656" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57656" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57656" ref_url="https://www.suse.com/security/cve/CVE-2024-57656" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:4039" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001584.html" source="SUSE-SU"/>
    <description>
    An issue in the sqlc_add_distinct_node component of openlink virtuoso-opensource v7.2.11 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-04"/>
	<updated date="2025-06-05"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-57656/">CVE-2024-57656 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-57656">CVE-2024-57656 at NVD</cve>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985775" comment="virtuoso-opensource-6.1.6-8.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985776" comment="virtuoso-opensource-utils-6.1.6-8.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457823" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57823</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57823" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57823" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57823" ref_url="https://www.suse.com/security/cve/CVE-2024-57823" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:0312" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000760.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:0314" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000757.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:0319" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03244-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03257-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041737.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14646-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7S7ZVXAGSBLZGFFVSEHSDXQND2DNAKY2/" source="SUSE-SU"/>
    <description>
    In Raptor RDF Syntax Library through 2.0.16, there is an integer underflow when normalizing a URI with the turtle parser in raptor_uri_normalize_path().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-29"/>
	<updated date="2025-10-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57823/">CVE-2024-57823 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57823">CVE-2024-57823 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235673">SUSE bug 1235673</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009961524" comment="raptor2-2.0.9-5.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961525" comment="raptor2-devel-2.0.9-5.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457980" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57980</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57980" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57980" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57980" ref_url="https://www.suse.com/security/cve/CVE-2024-57980" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:11298" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001807.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:11861" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001849.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:14748" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01600-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024170.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: uvcvideo: Fix double free in error path

If the uvc_status_init() function fails to allocate the int_urb, it will
free the dev-&gt;status pointer but doesn't reset the pointer to NULL. This
results in the kfree() call in uvc_status_cleanup() trying to
double-free the memory. Fix it by resetting the dev-&gt;status pointer to
NULL after freeing it.

Reviewed by: Ricardo Ribalda &lt;ribalda@chromium.org&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2025-09-05"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-57980/">CVE-2024-57980 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57980">CVE-2024-57980 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237911">SUSE bug 1237911</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010016960" comment="bpftool-3.10.0-1160.137.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016961" comment="kernel-3.10.0-1160.137.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016962" comment="kernel-abi-whitelists-3.10.0-1160.137.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016963" comment="kernel-debug-3.10.0-1160.137.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016966" comment="kernel-doc-3.10.0-1160.137.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016967" comment="kernel-headers-3.10.0-1160.137.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016968" comment="kernel-tools-3.10.0-1160.137.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016969" comment="kernel-tools-libs-3.10.0-1160.137.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016971" comment="perf-3.10.0-1160.137.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016972" comment="python-perf-3.10.0-1160.137.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20245953" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-5953</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-5953" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5953" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-5953" ref_url="https://www.suse.com/security/cve/CVE-2024-5953" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6153" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000035.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:6569" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019198.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3082-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019745.html" source="SUSE-SU"/>
    <description>
    A denial of service vulnerability was found in the 389-ds-base LDAP server. This issue may allow an authenticated user to cause a server denial of service while attempting to log in with a user with a malformed hash in their password.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-18"/>
	<updated date="2025-12-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-5953/">CVE-2024-5953 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5953">CVE-2024-5953 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226277">SUSE bug 1226277</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009942744" comment="389-ds-base-1.3.11.1-6.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942745" comment="389-ds-base-devel-1.3.11.1-6.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942746" comment="389-ds-base-libs-1.3.11.1-6.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942747" comment="389-ds-base-snmp-1.3.11.1-6.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20246345" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-6345</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-6345" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6345" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-6345" ref_url="https://www.suse.com/security/cve/CVE-2024-6345" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6309" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000021.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:6311" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000026.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:6661" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000029.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:6662" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000030.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:6726" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-202410:15282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-202410:15283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2899-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2900-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019192.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3054-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3055-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021036.html" source="SUSE-SU"/>
    <description>
    A vulnerability in the package_index module of pypa/setuptools versions up to 69.1.1 allows for remote code execution via its download functions. These functions, which are used to download packages from URLs provided by users or retrieved from package index servers, are susceptible to code injection. If these functions are exposed to user-controlled inputs, such as package URLs, they can execute arbitrary commands on the system. The issue is fixed in version 70.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-14"/>
	<updated date="2025-06-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-6345/">CVE-2024-6345 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6345">CVE-2024-6345 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228105">SUSE bug 1228105</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009942558" comment="python-setuptools-0.9.8-7.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942557" comment="python3-setuptools-39.2.0-10.el7_9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20247348" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-7348</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-7348" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7348" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-7348" ref_url="https://www.suse.com/security/cve/CVE-2024-7348" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8495" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3153-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3154-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036809.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3158-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3158-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3158-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019543.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3159-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3159-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3160-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3168-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3169-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3170-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3171-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036818.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3181-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3191-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3192-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3224-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036877.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14348-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OXG6KBR4NGDILNDJZP2FM4AIADAY3DBM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14349-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JFBV5HQIUL2TYPYWU3EU4MRYMYE6ONRA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14350-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/F6L7CYTL2P6XU6L63WN47NCR4GIQGAQH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14351-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/233KJGMB42XZRNBMLOMSWHBSDKMS7R47/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14360-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RSHH7GG3JERRES4WX7FTBWO2TZCAMJMP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14361-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HD5J3C4URB7D6PHUVYZRISSS5HBJ3ITI/" source="SUSE-SU"/>
    <description>
    Time-of-check Time-of-use (TOCTOU) race condition in pg_dump in PostgreSQL allows an object creator to execute arbitrary SQL functions as the user running pg_dump, which is often a superuser. The attack involves replacing another relation type with a view or foreign table. The attack requires waiting for pg_dump to start, but winning the race condition is trivial if the attacker retains an open transaction. Versions before PostgreSQL 16.4, 15.8, 14.13, 13.16, and 12.20 are affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-7348/">CVE-2024-7348 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7348">CVE-2024-7348 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229013">SUSE bug 1229013</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009953508" comment="postgresql-9.2.24-9.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953509" comment="postgresql-contrib-9.2.24-9.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953510" comment="postgresql-devel-9.2.24-9.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953511" comment="postgresql-docs-9.2.24-9.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953512" comment="postgresql-libs-9.2.24-9.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953513" comment="postgresql-plperl-9.2.24-9.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953514" comment="postgresql-plpython-9.2.24-9.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953515" comment="postgresql-pltcl-9.2.24-9.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953516" comment="postgresql-server-9.2.24-9.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953517" comment="postgresql-static-9.2.24-9.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953518" comment="postgresql-test-9.2.24-9.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953519" comment="postgresql-upgrade-9.2.24-9.el7_9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20248445" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-8445</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-8445" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8445" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-8445" ref_url="https://www.suse.com/security/cve/CVE-2024-8445" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7434" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000117.html" source="SUSE-SU"/>
    <description>
    The fix for CVE-2024-2199 in 389-ds-base was insufficient to cover all scenarios. In certain product versions, an authenticated user may cause a server crash while modifying `userPassword` using malformed input.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-05"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-8445/">CVE-2024-8445 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-8445">CVE-2024-8445 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230210">SUSE bug 1230210</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009945525" comment="389-ds-base-1.3.11.1-7.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945526" comment="389-ds-base-devel-1.3.11.1-7.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945527" comment="389-ds-base-libs-1.3.11.1-7.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945528" comment="389-ds-base-snmp-1.3.11.1-7.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20249050" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-9050</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-9050" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9050" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-9050" ref_url="https://www.suse.com/security/cve/CVE-2024-9050" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8353" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000156.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8357" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000234.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9555" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000561.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14422-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CEIZP2JFDFLF4SCP5AM7FOG6C2LBQOEA/" source="SUSE-SU"/>
    <description>
    A flaw was found in the libreswan client plugin for NetworkManager (NetkworkManager-libreswan), where it fails to properly sanitize the VPN configuration from the local unprivileged user. In this configuration, composed by a key-value format, the plugin fails to escape special characters, leading the application to interpret values as keys. One of the most critical parameters that could be abused by a malicious user is the `leftupdown`key. This key takes an executable command as a value and is used to specify what executes as a callback in NetworkManager-libreswan to retrieve configuration settings back to NetworkManager. As NetworkManager uses Polkit to allow an unprivileged user to control the system's network configuration, a malicious actor could achieve local privilege escalation and potential code execution as root in the targeted machine by creating a malicious configuration.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-19"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-9050/">CVE-2024-9050 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9050">CVE-2024-9050 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231331">SUSE bug 1231331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232040">SUSE bug 1232040</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009953315" comment="NetworkManager-libreswan-1.2.4-4.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953316" comment="NetworkManager-libreswan-gnome-1.2.4-4.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20249632" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-9632</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-9632" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9632" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-9632" ref_url="https://www.suse.com/security/cve/CVE-2024-9632" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:10090" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000572.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8798" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000182.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9540" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000226.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9901" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000731.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7163" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001306.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7165" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3866-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019763.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019762.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14466-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TM2IXKHQAG2LGZAB7MW6VRZJ235MJKFH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14467-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/B5QVOIWQHHCYNLWGG5A6LO6BYXLGP7FG/" source="SUSE-SU"/>
    <description>
    A flaw was found in the X.org server. Due to improperly tracked allocation size in _XkbSetCompatMap, a local attacker may be able to trigger a buffer overflow condition via a specially crafted payload, leading to denial of service or local privilege escalation in distributions where the X.org server is run with root privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-02"/>
	<updated date="2025-05-31"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9632/">CVE-2024-9632 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9632">CVE-2024-9632 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231565">SUSE bug 1231565</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009958984" comment="tigervnc-1.8.0-34.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009958985" comment="tigervnc-icons-1.8.0-34.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009958986" comment="tigervnc-license-1.8.0-34.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009958987" comment="tigervnc-server-1.8.0-34.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009958988" comment="tigervnc-server-applet-1.8.0-34.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009958989" comment="tigervnc-server-minimal-1.8.0-34.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009958990" comment="tigervnc-server-module-1.8.0-34.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20250624" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-0624</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-0624" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0624" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-0624" ref_url="https://www.suse.com/security/cve/CVE-2025-0624" source="SUSE CVE"/>
		<reference ref_id="ESSA-2025:2835" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001028.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:2867" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000970.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:3367" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/001004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01961-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20511-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20863-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042315.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14822-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ASOEHBP5LS2I6OPV4KMUZIY2AF7IGH4E/" source="SUSE-SU"/>
    <description>
    A flaw was found in grub2. During the network boot process, when trying to search for the configuration file, grub copies data from a user controlled environment variable into an internal buffer using the grub_strcpy() function. During this step, it fails to consider the environment variable length when allocating the internal buffer, resulting in an out-of-bounds write. If correctly exploited, this issue may result in remote code execution through the same network segment grub is searching for the boot information, which can be used to by-pass secure boot protections.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-04-10"/>
	<updated date="2025-10-25"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-0624/">CVE-2025-0624 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0624">CVE-2025-0624 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236316">SUSE bug 1236316</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009974746" comment="grub2-2.02-0.87.0.4.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974747" comment="grub2-common-2.02-0.87.0.4.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974748" comment="grub2-efi-ia32-2.02-0.87.0.4.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974749" comment="grub2-efi-ia32-cdboot-2.02-0.87.0.4.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974750" comment="grub2-efi-ia32-modules-2.02-0.87.0.4.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974751" comment="grub2-efi-x64-2.02-0.87.0.4.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974752" comment="grub2-efi-x64-cdboot-2.02-0.87.0.4.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974753" comment="grub2-efi-x64-modules-2.02-0.87.0.4.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974754" comment="grub2-pc-2.02-0.87.0.4.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974755" comment="grub2-pc-modules-2.02-0.87.0.4.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974756" comment="grub2-tools-2.02-0.87.0.4.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974757" comment="grub2-tools-extra-2.02-0.87.0.4.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974758" comment="grub2-tools-minimal-2.02-0.87.0.4.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20251094" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-1094</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-1094" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1094" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-1094" ref_url="https://www.suse.com/security/cve/CVE-2025-1094" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:1737" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000890.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1738" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000886.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1740" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000911.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1742" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000891.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:3978" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:00614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020393.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0618-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020391.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020405.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0634-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0635-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0636-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020401.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020456.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14807-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YK3EE7JIJVKOQGX76FWFAHQKDECBSJRT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14810-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DEQYP7JKCLUF4DB3FNI43RIPXVXQGCT7/" source="SUSE-SU"/>
    <description>
    Improper neutralization of quoting syntax in PostgreSQL libpq functions PQescapeLiteral(), PQescapeIdentifier(), PQescapeString(), and PQescapeStringConn() allows a database input provider to achieve SQL injection in certain usage patterns.  Specifically, SQL injection requires the application to use the function result to construct input to psql, the PostgreSQL interactive terminal.  Similarly, improper neutralization of quoting syntax in PostgreSQL command line utility programs allows a source of command line arguments to achieve SQL injection when client_encoding is BIG5 and server_encoding is one of EUC_TW or MULE_INTERNAL.  Versions before PostgreSQL 17.3, 16.7, 15.11, 14.16, and 13.19 are affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-13"/>
	<updated date="2025-09-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1094/">CVE-2025-1094 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1094">CVE-2025-1094 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237093">SUSE bug 1237093</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009986602" comment="postgresql-9.2.24-9.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986603" comment="postgresql-contrib-9.2.24-9.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986604" comment="postgresql-devel-9.2.24-9.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986605" comment="postgresql-docs-9.2.24-9.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986606" comment="postgresql-libs-9.2.24-9.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986607" comment="postgresql-plperl-9.2.24-9.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986608" comment="postgresql-plpython-9.2.24-9.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986609" comment="postgresql-pltcl-9.2.24-9.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986610" comment="postgresql-server-9.2.24-9.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986611" comment="postgresql-static-9.2.24-9.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986612" comment="postgresql-test-9.2.24-9.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986613" comment="postgresql-upgrade-9.2.24-9.el7_9.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202511561" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-11561</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-11561" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11561" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-11561" ref_url="https://www.suse.com/security/cve/CVE-2025-11561" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:19610" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002175.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19847" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002540.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:20954" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003082.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21067" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023359.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023358.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20019-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023724.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the integration of Active Directory and the System Security Services Daemon (SSSD) on Linux systems. In default configurations, the Kerberos local authentication plugin (sssd_krb5_localauth_plugin) is enabled, but a fallback to the an2ln plugin is possible. This fallback allows an attacker with permission to modify certain AD attributes (such as userPrincipalName or samAccountName) to impersonate privileged users, potentially resulting in unauthorized access or privilege escalation on domain-joined Linux hosts.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-11561/">CVE-2025-11561 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11561">CVE-2025-11561 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251827">SUSE bug 1251827</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010047003" comment="libipa_hbac-1.16.5-10.el7_9.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047004" comment="libipa_hbac-devel-1.16.5-10.el7_9.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047005" comment="libsss_autofs-1.16.5-10.el7_9.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047006" comment="libsss_certmap-1.16.5-10.el7_9.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047007" comment="libsss_certmap-devel-1.16.5-10.el7_9.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047008" comment="libsss_idmap-1.16.5-10.el7_9.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047009" comment="libsss_idmap-devel-1.16.5-10.el7_9.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047010" comment="libsss_nss_idmap-1.16.5-10.el7_9.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047011" comment="libsss_nss_idmap-devel-1.16.5-10.el7_9.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047012" comment="libsss_simpleifp-1.16.5-10.el7_9.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047013" comment="libsss_simpleifp-devel-1.16.5-10.el7_9.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047014" comment="libsss_sudo-1.16.5-10.el7_9.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047015" comment="python-libipa_hbac-1.16.5-10.el7_9.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047016" comment="python-libsss_nss_idmap-1.16.5-10.el7_9.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047017" comment="python-sss-1.16.5-10.el7_9.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047018" comment="python-sss-murmur-1.16.5-10.el7_9.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047019" comment="python-sssdconfig-1.16.5-10.el7_9.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047020" comment="sssd-1.16.5-10.el7_9.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047021" comment="sssd-ad-1.16.5-10.el7_9.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047022" comment="sssd-client-1.16.5-10.el7_9.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047023" comment="sssd-common-1.16.5-10.el7_9.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047024" comment="sssd-common-pac-1.16.5-10.el7_9.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047025" comment="sssd-dbus-1.16.5-10.el7_9.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047026" comment="sssd-ipa-1.16.5-10.el7_9.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047027" comment="sssd-kcm-1.16.5-10.el7_9.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047028" comment="sssd-krb5-1.16.5-10.el7_9.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047029" comment="sssd-krb5-common-1.16.5-10.el7_9.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047030" comment="sssd-ldap-1.16.5-10.el7_9.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047031" comment="sssd-libwbclient-1.16.5-10.el7_9.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047032" comment="sssd-libwbclient-devel-1.16.5-10.el7_9.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047033" comment="sssd-polkit-rules-1.16.5-10.el7_9.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047034" comment="sssd-proxy-1.16.5-10.el7_9.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047035" comment="sssd-tools-1.16.5-10.el7_9.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010047036" comment="sssd-winbind-idmap-1.16.5-10.el7_9.17 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202512084" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-12084</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-12084" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12084" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-12084" ref_url="https://www.suse.com/security/cve/CVE-2025-12084" source="SUSE CVE"/>
		<reference ref_id="ESSA-2026:0022" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002438.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0123" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002346.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1374" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002442.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1408" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003158.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1410" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003202.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1478" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003215.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1583" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002451.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1631" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002456.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2275" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002482.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2713" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4539-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20125-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024893.html" source="SUSE-SU"/>
    <description>
    When building nested elements using xml.dom.minidom methods such as appendChild() that have a dependency on _clear_id_cache() the algorithm is quadratic. Availability can be impacted when building excessively nested documents.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-31"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-12084/">CVE-2025-12084 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-12084">CVE-2025-12084 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254997">SUSE bug 1254997</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010040947" comment="python-2.7.5-94.el7_9.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040948" comment="python-debug-2.7.5-94.el7_9.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040949" comment="python-devel-2.7.5-94.el7_9.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040950" comment="python-libs-2.7.5-94.el7_9.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040951" comment="python-test-2.7.5-94.el7_9.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040952" comment="python-tools-2.7.5-94.el7_9.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045089" comment="python3-3.6.8-21.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045090" comment="python3-debug-3.6.8-21.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045091" comment="python3-devel-3.6.8-21.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045092" comment="python3-idle-3.6.8-21.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045093" comment="python3-libs-3.6.8-21.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045094" comment="python3-test-3.6.8-21.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010045095" comment="python3-tkinter-3.6.8-21.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040953" comment="tkinter-2.7.5-94.el7_9.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20251244" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-1244</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-1244" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1244" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-1244" ref_url="https://www.suse.com/security/cve/CVE-2025-1244" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:1915" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000915.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1917" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000916.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:2130" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020386.html" source="SUSE-SU"/>
    <description>
    A command injection flaw was found in the text editor Emacs. It could allow a remote, unauthenticated attacker to execute arbitrary shell commands on a vulnerable system. Exploitation is possible by tricking users into visiting a specially crafted website or an HTTP URL with a redirect.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-03-20"/>
	<updated date="2025-03-20"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1244/">CVE-2025-1244 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1244">CVE-2025-1244 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237091">SUSE bug 1237091</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009968226" comment="emacs-24.3-23.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968227" comment="emacs-common-24.3-23.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968228" comment="emacs-el-24.3-23.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968229" comment="emacs-filesystem-24.3-23.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968230" comment="emacs-nox-24.3-23.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968231" comment="emacs-terminal-24.3-23.el7_9.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202513601" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-13601</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-13601" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13601" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-13601" ref_url="https://www.suse.com/security/cve/CVE-2025-13601" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0936" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003174.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0991" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002426.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1465" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002447.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1608" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023641.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024480.html" source="SUSE-SU"/>
    <description>
    A heap-based buffer overflow problem was found in glib through an incorrect calculation of buffer size in the g_escape_uri_string() function. If the string to escape contains a very large number of unacceptable characters (which would need escaping), the calculation of the length of the escaped string could overflow, leading to a potential write off the end of the newly allocated string.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-04"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-13601/">CVE-2025-13601 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13601">CVE-2025-13601 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254297">SUSE bug 1254297</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041693" comment="glib2-2.56.1-11.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041694" comment="glib2-devel-2.56.1-11.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041695" comment="glib2-doc-2.56.1-11.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041696" comment="glib2-fam-2.56.1-11.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041697" comment="glib2-static-2.56.1-11.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041698" comment="glib2-tests-2.56.1-11.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202515366" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-15366</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-15366" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15366" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-15366" ref_url="https://www.suse.com/security/cve/CVE-2025-15366" source="SUSE CVE"/>
		<reference ref_id="ESSA-2026:0053" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002627.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2128" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002475.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4165" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003253.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4168" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003263.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4216" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003265.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4463" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002569.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4473" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002580.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4746" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002594.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6464" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0590-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024357.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024502.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024550.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024716.html" source="SUSE-SU"/>
    <description>
    The imaplib module, when passed a user-controlled command, can have additional commands injected using newlines. Mitigation rejects commands containing control characters.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H" cvss4="6/CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-15366/">CVE-2025-15366 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-15366">CVE-2025-15366 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257044">SUSE bug 1257044</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051492" comment="python-2.7.5-94.el7_9.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051493" comment="python-debug-2.7.5-94.el7_9.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051494" comment="python-devel-2.7.5-94.el7_9.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051495" comment="python-libs-2.7.5-94.el7_9.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051496" comment="python-test-2.7.5-94.el7_9.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051497" comment="python-tools-2.7.5-94.el7_9.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010052848" comment="python3-3.6.8-21.el7_9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010052849" comment="python3-debug-3.6.8-21.el7_9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010052850" comment="python3-devel-3.6.8-21.el7_9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010052851" comment="python3-idle-3.6.8-21.el7_9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010052852" comment="python3-libs-3.6.8-21.el7_9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010052853" comment="python3-test-3.6.8-21.el7_9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010052854" comment="python3-tkinter-3.6.8-21.el7_9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051498" comment="tkinter-2.7.5-94.el7_9.3.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202515367" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-15367</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-15367" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15367" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-15367" ref_url="https://www.suse.com/security/cve/CVE-2025-15367" source="SUSE CVE"/>
		<reference ref_id="ESSA-2026:0053" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002627.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2128" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002475.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4165" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003253.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4168" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003263.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4216" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003265.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4463" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002569.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4473" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002580.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4746" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002594.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6464" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0590-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024357.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024502.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024550.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024716.html" source="SUSE-SU"/>
    <description>
    The poplib module, when passed a user-controlled command, can have
additional commands injected using newlines. Mitigation rejects commands
containing control characters.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H" cvss4="6/CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-15367/">CVE-2025-15367 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-15367">CVE-2025-15367 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257041">SUSE bug 1257041</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010051492" comment="python-2.7.5-94.el7_9.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051493" comment="python-debug-2.7.5-94.el7_9.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051494" comment="python-devel-2.7.5-94.el7_9.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051495" comment="python-libs-2.7.5-94.el7_9.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051496" comment="python-test-2.7.5-94.el7_9.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051497" comment="python-tools-2.7.5-94.el7_9.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010052848" comment="python3-3.6.8-21.el7_9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010052849" comment="python3-debug-3.6.8-21.el7_9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010052850" comment="python3-devel-3.6.8-21.el7_9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010052851" comment="python3-idle-3.6.8-21.el7_9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010052852" comment="python3-libs-3.6.8-21.el7_9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010052853" comment="python3-test-3.6.8-21.el7_9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010052854" comment="python3-tkinter-3.6.8-21.el7_9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010051498" comment="tkinter-2.7.5-94.el7_9.3.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202520012" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-20012</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-20012" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20012" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-20012" ref_url="https://www.suse.com/security/cve/CVE-2025-20012" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039307.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01651-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01651-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039391.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1567-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-May/020842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20410-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20424-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040391.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15093-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IDMNMRHOEJBKOC4ZPMYVNMKT2SGRVB7Q/" source="SUSE-SU"/>
    <description>
    Incorrect behavior order for some Intel(R) Core(tm) Ultra Processors may allow an unauthenticated user to potentially enable information disclosure via physical access.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-18"/>
	<updated date="2025-12-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" cvss4="4.1/CVSS:4.0/AV:P/AC:H/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-20012/">CVE-2025-20012 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-20012">CVE-2025-20012 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242006">SUSE bug 1242006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1243123">SUSE bug 1243123</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999889" comment="microcode_ctl-2.1-73.24.el7_9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202520623" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-20623</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-20623" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20623" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-20623" ref_url="https://www.suse.com/security/cve/CVE-2025-20623" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039307.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01651-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01651-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039391.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1567-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-May/020842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20410-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20424-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040391.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15093-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IDMNMRHOEJBKOC4ZPMYVNMKT2SGRVB7Q/" source="SUSE-SU"/>
    <description>
    Exposure of sensitive information caused by shared microarchitectural predictor state that influences transient execution for some Intel(R) Core(tm) processors (10th Generation) may allow an authenticated user to potentially enable information disclosure via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-18"/>
	<updated date="2025-12-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-20623/">CVE-2025-20623 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-20623">CVE-2025-20623 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242006">SUSE bug 1242006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1243454">SUSE bug 1243454</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999889" comment="microcode_ctl-2.1-73.24.el7_9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521587" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21587</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21587" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21587" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21587" ref_url="https://www.suse.com/security/cve/CVE-2025-21587" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:3844" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001096.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:3845" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001044.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:3848" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001784.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:3852" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001073.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:3855" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01487-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01487-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01525-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01770-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01788-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021513.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1399-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1429-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1487-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-May/020782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1524-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-May/020817.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15022-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BRJ4ISGUWDRCC6WFUQ7DJTTNQVMYNV5Y/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15024-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C6XNBWNLTVY24PY5AGA3UCES65X3SMQN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15077-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PTNITOYWDOKJOEHSH2CU5O6OKDMZOEYZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15078-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PQYOZOCMS25XBQWUFJFFM6CS5L66IC5C/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15080-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YI5CZCHTIKADEFJKS6K6CGUTIV4PERYD/" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-05-09"/>
	<updated date="2025-11-22"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" cvss4="9.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21587/">CVE-2025-21587 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21587">CVE-2025-21587 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1241274">SUSE bug 1241274</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009977524" comment="java-1.8.0-openjdk-1.8.0.452.b09-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977525" comment="java-1.8.0-openjdk-accessibility-1.8.0.452.b09-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977526" comment="java-1.8.0-openjdk-demo-1.8.0.452.b09-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977527" comment="java-1.8.0-openjdk-devel-1.8.0.452.b09-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977528" comment="java-1.8.0-openjdk-headless-1.8.0.452.b09-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977529" comment="java-1.8.0-openjdk-javadoc-1.8.0.452.b09-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977530" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.452.b09-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977531" comment="java-1.8.0-openjdk-src-1.8.0.452.b09-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999548" comment="java-11-openjdk-11.0.27.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999549" comment="java-11-openjdk-debug-11.0.27.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999550" comment="java-11-openjdk-demo-11.0.27.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999551" comment="java-11-openjdk-demo-debug-11.0.27.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999554" comment="java-11-openjdk-devel-11.0.27.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999555" comment="java-11-openjdk-devel-debug-11.0.27.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999559" comment="java-11-openjdk-headless-11.0.27.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999560" comment="java-11-openjdk-headless-debug-11.0.27.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999563" comment="java-11-openjdk-javadoc-11.0.27.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999564" comment="java-11-openjdk-javadoc-debug-11.0.27.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999565" comment="java-11-openjdk-javadoc-zip-11.0.27.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999566" comment="java-11-openjdk-javadoc-zip-debug-11.0.27.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999567" comment="java-11-openjdk-jmods-11.0.27.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999568" comment="java-11-openjdk-jmods-debug-11.0.27.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999572" comment="java-11-openjdk-src-11.0.27.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999573" comment="java-11-openjdk-src-debug-11.0.27.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999576" comment="java-11-openjdk-static-libs-11.0.27.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999577" comment="java-11-openjdk-static-libs-debug-11.0.27.0.6-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521928" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21928</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21928" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21928" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21928" ref_url="https://www.suse.com/security/cve/CVE-2025-21928" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:12746" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001874.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:12752" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001879.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:14748" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01707-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01951-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02846-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024169.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

HID: intel-ish-hid: Fix use-after-free issue in ishtp_hid_remove()

The system can experience a random crash a few minutes after the driver is
removed. This issue occurs due to improper handling of memory freeing in
the ishtp_hid_remove() function.

The function currently frees the `driver_data` directly within the loop
that destroys the HID devices, which can lead to accessing freed memory.
Specifically, `hid_destroy_device()` uses `driver_data` when it calls
`hid_ishtp_set_feature()` to power off the sensor, so freeing
`driver_data` beforehand can result in accessing invalid memory.

This patch resolves the issue by storing the `driver_data` in a temporary
variable before calling `hid_destroy_device()`, and then freeing the
`driver_data` after the device is destroyed.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-09-05"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21928/">CVE-2025-21928 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21928">CVE-2025-21928 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240722">SUSE bug 1240722</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010016960" comment="bpftool-3.10.0-1160.137.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016961" comment="kernel-3.10.0-1160.137.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016962" comment="kernel-abi-whitelists-3.10.0-1160.137.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016963" comment="kernel-debug-3.10.0-1160.137.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016966" comment="kernel-doc-3.10.0-1160.137.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016967" comment="kernel-headers-3.10.0-1160.137.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016968" comment="kernel-tools-3.10.0-1160.137.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016969" comment="kernel-tools-libs-3.10.0-1160.137.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016971" comment="perf-3.10.0-1160.137.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016972" comment="python-perf-3.10.0-1160.137.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202522004" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-22004</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-22004" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22004" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-22004" ref_url="https://www.suse.com/security/cve/CVE-2025-22004" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:10379" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001765.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:11298" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001807.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:11358" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001818.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01600-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01620-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01627-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01633-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01640-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01707-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02099-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-May/020836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-May/020835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20343-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20344-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20354-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20355-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024168.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: atm: fix use after free in lec_send()

The -&gt;send() operation frees skb so save the length before calling
-&gt;send() to avoid a use after free.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-07-19"/>
	<updated date="2026-02-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22004/">CVE-2025-22004 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22004">CVE-2025-22004 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240835">SUSE bug 1240835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1241090">SUSE bug 1241090</bugzilla>
</advisory>
 </metadata>
</definition>
<definition id="oval:org.opensuse.security:def:202522026" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-22026</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-22026" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22026" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-22026" ref_url="https://www.suse.com/security/cve/CVE-2025-22026" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:16919" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002052.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:18281" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002120.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21063" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002273.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfsd: don't ignore the return code of svc_proc_register()

Currently, nfsd_proc_stat_init() ignores the return value of
svc_proc_register(). If the procfile creation fails, then the kernel
will WARN when it tries to remove the entry later.

Fix nfsd_proc_stat_init() to return the same type of pointer as
svc_proc_register(), and fix up nfsd_net_init() to check that and fail
the nfsd_net construction if it occurs.

svc_proc_register() can fail if the dentry can't be allocated, or if an
identical dentry already exists. The second case is pretty unlikely in
the nfsd_net construction codepath, so if this happens, return -ENOMEM.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-05"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22026/">CVE-2025-22026 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22026">CVE-2025-22026 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1241349">SUSE bug 1241349</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010032439" comment="bpftool-3.10.0-1160.142.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032440" comment="kernel-3.10.0-1160.142.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032441" comment="kernel-abi-whitelists-3.10.0-1160.142.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032442" comment="kernel-debug-3.10.0-1160.142.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032445" comment="kernel-doc-3.10.0-1160.142.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032446" comment="kernel-headers-3.10.0-1160.142.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032447" comment="kernel-tools-3.10.0-1160.142.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032448" comment="kernel-tools-libs-3.10.0-1160.142.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032450" comment="perf-3.10.0-1160.142.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032451" comment="python-perf-3.10.0-1160.142.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202523150" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-23150</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-23150" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23150" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-23150" ref_url="https://www.suse.com/security/cve/CVE-2025-23150" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:11298" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001807.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:14748" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001967.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:9302" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01951-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01965-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01972-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02000-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20413-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20419-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20421-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024167.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: fix off-by-one error in do_split

Syzkaller detected a use-after-free issue in ext4_insert_dentry that was
caused by out-of-bounds access due to incorrect splitting in do_split.

BUG: KASAN: use-after-free in ext4_insert_dentry+0x36a/0x6d0 fs/ext4/namei.c:2109
Write of size 251 at addr ffff888074572f14 by task syz-executor335/5847

CPU: 0 UID: 0 PID: 5847 Comm: syz-executor335 Not tainted 6.12.0-rc6-syzkaller-00318-ga9cda7c0ffed #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024
Call Trace:
 &lt;TASK&gt;
 __dump_stack lib/dump_stack.c:94 [inline]
 dump_stack_lvl+0x241/0x360 lib/dump_stack.c:120
 print_address_description mm/kasan/report.c:377 [inline]
 print_report+0x169/0x550 mm/kasan/report.c:488
 kasan_report+0x143/0x180 mm/kasan/report.c:601
 kasan_check_range+0x282/0x290 mm/kasan/generic.c:189
 __asan_memcpy+0x40/0x70 mm/kasan/shadow.c:106
 ext4_insert_dentry+0x36a/0x6d0 fs/ext4/namei.c:2109
 add_dirent_to_buf+0x3d9/0x750 fs/ext4/namei.c:2154
 make_indexed_dir+0xf98/0x1600 fs/ext4/namei.c:2351
 ext4_add_entry+0x222a/0x25d0 fs/ext4/namei.c:2455
 ext4_add_nondir+0x8d/0x290 fs/ext4/namei.c:2796
 ext4_symlink+0x920/0xb50 fs/ext4/namei.c:3431
 vfs_symlink+0x137/0x2e0 fs/namei.c:4615
 do_symlinkat+0x222/0x3a0 fs/namei.c:4641
 __do_sys_symlink fs/namei.c:4662 [inline]
 __se_sys_symlink fs/namei.c:4660 [inline]
 __x64_sys_symlink+0x7a/0x90 fs/namei.c:4660
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
 &lt;/TASK&gt;

The following loop is located right above 'if' statement.

for (i = count-1; i &gt;= 0; i--) {
	/* is more than half of this entry in 2nd half of the block? */
	if (size + map[i].size/2 &gt; blocksize/2)
		break;
	size += map[i].size;
	move++;
}

'i' in this case could go down to -1, in which case sum of active entries
wouldn't exceed half the block size, but previous behaviour would also do
split in half if sum would exceed at the very last block, which in case of
having too many long name files in a single block could lead to
out-of-bounds access and following use-after-free.

Found by Linux Verification Center (linuxtesting.org) with Syzkaller.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-09-05"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-23150/">CVE-2025-23150 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-23150">CVE-2025-23150 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242513">SUSE bug 1242513</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010016960" comment="bpftool-3.10.0-1160.137.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016961" comment="kernel-3.10.0-1160.137.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016962" comment="kernel-abi-whitelists-3.10.0-1160.137.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016963" comment="kernel-debug-3.10.0-1160.137.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016966" comment="kernel-doc-3.10.0-1160.137.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016967" comment="kernel-headers-3.10.0-1160.137.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016968" comment="kernel-tools-3.10.0-1160.137.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016969" comment="kernel-tools-libs-3.10.0-1160.137.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016971" comment="perf-3.10.0-1160.137.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016972" comment="python-perf-3.10.0-1160.137.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202524495" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-24495</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-24495" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24495" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-24495" ref_url="https://www.suse.com/security/cve/CVE-2025-24495" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039307.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01651-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01651-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039391.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1567-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-May/020842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20410-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20424-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040391.html" source="SUSE-SU"/>
		<reference ref_id="TID000021845" ref_url="https://www.suse.com/support/kb/doc/?id=000021845" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15093-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IDMNMRHOEJBKOC4ZPMYVNMKT2SGRVB7Q/" source="SUSE-SU"/>
    <description>
    Incorrect initialization of resource in the branch prediction unit for some Intel(R) Core(tm) Ultra Processors may allow an authenticated user to potentially enable information disclosure via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-18"/>
	<updated date="2025-12-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-24495/">CVE-2025-24495 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24495">CVE-2025-24495 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242006">SUSE bug 1242006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1243123">SUSE bug 1243123</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999889" comment="microcode_ctl-2.1-73.24.el7_9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202524528" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-24528</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-24528" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24528" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-24528" ref_url="https://www.suse.com/security/cve/CVE-2025-24528" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:1352" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000875.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:2722" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000960.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7067" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0304-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2FTHPKX7AIUOFNDU7J36C27TP7QFP2LP/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024196.html" source="SUSE-SU"/>
    <description>
    In MIT Kerberos 5 (aka krb5) before 1.22 (with incremental propagation), there is an integer overflow for a large update size to resize() in kdb_log.c. An authenticated attacker can cause an out-of-bounds write and kadmind daemon crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-02-17"/>
	<updated date="2026-02-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-24528/">CVE-2025-24528 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24528">CVE-2025-24528 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236619">SUSE bug 1236619</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009963881" comment="krb5-devel-1.15.1-55.el7_9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009963882" comment="krb5-libs-1.15.1-55.el7_9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009963883" comment="krb5-pkinit-1.15.1-55.el7_9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009963884" comment="krb5-server-1.15.1-55.el7_9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009963885" comment="krb5-server-ldap-1.15.1-55.el7_9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009963886" comment="krb5-workstation-1.15.1-55.el7_9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009963887" comment="libkadm5-1.15.1-55.el7_9.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202524855" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-24855</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-24855" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24855" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-24855" ref_url="https://www.suse.com/security/cve/CVE-2025-24855" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:3107" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000995.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:3612" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001029.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:3615" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020595.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1125-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1494-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14894-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZKCQGOW24ZBKSYCIKDUG4KKITEGCJKY2/" source="SUSE-SU"/>
    <description>
    numbers.c in libxslt before 1.1.43 has a use-after-free because, in nested XPath evaluations, an XPath context node can be modified but never restored. This is related to xsltNumberFormatGetValue, xsltEvalXPathPredicate, xsltEvalXPathStringNs, and xsltComputeSortResultInternal.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-04-11"/>
	<updated date="2025-10-23"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-24855/">CVE-2025-24855 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-24855">CVE-2025-24855 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1239625">SUSE bug 1239625</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009974858" comment="libxslt-1.1.28-8.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974859" comment="libxslt-devel-1.1.28-8.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974860" comment="libxslt-python-1.1.28-8.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202524928" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-24928</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-24928" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24928" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-24928" ref_url="https://www.suse.com/security/cve/CVE-2025-24928" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:2673" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000996.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:2679" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000965.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:2686" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0746-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14999-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BOJ5M2XMJXGWQUYHA5ROFPVMA2BJ6SLD/" source="SUSE-SU"/>
    <description>
    libxml2 before 2.12.10 and 2.13.x before 2.13.6 has a stack-based buffer overflow in xmlSnprintfElements in valid.c. To exploit this, DTD validation must occur for an untrusted document or untrusted DTD. NOTE: this is similar to CVE-2017-9047.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-03-27"/>
	<updated date="2025-10-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-24928/">CVE-2025-24928 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-24928">CVE-2025-24928 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237370">SUSE bug 1237370</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009969739" comment="libxml2-2.9.1-6.el7_9.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009969740" comment="libxml2-devel-2.9.1-6.el7_9.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009969741" comment="libxml2-python-2.9.1-6.el7_9.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009969742" comment="libxml2-static-2.9.1-6.el7_9.9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202526594" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-26594</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-26594" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26594" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-26594" ref_url="https://www.suse.com/security/cve/CVE-2025-26594" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:2500" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000948.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:2502" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000937.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:2861" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000988.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:2879" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000951.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7163" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001306.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7165" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0734-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020437.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14841-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DFXFWTIBYVEZW7776X7CR2CMJGQXCGXT/" source="SUSE-SU"/>
    <description>
    A use-after-free flaw was found in X.Org and Xwayland. The root cursor is referenced in the X server as a global variable. If a client frees the root cursor, the internal reference points to freed memory and causes a use-after-free.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-03-20"/>
	<updated date="2025-05-31"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L" href="https://www.suse.com/security/cve/CVE-2025-26594/">CVE-2025-26594 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-26594">CVE-2025-26594 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237427">SUSE bug 1237427</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009968232" comment="tigervnc-1.8.0-36.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968233" comment="tigervnc-icons-1.8.0-36.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968234" comment="tigervnc-license-1.8.0-36.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968235" comment="tigervnc-server-1.8.0-36.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968236" comment="tigervnc-server-applet-1.8.0-36.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968237" comment="tigervnc-server-minimal-1.8.0-36.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968238" comment="tigervnc-server-module-1.8.0-36.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968239" comment="xorg-x11-server-Xdmx-1.20.4-30.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968240" comment="xorg-x11-server-Xephyr-1.20.4-30.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968241" comment="xorg-x11-server-Xnest-1.20.4-30.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968242" comment="xorg-x11-server-Xorg-1.20.4-30.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968243" comment="xorg-x11-server-Xvfb-1.20.4-30.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968244" comment="xorg-x11-server-Xwayland-1.20.4-30.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968245" comment="xorg-x11-server-common-1.20.4-30.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968246" comment="xorg-x11-server-devel-1.20.4-30.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968247" comment="xorg-x11-server-source-1.20.4-30.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202526595" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-26595</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-26595" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26595" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-26595" ref_url="https://www.suse.com/security/cve/CVE-2025-26595" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:2500" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000948.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:2502" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000937.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:2861" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000988.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:2879" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000951.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7163" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001306.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7165" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0734-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0758-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/27GANBYQW25DQC6LDPTKCLJHEVLSI5SU/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020494.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14841-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DFXFWTIBYVEZW7776X7CR2CMJGQXCGXT/" source="SUSE-SU"/>
    <description>
    A buffer overflow flaw was found in X.Org and Xwayland. The code in XkbVModMaskText() allocates a fixed-sized buffer on the stack and copies the names of the virtual modifiers to that buffer. The code fails to check the bounds of the buffer and would copy the data regardless of the size.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-03-20"/>
	<updated date="2025-05-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-26595/">CVE-2025-26595 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-26595">CVE-2025-26595 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237429">SUSE bug 1237429</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009968232" comment="tigervnc-1.8.0-36.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968233" comment="tigervnc-icons-1.8.0-36.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968234" comment="tigervnc-license-1.8.0-36.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968235" comment="tigervnc-server-1.8.0-36.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968236" comment="tigervnc-server-applet-1.8.0-36.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968237" comment="tigervnc-server-minimal-1.8.0-36.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968238" comment="tigervnc-server-module-1.8.0-36.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968239" comment="xorg-x11-server-Xdmx-1.20.4-30.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968240" comment="xorg-x11-server-Xephyr-1.20.4-30.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968241" comment="xorg-x11-server-Xnest-1.20.4-30.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968242" comment="xorg-x11-server-Xorg-1.20.4-30.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968243" comment="xorg-x11-server-Xvfb-1.20.4-30.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968244" comment="xorg-x11-server-Xwayland-1.20.4-30.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968245" comment="xorg-x11-server-common-1.20.4-30.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968246" comment="xorg-x11-server-devel-1.20.4-30.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968247" comment="xorg-x11-server-source-1.20.4-30.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202526596" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-26596</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-26596" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26596" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-26596" ref_url="https://www.suse.com/security/cve/CVE-2025-26596" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:2500" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000948.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:2502" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000937.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:2861" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000988.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:2879" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000951.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7163" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001306.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7165" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0734-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020437.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14841-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DFXFWTIBYVEZW7776X7CR2CMJGQXCGXT/" source="SUSE-SU"/>
    <description>
    A heap overflow flaw was found in X.Org and Xwayland. The computation of the length in XkbSizeKeySyms() differs from what is written in XkbWriteKeySyms(), which may lead to a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-03-20"/>
	<updated date="2025-05-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-26596/">CVE-2025-26596 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-26596">CVE-2025-26596 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237430">SUSE bug 1237430</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009968232" comment="tigervnc-1.8.0-36.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968233" comment="tigervnc-icons-1.8.0-36.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968234" comment="tigervnc-license-1.8.0-36.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968235" comment="tigervnc-server-1.8.0-36.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968236" comment="tigervnc-server-applet-1.8.0-36.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968237" comment="tigervnc-server-minimal-1.8.0-36.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968238" comment="tigervnc-server-module-1.8.0-36.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968239" comment="xorg-x11-server-Xdmx-1.20.4-30.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968240" comment="xorg-x11-server-Xephyr-1.20.4-30.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968241" comment="xorg-x11-server-Xnest-1.20.4-30.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968242" comment="xorg-x11-server-Xorg-1.20.4-30.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968243" comment="xorg-x11-server-Xvfb-1.20.4-30.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968244" comment="xorg-x11-server-Xwayland-1.20.4-30.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968245" comment="xorg-x11-server-common-1.20.4-30.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968246" comment="xorg-x11-server-devel-1.20.4-30.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968247" comment="xorg-x11-server-source-1.20.4-30.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202526597" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-26597</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-26597" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26597" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-26597" ref_url="https://www.suse.com/security/cve/CVE-2025-26597" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:2500" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000948.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:2502" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000937.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:2861" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000988.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:2879" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000951.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7163" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001306.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7165" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0734-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0739-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020454.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0757-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14841-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DFXFWTIBYVEZW7776X7CR2CMJGQXCGXT/" source="SUSE-SU"/>
    <description>
    A buffer overflow flaw was found in X.Org and Xwayland. If XkbChangeTypesOfKey() is called with a 0 group, it will resize the key symbols table to 0 but leave the key actions unchanged. If the same function is later called with a non-zero value of groups, this will cause a buffer overflow because the key actions are of the wrong size.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-03-20"/>
	<updated date="2025-06-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-26597/">CVE-2025-26597 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-26597">CVE-2025-26597 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237431">SUSE bug 1237431</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009968232" comment="tigervnc-1.8.0-36.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968233" comment="tigervnc-icons-1.8.0-36.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968234" comment="tigervnc-license-1.8.0-36.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968235" comment="tigervnc-server-1.8.0-36.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968236" comment="tigervnc-server-applet-1.8.0-36.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968237" comment="tigervnc-server-minimal-1.8.0-36.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968238" comment="tigervnc-server-module-1.8.0-36.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968239" comment="xorg-x11-server-Xdmx-1.20.4-30.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968240" comment="xorg-x11-server-Xephyr-1.20.4-30.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968241" comment="xorg-x11-server-Xnest-1.20.4-30.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968242" comment="xorg-x11-server-Xorg-1.20.4-30.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968243" comment="xorg-x11-server-Xvfb-1.20.4-30.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968244" comment="xorg-x11-server-Xwayland-1.20.4-30.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968245" comment="xorg-x11-server-common-1.20.4-30.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968246" comment="xorg-x11-server-devel-1.20.4-30.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968247" comment="xorg-x11-server-source-1.20.4-30.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202526598" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-26598</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-26598" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26598" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-26598" ref_url="https://www.suse.com/security/cve/CVE-2025-26598" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:2500" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000948.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:2502" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000937.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:2861" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000988.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:2879" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000951.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7163" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001306.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7165" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0734-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020437.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14841-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DFXFWTIBYVEZW7776X7CR2CMJGQXCGXT/" source="SUSE-SU"/>
    <description>
    An out-of-bounds write flaw was found in X.Org and Xwayland. The function GetBarrierDevice() searches for the pointer device based on its device ID and returns the matching value, or supposedly NULL, if no match was found. However, the code will return the last element of the list if no matching device ID is found, which can lead to out-of-bounds memory access.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-03-20"/>
	<updated date="2025-05-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-26598/">CVE-2025-26598 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-26598">CVE-2025-26598 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237432">SUSE bug 1237432</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009968232" comment="tigervnc-1.8.0-36.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968233" comment="tigervnc-icons-1.8.0-36.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968234" comment="tigervnc-license-1.8.0-36.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968235" comment="tigervnc-server-1.8.0-36.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968236" comment="tigervnc-server-applet-1.8.0-36.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968237" comment="tigervnc-server-minimal-1.8.0-36.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968238" comment="tigervnc-server-module-1.8.0-36.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968239" comment="xorg-x11-server-Xdmx-1.20.4-30.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968240" comment="xorg-x11-server-Xephyr-1.20.4-30.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968241" comment="xorg-x11-server-Xnest-1.20.4-30.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968242" comment="xorg-x11-server-Xorg-1.20.4-30.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968243" comment="xorg-x11-server-Xvfb-1.20.4-30.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968244" comment="xorg-x11-server-Xwayland-1.20.4-30.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968245" comment="xorg-x11-server-common-1.20.4-30.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968246" comment="xorg-x11-server-devel-1.20.4-30.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968247" comment="xorg-x11-server-source-1.20.4-30.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202526599" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-26599</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-26599" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26599" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-26599" ref_url="https://www.suse.com/security/cve/CVE-2025-26599" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:2500" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000948.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:2502" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000937.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:2861" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000988.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:2879" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000951.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7163" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001306.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7165" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0734-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020437.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14841-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DFXFWTIBYVEZW7776X7CR2CMJGQXCGXT/" source="SUSE-SU"/>
    <description>
    An access to an uninitialized pointer flaw was found in X.Org and Xwayland. The function compCheckRedirect() may fail if it cannot allocate the backing pixmap. In that case, compRedirectWindow() will return a BadAlloc error without validating the window tree marked just before, which leaves the validated data partly initialized and the use of an uninitialized pointer later.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-03-20"/>
	<updated date="2025-05-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-26599/">CVE-2025-26599 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-26599">CVE-2025-26599 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237433">SUSE bug 1237433</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009968232" comment="tigervnc-1.8.0-36.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968233" comment="tigervnc-icons-1.8.0-36.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968234" comment="tigervnc-license-1.8.0-36.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968235" comment="tigervnc-server-1.8.0-36.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968236" comment="tigervnc-server-applet-1.8.0-36.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968237" comment="tigervnc-server-minimal-1.8.0-36.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968238" comment="tigervnc-server-module-1.8.0-36.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968239" comment="xorg-x11-server-Xdmx-1.20.4-30.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968240" comment="xorg-x11-server-Xephyr-1.20.4-30.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968241" comment="xorg-x11-server-Xnest-1.20.4-30.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968242" comment="xorg-x11-server-Xorg-1.20.4-30.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968243" comment="xorg-x11-server-Xvfb-1.20.4-30.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968244" comment="xorg-x11-server-Xwayland-1.20.4-30.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968245" comment="xorg-x11-server-common-1.20.4-30.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968246" comment="xorg-x11-server-devel-1.20.4-30.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968247" comment="xorg-x11-server-source-1.20.4-30.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202526600" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-26600</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-26600" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26600" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-26600" ref_url="https://www.suse.com/security/cve/CVE-2025-26600" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:2500" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000948.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:2502" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000937.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:2861" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000988.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:2879" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000951.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7163" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001306.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7165" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0734-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020437.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14841-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DFXFWTIBYVEZW7776X7CR2CMJGQXCGXT/" source="SUSE-SU"/>
    <description>
    A use-after-free flaw was found in X.Org and Xwayland. When a device is removed while still frozen, the events queued for that device remain while the device is freed. Replaying the events will cause a use-after-free.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-03-20"/>
	<updated date="2025-08-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-26600/">CVE-2025-26600 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-26600">CVE-2025-26600 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237434">SUSE bug 1237434</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009968232" comment="tigervnc-1.8.0-36.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968233" comment="tigervnc-icons-1.8.0-36.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968234" comment="tigervnc-license-1.8.0-36.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968235" comment="tigervnc-server-1.8.0-36.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968236" comment="tigervnc-server-applet-1.8.0-36.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968237" comment="tigervnc-server-minimal-1.8.0-36.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968238" comment="tigervnc-server-module-1.8.0-36.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968239" comment="xorg-x11-server-Xdmx-1.20.4-30.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968240" comment="xorg-x11-server-Xephyr-1.20.4-30.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968241" comment="xorg-x11-server-Xnest-1.20.4-30.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968242" comment="xorg-x11-server-Xorg-1.20.4-30.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968243" comment="xorg-x11-server-Xvfb-1.20.4-30.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968244" comment="xorg-x11-server-Xwayland-1.20.4-30.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968245" comment="xorg-x11-server-common-1.20.4-30.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968246" comment="xorg-x11-server-devel-1.20.4-30.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968247" comment="xorg-x11-server-source-1.20.4-30.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202526601" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-26601</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-26601" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26601" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-26601" ref_url="https://www.suse.com/security/cve/CVE-2025-26601" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:2500" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000948.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:2502" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000937.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:2861" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000988.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:2879" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000951.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7163" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001306.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7165" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0734-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020437.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14841-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DFXFWTIBYVEZW7776X7CR2CMJGQXCGXT/" source="SUSE-SU"/>
    <description>
    A use-after-free flaw was found in X.Org and Xwayland. When changing an alarm, the values of the change mask are evaluated one after the other, changing the trigger values as requested, and eventually, SyncInitTrigger() is called. If one of the changes triggers an error, the function will return early, not adding the new sync object, possibly causing a use-after-free when the alarm eventually triggers.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-03-20"/>
	<updated date="2025-08-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-26601/">CVE-2025-26601 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-26601">CVE-2025-26601 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237435">SUSE bug 1237435</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009968232" comment="tigervnc-1.8.0-36.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968233" comment="tigervnc-icons-1.8.0-36.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968234" comment="tigervnc-license-1.8.0-36.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968235" comment="tigervnc-server-1.8.0-36.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968236" comment="tigervnc-server-applet-1.8.0-36.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968237" comment="tigervnc-server-minimal-1.8.0-36.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968238" comment="tigervnc-server-module-1.8.0-36.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968239" comment="xorg-x11-server-Xdmx-1.20.4-30.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968240" comment="xorg-x11-server-Xephyr-1.20.4-30.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968241" comment="xorg-x11-server-Xnest-1.20.4-30.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968242" comment="xorg-x11-server-Xorg-1.20.4-30.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968243" comment="xorg-x11-server-Xvfb-1.20.4-30.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968244" comment="xorg-x11-server-Xwayland-1.20.4-30.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968245" comment="xorg-x11-server-common-1.20.4-30.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968246" comment="xorg-x11-server-devel-1.20.4-30.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968247" comment="xorg-x11-server-source-1.20.4-30.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202527363" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-27363</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-27363" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27363" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-27363" ref_url="https://www.suse.com/security/cve/CVE-2025-27363" source="SUSE CVE"/>
		<reference ref_id="ESSA-2025:2834" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001037.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:3407" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001011.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:3421" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020586.html" source="SUSE-SU"/>
    <description>
    An out of bounds write exists in FreeType versions 2.13.0 and below (newer versions of FreeType are not vulnerable) when attempting to parse font subglyph structures related to TrueType GX and variable font files. The vulnerable code assigns a signed short value to an unsigned long and then adds a static value causing it to wrap around and allocate too small of a heap buffer. The code then writes up to 6 signed long integers out of bounds relative to this buffer. This may result in arbitrary code execution. This vulnerability may have been exploited in the wild.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-04-17"/>
	<updated date="2025-05-09"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-27363/">CVE-2025-27363 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-27363">CVE-2025-27363 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1239465">SUSE bug 1239465</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009975550" comment="freetype-2.8-15.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009975551" comment="freetype-demos-2.8-15.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009975552" comment="freetype-devel-2.8-15.el7_9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20252784" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-2784</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-2784" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2784" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-2784" ref_url="https://www.suse.com/security/cve/CVE-2025-2784" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:8126" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001317.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:8132" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001157.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:9179" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01503-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039410.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01504-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1503-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1504-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1509-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1510-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1518-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1519-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039192.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20375-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20446-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040559.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15018-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ATPKW6OXT3PUHQHSXCXQTRUSRDDEGELB/" source="SUSE-SU"/>
    <description>
    A flaw was found in libsoup. The package is vulnerable to a heap buffer over-read when sniffing content via the skip_insight_whitespace() function. Libsoup clients may read one byte out-of-bounds in response to a crafted HTTP response by an HTTP server.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-07-05"/>
	<updated date="2025-08-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" cvss4="8.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-2784/">CVE-2025-2784 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-2784">CVE-2025-2784 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240750">SUSE bug 1240750</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009998908" comment="libsoup-2.62.2-6.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998909" comment="libsoup-devel-2.62.2-6.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202530691" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-30691</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-30691" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30691" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-30691" ref_url="https://www.suse.com/security/cve/CVE-2025-30691" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:3844" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001096.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:3845" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001044.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:3848" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001784.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:3852" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001073.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:3855" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01487-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01487-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01525-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01770-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01788-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021513.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1399-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1429-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1487-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-May/020782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1524-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-May/020817.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15022-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BRJ4ISGUWDRCC6WFUQ7DJTTNQVMYNV5Y/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15024-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C6XNBWNLTVY24PY5AGA3UCES65X3SMQN/" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-05-09"/>
	<updated date="2025-11-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30691/">CVE-2025-30691 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30691">CVE-2025-30691 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1241275">SUSE bug 1241275</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009977524" comment="java-1.8.0-openjdk-1.8.0.452.b09-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977525" comment="java-1.8.0-openjdk-accessibility-1.8.0.452.b09-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977526" comment="java-1.8.0-openjdk-demo-1.8.0.452.b09-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977527" comment="java-1.8.0-openjdk-devel-1.8.0.452.b09-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977528" comment="java-1.8.0-openjdk-headless-1.8.0.452.b09-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977529" comment="java-1.8.0-openjdk-javadoc-1.8.0.452.b09-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977530" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.452.b09-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977531" comment="java-1.8.0-openjdk-src-1.8.0.452.b09-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999548" comment="java-11-openjdk-11.0.27.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999549" comment="java-11-openjdk-debug-11.0.27.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999550" comment="java-11-openjdk-demo-11.0.27.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999551" comment="java-11-openjdk-demo-debug-11.0.27.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999554" comment="java-11-openjdk-devel-11.0.27.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999555" comment="java-11-openjdk-devel-debug-11.0.27.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999559" comment="java-11-openjdk-headless-11.0.27.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999560" comment="java-11-openjdk-headless-debug-11.0.27.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999563" comment="java-11-openjdk-javadoc-11.0.27.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999564" comment="java-11-openjdk-javadoc-debug-11.0.27.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999565" comment="java-11-openjdk-javadoc-zip-11.0.27.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999566" comment="java-11-openjdk-javadoc-zip-debug-11.0.27.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999567" comment="java-11-openjdk-jmods-11.0.27.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999568" comment="java-11-openjdk-jmods-debug-11.0.27.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999572" comment="java-11-openjdk-src-11.0.27.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999573" comment="java-11-openjdk-src-debug-11.0.27.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999576" comment="java-11-openjdk-static-libs-11.0.27.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999577" comment="java-11-openjdk-static-libs-debug-11.0.27.0.6-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202530698" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-30698</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-30698" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30698" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-30698" ref_url="https://www.suse.com/security/cve/CVE-2025-30698" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:3844" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001096.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:3845" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001044.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:3848" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001784.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:3852" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001073.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:3855" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01487-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01487-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01525-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01770-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01788-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021513.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1399-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1429-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1487-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-May/020782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1524-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-May/020817.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15022-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BRJ4ISGUWDRCC6WFUQ7DJTTNQVMYNV5Y/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15024-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C6XNBWNLTVY24PY5AGA3UCES65X3SMQN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15077-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PTNITOYWDOKJOEHSH2CU5O6OKDMZOEYZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15078-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PQYOZOCMS25XBQWUFJFFM6CS5L66IC5C/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15080-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YI5CZCHTIKADEFJKS6K6CGUTIV4PERYD/" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-05-09"/>
	<updated date="2025-11-22"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30698/">CVE-2025-30698 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30698">CVE-2025-30698 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1241274">SUSE bug 1241274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1241276">SUSE bug 1241276</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009977524" comment="java-1.8.0-openjdk-1.8.0.452.b09-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977525" comment="java-1.8.0-openjdk-accessibility-1.8.0.452.b09-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977526" comment="java-1.8.0-openjdk-demo-1.8.0.452.b09-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977527" comment="java-1.8.0-openjdk-devel-1.8.0.452.b09-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977528" comment="java-1.8.0-openjdk-headless-1.8.0.452.b09-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977529" comment="java-1.8.0-openjdk-javadoc-1.8.0.452.b09-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977530" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.452.b09-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977531" comment="java-1.8.0-openjdk-src-1.8.0.452.b09-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999548" comment="java-11-openjdk-11.0.27.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999549" comment="java-11-openjdk-debug-11.0.27.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999550" comment="java-11-openjdk-demo-11.0.27.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999551" comment="java-11-openjdk-demo-debug-11.0.27.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999554" comment="java-11-openjdk-devel-11.0.27.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999555" comment="java-11-openjdk-devel-debug-11.0.27.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999559" comment="java-11-openjdk-headless-11.0.27.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999560" comment="java-11-openjdk-headless-debug-11.0.27.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999563" comment="java-11-openjdk-javadoc-11.0.27.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999564" comment="java-11-openjdk-javadoc-debug-11.0.27.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999565" comment="java-11-openjdk-javadoc-zip-11.0.27.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999566" comment="java-11-openjdk-javadoc-zip-debug-11.0.27.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999567" comment="java-11-openjdk-jmods-11.0.27.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999568" comment="java-11-openjdk-jmods-debug-11.0.27.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999572" comment="java-11-openjdk-src-11.0.27.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999573" comment="java-11-openjdk-src-debug-11.0.27.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999576" comment="java-11-openjdk-static-libs-11.0.27.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999577" comment="java-11-openjdk-static-libs-debug-11.0.27.0.6-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202530749" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-30749</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-30749" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30749" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-30749" ref_url="https://www.suse.com/security/cve/CVE-2025-30749" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:10861" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001837.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:10862" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001811.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:10865" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001838.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:10867" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001814.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:10873" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02545-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02563-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02657-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02666-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02667-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03120-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03224-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03236-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03262-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041764.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-07-26"/>
	<updated date="2025-11-22"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" cvss4="8.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30749/">CVE-2025-30749 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30749">CVE-2025-30749 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246595">SUSE bug 1246595</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010010142" comment="java-1.8.0-openjdk-1.8.0.462.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010010143" comment="java-1.8.0-openjdk-accessibility-1.8.0.462.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010010144" comment="java-1.8.0-openjdk-demo-1.8.0.462.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010010145" comment="java-1.8.0-openjdk-devel-1.8.0.462.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010010146" comment="java-1.8.0-openjdk-headless-1.8.0.462.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010010147" comment="java-1.8.0-openjdk-javadoc-1.8.0.462.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010010148" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.462.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010010149" comment="java-1.8.0-openjdk-src-1.8.0.462.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011165" comment="java-11-openjdk-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011166" comment="java-11-openjdk-debug-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011167" comment="java-11-openjdk-demo-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011168" comment="java-11-openjdk-demo-debug-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011171" comment="java-11-openjdk-devel-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011172" comment="java-11-openjdk-devel-debug-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011176" comment="java-11-openjdk-headless-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011177" comment="java-11-openjdk-headless-debug-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011180" comment="java-11-openjdk-javadoc-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011181" comment="java-11-openjdk-javadoc-debug-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011182" comment="java-11-openjdk-javadoc-zip-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011183" comment="java-11-openjdk-javadoc-zip-debug-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011184" comment="java-11-openjdk-jmods-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011185" comment="java-11-openjdk-jmods-debug-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011189" comment="java-11-openjdk-src-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011190" comment="java-11-openjdk-src-debug-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011193" comment="java-11-openjdk-static-libs-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011194" comment="java-11-openjdk-static-libs-debug-11.0.28.0.6-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202530754" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-30754</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-30754" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30754" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-30754" ref_url="https://www.suse.com/security/cve/CVE-2025-30754" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:10861" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001837.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:10862" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001811.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:10865" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001838.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:10867" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001814.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:10873" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02545-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02563-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02657-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02666-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02667-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03120-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03224-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03236-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03262-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041764.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-07-26"/>
	<updated date="2025-11-22"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30754/">CVE-2025-30754 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30754">CVE-2025-30754 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246595">SUSE bug 1246595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246598">SUSE bug 1246598</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010010142" comment="java-1.8.0-openjdk-1.8.0.462.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010010143" comment="java-1.8.0-openjdk-accessibility-1.8.0.462.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010010144" comment="java-1.8.0-openjdk-demo-1.8.0.462.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010010145" comment="java-1.8.0-openjdk-devel-1.8.0.462.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010010146" comment="java-1.8.0-openjdk-headless-1.8.0.462.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010010147" comment="java-1.8.0-openjdk-javadoc-1.8.0.462.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010010148" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.462.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010010149" comment="java-1.8.0-openjdk-src-1.8.0.462.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011165" comment="java-11-openjdk-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011166" comment="java-11-openjdk-debug-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011167" comment="java-11-openjdk-demo-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011168" comment="java-11-openjdk-demo-debug-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011171" comment="java-11-openjdk-devel-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011172" comment="java-11-openjdk-devel-debug-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011176" comment="java-11-openjdk-headless-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011177" comment="java-11-openjdk-headless-debug-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011180" comment="java-11-openjdk-javadoc-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011181" comment="java-11-openjdk-javadoc-debug-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011182" comment="java-11-openjdk-javadoc-zip-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011183" comment="java-11-openjdk-javadoc-zip-debug-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011184" comment="java-11-openjdk-jmods-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011185" comment="java-11-openjdk-jmods-debug-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011189" comment="java-11-openjdk-src-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011190" comment="java-11-openjdk-src-debug-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011193" comment="java-11-openjdk-static-libs-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011194" comment="java-11-openjdk-static-libs-debug-11.0.28.0.6-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202530761" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-30761</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-30761" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30761" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-30761" ref_url="https://www.suse.com/security/cve/CVE-2025-30761" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:10861" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001837.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:10862" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001811.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:10865" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02545-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02563-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02666-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03120-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03224-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03236-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03262-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041764.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-07-26"/>
	<updated date="2025-11-22"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2025-30761/">CVE-2025-30761 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30761">CVE-2025-30761 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246580">SUSE bug 1246580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246595">SUSE bug 1246595</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010010142" comment="java-1.8.0-openjdk-1.8.0.462.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010010143" comment="java-1.8.0-openjdk-accessibility-1.8.0.462.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010010144" comment="java-1.8.0-openjdk-demo-1.8.0.462.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010010145" comment="java-1.8.0-openjdk-devel-1.8.0.462.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010010146" comment="java-1.8.0-openjdk-headless-1.8.0.462.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010010147" comment="java-1.8.0-openjdk-javadoc-1.8.0.462.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010010148" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.462.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010010149" comment="java-1.8.0-openjdk-src-1.8.0.462.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011165" comment="java-11-openjdk-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011166" comment="java-11-openjdk-debug-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011167" comment="java-11-openjdk-demo-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011168" comment="java-11-openjdk-demo-debug-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011171" comment="java-11-openjdk-devel-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011172" comment="java-11-openjdk-devel-debug-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011176" comment="java-11-openjdk-headless-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011177" comment="java-11-openjdk-headless-debug-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011180" comment="java-11-openjdk-javadoc-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011181" comment="java-11-openjdk-javadoc-debug-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011182" comment="java-11-openjdk-javadoc-zip-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011183" comment="java-11-openjdk-javadoc-zip-debug-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011184" comment="java-11-openjdk-jmods-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011185" comment="java-11-openjdk-jmods-debug-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011189" comment="java-11-openjdk-src-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011190" comment="java-11-openjdk-src-debug-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011193" comment="java-11-openjdk-static-libs-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011194" comment="java-11-openjdk-static-libs-debug-11.0.28.0.6-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202532049" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-32049</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-32049" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32049" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-32049" ref_url="https://www.suse.com/security/cve/CVE-2025-32049" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:8126" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001317.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:8132" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001157.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:9179" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0657-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0689-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20649-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20752-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025111.html" source="SUSE-SU"/>
    <description>
    A flaw was found in libsoup. The SoupWebsocketConnection may accept a large WebSocket message, which may cause libsoup to allocate memory and lead to a denial of service (DoS).
    </description>
<advisory from="security@suse.de">
	<issued date="2025-07-05"/>
	<updated date="2026-04-02"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-32049/">CVE-2025-32049 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-32049">CVE-2025-32049 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240751">SUSE bug 1240751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250562">SUSE bug 1250562</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009998908" comment="libsoup-2.62.2-6.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998909" comment="libsoup-devel-2.62.2-6.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202532414" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-32414</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-32414" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32414" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-32414" ref_url="https://www.suse.com/security/cve/CVE-2025-32414" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:12240" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001864.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:13428" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001885.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:8958" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001668.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1435-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1438-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1439-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1440-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20333-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20364-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039495.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15019-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HN7F2PARWMCPSROOCFF3CWKQYVSIH4RA/" source="SUSE-SU"/>
    <description>
    In libxml2 before 2.13.8 and 2.14.x before 2.14.2, out-of-bounds memory access can occur in the Python API (Python bindings) because of an incorrect return value. This occurs in xmlPythonFileRead and xmlPythonFileReadRaw because of a difference between bytes and characters.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-08-05"/>
	<updated date="2025-08-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L" cvss4="2.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L" href="https://www.suse.com/security/cve/CVE-2025-32414/">CVE-2025-32414 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-32414">CVE-2025-32414 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1241551">SUSE bug 1241551</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010011938" comment="libxml2-2.9.1-6.el7_9.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011939" comment="libxml2-devel-2.9.1-6.el7_9.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011940" comment="libxml2-python-2.9.1-6.el7_9.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011941" comment="libxml2-static-2.9.1-6.el7_9.10 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202532415" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-32415</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-32415" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32415" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-32415" ref_url="https://www.suse.com/security/cve/CVE-2025-32415" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:13203" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001881.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:13428" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001885.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:13789" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1435-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1438-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1439-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1440-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20333-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20364-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039495.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15019-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HN7F2PARWMCPSROOCFF3CWKQYVSIH4RA/" source="SUSE-SU"/>
    <description>
    In libxml2 before 2.13.8 and 2.14.x before 2.14.2, xmlSchemaIDCFillNodeTables in xmlschemas.c has a heap-based buffer under-read. To exploit this, a crafted XML document must be validated against an XML schema with certain identity constraints, or a crafted XML schema must be used.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-09-17"/>
	<updated date="2025-09-18"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2025-32415/">CVE-2025-32415 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-32415">CVE-2025-32415 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1241453">SUSE bug 1241453</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010018317" comment="libxml2-2.9.1-6.el7_9.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018318" comment="libxml2-devel-2.9.1-6.el7_9.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018319" comment="libxml2-python-2.9.1-6.el7_9.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018320" comment="libxml2-static-2.9.1-6.el7_9.13 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202532462" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-32462</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-32462" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32462" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-32462" ref_url="https://www.suse.com/security/cve/CVE-2025-32462" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:10110" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001749.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:10871" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001790.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:9978" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02174-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040550.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02175-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02177-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02178-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02179-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20478-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20489-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040932.html" source="SUSE-SU"/>
    <description>
    Sudo before 1.9.17p1, when used with a sudoers file that specifies a host that is neither the current host nor ALL, allows listed users to execute commands on unintended machines.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-07-16"/>
	<updated date="2025-08-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-32462/">CVE-2025-32462 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-32462">CVE-2025-32462 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245274">SUSE bug 1245274</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010006275" comment="sudo-1.8.23-10.el7_9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010006276" comment="sudo-devel-1.8.23-10.el7_9.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202532906" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-32906</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-32906" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32906" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-32906" ref_url="https://www.suse.com/security/cve/CVE-2025-32906" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:4560" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001116.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7436" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001318.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:9179" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01504-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01794-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01864-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1504-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1510-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20375-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20446-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040559.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15189-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LI34B57WJ4B5UMQTOCNXAAI3NVKDGJWF/" source="SUSE-SU"/>
    <description>
    A flaw was found in libsoup, where the soup_headers_parse_request() function may be vulnerable to an out-of-bound read. This flaw allows a malicious user to use a specially crafted HTTP request to crash the HTTP server.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-07-05"/>
	<updated date="2025-11-13"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-32906/">CVE-2025-32906 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-32906">CVE-2025-32906 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1241263">SUSE bug 1241263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250562">SUSE bug 1250562</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009998908" comment="libsoup-2.62.2-6.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998909" comment="libsoup-devel-2.62.2-6.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202532911" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-32911</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-32911" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32911" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-32911" ref_url="https://www.suse.com/security/cve/CVE-2025-32911" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:4560" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001116.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7436" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001318.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:9179" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01504-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01794-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01864-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1504-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20375-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20446-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040559.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023643.html" source="SUSE-SU"/>
    <description>
    A use-after-free type vulnerability was found in libsoup, in the soup_message_headers_get_content_disposition() function. This flaw allows a malicious HTTP client to cause memory corruption in the libsoup server.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-07-05"/>
	<updated date="2025-12-24"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-32911/">CVE-2025-32911 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-32911">CVE-2025-32911 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1241238">SUSE bug 1241238</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250562">SUSE bug 1250562</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009998908" comment="libsoup-2.62.2-6.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998909" comment="libsoup-devel-2.62.2-6.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202532913" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-32913</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-32913" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32913" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-32913" ref_url="https://www.suse.com/security/cve/CVE-2025-32913" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:4560" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001116.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7436" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001318.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:9179" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01504-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01794-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01864-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1504-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1510-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20375-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20446-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040559.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15189-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LI34B57WJ4B5UMQTOCNXAAI3NVKDGJWF/" source="SUSE-SU"/>
    <description>
    A flaw was found in libsoup, where the soup_message_headers_get_content_disposition() function is vulnerable to a NULL pointer dereference. This flaw allows a malicious HTTP peer to crash a libsoup client or server that uses this function.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-07-05"/>
	<updated date="2025-07-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-32913/">CVE-2025-32913 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-32913">CVE-2025-32913 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1241162">SUSE bug 1241162</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009998908" comment="libsoup-2.62.2-6.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998909" comment="libsoup-devel-2.62.2-6.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202532914" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-32914</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-32914" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32914" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-32914" ref_url="https://www.suse.com/security/cve/CVE-2025-32914" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:8126" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001317.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:8132" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001157.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:9179" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01503-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039410.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01504-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1503-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1504-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1509-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1510-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1518-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1519-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039192.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20375-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20446-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040559.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15015-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S22JSK2XZAOA2FDRSMJRCA7U6HIFDWLZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15044-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/53THXHSDPP4TLMFRSP5DPLY4DK72M7XY/" source="SUSE-SU"/>
    <description>
    A flaw was found in libsoup, where the soup_multipart_new_from_message() function is vulnerable to an out-of-bounds read. This flaw allows a malicious HTTP client to induce the libsoup server to read out of bounds.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-07-05"/>
	<updated date="2025-07-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-32914/">CVE-2025-32914 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-32914">CVE-2025-32914 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1241164">SUSE bug 1241164</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009998908" comment="libsoup-2.62.2-6.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998909" comment="libsoup-devel-2.62.2-6.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202537797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-37797</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-37797" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37797" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-37797" ref_url="https://www.suse.com/security/cve/CVE-2025-37797" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:11861" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001849.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16919" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002052.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21063" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01951-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01965-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01972-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02000-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02588-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02604-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02606-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02607-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02608-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02610-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02611-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02618-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02619-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02627-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02632-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02636-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02637-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02638-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02652-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02671-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02673-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02676-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02687-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02688-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02689-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02691-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02693-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02697-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02698-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02704-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02707-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02708-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02710-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02848-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02850-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02852-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02858-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02942-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20413-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20419-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20421-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20568-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20572-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022307.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20576-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20578-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20579-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041387.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20580-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20581-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20582-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20583-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20584-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20610-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20611-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20612-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20613-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20615-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20616-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20620-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20621-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20622-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20623-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20624-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20625-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024167.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net_sched: hfsc: Fix a UAF vulnerability in class handling

This patch fixes a Use-After-Free vulnerability in the HFSC qdisc class
handling. The issue occurs due to a time-of-check/time-of-use condition
in hfsc_change_class() when working with certain child qdiscs like netem
or codel.

The vulnerability works as follows:
1. hfsc_change_class() checks if a class has packets (q.qlen != 0)
2. It then calls qdisc_peek_len(), which for certain qdiscs (e.g.,
   codel, netem) might drop packets and empty the queue
3. The code continues assuming the queue is still non-empty, adding
   the class to vttree
4. This breaks HFSC scheduler assumptions that only non-empty classes
   are in vttree
5. Later, when the class is destroyed, this can lead to a Use-After-Free

The fix adds a second queue length check after qdisc_peek_len() to verify
the queue wasn't emptied.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-05"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-37797/">CVE-2025-37797 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37797">CVE-2025-37797 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242417">SUSE bug 1242417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245793">SUSE bug 1245793</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010032439" comment="bpftool-3.10.0-1160.142.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032440" comment="kernel-3.10.0-1160.142.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032441" comment="kernel-abi-whitelists-3.10.0-1160.142.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032442" comment="kernel-debug-3.10.0-1160.142.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032445" comment="kernel-doc-3.10.0-1160.142.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032446" comment="kernel-headers-3.10.0-1160.142.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032447" comment="kernel-tools-3.10.0-1160.142.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032448" comment="kernel-tools-libs-3.10.0-1160.142.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032450" comment="perf-3.10.0-1160.142.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032451" comment="python-perf-3.10.0-1160.142.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202537823" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-37823</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-37823" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37823" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-37823" ref_url="https://www.suse.com/security/cve/CVE-2025-37823" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:15011" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001976.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0755" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002421.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01951-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01965-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01972-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02000-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02308-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-July/021812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20413-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20419-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20421-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024167.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too

Similarly to the previous patch, we need to safe guard hfsc_dequeue()
too. But for this one, we don't have a reliable reproducer.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37823/">CVE-2025-37823 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37823">CVE-2025-37823 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242924">SUSE bug 1242924</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010039005" comment="bpftool-3.10.0-1160.145.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039006" comment="kernel-3.10.0-1160.145.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039007" comment="kernel-abi-whitelists-3.10.0-1160.145.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039008" comment="kernel-debug-3.10.0-1160.145.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039011" comment="kernel-doc-3.10.0-1160.145.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039012" comment="kernel-headers-3.10.0-1160.145.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039013" comment="kernel-tools-3.10.0-1160.145.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039014" comment="kernel-tools-libs-3.10.0-1160.145.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039016" comment="perf-3.10.0-1160.145.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039017" comment="python-perf-3.10.0-1160.145.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538000" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38000</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38000" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38000" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38000" ref_url="https://www.suse.com/security/cve/CVE-2025-38000" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:14748" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02254-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02307-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02308-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-July/021812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02333-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02334-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02335-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02538-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03097-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041543.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03100-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03104-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03106-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03108-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041547.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03109-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03111-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041544.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03123-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041558.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03124-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03126-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041561.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03129-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03130-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03133-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041601.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03138-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03143-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03148-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03153-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03154-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03156-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041644.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03160-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03175-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03179-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041665.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03180-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03181-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03182-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041669.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03186-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041668.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03191-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041676.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03207-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03208-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03210-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03212-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03213-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03215-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03217-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03222-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03223-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03226-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03235-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20475-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040847.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20493-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20498-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20698-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20699-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20700-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20701-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20702-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20703-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20704-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20705-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20706-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20707-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20709-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20710-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20711-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20712-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20714-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20762-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20763-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20764-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20766-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041889.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20767-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20775-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20776-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20777-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20778-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041873.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20779-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20780-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20782-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20329-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024166.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sch_hfsc: Fix qlen accounting bug when using peek in hfsc_enqueue()

When enqueuing the first packet to an HFSC class, hfsc_enqueue() calls the
child qdisc's peek() operation before incrementing sch-&gt;q.qlen and
sch-&gt;qstats.backlog. If the child qdisc uses qdisc_peek_dequeued(), this may
trigger an immediate dequeue and potential packet drop. In such cases,
qdisc_tree_reduce_backlog() is called, but the HFSC qdisc's qlen and backlog
have not yet been updated, leading to inconsistent queue accounting. This
can leave an empty HFSC class in the active list, causing further
consequences like use-after-free.

This patch fixes the bug by moving the increment of sch-&gt;q.qlen and
sch-&gt;qstats.backlog before the call to the child qdisc's peek() operation.
This ensures that queue length and backlog are always accurate when packet
drops or dequeues are triggered during the peek.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-09-05"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38000/">CVE-2025-38000 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38000">CVE-2025-38000 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244277">SUSE bug 1244277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245775">SUSE bug 1245775</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010016960" comment="bpftool-3.10.0-1160.137.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016961" comment="kernel-3.10.0-1160.137.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016962" comment="kernel-abi-whitelists-3.10.0-1160.137.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016963" comment="kernel-debug-3.10.0-1160.137.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016966" comment="kernel-doc-3.10.0-1160.137.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016967" comment="kernel-headers-3.10.0-1160.137.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016968" comment="kernel-tools-3.10.0-1160.137.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016969" comment="kernel-tools-libs-3.10.0-1160.137.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016971" comment="perf-3.10.0-1160.137.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016972" comment="python-perf-3.10.0-1160.137.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538079" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38079</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38079" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38079" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38079" ref_url="https://www.suse.com/security/cve/CVE-2025-38079" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:12752" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001879.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:13602" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001911.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:14987" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02254-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02307-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02333-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02335-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02538-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02588-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02820-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041241.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02821-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02827-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02830-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02832-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02833-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02834-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02844-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02844-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02846-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02848-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02849-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02850-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02851-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02852-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02854-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02857-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02858-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02859-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02860-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02875-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02876-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02878-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02883-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02897-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02908-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02909-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02911-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02917-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02918-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02926-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02930-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02932-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02933-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02934-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02936-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02937-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02942-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02945-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02955-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041328.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20475-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040847.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20493-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20498-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20634-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20635-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20636-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20638-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20676-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20677-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20678-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20680-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20681-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20682-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20684-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20685-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20686-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20687-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041613.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20688-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20689-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20329-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024166.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: algif_hash - fix double free in hash_accept

If accept(2) is called on socket type algif_hash with
MSG_MORE flag set and crypto_ahash_import fails,
sk2 is freed. However, it is also freed in af_alg_release,
leading to slab-use-after-free error.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-09-06"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38079/">CVE-2025-38079 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38079">CVE-2025-38079 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245217">SUSE bug 1245217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245218">SUSE bug 1245218</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010017107" comment="bpftool-3.10.0-1160.138.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017108" comment="kernel-3.10.0-1160.138.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017109" comment="kernel-abi-whitelists-3.10.0-1160.138.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017110" comment="kernel-debug-3.10.0-1160.138.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017113" comment="kernel-doc-3.10.0-1160.138.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017114" comment="kernel-headers-3.10.0-1160.138.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017115" comment="kernel-tools-3.10.0-1160.138.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017116" comment="kernel-tools-libs-3.10.0-1160.138.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017118" comment="perf-3.10.0-1160.138.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017119" comment="python-perf-3.10.0-1160.138.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538177" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38177</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38177" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38177" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38177" ref_url="https://www.suse.com/security/cve/CVE-2025-38177" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:14748" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02846-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02848-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02849-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02850-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02851-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02852-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03317-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03329-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03336-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03337-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03341-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03342-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03343-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03344-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022635.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03370-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041847.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03374-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03375-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03387-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03391-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03393-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03395-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03397-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03400-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03406-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03410-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03414-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03418-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20722-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20723-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20724-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20726-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20727-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20728-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20729-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20730-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20733-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20734-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20737-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20738-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20768-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20769-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20770-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20771-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20774-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20784-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20785-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20786-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20787-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20788-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20789-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024506.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sch_hfsc: make hfsc_qlen_notify() idempotent

hfsc_qlen_notify() is not idempotent either and not friendly
to its callers, like fq_codel_dequeue(). Let's make it idempotent
to ease qdisc_tree_reduce_backlog() callers' life:

1. update_vf() decreases cl-&gt;cl_nactive, so we can check whether it is
non-zero before calling it.

2. eltree_remove() always removes RB node cl-&gt;el_node, but we can use
   RB_EMPTY_NODE() + RB_CLEAR_NODE() to make it safe.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-09-05"/>
	<updated date="2026-03-06"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38177/">CVE-2025-38177 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38177">CVE-2025-38177 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237312">SUSE bug 1237312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245986">SUSE bug 1245986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246356">SUSE bug 1246356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247374">SUSE bug 1247374</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010016960" comment="bpftool-3.10.0-1160.137.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016961" comment="kernel-3.10.0-1160.137.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016962" comment="kernel-abi-whitelists-3.10.0-1160.137.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016963" comment="kernel-debug-3.10.0-1160.137.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016966" comment="kernel-doc-3.10.0-1160.137.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016967" comment="kernel-headers-3.10.0-1160.137.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016968" comment="kernel-tools-3.10.0-1160.137.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016969" comment="kernel-tools-libs-3.10.0-1160.137.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016971" comment="perf-3.10.0-1160.137.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016972" comment="python-perf-3.10.0-1160.137.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538200" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38200</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38200" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38200" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38200" ref_url="https://www.suse.com/security/cve/CVE-2025-38200" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:14438" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001933.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:15011" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001976.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:17161" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02588-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02844-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02844-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02846-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02848-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02849-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02850-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02851-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02852-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

i40e: fix MMIO write access to an invalid page in i40e_clear_hw

When the device sends a specific input, an integer underflow can occur, leading
to MMIO write access to an invalid page.

Prevent the integer underflow by changing the type of related variables.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-10-21"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38200/">CVE-2025-38200 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38200">CVE-2025-38200 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246045">SUSE bug 1246045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246046">SUSE bug 1246046</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010022317" comment="bpftool-3.10.0-1160.141.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022318" comment="kernel-3.10.0-1160.141.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022319" comment="kernel-abi-whitelists-3.10.0-1160.141.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022320" comment="kernel-debug-3.10.0-1160.141.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022323" comment="kernel-doc-3.10.0-1160.141.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022324" comment="kernel-headers-3.10.0-1160.141.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022325" comment="kernel-tools-3.10.0-1160.141.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022326" comment="kernel-tools-libs-3.10.0-1160.141.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022328" comment="perf-3.10.0-1160.141.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022329" comment="python-perf-3.10.0-1160.141.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538332" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38332</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38332" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38332" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38332" ref_url="https://www.suse.com/security/cve/CVE-2025-38332" source="SUSE CVE"/>
		<reference ref_id="ESSA-2025:3453" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002049.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:15008" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001974.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:15648" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001998.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:15661" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: lpfc: Use memcpy() for BIOS version

The strlcat() with FORTIFY support is triggering a panic because it
thinks the target buffer will overflow although the correct target
buffer size is passed in.

Anyway, instead of memset() with 0 followed by a strlcat(), just use
memcpy() and ensure that the resulting buffer is NULL terminated.

BIOSVersion is only used for the lpfc_printf_log() which expects a
properly terminated string.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-09-13"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38332/">CVE-2025-38332 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38332">CVE-2025-38332 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246375">SUSE bug 1246375</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010017846" comment="bpftool-3.10.0-1160.139.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017847" comment="kernel-3.10.0-1160.139.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017848" comment="kernel-abi-whitelists-3.10.0-1160.139.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017849" comment="kernel-debug-3.10.0-1160.139.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017852" comment="kernel-doc-3.10.0-1160.139.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017853" comment="kernel-headers-3.10.0-1160.139.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017854" comment="kernel-tools-3.10.0-1160.139.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017855" comment="kernel-tools-libs-3.10.0-1160.139.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017857" comment="perf-3.10.0-1160.139.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017858" comment="python-perf-3.10.0-1160.139.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538350" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38350</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38350" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38350" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38350" ref_url="https://www.suse.com/security/cve/CVE-2025-38350" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:14748" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001967.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:15011" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001976.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:15785" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02846-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02849-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02851-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02852-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03310-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03344-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/sched: Always pass notifications when child class becomes empty

Certain classful qdiscs may invoke their classes' dequeue handler on an
enqueue operation. This may unexpectedly empty the child qdisc and thus
make an in-flight class passive via qlen_notify(). Most qdiscs do not
expect such behaviour at this point in time and may re-activate the
class eventually anyways which will lead to a use-after-free.

The referenced fix commit attempted to fix this behavior for the HFSC
case by moving the backlog accounting around, though this turned out to
be incomplete since the parent's parent may run into the issue too.
The following reproducer demonstrates this use-after-free:

    tc qdisc add dev lo root handle 1: drr
    tc filter add dev lo parent 1: basic classid 1:1
    tc class add dev lo parent 1: classid 1:1 drr
    tc qdisc add dev lo parent 1:1 handle 2: hfsc def 1
    tc class add dev lo parent 2: classid 2:1 hfsc rt m1 8 d 1 m2 0
    tc qdisc add dev lo parent 2:1 handle 3: netem
    tc qdisc add dev lo parent 3:1 handle 4: blackhole

    echo 1 | socat -u STDIN UDP4-DATAGRAM:127.0.0.1:8888
    tc class delete dev lo classid 1:1
    echo 1 | socat -u STDIN UDP4-DATAGRAM:127.0.0.1:8888

Since backlog accounting issues leading to a use-after-frees on stale
class pointers is a recurring pattern at this point, this patch takes
a different approach. Instead of trying to fix the accounting, the patch
ensures that qdisc_tree_reduce_backlog always calls qlen_notify when
the child qdisc is empty. This solves the problem because deletion of
qdiscs always involves a call to qdisc_reset() and / or
qdisc_purge_queue() which ultimately resets its qlen to 0 thus causing
the following qdisc_tree_reduce_backlog() to report to the parent. Note
that this may call qlen_notify on passive classes multiple times. This
is not a problem after the recent patch series that made all the
classful qdiscs qlen_notify() handlers idempotent.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-09-05"/>
	<updated date="2026-03-06"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H" cvss4="7/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38350/">CVE-2025-38350 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38350">CVE-2025-38350 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246781">SUSE bug 1246781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247043">SUSE bug 1247043</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010016960" comment="bpftool-3.10.0-1160.137.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016961" comment="kernel-3.10.0-1160.137.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016962" comment="kernel-abi-whitelists-3.10.0-1160.137.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016963" comment="kernel-debug-3.10.0-1160.137.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016966" comment="kernel-doc-3.10.0-1160.137.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016967" comment="kernel-headers-3.10.0-1160.137.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016968" comment="kernel-tools-3.10.0-1160.137.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016969" comment="kernel-tools-libs-3.10.0-1160.137.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016971" comment="perf-3.10.0-1160.137.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016972" comment="python-perf-3.10.0-1160.137.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538352" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38352</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38352" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38352" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38352" ref_url="https://www.suse.com/security/cve/CVE-2025-38352" source="SUSE CVE"/>
		<reference ref_id="ESSA-2025:3453" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002049.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:15471" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001992.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:15648" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001998.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:15661" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03283-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03310-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03314-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03344-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024250.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0539-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20455-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20456-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20457-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20458-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20459-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20460-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20461-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20462-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20463-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20464-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20465-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20470-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20635-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024655.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del()

If an exiting non-autoreaping task has already passed exit_notify() and
calls handle_posix_cpu_timers() from IRQ, it can be reaped by its parent
or debugger right after unlock_task_sighand().

If a concurrent posix_cpu_timer_del() runs at that moment, it won't be
able to detect timer-&gt;it.cpu.firing != 0: cpu_timer_task_rcu() and/or
lock_task_sighand() will fail.

Add the tsk-&gt;exit_state check into run_posix_cpu_timers() to fix this.

This fix is not needed if CONFIG_POSIX_CPU_TIMERS_TASK_WORK=y, because
exit_task_work() is called before exit_notify(). But the check still
makes sense, task_work_add(&amp;tsk-&gt;posix_cputimers_work.work) will fail
anyway in this case.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-09-13"/>
	<updated date="2026-03-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38352/">CVE-2025-38352 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-38352">CVE-2025-38352 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246911">SUSE bug 1246911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249205">SUSE bug 1249205</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010017846" comment="bpftool-3.10.0-1160.139.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017847" comment="kernel-3.10.0-1160.139.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017848" comment="kernel-abi-whitelists-3.10.0-1160.139.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017849" comment="kernel-debug-3.10.0-1160.139.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017852" comment="kernel-doc-3.10.0-1160.139.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017853" comment="kernel-headers-3.10.0-1160.139.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017854" comment="kernel-tools-3.10.0-1160.139.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017855" comment="kernel-tools-libs-3.10.0-1160.139.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017857" comment="perf-3.10.0-1160.139.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017858" comment="python-perf-3.10.0-1160.139.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538415" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38415</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38415" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38415" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38415" ref_url="https://www.suse.com/security/cve/CVE-2025-38415" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1662" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002457.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2212" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003185.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3088" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002621.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3685" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02846-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Squashfs: check return result of sb_min_blocksize

Syzkaller reports an "UBSAN: shift-out-of-bounds in squashfs_bio_read" bug.

Syzkaller forks multiple processes which after mounting the Squashfs
filesystem, issues an ioctl("/dev/loop0", LOOP_SET_BLOCK_SIZE, 0x8000). 
Now if this ioctl occurs at the same time another process is in the
process of mounting a Squashfs filesystem on /dev/loop0, the failure
occurs.  When this happens the following code in squashfs_fill_super()
fails.

----
msblk-&gt;devblksize = sb_min_blocksize(sb, SQUASHFS_DEVBLK_SIZE);
msblk-&gt;devblksize_log2 = ffz(~msblk-&gt;devblksize);
----

sb_min_blocksize() returns 0, which means msblk-&gt;devblksize is set to 0.

As a result, ffz(~msblk-&gt;devblksize) returns 64, and msblk-&gt;devblksize_log2
is set to 64.

This subsequently causes the

UBSAN: shift-out-of-bounds in fs/squashfs/block.c:195:36
shift exponent 64 is too large for 64-bit type 'u64' (aka
'unsigned long long')

This commit adds a check for a 0 return by sb_min_blocksize().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-27"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38415/">CVE-2025-38415 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38415">CVE-2025-38415 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247147">SUSE bug 1247147</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010050974" comment="bpftool-3.10.0-1160.147.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050975" comment="kernel-3.10.0-1160.147.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050976" comment="kernel-abi-whitelists-3.10.0-1160.147.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050977" comment="kernel-debug-3.10.0-1160.147.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050978" comment="kernel-doc-3.10.0-1160.147.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050979" comment="kernel-headers-3.10.0-1160.147.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050980" comment="kernel-tools-3.10.0-1160.147.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050981" comment="kernel-tools-libs-3.10.0-1160.147.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050982" comment="perf-3.10.0-1160.147.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050983" comment="python-perf-3.10.0-1160.147.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538459" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38459</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38459" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38459" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38459" ref_url="https://www.suse.com/security/cve/CVE-2025-38459" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1662" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002457.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2212" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003185.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3685" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

atm: clip: Fix infinite recursive call of clip_push().

syzbot reported the splat below. [0]

This happens if we call ioctl(ATMARP_MKIP) more than once.

During the first call, clip_mkip() sets clip_push() to vcc-&gt;push(),
and the second call copies it to clip_vcc-&gt;old_push().

Later, when the socket is close()d, vcc_destroy_socket() passes
NULL skb to clip_push(), which calls clip_vcc-&gt;old_push(),
triggering the infinite recursion.

Let's prevent the second ioctl(ATMARP_MKIP) by checking
vcc-&gt;user_back, which is allocated by the first call as clip_vcc.

Note also that we use lock_sock() to prevent racy calls.

[0]:
BUG: TASK stack guard page was hit at ffffc9000d66fff8 (stack is ffffc9000d670000..ffffc9000d678000)
Oops: stack guard page: 0000 [#1] SMP KASAN NOPTI
CPU: 0 UID: 0 PID: 5322 Comm: syz.0.0 Not tainted 6.16.0-rc4-syzkaller #0 PREEMPT(full)
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014
RIP: 0010:clip_push+0x5/0x720 net/atm/clip.c:191
Code: e0 8f aa 8c e8 1c ad 5b fa eb ae 66 2e 0f 1f 84 00 00 00 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 55 &lt;41&gt; 57 41 56 41 55 41 54 53 48 83 ec 20 48 89 f3 49 89 fd 48 bd 00
RSP: 0018:ffffc9000d670000 EFLAGS: 00010246
RAX: 1ffff1100235a4a5 RBX: ffff888011ad2508 RCX: ffff8880003c0000
RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff888037f01000
RBP: dffffc0000000000 R08: ffffffff8fa104f7 R09: 1ffffffff1f4209e
R10: dffffc0000000000 R11: ffffffff8a99b300 R12: ffffffff8a99b300
R13: ffff888037f01000 R14: ffff888011ad2500 R15: ffff888037f01578
FS:  000055557ab6d500(0000) GS:ffff88808d250000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffc9000d66fff8 CR3: 0000000043172000 CR4: 0000000000352ef0
Call Trace:
 &lt;TASK&gt;
 clip_push+0x6dc/0x720 net/atm/clip.c:200
 clip_push+0x6dc/0x720 net/atm/clip.c:200
 clip_push+0x6dc/0x720 net/atm/clip.c:200
...
 clip_push+0x6dc/0x720 net/atm/clip.c:200
 clip_push+0x6dc/0x720 net/atm/clip.c:200
 clip_push+0x6dc/0x720 net/atm/clip.c:200
 vcc_destroy_socket net/atm/common.c:183 [inline]
 vcc_release+0x157/0x460 net/atm/common.c:205
 __sock_release net/socket.c:647 [inline]
 sock_close+0xc0/0x240 net/socket.c:1391
 __fput+0x449/0xa70 fs/file_table.c:465
 task_work_run+0x1d1/0x260 kernel/task_work.c:227
 resume_user_mode_work include/linux/resume_user_mode.h:50 [inline]
 exit_to_user_mode_loop+0xec/0x110 kernel/entry/common.c:114
 exit_to_user_mode_prepare include/linux/entry-common.h:330 [inline]
 syscall_exit_to_user_mode_work include/linux/entry-common.h:414 [inline]
 syscall_exit_to_user_mode include/linux/entry-common.h:449 [inline]
 do_syscall_64+0x2bd/0x3b0 arch/x86/entry/syscall_64.c:100
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7ff31c98e929
Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007fffb5aa1f78 EFLAGS: 00000246 ORIG_RAX: 00000000000001b4
RAX: 0000000000000000 RBX: 0000000000012747 RCX: 00007ff31c98e929
RDX: 0000000000000000 RSI: 000000000000001e RDI: 0000000000000003
RBP: 00007ff31cbb7ba0 R08: 0000000000000001 R09: 0000000db5aa226f
R10: 00007ff31c7ff030 R11: 0000000000000246 R12: 00007ff31cbb608c
R13: 00007ff31cbb6080 R14: ffffffffffffffff R15: 00007fffb5aa2090
 &lt;/TASK&gt;
Modules linked in:
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-27"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38459/">CVE-2025-38459 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38459">CVE-2025-38459 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247119">SUSE bug 1247119</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010050974" comment="bpftool-3.10.0-1160.147.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050975" comment="kernel-3.10.0-1160.147.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050976" comment="kernel-abi-whitelists-3.10.0-1160.147.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050977" comment="kernel-debug-3.10.0-1160.147.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050978" comment="kernel-doc-3.10.0-1160.147.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050979" comment="kernel-headers-3.10.0-1160.147.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050980" comment="kernel-tools-3.10.0-1160.147.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050981" comment="kernel-tools-libs-3.10.0-1160.147.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050982" comment="perf-3.10.0-1160.147.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050983" comment="python-perf-3.10.0-1160.147.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538477" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38477</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38477" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38477" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38477" ref_url="https://www.suse.com/security/cve/CVE-2025-38477" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:15008" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001974.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:17161" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02846-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02849-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02851-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02852-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03310-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03344-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03465-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03468-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03469-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03470-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03472-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03475-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03476-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03479-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03482-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03485-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03494-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03495-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03496-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03497-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03498-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03503-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03504-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03514-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03515-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03528-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03529-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03538-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03539-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03541-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042108.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03543-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03548-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03550-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03552-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03554-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03557-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03561-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03562-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03563-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03566-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03567-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03568-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03569-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03572-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03575-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03576-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03577-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03578-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03580-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03583-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20806-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20807-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20808-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20810-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20811-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20812-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20813-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20814-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20815-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20816-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20817-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20818-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20819-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20820-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20826-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20827-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20828-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20829-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20830-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20831-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20832-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20833-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20834-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20835-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20836-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20837-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20838-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20839-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20840-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20841-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20842-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/sched: sch_qfq: Fix race condition on qfq_aggregate

A race condition can occur when 'agg' is modified in qfq_change_agg
(called during qfq_enqueue) while other threads access it
concurrently. For example, qfq_dump_class may trigger a NULL
dereference, and qfq_delete_class may cause a use-after-free.

This patch addresses the issue by:

1. Moved qfq_destroy_class into the critical section.

2. Added sch_tree_lock protection to qfq_dump_class and
qfq_dump_class_stats.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-10-21"/>
	<updated date="2026-03-06"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38477/">CVE-2025-38477 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38477">CVE-2025-38477 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247314">SUSE bug 1247314</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247315">SUSE bug 1247315</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010022317" comment="bpftool-3.10.0-1160.141.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022318" comment="kernel-3.10.0-1160.141.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022319" comment="kernel-abi-whitelists-3.10.0-1160.141.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022320" comment="kernel-debug-3.10.0-1160.141.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022323" comment="kernel-doc-3.10.0-1160.141.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022324" comment="kernel-headers-3.10.0-1160.141.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022325" comment="kernel-tools-3.10.0-1160.141.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022326" comment="kernel-tools-libs-3.10.0-1160.141.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022328" comment="perf-3.10.0-1160.141.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022329" comment="python-perf-3.10.0-1160.141.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538556" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38556</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38556" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38556" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38556" ref_url="https://www.suse.com/security/cve/CVE-2025-38556" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:16372" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002043.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:17760" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002101.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21063" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

HID: core: Harden s32ton() against conversion to 0 bits

Testing by the syzbot fuzzer showed that the HID core gets a
shift-out-of-bounds exception when it tries to convert a 32-bit
quantity to a 0-bit quantity.  Ideally this should never occur, but
there are buggy devices and some might have a report field with size
set to zero; we shouldn't reject the report or the device just because
of that.

Instead, harden the s32ton() routine so that it returns a reasonable
result instead of crashing when it is called with the number of bits
set to 0 -- the same as what snto32() does.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-05"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38556/">CVE-2025-38556 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38556">CVE-2025-38556 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248296">SUSE bug 1248296</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010032439" comment="bpftool-3.10.0-1160.142.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032440" comment="kernel-3.10.0-1160.142.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032441" comment="kernel-abi-whitelists-3.10.0-1160.142.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032442" comment="kernel-debug-3.10.0-1160.142.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032445" comment="kernel-doc-3.10.0-1160.142.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032446" comment="kernel-headers-3.10.0-1160.142.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032447" comment="kernel-tools-3.10.0-1160.142.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032448" comment="kernel-tools-libs-3.10.0-1160.142.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032450" comment="perf-3.10.0-1160.142.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032451" comment="python-perf-3.10.0-1160.142.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538718" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38718</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38718" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38718" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38718" ref_url="https://www.suse.com/security/cve/CVE-2025-38718" source="SUSE CVE"/>
		<reference ref_id="ESSA-2026:0024" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002461.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16880" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002048.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16919" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002052.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22910" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sctp: linearize cloned gso packets in sctp_rcv

A cloned head skb still shares these frag skbs in fraglist with the
original head skb. It's not safe to access these frag skbs.

syzbot reported two use-of-uninitialized-memory bugs caused by this:

  BUG: KMSAN: uninit-value in sctp_inq_pop+0x15b7/0x1920 net/sctp/inqueue.c:211
   sctp_inq_pop+0x15b7/0x1920 net/sctp/inqueue.c:211
   sctp_assoc_bh_rcv+0x1a7/0xc50 net/sctp/associola.c:998
   sctp_inq_push+0x2ef/0x380 net/sctp/inqueue.c:88
   sctp_backlog_rcv+0x397/0xdb0 net/sctp/input.c:331
   sk_backlog_rcv+0x13b/0x420 include/net/sock.h:1122
   __release_sock+0x1da/0x330 net/core/sock.c:3106
   release_sock+0x6b/0x250 net/core/sock.c:3660
   sctp_wait_for_connect+0x487/0x820 net/sctp/socket.c:9360
   sctp_sendmsg_to_asoc+0x1ec1/0x1f00 net/sctp/socket.c:1885
   sctp_sendmsg+0x32b9/0x4a80 net/sctp/socket.c:2031
   inet_sendmsg+0x25a/0x280 net/ipv4/af_inet.c:851
   sock_sendmsg_nosec net/socket.c:718 [inline]

and

  BUG: KMSAN: uninit-value in sctp_assoc_bh_rcv+0x34e/0xbc0 net/sctp/associola.c:987
   sctp_assoc_bh_rcv+0x34e/0xbc0 net/sctp/associola.c:987
   sctp_inq_push+0x2a3/0x350 net/sctp/inqueue.c:88
   sctp_backlog_rcv+0x3c7/0xda0 net/sctp/input.c:331
   sk_backlog_rcv+0x142/0x420 include/net/sock.h:1148
   __release_sock+0x1d3/0x330 net/core/sock.c:3213
   release_sock+0x6b/0x270 net/core/sock.c:3767
   sctp_wait_for_connect+0x458/0x820 net/sctp/socket.c:9367
   sctp_sendmsg_to_asoc+0x223a/0x2260 net/sctp/socket.c:1886
   sctp_sendmsg+0x3910/0x49f0 net/sctp/socket.c:2032
   inet_sendmsg+0x269/0x2a0 net/ipv4/af_inet.c:851
   sock_sendmsg_nosec net/socket.c:712 [inline]

This patch fixes it by linearizing cloned gso packets in sctp_rcv().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-13"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38718/">CVE-2025-38718 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38718">CVE-2025-38718 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249161">SUSE bug 1249161</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010037040" comment="bpftool-3.10.0-1160.143.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037041" comment="kernel-3.10.0-1160.143.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037042" comment="kernel-abi-whitelists-3.10.0-1160.143.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037043" comment="kernel-debug-3.10.0-1160.143.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037046" comment="kernel-doc-3.10.0-1160.143.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037047" comment="kernel-headers-3.10.0-1160.143.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037048" comment="kernel-tools-3.10.0-1160.143.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037049" comment="kernel-tools-libs-3.10.0-1160.143.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037051" comment="perf-3.10.0-1160.143.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037052" comment="python-perf-3.10.0-1160.143.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538729" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38729</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38729" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38729" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38729" ref_url="https://www.suse.com/security/cve/CVE-2025-38729" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:23947" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: usb-audio: Validate UAC3 power domain descriptors, too

UAC3 power domain descriptors need to be verified with its variable
bLength for avoiding the unexpected OOB accesses by malicious
firmware, too.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-15"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38729/">CVE-2025-38729 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38729">CVE-2025-38729 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249164">SUSE bug 1249164</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010037313" comment="bpftool-3.10.0-1160.144.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037314" comment="kernel-3.10.0-1160.144.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037315" comment="kernel-abi-whitelists-3.10.0-1160.144.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037316" comment="kernel-debug-3.10.0-1160.144.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037319" comment="kernel-doc-3.10.0-1160.144.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037320" comment="kernel-headers-3.10.0-1160.144.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037321" comment="kernel-tools-3.10.0-1160.144.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037322" comment="kernel-tools-libs-3.10.0-1160.144.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037324" comment="perf-3.10.0-1160.144.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037325" comment="python-perf-3.10.0-1160.144.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539751" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39751</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39751" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39751" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39751" ref_url="https://www.suse.com/security/cve/CVE-2025-39751" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:18297" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002123.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19105" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002134.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21063" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03626-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-05"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39751/">CVE-2025-39751 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39751">CVE-2025-39751 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249538">SUSE bug 1249538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249539">SUSE bug 1249539</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010032439" comment="bpftool-3.10.0-1160.142.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032440" comment="kernel-3.10.0-1160.142.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032441" comment="kernel-abi-whitelists-3.10.0-1160.142.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032442" comment="kernel-debug-3.10.0-1160.142.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032445" comment="kernel-doc-3.10.0-1160.142.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032446" comment="kernel-headers-3.10.0-1160.142.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032447" comment="kernel-tools-3.10.0-1160.142.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032448" comment="kernel-tools-libs-3.10.0-1160.142.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032450" comment="perf-3.10.0-1160.142.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010032451" comment="python-perf-3.10.0-1160.142.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539757" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39757</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39757" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39757" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39757" ref_url="https://www.suse.com/security/cve/CVE-2025-39757" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:17760" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002101.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:18297" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002123.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23947" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: usb-audio: Validate UAC3 cluster segment descriptors

UAC3 class segment descriptors need to be verified whether their sizes
match with the declared lengths and whether they fit with the
allocated buffer sizes, too.  Otherwise malicious firmware may lead to
the unexpected OOB accesses.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-15"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39757/">CVE-2025-39757 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39757">CVE-2025-39757 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249515">SUSE bug 1249515</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010037313" comment="bpftool-3.10.0-1160.144.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037314" comment="kernel-3.10.0-1160.144.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037315" comment="kernel-abi-whitelists-3.10.0-1160.144.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037316" comment="kernel-debug-3.10.0-1160.144.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037319" comment="kernel-doc-3.10.0-1160.144.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037320" comment="kernel-headers-3.10.0-1160.144.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037321" comment="kernel-tools-3.10.0-1160.144.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037322" comment="kernel-tools-libs-3.10.0-1160.144.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037324" comment="perf-3.10.0-1160.144.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037325" comment="python-perf-3.10.0-1160.144.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539760" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39760</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39760" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39760" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39760" ref_url="https://www.suse.com/security/cve/CVE-2025-39760" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1662" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002457.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2212" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003185.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2759" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002619.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3685" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: core: config: Prevent OOB read in SS endpoint companion parsing

usb_parse_ss_endpoint_companion() checks descriptor type before length,
enabling a potentially odd read outside of the buffer size.

Fix this up by checking the size first before looking at any of the
fields in the descriptor.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-27"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39760/">CVE-2025-39760 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39760">CVE-2025-39760 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249598">SUSE bug 1249598</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010050974" comment="bpftool-3.10.0-1160.147.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050975" comment="kernel-3.10.0-1160.147.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050976" comment="kernel-abi-whitelists-3.10.0-1160.147.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050977" comment="kernel-debug-3.10.0-1160.147.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050978" comment="kernel-doc-3.10.0-1160.147.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050979" comment="kernel-headers-3.10.0-1160.147.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050980" comment="kernel-tools-3.10.0-1160.147.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050981" comment="kernel-tools-libs-3.10.0-1160.147.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050982" comment="perf-3.10.0-1160.147.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050983" comment="python-perf-3.10.0-1160.147.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39817</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39817" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39817" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39817" ref_url="https://www.suse.com/security/cve/CVE-2025-39817" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:18281" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002120.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19102" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002136.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3685" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

efivarfs: Fix slab-out-of-bounds in efivarfs_d_compare

Observed on kernel 6.6 (present on master as well):

  BUG: KASAN: slab-out-of-bounds in memcmp+0x98/0xd0
  Call trace:
   kasan_check_range+0xe8/0x190
   __asan_loadN+0x1c/0x28
   memcmp+0x98/0xd0
   efivarfs_d_compare+0x68/0xd8
   __d_lookup_rcu_op_compare+0x178/0x218
   __d_lookup_rcu+0x1f8/0x228
   d_alloc_parallel+0x150/0x648
   lookup_open.isra.0+0x5f0/0x8d0
   open_last_lookups+0x264/0x828
   path_openat+0x130/0x3f8
   do_filp_open+0x114/0x248
   do_sys_openat2+0x340/0x3c0
   __arm64_sys_openat+0x120/0x1a0

If dentry-&gt;d_name.len &lt; EFI_VARIABLE_GUID_LEN , 'guid' can become
negative, leadings to oob. The issue can be triggered by parallel
lookups using invalid filename:

  T1			T2
  lookup_open
   -&gt;lookup
    simple_lookup
     d_add
     // invalid dentry is added to hash list

			lookup_open
			 d_alloc_parallel
			  __d_lookup_rcu
			   __d_lookup_rcu_op_compare
			    hlist_bl_for_each_entry_rcu
			    // invalid dentry can be retrieved
			     -&gt;d_compare
			      efivarfs_d_compare
			      // oob

Fix it by checking 'guid' before cmp.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-27"/>
	<updated date="2026-03-27"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39817/">CVE-2025-39817 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39817">CVE-2025-39817 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249998">SUSE bug 1249998</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010050974" comment="bpftool-3.10.0-1160.147.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050975" comment="kernel-3.10.0-1160.147.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050976" comment="kernel-abi-whitelists-3.10.0-1160.147.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050977" comment="kernel-debug-3.10.0-1160.147.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050978" comment="kernel-doc-3.10.0-1160.147.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050979" comment="kernel-headers-3.10.0-1160.147.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050980" comment="kernel-tools-3.10.0-1160.147.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050981" comment="kernel-tools-libs-3.10.0-1160.147.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050982" comment="perf-3.10.0-1160.147.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050983" comment="python-perf-3.10.0-1160.147.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539898" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39898</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39898" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39898" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39898" ref_url="https://www.suse.com/security/cve/CVE-2025-39898" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:21933" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002295.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22388" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002268.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22405" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003120.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1581" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-10"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39898/">CVE-2025-39898 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39898">CVE-2025-39898 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247374">SUSE bug 1247374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250742">SUSE bug 1250742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250744">SUSE bug 1250744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253291">SUSE bug 1253291</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010042403" comment="bpftool-3.10.0-1160.146.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042404" comment="kernel-3.10.0-1160.146.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042405" comment="kernel-abi-whitelists-3.10.0-1160.146.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042406" comment="kernel-debug-3.10.0-1160.146.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042409" comment="kernel-doc-3.10.0-1160.146.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042410" comment="kernel-headers-3.10.0-1160.146.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042411" comment="kernel-tools-3.10.0-1160.146.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042412" comment="kernel-tools-libs-3.10.0-1160.146.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042414" comment="perf-3.10.0-1160.146.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042415" comment="python-perf-3.10.0-1160.146.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539955" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39955</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39955" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39955" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39955" ref_url="https://www.suse.com/security/cve/CVE-2025-39955" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:22388" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002268.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22405" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003120.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23947" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tcp: Clear tcp_sk(sk)-&gt;fastopen_rsk in tcp_disconnect().

syzbot reported the splat below where a socket had tcp_sk(sk)-&gt;fastopen_rsk
in the TCP_ESTABLISHED state. [0]

syzbot reused the server-side TCP Fast Open socket as a new client before
the TFO socket completes 3WHS:

  1. accept()
  2. connect(AF_UNSPEC)
  3. connect() to another destination

As of accept(), sk-&gt;sk_state is TCP_SYN_RECV, and tcp_disconnect() changes
it to TCP_CLOSE and makes connect() possible, which restarts timers.

Since tcp_disconnect() forgot to clear tcp_sk(sk)-&gt;fastopen_rsk, the
retransmit timer triggered the warning and the intended packet was not
retransmitted.

Let's call reqsk_fastopen_remove() in tcp_disconnect().

[0]:
WARNING: CPU: 2 PID: 0 at net/ipv4/tcp_timer.c:542 tcp_retransmit_timer (net/ipv4/tcp_timer.c:542 (discriminator 7))
Modules linked in:
CPU: 2 UID: 0 PID: 0 Comm: swapper/2 Not tainted 6.17.0-rc5-g201825fb4278 #62 PREEMPT(voluntary)
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
RIP: 0010:tcp_retransmit_timer (net/ipv4/tcp_timer.c:542 (discriminator 7))
Code: 41 55 41 54 55 53 48 8b af b8 08 00 00 48 89 fb 48 85 ed 0f 84 55 01 00 00 0f b6 47 12 3c 03 74 0c 0f b6 47 12 3c 04 74 04 90 &lt;0f&gt; 0b 90 48 8b 85 c0 00 00 00 48 89 ef 48 8b 40 30 e8 6a 4f 06 3e
RSP: 0018:ffffc900002f8d40 EFLAGS: 00010293
RAX: 0000000000000002 RBX: ffff888106911400 RCX: 0000000000000017
RDX: 0000000002517619 RSI: ffffffff83764080 RDI: ffff888106911400
RBP: ffff888106d5c000 R08: 0000000000000001 R09: ffffc900002f8de8
R10: 00000000000000c2 R11: ffffc900002f8ff8 R12: ffff888106911540
R13: ffff888106911480 R14: ffff888106911840 R15: ffffc900002f8de0
FS:  0000000000000000(0000) GS:ffff88907b768000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f8044d69d90 CR3: 0000000002c30003 CR4: 0000000000370ef0
Call Trace:
 &lt;IRQ&gt;
 tcp_write_timer (net/ipv4/tcp_timer.c:738)
 call_timer_fn (kernel/time/timer.c:1747)
 __run_timers (kernel/time/timer.c:1799 kernel/time/timer.c:2372)
 timer_expire_remote (kernel/time/timer.c:2385 kernel/time/timer.c:2376 kernel/time/timer.c:2135)
 tmigr_handle_remote_up (kernel/time/timer_migration.c:944 kernel/time/timer_migration.c:1035)
 __walk_groups.isra.0 (kernel/time/timer_migration.c:533 (discriminator 1))
 tmigr_handle_remote (kernel/time/timer_migration.c:1096)
 handle_softirqs (./arch/x86/include/asm/jump_label.h:36 ./include/trace/events/irq.h:142 kernel/softirq.c:580)
 irq_exit_rcu (kernel/softirq.c:614 kernel/softirq.c:453 kernel/softirq.c:680 kernel/softirq.c:696)
 sysvec_apic_timer_interrupt (arch/x86/kernel/apic/apic.c:1050 (discriminator 35) arch/x86/kernel/apic/apic.c:1050 (discriminator 35))
 &lt;/IRQ&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-15"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39955/">CVE-2025-39955 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39955">CVE-2025-39955 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251804">SUSE bug 1251804</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010037313" comment="bpftool-3.10.0-1160.144.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037314" comment="kernel-3.10.0-1160.144.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037315" comment="kernel-abi-whitelists-3.10.0-1160.144.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037316" comment="kernel-debug-3.10.0-1160.144.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037319" comment="kernel-doc-3.10.0-1160.144.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037320" comment="kernel-headers-3.10.0-1160.144.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037321" comment="kernel-tools-3.10.0-1160.144.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037322" comment="kernel-tools-libs-3.10.0-1160.144.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037324" comment="perf-3.10.0-1160.144.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010037325" comment="python-perf-3.10.0-1160.144.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539971" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39971</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39971" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39971" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39971" ref_url="https://www.suse.com/security/cve/CVE-2025-39971" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:21469" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003115.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21917" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002256.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21933" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002295.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1581" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

i40e: fix idx validation in config queues msg

Ensure idx is within range of active/initialized TCs when iterating over
vf-&gt;ch[idx] in i40e_vc_config_queues_msg().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-10"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39971/">CVE-2025-39971 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39971">CVE-2025-39971 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252052">SUSE bug 1252052</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010042403" comment="bpftool-3.10.0-1160.146.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042404" comment="kernel-3.10.0-1160.146.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042405" comment="kernel-abi-whitelists-3.10.0-1160.146.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042406" comment="kernel-debug-3.10.0-1160.146.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042409" comment="kernel-doc-3.10.0-1160.146.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042410" comment="kernel-headers-3.10.0-1160.146.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042411" comment="kernel-tools-3.10.0-1160.146.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042412" comment="kernel-tools-libs-3.10.0-1160.146.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042414" comment="perf-3.10.0-1160.146.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042415" comment="python-perf-3.10.0-1160.146.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539993" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39993</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39993" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39993" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39993" ref_url="https://www.suse.com/security/cve/CVE-2025-39993" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3685" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: rc: fix races with imon_disconnect()

Syzbot reports a KASAN issue as below:
BUG: KASAN: use-after-free in __create_pipe include/linux/usb.h:1945 [inline]
BUG: KASAN: use-after-free in send_packet+0xa2d/0xbc0 drivers/media/rc/imon.c:627
Read of size 4 at addr ffff8880256fb000 by task syz-executor314/4465

CPU: 2 PID: 4465 Comm: syz-executor314 Not tainted 6.0.0-rc1-syzkaller #0
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014
Call Trace:
 &lt;TASK&gt;
__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106
print_address_description mm/kasan/report.c:317 [inline]
print_report.cold+0x2ba/0x6e9 mm/kasan/report.c:433
kasan_report+0xb1/0x1e0 mm/kasan/report.c:495
__create_pipe include/linux/usb.h:1945 [inline]
send_packet+0xa2d/0xbc0 drivers/media/rc/imon.c:627
vfd_write+0x2d9/0x550 drivers/media/rc/imon.c:991
vfs_write+0x2d7/0xdd0 fs/read_write.c:576
ksys_write+0x127/0x250 fs/read_write.c:631
do_syscall_x64 arch/x86/entry/common.c:50 [inline]
do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
entry_SYSCALL_64_after_hwframe+0x63/0xcd

The iMON driver improperly releases the usb_device reference in
imon_disconnect without coordinating with active users of the
device.

Specifically, the fields usbdev_intf0 and usbdev_intf1 are not
protected by the users counter (ictx-&gt;users). During probe,
imon_init_intf0 or imon_init_intf1 increments the usb_device
reference count depending on the interface. However, during
disconnect, usb_put_dev is called unconditionally, regardless of
actual usage.

As a result, if vfd_write or other operations are still in
progress after disconnect, this can lead to a use-after-free of
the usb_device pointer.

Thread 1 vfd_write                      Thread 2 imon_disconnect
                                        ...
                                        if
                                          usb_put_dev(ictx-&gt;usbdev_intf0)
                                        else
                                          usb_put_dev(ictx-&gt;usbdev_intf1)
...
while
  send_packet
    if
      pipe = usb_sndintpipe(
        ictx-&gt;usbdev_intf0) UAF
    else
      pipe = usb_sndctrlpipe(
        ictx-&gt;usbdev_intf0, 0) UAF

Guard access to usbdev_intf0 and usbdev_intf1 after disconnect by
checking ictx-&gt;disconnected in all writer paths. Add early return
with -ENODEV in send_packet(), vfd_write(), lcd_write() and
display_open() if the device is no longer present.

Set and read ictx-&gt;disconnected under ictx-&gt;lock to ensure memory
synchronization. Acquire the lock in imon_disconnect() before setting
the flag to synchronize with any ongoing operations.

Ensure writers exit early and safely after disconnect before the USB
core proceeds with cleanup.

Found by Linux Verification Center (linuxtesting.org) with Syzkaller.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-27"/>
	<updated date="2026-03-27"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39993/">CVE-2025-39993 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39993">CVE-2025-39993 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252070">SUSE bug 1252070</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010050974" comment="bpftool-3.10.0-1160.147.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050975" comment="kernel-3.10.0-1160.147.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050976" comment="kernel-abi-whitelists-3.10.0-1160.147.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050977" comment="kernel-debug-3.10.0-1160.147.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050978" comment="kernel-doc-3.10.0-1160.147.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050979" comment="kernel-headers-3.10.0-1160.147.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050980" comment="kernel-tools-3.10.0-1160.147.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050981" comment="kernel-tools-libs-3.10.0-1160.147.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050982" comment="perf-3.10.0-1160.147.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050983" comment="python-perf-3.10.0-1160.147.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540248" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40248</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40248" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40248" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40248" ref_url="https://www.suse.com/security/cve/CVE-2025-40248" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1142" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002437.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1143" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003191.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1581" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002478.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1703" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vsock: Ignore signal/timeout on connect() if already established

During connect(), acting on a signal/timeout by disconnecting an already
established socket leads to several issues:

1. connect() invoking vsock_transport_cancel_pkt() -&gt;
   virtio_transport_purge_skbs() may race with sendmsg() invoking
   virtio_transport_get_credit(). This results in a permanently elevated
   `vvs-&gt;bytes_unsent`. Which, in turn, confuses the SOCK_LINGER handling.

2. connect() resetting a connected socket's state may race with socket
   being placed in a sockmap. A disconnected socket remaining in a sockmap
   breaks sockmap's assumptions. And gives rise to WARNs.

3. connect() transitioning SS_CONNECTED -&gt; SS_UNCONNECTED allows for a
   transport change/drop after TCP_ESTABLISHED. Which poses a problem for
   any simultaneous sendmsg() or connect() and may result in a
   use-after-free/null-ptr-deref.

Do not disconnect socket on signal/timeout. Keep the logic for unconnected
sockets: they don't linger, can't be placed in a sockmap, are rejected by
sendmsg().

[1]: https://lore.kernel.org/netdev/e07fd95c-9a38-4eea-9638-133e38c2ec9b@rbox.co/
[2]: https://lore.kernel.org/netdev/20250317-vsock-trans-signal-race-v4-0-fc8837f3f1d4@rbox.co/
[3]: https://lore.kernel.org/netdev/60f1b7db-3099-4f6a-875e-af9f6ef194f6@rbox.co/
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-10"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40248/">CVE-2025-40248 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40248">CVE-2025-40248 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254864">SUSE bug 1254864</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010042403" comment="bpftool-3.10.0-1160.146.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042404" comment="kernel-3.10.0-1160.146.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042405" comment="kernel-abi-whitelists-3.10.0-1160.146.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042406" comment="kernel-debug-3.10.0-1160.146.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042409" comment="kernel-doc-3.10.0-1160.146.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042410" comment="kernel-headers-3.10.0-1160.146.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042411" comment="kernel-tools-3.10.0-1160.146.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042412" comment="kernel-tools-libs-3.10.0-1160.146.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042414" comment="perf-3.10.0-1160.146.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042415" comment="python-perf-3.10.0-1160.146.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540271" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40271</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40271" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40271" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40271" ref_url="https://www.suse.com/security/cve/CVE-2025-40271" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1662" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002457.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2212" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003185.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2759" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002619.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3685" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fs/proc: fix uaf in proc_readdir_de()

Pde is erased from subdir rbtree through rb_erase(), but not set the node
to EMPTY, which may result in uaf access.  We should use RB_CLEAR_NODE()
set the erased node to EMPTY, then pde_subdir_next() will return NULL to
avoid uaf access.

We found an uaf issue while using stress-ng testing, need to run testcase
getdent and tun in the same time.  The steps of the issue is as follows:

1) use getdent to traverse dir /proc/pid/net/dev_snmp6/, and current
   pde is tun3;

2) in the [time windows] unregister netdevice tun3 and tun2, and erase
   them from rbtree.  erase tun3 first, and then erase tun2.  the
   pde(tun2) will be released to slab;

3) continue to getdent process, then pde_subdir_next() will return
   pde(tun2) which is released, it will case uaf access.

CPU 0                                      |    CPU 1
-------------------------------------------------------------------------
traverse dir /proc/pid/net/dev_snmp6/      |   unregister_netdevice(tun-&gt;dev)   //tun3 tun2
sys_getdents64()                           |
  iterate_dir()                            |
    proc_readdir()                         |
      proc_readdir_de()                    |     snmp6_unregister_dev()
        pde_get(de);                       |       proc_remove()
        read_unlock(&amp;proc_subdir_lock);    |         remove_proc_subtree()
                                           |           write_lock(&amp;proc_subdir_lock);
        [time window]                      |           rb_erase(&amp;root-&gt;subdir_node, &amp;parent-&gt;subdir);
                                           |           write_unlock(&amp;proc_subdir_lock);
        read_lock(&amp;proc_subdir_lock);      |
        next = pde_subdir_next(de);        |
        pde_put(de);                       |
        de = next;    //UAF                |

rbtree of dev_snmp6
                        |
                    pde(tun3)
                     /    \
                  NULL  pde(tun2)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-27"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.2/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-40271/">CVE-2025-40271 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40271">CVE-2025-40271 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255297">SUSE bug 1255297</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010050974" comment="bpftool-3.10.0-1160.147.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050975" comment="kernel-3.10.0-1160.147.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050976" comment="kernel-abi-whitelists-3.10.0-1160.147.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050977" comment="kernel-debug-3.10.0-1160.147.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050978" comment="kernel-doc-3.10.0-1160.147.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050979" comment="kernel-headers-3.10.0-1160.147.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050980" comment="kernel-tools-3.10.0-1160.147.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050981" comment="kernel-tools-libs-3.10.0-1160.147.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050982" comment="perf-3.10.0-1160.147.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050983" comment="python-perf-3.10.0-1160.147.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540778" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40778</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40778" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40778" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40778" ref_url="https://www.suse.com/security/cve/CVE-2025-40778" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:19793" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002177.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19835" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002182.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19950" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002208.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19951" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002219.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21110" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003119.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21111" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003108.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22205" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023814.html" source="SUSE-SU"/>
    <description>
    Under certain circumstances, BIND is too lenient when accepting records from answers, allowing an attacker to inject forged data into the cache.
This issue affects BIND 9 versions 9.11.0 through 9.16.50, 9.18.0 through 9.18.39, 9.20.0 through 9.20.13, 9.21.0 through 9.21.12, 9.11.3-S1 through 9.16.50-S1, 9.18.11-S1 through 9.18.39-S1, and 9.20.9-S1 through 9.20.13-S1.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-18"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N" cvss4="9.2/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:H/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40778/">CVE-2025-40778 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40778">CVE-2025-40778 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252379">SUSE bug 1252379</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010033792" comment="bind-9.11.4-26.P2.el7_9.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010033793" comment="bind-chroot-9.11.4-26.P2.el7_9.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010033794" comment="bind-devel-9.11.4-26.P2.el7_9.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010033795" comment="bind-export-devel-9.11.4-26.P2.el7_9.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010033796" comment="bind-export-libs-9.11.4-26.P2.el7_9.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010033797" comment="bind-libs-9.11.4-26.P2.el7_9.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010033798" comment="bind-libs-lite-9.11.4-26.P2.el7_9.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010033799" comment="bind-license-9.11.4-26.P2.el7_9.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010033800" comment="bind-lite-devel-9.11.4-26.P2.el7_9.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010033801" comment="bind-pkcs11-9.11.4-26.P2.el7_9.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010033802" comment="bind-pkcs11-devel-9.11.4-26.P2.el7_9.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010033803" comment="bind-pkcs11-libs-9.11.4-26.P2.el7_9.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010033804" comment="bind-pkcs11-utils-9.11.4-26.P2.el7_9.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010033805" comment="bind-sdb-9.11.4-26.P2.el7_9.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010033806" comment="bind-sdb-chroot-9.11.4-26.P2.el7_9.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010033807" comment="bind-utils-9.11.4-26.P2.el7_9.19 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540907" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40907</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40907" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40907" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40907" ref_url="https://www.suse.com/security/cve/CVE-2025-40907" source="SUSE CVE"/>
		<reference ref_id="ESSA-2025:3015" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001640.html" source="SUSE-SU"/>
		<reference ref_id="ESSA-2025:3016" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001648.html" source="SUSE-SU"/>
		<reference ref_id="ESSA-2025:3017" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001646.html" source="SUSE-SU"/>
		<reference ref_id="ESSA-2025:3018" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001649.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:8625" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001641.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:8635" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001637.html" source="SUSE-SU"/>
    <description>
    FCGI versions 0.44 through 0.82, for Perl, include a vulnerable version of the FastCGI fcgi2 (aka fcgi) library.

The included FastCGI library is affected by  CVE-2025-23016, causing an integer overflow (and resultant heap-based buffer overflow) via crafted nameLen or valueLen values in data to the IPC socket. This occurs in ReadParams in fcgiapp.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-12"/>
	<updated date="2025-12-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2025-40907/">CVE-2025-40907 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40907">CVE-2025-40907 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1243326">SUSE bug 1243326</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986261" comment="perl-FCGI-0.74-8.el7_9.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202547273" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-47273</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-47273" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47273" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-47273" ref_url="https://www.suse.com/security/cve/CVE-2025-47273" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:10407" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001770.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:11036" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001806.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:11043" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001794.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:11044" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001795.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:11463" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001828.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:11607" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001919.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:11984" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001886.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:12834" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001872.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:13578" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001908.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:14900" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01693-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01695-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039332.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01704-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01704-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01709-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039348.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01715-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01723-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-May/020926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01774-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01810-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20412-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20462-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040651.html" source="SUSE-SU"/>
    <description>
    setuptools is a package that allows users to download, build, install, upgrade, and uninstall Python packages. A path traversal vulnerability in `PackageIndex` is present in setuptools prior to version 78.1.1. An attacker would be allowed to write files to arbitrary locations on the filesystem with the permissions of the process running the Python code, which could escalate to remote code execution depending on the context. Version 78.1.1 fixes the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-08-08"/>
	<updated date="2025-08-30"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-47273/">CVE-2025-47273 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-47273">CVE-2025-47273 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1243313">SUSE bug 1243313</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010013083" comment="python-setuptools-0.9.8-7.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010014484" comment="python3-setuptools-39.2.0-10.el7_9.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20254802" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-4802</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-4802" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4802" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-4802" ref_url="https://www.suse.com/security/cve/CVE-2025-4802" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:10219" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001799.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:8655" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001639.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:8686" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01702-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01702-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01784-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20361-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039498.html" source="SUSE-SU"/>
    <description>
    Untrusted LD_LIBRARY_PATH environment variable vulnerability in the GNU C Library version 2.27 to 2.38 allows attacker controlled loading of dynamically shared library in statically compiled setuid binaries that call dlopen (including internal dlopen calls after setlocale or calls to NSS functions such as getaddrinfo).
    </description>
<advisory from="security@suse.de">
	<issued date="2025-07-18"/>
	<updated date="2025-07-23"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-4802/">CVE-2025-4802 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4802">CVE-2025-4802 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1243317">SUSE bug 1243317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1243318">SUSE bug 1243318</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010007991" comment="glibc-2.17-326.el7_9.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010007992" comment="glibc-common-2.17-326.el7_9.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010007993" comment="glibc-devel-2.17-326.el7_9.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010007994" comment="glibc-headers-2.17-326.el7_9.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010007995" comment="glibc-static-2.17-326.el7_9.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010007996" comment="glibc-utils-2.17-326.el7_9.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010007997" comment="nscd-2.17-326.el7_9.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202548384" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-48384</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-48384" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48384" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-48384" ref_url="https://www.suse.com/security/cve/CVE-2025-48384" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:11462" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001821.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:11534" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001832.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:11688" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03012-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03022-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03037-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20721-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20855-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042323.html" source="SUSE-SU"/>
    <description>
    Git is a fast, scalable, distributed revision control system with an unusually rich command set that provides both high-level operations and full access to internals. When reading a config value, Git strips any trailing carriage return and line feed (CRLF). When writing a config entry, values with a trailing CR are not quoted, causing the CR to be lost when the config is later read. When initializing a submodule, if the submodule path contains a trailing CR, the altered path is read resulting in the submodule being checked out to an incorrect location. If a symlink exists that points the altered path to the submodule hooks directory, and the submodule contains an executable post-checkout hook, the script may be unintentionally executed after checkout. This vulnerability is fixed in v2.43.7, v2.44.4, v2.45.4, v2.46.4, v2.47.3, v2.48.2, v2.49.1, and v2.50.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-08-20"/>
	<updated date="2025-10-25"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-48384/">CVE-2025-48384 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-48384">CVE-2025-48384 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245943">SUSE bug 1245943</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010014485" comment="emacs-git-1.8.3.1-25.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010014486" comment="emacs-git-el-1.8.3.1-25.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010014487" comment="git-1.8.3.1-25.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010014488" comment="git-all-1.8.3.1-25.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010014489" comment="git-bzr-1.8.3.1-25.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010014490" comment="git-cvs-1.8.3.1-25.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010014491" comment="git-daemon-1.8.3.1-25.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010014492" comment="git-email-1.8.3.1-25.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010014493" comment="git-gnome-keyring-1.8.3.1-25.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010014494" comment="git-gui-1.8.3.1-25.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010014495" comment="git-hg-1.8.3.1-25.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010014496" comment="git-instaweb-1.8.3.1-25.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010014497" comment="git-p4-1.8.3.1-25.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010014498" comment="git-svn-1.8.3.1-25.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010014499" comment="gitk-1.8.3.1-25.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010014500" comment="gitweb-1.8.3.1-25.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010014501" comment="perl-Git-1.8.3.1-25.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010014502" comment="perl-Git-SVN-1.8.3.1-25.el7_9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202548797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-48797</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-48797" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48797" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-48797" ref_url="https://www.suse.com/security/cve/CVE-2025-48797" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:9162" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001681.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:9165" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001679.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:9501" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02164-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040546.html" source="SUSE-SU"/>
    <description>
    A flaw was found in GIMP when processing certain TGA image files. If a user opens one of these image files that has been specially crafted by an attacker, GIMP can be tricked into making serious memory errors, potentially leading to crashes and causing a heap buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-08-20"/>
	<updated date="2025-08-20"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-48797/">CVE-2025-48797 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-48797">CVE-2025-48797 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1243711">SUSE bug 1243711</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010014503" comment="gimp-2.8.22-1.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010014504" comment="gimp-devel-2.8.22-1.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010014505" comment="gimp-devel-tools-2.8.22-1.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010014506" comment="gimp-libs-2.8.22-1.el7_9.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202548798" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-48798</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-48798" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48798" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-48798" ref_url="https://www.suse.com/security/cve/CVE-2025-48798" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:9162" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001681.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:9165" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001679.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:9501" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02164-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040546.html" source="SUSE-SU"/>
    <description>
    A flaw was found in GIMP when processing XCF image files. If a user opens one of these image files that has been specially crafted by an attacker, GIMP can be tricked into making serious memory errors, potentially leading to crashes and causing use-after-free issues.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-08-20"/>
	<updated date="2025-12-19"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-48798/">CVE-2025-48798 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-48798">CVE-2025-48798 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1243712">SUSE bug 1243712</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010014503" comment="gimp-2.8.22-1.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010014504" comment="gimp-devel-2.8.22-1.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010014505" comment="gimp-devel-tools-2.8.22-1.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010014506" comment="gimp-libs-2.8.22-1.el7_9.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202549091" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-49091</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-49091" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49091" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-49091" ref_url="https://www.suse.com/security/cve/CVE-2025-49091" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:12346" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001865.html" source="SUSE-SU"/>
    <description>
    KDE Konsole before 25.04.2 allows remote code execution in a certain scenario. It supports loading URLs from the scheme handlers such as a ssh:// or telnet:// or rlogin:// URL. This can be executed regardless of whether the ssh, telnet, or rlogin binary is available. In this mode, there is a code path where if that binary is not available, Konsole falls back to using /bin/bash for the given arguments (i.e., the URL) provided. This allows an attacker to execute arbitrary code.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-08-05"/>
	<updated date="2025-08-05"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-49091/">CVE-2025-49091 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49091">CVE-2025-49091 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244569">SUSE bug 1244569</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010011942" comment="konsole-4.10.5-5.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011943" comment="konsole-part-4.10.5-5.el7_9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202549175" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-49175</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-49175" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49175" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-49175" ref_url="https://www.suse.com/security/cve/CVE-2025-49175" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:10360" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001830.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:10375" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001831.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:9303" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001686.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:9305" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001684.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:9306" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001691.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:9392" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01974-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01975-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01977-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040328.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040327.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01980-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01981-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02012-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040365.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the X Rendering extension's handling of animated cursors. If a client provides no cursors, the server assumes at least one is present, leading to an out-of-bounds read and potential crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-07-24"/>
	<updated date="2025-07-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-49175/">CVE-2025-49175 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49175">CVE-2025-49175 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244082">SUSE bug 1244082</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010009444" comment="tigervnc-1.8.0-36.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009445" comment="tigervnc-icons-1.8.0-36.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009446" comment="tigervnc-license-1.8.0-36.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009447" comment="tigervnc-server-1.8.0-36.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009448" comment="tigervnc-server-applet-1.8.0-36.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009449" comment="tigervnc-server-minimal-1.8.0-36.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009450" comment="tigervnc-server-module-1.8.0-36.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009435" comment="xorg-x11-server-Xdmx-1.20.4-32.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009436" comment="xorg-x11-server-Xephyr-1.20.4-32.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009437" comment="xorg-x11-server-Xnest-1.20.4-32.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009438" comment="xorg-x11-server-Xorg-1.20.4-32.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009439" comment="xorg-x11-server-Xvfb-1.20.4-32.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009440" comment="xorg-x11-server-Xwayland-1.20.4-32.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009441" comment="xorg-x11-server-common-1.20.4-32.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009442" comment="xorg-x11-server-devel-1.20.4-32.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009443" comment="xorg-x11-server-source-1.20.4-32.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202549176" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-49176</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-49176" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49176" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-49176" ref_url="https://www.suse.com/security/cve/CVE-2025-49176" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:10360" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001830.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:10375" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001831.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:9303" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001686.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:9305" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001684.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:9306" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001691.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:9392" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01974-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01975-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01977-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040328.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040327.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01980-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01981-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02012-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02187-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02191-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02192-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02206-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02207-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02208-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02224-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040615.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Big Requests extension. The request length is multiplied by 4 before checking against the maximum allowed size, potentially causing an integer overflow and bypassing the size check.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-07-24"/>
	<updated date="2025-07-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-49176/">CVE-2025-49176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49176">CVE-2025-49176 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244084">SUSE bug 1244084</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010009444" comment="tigervnc-1.8.0-36.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009445" comment="tigervnc-icons-1.8.0-36.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009446" comment="tigervnc-license-1.8.0-36.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009447" comment="tigervnc-server-1.8.0-36.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009448" comment="tigervnc-server-applet-1.8.0-36.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009449" comment="tigervnc-server-minimal-1.8.0-36.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009450" comment="tigervnc-server-module-1.8.0-36.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009435" comment="xorg-x11-server-Xdmx-1.20.4-32.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009436" comment="xorg-x11-server-Xephyr-1.20.4-32.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009437" comment="xorg-x11-server-Xnest-1.20.4-32.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009438" comment="xorg-x11-server-Xorg-1.20.4-32.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009439" comment="xorg-x11-server-Xvfb-1.20.4-32.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009440" comment="xorg-x11-server-Xwayland-1.20.4-32.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009441" comment="xorg-x11-server-common-1.20.4-32.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009442" comment="xorg-x11-server-devel-1.20.4-32.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009443" comment="xorg-x11-server-source-1.20.4-32.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202549178" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-49178</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-49178" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49178" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-49178" ref_url="https://www.suse.com/security/cve/CVE-2025-49178" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:10360" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001830.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:10375" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001831.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:9303" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001686.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:9305" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001684.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:9306" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001691.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:9392" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01974-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01975-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01977-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040328.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040327.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01980-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01981-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02012-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040365.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the X server's request handling. Non-zero 'bytes to ignore' in a client's request can cause the server to skip processing another client's request, potentially leading to a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-07-24"/>
	<updated date="2025-07-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-49178/">CVE-2025-49178 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49178">CVE-2025-49178 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244087">SUSE bug 1244087</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010009444" comment="tigervnc-1.8.0-36.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009445" comment="tigervnc-icons-1.8.0-36.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009446" comment="tigervnc-license-1.8.0-36.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009447" comment="tigervnc-server-1.8.0-36.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009448" comment="tigervnc-server-applet-1.8.0-36.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009449" comment="tigervnc-server-minimal-1.8.0-36.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009450" comment="tigervnc-server-module-1.8.0-36.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009435" comment="xorg-x11-server-Xdmx-1.20.4-32.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009436" comment="xorg-x11-server-Xephyr-1.20.4-32.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009437" comment="xorg-x11-server-Xnest-1.20.4-32.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009438" comment="xorg-x11-server-Xorg-1.20.4-32.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009439" comment="xorg-x11-server-Xvfb-1.20.4-32.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009440" comment="xorg-x11-server-Xwayland-1.20.4-32.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009441" comment="xorg-x11-server-common-1.20.4-32.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009442" comment="xorg-x11-server-devel-1.20.4-32.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009443" comment="xorg-x11-server-source-1.20.4-32.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202549179" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-49179</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-49179" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49179" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-49179" ref_url="https://www.suse.com/security/cve/CVE-2025-49179" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:10360" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001830.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:10375" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001831.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:9303" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001686.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:9305" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001684.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:9306" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001691.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:9392" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01974-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01975-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01977-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040328.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040327.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01980-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01981-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02012-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040365.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the X Record extension. The RecordSanityCheckRegisterClients function does not check for an integer overflow when computing request length, which allows a client to bypass length checks.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-07-24"/>
	<updated date="2025-07-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-49179/">CVE-2025-49179 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49179">CVE-2025-49179 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244089">SUSE bug 1244089</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010009444" comment="tigervnc-1.8.0-36.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009445" comment="tigervnc-icons-1.8.0-36.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009446" comment="tigervnc-license-1.8.0-36.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009447" comment="tigervnc-server-1.8.0-36.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009448" comment="tigervnc-server-applet-1.8.0-36.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009449" comment="tigervnc-server-minimal-1.8.0-36.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009450" comment="tigervnc-server-module-1.8.0-36.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009435" comment="xorg-x11-server-Xdmx-1.20.4-32.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009436" comment="xorg-x11-server-Xephyr-1.20.4-32.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009437" comment="xorg-x11-server-Xnest-1.20.4-32.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009438" comment="xorg-x11-server-Xorg-1.20.4-32.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009439" comment="xorg-x11-server-Xvfb-1.20.4-32.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009440" comment="xorg-x11-server-Xwayland-1.20.4-32.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009441" comment="xorg-x11-server-common-1.20.4-32.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009442" comment="xorg-x11-server-devel-1.20.4-32.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009443" comment="xorg-x11-server-source-1.20.4-32.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202549180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-49180</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-49180" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49180" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-49180" ref_url="https://www.suse.com/security/cve/CVE-2025-49180" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:10360" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001830.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:10375" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001831.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:9303" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001686.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:9305" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001684.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:9306" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001691.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:9392" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01974-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01975-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01977-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040328.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040327.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01980-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01981-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02012-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040365.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the RandR extension, where the RRChangeProviderProperty function does not properly validate input. This issue leads to an integer overflow when computing the total size to allocate.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-07-24"/>
	<updated date="2025-07-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-49180/">CVE-2025-49180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49180">CVE-2025-49180 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244090">SUSE bug 1244090</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010009444" comment="tigervnc-1.8.0-36.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009445" comment="tigervnc-icons-1.8.0-36.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009446" comment="tigervnc-license-1.8.0-36.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009447" comment="tigervnc-server-1.8.0-36.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009448" comment="tigervnc-server-applet-1.8.0-36.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009449" comment="tigervnc-server-minimal-1.8.0-36.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009450" comment="tigervnc-server-module-1.8.0-36.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009435" comment="xorg-x11-server-Xdmx-1.20.4-32.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009436" comment="xorg-x11-server-Xephyr-1.20.4-32.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009437" comment="xorg-x11-server-Xnest-1.20.4-32.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009438" comment="xorg-x11-server-Xorg-1.20.4-32.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009439" comment="xorg-x11-server-Xvfb-1.20.4-32.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009440" comment="xorg-x11-server-Xwayland-1.20.4-32.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009441" comment="xorg-x11-server-common-1.20.4-32.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009442" comment="xorg-x11-server-devel-1.20.4-32.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009443" comment="xorg-x11-server-source-1.20.4-32.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20254948" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-4948</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-4948" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4948" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-4948" ref_url="https://www.suse.com/security/cve/CVE-2025-4948" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:8126" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001317.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:8132" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001157.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:9179" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01794-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01812-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01817-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01864-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20453-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022365.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15189-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LI34B57WJ4B5UMQTOCNXAAI3NVKDGJWF/" source="SUSE-SU"/>
    <description>
    A flaw was found in the soup_multipart_new_from_message() function of the libsoup HTTP library, which is commonly used by GNOME and other applications to handle web communications. The issue occurs when the library processes specially crafted multipart messages. Due to improper validation, an internal calculation can go wrong, leading to an integer underflow. This can cause the program to access invalid memory and crash. As a result, any application or server using libsoup could be forced to exit unexpectedly, creating a denial-of-service (DoS) risk.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-07-05"/>
	<updated date="2025-11-13"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4948/">CVE-2025-4948 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4948">CVE-2025-4948 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1243332">SUSE bug 1243332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250562">SUSE bug 1250562</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009998908" comment="libsoup-2.62.2-6.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998909" comment="libsoup-devel-2.62.2-6.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202549794" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-49794</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-49794" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49794" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-49794" ref_url="https://www.suse.com/security/cve/CVE-2025-49794" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:10698" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001780.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:10699" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001783.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:12240" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02260-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02275-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02294-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-July/021818.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02355-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20607-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041454.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability was found in libxml2. This issue occurs when parsing XPath elements under certain circumstances when the XML schematron has the &lt;sch:name path="..."/&gt; schema elements. This flaw allows a malicious actor to craft a malicious XML document used as input for libxml, resulting in the program's crash using libxml or other possible undefined behaviors.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-08-05"/>
	<updated date="2025-08-30"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" cvss4="8.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-49794/">CVE-2025-49794 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49794">CVE-2025-49794 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244554">SUSE bug 1244554</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010011938" comment="libxml2-2.9.1-6.el7_9.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011939" comment="libxml2-devel-2.9.1-6.el7_9.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011940" comment="libxml2-python-2.9.1-6.el7_9.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011941" comment="libxml2-static-2.9.1-6.el7_9.10 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202549796" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-49796</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-49796" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49796" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-49796" ref_url="https://www.suse.com/security/cve/CVE-2025-49796" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:10698" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001780.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:10699" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001783.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:12240" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02260-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02275-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02294-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-July/021818.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02355-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20607-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041454.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in libxml2. Processing certain sch:name elements from the input XML file can trigger a memory corruption issue. This flaw allows an attacker to craft a malicious XML input file that can lead libxml to crash, resulting in a denial of service or other possible undefined behavior due to sensitive data being corrupted in memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-08-05"/>
	<updated date="2025-08-30"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-49796/">CVE-2025-49796 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49796">CVE-2025-49796 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244557">SUSE bug 1244557</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010011938" comment="libxml2-2.9.1-6.el7_9.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011939" comment="libxml2-devel-2.9.1-6.el7_9.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011940" comment="libxml2-python-2.9.1-6.el7_9.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011941" comment="libxml2-static-2.9.1-6.el7_9.10 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202549812" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-49812</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-49812" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49812" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-49812" ref_url="https://www.suse.com/security/cve/CVE-2025-49812" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:14997" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001981.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:15023" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001973.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:15123" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02565-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02682-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02683-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02684-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02685-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041070.html" source="SUSE-SU"/>
    <description>
    In some mod_ssl configurations on Apache HTTP Server versions through to 2.4.63, an HTTP desynchronisation attack allows a man-in-the-middle attacker to hijack an HTTP session via a TLS upgrade.

Only configurations using "SSLEngine optional" to enable TLS upgrades are affected. Users are recommended to upgrade to version 2.4.64, which removes support for TLS upgrade.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-09-09"/>
	<updated date="2025-12-19"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:L" cvss4="8.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-49812/">CVE-2025-49812 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49812">CVE-2025-49812 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246161">SUSE bug 1246161</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010017223" comment="httpd-2.4.6-99.el7_9.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017224" comment="httpd-devel-2.4.6-99.el7_9.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017225" comment="httpd-manual-2.4.6-99.el7_9.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017226" comment="httpd-tools-2.4.6-99.el7_9.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017227" comment="mod_ldap-2.4.6-99.el7_9.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017228" comment="mod_proxy_html-2.4.6-99.el7_9.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017229" comment="mod_session-2.4.6-99.el7_9.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017230" comment="mod_ssl-2.4.6-99.el7_9.6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202550059" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-50059</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-50059" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50059" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-50059" ref_url="https://www.suse.com/security/cve/CVE-2025-50059" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:10865" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001838.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:10867" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001814.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:10873" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02545-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02563-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02657-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02666-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02667-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03236-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03262-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041764.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-07-30"/>
	<updated date="2025-11-22"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-50059/">CVE-2025-50059 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50059">CVE-2025-50059 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246575">SUSE bug 1246575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246595">SUSE bug 1246595</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010011165" comment="java-11-openjdk-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011166" comment="java-11-openjdk-debug-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011167" comment="java-11-openjdk-demo-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011168" comment="java-11-openjdk-demo-debug-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011171" comment="java-11-openjdk-devel-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011172" comment="java-11-openjdk-devel-debug-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011176" comment="java-11-openjdk-headless-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011177" comment="java-11-openjdk-headless-debug-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011180" comment="java-11-openjdk-javadoc-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011181" comment="java-11-openjdk-javadoc-debug-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011182" comment="java-11-openjdk-javadoc-zip-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011183" comment="java-11-openjdk-javadoc-zip-debug-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011184" comment="java-11-openjdk-jmods-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011185" comment="java-11-openjdk-jmods-debug-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011189" comment="java-11-openjdk-src-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011190" comment="java-11-openjdk-src-debug-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011193" comment="java-11-openjdk-static-libs-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011194" comment="java-11-openjdk-static-libs-debug-11.0.28.0.6-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202550106" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-50106</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-50106" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50106" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-50106" ref_url="https://www.suse.com/security/cve/CVE-2025-50106" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:10861" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001837.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:10862" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001811.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:10865" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001838.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:10867" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001814.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:10873" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02563-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02657-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02666-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02667-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03120-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03224-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03236-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03262-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041764.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-07-26"/>
	<updated date="2025-11-22"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-50106/">CVE-2025-50106 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50106">CVE-2025-50106 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246584">SUSE bug 1246584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246595">SUSE bug 1246595</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010010142" comment="java-1.8.0-openjdk-1.8.0.462.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010010143" comment="java-1.8.0-openjdk-accessibility-1.8.0.462.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010010144" comment="java-1.8.0-openjdk-demo-1.8.0.462.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010010145" comment="java-1.8.0-openjdk-devel-1.8.0.462.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010010146" comment="java-1.8.0-openjdk-headless-1.8.0.462.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010010147" comment="java-1.8.0-openjdk-javadoc-1.8.0.462.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010010148" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.462.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010010149" comment="java-1.8.0-openjdk-src-1.8.0.462.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011165" comment="java-11-openjdk-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011166" comment="java-11-openjdk-debug-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011167" comment="java-11-openjdk-demo-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011168" comment="java-11-openjdk-demo-debug-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011171" comment="java-11-openjdk-devel-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011172" comment="java-11-openjdk-devel-debug-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011176" comment="java-11-openjdk-headless-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011177" comment="java-11-openjdk-headless-debug-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011180" comment="java-11-openjdk-javadoc-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011181" comment="java-11-openjdk-javadoc-debug-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011182" comment="java-11-openjdk-javadoc-zip-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011183" comment="java-11-openjdk-javadoc-zip-debug-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011184" comment="java-11-openjdk-jmods-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011185" comment="java-11-openjdk-jmods-debug-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011189" comment="java-11-openjdk-src-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011190" comment="java-11-openjdk-src-debug-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011193" comment="java-11-openjdk-static-libs-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011194" comment="java-11-openjdk-static-libs-debug-11.0.28.0.6-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20255283" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-5283</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-5283" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5283" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-5283" ref_url="https://www.suse.com/security/cve/CVE-2025-5283" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:9118" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001676.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:9119" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001669.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:9331" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023500.html" source="SUSE-SU"/>
    <description>
    Use after free in libvpx in Google Chrome prior to 137.0.7151.55 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-07-24"/>
	<updated date="2025-12-11"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-5283/">CVE-2025-5283 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5283">CVE-2025-5283 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1243741">SUSE bug 1243741</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010009451" comment="libvpx-1.3.0-8.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009452" comment="libvpx-devel-1.3.0-8.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009453" comment="libvpx-utils-1.3.0-8.el7_9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202553057" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-53057</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-53057" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53057" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-53057" ref_url="https://www.suse.com/security/cve/CVE-2025-53057" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:18814" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002133.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:18815" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002124.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:18818" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002212.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:18821" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002126.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:18824" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3965-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4005-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023427.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-10-30"/>
	<updated date="2025-12-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-53057/">CVE-2025-53057 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53057">CVE-2025-53057 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252414">SUSE bug 1252414</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010024098" comment="java-1.8.0-openjdk-1.8.0.472.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024099" comment="java-1.8.0-openjdk-accessibility-1.8.0.472.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024100" comment="java-1.8.0-openjdk-demo-1.8.0.472.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024101" comment="java-1.8.0-openjdk-devel-1.8.0.472.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024102" comment="java-1.8.0-openjdk-headless-1.8.0.472.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024103" comment="java-1.8.0-openjdk-javadoc-1.8.0.472.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024104" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.472.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024105" comment="java-1.8.0-openjdk-src-1.8.0.472.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025493" comment="java-11-openjdk-11.0.29.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025494" comment="java-11-openjdk-debug-11.0.29.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025495" comment="java-11-openjdk-demo-11.0.29.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025496" comment="java-11-openjdk-demo-debug-11.0.29.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025499" comment="java-11-openjdk-devel-11.0.29.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025500" comment="java-11-openjdk-devel-debug-11.0.29.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025504" comment="java-11-openjdk-headless-11.0.29.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025505" comment="java-11-openjdk-headless-debug-11.0.29.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025508" comment="java-11-openjdk-javadoc-11.0.29.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025509" comment="java-11-openjdk-javadoc-debug-11.0.29.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025510" comment="java-11-openjdk-javadoc-zip-11.0.29.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025511" comment="java-11-openjdk-javadoc-zip-debug-11.0.29.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025512" comment="java-11-openjdk-jmods-11.0.29.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025513" comment="java-11-openjdk-jmods-debug-11.0.29.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025517" comment="java-11-openjdk-src-11.0.29.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025518" comment="java-11-openjdk-src-debug-11.0.29.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025521" comment="java-11-openjdk-static-libs-11.0.29.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025522" comment="java-11-openjdk-static-libs-debug-11.0.29.0.7-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202553066" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-53066</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-53066" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53066" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-53066" ref_url="https://www.suse.com/security/cve/CVE-2025-53066" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:18814" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002133.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:18815" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002124.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:18818" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002212.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:18821" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002126.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:18824" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3965-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4005-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023427.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-10-30"/>
	<updated date="2025-12-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-53066/">CVE-2025-53066 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53066">CVE-2025-53066 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252417">SUSE bug 1252417</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010024098" comment="java-1.8.0-openjdk-1.8.0.472.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024099" comment="java-1.8.0-openjdk-accessibility-1.8.0.472.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024100" comment="java-1.8.0-openjdk-demo-1.8.0.472.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024101" comment="java-1.8.0-openjdk-devel-1.8.0.472.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024102" comment="java-1.8.0-openjdk-headless-1.8.0.472.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024103" comment="java-1.8.0-openjdk-javadoc-1.8.0.472.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024104" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.472.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024105" comment="java-1.8.0-openjdk-src-1.8.0.472.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025493" comment="java-11-openjdk-11.0.29.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025494" comment="java-11-openjdk-debug-11.0.29.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025495" comment="java-11-openjdk-demo-11.0.29.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025496" comment="java-11-openjdk-demo-debug-11.0.29.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025499" comment="java-11-openjdk-devel-11.0.29.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025500" comment="java-11-openjdk-devel-debug-11.0.29.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025504" comment="java-11-openjdk-headless-11.0.29.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025505" comment="java-11-openjdk-headless-debug-11.0.29.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025508" comment="java-11-openjdk-javadoc-11.0.29.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025509" comment="java-11-openjdk-javadoc-debug-11.0.29.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025510" comment="java-11-openjdk-javadoc-zip-11.0.29.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025511" comment="java-11-openjdk-javadoc-zip-debug-11.0.29.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025512" comment="java-11-openjdk-jmods-11.0.29.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025513" comment="java-11-openjdk-jmods-debug-11.0.29.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025517" comment="java-11-openjdk-src-11.0.29.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025518" comment="java-11-openjdk-src-debug-11.0.29.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025521" comment="java-11-openjdk-static-libs-11.0.29.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025522" comment="java-11-openjdk-static-libs-debug-11.0.29.0.7-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20255473" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-5473</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-5473" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5473" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-5473" ref_url="https://www.suse.com/security/cve/CVE-2025-5473" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:9162" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001681.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:9165" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001679.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:9501" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02100-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040463.html" source="SUSE-SU"/>
    <description>
    GIMP ICO File Parsing Integer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

The specific flaw exists within the parsing of ICO files. The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before writing to memory. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-26752.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-08-20"/>
	<updated date="2025-08-20"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-5473/">CVE-2025-5473 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-5473">CVE-2025-5473 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244058">SUSE bug 1244058</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010014503" comment="gimp-2.8.22-1.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010014504" comment="gimp-devel-2.8.22-1.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010014505" comment="gimp-devel-tools-2.8.22-1.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010014506" comment="gimp-libs-2.8.22-1.el7_9.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202558060" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-58060</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-58060" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58060" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-58060" ref_url="https://www.suse.com/security/cve/CVE-2025-58060" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:15700" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002001.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:15702" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001997.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:17054" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03178-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03261-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041765.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024526.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024560.html" source="SUSE-SU"/>
    <description>
    OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. In versions 2.4.12 and earlier, when the `AuthType` is set to anything but `Basic`, if the request contains an `Authorization: Basic ...` header, the password is not checked. This results in authentication bypass. Any configuration that allows an `AuthType` that is not `Basic` is affected. Version 2.4.13 fixes the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-10-18"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58060/">CVE-2025-58060 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58060">CVE-2025-58060 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249049">SUSE bug 1249049</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010022020" comment="cups-1.6.3-52.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022021" comment="cups-client-1.6.3-52.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022022" comment="cups-devel-1.6.3-52.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022023" comment="cups-filesystem-1.6.3-52.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022024" comment="cups-ipptool-1.6.3-52.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022025" comment="cups-libs-1.6.3-52.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022026" comment="cups-lpd-1.6.3-52.el7_9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202558098" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-58098</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-58098" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58098" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-58098" ref_url="https://www.suse.com/security/cve/CVE-2025-58098" source="SUSE CVE"/>
		<reference ref_id="ESSA-2026:0017" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002434.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23732" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002326.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23919" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003135.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0090" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4488-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023629.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0019-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023669.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023668.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023817.html" source="SUSE-SU"/>
    <description>
    Apache HTTP Server 2.4.65 and earlier with Server Side Includes (SSI) enabled and mod_cgid (but not mod_cgi) passes the shell-escaped query string to #exec cmd="..." directives.

This issue affects Apache HTTP Server before 2.4.66.

Users are recommended to upgrade to version 2.4.66, which fixes the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-27"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58098/">CVE-2025-58098 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58098">CVE-2025-58098 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254512">SUSE bug 1254512</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010039781" comment="httpd-2.4.6-99.el7_9.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039782" comment="httpd-devel-2.4.6-99.el7_9.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039783" comment="httpd-manual-2.4.6-99.el7_9.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039784" comment="httpd-tools-2.4.6-99.el7_9.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039785" comment="mod_ldap-2.4.6-99.el7_9.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039786" comment="mod_proxy_html-2.4.6-99.el7_9.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039787" comment="mod_session-2.4.6-99.el7_9.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039788" comment="mod_ssl-2.4.6-99.el7_9.7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20255914" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-5914</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-5914" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5914" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-5914" ref_url="https://www.suse.com/security/cve/CVE-2025-5914" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:14130" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001932.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:14135" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001931.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:14828" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02522-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02522-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02566-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02718-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02718-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20594-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022368.html" source="SUSE-SU"/>
    <description>
    A vulnerability has been identified in the libarchive library, specifically within the archive_read_format_rar_seek_data() function. This flaw involves an integer overflow that can ultimately lead to a double-free condition. Exploiting a double-free vulnerability can result in memory corruption, enabling an attacker to execute arbitrary code or cause a denial-of-service condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-10-11"/>
	<updated date="2026-01-22"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-5914/">CVE-2025-5914 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-5914">CVE-2025-5914 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244272">SUSE bug 1244272</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010020503" comment="bsdcpio-3.1.2-14.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010020504" comment="bsdtar-3.1.2-14.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010020505" comment="libarchive-3.1.2-14.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010020506" comment="libarchive-devel-3.1.2-14.el7_9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20256019" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-6019</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-6019" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6019" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-6019" ref_url="https://www.suse.com/security/cve/CVE-2025-6019" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:10796" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002481.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:9327" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001685.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:9878" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02043-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02044-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20426-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040510.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20440-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040565.html" source="SUSE-SU"/>
    <description>
    A Local Privilege Escalation (LPE) vulnerability was found in libblockdev. Generally, the "allow_active" setting in Polkit permits a physically present user to take certain actions based on the session type. Due to the way libblockdev interacts with the udisks daemon, an "allow_active" user on a system may be able escalate to full root privileges on the target host. Normally, udisks mounts user-provided filesystem images with security flags like nosuid and nodev to prevent privilege escalation.  However, a local attacker can create a specially crafted XFS image containing a SUID-root shell, then trick udisks into resizing it. This mounts their malicious filesystem with root privileges, allowing them to execute their SUID-root shell and gain complete control of the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-10"/>
	<updated date="2026-02-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6019/">CVE-2025-6019 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6019">CVE-2025-6019 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1243285">SUSE bug 1243285</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010042371" comment="libblockdev-2.18-5.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042372" comment="libblockdev-btrfs-2.18-5.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042373" comment="libblockdev-btrfs-devel-2.18-5.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042374" comment="libblockdev-crypto-2.18-5.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042375" comment="libblockdev-crypto-devel-2.18-5.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042376" comment="libblockdev-devel-2.18-5.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042377" comment="libblockdev-dm-2.18-5.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042378" comment="libblockdev-dm-devel-2.18-5.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042379" comment="libblockdev-fs-2.18-5.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042380" comment="libblockdev-fs-devel-2.18-5.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042381" comment="libblockdev-kbd-2.18-5.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042382" comment="libblockdev-kbd-devel-2.18-5.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042383" comment="libblockdev-loop-2.18-5.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042384" comment="libblockdev-loop-devel-2.18-5.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042385" comment="libblockdev-lvm-2.18-5.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042386" comment="libblockdev-lvm-devel-2.18-5.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042387" comment="libblockdev-mdraid-2.18-5.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042388" comment="libblockdev-mdraid-devel-2.18-5.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042389" comment="libblockdev-mpath-2.18-5.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042390" comment="libblockdev-mpath-devel-2.18-5.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042391" comment="libblockdev-nvdimm-2.18-5.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042392" comment="libblockdev-nvdimm-devel-2.18-5.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042393" comment="libblockdev-part-2.18-5.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042394" comment="libblockdev-part-devel-2.18-5.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042395" comment="libblockdev-plugins-all-2.18-5.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042396" comment="libblockdev-swap-2.18-5.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042397" comment="libblockdev-swap-devel-2.18-5.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042398" comment="libblockdev-utils-2.18-5.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042399" comment="libblockdev-utils-devel-2.18-5.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042400" comment="libblockdev-vdo-2.18-5.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042401" comment="libblockdev-vdo-devel-2.18-5.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010042402" comment="python2-blockdev-2.18-5.el7_9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20256020" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-6020</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-6020" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6020" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-6020" ref_url="https://www.suse.com/security/cve/CVE-2025-6020" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:10027" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001746.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:10357" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001824.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:14557" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001988.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:15099" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001966.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:9526" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02013-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20427-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040508.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20441-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040564.html" source="SUSE-SU"/>
    <description>
    A flaw was found in linux-pam. The module pam_namespace may use access user-controlled paths without proper protection, allowing local users to elevate their privileges to root via multiple symlink attacks and race conditions.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-07-24"/>
	<updated date="2025-09-12"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6020/">CVE-2025-6020 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6020">CVE-2025-6020 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244509">SUSE bug 1244509</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010009433" comment="pam-1.1.8-23.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009434" comment="pam-devel-1.1.8-23.el7_9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20256021" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-6021</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-6021" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6021" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-6021" ref_url="https://www.suse.com/security/cve/CVE-2025-6021" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:10698" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001780.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:10699" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001783.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:12240" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02260-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02275-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02294-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-July/021818.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02355-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20607-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041454.html" source="SUSE-SU"/>
    <description>
    A flaw was found in libxml2's xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow. This issue can result in memory corruption or a denial of service when processing crafted input.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-08-05"/>
	<updated date="2025-08-30"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6021/">CVE-2025-6021 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6021">CVE-2025-6021 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244580">SUSE bug 1244580</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010011938" comment="libxml2-2.9.1-6.el7_9.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011939" comment="libxml2-devel-2.9.1-6.el7_9.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011940" comment="libxml2-python-2.9.1-6.el7_9.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011941" comment="libxml2-static-2.9.1-6.el7_9.10 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202561662" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-61662</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-61662" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61662" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-61662" ref_url="https://www.suse.com/security/cve/CVE-2025-61662" source="SUSE CVE"/>
		<reference ref_id="ESSA-2026:0049" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002611.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4148" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002610.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4648" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002582.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4760" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003262.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4823" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002595.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023596.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023307.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023439.html" source="SUSE-SU"/>
    <description>
    A Use-After-Free vulnerability has been discovered in GRUB's gettext module. This flaw stems from a programming error where the gettext command remains registered in memory after its module is unloaded. An attacker can exploit this condition by invoking the orphaned command, causing the application to access a memory location that is no longer valid. An attacker could exploit this vulnerability to cause grub to crash, leading to a Denial of Service. Possible data integrity or confidentiality compromise is not discarded.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-25"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="2.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61662/">CVE-2025-61662 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-61662">CVE-2025-61662 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252933">SUSE bug 1252933</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010050055" comment="grub2-2.02-0.87.0.5.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050056" comment="grub2-common-2.02-0.87.0.5.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050057" comment="grub2-efi-ia32-2.02-0.87.0.5.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050058" comment="grub2-efi-ia32-cdboot-2.02-0.87.0.5.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050059" comment="grub2-efi-ia32-modules-2.02-0.87.0.5.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050060" comment="grub2-efi-x64-2.02-0.87.0.5.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050061" comment="grub2-efi-x64-cdboot-2.02-0.87.0.5.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050062" comment="grub2-efi-x64-modules-2.02-0.87.0.5.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050063" comment="grub2-pc-2.02-0.87.0.5.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050064" comment="grub2-pc-modules-2.02-0.87.0.5.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050065" comment="grub2-tools-2.02-0.87.0.5.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050066" comment="grub2-tools-extra-2.02-0.87.0.5.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050067" comment="grub2-tools-minimal-2.02-0.87.0.5.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202562229" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-62229</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-62229" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62229" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-62229" ref_url="https://www.suse.com/security/cve/CVE-2025-62229" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:19432" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002149.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19433" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002166.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19434" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002154.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19489" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002197.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19623" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002198.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19909" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002201.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:20958" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003111.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:20960" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003083.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:20961" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003105.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22096" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023510.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3863-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3865-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3866-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3874-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023137.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the X.Org X server and Xwayland when processing X11 Present extension notifications. Improper error handling during notification creation can leave dangling pointers that lead to a use-after-free condition. This can cause memory corruption or a crash, potentially allowing an attacker to execute arbitrary code or cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-62229/">CVE-2025-62229 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-62229">CVE-2025-62229 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251958">SUSE bug 1251958</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010031899" comment="tigervnc-1.8.0-36.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031900" comment="tigervnc-icons-1.8.0-36.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031901" comment="tigervnc-license-1.8.0-36.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031902" comment="tigervnc-server-1.8.0-36.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031903" comment="tigervnc-server-applet-1.8.0-36.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031904" comment="tigervnc-server-minimal-1.8.0-36.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031905" comment="tigervnc-server-module-1.8.0-36.el7_9.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202562230" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-62230</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-62230" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62230" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-62230" ref_url="https://www.suse.com/security/cve/CVE-2025-62230" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:19432" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002149.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19433" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002166.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19434" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002154.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19489" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002197.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19623" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002198.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19909" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002201.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:20958" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003111.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:20960" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003083.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:20961" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003105.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22096" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023510.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3863-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3865-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3866-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3874-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023137.html" source="SUSE-SU"/>
    <description>
    A flaw was discovered in the X.Org X server's X Keyboard (Xkb) extension when handling client resource cleanup. The software frees certain data structures without properly detaching related resources, leading to a use-after-free condition. This can cause memory corruption or a crash when affected clients disconnect.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-62230/">CVE-2025-62230 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-62230">CVE-2025-62230 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251959">SUSE bug 1251959</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010031899" comment="tigervnc-1.8.0-36.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031900" comment="tigervnc-icons-1.8.0-36.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031901" comment="tigervnc-license-1.8.0-36.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031902" comment="tigervnc-server-1.8.0-36.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031903" comment="tigervnc-server-applet-1.8.0-36.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031904" comment="tigervnc-server-minimal-1.8.0-36.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031905" comment="tigervnc-server-module-1.8.0-36.el7_9.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202562231" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-62231</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-62231" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62231" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-62231" ref_url="https://www.suse.com/security/cve/CVE-2025-62231" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:19432" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002149.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19433" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002166.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19434" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002154.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19489" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002197.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19623" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002198.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19909" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002201.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:20958" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003111.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:20960" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003083.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:20961" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003105.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22096" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023510.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3863-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3865-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3866-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3874-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023137.html" source="SUSE-SU"/>
    <description>
    A flaw was identified in the X.Org X server's X Keyboard (Xkb) extension where improper bounds checking in the XkbSetCompatMap() function can cause an unsigned short overflow. If an attacker sends specially crafted input data, the value calculation may overflow, leading to memory corruption or a crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-62231/">CVE-2025-62231 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-62231">CVE-2025-62231 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251960">SUSE bug 1251960</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010031899" comment="tigervnc-1.8.0-36.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031900" comment="tigervnc-icons-1.8.0-36.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031901" comment="tigervnc-license-1.8.0-36.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031902" comment="tigervnc-server-1.8.0-36.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031903" comment="tigervnc-server-applet-1.8.0-36.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031904" comment="tigervnc-server-minimal-1.8.0-36.el7_9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010031905" comment="tigervnc-server-module-1.8.0-36.el7_9.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202562626" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-62626</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-62626" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62626" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-62626" ref_url="https://www.suse.com/security/cve/CVE-2025-62626" source="SUSE CVE"/>
		<reference ref_id="ESSA-2025:3472" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002250.html" source="SUSE-SU"/>
    <description>
    Improper handling of insufficient entropy in the AMD CPUs could allow a local attacker to influence the values returned by the RDSEED instruction, potentially resulting in the consumption of insufficiently random values.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2025-12-19"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-62626/">CVE-2025-62626 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-62626">CVE-2025-62626 at NVD</cve>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010030661" comment="iwl100-firmware-39.31.5.1-999.44.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010030662" comment="iwl1000-firmware-39.31.5.1-999.44.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010030663" comment="iwl105-firmware-18.168.6.1-999.44.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010030664" comment="iwl135-firmware-18.168.6.1-999.44.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010030665" comment="iwl2000-firmware-18.168.6.1-999.44.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010030666" comment="iwl2030-firmware-18.168.6.1-999.44.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010030667" comment="iwl3160-firmware-22.0.7.0-999.44.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010030668" comment="iwl3945-firmware-15.32.2.9-999.44.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010030669" comment="iwl4965-firmware-228.61.2.24-999.44.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010030670" comment="iwl5000-firmware-8.83.5.1_1-999.44.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010030671" comment="iwl5150-firmware-8.24.2.2-999.44.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010030672" comment="iwl6000-firmware-9.221.4.1-999.44.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010030673" comment="iwl6000g2a-firmware-17.168.5.3-999.44.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010030674" comment="iwl6000g2b-firmware-17.168.5.2-999.44.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010030675" comment="iwl6050-firmware-41.28.5.1-999.44.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010030676" comment="iwl7260-firmware-22.0.7.0-999.44.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010030677" comment="iwlax2xx-firmware-20251030-999.44.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010030678" comment="linux-firmware-20251030-999.44.1.gite9292517.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202564720" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-64720</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-64720" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-64720" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-64720" ref_url="https://www.suse.com/security/cve/CVE-2025-64720" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0125" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002348.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0210" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002416.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0238" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003141.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0241" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002359.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0847" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002501.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0927" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002409.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0928" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002427.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0932" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002431.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0933" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023774.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023744.html" source="SUSE-SU"/>
    <description>
    LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From version 1.6.0 to before 1.6.51, an out-of-bounds read vulnerability exists in png_image_read_composite when processing palette images with PNG_FLAG_OPTIMIZE_ALPHA enabled. The palette compositing code in png_init_read_transformations incorrectly applies background compositing during premultiplication, violating the invariant component ≤ alpha x 257 required by the simplified PNG API. This issue has been patched in version 1.6.51.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-13"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-64720/">CVE-2025-64720 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-64720">CVE-2025-64720 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254159">SUSE bug 1254159</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010043365" comment="java-11-openjdk-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043334" comment="java-11-openjdk-debug-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043366" comment="java-11-openjdk-demo-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043336" comment="java-11-openjdk-demo-debug-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043367" comment="java-11-openjdk-devel-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043340" comment="java-11-openjdk-devel-debug-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043368" comment="java-11-openjdk-headless-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043345" comment="java-11-openjdk-headless-debug-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043369" comment="java-11-openjdk-javadoc-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043349" comment="java-11-openjdk-javadoc-debug-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043370" comment="java-11-openjdk-javadoc-zip-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043351" comment="java-11-openjdk-javadoc-zip-debug-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043371" comment="java-11-openjdk-jmods-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043353" comment="java-11-openjdk-jmods-debug-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043372" comment="java-11-openjdk-src-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043358" comment="java-11-openjdk-src-debug-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043373" comment="java-11-openjdk-static-libs-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043362" comment="java-11-openjdk-static-libs-debug-11.0.30.0.7-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202565018" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-65018</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-65018" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-65018" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-65018" ref_url="https://www.suse.com/security/cve/CVE-2025-65018" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0125" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002348.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0210" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002416.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0238" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003141.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0241" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002359.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0847" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002501.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0927" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002409.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0928" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002427.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0932" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002431.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0933" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023774.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023744.html" source="SUSE-SU"/>
    <description>
    LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From version 1.6.0 to before 1.6.51, there is a heap buffer overflow vulnerability in the libpng simplified API function png_image_finish_read when processing 16-bit interlaced PNGs with 8-bit output format. Attacker-crafted interlaced PNG files cause heap writes beyond allocated buffer bounds. This issue has been patched in version 1.6.51.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-13"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-65018/">CVE-2025-65018 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-65018">CVE-2025-65018 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254160">SUSE bug 1254160</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010043365" comment="java-11-openjdk-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043334" comment="java-11-openjdk-debug-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043366" comment="java-11-openjdk-demo-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043336" comment="java-11-openjdk-demo-debug-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043367" comment="java-11-openjdk-devel-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043340" comment="java-11-openjdk-devel-debug-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043368" comment="java-11-openjdk-headless-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043345" comment="java-11-openjdk-headless-debug-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043369" comment="java-11-openjdk-javadoc-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043349" comment="java-11-openjdk-javadoc-debug-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043370" comment="java-11-openjdk-javadoc-zip-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043351" comment="java-11-openjdk-javadoc-zip-debug-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043371" comment="java-11-openjdk-jmods-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043353" comment="java-11-openjdk-jmods-debug-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043372" comment="java-11-openjdk-src-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043358" comment="java-11-openjdk-src-debug-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043373" comment="java-11-openjdk-static-libs-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043362" comment="java-11-openjdk-static-libs-debug-11.0.30.0.7-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568285" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68285</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68285" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68285" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68285" ref_url="https://www.suse.com/security/cve/CVE-2025-68285" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0755" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002421.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0793" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0941-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0944-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024779.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024778.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024786.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0958-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024809.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0970-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024807.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0992-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1099-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1132-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1136-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20792-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024873.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20817-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20863-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20865-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20866-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20885-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20887-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20888-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20889-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20897-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20898-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20899-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20900-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20944-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20945-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20946-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045205.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

libceph: fix potential use-after-free in have_mon_and_osd_map()

The wait loop in __ceph_open_session() can race with the client
receiving a new monmap or osdmap shortly after the initial map is
received.  Both ceph_monc_handle_map() and handle_one_map() install
a new map immediately after freeing the old one

    kfree(monc-&gt;monmap);
    monc-&gt;monmap = monmap;

    ceph_osdmap_destroy(osdc-&gt;osdmap);
    osdc-&gt;osdmap = newmap;

under client-&gt;monc.mutex and client-&gt;osdc.lock respectively, but
because neither is taken in have_mon_and_osd_map() it's possible for
client-&gt;monc.monmap-&gt;epoch and client-&gt;osdc.osdmap-&gt;epoch arms in

    client-&gt;monc.monmap &amp;&amp; client-&gt;monc.monmap-&gt;epoch &amp;&amp;
        client-&gt;osdc.osdmap &amp;&amp; client-&gt;osdc.osdmap-&gt;epoch;

condition to dereference an already freed map.  This happens to be
reproducible with generic/395 and generic/397 with KASAN enabled:

    BUG: KASAN: slab-use-after-free in have_mon_and_osd_map+0x56/0x70
    Read of size 4 at addr ffff88811012d810 by task mount.ceph/13305
    CPU: 2 UID: 0 PID: 13305 Comm: mount.ceph Not tainted 6.14.0-rc2-build2+ #1266
    ...
    Call Trace:
    &lt;TASK&gt;
    have_mon_and_osd_map+0x56/0x70
    ceph_open_session+0x182/0x290
    ceph_get_tree+0x333/0x680
    vfs_get_tree+0x49/0x180
    do_new_mount+0x1a3/0x2d0
    path_mount+0x6dd/0x730
    do_mount+0x99/0xe0
    __do_sys_mount+0x141/0x180
    do_syscall_64+0x9f/0x100
    entry_SYSCALL_64_after_hwframe+0x76/0x7e
    &lt;/TASK&gt;

    Allocated by task 13305:
    ceph_osdmap_alloc+0x16/0x130
    ceph_osdc_init+0x27a/0x4c0
    ceph_create_client+0x153/0x190
    create_fs_client+0x50/0x2a0
    ceph_get_tree+0xff/0x680
    vfs_get_tree+0x49/0x180
    do_new_mount+0x1a3/0x2d0
    path_mount+0x6dd/0x730
    do_mount+0x99/0xe0
    __do_sys_mount+0x141/0x180
    do_syscall_64+0x9f/0x100
    entry_SYSCALL_64_after_hwframe+0x76/0x7e

    Freed by task 9475:
    kfree+0x212/0x290
    handle_one_map+0x23c/0x3b0
    ceph_osdc_handle_map+0x3c9/0x590
    mon_dispatch+0x655/0x6f0
    ceph_con_process_message+0xc3/0xe0
    ceph_con_v1_try_read+0x614/0x760
    ceph_con_workfn+0x2de/0x650
    process_one_work+0x486/0x7c0
    process_scheduled_works+0x73/0x90
    worker_thread+0x1c8/0x2a0
    kthread+0x2ec/0x300
    ret_from_fork+0x24/0x40
    ret_from_fork_asm+0x1a/0x30

Rewrite the wait loop to check the above condition directly with
client-&gt;monc.mutex and client-&gt;osdc.lock taken as appropriate.  While
at it, improve the timeout handling (previously mount_timeout could be
exceeded in case wait_event_interruptible_timeout() slept more than
once) and access client-&gt;auth_err under client-&gt;monc.mutex to match
how it's set in finish_auth().

monmap_show() and osdmap_show() now take the respective lock before
accessing the map as well.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-24"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68285/">CVE-2025-68285 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68285">CVE-2025-68285 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255401">SUSE bug 1255401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255402">SUSE bug 1255402</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010039005" comment="bpftool-3.10.0-1160.145.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039006" comment="kernel-3.10.0-1160.145.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039007" comment="kernel-abi-whitelists-3.10.0-1160.145.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039008" comment="kernel-debug-3.10.0-1160.145.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039011" comment="kernel-doc-3.10.0-1160.145.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039012" comment="kernel-headers-3.10.0-1160.145.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039013" comment="kernel-tools-3.10.0-1160.145.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039014" comment="kernel-tools-libs-3.10.0-1160.145.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039016" comment="perf-3.10.0-1160.145.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039017" comment="python-perf-3.10.0-1160.145.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568349" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68349</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68349" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68349" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68349" ref_url="https://www.suse.com/security/cve/CVE-2025-68349" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2264" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002483.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2352" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002541.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2722" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003230.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3685" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

NFSv4/pNFS: Clear NFS_INO_LAYOUTCOMMIT in pnfs_mark_layout_stateid_invalid

Fixes a crash when layout is null during this call stack:

write_inode
    -&gt; nfs4_write_inode
        -&gt; pnfs_layoutcommit_inode

pnfs_set_layoutcommit relies on the lseg refcount to keep the layout
around. Need to clear NFS_INO_LAYOUTCOMMIT otherwise we might attempt
to reference a null layout.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-27"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68349/">CVE-2025-68349 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68349">CVE-2025-68349 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255544">SUSE bug 1255544</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010050974" comment="bpftool-3.10.0-1160.147.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050975" comment="kernel-3.10.0-1160.147.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050976" comment="kernel-abi-whitelists-3.10.0-1160.147.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050977" comment="kernel-debug-3.10.0-1160.147.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050978" comment="kernel-doc-3.10.0-1160.147.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050979" comment="kernel-headers-3.10.0-1160.147.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050980" comment="kernel-tools-3.10.0-1160.147.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050981" comment="kernel-tools-libs-3.10.0-1160.147.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050982" comment="perf-3.10.0-1160.147.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050983" comment="python-perf-3.10.0-1160.147.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20256965" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-6965</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-6965" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6965" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-6965" ref_url="https://www.suse.com/security/cve/CVE-2025-6965" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:11802" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001851.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:11803" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001848.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:11992" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001854.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:12010" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001847.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:12349" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001873.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:20936" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02672-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02744-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20674-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041627.html" source="SUSE-SU"/>
    <description>
    There exists a vulnerability in SQLite versions before 3.50.2 where the number of aggregate terms could exceed the number of columns available. This could lead to a memory corruption issue. We recommend upgrading to version 3.50.2 or above.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-08-06"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2025-6965/">CVE-2025-6965 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-6965">CVE-2025-6965 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246597">SUSE bug 1246597</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010012367" comment="lemon-3.7.17-9.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012368" comment="sqlite-3.7.17-9.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012369" comment="sqlite-devel-3.7.17-9.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012370" comment="sqlite-doc-3.7.17-9.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012371" comment="sqlite-tcl-3.7.17-9.el7_9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20258714" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-8714</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-8714" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8714" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-8714" ref_url="https://www.suse.com/security/cve/CVE-2025-8714" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:14827" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001947.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:14862" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003067.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:14878" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001958.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:14899" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001953.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:15021" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002076.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:15022" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002095.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16099" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02842-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02980-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02981-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02986-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02987-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02995-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03003-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03004-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03005-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03005-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03018-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041421.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03018-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041500.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041420.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03019-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03020-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03030-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03031-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041426.html" source="SUSE-SU"/>
    <description>
    Untrusted data inclusion in pg_dump in PostgreSQL allows a malicious superuser of the origin server to inject arbitrary code for restore-time execution as the client operating system account running psql to restore the dump, via psql meta-commands.  pg_dumpall is also affected.  pg_restore is affected when used to generate a plain-format dump.  This is similar to MySQL CVE-2024-21096.  Versions before PostgreSQL 17.6, 16.10, 15.14, 14.19, and 13.22 are affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-10-09"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8714/">CVE-2025-8714 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8714">CVE-2025-8714 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248122">SUSE bug 1248122</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010020296" comment="postgresql-9.2.24-9.el7_9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010020297" comment="postgresql-contrib-9.2.24-9.el7_9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010020298" comment="postgresql-devel-9.2.24-9.el7_9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010020299" comment="postgresql-docs-9.2.24-9.el7_9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010020300" comment="postgresql-libs-9.2.24-9.el7_9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010020301" comment="postgresql-plperl-9.2.24-9.el7_9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010020302" comment="postgresql-plpython-9.2.24-9.el7_9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010020303" comment="postgresql-pltcl-9.2.24-9.el7_9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010020304" comment="postgresql-server-9.2.24-9.el7_9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010020305" comment="postgresql-static-9.2.24-9.el7_9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010020306" comment="postgresql-test-9.2.24-9.el7_9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010020307" comment="postgresql-upgrade-9.2.24-9.el7_9.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20258941" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-8941</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-8941" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8941" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-8941" ref_url="https://www.suse.com/security/cve/CVE-2025-8941" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:15099" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001966.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:15106" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001982.html" source="SUSE-SU"/>
    <description>
    A flaw was found in linux-pam. The pam_namespace module may improperly handle user-controlled paths, allowing local users to exploit symlink attacks and race conditions to elevate their privileges to root. This CVE provides a "complete" fix for CVE-2025-6020.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-09-09"/>
	<updated date="2025-09-10"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8941/">CVE-2025-8941 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8941">CVE-2025-8941 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248073">SUSE bug 1248073</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010017231" comment="pam-1.1.8-23.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017232" comment="pam-devel-1.1.8-23.el7_9.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20259230" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-9230</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-9230" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-9230" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-9230" ref_url="https://www.suse.com/security/cve/CVE-2025-9230" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:21174" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002260.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21255" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003124.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1720" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002463.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2776" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03437-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03438-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03439-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03440-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03441-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03442-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03443-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03463-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03464-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03522-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03523-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03546-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03630-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03635-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023595.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3758-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024609.html" source="SUSE-SU"/>
    <description>
    Issue summary: An application trying to decrypt CMS messages encrypted using
password based encryption can trigger an out-of-bounds read and write.

Impact summary: This out-of-bounds read may trigger a crash which leads to
Denial of Service for an application. The out-of-bounds write can cause
a memory corruption which can have various consequences including
a Denial of Service or Execution of attacker-supplied code.

Although the consequences of a successful exploit of this vulnerability
could be severe, the probability that the attacker would be able to
perform it is low. Besides, password based (PWRI) encryption support in CMS
messages is very rarely used. For that reason the issue was assessed as
Moderate severity according to our Security Policy.

The FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this
issue, as the CMS implementation is outside the OpenSSL FIPS module
boundary.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-04"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-9230/">CVE-2025-9230 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9230">CVE-2025-9230 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250232">SUSE bug 1250232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250410">SUSE bug 1250410</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041699" comment="openssl-1.0.2k-26.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041700" comment="openssl-devel-1.0.2k-26.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041701" comment="openssl-libs-1.0.2k-26.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041702" comment="openssl-perl-1.0.2k-26.el7_9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041703" comment="openssl-static-1.0.2k-26.el7_9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20261299" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-1299</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-1299" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1299" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-1299" ref_url="https://www.suse.com/security/cve/CVE-2026-1299" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2128" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002475.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4165" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003253.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4168" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003263.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4216" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003265.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4463" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002569.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4473" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002580.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4746" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002594.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6464" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024676.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0884-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024596.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20951-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045283.html" source="SUSE-SU"/>
    <description>
    The 
email module, specifically the "BytesGenerator" class, didn't properly quote newlines for email headers when 
serializing an email message allowing for header injection when an email
 is serialized. This is only applicable if using "LiteralHeader" writing headers that don't respect email folding rules, the new behavior will reject the incorrectly folded headers in "BytesGenerator".
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-07"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N" cvss4="8.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-1299/">CVE-2026-1299 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-1299">CVE-2026-1299 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257181">SUSE bug 1257181</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010052848" comment="python3-3.6.8-21.el7_9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010052849" comment="python3-debug-3.6.8-21.el7_9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010052850" comment="python3-devel-3.6.8-21.el7_9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010052851" comment="python3-idle-3.6.8-21.el7_9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010052852" comment="python3-libs-3.6.8-21.el7_9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010052853" comment="python3-test-3.6.8-21.el7_9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010052854" comment="python3-tkinter-3.6.8-21.el7_9.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202621925" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-21925</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-21925" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21925" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-21925" ref_url="https://www.suse.com/security/cve/CVE-2026-21925" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0847" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002501.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0927" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002409.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0928" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002427.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0931" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002458.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0932" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002431.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0933" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0341-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0363-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024071.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2026-21925/">CVE-2026-21925 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21925">CVE-2026-21925 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257034">SUSE bug 1257034</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041186" comment="java-1.8.0-openjdk-1.8.0.482.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041187" comment="java-1.8.0-openjdk-accessibility-1.8.0.482.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041188" comment="java-1.8.0-openjdk-demo-1.8.0.482.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041189" comment="java-1.8.0-openjdk-devel-1.8.0.482.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041190" comment="java-1.8.0-openjdk-headless-1.8.0.482.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041191" comment="java-1.8.0-openjdk-javadoc-1.8.0.482.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041192" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.482.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041193" comment="java-1.8.0-openjdk-src-1.8.0.482.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043365" comment="java-11-openjdk-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043334" comment="java-11-openjdk-debug-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043366" comment="java-11-openjdk-demo-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043336" comment="java-11-openjdk-demo-debug-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043367" comment="java-11-openjdk-devel-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043340" comment="java-11-openjdk-devel-debug-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043368" comment="java-11-openjdk-headless-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043345" comment="java-11-openjdk-headless-debug-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043369" comment="java-11-openjdk-javadoc-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043349" comment="java-11-openjdk-javadoc-debug-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043370" comment="java-11-openjdk-javadoc-zip-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043351" comment="java-11-openjdk-javadoc-zip-debug-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043371" comment="java-11-openjdk-jmods-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043353" comment="java-11-openjdk-jmods-debug-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043372" comment="java-11-openjdk-src-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043358" comment="java-11-openjdk-src-debug-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043373" comment="java-11-openjdk-static-libs-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043362" comment="java-11-openjdk-static-libs-debug-11.0.30.0.7-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202621933" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-21933</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-21933" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21933" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-21933" ref_url="https://www.suse.com/security/cve/CVE-2026-21933" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0847" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002501.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0927" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002409.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0928" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002427.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0931" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002458.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0932" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002431.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0933" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0341-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0363-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024071.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2026-21933/">CVE-2026-21933 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21933">CVE-2026-21933 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257037">SUSE bug 1257037</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041186" comment="java-1.8.0-openjdk-1.8.0.482.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041187" comment="java-1.8.0-openjdk-accessibility-1.8.0.482.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041188" comment="java-1.8.0-openjdk-demo-1.8.0.482.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041189" comment="java-1.8.0-openjdk-devel-1.8.0.482.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041190" comment="java-1.8.0-openjdk-headless-1.8.0.482.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041191" comment="java-1.8.0-openjdk-javadoc-1.8.0.482.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041192" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.482.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041193" comment="java-1.8.0-openjdk-src-1.8.0.482.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043365" comment="java-11-openjdk-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043334" comment="java-11-openjdk-debug-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043366" comment="java-11-openjdk-demo-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043336" comment="java-11-openjdk-demo-debug-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043367" comment="java-11-openjdk-devel-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043340" comment="java-11-openjdk-devel-debug-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043368" comment="java-11-openjdk-headless-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043345" comment="java-11-openjdk-headless-debug-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043369" comment="java-11-openjdk-javadoc-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043349" comment="java-11-openjdk-javadoc-debug-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043370" comment="java-11-openjdk-javadoc-zip-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043351" comment="java-11-openjdk-javadoc-zip-debug-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043371" comment="java-11-openjdk-jmods-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043353" comment="java-11-openjdk-jmods-debug-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043372" comment="java-11-openjdk-src-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043358" comment="java-11-openjdk-src-debug-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043373" comment="java-11-openjdk-static-libs-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043362" comment="java-11-openjdk-static-libs-debug-11.0.30.0.7-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202621945" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-21945</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-21945" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21945" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-21945" ref_url="https://www.suse.com/security/cve/CVE-2026-21945" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0847" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002501.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0927" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002409.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0928" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002427.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0931" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002458.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0932" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002431.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0933" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0341-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0363-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024071.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-21945/">CVE-2026-21945 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21945">CVE-2026-21945 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257038">SUSE bug 1257038</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010041186" comment="java-1.8.0-openjdk-1.8.0.482.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041187" comment="java-1.8.0-openjdk-accessibility-1.8.0.482.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041188" comment="java-1.8.0-openjdk-demo-1.8.0.482.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041189" comment="java-1.8.0-openjdk-devel-1.8.0.482.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041190" comment="java-1.8.0-openjdk-headless-1.8.0.482.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041191" comment="java-1.8.0-openjdk-javadoc-1.8.0.482.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041192" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.482.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010041193" comment="java-1.8.0-openjdk-src-1.8.0.482.b08-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043365" comment="java-11-openjdk-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043334" comment="java-11-openjdk-debug-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043366" comment="java-11-openjdk-demo-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043336" comment="java-11-openjdk-demo-debug-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043367" comment="java-11-openjdk-devel-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043340" comment="java-11-openjdk-devel-debug-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043368" comment="java-11-openjdk-headless-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043345" comment="java-11-openjdk-headless-debug-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043369" comment="java-11-openjdk-javadoc-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043349" comment="java-11-openjdk-javadoc-debug-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043370" comment="java-11-openjdk-javadoc-zip-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043351" comment="java-11-openjdk-javadoc-zip-debug-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043371" comment="java-11-openjdk-jmods-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043353" comment="java-11-openjdk-jmods-debug-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043372" comment="java-11-openjdk-src-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043358" comment="java-11-openjdk-src-debug-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043373" comment="java-11-openjdk-static-libs-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043362" comment="java-11-openjdk-static-libs-debug-11.0.30.0.7-1.el7_9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623074" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23074</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23074" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23074" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23074" ref_url="https://www.suse.com/security/cve/CVE-2026-23074" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3083" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002524.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3685" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1131-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1180-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1187-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1188-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1212-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1221-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1222-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045332.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1236-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1237-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1239-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1242-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1244-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1248-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1254-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1258-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045428.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1259-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1261-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1262-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1263-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1265-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045423.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1266-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1268-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045421.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1269-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1270-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045418.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1271-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1274-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1278-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1279-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1280-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045412.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1283-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045410.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1284-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1285-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1287-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1288-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1297-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1298-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21004-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21005-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045401.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21006-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21007-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21009-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045397.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21020-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21042-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21051-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21053-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21054-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21055-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21056-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21057-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21058-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21059-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21060-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21061-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21070-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045454.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21071-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21072-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21073-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21074-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21075-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21076-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21077-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21078-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21079-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21080-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21081-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21082-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21083-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21084-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21085-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21086-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21087-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21088-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21089-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21090-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21091-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045433.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/sched: Enforce that teql can only be used as root qdisc

Design intent of teql is that it is only supposed to be used as root qdisc.
We need to check for that constraint.

Although not important, I will describe the scenario that unearthed this
issue for the curious.

GangMin Kim &lt;km.kim1503@gmail.com&gt; managed to concot a scenario as follows:

ROOT qdisc 1:0 (QFQ)
  ├── class 1:1 (weight=15, lmax=16384) netem with delay 6.4s
   ── class 1:2 (weight=1, lmax=1514) teql

GangMin sends a packet which is enqueued to 1:1 (netem).
Any invocation of dequeue by QFQ from this class will not return a packet
until after 6.4s. In the meantime, a second packet is sent and it lands on
1:2. teql's enqueue will return success and this will activate class 1:2.
Main issue is that teql only updates the parent visible qlen (sch-&gt;q.qlen)
at dequeue. Since QFQ will only call dequeue if peek succeeds (and teql's
peek always returns NULL), dequeue will never be called and thus the qlen
will remain as 0. With that in mind, when GangMin updates 1:2's lmax value,
the qfq_change_class calls qfq_deact_rm_from_agg. Since the child qdisc's
qlen was not incremented, qfq fails to deactivate the class, but still
frees its pointers from the aggregate. So when the first packet is
rescheduled after 6.4 seconds (netem's delay), a dangling pointer is
accessed causing GangMin's causing a UAF.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-27"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23074/">CVE-2026-23074 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23074">CVE-2026-23074 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257749">SUSE bug 1257749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258051">SUSE bug 1258051</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010050974" comment="bpftool-3.10.0-1160.147.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050975" comment="kernel-3.10.0-1160.147.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050976" comment="kernel-abi-whitelists-3.10.0-1160.147.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050977" comment="kernel-debug-3.10.0-1160.147.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050978" comment="kernel-doc-3.10.0-1160.147.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050979" comment="kernel-headers-3.10.0-1160.147.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050980" comment="kernel-tools-3.10.0-1160.147.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050981" comment="kernel-tools-libs-3.10.0-1160.147.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050982" comment="perf-3.10.0-1160.147.1.el7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050983" comment="python-perf-3.10.0-1160.147.1.el7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623490" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23490</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 7 LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23490" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23490" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23490" ref_url="https://www.suse.com/security/cve/CVE-2026-23490" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1903" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003192.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1904" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002484.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1906" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002485.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3359" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003255.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4141" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002592.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4146" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002558.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4148" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20133-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024488.html" source="SUSE-SU"/>
    <description>
    pyasn1 is a generic ASN.1 library for Python. Prior to 0.6.2, a Denial-of-Service issue has been found that leads to memory exhaustion from malformed RELATIVE-OID with excessive continuation octets. This vulnerability is fixed in 0.6.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-25"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-23490/">CVE-2026-23490 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23490">CVE-2026-23490 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256902">SUSE bug 1256902</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010050068" comment="python2-pyasn1-0.1.9-7.el7_9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010050069" comment="python2-pyasn1-modules-0.1.9-7.el7_9.2 is installed"/>
			</criteria>
		</criteria>
</definition>
</definitions>
<tests>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820671" version="1" comment="mailx is &lt;12.5-12.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820086" version="1" comment="sles_es-release-server is &gt;=7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820981" version="1" comment="java-1.6.0-openjdk is &lt;1.6.0.35-1.13.7.1.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820982" version="1" comment="java-1.6.0-openjdk-demo is &lt;1.6.0.35-1.13.7.1.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820983" version="1" comment="java-1.6.0-openjdk-devel is &lt;1.6.0.35-1.13.7.1.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820984" version="1" comment="java-1.6.0-openjdk-javadoc is &lt;1.6.0.35-1.13.7.1.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820985" version="1" comment="java-1.6.0-openjdk-src is &lt;1.6.0.35-1.13.7.1.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820974" version="1" comment="java-1.7.0-openjdk is &lt;1.7.0.79-2.5.5.1.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820975" version="1" comment="java-1.7.0-openjdk-accessibility is &lt;1.7.0.79-2.5.5.1.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820976" version="1" comment="java-1.7.0-openjdk-demo is &lt;1.7.0.79-2.5.5.1.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820977" version="1" comment="java-1.7.0-openjdk-devel is &lt;1.7.0.79-2.5.5.1.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820978" version="1" comment="java-1.7.0-openjdk-headless is &lt;1.7.0.79-2.5.5.1.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820979" version="1" comment="java-1.7.0-openjdk-javadoc is &lt;1.7.0.79-2.5.5.1.el7_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820980" version="1" comment="java-1.7.0-openjdk-src is &lt;1.7.0.79-2.5.5.1.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820986" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.45-30.b13.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820987" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.45-30.b13.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820988" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.45-30.b13.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820989" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.45-30.b13.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820990" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.45-30.b13.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820991" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.45-30.b13.el7_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820992" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.45-30.b13.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820158" version="1" comment="openssl is &lt;1.0.1e-34.el7_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820159" version="1" comment="openssl-devel is &lt;1.0.1e-34.el7_0.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820160" version="1" comment="openssl-libs is &lt;1.0.1e-34.el7_0.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820161" version="1" comment="openssl-perl is &lt;1.0.1e-34.el7_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820162" version="1" comment="openssl-static is &lt;1.0.1e-34.el7_0.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820888" version="1" comment="ipa-admintools is &lt;4.1.0-18.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820889" version="1" comment="ipa-client is &lt;4.1.0-18.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820890" version="1" comment="ipa-python is &lt;4.1.0-18.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820891" version="1" comment="ipa-server is &lt;4.1.0-18.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820892" version="1" comment="ipa-server-trust-ad is &lt;4.1.0-18.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821413" version="1" comment="kernel is &lt;3.10.0-327.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821414" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-327.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821415" version="1" comment="kernel-debug is &lt;3.10.0-327.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821418" version="1" comment="kernel-doc is &lt;3.10.0-327.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821419" version="1" comment="kernel-headers is &lt;3.10.0-327.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821420" version="1" comment="kernel-tools is &lt;3.10.0-327.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821421" version="1" comment="kernel-tools-libs is &lt;3.10.0-327.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821423" version="1" comment="perf is &lt;3.10.0-327.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821424" version="1" comment="python-perf is &lt;3.10.0-327.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998143" version="1" comment="perl-File-Find-Rule is &lt;0.33-5.el7_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998142" version="1" comment="perl-File-Find-Rule-Perl is &lt;1.13-2.el7_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821410" version="1" comment="xfsprogs is &lt;3.2.2-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821411" version="1" comment="xfsprogs-devel is &lt;3.2.2-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821412" version="1" comment="xfsprogs-qa-devel is &lt;3.2.2-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821446" version="1" comment="rubygem-bundler is &lt;1.7.8-3.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821447" version="1" comment="rubygem-bundler-doc is &lt;1.7.8-3.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821448" version="1" comment="rubygem-thor is &lt;0.19.1-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821449" version="1" comment="rubygem-thor-doc is &lt;0.19.1-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821393" version="1" comment="python is &lt;2.7.5-34.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821394" version="1" comment="python-debug is &lt;2.7.5-34.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821395" version="1" comment="python-devel is &lt;2.7.5-34.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821396" version="1" comment="python-libs is &lt;2.7.5-34.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821397" version="1" comment="python-test is &lt;2.7.5-34.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821398" version="1" comment="python-tools is &lt;2.7.5-34.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821399" version="1" comment="tkinter is &lt;2.7.5-34.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828224" version="1" comment="libsrtp is &lt;1.4.4-11.20101004cvs.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828225" version="1" comment="libsrtp-devel is &lt;1.4.4-11.20101004cvs.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820632" version="1" comment="kernel is &lt;3.10.0-123.13.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820633" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-123.13.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820634" version="1" comment="kernel-debug is &lt;3.10.0-123.13.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820637" version="1" comment="kernel-doc is &lt;3.10.0-123.13.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820638" version="1" comment="kernel-headers is &lt;3.10.0-123.13.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820639" version="1" comment="kernel-tools is &lt;3.10.0-123.13.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820640" version="1" comment="kernel-tools-libs is &lt;3.10.0-123.13.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820642" version="1" comment="perf is &lt;3.10.0-123.13.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820643" version="1" comment="python-perf is &lt;3.10.0-123.13.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820429" version="1" comment="xerces-j2 is &lt;2.11.0-17.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820430" version="1" comment="xerces-j2-demo is &lt;2.11.0-17.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820431" version="1" comment="xerces-j2-javadoc is &lt;2.11.0-17.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820289" version="1" comment="libcacard is &lt;1.5.3-60.el7_0.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820290" version="1" comment="libcacard-devel is &lt;1.5.3-60.el7_0.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820291" version="1" comment="libcacard-tools is &lt;1.5.3-60.el7_0.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820292" version="1" comment="qemu-guest-agent is &lt;1.5.3-60.el7_0.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820293" version="1" comment="qemu-img is &lt;1.5.3-60.el7_0.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820294" version="1" comment="qemu-kvm is &lt;1.5.3-60.el7_0.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820295" version="1" comment="qemu-kvm-common is &lt;1.5.3-60.el7_0.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820296" version="1" comment="qemu-kvm-tools is &lt;1.5.3-60.el7_0.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820174" version="1" comment="tomcat is &lt;7.0.42-5.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820175" version="1" comment="tomcat-admin-webapps is &lt;7.0.42-5.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820176" version="1" comment="tomcat-docs-webapp is &lt;7.0.42-5.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820177" version="1" comment="tomcat-el-2.2-api is &lt;7.0.42-5.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820178" version="1" comment="tomcat-javadoc is &lt;7.0.42-5.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820179" version="1" comment="tomcat-jsp-2.2-api is &lt;7.0.42-5.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820180" version="1" comment="tomcat-jsvc is &lt;7.0.42-5.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820181" version="1" comment="tomcat-lib is &lt;7.0.42-5.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820182" version="1" comment="tomcat-servlet-3.0-api is &lt;7.0.42-5.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820183" version="1" comment="tomcat-webapps is &lt;7.0.42-5.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822375" version="1" comment="kernel is &lt;3.10.0-514.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822376" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-514.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822377" version="1" comment="kernel-debug is &lt;3.10.0-514.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822380" version="1" comment="kernel-doc is &lt;3.10.0-514.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822381" version="1" comment="kernel-headers is &lt;3.10.0-514.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822382" version="1" comment="kernel-tools is &lt;3.10.0-514.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822383" version="1" comment="kernel-tools-libs is &lt;3.10.0-514.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822385" version="1" comment="perf is &lt;3.10.0-514.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822386" version="1" comment="python-perf is &lt;3.10.0-514.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820269" version="1" comment="httpd is &lt;2.4.6-18.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820270" version="1" comment="httpd-devel is &lt;2.4.6-18.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820271" version="1" comment="httpd-manual is &lt;2.4.6-18.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820272" version="1" comment="httpd-tools is &lt;2.4.6-18.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820273" version="1" comment="mod_ldap is &lt;2.4.6-18.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820274" version="1" comment="mod_proxy_html is &lt;2.4.6-18.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820275" version="1" comment="mod_session is &lt;2.4.6-18.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820276" version="1" comment="mod_ssl is &lt;2.4.6-18.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822734" version="1" comment="ghostscript is &lt;9.07-20.el7_3.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822735" version="1" comment="ghostscript-cups is &lt;9.07-20.el7_3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822736" version="1" comment="ghostscript-devel is &lt;9.07-20.el7_3.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822737" version="1" comment="ghostscript-doc is &lt;9.07-20.el7_3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822738" version="1" comment="ghostscript-gtk is &lt;9.07-20.el7_3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820845" version="1" comment="httpd is &lt;2.4.6-31.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820846" version="1" comment="httpd-devel is &lt;2.4.6-31.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820847" version="1" comment="httpd-manual is &lt;2.4.6-31.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820848" version="1" comment="httpd-tools is &lt;2.4.6-31.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820849" version="1" comment="mod_ldap is &lt;2.4.6-31.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820850" version="1" comment="mod_proxy_html is &lt;2.4.6-31.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820851" version="1" comment="mod_session is &lt;2.4.6-31.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820852" version="1" comment="mod_ssl is &lt;2.4.6-31.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820195" version="1" comment="json-c is &lt;0.11-4.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820196" version="1" comment="json-c-devel is &lt;0.11-4.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820197" version="1" comment="json-c-doc is &lt;0.11-4.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820644" version="1" comment="rpm is &lt;4.11.1-18.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820645" version="1" comment="rpm-apidocs is &lt;4.11.1-18.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820646" version="1" comment="rpm-build is &lt;4.11.1-18.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820647" version="1" comment="rpm-build-libs is &lt;4.11.1-18.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820648" version="1" comment="rpm-cron is &lt;4.11.1-18.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820649" version="1" comment="rpm-devel is &lt;4.11.1-18.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820650" version="1" comment="rpm-libs is &lt;4.11.1-18.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820651" version="1" comment="rpm-python is &lt;4.11.1-18.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820652" version="1" comment="rpm-sign is &lt;4.11.1-18.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820328" version="1" comment="php is &lt;5.4.16-23.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820329" version="1" comment="php-bcmath is &lt;5.4.16-23.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820330" version="1" comment="php-cli is &lt;5.4.16-23.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820331" version="1" comment="php-common is &lt;5.4.16-23.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820332" version="1" comment="php-dba is &lt;5.4.16-23.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820333" version="1" comment="php-devel is &lt;5.4.16-23.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820334" version="1" comment="php-embedded is &lt;5.4.16-23.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820335" version="1" comment="php-enchant is &lt;5.4.16-23.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820336" version="1" comment="php-fpm is &lt;5.4.16-23.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820337" version="1" comment="php-gd is &lt;5.4.16-23.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820338" version="1" comment="php-intl is &lt;5.4.16-23.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820339" version="1" comment="php-ldap is &lt;5.4.16-23.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820340" version="1" comment="php-mbstring is &lt;5.4.16-23.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820341" version="1" comment="php-mysql is &lt;5.4.16-23.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820342" version="1" comment="php-mysqlnd is &lt;5.4.16-23.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820343" version="1" comment="php-odbc is &lt;5.4.16-23.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820344" version="1" comment="php-pdo is &lt;5.4.16-23.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820345" version="1" comment="php-pgsql is &lt;5.4.16-23.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820346" version="1" comment="php-process is &lt;5.4.16-23.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820347" version="1" comment="php-pspell is &lt;5.4.16-23.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820348" version="1" comment="php-recode is &lt;5.4.16-23.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820349" version="1" comment="php-snmp is &lt;5.4.16-23.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820350" version="1" comment="php-soap is &lt;5.4.16-23.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820351" version="1" comment="php-xml is &lt;5.4.16-23.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820352" version="1" comment="php-xmlrpc is &lt;5.4.16-23.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821452" version="1" comment="glibc is &lt;2.17-105.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821453" version="1" comment="glibc-common is &lt;2.17-105.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821454" version="1" comment="glibc-devel is &lt;2.17-105.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821455" version="1" comment="glibc-headers is &lt;2.17-105.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821456" version="1" comment="glibc-static is &lt;2.17-105.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821457" version="1" comment="glibc-utils is &lt;2.17-105.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821458" version="1" comment="nscd is &lt;2.17-105.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711319" version="1" comment="kernel-default is ==3.12.38-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711320" version="1" comment="kgraft-patch-3_12_38-44-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711323" version="1" comment="kernel-default is ==3.12.39-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711324" version="1" comment="kgraft-patch-3_12_39-47-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711326" version="1" comment="kernel-default is ==3.12.43-52.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711327" version="1" comment="kgraft-patch-3_12_43-52_6-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711329" version="1" comment="kernel-default is ==3.12.44-52.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711330" version="1" comment="kgraft-patch-3_12_44-52_10-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711332" version="1" comment="kernel-default is ==3.12.44-52.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711333" version="1" comment="kgraft-patch-3_12_44-52_18-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711335" version="1" comment="kernel-default is ==3.12.48-52.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711336" version="1" comment="kgraft-patch-3_12_48-52_27-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714891" version="1" comment="kernel-default is ==3.12.49-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711338" version="1" comment="kgraft-patch-3_12_49-11-default is &gt;=5-14.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711340" version="1" comment="kernel-default is ==3.12.51-52.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711341" version="1" comment="kgraft-patch-3_12_51-52_31-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711343" version="1" comment="kernel-default is ==3.12.51-52.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711344" version="1" comment="kgraft-patch-3_12_51-52_34-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711346" version="1" comment="kernel-default is ==3.12.51-52.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711347" version="1" comment="kgraft-patch-3_12_51-52_39-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711349" version="1" comment="kernel-default is ==3.12.51-60.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711350" version="1" comment="kgraft-patch-3_12_51-60_20-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711352" version="1" comment="kernel-default is ==3.12.51-60.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711353" version="1" comment="kgraft-patch-3_12_51-60_25-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711355" version="1" comment="kernel-default is ==3.12.53-60.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711356" version="1" comment="kgraft-patch-3_12_53-60_30-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711358" version="1" comment="kernel-default is ==3.12.57-60.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711359" version="1" comment="kgraft-patch-3_12_57-60_35-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711361" version="1" comment="kernel-default is ==3.12.59-60.41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711362" version="1" comment="kgraft-patch-3_12_59-60_41-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711364" version="1" comment="kernel-default is ==3.12.59-60.45.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711365" version="1" comment="kgraft-patch-3_12_59-60_45-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129402" version="1" comment="kernel-default is &lt;3.12.59-60.45.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820219" version="1" comment="tomcat is &lt;7.0.42-6.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820220" version="1" comment="tomcat-admin-webapps is &lt;7.0.42-6.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820221" version="1" comment="tomcat-docs-webapp is &lt;7.0.42-6.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820222" version="1" comment="tomcat-el-2.2-api is &lt;7.0.42-6.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820223" version="1" comment="tomcat-javadoc is &lt;7.0.42-6.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820224" version="1" comment="tomcat-jsp-2.2-api is &lt;7.0.42-6.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820225" version="1" comment="tomcat-jsvc is &lt;7.0.42-6.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820226" version="1" comment="tomcat-lib is &lt;7.0.42-6.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820227" version="1" comment="tomcat-servlet-3.0-api is &lt;7.0.42-6.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820228" version="1" comment="tomcat-webapps is &lt;7.0.42-6.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820365" version="1" comment="tomcat is &lt;7.0.42-8.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820366" version="1" comment="tomcat-admin-webapps is &lt;7.0.42-8.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820367" version="1" comment="tomcat-docs-webapp is &lt;7.0.42-8.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820368" version="1" comment="tomcat-el-2.2-api is &lt;7.0.42-8.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820369" version="1" comment="tomcat-javadoc is &lt;7.0.42-8.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820370" version="1" comment="tomcat-jsp-2.2-api is &lt;7.0.42-8.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820371" version="1" comment="tomcat-jsvc is &lt;7.0.42-8.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820372" version="1" comment="tomcat-lib is &lt;7.0.42-8.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820373" version="1" comment="tomcat-servlet-3.0-api is &lt;7.0.42-8.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820374" version="1" comment="tomcat-webapps is &lt;7.0.42-8.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820229" version="1" comment="libsmbclient is &lt;4.1.1-35.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820230" version="1" comment="libsmbclient-devel is &lt;4.1.1-35.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820231" version="1" comment="libwbclient is &lt;4.1.1-35.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820232" version="1" comment="libwbclient-devel is &lt;4.1.1-35.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820233" version="1" comment="samba is &lt;4.1.1-35.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820234" version="1" comment="samba-client is &lt;4.1.1-35.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820235" version="1" comment="samba-common is &lt;4.1.1-35.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820236" version="1" comment="samba-dc is &lt;4.1.1-35.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820237" version="1" comment="samba-dc-libs is &lt;4.1.1-35.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820238" version="1" comment="samba-devel is &lt;4.1.1-35.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820239" version="1" comment="samba-libs is &lt;4.1.1-35.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820240" version="1" comment="samba-pidl is &lt;4.1.1-35.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820241" version="1" comment="samba-python is &lt;4.1.1-35.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820242" version="1" comment="samba-test is &lt;4.1.1-35.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820243" version="1" comment="samba-test-devel is &lt;4.1.1-35.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820244" version="1" comment="samba-vfs-glusterfs is &lt;4.1.1-35.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820245" version="1" comment="samba-winbind is &lt;4.1.1-35.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820246" version="1" comment="samba-winbind-clients is &lt;4.1.1-35.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820247" version="1" comment="samba-winbind-krb5-locator is &lt;4.1.1-35.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820248" version="1" comment="samba-winbind-modules is &lt;4.1.1-35.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820249" version="1" comment="libvirt is &lt;1.1.1-29.el7_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820250" version="1" comment="libvirt-client is &lt;1.1.1-29.el7_0.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820251" version="1" comment="libvirt-daemon is &lt;1.1.1-29.el7_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820252" version="1" comment="libvirt-daemon-config-network is &lt;1.1.1-29.el7_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820253" version="1" comment="libvirt-daemon-config-nwfilter is &lt;1.1.1-29.el7_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820254" version="1" comment="libvirt-daemon-driver-interface is &lt;1.1.1-29.el7_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820255" version="1" comment="libvirt-daemon-driver-lxc is &lt;1.1.1-29.el7_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820256" version="1" comment="libvirt-daemon-driver-network is &lt;1.1.1-29.el7_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820257" version="1" comment="libvirt-daemon-driver-nodedev is &lt;1.1.1-29.el7_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820258" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;1.1.1-29.el7_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820259" version="1" comment="libvirt-daemon-driver-qemu is &lt;1.1.1-29.el7_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820260" version="1" comment="libvirt-daemon-driver-secret is &lt;1.1.1-29.el7_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820261" version="1" comment="libvirt-daemon-driver-storage is &lt;1.1.1-29.el7_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820262" version="1" comment="libvirt-daemon-kvm is &lt;1.1.1-29.el7_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820263" version="1" comment="libvirt-daemon-lxc is &lt;1.1.1-29.el7_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820264" version="1" comment="libvirt-devel is &lt;1.1.1-29.el7_0.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820265" version="1" comment="libvirt-docs is &lt;1.1.1-29.el7_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820266" version="1" comment="libvirt-lock-sanlock is &lt;1.1.1-29.el7_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820267" version="1" comment="libvirt-login-shell is &lt;1.1.1-29.el7_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820268" version="1" comment="libvirt-python is &lt;1.1.1-29.el7_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820353" version="1" comment="kernel is &lt;3.10.0-123.6.3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820354" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-123.6.3.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820355" version="1" comment="kernel-debug is &lt;3.10.0-123.6.3.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820358" version="1" comment="kernel-doc is &lt;3.10.0-123.6.3.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820359" version="1" comment="kernel-headers is &lt;3.10.0-123.6.3.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820360" version="1" comment="kernel-tools is &lt;3.10.0-123.6.3.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820361" version="1" comment="kernel-tools-libs is &lt;3.10.0-123.6.3.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820363" version="1" comment="perf is &lt;3.10.0-123.6.3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820364" version="1" comment="python-perf is &lt;3.10.0-123.6.3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820944" version="1" comment="libxml2 is &lt;2.9.1-5.el7_1.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820945" version="1" comment="libxml2-devel is &lt;2.9.1-5.el7_1.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820946" version="1" comment="libxml2-python is &lt;2.9.1-5.el7_1.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820947" version="1" comment="libxml2-static is &lt;2.9.1-5.el7_1.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820146" version="1" comment="kernel is &lt;3.10.0-123.1.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820147" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-123.1.2.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820148" version="1" comment="kernel-debug is &lt;3.10.0-123.1.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820151" version="1" comment="kernel-doc is &lt;3.10.0-123.1.2.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820152" version="1" comment="kernel-headers is &lt;3.10.0-123.1.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820153" version="1" comment="kernel-tools is &lt;3.10.0-123.1.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820154" version="1" comment="kernel-tools-libs is &lt;3.10.0-123.1.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820156" version="1" comment="perf is &lt;3.10.0-123.1.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820157" version="1" comment="python-perf is &lt;3.10.0-123.1.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820206" version="1" comment="kernel is &lt;3.10.0-123.4.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820207" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-123.4.2.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820208" version="1" comment="kernel-debug is &lt;3.10.0-123.4.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820211" version="1" comment="kernel-doc is &lt;3.10.0-123.4.2.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820212" version="1" comment="kernel-headers is &lt;3.10.0-123.4.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820213" version="1" comment="kernel-tools is &lt;3.10.0-123.4.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820214" version="1" comment="kernel-tools-libs is &lt;3.10.0-123.4.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820216" version="1" comment="perf is &lt;3.10.0-123.4.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820217" version="1" comment="python-perf is &lt;3.10.0-123.4.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821431" version="1" comment="file is &lt;5.11-31.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821432" version="1" comment="file-devel is &lt;5.11-31.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821433" version="1" comment="file-libs is &lt;5.11-31.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821434" version="1" comment="file-static is &lt;5.11-31.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821435" version="1" comment="python-magic is &lt;5.11-31.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820602" version="1" comment="libXfont is &lt;1.4.7-2.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820603" version="1" comment="libXfont-devel is &lt;1.4.7-2.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820163" version="1" comment="openssl098e is &lt;0.9.8e-29.el7_0.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820998" version="1" comment="tomcat is &lt;7.0.54-2.el7_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820999" version="1" comment="tomcat-admin-webapps is &lt;7.0.54-2.el7_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821000" version="1" comment="tomcat-docs-webapp is &lt;7.0.54-2.el7_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821001" version="1" comment="tomcat-el-2.2-api is &lt;7.0.54-2.el7_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821002" version="1" comment="tomcat-javadoc is &lt;7.0.54-2.el7_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821003" version="1" comment="tomcat-jsp-2.2-api is &lt;7.0.54-2.el7_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821004" version="1" comment="tomcat-jsvc is &lt;7.0.54-2.el7_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821005" version="1" comment="tomcat-lib is &lt;7.0.54-2.el7_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821006" version="1" comment="tomcat-servlet-3.0-api is &lt;7.0.54-2.el7_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821007" version="1" comment="tomcat-webapps is &lt;7.0.54-2.el7_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820386" version="1" comment="mod_wsgi is &lt;3.4-12.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820187" version="1" comment="mariadb is &lt;5.5.37-1.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820188" version="1" comment="mariadb-bench is &lt;5.5.37-1.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820189" version="1" comment="mariadb-devel is &lt;5.5.37-1.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820190" version="1" comment="mariadb-embedded is &lt;5.5.37-1.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820191" version="1" comment="mariadb-embedded-devel is &lt;5.5.37-1.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820192" version="1" comment="mariadb-libs is &lt;5.5.37-1.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820193" version="1" comment="mariadb-server is &lt;5.5.37-1.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820194" version="1" comment="mariadb-test is &lt;5.5.37-1.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820169" version="1" comment="java-1.6.0-openjdk is &lt;1.6.0.0-6.1.13.3.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820170" version="1" comment="java-1.6.0-openjdk-demo is &lt;1.6.0.0-6.1.13.3.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820171" version="1" comment="java-1.6.0-openjdk-devel is &lt;1.6.0.0-6.1.13.3.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820172" version="1" comment="java-1.6.0-openjdk-javadoc is &lt;1.6.0.0-6.1.13.3.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820173" version="1" comment="java-1.6.0-openjdk-src is &lt;1.6.0.0-6.1.13.3.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820139" version="1" comment="java-1.7.0-openjdk is &lt;1.7.0.55-2.4.7.2.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820140" version="1" comment="java-1.7.0-openjdk-accessibility is &lt;1.7.0.55-2.4.7.2.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820141" version="1" comment="java-1.7.0-openjdk-demo is &lt;1.7.0.55-2.4.7.2.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820142" version="1" comment="java-1.7.0-openjdk-devel is &lt;1.7.0.55-2.4.7.2.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820143" version="1" comment="java-1.7.0-openjdk-headless is &lt;1.7.0.55-2.4.7.2.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820144" version="1" comment="java-1.7.0-openjdk-javadoc is &lt;1.7.0.55-2.4.7.2.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820145" version="1" comment="java-1.7.0-openjdk-src is &lt;1.7.0.55-2.4.7.2.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820387" version="1" comment="glibc is &lt;2.17-55.el7_0.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820388" version="1" comment="glibc-common is &lt;2.17-55.el7_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820389" version="1" comment="glibc-devel is &lt;2.17-55.el7_0.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820390" version="1" comment="glibc-headers is &lt;2.17-55.el7_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820391" version="1" comment="glibc-static is &lt;2.17-55.el7_0.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820392" version="1" comment="glibc-utils is &lt;2.17-55.el7_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820393" version="1" comment="nscd is &lt;2.17-55.el7_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824784" version="1" comment="zsh is &lt;5.0.2-31.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824785" version="1" comment="zsh-html is &lt;5.0.2-31.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820375" version="1" comment="nss is &lt;3.16.2-2.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820376" version="1" comment="nss-devel is &lt;3.16.2-2.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820377" version="1" comment="nss-pkcs11-devel is &lt;3.16.2-2.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820378" version="1" comment="nss-softokn is &lt;3.16.2-1.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820379" version="1" comment="nss-softokn-devel is &lt;3.16.2-1.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820380" version="1" comment="nss-softokn-freebl is &lt;3.16.2-1.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820381" version="1" comment="nss-softokn-freebl-devel is &lt;3.16.2-1.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820382" version="1" comment="nss-sysinit is &lt;3.16.2-2.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820383" version="1" comment="nss-tools is &lt;3.16.2-2.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820384" version="1" comment="nss-util is &lt;3.16.2-1.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820385" version="1" comment="nss-util-devel is &lt;3.16.2-1.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820418" version="1" comment="nss is &lt;3.16.2-7.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820419" version="1" comment="nss-devel is &lt;3.16.2-7.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820420" version="1" comment="nss-pkcs11-devel is &lt;3.16.2-7.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820421" version="1" comment="nss-softokn is &lt;3.16.2-2.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820422" version="1" comment="nss-softokn-devel is &lt;3.16.2-2.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820423" version="1" comment="nss-softokn-freebl is &lt;3.16.2-2.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820424" version="1" comment="nss-softokn-freebl-devel is &lt;3.16.2-2.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820425" version="1" comment="nss-sysinit is &lt;3.16.2-7.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820426" version="1" comment="nss-tools is &lt;3.16.2-7.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820427" version="1" comment="nss-util is &lt;3.16.2-2.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820428" version="1" comment="nss-util-devel is &lt;3.16.2-2.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820508" version="1" comment="firefox is &lt;31.2.0-3.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820509" version="1" comment="xulrunner is &lt;31.2.0-1.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820510" version="1" comment="xulrunner-devel is &lt;31.2.0-1.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820619" version="1" comment="firefox is &lt;31.3.0-3.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820594" version="1" comment="mariadb is &lt;5.5.40-1.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820595" version="1" comment="mariadb-bench is &lt;5.5.40-1.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820596" version="1" comment="mariadb-devel is &lt;5.5.40-1.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820597" version="1" comment="mariadb-embedded is &lt;5.5.40-1.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820598" version="1" comment="mariadb-embedded-devel is &lt;5.5.40-1.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820599" version="1" comment="mariadb-libs is &lt;5.5.40-1.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820600" version="1" comment="mariadb-server is &lt;5.5.40-1.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820601" version="1" comment="mariadb-test is &lt;5.5.40-1.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820432" version="1" comment="php is &lt;5.4.16-23.el7_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820433" version="1" comment="php-bcmath is &lt;5.4.16-23.el7_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820434" version="1" comment="php-cli is &lt;5.4.16-23.el7_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820435" version="1" comment="php-common is &lt;5.4.16-23.el7_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820436" version="1" comment="php-dba is &lt;5.4.16-23.el7_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820437" version="1" comment="php-devel is &lt;5.4.16-23.el7_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820438" version="1" comment="php-embedded is &lt;5.4.16-23.el7_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820439" version="1" comment="php-enchant is &lt;5.4.16-23.el7_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820440" version="1" comment="php-fpm is &lt;5.4.16-23.el7_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820441" version="1" comment="php-gd is &lt;5.4.16-23.el7_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820442" version="1" comment="php-intl is &lt;5.4.16-23.el7_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820443" version="1" comment="php-ldap is &lt;5.4.16-23.el7_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820444" version="1" comment="php-mbstring is &lt;5.4.16-23.el7_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820445" version="1" comment="php-mysql is &lt;5.4.16-23.el7_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820446" version="1" comment="php-mysqlnd is &lt;5.4.16-23.el7_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820447" version="1" comment="php-odbc is &lt;5.4.16-23.el7_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820448" version="1" comment="php-pdo is &lt;5.4.16-23.el7_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820449" version="1" comment="php-pgsql is &lt;5.4.16-23.el7_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820450" version="1" comment="php-process is &lt;5.4.16-23.el7_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820451" version="1" comment="php-pspell is &lt;5.4.16-23.el7_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820452" version="1" comment="php-recode is &lt;5.4.16-23.el7_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820453" version="1" comment="php-snmp is &lt;5.4.16-23.el7_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820454" version="1" comment="php-soap is &lt;5.4.16-23.el7_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820455" version="1" comment="php-xml is &lt;5.4.16-23.el7_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820456" version="1" comment="php-xmlrpc is &lt;5.4.16-23.el7_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820874" version="1" comment="openssh is &lt;6.6.1p1-11.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820875" version="1" comment="openssh-askpass is &lt;6.6.1p1-11.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820876" version="1" comment="openssh-clients is &lt;6.6.1p1-11.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820877" version="1" comment="openssh-keycat is &lt;6.6.1p1-11.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820878" version="1" comment="openssh-ldap is &lt;6.6.1p1-11.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820879" version="1" comment="openssh-server is &lt;6.6.1p1-11.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820880" version="1" comment="openssh-server-sysvinit is &lt;6.6.1p1-11.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820881" version="1" comment="pam_ssh_agent_auth is &lt;0.9.3-9.11.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820198" version="1" comment="libcacard is &lt;1.5.3-60.el7_0.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820199" version="1" comment="libcacard-devel is &lt;1.5.3-60.el7_0.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820200" version="1" comment="libcacard-tools is &lt;1.5.3-60.el7_0.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820201" version="1" comment="qemu-guest-agent is &lt;1.5.3-60.el7_0.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820202" version="1" comment="qemu-img is &lt;1.5.3-60.el7_0.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820203" version="1" comment="qemu-kvm is &lt;1.5.3-60.el7_0.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820204" version="1" comment="qemu-kvm-common is &lt;1.5.3-60.el7_0.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820205" version="1" comment="qemu-kvm-tools is &lt;1.5.3-60.el7_0.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820164" version="1" comment="gnutls is &lt;3.1.18-9.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820165" version="1" comment="gnutls-c++ is &lt;3.1.18-9.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820166" version="1" comment="gnutls-dane is &lt;3.1.18-9.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820167" version="1" comment="gnutls-devel is &lt;3.1.18-9.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820168" version="1" comment="gnutls-utils is &lt;3.1.18-9.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820184" version="1" comment="libtasn1 is &lt;3.3-5.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820185" version="1" comment="libtasn1-devel is &lt;3.3-5.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820186" version="1" comment="libtasn1-tools is &lt;3.3-5.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820317" version="1" comment="resteasy-base is &lt;2.3.5-3.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820318" version="1" comment="resteasy-base-atom-provider is &lt;2.3.5-3.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820319" version="1" comment="resteasy-base-jackson-provider is &lt;2.3.5-3.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820320" version="1" comment="resteasy-base-javadoc is &lt;2.3.5-3.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820321" version="1" comment="resteasy-base-jaxb-provider is &lt;2.3.5-3.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820322" version="1" comment="resteasy-base-jaxrs is &lt;2.3.5-3.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820323" version="1" comment="resteasy-base-jaxrs-all is &lt;2.3.5-3.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820324" version="1" comment="resteasy-base-jaxrs-api is &lt;2.3.5-3.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820325" version="1" comment="resteasy-base-jettison-provider is &lt;2.3.5-3.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820326" version="1" comment="resteasy-base-providers-pom is &lt;2.3.5-3.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820327" version="1" comment="resteasy-base-tjws is &lt;2.3.5-3.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820218" version="1" comment="docker is &lt;0.11.1-22.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820511" version="1" comment="openssl is &lt;1.0.1e-34.el7_0.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820512" version="1" comment="openssl-devel is &lt;1.0.1e-34.el7_0.6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820513" version="1" comment="openssl-libs is &lt;1.0.1e-34.el7_0.6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820514" version="1" comment="openssl-perl is &lt;1.0.1e-34.el7_0.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820515" version="1" comment="openssl-static is &lt;1.0.1e-34.el7_0.6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820773" version="1" comment="mod_dav_svn is &lt;1.7.14-7.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820774" version="1" comment="subversion is &lt;1.7.14-7.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820775" version="1" comment="subversion-devel is &lt;1.7.14-7.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820776" version="1" comment="subversion-gnome is &lt;1.7.14-7.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820777" version="1" comment="subversion-javahl is &lt;1.7.14-7.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820778" version="1" comment="subversion-kde is &lt;1.7.14-7.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820779" version="1" comment="subversion-libs is &lt;1.7.14-7.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820780" version="1" comment="subversion-perl is &lt;1.7.14-7.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820781" version="1" comment="subversion-python is &lt;1.7.14-7.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820782" version="1" comment="subversion-ruby is &lt;1.7.14-7.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820783" version="1" comment="subversion-tools is &lt;1.7.14-7.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820297" version="1" comment="libsmbclient is &lt;4.1.1-37.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820298" version="1" comment="libsmbclient-devel is &lt;4.1.1-37.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820299" version="1" comment="libwbclient is &lt;4.1.1-37.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820300" version="1" comment="libwbclient-devel is &lt;4.1.1-37.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820301" version="1" comment="samba is &lt;4.1.1-37.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820302" version="1" comment="samba-client is &lt;4.1.1-37.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820303" version="1" comment="samba-common is &lt;4.1.1-37.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820304" version="1" comment="samba-dc is &lt;4.1.1-37.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820305" version="1" comment="samba-dc-libs is &lt;4.1.1-37.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820306" version="1" comment="samba-devel is &lt;4.1.1-37.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820307" version="1" comment="samba-libs is &lt;4.1.1-37.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820308" version="1" comment="samba-pidl is &lt;4.1.1-37.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820309" version="1" comment="samba-python is &lt;4.1.1-37.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820310" version="1" comment="samba-test is &lt;4.1.1-37.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820311" version="1" comment="samba-test-devel is &lt;4.1.1-37.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820312" version="1" comment="samba-vfs-glusterfs is &lt;4.1.1-37.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820313" version="1" comment="samba-winbind is &lt;4.1.1-37.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820314" version="1" comment="samba-winbind-clients is &lt;4.1.1-37.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820315" version="1" comment="samba-winbind-krb5-locator is &lt;4.1.1-37.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820316" version="1" comment="samba-winbind-modules is &lt;4.1.1-37.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821503" version="1" comment="net-snmp is &lt;5.7.2-24.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821504" version="1" comment="net-snmp-agent-libs is &lt;5.7.2-24.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821505" version="1" comment="net-snmp-devel is &lt;5.7.2-24.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821506" version="1" comment="net-snmp-gui is &lt;5.7.2-24.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821507" version="1" comment="net-snmp-libs is &lt;5.7.2-24.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821508" version="1" comment="net-snmp-perl is &lt;5.7.2-24.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821509" version="1" comment="net-snmp-python is &lt;5.7.2-24.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821510" version="1" comment="net-snmp-sysvinit is &lt;5.7.2-24.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821511" version="1" comment="net-snmp-utils is &lt;5.7.2-24.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820739" version="1" comment="java-1.6.0-openjdk is &lt;1.6.0.34-1.13.6.1.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820740" version="1" comment="java-1.6.0-openjdk-demo is &lt;1.6.0.34-1.13.6.1.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820741" version="1" comment="java-1.6.0-openjdk-devel is &lt;1.6.0.34-1.13.6.1.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820742" version="1" comment="java-1.6.0-openjdk-javadoc is &lt;1.6.0.34-1.13.6.1.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820743" version="1" comment="java-1.6.0-openjdk-src is &lt;1.6.0.34-1.13.6.1.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820728" version="1" comment="java-1.7.0-openjdk is &lt;1.7.0.75-2.5.4.2.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820729" version="1" comment="java-1.7.0-openjdk-accessibility is &lt;1.7.0.75-2.5.4.2.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820730" version="1" comment="java-1.7.0-openjdk-demo is &lt;1.7.0.75-2.5.4.2.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820731" version="1" comment="java-1.7.0-openjdk-devel is &lt;1.7.0.75-2.5.4.2.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820732" version="1" comment="java-1.7.0-openjdk-headless is &lt;1.7.0.75-2.5.4.2.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820733" version="1" comment="java-1.7.0-openjdk-javadoc is &lt;1.7.0.75-2.5.4.2.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820734" version="1" comment="java-1.7.0-openjdk-src is &lt;1.7.0.75-2.5.4.2.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820723" version="1" comment="openssl is &lt;1.0.1e-34.el7_0.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820724" version="1" comment="openssl-devel is &lt;1.0.1e-34.el7_0.7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820725" version="1" comment="openssl-libs is &lt;1.0.1e-34.el7_0.7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820726" version="1" comment="openssl-perl is &lt;1.0.1e-34.el7_0.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820727" version="1" comment="openssl-static is &lt;1.0.1e-34.el7_0.7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820394" version="1" comment="httpcomponents-client is &lt;4.2.5-5.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820395" version="1" comment="httpcomponents-client-javadoc is &lt;4.2.5-5.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820398" version="1" comment="jakarta-commons-httpclient is &lt;3.1-16.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820399" version="1" comment="jakarta-commons-httpclient-demo is &lt;3.1-16.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820400" version="1" comment="jakarta-commons-httpclient-javadoc is &lt;3.1-16.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820401" version="1" comment="jakarta-commons-httpclient-manual is &lt;3.1-16.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820396" version="1" comment="squid is &lt;3.3.8-12.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820397" version="1" comment="squid-sysvinit is &lt;3.3.8-12.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820531" version="1" comment="kernel is &lt;3.10.0-123.9.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820532" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-123.9.2.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820533" version="1" comment="kernel-debug is &lt;3.10.0-123.9.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820536" version="1" comment="kernel-doc is &lt;3.10.0-123.9.2.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820537" version="1" comment="kernel-headers is &lt;3.10.0-123.9.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820538" version="1" comment="kernel-tools is &lt;3.10.0-123.9.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820539" version="1" comment="kernel-tools-libs is &lt;3.10.0-123.9.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820541" version="1" comment="perf is &lt;3.10.0-123.9.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820542" version="1" comment="python-perf is &lt;3.10.0-123.9.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821436" version="1" comment="curl is &lt;7.29.0-25.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821437" version="1" comment="libcurl is &lt;7.29.0-25.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821438" version="1" comment="libcurl-devel is &lt;7.29.0-25.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820520" version="1" comment="libcacard is &lt;1.5.3-60.el7_0.10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820521" version="1" comment="libcacard-devel is &lt;1.5.3-60.el7_0.10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820522" version="1" comment="libcacard-tools is &lt;1.5.3-60.el7_0.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820523" version="1" comment="qemu-guest-agent is &lt;1.5.3-60.el7_0.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820524" version="1" comment="qemu-img is &lt;1.5.3-60.el7_0.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820525" version="1" comment="qemu-kvm is &lt;1.5.3-60.el7_0.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820526" version="1" comment="qemu-kvm-common is &lt;1.5.3-60.el7_0.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820527" version="1" comment="qemu-kvm-tools is &lt;1.5.3-60.el7_0.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820402" version="1" comment="procmail is &lt;3.22-34.el7_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820457" version="1" comment="libvirt is &lt;1.1.1-29.el7_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820458" version="1" comment="libvirt-client is &lt;1.1.1-29.el7_0.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820459" version="1" comment="libvirt-daemon is &lt;1.1.1-29.el7_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820460" version="1" comment="libvirt-daemon-config-network is &lt;1.1.1-29.el7_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820461" version="1" comment="libvirt-daemon-config-nwfilter is &lt;1.1.1-29.el7_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820462" version="1" comment="libvirt-daemon-driver-interface is &lt;1.1.1-29.el7_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820463" version="1" comment="libvirt-daemon-driver-lxc is &lt;1.1.1-29.el7_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820464" version="1" comment="libvirt-daemon-driver-network is &lt;1.1.1-29.el7_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820465" version="1" comment="libvirt-daemon-driver-nodedev is &lt;1.1.1-29.el7_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820466" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;1.1.1-29.el7_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820467" version="1" comment="libvirt-daemon-driver-qemu is &lt;1.1.1-29.el7_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820468" version="1" comment="libvirt-daemon-driver-secret is &lt;1.1.1-29.el7_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820469" version="1" comment="libvirt-daemon-driver-storage is &lt;1.1.1-29.el7_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820470" version="1" comment="libvirt-daemon-kvm is &lt;1.1.1-29.el7_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820471" version="1" comment="libvirt-daemon-lxc is &lt;1.1.1-29.el7_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820472" version="1" comment="libvirt-devel is &lt;1.1.1-29.el7_0.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820473" version="1" comment="libvirt-docs is &lt;1.1.1-29.el7_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820474" version="1" comment="libvirt-lock-sanlock is &lt;1.1.1-29.el7_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820475" version="1" comment="libvirt-login-shell is &lt;1.1.1-29.el7_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820476" version="1" comment="libvirt-python is &lt;1.1.1-29.el7_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820480" version="1" comment="rsyslog is &lt;7.4.7-7.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820481" version="1" comment="rsyslog-crypto is &lt;7.4.7-7.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820482" version="1" comment="rsyslog-doc is &lt;7.4.7-7.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820483" version="1" comment="rsyslog-elasticsearch is &lt;7.4.7-7.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820484" version="1" comment="rsyslog-gnutls is &lt;7.4.7-7.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820485" version="1" comment="rsyslog-gssapi is &lt;7.4.7-7.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820486" version="1" comment="rsyslog-libdbi is &lt;7.4.7-7.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820487" version="1" comment="rsyslog-mmaudit is &lt;7.4.7-7.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820488" version="1" comment="rsyslog-mmjsonparse is &lt;7.4.7-7.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820489" version="1" comment="rsyslog-mmnormalize is &lt;7.4.7-7.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820490" version="1" comment="rsyslog-mmsnmptrapd is &lt;7.4.7-7.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820491" version="1" comment="rsyslog-mysql is &lt;7.4.7-7.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820492" version="1" comment="rsyslog-pgsql is &lt;7.4.7-7.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820493" version="1" comment="rsyslog-relp is &lt;7.4.7-7.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820494" version="1" comment="rsyslog-snmp is &lt;7.4.7-7.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820495" version="1" comment="rsyslog-udpspoof is &lt;7.4.7-7.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820864" version="1" comment="libcacard is &lt;1.5.3-86.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820865" version="1" comment="libcacard-devel is &lt;1.5.3-86.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820866" version="1" comment="libcacard-tools is &lt;1.5.3-86.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820867" version="1" comment="qemu-img is &lt;1.5.3-86.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820868" version="1" comment="qemu-kvm is &lt;1.5.3-86.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820869" version="1" comment="qemu-kvm-common is &lt;1.5.3-86.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820870" version="1" comment="qemu-kvm-tools is &lt;1.5.3-86.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820516" version="1" comment="libxml2 is &lt;2.9.1-5.el7_0.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820517" version="1" comment="libxml2-devel is &lt;2.9.1-5.el7_0.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820518" version="1" comment="libxml2-python is &lt;2.9.1-5.el7_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820519" version="1" comment="libxml2-static is &lt;2.9.1-5.el7_0.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820544" version="1" comment="php is &lt;5.4.16-23.el7_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820545" version="1" comment="php-bcmath is &lt;5.4.16-23.el7_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820546" version="1" comment="php-cli is &lt;5.4.16-23.el7_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820547" version="1" comment="php-common is &lt;5.4.16-23.el7_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820548" version="1" comment="php-dba is &lt;5.4.16-23.el7_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820549" version="1" comment="php-devel is &lt;5.4.16-23.el7_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820550" version="1" comment="php-embedded is &lt;5.4.16-23.el7_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820551" version="1" comment="php-enchant is &lt;5.4.16-23.el7_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820552" version="1" comment="php-fpm is &lt;5.4.16-23.el7_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820553" version="1" comment="php-gd is &lt;5.4.16-23.el7_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820554" version="1" comment="php-intl is &lt;5.4.16-23.el7_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820555" version="1" comment="php-ldap is &lt;5.4.16-23.el7_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820556" version="1" comment="php-mbstring is &lt;5.4.16-23.el7_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820557" version="1" comment="php-mysql is &lt;5.4.16-23.el7_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820558" version="1" comment="php-mysqlnd is &lt;5.4.16-23.el7_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820559" version="1" comment="php-odbc is &lt;5.4.16-23.el7_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820560" version="1" comment="php-pdo is &lt;5.4.16-23.el7_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820561" version="1" comment="php-pgsql is &lt;5.4.16-23.el7_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820562" version="1" comment="php-process is &lt;5.4.16-23.el7_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820563" version="1" comment="php-pspell is &lt;5.4.16-23.el7_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820564" version="1" comment="php-recode is &lt;5.4.16-23.el7_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820565" version="1" comment="php-snmp is &lt;5.4.16-23.el7_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820566" version="1" comment="php-soap is &lt;5.4.16-23.el7_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820567" version="1" comment="php-xml is &lt;5.4.16-23.el7_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820568" version="1" comment="php-xmlrpc is &lt;5.4.16-23.el7_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820631" version="1" comment="wpa_supplicant is &lt;2.0-13.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711368" version="1" comment="kernel-default is ==3.12.32-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711369" version="1" comment="kgraft-patch-3_12_32-33-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105317" version="1" comment="kernel-default is &lt;3.12.32-33.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820807" version="1" comment="kernel is &lt;3.10.0-229.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820808" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-229.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820809" version="1" comment="kernel-debug is &lt;3.10.0-229.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820812" version="1" comment="kernel-doc is &lt;3.10.0-229.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820813" version="1" comment="kernel-headers is &lt;3.10.0-229.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820814" version="1" comment="kernel-tools is &lt;3.10.0-229.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820815" version="1" comment="kernel-tools-libs is &lt;3.10.0-229.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820817" version="1" comment="perf is &lt;3.10.0-229.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820818" version="1" comment="python-perf is &lt;3.10.0-229.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823185" version="1" comment="finch is &lt;2.10.11-5.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823186" version="1" comment="finch-devel is &lt;2.10.11-5.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823187" version="1" comment="libpurple is &lt;2.10.11-5.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823188" version="1" comment="libpurple-devel is &lt;2.10.11-5.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823189" version="1" comment="libpurple-perl is &lt;2.10.11-5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823190" version="1" comment="libpurple-tcl is &lt;2.10.11-5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823191" version="1" comment="pidgin is &lt;2.10.11-5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823192" version="1" comment="pidgin-devel is &lt;2.10.11-5.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823193" version="1" comment="pidgin-perl is &lt;2.10.11-5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820403" version="1" comment="kernel is &lt;3.10.0-123.8.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820404" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-123.8.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820405" version="1" comment="kernel-debug is &lt;3.10.0-123.8.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820408" version="1" comment="kernel-doc is &lt;3.10.0-123.8.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820409" version="1" comment="kernel-headers is &lt;3.10.0-123.8.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820410" version="1" comment="kernel-tools is &lt;3.10.0-123.8.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820411" version="1" comment="kernel-tools-libs is &lt;3.10.0-123.8.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820413" version="1" comment="perf is &lt;3.10.0-123.8.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820414" version="1" comment="python-perf is &lt;3.10.0-123.8.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820753" version="1" comment="kernel is &lt;3.10.0-123.20.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820754" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-123.20.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820755" version="1" comment="kernel-debug is &lt;3.10.0-123.20.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820758" version="1" comment="kernel-doc is &lt;3.10.0-123.20.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820759" version="1" comment="kernel-headers is &lt;3.10.0-123.20.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820760" version="1" comment="kernel-tools is &lt;3.10.0-123.20.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820761" version="1" comment="kernel-tools-libs is &lt;3.10.0-123.20.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820763" version="1" comment="perf is &lt;3.10.0-123.20.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820764" version="1" comment="python-perf is &lt;3.10.0-123.20.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820569" version="1" comment="cups-filters is &lt;1.0.35-15.el7_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820570" version="1" comment="cups-filters-devel is &lt;1.0.35-15.el7_0.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820571" version="1" comment="cups-filters-libs is &lt;1.0.35-15.el7_0.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820882" version="1" comment="krb5-devel is &lt;1.12.2-14.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820883" version="1" comment="krb5-libs is &lt;1.12.2-14.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820884" version="1" comment="krb5-pkinit is &lt;1.12.2-14.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820885" version="1" comment="krb5-server is &lt;1.12.2-14.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820886" version="1" comment="krb5-server-ldap is &lt;1.12.2-14.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820887" version="1" comment="krb5-workstation is &lt;1.12.2-14.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820277" version="1" comment="kernel is &lt;3.10.0-123.4.4.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820278" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-123.4.4.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820279" version="1" comment="kernel-debug is &lt;3.10.0-123.4.4.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820282" version="1" comment="kernel-doc is &lt;3.10.0-123.4.4.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820283" version="1" comment="kernel-headers is &lt;3.10.0-123.4.4.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820284" version="1" comment="kernel-tools is &lt;3.10.0-123.4.4.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820285" version="1" comment="kernel-tools-libs is &lt;3.10.0-123.4.4.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820287" version="1" comment="perf is &lt;3.10.0-123.4.4.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820288" version="1" comment="python-perf is &lt;3.10.0-123.4.4.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820543" version="1" comment="wget is &lt;1.14-10.el7_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820604" version="1" comment="ruby is &lt;2.0.0.353-22.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820605" version="1" comment="ruby-devel is &lt;2.0.0.353-22.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820606" version="1" comment="ruby-doc is &lt;2.0.0.353-22.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820607" version="1" comment="ruby-irb is &lt;2.0.0.353-22.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820608" version="1" comment="ruby-libs is &lt;2.0.0.353-22.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820609" version="1" comment="ruby-tcltk is &lt;2.0.0.353-22.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820610" version="1" comment="rubygem-bigdecimal is &lt;1.2.0-22.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820611" version="1" comment="rubygem-io-console is &lt;0.4.2-22.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820612" version="1" comment="rubygem-json is &lt;1.7.7-22.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820613" version="1" comment="rubygem-minitest is &lt;4.3.2-22.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820614" version="1" comment="rubygem-psych is &lt;2.0.0-22.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820615" version="1" comment="rubygem-rake is &lt;0.9.6-22.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820616" version="1" comment="rubygem-rdoc is &lt;4.0.0-22.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820617" version="1" comment="rubygems is &lt;2.0.14-22.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820618" version="1" comment="rubygems-devel is &lt;2.0.14-22.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820477" version="1" comment="polkit-qt is &lt;0.103.0-10.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820478" version="1" comment="polkit-qt-devel is &lt;0.103.0-10.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820479" version="1" comment="polkit-qt-doc is &lt;0.103.0-10.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821425" version="1" comment="krb5-devel is &lt;1.13.2-10.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821426" version="1" comment="krb5-libs is &lt;1.13.2-10.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821427" version="1" comment="krb5-pkinit is &lt;1.13.2-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821428" version="1" comment="krb5-server is &lt;1.13.2-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821429" version="1" comment="krb5-server-ldap is &lt;1.13.2-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821430" version="1" comment="krb5-workstation is &lt;1.13.2-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820853" version="1" comment="glibc is &lt;2.17-78.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820854" version="1" comment="glibc-common is &lt;2.17-78.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820855" version="1" comment="glibc-devel is &lt;2.17-78.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820856" version="1" comment="glibc-headers is &lt;2.17-78.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820857" version="1" comment="glibc-static is &lt;2.17-78.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820858" version="1" comment="glibc-utils is &lt;2.17-78.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820859" version="1" comment="nscd is &lt;2.17-78.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820572" version="1" comment="libvncserver is &lt;0.9.9-9.el7_0.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820573" version="1" comment="libvncserver-devel is &lt;0.9.9-9.el7_0.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820574" version="1" comment="kdenetwork is &lt;4.10.5-8.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820575" version="1" comment="kdenetwork-common is &lt;4.10.5-8.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820576" version="1" comment="kdenetwork-devel is &lt;4.10.5-8.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820577" version="1" comment="kdenetwork-fileshare-samba is &lt;4.10.5-8.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820578" version="1" comment="kdenetwork-kdnssd is &lt;4.10.5-8.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820579" version="1" comment="kdenetwork-kget is &lt;4.10.5-8.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820580" version="1" comment="kdenetwork-kget-libs is &lt;4.10.5-8.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820581" version="1" comment="kdenetwork-kopete is &lt;4.10.5-8.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820582" version="1" comment="kdenetwork-kopete-devel is &lt;4.10.5-8.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820583" version="1" comment="kdenetwork-kopete-libs is &lt;4.10.5-8.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820584" version="1" comment="kdenetwork-krdc is &lt;4.10.5-8.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820585" version="1" comment="kdenetwork-krdc-devel is &lt;4.10.5-8.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820586" version="1" comment="kdenetwork-krdc-libs is &lt;4.10.5-8.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820587" version="1" comment="kdenetwork-krfb is &lt;4.10.5-8.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820588" version="1" comment="kdenetwork-krfb-libs is &lt;4.10.5-8.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820415" version="1" comment="haproxy is &lt;1.5.2-3.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820416" version="1" comment="bash is &lt;4.2.45-5.el7_0.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820417" version="1" comment="bash-doc is &lt;4.2.45-5.el7_0.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820528" version="1" comment="wireshark is &lt;1.10.3-12.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820529" version="1" comment="wireshark-devel is &lt;1.10.3-12.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820530" version="1" comment="wireshark-gnome is &lt;1.10.3-12.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820503" version="1" comment="java-1.6.0-openjdk is &lt;1.6.0.33-1.13.5.0.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820504" version="1" comment="java-1.6.0-openjdk-demo is &lt;1.6.0.33-1.13.5.0.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820505" version="1" comment="java-1.6.0-openjdk-devel is &lt;1.6.0.33-1.13.5.0.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820506" version="1" comment="java-1.6.0-openjdk-javadoc is &lt;1.6.0.33-1.13.5.0.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820507" version="1" comment="java-1.6.0-openjdk-src is &lt;1.6.0.33-1.13.5.0.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820496" version="1" comment="java-1.7.0-openjdk is &lt;1.7.0.71-2.5.3.1.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820497" version="1" comment="java-1.7.0-openjdk-accessibility is &lt;1.7.0.71-2.5.3.1.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820498" version="1" comment="java-1.7.0-openjdk-demo is &lt;1.7.0.71-2.5.3.1.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820499" version="1" comment="java-1.7.0-openjdk-devel is &lt;1.7.0.71-2.5.3.1.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820500" version="1" comment="java-1.7.0-openjdk-headless is &lt;1.7.0.71-2.5.3.1.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820501" version="1" comment="java-1.7.0-openjdk-javadoc is &lt;1.7.0.71-2.5.3.1.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820502" version="1" comment="java-1.7.0-openjdk-src is &lt;1.7.0.71-2.5.3.1.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820765" version="1" comment="mariadb is &lt;5.5.41-2.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820766" version="1" comment="mariadb-bench is &lt;5.5.41-2.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820767" version="1" comment="mariadb-devel is &lt;5.5.41-2.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820768" version="1" comment="mariadb-embedded is &lt;5.5.41-2.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820769" version="1" comment="mariadb-embedded-devel is &lt;5.5.41-2.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820770" version="1" comment="mariadb-libs is &lt;5.5.41-2.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820771" version="1" comment="mariadb-server is &lt;5.5.41-2.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820772" version="1" comment="mariadb-test is &lt;5.5.41-2.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820893" version="1" comment="clutter is &lt;1.14.4-12.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820894" version="1" comment="clutter-devel is &lt;1.14.4-12.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820895" version="1" comment="clutter-doc is &lt;1.14.4-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820896" version="1" comment="cogl is &lt;1.14.0-6.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820897" version="1" comment="cogl-devel is &lt;1.14.0-6.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820898" version="1" comment="cogl-doc is &lt;1.14.0-6.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820899" version="1" comment="gnome-shell is &lt;3.8.4-45.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820900" version="1" comment="gnome-shell-browser-plugin is &lt;3.8.4-45.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820901" version="1" comment="mutter is &lt;3.8.4-16.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820902" version="1" comment="mutter-devel is &lt;3.8.4-16.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822320" version="1" comment="tomcat is &lt;7.0.54-8.el7_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822321" version="1" comment="tomcat-admin-webapps is &lt;7.0.54-8.el7_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822322" version="1" comment="tomcat-docs-webapp is &lt;7.0.54-8.el7_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822323" version="1" comment="tomcat-el-2.2-api is &lt;7.0.54-8.el7_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822324" version="1" comment="tomcat-javadoc is &lt;7.0.54-8.el7_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822325" version="1" comment="tomcat-jsp-2.2-api is &lt;7.0.54-8.el7_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822326" version="1" comment="tomcat-jsvc is &lt;7.0.54-8.el7_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822327" version="1" comment="tomcat-lib is &lt;7.0.54-8.el7_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822328" version="1" comment="tomcat-servlet-3.0-api is &lt;7.0.54-8.el7_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822329" version="1" comment="tomcat-webapps is &lt;7.0.54-8.el7_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820688" version="1" comment="glibc is &lt;2.17-55.el7_0.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820689" version="1" comment="glibc-common is &lt;2.17-55.el7_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820690" version="1" comment="glibc-devel is &lt;2.17-55.el7_0.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820691" version="1" comment="glibc-headers is &lt;2.17-55.el7_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820692" version="1" comment="glibc-static is &lt;2.17-55.el7_0.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820693" version="1" comment="glibc-utils is &lt;2.17-55.el7_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820694" version="1" comment="nscd is &lt;2.17-55.el7_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711371" version="1" comment="kernel-default is ==3.12.36-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711372" version="1" comment="kgraft-patch-3_12_36-38-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105748" version="1" comment="kernel-default is &lt;3.12.36-38.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820700" version="1" comment="libvirt is &lt;1.1.1-29.el7_0.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820701" version="1" comment="libvirt-client is &lt;1.1.1-29.el7_0.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820702" version="1" comment="libvirt-daemon is &lt;1.1.1-29.el7_0.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820703" version="1" comment="libvirt-daemon-config-network is &lt;1.1.1-29.el7_0.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820704" version="1" comment="libvirt-daemon-config-nwfilter is &lt;1.1.1-29.el7_0.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820705" version="1" comment="libvirt-daemon-driver-interface is &lt;1.1.1-29.el7_0.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820706" version="1" comment="libvirt-daemon-driver-lxc is &lt;1.1.1-29.el7_0.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820707" version="1" comment="libvirt-daemon-driver-network is &lt;1.1.1-29.el7_0.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820708" version="1" comment="libvirt-daemon-driver-nodedev is &lt;1.1.1-29.el7_0.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820709" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;1.1.1-29.el7_0.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820710" version="1" comment="libvirt-daemon-driver-qemu is &lt;1.1.1-29.el7_0.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820711" version="1" comment="libvirt-daemon-driver-secret is &lt;1.1.1-29.el7_0.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820712" version="1" comment="libvirt-daemon-driver-storage is &lt;1.1.1-29.el7_0.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820713" version="1" comment="libvirt-daemon-kvm is &lt;1.1.1-29.el7_0.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820714" version="1" comment="libvirt-daemon-lxc is &lt;1.1.1-29.el7_0.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820715" version="1" comment="libvirt-devel is &lt;1.1.1-29.el7_0.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820716" version="1" comment="libvirt-docs is &lt;1.1.1-29.el7_0.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820717" version="1" comment="libvirt-lock-sanlock is &lt;1.1.1-29.el7_0.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820718" version="1" comment="libvirt-login-shell is &lt;1.1.1-29.el7_0.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820719" version="1" comment="libvirt-python is &lt;1.1.1-29.el7_0.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823168" version="1" comment="kernel is &lt;3.10.0-693.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823169" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-693.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823170" version="1" comment="kernel-debug is &lt;3.10.0-693.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823173" version="1" comment="kernel-doc is &lt;3.10.0-693.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823174" version="1" comment="kernel-headers is &lt;3.10.0-693.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823175" version="1" comment="kernel-tools is &lt;3.10.0-693.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823176" version="1" comment="kernel-tools-libs is &lt;3.10.0-693.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823178" version="1" comment="perf is &lt;3.10.0-693.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823179" version="1" comment="python-perf is &lt;3.10.0-693.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820653" version="1" comment="xorg-x11-server-Xdmx is &lt;1.15.0-7.el7_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820654" version="1" comment="xorg-x11-server-Xephyr is &lt;1.15.0-7.el7_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820655" version="1" comment="xorg-x11-server-Xnest is &lt;1.15.0-7.el7_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820656" version="1" comment="xorg-x11-server-Xorg is &lt;1.15.0-7.el7_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820657" version="1" comment="xorg-x11-server-Xvfb is &lt;1.15.0-7.el7_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820658" version="1" comment="xorg-x11-server-common is &lt;1.15.0-7.el7_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820659" version="1" comment="xorg-x11-server-devel is &lt;1.15.0-7.el7_0.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820660" version="1" comment="xorg-x11-server-source is &lt;1.15.0-7.el7_0.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820871" version="1" comment="389-ds-base is &lt;1.3.3.1-13.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820872" version="1" comment="389-ds-base-devel is &lt;1.3.3.1-13.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820873" version="1" comment="389-ds-base-libs is &lt;1.3.3.1-13.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821474" version="1" comment="netcf is &lt;0.2.8-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821475" version="1" comment="netcf-devel is &lt;0.2.8-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821476" version="1" comment="netcf-libs is &lt;0.2.8-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822206" version="1" comment="libtiff is &lt;4.0.3-25.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822207" version="1" comment="libtiff-devel is &lt;4.0.3-25.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822208" version="1" comment="libtiff-static is &lt;4.0.3-25.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822209" version="1" comment="libtiff-tools is &lt;4.0.3-25.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820826" version="1" comment="libvirt is &lt;1.2.8-16.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820827" version="1" comment="libvirt-client is &lt;1.2.8-16.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820828" version="1" comment="libvirt-daemon is &lt;1.2.8-16.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820829" version="1" comment="libvirt-daemon-config-network is &lt;1.2.8-16.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820830" version="1" comment="libvirt-daemon-config-nwfilter is &lt;1.2.8-16.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820831" version="1" comment="libvirt-daemon-driver-interface is &lt;1.2.8-16.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820832" version="1" comment="libvirt-daemon-driver-lxc is &lt;1.2.8-16.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820833" version="1" comment="libvirt-daemon-driver-network is &lt;1.2.8-16.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820834" version="1" comment="libvirt-daemon-driver-nodedev is &lt;1.2.8-16.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820835" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;1.2.8-16.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820836" version="1" comment="libvirt-daemon-driver-qemu is &lt;1.2.8-16.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820837" version="1" comment="libvirt-daemon-driver-secret is &lt;1.2.8-16.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820838" version="1" comment="libvirt-daemon-driver-storage is &lt;1.2.8-16.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820839" version="1" comment="libvirt-daemon-kvm is &lt;1.2.8-16.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820840" version="1" comment="libvirt-daemon-lxc is &lt;1.2.8-16.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820841" version="1" comment="libvirt-devel is &lt;1.2.8-16.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820842" version="1" comment="libvirt-docs is &lt;1.2.8-16.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820843" version="1" comment="libvirt-lock-sanlock is &lt;1.2.8-16.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820844" version="1" comment="libvirt-login-shell is &lt;1.2.8-16.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820684" version="1" comment="jasper is &lt;1.900.1-26.el7_0.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820685" version="1" comment="jasper-devel is &lt;1.900.1-26.el7_0.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820686" version="1" comment="jasper-libs is &lt;1.900.1-26.el7_0.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820687" version="1" comment="jasper-utils is &lt;1.900.1-26.el7_0.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820917" version="1" comment="unzip is &lt;6.0-15.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821089" version="1" comment="php is &lt;5.4.16-36.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821090" version="1" comment="php-bcmath is &lt;5.4.16-36.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821091" version="1" comment="php-cli is &lt;5.4.16-36.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821092" version="1" comment="php-common is &lt;5.4.16-36.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821093" version="1" comment="php-dba is &lt;5.4.16-36.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821094" version="1" comment="php-devel is &lt;5.4.16-36.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821095" version="1" comment="php-embedded is &lt;5.4.16-36.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821096" version="1" comment="php-enchant is &lt;5.4.16-36.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821097" version="1" comment="php-fpm is &lt;5.4.16-36.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821098" version="1" comment="php-gd is &lt;5.4.16-36.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821099" version="1" comment="php-intl is &lt;5.4.16-36.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821100" version="1" comment="php-ldap is &lt;5.4.16-36.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821101" version="1" comment="php-mbstring is &lt;5.4.16-36.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821102" version="1" comment="php-mysql is &lt;5.4.16-36.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821103" version="1" comment="php-mysqlnd is &lt;5.4.16-36.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821104" version="1" comment="php-odbc is &lt;5.4.16-36.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821105" version="1" comment="php-pdo is &lt;5.4.16-36.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821106" version="1" comment="php-pgsql is &lt;5.4.16-36.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821107" version="1" comment="php-process is &lt;5.4.16-36.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821108" version="1" comment="php-pspell is &lt;5.4.16-36.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821109" version="1" comment="php-recode is &lt;5.4.16-36.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821110" version="1" comment="php-snmp is &lt;5.4.16-36.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821111" version="1" comment="php-soap is &lt;5.4.16-36.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821112" version="1" comment="php-xml is &lt;5.4.16-36.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821113" version="1" comment="php-xmlrpc is &lt;5.4.16-36.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820735" version="1" comment="jasper is &lt;1.900.1-26.el7_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820736" version="1" comment="jasper-devel is &lt;1.900.1-26.el7_0.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820737" version="1" comment="jasper-libs is &lt;1.900.1-26.el7_0.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820738" version="1" comment="jasper-utils is &lt;1.900.1-26.el7_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711374" version="1" comment="kgraft-patch-3_12_38-44-default is &gt;=2-7.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711376" version="1" comment="kgraft-patch-3_12_39-47-default is &gt;=2-10.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108369" version="1" comment="kernel-default is &lt;3.12.39-47.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820924" version="1" comment="kernel is &lt;3.10.0-229.1.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820925" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-229.1.2.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820926" version="1" comment="kernel-debug is &lt;3.10.0-229.1.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820929" version="1" comment="kernel-doc is &lt;3.10.0-229.1.2.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820930" version="1" comment="kernel-headers is &lt;3.10.0-229.1.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820931" version="1" comment="kernel-tools is &lt;3.10.0-229.1.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820932" version="1" comment="kernel-tools-libs is &lt;3.10.0-229.1.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820934" version="1" comment="perf is &lt;3.10.0-229.1.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820935" version="1" comment="python-perf is &lt;3.10.0-229.1.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820948" version="1" comment="postgresql is &lt;9.2.10-2.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820949" version="1" comment="postgresql-contrib is &lt;9.2.10-2.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820950" version="1" comment="postgresql-devel is &lt;9.2.10-2.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820951" version="1" comment="postgresql-docs is &lt;9.2.10-2.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820952" version="1" comment="postgresql-libs is &lt;9.2.10-2.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820953" version="1" comment="postgresql-plperl is &lt;9.2.10-2.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820954" version="1" comment="postgresql-plpython is &lt;9.2.10-2.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820955" version="1" comment="postgresql-pltcl is &lt;9.2.10-2.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820956" version="1" comment="postgresql-server is &lt;9.2.10-2.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820957" version="1" comment="postgresql-test is &lt;9.2.10-2.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820958" version="1" comment="postgresql-upgrade is &lt;9.2.10-2.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821563" version="1" comment="autofs is &lt;5.0.7-54.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821077" version="1" comment="openssl is &lt;1.0.1e-42.el7_1.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821078" version="1" comment="openssl-devel is &lt;1.0.1e-42.el7_1.8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821079" version="1" comment="openssl-libs is &lt;1.0.1e-42.el7_1.8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821080" version="1" comment="openssl-perl is &lt;1.0.1e-42.el7_1.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821081" version="1" comment="openssl-static is &lt;1.0.1e-42.el7_1.8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823722" version="1" comment="liblouis is &lt;2.5.2-11.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823723" version="1" comment="liblouis-devel is &lt;2.5.2-11.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823724" version="1" comment="liblouis-doc is &lt;2.5.2-11.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823725" version="1" comment="liblouis-python is &lt;2.5.2-11.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823726" version="1" comment="liblouis-utils is &lt;2.5.2-11.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821464" version="1" comment="tigervnc is &lt;1.3.1-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821465" version="1" comment="tigervnc-icons is &lt;1.3.1-3.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821466" version="1" comment="tigervnc-license is &lt;1.3.1-3.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821467" version="1" comment="tigervnc-server is &lt;1.3.1-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821468" version="1" comment="tigervnc-server-applet is &lt;1.3.1-3.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821469" version="1" comment="tigervnc-server-minimal is &lt;1.3.1-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821470" version="1" comment="tigervnc-server-module is &lt;1.3.1-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821378" version="1" comment="binutils is &lt;2.23.52.0.1-55.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821379" version="1" comment="binutils-devel is &lt;2.23.52.0.1-55.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820661" version="1" comment="bind is &lt;9.9.4-14.el7_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820662" version="1" comment="bind-chroot is &lt;9.9.4-14.el7_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820663" version="1" comment="bind-devel is &lt;9.9.4-14.el7_0.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820664" version="1" comment="bind-libs is &lt;9.9.4-14.el7_0.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820665" version="1" comment="bind-libs-lite is &lt;9.9.4-14.el7_0.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820666" version="1" comment="bind-license is &lt;9.9.4-14.el7_0.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820667" version="1" comment="bind-lite-devel is &lt;9.9.4-14.el7_0.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820668" version="1" comment="bind-sdb is &lt;9.9.4-14.el7_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820669" version="1" comment="bind-sdb-chroot is &lt;9.9.4-14.el7_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820670" version="1" comment="bind-utils is &lt;9.9.4-14.el7_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821344" version="1" comment="kernel is &lt;3.10.0-229.20.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821345" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-229.20.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821346" version="1" comment="kernel-debug is &lt;3.10.0-229.20.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821349" version="1" comment="kernel-doc is &lt;3.10.0-229.20.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821350" version="1" comment="kernel-headers is &lt;3.10.0-229.20.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821351" version="1" comment="kernel-tools is &lt;3.10.0-229.20.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821352" version="1" comment="kernel-tools-libs is &lt;3.10.0-229.20.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821354" version="1" comment="perf is &lt;3.10.0-229.20.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821355" version="1" comment="python-perf is &lt;3.10.0-229.20.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820589" version="1" comment="gnutls is &lt;3.1.18-10.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820590" version="1" comment="gnutls-c++ is &lt;3.1.18-10.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820591" version="1" comment="gnutls-dane is &lt;3.1.18-10.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820592" version="1" comment="gnutls-devel is &lt;3.1.18-10.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820593" version="1" comment="gnutls-utils is &lt;3.1.18-10.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821564" version="1" comment="unbound is &lt;1.4.20-26.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821565" version="1" comment="unbound-devel is &lt;1.4.20-26.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821566" version="1" comment="unbound-libs is &lt;1.4.20-26.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821567" version="1" comment="unbound-python is &lt;1.4.20-26.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820720" version="1" comment="firefox is &lt;31.4.0-1.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820721" version="1" comment="xulrunner is &lt;31.4.0-1.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820722" version="1" comment="xulrunner-devel is &lt;31.4.0-1.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821556" version="1" comment="wireshark is &lt;1.10.14-7.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821557" version="1" comment="wireshark-devel is &lt;1.10.14-7.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821558" version="1" comment="wireshark-gnome is &lt;1.10.14-7.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820962" version="1" comment="flac is &lt;1.3.0-5.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820963" version="1" comment="flac-devel is &lt;1.3.0-5.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820964" version="1" comment="flac-libs is &lt;1.3.0-5.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820860" version="1" comment="pcre is &lt;8.32-14.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820861" version="1" comment="pcre-devel is &lt;8.32-14.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820862" version="1" comment="pcre-static is &lt;8.32-14.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820863" version="1" comment="pcre-tools is &lt;8.32-14.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821400" version="1" comment="cpio is &lt;2.11-24.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820751" version="1" comment="libyaml is &lt;0.1.4-11.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820752" version="1" comment="libyaml-devel is &lt;0.1.4-11.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820819" version="1" comment="hivex is &lt;1.3.10-5.7.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820820" version="1" comment="hivex-devel is &lt;1.3.10-5.7.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820821" version="1" comment="ocaml-hivex is &lt;1.3.10-5.7.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820822" version="1" comment="ocaml-hivex-devel is &lt;1.3.10-5.7.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820823" version="1" comment="perl-hivex is &lt;1.3.10-5.7.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820824" version="1" comment="python-hivex is &lt;1.3.10-5.7.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820825" version="1" comment="ruby-hivex is &lt;1.3.10-5.7.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820695" version="1" comment="ntp is &lt;4.2.6p5-19.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820696" version="1" comment="ntp-doc is &lt;4.2.6p5-19.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820697" version="1" comment="ntp-perl is &lt;4.2.6p5-19.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820698" version="1" comment="ntpdate is &lt;4.2.6p5-19.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820699" version="1" comment="sntp is &lt;4.2.6p5-19.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821459" version="1" comment="ntp is &lt;4.2.6p5-22.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821460" version="1" comment="ntp-doc is &lt;4.2.6p5-22.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821461" version="1" comment="ntp-perl is &lt;4.2.6p5-22.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821462" version="1" comment="ntpdate is &lt;4.2.6p5-22.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821463" version="1" comment="sntp is &lt;4.2.6p5-22.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820672" version="1" comment="kernel is &lt;3.10.0-123.13.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820673" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-123.13.2.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820674" version="1" comment="kernel-debug is &lt;3.10.0-123.13.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820677" version="1" comment="kernel-doc is &lt;3.10.0-123.13.2.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820678" version="1" comment="kernel-headers is &lt;3.10.0-123.13.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820679" version="1" comment="kernel-tools is &lt;3.10.0-123.13.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820680" version="1" comment="kernel-tools-libs is &lt;3.10.0-123.13.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820682" version="1" comment="perf is &lt;3.10.0-123.13.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820683" version="1" comment="python-perf is &lt;3.10.0-123.13.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823294" version="1" comment="python is &lt;2.7.5-58.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823295" version="1" comment="python-debug is &lt;2.7.5-58.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823296" version="1" comment="python-devel is &lt;2.7.5-58.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823297" version="1" comment="python-libs is &lt;2.7.5-58.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823298" version="1" comment="python-test is &lt;2.7.5-58.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823299" version="1" comment="python-tools is &lt;2.7.5-58.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823300" version="1" comment="tkinter is &lt;2.7.5-58.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824075" version="1" comment="glibc is &lt;2.17-222.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824076" version="1" comment="glibc-common is &lt;2.17-222.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824077" version="1" comment="glibc-devel is &lt;2.17-222.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824078" version="1" comment="glibc-headers is &lt;2.17-222.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824079" version="1" comment="glibc-static is &lt;2.17-222.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824080" version="1" comment="glibc-utils is &lt;2.17-222.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824081" version="1" comment="nscd is &lt;2.17-222.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821114" version="1" comment="kernel is &lt;3.10.0-229.7.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821115" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-229.7.2.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821116" version="1" comment="kernel-debug is &lt;3.10.0-229.7.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821119" version="1" comment="kernel-doc is &lt;3.10.0-229.7.2.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821120" version="1" comment="kernel-headers is &lt;3.10.0-229.7.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821121" version="1" comment="kernel-tools is &lt;3.10.0-229.7.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821122" version="1" comment="kernel-tools-libs is &lt;3.10.0-229.7.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821124" version="1" comment="perf is &lt;3.10.0-229.7.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821125" version="1" comment="python-perf is &lt;3.10.0-229.7.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998140" version="1" comment="mpfr is &lt;3.1.1-4.el7_9.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998141" version="1" comment="mpfr-devel is &lt;3.1.1-4.el7_9.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821287" version="1" comment="kernel is &lt;3.10.0-229.14.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821288" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-229.14.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821289" version="1" comment="kernel-debug is &lt;3.10.0-229.14.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821292" version="1" comment="kernel-doc is &lt;3.10.0-229.14.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821293" version="1" comment="kernel-headers is &lt;3.10.0-229.14.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821294" version="1" comment="kernel-tools is &lt;3.10.0-229.14.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821295" version="1" comment="kernel-tools-libs is &lt;3.10.0-229.14.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821297" version="1" comment="perf is &lt;3.10.0-229.14.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821298" version="1" comment="python-perf is &lt;3.10.0-229.14.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820914" version="1" comment="freetype is &lt;2.4.11-10.el7_1.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820915" version="1" comment="freetype-demos is &lt;2.4.11-10.el7_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820916" version="1" comment="freetype-devel is &lt;2.4.11-10.el7_1.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821082" version="1" comment="cups is &lt;1.6.3-17.el7_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821083" version="1" comment="cups-client is &lt;1.6.3-17.el7_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821084" version="1" comment="cups-devel is &lt;1.6.3-17.el7_1.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821085" version="1" comment="cups-filesystem is &lt;1.6.3-17.el7_1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821086" version="1" comment="cups-ipptool is &lt;1.6.3-17.el7_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821087" version="1" comment="cups-libs is &lt;1.6.3-17.el7_1.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821088" version="1" comment="cups-lpd is &lt;1.6.3-17.el7_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821203" version="1" comment="kernel is &lt;3.10.0-229.11.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821204" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-229.11.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821205" version="1" comment="kernel-debug is &lt;3.10.0-229.11.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821208" version="1" comment="kernel-doc is &lt;3.10.0-229.11.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821209" version="1" comment="kernel-headers is &lt;3.10.0-229.11.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821210" version="1" comment="kernel-tools is &lt;3.10.0-229.11.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821211" version="1" comment="kernel-tools-libs is &lt;3.10.0-229.11.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821213" version="1" comment="perf is &lt;3.10.0-229.11.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821214" version="1" comment="python-perf is &lt;3.10.0-229.11.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823302" version="1" comment="glibc is &lt;2.17-196.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823303" version="1" comment="glibc-common is &lt;2.17-196.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823304" version="1" comment="glibc-devel is &lt;2.17-196.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823305" version="1" comment="glibc-headers is &lt;2.17-196.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823306" version="1" comment="glibc-static is &lt;2.17-196.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823307" version="1" comment="glibc-utils is &lt;2.17-196.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823308" version="1" comment="nscd is &lt;2.17-196.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823360" version="1" comment="emacs-git is &lt;1.8.3.1-11.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823361" version="1" comment="emacs-git-el is &lt;1.8.3.1-11.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823362" version="1" comment="git is &lt;1.8.3.1-11.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823363" version="1" comment="git-all is &lt;1.8.3.1-11.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823364" version="1" comment="git-bzr is &lt;1.8.3.1-11.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823365" version="1" comment="git-cvs is &lt;1.8.3.1-11.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823366" version="1" comment="git-daemon is &lt;1.8.3.1-11.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823367" version="1" comment="git-email is &lt;1.8.3.1-11.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823368" version="1" comment="git-gui is &lt;1.8.3.1-11.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823369" version="1" comment="git-hg is &lt;1.8.3.1-11.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823370" version="1" comment="git-p4 is &lt;1.8.3.1-11.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823371" version="1" comment="git-svn is &lt;1.8.3.1-11.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823372" version="1" comment="gitk is &lt;1.8.3.1-11.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823373" version="1" comment="gitweb is &lt;1.8.3.1-11.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823374" version="1" comment="perl-Git is &lt;1.8.3.1-11.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823375" version="1" comment="perl-Git-SVN is &lt;1.8.3.1-11.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820918" version="1" comment="openssl is &lt;1.0.1e-42.el7_1.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820919" version="1" comment="openssl-devel is &lt;1.0.1e-42.el7_1.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820920" version="1" comment="openssl-libs is &lt;1.0.1e-42.el7_1.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820921" version="1" comment="openssl-perl is &lt;1.0.1e-42.el7_1.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820922" version="1" comment="openssl-static is &lt;1.0.1e-42.el7_1.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820744" version="1" comment="glibc is &lt;2.17-55.el7_0.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820745" version="1" comment="glibc-common is &lt;2.17-55.el7_0.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820746" version="1" comment="glibc-devel is &lt;2.17-55.el7_0.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820747" version="1" comment="glibc-headers is &lt;2.17-55.el7_0.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820748" version="1" comment="glibc-static is &lt;2.17-55.el7_0.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820749" version="1" comment="glibc-utils is &lt;2.17-55.el7_0.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820750" version="1" comment="nscd is &lt;2.17-55.el7_0.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820784" version="1" comment="libsmbclient is &lt;4.1.1-38.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820785" version="1" comment="libsmbclient-devel is &lt;4.1.1-38.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820786" version="1" comment="libwbclient is &lt;4.1.1-38.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820787" version="1" comment="libwbclient-devel is &lt;4.1.1-38.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820788" version="1" comment="samba is &lt;4.1.1-38.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820789" version="1" comment="samba-client is &lt;4.1.1-38.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820790" version="1" comment="samba-common is &lt;4.1.1-38.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820791" version="1" comment="samba-dc is &lt;4.1.1-38.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820792" version="1" comment="samba-dc-libs is &lt;4.1.1-38.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820793" version="1" comment="samba-devel is &lt;4.1.1-38.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820794" version="1" comment="samba-libs is &lt;4.1.1-38.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820795" version="1" comment="samba-pidl is &lt;4.1.1-38.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820796" version="1" comment="samba-python is &lt;4.1.1-38.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820797" version="1" comment="samba-test is &lt;4.1.1-38.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820798" version="1" comment="samba-test-devel is &lt;4.1.1-38.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820799" version="1" comment="samba-vfs-glusterfs is &lt;4.1.1-38.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820800" version="1" comment="samba-winbind is &lt;4.1.1-38.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820801" version="1" comment="samba-winbind-clients is &lt;4.1.1-38.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820802" version="1" comment="samba-winbind-krb5-locator is &lt;4.1.1-38.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820803" version="1" comment="samba-winbind-modules is &lt;4.1.1-38.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821276" version="1" comment="mod_dav_svn is &lt;1.7.14-7.el7_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821277" version="1" comment="subversion is &lt;1.7.14-7.el7_1.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821278" version="1" comment="subversion-devel is &lt;1.7.14-7.el7_1.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821279" version="1" comment="subversion-gnome is &lt;1.7.14-7.el7_1.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821280" version="1" comment="subversion-javahl is &lt;1.7.14-7.el7_1.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821281" version="1" comment="subversion-kde is &lt;1.7.14-7.el7_1.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821282" version="1" comment="subversion-libs is &lt;1.7.14-7.el7_1.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821283" version="1" comment="subversion-perl is &lt;1.7.14-7.el7_1.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821284" version="1" comment="subversion-python is &lt;1.7.14-7.el7_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821285" version="1" comment="subversion-ruby is &lt;1.7.14-7.el7_1.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821286" version="1" comment="subversion-tools is &lt;1.7.14-7.el7_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821135" version="1" comment="xerces-c is &lt;3.1.1-7.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821136" version="1" comment="xerces-c-devel is &lt;3.1.1-7.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821137" version="1" comment="xerces-c-doc is &lt;3.1.1-7.el7_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821253" version="1" comment="jakarta-taglibs-standard is &lt;1.1.2-14.el7_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821254" version="1" comment="jakarta-taglibs-standard-javadoc is &lt;1.1.2-14.el7_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820966" version="1" comment="xorg-x11-server-Xdmx is &lt;1.15.0-33.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820967" version="1" comment="xorg-x11-server-Xephyr is &lt;1.15.0-33.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820968" version="1" comment="xorg-x11-server-Xnest is &lt;1.15.0-33.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820969" version="1" comment="xorg-x11-server-Xorg is &lt;1.15.0-33.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820970" version="1" comment="xorg-x11-server-Xvfb is &lt;1.15.0-33.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820971" version="1" comment="xorg-x11-server-common is &lt;1.15.0-33.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820972" version="1" comment="xorg-x11-server-devel is &lt;1.15.0-33.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820973" version="1" comment="xorg-x11-server-source is &lt;1.15.0-33.el7_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823301" version="1" comment="tcpdump is &lt;4.9.0-5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821008" version="1" comment="kexec-tools is &lt;2.0.7-19.el7_1.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821009" version="1" comment="kexec-tools-anaconda-addon is &lt;2.0.7-19.el7_1.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821010" version="1" comment="kexec-tools-eppic is &lt;2.0.7-19.el7_1.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821478" version="1" comment="ModemManager is &lt;1.1.0-8.git20130913.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821479" version="1" comment="ModemManager-devel is &lt;1.1.0-8.git20130913.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821480" version="1" comment="ModemManager-glib is &lt;1.1.0-8.git20130913.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821481" version="1" comment="ModemManager-glib-devel is &lt;1.1.0-8.git20130913.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821482" version="1" comment="ModemManager-vala is &lt;1.1.0-8.git20130913.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821483" version="1" comment="NetworkManager is &lt;1.0.6-27.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821484" version="1" comment="NetworkManager-adsl is &lt;1.0.6-27.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821485" version="1" comment="NetworkManager-bluetooth is &lt;1.0.6-27.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821486" version="1" comment="NetworkManager-config-routing-rules is &lt;1.0.6-27.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821487" version="1" comment="NetworkManager-config-server is &lt;1.0.6-27.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821488" version="1" comment="NetworkManager-devel is &lt;1.0.6-27.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821489" version="1" comment="NetworkManager-glib is &lt;1.0.6-27.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821490" version="1" comment="NetworkManager-glib-devel is &lt;1.0.6-27.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821491" version="1" comment="NetworkManager-libnm is &lt;1.0.6-27.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821492" version="1" comment="NetworkManager-libnm-devel is &lt;1.0.6-27.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821493" version="1" comment="NetworkManager-libreswan is &lt;1.0.6-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821494" version="1" comment="NetworkManager-libreswan-gnome is &lt;1.0.6-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821495" version="1" comment="NetworkManager-team is &lt;1.0.6-27.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821496" version="1" comment="NetworkManager-tui is &lt;1.0.6-27.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821497" version="1" comment="NetworkManager-wifi is &lt;1.0.6-27.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821498" version="1" comment="NetworkManager-wwan is &lt;1.0.6-27.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821499" version="1" comment="libnm-gtk is &lt;1.0.6-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821500" version="1" comment="libnm-gtk-devel is &lt;1.0.6-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821501" version="1" comment="network-manager-applet is &lt;1.0.6-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821502" version="1" comment="nm-connection-editor is &lt;1.0.6-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820936" version="1" comment="ipa-admintools is &lt;4.1.0-18.el7_1.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820937" version="1" comment="ipa-client is &lt;4.1.0-18.el7_1.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820938" version="1" comment="ipa-python is &lt;4.1.0-18.el7_1.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820939" version="1" comment="ipa-server is &lt;4.1.0-18.el7_1.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820940" version="1" comment="ipa-server-trust-ad is &lt;4.1.0-18.el7_1.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820941" version="1" comment="slapi-nis is &lt;0.54-3.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821840" version="1" comment="openssl098e is &lt;0.9.8e-29.el7_2.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821233" version="1" comment="mariadb is &lt;5.5.44-1.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821234" version="1" comment="mariadb-bench is &lt;5.5.44-1.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821235" version="1" comment="mariadb-devel is &lt;5.5.44-1.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821236" version="1" comment="mariadb-embedded is &lt;5.5.44-1.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821237" version="1" comment="mariadb-embedded-devel is &lt;5.5.44-1.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821238" version="1" comment="mariadb-libs is &lt;5.5.44-1.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821239" version="1" comment="mariadb-server is &lt;5.5.44-1.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821240" version="1" comment="mariadb-test is &lt;5.5.44-1.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821023" version="1" comment="firefox is &lt;38.0-3.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820959" version="1" comment="firefox is &lt;31.6.0-2.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820965" version="1" comment="thunderbird is &lt;31.6.0-1.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820960" version="1" comment="xulrunner is &lt;31.6.0-2.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820961" version="1" comment="xulrunner-devel is &lt;31.6.0-2.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820923" version="1" comment="firefox is &lt;31.5.3-3.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820804" version="1" comment="firefox is &lt;31.5.0-2.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820903" version="1" comment="thunderbird is &lt;31.5.0-2.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820805" version="1" comment="xulrunner is &lt;31.5.0-1.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820806" version="1" comment="xulrunner-devel is &lt;31.5.0-1.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821315" version="1" comment="libwmf is &lt;0.2.8.4-41.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821316" version="1" comment="libwmf-devel is &lt;0.2.8.4-41.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821317" version="1" comment="libwmf-lite is &lt;0.2.8.4-41.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821401" version="1" comment="grep is &lt;2.20-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820904" version="1" comment="bind is &lt;9.9.4-18.el7_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820905" version="1" comment="bind-chroot is &lt;9.9.4-18.el7_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820906" version="1" comment="bind-devel is &lt;9.9.4-18.el7_1.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820907" version="1" comment="bind-libs is &lt;9.9.4-18.el7_1.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820908" version="1" comment="bind-libs-lite is &lt;9.9.4-18.el7_1.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820909" version="1" comment="bind-license is &lt;9.9.4-18.el7_1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820910" version="1" comment="bind-lite-devel is &lt;9.9.4-18.el7_1.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820911" version="1" comment="bind-sdb is &lt;9.9.4-18.el7_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820912" version="1" comment="bind-sdb-chroot is &lt;9.9.4-18.el7_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820913" version="1" comment="bind-utils is &lt;9.9.4-18.el7_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711378" version="1" comment="kgraft-patch-3_12_32-33-default is &gt;=2-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711380" version="1" comment="kgraft-patch-3_12_36-38-default is &gt;=2-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821337" version="1" comment="libcacard is &lt;1.5.3-86.el7_1.8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821338" version="1" comment="libcacard-devel is &lt;1.5.3-86.el7_1.8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821339" version="1" comment="libcacard-tools is &lt;1.5.3-86.el7_1.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821340" version="1" comment="qemu-img is &lt;1.5.3-86.el7_1.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821341" version="1" comment="qemu-kvm is &lt;1.5.3-86.el7_1.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821342" version="1" comment="qemu-kvm-common is &lt;1.5.3-86.el7_1.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821343" version="1" comment="qemu-kvm-tools is &lt;1.5.3-86.el7_1.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821407" version="1" comment="libssh2 is &lt;1.4.3-10.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821408" version="1" comment="libssh2-devel is &lt;1.4.3-10.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821409" version="1" comment="libssh2-docs is &lt;1.4.3-10.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821271" version="1" comment="libXfont is &lt;1.4.7-3.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821272" version="1" comment="libXfont-devel is &lt;1.4.7-3.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711382" version="1" comment="kgraft-patch-3_12_43-52_6-default is &gt;=2-6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110507" version="1" comment="kernel-default is &lt;3.12.43-52.6.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820942" version="1" comment="setroubleshoot is &lt;3.2.17-4.1.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820943" version="1" comment="setroubleshoot-server is &lt;3.2.17-4.1.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821611" version="1" comment="libxml2 is &lt;2.9.1-6.el7_2.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821612" version="1" comment="libxml2-devel is &lt;2.9.1-6.el7_2.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821613" version="1" comment="libxml2-python is &lt;2.9.1-6.el7_2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821614" version="1" comment="libxml2-static is &lt;2.9.1-6.el7_2.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821473" version="1" comment="chrony is &lt;2.1.1-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820996" version="1" comment="pcs is &lt;0.9.137-13.el7_1.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820997" version="1" comment="python-clufter is &lt;0.9.137-13.el7_1.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820993" version="1" comment="389-ds-base is &lt;1.3.3.1-16.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820994" version="1" comment="389-ds-base-devel is &lt;1.3.3.1-16.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820995" version="1" comment="389-ds-base-libs is &lt;1.3.3.1-16.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821076" version="1" comment="wpa_supplicant is &lt;2.0-17.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821547" version="1" comment="pacemaker is &lt;1.1.13-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821548" version="1" comment="pacemaker-cli is &lt;1.1.13-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821549" version="1" comment="pacemaker-cluster-libs is &lt;1.1.13-10.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821550" version="1" comment="pacemaker-cts is &lt;1.1.13-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821551" version="1" comment="pacemaker-doc is &lt;1.1.13-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821552" version="1" comment="pacemaker-libs is &lt;1.1.13-10.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821553" version="1" comment="pacemaker-libs-devel is &lt;1.1.13-10.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821554" version="1" comment="pacemaker-nagios-plugins-metadata is &lt;1.1.13-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821555" version="1" comment="pacemaker-remote is &lt;1.1.13-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821037" version="1" comment="abrt is &lt;2.1.11-22.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821038" version="1" comment="abrt-addon-ccpp is &lt;2.1.11-22.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821039" version="1" comment="abrt-addon-kerneloops is &lt;2.1.11-22.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821040" version="1" comment="abrt-addon-pstoreoops is &lt;2.1.11-22.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821041" version="1" comment="abrt-addon-python is &lt;2.1.11-22.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821042" version="1" comment="abrt-addon-upload-watch is &lt;2.1.11-22.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821043" version="1" comment="abrt-addon-vmcore is &lt;2.1.11-22.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821044" version="1" comment="abrt-addon-xorg is &lt;2.1.11-22.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821045" version="1" comment="abrt-cli is &lt;2.1.11-22.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821046" version="1" comment="abrt-console-notification is &lt;2.1.11-22.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821047" version="1" comment="abrt-dbus is &lt;2.1.11-22.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821048" version="1" comment="abrt-desktop is &lt;2.1.11-22.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821049" version="1" comment="abrt-devel is &lt;2.1.11-22.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821050" version="1" comment="abrt-gui is &lt;2.1.11-22.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821051" version="1" comment="abrt-gui-devel is &lt;2.1.11-22.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821052" version="1" comment="abrt-gui-libs is &lt;2.1.11-22.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821053" version="1" comment="abrt-libs is &lt;2.1.11-22.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821054" version="1" comment="abrt-python is &lt;2.1.11-22.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821055" version="1" comment="abrt-python-doc is &lt;2.1.11-22.el7_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821056" version="1" comment="abrt-retrace-client is &lt;2.1.11-22.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821057" version="1" comment="abrt-tui is &lt;2.1.11-22.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821058" version="1" comment="libreport is &lt;2.1.11-23.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821059" version="1" comment="libreport-anaconda is &lt;2.1.11-23.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821060" version="1" comment="libreport-cli is &lt;2.1.11-23.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821061" version="1" comment="libreport-compat is &lt;2.1.11-23.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821062" version="1" comment="libreport-devel is &lt;2.1.11-23.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821063" version="1" comment="libreport-filesystem is &lt;2.1.11-23.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821064" version="1" comment="libreport-gtk is &lt;2.1.11-23.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821065" version="1" comment="libreport-gtk-devel is &lt;2.1.11-23.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821066" version="1" comment="libreport-newt is &lt;2.1.11-23.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821067" version="1" comment="libreport-plugin-bugzilla is &lt;2.1.11-23.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821068" version="1" comment="libreport-plugin-kerneloops is &lt;2.1.11-23.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821069" version="1" comment="libreport-plugin-logger is &lt;2.1.11-23.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821070" version="1" comment="libreport-plugin-mailx is &lt;2.1.11-23.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821071" version="1" comment="libreport-plugin-reportuploader is &lt;2.1.11-23.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821072" version="1" comment="libreport-plugin-ureport is &lt;2.1.11-23.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821073" version="1" comment="libreport-python is &lt;2.1.11-23.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821074" version="1" comment="libreport-web is &lt;2.1.11-23.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821075" version="1" comment="libreport-web-devel is &lt;2.1.11-23.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822065" version="1" comment="pcre is &lt;8.32-15.el7_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822066" version="1" comment="pcre-devel is &lt;8.32-15.el7_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822067" version="1" comment="pcre-static is &lt;8.32-15.el7_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822068" version="1" comment="pcre-tools is &lt;8.32-15.el7_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821198" version="1" comment="java-1.6.0-openjdk is &lt;1.6.0.36-1.13.8.1.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821199" version="1" comment="java-1.6.0-openjdk-demo is &lt;1.6.0.36-1.13.8.1.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821200" version="1" comment="java-1.6.0-openjdk-devel is &lt;1.6.0.36-1.13.8.1.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821201" version="1" comment="java-1.6.0-openjdk-javadoc is &lt;1.6.0.36-1.13.8.1.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821202" version="1" comment="java-1.6.0-openjdk-src is &lt;1.6.0.36-1.13.8.1.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821157" version="1" comment="java-1.7.0-openjdk is &lt;1.7.0.85-2.6.1.2.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821158" version="1" comment="java-1.7.0-openjdk-accessibility is &lt;1.7.0.85-2.6.1.2.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821159" version="1" comment="java-1.7.0-openjdk-demo is &lt;1.7.0.85-2.6.1.2.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821160" version="1" comment="java-1.7.0-openjdk-devel is &lt;1.7.0.85-2.6.1.2.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821161" version="1" comment="java-1.7.0-openjdk-headless is &lt;1.7.0.85-2.6.1.2.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821162" version="1" comment="java-1.7.0-openjdk-javadoc is &lt;1.7.0.85-2.6.1.2.el7_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821163" version="1" comment="java-1.7.0-openjdk-src is &lt;1.7.0.85-2.6.1.2.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821150" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.51-1.b16.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821151" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.51-1.b16.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821152" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.51-1.b16.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821153" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.51-1.b16.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821154" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.51-1.b16.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821155" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.51-1.b16.el7_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821156" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.51-1.b16.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821471" version="1" comment="rest is &lt;0.7.92-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821472" version="1" comment="rest-devel is &lt;0.7.92-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821450" version="1" comment="realmd is &lt;0.16.1-5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821451" version="1" comment="realmd-devel-docs is &lt;0.16.1-5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821031" version="1" comment="thunderbird is &lt;31.7.0-1.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826990" version="1" comment="expat is &lt;2.1.0-11.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826991" version="1" comment="expat-devel is &lt;2.1.0-11.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826992" version="1" comment="expat-static is &lt;2.1.0-11.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821149" version="1" comment="firefox is &lt;38.1.0-1.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821174" version="1" comment="thunderbird is &lt;31.8.0-1.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821255" version="1" comment="nss-softokn is &lt;3.16.2.3-13.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821256" version="1" comment="nss-softokn-devel is &lt;3.16.2.3-13.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821257" version="1" comment="nss-softokn-freebl is &lt;3.16.2.3-13.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821258" version="1" comment="nss-softokn-freebl-devel is &lt;3.16.2.3-13.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821126" version="1" comment="mailman is &lt;2.1.15-21.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823204" version="1" comment="libtasn1 is &lt;4.10-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823205" version="1" comment="libtasn1-devel is &lt;4.10-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823206" version="1" comment="libtasn1-tools is &lt;4.10-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711384" version="1" comment="kgraft-patch-3_12_32-33-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711386" version="1" comment="kgraft-patch-3_12_36-38-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711388" version="1" comment="kgraft-patch-3_12_38-44-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711390" version="1" comment="kgraft-patch-3_12_39-47-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711392" version="1" comment="kgraft-patch-3_12_43-52_6-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711394" version="1" comment="kgraft-patch-3_12_44-52_10-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711396" version="1" comment="kgraft-patch-3_12_44-52_18-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711398" version="1" comment="kgraft-patch-3_12_48-52_27-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711400" version="1" comment="kgraft-patch-3_12_49-11-default is &gt;=2-5.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141891" version="1" comment="kernel-default is &lt;3.12.49-11.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821138" version="1" comment="postgresql is &lt;9.2.13-1.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821139" version="1" comment="postgresql-contrib is &lt;9.2.13-1.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821140" version="1" comment="postgresql-devel is &lt;9.2.13-1.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821141" version="1" comment="postgresql-docs is &lt;9.2.13-1.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821142" version="1" comment="postgresql-libs is &lt;9.2.13-1.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821143" version="1" comment="postgresql-plperl is &lt;9.2.13-1.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821144" version="1" comment="postgresql-plpython is &lt;9.2.13-1.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821145" version="1" comment="postgresql-pltcl is &lt;9.2.13-1.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821146" version="1" comment="postgresql-server is &lt;9.2.13-1.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821147" version="1" comment="postgresql-test is &lt;9.2.13-1.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821148" version="1" comment="postgresql-upgrade is &lt;9.2.13-1.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821241" version="1" comment="httpd is &lt;2.4.6-31.el7_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821242" version="1" comment="httpd-devel is &lt;2.4.6-31.el7_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821243" version="1" comment="httpd-manual is &lt;2.4.6-31.el7_1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821244" version="1" comment="httpd-tools is &lt;2.4.6-31.el7_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821245" version="1" comment="mod_ldap is &lt;2.4.6-31.el7_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821246" version="1" comment="mod_proxy_html is &lt;2.4.6-31.el7_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821247" version="1" comment="mod_session is &lt;2.4.6-31.el7_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821248" version="1" comment="mod_ssl is &lt;2.4.6-31.el7_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821648" version="1" comment="openssl is &lt;1.0.1e-51.el7_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821649" version="1" comment="openssl-devel is &lt;1.0.1e-51.el7_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821650" version="1" comment="openssl-libs is &lt;1.0.1e-51.el7_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821651" version="1" comment="openssl-perl is &lt;1.0.1e-51.el7_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821652" version="1" comment="openssl-static is &lt;1.0.1e-51.el7_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821822" version="1" comment="openssl is &lt;1.0.1e-51.el7_2.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821823" version="1" comment="openssl-devel is &lt;1.0.1e-51.el7_2.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821824" version="1" comment="openssl-libs is &lt;1.0.1e-51.el7_2.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821825" version="1" comment="openssl-perl is &lt;1.0.1e-51.el7_2.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821826" version="1" comment="openssl-static is &lt;1.0.1e-51.el7_2.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821127" version="1" comment="libreswan is &lt;3.12-10.1.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821185" version="1" comment="clutter is &lt;1.14.4-12.el7_1.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821186" version="1" comment="clutter-devel is &lt;1.14.4-12.el7_1.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821187" version="1" comment="clutter-doc is &lt;1.14.4-12.el7_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821178" version="1" comment="libcacard is &lt;1.5.3-86.el7_1.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821179" version="1" comment="libcacard-devel is &lt;1.5.3-86.el7_1.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821180" version="1" comment="libcacard-tools is &lt;1.5.3-86.el7_1.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821181" version="1" comment="qemu-img is &lt;1.5.3-86.el7_1.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821182" version="1" comment="qemu-kvm is &lt;1.5.3-86.el7_1.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821183" version="1" comment="qemu-kvm-common is &lt;1.5.3-86.el7_1.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821184" version="1" comment="qemu-kvm-tools is &lt;1.5.3-86.el7_1.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821674" version="1" comment="ctdb is &lt;4.2.3-11.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821675" version="1" comment="ctdb-devel is &lt;4.2.3-11.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821676" version="1" comment="ctdb-tests is &lt;4.2.3-11.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821711" version="1" comment="ldb-tools is &lt;1.1.20-1.el7_2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821712" version="1" comment="libldb is &lt;1.1.20-1.el7_2.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821713" version="1" comment="libldb-devel is &lt;1.1.20-1.el7_2.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821677" version="1" comment="libsmbclient is &lt;4.2.3-11.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821678" version="1" comment="libsmbclient-devel is &lt;4.2.3-11.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821679" version="1" comment="libwbclient is &lt;4.2.3-11.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821680" version="1" comment="libwbclient-devel is &lt;4.2.3-11.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821714" version="1" comment="pyldb is &lt;1.1.20-1.el7_2.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821715" version="1" comment="pyldb-devel is &lt;1.1.20-1.el7_2.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821681" version="1" comment="samba is &lt;4.2.3-11.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821682" version="1" comment="samba-client is &lt;4.2.3-11.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821683" version="1" comment="samba-client-libs is &lt;4.2.3-11.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821684" version="1" comment="samba-common is &lt;4.2.3-11.el7_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821685" version="1" comment="samba-common-libs is &lt;4.2.3-11.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821686" version="1" comment="samba-common-tools is &lt;4.2.3-11.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821687" version="1" comment="samba-dc is &lt;4.2.3-11.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821688" version="1" comment="samba-dc-libs is &lt;4.2.3-11.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821689" version="1" comment="samba-devel is &lt;4.2.3-11.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821690" version="1" comment="samba-libs is &lt;4.2.3-11.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821691" version="1" comment="samba-pidl is &lt;4.2.3-11.el7_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821692" version="1" comment="samba-python is &lt;4.2.3-11.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821693" version="1" comment="samba-test is &lt;4.2.3-11.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821694" version="1" comment="samba-test-devel is &lt;4.2.3-11.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821695" version="1" comment="samba-test-libs is &lt;4.2.3-11.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821696" version="1" comment="samba-vfs-glusterfs is &lt;4.2.3-11.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821697" version="1" comment="samba-winbind is &lt;4.2.3-11.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821698" version="1" comment="samba-winbind-clients is &lt;4.2.3-11.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821699" version="1" comment="samba-winbind-krb5-locator is &lt;4.2.3-11.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821700" version="1" comment="samba-winbind-modules is &lt;4.2.3-11.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821477" version="1" comment="pcs is &lt;0.9.143-15.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821231" version="1" comment="pam is &lt;1.1.8-12.el7_1.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821232" version="1" comment="pam-devel is &lt;1.1.8-12.el7_1.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821356" version="1" comment="libreswan is &lt;3.15-5.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821175" version="1" comment="libuser is &lt;0.60-7.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821176" version="1" comment="libuser-devel is &lt;0.60-7.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821177" version="1" comment="libuser-python is &lt;0.60-7.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821273" version="1" comment="spice-server is &lt;0.12.4-9.el7_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821274" version="1" comment="spice-server-devel is &lt;0.12.4-9.el7_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821542" version="1" comment="openhpi is &lt;3.4.0-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821543" version="1" comment="openhpi-devel is &lt;3.4.0-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821544" version="1" comment="openhpi-libs is &lt;3.4.0-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821814" version="1" comment="polkit is &lt;0.112-6.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821815" version="1" comment="polkit-devel is &lt;0.112-6.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821816" version="1" comment="polkit-docs is &lt;0.112-6.el7_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821539" version="1" comment="cups-filters is &lt;1.0.35-21.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821540" version="1" comment="cups-filters-devel is &lt;1.0.35-21.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821541" version="1" comment="cups-filters-libs is &lt;1.0.35-21.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821402" version="1" comment="openldap is &lt;2.4.40-8.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821403" version="1" comment="openldap-clients is &lt;2.4.40-8.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821404" version="1" comment="openldap-devel is &lt;2.4.40-8.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821405" version="1" comment="openldap-servers is &lt;2.4.40-8.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821406" version="1" comment="openldap-servers-sql is &lt;2.4.40-8.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821275" version="1" comment="haproxy is &lt;1.5.4-4.el7_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821011" version="1" comment="kernel is &lt;3.10.0-229.4.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821012" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-229.4.2.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821013" version="1" comment="kernel-debug is &lt;3.10.0-229.4.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821016" version="1" comment="kernel-doc is &lt;3.10.0-229.4.2.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821017" version="1" comment="kernel-headers is &lt;3.10.0-229.4.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821018" version="1" comment="kernel-tools is &lt;3.10.0-229.4.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821019" version="1" comment="kernel-tools-libs is &lt;3.10.0-229.4.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821021" version="1" comment="perf is &lt;3.10.0-229.4.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821022" version="1" comment="python-perf is &lt;3.10.0-229.4.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821217" version="1" comment="lemon is &lt;3.7.17-6.el7_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821218" version="1" comment="sqlite is &lt;3.7.17-6.el7_1.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821219" version="1" comment="sqlite-devel is &lt;3.7.17-6.el7_1.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821220" version="1" comment="sqlite-doc is &lt;3.7.17-6.el7_1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821221" version="1" comment="sqlite-tcl is &lt;3.7.17-6.el7_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821545" version="1" comment="squid is &lt;3.3.8-26.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821546" version="1" comment="squid-sysvinit is &lt;3.3.8-26.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821024" version="1" comment="libcacard is &lt;1.5.3-86.el7_1.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821025" version="1" comment="libcacard-devel is &lt;1.5.3-86.el7_1.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821026" version="1" comment="libcacard-tools is &lt;1.5.3-86.el7_1.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821027" version="1" comment="qemu-img is &lt;1.5.3-86.el7_1.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821028" version="1" comment="qemu-kvm is &lt;1.5.3-86.el7_1.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821029" version="1" comment="qemu-kvm-common is &lt;1.5.3-86.el7_1.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821030" version="1" comment="qemu-kvm-tools is &lt;1.5.3-86.el7_1.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821128" version="1" comment="nss is &lt;3.19.1-3.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821129" version="1" comment="nss-devel is &lt;3.19.1-3.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821130" version="1" comment="nss-pkcs11-devel is &lt;3.19.1-3.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821131" version="1" comment="nss-sysinit is &lt;3.19.1-3.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821132" version="1" comment="nss-tools is &lt;3.19.1-3.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821133" version="1" comment="nss-util is &lt;3.19.1-1.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821134" version="1" comment="nss-util-devel is &lt;3.19.1-1.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821032" version="1" comment="openssl is &lt;1.0.1e-42.el7_1.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821033" version="1" comment="openssl-devel is &lt;1.0.1e-42.el7_1.6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821034" version="1" comment="openssl-libs is &lt;1.0.1e-42.el7_1.6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821035" version="1" comment="openssl-perl is &lt;1.0.1e-42.el7_1.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821036" version="1" comment="openssl-static is &lt;1.0.1e-42.el7_1.6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821216" version="1" comment="firefox is &lt;38.2.0-4.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821249" version="1" comment="thunderbird is &lt;38.2.0-1.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821251" version="1" comment="gdk-pixbuf2 is &lt;2.28.2-5.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821252" version="1" comment="gdk-pixbuf2-devel is &lt;2.28.2-5.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821215" version="1" comment="firefox is &lt;38.1.1-1.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821250" version="1" comment="firefox is &lt;38.2.1-1.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821306" version="1" comment="firefox is &lt;38.3.0-2.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821312" version="1" comment="thunderbird is &lt;38.3.0-1.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821366" version="1" comment="firefox is &lt;38.4.0-1.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821606" version="1" comment="thunderbird is &lt;38.4.0-1.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821164" version="1" comment="bind is &lt;9.9.4-18.el7_1.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821165" version="1" comment="bind-chroot is &lt;9.9.4-18.el7_1.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821166" version="1" comment="bind-devel is &lt;9.9.4-18.el7_1.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821167" version="1" comment="bind-libs is &lt;9.9.4-18.el7_1.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821168" version="1" comment="bind-libs-lite is &lt;9.9.4-18.el7_1.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821169" version="1" comment="bind-license is &lt;9.9.4-18.el7_1.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821170" version="1" comment="bind-lite-devel is &lt;9.9.4-18.el7_1.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821171" version="1" comment="bind-sdb is &lt;9.9.4-18.el7_1.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821172" version="1" comment="bind-sdb-chroot is &lt;9.9.4-18.el7_1.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821173" version="1" comment="bind-utils is &lt;9.9.4-18.el7_1.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821380" version="1" comment="java-1.6.0-openjdk is &lt;1.6.0.37-1.13.9.4.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821381" version="1" comment="java-1.6.0-openjdk-demo is &lt;1.6.0.37-1.13.9.4.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821382" version="1" comment="java-1.6.0-openjdk-devel is &lt;1.6.0.37-1.13.9.4.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821383" version="1" comment="java-1.6.0-openjdk-javadoc is &lt;1.6.0.37-1.13.9.4.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821384" version="1" comment="java-1.6.0-openjdk-src is &lt;1.6.0.37-1.13.9.4.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821325" version="1" comment="java-1.7.0-openjdk is &lt;1.7.0.91-2.6.2.1.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821326" version="1" comment="java-1.7.0-openjdk-accessibility is &lt;1.7.0.91-2.6.2.1.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821327" version="1" comment="java-1.7.0-openjdk-demo is &lt;1.7.0.91-2.6.2.1.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821328" version="1" comment="java-1.7.0-openjdk-devel is &lt;1.7.0.91-2.6.2.1.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821329" version="1" comment="java-1.7.0-openjdk-headless is &lt;1.7.0.91-2.6.2.1.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821330" version="1" comment="java-1.7.0-openjdk-javadoc is &lt;1.7.0.91-2.6.2.1.el7_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821331" version="1" comment="java-1.7.0-openjdk-src is &lt;1.7.0.91-2.6.2.1.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821318" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.65-2.b17.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821319" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.65-2.b17.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821320" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.65-2.b17.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821321" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.65-2.b17.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821322" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.65-2.b17.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821323" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.65-2.b17.el7_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821324" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.65-2.b17.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821941" version="1" comment="mariadb is &lt;5.5.47-1.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821942" version="1" comment="mariadb-bench is &lt;5.5.47-1.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821943" version="1" comment="mariadb-devel is &lt;5.5.47-1.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821944" version="1" comment="mariadb-embedded is &lt;5.5.47-1.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821945" version="1" comment="mariadb-embedded-devel is &lt;5.5.47-1.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821946" version="1" comment="mariadb-libs is &lt;5.5.47-1.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821947" version="1" comment="mariadb-server is &lt;5.5.47-1.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821948" version="1" comment="mariadb-test is &lt;5.5.47-1.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821743" version="1" comment="java-1.7.0-openjdk is &lt;1.7.0.95-2.6.4.0.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821744" version="1" comment="java-1.7.0-openjdk-accessibility is &lt;1.7.0.95-2.6.4.0.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821745" version="1" comment="java-1.7.0-openjdk-demo is &lt;1.7.0.95-2.6.4.0.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821746" version="1" comment="java-1.7.0-openjdk-devel is &lt;1.7.0.95-2.6.4.0.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821747" version="1" comment="java-1.7.0-openjdk-headless is &lt;1.7.0.95-2.6.4.0.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821748" version="1" comment="java-1.7.0-openjdk-javadoc is &lt;1.7.0.95-2.6.4.0.el7_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821749" version="1" comment="java-1.7.0-openjdk-src is &lt;1.7.0.95-2.6.4.0.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821801" version="1" comment="kernel is &lt;3.10.0-327.10.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821802" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-327.10.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821803" version="1" comment="kernel-debug is &lt;3.10.0-327.10.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821806" version="1" comment="kernel-doc is &lt;3.10.0-327.10.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821807" version="1" comment="kernel-headers is &lt;3.10.0-327.10.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821808" version="1" comment="kernel-tools is &lt;3.10.0-327.10.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821809" version="1" comment="kernel-tools-libs is &lt;3.10.0-327.10.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821811" version="1" comment="perf is &lt;3.10.0-327.10.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821812" version="1" comment="python-perf is &lt;3.10.0-327.10.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822416" version="1" comment="libvirt is &lt;2.0.0-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822417" version="1" comment="libvirt-client is &lt;2.0.0-10.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822418" version="1" comment="libvirt-daemon is &lt;2.0.0-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822419" version="1" comment="libvirt-daemon-config-network is &lt;2.0.0-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822420" version="1" comment="libvirt-daemon-config-nwfilter is &lt;2.0.0-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822421" version="1" comment="libvirt-daemon-driver-interface is &lt;2.0.0-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822422" version="1" comment="libvirt-daemon-driver-lxc is &lt;2.0.0-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822423" version="1" comment="libvirt-daemon-driver-network is &lt;2.0.0-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822424" version="1" comment="libvirt-daemon-driver-nodedev is &lt;2.0.0-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822425" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;2.0.0-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822426" version="1" comment="libvirt-daemon-driver-qemu is &lt;2.0.0-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822427" version="1" comment="libvirt-daemon-driver-secret is &lt;2.0.0-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822428" version="1" comment="libvirt-daemon-driver-storage is &lt;2.0.0-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822429" version="1" comment="libvirt-daemon-kvm is &lt;2.0.0-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822430" version="1" comment="libvirt-daemon-lxc is &lt;2.0.0-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822431" version="1" comment="libvirt-devel is &lt;2.0.0-10.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822432" version="1" comment="libvirt-docs is &lt;2.0.0-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822433" version="1" comment="libvirt-lock-sanlock is &lt;2.0.0-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822434" version="1" comment="libvirt-login-shell is &lt;2.0.0-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822435" version="1" comment="libvirt-nss is &lt;2.0.0-10.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821299" version="1" comment="libcacard is &lt;1.5.3-86.el7_1.6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821300" version="1" comment="libcacard-devel is &lt;1.5.3-86.el7_1.6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821301" version="1" comment="libcacard-tools is &lt;1.5.3-86.el7_1.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821302" version="1" comment="qemu-img is &lt;1.5.3-86.el7_1.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821303" version="1" comment="qemu-kvm is &lt;1.5.3-86.el7_1.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821304" version="1" comment="qemu-kvm-common is &lt;1.5.3-86.el7_1.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821305" version="1" comment="qemu-kvm-tools is &lt;1.5.3-86.el7_1.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822586" version="1" comment="tomcat is &lt;7.0.69-10.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822587" version="1" comment="tomcat-admin-webapps is &lt;7.0.69-10.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822588" version="1" comment="tomcat-docs-webapp is &lt;7.0.69-10.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822589" version="1" comment="tomcat-el-2.2-api is &lt;7.0.69-10.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822590" version="1" comment="tomcat-javadoc is &lt;7.0.69-10.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822591" version="1" comment="tomcat-jsp-2.2-api is &lt;7.0.69-10.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822592" version="1" comment="tomcat-jsvc is &lt;7.0.69-10.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822593" version="1" comment="tomcat-lib is &lt;7.0.69-10.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822594" version="1" comment="tomcat-servlet-3.0-api is &lt;7.0.69-10.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822595" version="1" comment="tomcat-webapps is &lt;7.0.69-10.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821259" version="1" comment="pcs is &lt;0.9.137-13.el7_1.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821260" version="1" comment="python-clufter is &lt;0.9.137-13.el7_1.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822482" version="1" comment="ntp is &lt;4.2.6p5-25.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822483" version="1" comment="ntp-doc is &lt;4.2.6p5-25.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822484" version="1" comment="ntp-perl is &lt;4.2.6p5-25.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822485" version="1" comment="ntpdate is &lt;4.2.6p5-25.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822486" version="1" comment="sntp is &lt;4.2.6p5-25.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822979" version="1" comment="jasper is &lt;1.900.1-30.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822980" version="1" comment="jasper-devel is &lt;1.900.1-30.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822981" version="1" comment="jasper-libs is &lt;1.900.1-30.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822982" version="1" comment="jasper-utils is &lt;1.900.1-30.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821794" version="1" comment="glibc is &lt;2.17-106.el7_2.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821795" version="1" comment="glibc-common is &lt;2.17-106.el7_2.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821796" version="1" comment="glibc-devel is &lt;2.17-106.el7_2.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821797" version="1" comment="glibc-headers is &lt;2.17-106.el7_2.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821798" version="1" comment="glibc-static is &lt;2.17-106.el7_2.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821799" version="1" comment="glibc-utils is &lt;2.17-106.el7_2.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821800" version="1" comment="nscd is &lt;2.17-106.el7_2.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821313" version="1" comment="spice-server is &lt;0.12.4-9.el7_1.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821314" version="1" comment="spice-server-devel is &lt;0.12.4-9.el7_1.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821568" version="1" comment="abrt is &lt;2.1.11-35.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821569" version="1" comment="abrt-addon-ccpp is &lt;2.1.11-35.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821570" version="1" comment="abrt-addon-kerneloops is &lt;2.1.11-35.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821571" version="1" comment="abrt-addon-pstoreoops is &lt;2.1.11-35.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821572" version="1" comment="abrt-addon-python is &lt;2.1.11-35.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821573" version="1" comment="abrt-addon-upload-watch is &lt;2.1.11-35.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821574" version="1" comment="abrt-addon-vmcore is &lt;2.1.11-35.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821575" version="1" comment="abrt-addon-xorg is &lt;2.1.11-35.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821576" version="1" comment="abrt-cli is &lt;2.1.11-35.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821577" version="1" comment="abrt-console-notification is &lt;2.1.11-35.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821578" version="1" comment="abrt-dbus is &lt;2.1.11-35.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821579" version="1" comment="abrt-desktop is &lt;2.1.11-35.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821580" version="1" comment="abrt-devel is &lt;2.1.11-35.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821581" version="1" comment="abrt-gui is &lt;2.1.11-35.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821582" version="1" comment="abrt-gui-devel is &lt;2.1.11-35.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821583" version="1" comment="abrt-gui-libs is &lt;2.1.11-35.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821584" version="1" comment="abrt-libs is &lt;2.1.11-35.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821585" version="1" comment="abrt-python is &lt;2.1.11-35.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821586" version="1" comment="abrt-python-doc is &lt;2.1.11-35.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821587" version="1" comment="abrt-retrace-client is &lt;2.1.11-35.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821588" version="1" comment="abrt-tui is &lt;2.1.11-35.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821589" version="1" comment="libreport is &lt;2.1.11-31.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821590" version="1" comment="libreport-anaconda is &lt;2.1.11-31.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821591" version="1" comment="libreport-cli is &lt;2.1.11-31.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821592" version="1" comment="libreport-compat is &lt;2.1.11-31.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821593" version="1" comment="libreport-devel is &lt;2.1.11-31.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821594" version="1" comment="libreport-filesystem is &lt;2.1.11-31.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821595" version="1" comment="libreport-gtk is &lt;2.1.11-31.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821596" version="1" comment="libreport-gtk-devel is &lt;2.1.11-31.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821597" version="1" comment="libreport-newt is &lt;2.1.11-31.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821598" version="1" comment="libreport-plugin-bugzilla is &lt;2.1.11-31.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821599" version="1" comment="libreport-plugin-kerneloops is &lt;2.1.11-31.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821600" version="1" comment="libreport-plugin-logger is &lt;2.1.11-31.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821601" version="1" comment="libreport-plugin-mailx is &lt;2.1.11-31.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821602" version="1" comment="libreport-plugin-reportuploader is &lt;2.1.11-31.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821603" version="1" comment="libreport-python is &lt;2.1.11-31.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821604" version="1" comment="libreport-web is &lt;2.1.11-31.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821605" version="1" comment="libreport-web-devel is &lt;2.1.11-31.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821439" version="1" comment="glibc is &lt;2.17-106.el7_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821440" version="1" comment="glibc-common is &lt;2.17-106.el7_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821441" version="1" comment="glibc-devel is &lt;2.17-106.el7_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821442" version="1" comment="glibc-headers is &lt;2.17-106.el7_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821443" version="1" comment="glibc-static is &lt;2.17-106.el7_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821444" version="1" comment="glibc-utils is &lt;2.17-106.el7_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821445" version="1" comment="nscd is &lt;2.17-106.el7_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821559" version="1" comment="grub2 is &lt;2.02-0.29.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821560" version="1" comment="grub2-efi is &lt;2.02-0.29.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821561" version="1" comment="grub2-efi-modules is &lt;2.02-0.29.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821562" version="1" comment="grub2-tools is &lt;2.02-0.29.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821367" version="1" comment="postgresql is &lt;9.2.14-1.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821368" version="1" comment="postgresql-contrib is &lt;9.2.14-1.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821369" version="1" comment="postgresql-devel is &lt;9.2.14-1.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821370" version="1" comment="postgresql-docs is &lt;9.2.14-1.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821371" version="1" comment="postgresql-libs is &lt;9.2.14-1.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821372" version="1" comment="postgresql-plperl is &lt;9.2.14-1.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821373" version="1" comment="postgresql-plpython is &lt;9.2.14-1.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821374" version="1" comment="postgresql-pltcl is &lt;9.2.14-1.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821375" version="1" comment="postgresql-server is &lt;9.2.14-1.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821376" version="1" comment="postgresql-test is &lt;9.2.14-1.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821377" version="1" comment="postgresql-upgrade is &lt;9.2.14-1.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821512" version="1" comment="libipa_hbac is &lt;1.13.0-40.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821513" version="1" comment="libipa_hbac-devel is &lt;1.13.0-40.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821514" version="1" comment="libsss_idmap is &lt;1.13.0-40.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821515" version="1" comment="libsss_idmap-devel is &lt;1.13.0-40.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821516" version="1" comment="libsss_nss_idmap is &lt;1.13.0-40.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821517" version="1" comment="libsss_nss_idmap-devel is &lt;1.13.0-40.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821518" version="1" comment="libsss_simpleifp is &lt;1.13.0-40.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821519" version="1" comment="libsss_simpleifp-devel is &lt;1.13.0-40.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821520" version="1" comment="python-libipa_hbac is &lt;1.13.0-40.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821521" version="1" comment="python-libsss_nss_idmap is &lt;1.13.0-40.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821522" version="1" comment="python-sss is &lt;1.13.0-40.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821523" version="1" comment="python-sss-murmur is &lt;1.13.0-40.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821524" version="1" comment="python-sssdconfig is &lt;1.13.0-40.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821525" version="1" comment="sssd is &lt;1.13.0-40.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821526" version="1" comment="sssd-ad is &lt;1.13.0-40.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821527" version="1" comment="sssd-client is &lt;1.13.0-40.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821528" version="1" comment="sssd-common is &lt;1.13.0-40.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821529" version="1" comment="sssd-common-pac is &lt;1.13.0-40.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821530" version="1" comment="sssd-dbus is &lt;1.13.0-40.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821531" version="1" comment="sssd-ipa is &lt;1.13.0-40.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821532" version="1" comment="sssd-krb5 is &lt;1.13.0-40.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821533" version="1" comment="sssd-krb5-common is &lt;1.13.0-40.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821534" version="1" comment="sssd-ldap is &lt;1.13.0-40.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821535" version="1" comment="sssd-libwbclient is &lt;1.13.0-40.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821536" version="1" comment="sssd-libwbclient-devel is &lt;1.13.0-40.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821537" version="1" comment="sssd-proxy is &lt;1.13.0-40.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821538" version="1" comment="sssd-tools is &lt;1.13.0-40.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821332" version="1" comment="ntp is &lt;4.2.6p5-19.el7_1.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821333" version="1" comment="ntp-doc is &lt;4.2.6p5-19.el7_1.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821334" version="1" comment="ntp-perl is &lt;4.2.6p5-19.el7_1.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821335" version="1" comment="ntpdate is &lt;4.2.6p5-19.el7_1.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821336" version="1" comment="sntp is &lt;4.2.6p5-19.el7_1.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821615" version="1" comment="kernel is &lt;3.10.0-327.3.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821616" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-327.3.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821617" version="1" comment="kernel-debug is &lt;3.10.0-327.3.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821620" version="1" comment="kernel-doc is &lt;3.10.0-327.3.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821621" version="1" comment="kernel-headers is &lt;3.10.0-327.3.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821622" version="1" comment="kernel-tools is &lt;3.10.0-327.3.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821623" version="1" comment="kernel-tools-libs is &lt;3.10.0-327.3.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821625" version="1" comment="perf is &lt;3.10.0-327.3.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821626" version="1" comment="python-perf is &lt;3.10.0-327.3.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821951" version="1" comment="ctdb is &lt;4.2.10-6.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821952" version="1" comment="ctdb-devel is &lt;4.2.10-6.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821953" version="1" comment="ctdb-tests is &lt;4.2.10-6.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821954" version="1" comment="ipa-admintools is &lt;4.2.0-15.el7_2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821955" version="1" comment="ipa-client is &lt;4.2.0-15.el7_2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821956" version="1" comment="ipa-python is &lt;4.2.0-15.el7_2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821957" version="1" comment="ipa-server is &lt;4.2.0-15.el7_2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821958" version="1" comment="ipa-server-dns is &lt;4.2.0-15.el7_2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821959" version="1" comment="ipa-server-trust-ad is &lt;4.2.0-15.el7_2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821960" version="1" comment="ldb-tools is &lt;1.1.25-1.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821961" version="1" comment="libldb is &lt;1.1.25-1.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821962" version="1" comment="libldb-devel is &lt;1.1.25-1.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821963" version="1" comment="libsmbclient is &lt;4.2.10-6.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821964" version="1" comment="libsmbclient-devel is &lt;4.2.10-6.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821965" version="1" comment="libtalloc is &lt;2.1.5-1.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821966" version="1" comment="libtalloc-devel is &lt;2.1.5-1.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821967" version="1" comment="libtdb is &lt;1.3.8-1.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821968" version="1" comment="libtdb-devel is &lt;1.3.8-1.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821969" version="1" comment="libtevent is &lt;0.9.26-1.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821970" version="1" comment="libtevent-devel is &lt;0.9.26-1.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821971" version="1" comment="libwbclient is &lt;4.2.10-6.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821972" version="1" comment="libwbclient-devel is &lt;4.2.10-6.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821973" version="1" comment="openchange is &lt;2.0-10.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821974" version="1" comment="openchange-client is &lt;2.0-10.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821975" version="1" comment="openchange-devel is &lt;2.0-10.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821976" version="1" comment="openchange-devel-docs is &lt;2.0-10.el7_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821977" version="1" comment="pyldb is &lt;1.1.25-1.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821978" version="1" comment="pyldb-devel is &lt;1.1.25-1.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821979" version="1" comment="pytalloc is &lt;2.1.5-1.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821980" version="1" comment="pytalloc-devel is &lt;2.1.5-1.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821981" version="1" comment="python-tdb is &lt;1.3.8-1.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821982" version="1" comment="python-tevent is &lt;0.9.26-1.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821983" version="1" comment="samba is &lt;4.2.10-6.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821984" version="1" comment="samba-client is &lt;4.2.10-6.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821985" version="1" comment="samba-client-libs is &lt;4.2.10-6.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821986" version="1" comment="samba-common is &lt;4.2.10-6.el7_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821987" version="1" comment="samba-common-libs is &lt;4.2.10-6.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821988" version="1" comment="samba-common-tools is &lt;4.2.10-6.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821989" version="1" comment="samba-dc is &lt;4.2.10-6.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821990" version="1" comment="samba-dc-libs is &lt;4.2.10-6.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821991" version="1" comment="samba-devel is &lt;4.2.10-6.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821992" version="1" comment="samba-libs is &lt;4.2.10-6.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821993" version="1" comment="samba-pidl is &lt;4.2.10-6.el7_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821994" version="1" comment="samba-python is &lt;4.2.10-6.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821995" version="1" comment="samba-test is &lt;4.2.10-6.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821996" version="1" comment="samba-test-devel is &lt;4.2.10-6.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821997" version="1" comment="samba-test-libs is &lt;4.2.10-6.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821998" version="1" comment="samba-vfs-glusterfs is &lt;4.2.10-6.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821999" version="1" comment="samba-winbind is &lt;4.2.10-6.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822000" version="1" comment="samba-winbind-clients is &lt;4.2.10-6.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822001" version="1" comment="samba-winbind-krb5-locator is &lt;4.2.10-6.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822002" version="1" comment="samba-winbind-modules is &lt;4.2.10-6.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822003" version="1" comment="tdb-tools is &lt;1.3.8-1.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821188" version="1" comment="bind is &lt;9.9.4-18.el7_1.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821189" version="1" comment="bind-chroot is &lt;9.9.4-18.el7_1.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821190" version="1" comment="bind-devel is &lt;9.9.4-18.el7_1.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821191" version="1" comment="bind-libs is &lt;9.9.4-18.el7_1.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821192" version="1" comment="bind-libs-lite is &lt;9.9.4-18.el7_1.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821193" version="1" comment="bind-license is &lt;9.9.4-18.el7_1.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821194" version="1" comment="bind-lite-devel is &lt;9.9.4-18.el7_1.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821195" version="1" comment="bind-sdb is &lt;9.9.4-18.el7_1.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821196" version="1" comment="bind-sdb-chroot is &lt;9.9.4-18.el7_1.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821197" version="1" comment="bind-utils is &lt;9.9.4-18.el7_1.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821385" version="1" comment="openssh is &lt;6.6.1p1-22.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821386" version="1" comment="openssh-askpass is &lt;6.6.1p1-22.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821387" version="1" comment="openssh-clients is &lt;6.6.1p1-22.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821388" version="1" comment="openssh-keycat is &lt;6.6.1p1-22.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821389" version="1" comment="openssh-ldap is &lt;6.6.1p1-22.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821390" version="1" comment="openssh-server is &lt;6.6.1p1-22.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821391" version="1" comment="openssh-server-sysvinit is &lt;6.6.1p1-22.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821392" version="1" comment="pam_ssh_agent_auth is &lt;0.9.3-9.22.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821222" version="1" comment="net-snmp is &lt;5.7.2-20.el7_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821223" version="1" comment="net-snmp-agent-libs is &lt;5.7.2-20.el7_1.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821224" version="1" comment="net-snmp-devel is &lt;5.7.2-20.el7_1.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821225" version="1" comment="net-snmp-gui is &lt;5.7.2-20.el7_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821226" version="1" comment="net-snmp-libs is &lt;5.7.2-20.el7_1.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821227" version="1" comment="net-snmp-perl is &lt;5.7.2-20.el7_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821228" version="1" comment="net-snmp-python is &lt;5.7.2-20.el7_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821229" version="1" comment="net-snmp-sysvinit is &lt;5.7.2-20.el7_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821230" version="1" comment="net-snmp-utils is &lt;5.7.2-20.el7_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711402" version="1" comment="kgraft-patch-3_12_32-33-default is &gt;=4-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711404" version="1" comment="kgraft-patch-3_12_36-38-default is &gt;=4-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711406" version="1" comment="kgraft-patch-3_12_38-44-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711408" version="1" comment="kgraft-patch-3_12_39-47-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711410" version="1" comment="kgraft-patch-3_12_43-52_6-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711412" version="1" comment="kgraft-patch-3_12_44-52_10-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711414" version="1" comment="kgraft-patch-3_12_44-52_18-default is &gt;=2-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114432" version="1" comment="kernel-default is &lt;3.12.44-52.18.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821261" version="1" comment="bind is &lt;9.9.4-18.el7_1.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821262" version="1" comment="bind-chroot is &lt;9.9.4-18.el7_1.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821263" version="1" comment="bind-devel is &lt;9.9.4-18.el7_1.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821264" version="1" comment="bind-libs is &lt;9.9.4-18.el7_1.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821265" version="1" comment="bind-libs-lite is &lt;9.9.4-18.el7_1.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821266" version="1" comment="bind-license is &lt;9.9.4-18.el7_1.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821267" version="1" comment="bind-lite-devel is &lt;9.9.4-18.el7_1.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821268" version="1" comment="bind-sdb is &lt;9.9.4-18.el7_1.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821269" version="1" comment="bind-sdb-chroot is &lt;9.9.4-18.el7_1.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821270" version="1" comment="bind-utils is &lt;9.9.4-18.el7_1.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821307" version="1" comment="openldap is &lt;2.4.39-7.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821308" version="1" comment="openldap-clients is &lt;2.4.39-7.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821309" version="1" comment="openldap-devel is &lt;2.4.39-7.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821310" version="1" comment="openldap-servers is &lt;2.4.39-7.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821311" version="1" comment="openldap-servers-sql is &lt;2.4.39-7.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821357" version="1" comment="nspr is &lt;4.10.8-2.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821358" version="1" comment="nspr-devel is &lt;4.10.8-2.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821359" version="1" comment="nss is &lt;3.19.1-7.el7_1.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821360" version="1" comment="nss-devel is &lt;3.19.1-7.el7_1.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821361" version="1" comment="nss-pkcs11-devel is &lt;3.19.1-7.el7_1.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821362" version="1" comment="nss-sysinit is &lt;3.19.1-7.el7_1.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821363" version="1" comment="nss-tools is &lt;3.19.1-7.el7_1.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821364" version="1" comment="nss-util is &lt;3.19.1-4.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821365" version="1" comment="nss-util-devel is &lt;3.19.1-4.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821671" version="1" comment="firefox is &lt;38.5.0-3.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821672" version="1" comment="thunderbird is &lt;38.5.0-1.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821673" version="1" comment="rpcbind is &lt;0.2.0-33.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823411" version="1" comment="gdm is &lt;3.22.3-11.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823412" version="1" comment="gdm-devel is &lt;3.22.3-11.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823413" version="1" comment="gnome-session is &lt;3.22.3-4.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823414" version="1" comment="gnome-session-custom-session is &lt;3.22.3-4.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823415" version="1" comment="gnome-session-xsession is &lt;3.22.3-4.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821607" version="1" comment="apache-commons-collections is &lt;3.2.1-22.el7_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821608" version="1" comment="apache-commons-collections-javadoc is &lt;3.2.1-22.el7_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821609" version="1" comment="apache-commons-collections-testframework is &lt;3.2.1-22.el7_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821610" version="1" comment="apache-commons-collections-testframework-javadoc is &lt;3.2.1-22.el7_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821813" version="1" comment="sos is &lt;3.2-35.el7_2.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821848" version="1" comment="ctdb is &lt;4.2.3-12.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821849" version="1" comment="ctdb-devel is &lt;4.2.3-12.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821850" version="1" comment="ctdb-tests is &lt;4.2.3-12.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821851" version="1" comment="libsmbclient is &lt;4.2.3-12.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821852" version="1" comment="libsmbclient-devel is &lt;4.2.3-12.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821853" version="1" comment="libwbclient is &lt;4.2.3-12.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821854" version="1" comment="libwbclient-devel is &lt;4.2.3-12.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821855" version="1" comment="samba is &lt;4.2.3-12.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821856" version="1" comment="samba-client is &lt;4.2.3-12.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821857" version="1" comment="samba-client-libs is &lt;4.2.3-12.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821858" version="1" comment="samba-common is &lt;4.2.3-12.el7_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821859" version="1" comment="samba-common-libs is &lt;4.2.3-12.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821860" version="1" comment="samba-common-tools is &lt;4.2.3-12.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821861" version="1" comment="samba-dc is &lt;4.2.3-12.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821862" version="1" comment="samba-dc-libs is &lt;4.2.3-12.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821863" version="1" comment="samba-devel is &lt;4.2.3-12.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821864" version="1" comment="samba-libs is &lt;4.2.3-12.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821865" version="1" comment="samba-pidl is &lt;4.2.3-12.el7_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821866" version="1" comment="samba-python is &lt;4.2.3-12.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821867" version="1" comment="samba-test is &lt;4.2.3-12.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821868" version="1" comment="samba-test-devel is &lt;4.2.3-12.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821869" version="1" comment="samba-test-libs is &lt;4.2.3-12.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821870" version="1" comment="samba-vfs-glusterfs is &lt;4.2.3-12.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821871" version="1" comment="samba-winbind is &lt;4.2.3-12.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821872" version="1" comment="samba-winbind-clients is &lt;4.2.3-12.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821873" version="1" comment="samba-winbind-krb5-locator is &lt;4.2.3-12.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821874" version="1" comment="samba-winbind-modules is &lt;4.2.3-12.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821716" version="1" comment="gnutls is &lt;3.3.8-14.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821717" version="1" comment="gnutls-c++ is &lt;3.3.8-14.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821718" version="1" comment="gnutls-dane is &lt;3.3.8-14.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821719" version="1" comment="gnutls-devel is &lt;3.3.8-14.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821720" version="1" comment="gnutls-utils is &lt;3.3.8-14.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821729" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.71-2.b15.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821730" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.71-2.b15.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821731" version="1" comment="java-1.8.0-openjdk-accessibility-debug is &lt;1.8.0.71-2.b15.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821732" version="1" comment="java-1.8.0-openjdk-debug is &lt;1.8.0.71-2.b15.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821733" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.71-2.b15.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821734" version="1" comment="java-1.8.0-openjdk-demo-debug is &lt;1.8.0.71-2.b15.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821735" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.71-2.b15.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821736" version="1" comment="java-1.8.0-openjdk-devel-debug is &lt;1.8.0.71-2.b15.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821737" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.71-2.b15.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821738" version="1" comment="java-1.8.0-openjdk-headless-debug is &lt;1.8.0.71-2.b15.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821739" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.71-2.b15.el7_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821740" version="1" comment="java-1.8.0-openjdk-javadoc-debug is &lt;1.8.0.71-2.b15.el7_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821741" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.71-2.b15.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821742" version="1" comment="java-1.8.0-openjdk-src-debug is &lt;1.8.0.71-2.b15.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821701" version="1" comment="nss is &lt;3.19.1-19.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821702" version="1" comment="nss-devel is &lt;3.19.1-19.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821703" version="1" comment="nss-pkcs11-devel is &lt;3.19.1-19.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821704" version="1" comment="nss-sysinit is &lt;3.19.1-19.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821705" version="1" comment="nss-tools is &lt;3.19.1-19.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821706" version="1" comment="openssl is &lt;1.0.1e-51.el7_2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821707" version="1" comment="openssl-devel is &lt;1.0.1e-51.el7_2.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821708" version="1" comment="openssl-libs is &lt;1.0.1e-51.el7_2.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821709" version="1" comment="openssl-perl is &lt;1.0.1e-51.el7_2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821710" version="1" comment="openssl-static is &lt;1.0.1e-51.el7_2.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821643" version="1" comment="libpng12 is &lt;1.2.50-7.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821644" version="1" comment="libpng12-devel is &lt;1.2.50-7.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821657" version="1" comment="bind is &lt;9.9.4-29.el7_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821658" version="1" comment="bind-chroot is &lt;9.9.4-29.el7_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821659" version="1" comment="bind-devel is &lt;9.9.4-29.el7_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821660" version="1" comment="bind-libs is &lt;9.9.4-29.el7_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821661" version="1" comment="bind-libs-lite is &lt;9.9.4-29.el7_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821662" version="1" comment="bind-license is &lt;9.9.4-29.el7_2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821663" version="1" comment="bind-lite-devel is &lt;9.9.4-29.el7_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821664" version="1" comment="bind-pkcs11 is &lt;9.9.4-29.el7_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821665" version="1" comment="bind-pkcs11-devel is &lt;9.9.4-29.el7_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821666" version="1" comment="bind-pkcs11-libs is &lt;9.9.4-29.el7_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821667" version="1" comment="bind-pkcs11-utils is &lt;9.9.4-29.el7_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821668" version="1" comment="bind-sdb is &lt;9.9.4-29.el7_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821669" version="1" comment="bind-sdb-chroot is &lt;9.9.4-29.el7_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821670" version="1" comment="bind-utils is &lt;9.9.4-29.el7_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121536" version="1" comment="kernel-default is &lt;3.12.51-60.25.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827903" version="1" comment="libxml2 is &lt;2.9.1-6.el7.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827904" version="1" comment="libxml2-devel is &lt;2.9.1-6.el7.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827905" version="1" comment="libxml2-python is &lt;2.9.1-6.el7.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827906" version="1" comment="libxml2-static is &lt;2.9.1-6.el7.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821645" version="1" comment="libpng is &lt;1.5.13-7.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821646" version="1" comment="libpng-devel is &lt;1.5.13-7.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821647" version="1" comment="libpng-static is &lt;1.5.13-7.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821750" version="1" comment="ntp is &lt;4.2.6p5-22.el7_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821751" version="1" comment="ntp-doc is &lt;4.2.6p5-22.el7_2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821752" version="1" comment="ntp-perl is &lt;4.2.6p5-22.el7_2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821753" version="1" comment="ntpdate is &lt;4.2.6p5-22.el7_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821754" version="1" comment="sntp is &lt;4.2.6p5-22.el7_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822499" version="1" comment="openssh is &lt;6.6.1p1-31.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822500" version="1" comment="openssh-askpass is &lt;6.6.1p1-31.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822501" version="1" comment="openssh-clients is &lt;6.6.1p1-31.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822502" version="1" comment="openssh-keycat is &lt;6.6.1p1-31.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822503" version="1" comment="openssh-ldap is &lt;6.6.1p1-31.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822504" version="1" comment="openssh-server is &lt;6.6.1p1-31.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822505" version="1" comment="openssh-server-sysvinit is &lt;6.6.1p1-31.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822506" version="1" comment="pam_ssh_agent_auth is &lt;0.9.3-9.31.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821653" version="1" comment="grub2 is &lt;2.02-0.33.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821654" version="1" comment="grub2-efi is &lt;2.02-0.33.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821655" version="1" comment="grub2-efi-modules is &lt;2.02-0.33.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821656" version="1" comment="grub2-tools is &lt;2.02-0.33.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711416" version="1" comment="kgraft-patch-3_12_51-52_31-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711418" version="1" comment="kgraft-patch-3_12_51-60_20-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118983" version="1" comment="kernel-default is &lt;3.12.51-60.20.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823952" version="1" comment="kernel is &lt;3.10.0-693.17.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823953" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-693.17.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823954" version="1" comment="kernel-debug is &lt;3.10.0-693.17.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823957" version="1" comment="kernel-doc is &lt;3.10.0-693.17.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823958" version="1" comment="kernel-headers is &lt;3.10.0-693.17.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823959" version="1" comment="kernel-tools is &lt;3.10.0-693.17.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823960" version="1" comment="kernel-tools-libs is &lt;3.10.0-693.17.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823962" version="1" comment="perf is &lt;3.10.0-693.17.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823963" version="1" comment="python-perf is &lt;3.10.0-693.17.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821935" version="1" comment="krb5-devel is &lt;1.13.2-12.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821936" version="1" comment="krb5-libs is &lt;1.13.2-12.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821937" version="1" comment="krb5-pkinit is &lt;1.13.2-12.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821938" version="1" comment="krb5-server is &lt;1.13.2-12.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821939" version="1" comment="krb5-server-ldap is &lt;1.13.2-12.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821940" version="1" comment="krb5-workstation is &lt;1.13.2-12.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711420" version="1" comment="kgraft-patch-3_12_49-11-default is &gt;=3-8.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711422" version="1" comment="kgraft-patch-3_12_51-60_20-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711424" version="1" comment="kgraft-patch-3_12_51-60_25-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822194" version="1" comment="kernel is &lt;3.10.0-327.28.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822195" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-327.28.2.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822196" version="1" comment="kernel-debug is &lt;3.10.0-327.28.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822199" version="1" comment="kernel-doc is &lt;3.10.0-327.28.2.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822200" version="1" comment="kernel-headers is &lt;3.10.0-327.28.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822201" version="1" comment="kernel-tools is &lt;3.10.0-327.28.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822202" version="1" comment="kernel-tools-libs is &lt;3.10.0-327.28.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822204" version="1" comment="perf is &lt;3.10.0-327.28.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822205" version="1" comment="python-perf is &lt;3.10.0-327.28.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821773" version="1" comment="bind is &lt;9.9.4-29.el7_2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821774" version="1" comment="bind-chroot is &lt;9.9.4-29.el7_2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821775" version="1" comment="bind-devel is &lt;9.9.4-29.el7_2.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821776" version="1" comment="bind-libs is &lt;9.9.4-29.el7_2.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821777" version="1" comment="bind-libs-lite is &lt;9.9.4-29.el7_2.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821778" version="1" comment="bind-license is &lt;9.9.4-29.el7_2.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821779" version="1" comment="bind-lite-devel is &lt;9.9.4-29.el7_2.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821780" version="1" comment="bind-pkcs11 is &lt;9.9.4-29.el7_2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821781" version="1" comment="bind-pkcs11-devel is &lt;9.9.4-29.el7_2.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821782" version="1" comment="bind-pkcs11-libs is &lt;9.9.4-29.el7_2.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821783" version="1" comment="bind-pkcs11-utils is &lt;9.9.4-29.el7_2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821784" version="1" comment="bind-sdb is &lt;9.9.4-29.el7_2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821785" version="1" comment="bind-sdb-chroot is &lt;9.9.4-29.el7_2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821786" version="1" comment="bind-utils is &lt;9.9.4-29.el7_2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711426" version="1" comment="kgraft-patch-3_12_39-47-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711428" version="1" comment="kgraft-patch-3_12_43-52_6-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711430" version="1" comment="kgraft-patch-3_12_44-52_10-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711432" version="1" comment="kgraft-patch-3_12_44-52_18-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711434" version="1" comment="kgraft-patch-3_12_48-52_27-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711436" version="1" comment="kgraft-patch-3_12_49-11-default is &gt;=4-11.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711438" version="1" comment="kgraft-patch-3_12_51-52_31-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711440" version="1" comment="kgraft-patch-3_12_51-52_34-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711442" version="1" comment="kgraft-patch-3_12_51-52_39-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711444" version="1" comment="kgraft-patch-3_12_51-60_20-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711446" version="1" comment="kgraft-patch-3_12_51-60_25-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711448" version="1" comment="kgraft-patch-3_12_53-60_30-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123221" version="1" comment="kernel-default is &lt;3.12.53-60.30.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822100" version="1" comment="kernel is &lt;3.10.0-327.22.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822101" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-327.22.2.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822102" version="1" comment="kernel-debug is &lt;3.10.0-327.22.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822105" version="1" comment="kernel-doc is &lt;3.10.0-327.22.2.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822106" version="1" comment="kernel-headers is &lt;3.10.0-327.22.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822107" version="1" comment="kernel-tools is &lt;3.10.0-327.22.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822108" version="1" comment="kernel-tools-libs is &lt;3.10.0-327.22.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822110" version="1" comment="perf is &lt;3.10.0-327.22.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822111" version="1" comment="python-perf is &lt;3.10.0-327.22.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822480" version="1" comment="nettle is &lt;2.7.1-8.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822481" version="1" comment="nettle-devel is &lt;2.7.1-8.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824786" version="1" comment="bpftool is &lt;3.10.0-957.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824787" version="1" comment="kernel is &lt;3.10.0-957.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824788" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-957.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824789" version="1" comment="kernel-debug is &lt;3.10.0-957.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824792" version="1" comment="kernel-doc is &lt;3.10.0-957.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824793" version="1" comment="kernel-headers is &lt;3.10.0-957.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824794" version="1" comment="kernel-tools is &lt;3.10.0-957.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824795" version="1" comment="kernel-tools-libs is &lt;3.10.0-957.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824797" version="1" comment="perf is &lt;3.10.0-957.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824798" version="1" comment="python-perf is &lt;3.10.0-957.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822445" version="1" comment="poppler is &lt;0.26.5-16.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822446" version="1" comment="poppler-cpp is &lt;0.26.5-16.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822447" version="1" comment="poppler-cpp-devel is &lt;0.26.5-16.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822448" version="1" comment="poppler-demos is &lt;0.26.5-16.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822449" version="1" comment="poppler-devel is &lt;0.26.5-16.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822450" version="1" comment="poppler-glib is &lt;0.26.5-16.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822451" version="1" comment="poppler-glib-devel is &lt;0.26.5-16.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822452" version="1" comment="poppler-qt is &lt;0.26.5-16.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822453" version="1" comment="poppler-qt-devel is &lt;0.26.5-16.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822454" version="1" comment="poppler-utils is &lt;0.26.5-16.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822390" version="1" comment="libguestfs is &lt;1.32.7-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822391" version="1" comment="libguestfs-bash-completion is &lt;1.32.7-3.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822392" version="1" comment="libguestfs-devel is &lt;1.32.7-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822393" version="1" comment="libguestfs-gfs2 is &lt;1.32.7-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822394" version="1" comment="libguestfs-gobject is &lt;1.32.7-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822395" version="1" comment="libguestfs-gobject-devel is &lt;1.32.7-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822396" version="1" comment="libguestfs-gobject-doc is &lt;1.32.7-3.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822397" version="1" comment="libguestfs-inspect-icons is &lt;1.32.7-3.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822398" version="1" comment="libguestfs-java is &lt;1.32.7-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822399" version="1" comment="libguestfs-java-devel is &lt;1.32.7-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822400" version="1" comment="libguestfs-javadoc is &lt;1.32.7-3.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822401" version="1" comment="libguestfs-man-pages-ja is &lt;1.32.7-3.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822402" version="1" comment="libguestfs-man-pages-uk is &lt;1.32.7-3.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822403" version="1" comment="libguestfs-rescue is &lt;1.32.7-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822404" version="1" comment="libguestfs-rsync is &lt;1.32.7-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822405" version="1" comment="libguestfs-tools is &lt;1.32.7-3.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822406" version="1" comment="libguestfs-tools-c is &lt;1.32.7-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822407" version="1" comment="libguestfs-xfs is &lt;1.32.7-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822408" version="1" comment="lua-guestfs is &lt;1.32.7-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822119" version="1" comment="ocaml is &lt;4.01.0-22.7.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822120" version="1" comment="ocaml-camlp4 is &lt;4.01.0-22.7.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822121" version="1" comment="ocaml-camlp4-devel is &lt;4.01.0-22.7.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822122" version="1" comment="ocaml-compiler-libs is &lt;4.01.0-22.7.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822123" version="1" comment="ocaml-docs is &lt;4.01.0-22.7.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822124" version="1" comment="ocaml-emacs is &lt;4.01.0-22.7.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822125" version="1" comment="ocaml-labltk is &lt;4.01.0-22.7.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822126" version="1" comment="ocaml-labltk-devel is &lt;4.01.0-22.7.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822409" version="1" comment="ocaml-libguestfs is &lt;1.32.7-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822410" version="1" comment="ocaml-libguestfs-devel is &lt;1.32.7-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822127" version="1" comment="ocaml-ocamldoc is &lt;4.01.0-22.7.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822128" version="1" comment="ocaml-runtime is &lt;4.01.0-22.7.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822129" version="1" comment="ocaml-source is &lt;4.01.0-22.7.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822130" version="1" comment="ocaml-x11 is &lt;4.01.0-22.7.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822411" version="1" comment="perl-Sys-Guestfs is &lt;1.32.7-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822412" version="1" comment="python-libguestfs is &lt;1.32.7-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822413" version="1" comment="ruby-libguestfs is &lt;1.32.7-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822414" version="1" comment="virt-dib is &lt;1.32.7-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822415" version="1" comment="virt-v2v is &lt;1.32.7-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822802" version="1" comment="libtiff is &lt;4.0.3-27.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822803" version="1" comment="libtiff-devel is &lt;4.0.3-27.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822804" version="1" comment="libtiff-static is &lt;4.0.3-27.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822805" version="1" comment="libtiff-tools is &lt;4.0.3-27.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822094" version="1" comment="ImageMagick is &lt;6.7.8.9-15.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822095" version="1" comment="ImageMagick-c++ is &lt;6.7.8.9-15.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822096" version="1" comment="ImageMagick-c++-devel is &lt;6.7.8.9-15.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822097" version="1" comment="ImageMagick-devel is &lt;6.7.8.9-15.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822098" version="1" comment="ImageMagick-doc is &lt;6.7.8.9-15.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822099" version="1" comment="ImageMagick-perl is &lt;6.7.8.9-15.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822282" version="1" comment="bsdcpio is &lt;3.1.2-10.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822283" version="1" comment="bsdtar is &lt;3.1.2-10.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822284" version="1" comment="libarchive is &lt;3.1.2-10.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822285" version="1" comment="libarchive-devel is &lt;3.1.2-10.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828282" version="1" comment="ipa-client is &lt;4.6.8-5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828283" version="1" comment="ipa-client-common is &lt;4.6.8-5.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828284" version="1" comment="ipa-common is &lt;4.6.8-5.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828285" version="1" comment="ipa-python-compat is &lt;4.6.8-5.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828286" version="1" comment="ipa-server is &lt;4.6.8-5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828287" version="1" comment="ipa-server-common is &lt;4.6.8-5.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828288" version="1" comment="ipa-server-dns is &lt;4.6.8-5.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828289" version="1" comment="ipa-server-trust-ad is &lt;4.6.8-5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828290" version="1" comment="python2-ipaclient is &lt;4.6.8-5.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828291" version="1" comment="python2-ipalib is &lt;4.6.8-5.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828292" version="1" comment="python2-ipaserver is &lt;4.6.8-5.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824666" version="1" comment="drm-utils is &lt;2.4.91-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824667" version="1" comment="egl-utils is &lt;8.3.0-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824668" version="1" comment="freeglut is &lt;3.0.0-8.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824669" version="1" comment="freeglut-devel is &lt;3.0.0-8.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824670" version="1" comment="glx-utils is &lt;8.3.0-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824671" version="1" comment="intel-gpu-tools is &lt;2.99.917-28.20180530.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824672" version="1" comment="libX11 is &lt;1.6.5-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824673" version="1" comment="libX11-common is &lt;1.6.5-2.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824674" version="1" comment="libX11-devel is &lt;1.6.5-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824675" version="1" comment="libXcursor is &lt;1.1.15-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824676" version="1" comment="libXcursor-devel is &lt;1.1.15-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824677" version="1" comment="libXfont is &lt;1.5.4-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824678" version="1" comment="libXfont-devel is &lt;1.5.4-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824679" version="1" comment="libXfont2 is &lt;2.0.3-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824680" version="1" comment="libXfont2-devel is &lt;2.0.3-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824681" version="1" comment="libXres is &lt;1.2.0-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824682" version="1" comment="libXres-devel is &lt;1.2.0-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824683" version="1" comment="libdrm is &lt;2.4.91-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824684" version="1" comment="libdrm-devel is &lt;2.4.91-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824685" version="1" comment="libepoxy is &lt;1.5.2-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824686" version="1" comment="libepoxy-devel is &lt;1.5.2-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824687" version="1" comment="libglvnd is &lt;1.0.1-0.8.git5baa1e5.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824688" version="1" comment="libglvnd-core-devel is &lt;1.0.1-0.8.git5baa1e5.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824689" version="1" comment="libglvnd-devel is &lt;1.0.1-0.8.git5baa1e5.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824690" version="1" comment="libglvnd-egl is &lt;1.0.1-0.8.git5baa1e5.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824691" version="1" comment="libglvnd-gles is &lt;1.0.1-0.8.git5baa1e5.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824692" version="1" comment="libglvnd-glx is &lt;1.0.1-0.8.git5baa1e5.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824693" version="1" comment="libglvnd-opengl is &lt;1.0.1-0.8.git5baa1e5.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824694" version="1" comment="libinput is &lt;1.10.7-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824695" version="1" comment="libinput-devel is &lt;1.10.7-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824696" version="1" comment="libwacom is &lt;0.30-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824697" version="1" comment="libwacom-data is &lt;0.30-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824698" version="1" comment="libwacom-devel is &lt;0.30-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824699" version="1" comment="libxcb is &lt;1.13-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824700" version="1" comment="libxcb-devel is &lt;1.13-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824701" version="1" comment="libxcb-doc is &lt;1.13-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824702" version="1" comment="mesa-demos is &lt;8.3.0-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824703" version="1" comment="mesa-dri-drivers is &lt;18.0.5-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824704" version="1" comment="mesa-filesystem is &lt;18.0.5-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824705" version="1" comment="mesa-libEGL is &lt;18.0.5-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824706" version="1" comment="mesa-libEGL-devel is &lt;18.0.5-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824707" version="1" comment="mesa-libGL is &lt;18.0.5-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824708" version="1" comment="mesa-libGL-devel is &lt;18.0.5-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824709" version="1" comment="mesa-libGLES is &lt;18.0.5-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824710" version="1" comment="mesa-libGLES-devel is &lt;18.0.5-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824711" version="1" comment="mesa-libOSMesa is &lt;18.0.5-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824712" version="1" comment="mesa-libOSMesa-devel is &lt;18.0.5-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824713" version="1" comment="mesa-libgbm is &lt;18.0.5-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824714" version="1" comment="mesa-libgbm-devel is &lt;18.0.5-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824715" version="1" comment="mesa-libglapi is &lt;18.0.5-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824716" version="1" comment="mesa-libwayland-egl is &lt;18.0.5-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824717" version="1" comment="mesa-libwayland-egl-devel is &lt;18.0.5-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824718" version="1" comment="mesa-libxatracker is &lt;18.0.5-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824719" version="1" comment="mesa-libxatracker-devel is &lt;18.0.5-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824720" version="1" comment="mesa-vdpau-drivers is &lt;18.0.5-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824721" version="1" comment="mesa-vulkan-drivers is &lt;18.0.5-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824722" version="1" comment="tigervnc is &lt;1.8.0-13.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824723" version="1" comment="tigervnc-icons is &lt;1.8.0-13.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824724" version="1" comment="tigervnc-license is &lt;1.8.0-13.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824725" version="1" comment="tigervnc-server is &lt;1.8.0-13.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824726" version="1" comment="tigervnc-server-applet is &lt;1.8.0-13.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824727" version="1" comment="tigervnc-server-minimal is &lt;1.8.0-13.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824728" version="1" comment="tigervnc-server-module is &lt;1.8.0-13.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824729" version="1" comment="vulkan is &lt;1.1.73.0-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824730" version="1" comment="vulkan-devel is &lt;1.1.73.0-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824731" version="1" comment="vulkan-filesystem is &lt;1.1.73.0-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824732" version="1" comment="xcb-proto is &lt;1.13-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824733" version="1" comment="xkeyboard-config is &lt;2.24-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824734" version="1" comment="xkeyboard-config-devel is &lt;2.24-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824735" version="1" comment="xorg-x11-drv-ati is &lt;18.0.1-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824736" version="1" comment="xorg-x11-drv-dummy is &lt;0.3.7-1.el7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824737" version="1" comment="xorg-x11-drv-evdev is &lt;2.10.6-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824738" version="1" comment="xorg-x11-drv-evdev-devel is &lt;2.10.6-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824739" version="1" comment="xorg-x11-drv-fbdev is &lt;0.5.0-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824740" version="1" comment="xorg-x11-drv-intel is &lt;2.99.917-28.20180530.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824741" version="1" comment="xorg-x11-drv-intel-devel is &lt;2.99.917-28.20180530.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824742" version="1" comment="xorg-x11-drv-libinput is &lt;0.27.1-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824743" version="1" comment="xorg-x11-drv-libinput-devel is &lt;0.27.1-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824744" version="1" comment="xorg-x11-drv-mouse is &lt;1.9.2-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824745" version="1" comment="xorg-x11-drv-mouse-devel is &lt;1.9.2-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824746" version="1" comment="xorg-x11-drv-nouveau is &lt;1.0.15-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824747" version="1" comment="xorg-x11-drv-openchrome is &lt;0.5.0-3.el7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824748" version="1" comment="xorg-x11-drv-openchrome-devel is &lt;0.5.0-3.el7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824749" version="1" comment="xorg-x11-drv-qxl is &lt;0.1.5-4.el7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824750" version="1" comment="xorg-x11-drv-synaptics is &lt;1.9.0-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824751" version="1" comment="xorg-x11-drv-synaptics-devel is &lt;1.9.0-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824752" version="1" comment="xorg-x11-drv-v4l is &lt;0.2.0-49.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824753" version="1" comment="xorg-x11-drv-vesa is &lt;2.4.0-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824754" version="1" comment="xorg-x11-drv-vmmouse is &lt;13.1.0-1.el7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824755" version="1" comment="xorg-x11-drv-vmware is &lt;13.2.1-1.el7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824756" version="1" comment="xorg-x11-drv-void is &lt;1.4.1-2.el7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824757" version="1" comment="xorg-x11-drv-wacom is &lt;0.36.1-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824758" version="1" comment="xorg-x11-drv-wacom-devel is &lt;0.36.1-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824759" version="1" comment="xorg-x11-font-utils is &lt;7.5-21.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824760" version="1" comment="xorg-x11-proto-devel is &lt;2018.4-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824761" version="1" comment="xorg-x11-server-Xdmx is &lt;1.20.1-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824762" version="1" comment="xorg-x11-server-Xephyr is &lt;1.20.1-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824763" version="1" comment="xorg-x11-server-Xnest is &lt;1.20.1-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824764" version="1" comment="xorg-x11-server-Xorg is &lt;1.20.1-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824765" version="1" comment="xorg-x11-server-Xspice is &lt;0.1.5-4.el7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824766" version="1" comment="xorg-x11-server-Xvfb is &lt;1.20.1-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824767" version="1" comment="xorg-x11-server-Xwayland is &lt;1.20.1-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824768" version="1" comment="xorg-x11-server-common is &lt;1.20.1-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824769" version="1" comment="xorg-x11-server-devel is &lt;1.20.1-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824770" version="1" comment="xorg-x11-server-source is &lt;1.20.1-3.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824771" version="1" comment="xorg-x11-utils is &lt;7.5-23.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824772" version="1" comment="xorg-x11-xkb-extras is &lt;7.7-14.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824773" version="1" comment="xorg-x11-xkb-utils is &lt;7.7-14.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824774" version="1" comment="xorg-x11-xkb-utils-devel is &lt;7.7-14.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826993" version="1" comment="bpftool is &lt;3.10.0-1127.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826994" version="1" comment="kernel is &lt;3.10.0-1127.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826995" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1127.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826996" version="1" comment="kernel-debug is &lt;3.10.0-1127.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826999" version="1" comment="kernel-doc is &lt;3.10.0-1127.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827000" version="1" comment="kernel-headers is &lt;3.10.0-1127.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827001" version="1" comment="kernel-tools is &lt;3.10.0-1127.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827002" version="1" comment="kernel-tools-libs is &lt;3.10.0-1127.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827004" version="1" comment="perf is &lt;3.10.0-1127.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827005" version="1" comment="python-perf is &lt;3.10.0-1127.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824843" version="1" comment="PackageKit is &lt;1.1.10-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824844" version="1" comment="PackageKit-command-not-found is &lt;1.1.10-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824845" version="1" comment="PackageKit-cron is &lt;1.1.10-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824846" version="1" comment="PackageKit-glib is &lt;1.1.10-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824847" version="1" comment="PackageKit-glib-devel is &lt;1.1.10-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824848" version="1" comment="PackageKit-gstreamer-plugin is &lt;1.1.10-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824849" version="1" comment="PackageKit-gtk3-module is &lt;1.1.10-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824850" version="1" comment="PackageKit-yum is &lt;1.1.10-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824851" version="1" comment="PackageKit-yum-plugin is &lt;1.1.10-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824852" version="1" comment="accountsservice is &lt;0.6.50-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824853" version="1" comment="accountsservice-devel is &lt;0.6.50-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824854" version="1" comment="accountsservice-libs is &lt;0.6.50-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824855" version="1" comment="adwaita-cursor-theme is &lt;3.28.0-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824856" version="1" comment="adwaita-gtk2-theme is &lt;3.28-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824857" version="1" comment="adwaita-icon-theme is &lt;3.28.0-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824858" version="1" comment="adwaita-icon-theme-devel is &lt;3.28.0-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824859" version="1" comment="appstream-data is &lt;7-20180614.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824860" version="1" comment="at-spi2-atk is &lt;2.26.2-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824861" version="1" comment="at-spi2-atk-devel is &lt;2.26.2-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824862" version="1" comment="at-spi2-core is &lt;2.28.0-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824863" version="1" comment="at-spi2-core-devel is &lt;2.28.0-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824864" version="1" comment="atk is &lt;2.28.1-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824865" version="1" comment="atk-devel is &lt;2.28.1-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824866" version="1" comment="baobab is &lt;3.28.0-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824867" version="1" comment="bolt is &lt;0.4-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824868" version="1" comment="brasero is &lt;3.12.2-5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824869" version="1" comment="brasero-devel is &lt;3.12.2-5.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824870" version="1" comment="brasero-libs is &lt;3.12.2-5.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824871" version="1" comment="brasero-nautilus is &lt;3.12.2-5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824872" version="1" comment="cairo is &lt;1.15.12-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824873" version="1" comment="cairo-devel is &lt;1.15.12-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824874" version="1" comment="cairo-gobject is &lt;1.15.12-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824875" version="1" comment="cairo-gobject-devel is &lt;1.15.12-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824876" version="1" comment="cairo-tools is &lt;1.15.12-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824877" version="1" comment="cheese is &lt;3.28.0-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824878" version="1" comment="cheese-libs is &lt;3.28.0-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824879" version="1" comment="cheese-libs-devel is &lt;3.28.0-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824880" version="1" comment="clutter-gst3 is &lt;3.0.26-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824881" version="1" comment="clutter-gst3-devel is &lt;3.0.26-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824882" version="1" comment="compat-exiv2-023 is &lt;0.23-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824883" version="1" comment="compat-libical1 is &lt;1.0.1-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824884" version="1" comment="control-center is &lt;3.28.1-4.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824885" version="1" comment="control-center-filesystem is &lt;3.28.1-4.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824886" version="1" comment="dconf is &lt;0.28.0-4.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824887" version="1" comment="dconf-devel is &lt;0.28.0-4.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824888" version="1" comment="dconf-editor is &lt;3.28.0-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824889" version="1" comment="devhelp is &lt;3.28.1-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824890" version="1" comment="devhelp-devel is &lt;3.28.1-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824891" version="1" comment="devhelp-libs is &lt;3.28.1-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824892" version="1" comment="ekiga is &lt;4.0.1-8.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824893" version="1" comment="empathy is &lt;3.12.13-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824894" version="1" comment="eog is &lt;3.28.3-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824895" version="1" comment="eog-devel is &lt;3.28.3-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824896" version="1" comment="evince is &lt;3.28.2-5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824897" version="1" comment="evince-browser-plugin is &lt;3.28.2-5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824898" version="1" comment="evince-devel is &lt;3.28.2-5.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824899" version="1" comment="evince-dvi is &lt;3.28.2-5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824900" version="1" comment="evince-libs is &lt;3.28.2-5.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824901" version="1" comment="evince-nautilus is &lt;3.28.2-5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824902" version="1" comment="evolution is &lt;3.28.5-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824903" version="1" comment="evolution-bogofilter is &lt;3.28.5-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824904" version="1" comment="evolution-data-server is &lt;3.28.5-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824905" version="1" comment="evolution-data-server-devel is &lt;3.28.5-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824906" version="1" comment="evolution-data-server-doc is &lt;3.28.5-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824907" version="1" comment="evolution-data-server-langpacks is &lt;3.28.5-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824908" version="1" comment="evolution-data-server-perl is &lt;3.28.5-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824909" version="1" comment="evolution-data-server-tests is &lt;3.28.5-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824910" version="1" comment="evolution-devel is &lt;3.28.5-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824911" version="1" comment="evolution-devel-docs is &lt;3.28.5-2.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824912" version="1" comment="evolution-ews is &lt;3.28.5-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824913" version="1" comment="evolution-ews-langpacks is &lt;3.28.5-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824914" version="1" comment="evolution-help is &lt;3.28.5-2.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824915" version="1" comment="evolution-langpacks is &lt;3.28.5-2.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824916" version="1" comment="evolution-mapi is &lt;3.28.3-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824917" version="1" comment="evolution-mapi-langpacks is &lt;3.28.3-2.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824918" version="1" comment="evolution-pst is &lt;3.28.5-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824919" version="1" comment="evolution-spamassassin is &lt;3.28.5-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824920" version="1" comment="evolution-tests is &lt;3.28.5-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824921" version="1" comment="file-roller is &lt;3.28.1-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824922" version="1" comment="file-roller-nautilus is &lt;3.28.1-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824923" version="1" comment="flatpak is &lt;1.0.2-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824924" version="1" comment="flatpak-builder is &lt;1.0.0-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824925" version="1" comment="flatpak-devel is &lt;1.0.2-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824926" version="1" comment="flatpak-libs is &lt;1.0.2-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824927" version="1" comment="folks is &lt;0.11.4-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824928" version="1" comment="folks-devel is &lt;0.11.4-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824929" version="1" comment="folks-tools is &lt;0.11.4-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824930" version="1" comment="fontconfig is &lt;2.13.0-4.3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824931" version="1" comment="fontconfig-devel is &lt;2.13.0-4.3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824932" version="1" comment="fontconfig-devel-doc is &lt;2.13.0-4.3.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824933" version="1" comment="freetype is &lt;2.8-12.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824934" version="1" comment="freetype-demos is &lt;2.8-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824935" version="1" comment="freetype-devel is &lt;2.8-12.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824936" version="1" comment="fribidi is &lt;1.0.2-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824937" version="1" comment="fribidi-devel is &lt;1.0.2-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824938" version="1" comment="fwupd is &lt;1.0.8-4.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824939" version="1" comment="fwupd-devel is &lt;1.0.8-4.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824940" version="1" comment="fwupdate is &lt;12-5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824941" version="1" comment="fwupdate-devel is &lt;12-5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824942" version="1" comment="fwupdate-efi is &lt;12-5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824943" version="1" comment="fwupdate-libs is &lt;12-5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824944" version="1" comment="gcr is &lt;3.28.0-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824945" version="1" comment="gcr-devel is &lt;3.28.0-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824946" version="1" comment="gdk-pixbuf2 is &lt;2.36.12-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824947" version="1" comment="gdk-pixbuf2-devel is &lt;2.36.12-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824948" version="1" comment="gdk-pixbuf2-tests is &lt;2.36.12-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824949" version="1" comment="gdm is &lt;3.28.2-9.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824950" version="1" comment="gdm-devel is &lt;3.28.2-9.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824951" version="1" comment="gdm-pam-extensions-devel is &lt;3.28.2-9.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824952" version="1" comment="gedit is &lt;3.28.1-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824953" version="1" comment="gedit-devel is &lt;3.28.1-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824954" version="1" comment="gedit-plugin-bookmarks is &lt;3.28.1-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824955" version="1" comment="gedit-plugin-bracketcompletion is &lt;3.28.1-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824956" version="1" comment="gedit-plugin-charmap is &lt;3.28.1-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824957" version="1" comment="gedit-plugin-codecomment is &lt;3.28.1-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824958" version="1" comment="gedit-plugin-colorpicker is &lt;3.28.1-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824959" version="1" comment="gedit-plugin-colorschemer is &lt;3.28.1-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824960" version="1" comment="gedit-plugin-commander is &lt;3.28.1-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824961" version="1" comment="gedit-plugin-drawspaces is &lt;3.28.1-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824962" version="1" comment="gedit-plugin-findinfiles is &lt;3.28.1-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824963" version="1" comment="gedit-plugin-joinlines is &lt;3.28.1-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824964" version="1" comment="gedit-plugin-multiedit is &lt;3.28.1-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824965" version="1" comment="gedit-plugin-smartspaces is &lt;3.28.1-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824966" version="1" comment="gedit-plugin-synctex is &lt;3.28.1-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824967" version="1" comment="gedit-plugin-terminal is &lt;3.28.1-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824968" version="1" comment="gedit-plugin-textsize is &lt;3.28.1-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824969" version="1" comment="gedit-plugin-translate is &lt;3.28.1-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824970" version="1" comment="gedit-plugin-wordcompletion is &lt;3.28.1-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824971" version="1" comment="gedit-plugins is &lt;3.28.1-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824972" version="1" comment="gedit-plugins-data is &lt;3.28.1-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824973" version="1" comment="geoclue2 is &lt;2.4.8-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824974" version="1" comment="geoclue2-demos is &lt;2.4.8-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824975" version="1" comment="geoclue2-devel is &lt;2.4.8-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824976" version="1" comment="geoclue2-libs is &lt;2.4.8-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824977" version="1" comment="geocode-glib is &lt;3.26.0-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824978" version="1" comment="geocode-glib-devel is &lt;3.26.0-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824979" version="1" comment="gjs is &lt;1.52.3-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824980" version="1" comment="gjs-devel is &lt;1.52.3-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824981" version="1" comment="gjs-tests is &lt;1.52.3-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824982" version="1" comment="glade is &lt;3.22.1-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824983" version="1" comment="glade-devel is &lt;3.22.1-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824984" version="1" comment="glade-libs is &lt;3.22.1-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824985" version="1" comment="glib-networking is &lt;2.56.1-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824986" version="1" comment="glib-networking-tests is &lt;2.56.1-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824987" version="1" comment="glib2 is &lt;2.56.1-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824988" version="1" comment="glib2-devel is &lt;2.56.1-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824989" version="1" comment="glib2-doc is &lt;2.56.1-2.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824990" version="1" comment="glib2-fam is &lt;2.56.1-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824991" version="1" comment="glib2-static is &lt;2.56.1-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824992" version="1" comment="glib2-tests is &lt;2.56.1-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824993" version="1" comment="glibmm24 is &lt;2.56.0-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824994" version="1" comment="glibmm24-devel is &lt;2.56.0-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824995" version="1" comment="glibmm24-doc is &lt;2.56.0-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824996" version="1" comment="gnome-backgrounds is &lt;3.28.0-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824997" version="1" comment="gnome-bluetooth is &lt;3.28.2-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824998" version="1" comment="gnome-bluetooth-libs is &lt;3.28.2-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824999" version="1" comment="gnome-bluetooth-libs-devel is &lt;3.28.2-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825000" version="1" comment="gnome-boxes is &lt;3.28.5-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825001" version="1" comment="gnome-calculator is &lt;3.28.2-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825002" version="1" comment="gnome-classic-session is &lt;3.28.1-5.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825003" version="1" comment="gnome-clocks is &lt;3.28.0-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825004" version="1" comment="gnome-color-manager is &lt;3.28.0-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825005" version="1" comment="gnome-contacts is &lt;3.28.2-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825006" version="1" comment="gnome-desktop3 is &lt;3.28.2-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825007" version="1" comment="gnome-desktop3-devel is &lt;3.28.2-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825008" version="1" comment="gnome-desktop3-tests is &lt;3.28.2-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825009" version="1" comment="gnome-devel-docs is &lt;3.28.0-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825010" version="1" comment="gnome-dictionary is &lt;3.26.1-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825011" version="1" comment="gnome-disk-utility is &lt;3.28.3-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825012" version="1" comment="gnome-documents is &lt;3.28.2-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825013" version="1" comment="gnome-documents-libs is &lt;3.28.2-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825014" version="1" comment="gnome-font-viewer is &lt;3.28.0-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825015" version="1" comment="gnome-getting-started-docs is &lt;3.28.2-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825016" version="1" comment="gnome-getting-started-docs-cs is &lt;3.28.2-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825017" version="1" comment="gnome-getting-started-docs-de is &lt;3.28.2-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825018" version="1" comment="gnome-getting-started-docs-es is &lt;3.28.2-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825019" version="1" comment="gnome-getting-started-docs-fr is &lt;3.28.2-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825020" version="1" comment="gnome-getting-started-docs-gl is &lt;3.28.2-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825021" version="1" comment="gnome-getting-started-docs-hu is &lt;3.28.2-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825022" version="1" comment="gnome-getting-started-docs-it is &lt;3.28.2-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825023" version="1" comment="gnome-getting-started-docs-pl is &lt;3.28.2-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825024" version="1" comment="gnome-getting-started-docs-pt_BR is &lt;3.28.2-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825025" version="1" comment="gnome-getting-started-docs-ru is &lt;3.28.2-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825026" version="1" comment="gnome-initial-setup is &lt;3.28.0-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825027" version="1" comment="gnome-keyring is &lt;3.28.2-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825028" version="1" comment="gnome-keyring-pam is &lt;3.28.2-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825029" version="1" comment="gnome-online-accounts is &lt;3.28.0-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825030" version="1" comment="gnome-online-accounts-devel is &lt;3.28.0-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825031" version="1" comment="gnome-online-miners is &lt;3.26.0-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825032" version="1" comment="gnome-packagekit is &lt;3.28.0-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825033" version="1" comment="gnome-packagekit-common is &lt;3.28.0-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825034" version="1" comment="gnome-packagekit-installer is &lt;3.28.0-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825035" version="1" comment="gnome-packagekit-updater is &lt;3.28.0-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825036" version="1" comment="gnome-screenshot is &lt;3.26.0-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825037" version="1" comment="gnome-session is &lt;3.28.1-5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825038" version="1" comment="gnome-session-custom-session is &lt;3.28.1-5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825039" version="1" comment="gnome-session-wayland-session is &lt;3.28.1-5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825040" version="1" comment="gnome-session-xsession is &lt;3.28.1-5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825041" version="1" comment="gnome-settings-daemon is &lt;3.28.1-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825042" version="1" comment="gnome-settings-daemon-devel is &lt;3.28.1-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825043" version="1" comment="gnome-shell is &lt;3.28.3-6.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825044" version="1" comment="gnome-shell-extension-alternate-tab is &lt;3.28.1-5.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825045" version="1" comment="gnome-shell-extension-apps-menu is &lt;3.28.1-5.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825046" version="1" comment="gnome-shell-extension-auto-move-windows is &lt;3.28.1-5.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825047" version="1" comment="gnome-shell-extension-common is &lt;3.28.1-5.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825048" version="1" comment="gnome-shell-extension-dash-to-dock is &lt;3.28.1-5.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825049" version="1" comment="gnome-shell-extension-drive-menu is &lt;3.28.1-5.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825050" version="1" comment="gnome-shell-extension-launch-new-instance is &lt;3.28.1-5.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825051" version="1" comment="gnome-shell-extension-native-window-placement is &lt;3.28.1-5.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825052" version="1" comment="gnome-shell-extension-no-hot-corner is &lt;3.28.1-5.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825053" version="1" comment="gnome-shell-extension-panel-favorites is &lt;3.28.1-5.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825054" version="1" comment="gnome-shell-extension-places-menu is &lt;3.28.1-5.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825055" version="1" comment="gnome-shell-extension-screenshot-window-sizer is &lt;3.28.1-5.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825056" version="1" comment="gnome-shell-extension-systemMonitor is &lt;3.28.1-5.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825057" version="1" comment="gnome-shell-extension-top-icons is &lt;3.28.1-5.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825058" version="1" comment="gnome-shell-extension-updates-dialog is &lt;3.28.1-5.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825059" version="1" comment="gnome-shell-extension-user-theme is &lt;3.28.1-5.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825060" version="1" comment="gnome-shell-extension-window-list is &lt;3.28.1-5.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825061" version="1" comment="gnome-shell-extension-windowsNavigator is &lt;3.28.1-5.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825062" version="1" comment="gnome-shell-extension-workspace-indicator is &lt;3.28.1-5.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825063" version="1" comment="gnome-software is &lt;3.28.2-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825064" version="1" comment="gnome-software-devel is &lt;3.28.2-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825065" version="1" comment="gnome-software-editor is &lt;3.28.2-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825066" version="1" comment="gnome-system-monitor is &lt;3.28.2-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825067" version="1" comment="gnome-terminal is &lt;3.28.2-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825068" version="1" comment="gnome-terminal-nautilus is &lt;3.28.2-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825069" version="1" comment="gnome-themes-standard is &lt;3.28-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825070" version="1" comment="gnome-tweak-tool is &lt;3.28.1-2.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825071" version="1" comment="gnome-user-docs is &lt;3.28.2-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825072" version="1" comment="gnote is &lt;3.28.0-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825073" version="1" comment="gobject-introspection is &lt;1.56.1-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825074" version="1" comment="gobject-introspection-devel is &lt;1.56.1-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825075" version="1" comment="gom is &lt;0.3.3-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825076" version="1" comment="gom-devel is &lt;0.3.3-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825077" version="1" comment="google-noto-emoji-color-fonts is &lt;20180508-4.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825078" version="1" comment="google-noto-emoji-fonts is &lt;20180508-4.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825079" version="1" comment="grilo is &lt;0.3.6-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825080" version="1" comment="grilo-devel is &lt;0.3.6-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825081" version="1" comment="grilo-plugins is &lt;0.3.7-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825082" version="1" comment="gsettings-desktop-schemas is &lt;3.28.0-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825083" version="1" comment="gsettings-desktop-schemas-devel is &lt;3.28.0-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825084" version="1" comment="gspell is &lt;1.6.1-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825085" version="1" comment="gspell-devel is &lt;1.6.1-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825086" version="1" comment="gspell-doc is &lt;1.6.1-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825087" version="1" comment="gssdp is &lt;1.0.2-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825088" version="1" comment="gssdp-devel is &lt;1.0.2-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825089" version="1" comment="gssdp-docs is &lt;1.0.2-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825090" version="1" comment="gssdp-utils is &lt;1.0.2-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825091" version="1" comment="gstreamer1-plugins-base is &lt;1.10.4-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825092" version="1" comment="gstreamer1-plugins-base-devel is &lt;1.10.4-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825093" version="1" comment="gstreamer1-plugins-base-devel-docs is &lt;1.10.4-2.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825094" version="1" comment="gstreamer1-plugins-base-tools is &lt;1.10.4-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825095" version="1" comment="gtk-doc is &lt;1.28-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825096" version="1" comment="gtk-update-icon-cache is &lt;3.22.30-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825097" version="1" comment="gtk3 is &lt;3.22.30-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825098" version="1" comment="gtk3-devel is &lt;3.22.30-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825099" version="1" comment="gtk3-devel-docs is &lt;3.22.30-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825100" version="1" comment="gtk3-immodule-xim is &lt;3.22.30-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825101" version="1" comment="gtk3-immodules is &lt;3.22.30-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825102" version="1" comment="gtk3-tests is &lt;3.22.30-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825103" version="1" comment="gtksourceview3 is &lt;3.24.8-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825104" version="1" comment="gtksourceview3-devel is &lt;3.24.8-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825105" version="1" comment="gtksourceview3-tests is &lt;3.24.8-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825106" version="1" comment="gucharmap is &lt;10.0.4-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825107" version="1" comment="gucharmap-devel is &lt;10.0.4-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825108" version="1" comment="gucharmap-libs is &lt;10.0.4-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825109" version="1" comment="gupnp is &lt;1.0.2-5.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825110" version="1" comment="gupnp-devel is &lt;1.0.2-5.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825111" version="1" comment="gupnp-docs is &lt;1.0.2-5.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825112" version="1" comment="gupnp-igd is &lt;0.2.5-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825113" version="1" comment="gupnp-igd-devel is &lt;0.2.5-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825114" version="1" comment="gupnp-igd-python is &lt;0.2.5-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825115" version="1" comment="gvfs is &lt;1.36.2-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825116" version="1" comment="gvfs-afc is &lt;1.36.2-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825117" version="1" comment="gvfs-afp is &lt;1.36.2-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825118" version="1" comment="gvfs-archive is &lt;1.36.2-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825119" version="1" comment="gvfs-client is &lt;1.36.2-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825120" version="1" comment="gvfs-devel is &lt;1.36.2-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825121" version="1" comment="gvfs-fuse is &lt;1.36.2-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825122" version="1" comment="gvfs-goa is &lt;1.36.2-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825123" version="1" comment="gvfs-gphoto2 is &lt;1.36.2-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825124" version="1" comment="gvfs-mtp is &lt;1.36.2-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825125" version="1" comment="gvfs-smb is &lt;1.36.2-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825126" version="1" comment="gvfs-tests is &lt;1.36.2-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825127" version="1" comment="harfbuzz is &lt;1.7.5-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825128" version="1" comment="harfbuzz-devel is &lt;1.7.5-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825129" version="1" comment="harfbuzz-icu is &lt;1.7.5-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825130" version="1" comment="json-glib is &lt;1.4.2-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825131" version="1" comment="json-glib-devel is &lt;1.4.2-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825132" version="1" comment="json-glib-tests is &lt;1.4.2-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825133" version="1" comment="libappstream-glib is &lt;0.7.8-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825134" version="1" comment="libappstream-glib-builder is &lt;0.7.8-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825135" version="1" comment="libappstream-glib-builder-devel is &lt;0.7.8-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825136" version="1" comment="libappstream-glib-devel is &lt;0.7.8-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825137" version="1" comment="libchamplain is &lt;0.12.16-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825138" version="1" comment="libchamplain-demos is &lt;0.12.16-2.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825139" version="1" comment="libchamplain-devel is &lt;0.12.16-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825140" version="1" comment="libchamplain-gtk is &lt;0.12.16-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825141" version="1" comment="libcroco is &lt;0.6.12-4.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825142" version="1" comment="libcroco-devel is &lt;0.6.12-4.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825143" version="1" comment="libgdata is &lt;0.17.9-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825144" version="1" comment="libgdata-devel is &lt;0.17.9-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825145" version="1" comment="libgee is &lt;0.20.1-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825146" version="1" comment="libgee-devel is &lt;0.20.1-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825147" version="1" comment="libgepub is &lt;0.6.0-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825148" version="1" comment="libgepub-devel is &lt;0.6.0-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825149" version="1" comment="libgexiv2 is &lt;0.10.8-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825150" version="1" comment="libgexiv2-devel is &lt;0.10.8-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825151" version="1" comment="libgnomekbd is &lt;3.26.0-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825152" version="1" comment="libgnomekbd-devel is &lt;3.26.0-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825153" version="1" comment="libgovirt is &lt;0.3.4-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825154" version="1" comment="libgovirt-devel is &lt;0.3.4-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825155" version="1" comment="libgtop2 is &lt;2.38.0-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825156" version="1" comment="libgtop2-devel is &lt;2.38.0-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825157" version="1" comment="libgweather is &lt;3.28.2-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825158" version="1" comment="libgweather-devel is &lt;3.28.2-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825159" version="1" comment="libgxps is &lt;0.3.0-4.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825160" version="1" comment="libgxps-devel is &lt;0.3.0-4.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825161" version="1" comment="libgxps-tools is &lt;0.3.0-4.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825162" version="1" comment="libical is &lt;3.0.3-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825163" version="1" comment="libical-devel is &lt;3.0.3-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825164" version="1" comment="libical-glib is &lt;3.0.3-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825165" version="1" comment="libical-glib-devel is &lt;3.0.3-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825166" version="1" comment="libical-glib-doc is &lt;3.0.3-2.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825167" version="1" comment="libjpeg-turbo is &lt;1.2.90-6.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825168" version="1" comment="libjpeg-turbo-devel is &lt;1.2.90-6.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825169" version="1" comment="libjpeg-turbo-static is &lt;1.2.90-6.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825170" version="1" comment="libjpeg-turbo-utils is &lt;1.2.90-6.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825171" version="1" comment="libmediaart is &lt;1.9.4-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825172" version="1" comment="libmediaart-devel is &lt;1.9.4-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825173" version="1" comment="libmediaart-tests is &lt;1.9.4-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825174" version="1" comment="libosinfo is &lt;1.1.0-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825175" version="1" comment="libosinfo-devel is &lt;1.1.0-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825176" version="1" comment="libosinfo-vala is &lt;1.1.0-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825177" version="1" comment="libpeas is &lt;1.22.0-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825178" version="1" comment="libpeas-devel is &lt;1.22.0-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825179" version="1" comment="libpeas-gtk is &lt;1.22.0-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825180" version="1" comment="libpeas-loader-python is &lt;1.22.0-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825181" version="1" comment="librsvg2 is &lt;2.40.20-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825182" version="1" comment="librsvg2-devel is &lt;2.40.20-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825183" version="1" comment="librsvg2-tools is &lt;2.40.20-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825184" version="1" comment="libsecret is &lt;0.18.6-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825185" version="1" comment="libsecret-devel is &lt;0.18.6-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825186" version="1" comment="libsoup is &lt;2.62.2-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825187" version="1" comment="libsoup-devel is &lt;2.62.2-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825188" version="1" comment="libwayland-client is &lt;1.15.0-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825189" version="1" comment="libwayland-cursor is &lt;1.15.0-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825190" version="1" comment="libwayland-egl is &lt;1.15.0-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825191" version="1" comment="libwayland-server is &lt;1.15.0-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825192" version="1" comment="libwnck3 is &lt;3.24.1-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825193" version="1" comment="libwnck3-devel is &lt;3.24.1-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825194" version="1" comment="mozjs52 is &lt;52.9.0-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825195" version="1" comment="mozjs52-devel is &lt;52.9.0-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825196" version="1" comment="mutter is &lt;3.28.3-4.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825197" version="1" comment="mutter-devel is &lt;3.28.3-4.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825198" version="1" comment="nautilus is &lt;3.26.3.1-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825199" version="1" comment="nautilus-devel is &lt;3.26.3.1-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825200" version="1" comment="nautilus-extensions is &lt;3.26.3.1-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825201" version="1" comment="nautilus-sendto is &lt;3.8.6-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825202" version="1" comment="openchange is &lt;2.3-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825203" version="1" comment="openchange-client is &lt;2.3-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825204" version="1" comment="openchange-devel is &lt;2.3-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825205" version="1" comment="openchange-devel-docs is &lt;2.3-3.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825206" version="1" comment="osinfo-db is &lt;20180531-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825207" version="1" comment="pango is &lt;1.42.4-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825208" version="1" comment="pango-devel is &lt;1.42.4-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825209" version="1" comment="pango-tests is &lt;1.42.4-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825210" version="1" comment="poppler is &lt;0.26.5-20.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825211" version="1" comment="poppler-cpp is &lt;0.26.5-20.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825212" version="1" comment="poppler-cpp-devel is &lt;0.26.5-20.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825213" version="1" comment="poppler-demos is &lt;0.26.5-20.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825214" version="1" comment="poppler-devel is &lt;0.26.5-20.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825215" version="1" comment="poppler-glib is &lt;0.26.5-20.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825216" version="1" comment="poppler-glib-devel is &lt;0.26.5-20.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825217" version="1" comment="poppler-qt is &lt;0.26.5-20.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825218" version="1" comment="poppler-qt-devel is &lt;0.26.5-20.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825219" version="1" comment="poppler-utils is &lt;0.26.5-20.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825220" version="1" comment="python2-gexiv2 is &lt;0.10.8-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825221" version="1" comment="python2-pyatspi is &lt;2.26.0-3.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825222" version="1" comment="rest is &lt;0.8.1-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825223" version="1" comment="rest-devel is &lt;0.8.1-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825224" version="1" comment="rhythmbox is &lt;3.4.2-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825225" version="1" comment="rhythmbox-devel is &lt;3.4.2-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825226" version="1" comment="seahorse-nautilus is &lt;3.11.92-11.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825227" version="1" comment="shotwell is &lt;0.28.4-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825228" version="1" comment="sushi is &lt;3.28.3-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825229" version="1" comment="totem is &lt;3.26.2-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825230" version="1" comment="totem-devel is &lt;3.26.2-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825231" version="1" comment="totem-nautilus is &lt;3.26.2-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825232" version="1" comment="totem-pl-parser is &lt;3.26.1-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825233" version="1" comment="totem-pl-parser-devel is &lt;3.26.1-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825234" version="1" comment="turbojpeg is &lt;1.2.90-6.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825235" version="1" comment="turbojpeg-devel is &lt;1.2.90-6.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825236" version="1" comment="upower is &lt;0.99.7-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825237" version="1" comment="upower-devel is &lt;0.99.7-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825238" version="1" comment="upower-devel-docs is &lt;0.99.7-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825239" version="1" comment="vala is &lt;0.40.8-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825240" version="1" comment="vala-devel is &lt;0.40.8-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825241" version="1" comment="vala-doc is &lt;0.40.8-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825242" version="1" comment="valadoc is &lt;0.40.8-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825243" version="1" comment="valadoc-devel is &lt;0.40.8-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825244" version="1" comment="vino is &lt;3.22.0-7.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825245" version="1" comment="vte-profile is &lt;0.52.2-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825246" version="1" comment="vte291 is &lt;0.52.2-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825247" version="1" comment="vte291-devel is &lt;0.52.2-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825248" version="1" comment="wayland-devel is &lt;1.15.0-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825249" version="1" comment="wayland-doc is &lt;1.15.0-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825250" version="1" comment="wayland-protocols-devel is &lt;1.14-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825251" version="1" comment="webkitgtk4 is &lt;2.20.5-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825252" version="1" comment="webkitgtk4-devel is &lt;2.20.5-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825253" version="1" comment="webkitgtk4-doc is &lt;2.20.5-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825254" version="1" comment="webkitgtk4-jsc is &lt;2.20.5-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825255" version="1" comment="webkitgtk4-jsc-devel is &lt;2.20.5-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825256" version="1" comment="webkitgtk4-plugin-process-gtk2 is &lt;2.20.5-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825257" version="1" comment="xdg-desktop-portal is &lt;1.0.2-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825258" version="1" comment="xdg-desktop-portal-devel is &lt;1.0.2-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825259" version="1" comment="xdg-desktop-portal-gtk is &lt;1.0.2-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825260" version="1" comment="yelp is &lt;3.28.1-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825261" version="1" comment="yelp-devel is &lt;3.28.1-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825262" version="1" comment="yelp-libs is &lt;3.28.1-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825263" version="1" comment="yelp-tools is &lt;3.28.0-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825264" version="1" comment="yelp-xsl is &lt;3.28.0-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825265" version="1" comment="yelp-xsl-devel is &lt;3.28.0-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825266" version="1" comment="zenity is &lt;3.28.1-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821767" version="1" comment="java-1.6.0-openjdk is &lt;1.6.0.38-1.13.10.0.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821768" version="1" comment="java-1.6.0-openjdk-demo is &lt;1.6.0.38-1.13.10.0.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821769" version="1" comment="java-1.6.0-openjdk-devel is &lt;1.6.0.38-1.13.10.0.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821770" version="1" comment="java-1.6.0-openjdk-javadoc is &lt;1.6.0.38-1.13.10.0.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821771" version="1" comment="java-1.6.0-openjdk-src is &lt;1.6.0.38-1.13.10.0.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823309" version="1" comment="bash is &lt;4.2.46-28.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823310" version="1" comment="bash-doc is &lt;4.2.46-28.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821914" version="1" comment="java-1.7.0-openjdk is &lt;1.7.0.99-2.6.5.0.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821915" version="1" comment="java-1.7.0-openjdk-accessibility is &lt;1.7.0.99-2.6.5.0.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821916" version="1" comment="java-1.7.0-openjdk-demo is &lt;1.7.0.99-2.6.5.0.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821917" version="1" comment="java-1.7.0-openjdk-devel is &lt;1.7.0.99-2.6.5.0.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821918" version="1" comment="java-1.7.0-openjdk-headless is &lt;1.7.0.99-2.6.5.0.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821919" version="1" comment="java-1.7.0-openjdk-javadoc is &lt;1.7.0.99-2.6.5.0.el7_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821920" version="1" comment="java-1.7.0-openjdk-src is &lt;1.7.0.99-2.6.5.0.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821921" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.77-0.b03.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821922" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.77-0.b03.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821923" version="1" comment="java-1.8.0-openjdk-accessibility-debug is &lt;1.8.0.77-0.b03.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821924" version="1" comment="java-1.8.0-openjdk-debug is &lt;1.8.0.77-0.b03.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821925" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.77-0.b03.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821926" version="1" comment="java-1.8.0-openjdk-demo-debug is &lt;1.8.0.77-0.b03.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821927" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.77-0.b03.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821928" version="1" comment="java-1.8.0-openjdk-devel-debug is &lt;1.8.0.77-0.b03.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821929" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.77-0.b03.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821930" version="1" comment="java-1.8.0-openjdk-headless-debug is &lt;1.8.0.77-0.b03.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821931" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.77-0.b03.el7_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821932" version="1" comment="java-1.8.0-openjdk-javadoc-debug is &lt;1.8.0.77-0.b03.el7_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821933" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.77-0.b03.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821934" version="1" comment="java-1.8.0-openjdk-src-debug is &lt;1.8.0.77-0.b03.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822211" version="1" comment="mariadb is &lt;5.5.50-1.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822212" version="1" comment="mariadb-bench is &lt;5.5.50-1.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822213" version="1" comment="mariadb-devel is &lt;5.5.50-1.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822214" version="1" comment="mariadb-embedded is &lt;5.5.50-1.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822215" version="1" comment="mariadb-embedded-devel is &lt;5.5.50-1.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822216" version="1" comment="mariadb-libs is &lt;5.5.50-1.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822217" version="1" comment="mariadb-server is &lt;5.5.50-1.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822218" version="1" comment="mariadb-test is &lt;5.5.50-1.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822047" version="1" comment="java-1.6.0-openjdk is &lt;1.6.0.39-1.13.11.0.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822048" version="1" comment="java-1.6.0-openjdk-demo is &lt;1.6.0.39-1.13.11.0.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822049" version="1" comment="java-1.6.0-openjdk-devel is &lt;1.6.0.39-1.13.11.0.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822050" version="1" comment="java-1.6.0-openjdk-javadoc is &lt;1.6.0.39-1.13.11.0.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822051" version="1" comment="java-1.6.0-openjdk-src is &lt;1.6.0.39-1.13.11.0.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822017" version="1" comment="java-1.7.0-openjdk is &lt;1.7.0.101-2.6.6.1.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822018" version="1" comment="java-1.7.0-openjdk-accessibility is &lt;1.7.0.101-2.6.6.1.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822019" version="1" comment="java-1.7.0-openjdk-demo is &lt;1.7.0.101-2.6.6.1.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822020" version="1" comment="java-1.7.0-openjdk-devel is &lt;1.7.0.101-2.6.6.1.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822021" version="1" comment="java-1.7.0-openjdk-headless is &lt;1.7.0.101-2.6.6.1.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822022" version="1" comment="java-1.7.0-openjdk-javadoc is &lt;1.7.0.101-2.6.6.1.el7_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822023" version="1" comment="java-1.7.0-openjdk-src is &lt;1.7.0.101-2.6.6.1.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822004" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.91-0.b14.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822005" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.91-0.b14.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822006" version="1" comment="java-1.8.0-openjdk-accessibility-debug is &lt;1.8.0.91-0.b14.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822007" version="1" comment="java-1.8.0-openjdk-debug is &lt;1.8.0.91-0.b14.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822008" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.91-0.b14.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822009" version="1" comment="java-1.8.0-openjdk-demo-debug is &lt;1.8.0.91-0.b14.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822010" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.91-0.b14.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822011" version="1" comment="java-1.8.0-openjdk-devel-debug is &lt;1.8.0.91-0.b14.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822012" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.91-0.b14.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822013" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.91-0.b14.el7_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822014" version="1" comment="java-1.8.0-openjdk-javadoc-debug is &lt;1.8.0.91-0.b14.el7_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822015" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.91-0.b14.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822016" version="1" comment="java-1.8.0-openjdk-src-debug is &lt;1.8.0.91-0.b14.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822707" version="1" comment="expat is &lt;2.1.0-10.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822708" version="1" comment="expat-devel is &lt;2.1.0-10.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822709" version="1" comment="expat-static is &lt;2.1.0-10.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822555" version="1" comment="pcs is &lt;0.9.152-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711450" version="1" comment="kgraft-patch-3_12_51-52_34-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821755" version="1" comment="kernel is &lt;3.10.0-327.4.5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821756" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-327.4.5.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821757" version="1" comment="kernel-debug is &lt;3.10.0-327.4.5.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821760" version="1" comment="kernel-doc is &lt;3.10.0-327.4.5.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821761" version="1" comment="kernel-headers is &lt;3.10.0-327.4.5.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821762" version="1" comment="kernel-tools is &lt;3.10.0-327.4.5.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821763" version="1" comment="kernel-tools-libs is &lt;3.10.0-327.4.5.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821765" version="1" comment="perf is &lt;3.10.0-327.4.5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821766" version="1" comment="python-perf is &lt;3.10.0-327.4.5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821845" version="1" comment="xerces-c is &lt;3.1.1-8.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821846" version="1" comment="xerces-c-devel is &lt;3.1.1-8.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821847" version="1" comment="xerces-c-doc is &lt;3.1.1-8.el7_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822887" version="1" comment="httpd is &lt;2.4.6-45.el7_3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822888" version="1" comment="httpd-devel is &lt;2.4.6-45.el7_3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822889" version="1" comment="httpd-manual is &lt;2.4.6-45.el7_3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822890" version="1" comment="httpd-tools is &lt;2.4.6-45.el7_3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822891" version="1" comment="mod_ldap is &lt;2.4.6-45.el7_3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822892" version="1" comment="mod_proxy_html is &lt;2.4.6-45.el7_3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822893" version="1" comment="mod_session is &lt;2.4.6-45.el7_3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822894" version="1" comment="mod_ssl is &lt;2.4.6-45.el7_3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821818" version="1" comment="389-ds-base is &lt;1.3.4.0-26.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821819" version="1" comment="389-ds-base-devel is &lt;1.3.4.0-26.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821820" version="1" comment="389-ds-base-libs is &lt;1.3.4.0-26.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822091" version="1" comment="spice-server is &lt;0.12.4-15.el7_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822092" version="1" comment="spice-server-devel is &lt;0.12.4-15.el7_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822069" version="1" comment="kernel is &lt;3.10.0-327.18.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822070" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-327.18.2.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822071" version="1" comment="kernel-debug is &lt;3.10.0-327.18.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822074" version="1" comment="kernel-doc is &lt;3.10.0-327.18.2.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822075" version="1" comment="kernel-headers is &lt;3.10.0-327.18.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822076" version="1" comment="kernel-tools is &lt;3.10.0-327.18.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822077" version="1" comment="kernel-tools-libs is &lt;3.10.0-327.18.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822079" version="1" comment="perf is &lt;3.10.0-327.18.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822080" version="1" comment="python-perf is &lt;3.10.0-327.18.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823429" version="1" comment="tomcat is &lt;7.0.76-2.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823430" version="1" comment="tomcat-admin-webapps is &lt;7.0.76-2.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823431" version="1" comment="tomcat-docs-webapp is &lt;7.0.76-2.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823432" version="1" comment="tomcat-el-2.2-api is &lt;7.0.76-2.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823433" version="1" comment="tomcat-javadoc is &lt;7.0.76-2.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823434" version="1" comment="tomcat-jsp-2.2-api is &lt;7.0.76-2.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823435" version="1" comment="tomcat-jsvc is &lt;7.0.76-2.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823436" version="1" comment="tomcat-lib is &lt;7.0.76-2.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823437" version="1" comment="tomcat-servlet-3.0-api is &lt;7.0.76-2.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823438" version="1" comment="tomcat-webapps is &lt;7.0.76-2.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822455" version="1" comment="NetworkManager is &lt;1.4.0-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822456" version="1" comment="NetworkManager-adsl is &lt;1.4.0-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822457" version="1" comment="NetworkManager-bluetooth is &lt;1.4.0-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822458" version="1" comment="NetworkManager-config-server is &lt;1.4.0-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822459" version="1" comment="NetworkManager-dispatcher-routing-rules is &lt;1.4.0-12.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822460" version="1" comment="NetworkManager-glib is &lt;1.4.0-12.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822461" version="1" comment="NetworkManager-glib-devel is &lt;1.4.0-12.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822462" version="1" comment="NetworkManager-libnm is &lt;1.4.0-12.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822463" version="1" comment="NetworkManager-libnm-devel is &lt;1.4.0-12.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822464" version="1" comment="NetworkManager-libreswan is &lt;1.2.4-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822465" version="1" comment="NetworkManager-libreswan-gnome is &lt;1.2.4-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822466" version="1" comment="NetworkManager-team is &lt;1.4.0-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822467" version="1" comment="NetworkManager-tui is &lt;1.4.0-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822468" version="1" comment="NetworkManager-wifi is &lt;1.4.0-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822469" version="1" comment="NetworkManager-wwan is &lt;1.4.0-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822470" version="1" comment="libnl3 is &lt;3.2.28-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822471" version="1" comment="libnl3-cli is &lt;3.2.28-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822472" version="1" comment="libnl3-devel is &lt;3.2.28-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822473" version="1" comment="libnl3-doc is &lt;3.2.28-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822474" version="1" comment="libnm-gtk is &lt;1.4.0-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822475" version="1" comment="libnm-gtk-devel is &lt;1.4.0-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822476" version="1" comment="libnma is &lt;1.4.0-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822477" version="1" comment="libnma-devel is &lt;1.4.0-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822478" version="1" comment="network-manager-applet is &lt;1.4.0-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822479" version="1" comment="nm-connection-editor is &lt;1.4.0-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821827" version="1" comment="postgresql is &lt;9.2.15-1.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821828" version="1" comment="postgresql-contrib is &lt;9.2.15-1.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821829" version="1" comment="postgresql-devel is &lt;9.2.15-1.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821830" version="1" comment="postgresql-docs is &lt;9.2.15-1.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821831" version="1" comment="postgresql-libs is &lt;9.2.15-1.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821832" version="1" comment="postgresql-plperl is &lt;9.2.15-1.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821833" version="1" comment="postgresql-plpython is &lt;9.2.15-1.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821834" version="1" comment="postgresql-pltcl is &lt;9.2.15-1.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821835" version="1" comment="postgresql-server is &lt;9.2.15-1.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821836" version="1" comment="postgresql-test is &lt;9.2.15-1.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821837" version="1" comment="postgresql-upgrade is &lt;9.2.15-1.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821721" version="1" comment="openssh is &lt;6.6.1p1-23.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821722" version="1" comment="openssh-askpass is &lt;6.6.1p1-23.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821723" version="1" comment="openssh-clients is &lt;6.6.1p1-23.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821724" version="1" comment="openssh-keycat is &lt;6.6.1p1-23.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821725" version="1" comment="openssh-ldap is &lt;6.6.1p1-23.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821726" version="1" comment="openssh-server is &lt;6.6.1p1-23.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821727" version="1" comment="openssh-server-sysvinit is &lt;6.6.1p1-23.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821728" version="1" comment="pam_ssh_agent_auth is &lt;0.9.3-9.23.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821842" version="1" comment="libssh2 is &lt;1.4.3-10.el7_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821843" version="1" comment="libssh2-devel is &lt;1.4.3-10.el7_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821844" version="1" comment="libssh2-docs is &lt;1.4.3-10.el7_2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822042" version="1" comment="openssl is &lt;1.0.1e-51.el7_2.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822043" version="1" comment="openssl-devel is &lt;1.0.1e-51.el7_2.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822044" version="1" comment="openssl-libs is &lt;1.0.1e-51.el7_2.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822045" version="1" comment="openssl-perl is &lt;1.0.1e-51.el7_2.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822046" version="1" comment="openssl-static is &lt;1.0.1e-51.el7_2.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822251" version="1" comment="python is &lt;2.7.5-38.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822252" version="1" comment="python-debug is &lt;2.7.5-38.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822253" version="1" comment="python-devel is &lt;2.7.5-38.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822254" version="1" comment="python-libs is &lt;2.7.5-38.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822255" version="1" comment="python-test is &lt;2.7.5-38.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822256" version="1" comment="python-tools is &lt;2.7.5-38.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822257" version="1" comment="tkinter is &lt;2.7.5-38.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822318" version="1" comment="python-twisted-web is &lt;12.1.0-5.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822798" version="1" comment="squid is &lt;3.5.20-2.el7_3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822799" version="1" comment="squid-migration-script is &lt;3.5.20-2.el7_3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822800" version="1" comment="squid-sysvinit is &lt;3.5.20-2.el7_3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823379" version="1" comment="openssh is &lt;7.4p1-11.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823380" version="1" comment="openssh-askpass is &lt;7.4p1-11.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823381" version="1" comment="openssh-cavs is &lt;7.4p1-11.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823382" version="1" comment="openssh-clients is &lt;7.4p1-11.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823383" version="1" comment="openssh-keycat is &lt;7.4p1-11.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823384" version="1" comment="openssh-ldap is &lt;7.4p1-11.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823385" version="1" comment="openssh-server is &lt;7.4p1-11.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823386" version="1" comment="openssh-server-sysvinit is &lt;7.4p1-11.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823387" version="1" comment="pam_ssh_agent_auth is &lt;0.10.3-1.11.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711452" version="1" comment="kernel-default is ==4.4.21-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711453" version="1" comment="kgraft-patch-4_4_21-69-default is &gt;=3-8.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711454" version="1" comment="kernel-default is ==4.4.21-81.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711455" version="1" comment="kgraft-patch-4_4_21-81-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711456" version="1" comment="kernel-default is ==4.4.21-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711457" version="1" comment="kgraft-patch-4_4_21-84-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711458" version="1" comment="kernel-default is ==4.4.21-90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711459" version="1" comment="kgraft-patch-4_4_21-90-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711460" version="1" comment="kernel-default is ==4.4.38-93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711461" version="1" comment="kgraft-patch-4_4_38-93-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147227" version="1" comment="kernel-default is &lt;4.4.38-93.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823207" version="1" comment="drm-utils is &lt;2.4.74-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823208" version="1" comment="libICE is &lt;1.0.9-9.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823209" version="1" comment="libICE-devel is &lt;1.0.9-9.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823210" version="1" comment="libX11 is &lt;1.6.5-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823211" version="1" comment="libX11-common is &lt;1.6.5-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823212" version="1" comment="libX11-devel is &lt;1.6.5-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823213" version="1" comment="libXaw is &lt;1.0.13-4.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823214" version="1" comment="libXaw-devel is &lt;1.0.13-4.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823215" version="1" comment="libXcursor is &lt;1.1.14-8.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823216" version="1" comment="libXcursor-devel is &lt;1.1.14-8.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823217" version="1" comment="libXdmcp is &lt;1.1.2-6.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823218" version="1" comment="libXdmcp-devel is &lt;1.1.2-6.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823219" version="1" comment="libXfixes is &lt;5.0.3-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823220" version="1" comment="libXfixes-devel is &lt;5.0.3-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823221" version="1" comment="libXfont is &lt;1.5.2-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823222" version="1" comment="libXfont-devel is &lt;1.5.2-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823223" version="1" comment="libXfont2 is &lt;2.0.1-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823224" version="1" comment="libXfont2-devel is &lt;2.0.1-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823225" version="1" comment="libXi is &lt;1.7.9-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823226" version="1" comment="libXi-devel is &lt;1.7.9-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823227" version="1" comment="libXpm is &lt;3.5.12-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823228" version="1" comment="libXpm-devel is &lt;3.5.12-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823229" version="1" comment="libXrandr is &lt;1.5.1-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823230" version="1" comment="libXrandr-devel is &lt;1.5.1-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823231" version="1" comment="libXrender is &lt;0.9.10-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823232" version="1" comment="libXrender-devel is &lt;0.9.10-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823233" version="1" comment="libXt is &lt;1.1.5-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823234" version="1" comment="libXt-devel is &lt;1.1.5-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823235" version="1" comment="libXtst is &lt;1.2.3-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823236" version="1" comment="libXtst-devel is &lt;1.2.3-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823237" version="1" comment="libXv is &lt;1.0.11-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823238" version="1" comment="libXv-devel is &lt;1.0.11-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823239" version="1" comment="libXvMC is &lt;1.0.10-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823240" version="1" comment="libXvMC-devel is &lt;1.0.10-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823241" version="1" comment="libXxf86vm is &lt;1.1.4-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823242" version="1" comment="libXxf86vm-devel is &lt;1.1.4-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823243" version="1" comment="libdrm is &lt;2.4.74-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823244" version="1" comment="libdrm-devel is &lt;2.4.74-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823245" version="1" comment="libepoxy is &lt;1.3.1-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823246" version="1" comment="libepoxy-devel is &lt;1.3.1-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823247" version="1" comment="libevdev is &lt;1.5.6-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823248" version="1" comment="libevdev-devel is &lt;1.5.6-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823249" version="1" comment="libevdev-utils is &lt;1.5.6-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823250" version="1" comment="libfontenc is &lt;1.1.3-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823251" version="1" comment="libfontenc-devel is &lt;1.1.3-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823252" version="1" comment="libinput is &lt;1.6.3-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823253" version="1" comment="libinput-devel is &lt;1.6.3-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823254" version="1" comment="libvdpau is &lt;1.1.1-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823255" version="1" comment="libvdpau-devel is &lt;1.1.1-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823256" version="1" comment="libvdpau-docs is &lt;1.1.1-3.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823257" version="1" comment="libwacom is &lt;0.24-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823258" version="1" comment="libwacom-data is &lt;0.24-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823259" version="1" comment="libwacom-devel is &lt;0.24-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823260" version="1" comment="libxcb is &lt;1.12-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823261" version="1" comment="libxcb-devel is &lt;1.12-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823262" version="1" comment="libxcb-doc is &lt;1.12-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823263" version="1" comment="libxkbcommon is &lt;0.7.1-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823264" version="1" comment="libxkbcommon-devel is &lt;0.7.1-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823265" version="1" comment="libxkbcommon-x11 is &lt;0.7.1-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823266" version="1" comment="libxkbcommon-x11-devel is &lt;0.7.1-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823267" version="1" comment="libxkbfile is &lt;1.0.9-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823268" version="1" comment="libxkbfile-devel is &lt;1.0.9-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823269" version="1" comment="mesa-dri-drivers is &lt;17.0.1-6.20170307.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823270" version="1" comment="mesa-filesystem is &lt;17.0.1-6.20170307.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823271" version="1" comment="mesa-libEGL is &lt;17.0.1-6.20170307.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823272" version="1" comment="mesa-libEGL-devel is &lt;17.0.1-6.20170307.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823273" version="1" comment="mesa-libGL is &lt;17.0.1-6.20170307.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823274" version="1" comment="mesa-libGL-devel is &lt;17.0.1-6.20170307.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823275" version="1" comment="mesa-libGLES is &lt;17.0.1-6.20170307.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823276" version="1" comment="mesa-libGLES-devel is &lt;17.0.1-6.20170307.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823277" version="1" comment="mesa-libOSMesa is &lt;17.0.1-6.20170307.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823278" version="1" comment="mesa-libOSMesa-devel is &lt;17.0.1-6.20170307.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823279" version="1" comment="mesa-libgbm is &lt;17.0.1-6.20170307.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823280" version="1" comment="mesa-libgbm-devel is &lt;17.0.1-6.20170307.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823281" version="1" comment="mesa-libglapi is &lt;17.0.1-6.20170307.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823282" version="1" comment="mesa-libxatracker is &lt;17.0.1-6.20170307.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823283" version="1" comment="mesa-libxatracker-devel is &lt;17.0.1-6.20170307.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823284" version="1" comment="mesa-private-llvm is &lt;3.9.1-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823285" version="1" comment="mesa-private-llvm-devel is &lt;3.9.1-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823286" version="1" comment="mesa-vulkan-drivers is &lt;17.0.1-6.20170307.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823287" version="1" comment="vulkan is &lt;1.0.39.1-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823288" version="1" comment="vulkan-devel is &lt;1.0.39.1-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823289" version="1" comment="vulkan-filesystem is &lt;1.0.39.1-2.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823290" version="1" comment="xcb-proto is &lt;1.12-2.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823291" version="1" comment="xkeyboard-config is &lt;2.20-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823292" version="1" comment="xkeyboard-config-devel is &lt;2.20-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823293" version="1" comment="xorg-x11-proto-devel is &lt;7.7-20.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823727" version="1" comment="php is &lt;5.4.16-43.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823728" version="1" comment="php-bcmath is &lt;5.4.16-43.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823729" version="1" comment="php-cli is &lt;5.4.16-43.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823730" version="1" comment="php-common is &lt;5.4.16-43.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823731" version="1" comment="php-dba is &lt;5.4.16-43.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823732" version="1" comment="php-devel is &lt;5.4.16-43.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823733" version="1" comment="php-embedded is &lt;5.4.16-43.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823734" version="1" comment="php-enchant is &lt;5.4.16-43.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823735" version="1" comment="php-fpm is &lt;5.4.16-43.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823736" version="1" comment="php-gd is &lt;5.4.16-43.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823737" version="1" comment="php-intl is &lt;5.4.16-43.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823738" version="1" comment="php-ldap is &lt;5.4.16-43.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823739" version="1" comment="php-mbstring is &lt;5.4.16-43.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823740" version="1" comment="php-mysql is &lt;5.4.16-43.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823741" version="1" comment="php-mysqlnd is &lt;5.4.16-43.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823742" version="1" comment="php-odbc is &lt;5.4.16-43.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823743" version="1" comment="php-pdo is &lt;5.4.16-43.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823744" version="1" comment="php-pgsql is &lt;5.4.16-43.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823745" version="1" comment="php-process is &lt;5.4.16-43.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823746" version="1" comment="php-pspell is &lt;5.4.16-43.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823747" version="1" comment="php-recode is &lt;5.4.16-43.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823748" version="1" comment="php-snmp is &lt;5.4.16-43.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823749" version="1" comment="php-soap is &lt;5.4.16-43.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823750" version="1" comment="php-xml is &lt;5.4.16-43.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823751" version="1" comment="php-xmlrpc is &lt;5.4.16-43.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822971" version="1" comment="thunderbird is &lt;52.1.0-1.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823388" version="1" comment="clutter-gst2 is &lt;2.0.18-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823389" version="1" comment="clutter-gst2-devel is &lt;2.0.18-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823390" version="1" comment="gnome-video-effects is &lt;0.4.3-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064810"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823391" version="1" comment="gstreamer-plugins-bad-free is &lt;0.10.23-23.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823392" version="1" comment="gstreamer-plugins-bad-free-devel is &lt;0.10.23-23.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823393" version="1" comment="gstreamer-plugins-bad-free-devel-docs is &lt;0.10.23-23.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823394" version="1" comment="gstreamer-plugins-good is &lt;0.10.31-13.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823395" version="1" comment="gstreamer-plugins-good-devel-docs is &lt;0.10.31-13.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823396" version="1" comment="gstreamer1 is &lt;1.10.4-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823397" version="1" comment="gstreamer1-devel is &lt;1.10.4-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823398" version="1" comment="gstreamer1-devel-docs is &lt;1.10.4-2.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823399" version="1" comment="gstreamer1-plugins-bad-free is &lt;1.10.4-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823400" version="1" comment="gstreamer1-plugins-bad-free-devel is &lt;1.10.4-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823401" version="1" comment="gstreamer1-plugins-bad-free-gtk is &lt;1.10.4-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823402" version="1" comment="gstreamer1-plugins-base is &lt;1.10.4-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823403" version="1" comment="gstreamer1-plugins-base-devel is &lt;1.10.4-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823404" version="1" comment="gstreamer1-plugins-base-devel-docs is &lt;1.10.4-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823405" version="1" comment="gstreamer1-plugins-base-tools is &lt;1.10.4-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823406" version="1" comment="gstreamer1-plugins-good is &lt;1.10.4-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823407" version="1" comment="orc is &lt;0.4.26-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823408" version="1" comment="orc-compiler is &lt;0.4.26-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823409" version="1" comment="orc-devel is &lt;0.4.26-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823410" version="1" comment="orc-doc is &lt;0.4.26-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823349" version="1" comment="fltk is &lt;1.3.4-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823350" version="1" comment="fltk-devel is &lt;1.3.4-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823351" version="1" comment="fltk-fluid is &lt;1.3.4-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823352" version="1" comment="fltk-static is &lt;1.3.4-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823353" version="1" comment="tigervnc is &lt;1.8.0-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823354" version="1" comment="tigervnc-icons is &lt;1.8.0-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823355" version="1" comment="tigervnc-license is &lt;1.8.0-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823356" version="1" comment="tigervnc-server is &lt;1.8.0-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823357" version="1" comment="tigervnc-server-applet is &lt;1.8.0-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823358" version="1" comment="tigervnc-server-minimal is &lt;1.8.0-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823359" version="1" comment="tigervnc-server-module is &lt;1.8.0-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823048" version="1" comment="kernel is &lt;3.10.0-514.21.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823049" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-514.21.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823050" version="1" comment="kernel-debug is &lt;3.10.0-514.21.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823053" version="1" comment="kernel-doc is &lt;3.10.0-514.21.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823054" version="1" comment="kernel-headers is &lt;3.10.0-514.21.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823055" version="1" comment="kernel-tools is &lt;3.10.0-514.21.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823056" version="1" comment="kernel-tools-libs is &lt;3.10.0-514.21.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823058" version="1" comment="perf is &lt;3.10.0-514.21.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823059" version="1" comment="python-perf is &lt;3.10.0-514.21.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827089" version="1" comment="doxygen is &lt;1.8.5-4.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827090" version="1" comment="doxygen-doxywizard is &lt;1.8.5-4.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827091" version="1" comment="doxygen-latex is &lt;1.8.5-4.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826027" version="1" comment="patch is &lt;2.7.1-11.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826210" version="1" comment="glibc is &lt;2.17-292.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826211" version="1" comment="glibc-common is &lt;2.17-292.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826212" version="1" comment="glibc-devel is &lt;2.17-292.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826213" version="1" comment="glibc-headers is &lt;2.17-292.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826214" version="1" comment="glibc-static is &lt;2.17-292.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826215" version="1" comment="glibc-utils is &lt;2.17-292.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826216" version="1" comment="nscd is &lt;2.17-292.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825705" version="1" comment="python-jinja2 is &lt;2.7.2-3.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822716" version="1" comment="vim-X11 is &lt;7.4.160-1.el7_3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822717" version="1" comment="vim-common is &lt;7.4.160-1.el7_3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822718" version="1" comment="vim-enhanced is &lt;7.4.160-1.el7_3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822719" version="1" comment="vim-filesystem is &lt;7.4.160-1.el7_3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822720" version="1" comment="vim-minimal is &lt;7.4.160-1.el7_3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821875" version="1" comment="bind is &lt;9.9.4-29.el7_2.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821876" version="1" comment="bind-chroot is &lt;9.9.4-29.el7_2.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821877" version="1" comment="bind-devel is &lt;9.9.4-29.el7_2.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821878" version="1" comment="bind-libs is &lt;9.9.4-29.el7_2.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821879" version="1" comment="bind-libs-lite is &lt;9.9.4-29.el7_2.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821880" version="1" comment="bind-license is &lt;9.9.4-29.el7_2.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821881" version="1" comment="bind-lite-devel is &lt;9.9.4-29.el7_2.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821882" version="1" comment="bind-pkcs11 is &lt;9.9.4-29.el7_2.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821883" version="1" comment="bind-pkcs11-devel is &lt;9.9.4-29.el7_2.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821884" version="1" comment="bind-pkcs11-libs is &lt;9.9.4-29.el7_2.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821885" version="1" comment="bind-pkcs11-utils is &lt;9.9.4-29.el7_2.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821886" version="1" comment="bind-sdb is &lt;9.9.4-29.el7_2.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821887" version="1" comment="bind-sdb-chroot is &lt;9.9.4-29.el7_2.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821888" version="1" comment="bind-utils is &lt;9.9.4-29.el7_2.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821817" version="1" comment="firefox is &lt;38.6.1-1.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821949" version="1" comment="graphite2 is &lt;1.3.6-1.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821950" version="1" comment="graphite2-devel is &lt;1.3.6-1.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822086" version="1" comment="ntp is &lt;4.2.6p5-22.el7_2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822087" version="1" comment="ntp-doc is &lt;4.2.6p5-22.el7_2.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822088" version="1" comment="ntp-perl is &lt;4.2.6p5-22.el7_2.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822089" version="1" comment="ntpdate is &lt;4.2.6p5-22.el7_2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822090" version="1" comment="sntp is &lt;4.2.6p5-22.el7_2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125799" version="1" comment="kernel-default is &lt;3.12.57-60.35.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821787" version="1" comment="libcacard is &lt;1.5.3-105.el7_2.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821788" version="1" comment="libcacard-devel is &lt;1.5.3-105.el7_2.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821789" version="1" comment="libcacard-tools is &lt;1.5.3-105.el7_2.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821790" version="1" comment="qemu-img is &lt;1.5.3-105.el7_2.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821791" version="1" comment="qemu-kvm is &lt;1.5.3-105.el7_2.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821792" version="1" comment="qemu-kvm-common is &lt;1.5.3-105.el7_2.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821793" version="1" comment="qemu-kvm-tools is &lt;1.5.3-105.el7_2.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822112" version="1" comment="libxml2 is &lt;2.9.1-6.el7_2.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822113" version="1" comment="libxml2-devel is &lt;2.9.1-6.el7_2.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822114" version="1" comment="libxml2-python is &lt;2.9.1-6.el7_2.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822115" version="1" comment="libxml2-static is &lt;2.9.1-6.el7_2.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821890" version="1" comment="openssh is &lt;6.6.1p1-25.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821891" version="1" comment="openssh-askpass is &lt;6.6.1p1-25.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821892" version="1" comment="openssh-clients is &lt;6.6.1p1-25.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821893" version="1" comment="openssh-keycat is &lt;6.6.1p1-25.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821894" version="1" comment="openssh-ldap is &lt;6.6.1p1-25.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821895" version="1" comment="openssh-server is &lt;6.6.1p1-25.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821896" version="1" comment="openssh-server-sysvinit is &lt;6.6.1p1-25.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821897" version="1" comment="pam_ssh_agent_auth is &lt;0.9.3-9.25.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821772" version="1" comment="firefox is &lt;38.6.0-1.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821821" version="1" comment="thunderbird is &lt;38.6.0-1.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821838" version="1" comment="nss-util is &lt;3.19.1-9.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821839" version="1" comment="nss-util-devel is &lt;3.19.1-9.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821841" version="1" comment="firefox is &lt;38.7.0-1.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821889" version="1" comment="thunderbird is &lt;38.7.0-1.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822024" version="1" comment="nspr is &lt;4.11.0-1.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822025" version="1" comment="nspr-devel is &lt;4.11.0-1.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822026" version="1" comment="nss is &lt;3.21.0-9.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822027" version="1" comment="nss-devel is &lt;3.21.0-9.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822028" version="1" comment="nss-pkcs11-devel is &lt;3.21.0-9.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822029" version="1" comment="nss-softokn is &lt;3.16.2.3-14.2.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822030" version="1" comment="nss-softokn-devel is &lt;3.16.2.3-14.2.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822031" version="1" comment="nss-softokn-freebl is &lt;3.16.2.3-14.2.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822032" version="1" comment="nss-softokn-freebl-devel is &lt;3.16.2.3-14.2.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822033" version="1" comment="nss-sysinit is &lt;3.21.0-9.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822034" version="1" comment="nss-tools is &lt;3.21.0-9.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822035" version="1" comment="nss-util is &lt;3.21.0-2.2.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822036" version="1" comment="nss-util-devel is &lt;3.21.0-2.2.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822487" version="1" comment="qemu-img is &lt;1.5.3-126.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822488" version="1" comment="qemu-kvm is &lt;1.5.3-126.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822489" version="1" comment="qemu-kvm-common is &lt;1.5.3-126.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822490" version="1" comment="qemu-kvm-tools is &lt;1.5.3-126.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822154" version="1" comment="ctdb is &lt;4.2.10-7.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822155" version="1" comment="ctdb-devel is &lt;4.2.10-7.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822156" version="1" comment="ctdb-tests is &lt;4.2.10-7.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822157" version="1" comment="libsmbclient is &lt;4.2.10-7.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822158" version="1" comment="libsmbclient-devel is &lt;4.2.10-7.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822159" version="1" comment="libwbclient is &lt;4.2.10-7.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822160" version="1" comment="libwbclient-devel is &lt;4.2.10-7.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822161" version="1" comment="samba is &lt;4.2.10-7.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822162" version="1" comment="samba-client is &lt;4.2.10-7.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822163" version="1" comment="samba-client-libs is &lt;4.2.10-7.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822164" version="1" comment="samba-common is &lt;4.2.10-7.el7_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822165" version="1" comment="samba-common-libs is &lt;4.2.10-7.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822166" version="1" comment="samba-common-tools is &lt;4.2.10-7.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822167" version="1" comment="samba-dc is &lt;4.2.10-7.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822168" version="1" comment="samba-dc-libs is &lt;4.2.10-7.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822169" version="1" comment="samba-devel is &lt;4.2.10-7.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822170" version="1" comment="samba-libs is &lt;4.2.10-7.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822171" version="1" comment="samba-pidl is &lt;4.2.10-7.el7_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822172" version="1" comment="samba-python is &lt;4.2.10-7.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822173" version="1" comment="samba-test is &lt;4.2.10-7.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822174" version="1" comment="samba-test-devel is &lt;4.2.10-7.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822175" version="1" comment="samba-test-libs is &lt;4.2.10-7.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822176" version="1" comment="samba-vfs-glusterfs is &lt;4.2.10-7.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822177" version="1" comment="samba-winbind is &lt;4.2.10-7.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822178" version="1" comment="samba-winbind-clients is &lt;4.2.10-7.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822179" version="1" comment="samba-winbind-krb5-locator is &lt;4.2.10-7.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822180" version="1" comment="samba-winbind-modules is &lt;4.2.10-7.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829457" version="1" comment="ctdb is &lt;4.10.16-17.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829458" version="1" comment="ctdb-tests is &lt;4.10.16-17.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829459" version="1" comment="libsmbclient is &lt;4.10.16-17.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829460" version="1" comment="libsmbclient-devel is &lt;4.10.16-17.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829461" version="1" comment="libwbclient is &lt;4.10.16-17.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829462" version="1" comment="libwbclient-devel is &lt;4.10.16-17.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829463" version="1" comment="samba is &lt;4.10.16-17.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829464" version="1" comment="samba-client is &lt;4.10.16-17.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829465" version="1" comment="samba-client-libs is &lt;4.10.16-17.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829466" version="1" comment="samba-common is &lt;4.10.16-17.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829467" version="1" comment="samba-common-libs is &lt;4.10.16-17.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829468" version="1" comment="samba-common-tools is &lt;4.10.16-17.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829469" version="1" comment="samba-dc is &lt;4.10.16-17.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829470" version="1" comment="samba-dc-libs is &lt;4.10.16-17.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829471" version="1" comment="samba-devel is &lt;4.10.16-17.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829472" version="1" comment="samba-krb5-printing is &lt;4.10.16-17.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829473" version="1" comment="samba-libs is &lt;4.10.16-17.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829474" version="1" comment="samba-pidl is &lt;4.10.16-17.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829475" version="1" comment="samba-python is &lt;4.10.16-17.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829476" version="1" comment="samba-python-test is &lt;4.10.16-17.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829477" version="1" comment="samba-test is &lt;4.10.16-17.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829478" version="1" comment="samba-test-libs is &lt;4.10.16-17.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829479" version="1" comment="samba-vfs-glusterfs is &lt;4.10.16-17.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829480" version="1" comment="samba-winbind is &lt;4.10.16-17.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829481" version="1" comment="samba-winbind-clients is &lt;4.10.16-17.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829482" version="1" comment="samba-winbind-krb5-locator is &lt;4.10.16-17.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829483" version="1" comment="samba-winbind-modules is &lt;4.10.16-17.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822996" version="1" comment="ctdb is &lt;4.4.4-13.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822997" version="1" comment="ctdb-tests is &lt;4.4.4-13.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822998" version="1" comment="libsmbclient is &lt;4.4.4-13.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822999" version="1" comment="libsmbclient-devel is &lt;4.4.4-13.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823000" version="1" comment="libwbclient is &lt;4.4.4-13.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823001" version="1" comment="libwbclient-devel is &lt;4.4.4-13.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823002" version="1" comment="samba is &lt;4.4.4-13.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823003" version="1" comment="samba-client is &lt;4.4.4-13.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823004" version="1" comment="samba-client-libs is &lt;4.4.4-13.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823005" version="1" comment="samba-common is &lt;4.4.4-13.el7_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823006" version="1" comment="samba-common-libs is &lt;4.4.4-13.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823007" version="1" comment="samba-common-tools is &lt;4.4.4-13.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823008" version="1" comment="samba-dc is &lt;4.4.4-13.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823009" version="1" comment="samba-dc-libs is &lt;4.4.4-13.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823010" version="1" comment="samba-devel is &lt;4.4.4-13.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823011" version="1" comment="samba-krb5-printing is &lt;4.4.4-13.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823012" version="1" comment="samba-libs is &lt;4.4.4-13.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823013" version="1" comment="samba-pidl is &lt;4.4.4-13.el7_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823014" version="1" comment="samba-python is &lt;4.4.4-13.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823015" version="1" comment="samba-test is &lt;4.4.4-13.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823016" version="1" comment="samba-test-libs is &lt;4.4.4-13.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823017" version="1" comment="samba-vfs-glusterfs is &lt;4.4.4-13.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823018" version="1" comment="samba-winbind is &lt;4.4.4-13.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823019" version="1" comment="samba-winbind-clients is &lt;4.4.4-13.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823020" version="1" comment="samba-winbind-krb5-locator is &lt;4.4.4-13.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823021" version="1" comment="samba-winbind-modules is &lt;4.4.4-13.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822299" version="1" comment="openssl is &lt;1.0.1e-51.el7_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822300" version="1" comment="openssl-devel is &lt;1.0.1e-51.el7_2.7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822301" version="1" comment="openssl-libs is &lt;1.0.1e-51.el7_2.7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822302" version="1" comment="openssl-perl is &lt;1.0.1e-51.el7_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822303" version="1" comment="openssl-static is &lt;1.0.1e-51.el7_2.7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824440" version="1" comment="python is &lt;2.7.5-69.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824441" version="1" comment="python-debug is &lt;2.7.5-69.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824442" version="1" comment="python-devel is &lt;2.7.5-69.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824443" version="1" comment="python-libs is &lt;2.7.5-69.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824444" version="1" comment="python-test is &lt;2.7.5-69.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824445" version="1" comment="python-tools is &lt;2.7.5-69.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824446" version="1" comment="tkinter is &lt;2.7.5-69.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821898" version="1" comment="emacs-git is &lt;1.8.3.1-6.el7_2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821899" version="1" comment="emacs-git-el is &lt;1.8.3.1-6.el7_2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821900" version="1" comment="git is &lt;1.8.3.1-6.el7_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821901" version="1" comment="git-all is &lt;1.8.3.1-6.el7_2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821902" version="1" comment="git-bzr is &lt;1.8.3.1-6.el7_2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821903" version="1" comment="git-cvs is &lt;1.8.3.1-6.el7_2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821904" version="1" comment="git-daemon is &lt;1.8.3.1-6.el7_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821905" version="1" comment="git-email is &lt;1.8.3.1-6.el7_2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821906" version="1" comment="git-gui is &lt;1.8.3.1-6.el7_2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821907" version="1" comment="git-hg is &lt;1.8.3.1-6.el7_2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821908" version="1" comment="git-p4 is &lt;1.8.3.1-6.el7_2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821909" version="1" comment="git-svn is &lt;1.8.3.1-6.el7_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821910" version="1" comment="gitk is &lt;1.8.3.1-6.el7_2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821911" version="1" comment="gitweb is &lt;1.8.3.1-6.el7_2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821912" version="1" comment="perl-Git is &lt;1.8.3.1-6.el7_2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821913" version="1" comment="perl-Git-SVN is &lt;1.8.3.1-6.el7_2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822596" version="1" comment="squid is &lt;3.5.20-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822597" version="1" comment="squid-migration-script is &lt;3.5.20-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822598" version="1" comment="squid-sysvinit is &lt;3.5.20-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822529" version="1" comment="dhclient is &lt;4.2.5-47.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822530" version="1" comment="dhcp is &lt;4.2.5-47.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822531" version="1" comment="dhcp-common is &lt;4.2.5-47.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822532" version="1" comment="dhcp-devel is &lt;4.2.5-47.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822533" version="1" comment="dhcp-libs is &lt;4.2.5-47.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822304" version="1" comment="bind is &lt;9.9.4-29.el7_2.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822305" version="1" comment="bind-chroot is &lt;9.9.4-29.el7_2.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822306" version="1" comment="bind-devel is &lt;9.9.4-29.el7_2.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822307" version="1" comment="bind-libs is &lt;9.9.4-29.el7_2.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822308" version="1" comment="bind-libs-lite is &lt;9.9.4-29.el7_2.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822309" version="1" comment="bind-license is &lt;9.9.4-29.el7_2.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822310" version="1" comment="bind-lite-devel is &lt;9.9.4-29.el7_2.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822311" version="1" comment="bind-pkcs11 is &lt;9.9.4-29.el7_2.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822312" version="1" comment="bind-pkcs11-devel is &lt;9.9.4-29.el7_2.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822313" version="1" comment="bind-pkcs11-libs is &lt;9.9.4-29.el7_2.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822314" version="1" comment="bind-pkcs11-utils is &lt;9.9.4-29.el7_2.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822315" version="1" comment="bind-sdb is &lt;9.9.4-29.el7_2.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822316" version="1" comment="bind-sdb-chroot is &lt;9.9.4-29.el7_2.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822317" version="1" comment="bind-utils is &lt;9.9.4-29.el7_2.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822037" version="1" comment="firefox is &lt;45.1.0-1.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822081" version="1" comment="thunderbird is &lt;38.8.0-1.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822093" version="1" comment="firefox is &lt;45.2.0-1.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822131" version="1" comment="thunderbird is &lt;45.2-1.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822210" version="1" comment="firefox is &lt;45.3.0-1.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822685" version="1" comment="nss is &lt;3.21.3-2.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822686" version="1" comment="nss-devel is &lt;3.21.3-2.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822687" version="1" comment="nss-pkcs11-devel is &lt;3.21.3-2.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822688" version="1" comment="nss-sysinit is &lt;3.21.3-2.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822689" version="1" comment="nss-tools is &lt;3.21.3-2.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822690" version="1" comment="nss-util is &lt;3.21.3-1.1.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822691" version="1" comment="nss-util-devel is &lt;3.21.3-1.1.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822281" version="1" comment="thunderbird is &lt;45.3.0-1.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822766" version="1" comment="qemu-img is &lt;1.5.3-126.el7_3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822767" version="1" comment="qemu-kvm is &lt;1.5.3-126.el7_3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822768" version="1" comment="qemu-kvm-common is &lt;1.5.3-126.el7_3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822769" version="1" comment="qemu-kvm-tools is &lt;1.5.3-126.el7_3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822038" version="1" comment="emacs-mercurial is &lt;2.6.2-6.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822039" version="1" comment="emacs-mercurial-el is &lt;2.6.2-6.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822040" version="1" comment="mercurial is &lt;2.6.2-6.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822041" version="1" comment="mercurial-hgk is &lt;2.6.2-6.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822368" version="1" comment="glibc is &lt;2.17-157.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822369" version="1" comment="glibc-common is &lt;2.17-157.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822370" version="1" comment="glibc-devel is &lt;2.17-157.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822371" version="1" comment="glibc-headers is &lt;2.17-157.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822372" version="1" comment="glibc-static is &lt;2.17-157.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822373" version="1" comment="glibc-utils is &lt;2.17-157.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822374" version="1" comment="nscd is &lt;2.17-157.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822602" version="1" comment="mod_nss is &lt;1.0.14-7.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822534" version="1" comment="krb5-devel is &lt;1.14.1-26.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822535" version="1" comment="krb5-libs is &lt;1.14.1-26.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822536" version="1" comment="krb5-pkinit is &lt;1.14.1-26.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822537" version="1" comment="krb5-server is &lt;1.14.1-26.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822538" version="1" comment="krb5-server-ldap is &lt;1.14.1-26.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822539" version="1" comment="krb5-workstation is &lt;1.14.1-26.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822540" version="1" comment="libkadm5 is &lt;1.14.1-26.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822286" version="1" comment="kernel is &lt;3.10.0-327.36.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822287" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-327.36.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822288" version="1" comment="kernel-debug is &lt;3.10.0-327.36.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822291" version="1" comment="kernel-doc is &lt;3.10.0-327.36.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822292" version="1" comment="kernel-headers is &lt;3.10.0-327.36.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822293" version="1" comment="kernel-tools is &lt;3.10.0-327.36.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822294" version="1" comment="kernel-tools-libs is &lt;3.10.0-327.36.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822296" version="1" comment="perf is &lt;3.10.0-327.36.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822297" version="1" comment="python-perf is &lt;3.10.0-327.36.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826088" version="1" comment="libtiff is &lt;4.0.3-32.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826089" version="1" comment="libtiff-devel is &lt;4.0.3-32.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826090" version="1" comment="libtiff-static is &lt;4.0.3-32.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826091" version="1" comment="libtiff-tools is &lt;4.0.3-32.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822270" version="1" comment="java-1.6.0-openjdk is &lt;1.6.0.40-1.13.12.5.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822271" version="1" comment="java-1.6.0-openjdk-demo is &lt;1.6.0.40-1.13.12.5.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822272" version="1" comment="java-1.6.0-openjdk-devel is &lt;1.6.0.40-1.13.12.5.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822273" version="1" comment="java-1.6.0-openjdk-javadoc is &lt;1.6.0.40-1.13.12.5.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822274" version="1" comment="java-1.6.0-openjdk-src is &lt;1.6.0.40-1.13.12.5.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822181" version="1" comment="java-1.7.0-openjdk is &lt;1.7.0.111-2.6.7.2.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822182" version="1" comment="java-1.7.0-openjdk-accessibility is &lt;1.7.0.111-2.6.7.2.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822183" version="1" comment="java-1.7.0-openjdk-demo is &lt;1.7.0.111-2.6.7.2.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822184" version="1" comment="java-1.7.0-openjdk-devel is &lt;1.7.0.111-2.6.7.2.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822185" version="1" comment="java-1.7.0-openjdk-headless is &lt;1.7.0.111-2.6.7.2.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822186" version="1" comment="java-1.7.0-openjdk-javadoc is &lt;1.7.0.111-2.6.7.2.el7_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822187" version="1" comment="java-1.7.0-openjdk-src is &lt;1.7.0.111-2.6.7.2.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822140" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.101-3.b13.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822141" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.101-3.b13.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822142" version="1" comment="java-1.8.0-openjdk-accessibility-debug is &lt;1.8.0.101-3.b13.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822143" version="1" comment="java-1.8.0-openjdk-debug is &lt;1.8.0.101-3.b13.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822144" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.101-3.b13.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822145" version="1" comment="java-1.8.0-openjdk-demo-debug is &lt;1.8.0.101-3.b13.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822146" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.101-3.b13.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822147" version="1" comment="java-1.8.0-openjdk-devel-debug is &lt;1.8.0.101-3.b13.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822148" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.101-3.b13.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822149" version="1" comment="java-1.8.0-openjdk-headless-debug is &lt;1.8.0.101-3.b13.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822150" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.101-3.b13.el7_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822151" version="1" comment="java-1.8.0-openjdk-javadoc-debug is &lt;1.8.0.101-3.b13.el7_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822152" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.101-3.b13.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822153" version="1" comment="java-1.8.0-openjdk-src-debug is &lt;1.8.0.101-3.b13.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822547" version="1" comment="mariadb is &lt;5.5.52-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822548" version="1" comment="mariadb-bench is &lt;5.5.52-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822549" version="1" comment="mariadb-devel is &lt;5.5.52-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822550" version="1" comment="mariadb-embedded is &lt;5.5.52-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822551" version="1" comment="mariadb-embedded-devel is &lt;5.5.52-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822552" version="1" comment="mariadb-libs is &lt;5.5.52-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822553" version="1" comment="mariadb-server is &lt;5.5.52-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822554" version="1" comment="mariadb-test is &lt;5.5.52-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826082" version="1" comment="libjpeg-turbo is &lt;1.2.90-8.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826083" version="1" comment="libjpeg-turbo-devel is &lt;1.2.90-8.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826084" version="1" comment="libjpeg-turbo-static is &lt;1.2.90-8.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826085" version="1" comment="libjpeg-turbo-utils is &lt;1.2.90-8.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826086" version="1" comment="turbojpeg is &lt;1.2.90-8.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826087" version="1" comment="turbojpeg-devel is &lt;1.2.90-8.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824165" version="1" comment="kernel is &lt;3.10.0-862.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824166" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-862.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824167" version="1" comment="kernel-debug is &lt;3.10.0-862.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824170" version="1" comment="kernel-doc is &lt;3.10.0-862.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824171" version="1" comment="kernel-headers is &lt;3.10.0-862.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824172" version="1" comment="kernel-tools is &lt;3.10.0-862.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824173" version="1" comment="kernel-tools-libs is &lt;3.10.0-862.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824175" version="1" comment="perf is &lt;3.10.0-862.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824176" version="1" comment="python-perf is &lt;3.10.0-862.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822082" version="1" comment="libndp is &lt;1.2-6.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822083" version="1" comment="libndp-devel is &lt;1.2-6.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822052" version="1" comment="libcacard is &lt;1.5.3-105.el7_2.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822053" version="1" comment="libcacard-devel is &lt;1.5.3-105.el7_2.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822054" version="1" comment="libcacard-tools is &lt;1.5.3-105.el7_2.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822055" version="1" comment="qemu-img is &lt;1.5.3-105.el7_2.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822056" version="1" comment="qemu-kvm is &lt;1.5.3-105.el7_2.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822057" version="1" comment="qemu-kvm-common is &lt;1.5.3-105.el7_2.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822058" version="1" comment="qemu-kvm-tools is &lt;1.5.3-105.el7_2.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822059" version="1" comment="ImageMagick is &lt;6.7.8.9-13.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822060" version="1" comment="ImageMagick-c++ is &lt;6.7.8.9-13.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822061" version="1" comment="ImageMagick-c++-devel is &lt;6.7.8.9-13.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822062" version="1" comment="ImageMagick-devel is &lt;6.7.8.9-13.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822063" version="1" comment="ImageMagick-doc is &lt;6.7.8.9-13.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822064" version="1" comment="ImageMagick-perl is &lt;6.7.8.9-13.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823194" version="1" comment="qemu-img is &lt;1.5.3-141.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823195" version="1" comment="qemu-kvm is &lt;1.5.3-141.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823196" version="1" comment="qemu-kvm-common is &lt;1.5.3-141.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823197" version="1" comment="qemu-kvm-tools is &lt;1.5.3-141.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822084" version="1" comment="squid is &lt;3.3.8-26.el7_2.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822085" version="1" comment="squid-sysvinit is &lt;3.3.8-26.el7_2.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822116" version="1" comment="setroubleshoot is &lt;3.2.24-4.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822117" version="1" comment="setroubleshoot-plugins is &lt;3.0.59-2.el7_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822118" version="1" comment="setroubleshoot-server is &lt;3.2.24-4.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825335" version="1" comment="xerces-c is &lt;3.1.1-9.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825336" version="1" comment="xerces-c-devel is &lt;3.1.1-9.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825337" version="1" comment="xerces-c-doc is &lt;3.1.1-9.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829365" version="1" comment="libxml2 is &lt;2.9.1-6.el7_9.6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829366" version="1" comment="libxml2-devel is &lt;2.9.1-6.el7_9.6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829367" version="1" comment="libxml2-python is &lt;2.9.1-6.el7_9.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829368" version="1" comment="libxml2-static is &lt;2.9.1-6.el7_9.6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822498" version="1" comment="wget is &lt;1.14-13.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822543" version="1" comment="389-ds-base is &lt;1.3.5.10-11.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822544" version="1" comment="389-ds-base-devel is &lt;1.3.5.10-11.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822545" version="1" comment="389-ds-base-libs is &lt;1.3.5.10-11.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822546" version="1" comment="389-ds-base-snmp is &lt;1.3.5.10-11.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822507" version="1" comment="gimp is &lt;2.8.16-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822508" version="1" comment="gimp-devel is &lt;2.8.16-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822509" version="1" comment="gimp-devel-tools is &lt;2.8.16-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822510" version="1" comment="gimp-help is &lt;2.8.2-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822511" version="1" comment="gimp-help-ca is &lt;2.8.2-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822512" version="1" comment="gimp-help-da is &lt;2.8.2-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822513" version="1" comment="gimp-help-de is &lt;2.8.2-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822514" version="1" comment="gimp-help-el is &lt;2.8.2-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822515" version="1" comment="gimp-help-en_GB is &lt;2.8.2-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822516" version="1" comment="gimp-help-es is &lt;2.8.2-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822517" version="1" comment="gimp-help-fr is &lt;2.8.2-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822518" version="1" comment="gimp-help-it is &lt;2.8.2-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822519" version="1" comment="gimp-help-ja is &lt;2.8.2-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822520" version="1" comment="gimp-help-ko is &lt;2.8.2-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822521" version="1" comment="gimp-help-nl is &lt;2.8.2-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822522" version="1" comment="gimp-help-nn is &lt;2.8.2-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822523" version="1" comment="gimp-help-pt_BR is &lt;2.8.2-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822524" version="1" comment="gimp-help-ru is &lt;2.8.2-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822525" version="1" comment="gimp-help-sl is &lt;2.8.2-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822526" version="1" comment="gimp-help-sv is &lt;2.8.2-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822527" version="1" comment="gimp-help-zh_CN is &lt;2.8.2-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822528" version="1" comment="gimp-libs is &lt;2.8.16-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711462" version="1" comment="kgraft-patch-3_12_49-11-default is &gt;=6-17.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711464" version="1" comment="kgraft-patch-3_12_51-60_20-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711466" version="1" comment="kgraft-patch-3_12_51-60_25-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711468" version="1" comment="kgraft-patch-3_12_53-60_30-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711470" version="1" comment="kgraft-patch-3_12_57-60_35-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711472" version="1" comment="kgraft-patch-3_12_59-60_41-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129344" version="1" comment="kernel-default is &lt;3.12.59-60.41.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824347" version="1" comment="xmlrpc-client is &lt;3.1.3-9.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824348" version="1" comment="xmlrpc-common is &lt;3.1.3-9.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824349" version="1" comment="xmlrpc-javadoc is &lt;3.1.3-9.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824350" version="1" comment="xmlrpc-server is &lt;3.1.3-9.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822617" version="1" comment="libblkid is &lt;2.23.2-33.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822618" version="1" comment="libblkid-devel is &lt;2.23.2-33.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822619" version="1" comment="libmount is &lt;2.23.2-33.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822620" version="1" comment="libmount-devel is &lt;2.23.2-33.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822621" version="1" comment="libuuid is &lt;2.23.2-33.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822622" version="1" comment="libuuid-devel is &lt;2.23.2-33.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822623" version="1" comment="util-linux is &lt;2.23.2-33.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822624" version="1" comment="uuidd is &lt;2.23.2-33.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822219" version="1" comment="libcacard is &lt;1.5.3-105.el7_2.7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822220" version="1" comment="libcacard-devel is &lt;1.5.3-105.el7_2.7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822221" version="1" comment="libcacard-tools is &lt;1.5.3-105.el7_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822222" version="1" comment="qemu-img is &lt;1.5.3-105.el7_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822223" version="1" comment="qemu-kvm is &lt;1.5.3-105.el7_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822224" version="1" comment="qemu-kvm-common is &lt;1.5.3-105.el7_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822225" version="1" comment="qemu-kvm-tools is &lt;1.5.3-105.el7_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822884" version="1" comment="openjpeg is &lt;1.5.1-16.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822885" version="1" comment="openjpeg-devel is &lt;1.5.1-16.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822886" version="1" comment="openjpeg-libs is &lt;1.5.1-16.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711474" version="1" comment="kgraft-patch-3_12_49-11-default is &gt;=7-20.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711476" version="1" comment="kgraft-patch-3_12_51-60_20-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711478" version="1" comment="kgraft-patch-3_12_51-60_25-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711480" version="1" comment="kgraft-patch-3_12_53-60_30-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711482" version="1" comment="kgraft-patch-3_12_57-60_35-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711484" version="1" comment="kgraft-patch-3_12_59-60_41-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711486" version="1" comment="kgraft-patch-3_12_59-60_45-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711488" version="1" comment="kernel-default is ==3.12.62-60.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711489" version="1" comment="kgraft-patch-3_12_62-60_62-default is &gt;=3-5.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131004" version="1" comment="kernel-default is &lt;3.12.62-60.62.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822356" version="1" comment="kernel is &lt;3.10.0-327.36.3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822357" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-327.36.3.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822358" version="1" comment="kernel-debug is &lt;3.10.0-327.36.3.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822361" version="1" comment="kernel-doc is &lt;3.10.0-327.36.3.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822362" version="1" comment="kernel-headers is &lt;3.10.0-327.36.3.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822363" version="1" comment="kernel-tools is &lt;3.10.0-327.36.3.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822364" version="1" comment="kernel-tools-libs is &lt;3.10.0-327.36.3.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822366" version="1" comment="perf is &lt;3.10.0-327.36.3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822367" version="1" comment="python-perf is &lt;3.10.0-327.36.3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822298" version="1" comment="firefox is &lt;45.4.0-1.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822319" version="1" comment="thunderbird is &lt;45.4.0-1.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822692" version="1" comment="firefox is &lt;45.5.0-1.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822710" version="1" comment="thunderbird is &lt;45.5.0-1.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822603" version="1" comment="libreswan is &lt;3.15-8.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822599" version="1" comment="fontconfig is &lt;2.10.95-10.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822600" version="1" comment="fontconfig-devel is &lt;2.10.95-10.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822601" version="1" comment="fontconfig-devel-doc is &lt;2.10.95-10.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822226" version="1" comment="php is &lt;5.4.16-36.3.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822227" version="1" comment="php-bcmath is &lt;5.4.16-36.3.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822228" version="1" comment="php-cli is &lt;5.4.16-36.3.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822229" version="1" comment="php-common is &lt;5.4.16-36.3.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822230" version="1" comment="php-dba is &lt;5.4.16-36.3.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822231" version="1" comment="php-devel is &lt;5.4.16-36.3.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822232" version="1" comment="php-embedded is &lt;5.4.16-36.3.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822233" version="1" comment="php-enchant is &lt;5.4.16-36.3.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822234" version="1" comment="php-fpm is &lt;5.4.16-36.3.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822235" version="1" comment="php-gd is &lt;5.4.16-36.3.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822236" version="1" comment="php-intl is &lt;5.4.16-36.3.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822237" version="1" comment="php-ldap is &lt;5.4.16-36.3.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822238" version="1" comment="php-mbstring is &lt;5.4.16-36.3.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822239" version="1" comment="php-mysql is &lt;5.4.16-36.3.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822240" version="1" comment="php-mysqlnd is &lt;5.4.16-36.3.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822241" version="1" comment="php-odbc is &lt;5.4.16-36.3.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822242" version="1" comment="php-pdo is &lt;5.4.16-36.3.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822243" version="1" comment="php-pgsql is &lt;5.4.16-36.3.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822244" version="1" comment="php-process is &lt;5.4.16-36.3.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822245" version="1" comment="php-pspell is &lt;5.4.16-36.3.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822246" version="1" comment="php-recode is &lt;5.4.16-36.3.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822247" version="1" comment="php-snmp is &lt;5.4.16-36.3.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822248" version="1" comment="php-soap is &lt;5.4.16-36.3.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822249" version="1" comment="php-xml is &lt;5.4.16-36.3.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822250" version="1" comment="php-xmlrpc is &lt;5.4.16-36.3.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822188" version="1" comment="golang is &lt;1.6.3-1.el7_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822189" version="1" comment="golang-bin is &lt;1.6.3-1.el7_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822190" version="1" comment="golang-docs is &lt;1.6.3-1.el7_2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822191" version="1" comment="golang-misc is &lt;1.6.3-1.el7_2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822192" version="1" comment="golang-src is &lt;1.6.3-1.el7_2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822193" version="1" comment="golang-tests is &lt;1.6.3-1.el7_2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822132" version="1" comment="httpd is &lt;2.4.6-40.el7_2.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822133" version="1" comment="httpd-devel is &lt;2.4.6-40.el7_2.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822134" version="1" comment="httpd-manual is &lt;2.4.6-40.el7_2.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822135" version="1" comment="httpd-tools is &lt;2.4.6-40.el7_2.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822136" version="1" comment="mod_ldap is &lt;2.4.6-40.el7_2.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822137" version="1" comment="mod_proxy_html is &lt;2.4.6-40.el7_2.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822138" version="1" comment="mod_session is &lt;2.4.6-40.el7_2.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822139" version="1" comment="mod_ssl is &lt;2.4.6-40.el7_2.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822561" version="1" comment="php is &lt;5.4.16-42.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822562" version="1" comment="php-bcmath is &lt;5.4.16-42.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822563" version="1" comment="php-cli is &lt;5.4.16-42.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822564" version="1" comment="php-common is &lt;5.4.16-42.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822565" version="1" comment="php-dba is &lt;5.4.16-42.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822566" version="1" comment="php-devel is &lt;5.4.16-42.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822567" version="1" comment="php-embedded is &lt;5.4.16-42.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822568" version="1" comment="php-enchant is &lt;5.4.16-42.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822569" version="1" comment="php-fpm is &lt;5.4.16-42.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822570" version="1" comment="php-gd is &lt;5.4.16-42.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822571" version="1" comment="php-intl is &lt;5.4.16-42.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822572" version="1" comment="php-ldap is &lt;5.4.16-42.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822573" version="1" comment="php-mbstring is &lt;5.4.16-42.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822574" version="1" comment="php-mysql is &lt;5.4.16-42.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822575" version="1" comment="php-mysqlnd is &lt;5.4.16-42.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822576" version="1" comment="php-odbc is &lt;5.4.16-42.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822577" version="1" comment="php-pdo is &lt;5.4.16-42.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822578" version="1" comment="php-pgsql is &lt;5.4.16-42.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822579" version="1" comment="php-process is &lt;5.4.16-42.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822580" version="1" comment="php-pspell is &lt;5.4.16-42.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822581" version="1" comment="php-recode is &lt;5.4.16-42.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822582" version="1" comment="php-snmp is &lt;5.4.16-42.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822583" version="1" comment="php-soap is &lt;5.4.16-42.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822584" version="1" comment="php-xml is &lt;5.4.16-42.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822585" version="1" comment="php-xmlrpc is &lt;5.4.16-42.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822275" version="1" comment="ipa-admintools is &lt;4.2.0-15.el7_2.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822276" version="1" comment="ipa-client is &lt;4.2.0-15.el7_2.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822277" version="1" comment="ipa-python is &lt;4.2.0-15.el7_2.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822278" version="1" comment="ipa-server is &lt;4.2.0-15.el7_2.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822279" version="1" comment="ipa-server-dns is &lt;4.2.0-15.el7_2.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822280" version="1" comment="ipa-server-trust-ad is &lt;4.2.0-15.el7_2.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822556" version="1" comment="firewall-applet is &lt;0.4.3.2-8.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822557" version="1" comment="firewall-config is &lt;0.4.3.2-8.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822558" version="1" comment="firewalld is &lt;0.4.3.2-8.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822559" version="1" comment="firewalld-filesystem is &lt;0.4.3.2-8.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822560" version="1" comment="python-firewall is &lt;0.4.3.2-8.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822387" version="1" comment="curl is &lt;7.29.0-35.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822388" version="1" comment="libcurl is &lt;7.29.0-35.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822389" version="1" comment="libcurl-devel is &lt;7.29.0-35.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822625" version="1" comment="postgresql is &lt;9.2.18-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822626" version="1" comment="postgresql-contrib is &lt;9.2.18-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822627" version="1" comment="postgresql-devel is &lt;9.2.18-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822628" version="1" comment="postgresql-docs is &lt;9.2.18-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822629" version="1" comment="postgresql-libs is &lt;9.2.18-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822630" version="1" comment="postgresql-plperl is &lt;9.2.18-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822631" version="1" comment="postgresql-plpython is &lt;9.2.18-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822632" version="1" comment="postgresql-pltcl is &lt;9.2.18-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822633" version="1" comment="postgresql-server is &lt;9.2.18-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822634" version="1" comment="postgresql-test is &lt;9.2.18-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822635" version="1" comment="postgresql-upgrade is &lt;9.2.18-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822747" version="1" comment="java-1.6.0-openjdk is &lt;1.6.0.41-1.13.13.1.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822748" version="1" comment="java-1.6.0-openjdk-demo is &lt;1.6.0.41-1.13.13.1.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822749" version="1" comment="java-1.6.0-openjdk-devel is &lt;1.6.0.41-1.13.13.1.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822750" version="1" comment="java-1.6.0-openjdk-javadoc is &lt;1.6.0.41-1.13.13.1.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822751" version="1" comment="java-1.6.0-openjdk-src is &lt;1.6.0.41-1.13.13.1.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822669" version="1" comment="java-1.7.0-openjdk is &lt;1.7.0.121-2.6.8.0.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822670" version="1" comment="java-1.7.0-openjdk-accessibility is &lt;1.7.0.121-2.6.8.0.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822671" version="1" comment="java-1.7.0-openjdk-demo is &lt;1.7.0.121-2.6.8.0.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822672" version="1" comment="java-1.7.0-openjdk-devel is &lt;1.7.0.121-2.6.8.0.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822673" version="1" comment="java-1.7.0-openjdk-headless is &lt;1.7.0.121-2.6.8.0.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822674" version="1" comment="java-1.7.0-openjdk-javadoc is &lt;1.7.0.121-2.6.8.0.el7_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822675" version="1" comment="java-1.7.0-openjdk-src is &lt;1.7.0.121-2.6.8.0.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822342" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.111-1.b15.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822343" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.111-1.b15.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822344" version="1" comment="java-1.8.0-openjdk-accessibility-debug is &lt;1.8.0.111-1.b15.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822345" version="1" comment="java-1.8.0-openjdk-debug is &lt;1.8.0.111-1.b15.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822346" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.111-1.b15.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822347" version="1" comment="java-1.8.0-openjdk-demo-debug is &lt;1.8.0.111-1.b15.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822348" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.111-1.b15.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822349" version="1" comment="java-1.8.0-openjdk-devel-debug is &lt;1.8.0.111-1.b15.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822350" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.111-1.b15.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822351" version="1" comment="java-1.8.0-openjdk-headless-debug is &lt;1.8.0.111-1.b15.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822352" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.111-1.b15.el7_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822353" version="1" comment="java-1.8.0-openjdk-javadoc-debug is &lt;1.8.0.111-1.b15.el7_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822354" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.111-1.b15.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822355" version="1" comment="java-1.8.0-openjdk-src-debug is &lt;1.8.0.111-1.b15.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822814" version="1" comment="java-1.7.0-openjdk is &lt;1.7.0.131-2.6.9.0.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822815" version="1" comment="java-1.7.0-openjdk-accessibility is &lt;1.7.0.131-2.6.9.0.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822816" version="1" comment="java-1.7.0-openjdk-demo is &lt;1.7.0.131-2.6.9.0.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822817" version="1" comment="java-1.7.0-openjdk-devel is &lt;1.7.0.131-2.6.9.0.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822818" version="1" comment="java-1.7.0-openjdk-headless is &lt;1.7.0.131-2.6.9.0.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822819" version="1" comment="java-1.7.0-openjdk-javadoc is &lt;1.7.0.131-2.6.9.0.el7_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822820" version="1" comment="java-1.7.0-openjdk-src is &lt;1.7.0.131-2.6.9.0.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822782" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.121-0.b13.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822783" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.121-0.b13.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822784" version="1" comment="java-1.8.0-openjdk-accessibility-debug is &lt;1.8.0.121-0.b13.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822785" version="1" comment="java-1.8.0-openjdk-debug is &lt;1.8.0.121-0.b13.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822786" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.121-0.b13.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822787" version="1" comment="java-1.8.0-openjdk-demo-debug is &lt;1.8.0.121-0.b13.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822788" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.121-0.b13.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822789" version="1" comment="java-1.8.0-openjdk-devel-debug is &lt;1.8.0.121-0.b13.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822790" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.121-0.b13.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822791" version="1" comment="java-1.8.0-openjdk-headless-debug is &lt;1.8.0.121-0.b13.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822792" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.121-0.b13.el7_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822793" version="1" comment="java-1.8.0-openjdk-javadoc-debug is &lt;1.8.0.121-0.b13.el7_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822794" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.121-0.b13.el7_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822795" version="1" comment="java-1.8.0-openjdk-javadoc-zip-debug is &lt;1.8.0.121-0.b13.el7_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822796" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.121-0.b13.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822797" version="1" comment="java-1.8.0-openjdk-src-debug is &lt;1.8.0.121-0.b13.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822491" version="1" comment="python is &lt;2.7.5-48.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822492" version="1" comment="python-debug is &lt;2.7.5-48.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822493" version="1" comment="python-devel is &lt;2.7.5-48.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822494" version="1" comment="python-libs is &lt;2.7.5-48.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822495" version="1" comment="python-test is &lt;2.7.5-48.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822496" version="1" comment="python-tools is &lt;2.7.5-48.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822497" version="1" comment="tkinter is &lt;2.7.5-48.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828851" version="1" comment="gd is &lt;2.0.35-27.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828852" version="1" comment="gd-devel is &lt;2.0.35-27.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828853" version="1" comment="gd-progs is &lt;2.0.35-27.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825532" version="1" comment="thunderbird is &lt;60.5.0-1.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711491" version="1" comment="kgraft-patch-3_12_59-60_45-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822676" version="1" comment="libgcrypt is &lt;1.5.3-13.el7_3.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822677" version="1" comment="libgcrypt-devel is &lt;1.5.3-13.el7_3.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711493" version="1" comment="kgraft-patch-3_12_62-60_62-default is &gt;=2-9.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711495" version="1" comment="kernel-default is ==3.12.62-60.64.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711496" version="1" comment="kgraft-patch-3_12_62-60_64_8-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131270" version="1" comment="kernel-default is &lt;3.12.62-60.64.8.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823421" version="1" comment="mariadb is &lt;5.5.56-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823422" version="1" comment="mariadb-bench is &lt;5.5.56-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823423" version="1" comment="mariadb-devel is &lt;5.5.56-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823424" version="1" comment="mariadb-embedded is &lt;5.5.56-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823425" version="1" comment="mariadb-embedded-devel is &lt;5.5.56-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823426" version="1" comment="mariadb-libs is &lt;5.5.56-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823427" version="1" comment="mariadb-server is &lt;5.5.56-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823428" version="1" comment="mariadb-test is &lt;5.5.56-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823574" version="1" comment="groovy is &lt;1.8.9-8.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823575" version="1" comment="groovy-javadoc is &lt;1.8.9-8.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822919" version="1" comment="tomcat is &lt;7.0.69-11.el7_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822920" version="1" comment="tomcat-admin-webapps is &lt;7.0.69-11.el7_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822921" version="1" comment="tomcat-docs-webapp is &lt;7.0.69-11.el7_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822922" version="1" comment="tomcat-el-2.2-api is &lt;7.0.69-11.el7_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822923" version="1" comment="tomcat-javadoc is &lt;7.0.69-11.el7_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822924" version="1" comment="tomcat-jsp-2.2-api is &lt;7.0.69-11.el7_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822925" version="1" comment="tomcat-jsvc is &lt;7.0.69-11.el7_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822926" version="1" comment="tomcat-lib is &lt;7.0.69-11.el7_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822927" version="1" comment="tomcat-servlet-3.0-api is &lt;7.0.69-11.el7_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822928" version="1" comment="tomcat-webapps is &lt;7.0.69-11.el7_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822770" version="1" comment="kernel is &lt;3.10.0-514.6.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822771" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-514.6.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822772" version="1" comment="kernel-debug is &lt;3.10.0-514.6.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822775" version="1" comment="kernel-doc is &lt;3.10.0-514.6.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822776" version="1" comment="kernel-headers is &lt;3.10.0-514.6.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822777" version="1" comment="kernel-tools is &lt;3.10.0-514.6.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822778" version="1" comment="kernel-tools-libs is &lt;3.10.0-514.6.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822780" version="1" comment="perf is &lt;3.10.0-514.6.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822781" version="1" comment="python-perf is &lt;3.10.0-514.6.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829454" version="1" comment="mailman is &lt;2.1.15-30.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822722" version="1" comment="ipa-admintools is &lt;4.4.0-14.el7_3.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822723" version="1" comment="ipa-client is &lt;4.4.0-14.el7_3.1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822724" version="1" comment="ipa-client-common is &lt;4.4.0-14.el7_3.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822725" version="1" comment="ipa-common is &lt;4.4.0-14.el7_3.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822726" version="1" comment="ipa-python-compat is &lt;4.4.0-14.el7_3.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822727" version="1" comment="ipa-server is &lt;4.4.0-14.el7_3.1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822728" version="1" comment="ipa-server-common is &lt;4.4.0-14.el7_3.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822729" version="1" comment="ipa-server-dns is &lt;4.4.0-14.el7_3.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822730" version="1" comment="ipa-server-trust-ad is &lt;4.4.0-14.el7_3.1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822731" version="1" comment="python2-ipaclient is &lt;4.4.0-14.el7_3.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822732" version="1" comment="python2-ipalib is &lt;4.4.0-14.el7_3.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822733" version="1" comment="python2-ipaserver is &lt;4.4.0-14.el7_3.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822713" version="1" comment="sudo is &lt;1.8.6p7-21.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822714" version="1" comment="sudo-devel is &lt;1.8.6p7-21.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822646" version="1" comment="pacemaker is &lt;1.1.15-11.el7_3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822647" version="1" comment="pacemaker-cli is &lt;1.1.15-11.el7_3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822648" version="1" comment="pacemaker-cluster-libs is &lt;1.1.15-11.el7_3.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822649" version="1" comment="pacemaker-cts is &lt;1.1.15-11.el7_3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822650" version="1" comment="pacemaker-doc is &lt;1.1.15-11.el7_3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822651" version="1" comment="pacemaker-libs is &lt;1.1.15-11.el7_3.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822652" version="1" comment="pacemaker-libs-devel is &lt;1.1.15-11.el7_3.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822653" version="1" comment="pacemaker-nagios-plugins-metadata is &lt;1.1.15-11.el7_3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822654" version="1" comment="pacemaker-remote is &lt;1.1.15-11.el7_3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822330" version="1" comment="kernel is &lt;3.10.0-327.36.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822331" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-327.36.2.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822332" version="1" comment="kernel-debug is &lt;3.10.0-327.36.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822335" version="1" comment="kernel-doc is &lt;3.10.0-327.36.2.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822336" version="1" comment="kernel-headers is &lt;3.10.0-327.36.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822337" version="1" comment="kernel-tools is &lt;3.10.0-327.36.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822338" version="1" comment="kernel-tools-libs is &lt;3.10.0-327.36.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822340" version="1" comment="perf is &lt;3.10.0-327.36.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822341" version="1" comment="python-perf is &lt;3.10.0-327.36.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822604" version="1" comment="resteasy-base is &lt;3.0.6-4.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822605" version="1" comment="resteasy-base-atom-provider is &lt;3.0.6-4.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822606" version="1" comment="resteasy-base-client is &lt;3.0.6-4.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822607" version="1" comment="resteasy-base-jackson-provider is &lt;3.0.6-4.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822608" version="1" comment="resteasy-base-javadoc is &lt;3.0.6-4.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822609" version="1" comment="resteasy-base-jaxb-provider is &lt;3.0.6-4.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822610" version="1" comment="resteasy-base-jaxrs is &lt;3.0.6-4.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822611" version="1" comment="resteasy-base-jaxrs-all is &lt;3.0.6-4.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822612" version="1" comment="resteasy-base-jaxrs-api is &lt;3.0.6-4.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822613" version="1" comment="resteasy-base-jettison-provider is &lt;3.0.6-4.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822614" version="1" comment="resteasy-base-providers-pom is &lt;3.0.6-4.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822615" version="1" comment="resteasy-base-resteasy-pom is &lt;3.0.6-4.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822616" version="1" comment="resteasy-base-tjws is &lt;3.0.6-4.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822541" version="1" comment="sudo is &lt;1.8.6p7-20.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822542" version="1" comment="sudo-devel is &lt;1.8.6p7-20.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711498" version="1" comment="kgraft-patch-3_12_49-11-default is &gt;=8-23.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711500" version="1" comment="kgraft-patch-3_12_51-60_20-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711502" version="1" comment="kgraft-patch-3_12_51-60_25-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711504" version="1" comment="kgraft-patch-3_12_53-60_30-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711506" version="1" comment="kgraft-patch-3_12_57-60_35-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823376" version="1" comment="curl is &lt;7.29.0-42.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823377" version="1" comment="libcurl is &lt;7.29.0-42.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823378" version="1" comment="libcurl-devel is &lt;7.29.0-42.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822807" version="1" comment="ntp is &lt;4.2.6p5-25.el7_3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822808" version="1" comment="ntp-doc is &lt;4.2.6p5-25.el7_3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822809" version="1" comment="ntp-perl is &lt;4.2.6p5-25.el7_3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822810" version="1" comment="ntpdate is &lt;4.2.6p5-25.el7_3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822811" version="1" comment="sntp is &lt;4.2.6p5-25.el7_3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823451" version="1" comment="gnutls is &lt;3.3.26-9.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823452" version="1" comment="gnutls-c++ is &lt;3.3.26-9.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823453" version="1" comment="gnutls-dane is &lt;3.3.26-9.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823454" version="1" comment="gnutls-devel is &lt;3.3.26-9.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823455" version="1" comment="gnutls-utils is &lt;3.3.26-9.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822678" version="1" comment="policycoreutils is &lt;2.5-9.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822679" version="1" comment="policycoreutils-devel is &lt;2.5-9.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822680" version="1" comment="policycoreutils-gui is &lt;2.5-9.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822681" version="1" comment="policycoreutils-newrole is &lt;2.5-9.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822682" version="1" comment="policycoreutils-python is &lt;2.5-9.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822683" version="1" comment="policycoreutils-restorecond is &lt;2.5-9.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822684" version="1" comment="policycoreutils-sandbox is &lt;2.5-9.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822636" version="1" comment="libgudev1 is &lt;219-30.el7_3.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822637" version="1" comment="libgudev1-devel is &lt;219-30.el7_3.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822638" version="1" comment="systemd is &lt;219-30.el7_3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822639" version="1" comment="systemd-devel is &lt;219-30.el7_3.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822640" version="1" comment="systemd-journal-gateway is &lt;219-30.el7_3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822641" version="1" comment="systemd-libs is &lt;219-30.el7_3.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822642" version="1" comment="systemd-networkd is &lt;219-30.el7_3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822643" version="1" comment="systemd-python is &lt;219-30.el7_3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822644" version="1" comment="systemd-resolved is &lt;219-30.el7_3.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822645" version="1" comment="systemd-sysv is &lt;219-30.el7_3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822436" version="1" comment="pacemaker is &lt;1.1.15-11.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822437" version="1" comment="pacemaker-cli is &lt;1.1.15-11.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822438" version="1" comment="pacemaker-cluster-libs is &lt;1.1.15-11.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822439" version="1" comment="pacemaker-cts is &lt;1.1.15-11.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822440" version="1" comment="pacemaker-doc is &lt;1.1.15-11.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822441" version="1" comment="pacemaker-libs is &lt;1.1.15-11.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822442" version="1" comment="pacemaker-libs-devel is &lt;1.1.15-11.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822443" version="1" comment="pacemaker-nagios-plugins-metadata is &lt;1.1.15-11.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822444" version="1" comment="pacemaker-remote is &lt;1.1.15-11.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823683" version="1" comment="kernel is &lt;3.10.0-693.5.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823684" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-693.5.2.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823685" version="1" comment="kernel-debug is &lt;3.10.0-693.5.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823688" version="1" comment="kernel-doc is &lt;3.10.0-693.5.2.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823689" version="1" comment="kernel-headers is &lt;3.10.0-693.5.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823690" version="1" comment="kernel-tools is &lt;3.10.0-693.5.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823691" version="1" comment="kernel-tools-libs is &lt;3.10.0-693.5.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823693" version="1" comment="perf is &lt;3.10.0-693.5.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823694" version="1" comment="python-perf is &lt;3.10.0-693.5.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822835" version="1" comment="openssl is &lt;1.0.1e-60.el7_3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822836" version="1" comment="openssl-devel is &lt;1.0.1e-60.el7_3.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822837" version="1" comment="openssl-libs is &lt;1.0.1e-60.el7_3.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822838" version="1" comment="openssl-perl is &lt;1.0.1e-60.el7_3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822839" version="1" comment="openssl-static is &lt;1.0.1e-60.el7_3.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822852" version="1" comment="kernel is &lt;3.10.0-514.10.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822853" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-514.10.2.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822854" version="1" comment="kernel-debug is &lt;3.10.0-514.10.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822857" version="1" comment="kernel-doc is &lt;3.10.0-514.10.2.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822858" version="1" comment="kernel-headers is &lt;3.10.0-514.10.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822859" version="1" comment="kernel-tools is &lt;3.10.0-514.10.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822860" version="1" comment="kernel-tools-libs is &lt;3.10.0-514.10.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822862" version="1" comment="perf is &lt;3.10.0-514.10.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822863" version="1" comment="python-perf is &lt;3.10.0-514.10.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711508" version="1" comment="kgraft-patch-3_12_51-60_25-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711510" version="1" comment="kgraft-patch-3_12_53-60_30-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711512" version="1" comment="kgraft-patch-3_12_57-60_35-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711514" version="1" comment="kgraft-patch-3_12_59-60_41-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711516" version="1" comment="kgraft-patch-3_12_59-60_45-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711518" version="1" comment="kgraft-patch-3_12_62-60_62-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711520" version="1" comment="kgraft-patch-3_12_62-60_64_8-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711522" version="1" comment="kernel-default is ==3.12.67-60.64.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711523" version="1" comment="kgraft-patch-3_12_67-60_64_18-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715596" version="1" comment="kernel-default is &lt;4.4.21-81.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822693" version="1" comment="ipsilon is &lt;1.0.0-13.el7_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822694" version="1" comment="ipsilon-authform is &lt;1.0.0-13.el7_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822695" version="1" comment="ipsilon-authgssapi is &lt;1.0.0-13.el7_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822696" version="1" comment="ipsilon-authldap is &lt;1.0.0-13.el7_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822697" version="1" comment="ipsilon-base is &lt;1.0.0-13.el7_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822698" version="1" comment="ipsilon-client is &lt;1.0.0-13.el7_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822699" version="1" comment="ipsilon-filesystem is &lt;1.0.0-13.el7_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822700" version="1" comment="ipsilon-infosssd is &lt;1.0.0-13.el7_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822701" version="1" comment="ipsilon-persona is &lt;1.0.0-13.el7_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822702" version="1" comment="ipsilon-saml2 is &lt;1.0.0-13.el7_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822703" version="1" comment="ipsilon-saml2-base is &lt;1.0.0-13.el7_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822704" version="1" comment="ipsilon-tools-ipa is &lt;1.0.0-13.el7_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822907" version="1" comment="kernel is &lt;3.10.0-514.16.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822908" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-514.16.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822909" version="1" comment="kernel-debug is &lt;3.10.0-514.16.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822912" version="1" comment="kernel-doc is &lt;3.10.0-514.16.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822913" version="1" comment="kernel-headers is &lt;3.10.0-514.16.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822914" version="1" comment="kernel-tools is &lt;3.10.0-514.16.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822915" version="1" comment="kernel-tools-libs is &lt;3.10.0-514.16.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822917" version="1" comment="perf is &lt;3.10.0-514.16.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822918" version="1" comment="python-perf is &lt;3.10.0-514.16.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711525" version="1" comment="kgraft-patch-3_12_59-60_41-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711527" version="1" comment="kgraft-patch-3_12_59-60_45-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711529" version="1" comment="kgraft-patch-3_12_62-60_62-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711531" version="1" comment="kgraft-patch-3_12_62-60_64_8-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711533" version="1" comment="kgraft-patch-3_12_67-60_64_18-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711535" version="1" comment="kgraft-patch-4_4_21-69-default is &gt;=2-5.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711536" version="1" comment="kgraft-patch-4_4_21-81-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822705" version="1" comment="memcached is &lt;1.4.15-10.el7_3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822706" version="1" comment="memcached-devel is &lt;1.4.15-10.el7_3.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822655" version="1" comment="bind is &lt;9.9.4-38.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822656" version="1" comment="bind-chroot is &lt;9.9.4-38.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822657" version="1" comment="bind-devel is &lt;9.9.4-38.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822658" version="1" comment="bind-libs is &lt;9.9.4-38.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822659" version="1" comment="bind-libs-lite is &lt;9.9.4-38.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822660" version="1" comment="bind-license is &lt;9.9.4-38.el7_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822661" version="1" comment="bind-lite-devel is &lt;9.9.4-38.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822662" version="1" comment="bind-pkcs11 is &lt;9.9.4-38.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822663" version="1" comment="bind-pkcs11-devel is &lt;9.9.4-38.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822664" version="1" comment="bind-pkcs11-libs is &lt;9.9.4-38.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822665" version="1" comment="bind-pkcs11-utils is &lt;9.9.4-38.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822666" version="1" comment="bind-sdb is &lt;9.9.4-38.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822667" version="1" comment="bind-sdb-chroot is &lt;9.9.4-38.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822668" version="1" comment="bind-utils is &lt;9.9.4-38.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822711" version="1" comment="firefox is &lt;45.5.1-1.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822712" version="1" comment="thunderbird is &lt;45.5.1-1.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822752" version="1" comment="bind is &lt;9.9.4-38.el7_3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822753" version="1" comment="bind-chroot is &lt;9.9.4-38.el7_3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822754" version="1" comment="bind-devel is &lt;9.9.4-38.el7_3.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822755" version="1" comment="bind-libs is &lt;9.9.4-38.el7_3.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822756" version="1" comment="bind-libs-lite is &lt;9.9.4-38.el7_3.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822757" version="1" comment="bind-license is &lt;9.9.4-38.el7_3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822758" version="1" comment="bind-lite-devel is &lt;9.9.4-38.el7_3.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822759" version="1" comment="bind-pkcs11 is &lt;9.9.4-38.el7_3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822760" version="1" comment="bind-pkcs11-devel is &lt;9.9.4-38.el7_3.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822761" version="1" comment="bind-pkcs11-libs is &lt;9.9.4-38.el7_3.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822762" version="1" comment="bind-pkcs11-utils is &lt;9.9.4-38.el7_3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822763" version="1" comment="bind-sdb is &lt;9.9.4-38.el7_3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822764" version="1" comment="bind-sdb-chroot is &lt;9.9.4-38.el7_3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822765" version="1" comment="bind-utils is &lt;9.9.4-38.el7_3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825326" version="1" comment="jasper is &lt;1.900.1-33.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825327" version="1" comment="jasper-devel is &lt;1.900.1-33.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825328" version="1" comment="jasper-libs is &lt;1.900.1-33.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825329" version="1" comment="jasper-utils is &lt;1.900.1-33.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822739" version="1" comment="gstreamer-plugins-bad-free is &lt;0.10.23-22.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822740" version="1" comment="gstreamer-plugins-bad-free-devel is &lt;0.10.23-22.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822741" version="1" comment="gstreamer-plugins-bad-free-devel-docs is &lt;0.10.23-22.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822745" version="1" comment="gstreamer1-plugins-bad-free is &lt;1.4.5-6.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822746" version="1" comment="gstreamer1-plugins-bad-free-devel is &lt;1.4.5-6.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711537" version="1" comment="kernel-default is ==3.12.67-60.64.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711538" version="1" comment="kgraft-patch-3_12_67-60_64_21-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136647" version="1" comment="kernel-default is &lt;4.4.21-84.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822812" version="1" comment="spice-server is &lt;0.12.4-20.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822813" version="1" comment="spice-server-devel is &lt;0.12.4-20.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822929" version="1" comment="qemu-img is &lt;1.5.3-126.el7_3.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822930" version="1" comment="qemu-kvm is &lt;1.5.3-126.el7_3.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822931" version="1" comment="qemu-kvm-common is &lt;1.5.3-126.el7_3.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822932" version="1" comment="qemu-kvm-tools is &lt;1.5.3-126.el7_3.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822742" version="1" comment="gstreamer-plugins-good is &lt;0.10.31-12.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822743" version="1" comment="gstreamer-plugins-good-devel-docs is &lt;0.10.31-12.el7_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822744" version="1" comment="gstreamer1-plugins-good is &lt;1.4.5-3.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985929" version="1" comment="minizip is &lt;1.2.7-21.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985930" version="1" comment="minizip-devel is &lt;1.2.7-21.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985931" version="1" comment="zlib is &lt;1.2.7-21.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985932" version="1" comment="zlib-devel is &lt;1.2.7-21.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985933" version="1" comment="zlib-static is &lt;1.2.7-21.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822715" version="1" comment="firefox is &lt;45.6.0-1.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822721" version="1" comment="thunderbird is &lt;45.6.0-1.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828233" version="1" comment="libvpx is &lt;1.3.0-8.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828234" version="1" comment="libvpx-devel is &lt;1.3.0-8.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828235" version="1" comment="libvpx-utils is &lt;1.3.0-8.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823456" version="1" comment="NetworkManager is &lt;1.8.0-9.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823457" version="1" comment="NetworkManager-adsl is &lt;1.8.0-9.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823458" version="1" comment="NetworkManager-bluetooth is &lt;1.8.0-9.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823459" version="1" comment="NetworkManager-config-server is &lt;1.8.0-9.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823460" version="1" comment="NetworkManager-dispatcher-routing-rules is &lt;1.8.0-9.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823461" version="1" comment="NetworkManager-glib is &lt;1.8.0-9.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823462" version="1" comment="NetworkManager-glib-devel is &lt;1.8.0-9.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823463" version="1" comment="NetworkManager-libnm is &lt;1.8.0-9.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823464" version="1" comment="NetworkManager-libnm-devel is &lt;1.8.0-9.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823465" version="1" comment="NetworkManager-libreswan is &lt;1.2.4-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823466" version="1" comment="NetworkManager-libreswan-gnome is &lt;1.2.4-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823467" version="1" comment="NetworkManager-ppp is &lt;1.8.0-9.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823468" version="1" comment="NetworkManager-team is &lt;1.8.0-9.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823469" version="1" comment="NetworkManager-tui is &lt;1.8.0-9.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823470" version="1" comment="NetworkManager-wifi is &lt;1.8.0-9.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823471" version="1" comment="NetworkManager-wwan is &lt;1.8.0-9.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823472" version="1" comment="libnl3 is &lt;3.2.28-4.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823473" version="1" comment="libnl3-cli is &lt;3.2.28-4.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823474" version="1" comment="libnl3-devel is &lt;3.2.28-4.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823475" version="1" comment="libnl3-doc is &lt;3.2.28-4.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823476" version="1" comment="libnm-gtk is &lt;1.8.0-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823477" version="1" comment="libnm-gtk-devel is &lt;1.8.0-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823478" version="1" comment="libnma is &lt;1.8.0-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823479" version="1" comment="libnma-devel is &lt;1.8.0-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823480" version="1" comment="network-manager-applet is &lt;1.8.0-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823481" version="1" comment="nm-connection-editor is &lt;1.8.0-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711540" version="1" comment="kernel-default is ==4.4.103-6.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711541" version="1" comment="kgraft-patch-4_4_103-6_33-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711542" version="1" comment="kernel-default is ==4.4.103-6.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711543" version="1" comment="kgraft-patch-4_4_103-6_38-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711544" version="1" comment="kernel-default is ==4.4.82-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711545" version="1" comment="kgraft-patch-4_4_82-6_3-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711546" version="1" comment="kernel-default is ==4.4.82-6.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711547" version="1" comment="kgraft-patch-4_4_82-6_6-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711548" version="1" comment="kernel-default is ==4.4.82-6.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711549" version="1" comment="kgraft-patch-4_4_82-6_9-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711550" version="1" comment="kernel-default is ==4.4.92-6.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711551" version="1" comment="kgraft-patch-4_4_92-6_18-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711552" version="1" comment="kernel-default is ==4.4.92-6.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711553" version="1" comment="kgraft-patch-4_4_92-6_30-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167761" version="1" comment="kernel-default is &lt;4.4.92-6.30.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824000" version="1" comment="ruby is &lt;2.0.0.648-33.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824001" version="1" comment="ruby-devel is &lt;2.0.0.648-33.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824002" version="1" comment="ruby-doc is &lt;2.0.0.648-33.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824003" version="1" comment="ruby-irb is &lt;2.0.0.648-33.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824004" version="1" comment="ruby-libs is &lt;2.0.0.648-33.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824005" version="1" comment="ruby-tcltk is &lt;2.0.0.648-33.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824006" version="1" comment="rubygem-bigdecimal is &lt;1.2.0-33.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824007" version="1" comment="rubygem-io-console is &lt;0.4.2-33.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824008" version="1" comment="rubygem-json is &lt;1.7.7-33.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824009" version="1" comment="rubygem-minitest is &lt;4.3.2-33.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824010" version="1" comment="rubygem-psych is &lt;2.0.0-33.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824011" version="1" comment="rubygem-rake is &lt;0.9.6-33.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824012" version="1" comment="rubygem-rdoc is &lt;4.0.0-33.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824013" version="1" comment="rubygems is &lt;2.0.14.1-33.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824014" version="1" comment="rubygems-devel is &lt;2.0.14.1-33.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823580" version="1" comment="xmlsec1 is &lt;1.2.20-7.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823581" version="1" comment="xmlsec1-devel is &lt;1.2.20-7.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823582" version="1" comment="xmlsec1-gcrypt is &lt;1.2.20-7.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823583" version="1" comment="xmlsec1-gcrypt-devel is &lt;1.2.20-7.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823584" version="1" comment="xmlsec1-gnutls is &lt;1.2.20-7.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823585" version="1" comment="xmlsec1-gnutls-devel is &lt;1.2.20-7.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823586" version="1" comment="xmlsec1-nss is &lt;1.2.20-7.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823587" version="1" comment="xmlsec1-nss-devel is &lt;1.2.20-7.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823588" version="1" comment="xmlsec1-openssl is &lt;1.2.20-7.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823589" version="1" comment="xmlsec1-openssl-devel is &lt;1.2.20-7.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823490" version="1" comment="evince is &lt;3.22.1-5.2.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823491" version="1" comment="evince-browser-plugin is &lt;3.22.1-5.2.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823492" version="1" comment="evince-devel is &lt;3.22.1-5.2.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823493" version="1" comment="evince-dvi is &lt;3.22.1-5.2.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823494" version="1" comment="evince-libs is &lt;3.22.1-5.2.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823495" version="1" comment="evince-nautilus is &lt;3.22.1-5.2.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711554" version="1" comment="kgraft-patch-4_4_21-69-default is &gt;=9-18.10.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711555" version="1" comment="kgraft-patch-4_4_21-81-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711556" version="1" comment="kgraft-patch-4_4_21-84-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711557" version="1" comment="kgraft-patch-4_4_21-90-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711558" version="1" comment="kgraft-patch-4_4_38-93-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711559" version="1" comment="kernel-default is ==4.4.49-92.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711560" version="1" comment="kgraft-patch-4_4_49-92_11-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711561" version="1" comment="kernel-default is ==4.4.49-92.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711562" version="1" comment="kgraft-patch-4_4_49-92_14-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711563" version="1" comment="kernel-default is ==4.4.59-92.17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711564" version="1" comment="kgraft-patch-4_4_59-92_17-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711565" version="1" comment="kernel-default is ==4.4.59-92.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711566" version="1" comment="kgraft-patch-4_4_59-92_20-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711567" version="1" comment="kernel-default is ==4.4.59-92.24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711568" version="1" comment="kgraft-patch-4_4_59-92_24-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711569" version="1" comment="kernel-default is ==4.4.74-92.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711570" version="1" comment="kgraft-patch-4_4_74-92_29-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711571" version="1" comment="kernel-default is ==4.4.74-92.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711572" version="1" comment="kgraft-patch-4_4_74-92_32-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711573" version="1" comment="kernel-default is ==4.4.74-92.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711574" version="1" comment="kgraft-patch-4_4_74-92_35-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711575" version="1" comment="kernel-default is ==4.4.74-92.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711576" version="1" comment="kgraft-patch-4_4_74-92_38-default is &gt;=2-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164286" version="1" comment="kernel-default is &lt;4.4.74-92.38.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823576" version="1" comment="emacs-mercurial is &lt;2.6.2-8.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823577" version="1" comment="emacs-mercurial-el is &lt;2.6.2-8.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823578" version="1" comment="mercurial is &lt;2.6.2-8.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823579" version="1" comment="mercurial-hgk is &lt;2.6.2-8.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823558" version="1" comment="emacs-git is &lt;1.8.3.1-12.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823559" version="1" comment="emacs-git-el is &lt;1.8.3.1-12.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823560" version="1" comment="git is &lt;1.8.3.1-12.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823561" version="1" comment="git-all is &lt;1.8.3.1-12.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823562" version="1" comment="git-bzr is &lt;1.8.3.1-12.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823563" version="1" comment="git-cvs is &lt;1.8.3.1-12.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823564" version="1" comment="git-daemon is &lt;1.8.3.1-12.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823565" version="1" comment="git-email is &lt;1.8.3.1-12.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823566" version="1" comment="git-gui is &lt;1.8.3.1-12.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823567" version="1" comment="git-hg is &lt;1.8.3.1-12.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823568" version="1" comment="git-p4 is &lt;1.8.3.1-12.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823569" version="1" comment="git-svn is &lt;1.8.3.1-12.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823570" version="1" comment="gitk is &lt;1.8.3.1-12.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823571" version="1" comment="gitweb is &lt;1.8.3.1-12.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823572" version="1" comment="perl-Git is &lt;1.8.3.1-12.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823573" version="1" comment="perl-Git-SVN is &lt;1.8.3.1-12.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823613" version="1" comment="bluez is &lt;5.44-4.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823614" version="1" comment="bluez-cups is &lt;5.44-4.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823615" version="1" comment="bluez-hid2hci is &lt;5.44-4.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823616" version="1" comment="bluez-libs is &lt;5.44-4.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823617" version="1" comment="bluez-libs-devel is &lt;5.44-4.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711577" version="1" comment="kgraft-patch-4_4_21-69-default is &gt;=10-18.13.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711578" version="1" comment="kgraft-patch-4_4_21-81-default is &gt;=10-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711579" version="1" comment="kgraft-patch-4_4_21-84-default is &gt;=9-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711580" version="1" comment="kgraft-patch-4_4_21-90-default is &gt;=9-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711581" version="1" comment="kgraft-patch-4_4_38-93-default is &gt;=9-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711582" version="1" comment="kgraft-patch-4_4_49-92_11-default is &gt;=7-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711583" version="1" comment="kgraft-patch-4_4_49-92_14-default is &gt;=6-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711584" version="1" comment="kgraft-patch-4_4_59-92_17-default is &gt;=5-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711585" version="1" comment="kgraft-patch-4_4_59-92_20-default is &gt;=5-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711586" version="1" comment="kgraft-patch-4_4_59-92_24-default is &gt;=4-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711587" version="1" comment="kgraft-patch-4_4_74-92_29-default is &gt;=4-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711588" version="1" comment="kgraft-patch-4_4_74-92_32-default is &gt;=3-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711589" version="1" comment="kgraft-patch-4_4_74-92_35-default is &gt;=3-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161762" version="1" comment="kernel-default is &lt;4.4.74-92.35.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711590" version="1" comment="kgraft-patch-4_4_82-6_3-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162427" version="1" comment="kernel-default is &lt;4.4.82-6.3.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823601" version="1" comment="kernel is &lt;3.10.0-693.2.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823602" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-693.2.2.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823603" version="1" comment="kernel-debug is &lt;3.10.0-693.2.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823606" version="1" comment="kernel-doc is &lt;3.10.0-693.2.2.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823607" version="1" comment="kernel-headers is &lt;3.10.0-693.2.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823608" version="1" comment="kernel-tools is &lt;3.10.0-693.2.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823609" version="1" comment="kernel-tools-libs is &lt;3.10.0-693.2.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823611" version="1" comment="perf is &lt;3.10.0-693.2.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823612" version="1" comment="python-perf is &lt;3.10.0-693.2.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823779" version="1" comment="curl is &lt;7.29.0-42.el7_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823780" version="1" comment="libcurl is &lt;7.29.0-42.el7_4.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823781" version="1" comment="libcurl-devel is &lt;7.29.0-42.el7_4.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711591" version="1" comment="kgraft-patch-4_4_21-69-default is &gt;=7-21.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711592" version="1" comment="kgraft-patch-4_4_21-81-default is &gt;=7-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711593" version="1" comment="kgraft-patch-4_4_21-84-default is &gt;=6-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711594" version="1" comment="kgraft-patch-4_4_21-90-default is &gt;=6-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711595" version="1" comment="kgraft-patch-4_4_38-93-default is &gt;=6-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711596" version="1" comment="kgraft-patch-4_4_49-92_11-default is &gt;=4-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711597" version="1" comment="kgraft-patch-4_4_49-92_14-default is &gt;=3-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711598" version="1" comment="kgraft-patch-4_4_59-92_17-default is &gt;=2-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711599" version="1" comment="kgraft-patch-4_4_59-92_20-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156965" version="1" comment="kernel-default is &lt;4.4.59-92.20.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823079" version="1" comment="kernel is &lt;3.10.0-514.21.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823080" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-514.21.2.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823081" version="1" comment="kernel-debug is &lt;3.10.0-514.21.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823084" version="1" comment="kernel-doc is &lt;3.10.0-514.21.2.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823085" version="1" comment="kernel-headers is &lt;3.10.0-514.21.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823086" version="1" comment="kernel-tools is &lt;3.10.0-514.21.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823087" version="1" comment="kernel-tools-libs is &lt;3.10.0-514.21.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823089" version="1" comment="perf is &lt;3.10.0-514.21.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823090" version="1" comment="python-perf is &lt;3.10.0-514.21.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823072" version="1" comment="glibc is &lt;2.17-157.el7_3.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823073" version="1" comment="glibc-common is &lt;2.17-157.el7_3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823074" version="1" comment="glibc-devel is &lt;2.17-157.el7_3.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823075" version="1" comment="glibc-headers is &lt;2.17-157.el7_3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823076" version="1" comment="glibc-static is &lt;2.17-157.el7_3.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823077" version="1" comment="glibc-utils is &lt;2.17-157.el7_3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823078" version="1" comment="nscd is &lt;2.17-157.el7_3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823065" version="1" comment="sudo is &lt;1.8.6p7-22.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823066" version="1" comment="sudo-devel is &lt;1.8.6p7-22.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823092" version="1" comment="sudo is &lt;1.8.6p7-23.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823093" version="1" comment="sudo-devel is &lt;1.8.6p7-23.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823785" version="1" comment="kernel is &lt;3.10.0-693.11.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823786" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-693.11.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823787" version="1" comment="kernel-debug is &lt;3.10.0-693.11.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823790" version="1" comment="kernel-doc is &lt;3.10.0-693.11.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823791" version="1" comment="kernel-headers is &lt;3.10.0-693.11.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823792" version="1" comment="kernel-tools is &lt;3.10.0-693.11.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823793" version="1" comment="kernel-tools-libs is &lt;3.10.0-693.11.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823795" version="1" comment="perf is &lt;3.10.0-693.11.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823796" version="1" comment="python-perf is &lt;3.10.0-693.11.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711600" version="1" comment="kgraft-patch-4_4_59-92_17-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711601" version="1" comment="kgraft-patch-4_4_59-92_20-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711602" version="1" comment="kgraft-patch-4_4_59-92_24-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711603" version="1" comment="kgraft-patch-4_4_74-92_29-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711604" version="1" comment="kgraft-patch-4_4_74-92_32-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711605" version="1" comment="kgraft-patch-4_4_74-92_35-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711606" version="1" comment="kgraft-patch-4_4_74-92_38-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711607" version="1" comment="kernel-default is ==4.4.90-92.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711608" version="1" comment="kgraft-patch-4_4_90-92_45-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166113" version="1" comment="kernel-default is &lt;4.4.90-92.45.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711609" version="1" comment="kgraft-patch-4_4_82-6_3-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711610" version="1" comment="kgraft-patch-4_4_82-6_6-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711611" version="1" comment="kgraft-patch-4_4_82-6_9-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711612" version="1" comment="kgraft-patch-4_4_92-6_18-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166003" version="1" comment="kernel-default is &lt;4.4.92-6.18.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711613" version="1" comment="kernel-default is ==4.12.14-95.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711614" version="1" comment="kgraft-patch-4_12_14-95_40-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711615" version="1" comment="kernel-default is &lt;4.12.14-95.40.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711616" version="1" comment="kernel-default is ==4.12.14-120.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711617" version="1" comment="kgraft-patch-4_12_14-120-default is &gt;=8-21.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711618" version="1" comment="kernel-default is ==4.12.14-122.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711619" version="1" comment="kgraft-patch-4_12_14-122_7-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711620" version="1" comment="kernel-default is &lt;4.12.14-122.7.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711621" version="1" comment="kernel-default is ==4.12.14-150.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711622" version="1" comment="kernel-livepatch-4_12_14-150_41-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711623" version="1" comment="kernel-default is &lt;4.12.14-150.41.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711624" version="1" comment="kernel-default is ==4.12.14-197.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711625" version="1" comment="kernel-livepatch-4_12_14-197_26-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711626" version="1" comment="kernel-default is &lt;4.12.14-197.26.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827880" version="1" comment="ImageMagick is &lt;6.9.10.68-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827881" version="1" comment="ImageMagick-c++ is &lt;6.9.10.68-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827882" version="1" comment="ImageMagick-c++-devel is &lt;6.9.10.68-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827883" version="1" comment="ImageMagick-devel is &lt;6.9.10.68-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827884" version="1" comment="ImageMagick-doc is &lt;6.9.10.68-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827885" version="1" comment="ImageMagick-perl is &lt;6.9.10.68-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827886" version="1" comment="autotrace is &lt;0.31.1-38.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827887" version="1" comment="autotrace-devel is &lt;0.31.1-38.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827888" version="1" comment="emacs is &lt;24.3-23.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827889" version="1" comment="emacs-common is &lt;24.3-23.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827890" version="1" comment="emacs-el is &lt;24.3-23.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827891" version="1" comment="emacs-filesystem is &lt;24.3-23.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827892" version="1" comment="emacs-nox is &lt;24.3-23.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827893" version="1" comment="emacs-terminal is &lt;24.3-23.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827894" version="1" comment="inkscape is &lt;0.92.2-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827895" version="1" comment="inkscape-docs is &lt;0.92.2-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827896" version="1" comment="inkscape-view is &lt;0.92.2-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823511" version="1" comment="java-1.7.0-openjdk is &lt;1.7.0.151-2.6.11.1.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823512" version="1" comment="java-1.7.0-openjdk-accessibility is &lt;1.7.0.151-2.6.11.1.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823513" version="1" comment="java-1.7.0-openjdk-demo is &lt;1.7.0.151-2.6.11.1.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823514" version="1" comment="java-1.7.0-openjdk-devel is &lt;1.7.0.151-2.6.11.1.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823515" version="1" comment="java-1.7.0-openjdk-headless is &lt;1.7.0.151-2.6.11.1.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823516" version="1" comment="java-1.7.0-openjdk-javadoc is &lt;1.7.0.151-2.6.11.1.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823517" version="1" comment="java-1.7.0-openjdk-src is &lt;1.7.0.151-2.6.11.1.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823140" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.141-1.b16.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823141" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.141-1.b16.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823142" version="1" comment="java-1.8.0-openjdk-accessibility-debug is &lt;1.8.0.141-1.b16.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823143" version="1" comment="java-1.8.0-openjdk-debug is &lt;1.8.0.141-1.b16.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823144" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.141-1.b16.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823145" version="1" comment="java-1.8.0-openjdk-demo-debug is &lt;1.8.0.141-1.b16.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823146" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.141-1.b16.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823147" version="1" comment="java-1.8.0-openjdk-devel-debug is &lt;1.8.0.141-1.b16.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823148" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.141-1.b16.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823149" version="1" comment="java-1.8.0-openjdk-headless-debug is &lt;1.8.0.141-1.b16.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823150" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.141-1.b16.el7_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823151" version="1" comment="java-1.8.0-openjdk-javadoc-debug is &lt;1.8.0.141-1.b16.el7_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823152" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.141-1.b16.el7_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823153" version="1" comment="java-1.8.0-openjdk-javadoc-zip-debug is &lt;1.8.0.141-1.b16.el7_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823154" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.141-1.b16.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823155" version="1" comment="java-1.8.0-openjdk-src-debug is &lt;1.8.0.141-1.b16.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823842" version="1" comment="java-1.7.0-openjdk is &lt;1.7.0.161-2.6.12.0.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823843" version="1" comment="java-1.7.0-openjdk-accessibility is &lt;1.7.0.161-2.6.12.0.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823844" version="1" comment="java-1.7.0-openjdk-demo is &lt;1.7.0.161-2.6.12.0.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823845" version="1" comment="java-1.7.0-openjdk-devel is &lt;1.7.0.161-2.6.12.0.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823846" version="1" comment="java-1.7.0-openjdk-headless is &lt;1.7.0.161-2.6.12.0.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823847" version="1" comment="java-1.7.0-openjdk-javadoc is &lt;1.7.0.161-2.6.12.0.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823848" version="1" comment="java-1.7.0-openjdk-src is &lt;1.7.0.161-2.6.12.0.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824516" version="1" comment="mariadb is &lt;5.5.60-1.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824517" version="1" comment="mariadb-bench is &lt;5.5.60-1.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824518" version="1" comment="mariadb-devel is &lt;5.5.60-1.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824519" version="1" comment="mariadb-embedded is &lt;5.5.60-1.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824520" version="1" comment="mariadb-embedded-devel is &lt;5.5.60-1.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824521" version="1" comment="mariadb-libs is &lt;5.5.60-1.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824522" version="1" comment="mariadb-server is &lt;5.5.60-1.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824523" version="1" comment="mariadb-test is &lt;5.5.60-1.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823695" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.151-1.b12.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823696" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.151-1.b12.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823697" version="1" comment="java-1.8.0-openjdk-accessibility-debug is &lt;1.8.0.151-1.b12.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823698" version="1" comment="java-1.8.0-openjdk-debug is &lt;1.8.0.151-1.b12.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823699" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.151-1.b12.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823700" version="1" comment="java-1.8.0-openjdk-demo-debug is &lt;1.8.0.151-1.b12.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823701" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.151-1.b12.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823702" version="1" comment="java-1.8.0-openjdk-devel-debug is &lt;1.8.0.151-1.b12.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823703" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.151-1.b12.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823704" version="1" comment="java-1.8.0-openjdk-headless-debug is &lt;1.8.0.151-1.b12.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823705" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.151-1.b12.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823706" version="1" comment="java-1.8.0-openjdk-javadoc-debug is &lt;1.8.0.151-1.b12.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823707" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.151-1.b12.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823708" version="1" comment="java-1.8.0-openjdk-javadoc-zip-debug is &lt;1.8.0.151-1.b12.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823709" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.151-1.b12.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823710" version="1" comment="java-1.8.0-openjdk-src-debug is &lt;1.8.0.151-1.b12.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711627" version="1" comment="kgraft-patch-4_4_21-84-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711628" version="1" comment="kgraft-patch-4_4_21-90-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711629" version="1" comment="kgraft-patch-4_4_38-93-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711630" version="1" comment="kgraft-patch-4_4_49-92_11-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711631" version="1" comment="kgraft-patch-4_4_49-92_14-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157580" version="1" comment="kernel-default is &lt;4.4.59-92.24.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823518" version="1" comment="qemu-img is &lt;1.5.3-141.el7_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823519" version="1" comment="qemu-kvm is &lt;1.5.3-141.el7_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823520" version="1" comment="qemu-kvm-common is &lt;1.5.3-141.el7_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823521" version="1" comment="qemu-kvm-tools is &lt;1.5.3-141.el7_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823496" version="1" comment="freeradius is &lt;3.0.13-8.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823497" version="1" comment="freeradius-devel is &lt;3.0.13-8.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823498" version="1" comment="freeradius-doc is &lt;3.0.13-8.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823499" version="1" comment="freeradius-krb5 is &lt;3.0.13-8.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823500" version="1" comment="freeradius-ldap is &lt;3.0.13-8.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823501" version="1" comment="freeradius-mysql is &lt;3.0.13-8.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823502" version="1" comment="freeradius-perl is &lt;3.0.13-8.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823503" version="1" comment="freeradius-postgresql is &lt;3.0.13-8.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823504" version="1" comment="freeradius-python is &lt;3.0.13-8.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823505" version="1" comment="freeradius-sqlite is &lt;3.0.13-8.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823506" version="1" comment="freeradius-unixODBC is &lt;3.0.13-8.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823507" version="1" comment="freeradius-utils is &lt;3.0.13-8.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824068" version="1" comment="krb5-devel is &lt;1.15.1-18.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824069" version="1" comment="krb5-libs is &lt;1.15.1-18.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824070" version="1" comment="krb5-pkinit is &lt;1.15.1-18.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824071" version="1" comment="krb5-server is &lt;1.15.1-18.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824072" version="1" comment="krb5-server-ldap is &lt;1.15.1-18.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824073" version="1" comment="krb5-workstation is &lt;1.15.1-18.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824074" version="1" comment="libkadm5 is &lt;1.15.1-18.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711632" version="1" comment="kgraft-patch-4_4_82-6_3-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711633" version="1" comment="kgraft-patch-4_4_82-6_6-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711634" version="1" comment="kgraft-patch-4_4_82-6_9-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711635" version="1" comment="kernel-default is &lt;4.4.82-6.9.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824381" version="1" comment="kernel is &lt;3.10.0-862.6.3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824382" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-862.6.3.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824383" version="1" comment="kernel-debug is &lt;3.10.0-862.6.3.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824386" version="1" comment="kernel-doc is &lt;3.10.0-862.6.3.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824387" version="1" comment="kernel-headers is &lt;3.10.0-862.6.3.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824388" version="1" comment="kernel-tools is &lt;3.10.0-862.6.3.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824389" version="1" comment="kernel-tools-libs is &lt;3.10.0-862.6.3.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824391" version="1" comment="perf is &lt;3.10.0-862.6.3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824392" version="1" comment="python-perf is &lt;3.10.0-862.6.3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824087" version="1" comment="cpp is &lt;4.8.5-28.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824088" version="1" comment="gcc is &lt;4.8.5-28.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824089" version="1" comment="gcc-c++ is &lt;4.8.5-28.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824090" version="1" comment="gcc-gfortran is &lt;4.8.5-28.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824091" version="1" comment="gcc-gnat is &lt;4.8.5-28.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824092" version="1" comment="gcc-go is &lt;4.8.5-28.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824093" version="1" comment="gcc-objc is &lt;4.8.5-28.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824094" version="1" comment="gcc-objc++ is &lt;4.8.5-28.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824095" version="1" comment="gcc-plugin-devel is &lt;4.8.5-28.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824096" version="1" comment="libasan is &lt;4.8.5-28.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824097" version="1" comment="libasan-static is &lt;4.8.5-28.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824098" version="1" comment="libatomic is &lt;4.8.5-28.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824099" version="1" comment="libatomic-static is &lt;4.8.5-28.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824100" version="1" comment="libgcc is &lt;4.8.5-28.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824101" version="1" comment="libgfortran is &lt;4.8.5-28.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824102" version="1" comment="libgfortran-static is &lt;4.8.5-28.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824103" version="1" comment="libgnat is &lt;4.8.5-28.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824104" version="1" comment="libgnat-devel is &lt;4.8.5-28.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824105" version="1" comment="libgnat-static is &lt;4.8.5-28.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824106" version="1" comment="libgo is &lt;4.8.5-28.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824107" version="1" comment="libgo-devel is &lt;4.8.5-28.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824108" version="1" comment="libgo-static is &lt;4.8.5-28.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824109" version="1" comment="libgomp is &lt;4.8.5-28.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824110" version="1" comment="libitm is &lt;4.8.5-28.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824111" version="1" comment="libitm-devel is &lt;4.8.5-28.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824112" version="1" comment="libitm-static is &lt;4.8.5-28.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824113" version="1" comment="libmudflap is &lt;4.8.5-28.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824114" version="1" comment="libmudflap-devel is &lt;4.8.5-28.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824115" version="1" comment="libmudflap-static is &lt;4.8.5-28.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824116" version="1" comment="libobjc is &lt;4.8.5-28.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824117" version="1" comment="libquadmath is &lt;4.8.5-28.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824118" version="1" comment="libquadmath-devel is &lt;4.8.5-28.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824119" version="1" comment="libquadmath-static is &lt;4.8.5-28.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824120" version="1" comment="libstdc++ is &lt;4.8.5-28.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824121" version="1" comment="libstdc++-devel is &lt;4.8.5-28.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824122" version="1" comment="libstdc++-docs is &lt;4.8.5-28.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824123" version="1" comment="libstdc++-static is &lt;4.8.5-28.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824124" version="1" comment="libtsan is &lt;4.8.5-28.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824125" version="1" comment="libtsan-static is &lt;4.8.5-28.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823639" version="1" comment="ctdb is &lt;4.6.2-11.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823640" version="1" comment="ctdb-tests is &lt;4.6.2-11.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823641" version="1" comment="libsmbclient is &lt;4.6.2-11.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823642" version="1" comment="libsmbclient-devel is &lt;4.6.2-11.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823643" version="1" comment="libwbclient is &lt;4.6.2-11.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823644" version="1" comment="libwbclient-devel is &lt;4.6.2-11.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823645" version="1" comment="samba is &lt;4.6.2-11.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823646" version="1" comment="samba-client is &lt;4.6.2-11.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823647" version="1" comment="samba-client-libs is &lt;4.6.2-11.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823648" version="1" comment="samba-common is &lt;4.6.2-11.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823649" version="1" comment="samba-common-libs is &lt;4.6.2-11.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823650" version="1" comment="samba-common-tools is &lt;4.6.2-11.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823651" version="1" comment="samba-dc is &lt;4.6.2-11.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823652" version="1" comment="samba-dc-libs is &lt;4.6.2-11.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823653" version="1" comment="samba-devel is &lt;4.6.2-11.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823654" version="1" comment="samba-krb5-printing is &lt;4.6.2-11.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823655" version="1" comment="samba-libs is &lt;4.6.2-11.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823656" version="1" comment="samba-pidl is &lt;4.6.2-11.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823657" version="1" comment="samba-python is &lt;4.6.2-11.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823658" version="1" comment="samba-test is &lt;4.6.2-11.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823659" version="1" comment="samba-test-libs is &lt;4.6.2-11.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823660" version="1" comment="samba-vfs-glusterfs is &lt;4.6.2-11.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823661" version="1" comment="samba-winbind is &lt;4.6.2-11.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823662" version="1" comment="samba-winbind-clients is &lt;4.6.2-11.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823663" version="1" comment="samba-winbind-krb5-locator is &lt;4.6.2-11.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823664" version="1" comment="samba-winbind-modules is &lt;4.6.2-11.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823849" version="1" comment="postgresql is &lt;9.2.23-3.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823850" version="1" comment="postgresql-contrib is &lt;9.2.23-3.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823851" version="1" comment="postgresql-devel is &lt;9.2.23-3.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823852" version="1" comment="postgresql-docs is &lt;9.2.23-3.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823853" version="1" comment="postgresql-libs is &lt;9.2.23-3.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823854" version="1" comment="postgresql-plperl is &lt;9.2.23-3.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823855" version="1" comment="postgresql-plpython is &lt;9.2.23-3.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823856" version="1" comment="postgresql-pltcl is &lt;9.2.23-3.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823857" version="1" comment="postgresql-server is &lt;9.2.23-3.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823858" version="1" comment="postgresql-static is &lt;9.2.23-3.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823859" version="1" comment="postgresql-test is &lt;9.2.23-3.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823860" version="1" comment="postgresql-upgrade is &lt;9.2.23-3.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823802" version="1" comment="libipa_hbac is &lt;1.15.2-50.el7_4.8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823803" version="1" comment="libipa_hbac-devel is &lt;1.15.2-50.el7_4.8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823804" version="1" comment="libsss_autofs is &lt;1.15.2-50.el7_4.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823805" version="1" comment="libsss_certmap is &lt;1.15.2-50.el7_4.8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823806" version="1" comment="libsss_certmap-devel is &lt;1.15.2-50.el7_4.8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823807" version="1" comment="libsss_idmap is &lt;1.15.2-50.el7_4.8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823808" version="1" comment="libsss_idmap-devel is &lt;1.15.2-50.el7_4.8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823809" version="1" comment="libsss_nss_idmap is &lt;1.15.2-50.el7_4.8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823810" version="1" comment="libsss_nss_idmap-devel is &lt;1.15.2-50.el7_4.8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823811" version="1" comment="libsss_simpleifp is &lt;1.15.2-50.el7_4.8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823812" version="1" comment="libsss_simpleifp-devel is &lt;1.15.2-50.el7_4.8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823813" version="1" comment="libsss_sudo is &lt;1.15.2-50.el7_4.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823814" version="1" comment="python-libipa_hbac is &lt;1.15.2-50.el7_4.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823815" version="1" comment="python-libsss_nss_idmap is &lt;1.15.2-50.el7_4.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823816" version="1" comment="python-sss is &lt;1.15.2-50.el7_4.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823817" version="1" comment="python-sss-murmur is &lt;1.15.2-50.el7_4.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823818" version="1" comment="python-sssdconfig is &lt;1.15.2-50.el7_4.8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823819" version="1" comment="sssd is &lt;1.15.2-50.el7_4.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823820" version="1" comment="sssd-ad is &lt;1.15.2-50.el7_4.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823821" version="1" comment="sssd-client is &lt;1.15.2-50.el7_4.8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823822" version="1" comment="sssd-common is &lt;1.15.2-50.el7_4.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823823" version="1" comment="sssd-common-pac is &lt;1.15.2-50.el7_4.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823824" version="1" comment="sssd-dbus is &lt;1.15.2-50.el7_4.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823825" version="1" comment="sssd-ipa is &lt;1.15.2-50.el7_4.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823826" version="1" comment="sssd-kcm is &lt;1.15.2-50.el7_4.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823827" version="1" comment="sssd-krb5 is &lt;1.15.2-50.el7_4.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823828" version="1" comment="sssd-krb5-common is &lt;1.15.2-50.el7_4.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823829" version="1" comment="sssd-ldap is &lt;1.15.2-50.el7_4.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823830" version="1" comment="sssd-libwbclient is &lt;1.15.2-50.el7_4.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823831" version="1" comment="sssd-libwbclient-devel is &lt;1.15.2-50.el7_4.8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823832" version="1" comment="sssd-polkit-rules is &lt;1.15.2-50.el7_4.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823833" version="1" comment="sssd-proxy is &lt;1.15.2-50.el7_4.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823834" version="1" comment="sssd-tools is &lt;1.15.2-50.el7_4.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823835" version="1" comment="sssd-winbind-idmap is &lt;1.15.2-50.el7_4.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824015" version="1" comment="kernel is &lt;3.10.0-693.21.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824016" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-693.21.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824017" version="1" comment="kernel-debug is &lt;3.10.0-693.21.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824020" version="1" comment="kernel-doc is &lt;3.10.0-693.21.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824021" version="1" comment="kernel-headers is &lt;3.10.0-693.21.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824022" version="1" comment="kernel-tools is &lt;3.10.0-693.21.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824023" version="1" comment="kernel-tools-libs is &lt;3.10.0-693.21.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824025" version="1" comment="perf is &lt;3.10.0-693.21.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824026" version="1" comment="python-perf is &lt;3.10.0-693.21.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823783" version="1" comment="apr is &lt;1.4.8-3.el7_4.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823784" version="1" comment="apr-devel is &lt;1.4.8-3.el7_4.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823712" version="1" comment="tomcat is &lt;7.0.76-3.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823713" version="1" comment="tomcat-admin-webapps is &lt;7.0.76-3.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823714" version="1" comment="tomcat-docs-webapp is &lt;7.0.76-3.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823715" version="1" comment="tomcat-el-2.2-api is &lt;7.0.76-3.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823716" version="1" comment="tomcat-javadoc is &lt;7.0.76-3.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823717" version="1" comment="tomcat-jsp-2.2-api is &lt;7.0.76-3.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823718" version="1" comment="tomcat-jsvc is &lt;7.0.76-3.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823719" version="1" comment="tomcat-lib is &lt;7.0.76-3.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823720" version="1" comment="tomcat-servlet-3.0-api is &lt;7.0.76-3.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823721" version="1" comment="tomcat-webapps is &lt;7.0.76-3.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828254" version="1" comment="libpng is &lt;1.5.13-8.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828255" version="1" comment="libpng-devel is &lt;1.5.13-8.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828256" version="1" comment="libpng-static is &lt;1.5.13-8.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823682" version="1" comment="wpa_supplicant is &lt;2.6-5.el7_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711636" version="1" comment="kgraft-patch-4_4_21-84-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711637" version="1" comment="kgraft-patch-4_4_21-90-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711638" version="1" comment="kgraft-patch-4_4_38-93-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711639" version="1" comment="kgraft-patch-4_4_49-92_11-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711640" version="1" comment="kgraft-patch-4_4_49-92_14-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711641" version="1" comment="kgraft-patch-4_4_59-92_17-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711642" version="1" comment="kgraft-patch-4_4_59-92_20-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711643" version="1" comment="kgraft-patch-4_4_59-92_24-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711644" version="1" comment="kgraft-patch-4_4_74-92_29-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711645" version="1" comment="kgraft-patch-4_4_74-92_32-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711646" version="1" comment="kgraft-patch-4_4_74-92_35-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711647" version="1" comment="kgraft-patch-4_4_74-92_38-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711648" version="1" comment="kgraft-patch-4_4_82-6_3-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711649" version="1" comment="kgraft-patch-4_4_82-6_6-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711650" version="1" comment="kgraft-patch-4_4_82-6_9-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823711" version="1" comment="wget is &lt;1.14-15.el7_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711651" version="1" comment="kgraft-patch-4_4_103-6_33-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711652" version="1" comment="kgraft-patch-4_4_103-6_38-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711653" version="1" comment="kernel-default is ==4.4.114-94.11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711654" version="1" comment="kgraft-patch-4_4_114-94_11-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711655" version="1" comment="kernel-default is ==4.4.114-94.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711656" version="1" comment="kgraft-patch-4_4_114-94_14-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711657" version="1" comment="kgraft-patch-4_4_82-6_3-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711658" version="1" comment="kgraft-patch-4_4_82-6_6-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711659" version="1" comment="kgraft-patch-4_4_82-6_9-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711660" version="1" comment="kgraft-patch-4_4_92-6_18-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711661" version="1" comment="kgraft-patch-4_4_92-6_30-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824504" version="1" comment="kernel is &lt;3.10.0-862.11.6.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824505" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-862.11.6.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824506" version="1" comment="kernel-debug is &lt;3.10.0-862.11.6.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824509" version="1" comment="kernel-doc is &lt;3.10.0-862.11.6.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824510" version="1" comment="kernel-headers is &lt;3.10.0-862.11.6.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824511" version="1" comment="kernel-tools is &lt;3.10.0-862.11.6.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824512" version="1" comment="kernel-tools-libs is &lt;3.10.0-862.11.6.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824514" version="1" comment="perf is &lt;3.10.0-862.11.6.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824515" version="1" comment="python-perf is &lt;3.10.0-862.11.6.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824082" version="1" comment="qemu-img is &lt;1.5.3-156.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824083" version="1" comment="qemu-kvm is &lt;1.5.3-156.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824084" version="1" comment="qemu-kvm-common is &lt;1.5.3-156.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824085" version="1" comment="qemu-kvm-tools is &lt;1.5.3-156.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823797" version="1" comment="qemu-img is &lt;1.5.3-141.el7_4.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823798" version="1" comment="qemu-kvm is &lt;1.5.3-141.el7_4.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823799" version="1" comment="qemu-kvm-common is &lt;1.5.3-141.el7_4.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823800" version="1" comment="qemu-kvm-tools is &lt;1.5.3-141.el7_4.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823630" version="1" comment="emacs is &lt;24.3-20.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823631" version="1" comment="emacs-common is &lt;24.3-20.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823632" version="1" comment="emacs-el is &lt;24.3-20.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823633" version="1" comment="emacs-filesystem is &lt;24.3-20.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823634" version="1" comment="emacs-nox is &lt;24.3-20.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823635" version="1" comment="emacs-terminal is &lt;24.3-20.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823671" version="1" comment="dnsmasq is &lt;2.76-2.el7_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823672" version="1" comment="dnsmasq-utils is &lt;2.76-2.el7_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826557" version="1" comment="bsdcpio is &lt;3.1.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826558" version="1" comment="bsdtar is &lt;3.1.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826559" version="1" comment="libarchive is &lt;3.1.2-12.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826560" version="1" comment="libarchive-devel is &lt;3.1.2-12.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823973" version="1" comment="nautilus is &lt;3.22.3-4.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823974" version="1" comment="nautilus-devel is &lt;3.22.3-4.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823975" version="1" comment="nautilus-extensions is &lt;3.22.3-4.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823753" version="1" comment="ctdb is &lt;4.6.2-12.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823754" version="1" comment="ctdb-tests is &lt;4.6.2-12.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823755" version="1" comment="libsmbclient is &lt;4.6.2-12.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823756" version="1" comment="libsmbclient-devel is &lt;4.6.2-12.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823757" version="1" comment="libwbclient is &lt;4.6.2-12.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823758" version="1" comment="libwbclient-devel is &lt;4.6.2-12.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823759" version="1" comment="samba is &lt;4.6.2-12.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823760" version="1" comment="samba-client is &lt;4.6.2-12.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823761" version="1" comment="samba-client-libs is &lt;4.6.2-12.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823762" version="1" comment="samba-common is &lt;4.6.2-12.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823763" version="1" comment="samba-common-libs is &lt;4.6.2-12.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823764" version="1" comment="samba-common-tools is &lt;4.6.2-12.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823765" version="1" comment="samba-dc is &lt;4.6.2-12.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823766" version="1" comment="samba-dc-libs is &lt;4.6.2-12.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823767" version="1" comment="samba-devel is &lt;4.6.2-12.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823768" version="1" comment="samba-krb5-printing is &lt;4.6.2-12.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823769" version="1" comment="samba-libs is &lt;4.6.2-12.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823770" version="1" comment="samba-pidl is &lt;4.6.2-12.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823771" version="1" comment="samba-python is &lt;4.6.2-12.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823772" version="1" comment="samba-test is &lt;4.6.2-12.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823773" version="1" comment="samba-test-libs is &lt;4.6.2-12.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823774" version="1" comment="samba-vfs-glusterfs is &lt;4.6.2-12.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823775" version="1" comment="samba-winbind is &lt;4.6.2-12.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823776" version="1" comment="samba-winbind-clients is &lt;4.6.2-12.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823777" version="1" comment="samba-winbind-krb5-locator is &lt;4.6.2-12.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823778" version="1" comment="samba-winbind-modules is &lt;4.6.2-12.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824131" version="1" comment="golang is &lt;1.9.4-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824132" version="1" comment="golang-bin is &lt;1.9.4-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824133" version="1" comment="golang-docs is &lt;1.9.4-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824134" version="1" comment="golang-misc is &lt;1.9.4-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824135" version="1" comment="golang-src is &lt;1.9.4-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824136" version="1" comment="golang-tests is &lt;1.9.4-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823837" version="1" comment="liblouis is &lt;2.5.2-12.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823838" version="1" comment="liblouis-devel is &lt;2.5.2-12.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823839" version="1" comment="liblouis-doc is &lt;2.5.2-12.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823840" version="1" comment="liblouis-python is &lt;2.5.2-12.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823841" version="1" comment="liblouis-utils is &lt;2.5.2-12.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826326" version="1" comment="keycloak-httpd-client-install is &lt;0.8-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826327" version="1" comment="python2-keycloak-httpd-client-install is &lt;0.8-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824086" version="1" comment="xdg-user-dirs is &lt;0.15-5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823969" version="1" comment="389-ds-base is &lt;1.3.6.1-26.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823970" version="1" comment="389-ds-base-devel is &lt;1.3.6.1-26.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823971" version="1" comment="389-ds-base-libs is &lt;1.3.6.1-26.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823972" version="1" comment="389-ds-base-snmp is &lt;1.3.6.1-26.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824052" version="1" comment="389-ds-base is &lt;1.3.6.1-28.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824053" version="1" comment="389-ds-base-devel is &lt;1.3.6.1-28.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824054" version="1" comment="389-ds-base-libs is &lt;1.3.6.1-28.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824055" version="1" comment="389-ds-base-snmp is &lt;1.3.6.1-28.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140695" version="1" comment="kernel-default is &lt;4.4.21-69.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824591" version="1" comment="spamassassin is &lt;3.4.0-4.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827796" version="1" comment="httpd is &lt;2.4.6-93.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827797" version="1" comment="httpd-devel is &lt;2.4.6-93.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827798" version="1" comment="httpd-manual is &lt;2.4.6-93.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827799" version="1" comment="httpd-tools is &lt;2.4.6-93.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827800" version="1" comment="mod_ldap is &lt;2.4.6-93.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827801" version="1" comment="mod_proxy_html is &lt;2.4.6-93.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827802" version="1" comment="mod_session is &lt;2.4.6-93.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827803" version="1" comment="mod_ssl is &lt;2.4.6-93.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828309" version="1" comment="httpd is &lt;2.4.6-95.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828310" version="1" comment="httpd-devel is &lt;2.4.6-95.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828311" version="1" comment="httpd-manual is &lt;2.4.6-95.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828312" version="1" comment="httpd-tools is &lt;2.4.6-95.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828313" version="1" comment="mod_ldap is &lt;2.4.6-95.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828314" version="1" comment="mod_proxy_html is &lt;2.4.6-95.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828315" version="1" comment="mod_session is &lt;2.4.6-95.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828316" version="1" comment="mod_ssl is &lt;2.4.6-95.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824144" version="1" comment="openssh is &lt;7.4p1-16.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824145" version="1" comment="openssh-askpass is &lt;7.4p1-16.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824146" version="1" comment="openssh-cavs is &lt;7.4p1-16.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824147" version="1" comment="openssh-clients is &lt;7.4p1-16.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824148" version="1" comment="openssh-keycat is &lt;7.4p1-16.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824149" version="1" comment="openssh-ldap is &lt;7.4p1-16.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824150" version="1" comment="openssh-server is &lt;7.4p1-16.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824151" version="1" comment="openssh-server-sysvinit is &lt;7.4p1-16.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824152" version="1" comment="pam_ssh_agent_auth is &lt;0.10.3-2.16.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824555" version="1" comment="firefox is &lt;60.2.0-1.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825374" version="1" comment="thunderbird is &lt;60.2.1-4.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823782" version="1" comment="procmail is &lt;3.22-36.el7_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711662" version="1" comment="kgraft-patch-4_4_49-92_11-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711663" version="1" comment="kgraft-patch-4_4_49-92_14-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711664" version="1" comment="kgraft-patch-4_4_59-92_17-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711665" version="1" comment="kgraft-patch-4_4_59-92_20-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711666" version="1" comment="kgraft-patch-4_4_59-92_24-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711667" version="1" comment="kgraft-patch-4_4_74-92_29-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711668" version="1" comment="kgraft-patch-4_4_74-92_32-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711669" version="1" comment="kgraft-patch-4_4_74-92_35-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711670" version="1" comment="kgraft-patch-4_4_74-92_38-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711671" version="1" comment="kgraft-patch-4_4_90-92_45-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711672" version="1" comment="kgraft-patch-4_4_82-6_3-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711673" version="1" comment="kgraft-patch-4_4_82-6_6-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711674" version="1" comment="kgraft-patch-4_4_82-6_9-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711675" version="1" comment="kgraft-patch-4_4_92-6_18-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824218" version="1" comment="kernel is &lt;3.10.0-862.2.3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824219" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-862.2.3.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824220" version="1" comment="kernel-debug is &lt;3.10.0-862.2.3.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824223" version="1" comment="kernel-doc is &lt;3.10.0-862.2.3.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824224" version="1" comment="kernel-headers is &lt;3.10.0-862.2.3.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824225" version="1" comment="kernel-tools is &lt;3.10.0-862.2.3.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824226" version="1" comment="kernel-tools-libs is &lt;3.10.0-862.2.3.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824228" version="1" comment="perf is &lt;3.10.0-862.2.3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824229" version="1" comment="python-perf is &lt;3.10.0-862.2.3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824800" version="1" comment="glibc is &lt;2.17-260.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824801" version="1" comment="glibc-common is &lt;2.17-260.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824802" version="1" comment="glibc-devel is &lt;2.17-260.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824803" version="1" comment="glibc-headers is &lt;2.17-260.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824804" version="1" comment="glibc-static is &lt;2.17-260.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824805" version="1" comment="glibc-utils is &lt;2.17-260.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824806" version="1" comment="nscd is &lt;2.17-260.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711676" version="1" comment="kernel-default is ==4.4.103-92.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711677" version="1" comment="kgraft-patch-4_4_103-92_53-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711678" version="1" comment="kernel-default is ==4.4.103-92.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711679" version="1" comment="kgraft-patch-4_4_103-92_56-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711680" version="1" comment="kernel-default is ==4.4.90-92.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711681" version="1" comment="kgraft-patch-4_4_90-92_50-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167754" version="1" comment="kernel-default is &lt;4.4.90-92.50.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711682" version="1" comment="kgraft-patch-4_4_103-6_33-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711683" version="1" comment="kgraft-patch-4_4_103-6_38-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711684" version="1" comment="kgraft-patch-4_4_92-6_30-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826187" version="1" comment="exiv2 is &lt;0.27.0-2.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826188" version="1" comment="exiv2-devel is &lt;0.27.0-2.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826189" version="1" comment="exiv2-doc is &lt;0.27.0-2.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826190" version="1" comment="exiv2-libs is &lt;0.27.0-2.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825992" version="1" comment="ruby is &lt;2.0.0.648-36.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825993" version="1" comment="ruby-devel is &lt;2.0.0.648-36.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825994" version="1" comment="ruby-doc is &lt;2.0.0.648-36.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825995" version="1" comment="ruby-irb is &lt;2.0.0.648-36.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825996" version="1" comment="ruby-libs is &lt;2.0.0.648-36.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825997" version="1" comment="ruby-tcltk is &lt;2.0.0.648-36.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825998" version="1" comment="rubygem-bigdecimal is &lt;1.2.0-36.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825999" version="1" comment="rubygem-io-console is &lt;0.4.2-36.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826000" version="1" comment="rubygem-json is &lt;1.7.7-36.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826001" version="1" comment="rubygem-minitest is &lt;4.3.2-36.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826002" version="1" comment="rubygem-psych is &lt;2.0.0-36.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826003" version="1" comment="rubygem-rake is &lt;0.9.6-36.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826004" version="1" comment="rubygem-rdoc is &lt;4.0.0-36.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826005" version="1" comment="rubygems is &lt;2.0.14.1-36.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826006" version="1" comment="rubygems-devel is &lt;2.0.14.1-36.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824449" version="1" comment="openslp is &lt;2.0.0-7.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824450" version="1" comment="openslp-devel is &lt;2.0.0-7.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824451" version="1" comment="openslp-server is &lt;2.0.0-7.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711685" version="1" comment="kgraft-patch-4_4_103-92_53-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711686" version="1" comment="kgraft-patch-4_4_103-92_56-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711687" version="1" comment="kgraft-patch-4_4_49-92_11-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711688" version="1" comment="kgraft-patch-4_4_49-92_14-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711689" version="1" comment="kgraft-patch-4_4_59-92_17-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711690" version="1" comment="kgraft-patch-4_4_59-92_20-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711691" version="1" comment="kgraft-patch-4_4_59-92_24-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711692" version="1" comment="kgraft-patch-4_4_74-92_29-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711693" version="1" comment="kgraft-patch-4_4_74-92_32-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711694" version="1" comment="kgraft-patch-4_4_74-92_35-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711695" version="1" comment="kgraft-patch-4_4_74-92_38-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711696" version="1" comment="kgraft-patch-4_4_90-92_45-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711697" version="1" comment="kgraft-patch-4_4_90-92_50-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711698" version="1" comment="kgraft-patch-4_4_103-6_33-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711699" version="1" comment="kgraft-patch-4_4_103-6_38-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711700" version="1" comment="kgraft-patch-4_4_82-6_3-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711701" version="1" comment="kgraft-patch-4_4_82-6_6-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711702" version="1" comment="kgraft-patch-4_4_82-6_9-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711703" version="1" comment="kgraft-patch-4_4_92-6_18-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711704" version="1" comment="kgraft-patch-4_4_92-6_30-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826518" version="1" comment="sox is &lt;14.4.1-7.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826519" version="1" comment="sox-devel is &lt;14.4.1-7.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828116" version="1" comment="cups is &lt;1.6.3-51.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828117" version="1" comment="cups-client is &lt;1.6.3-51.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828118" version="1" comment="cups-devel is &lt;1.6.3-51.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828119" version="1" comment="cups-filesystem is &lt;1.6.3-51.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828120" version="1" comment="cups-ipptool is &lt;1.6.3-51.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828121" version="1" comment="cups-libs is &lt;1.6.3-51.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828122" version="1" comment="cups-lpd is &lt;1.6.3-51.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825323" version="1" comment="libcdio is &lt;0.92-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825324" version="1" comment="libcdio-devel is &lt;0.92-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826077" version="1" comment="exempi is &lt;2.2.0-9.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826078" version="1" comment="exempi-devel is &lt;2.2.0-9.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711705" version="1" comment="kgraft-patch-4_4_103-6_33-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711706" version="1" comment="kgraft-patch-4_4_103-6_38-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711707" version="1" comment="kgraft-patch-4_4_114-94_11-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711708" version="1" comment="kgraft-patch-4_4_114-94_14-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711709" version="1" comment="kgraft-patch-4_4_92-6_18-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711710" version="1" comment="kgraft-patch-4_4_92-6_30-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714892" version="1" comment="kernel-default is ==4.12.14-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711711" version="1" comment="kernel-livepatch-4_12_14-23-default is &gt;=2-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711712" version="1" comment="kernel-default is ==4.12.14-25.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711713" version="1" comment="kernel-livepatch-4_12_14-25_3-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714893" version="1" comment="kernel-default is &lt;4.12.14-25.3.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828543" version="1" comment="bpftool is &lt;3.10.0-1160.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828544" version="1" comment="kernel is &lt;3.10.0-1160.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828545" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1160.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828546" version="1" comment="kernel-debug is &lt;3.10.0-1160.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828549" version="1" comment="kernel-doc is &lt;3.10.0-1160.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828550" version="1" comment="kernel-headers is &lt;3.10.0-1160.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828551" version="1" comment="kernel-tools is &lt;3.10.0-1160.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828552" version="1" comment="kernel-tools-libs is &lt;3.10.0-1160.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828554" version="1" comment="perf is &lt;3.10.0-1160.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828555" version="1" comment="python-perf is &lt;3.10.0-1160.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827965" version="1" comment="bpftool is &lt;3.10.0-1127.8.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827966" version="1" comment="kernel is &lt;3.10.0-1127.8.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827967" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1127.8.2.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827968" version="1" comment="kernel-debug is &lt;3.10.0-1127.8.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827971" version="1" comment="kernel-doc is &lt;3.10.0-1127.8.2.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827972" version="1" comment="kernel-headers is &lt;3.10.0-1127.8.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827973" version="1" comment="kernel-tools is &lt;3.10.0-1127.8.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827974" version="1" comment="kernel-tools-libs is &lt;3.10.0-1127.8.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827976" version="1" comment="perf is &lt;3.10.0-1127.8.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827977" version="1" comment="python-perf is &lt;3.10.0-1127.8.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828095" version="1" comment="libvncserver is &lt;0.9.9-14.el7_8.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828096" version="1" comment="libvncserver-devel is &lt;0.9.9-14.el7_8.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823110" version="1" comment="kernel is &lt;3.10.0-514.26.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823111" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-514.26.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823112" version="1" comment="kernel-debug is &lt;3.10.0-514.26.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823115" version="1" comment="kernel-doc is &lt;3.10.0-514.26.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823116" version="1" comment="kernel-headers is &lt;3.10.0-514.26.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823117" version="1" comment="kernel-tools is &lt;3.10.0-514.26.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823118" version="1" comment="kernel-tools-libs is &lt;3.10.0-514.26.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823120" version="1" comment="perf is &lt;3.10.0-514.26.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823121" version="1" comment="python-perf is &lt;3.10.0-514.26.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822864" version="1" comment="ipa-admintools is &lt;4.4.0-14.el7_3.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822865" version="1" comment="ipa-client is &lt;4.4.0-14.el7_3.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822866" version="1" comment="ipa-client-common is &lt;4.4.0-14.el7_3.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822867" version="1" comment="ipa-common is &lt;4.4.0-14.el7_3.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822868" version="1" comment="ipa-python-compat is &lt;4.4.0-14.el7_3.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822869" version="1" comment="ipa-server is &lt;4.4.0-14.el7_3.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822870" version="1" comment="ipa-server-common is &lt;4.4.0-14.el7_3.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822871" version="1" comment="ipa-server-dns is &lt;4.4.0-14.el7_3.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822872" version="1" comment="ipa-server-trust-ad is &lt;4.4.0-14.el7_3.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822873" version="1" comment="python2-ipaclient is &lt;4.4.0-14.el7_3.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822874" version="1" comment="python2-ipalib is &lt;4.4.0-14.el7_3.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822875" version="1" comment="python2-ipaserver is &lt;4.4.0-14.el7_3.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822876" version="1" comment="qemu-img is &lt;1.5.3-126.el7_3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822877" version="1" comment="qemu-kvm is &lt;1.5.3-126.el7_3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822878" version="1" comment="qemu-kvm-common is &lt;1.5.3-126.el7_3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822879" version="1" comment="qemu-kvm-tools is &lt;1.5.3-126.el7_3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822895" version="1" comment="libblkid is &lt;2.23.2-33.el7_3.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822896" version="1" comment="libblkid-devel is &lt;2.23.2-33.el7_3.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822897" version="1" comment="libmount is &lt;2.23.2-33.el7_3.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822898" version="1" comment="libmount-devel is &lt;2.23.2-33.el7_3.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822899" version="1" comment="libuuid is &lt;2.23.2-33.el7_3.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822900" version="1" comment="libuuid-devel is &lt;2.23.2-33.el7_3.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822901" version="1" comment="util-linux is &lt;2.23.2-33.el7_3.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822902" version="1" comment="uuidd is &lt;2.23.2-33.el7_3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711714" version="1" comment="kgraft-patch-4_4_21-69-default is &gt;=8-18.7.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711715" version="1" comment="kgraft-patch-4_4_21-81-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711716" version="1" comment="kgraft-patch-4_4_21-84-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711717" version="1" comment="kgraft-patch-4_4_21-90-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711718" version="1" comment="kgraft-patch-4_4_38-93-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711719" version="1" comment="kgraft-patch-4_4_49-92_11-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149009" version="1" comment="kernel-default is &lt;4.4.49-92.11.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822903" version="1" comment="389-ds-base is &lt;1.3.5.10-20.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822904" version="1" comment="389-ds-base-devel is &lt;1.3.5.10-20.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822905" version="1" comment="389-ds-base-libs is &lt;1.3.5.10-20.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822906" version="1" comment="389-ds-base-snmp is &lt;1.3.5.10-20.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823523" version="1" comment="libsoup is &lt;2.56.0-4.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823524" version="1" comment="libsoup-devel is &lt;2.56.0-4.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822821" version="1" comment="bind is &lt;9.9.4-38.el7_3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822822" version="1" comment="bind-chroot is &lt;9.9.4-38.el7_3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822823" version="1" comment="bind-devel is &lt;9.9.4-38.el7_3.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822824" version="1" comment="bind-libs is &lt;9.9.4-38.el7_3.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822825" version="1" comment="bind-libs-lite is &lt;9.9.4-38.el7_3.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822826" version="1" comment="bind-license is &lt;9.9.4-38.el7_3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822827" version="1" comment="bind-lite-devel is &lt;9.9.4-38.el7_3.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822828" version="1" comment="bind-pkcs11 is &lt;9.9.4-38.el7_3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822829" version="1" comment="bind-pkcs11-devel is &lt;9.9.4-38.el7_3.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822830" version="1" comment="bind-pkcs11-libs is &lt;9.9.4-38.el7_3.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822831" version="1" comment="bind-pkcs11-utils is &lt;9.9.4-38.el7_3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822832" version="1" comment="bind-sdb is &lt;9.9.4-38.el7_3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822833" version="1" comment="bind-sdb-chroot is &lt;9.9.4-38.el7_3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822834" version="1" comment="bind-utils is &lt;9.9.4-38.el7_3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822933" version="1" comment="bind is &lt;9.9.4-38.el7_3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822934" version="1" comment="bind-chroot is &lt;9.9.4-38.el7_3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822935" version="1" comment="bind-devel is &lt;9.9.4-38.el7_3.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822936" version="1" comment="bind-libs is &lt;9.9.4-38.el7_3.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822937" version="1" comment="bind-libs-lite is &lt;9.9.4-38.el7_3.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822938" version="1" comment="bind-license is &lt;9.9.4-38.el7_3.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822939" version="1" comment="bind-lite-devel is &lt;9.9.4-38.el7_3.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822940" version="1" comment="bind-pkcs11 is &lt;9.9.4-38.el7_3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822941" version="1" comment="bind-pkcs11-devel is &lt;9.9.4-38.el7_3.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822942" version="1" comment="bind-pkcs11-libs is &lt;9.9.4-38.el7_3.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822943" version="1" comment="bind-pkcs11-utils is &lt;9.9.4-38.el7_3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822944" version="1" comment="bind-sdb is &lt;9.9.4-38.el7_3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822945" version="1" comment="bind-sdb-chroot is &lt;9.9.4-38.el7_3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822946" version="1" comment="bind-utils is &lt;9.9.4-38.el7_3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823122" version="1" comment="bind is &lt;9.9.4-50.el7_3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823123" version="1" comment="bind-chroot is &lt;9.9.4-50.el7_3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823124" version="1" comment="bind-devel is &lt;9.9.4-50.el7_3.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823125" version="1" comment="bind-libs is &lt;9.9.4-50.el7_3.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823126" version="1" comment="bind-libs-lite is &lt;9.9.4-50.el7_3.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823127" version="1" comment="bind-license is &lt;9.9.4-50.el7_3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823128" version="1" comment="bind-lite-devel is &lt;9.9.4-50.el7_3.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823129" version="1" comment="bind-pkcs11 is &lt;9.9.4-50.el7_3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823130" version="1" comment="bind-pkcs11-devel is &lt;9.9.4-50.el7_3.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823131" version="1" comment="bind-pkcs11-libs is &lt;9.9.4-50.el7_3.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823132" version="1" comment="bind-pkcs11-utils is &lt;9.9.4-50.el7_3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823133" version="1" comment="bind-sdb is &lt;9.9.4-50.el7_3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823134" version="1" comment="bind-sdb-chroot is &lt;9.9.4-50.el7_3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823135" version="1" comment="bind-utils is &lt;9.9.4-50.el7_3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823964" version="1" comment="dhclient is &lt;4.2.5-58.el7_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823965" version="1" comment="dhcp is &lt;4.2.5-58.el7_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823966" version="1" comment="dhcp-common is &lt;4.2.5-58.el7_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823967" version="1" comment="dhcp-devel is &lt;4.2.5-58.el7_4.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823968" version="1" comment="dhcp-libs is &lt;4.2.5-58.el7_4.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823937" version="1" comment="bind is &lt;9.9.4-51.el7_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823938" version="1" comment="bind-chroot is &lt;9.9.4-51.el7_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823939" version="1" comment="bind-devel is &lt;9.9.4-51.el7_4.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823940" version="1" comment="bind-libs is &lt;9.9.4-51.el7_4.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823941" version="1" comment="bind-libs-lite is &lt;9.9.4-51.el7_4.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823942" version="1" comment="bind-license is &lt;9.9.4-51.el7_4.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823943" version="1" comment="bind-lite-devel is &lt;9.9.4-51.el7_4.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823944" version="1" comment="bind-pkcs11 is &lt;9.9.4-51.el7_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823945" version="1" comment="bind-pkcs11-devel is &lt;9.9.4-51.el7_4.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823946" version="1" comment="bind-pkcs11-libs is &lt;9.9.4-51.el7_4.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823947" version="1" comment="bind-pkcs11-utils is &lt;9.9.4-51.el7_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823948" version="1" comment="bind-sdb is &lt;9.9.4-51.el7_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823949" version="1" comment="bind-sdb-chroot is &lt;9.9.4-51.el7_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823950" version="1" comment="bind-utils is &lt;9.9.4-51.el7_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823539" version="1" comment="httpd is &lt;2.4.6-67.el7_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823540" version="1" comment="httpd-devel is &lt;2.4.6-67.el7_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823541" version="1" comment="httpd-manual is &lt;2.4.6-67.el7_4.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823542" version="1" comment="httpd-tools is &lt;2.4.6-67.el7_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823543" version="1" comment="mod_ldap is &lt;2.4.6-67.el7_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823544" version="1" comment="mod_proxy_html is &lt;2.4.6-67.el7_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823545" version="1" comment="mod_session is &lt;2.4.6-67.el7_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823546" version="1" comment="mod_ssl is &lt;2.4.6-67.el7_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822972" version="1" comment="java-1.7.0-openjdk is &lt;1.7.0.141-2.6.10.1.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822973" version="1" comment="java-1.7.0-openjdk-accessibility is &lt;1.7.0.141-2.6.10.1.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822974" version="1" comment="java-1.7.0-openjdk-demo is &lt;1.7.0.141-2.6.10.1.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822975" version="1" comment="java-1.7.0-openjdk-devel is &lt;1.7.0.141-2.6.10.1.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822976" version="1" comment="java-1.7.0-openjdk-headless is &lt;1.7.0.141-2.6.10.1.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822977" version="1" comment="java-1.7.0-openjdk-javadoc is &lt;1.7.0.141-2.6.10.1.el7_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822978" version="1" comment="java-1.7.0-openjdk-src is &lt;1.7.0.141-2.6.10.1.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822955" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.131-2.b11.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822956" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.131-2.b11.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822957" version="1" comment="java-1.8.0-openjdk-accessibility-debug is &lt;1.8.0.131-2.b11.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822958" version="1" comment="java-1.8.0-openjdk-debug is &lt;1.8.0.131-2.b11.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822959" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.131-2.b11.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822960" version="1" comment="java-1.8.0-openjdk-demo-debug is &lt;1.8.0.131-2.b11.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822961" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.131-2.b11.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822962" version="1" comment="java-1.8.0-openjdk-devel-debug is &lt;1.8.0.131-2.b11.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822963" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.131-2.b11.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822964" version="1" comment="java-1.8.0-openjdk-headless-debug is &lt;1.8.0.131-2.b11.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822965" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.131-2.b11.el7_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822966" version="1" comment="java-1.8.0-openjdk-javadoc-debug is &lt;1.8.0.131-2.b11.el7_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822967" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.131-2.b11.el7_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822968" version="1" comment="java-1.8.0-openjdk-javadoc-zip-debug is &lt;1.8.0.131-2.b11.el7_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822969" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.131-2.b11.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822970" version="1" comment="java-1.8.0-openjdk-src-debug is &lt;1.8.0.131-2.b11.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825305" version="1" comment="openssl is &lt;1.0.2k-16.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825306" version="1" comment="openssl-devel is &lt;1.0.2k-16.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825307" version="1" comment="openssl-libs is &lt;1.0.2k-16.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825308" version="1" comment="openssl-perl is &lt;1.0.2k-16.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825309" version="1" comment="openssl-static is &lt;1.0.2k-16.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824153" version="1" comment="openssl is &lt;1.0.2k-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824154" version="1" comment="openssl-devel is &lt;1.0.2k-12.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824155" version="1" comment="openssl-libs is &lt;1.0.2k-12.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824156" version="1" comment="openssl-perl is &lt;1.0.2k-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824157" version="1" comment="openssl-static is &lt;1.0.2k-12.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822883" version="1" comment="icoutils is &lt;0.31.3-1.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822801" version="1" comment="firefox is &lt;45.7.0-1.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822806" version="1" comment="thunderbird is &lt;45.7.0-1.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822880" version="1" comment="firefox is &lt;52.0-4.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822881" version="1" comment="thunderbird is &lt;45.8.0-1.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822882" version="1" comment="firefox is &lt;52.0-5.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822954" version="1" comment="firefox is &lt;52.1.0-2.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822947" version="1" comment="nss is &lt;3.28.4-1.0.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822948" version="1" comment="nss-devel is &lt;3.28.4-1.0.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822949" version="1" comment="nss-pkcs11-devel is &lt;3.28.4-1.0.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822950" version="1" comment="nss-sysinit is &lt;3.28.4-1.0.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822951" version="1" comment="nss-tools is &lt;3.28.4-1.0.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822952" version="1" comment="nss-util is &lt;3.28.4-1.0.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822953" version="1" comment="nss-util-devel is &lt;3.28.4-1.0.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823071" version="1" comment="firefox is &lt;52.2.0-1.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823091" version="1" comment="thunderbird is &lt;52.2.0-1.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823508" version="1" comment="log4j is &lt;1.2.17-16.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823509" version="1" comment="log4j-javadoc is &lt;1.2.17-16.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823510" version="1" comment="log4j-manual is &lt;1.2.17-16.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823158" version="1" comment="tomcat is &lt;7.0.69-12.el7_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823159" version="1" comment="tomcat-admin-webapps is &lt;7.0.69-12.el7_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823160" version="1" comment="tomcat-docs-webapp is &lt;7.0.69-12.el7_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823161" version="1" comment="tomcat-el-2.2-api is &lt;7.0.69-12.el7_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823162" version="1" comment="tomcat-javadoc is &lt;7.0.69-12.el7_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823163" version="1" comment="tomcat-jsp-2.2-api is &lt;7.0.69-12.el7_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823164" version="1" comment="tomcat-jsvc is &lt;7.0.69-12.el7_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823165" version="1" comment="tomcat-lib is &lt;7.0.69-12.el7_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823166" version="1" comment="tomcat-servlet-3.0-api is &lt;7.0.69-12.el7_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823167" version="1" comment="tomcat-webapps is &lt;7.0.69-12.el7_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823903" version="1" comment="iwl100-firmware is &lt;39.31.5.1-58.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823904" version="1" comment="iwl1000-firmware is &lt;39.31.5.1-58.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823905" version="1" comment="iwl105-firmware is &lt;18.168.6.1-58.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823906" version="1" comment="iwl135-firmware is &lt;18.168.6.1-58.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823907" version="1" comment="iwl2000-firmware is &lt;18.168.6.1-58.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823908" version="1" comment="iwl2030-firmware is &lt;18.168.6.1-58.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823909" version="1" comment="iwl3160-firmware is &lt;22.0.7.0-58.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823910" version="1" comment="iwl3945-firmware is &lt;15.32.2.9-58.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823911" version="1" comment="iwl4965-firmware is &lt;228.61.2.24-58.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823912" version="1" comment="iwl5000-firmware is &lt;8.83.5.1_1-58.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823913" version="1" comment="iwl5150-firmware is &lt;8.24.2.2-58.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823914" version="1" comment="iwl6000-firmware is &lt;9.221.4.1-58.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823915" version="1" comment="iwl6000g2a-firmware is &lt;17.168.5.3-58.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823916" version="1" comment="iwl6000g2b-firmware is &lt;17.168.5.2-58.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823917" version="1" comment="iwl6050-firmware is &lt;41.28.5.1-58.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823918" version="1" comment="iwl7260-firmware is &lt;22.0.7.0-58.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823919" version="1" comment="iwl7265-firmware is &lt;22.0.7.0-58.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823861" version="1" comment="kernel is &lt;3.10.0-693.11.6.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823862" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-693.11.6.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823863" version="1" comment="kernel-debug is &lt;3.10.0-693.11.6.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823866" version="1" comment="kernel-doc is &lt;3.10.0-693.11.6.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823867" version="1" comment="kernel-headers is &lt;3.10.0-693.11.6.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823868" version="1" comment="kernel-tools is &lt;3.10.0-693.11.6.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823869" version="1" comment="kernel-tools-libs is &lt;3.10.0-693.11.6.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823896" version="1" comment="libvirt-admin is &lt;3.2.0-14.el7_4.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823897" version="1" comment="libvirt-daemon-lxc is &lt;3.2.0-14.el7_4.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823898" version="1" comment="libvirt-lock-sanlock is &lt;3.2.0-14.el7_4.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823899" version="1" comment="libvirt-login-shell is &lt;3.2.0-14.el7_4.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823900" version="1" comment="libvirt-nss is &lt;3.2.0-14.el7_4.7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823920" version="1" comment="linux-firmware is &lt;20170606-58.gitc990aae.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823902" version="1" comment="microcode_ctl is &lt;2.1-22.5.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823871" version="1" comment="perf is &lt;3.10.0-693.11.6.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823872" version="1" comment="python-perf is &lt;3.10.0-693.11.6.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823892" version="1" comment="qemu-img is &lt;1.5.3-141.el7_4.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823893" version="1" comment="qemu-kvm is &lt;1.5.3-141.el7_4.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823894" version="1" comment="qemu-kvm-common is &lt;1.5.3-141.el7_4.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823895" version="1" comment="qemu-kvm-tools is &lt;1.5.3-141.el7_4.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826217" version="1" comment="OVMF is &lt;20180508-6.gitee3198e672e2.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823439" version="1" comment="gtk-vnc is &lt;0.7.0-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823440" version="1" comment="gtk-vnc-devel is &lt;0.7.0-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823441" version="1" comment="gtk-vnc-python is &lt;0.7.0-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823442" version="1" comment="gtk-vnc2 is &lt;0.7.0-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823443" version="1" comment="gtk-vnc2-devel is &lt;0.7.0-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823444" version="1" comment="gvnc is &lt;0.7.0-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823445" version="1" comment="gvnc-devel is &lt;0.7.0-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823446" version="1" comment="gvnc-tools is &lt;0.7.0-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823447" version="1" comment="gvncpulse is &lt;0.7.0-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823448" version="1" comment="gvncpulse-devel is &lt;0.7.0-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711720" version="1" comment="kgraft-patch-3_12_57-60_35-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711722" version="1" comment="kgraft-patch-3_12_59-60_41-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711724" version="1" comment="kgraft-patch-3_12_59-60_45-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711726" version="1" comment="kgraft-patch-3_12_62-60_62-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711728" version="1" comment="kgraft-patch-3_12_62-60_64_8-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711730" version="1" comment="kgraft-patch-3_12_67-60_64_18-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711732" version="1" comment="kgraft-patch-3_12_67-60_64_21-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711734" version="1" comment="kernel-default is ==3.12.67-60.64.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711735" version="1" comment="kgraft-patch-3_12_67-60_64_24-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711737" version="1" comment="kernel-default is ==3.12.69-60.64.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711738" version="1" comment="kgraft-patch-3_12_69-60_64_29-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711740" version="1" comment="kgraft-patch-4_4_21-69-default is &gt;=4-11.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711741" version="1" comment="kgraft-patch-4_4_21-81-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711742" version="1" comment="kgraft-patch-4_4_21-84-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711743" version="1" comment="kgraft-patch-4_4_21-90-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711744" version="1" comment="kgraft-patch-4_4_38-93-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826209" version="1" comment="mod_auth_openidc is &lt;1.8.8-5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822840" version="1" comment="kernel is &lt;3.10.0-514.6.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822841" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-514.6.2.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822842" version="1" comment="kernel-debug is &lt;3.10.0-514.6.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822845" version="1" comment="kernel-doc is &lt;3.10.0-514.6.2.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822846" version="1" comment="kernel-headers is &lt;3.10.0-514.6.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822847" version="1" comment="kernel-tools is &lt;3.10.0-514.6.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822848" version="1" comment="kernel-tools-libs is &lt;3.10.0-514.6.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822850" version="1" comment="perf is &lt;3.10.0-514.6.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822851" version="1" comment="python-perf is &lt;3.10.0-514.6.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824126" version="1" comment="ntp is &lt;4.2.6p5-28.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824127" version="1" comment="ntp-doc is &lt;4.2.6p5-28.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824128" version="1" comment="ntp-perl is &lt;4.2.6p5-28.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824129" version="1" comment="ntpdate is &lt;4.2.6p5-28.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824130" version="1" comment="sntp is &lt;4.2.6p5-28.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827855" version="1" comment="avahi is &lt;0.6.31-20.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827856" version="1" comment="avahi-autoipd is &lt;0.6.31-20.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827857" version="1" comment="avahi-compat-howl is &lt;0.6.31-20.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827858" version="1" comment="avahi-compat-howl-devel is &lt;0.6.31-20.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827859" version="1" comment="avahi-compat-libdns_sd is &lt;0.6.31-20.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827860" version="1" comment="avahi-compat-libdns_sd-devel is &lt;0.6.31-20.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827861" version="1" comment="avahi-devel is &lt;0.6.31-20.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827862" version="1" comment="avahi-dnsconfd is &lt;0.6.31-20.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827863" version="1" comment="avahi-glib is &lt;0.6.31-20.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827864" version="1" comment="avahi-glib-devel is &lt;0.6.31-20.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827865" version="1" comment="avahi-gobject is &lt;0.6.31-20.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827866" version="1" comment="avahi-gobject-devel is &lt;0.6.31-20.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827867" version="1" comment="avahi-libs is &lt;0.6.31-20.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827868" version="1" comment="avahi-qt3 is &lt;0.6.31-20.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827869" version="1" comment="avahi-qt3-devel is &lt;0.6.31-20.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827870" version="1" comment="avahi-qt4 is &lt;0.6.31-20.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827871" version="1" comment="avahi-qt4-devel is &lt;0.6.31-20.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827872" version="1" comment="avahi-tools is &lt;0.6.31-20.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827873" version="1" comment="avahi-ui is &lt;0.6.31-20.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827874" version="1" comment="avahi-ui-devel is &lt;0.6.31-20.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827875" version="1" comment="avahi-ui-gtk3 is &lt;0.6.31-20.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827876" version="1" comment="avahi-ui-tools is &lt;0.6.31-20.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711745" version="1" comment="kgraft-patch-3_12_57-60_35-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711747" version="1" comment="kgraft-patch-3_12_59-60_41-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711749" version="1" comment="kgraft-patch-3_12_59-60_45-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711751" version="1" comment="kgraft-patch-3_12_62-60_62-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711753" version="1" comment="kgraft-patch-3_12_62-60_64_8-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711755" version="1" comment="kgraft-patch-3_12_67-60_64_18-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711757" version="1" comment="kgraft-patch-3_12_67-60_64_21-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711759" version="1" comment="kgraft-patch-3_12_67-60_64_24-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711761" version="1" comment="kgraft-patch-3_12_69-60_64_29-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711763" version="1" comment="kernel-default is ==3.12.69-60.64.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711764" version="1" comment="kgraft-patch-3_12_69-60_64_32-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711766" version="1" comment="kgraft-patch-4_4_21-69-default is &gt;=5-14.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711767" version="1" comment="kgraft-patch-4_4_21-81-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711768" version="1" comment="kgraft-patch-4_4_21-84-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711769" version="1" comment="kgraft-patch-4_4_21-90-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711770" version="1" comment="kgraft-patch-4_4_38-93-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711771" version="1" comment="kgraft-patch-4_4_49-92_11-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823416" version="1" comment="ghostscript is &lt;9.07-28.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823417" version="1" comment="ghostscript-cups is &lt;9.07-28.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823418" version="1" comment="ghostscript-devel is &lt;9.07-28.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823419" version="1" comment="ghostscript-doc is &lt;9.07-28.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823420" version="1" comment="ghostscript-gtk is &lt;9.07-28.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711772" version="1" comment="kgraft-patch-3_12_59-60_41-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711774" version="1" comment="kgraft-patch-3_12_59-60_45-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711776" version="1" comment="kgraft-patch-3_12_62-60_62-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711778" version="1" comment="kgraft-patch-3_12_62-60_64_8-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711780" version="1" comment="kgraft-patch-3_12_67-60_64_18-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711782" version="1" comment="kgraft-patch-3_12_67-60_64_21-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711784" version="1" comment="kgraft-patch-3_12_67-60_64_24-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711786" version="1" comment="kgraft-patch-3_12_69-60_64_29-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711788" version="1" comment="kgraft-patch-3_12_69-60_64_32-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711790" version="1" comment="kernel-default is ==3.12.69-60.64.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711791" version="1" comment="kgraft-patch-3_12_69-60_64_35-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711793" version="1" comment="kgraft-patch-4_4_21-69-default is &gt;=6-17.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711794" version="1" comment="kgraft-patch-4_4_21-81-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711795" version="1" comment="kgraft-patch-4_4_21-84-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711796" version="1" comment="kgraft-patch-4_4_21-90-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711797" version="1" comment="kgraft-patch-4_4_38-93-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711798" version="1" comment="kgraft-patch-4_4_49-92_11-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711799" version="1" comment="kgraft-patch-4_4_49-92_14-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150055" version="1" comment="kernel-default is &lt;4.4.49-92.14.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823337" version="1" comment="postgresql is &lt;9.2.21-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823338" version="1" comment="postgresql-contrib is &lt;9.2.21-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823339" version="1" comment="postgresql-devel is &lt;9.2.21-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823340" version="1" comment="postgresql-docs is &lt;9.2.21-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823341" version="1" comment="postgresql-libs is &lt;9.2.21-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823342" version="1" comment="postgresql-plperl is &lt;9.2.21-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823343" version="1" comment="postgresql-plpython is &lt;9.2.21-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823344" version="1" comment="postgresql-pltcl is &lt;9.2.21-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823345" version="1" comment="postgresql-server is &lt;9.2.21-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823346" version="1" comment="postgresql-static is &lt;9.2.21-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823347" version="1" comment="postgresql-test is &lt;9.2.21-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823348" version="1" comment="postgresql-upgrade is &lt;9.2.21-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823449" version="1" comment="authconfig is &lt;6.2.8-30.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823450" version="1" comment="authconfig-gtk is &lt;6.2.8-30.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823022" version="1" comment="ctdb is &lt;4.4.4-14.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823023" version="1" comment="ctdb-tests is &lt;4.4.4-14.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823024" version="1" comment="libsmbclient is &lt;4.4.4-14.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823025" version="1" comment="libsmbclient-devel is &lt;4.4.4-14.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823026" version="1" comment="libwbclient is &lt;4.4.4-14.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823027" version="1" comment="libwbclient-devel is &lt;4.4.4-14.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823028" version="1" comment="samba is &lt;4.4.4-14.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823029" version="1" comment="samba-client is &lt;4.4.4-14.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823030" version="1" comment="samba-client-libs is &lt;4.4.4-14.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823031" version="1" comment="samba-common is &lt;4.4.4-14.el7_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823032" version="1" comment="samba-common-libs is &lt;4.4.4-14.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823033" version="1" comment="samba-common-tools is &lt;4.4.4-14.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823034" version="1" comment="samba-dc is &lt;4.4.4-14.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823035" version="1" comment="samba-dc-libs is &lt;4.4.4-14.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823036" version="1" comment="samba-devel is &lt;4.4.4-14.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823037" version="1" comment="samba-krb5-printing is &lt;4.4.4-14.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823038" version="1" comment="samba-libs is &lt;4.4.4-14.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823039" version="1" comment="samba-pidl is &lt;4.4.4-14.el7_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823040" version="1" comment="samba-python is &lt;4.4.4-14.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823041" version="1" comment="samba-test is &lt;4.4.4-14.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823042" version="1" comment="samba-test-libs is &lt;4.4.4-14.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823043" version="1" comment="samba-vfs-glusterfs is &lt;4.4.4-14.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823044" version="1" comment="samba-winbind is &lt;4.4.4-14.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823045" version="1" comment="samba-winbind-clients is &lt;4.4.4-14.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823046" version="1" comment="samba-winbind-krb5-locator is &lt;4.4.4-14.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823047" version="1" comment="samba-winbind-modules is &lt;4.4.4-14.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823060" version="1" comment="nss is &lt;3.28.4-1.2.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823061" version="1" comment="nss-devel is &lt;3.28.4-1.2.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823062" version="1" comment="nss-pkcs11-devel is &lt;3.28.4-1.2.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823063" version="1" comment="nss-sysinit is &lt;3.28.4-1.2.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823064" version="1" comment="nss-tools is &lt;3.28.4-1.2.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823525" version="1" comment="spice-server is &lt;0.12.8-2.el7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823526" version="1" comment="spice-server-devel is &lt;0.12.8-2.el7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711800" version="1" comment="kgraft-patch-4_4_49-92_14-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711801" version="1" comment="kgraft-patch-4_4_59-92_17-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711802" version="1" comment="kgraft-patch-4_4_59-92_20-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711803" version="1" comment="kgraft-patch-4_4_59-92_24-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711804" version="1" comment="kgraft-patch-4_4_74-92_29-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158776" version="1" comment="kernel-default is &lt;4.4.74-92.29.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711805" version="1" comment="kernel-default is ==4.4.73-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711806" version="1" comment="kgraft-patch-4_4_73-5-default is &gt;=2-2.3.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159035" version="1" comment="kernel-default is &lt;4.4.73-5.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823527" version="1" comment="kernel is &lt;3.10.0-693.1.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823528" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-693.1.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823529" version="1" comment="kernel-debug is &lt;3.10.0-693.1.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823532" version="1" comment="kernel-doc is &lt;3.10.0-693.1.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823533" version="1" comment="kernel-headers is &lt;3.10.0-693.1.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823534" version="1" comment="kernel-tools is &lt;3.10.0-693.1.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823535" version="1" comment="kernel-tools-libs is &lt;3.10.0-693.1.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823537" version="1" comment="perf is &lt;3.10.0-693.1.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823538" version="1" comment="python-perf is &lt;3.10.0-693.1.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823482" version="1" comment="pki-base is &lt;10.4.1-11.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823483" version="1" comment="pki-base-java is &lt;10.4.1-11.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823484" version="1" comment="pki-ca is &lt;10.4.1-11.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823485" version="1" comment="pki-javadoc is &lt;10.4.1-11.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823486" version="1" comment="pki-kra is &lt;10.4.1-11.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823487" version="1" comment="pki-server is &lt;10.4.1-11.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823488" version="1" comment="pki-symkey is &lt;10.4.1-11.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823489" version="1" comment="pki-tools is &lt;10.4.1-11.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823618" version="1" comment="postgresql is &lt;9.2.23-1.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823619" version="1" comment="postgresql-contrib is &lt;9.2.23-1.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823620" version="1" comment="postgresql-devel is &lt;9.2.23-1.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823621" version="1" comment="postgresql-docs is &lt;9.2.23-1.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823622" version="1" comment="postgresql-libs is &lt;9.2.23-1.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823623" version="1" comment="postgresql-plperl is &lt;9.2.23-1.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823624" version="1" comment="postgresql-plpython is &lt;9.2.23-1.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823625" version="1" comment="postgresql-pltcl is &lt;9.2.23-1.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823626" version="1" comment="postgresql-server is &lt;9.2.23-1.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823627" version="1" comment="postgresql-static is &lt;9.2.23-1.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823628" version="1" comment="postgresql-test is &lt;9.2.23-1.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823629" version="1" comment="postgresql-upgrade is &lt;9.2.23-1.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823636" version="1" comment="augeas is &lt;1.4.0-2.el7_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823637" version="1" comment="augeas-devel is &lt;1.4.0-2.el7_4.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823638" version="1" comment="augeas-libs is &lt;1.4.0-2.el7_4.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823067" version="1" comment="qemu-img is &lt;1.5.3-126.el7_3.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823068" version="1" comment="qemu-kvm is &lt;1.5.3-126.el7_3.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823069" version="1" comment="qemu-kvm-common is &lt;1.5.3-126.el7_3.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823070" version="1" comment="qemu-kvm-tools is &lt;1.5.3-126.el7_3.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823522" version="1" comment="firefox is &lt;52.3.0-2.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823590" version="1" comment="thunderbird is &lt;52.3.0-1.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824439" version="1" comment="firefox is &lt;60.1.0-4.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823156" version="1" comment="graphite2 is &lt;1.3.10-1.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823157" version="1" comment="graphite2-devel is &lt;1.3.10-1.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823665" version="1" comment="firefox is &lt;52.4.0-1.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823681" version="1" comment="thunderbird is &lt;52.4.0-2.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823666" version="1" comment="nss is &lt;3.28.4-12.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823667" version="1" comment="nss-devel is &lt;3.28.4-12.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823668" version="1" comment="nss-pkcs11-devel is &lt;3.28.4-12.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823669" version="1" comment="nss-sysinit is &lt;3.28.4-12.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823670" version="1" comment="nss-tools is &lt;3.28.4-12.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823752" version="1" comment="firefox is &lt;52.5.0-1.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823801" version="1" comment="thunderbird is &lt;52.5.0-1.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823901" version="1" comment="thunderbird is &lt;52.5.2-1.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823836" version="1" comment="firefox is &lt;52.5.1-1.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824027" version="1" comment="php is &lt;5.4.16-43.el7_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824028" version="1" comment="php-bcmath is &lt;5.4.16-43.el7_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824029" version="1" comment="php-cli is &lt;5.4.16-43.el7_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824030" version="1" comment="php-common is &lt;5.4.16-43.el7_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824031" version="1" comment="php-dba is &lt;5.4.16-43.el7_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824032" version="1" comment="php-devel is &lt;5.4.16-43.el7_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824033" version="1" comment="php-embedded is &lt;5.4.16-43.el7_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824034" version="1" comment="php-enchant is &lt;5.4.16-43.el7_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824035" version="1" comment="php-fpm is &lt;5.4.16-43.el7_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824036" version="1" comment="php-gd is &lt;5.4.16-43.el7_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824037" version="1" comment="php-intl is &lt;5.4.16-43.el7_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824038" version="1" comment="php-ldap is &lt;5.4.16-43.el7_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824039" version="1" comment="php-mbstring is &lt;5.4.16-43.el7_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824040" version="1" comment="php-mysql is &lt;5.4.16-43.el7_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824041" version="1" comment="php-mysqlnd is &lt;5.4.16-43.el7_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824042" version="1" comment="php-odbc is &lt;5.4.16-43.el7_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824043" version="1" comment="php-pdo is &lt;5.4.16-43.el7_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824044" version="1" comment="php-pgsql is &lt;5.4.16-43.el7_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824045" version="1" comment="php-process is &lt;5.4.16-43.el7_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824046" version="1" comment="php-pspell is &lt;5.4.16-43.el7_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824047" version="1" comment="php-recode is &lt;5.4.16-43.el7_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824048" version="1" comment="php-snmp is &lt;5.4.16-43.el7_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824049" version="1" comment="php-soap is &lt;5.4.16-43.el7_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824050" version="1" comment="php-xml is &lt;5.4.16-43.el7_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824051" version="1" comment="php-xmlrpc is &lt;5.4.16-43.el7_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822983" version="1" comment="ghostscript is &lt;9.07-20.el7_3.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822984" version="1" comment="ghostscript-cups is &lt;9.07-20.el7_3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822985" version="1" comment="ghostscript-devel is &lt;9.07-20.el7_3.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822986" version="1" comment="ghostscript-doc is &lt;9.07-20.el7_3.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822987" version="1" comment="ghostscript-gtk is &lt;9.07-20.el7_3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822991" version="1" comment="kdelibs is &lt;4.14.8-6.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822992" version="1" comment="kdelibs-apidocs is &lt;4.14.8-6.el7_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822993" version="1" comment="kdelibs-common is &lt;4.14.8-6.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822994" version="1" comment="kdelibs-devel is &lt;4.14.8-6.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822995" version="1" comment="kdelibs-ktexteditor is &lt;4.14.8-6.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822989" version="1" comment="libtirpc is &lt;0.2.4-0.8.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822990" version="1" comment="libtirpc-devel is &lt;0.2.4-0.8.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822988" version="1" comment="rpcbind is &lt;0.2.0-38.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823198" version="1" comment="golang is &lt;1.8.3-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823199" version="1" comment="golang-bin is &lt;1.8.3-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823200" version="1" comment="golang-docs is &lt;1.8.3-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823201" version="1" comment="golang-misc is &lt;1.8.3-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823202" version="1" comment="golang-src is &lt;1.8.3-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823203" version="1" comment="golang-tests is &lt;1.8.3-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823098" version="1" comment="freeradius is &lt;3.0.4-8.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823099" version="1" comment="freeradius-devel is &lt;3.0.4-8.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823100" version="1" comment="freeradius-doc is &lt;3.0.4-8.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823101" version="1" comment="freeradius-krb5 is &lt;3.0.4-8.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823102" version="1" comment="freeradius-ldap is &lt;3.0.4-8.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823103" version="1" comment="freeradius-mysql is &lt;3.0.4-8.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823104" version="1" comment="freeradius-perl is &lt;3.0.4-8.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823105" version="1" comment="freeradius-postgresql is &lt;3.0.4-8.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823106" version="1" comment="freeradius-python is &lt;3.0.4-8.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823107" version="1" comment="freeradius-sqlite is &lt;3.0.4-8.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823108" version="1" comment="freeradius-unixODBC is &lt;3.0.4-8.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823109" version="1" comment="freeradius-utils is &lt;3.0.4-8.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823180" version="1" comment="openldap is &lt;2.4.44-5.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823181" version="1" comment="openldap-clients is &lt;2.4.44-5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823182" version="1" comment="openldap-devel is &lt;2.4.44-5.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823183" version="1" comment="openldap-servers is &lt;2.4.44-5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823184" version="1" comment="openldap-servers-sql is &lt;2.4.44-5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823311" version="1" comment="ctdb is &lt;4.6.2-8.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823312" version="1" comment="ctdb-tests is &lt;4.6.2-8.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823313" version="1" comment="libsmbclient is &lt;4.6.2-8.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823314" version="1" comment="libsmbclient-devel is &lt;4.6.2-8.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823315" version="1" comment="libwbclient is &lt;4.6.2-8.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823316" version="1" comment="libwbclient-devel is &lt;4.6.2-8.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823317" version="1" comment="samba is &lt;4.6.2-8.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823318" version="1" comment="samba-client is &lt;4.6.2-8.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823319" version="1" comment="samba-client-libs is &lt;4.6.2-8.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823320" version="1" comment="samba-common is &lt;4.6.2-8.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823321" version="1" comment="samba-common-libs is &lt;4.6.2-8.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823322" version="1" comment="samba-common-tools is &lt;4.6.2-8.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823323" version="1" comment="samba-dc is &lt;4.6.2-8.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823324" version="1" comment="samba-dc-libs is &lt;4.6.2-8.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823325" version="1" comment="samba-devel is &lt;4.6.2-8.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823326" version="1" comment="samba-krb5-printing is &lt;4.6.2-8.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823327" version="1" comment="samba-libs is &lt;4.6.2-8.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823328" version="1" comment="samba-pidl is &lt;4.6.2-8.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823329" version="1" comment="samba-python is &lt;4.6.2-8.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823330" version="1" comment="samba-test is &lt;4.6.2-8.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823331" version="1" comment="samba-test-libs is &lt;4.6.2-8.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823332" version="1" comment="samba-vfs-glusterfs is &lt;4.6.2-8.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823333" version="1" comment="samba-winbind is &lt;4.6.2-8.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823334" version="1" comment="samba-winbind-clients is &lt;4.6.2-8.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823335" version="1" comment="samba-winbind-krb5-locator is &lt;4.6.2-8.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823336" version="1" comment="samba-winbind-modules is &lt;4.6.2-8.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823094" version="1" comment="emacs-mercurial is &lt;2.6.2-7.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823095" version="1" comment="emacs-mercurial-el is &lt;2.6.2-7.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823096" version="1" comment="mercurial is &lt;2.6.2-7.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823097" version="1" comment="mercurial-hgk is &lt;2.6.2-7.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823136" version="1" comment="qemu-img is &lt;1.5.3-126.el7_3.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823137" version="1" comment="qemu-kvm is &lt;1.5.3-126.el7_3.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823138" version="1" comment="qemu-kvm-common is &lt;1.5.3-126.el7_3.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823139" version="1" comment="qemu-kvm-tools is &lt;1.5.3-126.el7_3.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823591" version="1" comment="poppler is &lt;0.26.5-17.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823592" version="1" comment="poppler-cpp is &lt;0.26.5-17.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823593" version="1" comment="poppler-cpp-devel is &lt;0.26.5-17.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823594" version="1" comment="poppler-demos is &lt;0.26.5-17.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823595" version="1" comment="poppler-devel is &lt;0.26.5-17.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823596" version="1" comment="poppler-glib is &lt;0.26.5-17.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823597" version="1" comment="poppler-glib-devel is &lt;0.26.5-17.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823598" version="1" comment="poppler-qt is &lt;0.26.5-17.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823599" version="1" comment="poppler-qt-devel is &lt;0.26.5-17.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823600" version="1" comment="poppler-utils is &lt;0.26.5-17.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823673" version="1" comment="httpd is &lt;2.4.6-67.el7_4.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823674" version="1" comment="httpd-devel is &lt;2.4.6-67.el7_4.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823675" version="1" comment="httpd-manual is &lt;2.4.6-67.el7_4.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823676" version="1" comment="httpd-tools is &lt;2.4.6-67.el7_4.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823677" version="1" comment="mod_ldap is &lt;2.4.6-67.el7_4.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823678" version="1" comment="mod_proxy_html is &lt;2.4.6-67.el7_4.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823679" version="1" comment="mod_session is &lt;2.4.6-67.el7_4.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823680" version="1" comment="mod_ssl is &lt;2.4.6-67.el7_4.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823547" version="1" comment="mod_dav_svn is &lt;1.7.14-11.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823548" version="1" comment="subversion is &lt;1.7.14-11.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823549" version="1" comment="subversion-devel is &lt;1.7.14-11.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823550" version="1" comment="subversion-gnome is &lt;1.7.14-11.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823551" version="1" comment="subversion-javahl is &lt;1.7.14-11.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823552" version="1" comment="subversion-kde is &lt;1.7.14-11.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823553" version="1" comment="subversion-libs is &lt;1.7.14-11.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823554" version="1" comment="subversion-perl is &lt;1.7.14-11.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823555" version="1" comment="subversion-python is &lt;1.7.14-11.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823556" version="1" comment="subversion-ruby is &lt;1.7.14-11.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823557" version="1" comment="subversion-tools is &lt;1.7.14-11.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824638" version="1" comment="wget is &lt;1.14-18.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826490" version="1" comment="nspr is &lt;4.21.0-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826491" version="1" comment="nspr-devel is &lt;4.21.0-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826492" version="1" comment="nss is &lt;3.44.0-4.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826493" version="1" comment="nss-devel is &lt;3.44.0-4.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826494" version="1" comment="nss-pkcs11-devel is &lt;3.44.0-4.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826495" version="1" comment="nss-softokn is &lt;3.44.0-5.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826496" version="1" comment="nss-softokn-devel is &lt;3.44.0-5.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826497" version="1" comment="nss-softokn-freebl is &lt;3.44.0-5.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826498" version="1" comment="nss-softokn-freebl-devel is &lt;3.44.0-5.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826499" version="1" comment="nss-sysinit is &lt;3.44.0-4.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826500" version="1" comment="nss-tools is &lt;3.44.0-4.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826501" version="1" comment="nss-util is &lt;3.44.0-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826502" version="1" comment="nss-util-devel is &lt;3.44.0-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827656" version="1" comment="mailman is &lt;2.1.15-30.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826561" version="1" comment="openssl is &lt;1.0.2k-19.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826562" version="1" comment="openssl-devel is &lt;1.0.2k-19.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826563" version="1" comment="openssl-libs is &lt;1.0.2k-19.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826564" version="1" comment="openssl-perl is &lt;1.0.2k-19.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826565" version="1" comment="openssl-static is &lt;1.0.2k-19.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824799" version="1" comment="OVMF is &lt;20180508-3.gitee3198e672e2.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711807" version="1" comment="kgraft-patch-4_4_103-6_33-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711808" version="1" comment="kgraft-patch-4_4_103-6_38-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711809" version="1" comment="kgraft-patch-4_4_82-6_3-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711810" version="1" comment="kgraft-patch-4_4_82-6_6-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711811" version="1" comment="kgraft-patch-4_4_82-6_9-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711812" version="1" comment="kgraft-patch-4_4_92-6_18-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711813" version="1" comment="kgraft-patch-4_4_92-6_30-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825267" version="1" comment="curl is &lt;7.29.0-51.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825268" version="1" comment="libcurl is &lt;7.29.0-51.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825269" version="1" comment="libcurl-devel is &lt;7.29.0-51.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825270" version="1" comment="nss-pem is &lt;1.0.3-5.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827678" version="1" comment="squid is &lt;3.5.20-15.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827679" version="1" comment="squid-migration-script is &lt;3.5.20-15.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827680" version="1" comment="squid-sysvinit is &lt;3.5.20-15.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711814" version="1" comment="kgraft-patch-4_4_103-6_33-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711815" version="1" comment="kgraft-patch-4_4_103-6_38-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711816" version="1" comment="kgraft-patch-4_4_114-94_11-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711817" version="1" comment="kgraft-patch-4_4_114-94_14-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711818" version="1" comment="kgraft-patch-4_4_82-6_6-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711819" version="1" comment="kgraft-patch-4_4_82-6_9-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711820" version="1" comment="kgraft-patch-4_4_92-6_18-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711821" version="1" comment="kgraft-patch-4_4_92-6_30-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824163" version="1" comment="pcs is &lt;0.9.162-5.el7_5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824164" version="1" comment="pcs-snmp is &lt;0.9.162-5.el7_5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826506" version="1" comment="emacs-mercurial is &lt;2.6.2-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826507" version="1" comment="emacs-mercurial-el is &lt;2.6.2-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826508" version="1" comment="mercurial is &lt;2.6.2-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826509" version="1" comment="mercurial-hgk is &lt;2.6.2-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824200" version="1" comment="librelp is &lt;1.2.12-1.el7_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824201" version="1" comment="librelp-devel is &lt;1.2.12-1.el7_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824199" version="1" comment="patch is &lt;2.7.1-10.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711822" version="1" comment="kgraft-patch-4_4_114-94_11-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711823" version="1" comment="kgraft-patch-4_4_114-94_14-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711824" version="1" comment="kernel-default is ==4.4.120-94.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711825" version="1" comment="kgraft-patch-4_4_120-94_17-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711826" version="1" comment="kernel-default is ==4.4.126-94.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711827" version="1" comment="kgraft-patch-4_4_126-94_22-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711828" version="1" comment="kernel-default is ==4.12.14-95.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711829" version="1" comment="kgraft-patch-4_12_14-95_19-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711830" version="1" comment="kernel-default is ==4.12.14-95.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711831" version="1" comment="kgraft-patch-4_12_14-95_24-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711832" version="1" comment="kernel-default is ==4.12.14-95.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711833" version="1" comment="kgraft-patch-4_12_14-95_29-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711834" version="1" comment="kernel-default is ==4.12.14-95.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711835" version="1" comment="kgraft-patch-4_12_14-95_32-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711836" version="1" comment="kernel-default is ==4.12.14-95.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711837" version="1" comment="kgraft-patch-4_12_14-95_37-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711838" version="1" comment="kgraft-patch-4_12_14-95_40-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711839" version="1" comment="kernel-default is ==4.12.14-95.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711840" version="1" comment="kgraft-patch-4_12_14-95_45-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711841" version="1" comment="kernel-default is ==4.12.14-95.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711842" version="1" comment="kgraft-patch-4_12_14-95_48-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711843" version="1" comment="kernel-default is ==4.12.14-95.51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711844" version="1" comment="kgraft-patch-4_12_14-95_51-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711845" version="1" comment="kernel-default is &lt;4.12.14-95.51.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711846" version="1" comment="kgraft-patch-4_12_14-120-default is &gt;=5-12.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711847" version="1" comment="kernel-default is ==4.12.14-122.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711848" version="1" comment="kgraft-patch-4_12_14-122_12-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711849" version="1" comment="kernel-default is ==4.12.14-122.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711850" version="1" comment="kgraft-patch-4_12_14-122_17-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711851" version="1" comment="kernel-default is ==4.12.14-122.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711852" version="1" comment="kgraft-patch-4_12_14-122_20-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711853" version="1" comment="kgraft-patch-4_12_14-122_7-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711854" version="1" comment="kernel-default is ==4.12.14-150.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711855" version="1" comment="kernel-livepatch-4_12_14-150_22-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711856" version="1" comment="kernel-default is ==4.12.14-150.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711857" version="1" comment="kernel-livepatch-4_12_14-150_27-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711858" version="1" comment="kernel-default is ==4.12.14-150.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711859" version="1" comment="kernel-livepatch-4_12_14-150_32-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711860" version="1" comment="kernel-default is ==4.12.14-150.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711861" version="1" comment="kernel-livepatch-4_12_14-150_35-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711862" version="1" comment="kernel-default is ==4.12.14-150.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711863" version="1" comment="kernel-livepatch-4_12_14-150_38-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711864" version="1" comment="kernel-livepatch-4_12_14-150_41-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711865" version="1" comment="kernel-default is ==4.12.14-150.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711866" version="1" comment="kernel-livepatch-4_12_14-150_47-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711867" version="1" comment="kernel-default is &lt;4.12.14-150.47.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714895" version="1" comment="kernel-default is ==4.12.14-195.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711868" version="1" comment="kernel-livepatch-4_12_14-195-default is &gt;=12-34.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711869" version="1" comment="kernel-default is ==4.12.14-197.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711870" version="1" comment="kernel-livepatch-4_12_14-197_10-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711871" version="1" comment="kernel-default is ==4.12.14-197.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711872" version="1" comment="kernel-livepatch-4_12_14-197_15-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711873" version="1" comment="kernel-default is ==4.12.14-197.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711874" version="1" comment="kernel-livepatch-4_12_14-197_18-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711875" version="1" comment="kernel-default is ==4.12.14-197.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711876" version="1" comment="kernel-livepatch-4_12_14-197_21-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711877" version="1" comment="kernel-livepatch-4_12_14-197_26-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711878" version="1" comment="kernel-default is ==4.12.14-197.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711879" version="1" comment="kernel-livepatch-4_12_14-197_29-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711880" version="1" comment="kernel-default is ==4.12.14-197.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711881" version="1" comment="kernel-livepatch-4_12_14-197_34-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711882" version="1" comment="kernel-default is ==4.12.14-197.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711883" version="1" comment="kernel-livepatch-4_12_14-197_37-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711884" version="1" comment="kernel-default is ==4.12.14-197.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711885" version="1" comment="kernel-livepatch-4_12_14-197_4-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711886" version="1" comment="kernel-default is ==4.12.14-197.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711887" version="1" comment="kernel-livepatch-4_12_14-197_40-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711888" version="1" comment="kernel-default is ==4.12.14-197.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711889" version="1" comment="kernel-livepatch-4_12_14-197_7-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712211" version="1" comment="kernel-default is &lt;4.12.14-197.7.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827848" version="1" comment="okular is &lt;4.10.5-8.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827849" version="1" comment="okular-devel is &lt;4.10.5-8.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827850" version="1" comment="okular-libs is &lt;4.10.5-8.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827851" version="1" comment="okular-part is &lt;4.10.5-8.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825338" version="1" comment="python-paramiko is &lt;2.1.1-9.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825339" version="1" comment="python-paramiko-doc is &lt;2.1.1-9.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826387" version="1" comment="freerdp is &lt;2.0.0-1.rc4.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826388" version="1" comment="freerdp-devel is &lt;2.0.0-1.rc4.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826389" version="1" comment="freerdp-libs is &lt;2.0.0-1.rc4.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826390" version="1" comment="libwinpr is &lt;2.0.0-1.rc4.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826391" version="1" comment="libwinpr-devel is &lt;2.0.0-1.rc4.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826392" version="1" comment="vinagre is &lt;3.22.0-12.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826113" version="1" comment="binutils is &lt;2.27-41.base.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826114" version="1" comment="binutils-devel is &lt;2.27-41.base.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824351" version="1" comment="plexus-archiver is &lt;2.4.2-5.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824352" version="1" comment="plexus-archiver-javadoc is &lt;2.4.2-5.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824592" version="1" comment="ghostscript is &lt;9.07-29.el7_5.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824593" version="1" comment="ghostscript-cups is &lt;9.07-29.el7_5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824594" version="1" comment="ghostscript-devel is &lt;9.07-29.el7_5.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824595" version="1" comment="ghostscript-doc is &lt;9.07-29.el7_5.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824596" version="1" comment="ghostscript-gtk is &lt;9.07-29.el7_5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827084" version="1" comment="file is &lt;5.11-36.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827085" version="1" comment="file-devel is &lt;5.11-36.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827086" version="1" comment="file-libs is &lt;5.11-36.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827087" version="1" comment="file-static is &lt;5.11-36.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827088" version="1" comment="python-magic is &lt;5.11-36.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824624" version="1" comment="binutils is &lt;2.27-34.base.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824625" version="1" comment="binutils-devel is &lt;2.27-34.base.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823976" version="1" comment="libgudev1 is &lt;219-42.el7_4.7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823977" version="1" comment="libgudev1-devel is &lt;219-42.el7_4.7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823978" version="1" comment="systemd is &lt;219-42.el7_4.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823979" version="1" comment="systemd-devel is &lt;219-42.el7_4.7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823980" version="1" comment="systemd-journal-gateway is &lt;219-42.el7_4.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823981" version="1" comment="systemd-libs is &lt;219-42.el7_4.7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823982" version="1" comment="systemd-networkd is &lt;219-42.el7_4.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823983" version="1" comment="systemd-python is &lt;219-42.el7_4.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823984" version="1" comment="systemd-resolved is &lt;219-42.el7_4.7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823985" version="1" comment="systemd-sysv is &lt;219-42.el7_4.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824639" version="1" comment="ctdb is &lt;4.8.3-4.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824640" version="1" comment="ctdb-tests is &lt;4.8.3-4.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824641" version="1" comment="libsmbclient is &lt;4.8.3-4.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824642" version="1" comment="libsmbclient-devel is &lt;4.8.3-4.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824643" version="1" comment="libwbclient is &lt;4.8.3-4.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824644" version="1" comment="libwbclient-devel is &lt;4.8.3-4.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824645" version="1" comment="samba is &lt;4.8.3-4.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824646" version="1" comment="samba-client is &lt;4.8.3-4.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824647" version="1" comment="samba-client-libs is &lt;4.8.3-4.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824648" version="1" comment="samba-common is &lt;4.8.3-4.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824649" version="1" comment="samba-common-libs is &lt;4.8.3-4.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824650" version="1" comment="samba-common-tools is &lt;4.8.3-4.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824651" version="1" comment="samba-dc is &lt;4.8.3-4.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824652" version="1" comment="samba-dc-libs is &lt;4.8.3-4.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824653" version="1" comment="samba-devel is &lt;4.8.3-4.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824654" version="1" comment="samba-krb5-printing is &lt;4.8.3-4.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824655" version="1" comment="samba-libs is &lt;4.8.3-4.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824656" version="1" comment="samba-pidl is &lt;4.8.3-4.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824657" version="1" comment="samba-python is &lt;4.8.3-4.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824658" version="1" comment="samba-python-test is &lt;4.8.3-4.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824659" version="1" comment="samba-test is &lt;4.8.3-4.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824660" version="1" comment="samba-test-libs is &lt;4.8.3-4.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824661" version="1" comment="samba-vfs-glusterfs is &lt;4.8.3-4.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824662" version="1" comment="samba-winbind is &lt;4.8.3-4.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824663" version="1" comment="samba-winbind-clients is &lt;4.8.3-4.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824664" version="1" comment="samba-winbind-krb5-locator is &lt;4.8.3-4.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824665" version="1" comment="samba-winbind-modules is &lt;4.8.3-4.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827765" version="1" comment="php is &lt;5.4.16-48.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827766" version="1" comment="php-bcmath is &lt;5.4.16-48.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827767" version="1" comment="php-cli is &lt;5.4.16-48.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827768" version="1" comment="php-common is &lt;5.4.16-48.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827769" version="1" comment="php-dba is &lt;5.4.16-48.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827770" version="1" comment="php-devel is &lt;5.4.16-48.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827771" version="1" comment="php-embedded is &lt;5.4.16-48.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827772" version="1" comment="php-enchant is &lt;5.4.16-48.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827773" version="1" comment="php-fpm is &lt;5.4.16-48.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827774" version="1" comment="php-gd is &lt;5.4.16-48.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827775" version="1" comment="php-intl is &lt;5.4.16-48.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827776" version="1" comment="php-ldap is &lt;5.4.16-48.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827777" version="1" comment="php-mbstring is &lt;5.4.16-48.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827778" version="1" comment="php-mysql is &lt;5.4.16-48.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827779" version="1" comment="php-mysqlnd is &lt;5.4.16-48.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827780" version="1" comment="php-odbc is &lt;5.4.16-48.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827781" version="1" comment="php-pdo is &lt;5.4.16-48.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827782" version="1" comment="php-pgsql is &lt;5.4.16-48.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827783" version="1" comment="php-process is &lt;5.4.16-48.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827784" version="1" comment="php-pspell is &lt;5.4.16-48.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827785" version="1" comment="php-recode is &lt;5.4.16-48.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827786" version="1" comment="php-snmp is &lt;5.4.16-48.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827787" version="1" comment="php-soap is &lt;5.4.16-48.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827788" version="1" comment="php-xml is &lt;5.4.16-48.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827789" version="1" comment="php-xmlrpc is &lt;5.4.16-48.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824435" version="1" comment="dpdk is &lt;17.11-11.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824436" version="1" comment="dpdk-devel is &lt;17.11-11.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824437" version="1" comment="dpdk-doc is &lt;17.11-11.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824438" version="1" comment="dpdk-tools is &lt;17.11-11.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824626" version="1" comment="python is &lt;2.7.5-76.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824627" version="1" comment="python-debug is &lt;2.7.5-76.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824628" version="1" comment="python-devel is &lt;2.7.5-76.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824629" version="1" comment="python-libs is &lt;2.7.5-76.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824630" version="1" comment="python-test is &lt;2.7.5-76.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824631" version="1" comment="python-tools is &lt;2.7.5-76.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824632" version="1" comment="tkinter is &lt;2.7.5-76.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824137" version="1" comment="policycoreutils is &lt;2.5-22.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824138" version="1" comment="policycoreutils-devel is &lt;2.5-22.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824139" version="1" comment="policycoreutils-gui is &lt;2.5-22.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824140" version="1" comment="policycoreutils-newrole is &lt;2.5-22.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824141" version="1" comment="policycoreutils-python is &lt;2.5-22.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824142" version="1" comment="policycoreutils-restorecond is &lt;2.5-22.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824143" version="1" comment="policycoreutils-sandbox is &lt;2.5-22.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824234" version="1" comment="libvirt is &lt;3.9.0-14.el7_5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824235" version="1" comment="libvirt-admin is &lt;3.9.0-14.el7_5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824236" version="1" comment="libvirt-client is &lt;3.9.0-14.el7_5.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824237" version="1" comment="libvirt-daemon is &lt;3.9.0-14.el7_5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824238" version="1" comment="libvirt-daemon-config-network is &lt;3.9.0-14.el7_5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824239" version="1" comment="libvirt-daemon-config-nwfilter is &lt;3.9.0-14.el7_5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824240" version="1" comment="libvirt-daemon-driver-interface is &lt;3.9.0-14.el7_5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824241" version="1" comment="libvirt-daemon-driver-lxc is &lt;3.9.0-14.el7_5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824242" version="1" comment="libvirt-daemon-driver-network is &lt;3.9.0-14.el7_5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824243" version="1" comment="libvirt-daemon-driver-nodedev is &lt;3.9.0-14.el7_5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824244" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;3.9.0-14.el7_5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824245" version="1" comment="libvirt-daemon-driver-qemu is &lt;3.9.0-14.el7_5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824246" version="1" comment="libvirt-daemon-driver-secret is &lt;3.9.0-14.el7_5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824247" version="1" comment="libvirt-daemon-driver-storage is &lt;3.9.0-14.el7_5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824248" version="1" comment="libvirt-daemon-driver-storage-core is &lt;3.9.0-14.el7_5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824249" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;3.9.0-14.el7_5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824250" version="1" comment="libvirt-daemon-driver-storage-gluster is &lt;3.9.0-14.el7_5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824251" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;3.9.0-14.el7_5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824252" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;3.9.0-14.el7_5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824253" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;3.9.0-14.el7_5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824254" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;3.9.0-14.el7_5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824255" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;3.9.0-14.el7_5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824256" version="1" comment="libvirt-daemon-kvm is &lt;3.9.0-14.el7_5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824257" version="1" comment="libvirt-daemon-lxc is &lt;3.9.0-14.el7_5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824258" version="1" comment="libvirt-devel is &lt;3.9.0-14.el7_5.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824259" version="1" comment="libvirt-docs is &lt;3.9.0-14.el7_5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824260" version="1" comment="libvirt-libs is &lt;3.9.0-14.el7_5.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824261" version="1" comment="libvirt-lock-sanlock is &lt;3.9.0-14.el7_5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824262" version="1" comment="libvirt-login-shell is &lt;3.9.0-14.el7_5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824263" version="1" comment="libvirt-nss is &lt;3.9.0-14.el7_5.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711890" version="1" comment="kgraft-patch-4_4_114-94_11-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711891" version="1" comment="kgraft-patch-4_4_114-94_14-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826394" version="1" comment="blktrace is &lt;1.0.5-9.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824393" version="1" comment="pki-base is &lt;10.5.1-13.1.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824394" version="1" comment="pki-base-java is &lt;10.5.1-13.1.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824395" version="1" comment="pki-ca is &lt;10.5.1-13.1.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824396" version="1" comment="pki-javadoc is &lt;10.5.1-13.1.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824397" version="1" comment="pki-kra is &lt;10.5.1-13.1.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824398" version="1" comment="pki-server is &lt;10.5.1-13.1.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824399" version="1" comment="pki-symkey is &lt;10.5.1-13.1.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824400" version="1" comment="pki-tools is &lt;10.5.1-13.1.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824178" version="1" comment="corosync is &lt;2.4.3-2.el7_5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824179" version="1" comment="corosync-qdevice is &lt;2.4.3-2.el7_5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824180" version="1" comment="corosync-qnetd is &lt;2.4.3-2.el7_5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824181" version="1" comment="corosynclib is &lt;2.4.3-2.el7_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824182" version="1" comment="corosynclib-devel is &lt;2.4.3-2.el7_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824633" version="1" comment="gnutls is &lt;3.3.29-8.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824634" version="1" comment="gnutls-c++ is &lt;3.3.29-8.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824635" version="1" comment="gnutls-dane is &lt;3.3.29-8.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824636" version="1" comment="gnutls-devel is &lt;3.3.29-8.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824637" version="1" comment="gnutls-utils is &lt;3.3.29-8.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824576" version="1" comment="389-ds-base is &lt;1.3.7.5-28.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824577" version="1" comment="389-ds-base-devel is &lt;1.3.7.5-28.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824578" version="1" comment="389-ds-base-libs is &lt;1.3.7.5-28.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824579" version="1" comment="389-ds-base-snmp is &lt;1.3.7.5-28.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825271" version="1" comment="libipa_hbac is &lt;1.16.2-13.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825272" version="1" comment="libipa_hbac-devel is &lt;1.16.2-13.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825273" version="1" comment="libsss_autofs is &lt;1.16.2-13.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825274" version="1" comment="libsss_certmap is &lt;1.16.2-13.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825275" version="1" comment="libsss_certmap-devel is &lt;1.16.2-13.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825276" version="1" comment="libsss_idmap is &lt;1.16.2-13.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825277" version="1" comment="libsss_idmap-devel is &lt;1.16.2-13.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825278" version="1" comment="libsss_nss_idmap is &lt;1.16.2-13.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825279" version="1" comment="libsss_nss_idmap-devel is &lt;1.16.2-13.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825280" version="1" comment="libsss_simpleifp is &lt;1.16.2-13.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825281" version="1" comment="libsss_simpleifp-devel is &lt;1.16.2-13.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825282" version="1" comment="libsss_sudo is &lt;1.16.2-13.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825283" version="1" comment="python-libipa_hbac is &lt;1.16.2-13.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825284" version="1" comment="python-libsss_nss_idmap is &lt;1.16.2-13.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825285" version="1" comment="python-sss is &lt;1.16.2-13.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825286" version="1" comment="python-sss-murmur is &lt;1.16.2-13.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825287" version="1" comment="python-sssdconfig is &lt;1.16.2-13.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825288" version="1" comment="sssd is &lt;1.16.2-13.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825289" version="1" comment="sssd-ad is &lt;1.16.2-13.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825290" version="1" comment="sssd-client is &lt;1.16.2-13.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825291" version="1" comment="sssd-common is &lt;1.16.2-13.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825292" version="1" comment="sssd-common-pac is &lt;1.16.2-13.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825293" version="1" comment="sssd-dbus is &lt;1.16.2-13.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825294" version="1" comment="sssd-ipa is &lt;1.16.2-13.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825295" version="1" comment="sssd-kcm is &lt;1.16.2-13.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825296" version="1" comment="sssd-krb5 is &lt;1.16.2-13.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825297" version="1" comment="sssd-krb5-common is &lt;1.16.2-13.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825298" version="1" comment="sssd-ldap is &lt;1.16.2-13.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825299" version="1" comment="sssd-libwbclient is &lt;1.16.2-13.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825300" version="1" comment="sssd-libwbclient-devel is &lt;1.16.2-13.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825301" version="1" comment="sssd-polkit-rules is &lt;1.16.2-13.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825302" version="1" comment="sssd-proxy is &lt;1.16.2-13.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825303" version="1" comment="sssd-tools is &lt;1.16.2-13.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825304" version="1" comment="sssd-winbind-idmap is &lt;1.16.2-13.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711892" version="1" comment="kgraft-patch-4_4_120-94_17-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711893" version="1" comment="kgraft-patch-4_4_126-94_22-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711894" version="1" comment="kernel-default is ==4.4.131-94.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711895" version="1" comment="kgraft-patch-4_4_131-94_29-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711896" version="1" comment="kernel-default is ==4.4.132-94.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711897" version="1" comment="kgraft-patch-4_4_132-94_33-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711898" version="1" comment="kernel-default is ==4.12.14-25.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711899" version="1" comment="kernel-livepatch-4_12_14-25_13-default is &gt;=3-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711900" version="1" comment="kernel-default is ==4.12.14-25.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711901" version="1" comment="kernel-livepatch-4_12_14-25_6-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712098" version="1" comment="kernel-default is &lt;4.12.14-25.6.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826007" version="1" comment="bpftool is &lt;3.10.0-1062.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826008" version="1" comment="kernel is &lt;3.10.0-1062.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826009" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1062.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826010" version="1" comment="kernel-debug is &lt;3.10.0-1062.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826013" version="1" comment="kernel-doc is &lt;3.10.0-1062.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826014" version="1" comment="kernel-headers is &lt;3.10.0-1062.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826015" version="1" comment="kernel-tools is &lt;3.10.0-1062.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826016" version="1" comment="kernel-tools-libs is &lt;3.10.0-1062.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826018" version="1" comment="perf is &lt;3.10.0-1062.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826019" version="1" comment="python-perf is &lt;3.10.0-1062.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711902" version="1" comment="kgraft-patch-4_4_120-94_17-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824556" version="1" comment="spice-glib is &lt;0.34-3.el7_5.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824557" version="1" comment="spice-glib-devel is &lt;0.34-3.el7_5.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824558" version="1" comment="spice-gtk-tools is &lt;0.34-3.el7_5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824559" version="1" comment="spice-gtk3 is &lt;0.34-3.el7_5.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824560" version="1" comment="spice-gtk3-devel is &lt;0.34-3.el7_5.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824561" version="1" comment="spice-gtk3-vala is &lt;0.34-3.el7_5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824562" version="1" comment="spice-server is &lt;0.14.0-2.el7_5.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824563" version="1" comment="spice-server-devel is &lt;0.14.0-2.el7_5.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824230" version="1" comment="389-ds-base is &lt;1.3.7.5-21.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824231" version="1" comment="389-ds-base-devel is &lt;1.3.7.5-21.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824232" version="1" comment="389-ds-base-libs is &lt;1.3.7.5-21.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824233" version="1" comment="389-ds-base-snmp is &lt;1.3.7.5-21.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826480" version="1" comment="libgovirt is &lt;0.3.4-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826481" version="1" comment="libgovirt-devel is &lt;0.3.4-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826482" version="1" comment="spice-glib is &lt;0.35-4.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826483" version="1" comment="spice-glib-devel is &lt;0.35-4.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826484" version="1" comment="spice-gtk-tools is &lt;0.35-4.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826485" version="1" comment="spice-gtk3 is &lt;0.35-4.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826486" version="1" comment="spice-gtk3-devel is &lt;0.35-4.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826487" version="1" comment="spice-gtk3-vala is &lt;0.35-4.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826488" version="1" comment="spice-vdagent is &lt;0.14.0-18.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826489" version="1" comment="virt-viewer is &lt;5.0-15.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828253" version="1" comment="cloud-init is &lt;19.4-7.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824469" version="1" comment="yum-NetworkManager-dispatcher is &lt;1.1.31-46.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824470" version="1" comment="yum-plugin-aliases is &lt;1.1.31-46.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824471" version="1" comment="yum-plugin-auto-update-debug-info is &lt;1.1.31-46.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824472" version="1" comment="yum-plugin-changelog is &lt;1.1.31-46.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824473" version="1" comment="yum-plugin-copr is &lt;1.1.31-46.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824474" version="1" comment="yum-plugin-fastestmirror is &lt;1.1.31-46.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824475" version="1" comment="yum-plugin-filter-data is &lt;1.1.31-46.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824476" version="1" comment="yum-plugin-fs-snapshot is &lt;1.1.31-46.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824477" version="1" comment="yum-plugin-keys is &lt;1.1.31-46.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824478" version="1" comment="yum-plugin-list-data is &lt;1.1.31-46.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824479" version="1" comment="yum-plugin-local is &lt;1.1.31-46.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824480" version="1" comment="yum-plugin-merge-conf is &lt;1.1.31-46.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824481" version="1" comment="yum-plugin-ovl is &lt;1.1.31-46.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824482" version="1" comment="yum-plugin-post-transaction-actions is &lt;1.1.31-46.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824483" version="1" comment="yum-plugin-pre-transaction-actions is &lt;1.1.31-46.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824484" version="1" comment="yum-plugin-priorities is &lt;1.1.31-46.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824485" version="1" comment="yum-plugin-protectbase is &lt;1.1.31-46.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824486" version="1" comment="yum-plugin-ps is &lt;1.1.31-46.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824487" version="1" comment="yum-plugin-remove-with-leaves is &lt;1.1.31-46.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824488" version="1" comment="yum-plugin-rpm-warm-cache is &lt;1.1.31-46.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824489" version="1" comment="yum-plugin-show-leaves is &lt;1.1.31-46.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824490" version="1" comment="yum-plugin-tmprepo is &lt;1.1.31-46.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824491" version="1" comment="yum-plugin-tsflags is &lt;1.1.31-46.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824492" version="1" comment="yum-plugin-upgrade-helper is &lt;1.1.31-46.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824493" version="1" comment="yum-plugin-verify is &lt;1.1.31-46.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824494" version="1" comment="yum-plugin-versionlock is &lt;1.1.31-46.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824495" version="1" comment="yum-updateonboot is &lt;1.1.31-46.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824496" version="1" comment="yum-utils is &lt;1.1.31-46.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711903" version="1" comment="kgraft-patch-4_4_120-94_17-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711904" version="1" comment="kgraft-patch-4_4_126-94_22-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711905" version="1" comment="kgraft-patch-4_4_131-94_29-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711906" version="1" comment="kgraft-patch-4_4_132-94_33-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711907" version="1" comment="kernel-default is ==4.4.138-94.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711908" version="1" comment="kgraft-patch-4_4_138-94_39-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711909" version="1" comment="kernel-default is ==4.4.140-94.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711910" version="1" comment="kgraft-patch-4_4_140-94_42-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711911" version="1" comment="kernel-default is ==4.4.143-94.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711912" version="1" comment="kgraft-patch-4_4_143-94_47-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711913" version="1" comment="kernel-livepatch-4_12_14-23-default is &gt;=4-10.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711914" version="1" comment="kernel-livepatch-4_12_14-25_3-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825330" version="1" comment="fuse is &lt;2.9.2-11.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825331" version="1" comment="fuse-devel is &lt;2.9.2-11.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825332" version="1" comment="fuse-libs is &lt;2.9.2-11.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827760" version="1" comment="bluez is &lt;5.44-6.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827761" version="1" comment="bluez-cups is &lt;5.44-6.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827762" version="1" comment="bluez-hid2hci is &lt;5.44-6.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827763" version="1" comment="bluez-libs is &lt;5.44-6.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827764" version="1" comment="bluez-libs-devel is &lt;5.44-6.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825313" version="1" comment="glusterfs is &lt;3.12.2-18.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825314" version="1" comment="glusterfs-api is &lt;3.12.2-18.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825315" version="1" comment="glusterfs-api-devel is &lt;3.12.2-18.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825316" version="1" comment="glusterfs-cli is &lt;3.12.2-18.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825317" version="1" comment="glusterfs-client-xlators is &lt;3.12.2-18.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825318" version="1" comment="glusterfs-devel is &lt;3.12.2-18.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825319" version="1" comment="glusterfs-fuse is &lt;3.12.2-18.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825320" version="1" comment="glusterfs-libs is &lt;3.12.2-18.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825321" version="1" comment="glusterfs-rdma is &lt;3.12.2-18.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825322" version="1" comment="python2-gluster is &lt;3.12.2-18.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824529" version="1" comment="postgresql is &lt;9.2.24-1.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824530" version="1" comment="postgresql-contrib is &lt;9.2.24-1.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824531" version="1" comment="postgresql-devel is &lt;9.2.24-1.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824532" version="1" comment="postgresql-docs is &lt;9.2.24-1.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824533" version="1" comment="postgresql-libs is &lt;9.2.24-1.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824534" version="1" comment="postgresql-plperl is &lt;9.2.24-1.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824535" version="1" comment="postgresql-plpython is &lt;9.2.24-1.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824536" version="1" comment="postgresql-pltcl is &lt;9.2.24-1.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824537" version="1" comment="postgresql-server is &lt;9.2.24-1.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824538" version="1" comment="postgresql-static is &lt;9.2.24-1.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824539" version="1" comment="postgresql-test is &lt;9.2.24-1.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824540" version="1" comment="postgresql-upgrade is &lt;9.2.24-1.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827641" version="1" comment="lftp is &lt;4.4.8-12.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827642" version="1" comment="lftp-scripts is &lt;4.4.8-12.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711915" version="1" comment="kernel-default is ==4.12.14-25.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711916" version="1" comment="kernel-livepatch-4_12_14-25_16-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711917" version="1" comment="kernel-livepatch-4_12_14-25_6-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824202" version="1" comment="PackageKit is &lt;1.1.5-2.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824203" version="1" comment="PackageKit-command-not-found is &lt;1.1.5-2.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824204" version="1" comment="PackageKit-cron is &lt;1.1.5-2.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824205" version="1" comment="PackageKit-glib is &lt;1.1.5-2.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824206" version="1" comment="PackageKit-glib-devel is &lt;1.1.5-2.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824207" version="1" comment="PackageKit-gstreamer-plugin is &lt;1.1.5-2.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824208" version="1" comment="PackageKit-gtk3-module is &lt;1.1.5-2.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824209" version="1" comment="PackageKit-yum is &lt;1.1.5-2.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824210" version="1" comment="PackageKit-yum-plugin is &lt;1.1.5-2.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824269" version="1" comment="dhclient is &lt;4.2.5-68.el7_5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824270" version="1" comment="dhcp is &lt;4.2.5-68.el7_5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824271" version="1" comment="dhcp-common is &lt;4.2.5-68.el7_5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824272" version="1" comment="dhcp-devel is &lt;4.2.5-68.el7_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824273" version="1" comment="dhcp-libs is &lt;4.2.5-68.el7_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825325" version="1" comment="setup is &lt;2.8.71-10.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827819" version="1" comment="polkit is &lt;0.112-26.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827820" version="1" comment="polkit-devel is &lt;0.112-26.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827821" version="1" comment="polkit-docs is &lt;0.112-26.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826456" version="1" comment="procps-ng is &lt;3.3.10-26.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826457" version="1" comment="procps-ng-devel is &lt;3.3.10-26.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826458" version="1" comment="procps-ng-i18n is &lt;3.3.10-26.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824365" version="1" comment="emacs-git is &lt;1.8.3.1-14.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824366" version="1" comment="emacs-git-el is &lt;1.8.3.1-14.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824367" version="1" comment="git is &lt;1.8.3.1-14.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824368" version="1" comment="git-all is &lt;1.8.3.1-14.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824369" version="1" comment="git-bzr is &lt;1.8.3.1-14.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824370" version="1" comment="git-cvs is &lt;1.8.3.1-14.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824371" version="1" comment="git-daemon is &lt;1.8.3.1-14.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824372" version="1" comment="git-email is &lt;1.8.3.1-14.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824373" version="1" comment="git-gui is &lt;1.8.3.1-14.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824374" version="1" comment="git-hg is &lt;1.8.3.1-14.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824375" version="1" comment="git-p4 is &lt;1.8.3.1-14.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824376" version="1" comment="git-svn is &lt;1.8.3.1-14.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824377" version="1" comment="gitk is &lt;1.8.3.1-14.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824378" version="1" comment="gitweb is &lt;1.8.3.1-14.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824379" version="1" comment="perl-Git is &lt;1.8.3.1-14.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824380" version="1" comment="perl-Git-SVN is &lt;1.8.3.1-14.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824343" version="1" comment="procps-ng is &lt;3.3.10-17.el7_5.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824344" version="1" comment="procps-ng-devel is &lt;3.3.10-17.el7_5.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824345" version="1" comment="procps-ng-i18n is &lt;3.3.10-17.el7_5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827643" version="1" comment="wireshark is &lt;1.10.14-24.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827644" version="1" comment="wireshark-devel is &lt;1.10.14-24.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827645" version="1" comment="wireshark-gnome is &lt;1.10.14-24.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827852" version="1" comment="taglib is &lt;1.8-8.20130218git.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827853" version="1" comment="taglib-devel is &lt;1.8-8.20130218git.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827854" version="1" comment="taglib-doc is &lt;1.8-8.20130218git.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826512" version="1" comment="ghostscript is &lt;9.25-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826513" version="1" comment="ghostscript-cups is &lt;9.25-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826514" version="1" comment="ghostscript-doc is &lt;9.25-2.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826515" version="1" comment="ghostscript-gtk is &lt;9.25-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826516" version="1" comment="libgs is &lt;9.25-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826517" version="1" comment="libgs-devel is &lt;9.25-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828322" version="1" comment="mod_dav_svn is &lt;1.7.14-16.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828323" version="1" comment="subversion is &lt;1.7.14-16.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828324" version="1" comment="subversion-devel is &lt;1.7.14-16.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828325" version="1" comment="subversion-gnome is &lt;1.7.14-16.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828326" version="1" comment="subversion-javahl is &lt;1.7.14-16.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828327" version="1" comment="subversion-kde is &lt;1.7.14-16.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828328" version="1" comment="subversion-libs is &lt;1.7.14-16.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828329" version="1" comment="subversion-perl is &lt;1.7.14-16.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828330" version="1" comment="subversion-python is &lt;1.7.14-16.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828331" version="1" comment="subversion-ruby is &lt;1.7.14-16.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828332" version="1" comment="subversion-tools is &lt;1.7.14-16.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825592" version="1" comment="tomcat is &lt;7.0.76-9.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825593" version="1" comment="tomcat-admin-webapps is &lt;7.0.76-9.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825594" version="1" comment="tomcat-docs-webapp is &lt;7.0.76-9.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825595" version="1" comment="tomcat-el-2.2-api is &lt;7.0.76-9.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825596" version="1" comment="tomcat-javadoc is &lt;7.0.76-9.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825597" version="1" comment="tomcat-jsp-2.2-api is &lt;7.0.76-9.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825598" version="1" comment="tomcat-jsvc is &lt;7.0.76-9.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825599" version="1" comment="tomcat-lib is &lt;7.0.76-9.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825600" version="1" comment="tomcat-servlet-3.0-api is &lt;7.0.76-9.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825601" version="1" comment="tomcat-webapps is &lt;7.0.76-9.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824524" version="1" comment="qemu-img is &lt;1.5.3-156.el7_5.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824525" version="1" comment="qemu-kvm is &lt;1.5.3-156.el7_5.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824526" version="1" comment="qemu-kvm-common is &lt;1.5.3-156.el7_5.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824527" version="1" comment="qemu-kvm-tools is &lt;1.5.3-156.el7_5.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826159" version="1" comment="perl-Archive-Tar is &lt;1.92-3.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824447" version="1" comment="gnupg2 is &lt;2.0.22-5.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824448" version="1" comment="gnupg2-smime is &lt;2.0.22-5.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826503" version="1" comment="http-parser is &lt;2.7.1-8.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826504" version="1" comment="http-parser-devel is &lt;2.7.1-8.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825722" version="1" comment="bpftool is &lt;3.10.0-957.12.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825723" version="1" comment="kernel is &lt;3.10.0-957.12.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825724" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-957.12.2.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825725" version="1" comment="kernel-debug is &lt;3.10.0-957.12.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825728" version="1" comment="kernel-doc is &lt;3.10.0-957.12.2.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825729" version="1" comment="kernel-headers is &lt;3.10.0-957.12.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825730" version="1" comment="kernel-tools is &lt;3.10.0-957.12.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825731" version="1" comment="kernel-tools-libs is &lt;3.10.0-957.12.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825735" version="1" comment="libvirt is &lt;4.5.0-10.el7_6.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825736" version="1" comment="libvirt-admin is &lt;4.5.0-10.el7_6.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825737" version="1" comment="libvirt-bash-completion is &lt;4.5.0-10.el7_6.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825738" version="1" comment="libvirt-client is &lt;4.5.0-10.el7_6.9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825739" version="1" comment="libvirt-daemon is &lt;4.5.0-10.el7_6.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825740" version="1" comment="libvirt-daemon-config-network is &lt;4.5.0-10.el7_6.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825741" version="1" comment="libvirt-daemon-config-nwfilter is &lt;4.5.0-10.el7_6.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825742" version="1" comment="libvirt-daemon-driver-interface is &lt;4.5.0-10.el7_6.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825743" version="1" comment="libvirt-daemon-driver-lxc is &lt;4.5.0-10.el7_6.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825744" version="1" comment="libvirt-daemon-driver-network is &lt;4.5.0-10.el7_6.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825745" version="1" comment="libvirt-daemon-driver-nodedev is &lt;4.5.0-10.el7_6.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825746" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;4.5.0-10.el7_6.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825747" version="1" comment="libvirt-daemon-driver-qemu is &lt;4.5.0-10.el7_6.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825748" version="1" comment="libvirt-daemon-driver-secret is &lt;4.5.0-10.el7_6.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825749" version="1" comment="libvirt-daemon-driver-storage is &lt;4.5.0-10.el7_6.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825750" version="1" comment="libvirt-daemon-driver-storage-core is &lt;4.5.0-10.el7_6.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825751" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;4.5.0-10.el7_6.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825752" version="1" comment="libvirt-daemon-driver-storage-gluster is &lt;4.5.0-10.el7_6.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825753" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;4.5.0-10.el7_6.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825754" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;4.5.0-10.el7_6.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825755" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;4.5.0-10.el7_6.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825756" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;4.5.0-10.el7_6.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825757" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;4.5.0-10.el7_6.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825758" version="1" comment="libvirt-daemon-kvm is &lt;4.5.0-10.el7_6.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825759" version="1" comment="libvirt-daemon-lxc is &lt;4.5.0-10.el7_6.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825760" version="1" comment="libvirt-devel is &lt;4.5.0-10.el7_6.9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825761" version="1" comment="libvirt-docs is &lt;4.5.0-10.el7_6.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825762" version="1" comment="libvirt-libs is &lt;4.5.0-10.el7_6.9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825763" version="1" comment="libvirt-lock-sanlock is &lt;4.5.0-10.el7_6.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825764" version="1" comment="libvirt-login-shell is &lt;4.5.0-10.el7_6.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825765" version="1" comment="libvirt-nss is &lt;4.5.0-10.el7_6.9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825733" version="1" comment="perf is &lt;3.10.0-957.12.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825734" version="1" comment="python-perf is &lt;3.10.0-957.12.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825766" version="1" comment="qemu-img is &lt;1.5.3-160.el7_6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825767" version="1" comment="qemu-kvm is &lt;1.5.3-160.el7_6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825768" version="1" comment="qemu-kvm-common is &lt;1.5.3-160.el7_6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825769" version="1" comment="qemu-kvm-tools is &lt;1.5.3-160.el7_6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825686" version="1" comment="OVMF is &lt;20180508-3.gitee3198e672e2.el7_6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826733" version="1" comment="bpftool is &lt;3.10.0-1062.4.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826734" version="1" comment="kernel is &lt;3.10.0-1062.4.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826735" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1062.4.2.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826736" version="1" comment="kernel-debug is &lt;3.10.0-1062.4.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826739" version="1" comment="kernel-doc is &lt;3.10.0-1062.4.2.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826740" version="1" comment="kernel-headers is &lt;3.10.0-1062.4.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826741" version="1" comment="kernel-tools is &lt;3.10.0-1062.4.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826742" version="1" comment="kernel-tools-libs is &lt;3.10.0-1062.4.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826744" version="1" comment="perf is &lt;3.10.0-1062.4.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826745" version="1" comment="python-perf is &lt;3.10.0-1062.4.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711918" version="1" comment="kernel-livepatch-4_12_14-23-default is &gt;=9-25.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711919" version="1" comment="kernel-livepatch-4_12_14-25_3-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826115" version="1" comment="ntp is &lt;4.2.6p5-29.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826116" version="1" comment="ntp-doc is &lt;4.2.6p5-29.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826117" version="1" comment="ntp-perl is &lt;4.2.6p5-29.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826118" version="1" comment="ntpdate is &lt;4.2.6p5-29.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826119" version="1" comment="sntp is &lt;4.2.6p5-29.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824468" version="1" comment="thunderbird is &lt;52.9.1-1.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824589" version="1" comment="firefox is &lt;60.2.1-1.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824584" version="1" comment="nss is &lt;3.36.0-7.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824585" version="1" comment="nss-devel is &lt;3.36.0-7.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824586" version="1" comment="nss-pkcs11-devel is &lt;3.36.0-7.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824587" version="1" comment="nss-sysinit is &lt;3.36.0-7.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824588" version="1" comment="nss-tools is &lt;3.36.0-7.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824590" version="1" comment="firefox is &lt;60.2.2-1.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824623" version="1" comment="firefox is &lt;60.3.0-1.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825391" version="1" comment="thunderbird is &lt;60.3.0-1.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825446" version="1" comment="firefox is &lt;60.4.0-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825483" version="1" comment="thunderbird is &lt;60.4.0-1.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480339" version="1" comment="kernel-default is &lt;4.12.14-23.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826470" version="1" comment="tomcat is &lt;7.0.76-9.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826471" version="1" comment="tomcat-admin-webapps is &lt;7.0.76-9.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826472" version="1" comment="tomcat-docs-webapp is &lt;7.0.76-9.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826473" version="1" comment="tomcat-el-2.2-api is &lt;7.0.76-9.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826474" version="1" comment="tomcat-javadoc is &lt;7.0.76-9.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826475" version="1" comment="tomcat-jsp-2.2-api is &lt;7.0.76-9.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826476" version="1" comment="tomcat-jsvc is &lt;7.0.76-9.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826477" version="1" comment="tomcat-lib is &lt;7.0.76-9.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826478" version="1" comment="tomcat-servlet-3.0-api is &lt;7.0.76-9.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826479" version="1" comment="tomcat-webapps is &lt;7.0.76-9.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826929" version="1" comment="xerces-c is &lt;3.1.1-10.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826930" version="1" comment="xerces-c-devel is &lt;3.1.1-10.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826931" version="1" comment="xerces-c-doc is &lt;3.1.1-10.el7_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825959" version="1" comment="httpd is &lt;2.4.6-89.el7_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825960" version="1" comment="httpd-devel is &lt;2.4.6-89.el7_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825961" version="1" comment="httpd-manual is &lt;2.4.6-89.el7_6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825962" version="1" comment="httpd-tools is &lt;2.4.6-89.el7_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825963" version="1" comment="mod_ldap is &lt;2.4.6-89.el7_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825964" version="1" comment="mod_proxy_html is &lt;2.4.6-89.el7_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825965" version="1" comment="mod_session is &lt;2.4.6-89.el7_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825966" version="1" comment="mod_ssl is &lt;2.4.6-89.el7_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827898" version="1" comment="libsndfile is &lt;1.0.25-11.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827899" version="1" comment="libsndfile-devel is &lt;1.0.25-11.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827900" version="1" comment="libsndfile-utils is &lt;1.0.25-11.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825970" version="1" comment="zsh is &lt;5.0.2-33.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825971" version="1" comment="zsh-html is &lt;5.0.2-33.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824597" version="1" comment="tomcat is &lt;7.0.76-8.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824598" version="1" comment="tomcat-admin-webapps is &lt;7.0.76-8.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824599" version="1" comment="tomcat-docs-webapp is &lt;7.0.76-8.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824600" version="1" comment="tomcat-el-2.2-api is &lt;7.0.76-8.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824601" version="1" comment="tomcat-javadoc is &lt;7.0.76-8.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824602" version="1" comment="tomcat-jsp-2.2-api is &lt;7.0.76-8.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824603" version="1" comment="tomcat-jsvc is &lt;7.0.76-8.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824604" version="1" comment="tomcat-lib is &lt;7.0.76-8.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824605" version="1" comment="tomcat-servlet-3.0-api is &lt;7.0.76-8.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824606" version="1" comment="tomcat-webapps is &lt;7.0.76-8.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828236" version="1" comment="audiofile is &lt;0.3.6-9.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828237" version="1" comment="audiofile-devel is &lt;0.3.6-9.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826073" version="1" comment="libcgroup is &lt;0.41-21.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826074" version="1" comment="libcgroup-devel is &lt;0.41-21.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826075" version="1" comment="libcgroup-pam is &lt;0.41-21.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826076" version="1" comment="libcgroup-tools is &lt;0.41-21.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824528" version="1" comment="mutt is &lt;1.5.21-28.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827804" version="1" comment="mutt is &lt;1.5.21-29.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824807" version="1" comment="wpa_supplicant is &lt;2.6-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826124" version="1" comment="gdm is &lt;3.28.2-16.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826125" version="1" comment="gdm-devel is &lt;3.28.2-16.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826126" version="1" comment="gdm-pam-extensions-devel is &lt;3.28.2-16.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826127" version="1" comment="libX11 is &lt;1.6.7-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826128" version="1" comment="libX11-common is &lt;1.6.7-2.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826129" version="1" comment="libX11-devel is &lt;1.6.7-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826130" version="1" comment="libxkbcommon is &lt;0.7.1-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826131" version="1" comment="libxkbcommon-devel is &lt;0.7.1-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826132" version="1" comment="libxkbcommon-x11 is &lt;0.7.1-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826133" version="1" comment="libxkbcommon-x11-devel is &lt;0.7.1-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826134" version="1" comment="mesa-libGLw is &lt;8.0.0-5.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826135" version="1" comment="mesa-libGLw-devel is &lt;8.0.0-5.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826136" version="1" comment="xorg-x11-drv-ati is &lt;19.0.1-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826137" version="1" comment="xorg-x11-drv-vesa is &lt;2.4.0-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826138" version="1" comment="xorg-x11-drv-wacom is &lt;0.36.1-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826139" version="1" comment="xorg-x11-drv-wacom-devel is &lt;0.36.1-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826140" version="1" comment="xorg-x11-server-Xdmx is &lt;1.20.4-7.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826141" version="1" comment="xorg-x11-server-Xephyr is &lt;1.20.4-7.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826142" version="1" comment="xorg-x11-server-Xnest is &lt;1.20.4-7.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826143" version="1" comment="xorg-x11-server-Xorg is &lt;1.20.4-7.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826144" version="1" comment="xorg-x11-server-Xvfb is &lt;1.20.4-7.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826145" version="1" comment="xorg-x11-server-Xwayland is &lt;1.20.4-7.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826146" version="1" comment="xorg-x11-server-common is &lt;1.20.4-7.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826147" version="1" comment="xorg-x11-server-devel is &lt;1.20.4-7.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826148" version="1" comment="xorg-x11-server-source is &lt;1.20.4-7.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825945" version="1" comment="curl is &lt;7.29.0-51.el7_6.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825946" version="1" comment="libcurl is &lt;7.29.0-51.el7_6.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825947" version="1" comment="libcurl-devel is &lt;7.29.0-51.el7_6.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711920" version="1" comment="kgraft-patch-4_4_103-6_33-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711921" version="1" comment="kgraft-patch-4_4_103-6_38-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711922" version="1" comment="kgraft-patch-4_4_114-94_11-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711923" version="1" comment="kgraft-patch-4_4_114-94_14-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711924" version="1" comment="kgraft-patch-4_4_120-94_17-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711925" version="1" comment="kgraft-patch-4_4_126-94_22-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711926" version="1" comment="kgraft-patch-4_4_131-94_29-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711927" version="1" comment="kgraft-patch-4_4_132-94_33-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711928" version="1" comment="kgraft-patch-4_4_138-94_39-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711929" version="1" comment="kgraft-patch-4_4_140-94_42-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711930" version="1" comment="kgraft-patch-4_4_143-94_47-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711931" version="1" comment="kernel-default is ==4.4.155-94.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711932" version="1" comment="kgraft-patch-4_4_155-94_50-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711933" version="1" comment="kernel-default is ==4.4.156-94.57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711934" version="1" comment="kgraft-patch-4_4_156-94_57-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711935" version="1" comment="kernel-default is ==4.4.156-94.61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711936" version="1" comment="kgraft-patch-4_4_156-94_61-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711937" version="1" comment="kernel-default is ==4.4.156-94.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711938" version="1" comment="kgraft-patch-4_4_156-94_64-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711939" version="1" comment="kgraft-patch-4_4_92-6_18-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711940" version="1" comment="kgraft-patch-4_4_92-6_30-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711941" version="1" comment="kernel-livepatch-4_12_14-23-default is &gt;=5-13.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711942" version="1" comment="kernel-livepatch-4_12_14-25_13-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711943" version="1" comment="kernel-livepatch-4_12_14-25_16-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711944" version="1" comment="kernel-default is ==4.12.14-25.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711945" version="1" comment="kernel-livepatch-4_12_14-25_19-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711946" version="1" comment="kernel-livepatch-4_12_14-25_3-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711947" version="1" comment="kernel-livepatch-4_12_14-25_6-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825397" version="1" comment="bpftool is &lt;3.10.0-957.1.3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825398" version="1" comment="kernel is &lt;3.10.0-957.1.3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825399" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-957.1.3.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825400" version="1" comment="kernel-debug is &lt;3.10.0-957.1.3.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825403" version="1" comment="kernel-doc is &lt;3.10.0-957.1.3.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825404" version="1" comment="kernel-headers is &lt;3.10.0-957.1.3.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825405" version="1" comment="kernel-tools is &lt;3.10.0-957.1.3.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825406" version="1" comment="kernel-tools-libs is &lt;3.10.0-957.1.3.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825408" version="1" comment="perf is &lt;3.10.0-957.1.3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825409" version="1" comment="python-perf is &lt;3.10.0-957.1.3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824564" version="1" comment="kernel is &lt;3.10.0-862.14.4.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824565" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-862.14.4.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824566" version="1" comment="kernel-debug is &lt;3.10.0-862.14.4.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824569" version="1" comment="kernel-doc is &lt;3.10.0-862.14.4.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824570" version="1" comment="kernel-headers is &lt;3.10.0-862.14.4.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824571" version="1" comment="kernel-tools is &lt;3.10.0-862.14.4.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824572" version="1" comment="kernel-tools-libs is &lt;3.10.0-862.14.4.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824574" version="1" comment="perf is &lt;3.10.0-862.14.4.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824575" version="1" comment="python-perf is &lt;3.10.0-862.14.4.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826020" version="1" comment="python is &lt;2.7.5-86.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826021" version="1" comment="python-debug is &lt;2.7.5-86.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826022" version="1" comment="python-devel is &lt;2.7.5-86.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826023" version="1" comment="python-libs is &lt;2.7.5-86.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826024" version="1" comment="python-test is &lt;2.7.5-86.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826025" version="1" comment="python-tools is &lt;2.7.5-86.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826026" version="1" comment="tkinter is &lt;2.7.5-86.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824839" version="1" comment="389-ds-base is &lt;1.3.8.4-15.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824840" version="1" comment="389-ds-base-devel is &lt;1.3.8.4-15.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824841" version="1" comment="389-ds-base-libs is &lt;1.3.8.4-15.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824842" version="1" comment="389-ds-base-snmp is &lt;1.3.8.4-15.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825410" version="1" comment="sos-collector is &lt;1.5-3.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825365" version="1" comment="xorg-x11-server-Xdmx is &lt;1.20.1-5.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825366" version="1" comment="xorg-x11-server-Xephyr is &lt;1.20.1-5.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825367" version="1" comment="xorg-x11-server-Xnest is &lt;1.20.1-5.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825368" version="1" comment="xorg-x11-server-Xorg is &lt;1.20.1-5.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825369" version="1" comment="xorg-x11-server-Xvfb is &lt;1.20.1-5.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825370" version="1" comment="xorg-x11-server-Xwayland is &lt;1.20.1-5.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825371" version="1" comment="xorg-x11-server-common is &lt;1.20.1-5.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825372" version="1" comment="xorg-x11-server-devel is &lt;1.20.1-5.1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825373" version="1" comment="xorg-x11-server-source is &lt;1.20.1-5.1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825333" version="1" comment="libmspack is &lt;0.5-0.6.alpha.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825334" version="1" comment="libmspack-devel is &lt;0.5-0.6.alpha.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711948" version="1" comment="kgraft-patch-4_4_132-94_33-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711949" version="1" comment="kgraft-patch-4_4_138-94_39-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711950" version="1" comment="kgraft-patch-4_4_140-94_42-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711951" version="1" comment="kernel-default is &lt;4.4.140-94.42.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711952" version="1" comment="kernel-livepatch-4_12_14-23-default is &gt;=10-28.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711953" version="1" comment="kernel-livepatch-4_12_14-25_3-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825463" version="1" comment="libvncserver is &lt;0.9.9-13.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825464" version="1" comment="libvncserver-devel is &lt;0.9.9-13.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711954" version="1" comment="kernel-livepatch-4_12_14-23-default is &gt;=3-7.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711955" version="1" comment="kernel-livepatch-4_12_14-25_3-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826365" version="1" comment="openssh is &lt;7.4p1-21.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826366" version="1" comment="openssh-askpass is &lt;7.4p1-21.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826367" version="1" comment="openssh-cavs is &lt;7.4p1-21.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826368" version="1" comment="openssh-clients is &lt;7.4p1-21.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826369" version="1" comment="openssh-keycat is &lt;7.4p1-21.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826370" version="1" comment="openssh-ldap is &lt;7.4p1-21.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826371" version="1" comment="openssh-server is &lt;7.4p1-21.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826372" version="1" comment="openssh-server-sysvinit is &lt;7.4p1-21.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826373" version="1" comment="pam_ssh_agent_auth is &lt;0.10.3-2.21.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827834" version="1" comment="qt is &lt;4.8.7-8.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827835" version="1" comment="qt-assistant is &lt;4.8.7-8.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827836" version="1" comment="qt-config is &lt;4.8.7-8.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827837" version="1" comment="qt-demos is &lt;4.8.7-8.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827838" version="1" comment="qt-devel is &lt;4.8.7-8.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827839" version="1" comment="qt-devel-private is &lt;4.8.7-8.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827840" version="1" comment="qt-doc is &lt;4.8.7-8.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827841" version="1" comment="qt-examples is &lt;4.8.7-8.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827842" version="1" comment="qt-mysql is &lt;4.8.7-8.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827843" version="1" comment="qt-odbc is &lt;4.8.7-8.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827844" version="1" comment="qt-postgresql is &lt;4.8.7-8.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827845" version="1" comment="qt-qdbusviewer is &lt;4.8.7-8.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827846" version="1" comment="qt-qvfb is &lt;4.8.7-8.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827847" version="1" comment="qt-x11 is &lt;4.8.7-8.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826222" version="1" comment="qt5-assistant is &lt;5.9.7-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826223" version="1" comment="qt5-designer is &lt;5.9.7-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826224" version="1" comment="qt5-doctools is &lt;5.9.7-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826225" version="1" comment="qt5-linguist is &lt;5.9.7-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826226" version="1" comment="qt5-qdbusviewer is &lt;5.9.7-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826227" version="1" comment="qt5-qt3d is &lt;5.9.7-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826228" version="1" comment="qt5-qt3d-devel is &lt;5.9.7-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826229" version="1" comment="qt5-qt3d-doc is &lt;5.9.7-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826230" version="1" comment="qt5-qt3d-examples is &lt;5.9.7-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826231" version="1" comment="qt5-qtbase is &lt;5.9.7-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826232" version="1" comment="qt5-qtbase-common is &lt;5.9.7-2.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826233" version="1" comment="qt5-qtbase-devel is &lt;5.9.7-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826234" version="1" comment="qt5-qtbase-doc is &lt;5.9.7-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826235" version="1" comment="qt5-qtbase-examples is &lt;5.9.7-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826236" version="1" comment="qt5-qtbase-gui is &lt;5.9.7-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826237" version="1" comment="qt5-qtbase-mysql is &lt;5.9.7-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826238" version="1" comment="qt5-qtbase-odbc is &lt;5.9.7-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826239" version="1" comment="qt5-qtbase-postgresql is &lt;5.9.7-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826240" version="1" comment="qt5-qtbase-static is &lt;5.9.7-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826241" version="1" comment="qt5-qtcanvas3d is &lt;5.9.7-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826242" version="1" comment="qt5-qtcanvas3d-doc is &lt;5.9.7-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826243" version="1" comment="qt5-qtcanvas3d-examples is &lt;5.9.7-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826244" version="1" comment="qt5-qtconnectivity is &lt;5.9.7-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826245" version="1" comment="qt5-qtconnectivity-devel is &lt;5.9.7-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826246" version="1" comment="qt5-qtconnectivity-doc is &lt;5.9.7-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826247" version="1" comment="qt5-qtconnectivity-examples is &lt;5.9.7-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826248" version="1" comment="qt5-qtdeclarative is &lt;5.9.7-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826249" version="1" comment="qt5-qtdeclarative-devel is &lt;5.9.7-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826250" version="1" comment="qt5-qtdeclarative-doc is &lt;5.9.7-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826251" version="1" comment="qt5-qtdeclarative-examples is &lt;5.9.7-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826252" version="1" comment="qt5-qtdeclarative-static is &lt;5.9.7-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826253" version="1" comment="qt5-qtdoc is &lt;5.9.7-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826254" version="1" comment="qt5-qtgraphicaleffects is &lt;5.9.7-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826255" version="1" comment="qt5-qtgraphicaleffects-doc is &lt;5.9.7-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826256" version="1" comment="qt5-qtimageformats is &lt;5.9.7-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826257" version="1" comment="qt5-qtimageformats-doc is &lt;5.9.7-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826258" version="1" comment="qt5-qtlocation is &lt;5.9.7-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826259" version="1" comment="qt5-qtlocation-devel is &lt;5.9.7-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826260" version="1" comment="qt5-qtlocation-doc is &lt;5.9.7-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826261" version="1" comment="qt5-qtlocation-examples is &lt;5.9.7-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826262" version="1" comment="qt5-qtmultimedia is &lt;5.9.7-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826263" version="1" comment="qt5-qtmultimedia-devel is &lt;5.9.7-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826264" version="1" comment="qt5-qtmultimedia-doc is &lt;5.9.7-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826265" version="1" comment="qt5-qtmultimedia-examples is &lt;5.9.7-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826266" version="1" comment="qt5-qtquickcontrols is &lt;5.9.7-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826267" version="1" comment="qt5-qtquickcontrols-doc is &lt;5.9.7-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826268" version="1" comment="qt5-qtquickcontrols-examples is &lt;5.9.7-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826269" version="1" comment="qt5-qtquickcontrols2 is &lt;5.9.7-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826270" version="1" comment="qt5-qtquickcontrols2-devel is &lt;5.9.7-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826271" version="1" comment="qt5-qtquickcontrols2-doc is &lt;5.9.7-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826272" version="1" comment="qt5-qtquickcontrols2-examples is &lt;5.9.7-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826273" version="1" comment="qt5-qtscript is &lt;5.9.7-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826274" version="1" comment="qt5-qtscript-devel is &lt;5.9.7-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826275" version="1" comment="qt5-qtscript-doc is &lt;5.9.7-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826276" version="1" comment="qt5-qtscript-examples is &lt;5.9.7-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826277" version="1" comment="qt5-qtsensors is &lt;5.9.7-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826278" version="1" comment="qt5-qtsensors-devel is &lt;5.9.7-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826279" version="1" comment="qt5-qtsensors-doc is &lt;5.9.7-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826280" version="1" comment="qt5-qtsensors-examples is &lt;5.9.7-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826281" version="1" comment="qt5-qtserialbus is &lt;5.9.7-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826282" version="1" comment="qt5-qtserialbus-devel is &lt;5.9.7-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826283" version="1" comment="qt5-qtserialbus-doc is &lt;5.9.7-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826284" version="1" comment="qt5-qtserialbus-examples is &lt;5.9.7-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826285" version="1" comment="qt5-qtserialport is &lt;5.9.7-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826286" version="1" comment="qt5-qtserialport-devel is &lt;5.9.7-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826287" version="1" comment="qt5-qtserialport-doc is &lt;5.9.7-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826288" version="1" comment="qt5-qtserialport-examples is &lt;5.9.7-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826289" version="1" comment="qt5-qtsvg is &lt;5.9.7-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826290" version="1" comment="qt5-qtsvg-devel is &lt;5.9.7-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826291" version="1" comment="qt5-qtsvg-doc is &lt;5.9.7-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826292" version="1" comment="qt5-qtsvg-examples is &lt;5.9.7-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826293" version="1" comment="qt5-qttools is &lt;5.9.7-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826294" version="1" comment="qt5-qttools-common is &lt;5.9.7-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826295" version="1" comment="qt5-qttools-devel is &lt;5.9.7-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826296" version="1" comment="qt5-qttools-doc is &lt;5.9.7-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826297" version="1" comment="qt5-qttools-examples is &lt;5.9.7-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826298" version="1" comment="qt5-qttools-libs-designer is &lt;5.9.7-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826299" version="1" comment="qt5-qttools-libs-designercomponents is &lt;5.9.7-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826300" version="1" comment="qt5-qttools-libs-help is &lt;5.9.7-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826301" version="1" comment="qt5-qttools-static is &lt;5.9.7-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826302" version="1" comment="qt5-qttranslations is &lt;5.9.7-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826303" version="1" comment="qt5-qtwayland is &lt;5.9.7-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826304" version="1" comment="qt5-qtwayland-devel is &lt;5.9.7-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826305" version="1" comment="qt5-qtwayland-doc is &lt;5.9.7-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826306" version="1" comment="qt5-qtwayland-examples is &lt;5.9.7-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826307" version="1" comment="qt5-qtwebchannel is &lt;5.9.7-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826308" version="1" comment="qt5-qtwebchannel-devel is &lt;5.9.7-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826309" version="1" comment="qt5-qtwebchannel-doc is &lt;5.9.7-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826310" version="1" comment="qt5-qtwebchannel-examples is &lt;5.9.7-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826311" version="1" comment="qt5-qtwebsockets is &lt;5.9.7-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826312" version="1" comment="qt5-qtwebsockets-devel is &lt;5.9.7-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826313" version="1" comment="qt5-qtwebsockets-doc is &lt;5.9.7-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826314" version="1" comment="qt5-qtwebsockets-examples is &lt;5.9.7-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826315" version="1" comment="qt5-qtx11extras is &lt;5.9.7-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826316" version="1" comment="qt5-qtx11extras-devel is &lt;5.9.7-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826317" version="1" comment="qt5-qtx11extras-doc is &lt;5.9.7-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826318" version="1" comment="qt5-qtxmlpatterns is &lt;5.9.7-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826319" version="1" comment="qt5-qtxmlpatterns-devel is &lt;5.9.7-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826320" version="1" comment="qt5-qtxmlpatterns-doc is &lt;5.9.7-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826321" version="1" comment="qt5-qtxmlpatterns-examples is &lt;5.9.7-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826322" version="1" comment="qt5-rpm-macros is &lt;5.9.7-2.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827697" version="1" comment="atk is &lt;2.28.1-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827698" version="1" comment="atk-devel is &lt;2.28.1-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827699" version="1" comment="evolution is &lt;3.28.5-8.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827700" version="1" comment="evolution-bogofilter is &lt;3.28.5-8.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827701" version="1" comment="evolution-data-server is &lt;3.28.5-4.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827702" version="1" comment="evolution-data-server-devel is &lt;3.28.5-4.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827703" version="1" comment="evolution-data-server-doc is &lt;3.28.5-4.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827704" version="1" comment="evolution-data-server-langpacks is &lt;3.28.5-4.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827705" version="1" comment="evolution-data-server-perl is &lt;3.28.5-4.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827706" version="1" comment="evolution-data-server-tests is &lt;3.28.5-4.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827707" version="1" comment="evolution-devel is &lt;3.28.5-8.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827708" version="1" comment="evolution-devel-docs is &lt;3.28.5-8.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827709" version="1" comment="evolution-ews is &lt;3.28.5-5.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827710" version="1" comment="evolution-ews-langpacks is &lt;3.28.5-5.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827711" version="1" comment="evolution-help is &lt;3.28.5-8.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827712" version="1" comment="evolution-langpacks is &lt;3.28.5-8.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827713" version="1" comment="evolution-pst is &lt;3.28.5-8.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827714" version="1" comment="evolution-spamassassin is &lt;3.28.5-8.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826149" version="1" comment="libgudev1 is &lt;219-67.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826150" version="1" comment="libgudev1-devel is &lt;219-67.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826151" version="1" comment="systemd is &lt;219-67.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826152" version="1" comment="systemd-devel is &lt;219-67.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826153" version="1" comment="systemd-journal-gateway is &lt;219-67.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826154" version="1" comment="systemd-libs is &lt;219-67.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826155" version="1" comment="systemd-networkd is &lt;219-67.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826156" version="1" comment="systemd-python is &lt;219-67.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826157" version="1" comment="systemd-resolved is &lt;219-67.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826158" version="1" comment="systemd-sysv is &lt;219-67.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825411" version="1" comment="NetworkManager is &lt;1.12.0-8.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825412" version="1" comment="NetworkManager-adsl is &lt;1.12.0-8.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825413" version="1" comment="NetworkManager-bluetooth is &lt;1.12.0-8.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825414" version="1" comment="NetworkManager-config-server is &lt;1.12.0-8.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825415" version="1" comment="NetworkManager-dispatcher-routing-rules is &lt;1.12.0-8.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825416" version="1" comment="NetworkManager-glib is &lt;1.12.0-8.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825417" version="1" comment="NetworkManager-glib-devel is &lt;1.12.0-8.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825418" version="1" comment="NetworkManager-libnm is &lt;1.12.0-8.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825419" version="1" comment="NetworkManager-libnm-devel is &lt;1.12.0-8.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825420" version="1" comment="NetworkManager-ovs is &lt;1.12.0-8.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825421" version="1" comment="NetworkManager-ppp is &lt;1.12.0-8.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825422" version="1" comment="NetworkManager-team is &lt;1.12.0-8.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825423" version="1" comment="NetworkManager-tui is &lt;1.12.0-8.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825424" version="1" comment="NetworkManager-wifi is &lt;1.12.0-8.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825425" version="1" comment="NetworkManager-wwan is &lt;1.12.0-8.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825453" version="1" comment="libgudev1 is &lt;219-62.el7_6.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825454" version="1" comment="libgudev1-devel is &lt;219-62.el7_6.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825455" version="1" comment="systemd is &lt;219-62.el7_6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825456" version="1" comment="systemd-devel is &lt;219-62.el7_6.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825457" version="1" comment="systemd-journal-gateway is &lt;219-62.el7_6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825458" version="1" comment="systemd-libs is &lt;219-62.el7_6.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825459" version="1" comment="systemd-networkd is &lt;219-62.el7_6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825460" version="1" comment="systemd-python is &lt;219-62.el7_6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825461" version="1" comment="systemd-resolved is &lt;219-62.el7_6.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825462" version="1" comment="systemd-sysv is &lt;219-62.el7_6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828261" version="1" comment="qemu-img is &lt;1.5.3-175.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828262" version="1" comment="qemu-kvm is &lt;1.5.3-175.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828263" version="1" comment="qemu-kvm-common is &lt;1.5.3-175.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828264" version="1" comment="qemu-kvm-tools is &lt;1.5.3-175.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825392" version="1" comment="ghostscript is &lt;9.07-31.el7_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825393" version="1" comment="ghostscript-cups is &lt;9.07-31.el7_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825394" version="1" comment="ghostscript-devel is &lt;9.07-31.el7_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825395" version="1" comment="ghostscript-doc is &lt;9.07-31.el7_6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825396" version="1" comment="ghostscript-gtk is &lt;9.07-31.el7_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825447" version="1" comment="ghostscript is &lt;9.07-31.el7_6.6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825448" version="1" comment="ghostscript-cups is &lt;9.07-31.el7_6.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825449" version="1" comment="ghostscript-devel is &lt;9.07-31.el7_6.6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825450" version="1" comment="ghostscript-doc is &lt;9.07-31.el7_6.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825451" version="1" comment="ghostscript-gtk is &lt;9.07-31.el7_6.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826462" version="1" comment="elfutils is &lt;0.176-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826463" version="1" comment="elfutils-default-yama-scope is &lt;0.176-2.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826464" version="1" comment="elfutils-devel is &lt;0.176-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826465" version="1" comment="elfutils-devel-static is &lt;0.176-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826466" version="1" comment="elfutils-libelf is &lt;0.176-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826467" version="1" comment="elfutils-libelf-devel is &lt;0.176-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826468" version="1" comment="elfutils-libelf-devel-static is &lt;0.176-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826469" version="1" comment="elfutils-libs is &lt;0.176-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826386" version="1" comment="opensc is &lt;0.19.0-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825426" version="1" comment="ruby is &lt;2.0.0.648-34.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825427" version="1" comment="ruby-devel is &lt;2.0.0.648-34.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825428" version="1" comment="ruby-doc is &lt;2.0.0.648-34.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825429" version="1" comment="ruby-irb is &lt;2.0.0.648-34.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825430" version="1" comment="ruby-libs is &lt;2.0.0.648-34.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825431" version="1" comment="ruby-tcltk is &lt;2.0.0.648-34.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825432" version="1" comment="rubygem-bigdecimal is &lt;1.2.0-34.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825433" version="1" comment="rubygem-io-console is &lt;0.4.2-34.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825434" version="1" comment="rubygem-json is &lt;1.7.7-34.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825435" version="1" comment="rubygem-minitest is &lt;4.3.2-34.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825436" version="1" comment="rubygem-psych is &lt;2.0.0-34.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825437" version="1" comment="rubygem-rake is &lt;0.9.6-34.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825438" version="1" comment="rubygem-rdoc is &lt;4.0.0-34.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825439" version="1" comment="rubygems is &lt;2.0.14.1-34.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825440" version="1" comment="rubygems-devel is &lt;2.0.14.1-34.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825522" version="1" comment="ghostscript is &lt;9.07-31.el7_6.9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825523" version="1" comment="ghostscript-cups is &lt;9.07-31.el7_6.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825524" version="1" comment="ghostscript-devel is &lt;9.07-31.el7_6.9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825525" version="1" comment="ghostscript-doc is &lt;9.07-31.el7_6.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825526" version="1" comment="ghostscript-gtk is &lt;9.07-31.el7_6.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826459" version="1" comment="zziplib is &lt;0.13.62-11.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826460" version="1" comment="zziplib-devel is &lt;0.13.62-11.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826461" version="1" comment="zziplib-utils is &lt;0.13.62-11.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825972" version="1" comment="evince is &lt;3.28.2-8.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825973" version="1" comment="evince-browser-plugin is &lt;3.28.2-8.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825974" version="1" comment="evince-devel is &lt;3.28.2-8.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825975" version="1" comment="evince-dvi is &lt;3.28.2-8.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825976" version="1" comment="evince-libs is &lt;3.28.2-8.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825977" version="1" comment="evince-nautilus is &lt;3.28.2-8.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825978" version="1" comment="okular is &lt;4.10.5-7.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825979" version="1" comment="okular-devel is &lt;4.10.5-7.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825980" version="1" comment="okular-libs is &lt;4.10.5-7.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825981" version="1" comment="okular-part is &lt;4.10.5-7.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825982" version="1" comment="poppler is &lt;0.26.5-38.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825983" version="1" comment="poppler-cpp is &lt;0.26.5-38.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825984" version="1" comment="poppler-cpp-devel is &lt;0.26.5-38.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825985" version="1" comment="poppler-demos is &lt;0.26.5-38.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825986" version="1" comment="poppler-devel is &lt;0.26.5-38.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825987" version="1" comment="poppler-glib is &lt;0.26.5-38.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825988" version="1" comment="poppler-glib-devel is &lt;0.26.5-38.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825989" version="1" comment="poppler-qt is &lt;0.26.5-38.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825990" version="1" comment="poppler-qt-devel is &lt;0.26.5-38.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825991" version="1" comment="poppler-utils is &lt;0.26.5-38.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826413" version="1" comment="libipa_hbac is &lt;1.16.4-21.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826414" version="1" comment="libipa_hbac-devel is &lt;1.16.4-21.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826415" version="1" comment="libsss_autofs is &lt;1.16.4-21.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826416" version="1" comment="libsss_certmap is &lt;1.16.4-21.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826417" version="1" comment="libsss_certmap-devel is &lt;1.16.4-21.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826418" version="1" comment="libsss_idmap is &lt;1.16.4-21.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826419" version="1" comment="libsss_idmap-devel is &lt;1.16.4-21.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826420" version="1" comment="libsss_nss_idmap is &lt;1.16.4-21.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826421" version="1" comment="libsss_nss_idmap-devel is &lt;1.16.4-21.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826422" version="1" comment="libsss_simpleifp is &lt;1.16.4-21.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826423" version="1" comment="libsss_simpleifp-devel is &lt;1.16.4-21.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826424" version="1" comment="libsss_sudo is &lt;1.16.4-21.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826425" version="1" comment="python-libipa_hbac is &lt;1.16.4-21.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826426" version="1" comment="python-libsss_nss_idmap is &lt;1.16.4-21.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826427" version="1" comment="python-sss is &lt;1.16.4-21.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826428" version="1" comment="python-sss-murmur is &lt;1.16.4-21.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826429" version="1" comment="python-sssdconfig is &lt;1.16.4-21.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826430" version="1" comment="sssd is &lt;1.16.4-21.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826431" version="1" comment="sssd-ad is &lt;1.16.4-21.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826432" version="1" comment="sssd-client is &lt;1.16.4-21.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826433" version="1" comment="sssd-common is &lt;1.16.4-21.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826434" version="1" comment="sssd-common-pac is &lt;1.16.4-21.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826435" version="1" comment="sssd-dbus is &lt;1.16.4-21.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826436" version="1" comment="sssd-ipa is &lt;1.16.4-21.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826437" version="1" comment="sssd-kcm is &lt;1.16.4-21.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826438" version="1" comment="sssd-krb5 is &lt;1.16.4-21.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826439" version="1" comment="sssd-krb5-common is &lt;1.16.4-21.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826440" version="1" comment="sssd-ldap is &lt;1.16.4-21.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826441" version="1" comment="sssd-libwbclient is &lt;1.16.4-21.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826442" version="1" comment="sssd-libwbclient-devel is &lt;1.16.4-21.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826443" version="1" comment="sssd-polkit-rules is &lt;1.16.4-21.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826444" version="1" comment="sssd-proxy is &lt;1.16.4-21.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826445" version="1" comment="sssd-tools is &lt;1.16.4-21.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826446" version="1" comment="sssd-winbind-idmap is &lt;1.16.4-21.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826453" version="1" comment="curl is &lt;7.29.0-54.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826454" version="1" comment="libcurl is &lt;7.29.0-54.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826455" version="1" comment="libcurl-devel is &lt;7.29.0-54.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825441" version="1" comment="ghostscript is &lt;9.07-31.el7_6.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825442" version="1" comment="ghostscript-cups is &lt;9.07-31.el7_6.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825443" version="1" comment="ghostscript-devel is &lt;9.07-31.el7_6.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825444" version="1" comment="ghostscript-doc is &lt;9.07-31.el7_6.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825445" version="1" comment="ghostscript-gtk is &lt;9.07-31.el7_6.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711956" version="1" comment="kernel-default is ==4.12.14-94.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711957" version="1" comment="kgraft-patch-4_12_14-94_41-default is &gt;=9-2.25.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711958" version="1" comment="kernel-default is ==4.12.14-95.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711959" version="1" comment="kgraft-patch-4_12_14-95_3-default is &gt;=8-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711960" version="1" comment="kernel-default is ==4.12.14-95.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711961" version="1" comment="kgraft-patch-4_12_14-95_6-default is &gt;=7-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711962" version="1" comment="kernel-default is &lt;4.12.14-95.6.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711963" version="1" comment="kernel-default is ==4.12.14-25.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711964" version="1" comment="kernel-livepatch-4_12_14-25_28-default is &gt;=7-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711965" version="1" comment="kernel-default is &lt;4.12.14-25.28.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825932" version="1" comment="bpftool is &lt;3.10.0-957.27.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825933" version="1" comment="kernel is &lt;3.10.0-957.27.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825934" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-957.27.2.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825935" version="1" comment="kernel-debug is &lt;3.10.0-957.27.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825938" version="1" comment="kernel-doc is &lt;3.10.0-957.27.2.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825939" version="1" comment="kernel-headers is &lt;3.10.0-957.27.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825940" version="1" comment="kernel-tools is &lt;3.10.0-957.27.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825941" version="1" comment="kernel-tools-libs is &lt;3.10.0-957.27.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825943" version="1" comment="perf is &lt;3.10.0-957.27.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825944" version="1" comment="python-perf is &lt;3.10.0-957.27.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826191" version="1" comment="rsyslog is &lt;8.24.0-38.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826192" version="1" comment="rsyslog-crypto is &lt;8.24.0-38.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826193" version="1" comment="rsyslog-doc is &lt;8.24.0-38.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826194" version="1" comment="rsyslog-elasticsearch is &lt;8.24.0-38.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826195" version="1" comment="rsyslog-gnutls is &lt;8.24.0-38.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826196" version="1" comment="rsyslog-gssapi is &lt;8.24.0-38.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826197" version="1" comment="rsyslog-kafka is &lt;8.24.0-38.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826198" version="1" comment="rsyslog-libdbi is &lt;8.24.0-38.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826199" version="1" comment="rsyslog-mmaudit is &lt;8.24.0-38.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826200" version="1" comment="rsyslog-mmjsonparse is &lt;8.24.0-38.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826201" version="1" comment="rsyslog-mmkubernetes is &lt;8.24.0-38.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826202" version="1" comment="rsyslog-mmnormalize is &lt;8.24.0-38.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826203" version="1" comment="rsyslog-mmsnmptrapd is &lt;8.24.0-38.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826204" version="1" comment="rsyslog-mysql is &lt;8.24.0-38.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826205" version="1" comment="rsyslog-pgsql is &lt;8.24.0-38.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826206" version="1" comment="rsyslog-relp is &lt;8.24.0-38.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826207" version="1" comment="rsyslog-snmp is &lt;8.24.0-38.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826208" version="1" comment="rsyslog-udpspoof is &lt;8.24.0-38.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711966" version="1" comment="kgraft-patch-4_4_114-94_11-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711967" version="1" comment="kgraft-patch-4_4_114-94_14-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711968" version="1" comment="kgraft-patch-4_4_120-94_17-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711969" version="1" comment="kgraft-patch-4_4_126-94_22-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711970" version="1" comment="kgraft-patch-4_4_131-94_29-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711971" version="1" comment="kgraft-patch-4_4_132-94_33-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711972" version="1" comment="kgraft-patch-4_4_138-94_39-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711973" version="1" comment="kgraft-patch-4_4_140-94_42-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711974" version="1" comment="kgraft-patch-4_4_143-94_47-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711975" version="1" comment="kgraft-patch-4_4_155-94_50-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711976" version="1" comment="kgraft-patch-4_4_156-94_57-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711977" version="1" comment="kgraft-patch-4_4_156-94_61-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711978" version="1" comment="kgraft-patch-4_4_156-94_64-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711979" version="1" comment="kernel-default is ==4.4.162-94.69.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711980" version="1" comment="kgraft-patch-4_4_162-94_69-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711981" version="1" comment="kernel-default is ==4.4.162-94.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711982" version="1" comment="kgraft-patch-4_4_162-94_72-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711983" version="1" comment="kernel-default is &lt;4.4.162-94.72.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711984" version="1" comment="kgraft-patch-4_12_14-94_41-default is &gt;=3-2.7.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711985" version="1" comment="kgraft-patch-4_12_14-95_3-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711986" version="1" comment="kernel-default is &lt;4.12.14-95.3.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711987" version="1" comment="kernel-livepatch-4_12_14-23-default is &gt;=8-22.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711988" version="1" comment="kernel-livepatch-4_12_14-25_13-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711989" version="1" comment="kernel-livepatch-4_12_14-25_16-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711990" version="1" comment="kernel-livepatch-4_12_14-25_19-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711991" version="1" comment="kernel-default is ==4.12.14-25.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711992" version="1" comment="kernel-livepatch-4_12_14-25_22-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711993" version="1" comment="kernel-default is ==4.12.14-25.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711994" version="1" comment="kernel-livepatch-4_12_14-25_25-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711995" version="1" comment="kernel-livepatch-4_12_14-25_3-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711996" version="1" comment="kernel-livepatch-4_12_14-25_6-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826447" version="1" comment="libudisks2 is &lt;2.7.3-9.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826448" version="1" comment="libudisks2-devel is &lt;2.7.3-9.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826449" version="1" comment="udisks2 is &lt;2.7.3-9.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826450" version="1" comment="udisks2-iscsi is &lt;2.7.3-9.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826451" version="1" comment="udisks2-lsm is &lt;2.7.3-9.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826452" version="1" comment="udisks2-lvm2 is &lt;2.7.3-9.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827092" version="1" comment="texlive is &lt;2012-45.20130427_r30134.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827093" version="1" comment="texlive-adjustbox is &lt;svn26555.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827094" version="1" comment="texlive-adjustbox-doc is &lt;svn26555.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827095" version="1" comment="texlive-ae is &lt;svn15878.1.4-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827096" version="1" comment="texlive-ae-doc is &lt;svn15878.1.4-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827097" version="1" comment="texlive-algorithms is &lt;svn15878.0.1-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827098" version="1" comment="texlive-algorithms-doc is &lt;svn15878.0.1-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827099" version="1" comment="texlive-amscls is &lt;svn29207.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827100" version="1" comment="texlive-amscls-doc is &lt;svn29207.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827101" version="1" comment="texlive-amsfonts is &lt;svn29208.3.04-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827102" version="1" comment="texlive-amsfonts-doc is &lt;svn29208.3.04-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827103" version="1" comment="texlive-amsmath is &lt;svn29327.2.14-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827104" version="1" comment="texlive-amsmath-doc is &lt;svn29327.2.14-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827105" version="1" comment="texlive-anysize is &lt;svn15878.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827106" version="1" comment="texlive-anysize-doc is &lt;svn15878.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827107" version="1" comment="texlive-appendix is &lt;svn15878.1.2b-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827108" version="1" comment="texlive-appendix-doc is &lt;svn15878.1.2b-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827109" version="1" comment="texlive-arabxetex is &lt;svn17470.v1.1.4-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827110" version="1" comment="texlive-arabxetex-doc is &lt;svn17470.v1.1.4-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827111" version="1" comment="texlive-arphic is &lt;svn15878.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827112" version="1" comment="texlive-arphic-doc is &lt;svn15878.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827113" version="1" comment="texlive-attachfile is &lt;svn21866.v1.5b-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827114" version="1" comment="texlive-attachfile-doc is &lt;svn21866.v1.5b-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827115" version="1" comment="texlive-avantgar is &lt;svn28614.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827116" version="1" comment="texlive-babel is &lt;svn24756.3.8m-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827117" version="1" comment="texlive-babel-doc is &lt;svn24756.3.8m-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827118" version="1" comment="texlive-babelbib is &lt;svn25245.1.31-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827119" version="1" comment="texlive-babelbib-doc is &lt;svn25245.1.31-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827120" version="1" comment="texlive-base is &lt;2012-45.20130427_r30134.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827121" version="1" comment="texlive-beamer is &lt;svn29349.3.26-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827122" version="1" comment="texlive-beamer-doc is &lt;svn29349.3.26-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827123" version="1" comment="texlive-bera is &lt;svn20031.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827124" version="1" comment="texlive-bera-doc is &lt;svn20031.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827125" version="1" comment="texlive-beton is &lt;svn15878.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827126" version="1" comment="texlive-beton-doc is &lt;svn15878.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827127" version="1" comment="texlive-bibtex is &lt;svn26689.0.99d-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827128" version="1" comment="texlive-bibtex-bin is &lt;svn26509.0-45.20130427_r30134.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827129" version="1" comment="texlive-bibtex-doc is &lt;svn26689.0.99d-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827130" version="1" comment="texlive-bibtopic is &lt;svn15878.1.1a-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827131" version="1" comment="texlive-bibtopic-doc is &lt;svn15878.1.1a-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827132" version="1" comment="texlive-bidi is &lt;svn29650.12.2-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827133" version="1" comment="texlive-bidi-doc is &lt;svn29650.12.2-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827134" version="1" comment="texlive-bigfoot is &lt;svn15878.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827135" version="1" comment="texlive-bigfoot-doc is &lt;svn15878.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827136" version="1" comment="texlive-bookman is &lt;svn28614.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827137" version="1" comment="texlive-booktabs is &lt;svn15878.1.61803-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827138" version="1" comment="texlive-booktabs-doc is &lt;svn15878.1.61803-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827139" version="1" comment="texlive-breakurl is &lt;svn15878.1.30-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827140" version="1" comment="texlive-breakurl-doc is &lt;svn15878.1.30-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827141" version="1" comment="texlive-caption is &lt;svn29026.3.3__2013_02_03_-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827142" version="1" comment="texlive-caption-doc is &lt;svn29026.3.3__2013_02_03_-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827143" version="1" comment="texlive-carlisle is &lt;svn18258.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827144" version="1" comment="texlive-carlisle-doc is &lt;svn18258.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827145" version="1" comment="texlive-changebar is &lt;svn29349.3.5c-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827146" version="1" comment="texlive-changebar-doc is &lt;svn29349.3.5c-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827147" version="1" comment="texlive-changepage is &lt;svn15878.1.0c-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827148" version="1" comment="texlive-changepage-doc is &lt;svn15878.1.0c-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827149" version="1" comment="texlive-charter is &lt;svn15878.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827150" version="1" comment="texlive-charter-doc is &lt;svn15878.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827151" version="1" comment="texlive-chngcntr is &lt;svn17157.1.0a-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827152" version="1" comment="texlive-chngcntr-doc is &lt;svn17157.1.0a-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827153" version="1" comment="texlive-cite is &lt;svn19955.5.3-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827154" version="1" comment="texlive-cite-doc is &lt;svn19955.5.3-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827155" version="1" comment="texlive-cjk is &lt;svn26296.4.8.3-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827156" version="1" comment="texlive-cjk-doc is &lt;svn26296.4.8.3-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827157" version="1" comment="texlive-cm is &lt;svn29581.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827158" version="1" comment="texlive-cm-doc is &lt;svn29581.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827159" version="1" comment="texlive-cm-lgc is &lt;svn28250.0.5-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827160" version="1" comment="texlive-cm-lgc-doc is &lt;svn28250.0.5-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827161" version="1" comment="texlive-cm-super is &lt;svn15878.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827162" version="1" comment="texlive-cm-super-doc is &lt;svn15878.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827163" version="1" comment="texlive-cmap is &lt;svn26568.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827164" version="1" comment="texlive-cmap-doc is &lt;svn26568.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827165" version="1" comment="texlive-cmextra is &lt;svn14075.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827166" version="1" comment="texlive-cns is &lt;svn15878.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827167" version="1" comment="texlive-cns-doc is &lt;svn15878.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827168" version="1" comment="texlive-collectbox is &lt;svn26557.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827169" version="1" comment="texlive-collectbox-doc is &lt;svn26557.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827170" version="1" comment="texlive-collection-basic is &lt;svn26314.0-45.20130427_r30134.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827171" version="1" comment="texlive-collection-documentation-base is &lt;svn17091.0-45.20130427_r30134.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827172" version="1" comment="texlive-collection-fontsrecommended is &lt;svn28082.0-45.20130427_r30134.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827173" version="1" comment="texlive-collection-htmlxml is &lt;svn28251.0-45.20130427_r30134.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827174" version="1" comment="texlive-collection-latex is &lt;svn25030.0-45.20130427_r30134.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827175" version="1" comment="texlive-collection-latexrecommended is &lt;svn25795.0-45.20130427_r30134.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827176" version="1" comment="texlive-collection-xetex is &lt;svn29634.0-45.20130427_r30134.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827177" version="1" comment="texlive-colortbl is &lt;svn25394.v1.0a-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827178" version="1" comment="texlive-colortbl-doc is &lt;svn25394.v1.0a-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827179" version="1" comment="texlive-courier is &lt;svn28614.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827180" version="1" comment="texlive-crop is &lt;svn15878.1.5-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827181" version="1" comment="texlive-crop-doc is &lt;svn15878.1.5-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827182" version="1" comment="texlive-csquotes is &lt;svn24393.5.1d-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827183" version="1" comment="texlive-csquotes-doc is &lt;svn24393.5.1d-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827184" version="1" comment="texlive-ctable is &lt;svn26694.1.23-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827185" version="1" comment="texlive-ctable-doc is &lt;svn26694.1.23-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827186" version="1" comment="texlive-currfile is &lt;svn29012.0.7b-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827187" version="1" comment="texlive-currfile-doc is &lt;svn29012.0.7b-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827188" version="1" comment="texlive-datetime is &lt;svn19834.2.58-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827189" version="1" comment="texlive-datetime-doc is &lt;svn19834.2.58-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827190" version="1" comment="texlive-dvipdfm is &lt;svn26689.0.13.2d-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827191" version="1" comment="texlive-dvipdfm-bin is &lt;svn13663.0-45.20130427_r30134.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827192" version="1" comment="texlive-dvipdfm-doc is &lt;svn26689.0.13.2d-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827193" version="1" comment="texlive-dvipdfmx is &lt;svn26765.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827194" version="1" comment="texlive-dvipdfmx-bin is &lt;svn26509.0-45.20130427_r30134.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827195" version="1" comment="texlive-dvipdfmx-def is &lt;svn15878.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827196" version="1" comment="texlive-dvipdfmx-doc is &lt;svn26765.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827197" version="1" comment="texlive-dvipng is &lt;svn26689.1.14-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827198" version="1" comment="texlive-dvipng-bin is &lt;svn26509.0-45.20130427_r30134.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827199" version="1" comment="texlive-dvipng-doc is &lt;svn26689.1.14-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827200" version="1" comment="texlive-dvips is &lt;svn29585.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827201" version="1" comment="texlive-dvips-bin is &lt;svn26509.0-45.20130427_r30134.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827202" version="1" comment="texlive-dvips-doc is &lt;svn29585.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827203" version="1" comment="texlive-ec is &lt;svn25033.1.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827204" version="1" comment="texlive-ec-doc is &lt;svn25033.1.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827205" version="1" comment="texlive-eepic is &lt;svn15878.1.1e-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827206" version="1" comment="texlive-eepic-doc is &lt;svn15878.1.1e-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827207" version="1" comment="texlive-enctex is &lt;svn28602.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827208" version="1" comment="texlive-enctex-doc is &lt;svn28602.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827209" version="1" comment="texlive-enumitem is &lt;svn24146.3.5.2-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827210" version="1" comment="texlive-enumitem-doc is &lt;svn24146.3.5.2-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827211" version="1" comment="texlive-epsf is &lt;svn21461.2.7.4-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827212" version="1" comment="texlive-epsf-doc is &lt;svn21461.2.7.4-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827213" version="1" comment="texlive-epstopdf is &lt;svn26577.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827214" version="1" comment="texlive-epstopdf-bin is &lt;svn18336.0-45.20130427_r30134.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827215" version="1" comment="texlive-epstopdf-doc is &lt;svn26577.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827216" version="1" comment="texlive-eso-pic is &lt;svn21515.2.0c-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827217" version="1" comment="texlive-eso-pic-doc is &lt;svn21515.2.0c-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827218" version="1" comment="texlive-etex is &lt;svn22198.2.1-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827219" version="1" comment="texlive-etex-doc is &lt;svn22198.2.1-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827220" version="1" comment="texlive-etex-pkg is &lt;svn15878.2.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827221" version="1" comment="texlive-etex-pkg-doc is &lt;svn15878.2.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827222" version="1" comment="texlive-etoolbox is &lt;svn20922.2.1-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827223" version="1" comment="texlive-etoolbox-doc is &lt;svn20922.2.1-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827224" version="1" comment="texlive-euenc is &lt;svn19795.0.1h-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827225" version="1" comment="texlive-euenc-doc is &lt;svn19795.0.1h-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827226" version="1" comment="texlive-euler is &lt;svn17261.2.5-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827227" version="1" comment="texlive-euler-doc is &lt;svn17261.2.5-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827228" version="1" comment="texlive-euro is &lt;svn22191.1.1-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827229" version="1" comment="texlive-euro-doc is &lt;svn22191.1.1-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827230" version="1" comment="texlive-eurosym is &lt;svn17265.1.4_subrfix-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827231" version="1" comment="texlive-eurosym-doc is &lt;svn17265.1.4_subrfix-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827232" version="1" comment="texlive-extsizes is &lt;svn17263.1.4a-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827233" version="1" comment="texlive-extsizes-doc is &lt;svn17263.1.4a-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827234" version="1" comment="texlive-fancybox is &lt;svn18304.1.4-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827235" version="1" comment="texlive-fancybox-doc is &lt;svn18304.1.4-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827236" version="1" comment="texlive-fancyhdr is &lt;svn15878.3.1-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827237" version="1" comment="texlive-fancyhdr-doc is &lt;svn15878.3.1-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827238" version="1" comment="texlive-fancyref is &lt;svn15878.0.9c-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827239" version="1" comment="texlive-fancyref-doc is &lt;svn15878.0.9c-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827240" version="1" comment="texlive-fancyvrb is &lt;svn18492.2.8-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827241" version="1" comment="texlive-fancyvrb-doc is &lt;svn18492.2.8-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827242" version="1" comment="texlive-filecontents is &lt;svn24250.1.3-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827243" version="1" comment="texlive-filecontents-doc is &lt;svn24250.1.3-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827244" version="1" comment="texlive-filehook is &lt;svn24280.0.5d-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827245" version="1" comment="texlive-filehook-doc is &lt;svn24280.0.5d-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827246" version="1" comment="texlive-fix2col is &lt;svn17133.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827247" version="1" comment="texlive-fix2col-doc is &lt;svn17133.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827248" version="1" comment="texlive-fixlatvian is &lt;svn21631.1a-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827249" version="1" comment="texlive-fixlatvian-doc is &lt;svn21631.1a-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827250" version="1" comment="texlive-float is &lt;svn15878.1.3d-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827251" version="1" comment="texlive-float-doc is &lt;svn15878.1.3d-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827252" version="1" comment="texlive-fmtcount is &lt;svn28068.2.02-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827253" version="1" comment="texlive-fmtcount-doc is &lt;svn28068.2.02-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827254" version="1" comment="texlive-fncychap is &lt;svn20710.v1.34-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827255" version="1" comment="texlive-fncychap-doc is &lt;svn20710.v1.34-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827256" version="1" comment="texlive-fontbook is &lt;svn23608.0.2-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827257" version="1" comment="texlive-fontbook-doc is &lt;svn23608.0.2-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827258" version="1" comment="texlive-fontspec is &lt;svn29412.v2.3a-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827259" version="1" comment="texlive-fontspec-doc is &lt;svn29412.v2.3a-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827260" version="1" comment="texlive-fontware is &lt;svn26689.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827261" version="1" comment="texlive-fontware-bin is &lt;svn26509.0-45.20130427_r30134.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827262" version="1" comment="texlive-fontwrap is &lt;svn15878.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827263" version="1" comment="texlive-fontwrap-doc is &lt;svn15878.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827264" version="1" comment="texlive-footmisc is &lt;svn23330.5.5b-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827265" version="1" comment="texlive-footmisc-doc is &lt;svn23330.5.5b-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827266" version="1" comment="texlive-fp is &lt;svn15878.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827267" version="1" comment="texlive-fp-doc is &lt;svn15878.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827268" version="1" comment="texlive-fpl is &lt;svn15878.1.002-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827269" version="1" comment="texlive-fpl-doc is &lt;svn15878.1.002-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827270" version="1" comment="texlive-framed is &lt;svn26789.0.96-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827271" version="1" comment="texlive-framed-doc is &lt;svn26789.0.96-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827272" version="1" comment="texlive-garuda-c90 is &lt;svn15878.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827273" version="1" comment="texlive-geometry is &lt;svn19716.5.6-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827274" version="1" comment="texlive-geometry-doc is &lt;svn19716.5.6-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827275" version="1" comment="texlive-glyphlist is &lt;svn28576.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827276" version="1" comment="texlive-graphics is &lt;svn25405.1.0o-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827277" version="1" comment="texlive-graphics-doc is &lt;svn25405.1.0o-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827278" version="1" comment="texlive-gsftopk is &lt;svn26689.1.19.2-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827279" version="1" comment="texlive-gsftopk-bin is &lt;svn26509.0-45.20130427_r30134.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827280" version="1" comment="texlive-helvetic is &lt;svn28614.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827281" version="1" comment="texlive-hyperref is &lt;svn28213.6.83m-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827282" version="1" comment="texlive-hyperref-doc is &lt;svn28213.6.83m-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827283" version="1" comment="texlive-hyph-utf8 is &lt;svn29641.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827284" version="1" comment="texlive-hyph-utf8-doc is &lt;svn29641.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827285" version="1" comment="texlive-hyphen-base is &lt;svn29197.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827286" version="1" comment="texlive-hyphenat is &lt;svn15878.2.3c-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827287" version="1" comment="texlive-hyphenat-doc is &lt;svn15878.2.3c-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827288" version="1" comment="texlive-ifetex is &lt;svn24853.1.2-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827289" version="1" comment="texlive-ifetex-doc is &lt;svn24853.1.2-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827290" version="1" comment="texlive-ifluatex is &lt;svn26725.1.3-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827291" version="1" comment="texlive-ifluatex-doc is &lt;svn26725.1.3-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827292" version="1" comment="texlive-ifmtarg is &lt;svn19363.1.2a-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827293" version="1" comment="texlive-ifmtarg-doc is &lt;svn19363.1.2a-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827294" version="1" comment="texlive-ifoddpage is &lt;svn23979.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827295" version="1" comment="texlive-ifoddpage-doc is &lt;svn23979.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827296" version="1" comment="texlive-iftex is &lt;svn29654.0.2-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827297" version="1" comment="texlive-iftex-doc is &lt;svn29654.0.2-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827298" version="1" comment="texlive-ifxetex is &lt;svn19685.0.5-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827299" version="1" comment="texlive-ifxetex-doc is &lt;svn19685.0.5-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827300" version="1" comment="texlive-index is &lt;svn24099.4.1beta-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827301" version="1" comment="texlive-index-doc is &lt;svn24099.4.1beta-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827302" version="1" comment="texlive-jadetex is &lt;svn23409.3.13-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827303" version="1" comment="texlive-jadetex-bin is &lt;svn3006.0-45.20130427_r30134.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827304" version="1" comment="texlive-jadetex-doc is &lt;svn23409.3.13-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827305" version="1" comment="texlive-jknapltx is &lt;svn19440.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827306" version="1" comment="texlive-jknapltx-doc is &lt;svn19440.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827307" version="1" comment="texlive-kastrup is &lt;svn15878.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827308" version="1" comment="texlive-kastrup-doc is &lt;svn15878.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827309" version="1" comment="texlive-kerkis is &lt;svn15878.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827310" version="1" comment="texlive-kerkis-doc is &lt;svn15878.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827311" version="1" comment="texlive-koma-script is &lt;svn27255.3.11b-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827312" version="1" comment="texlive-kpathsea is &lt;svn28792.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827313" version="1" comment="texlive-kpathsea-bin is &lt;svn27347.0-45.20130427_r30134.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827314" version="1" comment="texlive-kpathsea-doc is &lt;svn28792.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827315" version="1" comment="texlive-kpathsea-lib is &lt;2012-45.20130427_r30134.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827316" version="1" comment="texlive-kpathsea-lib-devel is &lt;2012-45.20130427_r30134.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827317" version="1" comment="texlive-l3experimental is &lt;svn29361.SVN_4467-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827318" version="1" comment="texlive-l3experimental-doc is &lt;svn29361.SVN_4467-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827319" version="1" comment="texlive-l3kernel is &lt;svn29409.SVN_4469-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827320" version="1" comment="texlive-l3kernel-doc is &lt;svn29409.SVN_4469-45.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827321" version="1" comment="texlive-l3packages is &lt;svn29361.SVN_4467-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827322" version="1" comment="texlive-l3packages-doc is &lt;svn29361.SVN_4467-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827323" version="1" comment="texlive-lastpage is &lt;svn28985.1.2l-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827324" version="1" comment="texlive-lastpage-doc is &lt;svn28985.1.2l-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827325" version="1" comment="texlive-latex is &lt;svn27907.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827326" version="1" comment="texlive-latex-bin is &lt;svn26689.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827327" version="1" comment="texlive-latex-bin-bin is &lt;svn14050.0-45.20130427_r30134.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827328" version="1" comment="texlive-latex-doc is &lt;svn27907.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827329" version="1" comment="texlive-latex-fonts is &lt;svn28888.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827330" version="1" comment="texlive-latex-fonts-doc is &lt;svn28888.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827331" version="1" comment="texlive-latexconfig is &lt;svn28991.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827332" version="1" comment="texlive-lettrine is &lt;svn29391.1.64-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827333" version="1" comment="texlive-lettrine-doc is &lt;svn29391.1.64-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827334" version="1" comment="texlive-listings is &lt;svn15878.1.4-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827335" version="1" comment="texlive-listings-doc is &lt;svn15878.1.4-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827336" version="1" comment="texlive-lm is &lt;svn28119.2.004-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827337" version="1" comment="texlive-lm-doc is &lt;svn28119.2.004-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827338" version="1" comment="texlive-lm-math is &lt;svn29044.1.958-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827339" version="1" comment="texlive-lm-math-doc is &lt;svn29044.1.958-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827340" version="1" comment="texlive-ltxmisc is &lt;svn21927.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827341" version="1" comment="texlive-lua-alt-getopt is &lt;svn29349.0.7.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827342" version="1" comment="texlive-lua-alt-getopt-doc is &lt;svn29349.0.7.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827343" version="1" comment="texlive-lualatex-math is &lt;svn29346.1.2-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827344" version="1" comment="texlive-lualatex-math-doc is &lt;svn29346.1.2-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827345" version="1" comment="texlive-luaotfload is &lt;svn26718.1.26-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827346" version="1" comment="texlive-luaotfload-bin is &lt;svn18579.0-45.20130427_r30134.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827347" version="1" comment="texlive-luaotfload-doc is &lt;svn26718.1.26-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827348" version="1" comment="texlive-luatex is &lt;svn26689.0.70.1-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827349" version="1" comment="texlive-luatex-bin is &lt;svn26912.0-45.20130427_r30134.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827350" version="1" comment="texlive-luatex-doc is &lt;svn26689.0.70.1-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827351" version="1" comment="texlive-luatexbase is &lt;svn22560.0.31-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827352" version="1" comment="texlive-luatexbase-doc is &lt;svn22560.0.31-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827353" version="1" comment="texlive-makecmds is &lt;svn15878.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827354" version="1" comment="texlive-makecmds-doc is &lt;svn15878.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827355" version="1" comment="texlive-makeindex is &lt;svn26689.2.12-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827356" version="1" comment="texlive-makeindex-bin is &lt;svn26509.0-45.20130427_r30134.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827357" version="1" comment="texlive-makeindex-doc is &lt;svn26689.2.12-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827358" version="1" comment="texlive-marginnote is &lt;svn25880.v1.1i-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827359" version="1" comment="texlive-marginnote-doc is &lt;svn25880.v1.1i-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827360" version="1" comment="texlive-marvosym is &lt;svn29349.2.2a-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827361" version="1" comment="texlive-marvosym-doc is &lt;svn29349.2.2a-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827362" version="1" comment="texlive-mathpazo is &lt;svn15878.1.003-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827363" version="1" comment="texlive-mathpazo-doc is &lt;svn15878.1.003-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827364" version="1" comment="texlive-mathspec is &lt;svn15878.0.2-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827365" version="1" comment="texlive-mathspec-doc is &lt;svn15878.0.2-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827366" version="1" comment="texlive-mdwtools is &lt;svn15878.1.05.4-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827367" version="1" comment="texlive-mdwtools-doc is &lt;svn15878.1.05.4-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827368" version="1" comment="texlive-memoir is &lt;svn21638.3.6j_patch_6.0g-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827369" version="1" comment="texlive-memoir-doc is &lt;svn21638.3.6j_patch_6.0g-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827370" version="1" comment="texlive-metafont is &lt;svn26689.2.718281-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827371" version="1" comment="texlive-metafont-bin is &lt;svn26912.0-45.20130427_r30134.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827372" version="1" comment="texlive-metalogo is &lt;svn18611.0.12-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827373" version="1" comment="texlive-metalogo-doc is &lt;svn18611.0.12-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827374" version="1" comment="texlive-metapost is &lt;svn26689.1.212-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827375" version="1" comment="texlive-metapost-bin is &lt;svn26509.0-45.20130427_r30134.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827376" version="1" comment="texlive-metapost-doc is &lt;svn26689.1.212-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827377" version="1" comment="texlive-metapost-examples-doc is &lt;svn15878.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827378" version="1" comment="texlive-mflogo is &lt;svn17487.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827379" version="1" comment="texlive-mflogo-doc is &lt;svn17487.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827380" version="1" comment="texlive-mfnfss is &lt;svn19410.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827381" version="1" comment="texlive-mfnfss-doc is &lt;svn19410.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827382" version="1" comment="texlive-mfware is &lt;svn26689.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827383" version="1" comment="texlive-mfware-bin is &lt;svn26509.0-45.20130427_r30134.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827384" version="1" comment="texlive-mh is &lt;svn29420.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827385" version="1" comment="texlive-mh-doc is &lt;svn29420.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827386" version="1" comment="texlive-microtype is &lt;svn29392.2.5-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827387" version="1" comment="texlive-microtype-doc is &lt;svn29392.2.5-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827388" version="1" comment="texlive-misc is &lt;svn24955.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827389" version="1" comment="texlive-mnsymbol is &lt;svn18651.1.4-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827390" version="1" comment="texlive-mnsymbol-doc is &lt;svn18651.1.4-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827391" version="1" comment="texlive-mparhack is &lt;svn15878.1.4-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827392" version="1" comment="texlive-mparhack-doc is &lt;svn15878.1.4-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827393" version="1" comment="texlive-mptopdf is &lt;svn26689.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827394" version="1" comment="texlive-mptopdf-bin is &lt;svn18674.0-45.20130427_r30134.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827395" version="1" comment="texlive-ms is &lt;svn24467.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827396" version="1" comment="texlive-ms-doc is &lt;svn24467.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827397" version="1" comment="texlive-multido is &lt;svn18302.1.42-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827398" version="1" comment="texlive-multido-doc is &lt;svn18302.1.42-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827399" version="1" comment="texlive-multirow is &lt;svn17256.1.6-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827400" version="1" comment="texlive-multirow-doc is &lt;svn17256.1.6-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827401" version="1" comment="texlive-natbib is &lt;svn20668.8.31b-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827402" version="1" comment="texlive-natbib-doc is &lt;svn20668.8.31b-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827403" version="1" comment="texlive-ncctools is &lt;svn15878.3.5-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827404" version="1" comment="texlive-ncctools-doc is &lt;svn15878.3.5-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827405" version="1" comment="texlive-ncntrsbk is &lt;svn28614.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827406" version="1" comment="texlive-norasi-c90 is &lt;svn15878.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827407" version="1" comment="texlive-ntgclass is &lt;svn15878.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827408" version="1" comment="texlive-ntgclass-doc is &lt;svn15878.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827409" version="1" comment="texlive-oberdiek is &lt;svn26725.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827410" version="1" comment="texlive-oberdiek-doc is &lt;svn26725.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827411" version="1" comment="texlive-overpic is &lt;svn19712.0.53-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827412" version="1" comment="texlive-overpic-doc is &lt;svn19712.0.53-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827413" version="1" comment="texlive-palatino is &lt;svn28614.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827414" version="1" comment="texlive-paralist is &lt;svn15878.2.3b-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827415" version="1" comment="texlive-paralist-doc is &lt;svn15878.2.3b-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827416" version="1" comment="texlive-parallel is &lt;svn15878.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827417" version="1" comment="texlive-parallel-doc is &lt;svn15878.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827418" version="1" comment="texlive-parskip is &lt;svn19963.2.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827419" version="1" comment="texlive-parskip-doc is &lt;svn19963.2.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827420" version="1" comment="texlive-passivetex is &lt;svn15878.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827421" version="1" comment="texlive-pdfpages is &lt;svn27574.0.4t-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827422" version="1" comment="texlive-pdfpages-doc is &lt;svn27574.0.4t-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827423" version="1" comment="texlive-pdftex is &lt;svn29585.1.40.11-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827424" version="1" comment="texlive-pdftex-bin is &lt;svn27321.0-45.20130427_r30134.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827425" version="1" comment="texlive-pdftex-def is &lt;svn22653.0.06d-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827426" version="1" comment="texlive-pdftex-doc is &lt;svn29585.1.40.11-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827427" version="1" comment="texlive-pgf is &lt;svn22614.2.10-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827428" version="1" comment="texlive-pgf-doc is &lt;svn22614.2.10-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827429" version="1" comment="texlive-philokalia is &lt;svn18651.1.1-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827430" version="1" comment="texlive-philokalia-doc is &lt;svn18651.1.1-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827431" version="1" comment="texlive-placeins is &lt;svn19848.2.2-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827432" version="1" comment="texlive-placeins-doc is &lt;svn19848.2.2-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827433" version="1" comment="texlive-plain is &lt;svn26647.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827434" version="1" comment="texlive-polyglossia is &lt;svn26163.v1.2.1-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827435" version="1" comment="texlive-polyglossia-doc is &lt;svn26163.v1.2.1-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827436" version="1" comment="texlive-powerdot is &lt;svn25656.1.4i-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827437" version="1" comment="texlive-powerdot-doc is &lt;svn25656.1.4i-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827438" version="1" comment="texlive-preprint is &lt;svn16085.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827439" version="1" comment="texlive-preprint-doc is &lt;svn16085.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827440" version="1" comment="texlive-psfrag is &lt;svn15878.3.04-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827441" version="1" comment="texlive-psfrag-doc is &lt;svn15878.3.04-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827442" version="1" comment="texlive-pslatex is &lt;svn16416.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827443" version="1" comment="texlive-psnfss is &lt;svn23394.9.2a-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827444" version="1" comment="texlive-psnfss-doc is &lt;svn23394.9.2a-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827445" version="1" comment="texlive-pspicture is &lt;svn15878.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827446" version="1" comment="texlive-pspicture-doc is &lt;svn15878.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827447" version="1" comment="texlive-pst-3d is &lt;svn17257.1.10-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827448" version="1" comment="texlive-pst-3d-doc is &lt;svn17257.1.10-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827449" version="1" comment="texlive-pst-blur is &lt;svn15878.2.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827450" version="1" comment="texlive-pst-blur-doc is &lt;svn15878.2.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827451" version="1" comment="texlive-pst-coil is &lt;svn24020.1.06-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827452" version="1" comment="texlive-pst-coil-doc is &lt;svn24020.1.06-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827453" version="1" comment="texlive-pst-eps is &lt;svn15878.1.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827454" version="1" comment="texlive-pst-eps-doc is &lt;svn15878.1.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827455" version="1" comment="texlive-pst-fill is &lt;svn15878.1.01-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827456" version="1" comment="texlive-pst-fill-doc is &lt;svn15878.1.01-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827457" version="1" comment="texlive-pst-grad is &lt;svn15878.1.06-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827458" version="1" comment="texlive-pst-grad-doc is &lt;svn15878.1.06-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827459" version="1" comment="texlive-pst-math is &lt;svn20176.0.61-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827460" version="1" comment="texlive-pst-math-doc is &lt;svn20176.0.61-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827461" version="1" comment="texlive-pst-node is &lt;svn27799.1.25-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827462" version="1" comment="texlive-pst-node-doc is &lt;svn27799.1.25-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827463" version="1" comment="texlive-pst-plot is &lt;svn28729.1.44-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827464" version="1" comment="texlive-pst-plot-doc is &lt;svn28729.1.44-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827465" version="1" comment="texlive-pst-slpe is &lt;svn24391.1.31-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827466" version="1" comment="texlive-pst-slpe-doc is &lt;svn24391.1.31-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827467" version="1" comment="texlive-pst-text is &lt;svn15878.1.00-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827468" version="1" comment="texlive-pst-text-doc is &lt;svn15878.1.00-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827469" version="1" comment="texlive-pst-tree is &lt;svn24142.1.12-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827470" version="1" comment="texlive-pst-tree-doc is &lt;svn24142.1.12-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827471" version="1" comment="texlive-pstricks is &lt;svn29678.2.39-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827472" version="1" comment="texlive-pstricks-add is &lt;svn28750.3.59-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827473" version="1" comment="texlive-pstricks-add-doc is &lt;svn28750.3.59-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827474" version="1" comment="texlive-pstricks-doc is &lt;svn29678.2.39-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827475" version="1" comment="texlive-ptext is &lt;svn28124.1-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827476" version="1" comment="texlive-ptext-doc is &lt;svn28124.1-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827477" version="1" comment="texlive-pxfonts is &lt;svn15878.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827478" version="1" comment="texlive-pxfonts-doc is &lt;svn15878.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827479" version="1" comment="texlive-qstest is &lt;svn15878.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827480" version="1" comment="texlive-qstest-doc is &lt;svn15878.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827481" version="1" comment="texlive-rcs is &lt;svn15878.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827482" version="1" comment="texlive-rcs-doc is &lt;svn15878.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827483" version="1" comment="texlive-realscripts is &lt;svn29423.0.3b-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827484" version="1" comment="texlive-realscripts-doc is &lt;svn29423.0.3b-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827485" version="1" comment="texlive-rotating is &lt;svn16832.2.16b-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827486" version="1" comment="texlive-rotating-doc is &lt;svn16832.2.16b-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827487" version="1" comment="texlive-rsfs is &lt;svn15878.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827488" version="1" comment="texlive-rsfs-doc is &lt;svn15878.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827489" version="1" comment="texlive-sansmath is &lt;svn17997.1.1-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827490" version="1" comment="texlive-sansmath-doc is &lt;svn17997.1.1-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827491" version="1" comment="texlive-sauerj is &lt;svn15878.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827492" version="1" comment="texlive-sauerj-doc is &lt;svn15878.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827493" version="1" comment="texlive-scheme-basic is &lt;svn25923.0-45.20130427_r30134.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827494" version="1" comment="texlive-section is &lt;svn20180.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827495" version="1" comment="texlive-section-doc is &lt;svn20180.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827496" version="1" comment="texlive-sectsty is &lt;svn15878.2.0.2-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827497" version="1" comment="texlive-sectsty-doc is &lt;svn15878.2.0.2-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827498" version="1" comment="texlive-seminar is &lt;svn18322.1.5-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827499" version="1" comment="texlive-seminar-doc is &lt;svn18322.1.5-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827500" version="1" comment="texlive-sepnum is &lt;svn20186.2.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827501" version="1" comment="texlive-sepnum-doc is &lt;svn20186.2.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827502" version="1" comment="texlive-setspace is &lt;svn24881.6.7a-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827503" version="1" comment="texlive-setspace-doc is &lt;svn24881.6.7a-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827504" version="1" comment="texlive-showexpl is &lt;svn27790.v0.3j-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827505" version="1" comment="texlive-showexpl-doc is &lt;svn27790.v0.3j-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827506" version="1" comment="texlive-soul is &lt;svn15878.2.4-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827507" version="1" comment="texlive-soul-doc is &lt;svn15878.2.4-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827508" version="1" comment="texlive-stmaryrd is &lt;svn22027.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827509" version="1" comment="texlive-stmaryrd-doc is &lt;svn22027.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827510" version="1" comment="texlive-subfig is &lt;svn15878.1.3-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827511" version="1" comment="texlive-subfig-doc is &lt;svn15878.1.3-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827512" version="1" comment="texlive-subfigure is &lt;svn15878.2.1.5-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827513" version="1" comment="texlive-subfigure-doc is &lt;svn15878.2.1.5-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827514" version="1" comment="texlive-svn-prov is &lt;svn18017.3.1862-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827515" version="1" comment="texlive-svn-prov-doc is &lt;svn18017.3.1862-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827516" version="1" comment="texlive-symbol is &lt;svn28614.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827517" version="1" comment="texlive-t2 is &lt;svn29349.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827518" version="1" comment="texlive-t2-doc is &lt;svn29349.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827519" version="1" comment="texlive-tetex is &lt;svn29585.3.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827520" version="1" comment="texlive-tetex-bin is &lt;svn27344.0-45.20130427_r30134.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827521" version="1" comment="texlive-tetex-doc is &lt;svn29585.3.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827522" version="1" comment="texlive-tex is &lt;svn26689.3.1415926-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827523" version="1" comment="texlive-tex-bin is &lt;svn26912.0-45.20130427_r30134.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827524" version="1" comment="texlive-tex-gyre is &lt;svn18651.2.004-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827525" version="1" comment="texlive-tex-gyre-doc is &lt;svn18651.2.004-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827526" version="1" comment="texlive-tex-gyre-math is &lt;svn29045.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827527" version="1" comment="texlive-tex-gyre-math-doc is &lt;svn29045.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827528" version="1" comment="texlive-tex4ht is &lt;svn29474.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827529" version="1" comment="texlive-tex4ht-bin is &lt;svn26509.0-45.20130427_r30134.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827530" version="1" comment="texlive-tex4ht-doc is &lt;svn29474.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827531" version="1" comment="texlive-texconfig is &lt;svn29349.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827532" version="1" comment="texlive-texconfig-bin is &lt;svn27344.0-45.20130427_r30134.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827533" version="1" comment="texlive-texlive.infra is &lt;svn28217.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827534" version="1" comment="texlive-texlive.infra-bin is &lt;svn22566.0-45.20130427_r30134.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827535" version="1" comment="texlive-texlive.infra-doc is &lt;svn28217.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827536" version="1" comment="texlive-textcase is &lt;svn15878.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827537" version="1" comment="texlive-textcase-doc is &lt;svn15878.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827538" version="1" comment="texlive-textpos is &lt;svn28261.1.7h-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827539" version="1" comment="texlive-textpos-doc is &lt;svn28261.1.7h-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827540" version="1" comment="texlive-thailatex is &lt;svn29349.0.5.1-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827541" version="1" comment="texlive-thailatex-doc is &lt;svn29349.0.5.1-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827542" version="1" comment="texlive-threeparttable is &lt;svn17383.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827543" version="1" comment="texlive-threeparttable-doc is &lt;svn17383.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827544" version="1" comment="texlive-thumbpdf is &lt;svn26689.3.15-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827545" version="1" comment="texlive-thumbpdf-bin is &lt;svn6898.0-45.20130427_r30134.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827546" version="1" comment="texlive-thumbpdf-doc is &lt;svn26689.3.15-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827547" version="1" comment="texlive-times is &lt;svn28614.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827548" version="1" comment="texlive-tipa is &lt;svn29349.1.3-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827549" version="1" comment="texlive-tipa-doc is &lt;svn29349.1.3-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827550" version="1" comment="texlive-titlesec is &lt;svn24852.2.10.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827551" version="1" comment="texlive-titlesec-doc is &lt;svn24852.2.10.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827552" version="1" comment="texlive-titling is &lt;svn15878.2.1d-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827553" version="1" comment="texlive-titling-doc is &lt;svn15878.2.1d-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827554" version="1" comment="texlive-tocloft is &lt;svn20084.2.3e-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827555" version="1" comment="texlive-tocloft-doc is &lt;svn20084.2.3e-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827556" version="1" comment="texlive-tools is &lt;svn26263.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827557" version="1" comment="texlive-tools-doc is &lt;svn26263.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827558" version="1" comment="texlive-txfonts is &lt;svn15878.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827559" version="1" comment="texlive-txfonts-doc is &lt;svn15878.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827560" version="1" comment="texlive-type1cm is &lt;svn21820.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827561" version="1" comment="texlive-type1cm-doc is &lt;svn21820.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827562" version="1" comment="texlive-typehtml is &lt;svn17134.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827563" version="1" comment="texlive-typehtml-doc is &lt;svn17134.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827564" version="1" comment="texlive-ucharclasses is &lt;svn27820.2.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827565" version="1" comment="texlive-ucharclasses-doc is &lt;svn27820.2.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827566" version="1" comment="texlive-ucs is &lt;svn27549.2.1-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827567" version="1" comment="texlive-ucs-doc is &lt;svn27549.2.1-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827568" version="1" comment="texlive-uhc is &lt;svn16791.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827569" version="1" comment="texlive-uhc-doc is &lt;svn16791.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827570" version="1" comment="texlive-ulem is &lt;svn26785.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827571" version="1" comment="texlive-ulem-doc is &lt;svn26785.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827572" version="1" comment="texlive-underscore is &lt;svn18261.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827573" version="1" comment="texlive-underscore-doc is &lt;svn18261.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827574" version="1" comment="texlive-unicode-math is &lt;svn29413.0.7d-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827575" version="1" comment="texlive-unicode-math-doc is &lt;svn29413.0.7d-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827576" version="1" comment="texlive-unisugar is &lt;svn22357.0.92-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827577" version="1" comment="texlive-unisugar-doc is &lt;svn22357.0.92-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827578" version="1" comment="texlive-url is &lt;svn16864.3.2-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827579" version="1" comment="texlive-url-doc is &lt;svn16864.3.2-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827580" version="1" comment="texlive-utopia is &lt;svn15878.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827581" version="1" comment="texlive-utopia-doc is &lt;svn15878.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827582" version="1" comment="texlive-varwidth is &lt;svn24104.0.92-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827583" version="1" comment="texlive-varwidth-doc is &lt;svn24104.0.92-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827584" version="1" comment="texlive-wadalab is &lt;svn22576.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827585" version="1" comment="texlive-wadalab-doc is &lt;svn22576.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827586" version="1" comment="texlive-was is &lt;svn21439.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827587" version="1" comment="texlive-was-doc is &lt;svn21439.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827588" version="1" comment="texlive-wasy is &lt;svn15878.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827589" version="1" comment="texlive-wasy-doc is &lt;svn15878.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827590" version="1" comment="texlive-wasysym is &lt;svn15878.2.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827591" version="1" comment="texlive-wasysym-doc is &lt;svn15878.2.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827592" version="1" comment="texlive-wrapfig is &lt;svn22048.3.6-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827593" version="1" comment="texlive-wrapfig-doc is &lt;svn22048.3.6-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827594" version="1" comment="texlive-xcolor is &lt;svn15878.2.11-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827595" version="1" comment="texlive-xcolor-doc is &lt;svn15878.2.11-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827596" version="1" comment="texlive-xdvi is &lt;svn26689.22.85-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827597" version="1" comment="texlive-xdvi-bin is &lt;svn26509.0-45.20130427_r30134.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827598" version="1" comment="texlive-xecjk is &lt;svn28816.3.1.2-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827599" version="1" comment="texlive-xecjk-doc is &lt;svn28816.3.1.2-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827600" version="1" comment="texlive-xecolor is &lt;svn29660.0.1-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827601" version="1" comment="texlive-xecolor-doc is &lt;svn29660.0.1-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827602" version="1" comment="texlive-xecyr is &lt;svn20221.1.1-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827603" version="1" comment="texlive-xecyr-doc is &lt;svn20221.1.1-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827604" version="1" comment="texlive-xeindex is &lt;svn16760.0.2-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827605" version="1" comment="texlive-xeindex-doc is &lt;svn16760.0.2-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827606" version="1" comment="texlive-xepersian is &lt;svn29661.12.1-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827607" version="1" comment="texlive-xepersian-doc is &lt;svn29661.12.1-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827608" version="1" comment="texlive-xesearch is &lt;svn16041.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827609" version="1" comment="texlive-xesearch-doc is &lt;svn16041.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827610" version="1" comment="texlive-xetex is &lt;svn26330.0.9997.5-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827611" version="1" comment="texlive-xetex-bin is &lt;svn26912.0-45.20130427_r30134.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827612" version="1" comment="texlive-xetex-def is &lt;svn29154.0.95-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827613" version="1" comment="texlive-xetex-doc is &lt;svn26330.0.9997.5-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827614" version="1" comment="texlive-xetex-itrans is &lt;svn24105.4.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827615" version="1" comment="texlive-xetex-itrans-doc is &lt;svn24105.4.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827616" version="1" comment="texlive-xetex-pstricks is &lt;svn17055.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827617" version="1" comment="texlive-xetex-pstricks-doc is &lt;svn17055.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827618" version="1" comment="texlive-xetex-tibetan is &lt;svn28847.0.1-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827619" version="1" comment="texlive-xetex-tibetan-doc is &lt;svn28847.0.1-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827620" version="1" comment="texlive-xetexconfig is &lt;svn28819.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827621" version="1" comment="texlive-xetexfontinfo is &lt;svn15878.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827622" version="1" comment="texlive-xetexfontinfo-doc is &lt;svn15878.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827623" version="1" comment="texlive-xifthen is &lt;svn15878.1.3-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827624" version="1" comment="texlive-xifthen-doc is &lt;svn15878.1.3-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827625" version="1" comment="texlive-xkeyval is &lt;svn27995.2.6a-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827626" version="1" comment="texlive-xkeyval-doc is &lt;svn27995.2.6a-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827627" version="1" comment="texlive-xltxtra is &lt;svn19809.0.5e-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827628" version="1" comment="texlive-xltxtra-doc is &lt;svn19809.0.5e-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827629" version="1" comment="texlive-xmltex is &lt;svn28273.0.8-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827630" version="1" comment="texlive-xmltex-bin is &lt;svn3006.0-45.20130427_r30134.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827631" version="1" comment="texlive-xmltex-doc is &lt;svn28273.0.8-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827632" version="1" comment="texlive-xstring is &lt;svn29258.1.7a-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827633" version="1" comment="texlive-xstring-doc is &lt;svn29258.1.7a-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827634" version="1" comment="texlive-xtab is &lt;svn23347.2.3f-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827635" version="1" comment="texlive-xtab-doc is &lt;svn23347.2.3f-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827636" version="1" comment="texlive-xunicode is &lt;svn23897.0.981-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827637" version="1" comment="texlive-xunicode-doc is &lt;svn23897.0.981-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827638" version="1" comment="texlive-zapfchan is &lt;svn28614.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827639" version="1" comment="texlive-zapfding is &lt;svn28614.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825347" version="1" comment="emacs-git is &lt;1.8.3.1-20.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825348" version="1" comment="emacs-git-el is &lt;1.8.3.1-20.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825349" version="1" comment="git is &lt;1.8.3.1-20.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825350" version="1" comment="git-all is &lt;1.8.3.1-20.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825351" version="1" comment="git-bzr is &lt;1.8.3.1-20.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825352" version="1" comment="git-cvs is &lt;1.8.3.1-20.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825353" version="1" comment="git-daemon is &lt;1.8.3.1-20.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825354" version="1" comment="git-email is &lt;1.8.3.1-20.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825355" version="1" comment="git-gnome-keyring is &lt;1.8.3.1-20.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825356" version="1" comment="git-gui is &lt;1.8.3.1-20.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825357" version="1" comment="git-hg is &lt;1.8.3.1-20.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825358" version="1" comment="git-instaweb is &lt;1.8.3.1-20.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825359" version="1" comment="git-p4 is &lt;1.8.3.1-20.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825360" version="1" comment="git-svn is &lt;1.8.3.1-20.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825361" version="1" comment="gitk is &lt;1.8.3.1-20.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825362" version="1" comment="gitweb is &lt;1.8.3.1-20.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825363" version="1" comment="perl-Git is &lt;1.8.3.1-20.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825364" version="1" comment="perl-Git-SVN is &lt;1.8.3.1-20.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827877" version="1" comment="zziplib is &lt;0.13.62-12.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827878" version="1" comment="zziplib-devel is &lt;0.13.62-12.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827879" version="1" comment="zziplib-utils is &lt;0.13.62-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825602" version="1" comment="bpftool is &lt;3.10.0-957.10.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825603" version="1" comment="kernel is &lt;3.10.0-957.10.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825604" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-957.10.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825605" version="1" comment="kernel-debug is &lt;3.10.0-957.10.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825608" version="1" comment="kernel-doc is &lt;3.10.0-957.10.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825609" version="1" comment="kernel-headers is &lt;3.10.0-957.10.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825610" version="1" comment="kernel-tools is &lt;3.10.0-957.10.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825611" version="1" comment="kernel-tools-libs is &lt;3.10.0-957.10.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825613" version="1" comment="perf is &lt;3.10.0-957.10.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825614" version="1" comment="python-perf is &lt;3.10.0-957.10.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827715" version="1" comment="net-snmp is &lt;5.7.2-47.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827716" version="1" comment="net-snmp-agent-libs is &lt;5.7.2-47.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827717" version="1" comment="net-snmp-devel is &lt;5.7.2-47.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827718" version="1" comment="net-snmp-gui is &lt;5.7.2-47.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827719" version="1" comment="net-snmp-libs is &lt;5.7.2-47.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827720" version="1" comment="net-snmp-perl is &lt;5.7.2-47.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827721" version="1" comment="net-snmp-python is &lt;5.7.2-47.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827722" version="1" comment="net-snmp-sysvinit is &lt;5.7.2-47.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827723" version="1" comment="net-snmp-utils is &lt;5.7.2-47.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826028" version="1" comment="python-requests is &lt;2.6.0-5.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825465" version="1" comment="perl is &lt;5.16.3-294.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825466" version="1" comment="perl-CPAN is &lt;1.9800-294.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825467" version="1" comment="perl-ExtUtils-CBuilder is &lt;0.28.2.6-294.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825468" version="1" comment="perl-ExtUtils-Embed is &lt;1.30-294.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825469" version="1" comment="perl-ExtUtils-Install is &lt;1.58-294.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825470" version="1" comment="perl-IO-Zlib is &lt;1.10-294.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825471" version="1" comment="perl-Locale-Maketext-Simple is &lt;0.21-294.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825472" version="1" comment="perl-Module-CoreList is &lt;2.76.02-294.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825473" version="1" comment="perl-Module-Loaded is &lt;0.08-294.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825474" version="1" comment="perl-Object-Accessor is &lt;0.42-294.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825475" version="1" comment="perl-Package-Constants is &lt;0.02-294.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825476" version="1" comment="perl-Pod-Escapes is &lt;1.04-294.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825477" version="1" comment="perl-Time-Piece is &lt;1.20.1-294.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825478" version="1" comment="perl-core is &lt;5.16.3-294.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825479" version="1" comment="perl-devel is &lt;5.16.3-294.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825480" version="1" comment="perl-libs is &lt;5.16.3-294.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825481" version="1" comment="perl-macros is &lt;5.16.3-294.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825482" version="1" comment="perl-tests is &lt;5.16.3-294.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825543" version="1" comment="firefox is &lt;60.5.1-1.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826393" version="1" comment="unzip is &lt;6.0-20.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711997" version="1" comment="kgraft-patch-4_4_103-6_33-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711998" version="1" comment="kgraft-patch-4_4_103-6_38-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711999" version="1" comment="kgraft-patch-4_4_92-6_30-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712000" version="1" comment="kernel-livepatch-4_12_14-23-default is &gt;=6-16.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825484" version="1" comment="bpftool is &lt;3.10.0-957.5.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825485" version="1" comment="kernel is &lt;3.10.0-957.5.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825486" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-957.5.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825487" version="1" comment="kernel-debug is &lt;3.10.0-957.5.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825490" version="1" comment="kernel-doc is &lt;3.10.0-957.5.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825491" version="1" comment="kernel-headers is &lt;3.10.0-957.5.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825492" version="1" comment="kernel-tools is &lt;3.10.0-957.5.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825493" version="1" comment="kernel-tools-libs is &lt;3.10.0-957.5.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825495" version="1" comment="perf is &lt;3.10.0-957.5.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825496" version="1" comment="python-perf is &lt;3.10.0-957.5.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825521" version="1" comment="firefox is &lt;60.5.0-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825616" version="1" comment="firefox is &lt;60.6.0-3.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825633" version="1" comment="thunderbird is &lt;60.6.1-1.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825817" version="1" comment="firefox is &lt;60.7.0-1.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825832" version="1" comment="thunderbird is &lt;60.7.0-1.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826079" version="1" comment="libmspack is &lt;0.5-0.7.alpha.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826080" version="1" comment="libmspack-devel is &lt;0.5-0.7.alpha.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827822" version="1" comment="emacs-gettext is &lt;0.19.8.1-3.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827823" version="1" comment="gettext is &lt;0.19.8.1-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827824" version="1" comment="gettext-common-devel is &lt;0.19.8.1-3.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827825" version="1" comment="gettext-devel is &lt;0.19.8.1-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827826" version="1" comment="gettext-libs is &lt;0.19.8.1-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826520" version="1" comment="keepalived is &lt;1.3.5-16.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825452" version="1" comment="keepalived is &lt;1.3.5-8.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826510" version="1" comment="uriparser is &lt;0.7.5-10.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826511" version="1" comment="uriparser-devel is &lt;0.7.5-10.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826218" version="1" comment="libwpd is &lt;0.10.0-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826219" version="1" comment="libwpd-devel is &lt;0.10.0-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826220" version="1" comment="libwpd-doc is &lt;0.10.0-2.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826221" version="1" comment="libwpd-tools is &lt;0.10.0-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826768" version="1" comment="tcpdump is &lt;4.9.2-4.el7_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828279" version="1" comment="libsndfile is &lt;1.0.25-12.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828280" version="1" comment="libsndfile-devel is &lt;1.0.25-12.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828281" version="1" comment="libsndfile-utils is &lt;1.0.25-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826070" version="1" comment="polkit is &lt;0.112-22.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826071" version="1" comment="polkit-devel is &lt;0.112-22.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826072" version="1" comment="polkit-docs is &lt;0.112-22.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826505" version="1" comment="python-urllib3 is &lt;1.10.2-7.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827964" version="1" comment="python-virtualenv is &lt;15.1.0-4.el7_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827963" version="1" comment="python3-pip is &lt;9.0.3-7.el7_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826521" version="1" comment="libsolv is &lt;0.6.34-4.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826522" version="1" comment="libsolv-demo is &lt;0.6.34-4.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826523" version="1" comment="libsolv-devel is &lt;0.6.34-4.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826524" version="1" comment="libsolv-tools is &lt;0.6.34-4.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826525" version="1" comment="python2-solv is &lt;0.6.34-4.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976140" version="1" comment="openssh is &lt;7.4p1-23.el7_9.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976141" version="1" comment="openssh-askpass is &lt;7.4p1-23.el7_9.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976142" version="1" comment="openssh-cavs is &lt;7.4p1-23.el7_9.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976143" version="1" comment="openssh-clients is &lt;7.4p1-23.el7_9.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976144" version="1" comment="openssh-keycat is &lt;7.4p1-23.el7_9.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976145" version="1" comment="openssh-ldap is &lt;7.4p1-23.el7_9.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976146" version="1" comment="openssh-server is &lt;7.4p1-23.el7_9.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976147" version="1" comment="openssh-server-sysvinit is &lt;7.4p1-23.el7_9.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976148" version="1" comment="pam_ssh_agent_auth is &lt;0.10.3-2.23.el7_9.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828306" version="1" comment="expat is &lt;2.1.0-12.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828307" version="1" comment="expat-devel is &lt;2.1.0-12.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828308" version="1" comment="expat-static is &lt;2.1.0-12.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827805" version="1" comment="python is &lt;2.7.5-88.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827806" version="1" comment="python-debug is &lt;2.7.5-88.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827807" version="1" comment="python-devel is &lt;2.7.5-88.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827808" version="1" comment="python-libs is &lt;2.7.5-88.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827809" version="1" comment="python-test is &lt;2.7.5-88.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827810" version="1" comment="python-tools is &lt;2.7.5-88.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827812" version="1" comment="python3 is &lt;3.6.8-13.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827813" version="1" comment="python3-debug is &lt;3.6.8-13.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827814" version="1" comment="python3-devel is &lt;3.6.8-13.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827815" version="1" comment="python3-idle is &lt;3.6.8-13.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827816" version="1" comment="python3-libs is &lt;3.6.8-13.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827817" version="1" comment="python3-test is &lt;3.6.8-13.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827818" version="1" comment="python3-tkinter is &lt;3.6.8-13.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827811" version="1" comment="tkinter is &lt;2.7.5-88.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826650" version="1" comment="bpftool is &lt;3.10.0-1062.4.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826651" version="1" comment="kernel is &lt;3.10.0-1062.4.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826652" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1062.4.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826653" version="1" comment="kernel-debug is &lt;3.10.0-1062.4.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826656" version="1" comment="kernel-doc is &lt;3.10.0-1062.4.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826657" version="1" comment="kernel-headers is &lt;3.10.0-1062.4.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826658" version="1" comment="kernel-tools is &lt;3.10.0-1062.4.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826659" version="1" comment="kernel-tools-libs is &lt;3.10.0-1062.4.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826661" version="1" comment="perf is &lt;3.10.0-1062.4.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826662" version="1" comment="python-perf is &lt;3.10.0-1062.4.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826649" version="1" comment="patch is &lt;2.7.1-12.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827681" version="1" comment="evince is &lt;3.28.2-9.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827682" version="1" comment="evince-browser-plugin is &lt;3.28.2-9.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827683" version="1" comment="evince-devel is &lt;3.28.2-9.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827684" version="1" comment="evince-dvi is &lt;3.28.2-9.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827685" version="1" comment="evince-libs is &lt;3.28.2-9.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827686" version="1" comment="evince-nautilus is &lt;3.28.2-9.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827687" version="1" comment="poppler is &lt;0.26.5-42.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827688" version="1" comment="poppler-cpp is &lt;0.26.5-42.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827689" version="1" comment="poppler-cpp-devel is &lt;0.26.5-42.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827690" version="1" comment="poppler-demos is &lt;0.26.5-42.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827691" version="1" comment="poppler-devel is &lt;0.26.5-42.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827692" version="1" comment="poppler-glib is &lt;0.26.5-42.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827693" version="1" comment="poppler-glib-devel is &lt;0.26.5-42.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827694" version="1" comment="poppler-qt is &lt;0.26.5-42.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827695" version="1" comment="poppler-qt-devel is &lt;0.26.5-42.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827696" version="1" comment="poppler-utils is &lt;0.26.5-42.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829121" version="1" comment="libwebp is &lt;0.3.0-10.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829122" version="1" comment="libwebp-devel is &lt;0.3.0-10.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829123" version="1" comment="libwebp-java is &lt;0.3.0-10.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829124" version="1" comment="libwebp-tools is &lt;0.3.0-10.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829182" version="1" comment="qt5-qtimageformats is &lt;5.9.7-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829183" version="1" comment="qt5-qtimageformats-doc is &lt;5.9.7-2.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712001" version="1" comment="kernel-default is ==4.12.14-95.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712002" version="1" comment="kgraft-patch-4_12_14-95_68-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712003" version="1" comment="kernel-default is ==4.12.14-95.71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712004" version="1" comment="kgraft-patch-4_12_14-95_71-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698690" version="1" comment="kernel-default is ==4.12.14-95.74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712005" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698692" version="1" comment="kernel-default is ==4.12.14-95.77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712006" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698694" version="1" comment="kernel-default is ==4.12.14-95.80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712007" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698696" version="1" comment="kernel-default is ==4.12.14-95.83.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712008" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698698" version="1" comment="kernel-default is &lt;4.12.14-95.83.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712009" version="1" comment="kernel-default is ==4.12.14-150.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712010" version="1" comment="kernel-livepatch-4_12_14-150_66-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712011" version="1" comment="kernel-default is ==4.12.14-150.69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712012" version="1" comment="kernel-livepatch-4_12_14-150_69-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698720" version="1" comment="kernel-default is ==4.12.14-150.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712013" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698722" version="1" comment="kernel-default is ==4.12.14-150.75.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712014" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698724" version="1" comment="kernel-default is ==4.12.14-150.78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712015" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698726" version="1" comment="kernel-default is &lt;4.12.14-150.78.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829673" version="1" comment="minizip is &lt;1.2.7-20.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829674" version="1" comment="minizip-devel is &lt;1.2.7-20.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829675" version="1" comment="zlib is &lt;1.2.7-20.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829676" version="1" comment="zlib-devel is &lt;1.2.7-20.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829677" version="1" comment="zlib-static is &lt;1.2.7-20.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823987" version="1" comment="java-1.7.0-openjdk is &lt;1.7.0.171-2.6.13.0.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823988" version="1" comment="java-1.7.0-openjdk-accessibility is &lt;1.7.0.171-2.6.13.0.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823989" version="1" comment="java-1.7.0-openjdk-demo is &lt;1.7.0.171-2.6.13.0.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823990" version="1" comment="java-1.7.0-openjdk-devel is &lt;1.7.0.171-2.6.13.0.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823991" version="1" comment="java-1.7.0-openjdk-headless is &lt;1.7.0.171-2.6.13.0.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823992" version="1" comment="java-1.7.0-openjdk-javadoc is &lt;1.7.0.171-2.6.13.0.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823993" version="1" comment="java-1.7.0-openjdk-src is &lt;1.7.0.171-2.6.13.0.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823921" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.161-0.b14.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823922" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.161-0.b14.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823923" version="1" comment="java-1.8.0-openjdk-accessibility-debug is &lt;1.8.0.161-0.b14.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823924" version="1" comment="java-1.8.0-openjdk-debug is &lt;1.8.0.161-0.b14.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823925" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.161-0.b14.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823926" version="1" comment="java-1.8.0-openjdk-demo-debug is &lt;1.8.0.161-0.b14.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823927" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.161-0.b14.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823928" version="1" comment="java-1.8.0-openjdk-devel-debug is &lt;1.8.0.161-0.b14.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823929" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.161-0.b14.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823930" version="1" comment="java-1.8.0-openjdk-headless-debug is &lt;1.8.0.161-0.b14.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823931" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.161-0.b14.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823932" version="1" comment="java-1.8.0-openjdk-javadoc-debug is &lt;1.8.0.161-0.b14.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823933" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.161-0.b14.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823934" version="1" comment="java-1.8.0-openjdk-javadoc-zip-debug is &lt;1.8.0.161-0.b14.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823935" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.161-0.b14.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823936" version="1" comment="java-1.8.0-openjdk-src-debug is &lt;1.8.0.161-0.b14.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824211" version="1" comment="java-1.7.0-openjdk is &lt;1.7.0.181-2.6.14.5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824212" version="1" comment="java-1.7.0-openjdk-accessibility is &lt;1.7.0.181-2.6.14.5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824213" version="1" comment="java-1.7.0-openjdk-demo is &lt;1.7.0.181-2.6.14.5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824214" version="1" comment="java-1.7.0-openjdk-devel is &lt;1.7.0.181-2.6.14.5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824215" version="1" comment="java-1.7.0-openjdk-headless is &lt;1.7.0.181-2.6.14.5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824216" version="1" comment="java-1.7.0-openjdk-javadoc is &lt;1.7.0.181-2.6.14.5.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824217" version="1" comment="java-1.7.0-openjdk-src is &lt;1.7.0.181-2.6.14.5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824183" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.171-7.b10.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824184" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.171-7.b10.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824185" version="1" comment="java-1.8.0-openjdk-accessibility-debug is &lt;1.8.0.171-7.b10.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824186" version="1" comment="java-1.8.0-openjdk-debug is &lt;1.8.0.171-7.b10.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824187" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.171-7.b10.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824188" version="1" comment="java-1.8.0-openjdk-demo-debug is &lt;1.8.0.171-7.b10.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824189" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.171-7.b10.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824190" version="1" comment="java-1.8.0-openjdk-devel-debug is &lt;1.8.0.171-7.b10.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824191" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.171-7.b10.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824192" version="1" comment="java-1.8.0-openjdk-headless-debug is &lt;1.8.0.171-7.b10.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824193" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.171-7.b10.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824194" version="1" comment="java-1.8.0-openjdk-javadoc-debug is &lt;1.8.0.171-7.b10.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824195" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.171-7.b10.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824196" version="1" comment="java-1.8.0-openjdk-javadoc-zip-debug is &lt;1.8.0.171-7.b10.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824197" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.171-7.b10.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824198" version="1" comment="java-1.8.0-openjdk-src-debug is &lt;1.8.0.171-7.b10.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824497" version="1" comment="java-1.7.0-openjdk is &lt;1.7.0.191-2.6.15.4.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824498" version="1" comment="java-1.7.0-openjdk-accessibility is &lt;1.7.0.191-2.6.15.4.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824499" version="1" comment="java-1.7.0-openjdk-demo is &lt;1.7.0.191-2.6.15.4.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824500" version="1" comment="java-1.7.0-openjdk-devel is &lt;1.7.0.191-2.6.15.4.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824501" version="1" comment="java-1.7.0-openjdk-headless is &lt;1.7.0.191-2.6.15.4.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824502" version="1" comment="java-1.7.0-openjdk-javadoc is &lt;1.7.0.191-2.6.15.4.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824503" version="1" comment="java-1.7.0-openjdk-src is &lt;1.7.0.191-2.6.15.4.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824452" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.181-3.b13.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824453" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.181-3.b13.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824454" version="1" comment="java-1.8.0-openjdk-accessibility-debug is &lt;1.8.0.181-3.b13.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824455" version="1" comment="java-1.8.0-openjdk-debug is &lt;1.8.0.181-3.b13.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824456" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.181-3.b13.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824457" version="1" comment="java-1.8.0-openjdk-demo-debug is &lt;1.8.0.181-3.b13.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824458" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.181-3.b13.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824459" version="1" comment="java-1.8.0-openjdk-devel-debug is &lt;1.8.0.181-3.b13.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824460" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.181-3.b13.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824461" version="1" comment="java-1.8.0-openjdk-headless-debug is &lt;1.8.0.181-3.b13.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824462" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.181-3.b13.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824463" version="1" comment="java-1.8.0-openjdk-javadoc-debug is &lt;1.8.0.181-3.b13.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824464" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.181-3.b13.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824465" version="1" comment="java-1.8.0-openjdk-javadoc-zip-debug is &lt;1.8.0.181-3.b13.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824466" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.181-3.b13.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824467" version="1" comment="java-1.8.0-openjdk-src-debug is &lt;1.8.0.181-3.b13.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826567" version="1" comment="mariadb is &lt;5.5.64-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826568" version="1" comment="mariadb-bench is &lt;5.5.64-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826569" version="1" comment="mariadb-devel is &lt;5.5.64-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826570" version="1" comment="mariadb-embedded is &lt;5.5.64-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826571" version="1" comment="mariadb-embedded-devel is &lt;5.5.64-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826572" version="1" comment="mariadb-libs is &lt;5.5.64-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826573" version="1" comment="mariadb-server is &lt;5.5.64-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826574" version="1" comment="mariadb-test is &lt;5.5.64-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825340" version="1" comment="java-1.7.0-openjdk is &lt;1.7.0.201-2.6.16.1.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825341" version="1" comment="java-1.7.0-openjdk-accessibility is &lt;1.7.0.201-2.6.16.1.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825342" version="1" comment="java-1.7.0-openjdk-demo is &lt;1.7.0.201-2.6.16.1.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825343" version="1" comment="java-1.7.0-openjdk-devel is &lt;1.7.0.201-2.6.16.1.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825344" version="1" comment="java-1.7.0-openjdk-headless is &lt;1.7.0.201-2.6.16.1.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825345" version="1" comment="java-1.7.0-openjdk-javadoc is &lt;1.7.0.201-2.6.16.1.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825346" version="1" comment="java-1.7.0-openjdk-src is &lt;1.7.0.201-2.6.16.1.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824607" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.191.b12-0.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824608" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.191.b12-0.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824609" version="1" comment="java-1.8.0-openjdk-accessibility-debug is &lt;1.8.0.191.b12-0.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824610" version="1" comment="java-1.8.0-openjdk-debug is &lt;1.8.0.191.b12-0.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824611" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.191.b12-0.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824612" version="1" comment="java-1.8.0-openjdk-demo-debug is &lt;1.8.0.191.b12-0.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824613" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.191.b12-0.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824614" version="1" comment="java-1.8.0-openjdk-devel-debug is &lt;1.8.0.191.b12-0.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824615" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.191.b12-0.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824616" version="1" comment="java-1.8.0-openjdk-headless-debug is &lt;1.8.0.191.b12-0.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824617" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.191.b12-0.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824618" version="1" comment="java-1.8.0-openjdk-javadoc-debug is &lt;1.8.0.191.b12-0.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824619" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.191.b12-0.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824620" version="1" comment="java-1.8.0-openjdk-javadoc-zip-debug is &lt;1.8.0.191.b12-0.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824621" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.191.b12-0.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824622" version="1" comment="java-1.8.0-openjdk-src-debug is &lt;1.8.0.191.b12-0.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825375" version="1" comment="java-11-openjdk is &lt;11.0.1.13-3.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825376" version="1" comment="java-11-openjdk-debug is &lt;11.0.1.13-3.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825377" version="1" comment="java-11-openjdk-demo is &lt;11.0.1.13-3.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825378" version="1" comment="java-11-openjdk-demo-debug is &lt;11.0.1.13-3.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825379" version="1" comment="java-11-openjdk-devel is &lt;11.0.1.13-3.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825380" version="1" comment="java-11-openjdk-devel-debug is &lt;11.0.1.13-3.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825381" version="1" comment="java-11-openjdk-headless is &lt;11.0.1.13-3.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825382" version="1" comment="java-11-openjdk-headless-debug is &lt;11.0.1.13-3.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825383" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.1.13-3.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825384" version="1" comment="java-11-openjdk-javadoc-debug is &lt;11.0.1.13-3.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825385" version="1" comment="java-11-openjdk-javadoc-zip is &lt;11.0.1.13-3.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825386" version="1" comment="java-11-openjdk-javadoc-zip-debug is &lt;11.0.1.13-3.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825387" version="1" comment="java-11-openjdk-jmods is &lt;11.0.1.13-3.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825388" version="1" comment="java-11-openjdk-jmods-debug is &lt;11.0.1.13-3.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825389" version="1" comment="java-11-openjdk-src is &lt;11.0.1.13-3.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825390" version="1" comment="java-11-openjdk-src-debug is &lt;11.0.1.13-3.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824320" version="1" comment="java-1.7.0-openjdk is &lt;1.7.0.181-2.6.14.8.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824321" version="1" comment="java-1.7.0-openjdk-accessibility is &lt;1.7.0.181-2.6.14.8.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824322" version="1" comment="java-1.7.0-openjdk-demo is &lt;1.7.0.181-2.6.14.8.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824323" version="1" comment="java-1.7.0-openjdk-devel is &lt;1.7.0.181-2.6.14.8.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824324" version="1" comment="java-1.7.0-openjdk-headless is &lt;1.7.0.181-2.6.14.8.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824325" version="1" comment="java-1.7.0-openjdk-javadoc is &lt;1.7.0.181-2.6.14.8.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824326" version="1" comment="java-1.7.0-openjdk-src is &lt;1.7.0.181-2.6.14.8.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824327" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.171-8.b10.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824328" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.171-8.b10.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824329" version="1" comment="java-1.8.0-openjdk-accessibility-debug is &lt;1.8.0.171-8.b10.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824330" version="1" comment="java-1.8.0-openjdk-debug is &lt;1.8.0.171-8.b10.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824331" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.171-8.b10.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824332" version="1" comment="java-1.8.0-openjdk-demo-debug is &lt;1.8.0.171-8.b10.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824333" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.171-8.b10.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824334" version="1" comment="java-1.8.0-openjdk-devel-debug is &lt;1.8.0.171-8.b10.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824335" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.171-8.b10.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824336" version="1" comment="java-1.8.0-openjdk-headless-debug is &lt;1.8.0.171-8.b10.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824337" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.171-8.b10.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824338" version="1" comment="java-1.8.0-openjdk-javadoc-debug is &lt;1.8.0.171-8.b10.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824339" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.171-8.b10.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824340" version="1" comment="java-1.8.0-openjdk-javadoc-zip-debug is &lt;1.8.0.171-8.b10.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824341" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.171-8.b10.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824342" version="1" comment="java-1.8.0-openjdk-src-debug is &lt;1.8.0.171-8.b10.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824401" version="1" comment="libvirt is &lt;3.9.0-14.el7_5.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824402" version="1" comment="libvirt-admin is &lt;3.9.0-14.el7_5.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824403" version="1" comment="libvirt-client is &lt;3.9.0-14.el7_5.6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824404" version="1" comment="libvirt-daemon is &lt;3.9.0-14.el7_5.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824405" version="1" comment="libvirt-daemon-config-network is &lt;3.9.0-14.el7_5.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824406" version="1" comment="libvirt-daemon-config-nwfilter is &lt;3.9.0-14.el7_5.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824407" version="1" comment="libvirt-daemon-driver-interface is &lt;3.9.0-14.el7_5.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824408" version="1" comment="libvirt-daemon-driver-lxc is &lt;3.9.0-14.el7_5.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824409" version="1" comment="libvirt-daemon-driver-network is &lt;3.9.0-14.el7_5.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824410" version="1" comment="libvirt-daemon-driver-nodedev is &lt;3.9.0-14.el7_5.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824411" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;3.9.0-14.el7_5.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824412" version="1" comment="libvirt-daemon-driver-qemu is &lt;3.9.0-14.el7_5.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824413" version="1" comment="libvirt-daemon-driver-secret is &lt;3.9.0-14.el7_5.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824414" version="1" comment="libvirt-daemon-driver-storage is &lt;3.9.0-14.el7_5.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824415" version="1" comment="libvirt-daemon-driver-storage-core is &lt;3.9.0-14.el7_5.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824416" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;3.9.0-14.el7_5.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824417" version="1" comment="libvirt-daemon-driver-storage-gluster is &lt;3.9.0-14.el7_5.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824418" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;3.9.0-14.el7_5.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824419" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;3.9.0-14.el7_5.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824420" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;3.9.0-14.el7_5.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824421" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;3.9.0-14.el7_5.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824422" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;3.9.0-14.el7_5.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824423" version="1" comment="libvirt-daemon-kvm is &lt;3.9.0-14.el7_5.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824424" version="1" comment="libvirt-daemon-lxc is &lt;3.9.0-14.el7_5.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824425" version="1" comment="libvirt-devel is &lt;3.9.0-14.el7_5.6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824426" version="1" comment="libvirt-docs is &lt;3.9.0-14.el7_5.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824427" version="1" comment="libvirt-libs is &lt;3.9.0-14.el7_5.6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824428" version="1" comment="libvirt-lock-sanlock is &lt;3.9.0-14.el7_5.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824429" version="1" comment="libvirt-login-shell is &lt;3.9.0-14.el7_5.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824430" version="1" comment="libvirt-nss is &lt;3.9.0-14.el7_5.6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824431" version="1" comment="qemu-img is &lt;1.5.3-156.el7_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824432" version="1" comment="qemu-kvm is &lt;1.5.3-156.el7_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824433" version="1" comment="qemu-kvm-common is &lt;1.5.3-156.el7_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824434" version="1" comment="qemu-kvm-tools is &lt;1.5.3-156.el7_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712016" version="1" comment="kernel-livepatch-4_12_14-25_6-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712017" version="1" comment="kgraft-patch-4_4_103-6_33-default is &gt;=7-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712018" version="1" comment="kgraft-patch-4_4_103-6_38-default is &gt;=7-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712019" version="1" comment="kgraft-patch-4_4_114-94_11-default is &gt;=5-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712020" version="1" comment="kgraft-patch-4_4_114-94_14-default is &gt;=5-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712021" version="1" comment="kgraft-patch-4_4_120-94_17-default is &gt;=4-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712022" version="1" comment="kgraft-patch-4_4_126-94_22-default is &gt;=4-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712023" version="1" comment="kgraft-patch-4_4_131-94_29-default is &gt;=2-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712024" version="1" comment="kgraft-patch-4_4_132-94_33-default is &gt;=2-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712025" version="1" comment="kgraft-patch-4_4_82-6_3-default is &gt;=10-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712026" version="1" comment="kgraft-patch-4_4_82-6_6-default is &gt;=9-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712027" version="1" comment="kgraft-patch-4_4_82-6_9-default is &gt;=9-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712028" version="1" comment="kgraft-patch-4_4_92-6_18-default is &gt;=8-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712029" version="1" comment="kgraft-patch-4_4_92-6_30-default is &gt;=7-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824353" version="1" comment="kernel is &lt;3.10.0-862.3.3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824354" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-862.3.3.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824355" version="1" comment="kernel-debug is &lt;3.10.0-862.3.3.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824358" version="1" comment="kernel-doc is &lt;3.10.0-862.3.3.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824359" version="1" comment="kernel-headers is &lt;3.10.0-862.3.3.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824360" version="1" comment="kernel-tools is &lt;3.10.0-862.3.3.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824361" version="1" comment="kernel-tools-libs is &lt;3.10.0-862.3.3.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824363" version="1" comment="perf is &lt;3.10.0-862.3.3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824364" version="1" comment="python-perf is &lt;3.10.0-862.3.3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827646" version="1" comment="cups is &lt;1.6.3-43.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827647" version="1" comment="cups-client is &lt;1.6.3-43.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827648" version="1" comment="cups-devel is &lt;1.6.3-43.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827649" version="1" comment="cups-filesystem is &lt;1.6.3-43.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827650" version="1" comment="cups-ipptool is &lt;1.6.3-43.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827651" version="1" comment="cups-libs is &lt;1.6.3-43.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827652" version="1" comment="cups-lpd is &lt;1.6.3-43.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823951" version="1" comment="firefox is &lt;52.6.0-1.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823986" version="1" comment="thunderbird is &lt;52.6.0-1.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824062" version="1" comment="firefox is &lt;52.7.0-1.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824067" version="1" comment="thunderbird is &lt;52.7.0-1.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824063" version="1" comment="firefox is &lt;52.7.2-1.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824160" version="1" comment="libvorbis is &lt;1.3.3-8.el7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824161" version="1" comment="libvorbis-devel is &lt;1.3.3-8.el7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824162" version="1" comment="libvorbis-devel-docs is &lt;1.3.3-8.el7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824177" version="1" comment="firefox is &lt;52.7.3-1.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824264" version="1" comment="firefox is &lt;52.8.0-1.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824346" version="1" comment="thunderbird is &lt;52.8.0-1.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823994" version="1" comment="gcab is &lt;0.7-4.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823995" version="1" comment="libgcab1 is &lt;0.7-4.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823996" version="1" comment="libgcab1-devel is &lt;0.7-4.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823997" version="1" comment="quagga is &lt;0.99.22.4-5.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823998" version="1" comment="quagga-contrib is &lt;0.99.22.4-5.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823999" version="1" comment="quagga-devel is &lt;0.99.22.4-5.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826395" version="1" comment="iwl100-firmware is &lt;39.31.5.1-72.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826396" version="1" comment="iwl1000-firmware is &lt;39.31.5.1-72.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826397" version="1" comment="iwl105-firmware is &lt;18.168.6.1-72.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826398" version="1" comment="iwl135-firmware is &lt;18.168.6.1-72.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826399" version="1" comment="iwl2000-firmware is &lt;18.168.6.1-72.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826400" version="1" comment="iwl2030-firmware is &lt;18.168.6.1-72.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826401" version="1" comment="iwl3160-firmware is &lt;22.0.7.0-72.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826402" version="1" comment="iwl3945-firmware is &lt;15.32.2.9-72.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826403" version="1" comment="iwl4965-firmware is &lt;228.61.2.24-72.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826404" version="1" comment="iwl5000-firmware is &lt;8.83.5.1_1-72.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826405" version="1" comment="iwl5150-firmware is &lt;8.24.2.2-72.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826406" version="1" comment="iwl6000-firmware is &lt;9.221.4.1-72.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826407" version="1" comment="iwl6000g2a-firmware is &lt;17.168.5.3-72.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826408" version="1" comment="iwl6000g2b-firmware is &lt;17.168.5.2-72.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826409" version="1" comment="iwl6050-firmware is &lt;41.28.5.1-72.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826410" version="1" comment="iwl7260-firmware is &lt;22.0.7.0-72.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826411" version="1" comment="iwl7265-firmware is &lt;22.0.7.0-72.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826412" version="1" comment="linux-firmware is &lt;20190429-72.gitddde598.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712030" version="1" comment="kgraft-patch-4_4_114-94_11-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712031" version="1" comment="kgraft-patch-4_4_114-94_14-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712032" version="1" comment="kgraft-patch-4_4_120-94_17-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712033" version="1" comment="kgraft-patch-4_4_126-94_22-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712034" version="1" comment="kgraft-patch-4_4_131-94_29-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712035" version="1" comment="kgraft-patch-4_4_132-94_33-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712036" version="1" comment="kgraft-patch-4_4_138-94_39-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712037" version="1" comment="kgraft-patch-4_4_140-94_42-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712038" version="1" comment="kernel-livepatch-4_12_14-25_3-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712039" version="1" comment="kernel-livepatch-4_12_14-25_6-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825587" version="1" comment="openssl is &lt;1.0.2k-16.el7_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825588" version="1" comment="openssl-devel is &lt;1.0.2k-16.el7_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825589" version="1" comment="openssl-libs is &lt;1.0.2k-16.el7_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825590" version="1" comment="openssl-perl is &lt;1.0.2k-16.el7_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825591" version="1" comment="openssl-static is &lt;1.0.2k-16.el7_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824777" version="1" comment="krb5-devel is &lt;1.15.1-34.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824778" version="1" comment="krb5-libs is &lt;1.15.1-34.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824779" version="1" comment="krb5-pkinit is &lt;1.15.1-34.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824780" version="1" comment="krb5-server is &lt;1.15.1-34.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824781" version="1" comment="krb5-server-ldap is &lt;1.15.1-34.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824782" version="1" comment="krb5-workstation is &lt;1.15.1-34.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824783" version="1" comment="libkadm5 is &lt;1.15.1-34.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824056" version="1" comment="dhclient is &lt;4.2.5-58.el7_4.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824057" version="1" comment="dhcp is &lt;4.2.5-58.el7_4.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824058" version="1" comment="dhcp-common is &lt;4.2.5-58.el7_4.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824059" version="1" comment="dhcp-devel is &lt;4.2.5-58.el7_4.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824060" version="1" comment="dhcp-libs is &lt;4.2.5-58.el7_4.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824541" version="1" comment="bind is &lt;9.9.4-61.el7_5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824542" version="1" comment="bind-chroot is &lt;9.9.4-61.el7_5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824543" version="1" comment="bind-devel is &lt;9.9.4-61.el7_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824544" version="1" comment="bind-libs is &lt;9.9.4-61.el7_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824545" version="1" comment="bind-libs-lite is &lt;9.9.4-61.el7_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824546" version="1" comment="bind-license is &lt;9.9.4-61.el7_5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824547" version="1" comment="bind-lite-devel is &lt;9.9.4-61.el7_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824548" version="1" comment="bind-pkcs11 is &lt;9.9.4-61.el7_5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824549" version="1" comment="bind-pkcs11-devel is &lt;9.9.4-61.el7_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824550" version="1" comment="bind-pkcs11-libs is &lt;9.9.4-61.el7_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824551" version="1" comment="bind-pkcs11-utils is &lt;9.9.4-61.el7_5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824552" version="1" comment="bind-sdb is &lt;9.9.4-61.el7_5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824553" version="1" comment="bind-sdb-chroot is &lt;9.9.4-61.el7_5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824554" version="1" comment="bind-utils is &lt;9.9.4-61.el7_5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826092" version="1" comment="bind is &lt;9.11.4-9.P2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826093" version="1" comment="bind-chroot is &lt;9.11.4-9.P2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826094" version="1" comment="bind-devel is &lt;9.11.4-9.P2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826095" version="1" comment="bind-export-devel is &lt;9.11.4-9.P2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826096" version="1" comment="bind-export-libs is &lt;9.11.4-9.P2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826097" version="1" comment="bind-libs is &lt;9.11.4-9.P2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826098" version="1" comment="bind-libs-lite is &lt;9.11.4-9.P2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826099" version="1" comment="bind-license is &lt;9.11.4-9.P2.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826100" version="1" comment="bind-lite-devel is &lt;9.11.4-9.P2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826101" version="1" comment="bind-pkcs11 is &lt;9.11.4-9.P2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826102" version="1" comment="bind-pkcs11-devel is &lt;9.11.4-9.P2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826103" version="1" comment="bind-pkcs11-libs is &lt;9.11.4-9.P2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826104" version="1" comment="bind-pkcs11-utils is &lt;9.11.4-9.P2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826105" version="1" comment="bind-sdb is &lt;9.11.4-9.P2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826106" version="1" comment="bind-sdb-chroot is &lt;9.11.4-9.P2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826107" version="1" comment="bind-utils is &lt;9.11.4-9.P2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825497" version="1" comment="bind is &lt;9.9.4-73.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825498" version="1" comment="bind-chroot is &lt;9.9.4-73.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825499" version="1" comment="bind-devel is &lt;9.9.4-73.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825500" version="1" comment="bind-libs is &lt;9.9.4-73.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825501" version="1" comment="bind-libs-lite is &lt;9.9.4-73.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825502" version="1" comment="bind-license is &lt;9.9.4-73.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825503" version="1" comment="bind-lite-devel is &lt;9.9.4-73.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825504" version="1" comment="bind-pkcs11 is &lt;9.9.4-73.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825505" version="1" comment="bind-pkcs11-devel is &lt;9.9.4-73.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825506" version="1" comment="bind-pkcs11-libs is &lt;9.9.4-73.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825507" version="1" comment="bind-pkcs11-utils is &lt;9.9.4-73.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825508" version="1" comment="bind-sdb is &lt;9.9.4-73.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825509" version="1" comment="bind-sdb-chroot is &lt;9.9.4-73.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825510" version="1" comment="bind-utils is &lt;9.9.4-73.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825818" version="1" comment="bind is &lt;9.9.4-74.el7_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825819" version="1" comment="bind-chroot is &lt;9.9.4-74.el7_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825820" version="1" comment="bind-devel is &lt;9.9.4-74.el7_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825821" version="1" comment="bind-libs is &lt;9.9.4-74.el7_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825822" version="1" comment="bind-libs-lite is &lt;9.9.4-74.el7_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825823" version="1" comment="bind-license is &lt;9.9.4-74.el7_6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825824" version="1" comment="bind-lite-devel is &lt;9.9.4-74.el7_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825825" version="1" comment="bind-pkcs11 is &lt;9.9.4-74.el7_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825826" version="1" comment="bind-pkcs11-devel is &lt;9.9.4-74.el7_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825827" version="1" comment="bind-pkcs11-libs is &lt;9.9.4-74.el7_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825828" version="1" comment="bind-pkcs11-utils is &lt;9.9.4-74.el7_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825829" version="1" comment="bind-sdb is &lt;9.9.4-74.el7_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825830" version="1" comment="bind-sdb-chroot is &lt;9.9.4-74.el7_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825831" version="1" comment="bind-utils is &lt;9.9.4-74.el7_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827657" version="1" comment="bind is &lt;9.11.4-16.P2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827658" version="1" comment="bind-chroot is &lt;9.11.4-16.P2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827659" version="1" comment="bind-devel is &lt;9.11.4-16.P2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827660" version="1" comment="bind-export-devel is &lt;9.11.4-16.P2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827661" version="1" comment="bind-export-libs is &lt;9.11.4-16.P2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827662" version="1" comment="bind-libs is &lt;9.11.4-16.P2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827663" version="1" comment="bind-libs-lite is &lt;9.11.4-16.P2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827664" version="1" comment="bind-license is &lt;9.11.4-16.P2.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827665" version="1" comment="bind-lite-devel is &lt;9.11.4-16.P2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827666" version="1" comment="bind-pkcs11 is &lt;9.11.4-16.P2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827667" version="1" comment="bind-pkcs11-devel is &lt;9.11.4-16.P2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827668" version="1" comment="bind-pkcs11-libs is &lt;9.11.4-16.P2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827669" version="1" comment="bind-pkcs11-utils is &lt;9.11.4-16.P2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827670" version="1" comment="bind-sdb is &lt;9.11.4-16.P2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827671" version="1" comment="bind-sdb-chroot is &lt;9.11.4-16.P2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827672" version="1" comment="bind-utils is &lt;9.11.4-16.P2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824775" version="1" comment="libkdcraw is &lt;4.10.5-5.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824776" version="1" comment="libkdcraw-devel is &lt;4.10.5-5.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712040" version="1" comment="kgraft-patch-4_4_103-6_33-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712041" version="1" comment="kgraft-patch-4_4_103-6_38-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712042" version="1" comment="kgraft-patch-4_4_114-94_11-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712043" version="1" comment="kgraft-patch-4_4_114-94_14-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712044" version="1" comment="kgraft-patch-4_4_120-94_17-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712045" version="1" comment="kgraft-patch-4_4_126-94_22-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712046" version="1" comment="kgraft-patch-4_4_131-94_29-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712047" version="1" comment="kgraft-patch-4_4_132-94_33-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712048" version="1" comment="kernel-default is &lt;4.4.132-94.33.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712049" version="1" comment="kernel-livepatch-4_12_14-23-default is &gt;=7-19.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824061" version="1" comment="mailman is &lt;2.1.15-26.el7_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824580" version="1" comment="flatpak is &lt;0.8.8-4.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824581" version="1" comment="flatpak-builder is &lt;0.8.8-4.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824582" version="1" comment="flatpak-devel is &lt;0.8.8-4.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824583" version="1" comment="flatpak-libs is &lt;0.8.8-4.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824808" version="1" comment="libvirt is &lt;4.5.0-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824809" version="1" comment="libvirt-admin is &lt;4.5.0-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824810" version="1" comment="libvirt-bash-completion is &lt;4.5.0-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824811" version="1" comment="libvirt-client is &lt;4.5.0-10.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824812" version="1" comment="libvirt-daemon is &lt;4.5.0-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824813" version="1" comment="libvirt-daemon-config-network is &lt;4.5.0-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824814" version="1" comment="libvirt-daemon-config-nwfilter is &lt;4.5.0-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824815" version="1" comment="libvirt-daemon-driver-interface is &lt;4.5.0-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824816" version="1" comment="libvirt-daemon-driver-lxc is &lt;4.5.0-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824817" version="1" comment="libvirt-daemon-driver-network is &lt;4.5.0-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824818" version="1" comment="libvirt-daemon-driver-nodedev is &lt;4.5.0-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824819" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;4.5.0-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824820" version="1" comment="libvirt-daemon-driver-qemu is &lt;4.5.0-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824821" version="1" comment="libvirt-daemon-driver-secret is &lt;4.5.0-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824822" version="1" comment="libvirt-daemon-driver-storage is &lt;4.5.0-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824823" version="1" comment="libvirt-daemon-driver-storage-core is &lt;4.5.0-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824824" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;4.5.0-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824825" version="1" comment="libvirt-daemon-driver-storage-gluster is &lt;4.5.0-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824826" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;4.5.0-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824827" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;4.5.0-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824828" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;4.5.0-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824829" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;4.5.0-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824830" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;4.5.0-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824831" version="1" comment="libvirt-daemon-kvm is &lt;4.5.0-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824832" version="1" comment="libvirt-daemon-lxc is &lt;4.5.0-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824833" version="1" comment="libvirt-devel is &lt;4.5.0-10.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824834" version="1" comment="libvirt-docs is &lt;4.5.0-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824835" version="1" comment="libvirt-libs is &lt;4.5.0-10.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824836" version="1" comment="libvirt-lock-sanlock is &lt;4.5.0-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824837" version="1" comment="libvirt-login-shell is &lt;4.5.0-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824838" version="1" comment="libvirt-nss is &lt;4.5.0-10.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826328" version="1" comment="kcm_colors is &lt;4.11.19-13.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826329" version="1" comment="kde-settings is &lt;19-23.9.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826330" version="1" comment="kde-settings-ksplash is &lt;19-23.9.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826331" version="1" comment="kde-settings-minimal is &lt;19-23.9.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826332" version="1" comment="kde-settings-plasma is &lt;19-23.9.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826333" version="1" comment="kde-settings-pulseaudio is &lt;19-23.9.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826334" version="1" comment="kde-style-oxygen is &lt;4.11.19-13.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826335" version="1" comment="kde-workspace is &lt;4.11.19-13.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826336" version="1" comment="kde-workspace-devel is &lt;4.11.19-13.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826337" version="1" comment="kde-workspace-ksplash-themes is &lt;4.11.19-13.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826338" version="1" comment="kde-workspace-libs is &lt;4.11.19-13.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826339" version="1" comment="kdeclassic-cursor-theme is &lt;4.11.19-13.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826340" version="1" comment="kdelibs is &lt;4.14.8-10.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826341" version="1" comment="kdelibs-apidocs is &lt;4.14.8-10.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826342" version="1" comment="kdelibs-common is &lt;4.14.8-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826343" version="1" comment="kdelibs-devel is &lt;4.14.8-10.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826344" version="1" comment="kdelibs-ktexteditor is &lt;4.14.8-10.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826345" version="1" comment="kgreeter-plugins is &lt;4.11.19-13.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826346" version="1" comment="khotkeys is &lt;4.11.19-13.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826347" version="1" comment="khotkeys-libs is &lt;4.11.19-13.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826348" version="1" comment="kinfocenter is &lt;4.11.19-13.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826349" version="1" comment="kmag is &lt;4.10.5-4.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826350" version="1" comment="kmenuedit is &lt;4.11.19-13.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826351" version="1" comment="ksysguard is &lt;4.11.19-13.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826352" version="1" comment="ksysguard-libs is &lt;4.11.19-13.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826353" version="1" comment="ksysguardd is &lt;4.11.19-13.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826354" version="1" comment="kwin is &lt;4.11.19-13.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826355" version="1" comment="kwin-gles is &lt;4.11.19-13.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826356" version="1" comment="kwin-gles-libs is &lt;4.11.19-13.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826357" version="1" comment="kwin-libs is &lt;4.11.19-13.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826358" version="1" comment="libkworkspace is &lt;4.11.19-13.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826359" version="1" comment="oxygen-cursor-themes is &lt;4.11.19-13.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826360" version="1" comment="plasma-scriptengine-python is &lt;4.11.19-13.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826361" version="1" comment="plasma-scriptengine-ruby is &lt;4.11.19-13.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826362" version="1" comment="qt-settings is &lt;19-23.9.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826363" version="1" comment="virtuoso-opensource is &lt;6.1.6-7.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826364" version="1" comment="virtuoso-opensource-utils is &lt;6.1.6-7.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824158" version="1" comment="libvncserver is &lt;0.9.9-12.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824159" version="1" comment="libvncserver-devel is &lt;0.9.9-12.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826576" version="1" comment="unixODBC is &lt;2.3.1-14.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826577" version="1" comment="unixODBC-devel is &lt;2.3.1-14.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826081" version="1" comment="compat-libtiff3 is &lt;3.9.4-12.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825310" version="1" comment="zziplib is &lt;0.13.62-9.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825311" version="1" comment="zziplib-devel is &lt;0.13.62-9.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825312" version="1" comment="zziplib-utils is &lt;0.13.62-9.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824265" version="1" comment="qemu-img is &lt;1.5.3-156.el7_5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824266" version="1" comment="qemu-kvm is &lt;1.5.3-156.el7_5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824267" version="1" comment="qemu-kvm-common is &lt;1.5.3-156.el7_5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824268" version="1" comment="qemu-kvm-tools is &lt;1.5.3-156.el7_5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824064" version="1" comment="slf4j is &lt;1.7.4-4.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824065" version="1" comment="slf4j-javadoc is &lt;1.7.4-4.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824066" version="1" comment="slf4j-manual is &lt;1.7.4-4.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825634" version="1" comment="freerdp is &lt;1.0.2-15.el7_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825635" version="1" comment="freerdp-devel is &lt;1.0.2-15.el7_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825636" version="1" comment="freerdp-libs is &lt;1.0.2-15.el7_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825637" version="1" comment="freerdp-plugins is &lt;1.0.2-15.el7_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712050" version="1" comment="kgraft-patch-4_12_14-95_32-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712051" version="1" comment="kgraft-patch-4_12_14-95_37-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712052" version="1" comment="kgraft-patch-4_12_14-95_40-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712053" version="1" comment="kgraft-patch-4_12_14-120-default is &gt;=6-15.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512974" version="1" comment="kernel-default is &lt;4.12.14-120.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712054" version="1" comment="kernel-livepatch-4_12_14-150_35-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712055" version="1" comment="kernel-livepatch-4_12_14-150_38-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712056" version="1" comment="kernel-livepatch-4_12_14-150_41-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712057" version="1" comment="kernel-livepatch-4_12_14-197_18-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712058" version="1" comment="kernel-livepatch-4_12_14-197_21-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712059" version="1" comment="kernel-livepatch-4_12_14-197_26-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826746" version="1" comment="bpftool is &lt;3.10.0-1062.4.3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826747" version="1" comment="kernel is &lt;3.10.0-1062.4.3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826748" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1062.4.3.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826749" version="1" comment="kernel-debug is &lt;3.10.0-1062.4.3.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826752" version="1" comment="kernel-doc is &lt;3.10.0-1062.4.3.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826753" version="1" comment="kernel-headers is &lt;3.10.0-1062.4.3.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826754" version="1" comment="kernel-tools is &lt;3.10.0-1062.4.3.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826755" version="1" comment="kernel-tools-libs is &lt;3.10.0-1062.4.3.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826757" version="1" comment="perf is &lt;3.10.0-1062.4.3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826758" version="1" comment="python-perf is &lt;3.10.0-1062.4.3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826578" version="1" comment="httpd is &lt;2.4.6-90.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826579" version="1" comment="httpd-devel is &lt;2.4.6-90.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826580" version="1" comment="httpd-manual is &lt;2.4.6-90.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826581" version="1" comment="httpd-tools is &lt;2.4.6-90.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826582" version="1" comment="mod_ldap is &lt;2.4.6-90.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826583" version="1" comment="mod_proxy_html is &lt;2.4.6-90.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826584" version="1" comment="mod_session is &lt;2.4.6-90.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826585" version="1" comment="mod_ssl is &lt;2.4.6-90.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825615" version="1" comment="cloud-init is &lt;18.2-1.el7_6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825706" version="1" comment="flatpak is &lt;1.0.2-5.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825707" version="1" comment="flatpak-builder is &lt;1.0.0-5.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825708" version="1" comment="flatpak-devel is &lt;1.0.2-5.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825709" version="1" comment="flatpak-libs is &lt;1.0.2-5.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826842" version="1" comment="apache-commons-beanutils is &lt;1.8.3-15.el7_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826843" version="1" comment="apache-commons-beanutils-javadoc is &lt;1.8.3-15.el7_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826592" version="1" comment="pango is &lt;1.42.4-4.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826593" version="1" comment="pango-devel is &lt;1.42.4-4.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826594" version="1" comment="pango-tests is &lt;1.42.4-4.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828107" version="1" comment="libmspack is &lt;0.5-0.8.alpha.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828108" version="1" comment="libmspack-devel is &lt;0.5-0.8.alpha.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825786" version="1" comment="libvirt is &lt;4.5.0-10.el7_6.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825787" version="1" comment="libvirt-admin is &lt;4.5.0-10.el7_6.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825788" version="1" comment="libvirt-bash-completion is &lt;4.5.0-10.el7_6.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825789" version="1" comment="libvirt-client is &lt;4.5.0-10.el7_6.10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825790" version="1" comment="libvirt-daemon is &lt;4.5.0-10.el7_6.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825791" version="1" comment="libvirt-daemon-config-network is &lt;4.5.0-10.el7_6.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825792" version="1" comment="libvirt-daemon-config-nwfilter is &lt;4.5.0-10.el7_6.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825793" version="1" comment="libvirt-daemon-driver-interface is &lt;4.5.0-10.el7_6.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825794" version="1" comment="libvirt-daemon-driver-lxc is &lt;4.5.0-10.el7_6.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825795" version="1" comment="libvirt-daemon-driver-network is &lt;4.5.0-10.el7_6.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825796" version="1" comment="libvirt-daemon-driver-nodedev is &lt;4.5.0-10.el7_6.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825797" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;4.5.0-10.el7_6.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825798" version="1" comment="libvirt-daemon-driver-qemu is &lt;4.5.0-10.el7_6.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825799" version="1" comment="libvirt-daemon-driver-secret is &lt;4.5.0-10.el7_6.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825800" version="1" comment="libvirt-daemon-driver-storage is &lt;4.5.0-10.el7_6.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825801" version="1" comment="libvirt-daemon-driver-storage-core is &lt;4.5.0-10.el7_6.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825802" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;4.5.0-10.el7_6.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825803" version="1" comment="libvirt-daemon-driver-storage-gluster is &lt;4.5.0-10.el7_6.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825804" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;4.5.0-10.el7_6.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825805" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;4.5.0-10.el7_6.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825806" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;4.5.0-10.el7_6.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825807" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;4.5.0-10.el7_6.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825808" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;4.5.0-10.el7_6.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825809" version="1" comment="libvirt-daemon-kvm is &lt;4.5.0-10.el7_6.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825810" version="1" comment="libvirt-daemon-lxc is &lt;4.5.0-10.el7_6.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825811" version="1" comment="libvirt-devel is &lt;4.5.0-10.el7_6.10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825812" version="1" comment="libvirt-docs is &lt;4.5.0-10.el7_6.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825813" version="1" comment="libvirt-libs is &lt;4.5.0-10.el7_6.10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825814" version="1" comment="libvirt-lock-sanlock is &lt;4.5.0-10.el7_6.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825815" version="1" comment="libvirt-login-shell is &lt;4.5.0-10.el7_6.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825816" version="1" comment="libvirt-nss is &lt;4.5.0-10.el7_6.10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828391" version="1" comment="freeradius is &lt;3.0.13-15.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828392" version="1" comment="freeradius-devel is &lt;3.0.13-15.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828393" version="1" comment="freeradius-doc is &lt;3.0.13-15.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828394" version="1" comment="freeradius-krb5 is &lt;3.0.13-15.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828395" version="1" comment="freeradius-ldap is &lt;3.0.13-15.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828396" version="1" comment="freeradius-mysql is &lt;3.0.13-15.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828397" version="1" comment="freeradius-perl is &lt;3.0.13-15.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828398" version="1" comment="freeradius-postgresql is &lt;3.0.13-15.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828399" version="1" comment="freeradius-python is &lt;3.0.13-15.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828400" version="1" comment="freeradius-sqlite is &lt;3.0.13-15.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828401" version="1" comment="freeradius-unixODBC is &lt;3.0.13-15.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828402" version="1" comment="freeradius-utils is &lt;3.0.13-15.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828983" version="1" comment="pki-base is &lt;10.5.18-12.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828984" version="1" comment="pki-base-java is &lt;10.5.18-12.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828985" version="1" comment="pki-ca is &lt;10.5.18-12.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828986" version="1" comment="pki-javadoc is &lt;10.5.18-12.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828987" version="1" comment="pki-kra is &lt;10.5.18-12.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828988" version="1" comment="pki-server is &lt;10.5.18-12.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828989" version="1" comment="pki-symkey is &lt;10.5.18-12.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828990" version="1" comment="pki-tools is &lt;10.5.18-12.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826029" version="1" comment="fence-agents-aliyun is &lt;4.2.1-24.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826030" version="1" comment="fence-agents-all is &lt;4.2.1-24.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826031" version="1" comment="fence-agents-amt-ws is &lt;4.2.1-24.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826032" version="1" comment="fence-agents-apc is &lt;4.2.1-24.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826033" version="1" comment="fence-agents-apc-snmp is &lt;4.2.1-24.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826034" version="1" comment="fence-agents-aws is &lt;4.2.1-24.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826035" version="1" comment="fence-agents-azure-arm is &lt;4.2.1-24.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826036" version="1" comment="fence-agents-bladecenter is &lt;4.2.1-24.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826037" version="1" comment="fence-agents-brocade is &lt;4.2.1-24.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826038" version="1" comment="fence-agents-cisco-mds is &lt;4.2.1-24.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826039" version="1" comment="fence-agents-cisco-ucs is &lt;4.2.1-24.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826040" version="1" comment="fence-agents-common is &lt;4.2.1-24.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826041" version="1" comment="fence-agents-compute is &lt;4.2.1-24.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826042" version="1" comment="fence-agents-drac5 is &lt;4.2.1-24.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826043" version="1" comment="fence-agents-eaton-snmp is &lt;4.2.1-24.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826044" version="1" comment="fence-agents-emerson is &lt;4.2.1-24.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826045" version="1" comment="fence-agents-eps is &lt;4.2.1-24.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826046" version="1" comment="fence-agents-gce is &lt;4.2.1-24.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826047" version="1" comment="fence-agents-heuristics-ping is &lt;4.2.1-24.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826048" version="1" comment="fence-agents-hpblade is &lt;4.2.1-24.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826049" version="1" comment="fence-agents-ibmblade is &lt;4.2.1-24.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826050" version="1" comment="fence-agents-ifmib is &lt;4.2.1-24.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826051" version="1" comment="fence-agents-ilo-moonshot is &lt;4.2.1-24.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826052" version="1" comment="fence-agents-ilo-mp is &lt;4.2.1-24.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826053" version="1" comment="fence-agents-ilo-ssh is &lt;4.2.1-24.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826054" version="1" comment="fence-agents-ilo2 is &lt;4.2.1-24.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826055" version="1" comment="fence-agents-intelmodular is &lt;4.2.1-24.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826056" version="1" comment="fence-agents-ipdu is &lt;4.2.1-24.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826057" version="1" comment="fence-agents-ipmilan is &lt;4.2.1-24.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826058" version="1" comment="fence-agents-kdump is &lt;4.2.1-24.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826059" version="1" comment="fence-agents-mpath is &lt;4.2.1-24.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826060" version="1" comment="fence-agents-redfish is &lt;4.2.1-24.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826061" version="1" comment="fence-agents-rhevm is &lt;4.2.1-24.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826062" version="1" comment="fence-agents-rsa is &lt;4.2.1-24.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826063" version="1" comment="fence-agents-rsb is &lt;4.2.1-24.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826064" version="1" comment="fence-agents-sbd is &lt;4.2.1-24.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826065" version="1" comment="fence-agents-scsi is &lt;4.2.1-24.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826066" version="1" comment="fence-agents-virsh is &lt;4.2.1-24.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826067" version="1" comment="fence-agents-vmware-rest is &lt;4.2.1-24.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826068" version="1" comment="fence-agents-vmware-soap is &lt;4.2.1-24.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826069" version="1" comment="fence-agents-wti is &lt;4.2.1-24.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825877" version="1" comment="python is &lt;2.7.5-80.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825878" version="1" comment="python-debug is &lt;2.7.5-80.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825879" version="1" comment="python-devel is &lt;2.7.5-80.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825880" version="1" comment="python-libs is &lt;2.7.5-80.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825881" version="1" comment="python-test is &lt;2.7.5-80.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825882" version="1" comment="python-tools is &lt;2.7.5-80.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825883" version="1" comment="tkinter is &lt;2.7.5-80.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825846" version="1" comment="libvirt is &lt;4.5.0-10.el7_6.12 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825847" version="1" comment="libvirt-admin is &lt;4.5.0-10.el7_6.12 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825848" version="1" comment="libvirt-bash-completion is &lt;4.5.0-10.el7_6.12 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825849" version="1" comment="libvirt-client is &lt;4.5.0-10.el7_6.12 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825850" version="1" comment="libvirt-daemon is &lt;4.5.0-10.el7_6.12 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825851" version="1" comment="libvirt-daemon-config-network is &lt;4.5.0-10.el7_6.12 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825852" version="1" comment="libvirt-daemon-config-nwfilter is &lt;4.5.0-10.el7_6.12 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825853" version="1" comment="libvirt-daemon-driver-interface is &lt;4.5.0-10.el7_6.12 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825854" version="1" comment="libvirt-daemon-driver-lxc is &lt;4.5.0-10.el7_6.12 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825855" version="1" comment="libvirt-daemon-driver-network is &lt;4.5.0-10.el7_6.12 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825856" version="1" comment="libvirt-daemon-driver-nodedev is &lt;4.5.0-10.el7_6.12 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825857" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;4.5.0-10.el7_6.12 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825858" version="1" comment="libvirt-daemon-driver-qemu is &lt;4.5.0-10.el7_6.12 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825859" version="1" comment="libvirt-daemon-driver-secret is &lt;4.5.0-10.el7_6.12 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825860" version="1" comment="libvirt-daemon-driver-storage is &lt;4.5.0-10.el7_6.12 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825861" version="1" comment="libvirt-daemon-driver-storage-core is &lt;4.5.0-10.el7_6.12 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825862" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;4.5.0-10.el7_6.12 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825863" version="1" comment="libvirt-daemon-driver-storage-gluster is &lt;4.5.0-10.el7_6.12 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825864" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;4.5.0-10.el7_6.12 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825865" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;4.5.0-10.el7_6.12 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825866" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;4.5.0-10.el7_6.12 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825867" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;4.5.0-10.el7_6.12 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825868" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;4.5.0-10.el7_6.12 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825869" version="1" comment="libvirt-daemon-kvm is &lt;4.5.0-10.el7_6.12 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825870" version="1" comment="libvirt-daemon-lxc is &lt;4.5.0-10.el7_6.12 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825871" version="1" comment="libvirt-devel is &lt;4.5.0-10.el7_6.12 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825872" version="1" comment="libvirt-docs is &lt;4.5.0-10.el7_6.12 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825873" version="1" comment="libvirt-libs is &lt;4.5.0-10.el7_6.12 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825874" version="1" comment="libvirt-lock-sanlock is &lt;4.5.0-10.el7_6.12 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825875" version="1" comment="libvirt-login-shell is &lt;4.5.0-10.el7_6.12 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825876" version="1" comment="libvirt-nss is &lt;4.5.0-10.el7_6.12 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825967" version="1" comment="icedtea-web is &lt;1.7.1-2.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825968" version="1" comment="icedtea-web-devel is &lt;1.7.1-2.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825969" version="1" comment="icedtea-web-javadoc is &lt;1.7.1-2.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826892" version="1" comment="ipa-client is &lt;4.6.5-11.el7_7.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826893" version="1" comment="ipa-client-common is &lt;4.6.5-11.el7_7.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826894" version="1" comment="ipa-common is &lt;4.6.5-11.el7_7.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826895" version="1" comment="ipa-python-compat is &lt;4.6.5-11.el7_7.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826896" version="1" comment="ipa-server is &lt;4.6.5-11.el7_7.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826897" version="1" comment="ipa-server-common is &lt;4.6.5-11.el7_7.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826898" version="1" comment="ipa-server-dns is &lt;4.6.5-11.el7_7.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826899" version="1" comment="ipa-server-trust-ad is &lt;4.6.5-11.el7_7.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826900" version="1" comment="python2-ipaclient is &lt;4.6.5-11.el7_7.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826901" version="1" comment="python2-ipalib is &lt;4.6.5-11.el7_7.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826902" version="1" comment="python2-ipaserver is &lt;4.6.5-11.el7_7.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827724" version="1" comment="ctdb is &lt;4.10.4-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827725" version="1" comment="ctdb-tests is &lt;4.10.4-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827726" version="1" comment="libsmbclient is &lt;4.10.4-10.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827727" version="1" comment="libsmbclient-devel is &lt;4.10.4-10.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827728" version="1" comment="libwbclient is &lt;4.10.4-10.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827729" version="1" comment="libwbclient-devel is &lt;4.10.4-10.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827730" version="1" comment="samba is &lt;4.10.4-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827731" version="1" comment="samba-client is &lt;4.10.4-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827732" version="1" comment="samba-client-libs is &lt;4.10.4-10.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827733" version="1" comment="samba-common is &lt;4.10.4-10.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827734" version="1" comment="samba-common-libs is &lt;4.10.4-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827735" version="1" comment="samba-common-tools is &lt;4.10.4-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827736" version="1" comment="samba-dc is &lt;4.10.4-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827737" version="1" comment="samba-dc-libs is &lt;4.10.4-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827738" version="1" comment="samba-devel is &lt;4.10.4-10.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827739" version="1" comment="samba-krb5-printing is &lt;4.10.4-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827740" version="1" comment="samba-libs is &lt;4.10.4-10.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827741" version="1" comment="samba-pidl is &lt;4.10.4-10.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827742" version="1" comment="samba-python is &lt;4.10.4-10.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827743" version="1" comment="samba-python-test is &lt;4.10.4-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827744" version="1" comment="samba-test is &lt;4.10.4-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827745" version="1" comment="samba-test-libs is &lt;4.10.4-10.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827746" version="1" comment="samba-vfs-glusterfs is &lt;4.10.4-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827747" version="1" comment="samba-winbind is &lt;4.10.4-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827748" version="1" comment="samba-winbind-clients is &lt;4.10.4-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827749" version="1" comment="samba-winbind-krb5-locator is &lt;4.10.4-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827750" version="1" comment="samba-winbind-modules is &lt;4.10.4-10.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829092" version="1" comment="postgresql is &lt;9.2.24-6.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829093" version="1" comment="postgresql-contrib is &lt;9.2.24-6.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829094" version="1" comment="postgresql-devel is &lt;9.2.24-6.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829095" version="1" comment="postgresql-docs is &lt;9.2.24-6.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829096" version="1" comment="postgresql-libs is &lt;9.2.24-6.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829097" version="1" comment="postgresql-plperl is &lt;9.2.24-6.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829098" version="1" comment="postgresql-plpython is &lt;9.2.24-6.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829099" version="1" comment="postgresql-pltcl is &lt;9.2.24-6.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829100" version="1" comment="postgresql-server is &lt;9.2.24-6.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829101" version="1" comment="postgresql-static is &lt;9.2.24-6.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829102" version="1" comment="postgresql-test is &lt;9.2.24-6.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829103" version="1" comment="postgresql-upgrade is &lt;9.2.24-6.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826586" version="1" comment="ghostscript is &lt;9.25-2.el7_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826587" version="1" comment="ghostscript-cups is &lt;9.25-2.el7_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826588" version="1" comment="ghostscript-doc is &lt;9.25-2.el7_7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826589" version="1" comment="ghostscript-gtk is &lt;9.25-2.el7_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826590" version="1" comment="libgs is &lt;9.25-2.el7_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826591" version="1" comment="libgs-devel is &lt;9.25-2.el7_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712060" version="1" comment="kernel-default is ==4.12.14-95.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712061" version="1" comment="kgraft-patch-4_12_14-95_13-default is &gt;=6-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712062" version="1" comment="kernel-default is ==4.12.14-95.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712063" version="1" comment="kgraft-patch-4_12_14-95_16-default is &gt;=6-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712064" version="1" comment="kgraft-patch-4_12_14-95_19-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712065" version="1" comment="kgraft-patch-4_12_14-95_24-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712066" version="1" comment="kgraft-patch-4_12_14-95_29-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712067" version="1" comment="kgraft-patch-4_12_14-95_32-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712068" version="1" comment="kgraft-patch-4_12_14-95_37-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712069" version="1" comment="kgraft-patch-4_12_14-120-default is &gt;=2-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712070" version="1" comment="kernel-default is ==4.12.14-150.14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712071" version="1" comment="kernel-livepatch-4_12_14-150_14-default is &gt;=6-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712072" version="1" comment="kernel-default is ==4.12.14-150.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712073" version="1" comment="kernel-livepatch-4_12_14-150_17-default is &gt;=6-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712074" version="1" comment="kernel-livepatch-4_12_14-150_22-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712075" version="1" comment="kernel-livepatch-4_12_14-150_27-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712076" version="1" comment="kernel-livepatch-4_12_14-150_32-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712077" version="1" comment="kernel-livepatch-4_12_14-150_35-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712078" version="1" comment="kernel-livepatch-4_12_14-150_38-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712079" version="1" comment="kernel-livepatch-4_12_14-25_25-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712080" version="1" comment="kernel-livepatch-4_12_14-195-default is &gt;=8-22.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712081" version="1" comment="kernel-livepatch-4_12_14-197_10-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712082" version="1" comment="kernel-livepatch-4_12_14-197_15-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712083" version="1" comment="kernel-livepatch-4_12_14-197_18-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712084" version="1" comment="kernel-livepatch-4_12_14-197_21-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712085" version="1" comment="kernel-livepatch-4_12_14-197_4-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712086" version="1" comment="kernel-livepatch-4_12_14-197_7-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826708" version="1" comment="php is &lt;5.4.16-46.1.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826709" version="1" comment="php-bcmath is &lt;5.4.16-46.1.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826710" version="1" comment="php-cli is &lt;5.4.16-46.1.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826711" version="1" comment="php-common is &lt;5.4.16-46.1.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826712" version="1" comment="php-dba is &lt;5.4.16-46.1.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826713" version="1" comment="php-devel is &lt;5.4.16-46.1.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826714" version="1" comment="php-embedded is &lt;5.4.16-46.1.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826715" version="1" comment="php-enchant is &lt;5.4.16-46.1.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826716" version="1" comment="php-fpm is &lt;5.4.16-46.1.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826717" version="1" comment="php-gd is &lt;5.4.16-46.1.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826718" version="1" comment="php-intl is &lt;5.4.16-46.1.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826719" version="1" comment="php-ldap is &lt;5.4.16-46.1.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826720" version="1" comment="php-mbstring is &lt;5.4.16-46.1.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826721" version="1" comment="php-mysql is &lt;5.4.16-46.1.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826722" version="1" comment="php-mysqlnd is &lt;5.4.16-46.1.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826723" version="1" comment="php-odbc is &lt;5.4.16-46.1.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826724" version="1" comment="php-pdo is &lt;5.4.16-46.1.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826725" version="1" comment="php-pgsql is &lt;5.4.16-46.1.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826726" version="1" comment="php-process is &lt;5.4.16-46.1.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826727" version="1" comment="php-pspell is &lt;5.4.16-46.1.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826728" version="1" comment="php-recode is &lt;5.4.16-46.1.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826729" version="1" comment="php-snmp is &lt;5.4.16-46.1.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826730" version="1" comment="php-soap is &lt;5.4.16-46.1.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826731" version="1" comment="php-xml is &lt;5.4.16-46.1.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826732" version="1" comment="php-xmlrpc is &lt;5.4.16-46.1.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828468" version="1" comment="libxslt is &lt;1.1.28-6.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828469" version="1" comment="libxslt-devel is &lt;1.1.28-6.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828470" version="1" comment="libxslt-python is &lt;1.1.28-6.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828527" version="1" comment="webkitgtk4 is &lt;2.28.2-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828528" version="1" comment="webkitgtk4-devel is &lt;2.28.2-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828529" version="1" comment="webkitgtk4-doc is &lt;2.28.2-2.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828530" version="1" comment="webkitgtk4-jsc is &lt;2.28.2-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828531" version="1" comment="webkitgtk4-jsc-devel is &lt;2.28.2-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712087" version="1" comment="kgraft-patch-4_12_14-94_41-default is &gt;=5-2.13.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712088" version="1" comment="kgraft-patch-4_12_14-95_3-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712089" version="1" comment="kgraft-patch-4_12_14-95_6-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712090" version="1" comment="kernel-livepatch-4_12_14-25_13-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712091" version="1" comment="kernel-livepatch-4_12_14-25_16-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712092" version="1" comment="kernel-livepatch-4_12_14-25_19-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712093" version="1" comment="kernel-livepatch-4_12_14-25_22-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712094" version="1" comment="kernel-livepatch-4_12_14-25_25-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712095" version="1" comment="kernel-livepatch-4_12_14-25_28-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712096" version="1" comment="kernel-livepatch-4_12_14-25_3-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712097" version="1" comment="kernel-livepatch-4_12_14-25_6-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826875" version="1" comment="qemu-img is &lt;1.5.3-167.el7_7.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826876" version="1" comment="qemu-kvm is &lt;1.5.3-167.el7_7.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826877" version="1" comment="qemu-kvm-common is &lt;1.5.3-167.el7_7.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826878" version="1" comment="qemu-kvm-tools is &lt;1.5.3-167.el7_7.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825710" version="1" comment="freeradius is &lt;3.0.13-10.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825711" version="1" comment="freeradius-devel is &lt;3.0.13-10.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825712" version="1" comment="freeradius-doc is &lt;3.0.13-10.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825713" version="1" comment="freeradius-krb5 is &lt;3.0.13-10.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825714" version="1" comment="freeradius-ldap is &lt;3.0.13-10.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825715" version="1" comment="freeradius-mysql is &lt;3.0.13-10.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825716" version="1" comment="freeradius-perl is &lt;3.0.13-10.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825717" version="1" comment="freeradius-postgresql is &lt;3.0.13-10.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825718" version="1" comment="freeradius-python is &lt;3.0.13-10.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825719" version="1" comment="freeradius-sqlite is &lt;3.0.13-10.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825720" version="1" comment="freeradius-unixODBC is &lt;3.0.13-10.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825721" version="1" comment="freeradius-utils is &lt;3.0.13-10.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826601" version="1" comment="bpftool is &lt;3.10.0-1062.1.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826602" version="1" comment="kernel is &lt;3.10.0-1062.1.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826603" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1062.1.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826604" version="1" comment="kernel-debug is &lt;3.10.0-1062.1.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826607" version="1" comment="kernel-doc is &lt;3.10.0-1062.1.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826608" version="1" comment="kernel-headers is &lt;3.10.0-1062.1.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826609" version="1" comment="kernel-tools is &lt;3.10.0-1062.1.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826610" version="1" comment="kernel-tools-libs is &lt;3.10.0-1062.1.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826612" version="1" comment="perf is &lt;3.10.0-1062.1.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826613" version="1" comment="python-perf is &lt;3.10.0-1062.1.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829899" version="1" comment="pcs is &lt;0.9.169-3.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829900" version="1" comment="pcs-snmp is &lt;0.9.169-3.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712099" version="1" comment="kgraft-patch-4_4_138-94_39-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712100" version="1" comment="kgraft-patch-4_4_140-94_42-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712101" version="1" comment="kgraft-patch-4_4_143-94_47-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712102" version="1" comment="kgraft-patch-4_4_155-94_50-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712103" version="1" comment="kgraft-patch-4_4_156-94_57-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712104" version="1" comment="kgraft-patch-4_4_156-94_61-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712105" version="1" comment="kgraft-patch-4_4_156-94_64-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712106" version="1" comment="kgraft-patch-4_4_162-94_69-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712107" version="1" comment="kgraft-patch-4_4_162-94_72-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712108" version="1" comment="kernel-default is ==4.4.175-94.79.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712109" version="1" comment="kgraft-patch-4_4_175-94_79-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712110" version="1" comment="kernel-default is ==4.4.176-94.88.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712111" version="1" comment="kgraft-patch-4_4_176-94_88-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712112" version="1" comment="kernel-default is ==4.4.178-94.91.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712113" version="1" comment="kgraft-patch-4_4_178-94_91-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712114" version="1" comment="kernel-default is &lt;4.4.178-94.91.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712115" version="1" comment="kgraft-patch-4_12_14-94_41-default is &gt;=6-2.16.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712116" version="1" comment="kgraft-patch-4_12_14-95_13-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712117" version="1" comment="kgraft-patch-4_12_14-95_16-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712118" version="1" comment="kgraft-patch-4_12_14-95_3-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712119" version="1" comment="kgraft-patch-4_12_14-95_6-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712120" version="1" comment="kernel-livepatch-4_12_14-150_14-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712121" version="1" comment="kernel-livepatch-4_12_14-150_17-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712122" version="1" comment="kernel-livepatch-4_12_14-25_13-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712123" version="1" comment="kernel-livepatch-4_12_14-25_16-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712124" version="1" comment="kernel-livepatch-4_12_14-25_19-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712125" version="1" comment="kernel-livepatch-4_12_14-25_22-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712126" version="1" comment="kernel-livepatch-4_12_14-25_25-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712127" version="1" comment="kernel-livepatch-4_12_14-25_28-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712128" version="1" comment="kernel-livepatch-4_12_14-25_3-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712129" version="1" comment="kernel-livepatch-4_12_14-25_6-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712130" version="1" comment="kernel-livepatch-4_12_14-195-default is &gt;=4-10.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481199" version="1" comment="kernel-default is &lt;4.12.14-195.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825833" version="1" comment="bpftool is &lt;3.10.0-957.21.3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825834" version="1" comment="kernel is &lt;3.10.0-957.21.3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825835" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-957.21.3.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825836" version="1" comment="kernel-debug is &lt;3.10.0-957.21.3.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825839" version="1" comment="kernel-doc is &lt;3.10.0-957.21.3.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825840" version="1" comment="kernel-headers is &lt;3.10.0-957.21.3.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825841" version="1" comment="kernel-tools is &lt;3.10.0-957.21.3.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825842" version="1" comment="kernel-tools-libs is &lt;3.10.0-957.21.3.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825844" version="1" comment="perf is &lt;3.10.0-957.21.3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825845" version="1" comment="python-perf is &lt;3.10.0-957.21.3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712131" version="1" comment="kgraft-patch-4_12_14-95_19-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712132" version="1" comment="kernel-livepatch-4_12_14-150_22-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712133" version="1" comment="kernel-livepatch-4_12_14-197_4-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712134" version="1" comment="kernel-livepatch-4_12_14-197_7-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712135" version="1" comment="kernel-default is ==4.4.180-94.97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712136" version="1" comment="kgraft-patch-4_4_180-94_97-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712137" version="1" comment="kernel-default is &lt;4.4.180-94.97.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712138" version="1" comment="kgraft-patch-4_12_14-95_13-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712139" version="1" comment="kgraft-patch-4_12_14-95_16-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712140" version="1" comment="kernel-livepatch-4_12_14-150_14-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712141" version="1" comment="kernel-livepatch-4_12_14-150_17-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712142" version="1" comment="kernel-livepatch-4_12_14-195-default is &gt;=2-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826933" version="1" comment="bpftool is &lt;3.10.0-1062.18.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826934" version="1" comment="kernel is &lt;3.10.0-1062.18.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826935" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1062.18.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826936" version="1" comment="kernel-debug is &lt;3.10.0-1062.18.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826939" version="1" comment="kernel-doc is &lt;3.10.0-1062.18.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826940" version="1" comment="kernel-headers is &lt;3.10.0-1062.18.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826941" version="1" comment="kernel-tools is &lt;3.10.0-1062.18.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826942" version="1" comment="kernel-tools-libs is &lt;3.10.0-1062.18.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826944" version="1" comment="perf is &lt;3.10.0-1062.18.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826945" version="1" comment="python-perf is &lt;3.10.0-1062.18.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826644" version="1" comment="dovecot is &lt;2.2.36-3.el7_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826645" version="1" comment="dovecot-devel is &lt;2.2.36-3.el7_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826646" version="1" comment="dovecot-mysql is &lt;2.2.36-3.el7_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826647" version="1" comment="dovecot-pgsql is &lt;2.2.36-3.el7_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826648" version="1" comment="dovecot-pigeonhole is &lt;2.2.36-3.el7_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825890" version="1" comment="thunderbird is &lt;60.7.2-2.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825884" version="1" comment="firefox is &lt;60.7.2-1.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825891" version="1" comment="firefox is &lt;60.8.0-1.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825892" version="1" comment="thunderbird is &lt;60.8.0-1.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828558" version="1" comment="nspr is &lt;4.25.0-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828559" version="1" comment="nspr-devel is &lt;4.25.0-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828560" version="1" comment="nss is &lt;3.53.1-3.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828561" version="1" comment="nss-devel is &lt;3.53.1-3.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828562" version="1" comment="nss-pkcs11-devel is &lt;3.53.1-3.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828563" version="1" comment="nss-softokn is &lt;3.53.1-6.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828564" version="1" comment="nss-softokn-devel is &lt;3.53.1-6.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828565" version="1" comment="nss-softokn-freebl is &lt;3.53.1-6.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828566" version="1" comment="nss-softokn-freebl-devel is &lt;3.53.1-6.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828567" version="1" comment="nss-sysinit is &lt;3.53.1-3.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828568" version="1" comment="nss-tools is &lt;3.53.1-3.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828569" version="1" comment="nss-util is &lt;3.53.1-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828570" version="1" comment="nss-util-devel is &lt;3.53.1-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826791" version="1" comment="nss is &lt;3.44.0-7.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826792" version="1" comment="nss-devel is &lt;3.44.0-7.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826793" version="1" comment="nss-softokn is &lt;3.44.0-8.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826794" version="1" comment="nss-softokn-devel is &lt;3.44.0-8.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826795" version="1" comment="nss-softokn-freebl is &lt;3.44.0-8.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826796" version="1" comment="nss-softokn-freebl-devel is &lt;3.44.0-8.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826797" version="1" comment="nss-sysinit is &lt;3.44.0-7.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826798" version="1" comment="nss-tools is &lt;3.44.0-7.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826799" version="1" comment="nss-util is &lt;3.44.0-4.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826800" version="1" comment="nss-util-devel is &lt;3.44.0-4.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826629" version="1" comment="firefox is &lt;60.9.0-1.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826630" version="1" comment="thunderbird is &lt;60.9.0-1.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826704" version="1" comment="firefox is &lt;68.2.0-1.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826707" version="1" comment="thunderbird is &lt;68.2.0-1.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826625" version="1" comment="qemu-img is &lt;1.5.3-167.el7_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826626" version="1" comment="qemu-kvm is &lt;1.5.3-167.el7_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826627" version="1" comment="qemu-kvm-common is &lt;1.5.3-167.el7_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826628" version="1" comment="qemu-kvm-tools is &lt;1.5.3-167.el7_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827751" version="1" comment="python-twisted-web is &lt;12.1.0-6.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828333" version="1" comment="spamassassin is &lt;3.4.0-6.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828350" version="1" comment="glib2 is &lt;2.56.1-7.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828351" version="1" comment="glib2-devel is &lt;2.56.1-7.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828352" version="1" comment="glib2-doc is &lt;2.56.1-7.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828353" version="1" comment="glib2-fam is &lt;2.56.1-7.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828354" version="1" comment="glib2-static is &lt;2.56.1-7.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828355" version="1" comment="glib2-tests is &lt;2.56.1-7.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828356" version="1" comment="ibus is &lt;1.5.17-11.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828357" version="1" comment="ibus-devel is &lt;1.5.17-11.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828358" version="1" comment="ibus-devel-docs is &lt;1.5.17-11.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828359" version="1" comment="ibus-gtk2 is &lt;1.5.17-11.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828360" version="1" comment="ibus-gtk3 is &lt;1.5.17-11.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828361" version="1" comment="ibus-libs is &lt;1.5.17-11.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828362" version="1" comment="ibus-pygtk2 is &lt;1.5.17-11.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828363" version="1" comment="ibus-setup is &lt;1.5.17-11.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827959" version="1" comment="squid is &lt;3.5.20-15.el7_8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827960" version="1" comment="squid-migration-script is &lt;3.5.20-15.el7_8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827961" version="1" comment="squid-sysvinit is &lt;3.5.20-15.el7_8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828576" version="1" comment="squid is &lt;3.5.20-17.el7_9.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828577" version="1" comment="squid-migration-script is &lt;3.5.20-17.el7_9.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828578" version="1" comment="squid-sysvinit is &lt;3.5.20-17.el7_9.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830559" version="1" comment="vim-X11 is &lt;7.4.160-6.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830560" version="1" comment="vim-common is &lt;7.4.160-6.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830561" version="1" comment="vim-enhanced is &lt;7.4.160-6.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830562" version="1" comment="vim-filesystem is &lt;7.4.160-6.el7_6 for noarch,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830563" version="1" comment="vim-minimal is &lt;7.4.160-6.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828521" version="1" comment="dbus is &lt;1.10.24-15.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828522" version="1" comment="dbus-devel is &lt;1.10.24-15.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828523" version="1" comment="dbus-doc is &lt;1.10.24-15.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828524" version="1" comment="dbus-libs is &lt;1.10.24-15.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828525" version="1" comment="dbus-tests is &lt;1.10.24-15.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828526" version="1" comment="dbus-x11 is &lt;1.10.24-15.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827901" version="1" comment="libqb is &lt;1.0.1-9.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827902" version="1" comment="libqb-devel is &lt;1.0.1-9.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712143" version="1" comment="kernel-livepatch-4_12_14-195-default is &gt;=3-7.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712144" version="1" comment="kernel-livepatch-4_12_14-197_4-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714896" version="1" comment="kernel-default is &lt;4.12.14-197.4.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826988" version="1" comment="mod_auth_mellon is &lt;0.14.0-8.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826989" version="1" comment="mod_auth_mellon-diagnostics is &lt;0.14.0-8.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827897" version="1" comment="unzip is &lt;6.0-21.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712145" version="1" comment="kernel-livepatch-4_12_14-195-default is &gt;=5-13.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712146" version="1" comment="kernel-livepatch-4_12_14-197_4-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712147" version="1" comment="kernel-livepatch-4_12_14-197_7-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827653" version="1" comment="libosinfo is &lt;1.1.0-5.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827654" version="1" comment="libosinfo-devel is &lt;1.1.0-5.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827655" version="1" comment="libosinfo-vala is &lt;1.1.0-5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826765" version="1" comment="SDL is &lt;1.2.15-14.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826766" version="1" comment="SDL-devel is &lt;1.2.15-14.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826767" version="1" comment="SDL-static is &lt;1.2.15-14.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826866" version="1" comment="lemon is &lt;3.7.17-8.el7_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826867" version="1" comment="sqlite is &lt;3.7.17-8.el7_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826868" version="1" comment="sqlite-devel is &lt;3.7.17-8.el7_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826869" version="1" comment="sqlite-doc is &lt;3.7.17-8.el7_7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826870" version="1" comment="sqlite-tcl is &lt;3.7.17-8.el7_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826824" version="1" comment="emacs-git is &lt;1.8.3.1-21.el7_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826825" version="1" comment="emacs-git-el is &lt;1.8.3.1-21.el7_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826826" version="1" comment="git is &lt;1.8.3.1-21.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826827" version="1" comment="git-all is &lt;1.8.3.1-21.el7_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826828" version="1" comment="git-bzr is &lt;1.8.3.1-21.el7_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826829" version="1" comment="git-cvs is &lt;1.8.3.1-21.el7_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826830" version="1" comment="git-daemon is &lt;1.8.3.1-21.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826831" version="1" comment="git-email is &lt;1.8.3.1-21.el7_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826832" version="1" comment="git-gnome-keyring is &lt;1.8.3.1-21.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826833" version="1" comment="git-gui is &lt;1.8.3.1-21.el7_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826834" version="1" comment="git-hg is &lt;1.8.3.1-21.el7_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826835" version="1" comment="git-instaweb is &lt;1.8.3.1-21.el7_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826836" version="1" comment="git-p4 is &lt;1.8.3.1-21.el7_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826837" version="1" comment="git-svn is &lt;1.8.3.1-21.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826838" version="1" comment="gitk is &lt;1.8.3.1-21.el7_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826839" version="1" comment="gitweb is &lt;1.8.3.1-21.el7_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826840" version="1" comment="perl-Git is &lt;1.8.3.1-21.el7_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826841" version="1" comment="perl-Git-SVN is &lt;1.8.3.1-21.el7_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826705" version="1" comment="sudo is &lt;1.8.23-4.el7_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826706" version="1" comment="sudo-devel is &lt;1.8.23-4.el7_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828334" version="1" comment="evince is &lt;3.28.2-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828335" version="1" comment="evince-browser-plugin is &lt;3.28.2-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828336" version="1" comment="evince-devel is &lt;3.28.2-10.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828337" version="1" comment="evince-dvi is &lt;3.28.2-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828338" version="1" comment="evince-libs is &lt;3.28.2-10.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828339" version="1" comment="evince-nautilus is &lt;3.28.2-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828340" version="1" comment="poppler is &lt;0.26.5-43.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828341" version="1" comment="poppler-cpp is &lt;0.26.5-43.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828342" version="1" comment="poppler-cpp-devel is &lt;0.26.5-43.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828343" version="1" comment="poppler-demos is &lt;0.26.5-43.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828344" version="1" comment="poppler-devel is &lt;0.26.5-43.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828345" version="1" comment="poppler-glib is &lt;0.26.5-43.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828346" version="1" comment="poppler-glib-devel is &lt;0.26.5-43.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828347" version="1" comment="poppler-qt is &lt;0.26.5-43.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828348" version="1" comment="poppler-qt-devel is &lt;0.26.5-43.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828349" version="1" comment="poppler-utils is &lt;0.26.5-43.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826614" version="1" comment="kde-settings is &lt;19-23.10.el7_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826615" version="1" comment="kde-settings-ksplash is &lt;19-23.10.el7_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826616" version="1" comment="kde-settings-minimal is &lt;19-23.10.el7_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826617" version="1" comment="kde-settings-plasma is &lt;19-23.10.el7_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826618" version="1" comment="kde-settings-pulseaudio is &lt;19-23.10.el7_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826619" version="1" comment="kdelibs is &lt;4.14.8-11.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826620" version="1" comment="kdelibs-apidocs is &lt;4.14.8-11.el7_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826621" version="1" comment="kdelibs-common is &lt;4.14.8-11.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826622" version="1" comment="kdelibs-devel is &lt;4.14.8-11.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826623" version="1" comment="kdelibs-ktexteditor is &lt;4.14.8-11.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826624" version="1" comment="qt-settings is &lt;19-23.10.el7_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826595" version="1" comment="ghostscript is &lt;9.25-2.el7_7.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826596" version="1" comment="ghostscript-cups is &lt;9.25-2.el7_7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826597" version="1" comment="ghostscript-doc is &lt;9.25-2.el7_7.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826598" version="1" comment="ghostscript-gtk is &lt;9.25-2.el7_7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826599" version="1" comment="libgs is &lt;9.25-2.el7_7.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826600" version="1" comment="libgs-devel is &lt;9.25-2.el7_7.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826879" version="1" comment="bpftool is &lt;3.10.0-1062.12.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826880" version="1" comment="kernel is &lt;3.10.0-1062.12.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826881" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1062.12.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826882" version="1" comment="kernel-debug is &lt;3.10.0-1062.12.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826885" version="1" comment="kernel-doc is &lt;3.10.0-1062.12.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826886" version="1" comment="kernel-headers is &lt;3.10.0-1062.12.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826887" version="1" comment="kernel-tools is &lt;3.10.0-1062.12.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826888" version="1" comment="kernel-tools-libs is &lt;3.10.0-1062.12.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826890" version="1" comment="perf is &lt;3.10.0-1062.12.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826891" version="1" comment="python-perf is &lt;3.10.0-1062.12.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826769" version="1" comment="bpftool is &lt;3.10.0-1062.7.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826770" version="1" comment="kernel is &lt;3.10.0-1062.7.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826771" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1062.7.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826772" version="1" comment="kernel-debug is &lt;3.10.0-1062.7.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826775" version="1" comment="kernel-doc is &lt;3.10.0-1062.7.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826776" version="1" comment="kernel-headers is &lt;3.10.0-1062.7.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826777" version="1" comment="kernel-tools is &lt;3.10.0-1062.7.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826778" version="1" comment="kernel-tools-libs is &lt;3.10.0-1062.7.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826780" version="1" comment="perf is &lt;3.10.0-1062.7.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826781" version="1" comment="python-perf is &lt;3.10.0-1062.7.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826663" version="1" comment="jss is &lt;4.4.6-3.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826664" version="1" comment="jss-javadoc is &lt;4.4.6-3.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826782" version="1" comment="389-ds-base is &lt;1.3.9.1-12.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826783" version="1" comment="389-ds-base-devel is &lt;1.3.9.1-12.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826784" version="1" comment="389-ds-base-libs is &lt;1.3.9.1-12.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826785" version="1" comment="389-ds-base-snmp is &lt;1.3.9.1-12.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828238" version="1" comment="dnsmasq is &lt;2.76-16.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828239" version="1" comment="dnsmasq-utils is &lt;2.76-16.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712148" version="1" comment="kgraft-patch-4_12_14-94_41-default is &gt;=7-2.19.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712149" version="1" comment="kgraft-patch-4_12_14-95_13-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712150" version="1" comment="kgraft-patch-4_12_14-95_16-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712151" version="1" comment="kgraft-patch-4_12_14-95_19-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712152" version="1" comment="kgraft-patch-4_12_14-95_24-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712153" version="1" comment="kgraft-patch-4_12_14-95_29-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712154" version="1" comment="kgraft-patch-4_12_14-95_3-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712155" version="1" comment="kgraft-patch-4_12_14-95_6-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712156" version="1" comment="kernel-livepatch-4_12_14-150_14-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712157" version="1" comment="kernel-livepatch-4_12_14-150_17-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712158" version="1" comment="kernel-livepatch-4_12_14-150_22-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712159" version="1" comment="kernel-livepatch-4_12_14-150_27-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712160" version="1" comment="kernel-livepatch-4_12_14-150_32-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712161" version="1" comment="kernel-livepatch-4_12_14-25_19-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712162" version="1" comment="kernel-livepatch-4_12_14-25_22-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712163" version="1" comment="kernel-livepatch-4_12_14-25_25-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712164" version="1" comment="kernel-livepatch-4_12_14-25_28-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712165" version="1" comment="kernel-livepatch-4_12_14-195-default is &gt;=6-16.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712166" version="1" comment="kernel-livepatch-4_12_14-197_10-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712167" version="1" comment="kernel-livepatch-4_12_14-197_15-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712168" version="1" comment="kernel-livepatch-4_12_14-197_4-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712169" version="1" comment="kernel-livepatch-4_12_14-197_7-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826631" version="1" comment="bpftool is &lt;3.10.0-1062.1.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826632" version="1" comment="kernel is &lt;3.10.0-1062.1.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826633" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1062.1.2.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826634" version="1" comment="kernel-debug is &lt;3.10.0-1062.1.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826637" version="1" comment="kernel-doc is &lt;3.10.0-1062.1.2.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826638" version="1" comment="kernel-headers is &lt;3.10.0-1062.1.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826639" version="1" comment="kernel-tools is &lt;3.10.0-1062.1.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826640" version="1" comment="kernel-tools-libs is &lt;3.10.0-1062.1.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826642" version="1" comment="perf is &lt;3.10.0-1062.1.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826643" version="1" comment="python-perf is &lt;3.10.0-1062.1.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827827" version="1" comment="nbdkit is &lt;1.8.0-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827828" version="1" comment="nbdkit-basic-plugins is &lt;1.8.0-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827829" version="1" comment="nbdkit-devel is &lt;1.8.0-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827830" version="1" comment="nbdkit-example-plugins is &lt;1.8.0-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827831" version="1" comment="nbdkit-plugin-python-common is &lt;1.8.0-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827832" version="1" comment="nbdkit-plugin-python2 is &lt;1.8.0-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827833" version="1" comment="nbdkit-plugin-vddk is &lt;1.8.0-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828319" version="1" comment="mod_auth_openidc is &lt;1.8.8-7.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828265" version="1" comment="cpio is &lt;2.11-28.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826917" version="1" comment="ksh is &lt;20120801-140.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826759" version="1" comment="ghostscript is &lt;9.25-2.el7_7.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826760" version="1" comment="ghostscript-cups is &lt;9.25-2.el7_7.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826761" version="1" comment="ghostscript-doc is &lt;9.25-2.el7_7.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826762" version="1" comment="ghostscript-gtk is &lt;9.25-2.el7_7.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826763" version="1" comment="libgs is &lt;9.25-2.el7_7.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826764" version="1" comment="libgs-devel is &lt;9.25-2.el7_7.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712170" version="1" comment="kgraft-patch-4_12_14-95_45-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712171" version="1" comment="kernel-default is &lt;4.12.14-95.45.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712172" version="1" comment="kgraft-patch-4_12_14-122_12-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712173" version="1" comment="kgraft-patch-4_12_14-122_7-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712174" version="1" comment="kernel-livepatch-4_12_14-150_47-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712175" version="1" comment="kernel-livepatch-4_12_14-197_29-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712176" version="1" comment="kernel-default is &lt;4.12.14-197.29.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712177" version="1" comment="kgraft-patch-4_12_14-95_13-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712178" version="1" comment="kgraft-patch-4_12_14-95_16-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712179" version="1" comment="kgraft-patch-4_12_14-95_19-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712180" version="1" comment="kgraft-patch-4_12_14-95_24-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712181" version="1" comment="kgraft-patch-4_12_14-95_29-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712182" version="1" comment="kgraft-patch-4_12_14-95_32-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712183" version="1" comment="kgraft-patch-4_12_14-95_37-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712184" version="1" comment="kgraft-patch-4_12_14-95_40-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712185" version="1" comment="kgraft-patch-4_12_14-95_45-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712186" version="1" comment="kgraft-patch-4_12_14-95_6-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712187" version="1" comment="kgraft-patch-4_12_14-122_12-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712188" version="1" comment="kgraft-patch-4_12_14-122_7-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712189" version="1" comment="kernel-livepatch-4_12_14-150_14-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712190" version="1" comment="kernel-livepatch-4_12_14-150_17-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712191" version="1" comment="kernel-livepatch-4_12_14-150_22-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712192" version="1" comment="kernel-livepatch-4_12_14-150_27-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712193" version="1" comment="kernel-livepatch-4_12_14-150_32-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712194" version="1" comment="kernel-livepatch-4_12_14-150_35-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712195" version="1" comment="kernel-livepatch-4_12_14-150_38-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712196" version="1" comment="kernel-livepatch-4_12_14-150_41-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712197" version="1" comment="kernel-livepatch-4_12_14-150_47-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712198" version="1" comment="kernel-livepatch-4_12_14-25_28-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712199" version="1" comment="kernel-livepatch-4_12_14-195-default is &gt;=9-25.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712200" version="1" comment="kernel-livepatch-4_12_14-197_10-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712201" version="1" comment="kernel-livepatch-4_12_14-197_15-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712202" version="1" comment="kernel-livepatch-4_12_14-197_18-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712203" version="1" comment="kernel-livepatch-4_12_14-197_21-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712204" version="1" comment="kernel-livepatch-4_12_14-197_26-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712205" version="1" comment="kernel-livepatch-4_12_14-197_29-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712206" version="1" comment="kernel-livepatch-4_12_14-197_4-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712207" version="1" comment="kernel-livepatch-4_12_14-197_7-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826786" version="1" comment="SDL is &lt;1.2.15-15.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826787" version="1" comment="SDL-devel is &lt;1.2.15-15.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826788" version="1" comment="SDL-static is &lt;1.2.15-15.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828364" version="1" comment="ctdb is &lt;4.10.16-5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828365" version="1" comment="ctdb-tests is &lt;4.10.16-5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828366" version="1" comment="libsmbclient is &lt;4.10.16-5.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828367" version="1" comment="libsmbclient-devel is &lt;4.10.16-5.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828368" version="1" comment="libwbclient is &lt;4.10.16-5.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828369" version="1" comment="libwbclient-devel is &lt;4.10.16-5.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828370" version="1" comment="samba is &lt;4.10.16-5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828371" version="1" comment="samba-client is &lt;4.10.16-5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828372" version="1" comment="samba-client-libs is &lt;4.10.16-5.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828373" version="1" comment="samba-common is &lt;4.10.16-5.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828374" version="1" comment="samba-common-libs is &lt;4.10.16-5.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828375" version="1" comment="samba-common-tools is &lt;4.10.16-5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828376" version="1" comment="samba-dc is &lt;4.10.16-5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828377" version="1" comment="samba-dc-libs is &lt;4.10.16-5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828378" version="1" comment="samba-devel is &lt;4.10.16-5.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828379" version="1" comment="samba-krb5-printing is &lt;4.10.16-5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828380" version="1" comment="samba-libs is &lt;4.10.16-5.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828381" version="1" comment="samba-pidl is &lt;4.10.16-5.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828382" version="1" comment="samba-python is &lt;4.10.16-5.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828383" version="1" comment="samba-python-test is &lt;4.10.16-5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828384" version="1" comment="samba-test is &lt;4.10.16-5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828385" version="1" comment="samba-test-libs is &lt;4.10.16-5.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828386" version="1" comment="samba-vfs-glusterfs is &lt;4.10.16-5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828387" version="1" comment="samba-winbind is &lt;4.10.16-5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828388" version="1" comment="samba-winbind-clients is &lt;4.10.16-5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828389" version="1" comment="samba-winbind-krb5-locator is &lt;4.10.16-5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828390" version="1" comment="samba-winbind-modules is &lt;4.10.16-5.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828257" version="1" comment="libtiff is &lt;4.0.3-35.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828258" version="1" comment="libtiff-devel is &lt;4.0.3-35.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828259" version="1" comment="libtiff-static is &lt;4.0.3-35.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828260" version="1" comment="libtiff-tools is &lt;4.0.3-35.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712208" version="1" comment="kernel-default is &lt;4.12.14-197.18.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712209" version="1" comment="kernel-default is &lt;4.12.14-95.29.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712210" version="1" comment="kernel-default is &lt;4.12.14-150.32.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826927" version="1" comment="http-parser is &lt;2.7.1-8.el7_7.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826928" version="1" comment="http-parser-devel is &lt;2.7.1-8.el7_7.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826965" version="1" comment="libvncserver is &lt;0.9.9-14.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826966" version="1" comment="libvncserver-devel is &lt;0.9.9-14.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828226" version="1" comment="tigervnc is &lt;1.8.0-21.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828227" version="1" comment="tigervnc-icons is &lt;1.8.0-21.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828228" version="1" comment="tigervnc-license is &lt;1.8.0-21.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828229" version="1" comment="tigervnc-server is &lt;1.8.0-21.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828230" version="1" comment="tigervnc-server-applet is &lt;1.8.0-21.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828231" version="1" comment="tigervnc-server-minimal is &lt;1.8.0-21.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828232" version="1" comment="tigervnc-server-module is &lt;1.8.0-21.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828320" version="1" comment="hunspell is &lt;1.3.2-16.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828321" version="1" comment="hunspell-devel is &lt;1.3.2-16.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712212" version="1" comment="kgraft-patch-4_12_14-95_48-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712213" version="1" comment="kgraft-patch-4_12_14-95_51-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712214" version="1" comment="kernel-default is ==4.12.14-95.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712215" version="1" comment="kgraft-patch-4_12_14-95_54-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712216" version="1" comment="kernel-default is &lt;4.12.14-95.54.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712217" version="1" comment="kernel-default is ==4.12.14-150.52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712218" version="1" comment="kernel-livepatch-4_12_14-150_52-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712219" version="1" comment="kernel-default is &lt;4.12.14-150.52.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826919" version="1" comment="python-pillow is &lt;2.0.0-20.gitd1c6db8.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826920" version="1" comment="python-pillow-devel is &lt;2.0.0-20.gitd1c6db8.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826921" version="1" comment="python-pillow-doc is &lt;2.0.0-20.gitd1c6db8.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826922" version="1" comment="python-pillow-qt is &lt;2.0.0-20.gitd1c6db8.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826923" version="1" comment="python-pillow-sane is &lt;2.0.0-20.gitd1c6db8.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826924" version="1" comment="python-pillow-tk is &lt;2.0.0-20.gitd1c6db8.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828266" version="1" comment="python is &lt;2.7.5-89.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828267" version="1" comment="python-debug is &lt;2.7.5-89.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828268" version="1" comment="python-devel is &lt;2.7.5-89.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828269" version="1" comment="python-libs is &lt;2.7.5-89.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828270" version="1" comment="python-test is &lt;2.7.5-89.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828271" version="1" comment="python-tools is &lt;2.7.5-89.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828246" version="1" comment="python3 is &lt;3.6.8-17.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828247" version="1" comment="python3-debug is &lt;3.6.8-17.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828248" version="1" comment="python3-devel is &lt;3.6.8-17.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828249" version="1" comment="python3-idle is &lt;3.6.8-17.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828250" version="1" comment="python3-libs is &lt;3.6.8-17.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828251" version="1" comment="python3-test is &lt;3.6.8-17.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828252" version="1" comment="python3-tkinter is &lt;3.6.8-17.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828272" version="1" comment="tkinter is &lt;2.7.5-89.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826789" version="1" comment="firefox is &lt;68.3.0-1.el7_7 for i686" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826790" version="1" comment="thunderbird is &lt;68.3.0-1.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826806" version="1" comment="firefox is &lt;68.4.1-1.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826807" version="1" comment="thunderbird is &lt;68.4.1-2.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826970" version="1" comment="rsyslog is &lt;8.24.0-52.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826971" version="1" comment="rsyslog-crypto is &lt;8.24.0-52.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826972" version="1" comment="rsyslog-doc is &lt;8.24.0-52.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826973" version="1" comment="rsyslog-elasticsearch is &lt;8.24.0-52.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826974" version="1" comment="rsyslog-gnutls is &lt;8.24.0-52.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826975" version="1" comment="rsyslog-gssapi is &lt;8.24.0-52.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826976" version="1" comment="rsyslog-kafka is &lt;8.24.0-52.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826977" version="1" comment="rsyslog-libdbi is &lt;8.24.0-52.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826978" version="1" comment="rsyslog-mmaudit is &lt;8.24.0-52.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826979" version="1" comment="rsyslog-mmjsonparse is &lt;8.24.0-52.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826980" version="1" comment="rsyslog-mmkubernetes is &lt;8.24.0-52.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826981" version="1" comment="rsyslog-mmnormalize is &lt;8.24.0-52.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826982" version="1" comment="rsyslog-mmsnmptrapd is &lt;8.24.0-52.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826983" version="1" comment="rsyslog-mysql is &lt;8.24.0-52.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826984" version="1" comment="rsyslog-pgsql is &lt;8.24.0-52.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826985" version="1" comment="rsyslog-relp is &lt;8.24.0-52.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826986" version="1" comment="rsyslog-snmp is &lt;8.24.0-52.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826987" version="1" comment="rsyslog-udpspoof is &lt;8.24.0-52.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712220" version="1" comment="kgraft-patch-4_12_14-94_41-default is &gt;=8-2.22.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712221" version="1" comment="kgraft-patch-4_12_14-95_13-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712222" version="1" comment="kgraft-patch-4_12_14-95_16-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712223" version="1" comment="kgraft-patch-4_12_14-95_19-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712224" version="1" comment="kgraft-patch-4_12_14-95_24-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712225" version="1" comment="kgraft-patch-4_12_14-95_29-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712226" version="1" comment="kgraft-patch-4_12_14-95_3-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712227" version="1" comment="kgraft-patch-4_12_14-95_32-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712228" version="1" comment="kgraft-patch-4_12_14-95_6-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712229" version="1" comment="kernel-livepatch-4_12_14-150_14-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712230" version="1" comment="kernel-livepatch-4_12_14-150_17-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712231" version="1" comment="kernel-livepatch-4_12_14-150_22-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712232" version="1" comment="kernel-livepatch-4_12_14-150_27-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712233" version="1" comment="kernel-livepatch-4_12_14-150_32-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712234" version="1" comment="kernel-livepatch-4_12_14-150_35-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712235" version="1" comment="kernel-livepatch-4_12_14-150_38-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712236" version="1" comment="kernel-livepatch-4_12_14-25_28-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712237" version="1" comment="kernel-livepatch-4_12_14-195-default is &gt;=7-19.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712238" version="1" comment="kernel-livepatch-4_12_14-197_10-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712239" version="1" comment="kernel-livepatch-4_12_14-197_18-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712240" version="1" comment="kernel-livepatch-4_12_14-197_21-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712241" version="1" comment="kernel-livepatch-4_12_14-197_4-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712242" version="1" comment="kernel-livepatch-4_12_14-197_7-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828512" version="1" comment="exiv2 is &lt;0.27.0-3.el7_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828513" version="1" comment="exiv2-devel is &lt;0.27.0-3.el7_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828514" version="1" comment="exiv2-doc is &lt;0.27.0-3.el7_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828515" version="1" comment="exiv2-libs is &lt;0.27.0-3.el7_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828273" version="1" comment="libssh2 is &lt;1.8.0-4.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828274" version="1" comment="libssh2-devel is &lt;1.8.0-4.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828275" version="1" comment="libssh2-docs is &lt;1.8.0-4.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828458" version="1" comment="tomcat is &lt;7.0.76-15.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828459" version="1" comment="tomcat-admin-webapps is &lt;7.0.76-15.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828460" version="1" comment="tomcat-docs-webapp is &lt;7.0.76-15.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828461" version="1" comment="tomcat-el-2.2-api is &lt;7.0.76-15.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828462" version="1" comment="tomcat-javadoc is &lt;7.0.76-15.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828463" version="1" comment="tomcat-jsp-2.2-api is &lt;7.0.76-15.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828464" version="1" comment="tomcat-jsvc is &lt;7.0.76-15.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828465" version="1" comment="tomcat-lib is &lt;7.0.76-15.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828466" version="1" comment="tomcat-servlet-3.0-api is &lt;7.0.76-15.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828467" version="1" comment="tomcat-webapps is &lt;7.0.76-15.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826844" version="1" comment="python-reportlab is &lt;2.5-9.el7_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826845" version="1" comment="python-reportlab-docs is &lt;2.5-9.el7_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828811" version="1" comment="bpftool is &lt;3.10.0-1160.11.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828812" version="1" comment="kernel is &lt;3.10.0-1160.11.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828813" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1160.11.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828814" version="1" comment="kernel-debug is &lt;3.10.0-1160.11.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828817" version="1" comment="kernel-doc is &lt;3.10.0-1160.11.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828818" version="1" comment="kernel-headers is &lt;3.10.0-1160.11.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828819" version="1" comment="kernel-tools is &lt;3.10.0-1160.11.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828820" version="1" comment="kernel-tools-libs is &lt;3.10.0-1160.11.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828822" version="1" comment="perf is &lt;3.10.0-1160.11.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828823" version="1" comment="python-perf is &lt;3.10.0-1160.11.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826804" version="1" comment="fribidi is &lt;1.0.2-1.el7_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826805" version="1" comment="fribidi-devel is &lt;1.0.2-1.el7_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826862" version="1" comment="bsdcpio is &lt;3.1.2-14.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826863" version="1" comment="bsdtar is &lt;3.1.2-14.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826864" version="1" comment="libarchive is &lt;3.1.2-14.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826865" version="1" comment="libarchive-devel is &lt;3.1.2-14.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828303" version="1" comment="librabbitmq is &lt;0.8.0-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828304" version="1" comment="librabbitmq-devel is &lt;0.8.0-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828305" version="1" comment="librabbitmq-examples is &lt;0.8.0-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826904" version="1" comment="sudo is &lt;1.8.23-4.el7_7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826905" version="1" comment="sudo-devel is &lt;1.8.23-4.el7_7.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828109" version="1" comment="glibc is &lt;2.17-317.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828110" version="1" comment="glibc-common is &lt;2.17-317.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828111" version="1" comment="glibc-devel is &lt;2.17-317.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828112" version="1" comment="glibc-headers is &lt;2.17-317.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828113" version="1" comment="glibc-static is &lt;2.17-317.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828114" version="1" comment="glibc-utils is &lt;2.17-317.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828115" version="1" comment="nscd is &lt;2.17-317.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830368" version="1" comment="python-reportlab is &lt;2.5-11.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830369" version="1" comment="python-reportlab-docs is &lt;2.5-11.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828081" version="1" comment="bpftool is &lt;3.10.0-1127.18.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828082" version="1" comment="kernel is &lt;3.10.0-1127.18.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828083" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1127.18.2.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828084" version="1" comment="kernel-debug is &lt;3.10.0-1127.18.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828087" version="1" comment="kernel-doc is &lt;3.10.0-1127.18.2.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828088" version="1" comment="kernel-headers is &lt;3.10.0-1127.18.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828089" version="1" comment="kernel-tools is &lt;3.10.0-1127.18.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828090" version="1" comment="kernel-tools-libs is &lt;3.10.0-1127.18.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828092" version="1" comment="perf is &lt;3.10.0-1127.18.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828093" version="1" comment="python-perf is &lt;3.10.0-1127.18.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828991" version="1" comment="bpftool is &lt;3.10.0-1160.21.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828992" version="1" comment="kernel is &lt;3.10.0-1160.21.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828993" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1160.21.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828994" version="1" comment="kernel-debug is &lt;3.10.0-1160.21.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828997" version="1" comment="kernel-doc is &lt;3.10.0-1160.21.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828998" version="1" comment="kernel-headers is &lt;3.10.0-1160.21.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828999" version="1" comment="kernel-tools is &lt;3.10.0-1160.21.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829000" version="1" comment="kernel-tools-libs is &lt;3.10.0-1160.21.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829002" version="1" comment="perf is &lt;3.10.0-1160.21.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829003" version="1" comment="python-perf is &lt;3.10.0-1160.21.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828403" version="1" comment="libxml2 is &lt;2.9.1-6.el7.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828404" version="1" comment="libxml2-devel is &lt;2.9.1-6.el7.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828405" version="1" comment="libxml2-python is &lt;2.9.1-6.el7.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828406" version="1" comment="libxml2-static is &lt;2.9.1-6.el7.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826948" version="1" comment="zsh is &lt;5.0.2-34.el7_7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826949" version="1" comment="zsh-html is &lt;5.0.2-34.el7_7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828471" version="1" comment="libgudev1 is &lt;219-78.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828472" version="1" comment="libgudev1-devel is &lt;219-78.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828473" version="1" comment="systemd is &lt;219-78.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828474" version="1" comment="systemd-devel is &lt;219-78.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828475" version="1" comment="systemd-journal-gateway is &lt;219-78.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828476" version="1" comment="systemd-libs is &lt;219-78.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828477" version="1" comment="systemd-networkd is &lt;219-78.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828478" version="1" comment="systemd-python is &lt;219-78.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828479" version="1" comment="systemd-resolved is &lt;219-78.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828480" version="1" comment="systemd-sysv is &lt;219-78.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828407" version="1" comment="libvirt is &lt;4.5.0-36.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828408" version="1" comment="libvirt-admin is &lt;4.5.0-36.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828409" version="1" comment="libvirt-bash-completion is &lt;4.5.0-36.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828410" version="1" comment="libvirt-client is &lt;4.5.0-36.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828411" version="1" comment="libvirt-daemon is &lt;4.5.0-36.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828412" version="1" comment="libvirt-daemon-config-network is &lt;4.5.0-36.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828413" version="1" comment="libvirt-daemon-config-nwfilter is &lt;4.5.0-36.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828414" version="1" comment="libvirt-daemon-driver-interface is &lt;4.5.0-36.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828415" version="1" comment="libvirt-daemon-driver-lxc is &lt;4.5.0-36.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828416" version="1" comment="libvirt-daemon-driver-network is &lt;4.5.0-36.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828417" version="1" comment="libvirt-daemon-driver-nodedev is &lt;4.5.0-36.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828418" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;4.5.0-36.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828419" version="1" comment="libvirt-daemon-driver-qemu is &lt;4.5.0-36.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828420" version="1" comment="libvirt-daemon-driver-secret is &lt;4.5.0-36.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828421" version="1" comment="libvirt-daemon-driver-storage is &lt;4.5.0-36.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828422" version="1" comment="libvirt-daemon-driver-storage-core is &lt;4.5.0-36.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828423" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;4.5.0-36.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828424" version="1" comment="libvirt-daemon-driver-storage-gluster is &lt;4.5.0-36.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828425" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;4.5.0-36.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828426" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;4.5.0-36.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828427" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;4.5.0-36.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828428" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;4.5.0-36.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828429" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;4.5.0-36.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828430" version="1" comment="libvirt-daemon-kvm is &lt;4.5.0-36.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828431" version="1" comment="libvirt-daemon-lxc is &lt;4.5.0-36.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828432" version="1" comment="libvirt-devel is &lt;4.5.0-36.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828433" version="1" comment="libvirt-docs is &lt;4.5.0-36.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828434" version="1" comment="libvirt-libs is &lt;4.5.0-36.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828435" version="1" comment="libvirt-lock-sanlock is &lt;4.5.0-36.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828436" version="1" comment="libvirt-login-shell is &lt;4.5.0-36.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828437" version="1" comment="libvirt-nss is &lt;4.5.0-36.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826932" version="1" comment="firefox is &lt;68.6.0-1.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826964" version="1" comment="thunderbird is &lt;68.6.0-1.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828737" version="1" comment="bpftool is &lt;3.10.0-1160.6.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828738" version="1" comment="kernel is &lt;3.10.0-1160.6.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828739" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1160.6.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828740" version="1" comment="kernel-debug is &lt;3.10.0-1160.6.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828743" version="1" comment="kernel-doc is &lt;3.10.0-1160.6.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828744" version="1" comment="kernel-headers is &lt;3.10.0-1160.6.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828745" version="1" comment="kernel-tools is &lt;3.10.0-1160.6.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828746" version="1" comment="kernel-tools-libs is &lt;3.10.0-1160.6.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828748" version="1" comment="perf is &lt;3.10.0-1160.6.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828749" version="1" comment="python-perf is &lt;3.10.0-1160.6.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828669" version="1" comment="python is &lt;2.7.5-90.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828670" version="1" comment="python-debug is &lt;2.7.5-90.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828671" version="1" comment="python-devel is &lt;2.7.5-90.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828672" version="1" comment="python-libs is &lt;2.7.5-90.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828673" version="1" comment="python-test is &lt;2.7.5-90.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828674" version="1" comment="python-tools is &lt;2.7.5-90.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828676" version="1" comment="python3 is &lt;3.6.8-18.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828677" version="1" comment="python3-debug is &lt;3.6.8-18.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828678" version="1" comment="python3-devel is &lt;3.6.8-18.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828679" version="1" comment="python3-idle is &lt;3.6.8-18.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828680" version="1" comment="python3-libs is &lt;3.6.8-18.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828681" version="1" comment="python3-test is &lt;3.6.8-18.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828682" version="1" comment="python3-tkinter is &lt;3.6.8-18.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828675" version="1" comment="tkinter is &lt;2.7.5-90.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829744" version="1" comment="python-virtualenv is &lt;15.1.0-7.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829207" version="1" comment="bpftool is &lt;3.10.0-1160.36.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829208" version="1" comment="kernel is &lt;3.10.0-1160.36.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829209" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1160.36.2.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829210" version="1" comment="kernel-debug is &lt;3.10.0-1160.36.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829213" version="1" comment="kernel-doc is &lt;3.10.0-1160.36.2.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829214" version="1" comment="kernel-headers is &lt;3.10.0-1160.36.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829215" version="1" comment="kernel-tools is &lt;3.10.0-1160.36.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829216" version="1" comment="kernel-tools-libs is &lt;3.10.0-1160.36.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829218" version="1" comment="perf is &lt;3.10.0-1160.36.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829219" version="1" comment="python-perf is &lt;3.10.0-1160.36.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825580" version="1" comment="java-1.7.0-openjdk is &lt;1.7.0.211-2.6.17.1.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825581" version="1" comment="java-1.7.0-openjdk-accessibility is &lt;1.7.0.211-2.6.17.1.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825582" version="1" comment="java-1.7.0-openjdk-demo is &lt;1.7.0.211-2.6.17.1.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825583" version="1" comment="java-1.7.0-openjdk-devel is &lt;1.7.0.211-2.6.17.1.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825584" version="1" comment="java-1.7.0-openjdk-headless is &lt;1.7.0.211-2.6.17.1.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825585" version="1" comment="java-1.7.0-openjdk-javadoc is &lt;1.7.0.211-2.6.17.1.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825586" version="1" comment="java-1.7.0-openjdk-src is &lt;1.7.0.211-2.6.17.1.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825548" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.201.b09-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825549" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.201.b09-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825550" version="1" comment="java-1.8.0-openjdk-accessibility-debug is &lt;1.8.0.201.b09-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825551" version="1" comment="java-1.8.0-openjdk-debug is &lt;1.8.0.201.b09-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825552" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.201.b09-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825553" version="1" comment="java-1.8.0-openjdk-demo-debug is &lt;1.8.0.201.b09-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825554" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.201.b09-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825555" version="1" comment="java-1.8.0-openjdk-devel-debug is &lt;1.8.0.201.b09-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825556" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.201.b09-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825557" version="1" comment="java-1.8.0-openjdk-headless-debug is &lt;1.8.0.201.b09-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825558" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.201.b09-0.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825559" version="1" comment="java-1.8.0-openjdk-javadoc-debug is &lt;1.8.0.201.b09-0.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825560" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.201.b09-0.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825561" version="1" comment="java-1.8.0-openjdk-javadoc-zip-debug is &lt;1.8.0.201.b09-0.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825562" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.201.b09-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825563" version="1" comment="java-1.8.0-openjdk-src-debug is &lt;1.8.0.201.b09-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825564" version="1" comment="java-11-openjdk is &lt;11.0.2.7-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825565" version="1" comment="java-11-openjdk-debug is &lt;11.0.2.7-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825566" version="1" comment="java-11-openjdk-demo is &lt;11.0.2.7-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825567" version="1" comment="java-11-openjdk-demo-debug is &lt;11.0.2.7-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825568" version="1" comment="java-11-openjdk-devel is &lt;11.0.2.7-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825569" version="1" comment="java-11-openjdk-devel-debug is &lt;11.0.2.7-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825570" version="1" comment="java-11-openjdk-headless is &lt;11.0.2.7-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825571" version="1" comment="java-11-openjdk-headless-debug is &lt;11.0.2.7-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825572" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.2.7-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825573" version="1" comment="java-11-openjdk-javadoc-debug is &lt;11.0.2.7-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825574" version="1" comment="java-11-openjdk-javadoc-zip is &lt;11.0.2.7-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825575" version="1" comment="java-11-openjdk-javadoc-zip-debug is &lt;11.0.2.7-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825576" version="1" comment="java-11-openjdk-jmods is &lt;11.0.2.7-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825577" version="1" comment="java-11-openjdk-jmods-debug is &lt;11.0.2.7-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825578" version="1" comment="java-11-openjdk-src is &lt;11.0.2.7-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825579" version="1" comment="java-11-openjdk-src-debug is &lt;11.0.2.7-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828938" version="1" comment="glibc is &lt;2.17-322.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828939" version="1" comment="glibc-common is &lt;2.17-322.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828940" version="1" comment="glibc-devel is &lt;2.17-322.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828941" version="1" comment="glibc-headers is &lt;2.17-322.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828942" version="1" comment="glibc-static is &lt;2.17-322.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828943" version="1" comment="glibc-utils is &lt;2.17-322.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828944" version="1" comment="nscd is &lt;2.17-322.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825679" version="1" comment="java-1.7.0-openjdk is &lt;1.7.0.221-2.6.18.0.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825680" version="1" comment="java-1.7.0-openjdk-accessibility is &lt;1.7.0.221-2.6.18.0.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825681" version="1" comment="java-1.7.0-openjdk-demo is &lt;1.7.0.221-2.6.18.0.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825682" version="1" comment="java-1.7.0-openjdk-devel is &lt;1.7.0.221-2.6.18.0.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825683" version="1" comment="java-1.7.0-openjdk-headless is &lt;1.7.0.221-2.6.18.0.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825684" version="1" comment="java-1.7.0-openjdk-javadoc is &lt;1.7.0.221-2.6.18.0.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825685" version="1" comment="java-1.7.0-openjdk-src is &lt;1.7.0.221-2.6.18.0.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825647" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.212.b04-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825648" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.212.b04-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825649" version="1" comment="java-1.8.0-openjdk-accessibility-debug is &lt;1.8.0.212.b04-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825650" version="1" comment="java-1.8.0-openjdk-debug is &lt;1.8.0.212.b04-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825651" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.212.b04-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825652" version="1" comment="java-1.8.0-openjdk-demo-debug is &lt;1.8.0.212.b04-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825653" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.212.b04-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825654" version="1" comment="java-1.8.0-openjdk-devel-debug is &lt;1.8.0.212.b04-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825655" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.212.b04-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825656" version="1" comment="java-1.8.0-openjdk-headless-debug is &lt;1.8.0.212.b04-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825657" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.212.b04-0.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825658" version="1" comment="java-1.8.0-openjdk-javadoc-debug is &lt;1.8.0.212.b04-0.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825659" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.212.b04-0.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825660" version="1" comment="java-1.8.0-openjdk-javadoc-zip-debug is &lt;1.8.0.212.b04-0.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825661" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.212.b04-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825662" version="1" comment="java-1.8.0-openjdk-src-debug is &lt;1.8.0.212.b04-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825663" version="1" comment="java-11-openjdk is &lt;11.0.3.7-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825664" version="1" comment="java-11-openjdk-debug is &lt;11.0.3.7-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825665" version="1" comment="java-11-openjdk-demo is &lt;11.0.3.7-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825666" version="1" comment="java-11-openjdk-demo-debug is &lt;11.0.3.7-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825667" version="1" comment="java-11-openjdk-devel is &lt;11.0.3.7-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825668" version="1" comment="java-11-openjdk-devel-debug is &lt;11.0.3.7-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825669" version="1" comment="java-11-openjdk-headless is &lt;11.0.3.7-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825670" version="1" comment="java-11-openjdk-headless-debug is &lt;11.0.3.7-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825671" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.3.7-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825672" version="1" comment="java-11-openjdk-javadoc-debug is &lt;11.0.3.7-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825673" version="1" comment="java-11-openjdk-javadoc-zip is &lt;11.0.3.7-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825674" version="1" comment="java-11-openjdk-javadoc-zip-debug is &lt;11.0.3.7-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825675" version="1" comment="java-11-openjdk-jmods is &lt;11.0.3.7-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825676" version="1" comment="java-11-openjdk-jmods-debug is &lt;11.0.3.7-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825677" version="1" comment="java-11-openjdk-src is &lt;11.0.3.7-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825678" version="1" comment="java-11-openjdk-src-debug is &lt;11.0.3.7-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827752" version="1" comment="mariadb is &lt;5.5.65-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827753" version="1" comment="mariadb-bench is &lt;5.5.65-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827754" version="1" comment="mariadb-devel is &lt;5.5.65-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827755" version="1" comment="mariadb-embedded is &lt;5.5.65-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827756" version="1" comment="mariadb-embedded-devel is &lt;5.5.65-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827757" version="1" comment="mariadb-libs is &lt;5.5.65-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827758" version="1" comment="mariadb-server is &lt;5.5.65-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827759" version="1" comment="mariadb-test is &lt;5.5.65-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825925" version="1" comment="java-1.7.0-openjdk is &lt;1.7.0.231-2.6.19.1.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825926" version="1" comment="java-1.7.0-openjdk-accessibility is &lt;1.7.0.231-2.6.19.1.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825927" version="1" comment="java-1.7.0-openjdk-demo is &lt;1.7.0.231-2.6.19.1.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825928" version="1" comment="java-1.7.0-openjdk-devel is &lt;1.7.0.231-2.6.19.1.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825929" version="1" comment="java-1.7.0-openjdk-headless is &lt;1.7.0.231-2.6.19.1.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825930" version="1" comment="java-1.7.0-openjdk-javadoc is &lt;1.7.0.231-2.6.19.1.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825931" version="1" comment="java-1.7.0-openjdk-src is &lt;1.7.0.231-2.6.19.1.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825909" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.222.b10-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825910" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.222.b10-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825911" version="1" comment="java-1.8.0-openjdk-accessibility-debug is &lt;1.8.0.222.b10-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825912" version="1" comment="java-1.8.0-openjdk-debug is &lt;1.8.0.222.b10-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825913" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.222.b10-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825914" version="1" comment="java-1.8.0-openjdk-demo-debug is &lt;1.8.0.222.b10-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825915" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.222.b10-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825916" version="1" comment="java-1.8.0-openjdk-devel-debug is &lt;1.8.0.222.b10-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825917" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.222.b10-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825918" version="1" comment="java-1.8.0-openjdk-headless-debug is &lt;1.8.0.222.b10-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825919" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.222.b10-0.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825920" version="1" comment="java-1.8.0-openjdk-javadoc-debug is &lt;1.8.0.222.b10-0.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825921" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.222.b10-0.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825922" version="1" comment="java-1.8.0-openjdk-javadoc-zip-debug is &lt;1.8.0.222.b10-0.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825923" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.222.b10-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825924" version="1" comment="java-1.8.0-openjdk-src-debug is &lt;1.8.0.222.b10-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825893" version="1" comment="java-11-openjdk is &lt;11.0.4.11-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825894" version="1" comment="java-11-openjdk-debug is &lt;11.0.4.11-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825895" version="1" comment="java-11-openjdk-demo is &lt;11.0.4.11-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825896" version="1" comment="java-11-openjdk-demo-debug is &lt;11.0.4.11-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825897" version="1" comment="java-11-openjdk-devel is &lt;11.0.4.11-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825898" version="1" comment="java-11-openjdk-devel-debug is &lt;11.0.4.11-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825899" version="1" comment="java-11-openjdk-headless is &lt;11.0.4.11-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825900" version="1" comment="java-11-openjdk-headless-debug is &lt;11.0.4.11-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825901" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.4.11-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825902" version="1" comment="java-11-openjdk-javadoc-debug is &lt;11.0.4.11-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825903" version="1" comment="java-11-openjdk-javadoc-zip is &lt;11.0.4.11-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825904" version="1" comment="java-11-openjdk-javadoc-zip-debug is &lt;11.0.4.11-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825905" version="1" comment="java-11-openjdk-jmods is &lt;11.0.4.11-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825906" version="1" comment="java-11-openjdk-jmods-debug is &lt;11.0.4.11-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825907" version="1" comment="java-11-openjdk-src is &lt;11.0.4.11-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825908" version="1" comment="java-11-openjdk-src-debug is &lt;11.0.4.11-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826697" version="1" comment="java-1.7.0-openjdk is &lt;1.7.0.241-2.6.20.0.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826698" version="1" comment="java-1.7.0-openjdk-accessibility is &lt;1.7.0.241-2.6.20.0.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826699" version="1" comment="java-1.7.0-openjdk-demo is &lt;1.7.0.241-2.6.20.0.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826700" version="1" comment="java-1.7.0-openjdk-devel is &lt;1.7.0.241-2.6.20.0.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826701" version="1" comment="java-1.7.0-openjdk-headless is &lt;1.7.0.241-2.6.20.0.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826702" version="1" comment="java-1.7.0-openjdk-javadoc is &lt;1.7.0.241-2.6.20.0.el7_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826703" version="1" comment="java-1.7.0-openjdk-src is &lt;1.7.0.241-2.6.20.0.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826681" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.232.b09-0.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826682" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.232.b09-0.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826683" version="1" comment="java-1.8.0-openjdk-accessibility-debug is &lt;1.8.0.232.b09-0.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826684" version="1" comment="java-1.8.0-openjdk-debug is &lt;1.8.0.232.b09-0.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826685" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.232.b09-0.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826686" version="1" comment="java-1.8.0-openjdk-demo-debug is &lt;1.8.0.232.b09-0.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826687" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.232.b09-0.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826688" version="1" comment="java-1.8.0-openjdk-devel-debug is &lt;1.8.0.232.b09-0.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826689" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.232.b09-0.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826690" version="1" comment="java-1.8.0-openjdk-headless-debug is &lt;1.8.0.232.b09-0.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826691" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.232.b09-0.el7_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826692" version="1" comment="java-1.8.0-openjdk-javadoc-debug is &lt;1.8.0.232.b09-0.el7_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826693" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.232.b09-0.el7_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826694" version="1" comment="java-1.8.0-openjdk-javadoc-zip-debug is &lt;1.8.0.232.b09-0.el7_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826695" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.232.b09-0.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826696" version="1" comment="java-1.8.0-openjdk-src-debug is &lt;1.8.0.232.b09-0.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826665" version="1" comment="java-11-openjdk is &lt;11.0.5.10-0.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826666" version="1" comment="java-11-openjdk-debug is &lt;11.0.5.10-0.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826667" version="1" comment="java-11-openjdk-demo is &lt;11.0.5.10-0.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826668" version="1" comment="java-11-openjdk-demo-debug is &lt;11.0.5.10-0.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826669" version="1" comment="java-11-openjdk-devel is &lt;11.0.5.10-0.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826670" version="1" comment="java-11-openjdk-devel-debug is &lt;11.0.5.10-0.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826671" version="1" comment="java-11-openjdk-headless is &lt;11.0.5.10-0.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826672" version="1" comment="java-11-openjdk-headless-debug is &lt;11.0.5.10-0.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826673" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.5.10-0.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826674" version="1" comment="java-11-openjdk-javadoc-debug is &lt;11.0.5.10-0.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826675" version="1" comment="java-11-openjdk-javadoc-zip is &lt;11.0.5.10-0.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826676" version="1" comment="java-11-openjdk-javadoc-zip-debug is &lt;11.0.5.10-0.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826677" version="1" comment="java-11-openjdk-jmods is &lt;11.0.5.10-0.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826678" version="1" comment="java-11-openjdk-jmods-debug is &lt;11.0.5.10-0.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826679" version="1" comment="java-11-openjdk-src is &lt;11.0.5.10-0.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826680" version="1" comment="java-11-openjdk-src-debug is &lt;11.0.5.10-0.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828504" version="1" comment="mariadb is &lt;5.5.68-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828505" version="1" comment="mariadb-bench is &lt;5.5.68-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828506" version="1" comment="mariadb-devel is &lt;5.5.68-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828507" version="1" comment="mariadb-embedded is &lt;5.5.68-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828508" version="1" comment="mariadb-embedded-devel is &lt;5.5.68-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828509" version="1" comment="mariadb-libs is &lt;5.5.68-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828510" version="1" comment="mariadb-server is &lt;5.5.68-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828511" version="1" comment="mariadb-test is &lt;5.5.68-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828126" version="1" comment="pcp is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828127" version="1" comment="pcp-conf is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828128" version="1" comment="pcp-devel is &lt;4.3.2-12.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828129" version="1" comment="pcp-doc is &lt;4.3.2-12.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828130" version="1" comment="pcp-export-pcp2elasticsearch is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828131" version="1" comment="pcp-export-pcp2graphite is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828132" version="1" comment="pcp-export-pcp2influxdb is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828133" version="1" comment="pcp-export-pcp2json is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828134" version="1" comment="pcp-export-pcp2spark is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828135" version="1" comment="pcp-export-pcp2xml is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828136" version="1" comment="pcp-export-pcp2zabbix is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828137" version="1" comment="pcp-export-zabbix-agent is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828138" version="1" comment="pcp-gui is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828139" version="1" comment="pcp-import-collectl2pcp is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828140" version="1" comment="pcp-import-ganglia2pcp is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828141" version="1" comment="pcp-import-iostat2pcp is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828142" version="1" comment="pcp-import-mrtg2pcp is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828143" version="1" comment="pcp-import-sar2pcp is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828144" version="1" comment="pcp-libs is &lt;4.3.2-12.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828145" version="1" comment="pcp-libs-devel is &lt;4.3.2-12.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828146" version="1" comment="pcp-manager is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828147" version="1" comment="pcp-pmda-activemq is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828148" version="1" comment="pcp-pmda-apache is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828149" version="1" comment="pcp-pmda-bash is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828150" version="1" comment="pcp-pmda-bcc is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828151" version="1" comment="pcp-pmda-bind2 is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828152" version="1" comment="pcp-pmda-bonding is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828153" version="1" comment="pcp-pmda-cifs is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828154" version="1" comment="pcp-pmda-cisco is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828155" version="1" comment="pcp-pmda-dbping is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828156" version="1" comment="pcp-pmda-dm is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828157" version="1" comment="pcp-pmda-docker is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828158" version="1" comment="pcp-pmda-ds389 is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828159" version="1" comment="pcp-pmda-ds389log is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828160" version="1" comment="pcp-pmda-elasticsearch is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828161" version="1" comment="pcp-pmda-gfs2 is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828162" version="1" comment="pcp-pmda-gluster is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828163" version="1" comment="pcp-pmda-gpfs is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828164" version="1" comment="pcp-pmda-gpsd is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828165" version="1" comment="pcp-pmda-haproxy is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828166" version="1" comment="pcp-pmda-infiniband is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828167" version="1" comment="pcp-pmda-json is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828168" version="1" comment="pcp-pmda-libvirt is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828169" version="1" comment="pcp-pmda-lio is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828170" version="1" comment="pcp-pmda-lmsensors is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828171" version="1" comment="pcp-pmda-logger is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828172" version="1" comment="pcp-pmda-lustre is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828173" version="1" comment="pcp-pmda-lustrecomm is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828174" version="1" comment="pcp-pmda-mailq is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828175" version="1" comment="pcp-pmda-memcache is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828176" version="1" comment="pcp-pmda-mic is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828177" version="1" comment="pcp-pmda-mounts is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828178" version="1" comment="pcp-pmda-mysql is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828179" version="1" comment="pcp-pmda-named is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828180" version="1" comment="pcp-pmda-netfilter is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828181" version="1" comment="pcp-pmda-news is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828182" version="1" comment="pcp-pmda-nfsclient is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828183" version="1" comment="pcp-pmda-nginx is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828184" version="1" comment="pcp-pmda-nvidia-gpu is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828185" version="1" comment="pcp-pmda-oracle is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828186" version="1" comment="pcp-pmda-pdns is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828187" version="1" comment="pcp-pmda-perfevent is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828188" version="1" comment="pcp-pmda-postfix is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828189" version="1" comment="pcp-pmda-postgresql is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828190" version="1" comment="pcp-pmda-prometheus is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828191" version="1" comment="pcp-pmda-redis is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828192" version="1" comment="pcp-pmda-roomtemp is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828193" version="1" comment="pcp-pmda-rpm is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828194" version="1" comment="pcp-pmda-rsyslog is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828195" version="1" comment="pcp-pmda-samba is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828196" version="1" comment="pcp-pmda-sendmail is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828197" version="1" comment="pcp-pmda-shping is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828198" version="1" comment="pcp-pmda-slurm is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828199" version="1" comment="pcp-pmda-smart is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828200" version="1" comment="pcp-pmda-snmp is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828201" version="1" comment="pcp-pmda-summary is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828202" version="1" comment="pcp-pmda-systemd is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828203" version="1" comment="pcp-pmda-trace is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828204" version="1" comment="pcp-pmda-unbound is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828205" version="1" comment="pcp-pmda-vmware is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828206" version="1" comment="pcp-pmda-weblog is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828207" version="1" comment="pcp-pmda-zimbra is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828208" version="1" comment="pcp-pmda-zswap is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828209" version="1" comment="pcp-selinux is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828210" version="1" comment="pcp-system-tools is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828211" version="1" comment="pcp-testsuite is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828212" version="1" comment="pcp-webapi is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828213" version="1" comment="pcp-webapp-blinkenlights is &lt;4.3.2-12.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828214" version="1" comment="pcp-webapp-grafana is &lt;4.3.2-12.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828215" version="1" comment="pcp-webapp-graphite is &lt;4.3.2-12.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828216" version="1" comment="pcp-webapp-vector is &lt;4.3.2-12.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828217" version="1" comment="pcp-webjs is &lt;4.3.2-12.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828218" version="1" comment="pcp-zeroconf is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828219" version="1" comment="perl-PCP-LogImport is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828220" version="1" comment="perl-PCP-LogSummary is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828221" version="1" comment="perl-PCP-MMV is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828222" version="1" comment="perl-PCP-PMDA is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828223" version="1" comment="python-pcp is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825530" version="1" comment="spice-server is &lt;0.14.0-6.el7_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825531" version="1" comment="spice-server-devel is &lt;0.14.0-6.el7_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827673" version="1" comment="dovecot is &lt;2.2.36-6.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827674" version="1" comment="dovecot-devel is &lt;2.2.36-6.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827675" version="1" comment="dovecot-mysql is &lt;2.2.36-6.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827676" version="1" comment="dovecot-pgsql is &lt;2.2.36-6.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827677" version="1" comment="dovecot-pigeonhole is &lt;2.2.36-6.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825511" version="1" comment="libgudev1 is &lt;219-62.el7_6.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825512" version="1" comment="libgudev1-devel is &lt;219-62.el7_6.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825513" version="1" comment="systemd is &lt;219-62.el7_6.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825514" version="1" comment="systemd-devel is &lt;219-62.el7_6.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825515" version="1" comment="systemd-journal-gateway is &lt;219-62.el7_6.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825516" version="1" comment="systemd-libs is &lt;219-62.el7_6.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825517" version="1" comment="systemd-networkd is &lt;219-62.el7_6.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825518" version="1" comment="systemd-python is &lt;219-62.el7_6.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825519" version="1" comment="systemd-resolved is &lt;219-62.el7_6.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825520" version="1" comment="systemd-sysv is &lt;219-62.el7_6.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825622" version="1" comment="libwsman-devel is &lt;2.6.3-6.git4391e5c.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825623" version="1" comment="libwsman1 is &lt;2.6.3-6.git4391e5c.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825624" version="1" comment="openwsman-client is &lt;2.6.3-6.git4391e5c.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825625" version="1" comment="openwsman-perl is &lt;2.6.3-6.git4391e5c.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825626" version="1" comment="openwsman-python is &lt;2.6.3-6.git4391e5c.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825627" version="1" comment="openwsman-ruby is &lt;2.6.3-6.git4391e5c.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825628" version="1" comment="openwsman-server is &lt;2.6.3-6.git4391e5c.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827009" version="1" comment="LibRaw is &lt;0.19.4-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827010" version="1" comment="LibRaw-devel is &lt;0.19.4-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827011" version="1" comment="LibRaw-static is &lt;0.19.4-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827012" version="1" comment="accountsservice is &lt;0.6.50-7.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827013" version="1" comment="accountsservice-devel is &lt;0.6.50-7.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827014" version="1" comment="accountsservice-libs is &lt;0.6.50-7.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827015" version="1" comment="colord is &lt;1.3.4-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827016" version="1" comment="colord-devel is &lt;1.3.4-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827017" version="1" comment="colord-devel-docs is &lt;1.3.4-2.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827018" version="1" comment="colord-extra-profiles is &lt;1.3.4-2.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827019" version="1" comment="colord-libs is &lt;1.3.4-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827020" version="1" comment="control-center is &lt;3.28.1-6.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827021" version="1" comment="control-center-filesystem is &lt;3.28.1-6.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827022" version="1" comment="gdm is &lt;3.28.2-22.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827023" version="1" comment="gdm-devel is &lt;3.28.2-22.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827024" version="1" comment="gdm-pam-extensions-devel is &lt;3.28.2-22.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827025" version="1" comment="gnome-classic-session is &lt;3.28.1-11.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827026" version="1" comment="gnome-online-accounts is &lt;3.28.2-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827027" version="1" comment="gnome-online-accounts-devel is &lt;3.28.2-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827028" version="1" comment="gnome-settings-daemon is &lt;3.28.1-8.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827029" version="1" comment="gnome-settings-daemon-devel is &lt;3.28.1-8.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827030" version="1" comment="gnome-shell is &lt;3.28.3-24.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827031" version="1" comment="gnome-shell-extension-alternate-tab is &lt;3.28.1-11.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827032" version="1" comment="gnome-shell-extension-apps-menu is &lt;3.28.1-11.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827033" version="1" comment="gnome-shell-extension-auto-move-windows is &lt;3.28.1-11.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827034" version="1" comment="gnome-shell-extension-common is &lt;3.28.1-11.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827035" version="1" comment="gnome-shell-extension-dash-to-dock is &lt;3.28.1-11.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827036" version="1" comment="gnome-shell-extension-disable-screenshield is &lt;3.28.1-11.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827037" version="1" comment="gnome-shell-extension-drive-menu is &lt;3.28.1-11.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827038" version="1" comment="gnome-shell-extension-extra-osk-keys is &lt;3.28.1-11.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827039" version="1" comment="gnome-shell-extension-horizontal-workspaces is &lt;3.28.1-11.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827040" version="1" comment="gnome-shell-extension-launch-new-instance is &lt;3.28.1-11.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827041" version="1" comment="gnome-shell-extension-native-window-placement is &lt;3.28.1-11.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827042" version="1" comment="gnome-shell-extension-no-hot-corner is &lt;3.28.1-11.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827043" version="1" comment="gnome-shell-extension-panel-favorites is &lt;3.28.1-11.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827044" version="1" comment="gnome-shell-extension-places-menu is &lt;3.28.1-11.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827045" version="1" comment="gnome-shell-extension-screenshot-window-sizer is &lt;3.28.1-11.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827046" version="1" comment="gnome-shell-extension-systemMonitor is &lt;3.28.1-11.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827047" version="1" comment="gnome-shell-extension-top-icons is &lt;3.28.1-11.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827048" version="1" comment="gnome-shell-extension-updates-dialog is &lt;3.28.1-11.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827049" version="1" comment="gnome-shell-extension-user-theme is &lt;3.28.1-11.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827050" version="1" comment="gnome-shell-extension-window-grouper is &lt;3.28.1-11.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827051" version="1" comment="gnome-shell-extension-window-list is &lt;3.28.1-11.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827052" version="1" comment="gnome-shell-extension-windowsNavigator is &lt;3.28.1-11.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827053" version="1" comment="gnome-shell-extension-workspace-indicator is &lt;3.28.1-11.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827054" version="1" comment="gnome-tweak-tool is &lt;3.28.1-7.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827055" version="1" comment="gsettings-desktop-schemas is &lt;3.28.0-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827056" version="1" comment="gsettings-desktop-schemas-devel is &lt;3.28.0-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827057" version="1" comment="gtk-update-icon-cache is &lt;3.22.30-5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827058" version="1" comment="gtk3 is &lt;3.22.30-5.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827059" version="1" comment="gtk3-devel is &lt;3.22.30-5.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827060" version="1" comment="gtk3-devel-docs is &lt;3.22.30-5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827061" version="1" comment="gtk3-immodule-xim is &lt;3.22.30-5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827062" version="1" comment="gtk3-immodules is &lt;3.22.30-5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827063" version="1" comment="gtk3-tests is &lt;3.22.30-5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827064" version="1" comment="libcanberra is &lt;0.30-9.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827065" version="1" comment="libcanberra-devel is &lt;0.30-9.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827066" version="1" comment="libcanberra-gtk2 is &lt;0.30-9.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827067" version="1" comment="libcanberra-gtk3 is &lt;0.30-9.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827068" version="1" comment="libgweather is &lt;3.28.2-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827069" version="1" comment="libgweather-devel is &lt;3.28.2-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827070" version="1" comment="mutter is &lt;3.28.3-20.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827071" version="1" comment="mutter-devel is &lt;3.28.3-20.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827072" version="1" comment="nautilus is &lt;3.26.3.1-7.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827073" version="1" comment="nautilus-devel is &lt;3.26.3.1-7.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827074" version="1" comment="nautilus-extensions is &lt;3.26.3.1-7.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827075" version="1" comment="osinfo-db is &lt;20190805-2.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827076" version="1" comment="shared-mime-info is &lt;1.8-5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827077" version="1" comment="tracker is &lt;1.10.5-8.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827078" version="1" comment="tracker-devel is &lt;1.10.5-8.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827079" version="1" comment="tracker-docs is &lt;1.10.5-8.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827080" version="1" comment="tracker-needle is &lt;1.10.5-8.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827081" version="1" comment="tracker-preferences is &lt;1.10.5-8.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827082" version="1" comment="xchat is &lt;2.8.8-25.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827083" version="1" comment="xchat-tcl is &lt;2.8.8-25.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826374" version="1" comment="gvfs is &lt;1.36.2-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826375" version="1" comment="gvfs-afc is &lt;1.36.2-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826376" version="1" comment="gvfs-afp is &lt;1.36.2-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826377" version="1" comment="gvfs-archive is &lt;1.36.2-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826378" version="1" comment="gvfs-client is &lt;1.36.2-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826379" version="1" comment="gvfs-devel is &lt;1.36.2-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826380" version="1" comment="gvfs-fuse is &lt;1.36.2-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826381" version="1" comment="gvfs-goa is &lt;1.36.2-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826382" version="1" comment="gvfs-gphoto2 is &lt;1.36.2-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826383" version="1" comment="gvfs-mtp is &lt;1.36.2-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826384" version="1" comment="gvfs-smb is &lt;1.36.2-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826385" version="1" comment="gvfs-tests is &lt;1.36.2-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828293" version="1" comment="libwsman-devel is &lt;2.6.3-7.git4391e5c.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828294" version="1" comment="libwsman1 is &lt;2.6.3-7.git4391e5c.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828295" version="1" comment="openwsman-client is &lt;2.6.3-7.git4391e5c.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828296" version="1" comment="openwsman-perl is &lt;2.6.3-7.git4391e5c.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828297" version="1" comment="openwsman-python is &lt;2.6.3-7.git4391e5c.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828298" version="1" comment="openwsman-ruby is &lt;2.6.3-7.git4391e5c.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828299" version="1" comment="openwsman-server is &lt;2.6.3-7.git4391e5c.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825617" version="1" comment="ghostscript is &lt;9.07-31.el7_6.10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825618" version="1" comment="ghostscript-cups is &lt;9.07-31.el7_6.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825619" version="1" comment="ghostscript-devel is &lt;9.07-31.el7_6.10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825620" version="1" comment="ghostscript-doc is &lt;9.07-31.el7_6.10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825621" version="1" comment="ghostscript-gtk is &lt;9.07-31.el7_6.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825700" version="1" comment="ghostscript is &lt;9.07-31.el7_6.11 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825701" version="1" comment="ghostscript-cups is &lt;9.07-31.el7_6.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825702" version="1" comment="ghostscript-devel is &lt;9.07-31.el7_6.11 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825703" version="1" comment="ghostscript-doc is &lt;9.07-31.el7_6.11 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825704" version="1" comment="ghostscript-gtk is &lt;9.07-31.el7_6.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826526" version="1" comment="libvirt is &lt;4.5.0-23.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826527" version="1" comment="libvirt-admin is &lt;4.5.0-23.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826528" version="1" comment="libvirt-bash-completion is &lt;4.5.0-23.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826529" version="1" comment="libvirt-client is &lt;4.5.0-23.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826530" version="1" comment="libvirt-daemon is &lt;4.5.0-23.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826531" version="1" comment="libvirt-daemon-config-network is &lt;4.5.0-23.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826532" version="1" comment="libvirt-daemon-config-nwfilter is &lt;4.5.0-23.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826533" version="1" comment="libvirt-daemon-driver-interface is &lt;4.5.0-23.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826534" version="1" comment="libvirt-daemon-driver-lxc is &lt;4.5.0-23.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826535" version="1" comment="libvirt-daemon-driver-network is &lt;4.5.0-23.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826536" version="1" comment="libvirt-daemon-driver-nodedev is &lt;4.5.0-23.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826537" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;4.5.0-23.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826538" version="1" comment="libvirt-daemon-driver-qemu is &lt;4.5.0-23.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826539" version="1" comment="libvirt-daemon-driver-secret is &lt;4.5.0-23.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826540" version="1" comment="libvirt-daemon-driver-storage is &lt;4.5.0-23.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826541" version="1" comment="libvirt-daemon-driver-storage-core is &lt;4.5.0-23.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826542" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;4.5.0-23.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826543" version="1" comment="libvirt-daemon-driver-storage-gluster is &lt;4.5.0-23.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826544" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;4.5.0-23.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826545" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;4.5.0-23.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826546" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;4.5.0-23.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826547" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;4.5.0-23.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826548" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;4.5.0-23.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826549" version="1" comment="libvirt-daemon-kvm is &lt;4.5.0-23.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826550" version="1" comment="libvirt-daemon-lxc is &lt;4.5.0-23.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826551" version="1" comment="libvirt-devel is &lt;4.5.0-23.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826552" version="1" comment="libvirt-docs is &lt;4.5.0-23.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826553" version="1" comment="libvirt-libs is &lt;4.5.0-23.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826554" version="1" comment="libvirt-lock-sanlock is &lt;4.5.0-23.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826555" version="1" comment="libvirt-login-shell is &lt;4.5.0-23.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826556" version="1" comment="libvirt-nss is &lt;4.5.0-23.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825630" version="1" comment="libssh2 is &lt;1.4.3-12.el7_6.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825631" version="1" comment="libssh2-devel is &lt;1.4.3-12.el7_6.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825632" version="1" comment="libssh2-docs is &lt;1.4.3-12.el7_6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826323" version="1" comment="libssh2 is &lt;1.8.0-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826324" version="1" comment="libssh2-devel is &lt;1.8.0-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826325" version="1" comment="libssh2-docs is &lt;1.8.0-3.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825952" version="1" comment="libssh2 is &lt;1.4.3-12.el7_6.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825953" version="1" comment="libssh2-devel is &lt;1.4.3-12.el7_6.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825954" version="1" comment="libssh2-docs is &lt;1.4.3-12.el7_6.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825645" version="1" comment="mod_auth_mellon is &lt;0.14.0-2.el7_6.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825646" version="1" comment="mod_auth_mellon-diagnostics is &lt;0.14.0-2.el7_6.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826160" version="1" comment="ctdb is &lt;4.9.1-6.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826161" version="1" comment="ctdb-tests is &lt;4.9.1-6.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826162" version="1" comment="libsmbclient is &lt;4.9.1-6.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826163" version="1" comment="libsmbclient-devel is &lt;4.9.1-6.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826164" version="1" comment="libwbclient is &lt;4.9.1-6.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826165" version="1" comment="libwbclient-devel is &lt;4.9.1-6.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826166" version="1" comment="samba is &lt;4.9.1-6.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826167" version="1" comment="samba-client is &lt;4.9.1-6.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826168" version="1" comment="samba-client-libs is &lt;4.9.1-6.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826169" version="1" comment="samba-common is &lt;4.9.1-6.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826170" version="1" comment="samba-common-libs is &lt;4.9.1-6.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826171" version="1" comment="samba-common-tools is &lt;4.9.1-6.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826172" version="1" comment="samba-dc is &lt;4.9.1-6.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826173" version="1" comment="samba-dc-libs is &lt;4.9.1-6.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826174" version="1" comment="samba-devel is &lt;4.9.1-6.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826175" version="1" comment="samba-krb5-printing is &lt;4.9.1-6.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826176" version="1" comment="samba-libs is &lt;4.9.1-6.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826177" version="1" comment="samba-pidl is &lt;4.9.1-6.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826178" version="1" comment="samba-python is &lt;4.9.1-6.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826179" version="1" comment="samba-python-test is &lt;4.9.1-6.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826180" version="1" comment="samba-test is &lt;4.9.1-6.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826181" version="1" comment="samba-test-libs is &lt;4.9.1-6.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826182" version="1" comment="samba-vfs-glusterfs is &lt;4.9.1-6.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826183" version="1" comment="samba-winbind is &lt;4.9.1-6.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826184" version="1" comment="samba-winbind-clients is &lt;4.9.1-6.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826185" version="1" comment="samba-winbind-krb5-locator is &lt;4.9.1-6.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826186" version="1" comment="samba-winbind-modules is &lt;4.9.1-6.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825955" version="1" comment="389-ds-base is &lt;1.3.8.4-25.1.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825956" version="1" comment="389-ds-base-devel is &lt;1.3.8.4-25.1.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825957" version="1" comment="389-ds-base-libs is &lt;1.3.8.4-25.1.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825958" version="1" comment="389-ds-base-snmp is &lt;1.3.8.4-25.1.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828481" version="1" comment="e2fsprogs is &lt;1.42.9-19.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828482" version="1" comment="e2fsprogs-devel is &lt;1.42.9-19.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828483" version="1" comment="e2fsprogs-libs is &lt;1.42.9-19.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828484" version="1" comment="e2fsprogs-static is &lt;1.42.9-19.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828485" version="1" comment="libcom_err is &lt;1.42.9-19.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828486" version="1" comment="libcom_err-devel is &lt;1.42.9-19.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828487" version="1" comment="libss is &lt;1.42.9-19.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828488" version="1" comment="libss-devel is &lt;1.42.9-19.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712243" version="1" comment="kgraft-patch-4_12_14-95_16-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712244" version="1" comment="kgraft-patch-4_12_14-95_19-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712245" version="1" comment="kgraft-patch-4_12_14-95_24-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712246" version="1" comment="kgraft-patch-4_12_14-95_29-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712247" version="1" comment="kgraft-patch-4_12_14-95_32-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712248" version="1" comment="kgraft-patch-4_12_14-95_37-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712249" version="1" comment="kgraft-patch-4_12_14-95_40-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712250" version="1" comment="kgraft-patch-4_12_14-95_45-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712251" version="1" comment="kgraft-patch-4_12_14-120-default is &gt;=3-6.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712252" version="1" comment="kgraft-patch-4_12_14-122_12-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712253" version="1" comment="kgraft-patch-4_12_14-122_7-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712254" version="1" comment="kernel-livepatch-4_12_14-150_14-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712255" version="1" comment="kernel-livepatch-4_12_14-150_17-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712256" version="1" comment="kernel-livepatch-4_12_14-150_22-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712257" version="1" comment="kernel-livepatch-4_12_14-150_27-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712258" version="1" comment="kernel-livepatch-4_12_14-150_32-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712259" version="1" comment="kernel-livepatch-4_12_14-150_35-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712260" version="1" comment="kernel-livepatch-4_12_14-150_38-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712261" version="1" comment="kernel-livepatch-4_12_14-150_41-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712262" version="1" comment="kernel-livepatch-4_12_14-150_47-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712263" version="1" comment="kernel-livepatch-4_12_14-195-default is &gt;=10-28.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712264" version="1" comment="kernel-livepatch-4_12_14-197_10-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712265" version="1" comment="kernel-livepatch-4_12_14-197_15-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712266" version="1" comment="kernel-livepatch-4_12_14-197_18-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712267" version="1" comment="kernel-livepatch-4_12_14-197_21-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712268" version="1" comment="kernel-livepatch-4_12_14-197_26-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712269" version="1" comment="kernel-livepatch-4_12_14-197_29-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712270" version="1" comment="kernel-livepatch-4_12_14-197_4-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712271" version="1" comment="kernel-livepatch-4_12_14-197_7-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827006" version="1" comment="curl is &lt;7.29.0-57.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827007" version="1" comment="libcurl is &lt;7.29.0-57.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827008" version="1" comment="libcurl-devel is &lt;7.29.0-57.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828276" version="1" comment="curl is &lt;7.29.0-59.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828277" version="1" comment="libcurl is &lt;7.29.0-59.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828278" version="1" comment="libcurl-devel is &lt;7.29.0-59.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826801" version="1" comment="openslp is &lt;2.0.0-8.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826802" version="1" comment="openslp-devel is &lt;2.0.0-8.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826803" version="1" comment="openslp-server is &lt;2.0.0-8.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825770" version="1" comment="wget is &lt;1.14-18.el7_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820087" version="1" comment="openssh is &lt;7.4p1-16.el7.PTF.1122802.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820088" version="1" comment="openssh-askpass is &lt;7.4p1-16.el7.PTF.1122802.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820089" version="1" comment="openssh-cavs is &lt;7.4p1-16.el7.PTF.1122802.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820090" version="1" comment="openssh-clients is &lt;7.4p1-16.el7.PTF.1122802.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820091" version="1" comment="openssh-keycat is &lt;7.4p1-16.el7.PTF.1122802.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820092" version="1" comment="openssh-ldap is &lt;7.4p1-16.el7.PTF.1122802.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820093" version="1" comment="openssh-server is &lt;7.4p1-16.el7.PTF.1122802.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820094" version="1" comment="openssh-server-sysvinit is &lt;7.4p1-16.el7.PTF.1122802.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820095" version="1" comment="pam_ssh_agent_auth is &lt;0.10.3-2.16.el7.PTF.1122802.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825527" version="1" comment="polkit is &lt;0.112-18.el7_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825528" version="1" comment="polkit-devel is &lt;0.112-18.el7_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825529" version="1" comment="polkit-docs is &lt;0.112-18.el7_6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825533" version="1" comment="libgudev1 is &lt;219-62.el7_6.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825534" version="1" comment="libgudev1-devel is &lt;219-62.el7_6.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825535" version="1" comment="systemd is &lt;219-62.el7_6.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825536" version="1" comment="systemd-devel is &lt;219-62.el7_6.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825537" version="1" comment="systemd-journal-gateway is &lt;219-62.el7_6.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825538" version="1" comment="systemd-libs is &lt;219-62.el7_6.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825539" version="1" comment="systemd-networkd is &lt;219-62.el7_6.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825540" version="1" comment="systemd-python is &lt;219-62.el7_6.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825541" version="1" comment="systemd-resolved is &lt;219-62.el7_6.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825542" version="1" comment="systemd-sysv is &lt;219-62.el7_6.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826108" version="1" comment="dhclient is &lt;4.2.5-77.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826109" version="1" comment="dhcp is &lt;4.2.5-77.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826110" version="1" comment="dhcp-common is &lt;4.2.5-77.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826111" version="1" comment="dhcp-devel is &lt;4.2.5-77.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826112" version="1" comment="dhcp-libs is &lt;4.2.5-77.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825948" version="1" comment="qemu-img is &lt;1.5.3-160.el7_6.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825949" version="1" comment="qemu-kvm is &lt;1.5.3-160.el7_6.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825950" version="1" comment="qemu-kvm-common is &lt;1.5.3-160.el7_6.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825951" version="1" comment="qemu-kvm-tools is &lt;1.5.3-160.el7_6.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712272" version="1" comment="kgraft-patch-4_4_120-94_17-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712273" version="1" comment="kgraft-patch-4_4_126-94_22-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712274" version="1" comment="kgraft-patch-4_4_131-94_29-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712275" version="1" comment="kgraft-patch-4_4_132-94_33-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712276" version="1" comment="kgraft-patch-4_4_138-94_39-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712277" version="1" comment="kgraft-patch-4_4_140-94_42-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712278" version="1" comment="kgraft-patch-4_4_143-94_47-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712279" version="1" comment="kgraft-patch-4_4_155-94_50-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712280" version="1" comment="kgraft-patch-4_4_156-94_57-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712281" version="1" comment="kgraft-patch-4_4_156-94_61-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712282" version="1" comment="kgraft-patch-4_4_156-94_64-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712283" version="1" comment="kgraft-patch-4_4_162-94_69-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712284" version="1" comment="kgraft-patch-4_4_162-94_72-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712285" version="1" comment="kgraft-patch-4_12_14-94_41-default is &gt;=4-2.10.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712286" version="1" comment="kgraft-patch-4_12_14-95_3-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712287" version="1" comment="kgraft-patch-4_12_14-95_6-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712288" version="1" comment="kernel-livepatch-4_12_14-25_13-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712289" version="1" comment="kernel-livepatch-4_12_14-25_16-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712290" version="1" comment="kernel-livepatch-4_12_14-25_19-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712291" version="1" comment="kernel-livepatch-4_12_14-25_22-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712292" version="1" comment="kernel-livepatch-4_12_14-25_25-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712293" version="1" comment="kernel-livepatch-4_12_14-25_28-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712294" version="1" comment="kernel-livepatch-4_12_14-25_6-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825687" version="1" comment="bpftool is &lt;3.10.0-957.12.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825688" version="1" comment="kernel is &lt;3.10.0-957.12.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825689" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-957.12.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825690" version="1" comment="kernel-debug is &lt;3.10.0-957.12.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825693" version="1" comment="kernel-doc is &lt;3.10.0-957.12.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825694" version="1" comment="kernel-headers is &lt;3.10.0-957.12.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825695" version="1" comment="kernel-tools is &lt;3.10.0-957.12.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825696" version="1" comment="kernel-tools-libs is &lt;3.10.0-957.12.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825698" version="1" comment="perf is &lt;3.10.0-957.12.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825699" version="1" comment="python-perf is &lt;3.10.0-957.12.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828300" version="1" comment="libwmf is &lt;0.2.8.4-44.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828301" version="1" comment="libwmf-devel is &lt;0.2.8.4-44.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828302" version="1" comment="libwmf-lite is &lt;0.2.8.4-44.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828123" version="1" comment="SDL is &lt;1.2.15-17.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828124" version="1" comment="SDL-devel is &lt;1.2.15-17.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828125" version="1" comment="SDL-static is &lt;1.2.15-17.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825544" version="1" comment="flatpak is &lt;1.0.2-4.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825545" version="1" comment="flatpak-builder is &lt;1.0.0-4.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825546" version="1" comment="flatpak-devel is &lt;1.0.2-4.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825547" version="1" comment="flatpak-libs is &lt;1.0.2-4.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825771" version="1" comment="ruby is &lt;2.0.0.648-35.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825772" version="1" comment="ruby-devel is &lt;2.0.0.648-35.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825773" version="1" comment="ruby-doc is &lt;2.0.0.648-35.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825774" version="1" comment="ruby-irb is &lt;2.0.0.648-35.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825775" version="1" comment="ruby-libs is &lt;2.0.0.648-35.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825776" version="1" comment="ruby-tcltk is &lt;2.0.0.648-35.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825777" version="1" comment="rubygem-bigdecimal is &lt;1.2.0-35.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825778" version="1" comment="rubygem-io-console is &lt;0.4.2-35.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825779" version="1" comment="rubygem-json is &lt;1.7.7-35.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825780" version="1" comment="rubygem-minitest is &lt;4.3.2-35.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825781" version="1" comment="rubygem-psych is &lt;2.0.0-35.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825782" version="1" comment="rubygem-rake is &lt;0.9.6-35.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825783" version="1" comment="rubygem-rdoc is &lt;4.0.0-35.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825784" version="1" comment="rubygems is &lt;2.0.14.1-35.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825785" version="1" comment="rubygems-devel is &lt;2.0.14.1-35.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826575" version="1" comment="advancecomp is &lt;1.15-21.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827640" version="1" comment="advancecomp is &lt;1.15-22.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712295" version="1" comment="kgraft-patch-4_4_175-94_79-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712296" version="1" comment="kernel-default is &lt;4.4.175-94.79.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828535" version="1" comment="libexif is &lt;0.6.22-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828536" version="1" comment="libexif-devel is &lt;0.6.22-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828537" version="1" comment="libexif-doc is &lt;0.6.22-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712297" version="1" comment="kernel-default is &lt;4.12.14-95.48.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712298" version="1" comment="kgraft-patch-4_12_14-122_17-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712299" version="1" comment="kernel-livepatch-4_12_14-197_34-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712300" version="1" comment="kernel-livepatch-4_12_14-197_37-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712301" version="1" comment="kernel-default is &lt;4.12.14-197.37.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825638" version="1" comment="python is &lt;2.7.5-77.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825639" version="1" comment="python-debug is &lt;2.7.5-77.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825640" version="1" comment="python-devel is &lt;2.7.5-77.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825641" version="1" comment="python-libs is &lt;2.7.5-77.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825642" version="1" comment="python-test is &lt;2.7.5-77.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825643" version="1" comment="python-tools is &lt;2.7.5-77.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825644" version="1" comment="tkinter is &lt;2.7.5-77.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826566" version="1" comment="libguestfs-winsupport is &lt;7.2-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825629" version="1" comment="firefox is &lt;60.6.1-1.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826120" version="1" comment="qemu-img is &lt;1.5.3-167.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826121" version="1" comment="qemu-kvm is &lt;1.5.3-167.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826122" version="1" comment="qemu-kvm-common is &lt;1.5.3-167.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826123" version="1" comment="qemu-kvm-tools is &lt;1.5.3-167.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827790" version="1" comment="bash is &lt;4.2.46-34.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827791" version="1" comment="bash-doc is &lt;4.2.46-34.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712302" version="1" comment="kgraft-patch-4_12_14-95_45-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712303" version="1" comment="kgraft-patch-4_12_14-95_48-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712304" version="1" comment="kgraft-patch-4_12_14-95_51-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712305" version="1" comment="kgraft-patch-4_12_14-95_54-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712306" version="1" comment="kernel-default is ==4.12.14-95.57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712307" version="1" comment="kgraft-patch-4_12_14-95_57-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712308" version="1" comment="kernel-default is ==4.12.14-95.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712309" version="1" comment="kgraft-patch-4_12_14-95_60-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712310" version="1" comment="kernel-default is &lt;4.12.14-95.60.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712311" version="1" comment="kernel-livepatch-4_12_14-150_47-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712312" version="1" comment="kernel-livepatch-4_12_14-150_52-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712313" version="1" comment="kernel-default is ==4.12.14-150.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712314" version="1" comment="kernel-livepatch-4_12_14-150_55-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712315" version="1" comment="kernel-default is ==4.12.14-150.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712316" version="1" comment="kernel-livepatch-4_12_14-150_58-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712317" version="1" comment="kernel-default is &lt;4.12.14-150.58.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712318" version="1" comment="kgraft-patch-4_12_14-95_37-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712319" version="1" comment="kgraft-patch-4_12_14-95_40-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712320" version="1" comment="kgraft-patch-4_12_14-95_45-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712321" version="1" comment="kgraft-patch-4_12_14-95_48-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712322" version="1" comment="kgraft-patch-4_12_14-95_51-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712323" version="1" comment="kgraft-patch-4_12_14-120-default is &gt;=7-18.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712324" version="1" comment="kgraft-patch-4_12_14-122_12-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712325" version="1" comment="kgraft-patch-4_12_14-122_17-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712326" version="1" comment="kgraft-patch-4_12_14-122_20-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712327" version="1" comment="kgraft-patch-4_12_14-122_7-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712328" version="1" comment="kernel-livepatch-4_12_14-150_41-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712329" version="1" comment="kernel-livepatch-4_12_14-150_47-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712330" version="1" comment="kernel-livepatch-4_12_14-150_52-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712331" version="1" comment="kernel-livepatch-4_12_14-150_55-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712332" version="1" comment="kernel-livepatch-4_12_14-150_58-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712333" version="1" comment="kernel-livepatch-4_12_14-197_26-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712334" version="1" comment="kernel-livepatch-4_12_14-197_29-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712335" version="1" comment="kernel-livepatch-4_12_14-197_34-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712336" version="1" comment="kernel-livepatch-4_12_14-197_37-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712337" version="1" comment="kernel-livepatch-4_12_14-197_40-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712338" version="1" comment="kernel-default is &lt;4.12.14-197.40.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712339" version="1" comment="kernel-livepatch-4_12_14-150_52-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712340" version="1" comment="kernel-livepatch-4_12_14-150_55-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712341" version="1" comment="kernel-livepatch-4_12_14-150_58-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712342" version="1" comment="kernel-default is ==4.12.14-150.63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712343" version="1" comment="kernel-livepatch-4_12_14-150_63-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712344" version="1" comment="kernel-livepatch-4_12_14-150_66-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712345" version="1" comment="kernel-livepatch-4_12_14-150_69-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712346" version="1" comment="kernel-default is &lt;4.12.14-150.69.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828796" version="1" comment="libexif is &lt;0.6.22-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828797" version="1" comment="libexif-devel is &lt;0.6.22-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828798" version="1" comment="libexif-doc is &lt;0.6.22-2.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712347" version="1" comment="kgraft-patch-4_12_14-95_48-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712348" version="1" comment="kgraft-patch-4_12_14-95_51-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712349" version="1" comment="kgraft-patch-4_12_14-95_54-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712350" version="1" comment="kgraft-patch-4_12_14-95_57-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712351" version="1" comment="kgraft-patch-4_12_14-95_60-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712352" version="1" comment="kernel-default is ==4.12.14-95.65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712353" version="1" comment="kgraft-patch-4_12_14-95_65-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712354" version="1" comment="kernel-default is &lt;4.12.14-95.65.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712355" version="1" comment="kgraft-patch-4_12_14-122_17-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712356" version="1" comment="kgraft-patch-4_12_14-122_20-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712357" version="1" comment="kernel-default is ==4.12.14-122.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712358" version="1" comment="kgraft-patch-4_12_14-122_23-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712359" version="1" comment="kernel-default is ==4.12.14-122.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712360" version="1" comment="kgraft-patch-4_12_14-122_26-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712361" version="1" comment="kernel-default is ==4.12.14-122.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712362" version="1" comment="kgraft-patch-4_12_14-122_29-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712363" version="1" comment="kernel-default is ==4.12.14-122.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712364" version="1" comment="kgraft-patch-4_12_14-122_32-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712365" version="1" comment="kernel-default is ==4.12.14-122.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712366" version="1" comment="kgraft-patch-4_12_14-122_37-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712367" version="1" comment="kernel-default is ==4.12.14-122.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712368" version="1" comment="kgraft-patch-4_12_14-122_41-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712369" version="1" comment="kernel-default is ==4.12.14-122.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712370" version="1" comment="kgraft-patch-4_12_14-122_46-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712371" version="1" comment="kernel-default is ==4.12.14-122.51.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712372" version="1" comment="kgraft-patch-4_12_14-122_51-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712373" version="1" comment="kernel-default is ==4.12.14-122.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712374" version="1" comment="kgraft-patch-4_12_14-122_54-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712375" version="1" comment="kernel-default is &lt;4.12.14-122.54.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712376" version="1" comment="kernel-livepatch-4_12_14-150_52-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712377" version="1" comment="kernel-livepatch-4_12_14-150_55-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712378" version="1" comment="kernel-livepatch-4_12_14-150_58-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712379" version="1" comment="kernel-livepatch-4_12_14-150_63-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712380" version="1" comment="kernel-default is &lt;4.12.14-150.63.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712381" version="1" comment="kernel-livepatch-4_12_14-197_34-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712382" version="1" comment="kernel-livepatch-4_12_14-197_37-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712383" version="1" comment="kernel-livepatch-4_12_14-197_40-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712384" version="1" comment="kernel-default is ==4.12.14-197.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712385" version="1" comment="kernel-livepatch-4_12_14-197_45-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712386" version="1" comment="kernel-default is ==4.12.14-197.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712387" version="1" comment="kernel-livepatch-4_12_14-197_48-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712388" version="1" comment="kernel-default is ==4.12.14-197.51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712389" version="1" comment="kernel-livepatch-4_12_14-197_51-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712390" version="1" comment="kernel-default is ==4.12.14-197.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712391" version="1" comment="kernel-livepatch-4_12_14-197_56-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712392" version="1" comment="kernel-default is ==4.12.14-197.61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712393" version="1" comment="kernel-livepatch-4_12_14-197_61-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712394" version="1" comment="kernel-default is ==4.12.14-197.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712395" version="1" comment="kernel-livepatch-4_12_14-197_64-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712396" version="1" comment="kernel-default is ==4.12.14-197.67.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712397" version="1" comment="kernel-livepatch-4_12_14-197_67-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712398" version="1" comment="kernel-default is ==4.12.14-197.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712399" version="1" comment="kernel-livepatch-4_12_14-197_72-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712400" version="1" comment="kernel-default is ==4.12.14-197.75.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712401" version="1" comment="kernel-livepatch-4_12_14-197_75-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712402" version="1" comment="kernel-default is &lt;4.12.14-197.75.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714897" version="1" comment="kernel-default is ==5.3.18-22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712403" version="1" comment="kernel-livepatch-5_3_18-22-default is &gt;=7-5.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712404" version="1" comment="kernel-default is ==5.3.18-24.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712405" version="1" comment="kernel-livepatch-5_3_18-24_12-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712406" version="1" comment="kernel-default is ==5.3.18-24.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712407" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712408" version="1" comment="kernel-default is ==5.3.18-24.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712409" version="1" comment="kernel-livepatch-5_3_18-24_9-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714898" version="1" comment="kernel-default is &lt;5.3.18-24.9.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829589" version="1" comment="bpftool is &lt;3.10.0-1160.59.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829590" version="1" comment="kernel is &lt;3.10.0-1160.59.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829591" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1160.59.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829592" version="1" comment="kernel-debug is &lt;3.10.0-1160.59.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829595" version="1" comment="kernel-doc is &lt;3.10.0-1160.59.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829596" version="1" comment="kernel-headers is &lt;3.10.0-1160.59.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829597" version="1" comment="kernel-tools is &lt;3.10.0-1160.59.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829598" version="1" comment="kernel-tools-libs is &lt;3.10.0-1160.59.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829600" version="1" comment="perf is &lt;3.10.0-1160.59.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829601" version="1" comment="python-perf is &lt;3.10.0-1160.59.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712410" version="1" comment="kernel-default is ==5.3.18-24.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712411" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712412" version="1" comment="kernel-default is ==5.3.18-24.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712413" version="1" comment="kernel-livepatch-5_3_18-24_29-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712414" version="1" comment="kernel-default is ==5.3.18-24.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712415" version="1" comment="kernel-livepatch-5_3_18-24_34-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712416" version="1" comment="kernel-default is ==5.3.18-24.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712417" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712418" version="1" comment="kernel-default is ==5.3.18-24.43.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712419" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829242" version="1" comment="microcode_ctl is &lt;2.1-73.11.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828438" version="1" comment="bluez is &lt;5.44-7.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828439" version="1" comment="bluez-cups is &lt;5.44-7.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828440" version="1" comment="bluez-hid2hci is &lt;5.44-7.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828441" version="1" comment="bluez-libs is &lt;5.44-7.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828442" version="1" comment="bluez-libs-devel is &lt;5.44-7.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828493" version="1" comment="qt5-qtbase is &lt;5.9.7-4.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828494" version="1" comment="qt5-qtbase-common is &lt;5.9.7-4.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828495" version="1" comment="qt5-qtbase-devel is &lt;5.9.7-4.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828496" version="1" comment="qt5-qtbase-doc is &lt;5.9.7-4.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828497" version="1" comment="qt5-qtbase-examples is &lt;5.9.7-4.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828498" version="1" comment="qt5-qtbase-gui is &lt;5.9.7-4.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828499" version="1" comment="qt5-qtbase-mysql is &lt;5.9.7-4.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828500" version="1" comment="qt5-qtbase-odbc is &lt;5.9.7-4.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828501" version="1" comment="qt5-qtbase-postgresql is &lt;5.9.7-4.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828502" version="1" comment="qt5-qtbase-static is &lt;5.9.7-4.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828503" version="1" comment="qt5-rpm-macros is &lt;5.9.7-4.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827957" version="1" comment="python-twisted-web is &lt;12.1.0-7.el7_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827911" version="1" comment="telnet is &lt;0.17-65.el7_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827912" version="1" comment="telnet-server is &lt;0.17-65.el7_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826960" version="1" comment="icu is &lt;50.2-4.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826961" version="1" comment="libicu is &lt;50.2-4.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826962" version="1" comment="libicu-devel is &lt;50.2-4.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826963" version="1" comment="libicu-doc is &lt;50.2-4.el7_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828916" version="1" comment="perl is &lt;5.16.3-299.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828917" version="1" comment="perl-CPAN is &lt;1.9800-299.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828918" version="1" comment="perl-ExtUtils-CBuilder is &lt;0.28.2.6-299.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828919" version="1" comment="perl-ExtUtils-Embed is &lt;1.30-299.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828920" version="1" comment="perl-ExtUtils-Install is &lt;1.58-299.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828921" version="1" comment="perl-IO-Zlib is &lt;1.10-299.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828922" version="1" comment="perl-Locale-Maketext-Simple is &lt;0.21-299.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828923" version="1" comment="perl-Module-CoreList is &lt;2.76.02-299.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828924" version="1" comment="perl-Module-Loaded is &lt;0.08-299.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828925" version="1" comment="perl-Object-Accessor is &lt;0.42-299.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828926" version="1" comment="perl-Package-Constants is &lt;0.02-299.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828927" version="1" comment="perl-Pod-Escapes is &lt;1.04-299.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828928" version="1" comment="perl-Time-Piece is &lt;1.20.1-299.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828929" version="1" comment="perl-core is &lt;5.16.3-299.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828930" version="1" comment="perl-devel is &lt;5.16.3-299.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828931" version="1" comment="perl-libs is &lt;5.16.3-299.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828932" version="1" comment="perl-macros is &lt;5.16.3-299.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828933" version="1" comment="perl-tests is &lt;5.16.3-299.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828443" version="1" comment="NetworkManager is &lt;1.18.8-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828444" version="1" comment="NetworkManager-adsl is &lt;1.18.8-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828445" version="1" comment="NetworkManager-bluetooth is &lt;1.18.8-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828446" version="1" comment="NetworkManager-config-server is &lt;1.18.8-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828447" version="1" comment="NetworkManager-dispatcher-routing-rules is &lt;1.18.8-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828448" version="1" comment="NetworkManager-glib is &lt;1.18.8-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828449" version="1" comment="NetworkManager-glib-devel is &lt;1.18.8-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828450" version="1" comment="NetworkManager-libnm is &lt;1.18.8-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828451" version="1" comment="NetworkManager-libnm-devel is &lt;1.18.8-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828452" version="1" comment="NetworkManager-ovs is &lt;1.18.8-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828453" version="1" comment="NetworkManager-ppp is &lt;1.18.8-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828454" version="1" comment="NetworkManager-team is &lt;1.18.8-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828455" version="1" comment="NetworkManager-tui is &lt;1.18.8-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828456" version="1" comment="NetworkManager-wifi is &lt;1.18.8-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828457" version="1" comment="NetworkManager-wwan is &lt;1.18.8-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828035" version="1" comment="unbound is &lt;1.6.6-5.el7_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828036" version="1" comment="unbound-devel is &lt;1.6.6-5.el7_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828037" version="1" comment="unbound-libs is &lt;1.6.6-5.el7_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828038" version="1" comment="unbound-python is &lt;1.6.6-5.el7_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827978" version="1" comment="emacs-git is &lt;1.8.3.1-23.el7_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827979" version="1" comment="emacs-git-el is &lt;1.8.3.1-23.el7_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827980" version="1" comment="git is &lt;1.8.3.1-23.el7_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827981" version="1" comment="git-all is &lt;1.8.3.1-23.el7_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827982" version="1" comment="git-bzr is &lt;1.8.3.1-23.el7_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827983" version="1" comment="git-cvs is &lt;1.8.3.1-23.el7_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827984" version="1" comment="git-daemon is &lt;1.8.3.1-23.el7_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827985" version="1" comment="git-email is &lt;1.8.3.1-23.el7_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827986" version="1" comment="git-gnome-keyring is &lt;1.8.3.1-23.el7_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827987" version="1" comment="git-gui is &lt;1.8.3.1-23.el7_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827988" version="1" comment="git-hg is &lt;1.8.3.1-23.el7_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827989" version="1" comment="git-instaweb is &lt;1.8.3.1-23.el7_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827990" version="1" comment="git-p4 is &lt;1.8.3.1-23.el7_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827991" version="1" comment="git-svn is &lt;1.8.3.1-23.el7_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827992" version="1" comment="gitk is &lt;1.8.3.1-23.el7_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827993" version="1" comment="gitweb is &lt;1.8.3.1-23.el7_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827994" version="1" comment="perl-Git is &lt;1.8.3.1-23.el7_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827995" version="1" comment="perl-Git-SVN is &lt;1.8.3.1-23.el7_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828516" version="1" comment="freerdp is &lt;2.1.1-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828517" version="1" comment="freerdp-devel is &lt;2.1.1-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828518" version="1" comment="freerdp-libs is &lt;2.1.1-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828519" version="1" comment="libwinpr is &lt;2.1.1-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828520" version="1" comment="libwinpr-devel is &lt;2.1.1-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828625" version="1" comment="fence-agents-aliyun is &lt;4.2.1-41.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828626" version="1" comment="fence-agents-all is &lt;4.2.1-41.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828627" version="1" comment="fence-agents-amt-ws is &lt;4.2.1-41.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828628" version="1" comment="fence-agents-apc is &lt;4.2.1-41.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828629" version="1" comment="fence-agents-apc-snmp is &lt;4.2.1-41.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828630" version="1" comment="fence-agents-aws is &lt;4.2.1-41.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828631" version="1" comment="fence-agents-azure-arm is &lt;4.2.1-41.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828632" version="1" comment="fence-agents-bladecenter is &lt;4.2.1-41.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828633" version="1" comment="fence-agents-brocade is &lt;4.2.1-41.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828634" version="1" comment="fence-agents-cisco-mds is &lt;4.2.1-41.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828635" version="1" comment="fence-agents-cisco-ucs is &lt;4.2.1-41.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828636" version="1" comment="fence-agents-common is &lt;4.2.1-41.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828637" version="1" comment="fence-agents-compute is &lt;4.2.1-41.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828638" version="1" comment="fence-agents-drac5 is &lt;4.2.1-41.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828639" version="1" comment="fence-agents-eaton-snmp is &lt;4.2.1-41.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828640" version="1" comment="fence-agents-emerson is &lt;4.2.1-41.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828641" version="1" comment="fence-agents-eps is &lt;4.2.1-41.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828642" version="1" comment="fence-agents-gce is &lt;4.2.1-41.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828643" version="1" comment="fence-agents-heuristics-ping is &lt;4.2.1-41.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828644" version="1" comment="fence-agents-hpblade is &lt;4.2.1-41.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828645" version="1" comment="fence-agents-ibmblade is &lt;4.2.1-41.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828646" version="1" comment="fence-agents-ifmib is &lt;4.2.1-41.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828647" version="1" comment="fence-agents-ilo-moonshot is &lt;4.2.1-41.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828648" version="1" comment="fence-agents-ilo-mp is &lt;4.2.1-41.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828649" version="1" comment="fence-agents-ilo-ssh is &lt;4.2.1-41.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828650" version="1" comment="fence-agents-ilo2 is &lt;4.2.1-41.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828651" version="1" comment="fence-agents-intelmodular is &lt;4.2.1-41.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828652" version="1" comment="fence-agents-ipdu is &lt;4.2.1-41.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828653" version="1" comment="fence-agents-ipmilan is &lt;4.2.1-41.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828654" version="1" comment="fence-agents-kdump is &lt;4.2.1-41.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828655" version="1" comment="fence-agents-lpar is &lt;4.2.1-41.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828656" version="1" comment="fence-agents-mpath is &lt;4.2.1-41.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828657" version="1" comment="fence-agents-redfish is &lt;4.2.1-41.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828658" version="1" comment="fence-agents-rhevm is &lt;4.2.1-41.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828659" version="1" comment="fence-agents-rsa is &lt;4.2.1-41.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828660" version="1" comment="fence-agents-rsb is &lt;4.2.1-41.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828661" version="1" comment="fence-agents-sbd is &lt;4.2.1-41.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828662" version="1" comment="fence-agents-scsi is &lt;4.2.1-41.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828663" version="1" comment="fence-agents-virsh is &lt;4.2.1-41.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828664" version="1" comment="fence-agents-vmware-rest is &lt;4.2.1-41.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828665" version="1" comment="fence-agents-vmware-soap is &lt;4.2.1-41.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828666" version="1" comment="fence-agents-wti is &lt;4.2.1-41.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828667" version="1" comment="resource-agents is &lt;4.1.1-61.el7_9.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828668" version="1" comment="resource-agents-aliyun is &lt;4.1.1-61.el7_9.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712420" version="1" comment="kernel-livepatch-4_12_14-150_55-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712421" version="1" comment="kernel-livepatch-4_12_14-150_63-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828532" version="1" comment="OpenEXR is &lt;1.7.1-8.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828533" version="1" comment="OpenEXR-devel is &lt;1.7.1-8.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828534" version="1" comment="OpenEXR-libs is &lt;1.7.1-8.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828039" version="1" comment="ntp is &lt;4.2.6p5-29.el7_8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828040" version="1" comment="ntp-doc is &lt;4.2.6p5-29.el7_8.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828041" version="1" comment="ntp-perl is &lt;4.2.6p5-29.el7_8.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828042" version="1" comment="ntpdate is &lt;4.2.6p5-29.el7_8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828043" version="1" comment="sntp is &lt;4.2.6p5-29.el7_8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828058" version="1" comment="dbus is &lt;1.10.24-14.el7_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828059" version="1" comment="dbus-devel is &lt;1.10.24-14.el7_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828060" version="1" comment="dbus-doc is &lt;1.10.24-14.el7_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828061" version="1" comment="dbus-libs is &lt;1.10.24-14.el7_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828062" version="1" comment="dbus-tests is &lt;1.10.24-14.el7_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828063" version="1" comment="dbus-x11 is &lt;1.10.24-14.el7_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828101" version="1" comment="dovecot is &lt;2.2.36-6.el7_8.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828102" version="1" comment="dovecot-devel is &lt;2.2.36-6.el7_8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828103" version="1" comment="dovecot-mysql is &lt;2.2.36-6.el7_8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828104" version="1" comment="dovecot-pgsql is &lt;2.2.36-6.el7_8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828105" version="1" comment="dovecot-pigeonhole is &lt;2.2.36-6.el7_8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828538" version="1" comment="openldap is &lt;2.4.44-22.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828539" version="1" comment="openldap-clients is &lt;2.4.44-22.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828540" version="1" comment="openldap-devel is &lt;2.4.44-22.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828541" version="1" comment="openldap-servers is &lt;2.4.44-22.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828542" version="1" comment="openldap-servers-sql is &lt;2.4.44-22.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828899" version="1" comment="iwl100-firmware is &lt;39.31.5.1-80.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828900" version="1" comment="iwl1000-firmware is &lt;39.31.5.1-80.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828901" version="1" comment="iwl105-firmware is &lt;18.168.6.1-80.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828902" version="1" comment="iwl135-firmware is &lt;18.168.6.1-80.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828903" version="1" comment="iwl2000-firmware is &lt;18.168.6.1-80.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828904" version="1" comment="iwl2030-firmware is &lt;18.168.6.1-80.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828905" version="1" comment="iwl3160-firmware is &lt;25.30.13.0-80.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828906" version="1" comment="iwl3945-firmware is &lt;15.32.2.9-80.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828907" version="1" comment="iwl4965-firmware is &lt;228.61.2.24-80.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828908" version="1" comment="iwl5000-firmware is &lt;8.83.5.1_1-80.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828909" version="1" comment="iwl5150-firmware is &lt;8.24.2.2-80.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828910" version="1" comment="iwl6000-firmware is &lt;9.221.4.1-80.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828911" version="1" comment="iwl6000g2a-firmware is &lt;18.168.6.1-80.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828912" version="1" comment="iwl6000g2b-firmware is &lt;18.168.6.1-80.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828913" version="1" comment="iwl6050-firmware is &lt;41.28.5.1-80.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828914" version="1" comment="iwl7260-firmware is &lt;25.30.13.0-80.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828915" version="1" comment="linux-firmware is &lt;20200421-80.git78c0348.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712422" version="1" comment="kgraft-patch-4_12_14-122_12-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712423" version="1" comment="kgraft-patch-4_12_14-122_17-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712424" version="1" comment="kgraft-patch-4_12_14-122_20-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712425" version="1" comment="kgraft-patch-4_12_14-122_23-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712426" version="1" comment="kgraft-patch-4_12_14-122_26-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712427" version="1" comment="kgraft-patch-4_12_14-122_29-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712428" version="1" comment="kgraft-patch-4_12_14-122_32-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712429" version="1" comment="kgraft-patch-4_12_14-122_37-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712430" version="1" comment="kgraft-patch-4_12_14-122_41-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712431" version="1" comment="kernel-livepatch-4_12_14-197_29-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712432" version="1" comment="kernel-livepatch-4_12_14-197_34-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712433" version="1" comment="kernel-livepatch-4_12_14-197_37-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712434" version="1" comment="kernel-livepatch-4_12_14-197_40-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712435" version="1" comment="kernel-livepatch-4_12_14-197_45-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712436" version="1" comment="kernel-livepatch-4_12_14-197_48-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712437" version="1" comment="kernel-livepatch-4_12_14-197_51-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712438" version="1" comment="kernel-livepatch-4_12_14-197_56-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712439" version="1" comment="kernel-livepatch-4_12_14-197_61-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712440" version="1" comment="kernel-default is &lt;4.12.14-197.61.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712441" version="1" comment="kernel-livepatch-5_3_18-22-default is &gt;=4-11.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712442" version="1" comment="kernel-livepatch-5_3_18-24_12-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712443" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712444" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712445" version="1" comment="kernel-livepatch-5_3_18-24_9-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829154" version="1" comment="bpftool is &lt;3.10.0-1160.31.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829155" version="1" comment="kernel is &lt;3.10.0-1160.31.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829156" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1160.31.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829157" version="1" comment="kernel-debug is &lt;3.10.0-1160.31.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829160" version="1" comment="kernel-doc is &lt;3.10.0-1160.31.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829161" version="1" comment="kernel-headers is &lt;3.10.0-1160.31.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829162" version="1" comment="kernel-tools is &lt;3.10.0-1160.31.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829163" version="1" comment="kernel-tools-libs is &lt;3.10.0-1160.31.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829165" version="1" comment="perf is &lt;3.10.0-1160.31.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829166" version="1" comment="python-perf is &lt;3.10.0-1160.31.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827958" version="1" comment="firefox is &lt;68.8.0-1.el7_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827962" version="1" comment="thunderbird is &lt;68.8.0-1.el7_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828034" version="1" comment="thunderbird is &lt;68.9.0-1.el7_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828012" version="1" comment="firefox is &lt;68.9.0-1.el7_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828057" version="1" comment="firefox is &lt;68.10.0-1.el7_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828064" version="1" comment="thunderbird is &lt;68.10.0-1.el7_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828575" version="1" comment="firefox is &lt;78.3.0-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712446" version="1" comment="kgraft-patch-4_12_14-95_16-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712447" version="1" comment="kgraft-patch-4_12_14-95_19-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712448" version="1" comment="kgraft-patch-4_12_14-95_24-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712449" version="1" comment="kgraft-patch-4_12_14-95_29-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712450" version="1" comment="kgraft-patch-4_12_14-95_32-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712451" version="1" comment="kgraft-patch-4_12_14-95_37-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712452" version="1" comment="kgraft-patch-4_12_14-95_40-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712453" version="1" comment="kgraft-patch-4_12_14-95_45-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712454" version="1" comment="kgraft-patch-4_12_14-95_48-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712455" version="1" comment="kgraft-patch-4_12_14-95_51-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712456" version="1" comment="kgraft-patch-4_12_14-120-default is &gt;=4-9.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712457" version="1" comment="kgraft-patch-4_12_14-122_12-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712458" version="1" comment="kgraft-patch-4_12_14-122_17-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712459" version="1" comment="kgraft-patch-4_12_14-122_20-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712460" version="1" comment="kgraft-patch-4_12_14-122_7-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712461" version="1" comment="kernel-livepatch-4_12_14-150_17-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712462" version="1" comment="kernel-livepatch-4_12_14-150_22-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712463" version="1" comment="kernel-livepatch-4_12_14-150_27-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712464" version="1" comment="kernel-livepatch-4_12_14-150_32-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712465" version="1" comment="kernel-livepatch-4_12_14-150_35-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712466" version="1" comment="kernel-livepatch-4_12_14-150_38-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712467" version="1" comment="kernel-livepatch-4_12_14-150_41-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712468" version="1" comment="kernel-livepatch-4_12_14-150_47-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712469" version="1" comment="kernel-livepatch-4_12_14-195-default is &gt;=11-31.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712470" version="1" comment="kernel-livepatch-4_12_14-197_10-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712471" version="1" comment="kernel-livepatch-4_12_14-197_15-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712472" version="1" comment="kernel-livepatch-4_12_14-197_18-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712473" version="1" comment="kernel-livepatch-4_12_14-197_21-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712474" version="1" comment="kernel-livepatch-4_12_14-197_26-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712475" version="1" comment="kernel-livepatch-4_12_14-197_29-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712476" version="1" comment="kernel-livepatch-4_12_14-197_34-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712477" version="1" comment="kernel-livepatch-4_12_14-197_37-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712478" version="1" comment="kernel-livepatch-4_12_14-197_4-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712479" version="1" comment="kernel-livepatch-4_12_14-197_40-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712480" version="1" comment="kernel-livepatch-4_12_14-197_7-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828018" version="1" comment="unbound is &lt;1.6.6-4.el7_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828019" version="1" comment="unbound-libs is &lt;1.6.6-4.el7_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828556" version="1" comment="libcroco is &lt;0.6.12-6.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828557" version="1" comment="libcroco-devel is &lt;0.6.12-6.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828044" version="1" comment="bpftool is &lt;3.10.0-1127.13.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828045" version="1" comment="kernel is &lt;3.10.0-1127.13.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828046" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1127.13.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828047" version="1" comment="kernel-debug is &lt;3.10.0-1127.13.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828050" version="1" comment="kernel-doc is &lt;3.10.0-1127.13.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828051" version="1" comment="kernel-headers is &lt;3.10.0-1127.13.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828052" version="1" comment="kernel-tools is &lt;3.10.0-1127.13.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828053" version="1" comment="kernel-tools-libs is &lt;3.10.0-1127.13.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828055" version="1" comment="perf is &lt;3.10.0-1127.13.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828056" version="1" comment="python-perf is &lt;3.10.0-1127.13.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828031" version="1" comment="libexif is &lt;0.6.21-7.el7_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828032" version="1" comment="libexif-devel is &lt;0.6.21-7.el7_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828033" version="1" comment="libexif-doc is &lt;0.6.21-7.el7_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828013" version="1" comment="freerdp is &lt;2.0.0-4.rc4.el7_8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828014" version="1" comment="freerdp-devel is &lt;2.0.0-4.rc4.el7_8.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828015" version="1" comment="freerdp-libs is &lt;2.0.0-4.rc4.el7_8.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828016" version="1" comment="libwinpr is &lt;2.0.0-4.rc4.el7_8.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828017" version="1" comment="libwinpr-devel is &lt;2.0.0-4.rc4.el7_8.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828097" version="1" comment="postgresql-jdbc is &lt;9.2.1002-8.el7_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828098" version="1" comment="postgresql-jdbc-javadoc is &lt;9.2.1002-8.el7_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828934" version="1" comment="qemu-img is &lt;1.5.3-175.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828935" version="1" comment="qemu-kvm is &lt;1.5.3-175.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828936" version="1" comment="qemu-kvm-common is &lt;1.5.3-175.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828937" version="1" comment="qemu-kvm-tools is &lt;1.5.3-175.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828808" version="1" comment="targetcli is &lt;2.1.53-1.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828809" version="1" comment="python-rtslib is &lt;2.1.74-1.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828810" version="1" comment="python-rtslib-doc is &lt;2.1.74-1.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828824" version="1" comment="ctdb is &lt;4.10.16-9.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828825" version="1" comment="ctdb-tests is &lt;4.10.16-9.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828826" version="1" comment="libsmbclient is &lt;4.10.16-9.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828827" version="1" comment="libsmbclient-devel is &lt;4.10.16-9.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828828" version="1" comment="libwbclient is &lt;4.10.16-9.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828829" version="1" comment="libwbclient-devel is &lt;4.10.16-9.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828830" version="1" comment="samba is &lt;4.10.16-9.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828831" version="1" comment="samba-client is &lt;4.10.16-9.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828832" version="1" comment="samba-client-libs is &lt;4.10.16-9.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828833" version="1" comment="samba-common is &lt;4.10.16-9.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828834" version="1" comment="samba-common-libs is &lt;4.10.16-9.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828835" version="1" comment="samba-common-tools is &lt;4.10.16-9.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828836" version="1" comment="samba-dc is &lt;4.10.16-9.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828837" version="1" comment="samba-dc-libs is &lt;4.10.16-9.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828838" version="1" comment="samba-devel is &lt;4.10.16-9.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828839" version="1" comment="samba-krb5-printing is &lt;4.10.16-9.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828840" version="1" comment="samba-libs is &lt;4.10.16-9.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828841" version="1" comment="samba-pidl is &lt;4.10.16-9.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828842" version="1" comment="samba-python is &lt;4.10.16-9.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828843" version="1" comment="samba-python-test is &lt;4.10.16-9.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828844" version="1" comment="samba-test is &lt;4.10.16-9.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828845" version="1" comment="samba-test-libs is &lt;4.10.16-9.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828846" version="1" comment="samba-vfs-glusterfs is &lt;4.10.16-9.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828847" version="1" comment="samba-winbind is &lt;4.10.16-9.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828848" version="1" comment="samba-winbind-clients is &lt;4.10.16-9.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828849" version="1" comment="samba-winbind-krb5-locator is &lt;4.10.16-9.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828850" version="1" comment="samba-winbind-modules is &lt;4.10.16-9.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712481" version="1" comment="kgraft-patch-4_12_14-95_57-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712482" version="1" comment="kernel-default is &lt;4.12.14-95.57.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712483" version="1" comment="kgraft-patch-4_12_14-122_20-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712484" version="1" comment="kgraft-patch-4_12_14-122_23-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712485" version="1" comment="kgraft-patch-4_12_14-122_26-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712486" version="1" comment="kgraft-patch-4_12_14-122_29-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712487" version="1" comment="kgraft-patch-4_12_14-122_32-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712488" version="1" comment="kernel-default is &lt;4.12.14-150.55.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712489" version="1" comment="kernel-livepatch-4_12_14-197_40-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712490" version="1" comment="kernel-livepatch-4_12_14-197_45-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712491" version="1" comment="kernel-livepatch-4_12_14-197_48-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712492" version="1" comment="kernel-livepatch-4_12_14-197_51-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712493" version="1" comment="kernel-default is &lt;4.12.14-197.51.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712494" version="1" comment="kernel-livepatch-5_3_18-22-default is &gt;=2-5.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712495" version="1" comment="kernel-livepatch-5_3_18-24_9-default is &gt;=2-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828613" version="1" comment="xorg-x11-server-Xdmx is &lt;1.20.4-12.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828614" version="1" comment="xorg-x11-server-Xephyr is &lt;1.20.4-12.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828615" version="1" comment="xorg-x11-server-Xnest is &lt;1.20.4-12.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828616" version="1" comment="xorg-x11-server-Xorg is &lt;1.20.4-12.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828617" version="1" comment="xorg-x11-server-Xvfb is &lt;1.20.4-12.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828618" version="1" comment="xorg-x11-server-Xwayland is &lt;1.20.4-12.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828619" version="1" comment="xorg-x11-server-common is &lt;1.20.4-12.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828620" version="1" comment="xorg-x11-server-devel is &lt;1.20.4-12.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828621" version="1" comment="xorg-x11-server-source is &lt;1.20.4-12.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828799" version="1" comment="xorg-x11-server-Xdmx is &lt;1.20.4-15.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828800" version="1" comment="xorg-x11-server-Xephyr is &lt;1.20.4-15.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828801" version="1" comment="xorg-x11-server-Xnest is &lt;1.20.4-15.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828802" version="1" comment="xorg-x11-server-Xorg is &lt;1.20.4-15.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828803" version="1" comment="xorg-x11-server-Xvfb is &lt;1.20.4-15.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828804" version="1" comment="xorg-x11-server-Xwayland is &lt;1.20.4-15.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828805" version="1" comment="xorg-x11-server-common is &lt;1.20.4-15.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828806" version="1" comment="xorg-x11-server-devel is &lt;1.20.4-15.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828807" version="1" comment="xorg-x11-server-source is &lt;1.20.4-15.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828699" version="1" comment="librepo is &lt;1.8.1-8.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828700" version="1" comment="librepo-devel is &lt;1.8.1-8.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828701" version="1" comment="python-librepo is &lt;1.8.1-8.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828580" version="1" comment="spice-glib is &lt;0.35-5.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828581" version="1" comment="spice-glib-devel is &lt;0.35-5.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828582" version="1" comment="spice-gtk-tools is &lt;0.35-5.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828583" version="1" comment="spice-gtk3 is &lt;0.35-5.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828584" version="1" comment="spice-gtk3-devel is &lt;0.35-5.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828585" version="1" comment="spice-gtk3-vala is &lt;0.35-5.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828586" version="1" comment="spice-server is &lt;0.14.0-9.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828587" version="1" comment="spice-server-devel is &lt;0.14.0-9.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828609" version="1" comment="libX11 is &lt;1.6.7-3.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828610" version="1" comment="libX11-common is &lt;1.6.7-3.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828611" version="1" comment="libX11-devel is &lt;1.6.7-3.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828571" version="1" comment="qemu-img is &lt;1.5.3-175.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828572" version="1" comment="qemu-kvm is &lt;1.5.3-175.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828573" version="1" comment="qemu-kvm-common is &lt;1.5.3-175.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828574" version="1" comment="qemu-kvm-tools is &lt;1.5.3-175.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828968" version="1" comment="grub2 is &lt;2.02-0.87.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828969" version="1" comment="grub2-common is &lt;2.02-0.87.el7_9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828970" version="1" comment="grub2-efi-ia32 is &lt;2.02-0.87.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828971" version="1" comment="grub2-efi-ia32-cdboot is &lt;2.02-0.87.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828972" version="1" comment="grub2-efi-ia32-modules is &lt;2.02-0.87.el7_9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828973" version="1" comment="grub2-efi-x64 is &lt;2.02-0.87.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828974" version="1" comment="grub2-efi-x64-cdboot is &lt;2.02-0.87.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828975" version="1" comment="grub2-efi-x64-modules is &lt;2.02-0.87.el7_9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828976" version="1" comment="grub2-pc is &lt;2.02-0.87.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828977" version="1" comment="grub2-pc-modules is &lt;2.02-0.87.el7_9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828978" version="1" comment="grub2-tools is &lt;2.02-0.87.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828979" version="1" comment="grub2-tools-extra is &lt;2.02-0.87.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828980" version="1" comment="grub2-tools-minimal is &lt;2.02-0.87.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712496" version="1" comment="kgraft-patch-4_12_14-95_54-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712497" version="1" comment="kgraft-patch-4_12_14-95_57-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712498" version="1" comment="kgraft-patch-4_12_14-95_60-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712499" version="1" comment="kgraft-patch-4_12_14-122_23-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712500" version="1" comment="kgraft-patch-4_12_14-122_26-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712501" version="1" comment="kgraft-patch-4_12_14-122_29-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712502" version="1" comment="kgraft-patch-4_12_14-122_32-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712503" version="1" comment="kgraft-patch-4_12_14-122_37-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712504" version="1" comment="kernel-livepatch-4_12_14-197_45-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712505" version="1" comment="kernel-livepatch-4_12_14-197_48-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712506" version="1" comment="kernel-livepatch-4_12_14-197_51-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712507" version="1" comment="kernel-livepatch-4_12_14-197_56-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712508" version="1" comment="kernel-default is &lt;4.12.14-197.56.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712509" version="1" comment="kernel-livepatch-5_3_18-22-default is &gt;=3-8.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712510" version="1" comment="kernel-livepatch-5_3_18-24_12-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712511" version="1" comment="kernel-livepatch-5_3_18-24_9-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828065" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.262.b10-0.el7_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828066" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.262.b10-0.el7_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828067" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.262.b10-0.el7_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828068" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.262.b10-0.el7_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828069" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.262.b10-0.el7_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828070" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.262.b10-0.el7_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828071" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.262.b10-0.el7_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828072" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.262.b10-0.el7_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828073" version="1" comment="java-11-openjdk is &lt;11.0.8.10-0.el7_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828074" version="1" comment="java-11-openjdk-demo is &lt;11.0.8.10-0.el7_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828075" version="1" comment="java-11-openjdk-devel is &lt;11.0.8.10-0.el7_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828076" version="1" comment="java-11-openjdk-headless is &lt;11.0.8.10-0.el7_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828077" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.8.10-0.el7_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828078" version="1" comment="java-11-openjdk-javadoc-zip is &lt;11.0.8.10-0.el7_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828079" version="1" comment="java-11-openjdk-jmods is &lt;11.0.8.10-0.el7_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828080" version="1" comment="java-11-openjdk-src is &lt;11.0.8.10-0.el7_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828598" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.272.b10-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828599" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.272.b10-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828600" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.272.b10-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828601" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.272.b10-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828602" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.272.b10-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828603" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.272.b10-1.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828604" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.272.b10-1.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828605" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.272.b10-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828588" version="1" comment="java-11-openjdk is &lt;11.0.9.11-0.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828589" version="1" comment="java-11-openjdk-demo is &lt;11.0.9.11-0.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828590" version="1" comment="java-11-openjdk-devel is &lt;11.0.9.11-0.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828591" version="1" comment="java-11-openjdk-headless is &lt;11.0.9.11-0.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828592" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.9.11-0.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828593" version="1" comment="java-11-openjdk-javadoc-zip is &lt;11.0.9.11-0.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828594" version="1" comment="java-11-openjdk-jmods is &lt;11.0.9.11-0.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828595" version="1" comment="java-11-openjdk-src is &lt;11.0.9.11-0.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828596" version="1" comment="java-11-openjdk-static-libs is &lt;11.0.9.11-0.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828886" version="1" comment="bpftool is &lt;3.10.0-1160.15.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828887" version="1" comment="kernel is &lt;3.10.0-1160.15.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828888" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1160.15.2.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828889" version="1" comment="kernel-debug is &lt;3.10.0-1160.15.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828892" version="1" comment="kernel-doc is &lt;3.10.0-1160.15.2.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828893" version="1" comment="kernel-headers is &lt;3.10.0-1160.15.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828894" version="1" comment="kernel-tools is &lt;3.10.0-1160.15.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828895" version="1" comment="kernel-tools-libs is &lt;3.10.0-1160.15.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828897" version="1" comment="perf is &lt;3.10.0-1160.15.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828898" version="1" comment="python-perf is &lt;3.10.0-1160.15.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828094" version="1" comment="firefox is &lt;68.11.0-1.el7_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828099" version="1" comment="thunderbird is &lt;68.11.0-1.el7_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828100" version="1" comment="firefox is &lt;68.12.0-1.el7_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828106" version="1" comment="thunderbird is &lt;68.12.0-1.el7_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828579" version="1" comment="thunderbird is &lt;78.3.1-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828597" version="1" comment="firefox is &lt;78.4.0-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828612" version="1" comment="thunderbird is &lt;78.4.0-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828885" version="1" comment="thunderbird is &lt;78.7.0-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712512" version="1" comment="kernel-default is &lt;4.12.14-197.45.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482053" version="1" comment="kernel-default is &lt;5.3.18-22.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828786" version="1" comment="net-snmp is &lt;5.7.2-49.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828787" version="1" comment="net-snmp-agent-libs is &lt;5.7.2-49.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828788" version="1" comment="net-snmp-devel is &lt;5.7.2-49.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828789" version="1" comment="net-snmp-gui is &lt;5.7.2-49.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828790" version="1" comment="net-snmp-libs is &lt;5.7.2-49.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828791" version="1" comment="net-snmp-perl is &lt;5.7.2-49.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828792" version="1" comment="net-snmp-python is &lt;5.7.2-49.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828793" version="1" comment="net-snmp-sysvinit is &lt;5.7.2-49.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828794" version="1" comment="net-snmp-utils is &lt;5.7.2-49.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828606" version="1" comment="freetype is &lt;2.8-14.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828607" version="1" comment="freetype-demos is &lt;2.8-14.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828608" version="1" comment="freetype-devel is &lt;2.8-14.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828785" version="1" comment="firefox is &lt;78.5.0-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828784" version="1" comment="thunderbird is &lt;78.5.0-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828863" version="1" comment="firefox is &lt;78.6.0-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828869" version="1" comment="thunderbird is &lt;78.6.0-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828876" version="1" comment="firefox is &lt;78.6.1-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828877" version="1" comment="thunderbird is &lt;78.6.1-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712513" version="1" comment="kgraft-patch-4_12_14-95_48-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712514" version="1" comment="kgraft-patch-4_12_14-122_17-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712515" version="1" comment="kernel-livepatch-4_12_14-197_34-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712516" version="1" comment="kernel-livepatch-4_12_14-197_37-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828712" version="1" comment="qt is &lt;4.8.7-9.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828713" version="1" comment="qt-assistant is &lt;4.8.7-9.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828714" version="1" comment="qt-config is &lt;4.8.7-9.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828715" version="1" comment="qt-demos is &lt;4.8.7-9.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828716" version="1" comment="qt-devel is &lt;4.8.7-9.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828717" version="1" comment="qt-devel-private is &lt;4.8.7-9.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828718" version="1" comment="qt-doc is &lt;4.8.7-9.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828719" version="1" comment="qt-examples is &lt;4.8.7-9.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828720" version="1" comment="qt-mysql is &lt;4.8.7-9.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828721" version="1" comment="qt-odbc is &lt;4.8.7-9.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828722" version="1" comment="qt-postgresql is &lt;4.8.7-9.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828723" version="1" comment="qt-qdbusviewer is &lt;4.8.7-9.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828724" version="1" comment="qt-qvfb is &lt;4.8.7-9.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828725" version="1" comment="qt-x11 is &lt;4.8.7-9.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828726" version="1" comment="qt5-qtbase is &lt;5.9.7-5.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828727" version="1" comment="qt5-qtbase-common is &lt;5.9.7-5.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828728" version="1" comment="qt5-qtbase-devel is &lt;5.9.7-5.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828729" version="1" comment="qt5-qtbase-doc is &lt;5.9.7-5.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828730" version="1" comment="qt5-qtbase-examples is &lt;5.9.7-5.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828731" version="1" comment="qt5-qtbase-gui is &lt;5.9.7-5.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828732" version="1" comment="qt5-qtbase-mysql is &lt;5.9.7-5.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828733" version="1" comment="qt5-qtbase-odbc is &lt;5.9.7-5.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828734" version="1" comment="qt5-qtbase-postgresql is &lt;5.9.7-5.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828735" version="1" comment="qt5-qtbase-static is &lt;5.9.7-5.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828736" version="1" comment="qt5-rpm-macros is &lt;5.9.7-5.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828702" version="1" comment="tomcat is &lt;7.0.76-16.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828703" version="1" comment="tomcat-admin-webapps is &lt;7.0.76-16.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828704" version="1" comment="tomcat-docs-webapp is &lt;7.0.76-16.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828705" version="1" comment="tomcat-el-2.2-api is &lt;7.0.76-16.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828706" version="1" comment="tomcat-javadoc is &lt;7.0.76-16.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828707" version="1" comment="tomcat-jsp-2.2-api is &lt;7.0.76-16.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828708" version="1" comment="tomcat-jsvc is &lt;7.0.76-16.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828709" version="1" comment="tomcat-lib is &lt;7.0.76-16.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828710" version="1" comment="tomcat-servlet-3.0-api is &lt;7.0.76-16.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828711" version="1" comment="tomcat-webapps is &lt;7.0.76-16.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826950" version="1" comment="tomcat is &lt;7.0.76-11.el7_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826951" version="1" comment="tomcat-admin-webapps is &lt;7.0.76-11.el7_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826952" version="1" comment="tomcat-docs-webapp is &lt;7.0.76-11.el7_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826953" version="1" comment="tomcat-el-2.2-api is &lt;7.0.76-11.el7_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826954" version="1" comment="tomcat-javadoc is &lt;7.0.76-11.el7_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826955" version="1" comment="tomcat-jsp-2.2-api is &lt;7.0.76-11.el7_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826956" version="1" comment="tomcat-jsvc is &lt;7.0.76-11.el7_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826957" version="1" comment="tomcat-lib is &lt;7.0.76-11.el7_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826958" version="1" comment="tomcat-servlet-3.0-api is &lt;7.0.76-11.el7_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826959" version="1" comment="tomcat-webapps is &lt;7.0.76-11.el7_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828864" version="1" comment="openssl is &lt;1.0.2k-21.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828865" version="1" comment="openssl-devel is &lt;1.0.2k-21.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828866" version="1" comment="openssl-libs is &lt;1.0.2k-21.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828867" version="1" comment="openssl-perl is &lt;1.0.2k-21.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828868" version="1" comment="openssl-static is &lt;1.0.2k-21.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830365" version="1" comment="libssh2 is &lt;1.8.0-4.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830366" version="1" comment="libssh2-devel is &lt;1.8.0-4.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830367" version="1" comment="libssh2-docs is &lt;1.8.0-4.el7_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829126" version="1" comment="microcode_ctl is &lt;2.1-73.9.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829039" version="1" comment="squid is &lt;3.5.20-17.el7_9.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829040" version="1" comment="squid-migration-script is &lt;3.5.20-17.el7_9.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829041" version="1" comment="squid-sysvinit is &lt;3.5.20-17.el7_9.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712517" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712518" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828750" version="1" comment="libvirt is &lt;4.5.0-36.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828751" version="1" comment="libvirt-admin is &lt;4.5.0-36.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828752" version="1" comment="libvirt-bash-completion is &lt;4.5.0-36.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828753" version="1" comment="libvirt-client is &lt;4.5.0-36.el7_9.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828754" version="1" comment="libvirt-daemon is &lt;4.5.0-36.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828755" version="1" comment="libvirt-daemon-config-network is &lt;4.5.0-36.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828756" version="1" comment="libvirt-daemon-config-nwfilter is &lt;4.5.0-36.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828757" version="1" comment="libvirt-daemon-driver-interface is &lt;4.5.0-36.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828758" version="1" comment="libvirt-daemon-driver-lxc is &lt;4.5.0-36.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828759" version="1" comment="libvirt-daemon-driver-network is &lt;4.5.0-36.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828760" version="1" comment="libvirt-daemon-driver-nodedev is &lt;4.5.0-36.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828761" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;4.5.0-36.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828762" version="1" comment="libvirt-daemon-driver-qemu is &lt;4.5.0-36.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828763" version="1" comment="libvirt-daemon-driver-secret is &lt;4.5.0-36.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828764" version="1" comment="libvirt-daemon-driver-storage is &lt;4.5.0-36.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828765" version="1" comment="libvirt-daemon-driver-storage-core is &lt;4.5.0-36.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828766" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;4.5.0-36.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828767" version="1" comment="libvirt-daemon-driver-storage-gluster is &lt;4.5.0-36.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828768" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;4.5.0-36.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828769" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;4.5.0-36.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828770" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;4.5.0-36.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828771" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;4.5.0-36.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828772" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;4.5.0-36.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828773" version="1" comment="libvirt-daemon-kvm is &lt;4.5.0-36.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828774" version="1" comment="libvirt-daemon-lxc is &lt;4.5.0-36.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828775" version="1" comment="libvirt-devel is &lt;4.5.0-36.el7_9.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828776" version="1" comment="libvirt-docs is &lt;4.5.0-36.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828777" version="1" comment="libvirt-libs is &lt;4.5.0-36.el7_9.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828778" version="1" comment="libvirt-lock-sanlock is &lt;4.5.0-36.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828779" version="1" comment="libvirt-login-shell is &lt;4.5.0-36.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828780" version="1" comment="libvirt-nss is &lt;4.5.0-36.el7_9.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829066" version="1" comment="nss is &lt;3.53.1-7.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829067" version="1" comment="nss-devel is &lt;3.53.1-7.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829068" version="1" comment="nss-pkcs11-devel is &lt;3.53.1-7.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829069" version="1" comment="nss-sysinit is &lt;3.53.1-7.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829070" version="1" comment="nss-tools is &lt;3.53.1-7.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828854" version="1" comment="pacemaker is &lt;1.1.23-1.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828855" version="1" comment="pacemaker-cli is &lt;1.1.23-1.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828856" version="1" comment="pacemaker-cluster-libs is &lt;1.1.23-1.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828857" version="1" comment="pacemaker-cts is &lt;1.1.23-1.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828858" version="1" comment="pacemaker-doc is &lt;1.1.23-1.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828859" version="1" comment="pacemaker-libs is &lt;1.1.23-1.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828860" version="1" comment="pacemaker-libs-devel is &lt;1.1.23-1.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828861" version="1" comment="pacemaker-nagios-plugins-metadata is &lt;1.1.23-1.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828862" version="1" comment="pacemaker-remote is &lt;1.1.23-1.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712519" version="1" comment="kgraft-patch-4_12_14-95_45-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712520" version="1" comment="kgraft-patch-4_12_14-95_48-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712521" version="1" comment="kgraft-patch-4_12_14-95_51-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712522" version="1" comment="kgraft-patch-4_12_14-95_54-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712523" version="1" comment="kgraft-patch-4_12_14-95_57-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712524" version="1" comment="kgraft-patch-4_12_14-95_60-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712525" version="1" comment="kgraft-patch-4_12_14-120-default is &gt;=9-3.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712526" version="1" comment="kgraft-patch-4_12_14-122_12-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712527" version="1" comment="kgraft-patch-4_12_14-122_17-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712528" version="1" comment="kgraft-patch-4_12_14-122_20-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712529" version="1" comment="kgraft-patch-4_12_14-122_23-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712530" version="1" comment="kgraft-patch-4_12_14-122_26-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712531" version="1" comment="kgraft-patch-4_12_14-122_29-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712532" version="1" comment="kgraft-patch-4_12_14-122_32-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712533" version="1" comment="kgraft-patch-4_12_14-122_37-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712534" version="1" comment="kgraft-patch-4_12_14-122_41-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712535" version="1" comment="kgraft-patch-4_12_14-122_46-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712536" version="1" comment="kgraft-patch-4_12_14-122_51-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712537" version="1" comment="kgraft-patch-4_12_14-122_7-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712538" version="1" comment="kernel-livepatch-4_12_14-150_47-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712539" version="1" comment="kernel-livepatch-4_12_14-150_52-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712540" version="1" comment="kernel-livepatch-4_12_14-150_55-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712541" version="1" comment="kernel-livepatch-4_12_14-150_58-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712542" version="1" comment="kernel-livepatch-4_12_14-197_29-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712543" version="1" comment="kernel-livepatch-4_12_14-197_34-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712544" version="1" comment="kernel-livepatch-4_12_14-197_37-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712545" version="1" comment="kernel-livepatch-4_12_14-197_40-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712546" version="1" comment="kernel-livepatch-4_12_14-197_45-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712547" version="1" comment="kernel-livepatch-4_12_14-197_48-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712548" version="1" comment="kernel-livepatch-4_12_14-197_51-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712549" version="1" comment="kernel-livepatch-4_12_14-197_56-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712550" version="1" comment="kernel-livepatch-4_12_14-197_61-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712551" version="1" comment="kernel-livepatch-4_12_14-197_64-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712552" version="1" comment="kernel-livepatch-4_12_14-197_67-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712553" version="1" comment="kernel-default is &lt;4.12.14-197.67.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712554" version="1" comment="kernel-livepatch-5_3_18-22-default is &gt;=5-5.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712555" version="1" comment="kernel-livepatch-5_3_18-24_12-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712556" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712557" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712558" version="1" comment="kernel-livepatch-5_3_18-24_29-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712559" version="1" comment="kernel-livepatch-5_3_18-24_34-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712560" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712561" version="1" comment="kernel-livepatch-5_3_18-24_9-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712562" version="1" comment="kernel-default is &lt;4.12.14-95.71.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712563" version="1" comment="kernel-default is ==4.12.14-122.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712564" version="1" comment="kgraft-patch-4_12_14-122_60-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712565" version="1" comment="kernel-default is ==4.12.14-122.63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712566" version="1" comment="kgraft-patch-4_12_14-122_63-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712567" version="1" comment="kernel-default is &lt;4.12.14-122.63.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712568" version="1" comment="kernel-default is ==4.12.14-197.83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712569" version="1" comment="kernel-livepatch-4_12_14-197_83-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712570" version="1" comment="kernel-default is ==4.12.14-197.86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712571" version="1" comment="kernel-livepatch-4_12_14-197_86-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712572" version="1" comment="kernel-default is &lt;4.12.14-197.86.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712573" version="1" comment="kernel-default is ==5.3.18-24.49.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712574" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712575" version="1" comment="kernel-default is ==5.3.18-24.52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712576" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712577" version="1" comment="kernel-default is &lt;5.3.18-24.52.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698763" version="1" comment="kernel-default is ==5.3.18-57.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712578" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=10-3.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628531" version="1" comment="kernel-default is &lt;5.3.18-57.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828878" version="1" comment="dnsmasq is &lt;2.76-16.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828879" version="1" comment="dnsmasq-utils is &lt;2.76-16.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829071" version="1" comment="openldap is &lt;2.4.44-23.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829072" version="1" comment="openldap-clients is &lt;2.4.44-23.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829073" version="1" comment="openldap-devel is &lt;2.4.44-23.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829074" version="1" comment="openldap-servers is &lt;2.4.44-23.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829075" version="1" comment="openldap-servers-sql is &lt;2.4.44-23.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829509" version="1" comment="bpftool is &lt;3.10.0-1160.53.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829510" version="1" comment="kernel is &lt;3.10.0-1160.53.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829511" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1160.53.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829512" version="1" comment="kernel-debug is &lt;3.10.0-1160.53.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829515" version="1" comment="kernel-doc is &lt;3.10.0-1160.53.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829516" version="1" comment="kernel-headers is &lt;3.10.0-1160.53.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829517" version="1" comment="kernel-tools is &lt;3.10.0-1160.53.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829518" version="1" comment="kernel-tools-libs is &lt;3.10.0-1160.53.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829520" version="1" comment="perf is &lt;3.10.0-1160.53.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829521" version="1" comment="python-perf is &lt;3.10.0-1160.53.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829602" version="1" comment="openldap is &lt;2.4.44-25.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829603" version="1" comment="openldap-clients is &lt;2.4.44-25.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829604" version="1" comment="openldap-devel is &lt;2.4.44-25.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829605" version="1" comment="openldap-servers is &lt;2.4.44-25.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829606" version="1" comment="openldap-servers-sql is &lt;2.4.44-25.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829484" version="1" comment="ipa-client is &lt;4.6.8-5.el7_9.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829485" version="1" comment="ipa-client-common is &lt;4.6.8-5.el7_9.10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829486" version="1" comment="ipa-common is &lt;4.6.8-5.el7_9.10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829487" version="1" comment="ipa-python-compat is &lt;4.6.8-5.el7_9.10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829488" version="1" comment="ipa-server is &lt;4.6.8-5.el7_9.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829489" version="1" comment="ipa-server-common is &lt;4.6.8-5.el7_9.10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829490" version="1" comment="ipa-server-dns is &lt;4.6.8-5.el7_9.10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829491" version="1" comment="ipa-server-trust-ad is &lt;4.6.8-5.el7_9.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829492" version="1" comment="python2-ipaclient is &lt;4.6.8-5.el7_9.10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829493" version="1" comment="python2-ipalib is &lt;4.6.8-5.el7_9.10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829494" version="1" comment="python2-ipaserver is &lt;4.6.8-5.el7_9.10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826906" version="1" comment="java-1.7.0-openjdk is &lt;1.7.0.251-2.6.21.0.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826907" version="1" comment="java-1.7.0-openjdk-accessibility is &lt;1.7.0.251-2.6.21.0.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826908" version="1" comment="java-1.7.0-openjdk-demo is &lt;1.7.0.251-2.6.21.0.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826909" version="1" comment="java-1.7.0-openjdk-devel is &lt;1.7.0.251-2.6.21.0.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826910" version="1" comment="java-1.7.0-openjdk-headless is &lt;1.7.0.251-2.6.21.0.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826911" version="1" comment="java-1.7.0-openjdk-javadoc is &lt;1.7.0.251-2.6.21.0.el7_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826912" version="1" comment="java-1.7.0-openjdk-src is &lt;1.7.0.251-2.6.21.0.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826846" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.242.b08-0.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826847" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.242.b08-0.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826848" version="1" comment="java-1.8.0-openjdk-accessibility-debug is &lt;1.8.0.242.b08-0.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826849" version="1" comment="java-1.8.0-openjdk-debug is &lt;1.8.0.242.b08-0.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826850" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.242.b08-0.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826851" version="1" comment="java-1.8.0-openjdk-demo-debug is &lt;1.8.0.242.b08-0.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826852" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.242.b08-0.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826853" version="1" comment="java-1.8.0-openjdk-devel-debug is &lt;1.8.0.242.b08-0.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826854" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.242.b08-0.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826855" version="1" comment="java-1.8.0-openjdk-headless-debug is &lt;1.8.0.242.b08-0.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826856" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.242.b08-0.el7_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826857" version="1" comment="java-1.8.0-openjdk-javadoc-debug is &lt;1.8.0.242.b08-0.el7_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826858" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.242.b08-0.el7_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826859" version="1" comment="java-1.8.0-openjdk-javadoc-zip-debug is &lt;1.8.0.242.b08-0.el7_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826860" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.242.b08-0.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826861" version="1" comment="java-1.8.0-openjdk-src-debug is &lt;1.8.0.242.b08-0.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826808" version="1" comment="java-11-openjdk is &lt;11.0.6.10-1.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826809" version="1" comment="java-11-openjdk-debug is &lt;11.0.6.10-1.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826810" version="1" comment="java-11-openjdk-demo is &lt;11.0.6.10-1.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826811" version="1" comment="java-11-openjdk-demo-debug is &lt;11.0.6.10-1.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826812" version="1" comment="java-11-openjdk-devel is &lt;11.0.6.10-1.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826813" version="1" comment="java-11-openjdk-devel-debug is &lt;11.0.6.10-1.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826814" version="1" comment="java-11-openjdk-headless is &lt;11.0.6.10-1.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826815" version="1" comment="java-11-openjdk-headless-debug is &lt;11.0.6.10-1.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826816" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.6.10-1.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826817" version="1" comment="java-11-openjdk-javadoc-debug is &lt;11.0.6.10-1.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826818" version="1" comment="java-11-openjdk-javadoc-zip is &lt;11.0.6.10-1.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826819" version="1" comment="java-11-openjdk-javadoc-zip-debug is &lt;11.0.6.10-1.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826820" version="1" comment="java-11-openjdk-jmods is &lt;11.0.6.10-1.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826821" version="1" comment="java-11-openjdk-jmods-debug is &lt;11.0.6.10-1.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826822" version="1" comment="java-11-openjdk-src is &lt;11.0.6.10-1.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826823" version="1" comment="java-11-openjdk-src-debug is &lt;11.0.6.10-1.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829745" version="1" comment="python is &lt;2.7.5-92.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829746" version="1" comment="python-debug is &lt;2.7.5-92.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829747" version="1" comment="python-devel is &lt;2.7.5-92.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829748" version="1" comment="python-libs is &lt;2.7.5-92.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829749" version="1" comment="python-test is &lt;2.7.5-92.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829750" version="1" comment="python-tools is &lt;2.7.5-92.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829751" version="1" comment="tkinter is &lt;2.7.5-92.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828880" version="1" comment="xstream is &lt;1.3.1-12.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828881" version="1" comment="xstream-javadoc is &lt;1.3.1-12.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828782" version="1" comment="firefox is &lt;78.4.1-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828783" version="1" comment="thunderbird is &lt;78.4.3-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828795" version="1" comment="thunderbird is &lt;78.5.1-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828884" version="1" comment="firefox is &lt;78.7.0-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827949" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.252.b09-2.el7_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827950" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.252.b09-2.el7_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827951" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.252.b09-2.el7_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827952" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.252.b09-2.el7_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827953" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.252.b09-2.el7_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827954" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.252.b09-2.el7_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827955" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.252.b09-2.el7_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827956" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.252.b09-2.el7_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827923" version="1" comment="java-11-openjdk is &lt;11.0.7.10-4.el7_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827924" version="1" comment="java-11-openjdk-demo is &lt;11.0.7.10-4.el7_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827925" version="1" comment="java-11-openjdk-devel is &lt;11.0.7.10-4.el7_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827926" version="1" comment="java-11-openjdk-headless is &lt;11.0.7.10-4.el7_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827927" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.7.10-4.el7_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827928" version="1" comment="java-11-openjdk-javadoc-zip is &lt;11.0.7.10-4.el7_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827929" version="1" comment="java-11-openjdk-jmods is &lt;11.0.7.10-4.el7_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827930" version="1" comment="java-11-openjdk-src is &lt;11.0.7.10-4.el7_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827916" version="1" comment="java-1.7.0-openjdk is &lt;1.7.0.261-2.6.22.2.el7_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827917" version="1" comment="java-1.7.0-openjdk-accessibility is &lt;1.7.0.261-2.6.22.2.el7_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827918" version="1" comment="java-1.7.0-openjdk-demo is &lt;1.7.0.261-2.6.22.2.el7_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827919" version="1" comment="java-1.7.0-openjdk-devel is &lt;1.7.0.261-2.6.22.2.el7_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827920" version="1" comment="java-1.7.0-openjdk-headless is &lt;1.7.0.261-2.6.22.2.el7_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827921" version="1" comment="java-1.7.0-openjdk-javadoc is &lt;1.7.0.261-2.6.22.2.el7_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827922" version="1" comment="java-1.7.0-openjdk-src is &lt;1.7.0.261-2.6.22.2.el7_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829273" version="1" comment="bpftool is &lt;3.10.0-1160.41.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829274" version="1" comment="kernel is &lt;3.10.0-1160.41.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829275" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1160.41.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829276" version="1" comment="kernel-debug is &lt;3.10.0-1160.41.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829279" version="1" comment="kernel-doc is &lt;3.10.0-1160.41.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829280" version="1" comment="kernel-headers is &lt;3.10.0-1160.41.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829281" version="1" comment="kernel-tools is &lt;3.10.0-1160.41.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829282" version="1" comment="kernel-tools-libs is &lt;3.10.0-1160.41.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829284" version="1" comment="perf is &lt;3.10.0-1160.41.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829285" version="1" comment="python-perf is &lt;3.10.0-1160.41.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712579" version="1" comment="kgraft-patch-4_12_14-95_48-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712580" version="1" comment="kgraft-patch-4_12_14-95_51-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712581" version="1" comment="kgraft-patch-4_12_14-95_54-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712582" version="1" comment="kgraft-patch-4_12_14-95_57-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712583" version="1" comment="kgraft-patch-4_12_14-95_60-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712584" version="1" comment="kgraft-patch-4_12_14-95_65-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712585" version="1" comment="kgraft-patch-4_12_14-122_17-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712586" version="1" comment="kgraft-patch-4_12_14-122_20-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712587" version="1" comment="kgraft-patch-4_12_14-122_23-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712588" version="1" comment="kgraft-patch-4_12_14-122_26-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712589" version="1" comment="kgraft-patch-4_12_14-122_29-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712590" version="1" comment="kgraft-patch-4_12_14-122_32-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712591" version="1" comment="kgraft-patch-4_12_14-122_37-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712592" version="1" comment="kgraft-patch-4_12_14-122_41-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712593" version="1" comment="kgraft-patch-4_12_14-122_46-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712594" version="1" comment="kgraft-patch-4_12_14-122_51-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712595" version="1" comment="kgraft-patch-4_12_14-122_54-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712596" version="1" comment="kernel-default is ==4.12.14-122.57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712597" version="1" comment="kgraft-patch-4_12_14-122_57-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712598" version="1" comment="kgraft-patch-4_12_14-122_60-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712599" version="1" comment="kernel-default is &lt;4.12.14-122.60.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712600" version="1" comment="kernel-livepatch-4_12_14-150_52-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712601" version="1" comment="kernel-livepatch-4_12_14-150_55-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712602" version="1" comment="kernel-livepatch-4_12_14-150_58-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712603" version="1" comment="kernel-livepatch-4_12_14-150_63-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712604" version="1" comment="kernel-livepatch-4_12_14-197_34-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712605" version="1" comment="kernel-livepatch-4_12_14-197_37-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712606" version="1" comment="kernel-livepatch-4_12_14-197_40-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712607" version="1" comment="kernel-livepatch-4_12_14-197_45-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712608" version="1" comment="kernel-livepatch-4_12_14-197_48-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712609" version="1" comment="kernel-livepatch-4_12_14-197_51-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712610" version="1" comment="kernel-livepatch-4_12_14-197_56-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712611" version="1" comment="kernel-livepatch-4_12_14-197_61-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712612" version="1" comment="kernel-livepatch-4_12_14-197_64-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712613" version="1" comment="kernel-livepatch-4_12_14-197_67-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712614" version="1" comment="kernel-livepatch-4_12_14-197_72-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712615" version="1" comment="kernel-livepatch-4_12_14-197_75-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712616" version="1" comment="kernel-default is ==4.12.14-197.78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712617" version="1" comment="kernel-livepatch-4_12_14-197_78-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712618" version="1" comment="kernel-default is &lt;4.12.14-197.78.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712619" version="1" comment="kernel-livepatch-5_3_18-22-default is &gt;=8-5.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712620" version="1" comment="kernel-livepatch-5_3_18-24_12-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712621" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712622" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712623" version="1" comment="kernel-livepatch-5_3_18-24_29-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712624" version="1" comment="kernel-livepatch-5_3_18-24_34-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712625" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712626" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712627" version="1" comment="kernel-livepatch-5_3_18-24_9-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829898" version="1" comment="php-pear is &lt;1.9.4-23.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712628" version="1" comment="kgraft-patch-4_12_14-95_68-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712629" version="1" comment="kernel-default is &lt;4.12.14-95.68.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712630" version="1" comment="kgraft-patch-4_12_14-122_63-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712631" version="1" comment="kernel-livepatch-4_12_14-150_66-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712632" version="1" comment="kernel-default is &lt;4.12.14-150.66.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712633" version="1" comment="kernel-livepatch-4_12_14-197_83-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712634" version="1" comment="kernel-default is &lt;4.12.14-197.83.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712635" version="1" comment="kernel-default is ==5.3.18-24.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712636" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712637" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712638" version="1" comment="kernel-livepatch-5_3_18-22-default is &gt;=6-5.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712639" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829174" version="1" comment="qemu-img is &lt;1.5.3-175.el7_9.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829175" version="1" comment="qemu-kvm is &lt;1.5.3-175.el7_9.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829176" version="1" comment="qemu-kvm-common is &lt;1.5.3-175.el7_9.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829177" version="1" comment="qemu-kvm-tools is &lt;1.5.3-175.el7_9.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712640" version="1" comment="kgraft-patch-4_12_14-122_57-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712641" version="1" comment="kernel-default is &lt;4.12.14-122.57.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712642" version="1" comment="kernel-livepatch-4_12_14-197_78-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828870" version="1" comment="ImageMagick is &lt;6.9.10.68-5.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828871" version="1" comment="ImageMagick-c++ is &lt;6.9.10.68-5.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828872" version="1" comment="ImageMagick-c++-devel is &lt;6.9.10.68-5.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828873" version="1" comment="ImageMagick-devel is &lt;6.9.10.68-5.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828874" version="1" comment="ImageMagick-doc is &lt;6.9.10.68-5.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828875" version="1" comment="ImageMagick-perl is &lt;6.9.10.68-5.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881415" version="1" comment="httpd is &lt;2.4.6-99.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881416" version="1" comment="httpd-devel is &lt;2.4.6-99.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881417" version="1" comment="httpd-manual is &lt;2.4.6-99.el7_9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881418" version="1" comment="httpd-tools is &lt;2.4.6-99.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881419" version="1" comment="mod_ldap is &lt;2.4.6-99.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881420" version="1" comment="mod_proxy_html is &lt;2.4.6-99.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881421" version="1" comment="mod_session is &lt;2.4.6-99.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881422" version="1" comment="mod_ssl is &lt;2.4.6-99.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829178" version="1" comment="389-ds-base is &lt;1.3.10.2-12.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829179" version="1" comment="389-ds-base-devel is &lt;1.3.10.2-12.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829180" version="1" comment="389-ds-base-libs is &lt;1.3.10.2-12.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829181" version="1" comment="389-ds-base-snmp is &lt;1.3.10.2-12.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712643" version="1" comment="kgraft-patch-4_12_14-95_54-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712644" version="1" comment="kgraft-patch-4_12_14-95_57-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712645" version="1" comment="kgraft-patch-4_12_14-95_60-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712646" version="1" comment="kgraft-patch-4_12_14-95_65-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712647" version="1" comment="kgraft-patch-4_12_14-95_68-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712648" version="1" comment="kgraft-patch-4_12_14-95_71-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712649" version="1" comment="kgraft-patch-4_12_14-122_23-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712650" version="1" comment="kgraft-patch-4_12_14-122_26-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712651" version="1" comment="kgraft-patch-4_12_14-122_29-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712652" version="1" comment="kgraft-patch-4_12_14-122_32-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712653" version="1" comment="kgraft-patch-4_12_14-122_37-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712654" version="1" comment="kgraft-patch-4_12_14-122_41-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712655" version="1" comment="kgraft-patch-4_12_14-122_46-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712656" version="1" comment="kgraft-patch-4_12_14-122_51-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712657" version="1" comment="kgraft-patch-4_12_14-122_54-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712658" version="1" comment="kgraft-patch-4_12_14-122_57-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712659" version="1" comment="kgraft-patch-4_12_14-122_60-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712660" version="1" comment="kgraft-patch-4_12_14-122_63-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712661" version="1" comment="kernel-default is ==4.12.14-122.66.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712662" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712663" version="1" comment="kernel-default is &lt;4.12.14-122.66.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712664" version="1" comment="kernel-livepatch-4_12_14-197_45-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712665" version="1" comment="kernel-livepatch-4_12_14-197_48-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712666" version="1" comment="kernel-livepatch-4_12_14-197_51-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712667" version="1" comment="kernel-livepatch-4_12_14-197_56-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712668" version="1" comment="kernel-livepatch-4_12_14-197_61-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712669" version="1" comment="kernel-livepatch-4_12_14-197_64-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712670" version="1" comment="kernel-livepatch-4_12_14-197_67-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712671" version="1" comment="kernel-livepatch-4_12_14-197_72-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712672" version="1" comment="kernel-livepatch-4_12_14-197_75-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712673" version="1" comment="kernel-livepatch-4_12_14-197_78-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712674" version="1" comment="kernel-livepatch-4_12_14-197_83-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712675" version="1" comment="kernel-livepatch-4_12_14-197_86-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712676" version="1" comment="kernel-livepatch-5_3_18-22-default is &gt;=11-5.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712677" version="1" comment="kernel-livepatch-5_3_18-24_12-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712678" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712679" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712680" version="1" comment="kernel-livepatch-5_3_18-24_29-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712681" version="1" comment="kernel-livepatch-5_3_18-24_34-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712682" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712683" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712684" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712685" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712686" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698736" version="1" comment="kernel-default is ==5.3.18-24.53.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712687" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712688" version="1" comment="kernel-livepatch-5_3_18-24_9-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712689" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=2-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712690" version="1" comment="kgraft-patch-4_12_14-95_57-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712691" version="1" comment="kgraft-patch-4_12_14-95_60-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712692" version="1" comment="kgraft-patch-4_12_14-95_65-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712693" version="1" comment="kgraft-patch-4_12_14-95_68-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712694" version="1" comment="kgraft-patch-4_12_14-95_71-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712695" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712696" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712697" version="1" comment="kernel-default is &lt;4.12.14-95.77.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712698" version="1" comment="kgraft-patch-4_12_14-122_29-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712699" version="1" comment="kgraft-patch-4_12_14-122_32-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712700" version="1" comment="kgraft-patch-4_12_14-122_37-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712701" version="1" comment="kgraft-patch-4_12_14-122_41-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712702" version="1" comment="kgraft-patch-4_12_14-122_46-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712703" version="1" comment="kgraft-patch-4_12_14-122_51-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712704" version="1" comment="kgraft-patch-4_12_14-122_54-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712705" version="1" comment="kgraft-patch-4_12_14-122_57-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712706" version="1" comment="kgraft-patch-4_12_14-122_60-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712707" version="1" comment="kgraft-patch-4_12_14-122_63-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712708" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698703" version="1" comment="kernel-default is ==4.12.14-122.71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712709" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698705" version="1" comment="kernel-default is ==4.12.14-122.74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712710" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698707" version="1" comment="kernel-default is ==4.12.14-122.77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712711" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712712" version="1" comment="kernel-default is &lt;4.12.14-122.77.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712713" version="1" comment="kernel-livepatch-4_12_14-150_55-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712714" version="1" comment="kernel-livepatch-4_12_14-150_58-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712715" version="1" comment="kernel-livepatch-4_12_14-150_63-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712716" version="1" comment="kernel-livepatch-4_12_14-150_66-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712717" version="1" comment="kernel-livepatch-4_12_14-150_69-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712718" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712719" version="1" comment="kernel-default is &lt;4.12.14-150.72.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712720" version="1" comment="kernel-livepatch-4_12_14-197_48-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712721" version="1" comment="kernel-livepatch-4_12_14-197_51-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712722" version="1" comment="kernel-livepatch-4_12_14-197_56-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712723" version="1" comment="kernel-livepatch-4_12_14-197_61-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712724" version="1" comment="kernel-livepatch-4_12_14-197_64-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712725" version="1" comment="kernel-livepatch-4_12_14-197_67-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712726" version="1" comment="kernel-livepatch-4_12_14-197_72-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712727" version="1" comment="kernel-livepatch-4_12_14-197_75-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712728" version="1" comment="kernel-livepatch-4_12_14-197_78-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712729" version="1" comment="kernel-livepatch-4_12_14-197_83-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712730" version="1" comment="kernel-livepatch-4_12_14-197_86-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698729" version="1" comment="kernel-default is ==4.12.14-197.89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712731" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698731" version="1" comment="kernel-default is ==4.12.14-197.92.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712732" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712733" version="1" comment="kernel-default is &lt;4.12.14-197.92.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712734" version="1" comment="kernel-livepatch-5_3_18-22-default is &gt;=14-5.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712735" version="1" comment="kernel-livepatch-5_3_18-24_12-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712736" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712737" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712738" version="1" comment="kernel-livepatch-5_3_18-24_29-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712739" version="1" comment="kernel-livepatch-5_3_18-24_34-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712740" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712741" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712742" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712743" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712744" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698791" version="1" comment="kernel-default is ==5.3.18-24.61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712745" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698738" version="1" comment="kernel-default is ==5.3.18-24.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712746" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698740" version="1" comment="kernel-default is ==5.3.18-24.67.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712747" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712748" version="1" comment="kernel-livepatch-5_3_18-24_9-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829410" version="1" comment="bpftool is &lt;3.10.0-1160.49.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829411" version="1" comment="kernel is &lt;3.10.0-1160.49.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829412" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1160.49.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829413" version="1" comment="kernel-debug is &lt;3.10.0-1160.49.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829416" version="1" comment="kernel-doc is &lt;3.10.0-1160.49.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829417" version="1" comment="kernel-headers is &lt;3.10.0-1160.49.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829418" version="1" comment="kernel-tools is &lt;3.10.0-1160.49.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829419" version="1" comment="kernel-tools-libs is &lt;3.10.0-1160.49.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829421" version="1" comment="perf is &lt;3.10.0-1160.49.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829422" version="1" comment="python-perf is &lt;3.10.0-1160.49.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712749" version="1" comment="kernel-default is ==4.12.14-95.102.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712750" version="1" comment="kgraft-patch-4_12_14-95_102-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712751" version="1" comment="kernel-default is ==4.12.14-95.105.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712752" version="1" comment="kgraft-patch-4_12_14-95_105-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712753" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=13-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701405" version="1" comment="kernel-default is ==4.12.14-95.88.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712754" version="1" comment="kgraft-patch-4_12_14-95_88-default is &gt;=9-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701143" version="1" comment="kernel-default is ==4.12.14-95.93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712755" version="1" comment="kgraft-patch-4_12_14-95_93-default is &gt;=8-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701407" version="1" comment="kernel-default is ==4.12.14-95.96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712756" version="1" comment="kgraft-patch-4_12_14-95_96-default is &gt;=7-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701145" version="1" comment="kernel-default is ==4.12.14-95.99.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712757" version="1" comment="kgraft-patch-4_12_14-95_99-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701147" version="1" comment="kernel-default is &lt;4.12.14-95.99.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698699" version="1" comment="kernel-default is ==4.12.14-122.103.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712758" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=14-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698701" version="1" comment="kernel-default is ==4.12.14-122.106.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712759" version="1" comment="kgraft-patch-4_12_14-122_106-default is &gt;=12-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701411" version="1" comment="kernel-default is ==4.12.14-122.110.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712760" version="1" comment="kgraft-patch-4_12_14-122_110-default is &gt;=10-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701413" version="1" comment="kernel-default is ==4.12.14-122.113.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712761" version="1" comment="kgraft-patch-4_12_14-122_113-default is &gt;=9-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701148" version="1" comment="kernel-default is ==4.12.14-122.116.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712762" version="1" comment="kgraft-patch-4_12_14-122_116-default is &gt;=7-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701415" version="1" comment="kernel-default is ==4.12.14-122.121.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712763" version="1" comment="kgraft-patch-4_12_14-122_121-default is &gt;=5-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701150" version="1" comment="kernel-default is ==4.12.14-122.124.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712764" version="1" comment="kgraft-patch-4_12_14-122_124-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712765" version="1" comment="kernel-default is ==4.12.14-122.127.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712766" version="1" comment="kgraft-patch-4_12_14-122_127-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712767" version="1" comment="kernel-default is ==4.12.14-122.130.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712768" version="1" comment="kgraft-patch-4_12_14-122_130-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698713" version="1" comment="kernel-default is ==4.12.14-122.88.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712769" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=16-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698715" version="1" comment="kernel-default is ==4.12.14-122.91.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712770" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=16-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698717" version="1" comment="kernel-default is ==4.12.14-122.98.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712771" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=14-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698719" version="1" comment="kernel-default is &lt;4.12.14-122.98.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701421" version="1" comment="kernel-default is ==4.12.14-150000.150.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712772" version="1" comment="kernel-livepatch-4_12_14-150000_150_89-default is &gt;=7-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701260" version="1" comment="kernel-default is ==4.12.14-150000.150.92.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712773" version="1" comment="kernel-livepatch-4_12_14-150000_150_92-default is &gt;=4-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712774" version="1" comment="kernel-default is ==4.12.14-150000.150.95.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712775" version="1" comment="kernel-livepatch-4_12_14-150000_150_95-default is &gt;=2-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712776" version="1" comment="kernel-default is ==4.12.14-150000.150.98.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712777" version="1" comment="kernel-livepatch-4_12_14-150000_150_98-default is &gt;=2-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712778" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=13-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701262" version="1" comment="kernel-default is ==4.12.14-150.83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712779" version="1" comment="kernel-livepatch-4_12_14-150_83-default is &gt;=9-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701425" version="1" comment="kernel-default is ==4.12.14-150.86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712780" version="1" comment="kernel-livepatch-4_12_14-150_86-default is &gt;=8-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701427" version="1" comment="kernel-default is &lt;4.12.14-150.86.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701265" version="1" comment="kernel-default is ==4.12.14-150100.197.111.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712781" version="1" comment="kernel-livepatch-4_12_14-150100_197_111-default is &gt;=7-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701154" version="1" comment="kernel-default is ==4.12.14-150100.197.114.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712782" version="1" comment="kernel-livepatch-4_12_14-150100_197_114-default is &gt;=4-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712783" version="1" comment="kernel-default is ==4.12.14-150100.197.117.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712784" version="1" comment="kernel-livepatch-4_12_14-150100_197_117-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712785" version="1" comment="kernel-default is ==4.12.14-150100.197.120.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712786" version="1" comment="kernel-livepatch-4_12_14-150100_197_120-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698727" version="1" comment="kernel-default is ==4.12.14-197.102.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712787" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=13-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701428" version="1" comment="kernel-default is ==4.12.14-197.105.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712788" version="1" comment="kernel-livepatch-4_12_14-197_105-default is &gt;=9-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701268" version="1" comment="kernel-default is ==4.12.14-197.108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712789" version="1" comment="kernel-livepatch-4_12_14-197_108-default is &gt;=8-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701270" version="1" comment="kernel-default is &lt;4.12.14-197.108.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698822" version="1" comment="kernel-default is ==5.3.18-150200.24.112.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712790" version="1" comment="kernel-livepatch-5_3_18-150200_24_112-default is &gt;=7-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698824" version="1" comment="kernel-default is ==5.3.18-150200.24.115.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712791" version="1" comment="kernel-livepatch-5_3_18-150200_24_115-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709908" version="1" comment="kernel-default is ==5.3.18-150200.24.126.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709909" version="1" comment="kernel-livepatch-5_3_18-150200_24_126-default is &gt;=2-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698786" version="1" comment="kernel-default is ==5.3.18-24.102.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712792" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=12-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698788" version="1" comment="kernel-default is ==5.3.18-24.107.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712793" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=11-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698748" version="1" comment="kernel-default is ==5.3.18-24.83.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712794" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=16-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698750" version="1" comment="kernel-default is ==5.3.18-24.86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712795" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=16-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698752" version="1" comment="kernel-default is ==5.3.18-24.93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712796" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=15-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698754" version="1" comment="kernel-default is ==5.3.18-24.96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712797" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=14-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698756" version="1" comment="kernel-default is ==5.3.18-24.99.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712798" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=13-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698758" version="1" comment="kernel-default is &lt;5.3.18-24.99.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698759" version="1" comment="kernel-default is ==5.3.18-150300.59.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712799" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698761" version="1" comment="kernel-default is ==5.3.18-150300.59.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712800" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698805" version="1" comment="kernel-default is ==5.3.18-150300.59.49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712801" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698807" version="1" comment="kernel-default is ==5.3.18-150300.59.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712802" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698809" version="1" comment="kernel-default is ==5.3.18-150300.59.60.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712803" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698842" version="1" comment="kernel-default is ==5.3.18-150300.59.63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712804" version="1" comment="kernel-livepatch-5_3_18-150300_59_63-default is &gt;=7-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698844" version="1" comment="kernel-default is ==5.3.18-150300.59.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712805" version="1" comment="kernel-livepatch-5_3_18-150300_59_68-default is &gt;=6-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698846" version="1" comment="kernel-default is ==5.3.18-150300.59.71.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712806" version="1" comment="kernel-livepatch-5_3_18-150300_59_71-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701403" version="1" comment="kernel-default is ==5.3.18-150300.59.76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712807" version="1" comment="kernel-livepatch-5_3_18-150300_59_76-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706111" version="1" comment="kernel-default is ==5.3.18-150300.59.87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712808" version="1" comment="kernel-livepatch-5_3_18-150300_59_87-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698773" version="1" comment="kernel-default is ==5.3.18-59.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712809" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698775" version="1" comment="kernel-default is ==5.3.18-59.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712810" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698777" version="1" comment="kernel-default is ==5.3.18-59.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712811" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=15-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698779" version="1" comment="kernel-default is ==5.3.18-59.37.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712812" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=14-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698781" version="1" comment="kernel-default is ==5.3.18-59.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712813" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=14-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701452" version="1" comment="kernel-default is &lt;5.3.18-59.40.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698874" version="1" comment="kernel-default is ==5.14.21-150400.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712814" version="1" comment="kernel-livepatch-5_14_21-150400_22-default is &gt;=5-150400.4.12.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712815" version="1" comment="kernel-default is ==5.14.21-150400.24.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712816" version="1" comment="kernel-livepatch-5_14_21-150400_24_11-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712817" version="1" comment="kernel-default is ==5.14.21-150400.24.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712818" version="1" comment="kernel-livepatch-5_14_21-150400_24_18-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712819" version="1" comment="kernel-default is &lt;5.14.21-150400.24.18.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725853" version="1" comment="kernel-livepatch-4_12_14-150000_150_89-default is &gt;=9-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725854" version="1" comment="kernel-livepatch-4_12_14-150000_150_92-default is &gt;=6-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725497" version="1" comment="kernel-livepatch-4_12_14-150000_150_95-default is &gt;=4-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725855" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=15-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725856" version="1" comment="kernel-livepatch-4_12_14-150_83-default is &gt;=11-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725857" version="1" comment="kernel-livepatch-4_12_14-150_86-default is &gt;=10-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858640" version="1" comment="bpftool is &lt;3.10.0-1160.118.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858641" version="1" comment="kernel is &lt;3.10.0-1160.118.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858642" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1160.118.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858643" version="1" comment="kernel-debug is &lt;3.10.0-1160.118.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858646" version="1" comment="kernel-doc is &lt;3.10.0-1160.118.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858647" version="1" comment="kernel-headers is &lt;3.10.0-1160.118.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858648" version="1" comment="kernel-tools is &lt;3.10.0-1160.118.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858649" version="1" comment="kernel-tools-libs is &lt;3.10.0-1160.118.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858651" version="1" comment="perf is &lt;3.10.0-1160.118.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858652" version="1" comment="python-perf is &lt;3.10.0-1160.118.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712820" version="1" comment="kernel-default is &lt;4.12.14-95.80.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712821" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712822" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712823" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712824" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698709" version="1" comment="kernel-default is ==4.12.14-122.80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712825" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698711" version="1" comment="kernel-default is ==4.12.14-122.83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712826" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712827" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712828" version="1" comment="kernel-default is &lt;4.12.14-122.88.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712829" version="1" comment="kernel-default is &lt;4.12.14-150.75.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712830" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712831" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698733" version="1" comment="kernel-default is ==4.12.14-197.99.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712832" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698735" version="1" comment="kernel-default is &lt;4.12.14-197.99.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712833" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712834" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712835" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712836" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698742" version="1" comment="kernel-default is ==5.3.18-24.70.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712837" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698744" version="1" comment="kernel-default is ==5.3.18-24.75.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712838" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698746" version="1" comment="kernel-default is ==5.3.18-24.78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712839" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712840" version="1" comment="kernel-default is &lt;5.3.18-24.78.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698765" version="1" comment="kernel-default is ==5.3.18-59.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712841" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698767" version="1" comment="kernel-default is ==5.3.18-59.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712842" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698769" version="1" comment="kernel-default is ==5.3.18-59.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712843" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=7-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698771" version="1" comment="kernel-default is ==5.3.18-59.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712844" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=6-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698783" version="1" comment="kernel-default is ==5.3.18-59.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712845" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698785" version="1" comment="kernel-default is &lt;5.3.18-59.5.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826967" version="1" comment="bmc-snmp-proxy is &lt;1.8.18-9.el7_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826968" version="1" comment="exchange-bmc-os-info is &lt;1.8.18-9.el7_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826969" version="1" comment="ipmitool is &lt;1.8.18-9.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827931" version="1" comment="emacs-git is &lt;1.8.3.1-22.el7_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827932" version="1" comment="emacs-git-el is &lt;1.8.3.1-22.el7_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827933" version="1" comment="git is &lt;1.8.3.1-22.el7_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827934" version="1" comment="git-all is &lt;1.8.3.1-22.el7_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827935" version="1" comment="git-bzr is &lt;1.8.3.1-22.el7_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827936" version="1" comment="git-cvs is &lt;1.8.3.1-22.el7_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827937" version="1" comment="git-daemon is &lt;1.8.3.1-22.el7_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827938" version="1" comment="git-email is &lt;1.8.3.1-22.el7_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827939" version="1" comment="git-gnome-keyring is &lt;1.8.3.1-22.el7_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827940" version="1" comment="git-gui is &lt;1.8.3.1-22.el7_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827941" version="1" comment="git-hg is &lt;1.8.3.1-22.el7_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827942" version="1" comment="git-instaweb is &lt;1.8.3.1-22.el7_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827943" version="1" comment="git-p4 is &lt;1.8.3.1-22.el7_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827944" version="1" comment="git-svn is &lt;1.8.3.1-22.el7_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827945" version="1" comment="gitk is &lt;1.8.3.1-22.el7_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827946" version="1" comment="gitweb is &lt;1.8.3.1-22.el7_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827947" version="1" comment="perl-Git is &lt;1.8.3.1-22.el7_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827948" version="1" comment="perl-Git-SVN is &lt;1.8.3.1-22.el7_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828240" version="1" comment="python-pillow is &lt;2.0.0-21.gitd1c6db8.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828241" version="1" comment="python-pillow-devel is &lt;2.0.0-21.gitd1c6db8.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828242" version="1" comment="python-pillow-doc is &lt;2.0.0-21.gitd1c6db8.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828243" version="1" comment="python-pillow-qt is &lt;2.0.0-21.gitd1c6db8.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828244" version="1" comment="python-pillow-sane is &lt;2.0.0-21.gitd1c6db8.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828245" version="1" comment="python-pillow-tk is &lt;2.0.0-21.gitd1c6db8.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828317" version="1" comment="fontforge is &lt;20120731b-13.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828318" version="1" comment="fontforge-devel is &lt;20120731b-13.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826918" version="1" comment="thunderbird is &lt;68.5.0-1.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826903" version="1" comment="firefox is &lt;68.5.0-2.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827913" version="1" comment="firefox is &lt;68.6.1-1.el7_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827915" version="1" comment="thunderbird is &lt;68.7.0-1.el7_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827914" version="1" comment="firefox is &lt;68.7.0-2.el7_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826871" version="1" comment="openjpeg2 is &lt;2.3.1-2.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826872" version="1" comment="openjpeg2-devel is &lt;2.3.1-2.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826873" version="1" comment="openjpeg2-devel-docs is &lt;2.3.1-2.el7_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826874" version="1" comment="openjpeg2-tools is &lt;2.3.1-2.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827792" version="1" comment="qemu-img is &lt;1.5.3-173.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827793" version="1" comment="qemu-kvm is &lt;1.5.3-173.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827794" version="1" comment="qemu-kvm-common is &lt;1.5.3-173.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827795" version="1" comment="qemu-kvm-tools is &lt;1.5.3-173.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826913" version="1" comment="openjpeg2 is &lt;2.3.1-3.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826914" version="1" comment="openjpeg2-devel is &lt;2.3.1-3.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826915" version="1" comment="openjpeg2-devel-docs is &lt;2.3.1-3.el7_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826916" version="1" comment="openjpeg2-tools is &lt;2.3.1-3.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828622" version="1" comment="curl is &lt;7.29.0-59.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828623" version="1" comment="libcurl is &lt;7.29.0-59.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828624" version="1" comment="libcurl-devel is &lt;7.29.0-59.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826925" version="1" comment="ppp is &lt;2.4.5-34.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826926" version="1" comment="ppp-devel is &lt;2.4.5-34.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827907" version="1" comment="qemu-img is &lt;1.5.3-173.el7_8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827908" version="1" comment="qemu-kvm is &lt;1.5.3-173.el7_8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827909" version="1" comment="qemu-kvm-common is &lt;1.5.3-173.el7_8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827910" version="1" comment="qemu-kvm-tools is &lt;1.5.3-173.el7_8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827996" version="1" comment="bind is &lt;9.11.4-16.P2.el7_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827997" version="1" comment="bind-chroot is &lt;9.11.4-16.P2.el7_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827998" version="1" comment="bind-devel is &lt;9.11.4-16.P2.el7_8.6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827999" version="1" comment="bind-export-devel is &lt;9.11.4-16.P2.el7_8.6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828000" version="1" comment="bind-export-libs is &lt;9.11.4-16.P2.el7_8.6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828001" version="1" comment="bind-libs is &lt;9.11.4-16.P2.el7_8.6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828002" version="1" comment="bind-libs-lite is &lt;9.11.4-16.P2.el7_8.6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828003" version="1" comment="bind-license is &lt;9.11.4-16.P2.el7_8.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828004" version="1" comment="bind-lite-devel is &lt;9.11.4-16.P2.el7_8.6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828005" version="1" comment="bind-pkcs11 is &lt;9.11.4-16.P2.el7_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828006" version="1" comment="bind-pkcs11-devel is &lt;9.11.4-16.P2.el7_8.6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828007" version="1" comment="bind-pkcs11-libs is &lt;9.11.4-16.P2.el7_8.6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828008" version="1" comment="bind-pkcs11-utils is &lt;9.11.4-16.P2.el7_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828009" version="1" comment="bind-sdb is &lt;9.11.4-16.P2.el7_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828010" version="1" comment="bind-sdb-chroot is &lt;9.11.4-16.P2.el7_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828011" version="1" comment="bind-utils is &lt;9.11.4-16.P2.el7_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828683" version="1" comment="bind is &lt;9.11.4-26.P2.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828684" version="1" comment="bind-chroot is &lt;9.11.4-26.P2.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828685" version="1" comment="bind-devel is &lt;9.11.4-26.P2.el7_9.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828686" version="1" comment="bind-export-devel is &lt;9.11.4-26.P2.el7_9.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828687" version="1" comment="bind-export-libs is &lt;9.11.4-26.P2.el7_9.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828688" version="1" comment="bind-libs is &lt;9.11.4-26.P2.el7_9.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828689" version="1" comment="bind-libs-lite is &lt;9.11.4-26.P2.el7_9.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828690" version="1" comment="bind-license is &lt;9.11.4-26.P2.el7_9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828691" version="1" comment="bind-lite-devel is &lt;9.11.4-26.P2.el7_9.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828692" version="1" comment="bind-pkcs11 is &lt;9.11.4-26.P2.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828693" version="1" comment="bind-pkcs11-devel is &lt;9.11.4-26.P2.el7_9.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828694" version="1" comment="bind-pkcs11-libs is &lt;9.11.4-26.P2.el7_9.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828695" version="1" comment="bind-pkcs11-utils is &lt;9.11.4-26.P2.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828696" version="1" comment="bind-sdb is &lt;9.11.4-26.P2.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828697" version="1" comment="bind-sdb-chroot is &lt;9.11.4-26.P2.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828698" version="1" comment="bind-utils is &lt;9.11.4-26.P2.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828952" version="1" comment="bind is &lt;9.11.4-26.P2.el7_9.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828953" version="1" comment="bind-chroot is &lt;9.11.4-26.P2.el7_9.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828954" version="1" comment="bind-devel is &lt;9.11.4-26.P2.el7_9.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828955" version="1" comment="bind-export-devel is &lt;9.11.4-26.P2.el7_9.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828956" version="1" comment="bind-export-libs is &lt;9.11.4-26.P2.el7_9.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828957" version="1" comment="bind-libs is &lt;9.11.4-26.P2.el7_9.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828958" version="1" comment="bind-libs-lite is &lt;9.11.4-26.P2.el7_9.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828959" version="1" comment="bind-license is &lt;9.11.4-26.P2.el7_9.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828960" version="1" comment="bind-lite-devel is &lt;9.11.4-26.P2.el7_9.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828961" version="1" comment="bind-pkcs11 is &lt;9.11.4-26.P2.el7_9.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828962" version="1" comment="bind-pkcs11-devel is &lt;9.11.4-26.P2.el7_9.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828963" version="1" comment="bind-pkcs11-libs is &lt;9.11.4-26.P2.el7_9.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828964" version="1" comment="bind-pkcs11-utils is &lt;9.11.4-26.P2.el7_9.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828965" version="1" comment="bind-sdb is &lt;9.11.4-26.P2.el7_9.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828966" version="1" comment="bind-sdb-chroot is &lt;9.11.4-26.P2.el7_9.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828967" version="1" comment="bind-utils is &lt;9.11.4-26.P2.el7_9.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712846" version="1" comment="kernel-default is &lt;4.12.14-197.64.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828489" version="1" comment="okular is &lt;4.10.5-9.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828490" version="1" comment="okular-devel is &lt;4.10.5-9.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828491" version="1" comment="okular-libs is &lt;4.10.5-9.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828492" version="1" comment="okular-part is &lt;4.10.5-9.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828021" version="1" comment="tomcat is &lt;7.0.76-12.el7_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828022" version="1" comment="tomcat-admin-webapps is &lt;7.0.76-12.el7_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828023" version="1" comment="tomcat-docs-webapp is &lt;7.0.76-12.el7_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828024" version="1" comment="tomcat-el-2.2-api is &lt;7.0.76-12.el7_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828025" version="1" comment="tomcat-javadoc is &lt;7.0.76-12.el7_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828026" version="1" comment="tomcat-jsp-2.2-api is &lt;7.0.76-12.el7_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828027" version="1" comment="tomcat-jsvc is &lt;7.0.76-12.el7_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828028" version="1" comment="tomcat-lib is &lt;7.0.76-12.el7_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828029" version="1" comment="tomcat-servlet-3.0-api is &lt;7.0.76-12.el7_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828030" version="1" comment="tomcat-webapps is &lt;7.0.76-12.el7_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712847" version="1" comment="kgraft-patch-4_12_14-95_57-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712848" version="1" comment="kgraft-patch-4_12_14-95_60-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712849" version="1" comment="kgraft-patch-4_12_14-95_65-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712850" version="1" comment="kgraft-patch-4_12_14-95_68-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712851" version="1" comment="kgraft-patch-4_12_14-95_71-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712852" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712853" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712854" version="1" comment="kgraft-patch-4_12_14-122_29-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712855" version="1" comment="kgraft-patch-4_12_14-122_32-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712856" version="1" comment="kgraft-patch-4_12_14-122_37-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712857" version="1" comment="kgraft-patch-4_12_14-122_41-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712858" version="1" comment="kgraft-patch-4_12_14-122_46-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712859" version="1" comment="kgraft-patch-4_12_14-122_51-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712860" version="1" comment="kgraft-patch-4_12_14-122_54-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712861" version="1" comment="kgraft-patch-4_12_14-122_57-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712862" version="1" comment="kgraft-patch-4_12_14-122_60-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712863" version="1" comment="kgraft-patch-4_12_14-122_63-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712864" version="1" comment="kernel-livepatch-4_12_14-150_55-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712865" version="1" comment="kernel-livepatch-4_12_14-150_58-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712866" version="1" comment="kernel-livepatch-4_12_14-150_63-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712867" version="1" comment="kernel-livepatch-4_12_14-150_66-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712868" version="1" comment="kernel-livepatch-4_12_14-150_69-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712869" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712870" version="1" comment="kernel-livepatch-4_12_14-197_48-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712871" version="1" comment="kernel-livepatch-4_12_14-197_51-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712872" version="1" comment="kernel-livepatch-4_12_14-197_56-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712873" version="1" comment="kernel-livepatch-4_12_14-197_61-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712874" version="1" comment="kernel-livepatch-4_12_14-197_64-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712875" version="1" comment="kernel-livepatch-4_12_14-197_67-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712876" version="1" comment="kernel-livepatch-4_12_14-197_72-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712877" version="1" comment="kernel-livepatch-4_12_14-197_75-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712878" version="1" comment="kernel-livepatch-4_12_14-197_78-default is &gt;=8-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712879" version="1" comment="kernel-livepatch-4_12_14-197_83-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712880" version="1" comment="kernel-livepatch-4_12_14-197_86-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712881" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712882" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712883" version="1" comment="kernel-livepatch-5_3_18-22-default is &gt;=13-5.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712884" version="1" comment="kernel-livepatch-5_3_18-24_12-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712885" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712886" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712887" version="1" comment="kernel-livepatch-5_3_18-24_29-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712888" version="1" comment="kernel-livepatch-5_3_18-24_34-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712889" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712890" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712891" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712892" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712893" version="1" comment="kernel-livepatch-5_3_18-24_9-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712894" version="1" comment="kernel-default is &lt;4.12.14-122.32.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712895" version="1" comment="kgraft-patch-4_12_14-95_71-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712896" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712897" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712898" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712899" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712900" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712901" version="1" comment="kgraft-patch-4_12_14-122_63-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712902" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712903" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712904" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712905" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712906" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712907" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712908" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712909" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712910" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712911" version="1" comment="kernel-livepatch-4_12_14-150_69-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712912" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712913" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712914" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712915" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712916" version="1" comment="kernel-livepatch-4_12_14-197_86-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712917" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712918" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712919" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712920" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712921" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=2-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712922" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712923" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712924" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712925" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712926" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712927" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712928" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712929" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712930" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712931" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712932" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712933" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712934" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712935" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712936" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712937" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712938" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712939" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=12-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712940" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712941" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712942" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712943" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712944" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712945" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712946" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712947" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712948" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712949" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712950" version="1" comment="kgraft-patch-4_12_14-95_65-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712951" version="1" comment="kgraft-patch-4_12_14-95_68-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712952" version="1" comment="kgraft-patch-4_12_14-95_71-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712953" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712954" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712955" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712956" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712957" version="1" comment="kgraft-patch-4_12_14-122_51-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712958" version="1" comment="kgraft-patch-4_12_14-122_54-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712959" version="1" comment="kgraft-patch-4_12_14-122_57-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712960" version="1" comment="kgraft-patch-4_12_14-122_60-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712961" version="1" comment="kgraft-patch-4_12_14-122_63-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712962" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712963" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712964" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712965" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712966" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712967" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712968" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712969" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712970" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712971" version="1" comment="kernel-livepatch-4_12_14-150_63-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712972" version="1" comment="kernel-livepatch-4_12_14-150_66-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712973" version="1" comment="kernel-livepatch-4_12_14-150_69-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712974" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712975" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712976" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712977" version="1" comment="kernel-livepatch-4_12_14-197_67-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712978" version="1" comment="kernel-livepatch-4_12_14-197_72-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712979" version="1" comment="kernel-livepatch-4_12_14-197_75-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712980" version="1" comment="kernel-livepatch-4_12_14-197_78-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712981" version="1" comment="kernel-livepatch-4_12_14-197_83-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712982" version="1" comment="kernel-livepatch-4_12_14-197_86-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712983" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712984" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712985" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712986" version="1" comment="kgraft-patch-4_12_14-95_68-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712987" version="1" comment="kgraft-patch-4_12_14-95_71-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712988" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712989" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712990" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712991" version="1" comment="kgraft-patch-4_12_14-122_54-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712992" version="1" comment="kgraft-patch-4_12_14-122_57-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712993" version="1" comment="kgraft-patch-4_12_14-122_60-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712994" version="1" comment="kgraft-patch-4_12_14-122_63-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712995" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712996" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712997" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712998" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712999" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713000" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713001" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713002" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713003" version="1" comment="kernel-livepatch-4_12_14-150_66-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713004" version="1" comment="kernel-livepatch-4_12_14-150_69-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713005" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713006" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713007" version="1" comment="kernel-livepatch-4_12_14-197_75-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713008" version="1" comment="kernel-livepatch-4_12_14-197_78-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713009" version="1" comment="kernel-livepatch-4_12_14-197_83-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713010" version="1" comment="kernel-livepatch-4_12_14-197_86-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713011" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713012" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713013" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713014" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713015" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713016" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713017" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713018" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713019" version="1" comment="kernel-default is &lt;5.3.18-24.53.4.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713020" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=9-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829127" version="1" comment="ctdb is &lt;4.10.16-15.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829128" version="1" comment="ctdb-tests is &lt;4.10.16-15.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829129" version="1" comment="libsmbclient is &lt;4.10.16-15.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829130" version="1" comment="libsmbclient-devel is &lt;4.10.16-15.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829131" version="1" comment="libwbclient is &lt;4.10.16-15.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829132" version="1" comment="libwbclient-devel is &lt;4.10.16-15.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829133" version="1" comment="samba is &lt;4.10.16-15.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829134" version="1" comment="samba-client is &lt;4.10.16-15.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829135" version="1" comment="samba-client-libs is &lt;4.10.16-15.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829136" version="1" comment="samba-common is &lt;4.10.16-15.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829137" version="1" comment="samba-common-libs is &lt;4.10.16-15.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829138" version="1" comment="samba-common-tools is &lt;4.10.16-15.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829139" version="1" comment="samba-dc is &lt;4.10.16-15.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829140" version="1" comment="samba-dc-libs is &lt;4.10.16-15.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829141" version="1" comment="samba-devel is &lt;4.10.16-15.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829142" version="1" comment="samba-krb5-printing is &lt;4.10.16-15.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829143" version="1" comment="samba-libs is &lt;4.10.16-15.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829144" version="1" comment="samba-pidl is &lt;4.10.16-15.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829145" version="1" comment="samba-python is &lt;4.10.16-15.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829146" version="1" comment="samba-python-test is &lt;4.10.16-15.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829147" version="1" comment="samba-test is &lt;4.10.16-15.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829148" version="1" comment="samba-test-libs is &lt;4.10.16-15.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829149" version="1" comment="samba-vfs-glusterfs is &lt;4.10.16-15.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829150" version="1" comment="samba-winbind is &lt;4.10.16-15.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829151" version="1" comment="samba-winbind-clients is &lt;4.10.16-15.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829152" version="1" comment="samba-winbind-krb5-locator is &lt;4.10.16-15.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829153" version="1" comment="samba-winbind-modules is &lt;4.10.16-15.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829432" version="1" comment="rpm is &lt;4.11.3-48.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829433" version="1" comment="rpm-apidocs is &lt;4.11.3-48.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829434" version="1" comment="rpm-build is &lt;4.11.3-48.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829435" version="1" comment="rpm-build-libs is &lt;4.11.3-48.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829436" version="1" comment="rpm-cron is &lt;4.11.3-48.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829437" version="1" comment="rpm-devel is &lt;4.11.3-48.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829438" version="1" comment="rpm-libs is &lt;4.11.3-48.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829439" version="1" comment="rpm-plugin-systemd-inhibit is &lt;4.11.3-48.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829440" version="1" comment="rpm-python is &lt;4.11.3-48.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829441" version="1" comment="rpm-sign is &lt;4.11.3-48.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829034" version="1" comment="ldb-tools is &lt;1.5.4-2.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829035" version="1" comment="libldb is &lt;1.5.4-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829036" version="1" comment="libldb-devel is &lt;1.5.4-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829037" version="1" comment="pyldb is &lt;1.5.4-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829038" version="1" comment="pyldb-devel is &lt;1.5.4-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829042" version="1" comment="nettle is &lt;2.7.1-9.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829043" version="1" comment="nettle-devel is &lt;2.7.1-9.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713021" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713022" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713023" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713024" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713025" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713026" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713027" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713028" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713029" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713030" version="1" comment="kernel-default is &lt;5.3.18-24.93.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713031" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713032" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713033" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713034" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713035" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713036" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713037" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713038" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828945" version="1" comment="flatpak is &lt;1.0.9-10.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828946" version="1" comment="flatpak-builder is &lt;1.0.0-10.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828947" version="1" comment="flatpak-devel is &lt;1.0.9-10.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828948" version="1" comment="flatpak-libs is &lt;1.0.9-10.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829063" version="1" comment="xstream is &lt;1.3.1-13.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829064" version="1" comment="xstream-javadoc is &lt;1.3.1-13.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829017" version="1" comment="flatpak is &lt;1.0.9-11.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829018" version="1" comment="flatpak-builder is &lt;1.0.0-11.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829019" version="1" comment="flatpak-devel is &lt;1.0.9-11.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829020" version="1" comment="flatpak-libs is &lt;1.0.9-11.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829054" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.292.b10-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829055" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.292.b10-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829056" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.292.b10-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829057" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.292.b10-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829058" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.292.b10-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829059" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.292.b10-1.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829060" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.292.b10-1.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829061" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.292.b10-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829045" version="1" comment="java-11-openjdk is &lt;11.0.11.0.9-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829046" version="1" comment="java-11-openjdk-demo is &lt;11.0.11.0.9-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829047" version="1" comment="java-11-openjdk-devel is &lt;11.0.11.0.9-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829048" version="1" comment="java-11-openjdk-headless is &lt;11.0.11.0.9-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829049" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.11.0.9-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829050" version="1" comment="java-11-openjdk-javadoc-zip is &lt;11.0.11.0.9-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829051" version="1" comment="java-11-openjdk-jmods is &lt;11.0.11.0.9-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829052" version="1" comment="java-11-openjdk-src is &lt;11.0.11.0.9-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829053" version="1" comment="java-11-openjdk-static-libs is &lt;11.0.11.0.9-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713041" version="1" comment="kgraft-patch-4_12_14-95_60-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713042" version="1" comment="kgraft-patch-4_12_14-95_65-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713043" version="1" comment="kgraft-patch-4_12_14-95_68-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713044" version="1" comment="kgraft-patch-4_12_14-95_71-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713045" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713046" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713047" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713048" version="1" comment="kgraft-patch-4_12_14-122_32-default is &gt;=16-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713049" version="1" comment="kgraft-patch-4_12_14-122_37-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713050" version="1" comment="kgraft-patch-4_12_14-122_41-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713051" version="1" comment="kgraft-patch-4_12_14-122_46-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713052" version="1" comment="kgraft-patch-4_12_14-122_51-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713053" version="1" comment="kgraft-patch-4_12_14-122_54-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713054" version="1" comment="kgraft-patch-4_12_14-122_57-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713055" version="1" comment="kgraft-patch-4_12_14-122_60-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713056" version="1" comment="kgraft-patch-4_12_14-122_63-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713057" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713058" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713059" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713060" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713061" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713062" version="1" comment="kernel-default is &lt;4.12.14-122.80.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713063" version="1" comment="kernel-livepatch-4_12_14-150_58-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713064" version="1" comment="kernel-livepatch-4_12_14-150_63-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713065" version="1" comment="kernel-livepatch-4_12_14-150_66-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713066" version="1" comment="kernel-livepatch-4_12_14-150_69-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713067" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713068" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713069" version="1" comment="kernel-livepatch-4_12_14-197_51-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713070" version="1" comment="kernel-livepatch-4_12_14-197_56-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713071" version="1" comment="kernel-livepatch-4_12_14-197_61-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713072" version="1" comment="kernel-livepatch-4_12_14-197_64-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713073" version="1" comment="kernel-livepatch-4_12_14-197_67-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713074" version="1" comment="kernel-livepatch-4_12_14-197_72-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713075" version="1" comment="kernel-livepatch-4_12_14-197_75-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713076" version="1" comment="kernel-livepatch-4_12_14-197_78-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713077" version="1" comment="kernel-livepatch-4_12_14-197_83-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713078" version="1" comment="kernel-livepatch-4_12_14-197_86-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713079" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713080" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713081" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713082" version="1" comment="kernel-livepatch-5_3_18-24_12-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713083" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713084" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713085" version="1" comment="kernel-livepatch-5_3_18-24_29-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713086" version="1" comment="kernel-livepatch-5_3_18-24_34-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713087" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713088" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713089" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713090" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713091" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713092" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713093" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713094" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713095" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713096" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713097" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713098" version="1" comment="kernel-default is &lt;5.3.18-24.75.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713099" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=5-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713100" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713101" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713102" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713103" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829348" version="1" comment="bpftool is &lt;3.10.0-1160.45.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829349" version="1" comment="kernel is &lt;3.10.0-1160.45.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829350" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1160.45.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829351" version="1" comment="kernel-debug is &lt;3.10.0-1160.45.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829354" version="1" comment="kernel-doc is &lt;3.10.0-1160.45.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829355" version="1" comment="kernel-headers is &lt;3.10.0-1160.45.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829356" version="1" comment="kernel-tools is &lt;3.10.0-1160.45.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829357" version="1" comment="kernel-tools-libs is &lt;3.10.0-1160.45.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829359" version="1" comment="perf is &lt;3.10.0-1160.45.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829360" version="1" comment="python-perf is &lt;3.10.0-1160.45.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713104" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713105" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=4-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713106" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713107" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713108" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713109" version="1" comment="kernel-default is &lt;4.12.14-95.74.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713110" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713111" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713112" version="1" comment="kernel-default is &lt;4.12.14-122.71.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713113" version="1" comment="kernel-default is &lt;4.12.14-197.89.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713114" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713115" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713116" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713117" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=3-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713118" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713119" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713120" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713121" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713122" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713123" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713124" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713125" version="1" comment="kernel-default is &lt;5.3.18-24.64.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829230" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.302.b08-0.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829231" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.302.b08-0.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829232" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.302.b08-0.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829233" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.302.b08-0.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829234" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.302.b08-0.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829235" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.302.b08-0.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829236" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.302.b08-0.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829237" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.302.b08-0.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829221" version="1" comment="java-11-openjdk is &lt;11.0.12.0.7-0.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829222" version="1" comment="java-11-openjdk-demo is &lt;11.0.12.0.7-0.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829223" version="1" comment="java-11-openjdk-devel is &lt;11.0.12.0.7-0.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829224" version="1" comment="java-11-openjdk-headless is &lt;11.0.12.0.7-0.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829225" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.12.0.7-0.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829226" version="1" comment="java-11-openjdk-javadoc-zip is &lt;11.0.12.0.7-0.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829227" version="1" comment="java-11-openjdk-jmods is &lt;11.0.12.0.7-0.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829228" version="1" comment="java-11-openjdk-src is &lt;11.0.12.0.7-0.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829229" version="1" comment="java-11-openjdk-static-libs is &lt;11.0.12.0.7-0.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829343" version="1" comment="openssl is &lt;1.0.2k-22.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829344" version="1" comment="openssl-devel is &lt;1.0.2k-22.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829345" version="1" comment="openssl-libs is &lt;1.0.2k-22.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829346" version="1" comment="openssl-perl is &lt;1.0.2k-22.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829347" version="1" comment="openssl-static is &lt;1.0.2k-22.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829065" version="1" comment="firefox is &lt;78.10.0-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829062" version="1" comment="thunderbird is &lt;78.10.0-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828950" version="1" comment="firefox is &lt;78.8.0-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828951" version="1" comment="thunderbird is &lt;78.8.0-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829015" version="1" comment="firefox is &lt;78.9.0-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829016" version="1" comment="thunderbird is &lt;78.9.0-3.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829044" version="1" comment="thunderbird is &lt;78.9.1-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829257" version="1" comment="bind is &lt;9.11.4-26.P2.el7_9.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829258" version="1" comment="bind-chroot is &lt;9.11.4-26.P2.el7_9.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829259" version="1" comment="bind-devel is &lt;9.11.4-26.P2.el7_9.7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829260" version="1" comment="bind-export-devel is &lt;9.11.4-26.P2.el7_9.7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829261" version="1" comment="bind-export-libs is &lt;9.11.4-26.P2.el7_9.7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829262" version="1" comment="bind-libs is &lt;9.11.4-26.P2.el7_9.7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829263" version="1" comment="bind-libs-lite is &lt;9.11.4-26.P2.el7_9.7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829264" version="1" comment="bind-license is &lt;9.11.4-26.P2.el7_9.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829265" version="1" comment="bind-lite-devel is &lt;9.11.4-26.P2.el7_9.7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829266" version="1" comment="bind-pkcs11 is &lt;9.11.4-26.P2.el7_9.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829267" version="1" comment="bind-pkcs11-devel is &lt;9.11.4-26.P2.el7_9.7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829268" version="1" comment="bind-pkcs11-libs is &lt;9.11.4-26.P2.el7_9.7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829269" version="1" comment="bind-pkcs11-utils is &lt;9.11.4-26.P2.el7_9.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829270" version="1" comment="bind-sdb is &lt;9.11.4-26.P2.el7_9.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829271" version="1" comment="bind-sdb-chroot is &lt;9.11.4-26.P2.el7_9.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829272" version="1" comment="bind-utils is &lt;9.11.4-26.P2.el7_9.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829076" version="1" comment="bind is &lt;9.11.4-26.P2.el7_9.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829077" version="1" comment="bind-chroot is &lt;9.11.4-26.P2.el7_9.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829078" version="1" comment="bind-devel is &lt;9.11.4-26.P2.el7_9.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829079" version="1" comment="bind-export-devel is &lt;9.11.4-26.P2.el7_9.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829080" version="1" comment="bind-export-libs is &lt;9.11.4-26.P2.el7_9.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829081" version="1" comment="bind-libs is &lt;9.11.4-26.P2.el7_9.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829082" version="1" comment="bind-libs-lite is &lt;9.11.4-26.P2.el7_9.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829083" version="1" comment="bind-license is &lt;9.11.4-26.P2.el7_9.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829084" version="1" comment="bind-lite-devel is &lt;9.11.4-26.P2.el7_9.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829085" version="1" comment="bind-pkcs11 is &lt;9.11.4-26.P2.el7_9.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829086" version="1" comment="bind-pkcs11-devel is &lt;9.11.4-26.P2.el7_9.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829087" version="1" comment="bind-pkcs11-libs is &lt;9.11.4-26.P2.el7_9.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829088" version="1" comment="bind-pkcs11-utils is &lt;9.11.4-26.P2.el7_9.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829089" version="1" comment="bind-sdb is &lt;9.11.4-26.P2.el7_9.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829090" version="1" comment="bind-sdb-chroot is &lt;9.11.4-26.P2.el7_9.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829091" version="1" comment="bind-utils is &lt;9.11.4-26.P2.el7_9.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829184" version="1" comment="dhclient is &lt;4.2.5-83.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829185" version="1" comment="dhcp is &lt;4.2.5-83.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829186" version="1" comment="dhcp-common is &lt;4.2.5-83.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829187" version="1" comment="dhcp-devel is &lt;4.2.5-83.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829188" version="1" comment="dhcp-libs is &lt;4.2.5-83.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830003" version="1" comment="bind is &lt;9.11.4-26.P2.el7_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830004" version="1" comment="bind-chroot is &lt;9.11.4-26.P2.el7_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830005" version="1" comment="bind-devel is &lt;9.11.4-26.P2.el7_9.13 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830006" version="1" comment="bind-export-devel is &lt;9.11.4-26.P2.el7_9.13 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830007" version="1" comment="bind-export-libs is &lt;9.11.4-26.P2.el7_9.13 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830008" version="1" comment="bind-libs is &lt;9.11.4-26.P2.el7_9.13 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830009" version="1" comment="bind-libs-lite is &lt;9.11.4-26.P2.el7_9.13 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830010" version="1" comment="bind-license is &lt;9.11.4-26.P2.el7_9.13 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830011" version="1" comment="bind-lite-devel is &lt;9.11.4-26.P2.el7_9.13 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830012" version="1" comment="bind-pkcs11 is &lt;9.11.4-26.P2.el7_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830013" version="1" comment="bind-pkcs11-devel is &lt;9.11.4-26.P2.el7_9.13 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830014" version="1" comment="bind-pkcs11-libs is &lt;9.11.4-26.P2.el7_9.13 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830015" version="1" comment="bind-pkcs11-utils is &lt;9.11.4-26.P2.el7_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830016" version="1" comment="bind-sdb is &lt;9.11.4-26.P2.el7_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830017" version="1" comment="bind-sdb-chroot is &lt;9.11.4-26.P2.el7_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830018" version="1" comment="bind-utils is &lt;9.11.4-26.P2.el7_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829990" version="1" comment="bpftool is &lt;3.10.0-1160.83.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829991" version="1" comment="kernel is &lt;3.10.0-1160.83.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829992" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1160.83.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829993" version="1" comment="kernel-debug is &lt;3.10.0-1160.83.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829996" version="1" comment="kernel-doc is &lt;3.10.0-1160.83.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829997" version="1" comment="kernel-headers is &lt;3.10.0-1160.83.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829998" version="1" comment="kernel-tools is &lt;3.10.0-1160.83.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829999" version="1" comment="kernel-tools-libs is &lt;3.10.0-1160.83.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830001" version="1" comment="perf is &lt;3.10.0-1160.83.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830002" version="1" comment="python-perf is &lt;3.10.0-1160.83.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829529" version="1" comment="httpd is &lt;2.4.6-97.el7_9.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829530" version="1" comment="httpd-devel is &lt;2.4.6-97.el7_9.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829531" version="1" comment="httpd-manual is &lt;2.4.6-97.el7_9.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829532" version="1" comment="httpd-tools is &lt;2.4.6-97.el7_9.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829533" version="1" comment="mod_ldap is &lt;2.4.6-97.el7_9.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829534" version="1" comment="mod_proxy_html is &lt;2.4.6-97.el7_9.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829535" version="1" comment="mod_session is &lt;2.4.6-97.el7_9.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829536" version="1" comment="mod_ssl is &lt;2.4.6-97.el7_9.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713126" version="1" comment="kgraft-patch-4_12_14-95_51-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713127" version="1" comment="kgraft-patch-4_12_14-95_54-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713128" version="1" comment="kgraft-patch-4_12_14-95_57-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713129" version="1" comment="kgraft-patch-4_12_14-95_60-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713130" version="1" comment="kgraft-patch-4_12_14-95_65-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713131" version="1" comment="kgraft-patch-4_12_14-95_68-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713132" version="1" comment="kgraft-patch-4_12_14-122_20-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713133" version="1" comment="kgraft-patch-4_12_14-122_23-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713134" version="1" comment="kgraft-patch-4_12_14-122_26-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713135" version="1" comment="kgraft-patch-4_12_14-122_29-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713136" version="1" comment="kgraft-patch-4_12_14-122_32-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713137" version="1" comment="kgraft-patch-4_12_14-122_37-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713138" version="1" comment="kgraft-patch-4_12_14-122_41-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713139" version="1" comment="kgraft-patch-4_12_14-122_46-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713140" version="1" comment="kgraft-patch-4_12_14-122_51-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713141" version="1" comment="kgraft-patch-4_12_14-122_54-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713142" version="1" comment="kgraft-patch-4_12_14-122_57-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713143" version="1" comment="kgraft-patch-4_12_14-122_60-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713144" version="1" comment="kgraft-patch-4_12_14-122_63-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713145" version="1" comment="kernel-livepatch-4_12_14-150_52-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713146" version="1" comment="kernel-livepatch-4_12_14-150_55-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713147" version="1" comment="kernel-livepatch-4_12_14-150_58-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713148" version="1" comment="kernel-livepatch-4_12_14-150_63-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713149" version="1" comment="kernel-livepatch-4_12_14-150_66-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713150" version="1" comment="kernel-livepatch-4_12_14-197_40-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713151" version="1" comment="kernel-livepatch-4_12_14-197_45-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713152" version="1" comment="kernel-livepatch-4_12_14-197_48-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713153" version="1" comment="kernel-livepatch-4_12_14-197_51-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713154" version="1" comment="kernel-livepatch-4_12_14-197_56-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713155" version="1" comment="kernel-livepatch-4_12_14-197_61-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713156" version="1" comment="kernel-livepatch-4_12_14-197_64-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713157" version="1" comment="kernel-livepatch-4_12_14-197_67-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713158" version="1" comment="kernel-livepatch-4_12_14-197_72-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713159" version="1" comment="kernel-livepatch-4_12_14-197_75-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713160" version="1" comment="kernel-livepatch-4_12_14-197_78-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713161" version="1" comment="kernel-livepatch-4_12_14-197_83-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713162" version="1" comment="kernel-livepatch-5_3_18-22-default is &gt;=10-5.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713163" version="1" comment="kernel-livepatch-5_3_18-24_12-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713164" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713165" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713166" version="1" comment="kernel-livepatch-5_3_18-24_29-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713167" version="1" comment="kernel-livepatch-5_3_18-24_34-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713168" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713169" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713170" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713171" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713172" version="1" comment="kernel-livepatch-5_3_18-24_9-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828981" version="1" comment="screen is &lt;4.1.0-0.27.20120314git3c2946.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828949" version="1" comment="xterm is &lt;295-3.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829114" version="1" comment="glib2 is &lt;2.56.1-9.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829115" version="1" comment="glib2-devel is &lt;2.56.1-9.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829116" version="1" comment="glib2-doc is &lt;2.56.1-9.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829117" version="1" comment="glib2-fam is &lt;2.56.1-9.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829118" version="1" comment="glib2-static is &lt;2.56.1-9.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829119" version="1" comment="glib2-tests is &lt;2.56.1-9.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713173" version="1" comment="kgraft-patch-4_12_14-95_51-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713174" version="1" comment="kgraft-patch-4_12_14-95_54-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713175" version="1" comment="kgraft-patch-4_12_14-95_57-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713176" version="1" comment="kgraft-patch-4_12_14-95_60-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713177" version="1" comment="kgraft-patch-4_12_14-95_65-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713178" version="1" comment="kgraft-patch-4_12_14-95_68-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713179" version="1" comment="kgraft-patch-4_12_14-95_71-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713180" version="1" comment="kgraft-patch-4_12_14-122_20-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713181" version="1" comment="kgraft-patch-4_12_14-122_23-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713182" version="1" comment="kgraft-patch-4_12_14-122_26-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713183" version="1" comment="kgraft-patch-4_12_14-122_29-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713184" version="1" comment="kgraft-patch-4_12_14-122_32-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713185" version="1" comment="kgraft-patch-4_12_14-122_37-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713186" version="1" comment="kgraft-patch-4_12_14-122_41-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713187" version="1" comment="kgraft-patch-4_12_14-122_46-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713188" version="1" comment="kgraft-patch-4_12_14-122_51-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713189" version="1" comment="kgraft-patch-4_12_14-122_54-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713190" version="1" comment="kgraft-patch-4_12_14-122_57-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713191" version="1" comment="kgraft-patch-4_12_14-122_60-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713192" version="1" comment="kernel-livepatch-4_12_14-150_52-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713193" version="1" comment="kernel-livepatch-4_12_14-150_55-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713194" version="1" comment="kernel-livepatch-4_12_14-150_58-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713195" version="1" comment="kernel-livepatch-4_12_14-150_63-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713196" version="1" comment="kernel-livepatch-4_12_14-150_66-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713197" version="1" comment="kernel-livepatch-4_12_14-150_69-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713198" version="1" comment="kernel-livepatch-4_12_14-197_37-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713199" version="1" comment="kernel-livepatch-4_12_14-197_40-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713200" version="1" comment="kernel-livepatch-4_12_14-197_45-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713201" version="1" comment="kernel-livepatch-4_12_14-197_48-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713202" version="1" comment="kernel-livepatch-4_12_14-197_51-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713203" version="1" comment="kernel-livepatch-4_12_14-197_56-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713204" version="1" comment="kernel-livepatch-4_12_14-197_61-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713205" version="1" comment="kernel-livepatch-4_12_14-197_64-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713206" version="1" comment="kernel-livepatch-4_12_14-197_67-default is &gt;=5-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713207" version="1" comment="kernel-livepatch-4_12_14-197_72-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713208" version="1" comment="kernel-livepatch-4_12_14-197_75-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713209" version="1" comment="kernel-livepatch-4_12_14-197_78-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713210" version="1" comment="kernel-livepatch-4_12_14-197_83-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713211" version="1" comment="kernel-livepatch-4_12_14-197_86-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713212" version="1" comment="kernel-livepatch-5_3_18-22-default is &gt;=9-5.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713213" version="1" comment="kernel-livepatch-5_3_18-24_12-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713214" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713215" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713216" version="1" comment="kernel-livepatch-5_3_18-24_29-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713217" version="1" comment="kernel-livepatch-5_3_18-24_34-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713218" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713219" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713220" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713221" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713222" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713223" version="1" comment="kernel-livepatch-5_3_18-24_9-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829021" version="1" comment="bpftool is &lt;3.10.0-1160.24.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829022" version="1" comment="kernel is &lt;3.10.0-1160.24.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829023" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1160.24.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829024" version="1" comment="kernel-debug is &lt;3.10.0-1160.24.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829027" version="1" comment="kernel-doc is &lt;3.10.0-1160.24.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829028" version="1" comment="kernel-headers is &lt;3.10.0-1160.24.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829029" version="1" comment="kernel-tools is &lt;3.10.0-1160.24.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829030" version="1" comment="kernel-tools-libs is &lt;3.10.0-1160.24.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829032" version="1" comment="perf is &lt;3.10.0-1160.24.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829033" version="1" comment="python-perf is &lt;3.10.0-1160.24.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828982" version="1" comment="wpa_supplicant is &lt;2.6-12.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829239" version="1" comment="lasso is &lt;2.5.1-8.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829240" version="1" comment="lasso-devel is &lt;2.5.1-8.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829241" version="1" comment="lasso-python is &lt;2.5.1-8.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713224" version="1" comment="kernel-livepatch-4_12_14-197_86-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713225" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713226" version="1" comment="kgraft-patch-4_12_14-95_71-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713227" version="1" comment="kernel-livepatch-4_12_14-150_69-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829205" version="1" comment="xstream is &lt;1.3.1-14.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829206" version="1" comment="xstream-javadoc is &lt;1.3.1-14.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829125" version="1" comment="thunderbird is &lt;78.11.0-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829120" version="1" comment="firefox is &lt;78.11.0-3.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829238" version="1" comment="thunderbird is &lt;78.12.0-2.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829220" version="1" comment="firefox is &lt;78.12.0-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829243" version="1" comment="firefox is &lt;78.13.0-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829248" version="1" comment="thunderbird is &lt;78.13.0-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829504" version="1" comment="webkitgtk4 is &lt;2.28.2-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829505" version="1" comment="webkitgtk4-devel is &lt;2.28.2-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829506" version="1" comment="webkitgtk4-doc is &lt;2.28.2-3.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829507" version="1" comment="webkitgtk4-jsc is &lt;2.28.2-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829508" version="1" comment="webkitgtk4-jsc-devel is &lt;2.28.2-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829250" version="1" comment="compat-exiv2-023 is &lt;0.23-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829249" version="1" comment="compat-exiv2-026 is &lt;0.26-3.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829244" version="1" comment="exiv2 is &lt;0.27.0-4.el7_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829245" version="1" comment="exiv2-devel is &lt;0.27.0-4.el7_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829246" version="1" comment="exiv2-doc is &lt;0.27.0-4.el7_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829247" version="1" comment="exiv2-libs is &lt;0.27.0-4.el7_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713228" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=7-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829254" version="1" comment="libX11 is &lt;1.6.7-4.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829255" version="1" comment="libX11-common is &lt;1.6.7-4.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829256" version="1" comment="libX11-devel is &lt;1.6.7-4.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828882" version="1" comment="sudo is &lt;1.8.23-10.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828883" version="1" comment="sudo-devel is &lt;1.8.23-10.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829189" version="1" comment="postgresql is &lt;9.2.24-7.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829190" version="1" comment="postgresql-contrib is &lt;9.2.24-7.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829191" version="1" comment="postgresql-devel is &lt;9.2.24-7.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829192" version="1" comment="postgresql-docs is &lt;9.2.24-7.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829193" version="1" comment="postgresql-libs is &lt;9.2.24-7.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829194" version="1" comment="postgresql-plperl is &lt;9.2.24-7.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829195" version="1" comment="postgresql-plpython is &lt;9.2.24-7.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829196" version="1" comment="postgresql-pltcl is &lt;9.2.24-7.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829197" version="1" comment="postgresql-server is &lt;9.2.24-7.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829198" version="1" comment="postgresql-static is &lt;9.2.24-7.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829199" version="1" comment="postgresql-test is &lt;9.2.24-7.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829200" version="1" comment="postgresql-upgrade is &lt;9.2.24-7.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844291" version="1" comment="LibRaw is &lt;0.19.4-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844292" version="1" comment="LibRaw-devel is &lt;0.19.4-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844293" version="1" comment="LibRaw-static is &lt;0.19.4-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713229" version="1" comment="kgraft-patch-4_12_14-95_57-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713230" version="1" comment="kgraft-patch-4_12_14-95_60-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713231" version="1" comment="kgraft-patch-4_12_14-95_65-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713232" version="1" comment="kgraft-patch-4_12_14-95_68-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713233" version="1" comment="kgraft-patch-4_12_14-95_71-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713234" version="1" comment="kgraft-patch-4_12_14-122_26-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713235" version="1" comment="kgraft-patch-4_12_14-122_29-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713236" version="1" comment="kgraft-patch-4_12_14-122_32-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713237" version="1" comment="kgraft-patch-4_12_14-122_37-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713238" version="1" comment="kgraft-patch-4_12_14-122_41-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713239" version="1" comment="kgraft-patch-4_12_14-122_46-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713240" version="1" comment="kgraft-patch-4_12_14-122_51-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713241" version="1" comment="kgraft-patch-4_12_14-122_54-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713242" version="1" comment="kgraft-patch-4_12_14-122_57-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713243" version="1" comment="kgraft-patch-4_12_14-122_60-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713244" version="1" comment="kgraft-patch-4_12_14-122_63-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713245" version="1" comment="kernel-livepatch-4_12_14-150_52-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713246" version="1" comment="kernel-livepatch-4_12_14-150_55-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713247" version="1" comment="kernel-livepatch-4_12_14-150_58-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713248" version="1" comment="kernel-livepatch-4_12_14-150_63-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713249" version="1" comment="kernel-livepatch-4_12_14-150_66-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713250" version="1" comment="kernel-livepatch-4_12_14-150_69-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713251" version="1" comment="kernel-livepatch-4_12_14-197_48-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713252" version="1" comment="kernel-livepatch-4_12_14-197_51-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713253" version="1" comment="kernel-livepatch-4_12_14-197_56-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713254" version="1" comment="kernel-livepatch-4_12_14-197_61-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713255" version="1" comment="kernel-livepatch-4_12_14-197_64-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713256" version="1" comment="kernel-livepatch-4_12_14-197_67-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713257" version="1" comment="kernel-livepatch-4_12_14-197_72-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713258" version="1" comment="kernel-livepatch-4_12_14-197_75-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713259" version="1" comment="kernel-livepatch-4_12_14-197_78-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713260" version="1" comment="kernel-livepatch-4_12_14-197_83-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713261" version="1" comment="kernel-livepatch-4_12_14-197_86-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713262" version="1" comment="kernel-livepatch-5_3_18-22-default is &gt;=12-5.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713263" version="1" comment="kernel-livepatch-5_3_18-24_12-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713264" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713265" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713266" version="1" comment="kernel-livepatch-5_3_18-24_29-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713267" version="1" comment="kernel-livepatch-5_3_18-24_34-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713268" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713269" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713270" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713271" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713272" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713273" version="1" comment="kernel-livepatch-5_3_18-24_9-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829251" version="1" comment="libsndfile is &lt;1.0.25-12.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829252" version="1" comment="libsndfile-devel is &lt;1.0.25-12.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829253" version="1" comment="libsndfile-utils is &lt;1.0.25-12.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829342" version="1" comment="firefox is &lt;91.2.0-4.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829369" version="1" comment="thunderbird is &lt;91.2.0-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829201" version="1" comment="gupnp is &lt;1.0.2-6.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829202" version="1" comment="gupnp-devel is &lt;1.0.2-6.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829203" version="1" comment="gupnp-docs is &lt;1.0.2-6.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725499" version="1" comment="kgraft-patch-4_12_14-95_102-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725858" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725859" version="1" comment="kgraft-patch-4_12_14-95_88-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725860" version="1" comment="kgraft-patch-4_12_14-95_93-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725861" version="1" comment="kgraft-patch-4_12_14-95_96-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725862" version="1" comment="kgraft-patch-4_12_14-95_99-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725863" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=16-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725864" version="1" comment="kgraft-patch-4_12_14-122_106-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725865" version="1" comment="kgraft-patch-4_12_14-122_110-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725866" version="1" comment="kgraft-patch-4_12_14-122_113-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725867" version="1" comment="kgraft-patch-4_12_14-122_116-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725868" version="1" comment="kgraft-patch-4_12_14-122_121-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725869" version="1" comment="kgraft-patch-4_12_14-122_124-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725501" version="1" comment="kgraft-patch-4_12_14-122_127-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725870" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=16-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725871" version="1" comment="kernel-livepatch-4_12_14-150100_197_111-default is &gt;=9-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725872" version="1" comment="kernel-livepatch-4_12_14-150100_197_114-default is &gt;=6-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725503" version="1" comment="kernel-livepatch-4_12_14-150100_197_117-default is &gt;=4-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725873" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=15-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725874" version="1" comment="kernel-livepatch-4_12_14-197_105-default is &gt;=11-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725875" version="1" comment="kernel-livepatch-4_12_14-197_108-default is &gt;=10-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725876" version="1" comment="kernel-livepatch-5_3_18-150200_24_112-default is &gt;=10-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725877" version="1" comment="kernel-livepatch-5_3_18-150200_24_115-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725878" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=15-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725879" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=14-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725880" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=18-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725881" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=17-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725882" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=16-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725883" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725884" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725885" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=15-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725886" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=14-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725887" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725888" version="1" comment="kernel-livepatch-5_3_18-150300_59_63-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725889" version="1" comment="kernel-livepatch-5_3_18-150300_59_68-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725890" version="1" comment="kernel-livepatch-5_3_18-150300_59_71-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725891" version="1" comment="kernel-livepatch-5_3_18-150300_59_76-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725505" version="1" comment="kernel-livepatch-5_3_18-150300_59_87-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725892" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=18-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725893" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=17-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725894" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=17-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725895" version="1" comment="kernel-livepatch-5_14_21-150400_22-default is &gt;=8-150400.4.21.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725506" version="1" comment="kernel-livepatch-5_14_21-150400_24_11-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713798" version="1" comment="kernel-default is &lt;5.14.21-150400.24.11.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829105" version="1" comment="xorg-x11-server-Xdmx is &lt;1.20.4-16.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829106" version="1" comment="xorg-x11-server-Xephyr is &lt;1.20.4-16.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829107" version="1" comment="xorg-x11-server-Xnest is &lt;1.20.4-16.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829108" version="1" comment="xorg-x11-server-Xorg is &lt;1.20.4-16.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829109" version="1" comment="xorg-x11-server-Xvfb is &lt;1.20.4-16.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829110" version="1" comment="xorg-x11-server-Xwayland is &lt;1.20.4-16.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829111" version="1" comment="xorg-x11-server-common is &lt;1.20.4-16.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829112" version="1" comment="xorg-x11-server-devel is &lt;1.20.4-16.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829113" version="1" comment="xorg-x11-server-source is &lt;1.20.4-16.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829104" version="1" comment="slapi-nis is &lt;0.56.5-4.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713274" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=8-3.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713275" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713276" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713277" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713278" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713279" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713280" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829167" version="1" comment="hivex is &lt;1.3.10-6.11.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829168" version="1" comment="hivex-devel is &lt;1.3.10-6.11.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829169" version="1" comment="ocaml-hivex is &lt;1.3.10-6.11.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829170" version="1" comment="ocaml-hivex-devel is &lt;1.3.10-6.11.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829171" version="1" comment="perl-hivex is &lt;1.3.10-6.11.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829172" version="1" comment="python-hivex is &lt;1.3.10-6.11.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829173" version="1" comment="ruby-hivex is &lt;1.3.10-6.11.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829378" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.312.b07-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829379" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.312.b07-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829380" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.312.b07-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829381" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.312.b07-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829382" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.312.b07-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829383" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.312.b07-1.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829384" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.312.b07-1.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829385" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.312.b07-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829386" version="1" comment="java-11-openjdk is &lt;11.0.13.0.8-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829387" version="1" comment="java-11-openjdk-demo is &lt;11.0.13.0.8-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829388" version="1" comment="java-11-openjdk-devel is &lt;11.0.13.0.8-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829389" version="1" comment="java-11-openjdk-headless is &lt;11.0.13.0.8-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829390" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.13.0.8-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829391" version="1" comment="java-11-openjdk-javadoc-zip is &lt;11.0.13.0.8-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829392" version="1" comment="java-11-openjdk-jmods is &lt;11.0.13.0.8-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829393" version="1" comment="java-11-openjdk-src is &lt;11.0.13.0.8-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829394" version="1" comment="java-11-openjdk-static-libs is &lt;11.0.13.0.8-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829204" version="1" comment="linuxptp is &lt;2.0-2.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713281" version="1" comment="kgraft-patch-4_12_14-95_65-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713282" version="1" comment="kgraft-patch-4_12_14-95_68-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713283" version="1" comment="kgraft-patch-4_12_14-95_71-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713284" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713285" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713286" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713287" version="1" comment="kgraft-patch-4_12_14-122_41-default is &gt;=16-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713288" version="1" comment="kgraft-patch-4_12_14-122_46-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713289" version="1" comment="kgraft-patch-4_12_14-122_51-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713290" version="1" comment="kgraft-patch-4_12_14-122_54-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713291" version="1" comment="kgraft-patch-4_12_14-122_57-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713292" version="1" comment="kgraft-patch-4_12_14-122_60-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713293" version="1" comment="kgraft-patch-4_12_14-122_63-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713294" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713295" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713296" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713297" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713298" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713299" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713300" version="1" comment="kernel-default is &lt;4.12.14-122.83.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713301" version="1" comment="kernel-livepatch-4_12_14-150_63-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713302" version="1" comment="kernel-livepatch-4_12_14-150_66-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713303" version="1" comment="kernel-livepatch-4_12_14-150_69-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713304" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713305" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713306" version="1" comment="kernel-livepatch-4_12_14-197_61-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713307" version="1" comment="kernel-livepatch-4_12_14-197_64-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713308" version="1" comment="kernel-livepatch-4_12_14-197_67-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713309" version="1" comment="kernel-livepatch-4_12_14-197_72-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713310" version="1" comment="kernel-livepatch-4_12_14-197_75-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713311" version="1" comment="kernel-livepatch-4_12_14-197_78-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713312" version="1" comment="kernel-livepatch-4_12_14-197_83-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713313" version="1" comment="kernel-livepatch-4_12_14-197_86-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713314" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713315" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713316" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713317" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713318" version="1" comment="kernel-livepatch-5_3_18-24_29-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713319" version="1" comment="kernel-livepatch-5_3_18-24_34-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713320" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713321" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713322" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713323" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713324" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713325" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713326" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713327" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713328" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713329" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713330" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713331" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713332" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713333" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713334" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713335" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713336" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713337" version="1" comment="kernel-default is &lt;5.3.18-24.70.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829286" version="1" comment="libipa_hbac is &lt;1.16.5-10.el7_9.10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829287" version="1" comment="libipa_hbac-devel is &lt;1.16.5-10.el7_9.10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829288" version="1" comment="libsss_autofs is &lt;1.16.5-10.el7_9.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829289" version="1" comment="libsss_certmap is &lt;1.16.5-10.el7_9.10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829290" version="1" comment="libsss_certmap-devel is &lt;1.16.5-10.el7_9.10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829291" version="1" comment="libsss_idmap is &lt;1.16.5-10.el7_9.10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829292" version="1" comment="libsss_idmap-devel is &lt;1.16.5-10.el7_9.10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829293" version="1" comment="libsss_nss_idmap is &lt;1.16.5-10.el7_9.10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829294" version="1" comment="libsss_nss_idmap-devel is &lt;1.16.5-10.el7_9.10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829295" version="1" comment="libsss_simpleifp is &lt;1.16.5-10.el7_9.10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829296" version="1" comment="libsss_simpleifp-devel is &lt;1.16.5-10.el7_9.10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829297" version="1" comment="libsss_sudo is &lt;1.16.5-10.el7_9.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829298" version="1" comment="python-libipa_hbac is &lt;1.16.5-10.el7_9.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829299" version="1" comment="python-libsss_nss_idmap is &lt;1.16.5-10.el7_9.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829300" version="1" comment="python-sss is &lt;1.16.5-10.el7_9.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829301" version="1" comment="python-sss-murmur is &lt;1.16.5-10.el7_9.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829302" version="1" comment="python-sssdconfig is &lt;1.16.5-10.el7_9.10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829303" version="1" comment="sssd is &lt;1.16.5-10.el7_9.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829304" version="1" comment="sssd-ad is &lt;1.16.5-10.el7_9.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829305" version="1" comment="sssd-client is &lt;1.16.5-10.el7_9.10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829306" version="1" comment="sssd-common is &lt;1.16.5-10.el7_9.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829307" version="1" comment="sssd-common-pac is &lt;1.16.5-10.el7_9.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829308" version="1" comment="sssd-dbus is &lt;1.16.5-10.el7_9.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829309" version="1" comment="sssd-ipa is &lt;1.16.5-10.el7_9.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829310" version="1" comment="sssd-kcm is &lt;1.16.5-10.el7_9.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829311" version="1" comment="sssd-krb5 is &lt;1.16.5-10.el7_9.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829312" version="1" comment="sssd-krb5-common is &lt;1.16.5-10.el7_9.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829313" version="1" comment="sssd-ldap is &lt;1.16.5-10.el7_9.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829314" version="1" comment="sssd-libwbclient is &lt;1.16.5-10.el7_9.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829315" version="1" comment="sssd-libwbclient-devel is &lt;1.16.5-10.el7_9.10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829316" version="1" comment="sssd-polkit-rules is &lt;1.16.5-10.el7_9.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829317" version="1" comment="sssd-proxy is &lt;1.16.5-10.el7_9.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829318" version="1" comment="sssd-tools is &lt;1.16.5-10.el7_9.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829319" version="1" comment="sssd-winbind-idmap is &lt;1.16.5-10.el7_9.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829320" version="1" comment="hivex is &lt;1.3.10-6.12.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829321" version="1" comment="hivex-devel is &lt;1.3.10-6.12.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829322" version="1" comment="ocaml-hivex is &lt;1.3.10-6.12.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829323" version="1" comment="ocaml-hivex-devel is &lt;1.3.10-6.12.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829324" version="1" comment="perl-hivex is &lt;1.3.10-6.12.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829325" version="1" comment="python-hivex is &lt;1.3.10-6.12.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829326" version="1" comment="ruby-hivex is &lt;1.3.10-6.12.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829361" version="1" comment="389-ds-base is &lt;1.3.10.2-13.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829362" version="1" comment="389-ds-base-devel is &lt;1.3.10.2-13.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829363" version="1" comment="389-ds-base-libs is &lt;1.3.10.2-13.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829364" version="1" comment="389-ds-base-snmp is &lt;1.3.10.2-13.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713338" version="1" comment="kgraft-patch-4_12_14-95_60-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713339" version="1" comment="kgraft-patch-4_12_14-95_65-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713340" version="1" comment="kgraft-patch-4_12_14-95_68-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713341" version="1" comment="kgraft-patch-4_12_14-95_71-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713342" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713343" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713344" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713345" version="1" comment="kgraft-patch-4_12_14-122_37-default is &gt;=16-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713346" version="1" comment="kgraft-patch-4_12_14-122_41-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713347" version="1" comment="kgraft-patch-4_12_14-122_46-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713348" version="1" comment="kgraft-patch-4_12_14-122_51-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713349" version="1" comment="kgraft-patch-4_12_14-122_54-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713350" version="1" comment="kgraft-patch-4_12_14-122_57-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713351" version="1" comment="kgraft-patch-4_12_14-122_60-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713352" version="1" comment="kgraft-patch-4_12_14-122_63-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713353" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713354" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713355" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713356" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713357" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713358" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713359" version="1" comment="kernel-livepatch-4_12_14-150_58-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713360" version="1" comment="kernel-livepatch-4_12_14-150_63-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713361" version="1" comment="kernel-livepatch-4_12_14-150_66-default is &gt;=10-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713362" version="1" comment="kernel-livepatch-4_12_14-150_69-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713363" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713364" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713365" version="1" comment="kernel-livepatch-4_12_14-197_56-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713366" version="1" comment="kernel-livepatch-4_12_14-197_61-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713367" version="1" comment="kernel-livepatch-4_12_14-197_64-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713368" version="1" comment="kernel-livepatch-4_12_14-197_67-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713369" version="1" comment="kernel-livepatch-4_12_14-197_72-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713370" version="1" comment="kernel-livepatch-4_12_14-197_75-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713371" version="1" comment="kernel-livepatch-4_12_14-197_78-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713372" version="1" comment="kernel-livepatch-4_12_14-197_83-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713373" version="1" comment="kernel-livepatch-4_12_14-197_86-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713374" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713375" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713376" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713377" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &gt;=14-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713378" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &gt;=14-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713379" version="1" comment="kernel-livepatch-5_3_18-24_29-default is &gt;=12-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713380" version="1" comment="kernel-livepatch-5_3_18-24_34-default is &gt;=12-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713381" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &gt;=12-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713382" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &gt;=11-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713383" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &gt;=11-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713384" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &gt;=10-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713385" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &gt;=9-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713386" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=4-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713387" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &gt;=6-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713388" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=6-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713389" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=4-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713390" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=4-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713391" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=3-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713392" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=2-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713393" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=6-3.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713394" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=4-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713395" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=4-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713396" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=3-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713397" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=2-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713398" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=4-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829522" version="1" comment="openssl is &lt;1.0.2k-23.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829523" version="1" comment="openssl-devel is &lt;1.0.2k-23.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829524" version="1" comment="openssl-libs is &lt;1.0.2k-23.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829525" version="1" comment="openssl-perl is &lt;1.0.2k-23.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829526" version="1" comment="openssl-static is &lt;1.0.2k-23.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829327" version="1" comment="bpftool is &lt;3.10.0-1160.42.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829328" version="1" comment="kernel is &lt;3.10.0-1160.42.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829329" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1160.42.2.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829330" version="1" comment="kernel-debug is &lt;3.10.0-1160.42.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829333" version="1" comment="kernel-doc is &lt;3.10.0-1160.42.2.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829334" version="1" comment="kernel-headers is &lt;3.10.0-1160.42.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829335" version="1" comment="kernel-tools is &lt;3.10.0-1160.42.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829336" version="1" comment="kernel-tools-libs is &lt;3.10.0-1160.42.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829338" version="1" comment="perf is &lt;3.10.0-1160.42.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829339" version="1" comment="python-perf is &lt;3.10.0-1160.42.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713399" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713400" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713401" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713402" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713403" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713404" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713405" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713406" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829442" version="1" comment="krb5-devel is &lt;1.15.1-51.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829443" version="1" comment="krb5-libs is &lt;1.15.1-51.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829444" version="1" comment="krb5-pkinit is &lt;1.15.1-51.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829445" version="1" comment="krb5-server is &lt;1.15.1-51.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829446" version="1" comment="krb5-server-ldap is &lt;1.15.1-51.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829447" version="1" comment="krb5-workstation is &lt;1.15.1-51.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829448" version="1" comment="libkadm5 is &lt;1.15.1-51.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829341" version="1" comment="firefox is &lt;78.14.0-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829340" version="1" comment="thunderbird is &lt;78.14.0-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829403" version="1" comment="firefox is &lt;91.3.0-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829404" version="1" comment="thunderbird is &lt;91.3.0-2.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829395" version="1" comment="xstream is &lt;1.3.1-16.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829396" version="1" comment="xstream-javadoc is &lt;1.3.1-16.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713407" version="1" comment="kernel-livepatch-5_3_18-150200_24_112-default is &gt;=2-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698825" version="1" comment="kernel-livepatch-5_3_18-150200_24_115-default is &gt;=2-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716156" version="1" comment="kernel-livepatch-5_3_18-150200_24_126-default is &gt;=3-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718697" version="1" comment="kernel-default is ==5.3.18-150200.24.129.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718698" version="1" comment="kernel-livepatch-5_3_18-150200_24_129-default is &gt;=2-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725507" version="1" comment="kernel-default is ==5.3.18-150200.24.134.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725508" version="1" comment="kernel-livepatch-5_3_18-150200_24_134-default is &gt;=2-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713408" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713409" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=3-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713410" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=12-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713411" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &gt;=14-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713412" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=14-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713413" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=12-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713414" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=12-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713415" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713416" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=10-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713417" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713418" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713419" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713420" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=6-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713421" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713422" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713423" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713424" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713425" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713426" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713427" version="1" comment="kernel-livepatch-5_3_18-150300_59_63-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713428" version="1" comment="kernel-livepatch-5_3_18-150300_59_68-default is &gt;=2-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701443" version="1" comment="kernel-livepatch-5_3_18-150300_59_71-default is &gt;=3-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701404" version="1" comment="kernel-livepatch-5_3_18-150300_59_76-default is &gt;=2-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706112" version="1" comment="kernel-livepatch-5_3_18-150300_59_87-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709695" version="1" comment="kernel-default is ==5.3.18-150300.59.90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715597" version="1" comment="kernel-livepatch-5_3_18-150300_59_90-default is &gt;=3-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715598" version="1" comment="kernel-default is ==5.3.18-150300.59.93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715599" version="1" comment="kernel-livepatch-5_3_18-150300_59_93-default is &gt;=2-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725509" version="1" comment="kernel-default is ==5.3.18-150300.59.98.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725510" version="1" comment="kernel-livepatch-5_3_18-150300_59_98-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713429" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=14-150200.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713430" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713431" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713432" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713433" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713434" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713435" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713436" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713437" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713438" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713439" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698875" version="1" comment="kernel-livepatch-5_14_21-150400_22-default is &gt;=2-150400.4.3.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715600" version="1" comment="kernel-default is ==5.14.21-150400.24.21.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715601" version="1" comment="kernel-livepatch-5_14_21-150400_24_21-default is &gt;=2-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725511" version="1" comment="kernel-default is ==5.14.21-150400.24.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725512" version="1" comment="kernel-livepatch-5_14_21-150400_24_28-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729488" version="1" comment="kernel-default is ==5.14.21-150400.24.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729489" version="1" comment="kernel-livepatch-5_14_21-150400_24_33-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729490" version="1" comment="kernel-default is &lt;5.14.21-150400.24.33.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713440" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713441" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713442" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713443" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713444" version="1" comment="kgraft-patch-4_12_14-95_88-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713445" version="1" comment="kgraft-patch-4_12_14-95_93-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713446" version="1" comment="kgraft-patch-4_12_14-95_96-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713447" version="1" comment="kernel-default is &lt;4.12.14-95.96.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713448" version="1" comment="kernel-livepatch-4_12_14-150000_150_89-default is &gt;=2-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713449" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=15-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713450" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=12-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713451" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=7-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713452" version="1" comment="kernel-livepatch-4_12_14-150_83-default is &gt;=4-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713453" version="1" comment="kernel-livepatch-4_12_14-150_86-default is &gt;=3-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713454" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=13-150200.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713455" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713456" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713457" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713458" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713459" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713460" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713461" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713462" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713463" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829495" version="1" comment="xorg-x11-server-Xdmx is &lt;1.20.4-17.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829496" version="1" comment="xorg-x11-server-Xephyr is &lt;1.20.4-17.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829497" version="1" comment="xorg-x11-server-Xnest is &lt;1.20.4-17.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829498" version="1" comment="xorg-x11-server-Xorg is &lt;1.20.4-17.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829499" version="1" comment="xorg-x11-server-Xvfb is &lt;1.20.4-17.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829500" version="1" comment="xorg-x11-server-Xwayland is &lt;1.20.4-17.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829501" version="1" comment="xorg-x11-server-common is &lt;1.20.4-17.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829502" version="1" comment="xorg-x11-server-devel is &lt;1.20.4-17.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829503" version="1" comment="xorg-x11-server-source is &lt;1.20.4-17.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830357" version="1" comment="ImageMagick is &lt;6.9.10.68-7.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830358" version="1" comment="ImageMagick-c++ is &lt;6.9.10.68-7.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830359" version="1" comment="ImageMagick-c++-devel is &lt;6.9.10.68-7.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830360" version="1" comment="ImageMagick-devel is &lt;6.9.10.68-7.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830361" version="1" comment="ImageMagick-doc is &lt;6.9.10.68-7.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830362" version="1" comment="ImageMagick-perl is &lt;6.9.10.68-7.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713464" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=4-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713465" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=4-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829638" version="1" comment="bpftool is &lt;3.10.0-1160.62.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829639" version="1" comment="kernel is &lt;3.10.0-1160.62.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829640" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1160.62.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829641" version="1" comment="kernel-debug is &lt;3.10.0-1160.62.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829644" version="1" comment="kernel-doc is &lt;3.10.0-1160.62.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829645" version="1" comment="kernel-headers is &lt;3.10.0-1160.62.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829646" version="1" comment="kernel-tools is &lt;3.10.0-1160.62.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829647" version="1" comment="kernel-tools-libs is &lt;3.10.0-1160.62.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829649" version="1" comment="perf is &lt;3.10.0-1160.62.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829650" version="1" comment="python-perf is &lt;3.10.0-1160.62.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829542" version="1" comment="polkit is &lt;0.112-26.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829543" version="1" comment="polkit-devel is &lt;0.112-26.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829544" version="1" comment="polkit-docs is &lt;0.112-26.el7_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829370" version="1" comment="httpd is &lt;2.4.6-97.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829371" version="1" comment="httpd-devel is &lt;2.4.6-97.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829372" version="1" comment="httpd-manual is &lt;2.4.6-97.el7_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829373" version="1" comment="httpd-tools is &lt;2.4.6-97.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829374" version="1" comment="mod_ldap is &lt;2.4.6-97.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829375" version="1" comment="mod_proxy_html is &lt;2.4.6-97.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829376" version="1" comment="mod_session is &lt;2.4.6-97.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829377" version="1" comment="mod_ssl is &lt;2.4.6-97.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713466" version="1" comment="kgraft-patch-4_12_14-95_68-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713467" version="1" comment="kgraft-patch-4_12_14-95_71-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713468" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713469" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713470" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713471" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713472" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713473" version="1" comment="kgraft-patch-4_12_14-122_106-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713474" version="1" comment="kgraft-patch-4_12_14-122_63-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713475" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713476" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713477" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713478" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713479" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713480" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713481" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713482" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713483" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713484" version="1" comment="kernel-livepatch-4_12_14-150_66-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713485" version="1" comment="kernel-livepatch-4_12_14-150_69-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713486" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713487" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713488" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713489" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713490" version="1" comment="kernel-livepatch-4_12_14-197_83-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713491" version="1" comment="kernel-livepatch-4_12_14-197_86-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713492" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713493" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713494" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713495" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713496" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713497" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713498" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713499" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713500" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713501" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713502" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713503" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713504" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713505" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713506" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713507" version="1" comment="kernel-default is &lt;5.3.18-24.96.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713508" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=11-3.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713509" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713510" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713511" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713512" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=7-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713513" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=5-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713514" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=5-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713515" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=4-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713516" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=3-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713517" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=3-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713518" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829607" version="1" comment="389-ds-base is &lt;1.3.10.2-15.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829608" version="1" comment="389-ds-base-devel is &lt;1.3.10.2-15.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829609" version="1" comment="389-ds-base-libs is &lt;1.3.10.2-15.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829610" version="1" comment="389-ds-base-snmp is &lt;1.3.10.2-15.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829399" version="1" comment="flatpak is &lt;1.0.9-12.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829400" version="1" comment="flatpak-builder is &lt;1.0.0-12.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829401" version="1" comment="flatpak-devel is &lt;1.0.9-12.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829402" version="1" comment="flatpak-libs is &lt;1.0.9-12.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829405" version="1" comment="freerdp is &lt;2.1.1-5.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829406" version="1" comment="freerdp-devel is &lt;2.1.1-5.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829407" version="1" comment="freerdp-libs is &lt;2.1.1-5.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829408" version="1" comment="libwinpr is &lt;2.1.1-5.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829409" version="1" comment="libwinpr-devel is &lt;2.1.1-5.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829527" version="1" comment="firefox is &lt;91.5.0-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829528" version="1" comment="thunderbird is &lt;91.5.0-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829423" version="1" comment="openssh is &lt;7.4p1-22.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829424" version="1" comment="openssh-askpass is &lt;7.4p1-22.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829425" version="1" comment="openssh-cavs is &lt;7.4p1-22.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829426" version="1" comment="openssh-clients is &lt;7.4p1-22.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829427" version="1" comment="openssh-keycat is &lt;7.4p1-22.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829428" version="1" comment="openssh-ldap is &lt;7.4p1-22.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829429" version="1" comment="openssh-server is &lt;7.4p1-22.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829430" version="1" comment="openssh-server-sysvinit is &lt;7.4p1-22.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829431" version="1" comment="pam_ssh_agent_auth is &lt;0.10.3-2.22.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713519" version="1" comment="kernel-default is &lt;4.12.14-122.91.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713520" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713521" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713522" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713523" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713524" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713525" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=2-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713526" version="1" comment="kernel-default is &lt;5.3.18-24.86.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713527" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829397" version="1" comment="binutils is &lt;2.27-44.base.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829398" version="1" comment="binutils-devel is &lt;2.27-44.base.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713528" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713529" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713530" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=4-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829449" version="1" comment="nss is &lt;3.67.0-4.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829450" version="1" comment="nss-devel is &lt;3.67.0-4.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829451" version="1" comment="nss-pkcs11-devel is &lt;3.67.0-4.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829452" version="1" comment="nss-sysinit is &lt;3.67.0-4.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829453" version="1" comment="nss-tools is &lt;3.67.0-4.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829456" version="1" comment="thunderbird is &lt;91.4.0-3.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829455" version="1" comment="firefox is &lt;91.4.0-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829553" version="1" comment="ctdb is &lt;4.10.16-18.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829554" version="1" comment="ctdb-tests is &lt;4.10.16-18.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829555" version="1" comment="libsmbclient is &lt;4.10.16-18.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829556" version="1" comment="libsmbclient-devel is &lt;4.10.16-18.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829557" version="1" comment="libwbclient is &lt;4.10.16-18.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829558" version="1" comment="libwbclient-devel is &lt;4.10.16-18.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829559" version="1" comment="samba is &lt;4.10.16-18.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829560" version="1" comment="samba-client is &lt;4.10.16-18.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829561" version="1" comment="samba-client-libs is &lt;4.10.16-18.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829562" version="1" comment="samba-common is &lt;4.10.16-18.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829563" version="1" comment="samba-common-libs is &lt;4.10.16-18.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829564" version="1" comment="samba-common-tools is &lt;4.10.16-18.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829565" version="1" comment="samba-dc is &lt;4.10.16-18.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829566" version="1" comment="samba-dc-libs is &lt;4.10.16-18.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829567" version="1" comment="samba-devel is &lt;4.10.16-18.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829568" version="1" comment="samba-krb5-printing is &lt;4.10.16-18.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829569" version="1" comment="samba-libs is &lt;4.10.16-18.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829570" version="1" comment="samba-pidl is &lt;4.10.16-18.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829571" version="1" comment="samba-python is &lt;4.10.16-18.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829572" version="1" comment="samba-python-test is &lt;4.10.16-18.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829573" version="1" comment="samba-test is &lt;4.10.16-18.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829574" version="1" comment="samba-test-libs is &lt;4.10.16-18.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829575" version="1" comment="samba-vfs-glusterfs is &lt;4.10.16-18.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829576" version="1" comment="samba-winbind is &lt;4.10.16-18.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829577" version="1" comment="samba-winbind-clients is &lt;4.10.16-18.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829578" version="1" comment="samba-winbind-krb5-locator is &lt;4.10.16-18.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829579" version="1" comment="samba-winbind-modules is &lt;4.10.16-18.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829580" version="1" comment="aide is &lt;0.15.1-13.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829537" version="1" comment="gegl is &lt;0.2.0-19.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829538" version="1" comment="gegl-devel is &lt;0.2.0-19.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829635" version="1" comment="expat is &lt;2.1.0-14.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829636" version="1" comment="expat-devel is &lt;2.1.0-14.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829637" version="1" comment="expat-static is &lt;2.1.0-14.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829758" version="1" comment="squid is &lt;3.5.20-17.el7_9.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829759" version="1" comment="squid-migration-script is &lt;3.5.20-17.el7_9.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829760" version="1" comment="squid-sysvinit is &lt;3.5.20-17.el7_9.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776021" version="1" comment="kernel-default is ==4.12.14-122.162.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868478" version="1" comment="kgraft-patch-4_12_14-122_162-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794744" version="1" comment="kernel-default is ==4.12.14-122.165.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868479" version="1" comment="kgraft-patch-4_12_14-122_165-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798684" version="1" comment="kernel-default is ==4.12.14-122.173.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868480" version="1" comment="kgraft-patch-4_12_14-122_173-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807350" version="1" comment="kernel-default is ==4.12.14-122.176.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868481" version="1" comment="kgraft-patch-4_12_14-122_176-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807695" version="1" comment="kernel-default is ==4.12.14-122.179.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868482" version="1" comment="kgraft-patch-4_12_14-122_179-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816437" version="1" comment="kernel-default is ==4.12.14-122.183.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868483" version="1" comment="kgraft-patch-4_12_14-122_183-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845680" version="1" comment="kernel-default is ==4.12.14-122.186.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868926" version="1" comment="kgraft-patch-4_12_14-122_186-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845682" version="1" comment="kernel-default is ==4.12.14-122.189.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868484" version="1" comment="kgraft-patch-4_12_14-122_189-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849119" version="1" comment="kernel-default is ==4.12.14-122.194.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868485" version="1" comment="kgraft-patch-4_12_14-122_194-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854320" version="1" comment="kernel-default is ==4.12.14-122.201.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960101" version="1" comment="kgraft-patch-4_12_14-122_201-default is &gt;=11-8.10.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868487" version="1" comment="kernel-default is ==4.12.14-122.216.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960102" version="1" comment="kgraft-patch-4_12_14-122_216-default is &gt;=9-8.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868489" version="1" comment="kernel-default is &lt;4.12.14-122.216.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776028" version="1" comment="kernel-default is ==5.3.18-150200.24.154.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868490" version="1" comment="kernel-livepatch-5_3_18-150200_24_154-default is &gt;=13-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795754" version="1" comment="kernel-default is ==5.3.18-150200.24.157.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868491" version="1" comment="kernel-livepatch-5_3_18-150200_24_157-default is &gt;=12-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799561" version="1" comment="kernel-default is ==5.3.18-150200.24.160.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868492" version="1" comment="kernel-livepatch-5_3_18-150200_24_160-default is &gt;=11-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804085" version="1" comment="kernel-default is ==5.3.18-150200.24.163.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868493" version="1" comment="kernel-livepatch-5_3_18-150200_24_163-default is &gt;=10-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804087" version="1" comment="kernel-default is ==5.3.18-150200.24.166.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868494" version="1" comment="kernel-livepatch-5_3_18-150200_24_166-default is &gt;=10-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816090" version="1" comment="kernel-default is ==5.3.18-150200.24.169.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868495" version="1" comment="kernel-livepatch-5_3_18-150200_24_169-default is &gt;=10-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845690" version="1" comment="kernel-default is ==5.3.18-150200.24.172.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868496" version="1" comment="kernel-livepatch-5_3_18-150200_24_172-default is &gt;=8-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845859" version="1" comment="kernel-default is ==5.3.18-150200.24.175.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868497" version="1" comment="kernel-livepatch-5_3_18-150200_24_175-default is &gt;=9-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849454" version="1" comment="kernel-default is ==5.3.18-150200.24.178.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868498" version="1" comment="kernel-livepatch-5_3_18-150200_24_178-default is &gt;=6-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854323" version="1" comment="kernel-default is ==5.3.18-150200.24.183.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956848" version="1" comment="kernel-livepatch-5_3_18-150200_24_183-default is &gt;=10-150200.5.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861753" version="1" comment="kernel-default is ==5.3.18-150200.24.188.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957141" version="1" comment="kernel-livepatch-5_3_18-150200_24_188-default is &gt;=9-150200.5.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861755" version="1" comment="kernel-default is &lt;5.3.18-150200.24.188.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775813" version="1" comment="kernel-default is ==5.3.18-150300.59.124.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868501" version="1" comment="kernel-livepatch-5_3_18-150300_59_124-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796008" version="1" comment="kernel-default is ==5.3.18-150300.59.127.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868502" version="1" comment="kernel-livepatch-5_3_18-150300_59_127-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799638" version="1" comment="kernel-default is ==5.3.18-150300.59.130.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868503" version="1" comment="kernel-livepatch-5_3_18-150300_59_130-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804090" version="1" comment="kernel-default is ==5.3.18-150300.59.133.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868504" version="1" comment="kernel-livepatch-5_3_18-150300_59_133-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804092" version="1" comment="kernel-default is ==5.3.18-150300.59.138.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868505" version="1" comment="kernel-livepatch-5_3_18-150300_59_138-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816440" version="1" comment="kernel-default is ==5.3.18-150300.59.141.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868506" version="1" comment="kernel-livepatch-5_3_18-150300_59_141-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845693" version="1" comment="kernel-default is ==5.3.18-150300.59.144.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868507" version="1" comment="kernel-livepatch-5_3_18-150300_59_144-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845695" version="1" comment="kernel-default is ==5.3.18-150300.59.147.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868508" version="1" comment="kernel-livepatch-5_3_18-150300_59_147-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849457" version="1" comment="kernel-default is ==5.3.18-150300.59.150.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868509" version="1" comment="kernel-livepatch-5_3_18-150300_59_150-default is &gt;=7-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854326" version="1" comment="kernel-default is ==5.3.18-150300.59.153.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961304" version="1" comment="kernel-livepatch-5_3_18-150300_59_153-default is &gt;=12-150300.7.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861761" version="1" comment="kernel-default is ==5.3.18-150300.59.158.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961280" version="1" comment="kernel-livepatch-5_3_18-150300_59_158-default is &gt;=11-150300.7.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861763" version="1" comment="kernel-default is &lt;5.3.18-150300.59.158.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968248" version="1" comment="kernel-livepatch-5_3_18-150300_59_150-default is &gt;=18-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968249" version="1" comment="kernel-livepatch-5_3_18-150300_59_153-default is &gt;=15-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968250" version="1" comment="kernel-livepatch-5_3_18-150300_59_158-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868517" version="1" comment="kernel-default is ==5.3.18-150300.59.161.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968251" version="1" comment="kernel-livepatch-5_3_18-150300_59_161-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871852" version="1" comment="kernel-default is &lt;5.3.18-150300.59.161.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947485" version="1" comment="kernel-livepatch-5_3_18-150200_24_163-default is &gt;=14-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947486" version="1" comment="kernel-livepatch-5_3_18-150200_24_166-default is &gt;=14-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947487" version="1" comment="kernel-livepatch-5_3_18-150200_24_169-default is &gt;=14-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947488" version="1" comment="kernel-livepatch-5_3_18-150200_24_172-default is &gt;=12-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947489" version="1" comment="kernel-livepatch-5_3_18-150200_24_175-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947408" version="1" comment="kernel-livepatch-5_3_18-150200_24_178-default is &gt;=10-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868514" version="1" comment="kernel-default is ==5.3.18-150200.24.191.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956850" version="1" comment="kernel-livepatch-5_3_18-150200_24_191-default is &gt;=8-150200.5.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878063" version="1" comment="kernel-default is ==5.3.18-150200.24.194.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956851" version="1" comment="kernel-livepatch-5_3_18-150200_24_194-default is &gt;=5-150200.5.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947492" version="1" comment="kernel-default is ==5.3.18-150200.24.197.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956852" version="1" comment="kernel-livepatch-5_3_18-150200_24_197-default is &gt;=4-150200.5.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947494" version="1" comment="kernel-default is &lt;5.3.18-150200.24.197.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947495" version="1" comment="kernel-livepatch-5_3_18-150300_59_133-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947496" version="1" comment="kernel-livepatch-5_3_18-150300_59_138-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947497" version="1" comment="kernel-livepatch-5_3_18-150300_59_141-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947498" version="1" comment="kernel-livepatch-5_3_18-150300_59_144-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947499" version="1" comment="kernel-livepatch-5_3_18-150300_59_147-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947500" version="1" comment="kernel-livepatch-5_3_18-150300_59_150-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961281" version="1" comment="kernel-livepatch-5_3_18-150300_59_161-default is &gt;=10-150300.7.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878066" version="1" comment="kernel-default is ==5.3.18-150300.59.164.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961282" version="1" comment="kernel-livepatch-5_3_18-150300_59_164-default is &gt;=7-150300.7.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947503" version="1" comment="kernel-default is ==5.3.18-150300.59.167.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961305" version="1" comment="kernel-livepatch-5_3_18-150300_59_167-default is &gt;=6-150300.7.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947505" version="1" comment="kernel-default is &lt;5.3.18-150300.59.167.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881211" version="1" comment="kgraft-patch-4_12_14-122_173-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881212" version="1" comment="kgraft-patch-4_12_14-122_176-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881075" version="1" comment="kgraft-patch-4_12_14-122_179-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881213" version="1" comment="kgraft-patch-4_12_14-122_183-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881214" version="1" comment="kgraft-patch-4_12_14-122_186-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881215" version="1" comment="kgraft-patch-4_12_14-122_189-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881216" version="1" comment="kgraft-patch-4_12_14-122_194-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881217" version="1" comment="kernel-livepatch-5_3_18-150200_24_160-default is &gt;=14-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881218" version="1" comment="kernel-livepatch-5_3_18-150200_24_163-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881219" version="1" comment="kernel-livepatch-5_3_18-150200_24_166-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881220" version="1" comment="kernel-livepatch-5_3_18-150200_24_169-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881221" version="1" comment="kernel-livepatch-5_3_18-150200_24_172-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881222" version="1" comment="kernel-livepatch-5_3_18-150200_24_175-default is &gt;=12-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881223" version="1" comment="kernel-livepatch-5_3_18-150200_24_178-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868516" version="1" comment="kernel-default is &lt;5.3.18-150200.24.191.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881225" version="1" comment="kernel-livepatch-5_3_18-150300_59_130-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881226" version="1" comment="kernel-livepatch-5_3_18-150300_59_133-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881227" version="1" comment="kernel-livepatch-5_3_18-150300_59_138-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881228" version="1" comment="kernel-livepatch-5_3_18-150300_59_141-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881229" version="1" comment="kernel-livepatch-5_3_18-150300_59_144-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881230" version="1" comment="kernel-livepatch-5_3_18-150300_59_147-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881231" version="1" comment="kernel-livepatch-5_3_18-150300_59_150-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874159" version="1" comment="kgraft-patch-4_12_14-122_162-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874160" version="1" comment="kgraft-patch-4_12_14-122_165-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874161" version="1" comment="kgraft-patch-4_12_14-122_173-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874162" version="1" comment="kgraft-patch-4_12_14-122_176-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874163" version="1" comment="kgraft-patch-4_12_14-122_179-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874164" version="1" comment="kgraft-patch-4_12_14-122_183-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874165" version="1" comment="kgraft-patch-4_12_14-122_186-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874166" version="1" comment="kgraft-patch-4_12_14-122_189-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874167" version="1" comment="kgraft-patch-4_12_14-122_194-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871835" version="1" comment="kernel-livepatch-5_3_18-150200_24_154-default is &gt;=14-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871836" version="1" comment="kernel-livepatch-5_3_18-150200_24_157-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871837" version="1" comment="kernel-livepatch-5_3_18-150200_24_160-default is &gt;=12-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871838" version="1" comment="kernel-livepatch-5_3_18-150200_24_163-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871839" version="1" comment="kernel-livepatch-5_3_18-150200_24_166-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871840" version="1" comment="kernel-livepatch-5_3_18-150200_24_169-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871841" version="1" comment="kernel-livepatch-5_3_18-150200_24_172-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871842" version="1" comment="kernel-livepatch-5_3_18-150200_24_175-default is &gt;=10-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871843" version="1" comment="kernel-livepatch-5_3_18-150200_24_178-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871845" version="1" comment="kernel-livepatch-5_3_18-150300_59_124-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871846" version="1" comment="kernel-livepatch-5_3_18-150300_59_127-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871847" version="1" comment="kernel-livepatch-5_3_18-150300_59_130-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872165" version="1" comment="kernel-livepatch-5_3_18-150300_59_133-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871848" version="1" comment="kernel-livepatch-5_3_18-150300_59_138-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871849" version="1" comment="kernel-livepatch-5_3_18-150300_59_141-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872415" version="1" comment="kernel-livepatch-5_3_18-150300_59_144-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871850" version="1" comment="kernel-livepatch-5_3_18-150300_59_147-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872166" version="1" comment="kernel-livepatch-5_3_18-150300_59_150-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968252" version="1" comment="kgraft-patch-4_12_14-122_201-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968253" version="1" comment="kgraft-patch-4_12_14-122_216-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966031" version="1" comment="kgraft-patch-4_12_14-122_194-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965285" version="1" comment="kgraft-patch-4_12_14-122_201-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965820" version="1" comment="kgraft-patch-4_12_14-122_216-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845879" version="1" comment="kernel-default is ==5.14.21-150500.55.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956546" version="1" comment="kernel-livepatch-5_14_21-150500_55_36-default is &gt;=14-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845884" version="1" comment="kernel-default is ==5.14.21-150500.55.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956854" version="1" comment="kernel-livepatch-5_14_21-150500_55_39-default is &gt;=14-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849163" version="1" comment="kernel-default is ==5.14.21-150500.55.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956547" version="1" comment="kernel-livepatch-5_14_21-150500_55_44-default is &gt;=13-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854334" version="1" comment="kernel-default is ==5.14.21-150500.55.49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961306" version="1" comment="kernel-livepatch-5_14_21-150500_55_49-default is &gt;=13-150500.11.8.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861773" version="1" comment="kernel-default is ==5.14.21-150500.55.52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961307" version="1" comment="kernel-livepatch-5_14_21-150500_55_52-default is &gt;=11-150500.11.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861864" version="1" comment="kernel-default is ==5.14.21-150500.55.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961308" version="1" comment="kernel-livepatch-5_14_21-150500_55_59-default is &gt;=11-150500.11.10.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872677" version="1" comment="kernel-default is ==5.14.21-150500.55.62.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961309" version="1" comment="kernel-livepatch-5_14_21-150500_55_62-default is &gt;=9-150500.11.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873488" version="1" comment="kernel-default is ==5.14.21-150500.55.65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961310" version="1" comment="kernel-livepatch-5_14_21-150500_55_65-default is &gt;=9-150500.11.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878545" version="1" comment="kernel-default is ==5.14.21-150500.55.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961311" version="1" comment="kernel-livepatch-5_14_21-150500_55_68-default is &gt;=8-150500.11.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956857" version="1" comment="kernel-default is ==5.14.21-150500.55.73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960514" version="1" comment="kernel-livepatch-5_14_21-150500_55_73-default is &gt;=3-150500.11.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956859" version="1" comment="kernel-default is &lt;5.14.21-150500.55.73.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948640" version="1" comment="kernel-livepatch-5_3_18-150200_24_166-default is &gt;=15-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948641" version="1" comment="kernel-livepatch-5_3_18-150200_24_169-default is &gt;=15-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948642" version="1" comment="kernel-livepatch-5_3_18-150200_24_172-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948620" version="1" comment="kernel-livepatch-5_3_18-150200_24_175-default is &gt;=14-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950329" version="1" comment="kernel-livepatch-5_3_18-150200_24_178-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948643" version="1" comment="kernel-livepatch-5_3_18-150300_59_138-default is &gt;=15-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948644" version="1" comment="kernel-livepatch-5_3_18-150300_59_141-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948645" version="1" comment="kernel-livepatch-5_3_18-150300_59_144-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950330" version="1" comment="kernel-livepatch-5_3_18-150300_59_147-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948646" version="1" comment="kernel-livepatch-5_3_18-150300_59_150-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846011" version="1" comment="kernel-default is ==5.14.21-150400.24.100.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948621" version="1" comment="kernel-livepatch-5_14_21-150400_24_100-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849156" version="1" comment="kernel-default is ==5.14.21-150400.24.103.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948647" version="1" comment="kernel-livepatch-5_14_21-150400_24_103-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854329" version="1" comment="kernel-default is ==5.14.21-150400.24.108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961312" version="1" comment="kernel-livepatch-5_14_21-150400_24_108-default is &gt;=13-150400.9.8.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861848" version="1" comment="kernel-default is ==5.14.21-150400.24.111.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961313" version="1" comment="kernel-livepatch-5_14_21-150400_24_111-default is &gt;=11-150400.9.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861850" version="1" comment="kernel-default is ==5.14.21-150400.24.116.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961314" version="1" comment="kernel-livepatch-5_14_21-150400_24_116-default is &gt;=11-150400.9.8.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868526" version="1" comment="kernel-default is ==5.14.21-150400.24.119.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961315" version="1" comment="kernel-livepatch-5_14_21-150400_24_119-default is &gt;=10-150400.9.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878543" version="1" comment="kernel-default is ==5.14.21-150400.24.122.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961316" version="1" comment="kernel-livepatch-5_14_21-150400_24_122-default is &gt;=8-150400.9.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947538" version="1" comment="kernel-default is ==5.14.21-150400.24.125.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960109" version="1" comment="kernel-livepatch-5_14_21-150400_24_125-default is &gt;=5-150400.9.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807720" version="1" comment="kernel-default is ==5.14.21-150400.24.88.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948652" version="1" comment="kernel-livepatch-5_14_21-150400_24_88-default is &gt;=15-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816464" version="1" comment="kernel-default is ==5.14.21-150400.24.92.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948653" version="1" comment="kernel-livepatch-5_14_21-150400_24_92-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846009" version="1" comment="kernel-default is ==5.14.21-150400.24.97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948654" version="1" comment="kernel-livepatch-5_14_21-150400_24_97-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849160" version="1" comment="kernel-default is &lt;5.14.21-150400.24.97.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807722" version="1" comment="kernel-default is ==5.14.21-150500.55.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948655" version="1" comment="kernel-livepatch-5_14_21-150500_55_28-default is &gt;=15-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816469" version="1" comment="kernel-default is ==5.14.21-150500.55.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948656" version="1" comment="kernel-livepatch-5_14_21-150500_55_31-default is &gt;=14-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950373" version="1" comment="kernel-livepatch-5_14_21-150500_55_36-default is &gt;=13-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950374" version="1" comment="kernel-livepatch-5_14_21-150500_55_39-default is &gt;=13-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950292" version="1" comment="kernel-livepatch-5_14_21-150500_55_44-default is &gt;=12-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943401" version="1" comment="kernel-default is &lt;5.14.21-150500.55.68.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713531" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713532" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713533" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=3-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713534" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=2-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713535" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=2-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698691" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=16-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698693" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698695" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698697" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698700" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698702" version="1" comment="kgraft-patch-4_12_14-122_106-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698704" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=16-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698706" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698708" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698710" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698712" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698714" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698716" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698718" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698721" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=16-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698723" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=13-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698725" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=8-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698728" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=8-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698730" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=16-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698732" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=15-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698734" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=13-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698737" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=14-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698739" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=16-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698741" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=14-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698743" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=14-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698745" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698747" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=12-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698749" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=10-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698751" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=10-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698753" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698755" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698757" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698760" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698762" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698764" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=16-150200.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698766" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698768" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698770" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698772" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698774" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698776" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698778" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698780" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698782" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698784" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713536" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713537" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=2-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713538" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=2-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713539" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713540" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713541" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713542" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713543" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713544" version="1" comment="kgraft-patch-4_12_14-122_106-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713545" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713546" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713547" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713548" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713549" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713550" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713551" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713552" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713553" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713554" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=13-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713555" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=10-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713556" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=5-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713557" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=5-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713558" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=13-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713559" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=12-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713560" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=10-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713561" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713562" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713563" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713564" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713565" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713566" version="1" comment="kgraft-patch-4_12_14-95_88-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713567" version="1" comment="kernel-default is &lt;4.12.14-95.88.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713568" version="1" comment="kgraft-patch-4_12_14-122_110-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713569" version="1" comment="kernel-livepatch-4_12_14-150_83-default is &gt;=2-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701264" version="1" comment="kernel-default is &lt;4.12.14-150.83.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713570" version="1" comment="kernel-livepatch-4_12_14-197_105-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713571" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=3-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713572" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=10-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713573" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713574" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713575" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713576" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=6-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713577" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713578" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713579" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713580" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713581" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713582" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829678" version="1" comment="bpftool is &lt;3.10.0-1160.66.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829679" version="1" comment="kernel is &lt;3.10.0-1160.66.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829680" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1160.66.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829681" version="1" comment="kernel-debug is &lt;3.10.0-1160.66.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829684" version="1" comment="kernel-doc is &lt;3.10.0-1160.66.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829685" version="1" comment="kernel-headers is &lt;3.10.0-1160.66.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829686" version="1" comment="kernel-tools is &lt;3.10.0-1160.66.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829687" version="1" comment="kernel-tools-libs is &lt;3.10.0-1160.66.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829689" version="1" comment="perf is &lt;3.10.0-1160.66.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829690" version="1" comment="python-perf is &lt;3.10.0-1160.66.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829623" version="1" comment="thunderbird is &lt;91.7.0-2.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829632" version="1" comment="openssl is &lt;1.0.2k-25.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829633" version="1" comment="openssl-devel is &lt;1.0.2k-25.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829634" version="1" comment="openssl-libs is &lt;1.0.2k-25.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829752" version="1" comment="389-ds-base is &lt;1.3.10.2-16.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829753" version="1" comment="389-ds-base-devel is &lt;1.3.10.2-16.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829754" version="1" comment="389-ds-base-libs is &lt;1.3.10.2-16.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829755" version="1" comment="389-ds-base-snmp is &lt;1.3.10.2-16.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713583" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713584" version="1" comment="kgraft-patch-4_12_14-122_106-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713585" version="1" comment="kgraft-patch-4_12_14-122_110-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713586" version="1" comment="kgraft-patch-4_12_14-122_113-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713587" version="1" comment="kgraft-patch-4_12_14-122_116-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713588" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=16-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713589" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713590" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713591" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713592" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713593" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713594" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713595" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713596" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713597" version="1" comment="kernel-livepatch-4_12_14-150100_197_111-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713598" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=7-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713599" version="1" comment="kernel-livepatch-4_12_14-197_105-default is &gt;=4-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713600" version="1" comment="kernel-livepatch-4_12_14-197_108-default is &gt;=3-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713601" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=15-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713602" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=14-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713603" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=12-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698787" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698789" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698790" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698792" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &gt;=15-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698793" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=15-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698794" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698795" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698796" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=12-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698797" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698798" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698799" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698800" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698801" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698802" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=6-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698803" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698804" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698806" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698808" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698810" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698811" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=15-150200.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698812" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698813" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698814" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698815" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698816" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698817" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698818" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698819" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698820" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698821" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943012" version="1" comment="bpftool is &lt;3.10.0-1160.123.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943013" version="1" comment="kernel is &lt;3.10.0-1160.123.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943014" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1160.123.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943015" version="1" comment="kernel-debug is &lt;3.10.0-1160.123.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943018" version="1" comment="kernel-doc is &lt;3.10.0-1160.123.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943019" version="1" comment="kernel-headers is &lt;3.10.0-1160.123.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943020" version="1" comment="kernel-tools is &lt;3.10.0-1160.123.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943021" version="1" comment="kernel-tools-libs is &lt;3.10.0-1160.123.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943023" version="1" comment="perf is &lt;3.10.0-1160.123.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943024" version="1" comment="python-perf is &lt;3.10.0-1160.123.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713604" version="1" comment="kernel-default is &lt;4.12.14-95.93.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009685665" version="1" comment="kernel-default is &lt;5.14.21-150400.22.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713605" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=16-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713606" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713607" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713608" version="1" comment="kgraft-patch-4_12_14-95_88-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713609" version="1" comment="kgraft-patch-4_12_14-95_93-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713610" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713611" version="1" comment="kgraft-patch-4_12_14-122_106-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713612" version="1" comment="kgraft-patch-4_12_14-122_110-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713613" version="1" comment="kgraft-patch-4_12_14-122_113-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713614" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=16-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713615" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=16-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713616" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713617" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713618" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713619" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713620" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713621" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=14-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713622" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=9-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713623" version="1" comment="kernel-livepatch-4_12_14-150_83-default is &gt;=5-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713624" version="1" comment="kernel-livepatch-4_12_14-150_86-default is &gt;=4-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713625" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=9-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713626" version="1" comment="kernel-livepatch-4_12_14-197_105-default is &gt;=5-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713627" version="1" comment="kernel-livepatch-4_12_14-197_108-default is &gt;=4-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713628" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=16-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713629" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=14-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713630" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=8-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713631" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=7-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713632" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=16-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713633" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=16-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713634" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=16-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713635" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=15-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713636" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=14-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713637" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=12-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713638" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=12-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713639" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=11-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713640" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=10-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713641" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=9-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713642" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713643" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713644" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713645" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=7-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713646" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=6-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713647" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=18-150200.3.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713648" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713649" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713650" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=15-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713651" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=14-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713652" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713653" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713654" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713655" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713656" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713657" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829651" version="1" comment="firefox is &lt;91.8.0-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829652" version="1" comment="thunderbird is &lt;91.8.0-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698823" version="1" comment="kernel-livepatch-5_3_18-150200_24_112-default is &gt;=4-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698826" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=9-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698827" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=8-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698828" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=17-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698829" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=17-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698830" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=16-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698831" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=15-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698832" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=13-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698833" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=13-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698834" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=12-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698835" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=11-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698836" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=10-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698837" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698838" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698839" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698840" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698841" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=7-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698843" version="1" comment="kernel-livepatch-5_3_18-150300_59_63-default is &gt;=4-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698845" version="1" comment="kernel-livepatch-5_3_18-150300_59_68-default is &gt;=3-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698847" version="1" comment="kernel-livepatch-5_3_18-150300_59_71-default is &gt;=2-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709696" version="1" comment="kernel-livepatch-5_3_18-150300_59_90-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698848" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=19-150200.3.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698849" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=17-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698850" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=17-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698851" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698852" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=15-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698853" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698854" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698855" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698856" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698857" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698858" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=17-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713658" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=6-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713659" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713660" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713661" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713662" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829672" version="1" comment="gzip is &lt;1.5-11.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829714" version="1" comment="xz is &lt;5.2.2-2.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829715" version="1" comment="xz-compat-libs is &lt;5.2.2-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829716" version="1" comment="xz-devel is &lt;5.2.2-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829717" version="1" comment="xz-libs is &lt;5.2.2-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829718" version="1" comment="xz-lzma-compat is &lt;5.2.2-2.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713663" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713664" version="1" comment="kgraft-patch-4_12_14-122_106-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713665" version="1" comment="kgraft-patch-4_12_14-122_110-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713666" version="1" comment="kgraft-patch-4_12_14-122_113-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713667" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713668" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713669" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713670" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713671" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713672" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713673" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713674" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713675" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=6-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713676" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=15-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713677" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=15-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713678" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=15-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713679" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=14-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713680" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713681" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713682" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713683" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=10-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713684" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713685" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713686" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713687" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713688" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713689" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713690" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713691" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=17-150200.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713692" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=15-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713693" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=15-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713694" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713695" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713696" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713697" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713698" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713699" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713700" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713701" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=15-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713702" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713703" version="1" comment="kgraft-patch-4_12_14-95_88-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713704" version="1" comment="kgraft-patch-4_12_14-95_93-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713705" version="1" comment="kgraft-patch-4_12_14-95_96-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713706" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713707" version="1" comment="kgraft-patch-4_12_14-122_106-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713708" version="1" comment="kgraft-patch-4_12_14-122_110-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713709" version="1" comment="kgraft-patch-4_12_14-122_113-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713710" version="1" comment="kgraft-patch-4_12_14-122_116-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713711" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=17-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713712" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713713" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713714" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713715" version="1" comment="kernel-livepatch-4_12_14-150000_150_89-default is &gt;=6-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713716" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=12-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713717" version="1" comment="kernel-livepatch-4_12_14-150_83-default is &gt;=8-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713718" version="1" comment="kernel-livepatch-4_12_14-150_86-default is &gt;=7-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713719" version="1" comment="kernel-livepatch-4_12_14-150100_197_111-default is &gt;=6-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713720" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=12-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713721" version="1" comment="kernel-livepatch-4_12_14-197_105-default is &gt;=8-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713722" version="1" comment="kernel-livepatch-4_12_14-197_108-default is &gt;=7-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829671" version="1" comment="thunderbird is &lt;91.9.0-3.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829691" version="1" comment="firefox is &lt;91.9.1-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829692" version="1" comment="thunderbird is &lt;91.9.1-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829719" version="1" comment="postgresql is &lt;9.2.24-8.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829720" version="1" comment="postgresql-contrib is &lt;9.2.24-8.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829721" version="1" comment="postgresql-devel is &lt;9.2.24-8.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829722" version="1" comment="postgresql-docs is &lt;9.2.24-8.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829723" version="1" comment="postgresql-libs is &lt;9.2.24-8.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829724" version="1" comment="postgresql-plperl is &lt;9.2.24-8.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829725" version="1" comment="postgresql-plpython is &lt;9.2.24-8.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829726" version="1" comment="postgresql-pltcl is &lt;9.2.24-8.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829727" version="1" comment="postgresql-server is &lt;9.2.24-8.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829728" version="1" comment="postgresql-static is &lt;9.2.24-8.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829729" version="1" comment="postgresql-test is &lt;9.2.24-8.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829730" version="1" comment="postgresql-upgrade is &lt;9.2.24-8.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714500" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714501" version="1" comment="kgraft-patch-4_12_14-95_88-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714502" version="1" comment="kgraft-patch-4_12_14-95_93-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715338" version="1" comment="kgraft-patch-4_12_14-95_96-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715339" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715340" version="1" comment="kgraft-patch-4_12_14-122_106-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715603" version="1" comment="kgraft-patch-4_12_14-122_110-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714503" version="1" comment="kgraft-patch-4_12_14-122_113-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715341" version="1" comment="kgraft-patch-4_12_14-122_116-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714504" version="1" comment="kgraft-patch-4_12_14-122_121-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715342" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=17-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714505" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=17-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714506" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715811" version="1" comment="kernel-livepatch-4_12_14-150000_150_89-default is &gt;=8-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715604" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=14-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715605" version="1" comment="kernel-livepatch-4_12_14-150_83-default is &gt;=10-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714507" version="1" comment="kernel-livepatch-4_12_14-150_86-default is &gt;=9-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714508" version="1" comment="kernel-livepatch-4_12_14-150100_197_111-default is &gt;=8-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715606" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=14-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714509" version="1" comment="kernel-livepatch-4_12_14-197_105-default is &gt;=10-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715607" version="1" comment="kernel-livepatch-4_12_14-197_108-default is &gt;=9-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716236" version="1" comment="kernel-livepatch-5_3_18-150200_24_112-default is &gt;=8-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716237" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=13-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715812" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=12-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715813" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=17-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715814" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=17-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716238" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=16-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716239" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=15-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716240" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=14-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716157" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=14-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715815" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=14-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714900" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716158" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715608" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715609" version="1" comment="kernel-livepatch-5_3_18-150300_59_63-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716159" version="1" comment="kernel-livepatch-5_3_18-150300_59_68-default is &gt;=7-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715610" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=17-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715611" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=17-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715612" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715816" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=15-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715817" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=15-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714902" version="1" comment="kernel-livepatch-5_14_21-150400_22-default is &gt;=6-150400.4.15.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713723" version="1" comment="kgraft-patch-4_12_14-95_99-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713724" version="1" comment="kgraft-patch-4_12_14-122_121-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713725" version="1" comment="kgraft-patch-4_12_14-122_124-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713726" version="1" comment="kernel-livepatch-4_12_14-150000_150_92-default is &gt;=3-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713727" version="1" comment="kernel-livepatch-4_12_14-150100_197_114-default is &gt;=3-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713728" version="1" comment="kernel-livepatch-5_3_18-150200_24_112-default is &gt;=6-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713729" version="1" comment="kernel-livepatch-5_3_18-150200_24_115-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713730" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=11-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713731" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=10-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713732" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=17-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713733" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=15-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713734" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=15-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713735" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=14-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713736" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=13-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713737" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=12-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713738" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713739" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713740" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713741" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713742" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713743" version="1" comment="kernel-livepatch-5_3_18-150300_59_63-default is &gt;=6-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713744" version="1" comment="kernel-livepatch-5_3_18-150300_59_68-default is &gt;=5-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713745" version="1" comment="kernel-livepatch-5_3_18-150300_59_71-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713746" version="1" comment="kernel-livepatch-5_3_18-150300_59_76-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713747" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=17-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713748" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=15-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713749" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=15-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713750" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=14-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713751" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713752" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713753" version="1" comment="kernel-livepatch-5_14_21-150400_22-default is &gt;=4-150400.4.9.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701141" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=16-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701142" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=11-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701406" version="1" comment="kgraft-patch-4_12_14-95_88-default is &gt;=7-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701144" version="1" comment="kgraft-patch-4_12_14-95_93-default is &gt;=6-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701408" version="1" comment="kgraft-patch-4_12_14-95_96-default is &gt;=5-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701146" version="1" comment="kgraft-patch-4_12_14-95_99-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701409" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=12-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701410" version="1" comment="kgraft-patch-4_12_14-122_106-default is &gt;=10-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701412" version="1" comment="kgraft-patch-4_12_14-122_110-default is &gt;=8-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701414" version="1" comment="kgraft-patch-4_12_14-122_113-default is &gt;=7-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701149" version="1" comment="kgraft-patch-4_12_14-122_116-default is &gt;=5-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701416" version="1" comment="kgraft-patch-4_12_14-122_121-default is &gt;=3-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701417" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=18-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701418" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=17-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701419" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=16-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701420" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=14-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701152" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=14-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701153" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=12-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701422" version="1" comment="kernel-livepatch-4_12_14-150000_150_89-default is &gt;=5-150000.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701423" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=16-150000.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701424" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=11-150000.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701263" version="1" comment="kernel-livepatch-4_12_14-150_83-default is &gt;=7-150000.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701426" version="1" comment="kernel-livepatch-4_12_14-150_86-default is &gt;=6-150000.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701266" version="1" comment="kernel-livepatch-4_12_14-150100_197_111-default is &gt;=5-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701267" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=11-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701429" version="1" comment="kernel-livepatch-4_12_14-197_105-default is &gt;=7-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701269" version="1" comment="kernel-livepatch-4_12_14-197_108-default is &gt;=6-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701430" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=16-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701271" version="1" comment="kernel-livepatch-5_3_18-150200_24_112-default is &gt;=5-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701431" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=10-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701272" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=9-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701432" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=18-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701273" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=17-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701433" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=16-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701274" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=14-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701434" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=14-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701435" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=13-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701275" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=12-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701276" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=11-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701436" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=11-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701437" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=11-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701438" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=10-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701439" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=9-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701440" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=8-150300.3.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701441" version="1" comment="kernel-livepatch-5_3_18-150300_59_63-default is &gt;=5-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701442" version="1" comment="kernel-livepatch-5_3_18-150300_59_68-default is &gt;=4-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701444" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=18-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701445" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=17-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701446" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=16-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701447" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=14-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701448" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=14-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701449" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=13-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701450" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=12-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701451" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=12-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701453" version="1" comment="kernel-livepatch-5_14_21-150400_22-default is &gt;=3-150400.4.6.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829731" version="1" comment="bpftool is &lt;3.10.0-1160.71.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829732" version="1" comment="kernel is &lt;3.10.0-1160.71.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829733" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1160.71.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829734" version="1" comment="kernel-debug is &lt;3.10.0-1160.71.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829737" version="1" comment="kernel-doc is &lt;3.10.0-1160.71.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829738" version="1" comment="kernel-headers is &lt;3.10.0-1160.71.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829739" version="1" comment="kernel-tools is &lt;3.10.0-1160.71.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829740" version="1" comment="kernel-tools-libs is &lt;3.10.0-1160.71.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829742" version="1" comment="perf is &lt;3.10.0-1160.71.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829743" version="1" comment="python-perf is &lt;3.10.0-1160.71.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713754" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713755" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713756" version="1" comment="kgraft-patch-4_12_14-95_88-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713757" version="1" comment="kgraft-patch-4_12_14-95_93-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713758" version="1" comment="kgraft-patch-4_12_14-95_96-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713759" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713760" version="1" comment="kgraft-patch-4_12_14-122_106-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713761" version="1" comment="kgraft-patch-4_12_14-122_110-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713762" version="1" comment="kgraft-patch-4_12_14-122_113-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713763" version="1" comment="kgraft-patch-4_12_14-122_116-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713764" version="1" comment="kgraft-patch-4_12_14-122_121-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713765" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=17-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713766" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=16-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713767" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713768" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713769" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713770" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713771" version="1" comment="kernel-livepatch-4_12_14-150000_150_89-default is &gt;=4-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713772" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=15-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713773" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=10-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713774" version="1" comment="kernel-livepatch-4_12_14-150_83-default is &gt;=6-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713775" version="1" comment="kernel-livepatch-4_12_14-150_86-default is &gt;=5-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713776" version="1" comment="kernel-livepatch-4_12_14-150100_197_111-default is &gt;=4-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713777" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=10-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713778" version="1" comment="kernel-livepatch-4_12_14-197_105-default is &gt;=6-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713779" version="1" comment="kernel-livepatch-4_12_14-197_108-default is &gt;=5-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713780" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=15-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829712" version="1" comment="thunderbird is &lt;91.10.0-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725514" version="1" comment="kernel-livepatch-5_14_21-150400_24_18-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701151" version="1" comment="kgraft-patch-4_12_14-122_124-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701261" version="1" comment="kernel-livepatch-4_12_14-150000_150_92-default is &gt;=2-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701155" version="1" comment="kernel-livepatch-4_12_14-150100_197_114-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701157" version="1" comment="kernel-livepatch-5_3_18-150200_24_115-default is &gt;=3-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829789" version="1" comment="bpftool is &lt;3.10.0-1160.76.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829790" version="1" comment="kernel is &lt;3.10.0-1160.76.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829791" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1160.76.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829792" version="1" comment="kernel-debug is &lt;3.10.0-1160.76.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829795" version="1" comment="kernel-doc is &lt;3.10.0-1160.76.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829796" version="1" comment="kernel-headers is &lt;3.10.0-1160.76.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829797" version="1" comment="kernel-tools is &lt;3.10.0-1160.76.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829798" version="1" comment="kernel-tools-libs is &lt;3.10.0-1160.76.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829800" version="1" comment="perf is &lt;3.10.0-1160.76.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829801" version="1" comment="python-perf is &lt;3.10.0-1160.76.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829545" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.322.b06-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829546" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.322.b06-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829547" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.322.b06-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829548" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.322.b06-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829549" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.322.b06-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829550" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.322.b06-1.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829551" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.322.b06-1.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829552" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.322.b06-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829539" version="1" comment="java-11-openjdk is &lt;11.0.14.0.9-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829540" version="1" comment="java-11-openjdk-devel is &lt;11.0.14.0.9-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829541" version="1" comment="java-11-openjdk-headless is &lt;11.0.14.0.9-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829964" version="1" comment="dpdk is &lt;18.11.8-2.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829965" version="1" comment="dpdk-devel is &lt;18.11.8-2.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829966" version="1" comment="dpdk-doc is &lt;18.11.8-2.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829967" version="1" comment="dpdk-tools is &lt;18.11.8-2.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829662" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.332.b09-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829663" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.332.b09-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829664" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.332.b09-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829665" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.332.b09-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829666" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.332.b09-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829667" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.332.b09-1.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829668" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.332.b09-1.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829669" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.332.b09-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829653" version="1" comment="java-11-openjdk is &lt;11.0.15.0.9-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829654" version="1" comment="java-11-openjdk-demo is &lt;11.0.15.0.9-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829655" version="1" comment="java-11-openjdk-devel is &lt;11.0.15.0.9-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829656" version="1" comment="java-11-openjdk-headless is &lt;11.0.15.0.9-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829657" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.15.0.9-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829658" version="1" comment="java-11-openjdk-javadoc-zip is &lt;11.0.15.0.9-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829659" version="1" comment="java-11-openjdk-jmods is &lt;11.0.15.0.9-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829660" version="1" comment="java-11-openjdk-src is &lt;11.0.15.0.9-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829661" version="1" comment="java-11-openjdk-static-libs is &lt;11.0.15.0.9-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829770" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.342.b07-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829771" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.342.b07-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829772" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.342.b07-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829773" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.342.b07-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829774" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.342.b07-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829775" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.342.b07-1.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829776" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.342.b07-1.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829777" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.342.b07-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829761" version="1" comment="java-11-openjdk is &lt;11.0.16.0.8-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829762" version="1" comment="java-11-openjdk-demo is &lt;11.0.16.0.8-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829763" version="1" comment="java-11-openjdk-devel is &lt;11.0.16.0.8-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829764" version="1" comment="java-11-openjdk-headless is &lt;11.0.16.0.8-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829765" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.16.0.8-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829766" version="1" comment="java-11-openjdk-javadoc-zip is &lt;11.0.16.0.8-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829767" version="1" comment="java-11-openjdk-jmods is &lt;11.0.16.0.8-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829768" version="1" comment="java-11-openjdk-src is &lt;11.0.16.0.8-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829769" version="1" comment="java-11-openjdk-static-libs is &lt;11.0.16.0.8-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829853" version="1" comment="java-11-openjdk is &lt;11.0.17.0.8-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829854" version="1" comment="java-11-openjdk-demo is &lt;11.0.17.0.8-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829855" version="1" comment="java-11-openjdk-devel is &lt;11.0.17.0.8-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829856" version="1" comment="java-11-openjdk-headless is &lt;11.0.17.0.8-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829857" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.17.0.8-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829858" version="1" comment="java-11-openjdk-javadoc-zip is &lt;11.0.17.0.8-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829859" version="1" comment="java-11-openjdk-jmods is &lt;11.0.17.0.8-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829860" version="1" comment="java-11-openjdk-src is &lt;11.0.17.0.8-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829861" version="1" comment="java-11-openjdk-static-libs is &lt;11.0.17.0.8-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829845" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.352.b08-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829846" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.352.b08-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829847" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.352.b08-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829848" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.352.b08-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829849" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.352.b08-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829850" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.352.b08-2.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829851" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.352.b08-2.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829852" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.352.b08-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829756" version="1" comment="firefox is &lt;91.11.0-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829757" version="1" comment="thunderbird is &lt;91.11.0-2.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829624" version="1" comment="httpd is &lt;2.4.6-97.el7_9.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829625" version="1" comment="httpd-devel is &lt;2.4.6-97.el7_9.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829626" version="1" comment="httpd-manual is &lt;2.4.6-97.el7_9.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829627" version="1" comment="httpd-tools is &lt;2.4.6-97.el7_9.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829628" version="1" comment="mod_ldap is &lt;2.4.6-97.el7_9.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829629" version="1" comment="mod_proxy_html is &lt;2.4.6-97.el7_9.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829630" version="1" comment="mod_session is &lt;2.4.6-97.el7_9.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829631" version="1" comment="mod_ssl is &lt;2.4.6-97.el7_9.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829581" version="1" comment="firefox is &lt;91.6.0-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829582" version="1" comment="thunderbird is &lt;91.6.0-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829583" version="1" comment="python-pillow is &lt;2.0.0-23.gitd1c6db8.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829584" version="1" comment="python-pillow-devel is &lt;2.0.0-23.gitd1c6db8.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829585" version="1" comment="python-pillow-doc is &lt;2.0.0-23.gitd1c6db8.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829586" version="1" comment="python-pillow-qt is &lt;2.0.0-23.gitd1c6db8.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829587" version="1" comment="python-pillow-sane is &lt;2.0.0-23.gitd1c6db8.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829588" version="1" comment="python-pillow-tk is &lt;2.0.0-23.gitd1c6db8.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713781" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713782" version="1" comment="kgraft-patch-4_12_14-122_106-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713783" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713784" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713785" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713786" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713787" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713788" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713789" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713790" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713791" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713792" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=6-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713793" version="1" comment="kernel-livepatch-4_12_14-197_105-default is &gt;=3-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713794" version="1" comment="kernel-livepatch-4_12_14-197_108-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713795" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=14-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713796" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=13-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713797" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=11-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829780" version="1" comment="xorg-x11-server-Xdmx is &lt;1.20.4-18.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829781" version="1" comment="xorg-x11-server-Xephyr is &lt;1.20.4-18.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829782" version="1" comment="xorg-x11-server-Xnest is &lt;1.20.4-18.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829783" version="1" comment="xorg-x11-server-Xorg is &lt;1.20.4-18.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829784" version="1" comment="xorg-x11-server-Xvfb is &lt;1.20.4-18.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829785" version="1" comment="xorg-x11-server-Xwayland is &lt;1.20.4-18.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829786" version="1" comment="xorg-x11-server-common is &lt;1.20.4-18.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829787" version="1" comment="xorg-x11-server-devel is &lt;1.20.4-18.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829788" version="1" comment="xorg-x11-server-source is &lt;1.20.4-18.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830075" version="1" comment="emacs-git is &lt;1.8.3.1-24.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830076" version="1" comment="emacs-git-el is &lt;1.8.3.1-24.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830077" version="1" comment="git is &lt;1.8.3.1-24.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830078" version="1" comment="git-all is &lt;1.8.3.1-24.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830079" version="1" comment="git-bzr is &lt;1.8.3.1-24.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830080" version="1" comment="git-cvs is &lt;1.8.3.1-24.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830081" version="1" comment="git-daemon is &lt;1.8.3.1-24.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830082" version="1" comment="git-email is &lt;1.8.3.1-24.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830083" version="1" comment="git-gnome-keyring is &lt;1.8.3.1-24.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830084" version="1" comment="git-gui is &lt;1.8.3.1-24.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830085" version="1" comment="git-hg is &lt;1.8.3.1-24.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830086" version="1" comment="git-instaweb is &lt;1.8.3.1-24.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830087" version="1" comment="git-p4 is &lt;1.8.3.1-24.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830088" version="1" comment="git-svn is &lt;1.8.3.1-24.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830089" version="1" comment="gitk is &lt;1.8.3.1-24.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830090" version="1" comment="gitweb is &lt;1.8.3.1-24.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830091" version="1" comment="perl-Git is &lt;1.8.3.1-24.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830092" version="1" comment="perl-Git-SVN is &lt;1.8.3.1-24.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829885" version="1" comment="bpftool is &lt;3.10.0-1160.80.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829886" version="1" comment="kernel is &lt;3.10.0-1160.80.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829887" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1160.80.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829888" version="1" comment="kernel-debug is &lt;3.10.0-1160.80.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829891" version="1" comment="kernel-doc is &lt;3.10.0-1160.80.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829892" version="1" comment="kernel-headers is &lt;3.10.0-1160.80.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829893" version="1" comment="kernel-tools is &lt;3.10.0-1160.80.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829894" version="1" comment="kernel-tools-libs is &lt;3.10.0-1160.80.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829896" version="1" comment="perf is &lt;3.10.0-1160.80.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829897" version="1" comment="python-perf is &lt;3.10.0-1160.80.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829863" version="1" comment="pki-base is &lt;10.5.18-23.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829864" version="1" comment="pki-base-java is &lt;10.5.18-23.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829865" version="1" comment="pki-ca is &lt;10.5.18-23.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829866" version="1" comment="pki-javadoc is &lt;10.5.18-23.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829867" version="1" comment="pki-kra is &lt;10.5.18-23.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829868" version="1" comment="pki-server is &lt;10.5.18-23.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829869" version="1" comment="pki-symkey is &lt;10.5.18-23.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829870" version="1" comment="pki-tools is &lt;10.5.18-23.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829923" version="1" comment="pki-base is &lt;10.5.18-24.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829924" version="1" comment="pki-base-java is &lt;10.5.18-24.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829925" version="1" comment="pki-ca is &lt;10.5.18-24.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829926" version="1" comment="pki-javadoc is &lt;10.5.18-24.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829927" version="1" comment="pki-kra is &lt;10.5.18-24.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829928" version="1" comment="pki-server is &lt;10.5.18-24.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829929" version="1" comment="pki-symkey is &lt;10.5.18-24.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829930" version="1" comment="pki-tools is &lt;10.5.18-24.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829611" version="1" comment="cyrus-sasl is &lt;2.1.26-24.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829612" version="1" comment="cyrus-sasl-devel is &lt;2.1.26-24.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829613" version="1" comment="cyrus-sasl-gs2 is &lt;2.1.26-24.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829614" version="1" comment="cyrus-sasl-gssapi is &lt;2.1.26-24.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829615" version="1" comment="cyrus-sasl-ldap is &lt;2.1.26-24.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829616" version="1" comment="cyrus-sasl-lib is &lt;2.1.26-24.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829617" version="1" comment="cyrus-sasl-md5 is &lt;2.1.26-24.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829618" version="1" comment="cyrus-sasl-ntlm is &lt;2.1.26-24.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829619" version="1" comment="cyrus-sasl-plain is &lt;2.1.26-24.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829620" version="1" comment="cyrus-sasl-scram is &lt;2.1.26-24.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829621" version="1" comment="cyrus-sasl-sql is &lt;2.1.26-24.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829713" version="1" comment="python-twisted-web is &lt;12.1.0-8.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829693" version="1" comment="rsyslog is &lt;8.24.0-57.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829694" version="1" comment="rsyslog-crypto is &lt;8.24.0-57.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829695" version="1" comment="rsyslog-doc is &lt;8.24.0-57.el7_9.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829696" version="1" comment="rsyslog-elasticsearch is &lt;8.24.0-57.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829697" version="1" comment="rsyslog-gnutls is &lt;8.24.0-57.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829698" version="1" comment="rsyslog-gssapi is &lt;8.24.0-57.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829699" version="1" comment="rsyslog-kafka is &lt;8.24.0-57.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829700" version="1" comment="rsyslog-libdbi is &lt;8.24.0-57.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829701" version="1" comment="rsyslog-mmaudit is &lt;8.24.0-57.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829702" version="1" comment="rsyslog-mmjsonparse is &lt;8.24.0-57.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829703" version="1" comment="rsyslog-mmkubernetes is &lt;8.24.0-57.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829704" version="1" comment="rsyslog-mmnormalize is &lt;8.24.0-57.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829705" version="1" comment="rsyslog-mmsnmptrapd is &lt;8.24.0-57.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829706" version="1" comment="rsyslog-mysql is &lt;8.24.0-57.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829707" version="1" comment="rsyslog-pgsql is &lt;8.24.0-57.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829708" version="1" comment="rsyslog-relp is &lt;8.24.0-57.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829709" version="1" comment="rsyslog-snmp is &lt;8.24.0-57.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829710" version="1" comment="rsyslog-udpspoof is &lt;8.24.0-57.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829779" version="1" comment="firefox is &lt;91.12.0-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829778" version="1" comment="thunderbird is &lt;91.12.0-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830212" version="1" comment="apr-util is &lt;1.5.2-6.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830213" version="1" comment="apr-util-devel is &lt;1.5.2-6.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830214" version="1" comment="apr-util-ldap is &lt;1.5.2-6.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830215" version="1" comment="apr-util-mysql is &lt;1.5.2-6.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830216" version="1" comment="apr-util-nss is &lt;1.5.2-6.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830217" version="1" comment="apr-util-odbc is &lt;1.5.2-6.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830218" version="1" comment="apr-util-openssl is &lt;1.5.2-6.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830219" version="1" comment="apr-util-pgsql is &lt;1.5.2-6.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830220" version="1" comment="apr-util-sqlite is &lt;1.5.2-6.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829622" version="1" comment="firefox is &lt;91.7.0-3.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829802" version="1" comment="libgudev1 is &lt;219-78.el7_9.7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829803" version="1" comment="libgudev1-devel is &lt;219-78.el7_9.7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829804" version="1" comment="systemd is &lt;219-78.el7_9.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829805" version="1" comment="systemd-devel is &lt;219-78.el7_9.7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829806" version="1" comment="systemd-journal-gateway is &lt;219-78.el7_9.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829807" version="1" comment="systemd-libs is &lt;219-78.el7_9.7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829808" version="1" comment="systemd-networkd is &lt;219-78.el7_9.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829809" version="1" comment="systemd-python is &lt;219-78.el7_9.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829810" version="1" comment="systemd-resolved is &lt;219-78.el7_9.7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829811" version="1" comment="systemd-sysv is &lt;219-78.el7_9.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725516" version="1" comment="kgraft-patch-4_12_14-95_105-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725518" version="1" comment="kgraft-patch-4_12_14-122_130-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725520" version="1" comment="kernel-livepatch-4_12_14-150000_150_98-default is &gt;=4-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725522" version="1" comment="kernel-livepatch-4_12_14-150100_197_120-default is &gt;=4-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725524" version="1" comment="kernel-livepatch-5_3_18-150200_24_126-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725526" version="1" comment="kernel-livepatch-5_3_18-150300_59_90-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858415" version="1" comment="grub2 is &lt;2.02-0.87.el7_9.14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858416" version="1" comment="grub2-common is &lt;2.02-0.87.el7_9.14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858417" version="1" comment="grub2-efi-ia32 is &lt;2.02-0.87.el7_9.14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858418" version="1" comment="grub2-efi-ia32-cdboot is &lt;2.02-0.87.el7_9.14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858419" version="1" comment="grub2-efi-ia32-modules is &lt;2.02-0.87.el7_9.14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858420" version="1" comment="grub2-efi-x64 is &lt;2.02-0.87.el7_9.14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858421" version="1" comment="grub2-efi-x64-cdboot is &lt;2.02-0.87.el7_9.14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858422" version="1" comment="grub2-efi-x64-modules is &lt;2.02-0.87.el7_9.14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858423" version="1" comment="grub2-pc is &lt;2.02-0.87.el7_9.14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858424" version="1" comment="grub2-pc-modules is &lt;2.02-0.87.el7_9.14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858425" version="1" comment="grub2-tools is &lt;2.02-0.87.el7_9.14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858426" version="1" comment="grub2-tools-extra is &lt;2.02-0.87.el7_9.14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858427" version="1" comment="grub2-tools-minimal is &lt;2.02-0.87.el7_9.14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737234" version="1" comment="kernel-livepatch-5_3_18-150200_24_112-default is &gt;=12-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737179" version="1" comment="kernel-livepatch-5_3_18-150200_24_115-default is &gt;=10-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737180" version="1" comment="kernel-livepatch-5_3_18-150200_24_126-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737181" version="1" comment="kernel-livepatch-5_3_18-150200_24_129-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737182" version="1" comment="kernel-livepatch-5_3_18-150200_24_134-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737235" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=17-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737236" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=16-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737318" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=18-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729590" version="1" comment="kernel-default is ==5.3.18-150300.59.101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009738271" version="1" comment="kernel-livepatch-5_3_18-150300_59_101-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737319" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=18-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737320" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=18-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737321" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=17-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737610" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737611" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=15-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737612" version="1" comment="kernel-livepatch-5_3_18-150300_59_63-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737322" version="1" comment="kernel-livepatch-5_3_18-150300_59_68-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737323" version="1" comment="kernel-livepatch-5_3_18-150300_59_71-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737324" version="1" comment="kernel-livepatch-5_3_18-150300_59_76-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737364" version="1" comment="kernel-livepatch-5_3_18-150300_59_87-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737238" version="1" comment="kernel-livepatch-5_3_18-150300_59_90-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737239" version="1" comment="kernel-livepatch-5_3_18-150300_59_93-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737365" version="1" comment="kernel-livepatch-5_3_18-150300_59_98-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729113" version="1" comment="kernel-default is &lt;5.3.18-150300.59.98.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737366" version="1" comment="kernel-livepatch-5_14_21-150400_22-default is &gt;=10-150400.4.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737613" version="1" comment="kernel-livepatch-5_14_21-150400_24_11-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737367" version="1" comment="kernel-livepatch-5_14_21-150400_24_18-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009738272" version="1" comment="kernel-livepatch-5_14_21-150400_24_21-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737368" version="1" comment="kernel-livepatch-5_14_21-150400_24_28-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737614" version="1" comment="kernel-livepatch-5_14_21-150400_24_33-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867116" version="1" comment="iwl100-firmware is &lt;39.31.5.1-83.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867117" version="1" comment="iwl1000-firmware is &lt;39.31.5.1-83.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867118" version="1" comment="iwl105-firmware is &lt;18.168.6.1-83.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867119" version="1" comment="iwl135-firmware is &lt;18.168.6.1-83.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867120" version="1" comment="iwl2000-firmware is &lt;18.168.6.1-83.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867121" version="1" comment="iwl2030-firmware is &lt;18.168.6.1-83.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867122" version="1" comment="iwl3160-firmware is &lt;25.30.13.0-83.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867123" version="1" comment="iwl3945-firmware is &lt;15.32.2.9-83.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867124" version="1" comment="iwl4965-firmware is &lt;228.61.2.24-83.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867125" version="1" comment="iwl5000-firmware is &lt;8.83.5.1_1-83.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867126" version="1" comment="iwl5150-firmware is &lt;8.24.2.2-83.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867127" version="1" comment="iwl6000-firmware is &lt;9.221.4.1-83.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867128" version="1" comment="iwl6000g2a-firmware is &lt;18.168.6.1-83.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867129" version="1" comment="iwl6000g2b-firmware is &lt;18.168.6.1-83.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867130" version="1" comment="iwl6050-firmware is &lt;41.28.5.1-83.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867131" version="1" comment="iwl7260-firmware is &lt;25.30.13.0-83.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867132" version="1" comment="linux-firmware is &lt;20200421-83.git78c0348.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713799" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713800" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713801" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713802" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713803" version="1" comment="kgraft-patch-4_12_14-95_88-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713804" version="1" comment="kgraft-patch-4_12_14-95_93-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713805" version="1" comment="kgraft-patch-4_12_14-122_110-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713806" version="1" comment="kgraft-patch-4_12_14-122_113-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713807" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=14-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713808" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=11-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713809" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=6-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713810" version="1" comment="kernel-livepatch-4_12_14-150_83-default is &gt;=3-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713811" version="1" comment="kernel-livepatch-4_12_14-150_86-default is &gt;=2-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829871" version="1" comment="389-ds-base is &lt;1.3.10.2-17.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829872" version="1" comment="389-ds-base-devel is &lt;1.3.10.2-17.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829873" version="1" comment="389-ds-base-libs is &lt;1.3.10.2-17.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829874" version="1" comment="389-ds-base-snmp is &lt;1.3.10.2-17.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829931" version="1" comment="grub2 is &lt;2.02-0.87.el7_9.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829932" version="1" comment="grub2-common is &lt;2.02-0.87.el7_9.11 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829933" version="1" comment="grub2-efi-ia32 is &lt;2.02-0.87.el7_9.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829934" version="1" comment="grub2-efi-ia32-cdboot is &lt;2.02-0.87.el7_9.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829935" version="1" comment="grub2-efi-ia32-modules is &lt;2.02-0.87.el7_9.11 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829936" version="1" comment="grub2-efi-x64 is &lt;2.02-0.87.el7_9.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829937" version="1" comment="grub2-efi-x64-cdboot is &lt;2.02-0.87.el7_9.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829938" version="1" comment="grub2-efi-x64-modules is &lt;2.02-0.87.el7_9.11 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829939" version="1" comment="grub2-pc is &lt;2.02-0.87.el7_9.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829940" version="1" comment="grub2-pc-modules is &lt;2.02-0.87.el7_9.11 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829941" version="1" comment="grub2-tools is &lt;2.02-0.87.el7_9.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829942" version="1" comment="grub2-tools-extra is &lt;2.02-0.87.el7_9.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829943" version="1" comment="grub2-tools-minimal is &lt;2.02-0.87.el7_9.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829813" version="1" comment="rsync is &lt;3.1.2-11.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715614" version="1" comment="kgraft-patch-4_12_14-122_124-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715615" version="1" comment="kgraft-patch-4_12_14-122_127-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715343" version="1" comment="kgraft-patch-4_12_14-122_130-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714903" version="1" comment="kernel-livepatch-4_12_14-150100_197_114-default is &gt;=5-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714904" version="1" comment="kernel-livepatch-4_12_14-150100_197_117-default is &gt;=3-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714905" version="1" comment="kernel-livepatch-4_12_14-150100_197_120-default is &gt;=3-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716160" version="1" comment="kernel-livepatch-5_3_18-150200_24_115-default is &gt;=6-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715818" version="1" comment="kernel-livepatch-5_3_18-150300_59_71-default is &gt;=6-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714906" version="1" comment="kernel-livepatch-5_3_18-150300_59_76-default is &gt;=5-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715344" version="1" comment="kernel-livepatch-5_3_18-150300_59_87-default is &gt;=4-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715616" version="1" comment="kernel-livepatch-5_14_21-150400_24_11-default is &gt;=3-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729566" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=16-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729567" version="1" comment="kgraft-patch-4_12_14-95_88-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729771" version="1" comment="kgraft-patch-4_12_14-95_93-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729491" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=17-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729492" version="1" comment="kgraft-patch-4_12_14-122_106-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729493" version="1" comment="kgraft-patch-4_12_14-122_110-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729494" version="1" comment="kgraft-patch-4_12_14-122_113-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729568" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=17-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729569" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=16-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729570" version="1" comment="kernel-livepatch-4_12_14-150_83-default is &gt;=12-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729571" version="1" comment="kernel-livepatch-4_12_14-150_86-default is &gt;=11-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729496" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=16-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729497" version="1" comment="kernel-livepatch-4_12_14-197_105-default is &gt;=12-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729498" version="1" comment="kernel-livepatch-4_12_14-197_108-default is &gt;=11-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729772" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=16-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729773" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=15-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729774" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=17-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729572" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=17-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729573" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=17-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729499" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729574" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=15-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729500" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=14-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729575" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=19-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729576" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=18-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729577" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=18-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829670" version="1" comment="firefox is &lt;91.9.0-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755119" version="1" comment="kgraft-patch-4_12_14-95_102-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755215" version="1" comment="kgraft-patch-4_12_14-95_105-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755384" version="1" comment="kgraft-patch-4_12_14-95_99-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755120" version="1" comment="kgraft-patch-4_12_14-122_121-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755216" version="1" comment="kgraft-patch-4_12_14-122_124-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755217" version="1" comment="kgraft-patch-4_12_14-122_127-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755121" version="1" comment="kgraft-patch-4_12_14-122_130-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725519" version="1" comment="kernel-default is &lt;4.12.14-122.130.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755218" version="1" comment="kernel-livepatch-4_12_14-150100_197_114-default is &gt;=11-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755219" version="1" comment="kernel-livepatch-4_12_14-150100_197_117-default is &gt;=9-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755220" version="1" comment="kernel-livepatch-4_12_14-150100_197_120-default is &gt;=9-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725523" version="1" comment="kernel-default is &lt;4.12.14-150100.197.120.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755221" version="1" comment="kernel-livepatch-5_3_18-150200_24_115-default is &gt;=13-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755222" version="1" comment="kernel-livepatch-5_3_18-150200_24_126-default is &gt;=10-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725525" version="1" comment="kernel-default is &lt;5.3.18-150200.24.126.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829819" version="1" comment="thunderbird is &lt;102.3.0-3.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713812" version="1" comment="kgraft-patch-4_12_14-95_96-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713813" version="1" comment="kgraft-patch-4_12_14-122_116-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713814" version="1" comment="kernel-livepatch-4_12_14-150000_150_89-default is &gt;=3-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713815" version="1" comment="kernel-livepatch-4_12_14-150100_197_111-default is &gt;=3-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713816" version="1" comment="kernel-livepatch-5_3_18-150200_24_112-default is &gt;=3-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713817" version="1" comment="kernel-livepatch-5_3_18-150300_59_63-default is &gt;=3-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829815" version="1" comment="open-vm-tools is &lt;11.0.5-3.el7_9.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829816" version="1" comment="open-vm-tools-desktop is &lt;11.0.5-3.el7_9.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829817" version="1" comment="open-vm-tools-devel is &lt;11.0.5-3.el7_9.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829818" version="1" comment="open-vm-tools-test is &lt;11.0.5-3.el7_9.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829711" version="1" comment="firefox is &lt;91.10.0-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737240" version="1" comment="kgraft-patch-4_12_14-95_102-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737009" version="1" comment="kgraft-patch-4_12_14-95_105-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714512" version="1" comment="kernel-default is ==4.12.14-95.108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737241" version="1" comment="kgraft-patch-4_12_14-95_108-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729505" version="1" comment="kernel-default is ==4.12.14-95.111.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737242" version="1" comment="kgraft-patch-4_12_14-95_111-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737325" version="1" comment="kgraft-patch-4_12_14-95_88-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737326" version="1" comment="kgraft-patch-4_12_14-95_93-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737369" version="1" comment="kgraft-patch-4_12_14-95_96-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737327" version="1" comment="kgraft-patch-4_12_14-95_99-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737328" version="1" comment="kgraft-patch-4_12_14-122_110-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737329" version="1" comment="kgraft-patch-4_12_14-122_113-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737370" version="1" comment="kgraft-patch-4_12_14-122_116-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737330" version="1" comment="kgraft-patch-4_12_14-122_121-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737331" version="1" comment="kgraft-patch-4_12_14-122_124-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737371" version="1" comment="kgraft-patch-4_12_14-122_127-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737332" version="1" comment="kgraft-patch-4_12_14-122_130-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715347" version="1" comment="kernel-default is ==4.12.14-122.133.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737372" version="1" comment="kgraft-patch-4_12_14-122_133-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729511" version="1" comment="kernel-default is ==4.12.14-122.136.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737333" version="1" comment="kgraft-patch-4_12_14-122_136-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729513" version="1" comment="kernel-default is &lt;4.12.14-122.136.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737244" version="1" comment="kernel-livepatch-4_12_14-150100_197_111-default is &gt;=11-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737183" version="1" comment="kernel-livepatch-4_12_14-150100_197_114-default is &gt;=8-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737184" version="1" comment="kernel-livepatch-4_12_14-150100_197_117-default is &gt;=6-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737185" version="1" comment="kernel-livepatch-4_12_14-150100_197_120-default is &gt;=6-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729104" version="1" comment="kernel-default is ==4.12.14-150100.197.123.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737010" version="1" comment="kernel-livepatch-4_12_14-150100_197_123-default is &gt;=3-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729519" version="1" comment="kernel-default is ==4.12.14-150100.197.126.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737186" version="1" comment="kernel-livepatch-4_12_14-150100_197_126-default is &gt;=3-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737187" version="1" comment="kernel-livepatch-4_12_14-197_105-default is &gt;=13-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737188" version="1" comment="kernel-livepatch-4_12_14-197_108-default is &gt;=12-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725513" version="1" comment="kernel-default is &lt;5.14.21-150400.24.28.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829875" version="1" comment="libksba is &lt;1.3.0-6.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829876" version="1" comment="libksba-devel is &lt;1.3.0-6.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729502" version="1" comment="kgraft-patch-4_12_14-95_102-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729503" version="1" comment="kgraft-patch-4_12_14-95_105-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729504" version="1" comment="kgraft-patch-4_12_14-95_108-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729506" version="1" comment="kgraft-patch-4_12_14-95_111-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729578" version="1" comment="kgraft-patch-4_12_14-95_96-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729097" version="1" comment="kgraft-patch-4_12_14-95_99-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729579" version="1" comment="kgraft-patch-4_12_14-122_116-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729507" version="1" comment="kgraft-patch-4_12_14-122_121-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729508" version="1" comment="kgraft-patch-4_12_14-122_124-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729509" version="1" comment="kgraft-patch-4_12_14-122_127-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729098" version="1" comment="kgraft-patch-4_12_14-122_130-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729510" version="1" comment="kgraft-patch-4_12_14-122_133-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729512" version="1" comment="kgraft-patch-4_12_14-122_136-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729099" version="1" comment="kernel-default is ==4.12.14-150000.150.101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729100" version="1" comment="kernel-livepatch-4_12_14-150000_150_101-default is &gt;=2-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729514" version="1" comment="kernel-default is ==4.12.14-150000.150.104.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729515" version="1" comment="kernel-livepatch-4_12_14-150000_150_104-default is &gt;=2-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729580" version="1" comment="kernel-livepatch-4_12_14-150000_150_89-default is &gt;=10-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729581" version="1" comment="kernel-livepatch-4_12_14-150000_150_92-default is &gt;=7-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729582" version="1" comment="kernel-livepatch-4_12_14-150000_150_95-default is &gt;=5-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729583" version="1" comment="kernel-livepatch-4_12_14-150000_150_98-default is &gt;=5-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729517" version="1" comment="kernel-livepatch-4_12_14-150100_197_111-default is &gt;=10-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729102" version="1" comment="kernel-livepatch-4_12_14-150100_197_114-default is &gt;=7-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729103" version="1" comment="kernel-livepatch-4_12_14-150100_197_117-default is &gt;=5-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729518" version="1" comment="kernel-livepatch-4_12_14-150100_197_120-default is &gt;=5-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729105" version="1" comment="kernel-livepatch-4_12_14-150100_197_123-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729520" version="1" comment="kernel-livepatch-4_12_14-150100_197_126-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729775" version="1" comment="kernel-livepatch-5_3_18-150200_24_112-default is &gt;=11-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729107" version="1" comment="kernel-livepatch-5_3_18-150200_24_115-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729108" version="1" comment="kernel-livepatch-5_3_18-150200_24_126-default is &gt;=6-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729521" version="1" comment="kernel-livepatch-5_3_18-150200_24_129-default is &gt;=3-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729109" version="1" comment="kernel-livepatch-5_3_18-150200_24_134-default is &gt;=3-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729584" version="1" comment="kernel-livepatch-5_3_18-150300_59_63-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729585" version="1" comment="kernel-livepatch-5_3_18-150300_59_68-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729522" version="1" comment="kernel-livepatch-5_3_18-150300_59_71-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729586" version="1" comment="kernel-livepatch-5_3_18-150300_59_76-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729523" version="1" comment="kernel-livepatch-5_3_18-150300_59_87-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729524" version="1" comment="kernel-livepatch-5_3_18-150300_59_90-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729111" version="1" comment="kernel-livepatch-5_3_18-150300_59_93-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729112" version="1" comment="kernel-livepatch-5_3_18-150300_59_98-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729587" version="1" comment="kernel-livepatch-5_14_21-150400_22-default is &gt;=9-150400.4.24.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729114" version="1" comment="kernel-livepatch-5_14_21-150400_24_11-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729115" version="1" comment="kernel-livepatch-5_14_21-150400_24_18-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729588" version="1" comment="kernel-livepatch-5_14_21-150400_24_21-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729589" version="1" comment="kernel-livepatch-5_14_21-150400_24_28-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829901" version="1" comment="xorg-x11-server-Xdmx is &lt;1.20.4-19.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829902" version="1" comment="xorg-x11-server-Xephyr is &lt;1.20.4-19.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829903" version="1" comment="xorg-x11-server-Xnest is &lt;1.20.4-19.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829904" version="1" comment="xorg-x11-server-Xorg is &lt;1.20.4-19.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829905" version="1" comment="xorg-x11-server-Xvfb is &lt;1.20.4-19.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829906" version="1" comment="xorg-x11-server-Xwayland is &lt;1.20.4-19.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829907" version="1" comment="xorg-x11-server-common is &lt;1.20.4-19.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829908" version="1" comment="xorg-x11-server-devel is &lt;1.20.4-19.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829909" version="1" comment="xorg-x11-server-source is &lt;1.20.4-19.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830133" version="1" comment="pesign is &lt;0.109-11.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742686" version="1" comment="kgraft-patch-4_12_14-95_102-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742526" version="1" comment="kgraft-patch-4_12_14-95_105-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742527" version="1" comment="kgraft-patch-4_12_14-95_108-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742528" version="1" comment="kgraft-patch-4_12_14-95_111-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742251" version="1" comment="kernel-default is ==4.12.14-95.114.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742252" version="1" comment="kgraft-patch-4_12_14-95_114-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742529" version="1" comment="kgraft-patch-4_12_14-95_93-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742687" version="1" comment="kgraft-patch-4_12_14-95_96-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742530" version="1" comment="kgraft-patch-4_12_14-95_99-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742531" version="1" comment="kgraft-patch-4_12_14-122_113-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742688" version="1" comment="kgraft-patch-4_12_14-122_116-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742689" version="1" comment="kgraft-patch-4_12_14-122_121-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742532" version="1" comment="kgraft-patch-4_12_14-122_124-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742533" version="1" comment="kgraft-patch-4_12_14-122_127-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742534" version="1" comment="kgraft-patch-4_12_14-122_130-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742690" version="1" comment="kgraft-patch-4_12_14-122_133-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742535" version="1" comment="kgraft-patch-4_12_14-122_136-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729116" version="1" comment="kernel-default is ==4.12.14-122.139.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742254" version="1" comment="kgraft-patch-4_12_14-122_139-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742255" version="1" comment="kernel-default is ==4.12.14-122.144.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742256" version="1" comment="kgraft-patch-4_12_14-122_144-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742257" version="1" comment="kernel-default is &lt;4.12.14-122.144.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742536" version="1" comment="kernel-livepatch-4_12_14-150100_197_111-default is &gt;=12-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742537" version="1" comment="kernel-livepatch-4_12_14-150100_197_114-default is &gt;=9-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742538" version="1" comment="kernel-livepatch-4_12_14-150100_197_117-default is &gt;=7-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742539" version="1" comment="kernel-livepatch-4_12_14-150100_197_120-default is &gt;=7-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742540" version="1" comment="kernel-livepatch-4_12_14-150100_197_123-default is &gt;=4-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742541" version="1" comment="kernel-livepatch-4_12_14-150100_197_126-default is &gt;=4-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742258" version="1" comment="kernel-default is ==4.12.14-150100.197.131.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742259" version="1" comment="kernel-livepatch-4_12_14-150100_197_131-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742542" version="1" comment="kernel-livepatch-4_12_14-197_108-default is &gt;=13-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742691" version="1" comment="kernel-livepatch-5_3_18-150200_24_112-default is &gt;=13-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742543" version="1" comment="kernel-livepatch-5_3_18-150200_24_115-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742544" version="1" comment="kernel-livepatch-5_3_18-150200_24_126-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742545" version="1" comment="kernel-livepatch-5_3_18-150200_24_129-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742546" version="1" comment="kernel-livepatch-5_3_18-150200_24_134-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742261" version="1" comment="kernel-default is ==5.3.18-150200.24.139.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742262" version="1" comment="kernel-livepatch-5_3_18-150200_24_139-default is &gt;=2-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742547" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=17-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737237" version="1" comment="kernel-default is &lt;5.3.18-24.107.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742264" version="1" comment="kernel-livepatch-5_3_18-150300_59_101-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742548" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=17-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742549" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742692" version="1" comment="kernel-livepatch-5_3_18-150300_59_63-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742693" version="1" comment="kernel-livepatch-5_3_18-150300_59_68-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742550" version="1" comment="kernel-livepatch-5_3_18-150300_59_71-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742694" version="1" comment="kernel-livepatch-5_3_18-150300_59_76-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742695" version="1" comment="kernel-livepatch-5_3_18-150300_59_87-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742696" version="1" comment="kernel-livepatch-5_3_18-150300_59_90-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742697" version="1" comment="kernel-livepatch-5_3_18-150300_59_93-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742698" version="1" comment="kernel-livepatch-5_3_18-150300_59_98-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743615" version="1" comment="kernel-livepatch-5_14_21-150400_22-default is &gt;=11-150400.7.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743616" version="1" comment="kernel-livepatch-5_14_21-150400_24_11-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743617" version="1" comment="kernel-livepatch-5_14_21-150400_24_18-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743618" version="1" comment="kernel-livepatch-5_14_21-150400_24_21-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743619" version="1" comment="kernel-livepatch-5_14_21-150400_24_28-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830270" version="1" comment="bpftool is &lt;3.10.0-1160.95.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830271" version="1" comment="kernel is &lt;3.10.0-1160.95.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830272" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1160.95.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830273" version="1" comment="kernel-debug is &lt;3.10.0-1160.95.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830276" version="1" comment="kernel-doc is &lt;3.10.0-1160.95.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830277" version="1" comment="kernel-headers is &lt;3.10.0-1160.95.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830278" version="1" comment="kernel-tools is &lt;3.10.0-1160.95.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830279" version="1" comment="kernel-tools-libs is &lt;3.10.0-1160.95.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830281" version="1" comment="perf is &lt;3.10.0-1160.95.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830282" version="1" comment="python-perf is &lt;3.10.0-1160.95.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037040" version="1" comment="bpftool is &lt;3.10.0-1160.143.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037041" version="1" comment="kernel is &lt;3.10.0-1160.143.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037042" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1160.143.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037043" version="1" comment="kernel-debug is &lt;3.10.0-1160.143.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037046" version="1" comment="kernel-doc is &lt;3.10.0-1160.143.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037047" version="1" comment="kernel-headers is &lt;3.10.0-1160.143.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037048" version="1" comment="kernel-tools is &lt;3.10.0-1160.143.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037049" version="1" comment="kernel-tools-libs is &lt;3.10.0-1160.143.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037051" version="1" comment="perf is &lt;3.10.0-1160.143.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037052" version="1" comment="python-perf is &lt;3.10.0-1160.143.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830134" version="1" comment="minizip is &lt;1.2.7-21.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830135" version="1" comment="minizip-devel is &lt;1.2.7-21.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830136" version="1" comment="zlib is &lt;1.2.7-21.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830137" version="1" comment="zlib-devel is &lt;1.2.7-21.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830138" version="1" comment="zlib-static is &lt;1.2.7-21.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830093" version="1" comment="ctdb is &lt;4.10.16-24.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830094" version="1" comment="ctdb-tests is &lt;4.10.16-24.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830095" version="1" comment="libsmbclient is &lt;4.10.16-24.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830096" version="1" comment="libsmbclient-devel is &lt;4.10.16-24.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830097" version="1" comment="libwbclient is &lt;4.10.16-24.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830098" version="1" comment="libwbclient-devel is &lt;4.10.16-24.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830099" version="1" comment="samba is &lt;4.10.16-24.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830100" version="1" comment="samba-client is &lt;4.10.16-24.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830101" version="1" comment="samba-client-libs is &lt;4.10.16-24.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830102" version="1" comment="samba-common is &lt;4.10.16-24.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830103" version="1" comment="samba-common-libs is &lt;4.10.16-24.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830104" version="1" comment="samba-common-tools is &lt;4.10.16-24.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830105" version="1" comment="samba-dc is &lt;4.10.16-24.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830106" version="1" comment="samba-dc-libs is &lt;4.10.16-24.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830107" version="1" comment="samba-devel is &lt;4.10.16-24.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830108" version="1" comment="samba-krb5-printing is &lt;4.10.16-24.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830109" version="1" comment="samba-libs is &lt;4.10.16-24.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830110" version="1" comment="samba-pidl is &lt;4.10.16-24.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830111" version="1" comment="samba-python is &lt;4.10.16-24.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830112" version="1" comment="samba-python-test is &lt;4.10.16-24.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830113" version="1" comment="samba-test is &lt;4.10.16-24.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830114" version="1" comment="samba-test-libs is &lt;4.10.16-24.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830115" version="1" comment="samba-vfs-glusterfs is &lt;4.10.16-24.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830116" version="1" comment="samba-winbind is &lt;4.10.16-24.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830117" version="1" comment="samba-winbind-clients is &lt;4.10.16-24.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830118" version="1" comment="samba-winbind-krb5-locator is &lt;4.10.16-24.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830119" version="1" comment="samba-winbind-modules is &lt;4.10.16-24.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829821" version="1" comment="bind is &lt;9.11.4-26.P2.el7_9.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829822" version="1" comment="bind-chroot is &lt;9.11.4-26.P2.el7_9.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829823" version="1" comment="bind-devel is &lt;9.11.4-26.P2.el7_9.10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829824" version="1" comment="bind-export-devel is &lt;9.11.4-26.P2.el7_9.10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829825" version="1" comment="bind-export-libs is &lt;9.11.4-26.P2.el7_9.10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829826" version="1" comment="bind-libs is &lt;9.11.4-26.P2.el7_9.10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829827" version="1" comment="bind-libs-lite is &lt;9.11.4-26.P2.el7_9.10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829828" version="1" comment="bind-license is &lt;9.11.4-26.P2.el7_9.10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829829" version="1" comment="bind-lite-devel is &lt;9.11.4-26.P2.el7_9.10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829830" version="1" comment="bind-pkcs11 is &lt;9.11.4-26.P2.el7_9.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829831" version="1" comment="bind-pkcs11-devel is &lt;9.11.4-26.P2.el7_9.10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829832" version="1" comment="bind-pkcs11-libs is &lt;9.11.4-26.P2.el7_9.10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829833" version="1" comment="bind-pkcs11-utils is &lt;9.11.4-26.P2.el7_9.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829834" version="1" comment="bind-sdb is &lt;9.11.4-26.P2.el7_9.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829835" version="1" comment="bind-sdb-chroot is &lt;9.11.4-26.P2.el7_9.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829836" version="1" comment="bind-utils is &lt;9.11.4-26.P2.el7_9.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829814" version="1" comment="firefox is &lt;91.13.0-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829812" version="1" comment="thunderbird is &lt;91.13.0-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715346" version="1" comment="kgraft-patch-4_12_14-95_102-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714511" version="1" comment="kgraft-patch-4_12_14-95_105-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714513" version="1" comment="kgraft-patch-4_12_14-95_108-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714514" version="1" comment="kgraft-patch-4_12_14-95_99-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715348" version="1" comment="kgraft-patch-4_12_14-122_133-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714515" version="1" comment="kernel-livepatch-4_12_14-150000_150_92-default is &gt;=5-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715618" version="1" comment="kernel-livepatch-4_12_14-150000_150_95-default is &gt;=3-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714516" version="1" comment="kernel-livepatch-4_12_14-150000_150_98-default is &gt;=3-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715619" version="1" comment="kernel-livepatch-5_14_21-150400_24_18-default is &gt;=3-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718699" version="1" comment="kernel-livepatch-5_3_18-150200_24_112-default is &gt;=9-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718700" version="1" comment="kernel-livepatch-5_3_18-150200_24_115-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718701" version="1" comment="kernel-livepatch-5_3_18-150200_24_126-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718702" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=14-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718703" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=13-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718704" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=18-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718705" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=17-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718706" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=16-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718707" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=15-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718708" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=15-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718709" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=15-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718710" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=14-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718860" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718711" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718712" version="1" comment="kernel-livepatch-5_3_18-150300_59_63-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718713" version="1" comment="kernel-livepatch-5_3_18-150300_59_68-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718714" version="1" comment="kernel-livepatch-5_3_18-150300_59_71-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718715" version="1" comment="kernel-livepatch-5_3_18-150300_59_76-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718716" version="1" comment="kernel-livepatch-5_3_18-150300_59_87-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718717" version="1" comment="kernel-livepatch-5_3_18-150300_59_90-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718368" version="1" comment="kernel-livepatch-5_3_18-150300_59_93-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718718" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=18-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718719" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=17-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718720" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718721" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718722" version="1" comment="kernel-livepatch-5_14_21-150400_22-default is &gt;=7-150400.4.18.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718723" version="1" comment="kernel-livepatch-5_14_21-150400_24_11-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718370" version="1" comment="kernel-livepatch-5_14_21-150400_24_18-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718371" version="1" comment="kernel-livepatch-5_14_21-150400_24_21-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715602" version="1" comment="kernel-default is &lt;5.14.21-150400.24.21.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829877" version="1" comment="thunderbird is &lt;102.4.0-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829840" version="1" comment="expat is &lt;2.1.0-15.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829841" version="1" comment="expat-devel is &lt;2.1.0-15.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829842" version="1" comment="expat-static is &lt;2.1.0-15.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829843" version="1" comment="firefox is &lt;102.3.0-7.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829844" version="1" comment="thunderbird is &lt;102.3.0-4.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829820" version="1" comment="firefox is &lt;102.3.0-6.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830450" version="1" comment="bpftool is &lt;3.10.0-1160.105.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830451" version="1" comment="kernel is &lt;3.10.0-1160.105.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830452" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1160.105.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830453" version="1" comment="kernel-debug is &lt;3.10.0-1160.105.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830456" version="1" comment="kernel-doc is &lt;3.10.0-1160.105.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830457" version="1" comment="kernel-headers is &lt;3.10.0-1160.105.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830458" version="1" comment="kernel-tools is &lt;3.10.0-1160.105.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830459" version="1" comment="kernel-tools-libs is &lt;3.10.0-1160.105.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830461" version="1" comment="perf is &lt;3.10.0-1160.105.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830462" version="1" comment="python-perf is &lt;3.10.0-1160.105.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829837" version="1" comment="squid is &lt;3.5.20-17.el7_9.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829838" version="1" comment="squid-migration-script is &lt;3.5.20-17.el7_9.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829839" version="1" comment="squid-sysvinit is &lt;3.5.20-17.el7_9.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729591" version="1" comment="kernel-livepatch-5_3_18-150300_59_101-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829912" version="1" comment="hsqldb is &lt;1.8.1.3-15.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829913" version="1" comment="hsqldb-demo is &lt;1.8.1.3-15.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829914" version="1" comment="hsqldb-javadoc is &lt;1.8.1.3-15.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829915" version="1" comment="hsqldb-manual is &lt;1.8.1.3-15.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829878" version="1" comment="device-mapper-multipath is &lt;0.4.9-136.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829879" version="1" comment="device-mapper-multipath-devel is &lt;0.4.9-136.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829880" version="1" comment="device-mapper-multipath-libs is &lt;0.4.9-136.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829881" version="1" comment="device-mapper-multipath-sysvinit is &lt;0.4.9-136.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829882" version="1" comment="kpartx is &lt;0.4.9-136.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829883" version="1" comment="libdmmp is &lt;0.4.9-136.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829884" version="1" comment="libdmmp-devel is &lt;0.4.9-136.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830019" version="1" comment="libipa_hbac is &lt;1.16.5-10.el7_9.15 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830020" version="1" comment="libipa_hbac-devel is &lt;1.16.5-10.el7_9.15 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830021" version="1" comment="libsss_autofs is &lt;1.16.5-10.el7_9.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830022" version="1" comment="libsss_certmap is &lt;1.16.5-10.el7_9.15 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830023" version="1" comment="libsss_certmap-devel is &lt;1.16.5-10.el7_9.15 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830024" version="1" comment="libsss_idmap is &lt;1.16.5-10.el7_9.15 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830025" version="1" comment="libsss_idmap-devel is &lt;1.16.5-10.el7_9.15 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830026" version="1" comment="libsss_nss_idmap is &lt;1.16.5-10.el7_9.15 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830027" version="1" comment="libsss_nss_idmap-devel is &lt;1.16.5-10.el7_9.15 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830028" version="1" comment="libsss_simpleifp is &lt;1.16.5-10.el7_9.15 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830029" version="1" comment="libsss_simpleifp-devel is &lt;1.16.5-10.el7_9.15 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830030" version="1" comment="libsss_sudo is &lt;1.16.5-10.el7_9.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830031" version="1" comment="python-libipa_hbac is &lt;1.16.5-10.el7_9.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830032" version="1" comment="python-libsss_nss_idmap is &lt;1.16.5-10.el7_9.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830033" version="1" comment="python-sss is &lt;1.16.5-10.el7_9.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830034" version="1" comment="python-sss-murmur is &lt;1.16.5-10.el7_9.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830035" version="1" comment="python-sssdconfig is &lt;1.16.5-10.el7_9.15 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830036" version="1" comment="sssd is &lt;1.16.5-10.el7_9.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830037" version="1" comment="sssd-ad is &lt;1.16.5-10.el7_9.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830038" version="1" comment="sssd-client is &lt;1.16.5-10.el7_9.15 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830039" version="1" comment="sssd-common is &lt;1.16.5-10.el7_9.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830040" version="1" comment="sssd-common-pac is &lt;1.16.5-10.el7_9.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830041" version="1" comment="sssd-dbus is &lt;1.16.5-10.el7_9.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830042" version="1" comment="sssd-ipa is &lt;1.16.5-10.el7_9.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830043" version="1" comment="sssd-kcm is &lt;1.16.5-10.el7_9.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830044" version="1" comment="sssd-krb5 is &lt;1.16.5-10.el7_9.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830045" version="1" comment="sssd-krb5-common is &lt;1.16.5-10.el7_9.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830046" version="1" comment="sssd-ldap is &lt;1.16.5-10.el7_9.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830047" version="1" comment="sssd-libwbclient is &lt;1.16.5-10.el7_9.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830048" version="1" comment="sssd-libwbclient-devel is &lt;1.16.5-10.el7_9.15 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830049" version="1" comment="sssd-polkit-rules is &lt;1.16.5-10.el7_9.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830050" version="1" comment="sssd-proxy is &lt;1.16.5-10.el7_9.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830051" version="1" comment="sssd-tools is &lt;1.16.5-10.el7_9.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830052" version="1" comment="sssd-winbind-idmap is &lt;1.16.5-10.el7_9.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830120" version="1" comment="bpftool is &lt;3.10.0-1160.88.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830121" version="1" comment="kernel is &lt;3.10.0-1160.88.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830122" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1160.88.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830123" version="1" comment="kernel-debug is &lt;3.10.0-1160.88.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830126" version="1" comment="kernel-doc is &lt;3.10.0-1160.88.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830127" version="1" comment="kernel-headers is &lt;3.10.0-1160.88.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830128" version="1" comment="kernel-tools is &lt;3.10.0-1160.88.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830129" version="1" comment="kernel-tools-libs is &lt;3.10.0-1160.88.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830131" version="1" comment="perf is &lt;3.10.0-1160.88.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830132" version="1" comment="python-perf is &lt;3.10.0-1160.88.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725528" version="1" comment="kernel-livepatch-5_3_18-150300_59_93-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725256" version="1" comment="kernel-livepatch-5_14_21-150400_24_21-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829948" version="1" comment="tigervnc is &lt;1.8.0-23.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829949" version="1" comment="tigervnc-icons is &lt;1.8.0-23.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829950" version="1" comment="tigervnc-license is &lt;1.8.0-23.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829951" version="1" comment="tigervnc-server is &lt;1.8.0-23.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829952" version="1" comment="tigervnc-server-applet is &lt;1.8.0-23.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829953" version="1" comment="tigervnc-server-minimal is &lt;1.8.0-23.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829954" version="1" comment="tigervnc-server-module is &lt;1.8.0-23.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829955" version="1" comment="xorg-x11-server-Xdmx is &lt;1.20.4-21.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829956" version="1" comment="xorg-x11-server-Xephyr is &lt;1.20.4-21.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829957" version="1" comment="xorg-x11-server-Xnest is &lt;1.20.4-21.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829958" version="1" comment="xorg-x11-server-Xorg is &lt;1.20.4-21.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829959" version="1" comment="xorg-x11-server-Xvfb is &lt;1.20.4-21.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829960" version="1" comment="xorg-x11-server-Xwayland is &lt;1.20.4-21.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829961" version="1" comment="xorg-x11-server-common is &lt;1.20.4-21.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829962" version="1" comment="xorg-x11-server-devel is &lt;1.20.4-21.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829963" version="1" comment="xorg-x11-server-source is &lt;1.20.4-21.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851792" version="1" comment="bpftool is &lt;3.10.0-1160.114.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851793" version="1" comment="kernel is &lt;3.10.0-1160.114.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851794" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1160.114.2.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851795" version="1" comment="kernel-debug is &lt;3.10.0-1160.114.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851798" version="1" comment="kernel-doc is &lt;3.10.0-1160.114.2.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851799" version="1" comment="kernel-headers is &lt;3.10.0-1160.114.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851800" version="1" comment="kernel-tools is &lt;3.10.0-1160.114.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851801" version="1" comment="kernel-tools-libs is &lt;3.10.0-1160.114.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851803" version="1" comment="perf is &lt;3.10.0-1160.114.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851804" version="1" comment="python-perf is &lt;3.10.0-1160.114.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829916" version="1" comment="krb5-devel is &lt;1.15.1-55.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829917" version="1" comment="krb5-libs is &lt;1.15.1-55.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829918" version="1" comment="krb5-pkinit is &lt;1.15.1-55.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829919" version="1" comment="krb5-server is &lt;1.15.1-55.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829920" version="1" comment="krb5-server-ldap is &lt;1.15.1-55.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829921" version="1" comment="krb5-workstation is &lt;1.15.1-55.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829922" version="1" comment="libkadm5 is &lt;1.15.1-55.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829944" version="1" comment="bcel is &lt;5.2-19.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829945" version="1" comment="bcel-javadoc is &lt;5.2-19.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829862" version="1" comment="firefox is &lt;102.4.0-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830489" version="1" comment="curl is &lt;7.29.0-59.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830490" version="1" comment="libcurl is &lt;7.29.0-59.el7_9.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830491" version="1" comment="libcurl-devel is &lt;7.29.0-59.el7_9.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830194" version="1" comment="bpftool is &lt;3.10.0-1160.90.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830195" version="1" comment="kernel is &lt;3.10.0-1160.90.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830196" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1160.90.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830197" version="1" comment="kernel-debug is &lt;3.10.0-1160.90.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830200" version="1" comment="kernel-doc is &lt;3.10.0-1160.90.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830201" version="1" comment="kernel-headers is &lt;3.10.0-1160.90.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830202" version="1" comment="kernel-tools is &lt;3.10.0-1160.90.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830203" version="1" comment="kernel-tools-libs is &lt;3.10.0-1160.90.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830205" version="1" comment="perf is &lt;3.10.0-1160.90.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830206" version="1" comment="python-perf is &lt;3.10.0-1160.90.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729117" version="1" comment="kgraft-patch-4_12_14-122_139-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737373" version="1" comment="kernel-default is ==5.14.21-150400.24.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737374" version="1" comment="kernel-livepatch-5_14_21-150400_24_38-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737375" version="1" comment="kernel-default is &lt;5.14.21-150400.24.38.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829910" version="1" comment="firefox is &lt;102.5.0-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829911" version="1" comment="thunderbird is &lt;102.5.0-2.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829947" version="1" comment="thunderbird is &lt;102.6.0-2.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829987" version="1" comment="firefox is &lt;102.7.0-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830053" version="1" comment="thunderbird is &lt;102.7.1-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829946" version="1" comment="firefox is &lt;102.6.0-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769980" version="1" comment="kernel-livepatch-5_3_18-150200_24_126-default is &gt;=12-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769981" version="1" comment="kernel-livepatch-5_3_18-150200_24_129-default is &gt;=9-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769982" version="1" comment="kernel-livepatch-5_3_18-150200_24_134-default is &gt;=9-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770206" version="1" comment="kernel-livepatch-5_3_18-150200_24_139-default is &gt;=6-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751206" version="1" comment="kernel-default is ==5.3.18-150200.24.142.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769983" version="1" comment="kernel-livepatch-5_3_18-150200_24_142-default is &gt;=5-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751208" version="1" comment="kernel-default is ==5.3.18-150200.24.145.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769984" version="1" comment="kernel-livepatch-5_3_18-150200_24_145-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751210" version="1" comment="kernel-default is &lt;5.3.18-150200.24.145.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770207" version="1" comment="kernel-livepatch-5_3_18-150300_59_101-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742266" version="1" comment="kernel-default is ==5.3.18-150300.59.106.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770208" version="1" comment="kernel-livepatch-5_3_18-150300_59_106-default is &gt;=6-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742711" version="1" comment="kernel-default is ==5.3.18-150300.59.109.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770209" version="1" comment="kernel-livepatch-5_3_18-150300_59_109-default is &gt;=6-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751212" version="1" comment="kernel-default is ==5.3.18-150300.59.112.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770210" version="1" comment="kernel-livepatch-5_3_18-150300_59_112-default is &gt;=5-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751214" version="1" comment="kernel-default is ==5.3.18-150300.59.115.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769985" version="1" comment="kernel-livepatch-5_3_18-150300_59_115-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770211" version="1" comment="kernel-livepatch-5_3_18-150300_59_76-default is &gt;=14-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770251" version="1" comment="kernel-livepatch-5_3_18-150300_59_87-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770212" version="1" comment="kernel-livepatch-5_3_18-150300_59_90-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770213" version="1" comment="kernel-livepatch-5_3_18-150300_59_93-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770214" version="1" comment="kernel-livepatch-5_3_18-150300_59_98-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770252" version="1" comment="kernel-livepatch-5_14_21-150400_24_11-default is &gt;=12-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770215" version="1" comment="kernel-livepatch-5_14_21-150400_24_18-default is &gt;=12-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830054" version="1" comment="libksba is &lt;1.3.0-7.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830055" version="1" comment="libksba-devel is &lt;1.3.0-7.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830240" version="1" comment="emacs is &lt;24.3-23.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830241" version="1" comment="emacs-common is &lt;24.3-23.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830242" version="1" comment="emacs-el is &lt;24.3-23.el7_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830243" version="1" comment="emacs-filesystem is &lt;24.3-23.el7_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830244" version="1" comment="emacs-nox is &lt;24.3-23.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830245" version="1" comment="emacs-terminal is &lt;24.3-23.el7_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770229" version="1" comment="kernel-default is ==4.12.14-122.159.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861619" version="1" comment="kgraft-patch-4_12_14-122_159-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861620" version="1" comment="kgraft-patch-4_12_14-122_162-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861621" version="1" comment="kgraft-patch-4_12_14-122_165-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861741" version="1" comment="kgraft-patch-4_12_14-122_173-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861622" version="1" comment="kgraft-patch-4_12_14-122_176-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861623" version="1" comment="kgraft-patch-4_12_14-122_179-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861624" version="1" comment="kgraft-patch-4_12_14-122_183-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861625" version="1" comment="kgraft-patch-4_12_14-122_186-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861626" version="1" comment="kgraft-patch-4_12_14-122_189-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861742" version="1" comment="kgraft-patch-4_12_14-122_194-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854322" version="1" comment="kernel-default is &lt;4.12.14-122.201.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764737" version="1" comment="kernel-default is ==5.3.18-150200.24.151.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861743" version="1" comment="kernel-livepatch-5_3_18-150200_24_151-default is &gt;=14-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861744" version="1" comment="kernel-livepatch-5_3_18-150200_24_154-default is &gt;=12-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861745" version="1" comment="kernel-livepatch-5_3_18-150200_24_157-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861746" version="1" comment="kernel-livepatch-5_3_18-150200_24_160-default is &gt;=10-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861747" version="1" comment="kernel-livepatch-5_3_18-150200_24_163-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861844" version="1" comment="kernel-livepatch-5_3_18-150200_24_166-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861748" version="1" comment="kernel-livepatch-5_3_18-150200_24_169-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861749" version="1" comment="kernel-livepatch-5_3_18-150200_24_172-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861750" version="1" comment="kernel-livepatch-5_3_18-150200_24_175-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861751" version="1" comment="kernel-livepatch-5_3_18-150200_24_178-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764740" version="1" comment="kernel-default is ==5.3.18-150300.59.121.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861756" version="1" comment="kernel-livepatch-5_3_18-150300_59_121-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861757" version="1" comment="kernel-livepatch-5_3_18-150300_59_124-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861758" version="1" comment="kernel-livepatch-5_3_18-150300_59_127-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861759" version="1" comment="kernel-livepatch-5_3_18-150300_59_130-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861760" version="1" comment="kernel-livepatch-5_3_18-150300_59_133-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861628" version="1" comment="kernel-livepatch-5_3_18-150300_59_138-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861629" version="1" comment="kernel-livepatch-5_3_18-150300_59_141-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861845" version="1" comment="kernel-livepatch-5_3_18-150300_59_144-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861846" version="1" comment="kernel-livepatch-5_3_18-150300_59_147-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861630" version="1" comment="kernel-livepatch-5_3_18-150300_59_150-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861764" version="1" comment="kernel-livepatch-5_14_21-150400_24_100-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861765" version="1" comment="kernel-livepatch-5_14_21-150400_24_103-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764673" version="1" comment="kernel-default is ==5.14.21-150400.24.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861766" version="1" comment="kernel-livepatch-5_14_21-150400_24_60-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764743" version="1" comment="kernel-default is ==5.14.21-150400.24.63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861852" version="1" comment="kernel-livepatch-5_14_21-150400_24_63-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776036" version="1" comment="kernel-default is ==5.14.21-150400.24.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861853" version="1" comment="kernel-livepatch-5_14_21-150400_24_66-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796010" version="1" comment="kernel-default is ==5.14.21-150400.24.69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861767" version="1" comment="kernel-livepatch-5_14_21-150400_24_69-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796012" version="1" comment="kernel-default is ==5.14.21-150400.24.74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861854" version="1" comment="kernel-livepatch-5_14_21-150400_24_74-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799692" version="1" comment="kernel-default is ==5.14.21-150400.24.81.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861855" version="1" comment="kernel-livepatch-5_14_21-150400_24_81-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861768" version="1" comment="kernel-livepatch-5_14_21-150400_24_88-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861856" version="1" comment="kernel-livepatch-5_14_21-150400_24_92-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861769" version="1" comment="kernel-livepatch-5_14_21-150400_24_97-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877783" version="1" comment="kernel-rt is ==5.14.21-150500.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861770" version="1" comment="kernel-livepatch-5_14_21-150500_11-rt is &gt;=13-150500.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776034" version="1" comment="kernel-default is ==5.14.21-150500.53.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861857" version="1" comment="kernel-livepatch-5_14_21-150500_53-default is &gt;=12-150500.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796015" version="1" comment="kernel-default is ==5.14.21-150500.55.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861858" version="1" comment="kernel-livepatch-5_14_21-150500_55_12-default is &gt;=11-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799694" version="1" comment="kernel-default is ==5.14.21-150500.55.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861859" version="1" comment="kernel-livepatch-5_14_21-150500_55_19-default is &gt;=10-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861860" version="1" comment="kernel-livepatch-5_14_21-150500_55_28-default is &gt;=9-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861861" version="1" comment="kernel-livepatch-5_14_21-150500_55_31-default is &gt;=8-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861862" version="1" comment="kernel-livepatch-5_14_21-150500_55_36-default is &gt;=7-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861634" version="1" comment="kernel-livepatch-5_14_21-150500_55_39-default is &gt;=7-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861863" version="1" comment="kernel-livepatch-5_14_21-150500_55_44-default is &gt;=6-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796017" version="1" comment="kernel-default is ==5.14.21-150500.55.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861775" version="1" comment="kernel-livepatch-5_14_21-150500_55_7-default is &gt;=11-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796019" version="1" comment="kernel-default is &lt;5.14.21-150500.55.7.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944105" version="1" comment="kernel-livepatch-5_14_21-150400_24_100-default is &gt;=11-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944106" version="1" comment="kernel-livepatch-5_14_21-150400_24_103-default is &gt;=9-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944081" version="1" comment="kernel-livepatch-5_14_21-150400_24_81-default is &gt;=14-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944429" version="1" comment="kernel-livepatch-5_14_21-150400_24_88-default is &gt;=13-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944082" version="1" comment="kernel-livepatch-5_14_21-150400_24_92-default is &gt;=12-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944107" version="1" comment="kernel-livepatch-5_14_21-150400_24_97-default is &gt;=11-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944108" version="1" comment="kernel-livepatch-5_14_21-150500_55_19-default is &gt;=14-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944109" version="1" comment="kernel-livepatch-5_14_21-150500_55_28-default is &gt;=13-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944110" version="1" comment="kernel-livepatch-5_14_21-150500_55_31-default is &gt;=12-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944111" version="1" comment="kernel-livepatch-5_14_21-150500_55_36-default is &gt;=11-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944112" version="1" comment="kernel-livepatch-5_14_21-150500_55_39-default is &gt;=11-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944113" version="1" comment="kernel-livepatch-5_14_21-150500_55_44-default is &gt;=10-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943397" version="1" comment="kernel-default is &lt;5.14.21-150500.55.59.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960110" version="1" comment="kgraft-patch-4_12_14-122_186-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960111" version="1" comment="kgraft-patch-4_12_14-122_189-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960112" version="1" comment="kgraft-patch-4_12_14-122_194-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868197" version="1" comment="kernel-livepatch-5_14_21-150500_11-rt is &gt;=14-150500.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868931" version="1" comment="kernel-livepatch-5_14_21-150500_53-default is &gt;=13-150500.9.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009765681" version="1" comment="kernel-default is &lt;5.14.21-150500.53.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022317" version="1" comment="bpftool is &lt;3.10.0-1160.141.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022318" version="1" comment="kernel is &lt;3.10.0-1160.141.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022319" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1160.141.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022320" version="1" comment="kernel-debug is &lt;3.10.0-1160.141.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022323" version="1" comment="kernel-doc is &lt;3.10.0-1160.141.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022324" version="1" comment="kernel-headers is &lt;3.10.0-1160.141.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022325" version="1" comment="kernel-tools is &lt;3.10.0-1160.141.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022326" version="1" comment="kernel-tools-libs is &lt;3.10.0-1160.141.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022328" version="1" comment="perf is &lt;3.10.0-1160.141.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022329" version="1" comment="python-perf is &lt;3.10.0-1160.141.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970722" version="1" comment="kgraft-patch-4_12_14-122_201-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970723" version="1" comment="kgraft-patch-4_12_14-122_216-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878540" version="1" comment="kernel-default is ==4.12.14-122.219.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970724" version="1" comment="kgraft-patch-4_12_14-122_219-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947540" version="1" comment="kernel-default is ==4.12.14-122.222.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970725" version="1" comment="kgraft-patch-4_12_14-122_222-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956559" version="1" comment="kernel-default is ==4.12.14-122.225.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970726" version="1" comment="kgraft-patch-4_12_14-122_225-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960515" version="1" comment="kernel-default is ==4.12.14-122.228.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970727" version="1" comment="kgraft-patch-4_12_14-122_228-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968261" version="1" comment="kernel-default is &lt;4.12.14-122.228.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974048" version="1" comment="kernel-livepatch-5_3_18-150300_59_153-default is &gt;=16-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974049" version="1" comment="kernel-livepatch-5_3_18-150300_59_158-default is &gt;=15-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974166" version="1" comment="kernel-livepatch-5_3_18-150300_59_161-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974167" version="1" comment="kernel-livepatch-5_3_18-150300_59_164-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974050" version="1" comment="kernel-livepatch-5_3_18-150300_59_167-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956871" version="1" comment="kernel-default is ==5.3.18-150300.59.170.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974168" version="1" comment="kernel-livepatch-5_3_18-150300_59_170-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956873" version="1" comment="kernel-default is &lt;5.3.18-150300.59.170.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968254" version="1" comment="kgraft-patch-4_12_14-122_194-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968255" version="1" comment="kgraft-patch-4_12_14-122_219-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968256" version="1" comment="kgraft-patch-4_12_14-122_222-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947542" version="1" comment="kernel-default is &lt;4.12.14-122.222.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968257" version="1" comment="kernel-livepatch-5_3_18-150300_59_164-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968258" version="1" comment="kernel-livepatch-5_3_18-150300_59_167-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829988" version="1" comment="libXpm is &lt;3.5.12-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829989" version="1" comment="libXpm-devel is &lt;3.5.12-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968259" version="1" comment="kgraft-patch-4_12_14-122_225-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968260" version="1" comment="kgraft-patch-4_12_14-122_228-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968262" version="1" comment="kernel-livepatch-5_3_18-150300_59_170-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960520" version="1" comment="kernel-default is ==5.3.18-150300.59.174.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968263" version="1" comment="kernel-livepatch-5_3_18-150300_59_174-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961325" version="1" comment="kernel-default is &lt;5.3.18-150300.59.174.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968264" version="1" comment="kernel-livepatch-5_14_21-150400_24_108-default is &gt;=16-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968265" version="1" comment="kernel-livepatch-5_14_21-150400_24_111-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968266" version="1" comment="kernel-livepatch-5_14_21-150400_24_116-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968267" version="1" comment="kernel-livepatch-5_14_21-150400_24_119-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968268" version="1" comment="kernel-livepatch-5_14_21-150400_24_122-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968269" version="1" comment="kernel-livepatch-5_14_21-150400_24_125-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957147" version="1" comment="kernel-default is ==5.14.21-150400.24.128.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968270" version="1" comment="kernel-livepatch-5_14_21-150400_24_128-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960526" version="1" comment="kernel-default is ==5.14.21-150400.24.133.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968271" version="1" comment="kernel-livepatch-5_14_21-150400_24_133-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963660" version="1" comment="kernel-default is &lt;5.14.21-150400.24.133.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968272" version="1" comment="kernel-livepatch-5_14_21-150500_55_49-default is &gt;=16-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968273" version="1" comment="kernel-livepatch-5_14_21-150500_55_52-default is &gt;=14-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968274" version="1" comment="kernel-livepatch-5_14_21-150500_55_59-default is &gt;=14-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968275" version="1" comment="kernel-livepatch-5_14_21-150500_55_62-default is &gt;=12-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968276" version="1" comment="kernel-livepatch-5_14_21-150500_55_65-default is &gt;=12-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968277" version="1" comment="kernel-livepatch-5_14_21-150500_55_68-default is &gt;=11-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968278" version="1" comment="kernel-livepatch-5_14_21-150500_55_73-default is &gt;=6-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960532" version="1" comment="kernel-default is ==5.14.21-150500.55.80.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968279" version="1" comment="kernel-livepatch-5_14_21-150500_55_80-default is &gt;=5-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968280" version="1" comment="kernel-default is &lt;5.14.21-150500.55.80.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963652" version="1" comment="kernel-livepatch-5_3_18-150300_59_147-default is &gt;=17-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963347" version="1" comment="kernel-livepatch-5_3_18-150300_59_150-default is &gt;=16-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963348" version="1" comment="kernel-livepatch-5_3_18-150300_59_153-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963349" version="1" comment="kernel-livepatch-5_3_18-150300_59_158-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963350" version="1" comment="kernel-livepatch-5_3_18-150300_59_161-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963653" version="1" comment="kernel-livepatch-5_3_18-150300_59_164-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963351" version="1" comment="kernel-livepatch-5_3_18-150300_59_167-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963352" version="1" comment="kernel-livepatch-5_3_18-150300_59_170-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963353" version="1" comment="kernel-livepatch-5_14_21-150400_24_103-default is &gt;=15-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963354" version="1" comment="kernel-livepatch-5_14_21-150400_24_108-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963355" version="1" comment="kernel-livepatch-5_14_21-150400_24_111-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963356" version="1" comment="kernel-livepatch-5_14_21-150400_24_116-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963357" version="1" comment="kernel-livepatch-5_14_21-150400_24_119-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963654" version="1" comment="kernel-livepatch-5_14_21-150400_24_122-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963655" version="1" comment="kernel-livepatch-5_14_21-150400_24_125-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963358" version="1" comment="kernel-livepatch-5_14_21-150400_24_128-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957149" version="1" comment="kernel-default is &lt;5.14.21-150400.24.128.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963656" version="1" comment="kernel-livepatch-5_14_21-150500_55_44-default is &gt;=16-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963657" version="1" comment="kernel-livepatch-5_14_21-150500_55_49-default is &gt;=14-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963359" version="1" comment="kernel-livepatch-5_14_21-150500_55_52-default is &gt;=12-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963360" version="1" comment="kernel-livepatch-5_14_21-150500_55_59-default is &gt;=12-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963361" version="1" comment="kernel-livepatch-5_14_21-150500_55_62-default is &gt;=10-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963362" version="1" comment="kernel-livepatch-5_14_21-150500_55_65-default is &gt;=10-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963363" version="1" comment="kernel-livepatch-5_14_21-150500_55_68-default is &gt;=9-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963658" version="1" comment="kernel-livepatch-5_14_21-150500_55_73-default is &gt;=4-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963659" version="1" comment="kernel-livepatch-5_14_21-150400_24_133-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947529" version="1" comment="kernel-default is &lt;5.14.21-150500.55.65.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960113" version="1" comment="kgraft-patch-4_12_14-122_219-default is &gt;=6-8.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960114" version="1" comment="kgraft-patch-4_12_14-122_222-default is &gt;=4-8.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960115" version="1" comment="kgraft-patch-4_12_14-122_225-default is &gt;=3-8.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960516" version="1" comment="kgraft-patch-4_12_14-122_228-default is &gt;=2-8.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960517" version="1" comment="kernel-default is ==4.12.14-122.231.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029759" version="1" comment="kgraft-patch-4_12_14-122_231-default is &gt;=18-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960519" version="1" comment="kernel-default is &lt;4.12.14-122.231.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960408" version="1" comment="kernel-livepatch-5_3_18-150300_59_144-default is &gt;=15-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960116" version="1" comment="kernel-livepatch-5_3_18-150300_59_147-default is &gt;=15-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960117" version="1" comment="kernel-livepatch-5_3_18-150300_59_150-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961317" version="1" comment="kernel-livepatch-5_3_18-150300_59_170-default is &gt;=4-150300.7.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961318" version="1" comment="kernel-livepatch-5_3_18-150300_59_174-default is &gt;=3-150300.7.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960522" version="1" comment="kernel-default is ==5.3.18-150300.59.179.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960523" version="1" comment="kernel-livepatch-5_3_18-150300_59_179-default is &gt;=2-150300.7.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960524" version="1" comment="kernel-default is &lt;5.3.18-150300.59.179.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960339" version="1" comment="kernel-livepatch-5_14_21-150400_24_100-default is &gt;=15-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960118" version="1" comment="kernel-livepatch-5_14_21-150400_24_103-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960525" version="1" comment="kernel-livepatch-5_14_21-150400_24_128-default is &gt;=3-150400.9.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960527" version="1" comment="kernel-livepatch-5_14_21-150400_24_133-default is &gt;=2-150400.9.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960528" version="1" comment="kernel-default is ==5.14.21-150400.24.136.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960529" version="1" comment="kernel-livepatch-5_14_21-150400_24_136-default is &gt;=2-150400.9.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960530" version="1" comment="kernel-default is &lt;5.14.21-150400.24.136.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960531" version="1" comment="kernel-livepatch-5_14_21-150500_55_39-default is &gt;=15-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960120" version="1" comment="kernel-livepatch-5_14_21-150500_55_44-default is &gt;=14-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960533" version="1" comment="kernel-livepatch-5_14_21-150500_55_80-default is &gt;=2-150500.11.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960534" version="1" comment="kernel-default is ==5.14.21-150500.55.83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960535" version="1" comment="kernel-livepatch-5_14_21-150500_55_83-default is &gt;=2-150500.11.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960536" version="1" comment="kernel-default is &lt;5.14.21-150500.55.83.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032439" version="1" comment="bpftool is &lt;3.10.0-1160.142.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032440" version="1" comment="kernel is &lt;3.10.0-1160.142.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032441" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1160.142.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032442" version="1" comment="kernel-debug is &lt;3.10.0-1160.142.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032445" version="1" comment="kernel-doc is &lt;3.10.0-1160.142.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032446" version="1" comment="kernel-headers is &lt;3.10.0-1160.142.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032447" version="1" comment="kernel-tools is &lt;3.10.0-1160.142.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032448" version="1" comment="kernel-tools-libs is &lt;3.10.0-1160.142.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032450" version="1" comment="perf is &lt;3.10.0-1160.142.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032451" version="1" comment="python-perf is &lt;3.10.0-1160.142.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975029" version="1" comment="kgraft-patch-4_12_14-122_201-default is &gt;=16-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975043" version="1" comment="kgraft-patch-4_12_14-122_216-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975044" version="1" comment="kgraft-patch-4_12_14-122_219-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975030" version="1" comment="kgraft-patch-4_12_14-122_222-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975045" version="1" comment="kgraft-patch-4_12_14-122_225-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975046" version="1" comment="kgraft-patch-4_12_14-122_228-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975047" version="1" comment="kernel-livepatch-5_3_18-150300_59_153-default is &gt;=17-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975048" version="1" comment="kernel-livepatch-5_3_18-150300_59_158-default is &gt;=16-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975049" version="1" comment="kernel-livepatch-5_3_18-150300_59_161-default is &gt;=15-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975401" version="1" comment="kernel-livepatch-5_3_18-150300_59_164-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975050" version="1" comment="kernel-livepatch-5_3_18-150300_59_167-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975051" version="1" comment="kernel-livepatch-5_3_18-150300_59_170-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975052" version="1" comment="kernel-livepatch-5_3_18-150300_59_174-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975053" version="1" comment="kernel-livepatch-5_3_18-150300_59_179-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974051" version="1" comment="kernel-livepatch-5_3_18-150300_59_174-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974052" version="1" comment="kernel-livepatch-5_3_18-150300_59_179-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017397" version="1" comment="kgraft-patch-4_12_14-122_225-default is &gt;=16-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017398" version="1" comment="kgraft-patch-4_12_14-122_228-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960541" version="1" comment="kernel-default is ==4.12.14-122.234.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017400" version="1" comment="kgraft-patch-4_12_14-122_234-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975403" version="1" comment="kernel-default is ==4.12.14-122.237.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017401" version="1" comment="kgraft-patch-4_12_14-122_237-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975405" version="1" comment="kernel-default is ==4.12.14-122.244.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017402" version="1" comment="kgraft-patch-4_12_14-122_244-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986269" version="1" comment="kernel-default is ==4.12.14-122.247.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017403" version="1" comment="kgraft-patch-4_12_14-122_247-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986280" version="1" comment="kernel-default is ==4.12.14-122.250.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017404" version="1" comment="kgraft-patch-4_12_14-122_250-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986282" version="1" comment="kernel-default is &lt;4.12.14-122.250.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017405" version="1" comment="kernel-livepatch-5_3_18-150300_59_170-default is &gt;=17-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017406" version="1" comment="kernel-livepatch-5_3_18-150300_59_174-default is &gt;=16-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017329" version="1" comment="kernel-livepatch-5_3_18-150300_59_179-default is &gt;=15-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960544" version="1" comment="kernel-default is ==5.3.18-150300.59.182.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017407" version="1" comment="kernel-livepatch-5_3_18-150300_59_182-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966288" version="1" comment="kernel-default is ==5.3.18-150300.59.185.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017330" version="1" comment="kernel-livepatch-5_3_18-150300_59_185-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966290" version="1" comment="kernel-default is ==5.3.18-150300.59.188.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017331" version="1" comment="kernel-livepatch-5_3_18-150300_59_188-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986726" version="1" comment="kernel-default is ==5.3.18-150300.59.195.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017408" version="1" comment="kernel-livepatch-5_3_18-150300_59_195-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986730" version="1" comment="kernel-default is ==5.3.18-150300.59.198.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017409" version="1" comment="kernel-livepatch-5_3_18-150300_59_198-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986732" version="1" comment="kernel-default is &lt;5.3.18-150300.59.198.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017667" version="1" comment="kernel-livepatch-5_14_21-150400_24_128-default is &gt;=16-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017410" version="1" comment="kernel-livepatch-5_14_21-150400_24_133-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017668" version="1" comment="kernel-livepatch-5_14_21-150400_24_136-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960752" version="1" comment="kernel-default is ==5.14.21-150400.24.141.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017669" version="1" comment="kernel-livepatch-5_14_21-150400_24_141-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966293" version="1" comment="kernel-default is ==5.14.21-150400.24.144.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017670" version="1" comment="kernel-livepatch-5_14_21-150400_24_144-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966295" version="1" comment="kernel-default is ==5.14.21-150400.24.147.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017671" version="1" comment="kernel-livepatch-5_14_21-150400_24_147-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986625" version="1" comment="kernel-default is ==5.14.21-150400.24.150.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017672" version="1" comment="kernel-livepatch-5_14_21-150400_24_150-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986633" version="1" comment="kernel-default is ==5.14.21-150400.24.153.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017673" version="1" comment="kernel-livepatch-5_14_21-150400_24_153-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008960" version="1" comment="kernel-default is ==5.14.21-150400.24.158.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017411" version="1" comment="kernel-livepatch-5_14_21-150400_24_158-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008962" version="1" comment="kernel-default is &lt;5.14.21-150400.24.158.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017859" version="1" comment="kernel-livepatch-5_14_21-150500_55_73-default is &gt;=16-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017674" version="1" comment="kernel-livepatch-5_14_21-150500_55_80-default is &gt;=14-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017860" version="1" comment="kernel-livepatch-5_14_21-150500_55_83-default is &gt;=14-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968297" version="1" comment="kernel-default is ==5.14.21-150500.55.88.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017675" version="1" comment="kernel-livepatch-5_14_21-150500_55_88-default is &gt;=10-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968299" version="1" comment="kernel-default is ==5.14.21-150500.55.91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017861" version="1" comment="kernel-livepatch-5_14_21-150500_55_91-default is &gt;=10-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986277" version="1" comment="kernel-default is ==5.14.21-150500.55.94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017862" version="1" comment="kernel-livepatch-5_14_21-150500_55_94-default is &gt;=6-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986283" version="1" comment="kernel-default is ==5.14.21-150500.55.97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017863" version="1" comment="kernel-livepatch-5_14_21-150500_55_97-default is &gt;=6-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986285" version="1" comment="kernel-default is &lt;5.14.21-150500.55.97.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986262" version="1" comment="kgraft-patch-4_12_14-122_216-default is &gt;=17-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986105" version="1" comment="kgraft-patch-4_12_14-122_219-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986263" version="1" comment="kgraft-patch-4_12_14-122_222-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986264" version="1" comment="kgraft-patch-4_12_14-122_225-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986106" version="1" comment="kgraft-patch-4_12_14-122_228-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986266" version="1" comment="kgraft-patch-4_12_14-122_234-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986267" version="1" comment="kgraft-patch-4_12_14-122_237-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986268" version="1" comment="kgraft-patch-4_12_14-122_244-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986270" version="1" comment="kgraft-patch-4_12_14-122_247-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986271" version="1" comment="kernel-default is &lt;4.12.14-122.247.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986272" version="1" comment="kernel-livepatch-5_3_18-150300_59_161-default is &gt;=18-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986273" version="1" comment="kernel-livepatch-5_3_18-150300_59_164-default is &gt;=15-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986614" version="1" comment="kernel-livepatch-5_3_18-150300_59_167-default is &gt;=14-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986615" version="1" comment="kernel-livepatch-5_3_18-150300_59_170-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986616" version="1" comment="kernel-livepatch-5_3_18-150300_59_174-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986148" version="1" comment="kernel-livepatch-5_3_18-150300_59_179-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986274" version="1" comment="kernel-livepatch-5_3_18-150300_59_182-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986275" version="1" comment="kernel-livepatch-5_3_18-150300_59_185-default is &gt;=6-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986276" version="1" comment="kernel-livepatch-5_3_18-150300_59_188-default is &gt;=5-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986727" version="1" comment="kernel-livepatch-5_3_18-150300_59_195-default is &gt;=2-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986728" version="1" comment="kernel-default is &lt;5.3.18-150300.59.195.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986617" version="1" comment="kernel-livepatch-5_14_21-150400_24_119-default is &gt;=18-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986618" version="1" comment="kernel-livepatch-5_14_21-150400_24_122-default is &gt;=16-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986619" version="1" comment="kernel-livepatch-5_14_21-150400_24_125-default is &gt;=13-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986729" version="1" comment="kernel-livepatch-5_14_21-150400_24_128-default is &gt;=11-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986620" version="1" comment="kernel-livepatch-5_14_21-150400_24_133-default is &gt;=9-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986621" version="1" comment="kernel-livepatch-5_14_21-150400_24_136-default is &gt;=9-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986622" version="1" comment="kernel-livepatch-5_14_21-150400_24_141-default is &gt;=8-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986623" version="1" comment="kernel-livepatch-5_14_21-150400_24_144-default is &gt;=7-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986624" version="1" comment="kernel-livepatch-5_14_21-150400_24_147-default is &gt;=6-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986626" version="1" comment="kernel-livepatch-5_14_21-150400_24_150-default is &gt;=2-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986627" version="1" comment="kernel-default is &lt;5.14.21-150400.24.150.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986149" version="1" comment="kernel-livepatch-5_14_21-150500_55_62-default is &gt;=17-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986150" version="1" comment="kernel-livepatch-5_14_21-150500_55_65-default is &gt;=17-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986151" version="1" comment="kernel-livepatch-5_14_21-150500_55_68-default is &gt;=16-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986152" version="1" comment="kernel-livepatch-5_14_21-150500_55_73-default is &gt;=11-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986153" version="1" comment="kernel-livepatch-5_14_21-150500_55_80-default is &gt;=9-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986154" version="1" comment="kernel-livepatch-5_14_21-150500_55_83-default is &gt;=9-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986155" version="1" comment="kernel-livepatch-5_14_21-150500_55_88-default is &gt;=5-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986156" version="1" comment="kernel-livepatch-5_14_21-150500_55_91-default is &gt;=5-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986278" version="1" comment="kernel-livepatch-5_14_21-150500_55_94-default is &gt;=2-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986279" version="1" comment="kernel-default is &lt;5.14.21-150500.55.94.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987582" version="1" comment="kgraft-patch-4_12_14-122_216-default is &gt;=18-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987583" version="1" comment="kgraft-patch-4_12_14-122_219-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996805" version="1" comment="kgraft-patch-4_12_14-122_222-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987584" version="1" comment="kgraft-patch-4_12_14-122_225-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987585" version="1" comment="kgraft-patch-4_12_14-122_228-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987643" version="1" comment="kgraft-patch-4_12_14-122_234-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996806" version="1" comment="kgraft-patch-4_12_14-122_237-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987586" version="1" comment="kgraft-patch-4_12_14-122_244-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987587" version="1" comment="kgraft-patch-4_12_14-122_247-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996807" version="1" comment="kgraft-patch-4_12_14-122_250-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996808" version="1" comment="kernel-default is ==4.12.14-122.255.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996809" version="1" comment="kgraft-patch-4_12_14-122_255-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996810" version="1" comment="kernel-default is &lt;4.12.14-122.255.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008768" version="1" comment="kgraft-patch-4_12_14-122_219-default is &gt;=16-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008700" version="1" comment="kgraft-patch-4_12_14-122_222-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008701" version="1" comment="kgraft-patch-4_12_14-122_225-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010059" version="1" comment="kgraft-patch-4_12_14-122_228-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008770" version="1" comment="kgraft-patch-4_12_14-122_234-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008771" version="1" comment="kgraft-patch-4_12_14-122_237-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008772" version="1" comment="kgraft-patch-4_12_14-122_244-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008702" version="1" comment="kgraft-patch-4_12_14-122_247-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008773" version="1" comment="kgraft-patch-4_12_14-122_250-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008774" version="1" comment="kgraft-patch-4_12_14-122_255-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008775" version="1" comment="kernel-livepatch-5_3_18-150300_59_164-default is &gt;=17-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008776" version="1" comment="kernel-livepatch-5_3_18-150300_59_167-default is &gt;=16-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008777" version="1" comment="kernel-livepatch-5_3_18-150300_59_170-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008778" version="1" comment="kernel-livepatch-5_3_18-150300_59_174-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008779" version="1" comment="kernel-livepatch-5_3_18-150300_59_179-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008780" version="1" comment="kernel-livepatch-5_3_18-150300_59_182-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008781" version="1" comment="kernel-livepatch-5_3_18-150300_59_185-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008782" version="1" comment="kernel-livepatch-5_3_18-150300_59_188-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008783" version="1" comment="kernel-livepatch-5_3_18-150300_59_195-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008784" version="1" comment="kernel-livepatch-5_3_18-150300_59_198-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008785" version="1" comment="kernel-livepatch-5_14_21-150400_24_122-default is &gt;=18-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008786" version="1" comment="kernel-livepatch-5_14_21-150400_24_125-default is &gt;=15-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008787" version="1" comment="kernel-livepatch-5_14_21-150400_24_128-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008788" version="1" comment="kernel-livepatch-5_14_21-150400_24_133-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008789" version="1" comment="kernel-livepatch-5_14_21-150400_24_136-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008790" version="1" comment="kernel-livepatch-5_14_21-150400_24_141-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008791" version="1" comment="kernel-livepatch-5_14_21-150400_24_144-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008792" version="1" comment="kernel-livepatch-5_14_21-150400_24_147-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008793" version="1" comment="kernel-livepatch-5_14_21-150400_24_150-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008794" version="1" comment="kernel-livepatch-5_14_21-150400_24_153-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008961" version="1" comment="kernel-livepatch-5_14_21-150400_24_158-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996811" version="1" comment="kernel-livepatch-5_3_18-150300_59_161-default is &gt;=19-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996812" version="1" comment="kernel-livepatch-5_3_18-150300_59_164-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996813" version="1" comment="kernel-livepatch-5_3_18-150300_59_167-default is &gt;=15-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996814" version="1" comment="kernel-livepatch-5_3_18-150300_59_170-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996815" version="1" comment="kernel-livepatch-5_3_18-150300_59_174-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996816" version="1" comment="kernel-livepatch-5_3_18-150300_59_179-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996817" version="1" comment="kernel-livepatch-5_3_18-150300_59_182-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997085" version="1" comment="kernel-livepatch-5_3_18-150300_59_185-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996818" version="1" comment="kernel-livepatch-5_3_18-150300_59_188-default is &gt;=6-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997086" version="1" comment="kernel-livepatch-5_3_18-150300_59_195-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987644" version="1" comment="kernel-livepatch-5_3_18-150300_59_198-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975402" version="1" comment="kgraft-patch-4_12_14-122_234-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975404" version="1" comment="kgraft-patch-4_12_14-122_237-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975406" version="1" comment="kgraft-patch-4_12_14-122_244-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986281" version="1" comment="kgraft-patch-4_12_14-122_250-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975408" version="1" comment="kernel-livepatch-5_3_18-150300_59_182-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975409" version="1" comment="kernel-livepatch-5_3_18-150300_59_185-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975410" version="1" comment="kernel-livepatch-5_3_18-150300_59_188-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986731" version="1" comment="kernel-livepatch-5_3_18-150300_59_198-default is &gt;=2-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016960" version="1" comment="bpftool is &lt;3.10.0-1160.137.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016961" version="1" comment="kernel is &lt;3.10.0-1160.137.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016962" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1160.137.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016963" version="1" comment="kernel-debug is &lt;3.10.0-1160.137.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016966" version="1" comment="kernel-doc is &lt;3.10.0-1160.137.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016967" version="1" comment="kernel-headers is &lt;3.10.0-1160.137.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016968" version="1" comment="kernel-tools is &lt;3.10.0-1160.137.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016969" version="1" comment="kernel-tools-libs is &lt;3.10.0-1160.137.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016971" version="1" comment="perf is &lt;3.10.0-1160.137.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016972" version="1" comment="python-perf is &lt;3.10.0-1160.137.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008281" version="1" comment="bpftool is &lt;3.10.0-1160.136.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008282" version="1" comment="kernel is &lt;3.10.0-1160.136.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008283" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1160.136.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008284" version="1" comment="kernel-debug is &lt;3.10.0-1160.136.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008287" version="1" comment="kernel-doc is &lt;3.10.0-1160.136.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008288" version="1" comment="kernel-headers is &lt;3.10.0-1160.136.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008289" version="1" comment="kernel-tools is &lt;3.10.0-1160.136.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008290" version="1" comment="kernel-tools-libs is &lt;3.10.0-1160.136.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008292" version="1" comment="perf is &lt;3.10.0-1160.136.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008293" version="1" comment="python-perf is &lt;3.10.0-1160.136.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037981" version="1" comment="kgraft-patch-4_12_14-122_237-default is &gt;=16-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037982" version="1" comment="kgraft-patch-4_12_14-122_244-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037983" version="1" comment="kgraft-patch-4_12_14-122_247-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037984" version="1" comment="kgraft-patch-4_12_14-122_250-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037985" version="1" comment="kgraft-patch-4_12_14-122_255-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011973" version="1" comment="kernel-default is ==4.12.14-122.258.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037986" version="1" comment="kgraft-patch-4_12_14-122_258-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014519" version="1" comment="kernel-default is ==4.12.14-122.261.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037987" version="1" comment="kgraft-patch-4_12_14-122_261-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014521" version="1" comment="kernel-default is ==4.12.14-122.266.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037988" version="1" comment="kgraft-patch-4_12_14-122_266-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019465" version="1" comment="kernel-default is ==4.12.14-122.269.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037989" version="1" comment="kgraft-patch-4_12_14-122_269-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022330" version="1" comment="kernel-default is ==4.12.14-122.272.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037990" version="1" comment="kgraft-patch-4_12_14-122_272-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022332" version="1" comment="kernel-default is &lt;4.12.14-122.272.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037991" version="1" comment="kernel-livepatch-5_14_21-150400_24_144-default is &gt;=19-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037992" version="1" comment="kernel-livepatch-5_14_21-150400_24_147-default is &gt;=18-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037993" version="1" comment="kernel-livepatch-5_14_21-150400_24_150-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037994" version="1" comment="kernel-livepatch-5_14_21-150400_24_153-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037995" version="1" comment="kernel-livepatch-5_14_21-150400_24_158-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008967" version="1" comment="kernel-default is ==5.14.21-150400.24.161.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037996" version="1" comment="kernel-livepatch-5_14_21-150400_24_161-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008969" version="1" comment="kernel-default is ==5.14.21-150400.24.164.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037997" version="1" comment="kernel-livepatch-5_14_21-150400_24_164-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012372" version="1" comment="kernel-default is ==5.14.21-150400.24.167.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037998" version="1" comment="kernel-livepatch-5_14_21-150400_24_167-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014752" version="1" comment="kernel-default is ==5.14.21-150400.24.170.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037999" version="1" comment="kernel-livepatch-5_14_21-150400_24_170-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019721" version="1" comment="kernel-default is ==5.14.21-150400.24.173.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038211" version="1" comment="kernel-livepatch-5_14_21-150400_24_173-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023345" version="1" comment="kernel-default is ==5.14.21-150400.24.176.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038000" version="1" comment="kernel-livepatch-5_14_21-150400_24_176-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023347" version="1" comment="kernel-default is &lt;5.14.21-150400.24.176.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025285" version="1" comment="kernel-livepatch-5_3_18-150300_59_179-default is &gt;=19-150300.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025286" version="1" comment="kernel-livepatch-5_3_18-150300_59_182-default is &gt;=17-150300.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025287" version="1" comment="kernel-livepatch-5_3_18-150300_59_185-default is &gt;=15-150300.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025288" version="1" comment="kernel-livepatch-5_3_18-150300_59_188-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025289" version="1" comment="kernel-livepatch-5_3_18-150300_59_195-default is &gt;=11-150300.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025290" version="1" comment="kernel-livepatch-5_3_18-150300_59_198-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008807" version="1" comment="kernel-default is ==5.3.18-150300.59.201.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025291" version="1" comment="kernel-livepatch-5_3_18-150300_59_201-default is &gt;=9-150300.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008964" version="1" comment="kernel-default is ==5.3.18-150300.59.204.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025292" version="1" comment="kernel-livepatch-5_3_18-150300_59_204-default is &gt;=9-150300.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012375" version="1" comment="kernel-default is ==5.3.18-150300.59.207.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025293" version="1" comment="kernel-livepatch-5_3_18-150300_59_207-default is &gt;=8-150300.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012379" version="1" comment="kernel-default is ==5.3.18-150300.59.211.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025294" version="1" comment="kernel-livepatch-5_3_18-150300_59_211-default is &gt;=8-150300.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019755" version="1" comment="kernel-default is ==5.3.18-150300.59.215.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025525" version="1" comment="kernel-livepatch-5_3_18-150300_59_215-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025254" version="1" comment="kernel-default is ==5.3.18-150300.59.218.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025255" version="1" comment="kernel-livepatch-5_3_18-150300_59_218-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025256" version="1" comment="kernel-default is &lt;5.3.18-150300.59.218.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025295" version="1" comment="kgraft-patch-4_12_14-122_234-default is &gt;=18-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025296" version="1" comment="kgraft-patch-4_12_14-122_237-default is &gt;=14-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025297" version="1" comment="kgraft-patch-4_12_14-122_244-default is &gt;=13-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025298" version="1" comment="kgraft-patch-4_12_14-122_247-default is &gt;=11-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025299" version="1" comment="kgraft-patch-4_12_14-122_250-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025300" version="1" comment="kgraft-patch-4_12_14-122_255-default is &gt;=10-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025301" version="1" comment="kgraft-patch-4_12_14-122_258-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025302" version="1" comment="kgraft-patch-4_12_14-122_261-default is &gt;=7-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025303" version="1" comment="kgraft-patch-4_12_14-122_266-default is &gt;=7-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025526" version="1" comment="kgraft-patch-4_12_14-122_269-default is &gt;=4-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024667" version="1" comment="kgraft-patch-4_12_14-122_272-default is &gt;=3-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025304" version="1" comment="kernel-livepatch-5_14_21-150400_24_136-default is &gt;=18-150400.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025305" version="1" comment="kernel-livepatch-5_14_21-150400_24_141-default is &gt;=17-150400.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025306" version="1" comment="kernel-livepatch-5_14_21-150400_24_144-default is &gt;=16-150400.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025307" version="1" comment="kernel-livepatch-5_14_21-150400_24_147-default is &gt;=15-150400.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025527" version="1" comment="kernel-livepatch-5_14_21-150400_24_150-default is &gt;=10-150400.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025308" version="1" comment="kernel-livepatch-5_14_21-150400_24_153-default is &gt;=10-150400.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025309" version="1" comment="kernel-livepatch-5_14_21-150400_24_158-default is &gt;=9-150400.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025310" version="1" comment="kernel-livepatch-5_14_21-150400_24_161-default is &gt;=9-150400.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025311" version="1" comment="kernel-livepatch-5_14_21-150400_24_164-default is &gt;=9-150400.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025312" version="1" comment="kernel-livepatch-5_14_21-150400_24_167-default is &gt;=8-150400.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025313" version="1" comment="kernel-livepatch-5_14_21-150400_24_170-default is &gt;=7-150400.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025314" version="1" comment="kernel-livepatch-5_14_21-150400_24_173-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025257" version="1" comment="kernel-livepatch-5_14_21-150400_24_176-default is &gt;=3-150400.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011979" version="1" comment="kernel-default is ==5.14.21-150500.55.100.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025528" version="1" comment="kernel-livepatch-5_14_21-150500_55_100-default is &gt;=9-150500.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011981" version="1" comment="kernel-default is ==5.14.21-150500.55.103.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025529" version="1" comment="kernel-livepatch-5_14_21-150500_55_103-default is &gt;=9-150500.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011983" version="1" comment="kernel-default is ==5.14.21-150500.55.110.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025315" version="1" comment="kernel-livepatch-5_14_21-150500_55_110-default is &gt;=8-150500.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011988" version="1" comment="kernel-default is ==5.14.21-150500.55.113.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025530" version="1" comment="kernel-livepatch-5_14_21-150500_55_113-default is &gt;=8-150500.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014542" version="1" comment="kernel-default is ==5.14.21-150500.55.116.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025531" version="1" comment="kernel-livepatch-5_14_21-150500_55_116-default is &gt;=6-150500.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023037" version="1" comment="kernel-default is ==5.14.21-150500.55.121.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025258" version="1" comment="kernel-livepatch-5_14_21-150500_55_121-default is &gt;=3-150500.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025532" version="1" comment="kernel-livepatch-5_14_21-150500_55_83-default is &gt;=18-150500.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025533" version="1" comment="kernel-livepatch-5_14_21-150500_55_88-default is &gt;=14-150500.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025534" version="1" comment="kernel-livepatch-5_14_21-150500_55_91-default is &gt;=14-150500.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025535" version="1" comment="kernel-livepatch-5_14_21-150500_55_94-default is &gt;=10-150500.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025536" version="1" comment="kernel-livepatch-5_14_21-150500_55_97-default is &gt;=10-150500.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038212" version="1" comment="kernel-default is ==4.12.14-122.275.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038213" version="1" comment="kgraft-patch-4_12_14-122_275-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038214" version="1" comment="kernel-default is &lt;4.12.14-122.275.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031207" version="1" comment="kernel-default is ==5.14.21-150400.24.179.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038215" version="1" comment="kernel-livepatch-5_14_21-150400_24_179-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031209" version="1" comment="kernel-default is &lt;5.14.21-150400.24.179.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038216" version="1" comment="kernel-livepatch-5_14_21-150500_55_100-default is &gt;=12-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038001" version="1" comment="kernel-livepatch-5_14_21-150500_55_103-default is &gt;=12-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038217" version="1" comment="kernel-livepatch-5_14_21-150500_55_110-default is &gt;=11-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038218" version="1" comment="kernel-livepatch-5_14_21-150500_55_113-default is &gt;=10-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038219" version="1" comment="kernel-livepatch-5_14_21-150500_55_116-default is &gt;=8-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038220" version="1" comment="kernel-livepatch-5_14_21-150500_55_121-default is &gt;=5-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037072" version="1" comment="kernel-default is ==5.14.21-150500.55.124.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038221" version="1" comment="kernel-livepatch-5_14_21-150500_55_124-default is &gt;=3-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038002" version="1" comment="kernel-livepatch-5_14_21-150500_55_88-default is &gt;=17-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038509" version="1" comment="kernel-livepatch-5_14_21-150500_55_91-default is &gt;=17-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038222" version="1" comment="kernel-livepatch-5_14_21-150500_55_94-default is &gt;=13-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038223" version="1" comment="kernel-livepatch-5_14_21-150500_55_97-default is &gt;=13-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037313" version="1" comment="bpftool is &lt;3.10.0-1160.144.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037314" version="1" comment="kernel is &lt;3.10.0-1160.144.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037315" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1160.144.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037316" version="1" comment="kernel-debug is &lt;3.10.0-1160.144.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037319" version="1" comment="kernel-doc is &lt;3.10.0-1160.144.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037320" version="1" comment="kernel-headers is &lt;3.10.0-1160.144.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037321" version="1" comment="kernel-tools is &lt;3.10.0-1160.144.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037322" version="1" comment="kernel-tools-libs is &lt;3.10.0-1160.144.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037324" version="1" comment="perf is &lt;3.10.0-1160.144.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037325" version="1" comment="python-perf is &lt;3.10.0-1160.144.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022248" version="1" comment="kgraft-patch-4_12_14-122_228-default is &gt;=18-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022275" version="1" comment="kgraft-patch-4_12_14-122_234-default is &gt;=17-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022276" version="1" comment="kgraft-patch-4_12_14-122_237-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022277" version="1" comment="kgraft-patch-4_12_14-122_244-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022278" version="1" comment="kgraft-patch-4_12_14-122_247-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022279" version="1" comment="kgraft-patch-4_12_14-122_250-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022280" version="1" comment="kgraft-patch-4_12_14-122_255-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022281" version="1" comment="kgraft-patch-4_12_14-122_258-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022282" version="1" comment="kgraft-patch-4_12_14-122_261-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022283" version="1" comment="kgraft-patch-4_12_14-122_266-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022611" version="1" comment="kgraft-patch-4_12_14-122_269-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022331" version="1" comment="kgraft-patch-4_12_14-122_272-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030679" version="1" comment="kernel-livepatch-5_3_18-150300_59_182-default is &gt;=18-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030649" version="1" comment="kernel-livepatch-5_3_18-150300_59_185-default is &gt;=16-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030680" version="1" comment="kernel-livepatch-5_3_18-150300_59_188-default is &gt;=15-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030681" version="1" comment="kernel-livepatch-5_3_18-150300_59_195-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030682" version="1" comment="kernel-livepatch-5_3_18-150300_59_198-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030683" version="1" comment="kernel-livepatch-5_3_18-150300_59_201-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030684" version="1" comment="kernel-livepatch-5_3_18-150300_59_204-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030685" version="1" comment="kernel-livepatch-5_3_18-150300_59_207-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030686" version="1" comment="kernel-livepatch-5_3_18-150300_59_211-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030650" version="1" comment="kernel-livepatch-5_3_18-150300_59_215-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030687" version="1" comment="kernel-livepatch-5_3_18-150300_59_218-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031652" version="1" comment="kernel-default is ==5.3.18-150300.59.221.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031653" version="1" comment="kernel-livepatch-5_3_18-150300_59_221-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031654" version="1" comment="kernel-default is &lt;5.3.18-150300.59.221.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049711" version="1" comment="kgraft-patch-4_12_14-122_247-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049712" version="1" comment="kgraft-patch-4_12_14-122_250-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050984" version="1" comment="kgraft-patch-4_12_14-122_255-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049713" version="1" comment="kgraft-patch-4_12_14-122_258-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049764" version="1" comment="kgraft-patch-4_12_14-122_261-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050306" version="1" comment="kgraft-patch-4_12_14-122_266-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049765" version="1" comment="kgraft-patch-4_12_14-122_269-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049766" version="1" comment="kgraft-patch-4_12_14-122_272-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049767" version="1" comment="kgraft-patch-4_12_14-122_275-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050974" version="1" comment="bpftool is &lt;3.10.0-1160.147.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050975" version="1" comment="kernel is &lt;3.10.0-1160.147.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050976" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1160.147.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050977" version="1" comment="kernel-debug is &lt;3.10.0-1160.147.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050978" version="1" comment="kernel-doc is &lt;3.10.0-1160.147.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050979" version="1" comment="kernel-headers is &lt;3.10.0-1160.147.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050980" version="1" comment="kernel-tools is &lt;3.10.0-1160.147.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050981" version="1" comment="kernel-tools-libs is &lt;3.10.0-1160.147.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050982" version="1" comment="perf is &lt;3.10.0-1160.147.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050983" version="1" comment="python-perf is &lt;3.10.0-1160.147.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046222" version="1" comment="kernel-default is ==4.12.14-122.280.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049768" version="1" comment="kgraft-patch-4_12_14-122_280-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046224" version="1" comment="kernel-default is ==4.12.14-122.283.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049769" version="1" comment="kgraft-patch-4_12_14-122_283-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046236" version="1" comment="kernel-default is ==4.12.14-122.290.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049770" version="1" comment="kgraft-patch-4_12_14-122_290-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046238" version="1" comment="kernel-default is &lt;4.12.14-122.290.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050307" version="1" comment="kernel-livepatch-5_14_21-150400_24_150-default is &gt;=16-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049771" version="1" comment="kernel-livepatch-5_14_21-150400_24_153-default is &gt;=16-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049772" version="1" comment="kernel-livepatch-5_14_21-150400_24_158-default is &gt;=15-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049773" version="1" comment="kernel-livepatch-5_14_21-150400_24_161-default is &gt;=15-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050070" version="1" comment="kernel-livepatch-5_14_21-150400_24_164-default is &gt;=15-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050071" version="1" comment="kernel-livepatch-5_14_21-150400_24_167-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050072" version="1" comment="kernel-livepatch-5_14_21-150400_24_170-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050073" version="1" comment="kernel-livepatch-5_14_21-150400_24_173-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050074" version="1" comment="kernel-livepatch-5_14_21-150400_24_176-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050075" version="1" comment="kernel-livepatch-5_14_21-150400_24_179-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046274" version="1" comment="kernel-default is ==5.14.21-150400.24.184.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050308" version="1" comment="kernel-livepatch-5_14_21-150400_24_184-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046276" version="1" comment="kernel-default is ==5.14.21-150400.24.187.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050309" version="1" comment="kernel-livepatch-5_14_21-150400_24_187-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046278" version="1" comment="kernel-default is &lt;5.14.21-150400.24.187.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050310" version="1" comment="kernel-livepatch-5_14_21-150500_55_100-default is &gt;=15-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050311" version="1" comment="kernel-livepatch-5_14_21-150500_55_103-default is &gt;=15-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050312" version="1" comment="kernel-livepatch-5_14_21-150500_55_110-default is &gt;=14-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050313" version="1" comment="kernel-livepatch-5_14_21-150500_55_113-default is &gt;=13-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050314" version="1" comment="kernel-livepatch-5_14_21-150500_55_116-default is &gt;=11-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050985" version="1" comment="kernel-livepatch-5_14_21-150500_55_121-default is &gt;=8-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050986" version="1" comment="kernel-livepatch-5_14_21-150500_55_124-default is &gt;=6-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046286" version="1" comment="kernel-default is ==5.14.21-150500.55.127.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050987" version="1" comment="kernel-livepatch-5_14_21-150500_55_127-default is &gt;=3-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046288" version="1" comment="kernel-default is ==5.14.21-150500.55.130.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050988" version="1" comment="kernel-livepatch-5_14_21-150500_55_130-default is &gt;=3-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046292" version="1" comment="kernel-default is ==5.14.21-150500.55.133.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050989" version="1" comment="kernel-livepatch-5_14_21-150500_55_133-default is &gt;=3-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050315" version="1" comment="kernel-livepatch-5_14_21-150500_55_94-default is &gt;=16-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050316" version="1" comment="kernel-livepatch-5_14_21-150500_55_97-default is &gt;=16-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045279" version="1" comment="kgraft-patch-4_12_14-122_247-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045280" version="1" comment="kgraft-patch-4_12_14-122_250-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046215" version="1" comment="kgraft-patch-4_12_14-122_255-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046216" version="1" comment="kgraft-patch-4_12_14-122_258-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046217" version="1" comment="kgraft-patch-4_12_14-122_261-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046218" version="1" comment="kgraft-patch-4_12_14-122_266-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046219" version="1" comment="kgraft-patch-4_12_14-122_269-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046220" version="1" comment="kgraft-patch-4_12_14-122_272-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046221" version="1" comment="kgraft-patch-4_12_14-122_275-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046223" version="1" comment="kgraft-patch-4_12_14-122_280-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046225" version="1" comment="kgraft-patch-4_12_14-122_283-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046226" version="1" comment="kernel-default is &lt;4.12.14-122.283.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046227" version="1" comment="kernel-livepatch-5_14_21-150400_24_150-default is &gt;=15-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046228" version="1" comment="kernel-livepatch-5_14_21-150400_24_153-default is &gt;=15-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046229" version="1" comment="kernel-livepatch-5_14_21-150400_24_158-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046230" version="1" comment="kernel-livepatch-5_14_21-150400_24_161-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046231" version="1" comment="kernel-livepatch-5_14_21-150400_24_164-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046232" version="1" comment="kernel-livepatch-5_14_21-150400_24_167-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046233" version="1" comment="kernel-livepatch-5_14_21-150400_24_170-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046234" version="1" comment="kernel-livepatch-5_14_21-150400_24_173-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046235" version="1" comment="kernel-livepatch-5_14_21-150400_24_176-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046273" version="1" comment="kernel-livepatch-5_14_21-150400_24_179-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046275" version="1" comment="kernel-livepatch-5_14_21-150400_24_184-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046277" version="1" comment="kernel-livepatch-5_14_21-150400_24_187-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046279" version="1" comment="kernel-livepatch-5_14_21-150500_55_100-default is &gt;=14-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046280" version="1" comment="kernel-livepatch-5_14_21-150500_55_103-default is &gt;=14-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046281" version="1" comment="kernel-livepatch-5_14_21-150500_55_110-default is &gt;=13-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046282" version="1" comment="kernel-livepatch-5_14_21-150500_55_113-default is &gt;=12-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046283" version="1" comment="kernel-livepatch-5_14_21-150500_55_116-default is &gt;=10-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046284" version="1" comment="kernel-livepatch-5_14_21-150500_55_121-default is &gt;=7-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046285" version="1" comment="kernel-livepatch-5_14_21-150500_55_124-default is &gt;=5-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046287" version="1" comment="kernel-livepatch-5_14_21-150500_55_127-default is &gt;=2-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046289" version="1" comment="kernel-livepatch-5_14_21-150500_55_130-default is &gt;=2-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046290" version="1" comment="kernel-livepatch-5_14_21-150500_55_94-default is &gt;=15-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046291" version="1" comment="kernel-livepatch-5_14_21-150500_55_97-default is &gt;=15-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046237" version="1" comment="kgraft-patch-4_12_14-122_290-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742267" version="1" comment="kernel-livepatch-5_3_18-150300_59_106-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742712" version="1" comment="kernel-livepatch-5_3_18-150300_59_109-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743622" version="1" comment="kernel-livepatch-5_14_21-150400_24_33-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743623" version="1" comment="kernel-livepatch-5_14_21-150400_24_38-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743624" version="1" comment="kernel-default is ==5.14.21-150400.24.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743625" version="1" comment="kernel-livepatch-5_14_21-150400_24_41-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877718" version="1" comment="kernel-default is &lt;5.14.21-150400.24.41.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751177" version="1" comment="kgraft-patch-4_12_14-122_116-default is &gt;=13-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751178" version="1" comment="kgraft-patch-4_12_14-122_121-default is &gt;=11-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751179" version="1" comment="kgraft-patch-4_12_14-122_124-default is &gt;=10-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751180" version="1" comment="kgraft-patch-4_12_14-122_127-default is &gt;=8-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751181" version="1" comment="kgraft-patch-4_12_14-122_130-default is &gt;=8-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751182" version="1" comment="kgraft-patch-4_12_14-122_133-default is &gt;=6-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751183" version="1" comment="kgraft-patch-4_12_14-122_136-default is &gt;=5-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751184" version="1" comment="kgraft-patch-4_12_14-122_139-default is &gt;=4-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751185" version="1" comment="kgraft-patch-4_12_14-122_144-default is &gt;=3-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751186" version="1" comment="kernel-default is ==4.12.14-122.147.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751187" version="1" comment="kgraft-patch-4_12_14-122_147-default is &gt;=2-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751188" version="1" comment="kernel-default is &lt;4.12.14-122.147.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750757" version="1" comment="kernel-livepatch-5_3_18-150200_24_112-default is &gt;=14-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750758" version="1" comment="kernel-livepatch-5_3_18-150200_24_115-default is &gt;=12-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750759" version="1" comment="kernel-livepatch-5_3_18-150200_24_126-default is &gt;=9-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750760" version="1" comment="kernel-livepatch-5_3_18-150200_24_129-default is &gt;=6-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751189" version="1" comment="kernel-livepatch-5_3_18-150200_24_134-default is &gt;=6-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751190" version="1" comment="kernel-livepatch-5_3_18-150200_24_139-default is &gt;=3-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742263" version="1" comment="kernel-default is &lt;5.3.18-150200.24.139.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750762" version="1" comment="kernel-livepatch-5_3_18-150300_59_101-default is &gt;=5-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750763" version="1" comment="kernel-livepatch-5_3_18-150300_59_106-default is &gt;=3-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751191" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=17-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751192" version="1" comment="kernel-livepatch-5_3_18-150300_59_63-default is &gt;=14-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751193" version="1" comment="kernel-livepatch-5_3_18-150300_59_68-default is &gt;=13-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751194" version="1" comment="kernel-livepatch-5_3_18-150300_59_71-default is &gt;=12-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751195" version="1" comment="kernel-livepatch-5_3_18-150300_59_76-default is &gt;=11-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751196" version="1" comment="kernel-livepatch-5_3_18-150300_59_87-default is &gt;=10-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751197" version="1" comment="kernel-livepatch-5_3_18-150300_59_90-default is &gt;=9-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750764" version="1" comment="kernel-livepatch-5_3_18-150300_59_93-default is &gt;=8-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751198" version="1" comment="kernel-livepatch-5_3_18-150300_59_98-default is &gt;=6-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751199" version="1" comment="kernel-livepatch-5_14_21-150400_22-default is &gt;=12-150400.10.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751200" version="1" comment="kernel-livepatch-5_14_21-150400_24_11-default is &gt;=9-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751201" version="1" comment="kernel-livepatch-5_14_21-150400_24_18-default is &gt;=9-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751202" version="1" comment="kernel-livepatch-5_14_21-150400_24_21-default is &gt;=8-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751203" version="1" comment="kernel-livepatch-5_14_21-150400_24_28-default is &gt;=6-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751204" version="1" comment="kernel-livepatch-5_14_21-150400_24_33-default is &gt;=5-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751205" version="1" comment="kernel-livepatch-5_14_21-150400_24_38-default is &gt;=4-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009752332" version="1" comment="kernel-livepatch-5_14_21-150400_24_41-default is &gt;=3-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830145" version="1" comment="openssl is &lt;1.0.2k-26.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830146" version="1" comment="openssl-devel is &lt;1.0.2k-26.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830147" version="1" comment="openssl-libs is &lt;1.0.2k-26.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830148" version="1" comment="openssl-perl is &lt;1.0.2k-26.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830149" version="1" comment="openssl-static is &lt;1.0.2k-26.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877784" version="1" comment="kernel-rt is ==5.14.21-150400.15.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764659" version="1" comment="kernel-livepatch-5_14_21-150400_15_11-rt is &gt;=4-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009765065" version="1" comment="kernel-livepatch-5_14_21-150400_22-default is &gt;=14-150400.16.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764664" version="1" comment="kernel-livepatch-5_14_21-150400_24_11-default is &gt;=11-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764665" version="1" comment="kernel-livepatch-5_14_21-150400_24_18-default is &gt;=11-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764666" version="1" comment="kernel-livepatch-5_14_21-150400_24_21-default is &gt;=10-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764667" version="1" comment="kernel-livepatch-5_14_21-150400_24_28-default is &gt;=8-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764668" version="1" comment="kernel-livepatch-5_14_21-150400_24_33-default is &gt;=7-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764669" version="1" comment="kernel-livepatch-5_14_21-150400_24_38-default is &gt;=6-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764670" version="1" comment="kernel-livepatch-5_14_21-150400_24_41-default is &gt;=5-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751216" version="1" comment="kernel-default is ==5.14.21-150400.24.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764671" version="1" comment="kernel-livepatch-5_14_21-150400_24_46-default is &gt;=4-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755396" version="1" comment="kernel-default is ==5.14.21-150400.24.55.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764672" version="1" comment="kernel-livepatch-5_14_21-150400_24_55-default is &gt;=3-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764674" version="1" comment="kernel-livepatch-5_14_21-150400_24_60-default is &gt;=2-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796020" version="1" comment="kernel-default is &lt;5.14.21-150400.24.60.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830056" version="1" comment="thunderbird is &lt;102.7.1-2.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764675" version="1" comment="kernel-livepatch-5_3_18-150200_24_115-default is &gt;=14-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764676" version="1" comment="kernel-livepatch-5_3_18-150200_24_126-default is &gt;=11-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764677" version="1" comment="kernel-livepatch-5_3_18-150200_24_129-default is &gt;=8-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764678" version="1" comment="kernel-livepatch-5_3_18-150200_24_134-default is &gt;=8-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764679" version="1" comment="kernel-livepatch-5_3_18-150200_24_139-default is &gt;=5-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764680" version="1" comment="kernel-livepatch-5_3_18-150200_24_142-default is &gt;=4-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764681" version="1" comment="kernel-livepatch-5_3_18-150200_24_145-default is &gt;=3-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764682" version="1" comment="kernel-livepatch-5_3_18-150300_59_101-default is &gt;=7-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764683" version="1" comment="kernel-livepatch-5_3_18-150300_59_106-default is &gt;=5-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764684" version="1" comment="kernel-livepatch-5_3_18-150300_59_109-default is &gt;=5-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764685" version="1" comment="kernel-livepatch-5_3_18-150300_59_112-default is &gt;=4-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764686" version="1" comment="kernel-livepatch-5_3_18-150300_59_115-default is &gt;=3-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764687" version="1" comment="kernel-livepatch-5_3_18-150300_59_71-default is &gt;=14-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764688" version="1" comment="kernel-livepatch-5_3_18-150300_59_76-default is &gt;=13-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764689" version="1" comment="kernel-livepatch-5_3_18-150300_59_87-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764690" version="1" comment="kernel-livepatch-5_3_18-150300_59_90-default is &gt;=11-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764691" version="1" comment="kernel-livepatch-5_3_18-150300_59_93-default is &gt;=10-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764692" version="1" comment="kernel-livepatch-5_3_18-150300_59_98-default is &gt;=8-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009761482" version="1" comment="kernel-default is &lt;5.14.21-150400.24.46.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009180976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852715" version="1" comment="kernel-livepatch-5_14_21-150500_11-rt is &gt;=9-150500.6.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852366" version="1" comment="kernel-livepatch-5_14_21-150500_53-default is &gt;=9-150500.6.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830057" version="1" comment="tigervnc is &lt;1.8.0-24.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830058" version="1" comment="tigervnc-icons is &lt;1.8.0-24.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830059" version="1" comment="tigervnc-license is &lt;1.8.0-24.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830060" version="1" comment="tigervnc-server is &lt;1.8.0-24.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830061" version="1" comment="tigervnc-server-applet is &lt;1.8.0-24.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830062" version="1" comment="tigervnc-server-minimal is &lt;1.8.0-24.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830063" version="1" comment="tigervnc-server-module is &lt;1.8.0-24.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830064" version="1" comment="xorg-x11-server-Xdmx is &lt;1.20.4-22.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830065" version="1" comment="xorg-x11-server-Xephyr is &lt;1.20.4-22.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830066" version="1" comment="xorg-x11-server-Xnest is &lt;1.20.4-22.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830067" version="1" comment="xorg-x11-server-Xorg is &lt;1.20.4-22.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830068" version="1" comment="xorg-x11-server-Xvfb is &lt;1.20.4-22.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830069" version="1" comment="xorg-x11-server-Xwayland is &lt;1.20.4-22.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830070" version="1" comment="xorg-x11-server-common is &lt;1.20.4-22.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830071" version="1" comment="xorg-x11-server-devel is &lt;1.20.4-22.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830072" version="1" comment="xorg-x11-server-source is &lt;1.20.4-22.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830176" version="1" comment="thunderbird is &lt;102.10.0-2.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755385" version="1" comment="kgraft-patch-4_12_14-95_108-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755386" version="1" comment="kgraft-patch-4_12_14-95_111-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755223" version="1" comment="kgraft-patch-4_12_14-95_114-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751223" version="1" comment="kernel-default is ==4.12.14-95.117.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755387" version="1" comment="kgraft-patch-4_12_14-95_117-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755224" version="1" comment="kgraft-patch-4_12_14-122_133-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755225" version="1" comment="kgraft-patch-4_12_14-122_136-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755226" version="1" comment="kgraft-patch-4_12_14-122_139-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755227" version="1" comment="kgraft-patch-4_12_14-122_144-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755228" version="1" comment="kgraft-patch-4_12_14-122_147-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755229" version="1" comment="kernel-livepatch-4_12_14-150100_197_123-default is &gt;=6-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755230" version="1" comment="kernel-livepatch-4_12_14-150100_197_126-default is &gt;=6-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755231" version="1" comment="kernel-livepatch-4_12_14-150100_197_131-default is &gt;=4-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751233" version="1" comment="kernel-default is ==4.12.14-150100.197.134.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755232" version="1" comment="kernel-livepatch-4_12_14-150100_197_134-default is &gt;=3-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751235" version="1" comment="kernel-default is &lt;4.12.14-150100.197.134.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755233" version="1" comment="kernel-livepatch-5_3_18-150200_24_129-default is &gt;=7-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755234" version="1" comment="kernel-livepatch-5_3_18-150200_24_134-default is &gt;=7-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755235" version="1" comment="kernel-livepatch-5_3_18-150200_24_139-default is &gt;=4-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755236" version="1" comment="kernel-livepatch-5_3_18-150200_24_142-default is &gt;=3-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751236" version="1" comment="kernel-default is &lt;5.3.18-150200.24.142.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755237" version="1" comment="kernel-livepatch-5_3_18-150300_59_101-default is &gt;=6-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755238" version="1" comment="kernel-livepatch-5_3_18-150300_59_106-default is &gt;=4-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755388" version="1" comment="kernel-livepatch-5_3_18-150300_59_109-default is &gt;=4-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755389" version="1" comment="kernel-livepatch-5_3_18-150300_59_112-default is &gt;=3-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755239" version="1" comment="kernel-livepatch-5_3_18-150300_59_68-default is &gt;=14-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755240" version="1" comment="kernel-livepatch-5_3_18-150300_59_71-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755241" version="1" comment="kernel-livepatch-5_3_18-150300_59_76-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755242" version="1" comment="kernel-livepatch-5_3_18-150300_59_87-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755243" version="1" comment="kernel-livepatch-5_3_18-150300_59_90-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755244" version="1" comment="kernel-livepatch-5_3_18-150300_59_93-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755245" version="1" comment="kernel-livepatch-5_3_18-150300_59_98-default is &gt;=7-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755390" version="1" comment="kernel-livepatch-5_14_21-150400_22-default is &gt;=13-150400.13.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755391" version="1" comment="kernel-livepatch-5_14_21-150400_24_11-default is &gt;=10-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755392" version="1" comment="kernel-livepatch-5_14_21-150400_24_18-default is &gt;=10-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755248" version="1" comment="kernel-livepatch-5_14_21-150400_24_21-default is &gt;=9-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755393" version="1" comment="kernel-livepatch-5_14_21-150400_24_28-default is &gt;=7-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755394" version="1" comment="kernel-livepatch-5_14_21-150400_24_33-default is &gt;=6-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755249" version="1" comment="kernel-livepatch-5_14_21-150400_24_38-default is &gt;=5-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755395" version="1" comment="kernel-livepatch-5_14_21-150400_24_41-default is &gt;=4-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830074" version="1" comment="thunderbird is &lt;102.8.0-2.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830073" version="1" comment="firefox is &lt;102.8.0-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830139" version="1" comment="nss is &lt;3.79.0-5.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830140" version="1" comment="nss-devel is &lt;3.79.0-5.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830141" version="1" comment="nss-pkcs11-devel is &lt;3.79.0-5.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830142" version="1" comment="nss-sysinit is &lt;3.79.0-5.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830143" version="1" comment="nss-tools is &lt;3.79.0-5.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009786219" version="1" comment="kgraft-patch-4_12_14-122_130-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009786220" version="1" comment="kgraft-patch-4_12_14-122_133-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794740" version="1" comment="kgraft-patch-4_12_14-122_136-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795130" version="1" comment="kgraft-patch-4_12_14-122_139-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795131" version="1" comment="kgraft-patch-4_12_14-122_144-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795992" version="1" comment="kgraft-patch-4_12_14-122_147-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751227" version="1" comment="kernel-default is ==4.12.14-122.150.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009786221" version="1" comment="kgraft-patch-4_12_14-122_150-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764702" version="1" comment="kernel-default is ==4.12.14-122.153.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009786222" version="1" comment="kgraft-patch-4_12_14-122_153-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764728" version="1" comment="kernel-default is ==4.12.14-122.156.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009786223" version="1" comment="kgraft-patch-4_12_14-122_156-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795132" version="1" comment="kgraft-patch-4_12_14-122_159-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009786224" version="1" comment="kgraft-patch-4_12_14-122_162-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776023" version="1" comment="kernel-default is &lt;4.12.14-122.162.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795133" version="1" comment="kernel-livepatch-4_12_14-150100_197_120-default is &gt;=13-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782315" version="1" comment="kernel-livepatch-4_12_14-150100_197_123-default is &gt;=10-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782316" version="1" comment="kernel-livepatch-4_12_14-150100_197_126-default is &gt;=10-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794741" version="1" comment="kernel-livepatch-4_12_14-150100_197_131-default is &gt;=8-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795134" version="1" comment="kernel-livepatch-4_12_14-150100_197_134-default is &gt;=7-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764712" version="1" comment="kernel-default is ==4.12.14-150100.197.137.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782317" version="1" comment="kernel-livepatch-4_12_14-150100_197_137-default is &gt;=5-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764731" version="1" comment="kernel-default is ==4.12.14-150100.197.142.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782318" version="1" comment="kernel-livepatch-4_12_14-150100_197_142-default is &gt;=5-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764734" version="1" comment="kernel-default is ==4.12.14-150100.197.145.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782319" version="1" comment="kernel-livepatch-4_12_14-150100_197_145-default is &gt;=5-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764736" version="1" comment="kernel-default is &lt;4.12.14-150100.197.145.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795742" version="1" comment="kernel-livepatch-5_3_18-150200_24_126-default is &gt;=14-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795743" version="1" comment="kernel-livepatch-5_3_18-150200_24_129-default is &gt;=11-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795744" version="1" comment="kernel-livepatch-5_3_18-150200_24_134-default is &gt;=11-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795745" version="1" comment="kernel-livepatch-5_3_18-150200_24_139-default is &gt;=8-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795746" version="1" comment="kernel-livepatch-5_3_18-150200_24_142-default is &gt;=7-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795747" version="1" comment="kernel-livepatch-5_3_18-150200_24_145-default is &gt;=6-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764715" version="1" comment="kernel-default is ==5.3.18-150200.24.148.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795748" version="1" comment="kernel-livepatch-5_3_18-150200_24_148-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795749" version="1" comment="kernel-livepatch-5_3_18-150200_24_151-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795750" version="1" comment="kernel-livepatch-5_3_18-150200_24_154-default is &gt;=3-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776030" version="1" comment="kernel-default is &lt;5.3.18-150200.24.154.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795751" version="1" comment="kernel-livepatch-5_3_18-150300_59_101-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794742" version="1" comment="kernel-livepatch-5_3_18-150300_59_106-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795752" version="1" comment="kernel-livepatch-5_3_18-150300_59_109-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795753" version="1" comment="kernel-livepatch-5_3_18-150300_59_112-default is &gt;=7-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795824" version="1" comment="kernel-livepatch-5_3_18-150300_59_115-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764718" version="1" comment="kernel-default is ==5.3.18-150300.59.118.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795993" version="1" comment="kernel-livepatch-5_3_18-150300_59_118-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795825" version="1" comment="kernel-livepatch-5_3_18-150300_59_121-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795994" version="1" comment="kernel-livepatch-5_3_18-150300_59_124-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795135" version="1" comment="kernel-livepatch-5_3_18-150300_59_90-default is &gt;=14-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794743" version="1" comment="kernel-livepatch-5_3_18-150300_59_93-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795136" version="1" comment="kernel-livepatch-5_3_18-150300_59_98-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796654" version="1" comment="kernel-livepatch-5_14_21-150400_15_11-rt is &gt;=7-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795995" version="1" comment="kernel-livepatch-5_14_21-150400_24_18-default is &gt;=14-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795996" version="1" comment="kernel-livepatch-5_14_21-150400_24_21-default is &gt;=13-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795997" version="1" comment="kernel-livepatch-5_14_21-150400_24_28-default is &gt;=11-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795998" version="1" comment="kernel-livepatch-5_14_21-150400_24_33-default is &gt;=10-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795999" version="1" comment="kernel-livepatch-5_14_21-150400_24_38-default is &gt;=9-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796000" version="1" comment="kernel-livepatch-5_14_21-150400_24_41-default is &gt;=8-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796001" version="1" comment="kernel-livepatch-5_14_21-150400_24_46-default is &gt;=7-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796002" version="1" comment="kernel-livepatch-5_14_21-150400_24_55-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796003" version="1" comment="kernel-livepatch-5_14_21-150400_24_60-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796004" version="1" comment="kernel-livepatch-5_14_21-150400_24_63-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796005" version="1" comment="kernel-livepatch-5_14_21-150400_24_66-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796006" version="1" comment="kernel-default is &lt;5.14.21-150400.24.66.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796660" version="1" comment="kernel-livepatch-5_14_21-150500_11-rt is &gt;=3-150500.6.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796007" version="1" comment="kernel-livepatch-5_14_21-150500_53-default is &gt;=3-150500.6.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751207" version="1" comment="kernel-livepatch-5_3_18-150200_24_142-default is &gt;=2-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751209" version="1" comment="kernel-livepatch-5_3_18-150200_24_145-default is &gt;=2-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751211" version="1" comment="kernel-livepatch-5_3_18-150300_59_109-default is &gt;=3-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751213" version="1" comment="kernel-livepatch-5_3_18-150300_59_112-default is &gt;=2-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751215" version="1" comment="kernel-livepatch-5_3_18-150300_59_115-default is &gt;=2-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750644" version="1" comment="kernel-livepatch-5_14_21-150400_15_11-rt is &gt;=2-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751217" version="1" comment="kernel-livepatch-5_14_21-150400_24_46-default is &gt;=2-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755122" version="1" comment="kernel-default is ==4.12.14-95.120.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755123" version="1" comment="kgraft-patch-4_12_14-95_120-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755250" version="1" comment="kgraft-patch-4_12_14-122_150-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751229" version="1" comment="kernel-default is &lt;4.12.14-122.150.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755251" version="1" comment="kernel-livepatch-5_14_21-150400_15_11-rt is &gt;=3-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755642" version="1" comment="kernel-livepatch-5_14_21-150400_24_46-default is &gt;=3-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764693" version="1" comment="kgraft-patch-4_12_14-122_124-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764694" version="1" comment="kgraft-patch-4_12_14-122_127-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764695" version="1" comment="kgraft-patch-4_12_14-122_130-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764696" version="1" comment="kgraft-patch-4_12_14-122_133-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764697" version="1" comment="kgraft-patch-4_12_14-122_136-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764698" version="1" comment="kgraft-patch-4_12_14-122_139-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764699" version="1" comment="kgraft-patch-4_12_14-122_144-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764700" version="1" comment="kgraft-patch-4_12_14-122_147-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764701" version="1" comment="kgraft-patch-4_12_14-122_150-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764703" version="1" comment="kgraft-patch-4_12_14-122_153-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807351" version="1" comment="kgraft-patch-4_12_14-122_176-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807696" version="1" comment="kgraft-patch-4_12_14-122_179-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807697" version="1" comment="kernel-default is &lt;4.12.14-122.179.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764705" version="1" comment="kernel-livepatch-4_12_14-150100_197_114-default is &gt;=12-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764706" version="1" comment="kernel-livepatch-4_12_14-150100_197_117-default is &gt;=10-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764707" version="1" comment="kernel-livepatch-4_12_14-150100_197_120-default is &gt;=10-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764708" version="1" comment="kernel-livepatch-4_12_14-150100_197_123-default is &gt;=7-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764709" version="1" comment="kernel-livepatch-4_12_14-150100_197_126-default is &gt;=7-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764710" version="1" comment="kernel-livepatch-4_12_14-150100_197_131-default is &gt;=5-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764711" version="1" comment="kernel-livepatch-4_12_14-150100_197_134-default is &gt;=4-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764713" version="1" comment="kernel-livepatch-4_12_14-150100_197_137-default is &gt;=2-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807353" version="1" comment="kernel-default is ==4.12.14-150100.197.157.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807354" version="1" comment="kernel-livepatch-4_12_14-150100_197_157-default is &gt;=2-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807355" version="1" comment="kernel-default is &lt;4.12.14-150100.197.157.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877719" version="1" comment="kernel-default is &lt;5.14.21-150400.24.55.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769736" version="1" comment="kgraft-patch-4_12_14-95_102-default is &gt;=11-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769737" version="1" comment="kgraft-patch-4_12_14-95_105-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769987" version="1" comment="kgraft-patch-4_12_14-95_108-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770216" version="1" comment="kgraft-patch-4_12_14-95_111-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769988" version="1" comment="kgraft-patch-4_12_14-95_114-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769989" version="1" comment="kgraft-patch-4_12_14-95_117-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769738" version="1" comment="kgraft-patch-4_12_14-95_120-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755124" version="1" comment="kernel-default is &lt;4.12.14-95.120.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770217" version="1" comment="kgraft-patch-4_12_14-122_127-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770218" version="1" comment="kgraft-patch-4_12_14-122_130-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770219" version="1" comment="kgraft-patch-4_12_14-122_133-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769990" version="1" comment="kgraft-patch-4_12_14-122_136-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769991" version="1" comment="kgraft-patch-4_12_14-122_139-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769992" version="1" comment="kgraft-patch-4_12_14-122_144-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770220" version="1" comment="kgraft-patch-4_12_14-122_147-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770221" version="1" comment="kgraft-patch-4_12_14-122_150-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769993" version="1" comment="kgraft-patch-4_12_14-122_153-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764704" version="1" comment="kernel-default is &lt;4.12.14-122.153.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770222" version="1" comment="kernel-livepatch-4_12_14-150100_197_117-default is &gt;=11-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769994" version="1" comment="kernel-livepatch-4_12_14-150100_197_120-default is &gt;=11-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770223" version="1" comment="kernel-livepatch-4_12_14-150100_197_123-default is &gt;=8-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769995" version="1" comment="kernel-livepatch-4_12_14-150100_197_126-default is &gt;=8-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769996" version="1" comment="kernel-livepatch-4_12_14-150100_197_131-default is &gt;=6-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769997" version="1" comment="kernel-livepatch-4_12_14-150100_197_134-default is &gt;=5-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769998" version="1" comment="kernel-livepatch-4_12_14-150100_197_137-default is &gt;=3-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764714" version="1" comment="kernel-default is &lt;4.12.14-150100.197.137.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830159" version="1" comment="tigervnc is &lt;1.8.0-25.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830160" version="1" comment="tigervnc-icons is &lt;1.8.0-25.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830161" version="1" comment="tigervnc-license is &lt;1.8.0-25.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830162" version="1" comment="tigervnc-server is &lt;1.8.0-25.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830163" version="1" comment="tigervnc-server-applet is &lt;1.8.0-25.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830164" version="1" comment="tigervnc-server-minimal is &lt;1.8.0-25.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830165" version="1" comment="tigervnc-server-module is &lt;1.8.0-25.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830166" version="1" comment="xorg-x11-server-Xdmx is &lt;1.20.4-23.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830167" version="1" comment="xorg-x11-server-Xephyr is &lt;1.20.4-23.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830168" version="1" comment="xorg-x11-server-Xnest is &lt;1.20.4-23.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830169" version="1" comment="xorg-x11-server-Xorg is &lt;1.20.4-23.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830170" version="1" comment="xorg-x11-server-Xvfb is &lt;1.20.4-23.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830171" version="1" comment="xorg-x11-server-Xwayland is &lt;1.20.4-23.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830172" version="1" comment="xorg-x11-server-common is &lt;1.20.4-23.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830173" version="1" comment="xorg-x11-server-devel is &lt;1.20.4-23.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830174" version="1" comment="xorg-x11-server-source is &lt;1.20.4-23.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755397" version="1" comment="kernel-livepatch-5_14_21-150400_24_55-default is &gt;=2-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798679" version="1" comment="kgraft-patch-4_12_14-122_133-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798650" version="1" comment="kgraft-patch-4_12_14-122_136-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798651" version="1" comment="kgraft-patch-4_12_14-122_139-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798680" version="1" comment="kgraft-patch-4_12_14-122_144-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798681" version="1" comment="kgraft-patch-4_12_14-122_147-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798652" version="1" comment="kgraft-patch-4_12_14-122_150-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798653" version="1" comment="kgraft-patch-4_12_14-122_153-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798682" version="1" comment="kgraft-patch-4_12_14-122_156-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798654" version="1" comment="kgraft-patch-4_12_14-122_159-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798655" version="1" comment="kgraft-patch-4_12_14-122_162-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798683" version="1" comment="kgraft-patch-4_12_14-122_165-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798685" version="1" comment="kgraft-patch-4_12_14-122_173-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816438" version="1" comment="kgraft-patch-4_12_14-122_183-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845681" version="1" comment="kgraft-patch-4_12_14-122_186-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845683" version="1" comment="kgraft-patch-4_12_14-122_189-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849120" version="1" comment="kgraft-patch-4_12_14-122_194-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798903" version="1" comment="kernel-livepatch-4_12_14-150100_197_123-default is &gt;=11-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798687" version="1" comment="kernel-livepatch-4_12_14-150100_197_126-default is &gt;=11-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798904" version="1" comment="kernel-livepatch-4_12_14-150100_197_131-default is &gt;=9-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798905" version="1" comment="kernel-livepatch-4_12_14-150100_197_134-default is &gt;=8-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798906" version="1" comment="kernel-livepatch-4_12_14-150100_197_137-default is &gt;=6-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798907" version="1" comment="kernel-livepatch-4_12_14-150100_197_142-default is &gt;=6-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799060" version="1" comment="kernel-livepatch-4_12_14-150100_197_145-default is &gt;=6-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775802" version="1" comment="kernel-default is ==4.12.14-150100.197.148.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799061" version="1" comment="kernel-livepatch-4_12_14-150100_197_148-default is &gt;=4-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782321" version="1" comment="kernel-default is ==4.12.14-150100.197.151.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799062" version="1" comment="kernel-livepatch-4_12_14-150100_197_151-default is &gt;=3-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799063" version="1" comment="kernel-default is ==4.12.14-150100.197.154.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799064" version="1" comment="kernel-livepatch-4_12_14-150100_197_154-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816087" version="1" comment="kernel-default is ==4.12.14-150100.197.160.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816088" version="1" comment="kernel-livepatch-4_12_14-150100_197_160-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845685" version="1" comment="kernel-default is ==4.12.14-150100.197.165.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845686" version="1" comment="kernel-livepatch-4_12_14-150100_197_165-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845687" version="1" comment="kernel-default is ==4.12.14-150100.197.168.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845688" version="1" comment="kernel-livepatch-4_12_14-150100_197_168-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845689" version="1" comment="kernel-default is &lt;4.12.14-150100.197.168.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799066" version="1" comment="kernel-livepatch-5_3_18-150200_24_129-default is &gt;=12-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798908" version="1" comment="kernel-livepatch-5_3_18-150200_24_134-default is &gt;=12-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799558" version="1" comment="kernel-livepatch-5_3_18-150200_24_139-default is &gt;=9-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799067" version="1" comment="kernel-livepatch-5_3_18-150200_24_142-default is &gt;=8-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799068" version="1" comment="kernel-livepatch-5_3_18-150200_24_145-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799069" version="1" comment="kernel-livepatch-5_3_18-150200_24_148-default is &gt;=6-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799070" version="1" comment="kernel-livepatch-5_3_18-150200_24_151-default is &gt;=6-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799559" version="1" comment="kernel-livepatch-5_3_18-150200_24_154-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799560" version="1" comment="kernel-livepatch-5_3_18-150200_24_157-default is &gt;=3-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799562" version="1" comment="kernel-livepatch-5_3_18-150200_24_160-default is &gt;=2-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804086" version="1" comment="kernel-livepatch-5_3_18-150200_24_163-default is &gt;=2-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804088" version="1" comment="kernel-livepatch-5_3_18-150200_24_166-default is &gt;=2-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816091" version="1" comment="kernel-livepatch-5_3_18-150200_24_169-default is &gt;=2-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845691" version="1" comment="kernel-livepatch-5_3_18-150200_24_172-default is &gt;=2-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845860" version="1" comment="kernel-livepatch-5_3_18-150200_24_175-default is &gt;=2-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849455" version="1" comment="kernel-livepatch-5_3_18-150200_24_178-default is &gt;=2-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799630" version="1" comment="kernel-livepatch-5_3_18-150300_59_101-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799690" version="1" comment="kernel-livepatch-5_3_18-150300_59_106-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799631" version="1" comment="kernel-livepatch-5_3_18-150300_59_109-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799632" version="1" comment="kernel-livepatch-5_3_18-150300_59_112-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799633" version="1" comment="kernel-livepatch-5_3_18-150300_59_115-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799634" version="1" comment="kernel-livepatch-5_3_18-150300_59_118-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799635" version="1" comment="kernel-livepatch-5_3_18-150300_59_121-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799636" version="1" comment="kernel-livepatch-5_3_18-150300_59_124-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799637" version="1" comment="kernel-livepatch-5_3_18-150300_59_127-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799639" version="1" comment="kernel-livepatch-5_3_18-150300_59_130-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804091" version="1" comment="kernel-livepatch-5_3_18-150300_59_133-default is &gt;=2-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804093" version="1" comment="kernel-livepatch-5_3_18-150300_59_138-default is &gt;=2-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816441" version="1" comment="kernel-livepatch-5_3_18-150300_59_141-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845694" version="1" comment="kernel-livepatch-5_3_18-150300_59_144-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845696" version="1" comment="kernel-livepatch-5_3_18-150300_59_147-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849458" version="1" comment="kernel-livepatch-5_3_18-150300_59_150-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799564" version="1" comment="kernel-livepatch-5_3_18-150300_59_90-default is &gt;=15-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799640" version="1" comment="kernel-livepatch-5_3_18-150300_59_93-default is &gt;=14-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799641" version="1" comment="kernel-livepatch-5_3_18-150300_59_98-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798909" version="1" comment="kernel-livepatch-5_14_21-150400_15_11-rt is &gt;=8-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799642" version="1" comment="kernel-livepatch-5_14_21-150400_24_21-default is &gt;=14-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799643" version="1" comment="kernel-livepatch-5_14_21-150400_24_28-default is &gt;=12-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799644" version="1" comment="kernel-livepatch-5_14_21-150400_24_33-default is &gt;=11-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799645" version="1" comment="kernel-livepatch-5_14_21-150400_24_38-default is &gt;=10-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799646" version="1" comment="kernel-livepatch-5_14_21-150400_24_41-default is &gt;=9-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799647" version="1" comment="kernel-livepatch-5_14_21-150400_24_46-default is &gt;=8-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799648" version="1" comment="kernel-livepatch-5_14_21-150400_24_55-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799649" version="1" comment="kernel-livepatch-5_14_21-150400_24_60-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799650" version="1" comment="kernel-livepatch-5_14_21-150400_24_63-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799651" version="1" comment="kernel-livepatch-5_14_21-150400_24_66-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798916" version="1" comment="kernel-livepatch-5_14_21-150500_11-rt is &gt;=4-150500.9.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799652" version="1" comment="kernel-livepatch-5_14_21-150500_53-default is &gt;=4-150500.9.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764716" version="1" comment="kernel-livepatch-5_3_18-150200_24_148-default is &gt;=2-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764717" version="1" comment="kernel-default is &lt;5.3.18-150200.24.148.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764719" version="1" comment="kernel-livepatch-5_3_18-150300_59_118-default is &gt;=2-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830175" version="1" comment="firefox is &lt;102.10.0-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764720" version="1" comment="kgraft-patch-4_12_14-95_102-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764721" version="1" comment="kgraft-patch-4_12_14-95_105-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764722" version="1" comment="kgraft-patch-4_12_14-95_108-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764723" version="1" comment="kgraft-patch-4_12_14-95_111-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764724" version="1" comment="kgraft-patch-4_12_14-95_114-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764725" version="1" comment="kgraft-patch-4_12_14-95_117-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764726" version="1" comment="kgraft-patch-4_12_14-95_120-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764727" version="1" comment="kgraft-patch-4_12_14-95_99-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764729" version="1" comment="kgraft-patch-4_12_14-122_156-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764730" version="1" comment="kernel-default is &lt;4.12.14-122.156.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764732" version="1" comment="kernel-livepatch-4_12_14-150100_197_142-default is &gt;=2-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764733" version="1" comment="kernel-default is &lt;4.12.14-150100.197.142.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830207" version="1" comment="libwebp is &lt;0.3.0-11.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830208" version="1" comment="libwebp-devel is &lt;0.3.0-11.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830209" version="1" comment="libwebp-java is &lt;0.3.0-11.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830210" version="1" comment="libwebp-tools is &lt;0.3.0-11.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776019" version="1" comment="kgraft-patch-4_12_14-122_130-default is &gt;=12-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775786" version="1" comment="kgraft-patch-4_12_14-122_133-default is &gt;=10-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775787" version="1" comment="kgraft-patch-4_12_14-122_136-default is &gt;=9-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775788" version="1" comment="kgraft-patch-4_12_14-122_139-default is &gt;=8-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775789" version="1" comment="kgraft-patch-4_12_14-122_144-default is &gt;=7-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775790" version="1" comment="kgraft-patch-4_12_14-122_147-default is &gt;=6-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775791" version="1" comment="kgraft-patch-4_12_14-122_150-default is &gt;=6-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775792" version="1" comment="kgraft-patch-4_12_14-122_153-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775793" version="1" comment="kgraft-patch-4_12_14-122_156-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776020" version="1" comment="kgraft-patch-4_12_14-122_159-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776022" version="1" comment="kgraft-patch-4_12_14-122_162-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775794" version="1" comment="kernel-livepatch-4_12_14-150100_197_120-default is &gt;=12-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775795" version="1" comment="kernel-livepatch-4_12_14-150100_197_123-default is &gt;=9-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775796" version="1" comment="kernel-livepatch-4_12_14-150100_197_126-default is &gt;=9-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775797" version="1" comment="kernel-livepatch-4_12_14-150100_197_131-default is &gt;=7-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775798" version="1" comment="kernel-livepatch-4_12_14-150100_197_134-default is &gt;=6-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775799" version="1" comment="kernel-livepatch-4_12_14-150100_197_137-default is &gt;=4-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775800" version="1" comment="kernel-livepatch-4_12_14-150100_197_142-default is &gt;=4-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775801" version="1" comment="kernel-livepatch-4_12_14-150100_197_145-default is &gt;=4-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775803" version="1" comment="kernel-livepatch-4_12_14-150100_197_148-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775804" version="1" comment="kernel-default is &lt;4.12.14-150100.197.148.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775805" version="1" comment="kernel-livepatch-5_3_18-150200_24_126-default is &gt;=13-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776024" version="1" comment="kernel-livepatch-5_3_18-150200_24_129-default is &gt;=10-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775806" version="1" comment="kernel-livepatch-5_3_18-150200_24_134-default is &gt;=10-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776025" version="1" comment="kernel-livepatch-5_3_18-150200_24_139-default is &gt;=7-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775807" version="1" comment="kernel-livepatch-5_3_18-150200_24_142-default is &gt;=6-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776026" version="1" comment="kernel-livepatch-5_3_18-150200_24_145-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776027" version="1" comment="kernel-livepatch-5_3_18-150200_24_148-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775808" version="1" comment="kernel-livepatch-5_3_18-150200_24_151-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776029" version="1" comment="kernel-livepatch-5_3_18-150200_24_154-default is &gt;=2-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776031" version="1" comment="kernel-livepatch-5_3_18-150300_59_101-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776032" version="1" comment="kernel-livepatch-5_3_18-150300_59_106-default is &gt;=7-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775809" version="1" comment="kernel-livepatch-5_3_18-150300_59_109-default is &gt;=7-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776033" version="1" comment="kernel-livepatch-5_3_18-150300_59_112-default is &gt;=6-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775810" version="1" comment="kernel-livepatch-5_3_18-150300_59_115-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775811" version="1" comment="kernel-livepatch-5_3_18-150300_59_118-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775812" version="1" comment="kernel-livepatch-5_3_18-150300_59_121-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775814" version="1" comment="kernel-livepatch-5_3_18-150300_59_124-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775815" version="1" comment="kernel-livepatch-5_3_18-150300_59_90-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775816" version="1" comment="kernel-livepatch-5_3_18-150300_59_93-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775817" version="1" comment="kernel-livepatch-5_3_18-150300_59_98-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775818" version="1" comment="kernel-livepatch-5_14_21-150400_15_11-rt is &gt;=6-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775823" version="1" comment="kernel-livepatch-5_14_21-150400_24_18-default is &gt;=13-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775824" version="1" comment="kernel-livepatch-5_14_21-150400_24_21-default is &gt;=12-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775825" version="1" comment="kernel-livepatch-5_14_21-150400_24_28-default is &gt;=10-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775826" version="1" comment="kernel-livepatch-5_14_21-150400_24_33-default is &gt;=9-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775827" version="1" comment="kernel-livepatch-5_14_21-150400_24_38-default is &gt;=8-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775828" version="1" comment="kernel-livepatch-5_14_21-150400_24_41-default is &gt;=7-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775829" version="1" comment="kernel-livepatch-5_14_21-150400_24_46-default is &gt;=6-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775830" version="1" comment="kernel-livepatch-5_14_21-150400_24_55-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775831" version="1" comment="kernel-livepatch-5_14_21-150400_24_60-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776228" version="1" comment="kernel-livepatch-5_14_21-150500_11-rt is &gt;=2-150500.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776035" version="1" comment="kernel-livepatch-5_14_21-150500_53-default is &gt;=2-150500.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830472" version="1" comment="iwl100-firmware is &lt;39.31.5.1-81.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830473" version="1" comment="iwl1000-firmware is &lt;39.31.5.1-81.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830474" version="1" comment="iwl105-firmware is &lt;18.168.6.1-81.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830475" version="1" comment="iwl135-firmware is &lt;18.168.6.1-81.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830476" version="1" comment="iwl2000-firmware is &lt;18.168.6.1-81.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830477" version="1" comment="iwl2030-firmware is &lt;18.168.6.1-81.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830478" version="1" comment="iwl3160-firmware is &lt;25.30.13.0-81.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830479" version="1" comment="iwl3945-firmware is &lt;15.32.2.9-81.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830480" version="1" comment="iwl4965-firmware is &lt;228.61.2.24-81.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830481" version="1" comment="iwl5000-firmware is &lt;8.83.5.1_1-81.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830482" version="1" comment="iwl5150-firmware is &lt;8.24.2.2-81.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830483" version="1" comment="iwl6000-firmware is &lt;9.221.4.1-81.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830484" version="1" comment="iwl6000g2a-firmware is &lt;18.168.6.1-81.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830485" version="1" comment="iwl6000g2b-firmware is &lt;18.168.6.1-81.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830486" version="1" comment="iwl6050-firmware is &lt;41.28.5.1-81.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830487" version="1" comment="iwl7260-firmware is &lt;25.30.13.0-81.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830488" version="1" comment="linux-firmware is &lt;20200421-81.git78c0348.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846124" version="1" comment="iwl100-firmware is &lt;39.31.5.1-82.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846125" version="1" comment="iwl1000-firmware is &lt;39.31.5.1-82.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846126" version="1" comment="iwl105-firmware is &lt;18.168.6.1-82.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846127" version="1" comment="iwl135-firmware is &lt;18.168.6.1-82.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846128" version="1" comment="iwl2000-firmware is &lt;18.168.6.1-82.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846129" version="1" comment="iwl2030-firmware is &lt;18.168.6.1-82.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846130" version="1" comment="iwl3160-firmware is &lt;25.30.13.0-82.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846131" version="1" comment="iwl3945-firmware is &lt;15.32.2.9-82.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846132" version="1" comment="iwl4965-firmware is &lt;228.61.2.24-82.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846133" version="1" comment="iwl5000-firmware is &lt;8.83.5.1_1-82.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846134" version="1" comment="iwl5150-firmware is &lt;8.24.2.2-82.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846135" version="1" comment="iwl6000-firmware is &lt;9.221.4.1-82.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846136" version="1" comment="iwl6000g2a-firmware is &lt;18.168.6.1-82.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846137" version="1" comment="iwl6000g2b-firmware is &lt;18.168.6.1-82.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846138" version="1" comment="iwl6050-firmware is &lt;41.28.5.1-82.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846139" version="1" comment="iwl7260-firmware is &lt;25.30.13.0-82.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846140" version="1" comment="linux-firmware is &lt;20200421-82.git78c0348.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830336" version="1" comment="bpftool is &lt;3.10.0-1160.99.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830337" version="1" comment="kernel is &lt;3.10.0-1160.99.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830338" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1160.99.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830339" version="1" comment="kernel-debug is &lt;3.10.0-1160.99.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830342" version="1" comment="kernel-doc is &lt;3.10.0-1160.99.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830343" version="1" comment="kernel-headers is &lt;3.10.0-1160.99.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830344" version="1" comment="kernel-tools is &lt;3.10.0-1160.99.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830345" version="1" comment="kernel-tools-libs is &lt;3.10.0-1160.99.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830347" version="1" comment="perf is &lt;3.10.0-1160.99.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830348" version="1" comment="python-perf is &lt;3.10.0-1160.99.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830264" version="1" comment="open-vm-tools is &lt;11.0.5-3.el7_9.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830265" version="1" comment="open-vm-tools-desktop is &lt;11.0.5-3.el7_9.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830266" version="1" comment="open-vm-tools-devel is &lt;11.0.5-3.el7_9.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830267" version="1" comment="open-vm-tools-test is &lt;11.0.5-3.el7_9.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830353" version="1" comment="open-vm-tools is &lt;11.0.5-3.el7_9.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830354" version="1" comment="open-vm-tools-desktop is &lt;11.0.5-3.el7_9.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830355" version="1" comment="open-vm-tools-devel is &lt;11.0.5-3.el7_9.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830356" version="1" comment="open-vm-tools-test is &lt;11.0.5-3.el7_9.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796009" version="1" comment="kernel-livepatch-5_3_18-150300_59_127-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796011" version="1" comment="kernel-livepatch-5_14_21-150400_24_69-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796013" version="1" comment="kernel-livepatch-5_14_21-150400_24_74-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796014" version="1" comment="kernel-default is &lt;5.14.21-150400.24.74.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796016" version="1" comment="kernel-livepatch-5_14_21-150500_55_12-default is &gt;=2-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796018" version="1" comment="kernel-livepatch-5_14_21-150500_55_7-default is &gt;=2-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816442" version="1" comment="kernel-livepatch-5_3_18-150200_24_139-default is &gt;=11-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816443" version="1" comment="kernel-livepatch-5_3_18-150200_24_142-default is &gt;=10-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816444" version="1" comment="kernel-livepatch-5_3_18-150200_24_145-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816093" version="1" comment="kernel-livepatch-5_3_18-150200_24_148-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816094" version="1" comment="kernel-livepatch-5_3_18-150200_24_151-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816445" version="1" comment="kernel-livepatch-5_3_18-150200_24_154-default is &gt;=6-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816095" version="1" comment="kernel-livepatch-5_3_18-150200_24_157-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816096" version="1" comment="kernel-livepatch-5_3_18-150200_24_160-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816097" version="1" comment="kernel-livepatch-5_3_18-150200_24_163-default is &gt;=3-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816446" version="1" comment="kernel-livepatch-5_3_18-150200_24_166-default is &gt;=3-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804089" version="1" comment="kernel-default is &lt;5.3.18-150200.24.166.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816447" version="1" comment="kernel-livepatch-5_3_18-150300_59_101-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816448" version="1" comment="kernel-livepatch-5_3_18-150300_59_106-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816449" version="1" comment="kernel-livepatch-5_3_18-150300_59_109-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816450" version="1" comment="kernel-livepatch-5_3_18-150300_59_112-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816451" version="1" comment="kernel-livepatch-5_3_18-150300_59_115-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816098" version="1" comment="kernel-livepatch-5_3_18-150300_59_118-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816099" version="1" comment="kernel-livepatch-5_3_18-150300_59_121-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816100" version="1" comment="kernel-livepatch-5_3_18-150300_59_124-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816101" version="1" comment="kernel-livepatch-5_3_18-150300_59_127-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816102" version="1" comment="kernel-livepatch-5_3_18-150300_59_130-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816452" version="1" comment="kernel-livepatch-5_3_18-150300_59_133-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816453" version="1" comment="kernel-livepatch-5_3_18-150300_59_138-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816454" version="1" comment="kernel-default is &lt;5.3.18-150300.59.138.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816104" version="1" comment="kernel-livepatch-5_14_21-150400_15_11-rt is &gt;=10-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816456" version="1" comment="kernel-livepatch-5_14_21-150400_24_28-default is &gt;=14-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816457" version="1" comment="kernel-livepatch-5_14_21-150400_24_33-default is &gt;=13-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816458" version="1" comment="kernel-livepatch-5_14_21-150400_24_38-default is &gt;=12-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816114" version="1" comment="kernel-livepatch-5_14_21-150400_24_41-default is &gt;=11-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816459" version="1" comment="kernel-livepatch-5_14_21-150400_24_46-default is &gt;=10-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816460" version="1" comment="kernel-livepatch-5_14_21-150400_24_55-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816115" version="1" comment="kernel-livepatch-5_14_21-150400_24_60-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816116" version="1" comment="kernel-livepatch-5_14_21-150400_24_63-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816461" version="1" comment="kernel-livepatch-5_14_21-150400_24_66-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816462" version="1" comment="kernel-livepatch-5_14_21-150400_24_69-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816117" version="1" comment="kernel-livepatch-5_14_21-150400_24_74-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816463" version="1" comment="kernel-livepatch-5_14_21-150400_24_81-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816118" version="1" comment="kernel-livepatch-5_14_21-150400_24_88-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816465" version="1" comment="kernel-livepatch-5_14_21-150400_24_92-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852611" version="1" comment="kernel-default is &lt;5.14.21-150400.24.92.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816119" version="1" comment="kernel-livepatch-5_14_21-150500_11-rt is &gt;=6-150500.15.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816124" version="1" comment="kernel-livepatch-5_14_21-150500_53-default is &gt;=6-150500.15.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816466" version="1" comment="kernel-livepatch-5_14_21-150500_55_12-default is &gt;=5-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816467" version="1" comment="kernel-livepatch-5_14_21-150500_55_19-default is &gt;=4-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816468" version="1" comment="kernel-livepatch-5_14_21-150500_55_28-default is &gt;=3-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816470" version="1" comment="kernel-livepatch-5_14_21-150500_55_31-default is &gt;=2-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816125" version="1" comment="kernel-livepatch-5_14_21-150500_55_7-default is &gt;=5-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770231" version="1" comment="kernel-default is &lt;4.12.14-122.159.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829977" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.362.b08-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829978" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.362.b08-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829979" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.362.b08-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829980" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.362.b08-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829981" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.362.b08-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829982" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.362.b08-1.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829983" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.362.b08-1.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829984" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.362.b08-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829968" version="1" comment="java-11-openjdk is &lt;11.0.18.0.10-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829969" version="1" comment="java-11-openjdk-demo is &lt;11.0.18.0.10-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829970" version="1" comment="java-11-openjdk-devel is &lt;11.0.18.0.10-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829971" version="1" comment="java-11-openjdk-headless is &lt;11.0.18.0.10-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829972" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.18.0.10-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829973" version="1" comment="java-11-openjdk-javadoc-zip is &lt;11.0.18.0.10-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829974" version="1" comment="java-11-openjdk-jmods is &lt;11.0.18.0.10-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829975" version="1" comment="java-11-openjdk-src is &lt;11.0.18.0.10-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829976" version="1" comment="java-11-openjdk-static-libs is &lt;11.0.18.0.10-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830186" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.372.b07-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830187" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.372.b07-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830188" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.372.b07-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830189" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.372.b07-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830190" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.372.b07-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830191" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.372.b07-1.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830192" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.372.b07-1.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830193" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.372.b07-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830177" version="1" comment="java-11-openjdk is &lt;11.0.19.0.7-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830178" version="1" comment="java-11-openjdk-demo is &lt;11.0.19.0.7-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830179" version="1" comment="java-11-openjdk-devel is &lt;11.0.19.0.7-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830180" version="1" comment="java-11-openjdk-headless is &lt;11.0.19.0.7-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830181" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.19.0.7-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830182" version="1" comment="java-11-openjdk-javadoc-zip is &lt;11.0.19.0.7-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830183" version="1" comment="java-11-openjdk-jmods is &lt;11.0.19.0.7-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830184" version="1" comment="java-11-openjdk-src is &lt;11.0.19.0.7-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830185" version="1" comment="java-11-openjdk-static-libs is &lt;11.0.19.0.7-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830307" version="1" comment="java-11-openjdk is &lt;11.0.20.0.8-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830308" version="1" comment="java-11-openjdk-demo is &lt;11.0.20.0.8-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830309" version="1" comment="java-11-openjdk-devel is &lt;11.0.20.0.8-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830310" version="1" comment="java-11-openjdk-headless is &lt;11.0.20.0.8-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830311" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.20.0.8-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830312" version="1" comment="java-11-openjdk-javadoc-zip is &lt;11.0.20.0.8-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830313" version="1" comment="java-11-openjdk-jmods is &lt;11.0.20.0.8-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830314" version="1" comment="java-11-openjdk-src is &lt;11.0.20.0.8-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830315" version="1" comment="java-11-openjdk-static-libs is &lt;11.0.20.0.8-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830299" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.382.b05-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830300" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.382.b05-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830301" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.382.b05-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830302" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.382.b05-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830303" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.382.b05-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830304" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.382.b05-1.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830305" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.382.b05-1.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830306" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.382.b05-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830408" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.392.b08-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830409" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.392.b08-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830410" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.392.b08-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830411" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.392.b08-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830412" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.392.b08-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830413" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.392.b08-2.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830414" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.392.b08-2.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830415" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.392.b08-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830399" version="1" comment="java-11-openjdk is &lt;11.0.21.0.9-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830400" version="1" comment="java-11-openjdk-demo is &lt;11.0.21.0.9-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830401" version="1" comment="java-11-openjdk-devel is &lt;11.0.21.0.9-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830402" version="1" comment="java-11-openjdk-headless is &lt;11.0.21.0.9-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830403" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.21.0.9-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830404" version="1" comment="java-11-openjdk-javadoc-zip is &lt;11.0.21.0.9-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830405" version="1" comment="java-11-openjdk-jmods is &lt;11.0.21.0.9-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830406" version="1" comment="java-11-openjdk-src is &lt;11.0.21.0.9-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830407" version="1" comment="java-11-openjdk-static-libs is &lt;11.0.21.0.9-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829985" version="1" comment="sudo is &lt;1.8.23-10.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829986" version="1" comment="sudo-devel is &lt;1.8.23-10.el7_9.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764735" version="1" comment="kernel-livepatch-4_12_14-150100_197_145-default is &gt;=2-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764738" version="1" comment="kernel-livepatch-5_3_18-150200_24_151-default is &gt;=2-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764739" version="1" comment="kernel-default is &lt;5.3.18-150200.24.151.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764741" version="1" comment="kernel-livepatch-5_3_18-150300_59_121-default is &gt;=2-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764744" version="1" comment="kernel-livepatch-5_14_21-150400_24_63-default is &gt;=2-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796021" version="1" comment="kernel-default is &lt;5.14.21-150400.24.63.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742253" version="1" comment="kernel-default is &lt;4.12.14-95.114.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742260" version="1" comment="kernel-default is &lt;4.12.14-150100.197.131.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770224" version="1" comment="kernel-livepatch-5_14_21-150400_24_21-default is &gt;=11-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770225" version="1" comment="kernel-livepatch-5_14_21-150400_24_28-default is &gt;=9-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770226" version="1" comment="kernel-livepatch-5_14_21-150400_24_33-default is &gt;=8-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770253" version="1" comment="kernel-livepatch-5_14_21-150400_24_38-default is &gt;=7-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770227" version="1" comment="kernel-livepatch-5_14_21-150400_24_41-default is &gt;=6-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830246" version="1" comment="python is &lt;2.7.5-93.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830247" version="1" comment="python-debug is &lt;2.7.5-93.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830248" version="1" comment="python-devel is &lt;2.7.5-93.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830249" version="1" comment="python-libs is &lt;2.7.5-93.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830250" version="1" comment="python-test is &lt;2.7.5-93.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830251" version="1" comment="python-tools is &lt;2.7.5-93.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830253" version="1" comment="python3 is &lt;3.6.8-19.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830254" version="1" comment="python3-debug is &lt;3.6.8-19.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830255" version="1" comment="python3-devel is &lt;3.6.8-19.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830256" version="1" comment="python3-idle is &lt;3.6.8-19.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830257" version="1" comment="python3-libs is &lt;3.6.8-19.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830258" version="1" comment="python3-test is &lt;3.6.8-19.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830259" version="1" comment="python3-tkinter is &lt;3.6.8-19.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830252" version="1" comment="tkinter is &lt;2.7.5-93.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830222" version="1" comment="emacs-git is &lt;1.8.3.1-25.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830223" version="1" comment="emacs-git-el is &lt;1.8.3.1-25.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830224" version="1" comment="git is &lt;1.8.3.1-25.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830225" version="1" comment="git-all is &lt;1.8.3.1-25.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830226" version="1" comment="git-bzr is &lt;1.8.3.1-25.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830227" version="1" comment="git-cvs is &lt;1.8.3.1-25.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830228" version="1" comment="git-daemon is &lt;1.8.3.1-25.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830229" version="1" comment="git-email is &lt;1.8.3.1-25.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830230" version="1" comment="git-gnome-keyring is &lt;1.8.3.1-25.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830231" version="1" comment="git-gui is &lt;1.8.3.1-25.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830232" version="1" comment="git-hg is &lt;1.8.3.1-25.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830233" version="1" comment="git-instaweb is &lt;1.8.3.1-25.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830234" version="1" comment="git-p4 is &lt;1.8.3.1-25.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830235" version="1" comment="git-svn is &lt;1.8.3.1-25.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830236" version="1" comment="gitk is &lt;1.8.3.1-25.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830237" version="1" comment="gitweb is &lt;1.8.3.1-25.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830238" version="1" comment="perl-Git is &lt;1.8.3.1-25.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830239" version="1" comment="perl-Git-SVN is &lt;1.8.3.1-25.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830151" version="1" comment="httpd is &lt;2.4.6-98.el7_9.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830152" version="1" comment="httpd-devel is &lt;2.4.6-98.el7_9.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830153" version="1" comment="httpd-manual is &lt;2.4.6-98.el7_9.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830154" version="1" comment="httpd-tools is &lt;2.4.6-98.el7_9.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830155" version="1" comment="mod_ldap is &lt;2.4.6-98.el7_9.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830156" version="1" comment="mod_proxy_html is &lt;2.4.6-98.el7_9.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830157" version="1" comment="mod_session is &lt;2.4.6-98.el7_9.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830158" version="1" comment="mod_ssl is &lt;2.4.6-98.el7_9.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830144" version="1" comment="firefox is &lt;102.9.0-3.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830150" version="1" comment="thunderbird is &lt;102.9.0-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751218" version="1" comment="kgraft-patch-4_12_14-95_102-default is &gt;=8-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751219" version="1" comment="kgraft-patch-4_12_14-95_105-default is &gt;=8-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751220" version="1" comment="kgraft-patch-4_12_14-95_108-default is &gt;=6-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751221" version="1" comment="kgraft-patch-4_12_14-95_111-default is &gt;=5-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751222" version="1" comment="kgraft-patch-4_12_14-95_114-default is &gt;=3-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751224" version="1" comment="kgraft-patch-4_12_14-95_117-default is &gt;=2-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751225" version="1" comment="kgraft-patch-4_12_14-95_96-default is &gt;=13-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751226" version="1" comment="kgraft-patch-4_12_14-95_99-default is &gt;=10-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751228" version="1" comment="kgraft-patch-4_12_14-122_150-default is &gt;=2-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750765" version="1" comment="kernel-livepatch-4_12_14-150100_197_111-default is &gt;=13-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750766" version="1" comment="kernel-livepatch-4_12_14-150100_197_114-default is &gt;=10-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751230" version="1" comment="kernel-livepatch-4_12_14-150100_197_117-default is &gt;=8-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750767" version="1" comment="kernel-livepatch-4_12_14-150100_197_120-default is &gt;=8-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750768" version="1" comment="kernel-livepatch-4_12_14-150100_197_123-default is &gt;=5-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751231" version="1" comment="kernel-livepatch-4_12_14-150100_197_126-default is &gt;=5-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751232" version="1" comment="kernel-livepatch-4_12_14-150100_197_131-default is &gt;=3-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751234" version="1" comment="kernel-livepatch-4_12_14-150100_197_134-default is &gt;=2-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948422" version="1" comment="libgudev1 is &lt;219-78.el7_9.11 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948423" version="1" comment="libgudev1-devel is &lt;219-78.el7_9.11 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948424" version="1" comment="systemd is &lt;219-78.el7_9.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948425" version="1" comment="systemd-devel is &lt;219-78.el7_9.11 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948426" version="1" comment="systemd-journal-gateway is &lt;219-78.el7_9.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948427" version="1" comment="systemd-libs is &lt;219-78.el7_9.11 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948428" version="1" comment="systemd-networkd is &lt;219-78.el7_9.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948429" version="1" comment="systemd-python is &lt;219-78.el7_9.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948430" version="1" comment="systemd-resolved is &lt;219-78.el7_9.11 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948431" version="1" comment="systemd-sysv is &lt;219-78.el7_9.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830283" version="1" comment="bind is &lt;9.11.4-26.P2.el7_9.14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830284" version="1" comment="bind-chroot is &lt;9.11.4-26.P2.el7_9.14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830285" version="1" comment="bind-devel is &lt;9.11.4-26.P2.el7_9.14 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830286" version="1" comment="bind-export-devel is &lt;9.11.4-26.P2.el7_9.14 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830287" version="1" comment="bind-export-libs is &lt;9.11.4-26.P2.el7_9.14 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830288" version="1" comment="bind-libs is &lt;9.11.4-26.P2.el7_9.14 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830289" version="1" comment="bind-libs-lite is &lt;9.11.4-26.P2.el7_9.14 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830290" version="1" comment="bind-license is &lt;9.11.4-26.P2.el7_9.14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830291" version="1" comment="bind-lite-devel is &lt;9.11.4-26.P2.el7_9.14 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830292" version="1" comment="bind-pkcs11 is &lt;9.11.4-26.P2.el7_9.14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830293" version="1" comment="bind-pkcs11-devel is &lt;9.11.4-26.P2.el7_9.14 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830294" version="1" comment="bind-pkcs11-libs is &lt;9.11.4-26.P2.el7_9.14 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830295" version="1" comment="bind-pkcs11-utils is &lt;9.11.4-26.P2.el7_9.14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830296" version="1" comment="bind-sdb is &lt;9.11.4-26.P2.el7_9.14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830297" version="1" comment="bind-sdb-chroot is &lt;9.11.4-26.P2.el7_9.14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830298" version="1" comment="bind-utils is &lt;9.11.4-26.P2.el7_9.14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770228" version="1" comment="kgraft-patch-4_12_14-122_156-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770230" version="1" comment="kgraft-patch-4_12_14-122_159-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770001" version="1" comment="kernel-livepatch-4_12_14-150100_197_142-default is &gt;=3-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770002" version="1" comment="kernel-livepatch-4_12_14-150100_197_145-default is &gt;=3-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770003" version="1" comment="kernel-livepatch-5_14_21-150400_15_11-rt is &gt;=5-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770232" version="1" comment="kernel-livepatch-5_14_21-150400_24_46-default is &gt;=5-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770233" version="1" comment="kernel-livepatch-5_14_21-150400_24_55-default is &gt;=4-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782320" version="1" comment="kernel-livepatch-4_12_14-150100_197_148-default is &gt;=3-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799653" version="1" comment="kernel-livepatch-5_14_21-150400_24_69-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796022" version="1" comment="kernel-default is &lt;5.14.21-150400.24.69.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799654" version="1" comment="kernel-livepatch-5_14_21-150500_55_7-default is &gt;=3-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944402" version="1" comment="iwl100-firmware is &lt;39.31.5.1-999.34.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944403" version="1" comment="iwl1000-firmware is &lt;39.31.5.1-999.34.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944404" version="1" comment="iwl105-firmware is &lt;18.168.6.1-999.34.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944405" version="1" comment="iwl135-firmware is &lt;18.168.6.1-999.34.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944406" version="1" comment="iwl2000-firmware is &lt;18.168.6.1-999.34.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944407" version="1" comment="iwl2030-firmware is &lt;18.168.6.1-999.34.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944408" version="1" comment="iwl3160-firmware is &lt;22.0.7.0-999.34.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944409" version="1" comment="iwl3945-firmware is &lt;15.32.2.9-999.34.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944410" version="1" comment="iwl4965-firmware is &lt;228.61.2.24-999.34.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944411" version="1" comment="iwl5000-firmware is &lt;8.83.5.1_1-999.34.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944412" version="1" comment="iwl5150-firmware is &lt;8.24.2.2-999.34.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944413" version="1" comment="iwl6000-firmware is &lt;9.221.4.1-999.34.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944414" version="1" comment="iwl6000g2a-firmware is &lt;17.168.5.3-999.34.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944415" version="1" comment="iwl6000g2b-firmware is &lt;17.168.5.2-999.34.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944416" version="1" comment="iwl6050-firmware is &lt;41.28.5.1-999.34.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944417" version="1" comment="iwl7260-firmware is &lt;22.0.7.0-999.34.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944933" version="1" comment="iwlax2xx-firmware is &lt;20240715-999.34.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947247" version="1" comment="linux-firmware is &lt;20240715-999.34.git4c8fb21e.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770234" version="1" comment="kernel-default is ==4.12.14-95.125.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770235" version="1" comment="kgraft-patch-4_12_14-95_125-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770236" version="1" comment="kernel-default is &lt;4.12.14-95.125.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770005" version="1" comment="kernel-livepatch-5_3_18-150200_24_148-default is &gt;=3-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770237" version="1" comment="kernel-livepatch-5_3_18-150200_24_151-default is &gt;=3-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770238" version="1" comment="kernel-livepatch-5_3_18-150300_59_118-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770239" version="1" comment="kernel-livepatch-5_3_18-150300_59_121-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770240" version="1" comment="kernel-livepatch-5_14_21-150400_24_60-default is &gt;=3-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770241" version="1" comment="kernel-livepatch-5_14_21-150400_24_63-default is &gt;=3-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037326" version="1" comment="perl is &lt;5.16.3-299.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037327" version="1" comment="perl-CPAN is &lt;1.9800-299.el7_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037328" version="1" comment="perl-ExtUtils-CBuilder is &lt;0.28.2.6-299.el7_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037329" version="1" comment="perl-ExtUtils-Embed is &lt;1.30-299.el7_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037330" version="1" comment="perl-ExtUtils-Install is &lt;1.58-299.el7_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037331" version="1" comment="perl-IO-Zlib is &lt;1.10-299.el7_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037332" version="1" comment="perl-Locale-Maketext-Simple is &lt;0.21-299.el7_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037333" version="1" comment="perl-Module-CoreList is &lt;2.76.02-299.el7_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037334" version="1" comment="perl-Module-Loaded is &lt;0.08-299.el7_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037335" version="1" comment="perl-Object-Accessor is &lt;0.42-299.el7_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037336" version="1" comment="perl-Package-Constants is &lt;0.02-299.el7_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037337" version="1" comment="perl-Pod-Escapes is &lt;1.04-299.el7_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037338" version="1" comment="perl-Time-Piece is &lt;1.20.1-299.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037339" version="1" comment="perl-core is &lt;5.16.3-299.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037340" version="1" comment="perl-devel is &lt;5.16.3-299.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037341" version="1" comment="perl-libs is &lt;5.16.3-299.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037342" version="1" comment="perl-macros is &lt;5.16.3-299.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037343" version="1" comment="perl-tests is &lt;5.16.3-299.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830262" version="1" comment="c-ares is &lt;1.10.0-3.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830263" version="1" comment="c-ares-devel is &lt;1.10.0-3.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830211" version="1" comment="firefox is &lt;102.11.0-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830221" version="1" comment="thunderbird is &lt;102.11.0-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830370" version="1" comment="bpftool is &lt;3.10.0-1160.102.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830371" version="1" comment="kernel is &lt;3.10.0-1160.102.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830372" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1160.102.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830373" version="1" comment="kernel-debug is &lt;3.10.0-1160.102.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830376" version="1" comment="kernel-doc is &lt;3.10.0-1160.102.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830377" version="1" comment="kernel-headers is &lt;3.10.0-1160.102.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830378" version="1" comment="kernel-tools is &lt;3.10.0-1160.102.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830379" version="1" comment="kernel-tools-libs is &lt;3.10.0-1160.102.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830381" version="1" comment="perf is &lt;3.10.0-1160.102.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830382" version="1" comment="python-perf is &lt;3.10.0-1160.102.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830329" version="1" comment="cups is &lt;1.6.3-52.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830330" version="1" comment="cups-client is &lt;1.6.3-52.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830331" version="1" comment="cups-devel is &lt;1.6.3-52.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830332" version="1" comment="cups-filesystem is &lt;1.6.3-52.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830333" version="1" comment="cups-ipptool is &lt;1.6.3-52.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830334" version="1" comment="cups-libs is &lt;1.6.3-52.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830335" version="1" comment="cups-lpd is &lt;1.6.3-52.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830383" version="1" comment="bind is &lt;9.11.4-26.P2.el7_9.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830384" version="1" comment="bind-chroot is &lt;9.11.4-26.P2.el7_9.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830385" version="1" comment="bind-devel is &lt;9.11.4-26.P2.el7_9.15 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830386" version="1" comment="bind-export-devel is &lt;9.11.4-26.P2.el7_9.15 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830387" version="1" comment="bind-export-libs is &lt;9.11.4-26.P2.el7_9.15 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830388" version="1" comment="bind-libs is &lt;9.11.4-26.P2.el7_9.15 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830389" version="1" comment="bind-libs-lite is &lt;9.11.4-26.P2.el7_9.15 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830390" version="1" comment="bind-license is &lt;9.11.4-26.P2.el7_9.15 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830391" version="1" comment="bind-lite-devel is &lt;9.11.4-26.P2.el7_9.15 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830392" version="1" comment="bind-pkcs11 is &lt;9.11.4-26.P2.el7_9.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830393" version="1" comment="bind-pkcs11-devel is &lt;9.11.4-26.P2.el7_9.15 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830394" version="1" comment="bind-pkcs11-libs is &lt;9.11.4-26.P2.el7_9.15 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830395" version="1" comment="bind-pkcs11-utils is &lt;9.11.4-26.P2.el7_9.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830396" version="1" comment="bind-sdb is &lt;9.11.4-26.P2.el7_9.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830397" version="1" comment="bind-sdb-chroot is &lt;9.11.4-26.P2.el7_9.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830398" version="1" comment="bind-utils is &lt;9.11.4-26.P2.el7_9.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804094" version="1" comment="kernel-livepatch-5_3_18-150200_24_129-default is &gt;=13-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804095" version="1" comment="kernel-livepatch-5_3_18-150200_24_134-default is &gt;=13-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804096" version="1" comment="kernel-livepatch-5_3_18-150200_24_139-default is &gt;=10-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804097" version="1" comment="kernel-livepatch-5_3_18-150200_24_142-default is &gt;=9-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807356" version="1" comment="kernel-livepatch-5_3_18-150200_24_145-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804098" version="1" comment="kernel-livepatch-5_3_18-150200_24_148-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804099" version="1" comment="kernel-livepatch-5_3_18-150200_24_151-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804100" version="1" comment="kernel-livepatch-5_3_18-150200_24_154-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804101" version="1" comment="kernel-livepatch-5_3_18-150200_24_157-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795756" version="1" comment="kernel-default is &lt;5.3.18-150200.24.157.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804102" version="1" comment="kernel-livepatch-5_3_18-150300_59_101-default is &gt;=12-150300.2.4" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804103" version="1" comment="kernel-livepatch-5_3_18-150300_59_106-default is &gt;=10-150300.2.4" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804104" version="1" comment="kernel-livepatch-5_3_18-150300_59_109-default is &gt;=10-150300.2.4" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804105" version="1" comment="kernel-livepatch-5_3_18-150300_59_112-default is &gt;=9-150300.2.4" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804106" version="1" comment="kernel-livepatch-5_3_18-150300_59_115-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804107" version="1" comment="kernel-livepatch-5_3_18-150300_59_118-default is &gt;=7-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807357" version="1" comment="kernel-livepatch-5_3_18-150300_59_121-default is &gt;=7-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803408" version="1" comment="kernel-livepatch-5_3_18-150300_59_124-default is &gt;=5-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804108" version="1" comment="kernel-livepatch-5_3_18-150300_59_127-default is &gt;=4-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804109" version="1" comment="kernel-livepatch-5_3_18-150300_59_98-default is &gt;=13-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803252" version="1" comment="kernel-livepatch-5_14_21-150400_15_11-rt is &gt;=9-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807336" version="1" comment="kernel-livepatch-5_14_21-150400_24_28-default is &gt;=13-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807698" version="1" comment="kernel-livepatch-5_14_21-150400_24_33-default is &gt;=12-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807358" version="1" comment="kernel-livepatch-5_14_21-150400_24_38-default is &gt;=11-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807359" version="1" comment="kernel-livepatch-5_14_21-150400_24_41-default is &gt;=10-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807699" version="1" comment="kernel-livepatch-5_14_21-150400_24_46-default is &gt;=9-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807700" version="1" comment="kernel-livepatch-5_14_21-150400_24_55-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807360" version="1" comment="kernel-livepatch-5_14_21-150400_24_60-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807701" version="1" comment="kernel-livepatch-5_14_21-150400_24_63-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807702" version="1" comment="kernel-livepatch-5_14_21-150400_24_66-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807703" version="1" comment="kernel-livepatch-5_14_21-150400_24_69-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803099" version="1" comment="kernel-livepatch-5_14_21-150500_11-rt is &gt;=5-150500.12.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807704" version="1" comment="kernel-livepatch-5_14_21-150500_53-default is &gt;=5-150500.12.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807705" version="1" comment="kernel-livepatch-5_14_21-150500_55_7-default is &gt;=4-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830446" version="1" comment="open-vm-tools is &lt;11.0.5-3.el7_9.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830447" version="1" comment="open-vm-tools-desktop is &lt;11.0.5-3.el7_9.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830448" version="1" comment="open-vm-tools-devel is &lt;11.0.5-3.el7_9.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830449" version="1" comment="open-vm-tools-test is &lt;11.0.5-3.el7_9.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830328" version="1" comment="thunderbird is &lt;102.14.0-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830261" version="1" comment="firefox is &lt;102.12.0-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830260" version="1" comment="thunderbird is &lt;102.12.0-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040954" version="1" comment="microcode_ctl is &lt;2.1-73.23.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794745" version="1" comment="kgraft-patch-4_12_14-122_165-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794746" version="1" comment="kernel-default is &lt;4.12.14-122.165.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782322" version="1" comment="kernel-livepatch-4_12_14-150100_197_151-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782323" version="1" comment="kernel-default is &lt;4.12.14-150100.197.151.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795755" version="1" comment="kernel-livepatch-5_3_18-150200_24_157-default is &gt;=2-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775833" version="1" comment="kernel-livepatch-5_14_21-150400_24_63-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776037" version="1" comment="kernel-livepatch-5_14_21-150400_24_66-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830364" version="1" comment="firefox is &lt;115.3.1-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830363" version="1" comment="thunderbird is &lt;115.3.1-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799655" version="1" comment="kernel-livepatch-5_14_21-150400_24_74-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799691" version="1" comment="kernel-livepatch-5_14_21-150500_55_12-default is &gt;=3-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849473" version="1" comment="kernel-default is &lt;5.14.21-150400.24.81.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830269" version="1" comment="firefox is &lt;102.13.0-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830268" version="1" comment="thunderbird is &lt;102.13.0-2.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830444" version="1" comment="plexus-archiver is &lt;2.4.2-6.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830445" version="1" comment="plexus-archiver-javadoc is &lt;2.4.2-6.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960784" version="1" comment="xerces-c is &lt;3.1.1-10.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960785" version="1" comment="xerces-c-devel is &lt;3.1.1-10.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960786" version="1" comment="xerces-c-doc is &lt;3.1.1-10.el7_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798686" version="1" comment="kernel-default is &lt;4.12.14-122.173.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799065" version="1" comment="kernel-default is &lt;4.12.14-150100.197.154.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830316" version="1" comment="iperf3 is &lt;3.1.7-3.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830317" version="1" comment="iperf3-devel is &lt;3.1.7-3.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830318" version="1" comment="openssh is &lt;7.4p1-23.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830319" version="1" comment="openssh-askpass is &lt;7.4p1-23.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830320" version="1" comment="openssh-cavs is &lt;7.4p1-23.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830321" version="1" comment="openssh-clients is &lt;7.4p1-23.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830322" version="1" comment="openssh-keycat is &lt;7.4p1-23.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830323" version="1" comment="openssh-ldap is &lt;7.4p1-23.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830324" version="1" comment="openssh-server is &lt;7.4p1-23.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830325" version="1" comment="openssh-server-sysvinit is &lt;7.4p1-23.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830326" version="1" comment="pam_ssh_agent_auth is &lt;0.10.3-2.23.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852098" version="1" comment="kernel-livepatch-5_14_21-150500_55_12-default is &gt;=8-150500.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852367" version="1" comment="kernel-livepatch-5_14_21-150500_55_19-default is &gt;=7-150500.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852368" version="1" comment="kernel-livepatch-5_14_21-150500_55_28-default is &gt;=6-150500.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852369" version="1" comment="kernel-livepatch-5_14_21-150500_55_31-default is &gt;=5-150500.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852099" version="1" comment="kernel-livepatch-5_14_21-150500_55_7-default is &gt;=8-150500.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849459" version="1" comment="kgraft-patch-4_12_14-122_147-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849122" version="1" comment="kgraft-patch-4_12_14-122_150-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849123" version="1" comment="kgraft-patch-4_12_14-122_153-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849124" version="1" comment="kgraft-patch-4_12_14-122_156-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849125" version="1" comment="kgraft-patch-4_12_14-122_159-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849126" version="1" comment="kgraft-patch-4_12_14-122_162-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849127" version="1" comment="kgraft-patch-4_12_14-122_165-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849128" version="1" comment="kgraft-patch-4_12_14-122_173-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849129" version="1" comment="kgraft-patch-4_12_14-122_176-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849130" version="1" comment="kgraft-patch-4_12_14-122_179-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849131" version="1" comment="kgraft-patch-4_12_14-122_183-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816439" version="1" comment="kernel-default is &lt;4.12.14-122.183.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849132" version="1" comment="kernel-livepatch-5_3_18-150200_24_142-default is &gt;=12-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849133" version="1" comment="kernel-livepatch-5_3_18-150200_24_145-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849134" version="1" comment="kernel-livepatch-5_3_18-150200_24_148-default is &gt;=10-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849135" version="1" comment="kernel-livepatch-5_3_18-150200_24_151-default is &gt;=10-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849136" version="1" comment="kernel-livepatch-5_3_18-150200_24_154-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849137" version="1" comment="kernel-livepatch-5_3_18-150200_24_157-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849138" version="1" comment="kernel-livepatch-5_3_18-150200_24_160-default is &gt;=6-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849139" version="1" comment="kernel-livepatch-5_3_18-150200_24_163-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849140" version="1" comment="kernel-livepatch-5_3_18-150200_24_166-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849141" version="1" comment="kernel-livepatch-5_3_18-150200_24_169-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816092" version="1" comment="kernel-default is &lt;5.3.18-150200.24.169.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849460" version="1" comment="kernel-livepatch-5_3_18-150300_59_109-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849461" version="1" comment="kernel-livepatch-5_3_18-150300_59_112-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849462" version="1" comment="kernel-livepatch-5_3_18-150300_59_115-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849463" version="1" comment="kernel-livepatch-5_3_18-150300_59_118-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849464" version="1" comment="kernel-livepatch-5_3_18-150300_59_121-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849465" version="1" comment="kernel-livepatch-5_3_18-150300_59_124-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849466" version="1" comment="kernel-livepatch-5_3_18-150300_59_127-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849467" version="1" comment="kernel-livepatch-5_3_18-150300_59_130-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849468" version="1" comment="kernel-livepatch-5_3_18-150300_59_133-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849469" version="1" comment="kernel-livepatch-5_3_18-150300_59_138-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849470" version="1" comment="kernel-livepatch-5_3_18-150300_59_141-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845718" version="1" comment="kernel-default is &lt;5.3.18-150300.59.141.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849142" version="1" comment="kernel-livepatch-5_14_21-150400_24_41-default is &gt;=13-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849143" version="1" comment="kernel-livepatch-5_14_21-150400_24_46-default is &gt;=12-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849144" version="1" comment="kernel-livepatch-5_14_21-150400_24_55-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849145" version="1" comment="kernel-livepatch-5_14_21-150400_24_60-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849146" version="1" comment="kernel-livepatch-5_14_21-150400_24_63-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849147" version="1" comment="kernel-livepatch-5_14_21-150400_24_66-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849471" version="1" comment="kernel-livepatch-5_14_21-150400_24_69-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849148" version="1" comment="kernel-livepatch-5_14_21-150400_24_74-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849472" version="1" comment="kernel-livepatch-5_14_21-150400_24_81-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849149" version="1" comment="kernel-livepatch-5_14_21-150500_11-rt is &gt;=8-150500.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849474" version="1" comment="kernel-livepatch-5_14_21-150500_53-default is &gt;=8-150500.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849475" version="1" comment="kernel-livepatch-5_14_21-150500_55_12-default is &gt;=7-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849476" version="1" comment="kernel-livepatch-5_14_21-150500_55_19-default is &gt;=6-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849477" version="1" comment="kernel-livepatch-5_14_21-150500_55_7-default is &gt;=7-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804110" version="1" comment="kernel-livepatch-5_3_18-150300_59_130-default is &gt;=3-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807706" version="1" comment="kernel-livepatch-5_14_21-150400_24_74-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807707" version="1" comment="kernel-livepatch-5_14_21-150500_55_12-default is &gt;=4-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830437" version="1" comment="python is &lt;2.7.5-94.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830438" version="1" comment="python-debug is &lt;2.7.5-94.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830439" version="1" comment="python-devel is &lt;2.7.5-94.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830440" version="1" comment="python-libs is &lt;2.7.5-94.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830441" version="1" comment="python-test is &lt;2.7.5-94.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830442" version="1" comment="python-tools is &lt;2.7.5-94.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830430" version="1" comment="python3 is &lt;3.6.8-21.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830431" version="1" comment="python3-debug is &lt;3.6.8-21.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830432" version="1" comment="python3-devel is &lt;3.6.8-21.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830433" version="1" comment="python3-idle is &lt;3.6.8-21.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830434" version="1" comment="python3-libs is &lt;3.6.8-21.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830435" version="1" comment="python3-test is &lt;3.6.8-21.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830436" version="1" comment="python3-tkinter is &lt;3.6.8-21.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830443" version="1" comment="tkinter is &lt;2.7.5-94.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830327" version="1" comment="firefox is &lt;102.14.0-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830350" version="1" comment="firefox is &lt;102.15.0-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830349" version="1" comment="thunderbird is &lt;102.15.0-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960781" version="1" comment="mokutil is &lt;15.8-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960782" version="1" comment="shim-ia32 is &lt;15.8-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960783" version="1" comment="shim-x64 is &lt;15.8-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807708" version="1" comment="kernel-livepatch-5_14_21-150400_24_81-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807709" version="1" comment="kernel-livepatch-5_14_21-150500_55_19-default is &gt;=3-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799563" version="1" comment="kernel-default is &lt;5.3.18-150200.24.160.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799693" version="1" comment="kernel-livepatch-5_14_21-150400_24_81-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799695" version="1" comment="kernel-livepatch-5_14_21-150500_55_19-default is &gt;=2-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854051" version="1" comment="kernel-livepatch-5_3_18-150200_24_145-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854052" version="1" comment="kernel-livepatch-5_3_18-150200_24_148-default is &gt;=12-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854053" version="1" comment="kernel-livepatch-5_3_18-150200_24_151-default is &gt;=12-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854054" version="1" comment="kernel-livepatch-5_3_18-150200_24_154-default is &gt;=10-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854055" version="1" comment="kernel-livepatch-5_3_18-150200_24_157-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854056" version="1" comment="kernel-livepatch-5_3_18-150200_24_160-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854328" version="1" comment="kernel-livepatch-5_3_18-150200_24_163-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804116" version="1" comment="kernel-default is &lt;5.3.18-150200.24.163.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854057" version="1" comment="kernel-livepatch-5_3_18-150300_59_115-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854058" version="1" comment="kernel-livepatch-5_3_18-150300_59_118-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854059" version="1" comment="kernel-livepatch-5_3_18-150300_59_121-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854060" version="1" comment="kernel-livepatch-5_3_18-150300_59_124-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854061" version="1" comment="kernel-livepatch-5_3_18-150300_59_127-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854062" version="1" comment="kernel-livepatch-5_3_18-150300_59_130-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854063" version="1" comment="kernel-livepatch-5_3_18-150300_59_133-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816477" version="1" comment="kernel-default is &lt;5.3.18-150300.59.133.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854707" version="1" comment="kernel-livepatch-5_14_21-150400_24_55-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854708" version="1" comment="kernel-livepatch-5_14_21-150400_24_60-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854836" version="1" comment="kernel-livepatch-5_14_21-150400_24_63-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854709" version="1" comment="kernel-livepatch-5_14_21-150400_24_66-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854710" version="1" comment="kernel-livepatch-5_14_21-150400_24_69-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854711" version="1" comment="kernel-livepatch-5_14_21-150400_24_74-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854712" version="1" comment="kernel-livepatch-5_14_21-150400_24_81-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854837" version="1" comment="kernel-livepatch-5_14_21-150400_24_88-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849151" version="1" comment="kernel-default is &lt;5.14.21-150400.24.88.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853704" version="1" comment="kernel-livepatch-5_14_21-150500_11-rt is &gt;=10-150500.9.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854064" version="1" comment="kernel-livepatch-5_14_21-150500_53-default is &gt;=10-150500.9.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854065" version="1" comment="kernel-livepatch-5_14_21-150500_55_12-default is &gt;=9-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854066" version="1" comment="kernel-livepatch-5_14_21-150500_55_19-default is &gt;=8-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854067" version="1" comment="kernel-livepatch-5_14_21-150500_55_28-default is &gt;=7-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854068" version="1" comment="kernel-livepatch-5_14_21-150500_55_7-default is &gt;=9-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844447" version="1" comment="bpftool is &lt;3.10.0-1160.108.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844448" version="1" comment="kernel is &lt;3.10.0-1160.108.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844449" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1160.108.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844450" version="1" comment="kernel-debug is &lt;3.10.0-1160.108.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844453" version="1" comment="kernel-doc is &lt;3.10.0-1160.108.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844454" version="1" comment="kernel-headers is &lt;3.10.0-1160.108.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844455" version="1" comment="kernel-tools is &lt;3.10.0-1160.108.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844456" version="1" comment="kernel-tools-libs is &lt;3.10.0-1160.108.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844458" version="1" comment="perf is &lt;3.10.0-1160.108.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844459" version="1" comment="python-perf is &lt;3.10.0-1160.108.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865880" version="1" comment="bind is &lt;9.11.4-26.P2.el7_9.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865881" version="1" comment="bind-chroot is &lt;9.11.4-26.P2.el7_9.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865882" version="1" comment="bind-devel is &lt;9.11.4-26.P2.el7_9.16 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865883" version="1" comment="bind-dyndb-ldap is &lt;11.1-7.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865884" version="1" comment="bind-export-devel is &lt;9.11.4-26.P2.el7_9.16 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865885" version="1" comment="bind-export-libs is &lt;9.11.4-26.P2.el7_9.16 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865886" version="1" comment="bind-libs is &lt;9.11.4-26.P2.el7_9.16 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865887" version="1" comment="bind-libs-lite is &lt;9.11.4-26.P2.el7_9.16 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865888" version="1" comment="bind-license is &lt;9.11.4-26.P2.el7_9.16 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865889" version="1" comment="bind-lite-devel is &lt;9.11.4-26.P2.el7_9.16 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865890" version="1" comment="bind-pkcs11 is &lt;9.11.4-26.P2.el7_9.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865891" version="1" comment="bind-pkcs11-devel is &lt;9.11.4-26.P2.el7_9.16 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865892" version="1" comment="bind-pkcs11-libs is &lt;9.11.4-26.P2.el7_9.16 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865893" version="1" comment="bind-pkcs11-utils is &lt;9.11.4-26.P2.el7_9.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865894" version="1" comment="bind-sdb is &lt;9.11.4-26.P2.el7_9.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865895" version="1" comment="bind-sdb-chroot is &lt;9.11.4-26.P2.el7_9.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865896" version="1" comment="bind-utils is &lt;9.11.4-26.P2.el7_9.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865897" version="1" comment="dhclient is &lt;4.2.5-83.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865898" version="1" comment="dhcp is &lt;4.2.5-83.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865899" version="1" comment="dhcp-common is &lt;4.2.5-83.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865900" version="1" comment="dhcp-devel is &lt;4.2.5-83.el7_9.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865901" version="1" comment="dhcp-libs is &lt;4.2.5-83.el7_9.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849764" version="1" comment="python-pillow is &lt;2.0.0-24.gitd1c6db8.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849765" version="1" comment="python-pillow-devel is &lt;2.0.0-24.gitd1c6db8.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849766" version="1" comment="python-pillow-doc is &lt;2.0.0-24.gitd1c6db8.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849767" version="1" comment="python-pillow-qt is &lt;2.0.0-24.gitd1c6db8.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849768" version="1" comment="python-pillow-sane is &lt;2.0.0-24.gitd1c6db8.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849769" version="1" comment="python-pillow-tk is &lt;2.0.0-24.gitd1c6db8.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830547" version="1" comment="gstreamer-plugins-bad-free is &lt;0.10.23-24.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830548" version="1" comment="gstreamer-plugins-bad-free-devel is &lt;0.10.23-24.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830549" version="1" comment="gstreamer-plugins-bad-free-devel-docs is &lt;0.10.23-24.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830520" version="1" comment="gstreamer1-plugins-bad-free is &lt;1.10.4-4.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830521" version="1" comment="gstreamer1-plugins-bad-free-devel is &lt;1.10.4-4.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830522" version="1" comment="gstreamer1-plugins-bad-free-gtk is &lt;1.10.4-4.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830416" version="1" comment="firefox is &lt;115.4.0-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816127" version="1" comment="kgraft-patch-4_12_14-122_139-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816128" version="1" comment="kgraft-patch-4_12_14-122_144-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816471" version="1" comment="kgraft-patch-4_12_14-122_147-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816472" version="1" comment="kgraft-patch-4_12_14-122_150-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816473" version="1" comment="kgraft-patch-4_12_14-122_153-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816129" version="1" comment="kgraft-patch-4_12_14-122_156-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816130" version="1" comment="kgraft-patch-4_12_14-122_159-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816474" version="1" comment="kgraft-patch-4_12_14-122_162-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816131" version="1" comment="kgraft-patch-4_12_14-122_165-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816132" version="1" comment="kgraft-patch-4_12_14-122_173-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816133" version="1" comment="kgraft-patch-4_12_14-122_176-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807352" version="1" comment="kernel-default is &lt;4.12.14-122.176.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816475" version="1" comment="kernel-livepatch-4_12_14-150100_197_131-default is &gt;=11-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816476" version="1" comment="kernel-livepatch-4_12_14-150100_197_134-default is &gt;=10-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816134" version="1" comment="kernel-livepatch-4_12_14-150100_197_137-default is &gt;=8-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816135" version="1" comment="kernel-livepatch-4_12_14-150100_197_142-default is &gt;=8-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816136" version="1" comment="kernel-livepatch-4_12_14-150100_197_145-default is &gt;=8-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816137" version="1" comment="kernel-livepatch-4_12_14-150100_197_148-default is &gt;=6-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816138" version="1" comment="kernel-livepatch-4_12_14-150100_197_151-default is &gt;=5-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816139" version="1" comment="kernel-livepatch-4_12_14-150100_197_154-default is &gt;=4-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816140" version="1" comment="kernel-livepatch-4_12_14-150100_197_157-default is &gt;=3-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803255" version="1" comment="kgraft-patch-4_12_14-122_136-default is &gt;=12-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807710" version="1" comment="kgraft-patch-4_12_14-122_139-default is &gt;=11-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807711" version="1" comment="kgraft-patch-4_12_14-122_144-default is &gt;=10-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807712" version="1" comment="kgraft-patch-4_12_14-122_147-default is &gt;=9-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807713" version="1" comment="kgraft-patch-4_12_14-122_150-default is &gt;=9-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807714" version="1" comment="kgraft-patch-4_12_14-122_153-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807715" version="1" comment="kgraft-patch-4_12_14-122_156-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807716" version="1" comment="kgraft-patch-4_12_14-122_159-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803410" version="1" comment="kgraft-patch-4_12_14-122_162-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807717" version="1" comment="kgraft-patch-4_12_14-122_165-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804111" version="1" comment="kgraft-patch-4_12_14-122_173-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807361" version="1" comment="kernel-livepatch-4_12_14-150100_197_123-default is &gt;=12-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804112" version="1" comment="kernel-livepatch-4_12_14-150100_197_126-default is &gt;=12-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807718" version="1" comment="kernel-livepatch-4_12_14-150100_197_131-default is &gt;=10-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807362" version="1" comment="kernel-livepatch-4_12_14-150100_197_134-default is &gt;=9-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804113" version="1" comment="kernel-livepatch-4_12_14-150100_197_137-default is &gt;=7-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807363" version="1" comment="kernel-livepatch-4_12_14-150100_197_142-default is &gt;=7-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807364" version="1" comment="kernel-livepatch-4_12_14-150100_197_145-default is &gt;=7-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807365" version="1" comment="kernel-livepatch-4_12_14-150100_197_148-default is &gt;=5-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807719" version="1" comment="kernel-livepatch-4_12_14-150100_197_151-default is &gt;=4-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804114" version="1" comment="kernel-livepatch-4_12_14-150100_197_154-default is &gt;=3-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804115" version="1" comment="kernel-livepatch-5_3_18-150200_24_160-default is &gt;=3-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807721" version="1" comment="kernel-livepatch-5_14_21-150400_24_88-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807723" version="1" comment="kernel-livepatch-5_14_21-150500_55_28-default is &gt;=2-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854317" version="1" comment="squid is &lt;3.5.20-17.el7_9.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854318" version="1" comment="squid-migration-script is &lt;3.5.20-17.el7_9.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854319" version="1" comment="squid-sysvinit is &lt;3.5.20-17.el7_9.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852602" version="1" comment="kernel-livepatch-5_14_21-150400_24_55-default is &gt;=12-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852603" version="1" comment="kernel-livepatch-5_14_21-150400_24_60-default is &gt;=11-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852604" version="1" comment="kernel-livepatch-5_14_21-150400_24_63-default is &gt;=11-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852605" version="1" comment="kernel-livepatch-5_14_21-150400_24_66-default is &gt;=9-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852606" version="1" comment="kernel-livepatch-5_14_21-150400_24_69-default is &gt;=8-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852607" version="1" comment="kernel-livepatch-5_14_21-150400_24_74-default is &gt;=8-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852608" version="1" comment="kernel-livepatch-5_14_21-150400_24_81-default is &gt;=7-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852609" version="1" comment="kernel-livepatch-5_14_21-150400_24_88-default is &gt;=6-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852610" version="1" comment="kernel-livepatch-5_14_21-150400_24_92-default is &gt;=5-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830427" version="1" comment="squid is &lt;3.5.20-17.el7_9.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830428" version="1" comment="squid-migration-script is &lt;3.5.20-17.el7_9.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830429" version="1" comment="squid-sysvinit is &lt;3.5.20-17.el7_9.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873474" version="1" comment="pki-base is &lt;10.5.18-32.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873475" version="1" comment="pki-base-java is &lt;10.5.18-32.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873476" version="1" comment="pki-ca is &lt;10.5.18-32.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873477" version="1" comment="pki-javadoc is &lt;10.5.18-32.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873478" version="1" comment="pki-kra is &lt;10.5.18-32.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873479" version="1" comment="pki-server is &lt;10.5.18-32.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873480" version="1" comment="pki-symkey is &lt;10.5.18-32.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873481" version="1" comment="pki-tools is &lt;10.5.18-32.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830352" version="1" comment="firefox is &lt;102.15.1-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830351" version="1" comment="thunderbird is &lt;102.15.1-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849150" version="1" comment="kernel-livepatch-5_14_21-150400_24_88-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849478" version="1" comment="kernel-livepatch-5_14_21-150500_55_28-default is &gt;=5-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959700" version="1" comment="unbound is &lt;1.6.6-5.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959701" version="1" comment="unbound-devel is &lt;1.6.6-5.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959702" version="1" comment="unbound-libs is &lt;1.6.6-5.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959703" version="1" comment="unbound-python is &lt;1.6.6-5.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849770" version="1" comment="python-pillow is &lt;2.0.0-25.gitd1c6db8.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849771" version="1" comment="python-pillow-devel is &lt;2.0.0-25.gitd1c6db8.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849772" version="1" comment="python-pillow-doc is &lt;2.0.0-25.gitd1c6db8.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849773" version="1" comment="python-pillow-qt is &lt;2.0.0-25.gitd1c6db8.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849774" version="1" comment="python-pillow-sane is &lt;2.0.0-25.gitd1c6db8.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849775" version="1" comment="python-pillow-tk is &lt;2.0.0-25.gitd1c6db8.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830524" version="1" comment="thunderbird is &lt;115.6.0-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853304" version="1" comment="kgraft-patch-4_12_14-122_150-default is &gt;=13-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852100" version="1" comment="kgraft-patch-4_12_14-122_153-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852101" version="1" comment="kgraft-patch-4_12_14-122_156-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852370" version="1" comment="kgraft-patch-4_12_14-122_159-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852371" version="1" comment="kgraft-patch-4_12_14-122_162-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852372" version="1" comment="kgraft-patch-4_12_14-122_165-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852102" version="1" comment="kgraft-patch-4_12_14-122_173-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852373" version="1" comment="kgraft-patch-4_12_14-122_176-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852374" version="1" comment="kgraft-patch-4_12_14-122_179-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852103" version="1" comment="kgraft-patch-4_12_14-122_183-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852375" version="1" comment="kgraft-patch-4_12_14-122_186-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845730" version="1" comment="kernel-default is &lt;4.12.14-122.186.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852376" version="1" comment="kernel-livepatch-5_3_18-150200_24_145-default is &gt;=12-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852377" version="1" comment="kernel-livepatch-5_3_18-150200_24_148-default is &gt;=11-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852378" version="1" comment="kernel-livepatch-5_3_18-150200_24_151-default is &gt;=11-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852379" version="1" comment="kernel-livepatch-5_3_18-150200_24_154-default is &gt;=9-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852380" version="1" comment="kernel-livepatch-5_3_18-150200_24_157-default is &gt;=8-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852104" version="1" comment="kernel-livepatch-5_3_18-150200_24_160-default is &gt;=7-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852105" version="1" comment="kernel-livepatch-5_3_18-150200_24_163-default is &gt;=6-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852381" version="1" comment="kernel-livepatch-5_3_18-150200_24_166-default is &gt;=6-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852106" version="1" comment="kernel-livepatch-5_3_18-150200_24_169-default is &gt;=5-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852382" version="1" comment="kernel-livepatch-5_3_18-150200_24_172-default is &gt;=4-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845692" version="1" comment="kernel-default is &lt;5.3.18-150200.24.172.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852107" version="1" comment="kernel-livepatch-5_3_18-150300_59_115-default is &gt;=12-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852383" version="1" comment="kernel-livepatch-5_3_18-150300_59_118-default is &gt;=11-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852384" version="1" comment="kernel-livepatch-5_3_18-150300_59_121-default is &gt;=11-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852108" version="1" comment="kernel-livepatch-5_3_18-150300_59_124-default is &gt;=9-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852385" version="1" comment="kernel-livepatch-5_3_18-150300_59_127-default is &gt;=8-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852386" version="1" comment="kernel-livepatch-5_3_18-150300_59_130-default is &gt;=7-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852387" version="1" comment="kernel-livepatch-5_3_18-150300_59_133-default is &gt;=6-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852388" version="1" comment="kernel-livepatch-5_3_18-150300_59_138-default is &gt;=6-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852109" version="1" comment="kernel-livepatch-5_3_18-150300_59_141-default is &gt;=5-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852389" version="1" comment="kernel-livepatch-5_3_18-150300_59_144-default is &gt;=4-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845739" version="1" comment="kernel-default is &lt;5.3.18-150300.59.144.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852612" version="1" comment="kernel-livepatch-5_14_21-150400_24_100-default is &gt;=4-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852613" version="1" comment="kernel-livepatch-5_14_21-150400_24_97-default is &gt;=4-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852390" version="1" comment="kernel-livepatch-5_14_21-150500_55_36-default is &gt;=4-150500.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852391" version="1" comment="kernel-livepatch-5_14_21-150500_55_39-default is &gt;=4-150500.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845575" version="1" comment="kernel-livepatch-5_14_21-150400_15_11-rt is &gt;=11-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845862" version="1" comment="kernel-livepatch-5_14_21-150400_24_41-default is &gt;=12-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845863" version="1" comment="kernel-livepatch-5_14_21-150400_24_46-default is &gt;=11-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845864" version="1" comment="kernel-livepatch-5_14_21-150400_24_55-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845697" version="1" comment="kernel-livepatch-5_14_21-150400_24_60-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845698" version="1" comment="kernel-livepatch-5_14_21-150400_24_63-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845865" version="1" comment="kernel-livepatch-5_14_21-150400_24_66-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845699" version="1" comment="kernel-livepatch-5_14_21-150400_24_69-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845700" version="1" comment="kernel-livepatch-5_14_21-150400_24_74-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845866" version="1" comment="kernel-livepatch-5_14_21-150400_24_81-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845867" version="1" comment="kernel-livepatch-5_14_21-150400_24_88-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845701" version="1" comment="kernel-livepatch-5_14_21-150400_24_92-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845585" version="1" comment="kernel-livepatch-5_14_21-150500_11-rt is &gt;=7-150500.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845868" version="1" comment="kernel-livepatch-5_14_21-150500_53-default is &gt;=7-150500.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845869" version="1" comment="kernel-livepatch-5_14_21-150500_55_12-default is &gt;=6-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845702" version="1" comment="kernel-livepatch-5_14_21-150500_55_19-default is &gt;=5-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845703" version="1" comment="kernel-livepatch-5_14_21-150500_55_28-default is &gt;=4-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845870" version="1" comment="kernel-livepatch-5_14_21-150500_55_31-default is &gt;=3-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845871" version="1" comment="kernel-livepatch-5_14_21-150500_55_7-default is &gt;=6-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849152" version="1" comment="kgraft-patch-4_12_14-122_186-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849153" version="1" comment="kgraft-patch-4_12_14-122_189-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845684" version="1" comment="kernel-default is &lt;4.12.14-122.189.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849154" version="1" comment="kernel-livepatch-5_3_18-150200_24_172-default is &gt;=3-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849479" version="1" comment="kernel-livepatch-5_3_18-150200_24_175-default is &gt;=3-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845861" version="1" comment="kernel-default is &lt;5.3.18-150200.24.175.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849480" version="1" comment="kernel-livepatch-5_3_18-150300_59_144-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849481" version="1" comment="kernel-livepatch-5_3_18-150300_59_147-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849482" version="1" comment="kernel-default is &lt;5.3.18-150300.59.147.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849155" version="1" comment="kernel-livepatch-5_14_21-150400_24_100-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849157" version="1" comment="kernel-livepatch-5_14_21-150400_24_103-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849158" version="1" comment="kernel-livepatch-5_14_21-150400_24_92-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849159" version="1" comment="kernel-livepatch-5_14_21-150400_24_97-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849483" version="1" comment="kernel-livepatch-5_14_21-150500_55_31-default is &gt;=4-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849162" version="1" comment="kernel-livepatch-5_14_21-150500_55_36-default is &gt;=3-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849484" version="1" comment="kernel-livepatch-5_14_21-150500_55_39-default is &gt;=3-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849164" version="1" comment="kernel-livepatch-5_14_21-150500_55_44-default is &gt;=2-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854069" version="1" comment="kgraft-patch-4_12_14-122_150-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854070" version="1" comment="kgraft-patch-4_12_14-122_153-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854071" version="1" comment="kgraft-patch-4_12_14-122_156-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854072" version="1" comment="kgraft-patch-4_12_14-122_159-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854073" version="1" comment="kgraft-patch-4_12_14-122_162-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854074" version="1" comment="kgraft-patch-4_12_14-122_165-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854075" version="1" comment="kgraft-patch-4_12_14-122_173-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854076" version="1" comment="kgraft-patch-4_12_14-122_176-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854077" version="1" comment="kgraft-patch-4_12_14-122_179-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854078" version="1" comment="kgraft-patch-4_12_14-122_183-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854079" version="1" comment="kgraft-patch-4_12_14-122_186-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854080" version="1" comment="kgraft-patch-4_12_14-122_189-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854081" version="1" comment="kgraft-patch-4_12_14-122_194-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849121" version="1" comment="kernel-default is &lt;4.12.14-122.194.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854082" version="1" comment="kernel-livepatch-5_3_18-150200_24_166-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854083" version="1" comment="kernel-livepatch-5_3_18-150200_24_169-default is &gt;=6-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854084" version="1" comment="kernel-livepatch-5_3_18-150200_24_172-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854085" version="1" comment="kernel-livepatch-5_3_18-150200_24_175-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854086" version="1" comment="kernel-livepatch-5_3_18-150200_24_178-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849456" version="1" comment="kernel-default is &lt;5.3.18-150200.24.178.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854087" version="1" comment="kernel-livepatch-5_3_18-150300_59_138-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854088" version="1" comment="kernel-livepatch-5_3_18-150300_59_141-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854089" version="1" comment="kernel-livepatch-5_3_18-150300_59_144-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854090" version="1" comment="kernel-livepatch-5_3_18-150300_59_147-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854091" version="1" comment="kernel-livepatch-5_3_18-150300_59_150-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852396" version="1" comment="kernel-default is &lt;5.3.18-150300.59.150.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854713" version="1" comment="kernel-livepatch-5_14_21-150400_24_100-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854714" version="1" comment="kernel-livepatch-5_14_21-150400_24_103-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854715" version="1" comment="kernel-livepatch-5_14_21-150400_24_92-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854838" version="1" comment="kernel-livepatch-5_14_21-150400_24_97-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854333" version="1" comment="kernel-livepatch-5_14_21-150500_55_31-default is &gt;=6-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854092" version="1" comment="kernel-livepatch-5_14_21-150500_55_36-default is &gt;=5-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854093" version="1" comment="kernel-livepatch-5_14_21-150500_55_39-default is &gt;=5-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854094" version="1" comment="kernel-livepatch-5_14_21-150500_55_44-default is &gt;=4-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868519" version="1" comment="kernel-livepatch-5_14_21-150400_24_66-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868520" version="1" comment="kernel-livepatch-5_14_21-150400_24_69-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868521" version="1" comment="kernel-livepatch-5_14_21-150400_24_74-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868522" version="1" comment="kernel-livepatch-5_14_21-150400_24_81-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868523" version="1" comment="kernel-livepatch-5_14_21-150400_24_88-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868932" version="1" comment="kernel-livepatch-5_14_21-150500_55_12-default is &gt;=12-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868933" version="1" comment="kernel-livepatch-5_14_21-150500_55_19-default is &gt;=11-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868934" version="1" comment="kernel-livepatch-5_14_21-150500_55_28-default is &gt;=10-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868935" version="1" comment="kernel-livepatch-5_14_21-150500_55_7-default is &gt;=12-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948658" version="1" comment="kgraft-patch-4_12_14-122_179-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948659" version="1" comment="kgraft-patch-4_12_14-122_183-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948660" version="1" comment="kgraft-patch-4_12_14-122_186-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948661" version="1" comment="kgraft-patch-4_12_14-122_189-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948662" version="1" comment="kgraft-patch-4_12_14-122_194-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878542" version="1" comment="kernel-default is &lt;4.12.14-122.219.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878065" version="1" comment="kernel-default is &lt;5.3.18-150200.24.194.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878068" version="1" comment="kernel-default is &lt;5.3.18-150300.59.164.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878777" version="1" comment="kernel-default is ==6.4.0-150600.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950845" version="1" comment="kernel-livepatch-6_4_0-150600_21-default is &gt;=6-150600.4.10.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944115" version="1" comment="kernel-default is ==6.4.0-150600.23.14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961319" version="1" comment="kernel-livepatch-6_4_0-150600_23_14-default is &gt;=7-150600.13.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944117" version="1" comment="kernel-default is ==6.4.0-150600.23.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961320" version="1" comment="kernel-livepatch-6_4_0-150600_23_17-default is &gt;=7-150600.13.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950848" version="1" comment="kernel-default is ==6.4.0-150600.23.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960539" version="1" comment="kernel-livepatch-6_4_0-150600_23_22-default is &gt;=3-150600.13.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944934" version="1" comment="kernel-default is ==6.4.0-150600.23.7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961321" version="1" comment="kernel-livepatch-6_4_0-150600_23_7-default is &gt;=7-150600.13.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881324" version="1" comment="kernel-rt is ==6.4.0-150600.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948664" version="1" comment="kernel-livepatch-6_4_0-150600_8-rt is &gt;=5-150600.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881326" version="1" comment="kernel-default is &lt;6.4.0-150600.8.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944114" version="1" comment="kernel-livepatch-6_4_0-150600_21-default is &gt;=4-150600.1.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881325" version="1" comment="kernel-livepatch-6_4_0-150600_8-rt is &gt;=2-150600.3.3.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944935" version="1" comment="kernel-livepatch-6_4_0-150600_23_7-default is &gt;=2-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944936" version="1" comment="kernel-default is &lt;6.4.0-150600.23.7.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977138" version="1" comment="kernel-livepatch-5_3_18-150300_59_158-default is &gt;=17-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976832" version="1" comment="kernel-livepatch-5_3_18-150300_59_161-default is &gt;=16-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977128" version="1" comment="kernel-livepatch-5_3_18-150300_59_164-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976885" version="1" comment="kernel-livepatch-5_3_18-150300_59_167-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969081" version="1" comment="bpftool is &lt;3.10.0-1160.133.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969082" version="1" comment="kernel is &lt;3.10.0-1160.133.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969083" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1160.133.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969084" version="1" comment="kernel-debug is &lt;3.10.0-1160.133.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969087" version="1" comment="kernel-doc is &lt;3.10.0-1160.133.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969088" version="1" comment="kernel-headers is &lt;3.10.0-1160.133.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969089" version="1" comment="kernel-tools is &lt;3.10.0-1160.133.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969090" version="1" comment="kernel-tools-libs is &lt;3.10.0-1160.133.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969092" version="1" comment="perf is &lt;3.10.0-1160.133.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969093" version="1" comment="python-perf is &lt;3.10.0-1160.133.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043856" version="1" comment="kgraft-patch-4_12_14-122_244-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043647" version="1" comment="kgraft-patch-4_12_14-122_247-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043648" version="1" comment="kgraft-patch-4_12_14-122_250-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043857" version="1" comment="kgraft-patch-4_12_14-122_255-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043858" version="1" comment="kgraft-patch-4_12_14-122_258-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043859" version="1" comment="kgraft-patch-4_12_14-122_261-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043860" version="1" comment="kgraft-patch-4_12_14-122_266-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043861" version="1" comment="kgraft-patch-4_12_14-122_269-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043862" version="1" comment="kgraft-patch-4_12_14-122_272-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043863" version="1" comment="kernel-livepatch-5_14_21-150400_24_147-default is &gt;=19-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044016" version="1" comment="kernel-livepatch-5_14_21-150400_24_150-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043864" version="1" comment="kernel-livepatch-5_14_21-150400_24_153-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043865" version="1" comment="kernel-livepatch-5_14_21-150400_24_158-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043866" version="1" comment="kernel-livepatch-5_14_21-150400_24_161-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043867" version="1" comment="kernel-livepatch-5_14_21-150400_24_164-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043868" version="1" comment="kernel-livepatch-5_14_21-150400_24_167-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043869" version="1" comment="kernel-livepatch-5_14_21-150400_24_170-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044017" version="1" comment="kernel-livepatch-5_14_21-150400_24_173-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044134" version="1" comment="kernel-livepatch-5_14_21-150400_24_176-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043978" version="1" comment="kernel-livepatch-5_14_21-150500_55_100-default is &gt;=13-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043979" version="1" comment="kernel-livepatch-5_14_21-150500_55_103-default is &gt;=13-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043980" version="1" comment="kernel-livepatch-5_14_21-150500_55_110-default is &gt;=12-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043981" version="1" comment="kernel-livepatch-5_14_21-150500_55_113-default is &gt;=11-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043982" version="1" comment="kernel-livepatch-5_14_21-150500_55_116-default is &gt;=9-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043983" version="1" comment="kernel-livepatch-5_14_21-150500_55_121-default is &gt;=6-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043984" version="1" comment="kernel-livepatch-5_14_21-150500_55_91-default is &gt;=18-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043985" version="1" comment="kernel-livepatch-5_14_21-150500_55_94-default is &gt;=14-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043986" version="1" comment="kernel-livepatch-5_14_21-150500_55_97-default is &gt;=14-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037053" version="1" comment="kernel-livepatch-5_14_21-150400_24_141-default is &gt;=19-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037054" version="1" comment="kernel-livepatch-5_14_21-150400_24_144-default is &gt;=18-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037055" version="1" comment="kernel-livepatch-5_14_21-150400_24_147-default is &gt;=17-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037056" version="1" comment="kernel-livepatch-5_14_21-150400_24_150-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037057" version="1" comment="kernel-livepatch-5_14_21-150400_24_153-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037058" version="1" comment="kernel-livepatch-5_14_21-150400_24_158-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037059" version="1" comment="kernel-livepatch-5_14_21-150400_24_161-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037060" version="1" comment="kernel-livepatch-5_14_21-150400_24_164-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037061" version="1" comment="kernel-livepatch-5_14_21-150400_24_167-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037062" version="1" comment="kernel-livepatch-5_14_21-150400_24_170-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037063" version="1" comment="kernel-livepatch-5_14_21-150400_24_173-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037064" version="1" comment="kernel-livepatch-5_14_21-150400_24_176-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037065" version="1" comment="kernel-livepatch-5_14_21-150400_24_179-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037066" version="1" comment="kernel-livepatch-5_14_21-150500_55_100-default is &gt;=11-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037067" version="1" comment="kernel-livepatch-5_14_21-150500_55_103-default is &gt;=11-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037068" version="1" comment="kernel-livepatch-5_14_21-150500_55_110-default is &gt;=10-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037069" version="1" comment="kernel-livepatch-5_14_21-150500_55_113-default is &gt;=9-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037070" version="1" comment="kernel-livepatch-5_14_21-150500_55_116-default is &gt;=7-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037071" version="1" comment="kernel-livepatch-5_14_21-150500_55_121-default is &gt;=4-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037073" version="1" comment="kernel-livepatch-5_14_21-150500_55_124-default is &gt;=2-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037074" version="1" comment="kernel-livepatch-5_14_21-150500_55_88-default is &gt;=16-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037075" version="1" comment="kernel-livepatch-5_14_21-150500_55_91-default is &gt;=16-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037076" version="1" comment="kernel-livepatch-5_14_21-150500_55_94-default is &gt;=12-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037077" version="1" comment="kernel-livepatch-5_14_21-150500_55_97-default is &gt;=12-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830463" version="1" comment="tigervnc is &lt;1.8.0-26.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830464" version="1" comment="tigervnc-icons is &lt;1.8.0-26.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830465" version="1" comment="tigervnc-license is &lt;1.8.0-26.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830466" version="1" comment="tigervnc-server is &lt;1.8.0-26.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830467" version="1" comment="tigervnc-server-applet is &lt;1.8.0-26.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830468" version="1" comment="tigervnc-server-minimal is &lt;1.8.0-26.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830469" version="1" comment="tigervnc-server-module is &lt;1.8.0-26.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830418" version="1" comment="xorg-x11-server-Xdmx is &lt;1.20.4-24.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830419" version="1" comment="xorg-x11-server-Xephyr is &lt;1.20.4-24.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830420" version="1" comment="xorg-x11-server-Xnest is &lt;1.20.4-24.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830421" version="1" comment="xorg-x11-server-Xorg is &lt;1.20.4-24.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830422" version="1" comment="xorg-x11-server-Xvfb is &lt;1.20.4-24.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830423" version="1" comment="xorg-x11-server-Xwayland is &lt;1.20.4-24.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830424" version="1" comment="xorg-x11-server-common is &lt;1.20.4-24.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830425" version="1" comment="xorg-x11-server-devel is &lt;1.20.4-24.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830426" version="1" comment="xorg-x11-server-source is &lt;1.20.4-24.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030688" version="1" comment="kernel-livepatch-5_14_21-150400_24_141-default is &gt;=18-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030689" version="1" comment="kernel-livepatch-5_14_21-150400_24_144-default is &gt;=17-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030690" version="1" comment="kernel-livepatch-5_14_21-150400_24_147-default is &gt;=16-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030740" version="1" comment="kernel-livepatch-5_14_21-150400_24_150-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031201" version="1" comment="kernel-livepatch-5_14_21-150400_24_153-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030741" version="1" comment="kernel-livepatch-5_14_21-150400_24_158-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031202" version="1" comment="kernel-livepatch-5_14_21-150400_24_161-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031203" version="1" comment="kernel-livepatch-5_14_21-150400_24_164-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031204" version="1" comment="kernel-livepatch-5_14_21-150400_24_167-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031205" version="1" comment="kernel-livepatch-5_14_21-150400_24_170-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031655" version="1" comment="kernel-livepatch-5_14_21-150400_24_173-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031206" version="1" comment="kernel-livepatch-5_14_21-150400_24_176-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031208" version="1" comment="kernel-livepatch-5_14_21-150400_24_179-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039005" version="1" comment="bpftool is &lt;3.10.0-1160.145.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039006" version="1" comment="kernel is &lt;3.10.0-1160.145.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039007" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1160.145.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039008" version="1" comment="kernel-debug is &lt;3.10.0-1160.145.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039011" version="1" comment="kernel-doc is &lt;3.10.0-1160.145.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039012" version="1" comment="kernel-headers is &lt;3.10.0-1160.145.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039013" version="1" comment="kernel-tools is &lt;3.10.0-1160.145.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039014" version="1" comment="kernel-tools-libs is &lt;3.10.0-1160.145.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039016" version="1" comment="perf is &lt;3.10.0-1160.145.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039017" version="1" comment="python-perf is &lt;3.10.0-1160.145.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968302" version="1" comment="kernel-default is ==6.4.0-150600.23.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039018" version="1" comment="kernel-livepatch-6_4_0-150600_23_30-default is &gt;=17-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968304" version="1" comment="kernel-default is ==6.4.0-150600.23.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039019" version="1" comment="kernel-livepatch-6_4_0-150600_23_33-default is &gt;=17-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986736" version="1" comment="kernel-default is ==6.4.0-150600.23.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038510" version="1" comment="kernel-livepatch-6_4_0-150600_23_38-default is &gt;=12-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986738" version="1" comment="kernel-default is ==6.4.0-150600.23.42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039020" version="1" comment="kernel-livepatch-6_4_0-150600_23_42-default is &gt;=12-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010060" version="1" comment="kernel-default is ==6.4.0-150600.23.47.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039021" version="1" comment="kernel-livepatch-6_4_0-150600_23_47-default is &gt;=11-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012361" version="1" comment="kernel-default is ==6.4.0-150600.23.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039022" version="1" comment="kernel-livepatch-6_4_0-150600_23_50-default is &gt;=10-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012363" version="1" comment="kernel-default is ==6.4.0-150600.23.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039023" version="1" comment="kernel-livepatch-6_4_0-150600_23_53-default is &gt;=10-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014544" version="1" comment="kernel-default is ==6.4.0-150600.23.60.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039024" version="1" comment="kernel-livepatch-6_4_0-150600_23_60-default is &gt;=9-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023342" version="1" comment="kernel-default is ==6.4.0-150600.23.65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038224" version="1" comment="kernel-livepatch-6_4_0-150600_23_65-default is &gt;=5-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023348" version="1" comment="kernel-default is ==6.4.0-150600.23.70.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038225" version="1" comment="kernel-livepatch-6_4_0-150600_23_70-default is &gt;=5-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038226" version="1" comment="kernel-default is ==6.4.0-150600.23.73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038227" version="1" comment="kernel-livepatch-6_4_0-150600_23_73-default is &gt;=2-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038228" version="1" comment="kernel-default is &lt;6.4.0-150600.23.73.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014264" version="1" comment="kernel-rt is ==6.4.0-150700.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037826" version="1" comment="kernel-livepatch-6_4_0-150700_5-rt is &gt;=9-150700.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014746" version="1" comment="kernel-default is ==6.4.0-150700.51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039025" version="1" comment="kernel-livepatch-6_4_0-150700_51-default is &gt;=9-150700.3.24.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023034" version="1" comment="kernel-default is ==6.4.0-150700.53.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038229" version="1" comment="kernel-livepatch-6_4_0-150700_53_11-default is &gt;=5-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023039" version="1" comment="kernel-default is ==6.4.0-150700.53.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038230" version="1" comment="kernel-livepatch-6_4_0-150700_53_16-default is &gt;=5-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038511" version="1" comment="kernel-default is ==6.4.0-150700.53.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038512" version="1" comment="kernel-livepatch-6_4_0-150700_53_19-default is &gt;=2-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014749" version="1" comment="kernel-default is ==6.4.0-150700.53.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039026" version="1" comment="kernel-livepatch-6_4_0-150700_53_3-default is &gt;=9-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014757" version="1" comment="kernel-default is ==6.4.0-150700.53.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039027" version="1" comment="kernel-livepatch-6_4_0-150700_53_6-default is &gt;=9-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014759" version="1" comment="kernel-default is &lt;6.4.0-150700.53.6.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056353" version="1" comment="kgraft-patch-4_12_14-122_250-default is &gt;=16-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053077" version="1" comment="kgraft-patch-4_12_14-122_255-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056286" version="1" comment="kgraft-patch-4_12_14-122_258-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056287" version="1" comment="kgraft-patch-4_12_14-122_261-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056288" version="1" comment="kgraft-patch-4_12_14-122_266-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056354" version="1" comment="kgraft-patch-4_12_14-122_269-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056355" version="1" comment="kgraft-patch-4_12_14-122_272-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056356" version="1" comment="kgraft-patch-4_12_14-122_275-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056357" version="1" comment="kgraft-patch-4_12_14-122_280-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056358" version="1" comment="kgraft-patch-4_12_14-122_283-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056359" version="1" comment="kgraft-patch-4_12_14-122_290-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050317" version="1" comment="kernel-default is ==4.12.14-122.293.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056360" version="1" comment="kgraft-patch-4_12_14-122_293-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050319" version="1" comment="kernel-default is &lt;4.12.14-122.293.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852714" version="1" comment="firefox is &lt;115.9.1-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851985" version="1" comment="thunderbird is &lt;115.9.0-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046293" version="1" comment="kernel-livepatch-5_14_21-150500_55_133-default is &gt;=2-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830525" version="1" comment="ipa-client is &lt;4.6.8-5.el7_9.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830526" version="1" comment="ipa-client-common is &lt;4.6.8-5.el7_9.16 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830527" version="1" comment="ipa-common is &lt;4.6.8-5.el7_9.16 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830528" version="1" comment="ipa-python-compat is &lt;4.6.8-5.el7_9.16 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830529" version="1" comment="ipa-server is &lt;4.6.8-5.el7_9.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830530" version="1" comment="ipa-server-common is &lt;4.6.8-5.el7_9.16 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830531" version="1" comment="ipa-server-dns is &lt;4.6.8-5.el7_9.16 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830532" version="1" comment="ipa-server-trust-ad is &lt;4.6.8-5.el7_9.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830533" version="1" comment="python2-ipaclient is &lt;4.6.8-5.el7_9.16 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830534" version="1" comment="python2-ipalib is &lt;4.6.8-5.el7_9.16 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830535" version="1" comment="python2-ipaserver is &lt;4.6.8-5.el7_9.16 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858925" version="1" comment="kgraft-patch-4_12_14-122_156-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858926" version="1" comment="kgraft-patch-4_12_14-122_159-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858856" version="1" comment="kgraft-patch-4_12_14-122_162-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858857" version="1" comment="kgraft-patch-4_12_14-122_165-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855859" version="1" comment="kgraft-patch-4_12_14-122_173-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855684" version="1" comment="kgraft-patch-4_12_14-122_176-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855685" version="1" comment="kgraft-patch-4_12_14-122_179-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855686" version="1" comment="kgraft-patch-4_12_14-122_183-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859175" version="1" comment="kernel-livepatch-5_3_18-150200_24_148-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859176" version="1" comment="kernel-livepatch-5_3_18-150200_24_151-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859177" version="1" comment="kernel-livepatch-5_3_18-150200_24_154-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859178" version="1" comment="kernel-livepatch-5_3_18-150200_24_157-default is &gt;=10-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859626" version="1" comment="kernel-livepatch-5_3_18-150200_24_160-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859179" version="1" comment="kernel-livepatch-5_3_18-150200_24_163-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858927" version="1" comment="kernel-livepatch-5_3_18-150200_24_166-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858867" version="1" comment="kernel-livepatch-5_3_18-150200_24_169-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859627" version="1" comment="kernel-livepatch-5_3_18-150300_59_118-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859957" version="1" comment="kernel-livepatch-5_3_18-150300_59_121-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859374" version="1" comment="kernel-livepatch-5_3_18-150300_59_124-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859375" version="1" comment="kernel-livepatch-5_3_18-150300_59_127-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859376" version="1" comment="kernel-livepatch-5_3_18-150300_59_130-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859377" version="1" comment="kernel-livepatch-5_3_18-150300_59_133-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859958" version="1" comment="kernel-livepatch-5_3_18-150300_59_138-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859959" version="1" comment="kernel-livepatch-5_3_18-150300_59_141-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859628" version="1" comment="kernel-livepatch-5_14_21-150400_24_55-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859629" version="1" comment="kernel-livepatch-5_14_21-150400_24_60-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859960" version="1" comment="kernel-livepatch-5_14_21-150400_24_63-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859630" version="1" comment="kernel-livepatch-5_14_21-150400_24_66-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859631" version="1" comment="kernel-livepatch-5_14_21-150400_24_69-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855860" version="1" comment="kernel-livepatch-5_14_21-150400_24_74-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855687" version="1" comment="kernel-livepatch-5_14_21-150400_24_81-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855861" version="1" comment="kernel-livepatch-5_14_21-150400_24_88-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856129" version="1" comment="kernel-livepatch-5_14_21-150400_24_92-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855688" version="1" comment="kernel-livepatch-5_14_21-150400_24_97-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855569" version="1" comment="kernel-livepatch-5_14_21-150500_11-rt is &gt;=11-150500.12.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859961" version="1" comment="kernel-livepatch-5_14_21-150500_53-default is &gt;=11-150500.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855689" version="1" comment="kernel-livepatch-5_14_21-150500_55_12-default is &gt;=10-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855862" version="1" comment="kernel-livepatch-5_14_21-150500_55_19-default is &gt;=9-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855690" version="1" comment="kernel-livepatch-5_14_21-150500_55_28-default is &gt;=8-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855863" version="1" comment="kernel-livepatch-5_14_21-150500_55_31-default is &gt;=7-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855691" version="1" comment="kernel-livepatch-5_14_21-150500_55_36-default is &gt;=6-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855692" version="1" comment="kernel-livepatch-5_14_21-150500_55_7-default is &gt;=10-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830492" version="1" comment="postgresql is &lt;9.2.24-9.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830493" version="1" comment="postgresql-contrib is &lt;9.2.24-9.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830494" version="1" comment="postgresql-devel is &lt;9.2.24-9.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830495" version="1" comment="postgresql-docs is &lt;9.2.24-9.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830496" version="1" comment="postgresql-libs is &lt;9.2.24-9.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830497" version="1" comment="postgresql-plperl is &lt;9.2.24-9.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830498" version="1" comment="postgresql-plpython is &lt;9.2.24-9.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830499" version="1" comment="postgresql-pltcl is &lt;9.2.24-9.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830500" version="1" comment="postgresql-server is &lt;9.2.24-9.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830501" version="1" comment="postgresql-static is &lt;9.2.24-9.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830502" version="1" comment="postgresql-test is &lt;9.2.24-9.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830503" version="1" comment="postgresql-upgrade is &lt;9.2.24-9.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845872" version="1" comment="kernel-livepatch-5_3_18-150200_24_142-default is &gt;=11-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845704" version="1" comment="kernel-livepatch-5_3_18-150200_24_145-default is &gt;=10-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845705" version="1" comment="kernel-livepatch-5_3_18-150200_24_148-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845706" version="1" comment="kernel-livepatch-5_3_18-150200_24_151-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845707" version="1" comment="kernel-livepatch-5_3_18-150200_24_154-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845708" version="1" comment="kernel-livepatch-5_3_18-150200_24_157-default is &gt;=6-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845709" version="1" comment="kernel-livepatch-5_3_18-150200_24_160-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845710" version="1" comment="kernel-livepatch-5_3_18-150200_24_163-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845711" version="1" comment="kernel-livepatch-5_3_18-150200_24_166-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845873" version="1" comment="kernel-livepatch-5_3_18-150200_24_169-default is &gt;=3-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845874" version="1" comment="kernel-livepatch-5_3_18-150300_59_109-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845875" version="1" comment="kernel-livepatch-5_3_18-150300_59_112-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845876" version="1" comment="kernel-livepatch-5_3_18-150300_59_115-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845712" version="1" comment="kernel-livepatch-5_3_18-150300_59_118-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845713" version="1" comment="kernel-livepatch-5_3_18-150300_59_121-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845714" version="1" comment="kernel-livepatch-5_3_18-150300_59_124-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845877" version="1" comment="kernel-livepatch-5_3_18-150300_59_127-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845878" version="1" comment="kernel-livepatch-5_3_18-150300_59_130-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845715" version="1" comment="kernel-livepatch-5_3_18-150300_59_133-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845716" version="1" comment="kernel-livepatch-5_3_18-150300_59_138-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845717" version="1" comment="kernel-livepatch-5_3_18-150300_59_141-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846010" version="1" comment="kernel-livepatch-5_14_21-150400_24_97-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845880" version="1" comment="kernel-livepatch-5_14_21-150500_55_36-default is &gt;=2-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830471" version="1" comment="firefox is &lt;115.5.0-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830470" version="1" comment="thunderbird is &lt;115.5.0-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830504" version="1" comment="tigervnc is &lt;1.8.0-28.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830505" version="1" comment="tigervnc-icons is &lt;1.8.0-28.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830506" version="1" comment="tigervnc-license is &lt;1.8.0-28.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830507" version="1" comment="tigervnc-server is &lt;1.8.0-28.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830508" version="1" comment="tigervnc-server-applet is &lt;1.8.0-28.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830509" version="1" comment="tigervnc-server-minimal is &lt;1.8.0-28.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830510" version="1" comment="tigervnc-server-module is &lt;1.8.0-28.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830511" version="1" comment="xorg-x11-server-Xdmx is &lt;1.20.4-25.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830512" version="1" comment="xorg-x11-server-Xephyr is &lt;1.20.4-25.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830513" version="1" comment="xorg-x11-server-Xnest is &lt;1.20.4-25.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830514" version="1" comment="xorg-x11-server-Xorg is &lt;1.20.4-25.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830515" version="1" comment="xorg-x11-server-Xvfb is &lt;1.20.4-25.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830516" version="1" comment="xorg-x11-server-Xwayland is &lt;1.20.4-25.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830517" version="1" comment="xorg-x11-server-common is &lt;1.20.4-25.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830518" version="1" comment="xorg-x11-server-devel is &lt;1.20.4-25.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830519" version="1" comment="xorg-x11-server-source is &lt;1.20.4-25.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852392" version="1" comment="kernel-livepatch-5_3_18-150200_24_175-default is &gt;=4-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852393" version="1" comment="kernel-livepatch-5_3_18-150200_24_178-default is &gt;=3-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854325" version="1" comment="kernel-default is &lt;5.3.18-150200.24.183.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852394" version="1" comment="kernel-livepatch-5_3_18-150300_59_147-default is &gt;=4-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852395" version="1" comment="kernel-livepatch-5_3_18-150300_59_150-default is &gt;=3-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854336" version="1" comment="kernel-default is &lt;5.3.18-150300.59.153.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846117" version="1" comment="tigervnc is &lt;1.8.0-31.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846118" version="1" comment="tigervnc-icons is &lt;1.8.0-31.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846119" version="1" comment="tigervnc-license is &lt;1.8.0-31.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846120" version="1" comment="tigervnc-server is &lt;1.8.0-31.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846121" version="1" comment="tigervnc-server-applet is &lt;1.8.0-31.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846122" version="1" comment="tigervnc-server-minimal is &lt;1.8.0-31.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846123" version="1" comment="tigervnc-server-module is &lt;1.8.0-31.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830550" version="1" comment="xorg-x11-server-Xdmx is &lt;1.20.4-27.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830551" version="1" comment="xorg-x11-server-Xephyr is &lt;1.20.4-27.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830552" version="1" comment="xorg-x11-server-Xnest is &lt;1.20.4-27.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830553" version="1" comment="xorg-x11-server-Xorg is &lt;1.20.4-27.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830554" version="1" comment="xorg-x11-server-Xvfb is &lt;1.20.4-27.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830555" version="1" comment="xorg-x11-server-Xwayland is &lt;1.20.4-27.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830556" version="1" comment="xorg-x11-server-common is &lt;1.20.4-27.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830557" version="1" comment="xorg-x11-server-devel is &lt;1.20.4-27.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830558" version="1" comment="xorg-x11-server-source is &lt;1.20.4-27.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830523" version="1" comment="firefox is &lt;115.6.0-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868524" version="1" comment="kernel-livepatch-5_14_21-150400_24_100-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868936" version="1" comment="kernel-livepatch-5_14_21-150500_55_39-default is &gt;=8-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845720" version="1" comment="kgraft-patch-4_12_14-122_147-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845881" version="1" comment="kgraft-patch-4_12_14-122_150-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845721" version="1" comment="kgraft-patch-4_12_14-122_153-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845722" version="1" comment="kgraft-patch-4_12_14-122_156-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845723" version="1" comment="kgraft-patch-4_12_14-122_159-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845724" version="1" comment="kgraft-patch-4_12_14-122_162-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845725" version="1" comment="kgraft-patch-4_12_14-122_165-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845726" version="1" comment="kgraft-patch-4_12_14-122_173-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845727" version="1" comment="kgraft-patch-4_12_14-122_176-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845728" version="1" comment="kgraft-patch-4_12_14-122_179-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845729" version="1" comment="kgraft-patch-4_12_14-122_183-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845882" version="1" comment="kernel-livepatch-4_12_14-150100_197_134-default is &gt;=11-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845731" version="1" comment="kernel-livepatch-4_12_14-150100_197_137-default is &gt;=9-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845732" version="1" comment="kernel-livepatch-4_12_14-150100_197_142-default is &gt;=9-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845733" version="1" comment="kernel-livepatch-4_12_14-150100_197_145-default is &gt;=9-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845734" version="1" comment="kernel-livepatch-4_12_14-150100_197_148-default is &gt;=7-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845735" version="1" comment="kernel-livepatch-4_12_14-150100_197_151-default is &gt;=6-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845736" version="1" comment="kernel-livepatch-4_12_14-150100_197_154-default is &gt;=5-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845737" version="1" comment="kernel-livepatch-4_12_14-150100_197_157-default is &gt;=4-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845883" version="1" comment="kernel-livepatch-4_12_14-150100_197_160-default is &gt;=3-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845738" version="1" comment="kernel-default is &lt;4.12.14-150100.197.165.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846012" version="1" comment="kernel-livepatch-5_14_21-150400_24_100-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845885" version="1" comment="kernel-livepatch-5_14_21-150500_55_39-default is &gt;=2-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845118" version="1" comment="firefox is &lt;115.7.0-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846116" version="1" comment="thunderbird is &lt;115.7.0-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859180" version="1" comment="kernel-livepatch-5_3_18-150200_24_172-default is &gt;=6-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858928" version="1" comment="kernel-livepatch-5_3_18-150200_24_175-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859632" version="1" comment="kernel-livepatch-5_3_18-150300_59_144-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859378" version="1" comment="kernel-livepatch-5_3_18-150300_59_147-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858858" version="1" comment="kernel-livepatch-5_14_21-150500_11-rt is &gt;=12-150500.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855693" version="1" comment="kgraft-patch-4_12_14-122_186-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855864" version="1" comment="kgraft-patch-4_12_14-122_189-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855694" version="1" comment="kernel-livepatch-5_14_21-150400_24_100-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855695" version="1" comment="kernel-livepatch-5_14_21-150400_24_103-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855865" version="1" comment="kernel-livepatch-5_14_21-150500_55_39-default is &gt;=6-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855696" version="1" comment="kernel-livepatch-5_14_21-150500_55_44-default is &gt;=5-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958972" version="1" comment="postgresql is &lt;9.2.24-9.el7_9.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958973" version="1" comment="postgresql-contrib is &lt;9.2.24-9.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958974" version="1" comment="postgresql-devel is &lt;9.2.24-9.el7_9.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958975" version="1" comment="postgresql-docs is &lt;9.2.24-9.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958976" version="1" comment="postgresql-libs is &lt;9.2.24-9.el7_9.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958977" version="1" comment="postgresql-plperl is &lt;9.2.24-9.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958978" version="1" comment="postgresql-plpython is &lt;9.2.24-9.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958979" version="1" comment="postgresql-pltcl is &lt;9.2.24-9.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958980" version="1" comment="postgresql-server is &lt;9.2.24-9.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958981" version="1" comment="postgresql-static is &lt;9.2.24-9.el7_9.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958982" version="1" comment="postgresql-test is &lt;9.2.24-9.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958983" version="1" comment="postgresql-upgrade is &lt;9.2.24-9.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966015" version="1" comment="bind is &lt;9.11.4-26.P2.el7_9.18 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966016" version="1" comment="bind-chroot is &lt;9.11.4-26.P2.el7_9.18 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966017" version="1" comment="bind-devel is &lt;9.11.4-26.P2.el7_9.18 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966018" version="1" comment="bind-export-devel is &lt;9.11.4-26.P2.el7_9.18 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966019" version="1" comment="bind-export-libs is &lt;9.11.4-26.P2.el7_9.18 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966020" version="1" comment="bind-libs is &lt;9.11.4-26.P2.el7_9.18 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966021" version="1" comment="bind-libs-lite is &lt;9.11.4-26.P2.el7_9.18 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966022" version="1" comment="bind-license is &lt;9.11.4-26.P2.el7_9.18 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966023" version="1" comment="bind-lite-devel is &lt;9.11.4-26.P2.el7_9.18 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966024" version="1" comment="bind-pkcs11 is &lt;9.11.4-26.P2.el7_9.18 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966025" version="1" comment="bind-pkcs11-devel is &lt;9.11.4-26.P2.el7_9.18 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966026" version="1" comment="bind-pkcs11-libs is &lt;9.11.4-26.P2.el7_9.18 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966027" version="1" comment="bind-pkcs11-utils is &lt;9.11.4-26.P2.el7_9.18 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966028" version="1" comment="bind-sdb is &lt;9.11.4-26.P2.el7_9.18 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966029" version="1" comment="bind-sdb-chroot is &lt;9.11.4-26.P2.el7_9.18 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966030" version="1" comment="bind-utils is &lt;9.11.4-26.P2.el7_9.18 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962649" version="1" comment="rsync is &lt;3.1.2-12.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034202" version="1" comment="rsync is &lt;3.1.2-12.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849777" version="1" comment="firefox is &lt;115.8.0-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849776" version="1" comment="thunderbird is &lt;115.8.0-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945509" version="1" comment="bind is &lt;9.11.4-26.P2.el7_9.17 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945510" version="1" comment="bind-chroot is &lt;9.11.4-26.P2.el7_9.17 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946141" version="1" comment="bind-devel is &lt;9.11.4-26.P2.el7_9.17 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946142" version="1" comment="bind-export-devel is &lt;9.11.4-26.P2.el7_9.17 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946143" version="1" comment="bind-export-libs is &lt;9.11.4-26.P2.el7_9.17 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945514" version="1" comment="bind-libs is &lt;9.11.4-26.P2.el7_9.17 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946144" version="1" comment="bind-libs-lite is &lt;9.11.4-26.P2.el7_9.17 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945516" version="1" comment="bind-license is &lt;9.11.4-26.P2.el7_9.17 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946145" version="1" comment="bind-lite-devel is &lt;9.11.4-26.P2.el7_9.17 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946146" version="1" comment="bind-pkcs11 is &lt;9.11.4-26.P2.el7_9.17 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946147" version="1" comment="bind-pkcs11-devel is &lt;9.11.4-26.P2.el7_9.17 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946148" version="1" comment="bind-pkcs11-libs is &lt;9.11.4-26.P2.el7_9.17 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945521" version="1" comment="bind-pkcs11-utils is &lt;9.11.4-26.P2.el7_9.17 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945522" version="1" comment="bind-sdb is &lt;9.11.4-26.P2.el7_9.17 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945523" version="1" comment="bind-sdb-chroot is &lt;9.11.4-26.P2.el7_9.17 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945524" version="1" comment="bind-utils is &lt;9.11.4-26.P2.el7_9.17 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830536" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.402.b06-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830537" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.402.b06-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830538" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.402.b06-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830539" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.402.b06-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830540" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.402.b06-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830541" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.402.b06-1.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830542" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.402.b06-1.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830543" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.402.b06-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830544" version="1" comment="java-11-openjdk is &lt;11.0.22.0.7-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830545" version="1" comment="java-11-openjdk-devel is &lt;11.0.22.0.7-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830546" version="1" comment="java-11-openjdk-headless is &lt;11.0.22.0.7-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858056" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.412.b08-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858057" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.412.b08-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858058" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.412.b08-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858059" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.412.b08-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858060" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.412.b08-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858061" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.412.b08-1.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858062" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.412.b08-1.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858063" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.412.b08-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856119" version="1" comment="java-11-openjdk is &lt;11.0.23.0.9-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856120" version="1" comment="java-11-openjdk-demo is &lt;11.0.23.0.9-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856121" version="1" comment="java-11-openjdk-devel is &lt;11.0.23.0.9-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856122" version="1" comment="java-11-openjdk-headless is &lt;11.0.23.0.9-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856123" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.23.0.9-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856124" version="1" comment="java-11-openjdk-javadoc-zip is &lt;11.0.23.0.9-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856125" version="1" comment="java-11-openjdk-jmods is &lt;11.0.23.0.9-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856126" version="1" comment="java-11-openjdk-src is &lt;11.0.23.0.9-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856127" version="1" comment="java-11-openjdk-static-libs is &lt;11.0.23.0.9-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941589" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.422.b05-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941590" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.422.b05-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941591" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.422.b05-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941592" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.422.b05-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941593" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.422.b05-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941594" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.422.b05-1.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941595" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.422.b05-1.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941596" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.422.b05-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880848" version="1" comment="java-11-openjdk is &lt;11.0.24.0.8-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880849" version="1" comment="java-11-openjdk-demo is &lt;11.0.24.0.8-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880850" version="1" comment="java-11-openjdk-devel is &lt;11.0.24.0.8-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880851" version="1" comment="java-11-openjdk-headless is &lt;11.0.24.0.8-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880852" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.24.0.8-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880853" version="1" comment="java-11-openjdk-javadoc-zip is &lt;11.0.24.0.8-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880854" version="1" comment="java-11-openjdk-jmods is &lt;11.0.24.0.8-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880855" version="1" comment="java-11-openjdk-src is &lt;11.0.24.0.8-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880856" version="1" comment="java-11-openjdk-static-libs is &lt;11.0.24.0.8-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976233" version="1" comment="docker is &lt;1.13.1-210.git7d71120.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976234" version="1" comment="docker-client is &lt;1.13.1-210.git7d71120.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976235" version="1" comment="docker-common is &lt;1.13.1-210.git7d71120.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976236" version="1" comment="docker-logrotate is &lt;1.13.1-210.git7d71120.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976237" version="1" comment="docker-lvm-plugin is &lt;1.13.1-210.git7d71120.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976238" version="1" comment="docker-novolume-plugin is &lt;1.13.1-210.git7d71120.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976239" version="1" comment="docker-v1.10-migrator is &lt;1.13.1-210.git7d71120.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976232" version="1" comment="runc is &lt;1.0.0-70.rc10.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865172" version="1" comment="389-ds-base is &lt;1.3.11.1-5.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865173" version="1" comment="389-ds-base-devel is &lt;1.3.11.1-5.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865174" version="1" comment="389-ds-base-libs is &lt;1.3.11.1-5.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865175" version="1" comment="389-ds-base-snmp is &lt;1.3.11.1-5.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945459" version="1" comment="bpftool is &lt;3.10.0-1160.125.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945460" version="1" comment="kernel is &lt;3.10.0-1160.125.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945461" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1160.125.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945462" version="1" comment="kernel-debug is &lt;3.10.0-1160.125.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945465" version="1" comment="kernel-doc is &lt;3.10.0-1160.125.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945466" version="1" comment="kernel-headers is &lt;3.10.0-1160.125.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945467" version="1" comment="kernel-tools is &lt;3.10.0-1160.125.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945468" version="1" comment="kernel-tools-libs is &lt;3.10.0-1160.125.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945470" version="1" comment="perf is &lt;3.10.0-1160.125.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945471" version="1" comment="python-perf is &lt;3.10.0-1160.125.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872665" version="1" comment="kernel-livepatch-5_14_21-150400_24_100-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872666" version="1" comment="kernel-livepatch-5_14_21-150400_24_103-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872667" version="1" comment="kernel-livepatch-5_14_21-150400_24_66-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872668" version="1" comment="kernel-livepatch-5_14_21-150400_24_69-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872669" version="1" comment="kernel-livepatch-5_14_21-150400_24_74-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872670" version="1" comment="kernel-livepatch-5_14_21-150400_24_81-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872671" version="1" comment="kernel-livepatch-5_14_21-150400_24_88-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872672" version="1" comment="kernel-livepatch-5_14_21-150400_24_92-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872673" version="1" comment="kernel-livepatch-5_14_21-150400_24_97-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871638" version="1" comment="kernel-livepatch-5_14_21-150500_11-rt is &gt;=15-150500.9.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873482" version="1" comment="kernel-livepatch-5_14_21-150500_53-default is &gt;=14-150500.12.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873483" version="1" comment="kernel-livepatch-5_14_21-150500_55_12-default is &gt;=13-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873484" version="1" comment="kernel-livepatch-5_14_21-150500_55_19-default is &gt;=12-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873485" version="1" comment="kernel-livepatch-5_14_21-150500_55_28-default is &gt;=11-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873922" version="1" comment="kernel-livepatch-5_14_21-150500_55_31-default is &gt;=10-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872674" version="1" comment="kernel-livepatch-5_14_21-150500_55_36-default is &gt;=9-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872675" version="1" comment="kernel-livepatch-5_14_21-150500_55_39-default is &gt;=9-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873486" version="1" comment="kernel-livepatch-5_14_21-150500_55_44-default is &gt;=8-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873487" version="1" comment="kernel-livepatch-5_14_21-150500_55_7-default is &gt;=13-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855857" version="1" comment="firefox is &lt;115.10.0-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855866" version="1" comment="kernel-livepatch-5_3_18-150300_59_150-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019451" version="1" comment="kernel-livepatch-5_14_21-150400_24_133-default is &gt;=15-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019452" version="1" comment="kernel-livepatch-5_14_21-150400_24_136-default is &gt;=15-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019453" version="1" comment="kernel-livepatch-5_14_21-150400_24_141-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019454" version="1" comment="kernel-livepatch-5_14_21-150400_24_144-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019702" version="1" comment="kernel-livepatch-5_14_21-150400_24_147-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019455" version="1" comment="kernel-livepatch-5_14_21-150400_24_150-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019456" version="1" comment="kernel-livepatch-5_14_21-150400_24_153-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019457" version="1" comment="kernel-livepatch-5_14_21-150400_24_158-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019458" version="1" comment="kernel-livepatch-5_14_21-150400_24_161-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019703" version="1" comment="kernel-livepatch-5_14_21-150400_24_164-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019459" version="1" comment="kernel-livepatch-5_14_21-150400_24_167-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012374" version="1" comment="kernel-default is &lt;5.14.21-150400.24.167.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012356" version="1" comment="kernel-livepatch-6_4_0-150600_23_14-default is &gt;=18-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011944" version="1" comment="kernel-livepatch-6_4_0-150600_23_17-default is &gt;=18-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011824" version="1" comment="kernel-livepatch-6_4_0-150600_8-rt is &gt;=19-150600.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868525" version="1" comment="kernel-livepatch-5_14_21-150400_24_103-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868528" version="1" comment="kernel-livepatch-5_14_21-150400_24_92-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868529" version="1" comment="kernel-livepatch-5_14_21-150400_24_97-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868937" version="1" comment="kernel-livepatch-5_14_21-150500_55_31-default is &gt;=9-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868938" version="1" comment="kernel-livepatch-5_14_21-150500_55_36-default is &gt;=8-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868939" version="1" comment="kernel-livepatch-5_14_21-150500_55_44-default is &gt;=7-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878779" version="1" comment="kernel-default is &lt;6.4.0-150600.21.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961322" version="1" comment="kernel-livepatch-6_4_0-150600_21-default is &gt;=9-150600.4.19.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878547" version="1" comment="kgraft-patch-4_12_14-122_165-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878548" version="1" comment="kgraft-patch-4_12_14-122_173-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878549" version="1" comment="kgraft-patch-4_12_14-122_176-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878550" version="1" comment="kgraft-patch-4_12_14-122_179-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878551" version="1" comment="kgraft-patch-4_12_14-122_183-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878552" version="1" comment="kgraft-patch-4_12_14-122_186-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878553" version="1" comment="kgraft-patch-4_12_14-122_189-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878554" version="1" comment="kgraft-patch-4_12_14-122_194-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877990" version="1" comment="kernel-livepatch-5_3_18-150200_24_157-default is &gt;=14-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878069" version="1" comment="kernel-livepatch-5_3_18-150200_24_160-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877991" version="1" comment="kernel-livepatch-5_3_18-150200_24_163-default is &gt;=12-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877992" version="1" comment="kernel-livepatch-5_3_18-150200_24_166-default is &gt;=12-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877993" version="1" comment="kernel-livepatch-5_3_18-150200_24_169-default is &gt;=12-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877994" version="1" comment="kernel-livepatch-5_3_18-150200_24_172-default is &gt;=10-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877995" version="1" comment="kernel-livepatch-5_3_18-150200_24_175-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878070" version="1" comment="kernel-livepatch-5_3_18-150200_24_178-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878071" version="1" comment="kernel-livepatch-5_3_18-150300_59_127-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878072" version="1" comment="kernel-livepatch-5_3_18-150300_59_130-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878073" version="1" comment="kernel-livepatch-5_3_18-150300_59_133-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878074" version="1" comment="kernel-livepatch-5_3_18-150300_59_138-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878075" version="1" comment="kernel-livepatch-5_3_18-150300_59_141-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878076" version="1" comment="kernel-livepatch-5_3_18-150300_59_144-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878077" version="1" comment="kernel-livepatch-5_3_18-150300_59_147-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878212" version="1" comment="kernel-livepatch-5_3_18-150300_59_150-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878555" version="1" comment="kernel-livepatch-5_14_21-150400_24_100-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878556" version="1" comment="kernel-livepatch-5_14_21-150400_24_103-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878557" version="1" comment="kernel-livepatch-5_14_21-150400_24_69-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878558" version="1" comment="kernel-livepatch-5_14_21-150400_24_74-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878559" version="1" comment="kernel-livepatch-5_14_21-150400_24_81-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878560" version="1" comment="kernel-livepatch-5_14_21-150400_24_88-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878561" version="1" comment="kernel-livepatch-5_14_21-150400_24_92-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878562" version="1" comment="kernel-livepatch-5_14_21-150400_24_97-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878563" version="1" comment="kernel-livepatch-5_14_21-150500_55_12-default is &gt;=14-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878564" version="1" comment="kernel-livepatch-5_14_21-150500_55_19-default is &gt;=13-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878565" version="1" comment="kernel-livepatch-5_14_21-150500_55_28-default is &gt;=12-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878566" version="1" comment="kernel-livepatch-5_14_21-150500_55_31-default is &gt;=11-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878567" version="1" comment="kernel-livepatch-5_14_21-150500_55_36-default is &gt;=10-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878568" version="1" comment="kernel-livepatch-5_14_21-150500_55_39-default is &gt;=10-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878569" version="1" comment="kernel-livepatch-5_14_21-150500_55_44-default is &gt;=9-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878570" version="1" comment="kernel-livepatch-5_14_21-150500_55_7-default is &gt;=14-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999889" version="1" comment="microcode_ctl is &lt;2.1-73.24.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865873" version="1" comment="glibc is &lt;2.17-326.el7_9.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865874" version="1" comment="glibc-common is &lt;2.17-326.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865875" version="1" comment="glibc-devel is &lt;2.17-326.el7_9.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865876" version="1" comment="glibc-headers is &lt;2.17-326.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865877" version="1" comment="glibc-static is &lt;2.17-326.el7_9.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865878" version="1" comment="glibc-utils is &lt;2.17-326.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865879" version="1" comment="nscd is &lt;2.17-326.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858653" version="1" comment="tigervnc is &lt;1.8.0-33.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858654" version="1" comment="tigervnc-icons is &lt;1.8.0-33.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858655" version="1" comment="tigervnc-license is &lt;1.8.0-33.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858656" version="1" comment="tigervnc-server is &lt;1.8.0-33.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858657" version="1" comment="tigervnc-server-applet is &lt;1.8.0-33.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858658" version="1" comment="tigervnc-server-minimal is &lt;1.8.0-33.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858659" version="1" comment="tigervnc-server-module is &lt;1.8.0-33.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854308" version="1" comment="xorg-x11-server-Xdmx is &lt;1.20.4-29.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854309" version="1" comment="xorg-x11-server-Xephyr is &lt;1.20.4-29.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854310" version="1" comment="xorg-x11-server-Xnest is &lt;1.20.4-29.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854311" version="1" comment="xorg-x11-server-Xorg is &lt;1.20.4-29.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854312" version="1" comment="xorg-x11-server-Xvfb is &lt;1.20.4-29.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854313" version="1" comment="xorg-x11-server-Xwayland is &lt;1.20.4-29.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854314" version="1" comment="xorg-x11-server-common is &lt;1.20.4-29.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854315" version="1" comment="xorg-x11-server-devel is &lt;1.20.4-29.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854316" version="1" comment="xorg-x11-server-source is &lt;1.20.4-29.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865902" version="1" comment="ipa-client is &lt;4.6.8-5.el7_9.17 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865903" version="1" comment="ipa-client-common is &lt;4.6.8-5.el7_9.17 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865904" version="1" comment="ipa-common is &lt;4.6.8-5.el7_9.17 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865905" version="1" comment="ipa-python-compat is &lt;4.6.8-5.el7_9.17 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865906" version="1" comment="ipa-server is &lt;4.6.8-5.el7_9.17 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865907" version="1" comment="ipa-server-common is &lt;4.6.8-5.el7_9.17 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865908" version="1" comment="ipa-server-dns is &lt;4.6.8-5.el7_9.17 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865909" version="1" comment="ipa-server-trust-ad is &lt;4.6.8-5.el7_9.17 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865910" version="1" comment="python2-ipaclient is &lt;4.6.8-5.el7_9.17 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865911" version="1" comment="python2-ipalib is &lt;4.6.8-5.el7_9.17 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865912" version="1" comment="python2-ipaserver is &lt;4.6.8-5.el7_9.17 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868190" version="1" comment="flatpak is &lt;1.0.9-13.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868191" version="1" comment="flatpak-builder is &lt;1.0.0-13.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868192" version="1" comment="flatpak-devel is &lt;1.0.9-13.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868193" version="1" comment="flatpak-libs is &lt;1.0.9-13.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865176" version="1" comment="less is &lt;458-10.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877712" version="1" comment="ghostscript is &lt;9.25-5.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877713" version="1" comment="ghostscript-cups is &lt;9.25-5.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877714" version="1" comment="ghostscript-doc is &lt;9.25-5.el7_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877715" version="1" comment="ghostscript-gtk is &lt;9.25-5.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877716" version="1" comment="libgs is &lt;9.25-5.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877717" version="1" comment="libgs-devel is &lt;9.25-5.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965821" version="1" comment="kernel-livepatch-5_3_18-150300_59_150-default is &gt;=17-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966032" version="1" comment="kernel-livepatch-5_3_18-150300_59_153-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966033" version="1" comment="kernel-livepatch-5_3_18-150300_59_158-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966284" version="1" comment="kernel-livepatch-5_3_18-150300_59_161-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966285" version="1" comment="kernel-livepatch-5_3_18-150300_59_164-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966286" version="1" comment="kernel-livepatch-5_14_21-150400_24_108-default is &gt;=15-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966034" version="1" comment="kernel-livepatch-5_14_21-150400_24_111-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966035" version="1" comment="kernel-livepatch-5_14_21-150400_24_116-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966036" version="1" comment="kernel-livepatch-5_14_21-150400_24_119-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966037" version="1" comment="kernel-livepatch-5_14_21-150400_24_122-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948623" version="1" comment="kernel-default is &lt;5.14.21-150400.24.122.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966038" version="1" comment="kernel-livepatch-5_14_21-150500_55_49-default is &gt;=15-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966039" version="1" comment="kernel-livepatch-5_14_21-150500_55_52-default is &gt;=13-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965822" version="1" comment="kernel-livepatch-5_14_21-150500_55_59-default is &gt;=13-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966040" version="1" comment="kernel-livepatch-6_4_0-150600_21-default is &gt;=11-150600.4.25.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965286" version="1" comment="kernel-livepatch-6_4_0-150600_8-rt is &gt;=10-150600.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943402" version="1" comment="kernel-default is &lt;5.14.21-150500.55.52.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943025" version="1" comment="kernel-livepatch-6_4_0-150600_8-rt is &gt;=3-150600.3.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947519" version="1" comment="kernel-livepatch-5_14_21-150400_24_100-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947520" version="1" comment="kernel-livepatch-5_14_21-150400_24_103-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947521" version="1" comment="kernel-livepatch-5_14_21-150400_24_88-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947522" version="1" comment="kernel-livepatch-5_14_21-150400_24_92-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947523" version="1" comment="kernel-livepatch-5_14_21-150400_24_97-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947524" version="1" comment="kernel-livepatch-5_14_21-150500_55_28-default is &gt;=14-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947525" version="1" comment="kernel-livepatch-5_14_21-150500_55_31-default is &gt;=13-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947526" version="1" comment="kernel-livepatch-5_14_21-150500_55_36-default is &gt;=12-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947527" version="1" comment="kernel-livepatch-5_14_21-150500_55_39-default is &gt;=12-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947528" version="1" comment="kernel-livepatch-5_14_21-150500_55_44-default is &gt;=11-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947409" version="1" comment="kernel-livepatch-6_4_0-150600_8-rt is &gt;=4-150600.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948666" version="1" comment="kernel-default is &lt;5.14.21-150400.24.119.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957145" version="1" comment="kgraft-patch-4_12_14-122_183-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956863" version="1" comment="kgraft-patch-4_12_14-122_186-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956201" version="1" comment="kgraft-patch-4_12_14-122_189-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956556" version="1" comment="kgraft-patch-4_12_14-122_194-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956558" version="1" comment="kernel-livepatch-6_4_0-150600_21-default is &gt;=7-150600.4.13.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955679" version="1" comment="kernel-livepatch-6_4_0-150600_8-rt is &gt;=6-150600.3.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950973" version="1" comment="freeradius is &lt;3.0.13-15.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950974" version="1" comment="freeradius-devel is &lt;3.0.13-15.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950975" version="1" comment="freeradius-doc is &lt;3.0.13-15.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950976" version="1" comment="freeradius-krb5 is &lt;3.0.13-15.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950977" version="1" comment="freeradius-ldap is &lt;3.0.13-15.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950978" version="1" comment="freeradius-mysql is &lt;3.0.13-15.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950979" version="1" comment="freeradius-perl is &lt;3.0.13-15.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950980" version="1" comment="freeradius-postgresql is &lt;3.0.13-15.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950981" version="1" comment="freeradius-python is &lt;3.0.13-15.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950982" version="1" comment="freeradius-sqlite is &lt;3.0.13-15.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950983" version="1" comment="freeradius-unixODBC is &lt;3.0.13-15.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950984" version="1" comment="freeradius-utils is &lt;3.0.13-15.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956539" version="1" comment="krb5-devel is &lt;1.15.1-55.el7_9.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956540" version="1" comment="krb5-libs is &lt;1.15.1-55.el7_9.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956541" version="1" comment="krb5-pkinit is &lt;1.15.1-55.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956542" version="1" comment="krb5-server is &lt;1.15.1-55.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956543" version="1" comment="krb5-server-ldap is &lt;1.15.1-55.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956544" version="1" comment="krb5-workstation is &lt;1.15.1-55.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956545" version="1" comment="libkadm5 is &lt;1.15.1-55.el7_9.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950985" version="1" comment="python-idna is &lt;2.4-2.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957241" version="1" comment="kernel-livepatch-5_3_18-150200_24_169-default is &gt;=16-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956864" version="1" comment="kernel-livepatch-5_3_18-150200_24_172-default is &gt;=14-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956865" version="1" comment="kernel-livepatch-5_3_18-150200_24_175-default is &gt;=15-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957242" version="1" comment="kernel-livepatch-5_3_18-150200_24_178-default is &gt;=12-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956202" version="1" comment="kernel-livepatch-5_3_18-150300_59_141-default is &gt;=15-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956203" version="1" comment="kernel-livepatch-5_3_18-150300_59_144-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956866" version="1" comment="kernel-livepatch-5_3_18-150300_59_147-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956867" version="1" comment="kernel-livepatch-5_3_18-150300_59_150-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957146" version="1" comment="kernel-livepatch-5_14_21-150400_24_100-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957243" version="1" comment="kernel-livepatch-5_14_21-150400_24_103-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957244" version="1" comment="kernel-livepatch-5_14_21-150400_24_97-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947531" version="1" comment="kgraft-patch-4_12_14-122_176-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947532" version="1" comment="kgraft-patch-4_12_14-122_179-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947410" version="1" comment="kgraft-patch-4_12_14-122_183-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947533" version="1" comment="kgraft-patch-4_12_14-122_186-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947534" version="1" comment="kgraft-patch-4_12_14-122_189-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947535" version="1" comment="kgraft-patch-4_12_14-122_194-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961323" version="1" comment="kernel-livepatch-5_3_18-150300_59_147-default is &gt;=16-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961324" version="1" comment="kernel-livepatch-5_3_18-150300_59_150-default is &gt;=15-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961326" version="1" comment="kernel-livepatch-5_14_21-150400_24_103-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961302" version="1" comment="kernel-livepatch-5_14_21-150500_55_44-default is &gt;=15-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961528" version="1" comment="kernel-livepatch-6_4_0-150600_8-rt is &gt;=8-150600.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014214" version="1" comment="kernel-livepatch-6_4_0-150600_8-rt is &gt;=20-150600.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966041" version="1" comment="kernel-livepatch-5_3_18-150300_59_167-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966042" version="1" comment="kernel-livepatch-5_14_21-150400_24_125-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960119" version="1" comment="kernel-default is &lt;5.14.21-150400.24.125.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966043" version="1" comment="kernel-livepatch-5_14_21-150500_55_62-default is &gt;=11-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965823" version="1" comment="kernel-livepatch-5_14_21-150500_55_65-default is &gt;=11-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965824" version="1" comment="kernel-livepatch-5_14_21-150500_55_68-default is &gt;=10-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966044" version="1" comment="kernel-livepatch-6_4_0-150600_23_14-default is &gt;=9-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966045" version="1" comment="kernel-livepatch-6_4_0-150600_23_7-default is &gt;=9-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014742" version="1" comment="kernel-livepatch-5_3_18-150300_59_170-default is &gt;=16-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014507" version="1" comment="kernel-livepatch-5_3_18-150300_59_174-default is &gt;=15-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014671" version="1" comment="kernel-livepatch-5_3_18-150300_59_179-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014743" version="1" comment="kernel-livepatch-5_3_18-150300_59_182-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014744" version="1" comment="kernel-livepatch-5_3_18-150300_59_185-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014745" version="1" comment="kernel-livepatch-5_3_18-150300_59_188-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014260" version="1" comment="kernel-livepatch-5_3_18-150300_59_195-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014672" version="1" comment="kernel-livepatch-5_3_18-150300_59_198-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014508" version="1" comment="kernel-livepatch-5_3_18-150300_59_201-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014261" version="1" comment="kernel-livepatch-5_3_18-150300_59_204-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014254" version="1" comment="kernel-livepatch-5_3_18-150300_59_207-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012377" version="1" comment="kernel-default is &lt;5.3.18-150300.59.207.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014509" version="1" comment="kernel-livepatch-5_14_21-150400_24_125-default is &gt;=17-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014255" version="1" comment="kernel-livepatch-5_14_21-150400_24_128-default is &gt;=15-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014262" version="1" comment="kernel-livepatch-5_14_21-150400_24_133-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014510" version="1" comment="kernel-livepatch-5_14_21-150400_24_136-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014511" version="1" comment="kernel-livepatch-5_14_21-150400_24_141-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014263" version="1" comment="kernel-livepatch-5_14_21-150400_24_144-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014512" version="1" comment="kernel-livepatch-5_14_21-150400_24_147-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014513" version="1" comment="kernel-livepatch-5_14_21-150400_24_150-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014514" version="1" comment="kernel-livepatch-5_14_21-150400_24_153-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014256" version="1" comment="kernel-livepatch-5_14_21-150400_24_158-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014515" version="1" comment="kernel-livepatch-5_14_21-150400_24_161-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014516" version="1" comment="kernel-livepatch-5_14_21-150400_24_164-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014517" version="1" comment="kernel-livepatch-5_14_21-150400_24_167-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880203" version="1" comment="krb5-devel is &lt;1.15.1-55.el7_9.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880204" version="1" comment="krb5-libs is &lt;1.15.1-55.el7_9.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880205" version="1" comment="krb5-pkinit is &lt;1.15.1-55.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880206" version="1" comment="krb5-server is &lt;1.15.1-55.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880207" version="1" comment="krb5-server-ldap is &lt;1.15.1-55.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880208" version="1" comment="krb5-workstation is &lt;1.15.1-55.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880209" version="1" comment="libkadm5 is &lt;1.15.1-55.el7_9.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942736" version="1" comment="httpd is &lt;2.4.6-99.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942737" version="1" comment="httpd-devel is &lt;2.4.6-99.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942738" version="1" comment="httpd-manual is &lt;2.4.6-99.el7_9.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942739" version="1" comment="httpd-tools is &lt;2.4.6-99.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942740" version="1" comment="mod_ldap is &lt;2.4.6-99.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942741" version="1" comment="mod_proxy_html is &lt;2.4.6-99.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942742" version="1" comment="mod_session is &lt;2.4.6-99.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942743" version="1" comment="mod_ssl is &lt;2.4.6-99.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947472" version="1" comment="httpd is &lt;2.4.6-99.el7_9.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947473" version="1" comment="httpd-devel is &lt;2.4.6-99.el7_9.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947474" version="1" comment="httpd-manual is &lt;2.4.6-99.el7_9.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947475" version="1" comment="httpd-tools is &lt;2.4.6-99.el7_9.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947476" version="1" comment="mod_ldap is &lt;2.4.6-99.el7_9.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947477" version="1" comment="mod_proxy_html is &lt;2.4.6-99.el7_9.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947478" version="1" comment="mod_session is &lt;2.4.6-99.el7_9.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947479" version="1" comment="mod_ssl is &lt;2.4.6-99.el7_9.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944418" version="1" comment="qt5-qtbase is &lt;5.9.7-6.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944419" version="1" comment="qt5-qtbase-common is &lt;5.9.7-6.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944420" version="1" comment="qt5-qtbase-devel is &lt;5.9.7-6.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944421" version="1" comment="qt5-qtbase-doc is &lt;5.9.7-6.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944422" version="1" comment="qt5-qtbase-examples is &lt;5.9.7-6.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944423" version="1" comment="qt5-qtbase-gui is &lt;5.9.7-6.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944424" version="1" comment="qt5-qtbase-mysql is &lt;5.9.7-6.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944425" version="1" comment="qt5-qtbase-odbc is &lt;5.9.7-6.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944426" version="1" comment="qt5-qtbase-postgresql is &lt;5.9.7-6.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944427" version="1" comment="qt5-qtbase-static is &lt;5.9.7-6.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944428" version="1" comment="qt5-rpm-macros is &lt;5.9.7-6.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996819" version="1" comment="kernel-livepatch-5_14_21-150400_24_119-default is &gt;=19-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996820" version="1" comment="kernel-livepatch-5_14_21-150400_24_122-default is &gt;=17-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996821" version="1" comment="kernel-livepatch-5_14_21-150400_24_125-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987645" version="1" comment="kernel-livepatch-5_14_21-150500_55_62-default is &gt;=18-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997087" version="1" comment="kernel-livepatch-5_14_21-150500_55_65-default is &gt;=18-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987646" version="1" comment="kernel-livepatch-5_14_21-150500_55_68-default is &gt;=17-150500.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987906" version="1" comment="kernel-livepatch-6_4_0-150600_21-default is &gt;=18-150600.4.46.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996822" version="1" comment="kernel-livepatch-6_4_0-150600_23_14-default is &gt;=16-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987676" version="1" comment="kernel-livepatch-6_4_0-150600_23_7-default is &gt;=16-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987573" version="1" comment="kernel-livepatch-6_4_0-150600_8-rt is &gt;=17-150600.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956561" version="1" comment="kernel-default is &lt;4.12.14-122.225.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974053" version="1" comment="kernel-livepatch-5_14_21-150400_24_111-default is &gt;=15-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974054" version="1" comment="kernel-livepatch-5_14_21-150400_24_116-default is &gt;=15-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974055" version="1" comment="kernel-livepatch-5_14_21-150400_24_119-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974056" version="1" comment="kernel-livepatch-5_14_21-150400_24_122-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974057" version="1" comment="kernel-livepatch-5_14_21-150400_24_125-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974058" version="1" comment="kernel-livepatch-5_14_21-150400_24_128-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974059" version="1" comment="kernel-livepatch-5_14_21-150500_55_52-default is &gt;=15-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974060" version="1" comment="kernel-livepatch-5_14_21-150500_55_59-default is &gt;=15-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974061" version="1" comment="kernel-livepatch-5_14_21-150500_55_62-default is &gt;=13-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974062" version="1" comment="kernel-livepatch-5_14_21-150500_55_65-default is &gt;=13-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974063" version="1" comment="kernel-livepatch-5_14_21-150500_55_68-default is &gt;=12-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974064" version="1" comment="kernel-livepatch-5_14_21-150500_55_73-default is &gt;=7-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970646" version="1" comment="kernel-livepatch-6_4_0-150600_21-default is &gt;=13-150600.4.31.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970647" version="1" comment="kernel-livepatch-6_4_0-150600_23_14-default is &gt;=11-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970648" version="1" comment="kernel-livepatch-6_4_0-150600_23_17-default is &gt;=11-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970649" version="1" comment="kernel-livepatch-6_4_0-150600_23_7-default is &gt;=11-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970351" version="1" comment="kernel-livepatch-6_4_0-150600_8-rt is &gt;=12-150600.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011945" version="1" comment="kernel-livepatch-5_3_18-150300_59_167-default is &gt;=17-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011946" version="1" comment="kernel-livepatch-5_14_21-150400_24_125-default is &gt;=16-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975054" version="1" comment="kernel-livepatch-5_14_21-150400_24_111-default is &gt;=16-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975055" version="1" comment="kernel-livepatch-5_14_21-150400_24_116-default is &gt;=16-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975056" version="1" comment="kernel-livepatch-5_14_21-150400_24_119-default is &gt;=15-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975031" version="1" comment="kernel-livepatch-5_14_21-150400_24_122-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975057" version="1" comment="kernel-livepatch-5_14_21-150400_24_125-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975058" version="1" comment="kernel-livepatch-5_14_21-150500_55_52-default is &gt;=16-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975059" version="1" comment="kernel-livepatch-5_14_21-150500_55_59-default is &gt;=16-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975060" version="1" comment="kernel-livepatch-5_14_21-150500_55_62-default is &gt;=14-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975061" version="1" comment="kernel-livepatch-5_14_21-150500_55_65-default is &gt;=14-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975062" version="1" comment="kernel-livepatch-5_14_21-150500_55_68-default is &gt;=13-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975063" version="1" comment="kernel-livepatch-6_4_0-150600_21-default is &gt;=14-150600.4.34.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975064" version="1" comment="kernel-livepatch-6_4_0-150600_23_14-default is &gt;=12-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975065" version="1" comment="kernel-livepatch-6_4_0-150600_23_7-default is &gt;=12-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975032" version="1" comment="kernel-livepatch-6_4_0-150600_8-rt is &gt;=13-150600.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968281" version="1" comment="kernel-livepatch-6_4_0-150600_21-default is &gt;=12-150600.4.28.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968282" version="1" comment="kernel-livepatch-6_4_0-150600_23_14-default is &gt;=10-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968283" version="1" comment="kernel-livepatch-6_4_0-150600_23_17-default is &gt;=10-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968284" version="1" comment="kernel-livepatch-6_4_0-150600_23_7-default is &gt;=10-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968285" version="1" comment="kernel-livepatch-6_4_0-150600_8-rt is &gt;=11-150600.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008795" version="1" comment="kernel-livepatch-5_14_21-150500_55_68-default is &gt;=18-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008796" version="1" comment="kernel-livepatch-6_4_0-150600_21-default is &gt;=19-150600.4.49.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008797" version="1" comment="kernel-livepatch-6_4_0-150600_23_14-default is &gt;=17-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008798" version="1" comment="kernel-livepatch-6_4_0-150600_23_7-default is &gt;=17-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008703" version="1" comment="kernel-livepatch-6_4_0-150600_8-rt is &gt;=18-150600.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942748" version="1" comment="flatpak is &lt;1.0.9-15.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942749" version="1" comment="flatpak-builder is &lt;1.0.0-15.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942750" version="1" comment="flatpak-devel is &lt;1.0.9-15.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942751" version="1" comment="flatpak-libs is &lt;1.0.9-15.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863197" version="1" comment="firefox is &lt;115.11.0-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863198" version="1" comment="thunderbird is &lt;115.11.0-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956868" version="1" comment="kernel-default is ==5.3.18-150200.24.200.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956869" version="1" comment="kernel-livepatch-5_3_18-150200_24_200-default is &gt;=2-150200.5.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956870" version="1" comment="kernel-default is &lt;5.3.18-150200.24.200.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982353" version="1" comment="kgraft-patch-4_12_14-122_216-default is &gt;=16-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982354" version="1" comment="kgraft-patch-4_12_14-122_219-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982355" version="1" comment="kgraft-patch-4_12_14-122_222-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982627" version="1" comment="kgraft-patch-4_12_14-122_225-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982927" version="1" comment="kernel-livepatch-5_3_18-150300_59_158-default is &gt;=18-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983055" version="1" comment="kernel-livepatch-5_3_18-150300_59_161-default is &gt;=17-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982628" version="1" comment="kernel-livepatch-5_3_18-150300_59_164-default is &gt;=14-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982629" version="1" comment="kernel-livepatch-5_3_18-150300_59_167-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982928" version="1" comment="kernel-livepatch-5_3_18-150300_59_170-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982929" version="1" comment="kernel-livepatch-5_14_21-150400_24_116-default is &gt;=18-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983056" version="1" comment="kernel-livepatch-5_14_21-150400_24_119-default is &gt;=17-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983057" version="1" comment="kernel-livepatch-5_14_21-150400_24_122-default is &gt;=15-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982930" version="1" comment="kernel-livepatch-5_14_21-150400_24_125-default is &gt;=12-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982931" version="1" comment="kernel-livepatch-5_14_21-150400_24_128-default is &gt;=10-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982932" version="1" comment="kernel-livepatch-5_14_21-150500_55_59-default is &gt;=18-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982933" version="1" comment="kernel-livepatch-5_14_21-150500_55_62-default is &gt;=16-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982934" version="1" comment="kernel-livepatch-5_14_21-150500_55_65-default is &gt;=16-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982935" version="1" comment="kernel-livepatch-5_14_21-150500_55_68-default is &gt;=15-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983058" version="1" comment="kernel-livepatch-5_14_21-150500_55_73-default is &gt;=10-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982936" version="1" comment="kernel-livepatch-6_4_0-150600_21-default is &gt;=16-150600.4.40.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982937" version="1" comment="kernel-livepatch-6_4_0-150600_23_14-default is &gt;=14-150600.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982938" version="1" comment="kernel-livepatch-6_4_0-150600_23_17-default is &gt;=14-150600.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982939" version="1" comment="kernel-livepatch-6_4_0-150600_23_7-default is &gt;=14-150600.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982451" version="1" comment="kernel-livepatch-6_4_0-150600_8-rt is &gt;=15-150600.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963364" version="1" comment="kgraft-patch-4_12_14-122_189-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963365" version="1" comment="kgraft-patch-4_12_14-122_194-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963366" version="1" comment="kgraft-patch-4_12_14-122_201-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963367" version="1" comment="kgraft-patch-4_12_14-122_216-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963368" version="1" comment="kgraft-patch-4_12_14-122_219-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963369" version="1" comment="kgraft-patch-4_12_14-122_222-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963370" version="1" comment="kgraft-patch-4_12_14-122_225-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963371" version="1" comment="kgraft-patch-4_12_14-122_228-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963297" version="1" comment="kgraft-patch-4_12_14-122_234-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960543" version="1" comment="kernel-default is &lt;4.12.14-122.234.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963661" version="1" comment="kernel-livepatch-5_3_18-150300_59_174-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963373" version="1" comment="kernel-livepatch-5_3_18-150300_59_179-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963374" version="1" comment="kernel-livepatch-5_14_21-150400_24_136-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963662" version="1" comment="kernel-livepatch-5_14_21-150500_55_80-default is &gt;=3-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963663" version="1" comment="kernel-livepatch-5_14_21-150500_55_83-default is &gt;=3-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963375" version="1" comment="kernel-livepatch-6_4_0-150600_21-default is &gt;=10-150600.4.22.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963376" version="1" comment="kernel-livepatch-6_4_0-150600_23_14-default is &gt;=8-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963377" version="1" comment="kernel-livepatch-6_4_0-150600_23_17-default is &gt;=8-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963378" version="1" comment="kernel-livepatch-6_4_0-150600_23_22-default is &gt;=4-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960548" version="1" comment="kernel-default is ==6.4.0-150600.23.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963379" version="1" comment="kernel-livepatch-6_4_0-150600_23_25-default is &gt;=3-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963380" version="1" comment="kernel-livepatch-6_4_0-150600_23_7-default is &gt;=8-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963163" version="1" comment="kernel-livepatch-6_4_0-150600_8-rt is &gt;=9-150600.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974746" version="1" comment="grub2 is &lt;2.02-0.87.0.4.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974747" version="1" comment="grub2-common is &lt;2.02-0.87.0.4.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974748" version="1" comment="grub2-efi-ia32 is &lt;2.02-0.87.0.4.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974749" version="1" comment="grub2-efi-ia32-cdboot is &lt;2.02-0.87.0.4.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974750" version="1" comment="grub2-efi-ia32-modules is &lt;2.02-0.87.0.4.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974751" version="1" comment="grub2-efi-x64 is &lt;2.02-0.87.0.4.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974752" version="1" comment="grub2-efi-x64-cdboot is &lt;2.02-0.87.0.4.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974753" version="1" comment="grub2-efi-x64-modules is &lt;2.02-0.87.0.4.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974754" version="1" comment="grub2-pc is &lt;2.02-0.87.0.4.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974755" version="1" comment="grub2-pc-modules is &lt;2.02-0.87.0.4.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974756" version="1" comment="grub2-tools is &lt;2.02-0.87.0.4.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974757" version="1" comment="grub2-tools-extra is &lt;2.02-0.87.0.4.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974758" version="1" comment="grub2-tools-minimal is &lt;2.02-0.87.0.4.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957237" version="1" comment="squid is &lt;3.5.20-17.el7_9.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957238" version="1" comment="squid-migration-script is &lt;3.5.20-17.el7_9.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957239" version="1" comment="squid-sysvinit is &lt;3.5.20-17.el7_9.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968286" version="1" comment="kernel-livepatch-5_14_21-150400_24_136-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968287" version="1" comment="kernel-livepatch-6_4_0-150600_23_22-default is &gt;=6-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968289" version="1" comment="kernel-livepatch-5_3_18-150300_59_179-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947248" version="1" comment="cups-filters is &lt;1.0.35-29.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947249" version="1" comment="cups-filters-devel is &lt;1.0.35-29.el7_9.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947250" version="1" comment="cups-filters-libs is &lt;1.0.35-29.el7_9.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017223" version="1" comment="httpd is &lt;2.4.6-99.el7_9.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017224" version="1" comment="httpd-devel is &lt;2.4.6-99.el7_9.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017225" version="1" comment="httpd-manual is &lt;2.4.6-99.el7_9.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017226" version="1" comment="httpd-tools is &lt;2.4.6-99.el7_9.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017227" version="1" comment="mod_ldap is &lt;2.4.6-99.el7_9.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017228" version="1" comment="mod_proxy_html is &lt;2.4.6-99.el7_9.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017229" version="1" comment="mod_session is &lt;2.4.6-99.el7_9.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017230" version="1" comment="mod_ssl is &lt;2.4.6-99.el7_9.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018025" version="1" comment="kernel-livepatch-6_4_0-150600_23_17-default is &gt;=20-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017977" version="1" comment="kernel-livepatch-6_4_0-150600_23_22-default is &gt;=16-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018026" version="1" comment="kernel-livepatch-6_4_0-150600_23_25-default is &gt;=15-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017332" version="1" comment="kernel-livepatch-6_4_0-150600_8-rt is &gt;=21-150600.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986628" version="1" comment="kernel-livepatch-6_4_0-150600_21-default is &gt;=17-150600.4.43.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986733" version="1" comment="kernel-livepatch-6_4_0-150600_23_14-default is &gt;=15-150600.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986629" version="1" comment="kernel-livepatch-6_4_0-150600_23_17-default is &gt;=15-150600.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986630" version="1" comment="kernel-livepatch-6_4_0-150600_23_22-default is &gt;=11-150600.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986631" version="1" comment="kernel-livepatch-6_4_0-150600_23_25-default is &gt;=10-150600.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986632" version="1" comment="kernel-livepatch-6_4_0-150600_23_7-default is &gt;=15-150600.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986107" version="1" comment="kernel-livepatch-6_4_0-150600_8-rt is &gt;=16-150600.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019242" version="1" comment="kgraft-patch-4_12_14-122_228-default is &gt;=16-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019406" version="1" comment="kernel-livepatch-5_3_18-150300_59_174-default is &gt;=17-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019407" version="1" comment="kernel-livepatch-5_3_18-150300_59_179-default is &gt;=16-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019704" version="1" comment="kernel-livepatch-5_14_21-150500_55_80-default is &gt;=15-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019705" version="1" comment="kernel-livepatch-6_4_0-150600_23_22-default is &gt;=17-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987908" version="1" comment="kernel-default is &lt;6.4.0-150600.23.22.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022284" version="1" comment="kernel-livepatch-5_3_18-150300_59_174-default is &gt;=19-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022309" version="1" comment="kernel-livepatch-5_3_18-150300_59_179-default is &gt;=18-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022333" version="1" comment="kernel-livepatch-5_14_21-150400_24_133-default is &gt;=17-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022612" version="1" comment="kernel-livepatch-5_14_21-150400_24_136-default is &gt;=17-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022801" version="1" comment="kernel-livepatch-5_14_21-150500_55_80-default is &gt;=17-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022802" version="1" comment="kernel-livepatch-5_14_21-150500_55_83-default is &gt;=17-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023023" version="1" comment="kernel-livepatch-6_4_0-150600_23_22-default is &gt;=19-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023024" version="1" comment="kernel-livepatch-6_4_0-150600_23_25-default is &gt;=18-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996825" version="1" comment="kernel-default is &lt;6.4.0-150600.23.25.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982356" version="1" comment="kgraft-patch-4_12_14-122_228-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982358" version="1" comment="kgraft-patch-4_12_14-122_234-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982940" version="1" comment="kernel-livepatch-5_3_18-150300_59_174-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982941" version="1" comment="kernel-livepatch-5_3_18-150300_59_179-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982942" version="1" comment="kernel-livepatch-5_3_18-150300_59_182-default is &gt;=7-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960546" version="1" comment="kernel-default is &lt;5.3.18-150300.59.182.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982943" version="1" comment="kernel-livepatch-5_14_21-150400_24_133-default is &gt;=8-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982944" version="1" comment="kernel-livepatch-5_14_21-150400_24_136-default is &gt;=8-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982945" version="1" comment="kernel-livepatch-5_14_21-150400_24_141-default is &gt;=7-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960754" version="1" comment="kernel-default is &lt;5.14.21-150400.24.141.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982946" version="1" comment="kernel-livepatch-5_14_21-150500_55_80-default is &gt;=8-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982947" version="1" comment="kernel-livepatch-5_14_21-150500_55_83-default is &gt;=8-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982948" version="1" comment="kernel-livepatch-6_4_0-150600_23_22-default is &gt;=10-150600.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982949" version="1" comment="kernel-livepatch-6_4_0-150600_23_25-default is &gt;=9-150600.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987647" version="1" comment="kernel-livepatch-5_14_21-150500_55_73-default is &gt;=12-150500.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997139" version="1" comment="kernel-livepatch-5_14_21-150500_55_80-default is &gt;=10-150500.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987648" version="1" comment="kernel-livepatch-5_14_21-150500_55_83-default is &gt;=10-150500.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997088" version="1" comment="kernel-livepatch-6_4_0-150600_23_17-default is &gt;=16-150600.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987907" version="1" comment="kernel-livepatch-6_4_0-150600_23_22-default is &gt;=12-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996823" version="1" comment="kernel-livepatch-6_4_0-150600_23_25-default is &gt;=11-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987649" version="1" comment="kernel-livepatch-5_14_21-150400_24_128-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996824" version="1" comment="kernel-livepatch-5_14_21-150400_24_133-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987650" version="1" comment="kernel-livepatch-5_14_21-150400_24_136-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997089" version="1" comment="kernel-livepatch-5_14_21-150400_24_141-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020202" version="1" comment="kgraft-patch-4_12_14-122_228-default is &gt;=17-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020204" version="1" comment="kgraft-patch-4_12_14-122_234-default is &gt;=16-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020375" version="1" comment="kernel-livepatch-5_3_18-150300_59_174-default is &gt;=18-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020741" version="1" comment="kernel-livepatch-5_3_18-150300_59_179-default is &gt;=17-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020376" version="1" comment="kernel-livepatch-5_3_18-150300_59_182-default is &gt;=15-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020673" version="1" comment="kernel-livepatch-5_14_21-150400_24_133-default is &gt;=16-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020674" version="1" comment="kernel-livepatch-5_14_21-150400_24_136-default is &gt;=16-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020507" version="1" comment="kernel-livepatch-5_14_21-150400_24_141-default is &gt;=15-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020675" version="1" comment="kernel-livepatch-5_14_21-150500_55_80-default is &gt;=16-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020676" version="1" comment="kernel-livepatch-5_14_21-150500_55_83-default is &gt;=16-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020702" version="1" comment="kernel-livepatch-6_4_0-150600_23_22-default is &gt;=18-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020703" version="1" comment="kernel-livepatch-6_4_0-150600_23_25-default is &gt;=17-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977139" version="1" comment="kernel-livepatch-5_3_18-150300_59_170-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977140" version="1" comment="kernel-livepatch-5_3_18-150300_59_174-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977280" version="1" comment="kernel-livepatch-5_3_18-150300_59_179-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976833" version="1" comment="kernel-livepatch-5_3_18-150300_59_182-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976886" version="1" comment="kernel-livepatch-5_14_21-150400_24_116-default is &gt;=17-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977129" version="1" comment="kernel-livepatch-5_14_21-150400_24_119-default is &gt;=16-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977141" version="1" comment="kernel-livepatch-5_14_21-150400_24_122-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977122" version="1" comment="kernel-livepatch-5_14_21-150400_24_125-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976887" version="1" comment="kernel-livepatch-5_14_21-150400_24_128-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976888" version="1" comment="kernel-livepatch-5_14_21-150400_24_133-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976889" version="1" comment="kernel-livepatch-5_14_21-150400_24_136-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977130" version="1" comment="kernel-livepatch-5_14_21-150400_24_141-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977281" version="1" comment="kernel-livepatch-5_14_21-150500_55_59-default is &gt;=17-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977282" version="1" comment="kernel-livepatch-5_14_21-150500_55_62-default is &gt;=15-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977283" version="1" comment="kernel-livepatch-5_14_21-150500_55_65-default is &gt;=15-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977284" version="1" comment="kernel-livepatch-5_14_21-150500_55_68-default is &gt;=14-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977285" version="1" comment="kernel-livepatch-5_14_21-150500_55_73-default is &gt;=9-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977286" version="1" comment="kernel-livepatch-5_14_21-150500_55_80-default is &gt;=7-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977287" version="1" comment="kernel-livepatch-5_14_21-150500_55_83-default is &gt;=7-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008963" version="1" comment="kernel-livepatch-5_14_21-150500_55_73-default is &gt;=13-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008799" version="1" comment="kernel-livepatch-5_14_21-150500_55_80-default is &gt;=11-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008800" version="1" comment="kernel-livepatch-5_14_21-150500_55_83-default is &gt;=11-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008801" version="1" comment="kernel-livepatch-6_4_0-150600_23_17-default is &gt;=17-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008802" version="1" comment="kernel-livepatch-6_4_0-150600_23_22-default is &gt;=13-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008803" version="1" comment="kernel-livepatch-6_4_0-150600_23_25-default is &gt;=12-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960542" version="1" comment="kgraft-patch-4_12_14-122_234-default is &gt;=2-8.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960545" version="1" comment="kernel-livepatch-5_3_18-150300_59_182-default is &gt;=2-150300.7.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960753" version="1" comment="kernel-livepatch-5_14_21-150400_24_141-default is &gt;=2-150400.9.8.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960547" version="1" comment="kernel-livepatch-6_4_0-150600_21-default is &gt;=8-150600.4.16.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960549" version="1" comment="kernel-livepatch-6_4_0-150600_23_25-default is &gt;=2-150600.13.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960122" version="1" comment="kernel-livepatch-6_4_0-150600_8-rt is &gt;=7-150600.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968290" version="1" comment="kgraft-patch-4_12_14-122_234-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968291" version="1" comment="kernel-livepatch-5_3_18-150300_59_182-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968292" version="1" comment="kernel-livepatch-5_14_21-150400_24_141-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968293" version="1" comment="kernel-livepatch-5_14_21-150500_55_83-default is &gt;=5-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968294" version="1" comment="kernel-livepatch-6_4_0-150600_23_25-default is &gt;=5-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956837" version="1" comment="tuned is &lt;2.11.0-13.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956838" version="1" comment="tuned-gtk is &lt;2.11.0-13.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956839" version="1" comment="tuned-profiles-atomic is &lt;2.11.0-13.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956840" version="1" comment="tuned-profiles-compat is &lt;2.11.0-13.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956841" version="1" comment="tuned-profiles-cpu-partitioning is &lt;2.11.0-13.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956842" version="1" comment="tuned-profiles-mssql is &lt;2.11.0-13.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956843" version="1" comment="tuned-profiles-oracle is &lt;2.11.0-13.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956844" version="1" comment="tuned-utils is &lt;2.11.0-13.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956845" version="1" comment="tuned-utils-systemtap is &lt;2.11.0-13.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955234" version="1" comment="libsoup is &lt;2.62.2-3.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955235" version="1" comment="libsoup-devel is &lt;2.62.2-3.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977288" version="1" comment="kernel-livepatch-6_4_0-150600_21-default is &gt;=15-150600.4.37.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977289" version="1" comment="kernel-livepatch-6_4_0-150600_23_14-default is &gt;=13-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977290" version="1" comment="kernel-livepatch-6_4_0-150600_23_17-default is &gt;=13-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977291" version="1" comment="kernel-livepatch-6_4_0-150600_23_22-default is &gt;=9-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977292" version="1" comment="kernel-livepatch-6_4_0-150600_23_25-default is &gt;=8-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977293" version="1" comment="kernel-livepatch-6_4_0-150600_23_7-default is &gt;=13-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976432" version="1" comment="kernel-livepatch-6_4_0-150600_8-rt is &gt;=14-150600.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965287" version="1" comment="kgraft-patch-4_12_14-122_219-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965288" version="1" comment="kgraft-patch-4_12_14-122_222-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965289" version="1" comment="kgraft-patch-4_12_14-122_225-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965290" version="1" comment="kgraft-patch-4_12_14-122_228-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966046" version="1" comment="kgraft-patch-4_12_14-122_234-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966047" version="1" comment="kernel-livepatch-5_3_18-150300_59_170-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966287" version="1" comment="kernel-livepatch-5_3_18-150300_59_174-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965825" version="1" comment="kernel-livepatch-5_3_18-150300_59_179-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966048" version="1" comment="kernel-livepatch-5_3_18-150300_59_182-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966289" version="1" comment="kernel-livepatch-5_3_18-150300_59_185-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966291" version="1" comment="kernel-livepatch-5_3_18-150300_59_188-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966292" version="1" comment="kernel-default is &lt;5.3.18-150300.59.188.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966049" version="1" comment="kernel-livepatch-5_14_21-150400_24_128-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966050" version="1" comment="kernel-livepatch-5_14_21-150400_24_133-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966051" version="1" comment="kernel-livepatch-5_14_21-150400_24_136-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966052" version="1" comment="kernel-livepatch-5_14_21-150400_24_141-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966294" version="1" comment="kernel-livepatch-5_14_21-150400_24_144-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966296" version="1" comment="kernel-livepatch-5_14_21-150400_24_147-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966297" version="1" comment="kernel-default is &lt;5.14.21-150400.24.147.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965826" version="1" comment="kernel-livepatch-5_14_21-150500_55_73-default is &gt;=5-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966053" version="1" comment="kernel-livepatch-5_14_21-150500_55_80-default is &gt;=4-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966054" version="1" comment="kernel-livepatch-5_14_21-150500_55_83-default is &gt;=4-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966055" version="1" comment="kernel-livepatch-6_4_0-150600_23_17-default is &gt;=9-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966056" version="1" comment="kernel-livepatch-6_4_0-150600_23_22-default is &gt;=5-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966057" version="1" comment="kernel-livepatch-6_4_0-150600_23_25-default is &gt;=4-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964251" version="1" comment="bpftool is &lt;3.10.0-1160.132.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964252" version="1" comment="kernel is &lt;3.10.0-1160.132.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964253" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1160.132.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964254" version="1" comment="kernel-debug is &lt;3.10.0-1160.132.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964257" version="1" comment="kernel-doc is &lt;3.10.0-1160.132.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964258" version="1" comment="kernel-headers is &lt;3.10.0-1160.132.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964259" version="1" comment="kernel-tools is &lt;3.10.0-1160.132.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964260" version="1" comment="kernel-tools-libs is &lt;3.10.0-1160.132.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964262" version="1" comment="perf is &lt;3.10.0-1160.132.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964263" version="1" comment="python-perf is &lt;3.10.0-1160.132.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011947" version="1" comment="kernel-livepatch-5_14_21-150400_24_128-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011948" version="1" comment="kernel-livepatch-5_14_21-150400_24_133-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011949" version="1" comment="kernel-livepatch-5_14_21-150400_24_136-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011950" version="1" comment="kernel-livepatch-5_14_21-150400_24_141-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011889" version="1" comment="kernel-livepatch-5_14_21-150400_24_144-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011951" version="1" comment="kernel-livepatch-5_14_21-150400_24_147-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011952" version="1" comment="kernel-livepatch-5_14_21-150400_24_150-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011953" version="1" comment="kernel-livepatch-5_14_21-150400_24_153-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011890" version="1" comment="kernel-livepatch-5_14_21-150400_24_158-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011954" version="1" comment="kernel-livepatch-5_14_21-150400_24_161-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011955" version="1" comment="kernel-livepatch-5_14_21-150400_24_164-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012373" version="1" comment="kernel-livepatch-5_14_21-150400_24_167-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011956" version="1" comment="kernel-livepatch-5_14_21-150500_55_73-default is &gt;=14-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011957" version="1" comment="kernel-livepatch-5_14_21-150500_55_80-default is &gt;=12-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011958" version="1" comment="kernel-livepatch-5_14_21-150500_55_83-default is &gt;=12-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012357" version="1" comment="kernel-livepatch-5_14_21-150500_55_88-default is &gt;=8-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987653" version="1" comment="kernel-default is &lt;5.14.21-150500.55.88.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011959" version="1" comment="kernel-livepatch-6_4_0-150600_23_22-default is &gt;=14-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011960" version="1" comment="kernel-livepatch-6_4_0-150600_23_25-default is &gt;=13-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012358" version="1" comment="kernel-livepatch-6_4_0-150600_23_30-default is &gt;=9-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030691" version="1" comment="kgraft-patch-4_12_14-122_234-default is &gt;=19-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030651" version="1" comment="kgraft-patch-4_12_14-122_237-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976561" version="1" comment="kernel-default is &lt;4.12.14-122.237.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031210" version="1" comment="kernel-livepatch-5_14_21-150500_55_100-default is &gt;=10-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031656" version="1" comment="kernel-livepatch-5_14_21-150500_55_103-default is &gt;=10-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031468" version="1" comment="kernel-livepatch-5_14_21-150500_55_110-default is &gt;=9-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031657" version="1" comment="kernel-livepatch-5_14_21-150500_55_88-default is &gt;=15-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031469" version="1" comment="kernel-livepatch-5_14_21-150500_55_91-default is &gt;=15-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031470" version="1" comment="kernel-livepatch-5_14_21-150500_55_94-default is &gt;=11-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031471" version="1" comment="kernel-livepatch-5_14_21-150500_55_97-default is &gt;=11-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031472" version="1" comment="kernel-livepatch-6_4_0-150600_23_30-default is &gt;=16-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020709" version="1" comment="kernel-default is &lt;6.4.0-150600.23.30.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983821" version="1" comment="bpftool is &lt;3.10.0-1160.135.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983822" version="1" comment="kernel is &lt;3.10.0-1160.135.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983823" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1160.135.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983824" version="1" comment="kernel-debug is &lt;3.10.0-1160.135.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983827" version="1" comment="kernel-doc is &lt;3.10.0-1160.135.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983828" version="1" comment="kernel-headers is &lt;3.10.0-1160.135.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983829" version="1" comment="kernel-tools is &lt;3.10.0-1160.135.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983830" version="1" comment="kernel-tools-libs is &lt;3.10.0-1160.135.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983832" version="1" comment="perf is &lt;3.10.0-1160.135.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983833" version="1" comment="python-perf is &lt;3.10.0-1160.135.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982951" version="1" comment="kernel-default is &lt;5.3.18-150300.59.185.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977143" version="1" comment="kernel-default is &lt;5.14.21-150400.24.144.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008804" version="1" comment="kernel-livepatch-5_14_21-150500_55_88-default is &gt;=7-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008805" version="1" comment="kernel-livepatch-6_4_0-150600_23_30-default is &gt;=8-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976240" version="1" comment="bpftool is &lt;3.10.0-1160.134.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976241" version="1" comment="kernel is &lt;3.10.0-1160.134.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976242" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1160.134.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976243" version="1" comment="kernel-debug is &lt;3.10.0-1160.134.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976246" version="1" comment="kernel-doc is &lt;3.10.0-1160.134.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976247" version="1" comment="kernel-headers is &lt;3.10.0-1160.134.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976248" version="1" comment="kernel-tools is &lt;3.10.0-1160.134.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976249" version="1" comment="kernel-tools-libs is &lt;3.10.0-1160.134.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976251" version="1" comment="perf is &lt;3.10.0-1160.134.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976252" version="1" comment="python-perf is &lt;3.10.0-1160.134.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982452" version="1" comment="kgraft-patch-4_12_14-122_237-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982950" version="1" comment="kernel-livepatch-5_3_18-150300_59_185-default is &gt;=5-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982630" version="1" comment="kernel-livepatch-5_14_21-150400_24_144-default is &gt;=6-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012381" version="1" comment="kernel-default is &lt;5.3.18-150300.59.211.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014754" version="1" comment="kernel-default is &lt;5.14.21-150400.24.170.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025110" version="1" comment="kernel-livepatch-6_4_0-150600_23_25-default is &gt;=19-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024668" version="1" comment="kernel-livepatch-6_4_0-150600_23_30-default is &gt;=15-150600.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024669" version="1" comment="kernel-livepatch-6_4_0-150600_23_33-default is &gt;=15-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019716" version="1" comment="kernel-default is &lt;6.4.0-150600.23.33.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008806" version="1" comment="kernel-livepatch-5_14_21-150500_55_91-default is &gt;=7-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968301" version="1" comment="kernel-default is &lt;5.14.21-150500.55.91.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020205" version="1" comment="kgraft-patch-4_12_14-122_237-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020704" version="1" comment="kgraft-patch-4_12_14-122_244-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020308" version="1" comment="kgraft-patch-4_12_14-122_247-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020309" version="1" comment="kgraft-patch-4_12_14-122_250-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020206" version="1" comment="kgraft-patch-4_12_14-122_255-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020310" version="1" comment="kgraft-patch-4_12_14-122_258-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011975" version="1" comment="kernel-default is &lt;4.12.14-122.258.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020377" version="1" comment="kernel-livepatch-5_3_18-150300_59_185-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020508" version="1" comment="kernel-livepatch-5_3_18-150300_59_188-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020509" version="1" comment="kernel-livepatch-5_3_18-150300_59_195-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020510" version="1" comment="kernel-livepatch-5_3_18-150300_59_198-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020511" version="1" comment="kernel-livepatch-5_3_18-150300_59_201-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020378" version="1" comment="kernel-livepatch-5_3_18-150300_59_204-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008966" version="1" comment="kernel-default is &lt;5.3.18-150300.59.204.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020512" version="1" comment="kernel-livepatch-5_14_21-150400_24_144-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020513" version="1" comment="kernel-livepatch-5_14_21-150400_24_147-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020514" version="1" comment="kernel-livepatch-5_14_21-150400_24_150-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020515" version="1" comment="kernel-livepatch-5_14_21-150400_24_153-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020705" version="1" comment="kernel-livepatch-5_14_21-150400_24_158-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020742" version="1" comment="kernel-livepatch-5_14_21-150400_24_161-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020677" version="1" comment="kernel-livepatch-5_14_21-150400_24_164-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008971" version="1" comment="kernel-default is &lt;5.14.21-150400.24.164.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020706" version="1" comment="kernel-livepatch-5_14_21-150500_55_100-default is &gt;=7-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020707" version="1" comment="kernel-livepatch-5_14_21-150500_55_103-default is &gt;=7-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020678" version="1" comment="kernel-livepatch-5_14_21-150500_55_88-default is &gt;=12-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020679" version="1" comment="kernel-livepatch-5_14_21-150500_55_91-default is &gt;=12-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020680" version="1" comment="kernel-livepatch-5_14_21-150500_55_94-default is &gt;=8-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020681" version="1" comment="kernel-livepatch-5_14_21-150500_55_97-default is &gt;=8-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020708" version="1" comment="kernel-livepatch-6_4_0-150600_23_30-default is &gt;=13-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961526" version="1" comment="iperf3 is &lt;3.1.7-3.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961527" version="1" comment="iperf3-devel is &lt;3.1.7-3.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958158" version="1" comment="python-virtualenv is &lt;15.1.0-7.el7_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982178" version="1" comment="libxslt is &lt;1.1.28-9.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982179" version="1" comment="libxslt-devel is &lt;1.1.28-9.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982180" version="1" comment="libxslt-python is &lt;1.1.28-9.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879076" version="1" comment="libndp is &lt;1.2-10.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879077" version="1" comment="libndp-devel is &lt;1.2-10.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969739" version="1" comment="libxml2 is &lt;2.9.1-6.el7_9.9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969740" version="1" comment="libxml2-devel is &lt;2.9.1-6.el7_9.9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969741" version="1" comment="libxml2-python is &lt;2.9.1-6.el7_9.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969742" version="1" comment="libxml2-static is &lt;2.9.1-6.el7_9.9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964798" version="1" comment="python-jinja2 is &lt;2.7.2-5.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008808" version="1" comment="kernel-livepatch-5_3_18-150300_59_201-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008965" version="1" comment="kernel-livepatch-5_3_18-150300_59_204-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008968" version="1" comment="kernel-livepatch-5_14_21-150400_24_161-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008970" version="1" comment="kernel-livepatch-5_14_21-150400_24_164-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997090" version="1" comment="kernel-livepatch-6_4_0-150600_23_30-default is &gt;=7-150600.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975407" version="1" comment="kernel-default is &lt;4.12.14-122.244.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975033" version="1" comment="kernel-livepatch-5_14_21-150400_24_128-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975411" version="1" comment="kernel-livepatch-5_14_21-150400_24_133-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975412" version="1" comment="kernel-livepatch-5_14_21-150400_24_136-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975413" version="1" comment="kernel-livepatch-5_14_21-150400_24_141-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975414" version="1" comment="kernel-livepatch-5_14_21-150400_24_144-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975415" version="1" comment="kernel-livepatch-5_14_21-150400_24_147-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975066" version="1" comment="kernel-livepatch-5_14_21-150500_55_73-default is &gt;=8-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975416" version="1" comment="kernel-livepatch-5_14_21-150500_55_80-default is &gt;=6-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975417" version="1" comment="kernel-livepatch-5_14_21-150500_55_83-default is &gt;=6-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975418" version="1" comment="kernel-livepatch-5_14_21-150500_55_88-default is &gt;=3-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975419" version="1" comment="kernel-livepatch-5_14_21-150500_55_91-default is &gt;=3-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975067" version="1" comment="kernel-livepatch-6_4_0-150600_23_17-default is &gt;=12-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975068" version="1" comment="kernel-livepatch-6_4_0-150600_23_22-default is &gt;=8-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975069" version="1" comment="kernel-livepatch-6_4_0-150600_23_25-default is &gt;=7-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975070" version="1" comment="kernel-livepatch-6_4_0-150600_23_30-default is &gt;=4-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975071" version="1" comment="kernel-livepatch-6_4_0-150600_23_33-default is &gt;=4-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987651" version="1" comment="kernel-livepatch-5_14_21-150400_24_144-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997091" version="1" comment="kernel-livepatch-5_14_21-150400_24_147-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987652" version="1" comment="kernel-livepatch-5_14_21-150500_55_88-default is &gt;=6-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997092" version="1" comment="kernel-livepatch-5_14_21-150500_55_91-default is &gt;=6-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996826" version="1" comment="kernel-livepatch-6_4_0-150600_23_33-default is &gt;=7-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968295" version="1" comment="kernel-livepatch-5_14_21-150400_24_144-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968296" version="1" comment="kernel-livepatch-5_14_21-150400_24_147-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968298" version="1" comment="kernel-livepatch-5_14_21-150500_55_88-default is &gt;=2-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968300" version="1" comment="kernel-livepatch-5_14_21-150500_55_91-default is &gt;=2-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968303" version="1" comment="kernel-livepatch-6_4_0-150600_23_30-default is &gt;=2-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968305" version="1" comment="kernel-livepatch-6_4_0-150600_23_33-default is &gt;=2-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976552" version="1" comment="kgraft-patch-4_12_14-122_216-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976553" version="1" comment="kgraft-patch-4_12_14-122_219-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976554" version="1" comment="kgraft-patch-4_12_14-122_222-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976555" version="1" comment="kgraft-patch-4_12_14-122_225-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976556" version="1" comment="kgraft-patch-4_12_14-122_228-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976558" version="1" comment="kgraft-patch-4_12_14-122_234-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976559" version="1" comment="kgraft-patch-4_12_14-122_237-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976560" version="1" comment="kgraft-patch-4_12_14-122_244-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977294" version="1" comment="kernel-livepatch-5_3_18-150300_59_185-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976834" version="1" comment="kernel-livepatch-5_3_18-150300_59_188-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977142" version="1" comment="kernel-livepatch-5_14_21-150400_24_144-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977131" version="1" comment="kernel-livepatch-5_14_21-150400_24_147-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977295" version="1" comment="kernel-livepatch-5_14_21-150500_55_88-default is &gt;=4-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977296" version="1" comment="kernel-livepatch-5_14_21-150500_55_91-default is &gt;=4-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977297" version="1" comment="kernel-livepatch-6_4_0-150600_23_30-default is &gt;=5-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977298" version="1" comment="kernel-livepatch-6_4_0-150600_23_33-default is &gt;=5-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011961" version="1" comment="kgraft-patch-4_12_14-122_222-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011962" version="1" comment="kgraft-patch-4_12_14-122_225-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011963" version="1" comment="kgraft-patch-4_12_14-122_228-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011826" version="1" comment="kgraft-patch-4_12_14-122_234-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011964" version="1" comment="kgraft-patch-4_12_14-122_237-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011965" version="1" comment="kernel-livepatch-5_3_18-150300_59_170-default is &gt;=15-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011827" version="1" comment="kernel-livepatch-5_3_18-150300_59_174-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011966" version="1" comment="kernel-livepatch-5_3_18-150300_59_179-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012359" version="1" comment="kernel-livepatch-5_3_18-150300_59_182-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011891" version="1" comment="kernel-livepatch-5_3_18-150300_59_185-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011967" version="1" comment="kernel-livepatch-5_3_18-150300_59_188-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011968" version="1" comment="kernel-livepatch-5_14_21-150500_55_91-default is &gt;=8-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011969" version="1" comment="kernel-livepatch-6_4_0-150600_23_33-default is &gt;=9-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870202" version="1" comment="firefox is &lt;115.12.0-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869887" version="1" comment="thunderbird is &lt;115.12.1-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985775" version="1" comment="virtuoso-opensource is &lt;6.1.6-8.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985776" version="1" comment="virtuoso-opensource-utils is &lt;6.1.6-8.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008810" version="1" comment="kernel-livepatch-6_4_0-150600_23_33-default is &gt;=8-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961524" version="1" comment="raptor2 is &lt;2.0.9-5.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961525" version="1" comment="raptor2-devel is &lt;2.0.9-5.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970650" version="1" comment="kernel-livepatch-6_4_0-150600_23_22-default is &gt;=7-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970651" version="1" comment="kernel-livepatch-6_4_0-150600_23_25-default is &gt;=6-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970652" version="1" comment="kernel-livepatch-6_4_0-150600_23_30-default is &gt;=3-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970653" version="1" comment="kernel-livepatch-6_4_0-150600_23_33-default is &gt;=3-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986634" version="1" comment="kernel-livepatch-5_14_21-150400_24_153-default is &gt;=2-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986635" version="1" comment="kernel-default is &lt;5.14.21-150400.24.153.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986284" version="1" comment="kernel-livepatch-5_14_21-150500_55_97-default is &gt;=2-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986734" version="1" comment="kernel-livepatch-6_4_0-150600_23_30-default is &gt;=6-150600.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986735" version="1" comment="kernel-livepatch-6_4_0-150600_23_33-default is &gt;=6-150600.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986737" version="1" comment="kernel-livepatch-6_4_0-150600_23_38-default is &gt;=2-150600.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986739" version="1" comment="kernel-livepatch-6_4_0-150600_23_42-default is &gt;=2-150600.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019723" version="1" comment="kernel-default is &lt;5.14.21-150400.24.173.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942744" version="1" comment="389-ds-base is &lt;1.3.11.1-6.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942745" version="1" comment="389-ds-base-devel is &lt;1.3.11.1-6.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942746" version="1" comment="389-ds-base-libs is &lt;1.3.11.1-6.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942747" version="1" comment="389-ds-base-snmp is &lt;1.3.11.1-6.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942558" version="1" comment="python-setuptools is &lt;0.9.8-7.el7_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942557" version="1" comment="python3-setuptools is &lt;39.2.0-10.el7_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953508" version="1" comment="postgresql is &lt;9.2.24-9.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953509" version="1" comment="postgresql-contrib is &lt;9.2.24-9.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953510" version="1" comment="postgresql-devel is &lt;9.2.24-9.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953511" version="1" comment="postgresql-docs is &lt;9.2.24-9.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953512" version="1" comment="postgresql-libs is &lt;9.2.24-9.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953513" version="1" comment="postgresql-plperl is &lt;9.2.24-9.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953514" version="1" comment="postgresql-plpython is &lt;9.2.24-9.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953515" version="1" comment="postgresql-pltcl is &lt;9.2.24-9.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953516" version="1" comment="postgresql-server is &lt;9.2.24-9.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953517" version="1" comment="postgresql-static is &lt;9.2.24-9.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953518" version="1" comment="postgresql-test is &lt;9.2.24-9.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953519" version="1" comment="postgresql-upgrade is &lt;9.2.24-9.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945525" version="1" comment="389-ds-base is &lt;1.3.11.1-7.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945526" version="1" comment="389-ds-base-devel is &lt;1.3.11.1-7.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945527" version="1" comment="389-ds-base-libs is &lt;1.3.11.1-7.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945528" version="1" comment="389-ds-base-snmp is &lt;1.3.11.1-7.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953315" version="1" comment="NetworkManager-libreswan is &lt;1.2.4-4.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953316" version="1" comment="NetworkManager-libreswan-gnome is &lt;1.2.4-4.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958984" version="1" comment="tigervnc is &lt;1.8.0-34.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958985" version="1" comment="tigervnc-icons is &lt;1.8.0-34.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958986" version="1" comment="tigervnc-license is &lt;1.8.0-34.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958987" version="1" comment="tigervnc-server is &lt;1.8.0-34.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958988" version="1" comment="tigervnc-server-applet is &lt;1.8.0-34.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958989" version="1" comment="tigervnc-server-minimal is &lt;1.8.0-34.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958990" version="1" comment="tigervnc-server-module is &lt;1.8.0-34.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986602" version="1" comment="postgresql is &lt;9.2.24-9.el7_9.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986603" version="1" comment="postgresql-contrib is &lt;9.2.24-9.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986604" version="1" comment="postgresql-devel is &lt;9.2.24-9.el7_9.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986605" version="1" comment="postgresql-docs is &lt;9.2.24-9.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986606" version="1" comment="postgresql-libs is &lt;9.2.24-9.el7_9.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986607" version="1" comment="postgresql-plperl is &lt;9.2.24-9.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986608" version="1" comment="postgresql-plpython is &lt;9.2.24-9.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986609" version="1" comment="postgresql-pltcl is &lt;9.2.24-9.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986610" version="1" comment="postgresql-server is &lt;9.2.24-9.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986611" version="1" comment="postgresql-static is &lt;9.2.24-9.el7_9.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986612" version="1" comment="postgresql-test is &lt;9.2.24-9.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986613" version="1" comment="postgresql-upgrade is &lt;9.2.24-9.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047003" version="1" comment="libipa_hbac is &lt;1.16.5-10.el7_9.17 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047004" version="1" comment="libipa_hbac-devel is &lt;1.16.5-10.el7_9.17 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047005" version="1" comment="libsss_autofs is &lt;1.16.5-10.el7_9.17 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047006" version="1" comment="libsss_certmap is &lt;1.16.5-10.el7_9.17 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047007" version="1" comment="libsss_certmap-devel is &lt;1.16.5-10.el7_9.17 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047008" version="1" comment="libsss_idmap is &lt;1.16.5-10.el7_9.17 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047009" version="1" comment="libsss_idmap-devel is &lt;1.16.5-10.el7_9.17 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047010" version="1" comment="libsss_nss_idmap is &lt;1.16.5-10.el7_9.17 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047011" version="1" comment="libsss_nss_idmap-devel is &lt;1.16.5-10.el7_9.17 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047012" version="1" comment="libsss_simpleifp is &lt;1.16.5-10.el7_9.17 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047013" version="1" comment="libsss_simpleifp-devel is &lt;1.16.5-10.el7_9.17 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047014" version="1" comment="libsss_sudo is &lt;1.16.5-10.el7_9.17 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047015" version="1" comment="python-libipa_hbac is &lt;1.16.5-10.el7_9.17 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047016" version="1" comment="python-libsss_nss_idmap is &lt;1.16.5-10.el7_9.17 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047017" version="1" comment="python-sss is &lt;1.16.5-10.el7_9.17 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047018" version="1" comment="python-sss-murmur is &lt;1.16.5-10.el7_9.17 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047019" version="1" comment="python-sssdconfig is &lt;1.16.5-10.el7_9.17 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047020" version="1" comment="sssd is &lt;1.16.5-10.el7_9.17 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047021" version="1" comment="sssd-ad is &lt;1.16.5-10.el7_9.17 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047022" version="1" comment="sssd-client is &lt;1.16.5-10.el7_9.17 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047023" version="1" comment="sssd-common is &lt;1.16.5-10.el7_9.17 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047024" version="1" comment="sssd-common-pac is &lt;1.16.5-10.el7_9.17 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047025" version="1" comment="sssd-dbus is &lt;1.16.5-10.el7_9.17 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047026" version="1" comment="sssd-ipa is &lt;1.16.5-10.el7_9.17 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047027" version="1" comment="sssd-kcm is &lt;1.16.5-10.el7_9.17 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047028" version="1" comment="sssd-krb5 is &lt;1.16.5-10.el7_9.17 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047029" version="1" comment="sssd-krb5-common is &lt;1.16.5-10.el7_9.17 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047030" version="1" comment="sssd-ldap is &lt;1.16.5-10.el7_9.17 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047031" version="1" comment="sssd-libwbclient is &lt;1.16.5-10.el7_9.17 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047032" version="1" comment="sssd-libwbclient-devel is &lt;1.16.5-10.el7_9.17 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047033" version="1" comment="sssd-polkit-rules is &lt;1.16.5-10.el7_9.17 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047034" version="1" comment="sssd-proxy is &lt;1.16.5-10.el7_9.17 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047035" version="1" comment="sssd-tools is &lt;1.16.5-10.el7_9.17 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047036" version="1" comment="sssd-winbind-idmap is &lt;1.16.5-10.el7_9.17 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040947" version="1" comment="python is &lt;2.7.5-94.el7_9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040948" version="1" comment="python-debug is &lt;2.7.5-94.el7_9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040949" version="1" comment="python-devel is &lt;2.7.5-94.el7_9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040950" version="1" comment="python-libs is &lt;2.7.5-94.el7_9.3.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040951" version="1" comment="python-test is &lt;2.7.5-94.el7_9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040952" version="1" comment="python-tools is &lt;2.7.5-94.el7_9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045089" version="1" comment="python3 is &lt;3.6.8-21.el7_9.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045090" version="1" comment="python3-debug is &lt;3.6.8-21.el7_9.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045091" version="1" comment="python3-devel is &lt;3.6.8-21.el7_9.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045092" version="1" comment="python3-idle is &lt;3.6.8-21.el7_9.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045093" version="1" comment="python3-libs is &lt;3.6.8-21.el7_9.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045094" version="1" comment="python3-test is &lt;3.6.8-21.el7_9.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045095" version="1" comment="python3-tkinter is &lt;3.6.8-21.el7_9.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040953" version="1" comment="tkinter is &lt;2.7.5-94.el7_9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968226" version="1" comment="emacs is &lt;24.3-23.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968227" version="1" comment="emacs-common is &lt;24.3-23.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968228" version="1" comment="emacs-el is &lt;24.3-23.el7_9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968229" version="1" comment="emacs-filesystem is &lt;24.3-23.el7_9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968230" version="1" comment="emacs-nox is &lt;24.3-23.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968231" version="1" comment="emacs-terminal is &lt;24.3-23.el7_9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041693" version="1" comment="glib2 is &lt;2.56.1-11.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041694" version="1" comment="glib2-devel is &lt;2.56.1-11.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041695" version="1" comment="glib2-doc is &lt;2.56.1-11.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041696" version="1" comment="glib2-fam is &lt;2.56.1-11.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041697" version="1" comment="glib2-static is &lt;2.56.1-11.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041698" version="1" comment="glib2-tests is &lt;2.56.1-11.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051492" version="1" comment="python is &lt;2.7.5-94.el7_9.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051493" version="1" comment="python-debug is &lt;2.7.5-94.el7_9.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051494" version="1" comment="python-devel is &lt;2.7.5-94.el7_9.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051495" version="1" comment="python-libs is &lt;2.7.5-94.el7_9.3.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051496" version="1" comment="python-test is &lt;2.7.5-94.el7_9.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051497" version="1" comment="python-tools is &lt;2.7.5-94.el7_9.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052848" version="1" comment="python3 is &lt;3.6.8-21.el7_9.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052849" version="1" comment="python3-debug is &lt;3.6.8-21.el7_9.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052850" version="1" comment="python3-devel is &lt;3.6.8-21.el7_9.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052851" version="1" comment="python3-idle is &lt;3.6.8-21.el7_9.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052852" version="1" comment="python3-libs is &lt;3.6.8-21.el7_9.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052853" version="1" comment="python3-test is &lt;3.6.8-21.el7_9.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052854" version="1" comment="python3-tkinter is &lt;3.6.8-21.el7_9.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051498" version="1" comment="tkinter is &lt;2.7.5-94.el7_9.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977524" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.452.b09-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977525" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.452.b09-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977526" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.452.b09-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977527" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.452.b09-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977528" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.452.b09-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977529" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.452.b09-1.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977530" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.452.b09-1.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977531" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.452.b09-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999548" version="1" comment="java-11-openjdk is &lt;11.0.27.0.6-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999549" version="1" comment="java-11-openjdk-debug is &lt;11.0.27.0.6-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999550" version="1" comment="java-11-openjdk-demo is &lt;11.0.27.0.6-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999551" version="1" comment="java-11-openjdk-demo-debug is &lt;11.0.27.0.6-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999554" version="1" comment="java-11-openjdk-devel is &lt;11.0.27.0.6-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999555" version="1" comment="java-11-openjdk-devel-debug is &lt;11.0.27.0.6-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999559" version="1" comment="java-11-openjdk-headless is &lt;11.0.27.0.6-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999560" version="1" comment="java-11-openjdk-headless-debug is &lt;11.0.27.0.6-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999563" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.27.0.6-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999564" version="1" comment="java-11-openjdk-javadoc-debug is &lt;11.0.27.0.6-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999565" version="1" comment="java-11-openjdk-javadoc-zip is &lt;11.0.27.0.6-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999566" version="1" comment="java-11-openjdk-javadoc-zip-debug is &lt;11.0.27.0.6-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999567" version="1" comment="java-11-openjdk-jmods is &lt;11.0.27.0.6-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999568" version="1" comment="java-11-openjdk-jmods-debug is &lt;11.0.27.0.6-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999572" version="1" comment="java-11-openjdk-src is &lt;11.0.27.0.6-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999573" version="1" comment="java-11-openjdk-src-debug is &lt;11.0.27.0.6-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999576" version="1" comment="java-11-openjdk-static-libs is &lt;11.0.27.0.6-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999577" version="1" comment="java-11-openjdk-static-libs-debug is &lt;11.0.27.0.6-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018027" version="1" comment="kernel-livepatch-6_4_0-150600_23_30-default is &gt;=11-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017978" version="1" comment="kernel-livepatch-6_4_0-150600_23_33-default is &gt;=11-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017979" version="1" comment="kernel-livepatch-6_4_0-150600_23_38-default is &gt;=6-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018028" version="1" comment="kernel-livepatch-6_4_0-150600_23_42-default is &gt;=6-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018016" version="1" comment="kernel-livepatch-6_4_0-150700_51-default is &gt;=3-150700.3.6.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014748" version="1" comment="kernel-default is &lt;6.4.0-150700.51.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020710" version="1" comment="kernel-livepatch-6_4_0-150600_23_33-default is &gt;=13-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020711" version="1" comment="kernel-livepatch-6_4_0-150600_23_38-default is &gt;=8-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020712" version="1" comment="kernel-default is &lt;6.4.0-150600.23.38.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017864" version="1" comment="kernel-livepatch-5_14_21-150500_55_100-default is &gt;=5-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017865" version="1" comment="kernel-livepatch-5_14_21-150500_55_103-default is &gt;=5-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017866" version="1" comment="kernel-livepatch-5_14_21-150500_55_110-default is &gt;=4-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017867" version="1" comment="kernel-livepatch-5_14_21-150500_55_113-default is &gt;=4-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019706" version="1" comment="kernel-livepatch-5_14_21-150500_55_116-default is &gt;=3-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011970" version="1" comment="kgraft-patch-4_12_14-122_244-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011971" version="1" comment="kgraft-patch-4_12_14-122_247-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011828" version="1" comment="kgraft-patch-4_12_14-122_250-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011972" version="1" comment="kgraft-patch-4_12_14-122_255-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011974" version="1" comment="kgraft-patch-4_12_14-122_258-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011976" version="1" comment="kernel-livepatch-5_3_18-150300_59_195-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011977" version="1" comment="kernel-livepatch-5_3_18-150300_59_198-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011978" version="1" comment="kernel-livepatch-5_3_18-150300_59_201-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011829" version="1" comment="kernel-livepatch-5_3_18-150300_59_204-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012376" version="1" comment="kernel-livepatch-5_3_18-150300_59_207-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011980" version="1" comment="kernel-livepatch-5_14_21-150500_55_100-default is &gt;=3-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011982" version="1" comment="kernel-livepatch-5_14_21-150500_55_103-default is &gt;=3-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011984" version="1" comment="kernel-livepatch-5_14_21-150500_55_110-default is &gt;=2-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011985" version="1" comment="kernel-livepatch-5_14_21-150500_55_94-default is &gt;=4-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011986" version="1" comment="kernel-livepatch-5_14_21-150500_55_97-default is &gt;=4-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011987" version="1" comment="kernel-livepatch-6_4_0-150600_23_38-default is &gt;=4-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012360" version="1" comment="kernel-livepatch-6_4_0-150600_23_42-default is &gt;=4-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012378" version="1" comment="kernel-livepatch-6_4_0-150600_23_47-default is &gt;=3-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012362" version="1" comment="kernel-livepatch-6_4_0-150600_23_50-default is &gt;=2-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014265" version="1" comment="kernel-livepatch-6_4_0-150700_5-rt is &gt;=2-150700.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014747" version="1" comment="kernel-livepatch-6_4_0-150700_51-default is &gt;=2-150700.3.3.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050318" version="1" comment="kgraft-patch-4_12_14-122_293-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050990" version="1" comment="kernel-default is ==5.14.21-150500.55.136.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050991" version="1" comment="kernel-livepatch-5_14_21-150500_55_136-default is &gt;=2-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019707" version="1" comment="kernel-livepatch-5_14_21-150500_55_100-default is &gt;=6-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019708" version="1" comment="kernel-livepatch-5_14_21-150500_55_103-default is &gt;=6-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019709" version="1" comment="kernel-livepatch-5_14_21-150500_55_110-default is &gt;=5-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019710" version="1" comment="kernel-livepatch-5_14_21-150500_55_83-default is &gt;=15-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019711" version="1" comment="kernel-livepatch-5_14_21-150500_55_88-default is &gt;=11-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019712" version="1" comment="kernel-livepatch-5_14_21-150500_55_91-default is &gt;=11-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019713" version="1" comment="kernel-livepatch-5_14_21-150500_55_94-default is &gt;=7-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019714" version="1" comment="kernel-livepatch-5_14_21-150500_55_97-default is &gt;=7-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019744" version="1" comment="kernel-livepatch-6_4_0-150600_23_25-default is &gt;=16-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019745" version="1" comment="kernel-livepatch-6_4_0-150600_23_30-default is &gt;=12-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019715" version="1" comment="kernel-livepatch-6_4_0-150600_23_33-default is &gt;=12-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008704" version="1" comment="kernel-livepatch-5_14_21-150500_55_94-default is &gt;=3-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008811" version="1" comment="kernel-livepatch-5_14_21-150500_55_97-default is &gt;=3-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008812" version="1" comment="kernel-livepatch-6_4_0-150600_23_38-default is &gt;=3-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008813" version="1" comment="kernel-livepatch-6_4_0-150600_23_42-default is &gt;=3-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008809" version="1" comment="kernel-default is &lt;5.3.18-150300.59.201.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020743" version="1" comment="kernel-default is &lt;5.14.21-150400.24.161.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020713" version="1" comment="kernel-livepatch-6_4_0-150600_23_42-default is &gt;=8-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020714" version="1" comment="kernel-default is &lt;6.4.0-150600.23.42.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014541" version="1" comment="kernel-default is &lt;4.12.14-122.261.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022285" version="1" comment="kernel-livepatch-5_3_18-150300_59_182-default is &gt;=16-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022334" version="1" comment="kernel-livepatch-5_3_18-150300_59_185-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022310" version="1" comment="kernel-livepatch-5_3_18-150300_59_188-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022311" version="1" comment="kernel-livepatch-5_3_18-150300_59_195-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022286" version="1" comment="kernel-livepatch-5_3_18-150300_59_198-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022287" version="1" comment="kernel-livepatch-5_3_18-150300_59_201-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022288" version="1" comment="kernel-livepatch-5_3_18-150300_59_204-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022289" version="1" comment="kernel-livepatch-5_3_18-150300_59_207-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022312" version="1" comment="kernel-livepatch-5_3_18-150300_59_211-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022290" version="1" comment="kernel-livepatch-5_3_18-150300_59_215-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019757" version="1" comment="kernel-default is &lt;5.3.18-150300.59.215.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022613" version="1" comment="kernel-livepatch-5_14_21-150400_24_141-default is &gt;=16-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022335" version="1" comment="kernel-livepatch-5_14_21-150400_24_144-default is &gt;=15-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022614" version="1" comment="kernel-livepatch-5_14_21-150400_24_147-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022803" version="1" comment="kernel-livepatch-5_14_21-150400_24_150-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022336" version="1" comment="kernel-livepatch-5_14_21-150400_24_153-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022804" version="1" comment="kernel-livepatch-5_14_21-150400_24_158-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022805" version="1" comment="kernel-livepatch-5_14_21-150400_24_161-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022615" version="1" comment="kernel-livepatch-5_14_21-150400_24_164-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022806" version="1" comment="kernel-livepatch-5_14_21-150400_24_167-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022616" version="1" comment="kernel-livepatch-5_14_21-150400_24_170-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022807" version="1" comment="kernel-livepatch-5_14_21-150500_55_100-default is &gt;=8-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022808" version="1" comment="kernel-livepatch-5_14_21-150500_55_103-default is &gt;=8-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022809" version="1" comment="kernel-livepatch-5_14_21-150500_55_110-default is &gt;=7-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022810" version="1" comment="kernel-livepatch-5_14_21-150500_55_113-default is &gt;=7-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023025" version="1" comment="kernel-livepatch-5_14_21-150500_55_116-default is &gt;=5-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022811" version="1" comment="kernel-livepatch-5_14_21-150500_55_88-default is &gt;=13-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022812" version="1" comment="kernel-livepatch-5_14_21-150500_55_91-default is &gt;=13-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022813" version="1" comment="kernel-livepatch-5_14_21-150500_55_94-default is &gt;=9-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022814" version="1" comment="kernel-livepatch-5_14_21-150500_55_97-default is &gt;=9-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023026" version="1" comment="kernel-livepatch-6_4_0-150600_23_30-default is &gt;=14-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023027" version="1" comment="kernel-livepatch-6_4_0-150600_23_33-default is &gt;=14-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023028" version="1" comment="kernel-livepatch-6_4_0-150600_23_38-default is &gt;=9-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023339" version="1" comment="kernel-livepatch-6_4_0-150600_23_42-default is &gt;=9-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023029" version="1" comment="kernel-livepatch-6_4_0-150700_51-default is &gt;=6-150700.3.15.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017412" version="1" comment="kernel-livepatch-5_3_18-150300_59_201-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017413" version="1" comment="kernel-livepatch-5_3_18-150300_59_204-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017676" version="1" comment="kernel-livepatch-5_14_21-150400_24_161-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017677" version="1" comment="kernel-livepatch-5_14_21-150400_24_164-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017980" version="1" comment="kernel-livepatch-6_4_0-150600_23_47-default is &gt;=5-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020715" version="1" comment="kernel-livepatch-6_4_0-150700_51-default is &gt;=5-150700.3.12.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010061" version="1" comment="kernel-livepatch-6_4_0-150600_23_47-default is &gt;=2-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031473" version="1" comment="kernel-livepatch-6_4_0-150600_23_33-default is &gt;=16-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031474" version="1" comment="kernel-livepatch-6_4_0-150600_23_38-default is &gt;=11-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031475" version="1" comment="kernel-livepatch-6_4_0-150600_23_42-default is &gt;=11-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031476" version="1" comment="kernel-livepatch-6_4_0-150600_23_47-default is &gt;=10-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019719" version="1" comment="kernel-default is &lt;6.4.0-150600.23.47.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030638" version="1" comment="kernel-livepatch-6_4_0-150700_5-rt is &gt;=8-150700.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031906" version="1" comment="kernel-livepatch-6_4_0-150700_51-default is &gt;=8-150700.3.21.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963881" version="1" comment="krb5-devel is &lt;1.15.1-55.el7_9.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963882" version="1" comment="krb5-libs is &lt;1.15.1-55.el7_9.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963883" version="1" comment="krb5-pkinit is &lt;1.15.1-55.el7_9.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963884" version="1" comment="krb5-server is &lt;1.15.1-55.el7_9.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963885" version="1" comment="krb5-server-ldap is &lt;1.15.1-55.el7_9.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963886" version="1" comment="krb5-workstation is &lt;1.15.1-55.el7_9.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963887" version="1" comment="libkadm5 is &lt;1.15.1-55.el7_9.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974858" version="1" comment="libxslt is &lt;1.1.28-8.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974859" version="1" comment="libxslt-devel is &lt;1.1.28-8.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974860" version="1" comment="libxslt-python is &lt;1.1.28-8.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968232" version="1" comment="tigervnc is &lt;1.8.0-36.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968233" version="1" comment="tigervnc-icons is &lt;1.8.0-36.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968234" version="1" comment="tigervnc-license is &lt;1.8.0-36.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968235" version="1" comment="tigervnc-server is &lt;1.8.0-36.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968236" version="1" comment="tigervnc-server-applet is &lt;1.8.0-36.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968237" version="1" comment="tigervnc-server-minimal is &lt;1.8.0-36.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968238" version="1" comment="tigervnc-server-module is &lt;1.8.0-36.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968239" version="1" comment="xorg-x11-server-Xdmx is &lt;1.20.4-30.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968240" version="1" comment="xorg-x11-server-Xephyr is &lt;1.20.4-30.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968241" version="1" comment="xorg-x11-server-Xnest is &lt;1.20.4-30.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968242" version="1" comment="xorg-x11-server-Xorg is &lt;1.20.4-30.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968243" version="1" comment="xorg-x11-server-Xvfb is &lt;1.20.4-30.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968244" version="1" comment="xorg-x11-server-Xwayland is &lt;1.20.4-30.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968245" version="1" comment="xorg-x11-server-common is &lt;1.20.4-30.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968246" version="1" comment="xorg-x11-server-devel is &lt;1.20.4-30.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968247" version="1" comment="xorg-x11-server-source is &lt;1.20.4-30.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975550" version="1" comment="freetype is &lt;2.8-15.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975551" version="1" comment="freetype-demos is &lt;2.8-15.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975552" version="1" comment="freetype-devel is &lt;2.8-15.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998908" version="1" comment="libsoup is &lt;2.62.2-6.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998909" version="1" comment="libsoup-devel is &lt;2.62.2-6.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010142" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.462.b08-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010143" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.462.b08-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010144" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.462.b08-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010145" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.462.b08-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010146" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.462.b08-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010147" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.462.b08-1.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010148" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.462.b08-1.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010149" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.462.b08-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011165" version="1" comment="java-11-openjdk is &lt;11.0.28.0.6-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011166" version="1" comment="java-11-openjdk-debug is &lt;11.0.28.0.6-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011167" version="1" comment="java-11-openjdk-demo is &lt;11.0.28.0.6-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011168" version="1" comment="java-11-openjdk-demo-debug is &lt;11.0.28.0.6-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011171" version="1" comment="java-11-openjdk-devel is &lt;11.0.28.0.6-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011172" version="1" comment="java-11-openjdk-devel-debug is &lt;11.0.28.0.6-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011176" version="1" comment="java-11-openjdk-headless is &lt;11.0.28.0.6-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011177" version="1" comment="java-11-openjdk-headless-debug is &lt;11.0.28.0.6-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011180" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.28.0.6-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011181" version="1" comment="java-11-openjdk-javadoc-debug is &lt;11.0.28.0.6-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011182" version="1" comment="java-11-openjdk-javadoc-zip is &lt;11.0.28.0.6-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011183" version="1" comment="java-11-openjdk-javadoc-zip-debug is &lt;11.0.28.0.6-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011184" version="1" comment="java-11-openjdk-jmods is &lt;11.0.28.0.6-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011185" version="1" comment="java-11-openjdk-jmods-debug is &lt;11.0.28.0.6-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011189" version="1" comment="java-11-openjdk-src is &lt;11.0.28.0.6-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011190" version="1" comment="java-11-openjdk-src-debug is &lt;11.0.28.0.6-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011193" version="1" comment="java-11-openjdk-static-libs is &lt;11.0.28.0.6-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011194" version="1" comment="java-11-openjdk-static-libs-debug is &lt;11.0.28.0.6-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011938" version="1" comment="libxml2 is &lt;2.9.1-6.el7_9.10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011939" version="1" comment="libxml2-devel is &lt;2.9.1-6.el7_9.10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011940" version="1" comment="libxml2-python is &lt;2.9.1-6.el7_9.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011941" version="1" comment="libxml2-static is &lt;2.9.1-6.el7_9.10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018317" version="1" comment="libxml2 is &lt;2.9.1-6.el7_9.13 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018318" version="1" comment="libxml2-devel is &lt;2.9.1-6.el7_9.13 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018319" version="1" comment="libxml2-python is &lt;2.9.1-6.el7_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018320" version="1" comment="libxml2-static is &lt;2.9.1-6.el7_9.13 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006275" version="1" comment="sudo is &lt;1.8.23-10.el7_9.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006276" version="1" comment="sudo-devel is &lt;1.8.23-10.el7_9.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012364" version="1" comment="kernel-livepatch-6_4_0-150600_23_53-default is &gt;=2-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014750" version="1" comment="kernel-livepatch-6_4_0-150700_53_3-default is &gt;=2-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014751" version="1" comment="kernel-default is &lt;6.4.0-150700.53.3.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012380" version="1" comment="kernel-livepatch-5_3_18-150300_59_211-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011989" version="1" comment="kernel-livepatch-5_14_21-150500_55_113-default is &gt;=2-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017414" version="1" comment="kernel-livepatch-5_3_18-150300_59_207-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017678" version="1" comment="kernel-livepatch-5_14_21-150400_24_167-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017233" version="1" comment="kernel-livepatch-6_4_0-150700_5-rt is &gt;=3-150700.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017415" version="1" comment="kgraft-patch-4_12_14-122_255-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017416" version="1" comment="kgraft-patch-4_12_14-122_258-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017417" version="1" comment="kgraft-patch-4_12_14-122_261-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018029" version="1" comment="kernel-livepatch-6_4_0-150600_23_50-default is &gt;=4-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017981" version="1" comment="kernel-livepatch-6_4_0-150600_23_53-default is &gt;=4-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018030" version="1" comment="kernel-livepatch-6_4_0-150700_53_3-default is &gt;=3-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014215" version="1" comment="kgraft-patch-4_12_14-122_222-default is &gt;=16-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014267" version="1" comment="kgraft-patch-4_12_14-122_225-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014518" version="1" comment="kgraft-patch-4_12_14-122_228-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014268" version="1" comment="kgraft-patch-4_12_14-122_234-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014269" version="1" comment="kgraft-patch-4_12_14-122_237-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014217" version="1" comment="kgraft-patch-4_12_14-122_244-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014218" version="1" comment="kgraft-patch-4_12_14-122_247-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014219" version="1" comment="kgraft-patch-4_12_14-122_250-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014220" version="1" comment="kgraft-patch-4_12_14-122_255-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014221" version="1" comment="kgraft-patch-4_12_14-122_258-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014520" version="1" comment="kgraft-patch-4_12_14-122_261-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014522" version="1" comment="kgraft-patch-4_12_14-122_266-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014523" version="1" comment="kernel-default is &lt;4.12.14-122.266.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014673" version="1" comment="kernel-livepatch-5_3_18-150300_59_211-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014753" version="1" comment="kernel-livepatch-5_14_21-150400_24_170-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014524" version="1" comment="kernel-livepatch-5_14_21-150500_55_100-default is &gt;=4-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014525" version="1" comment="kernel-livepatch-5_14_21-150500_55_103-default is &gt;=4-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014526" version="1" comment="kernel-livepatch-5_14_21-150500_55_110-default is &gt;=3-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014527" version="1" comment="kernel-livepatch-5_14_21-150500_55_113-default is &gt;=3-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014528" version="1" comment="kernel-livepatch-5_14_21-150500_55_73-default is &gt;=15-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014529" version="1" comment="kernel-livepatch-5_14_21-150500_55_80-default is &gt;=13-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014530" version="1" comment="kernel-livepatch-5_14_21-150500_55_83-default is &gt;=13-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014531" version="1" comment="kernel-livepatch-5_14_21-150500_55_88-default is &gt;=9-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014532" version="1" comment="kernel-livepatch-5_14_21-150500_55_91-default is &gt;=9-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014533" version="1" comment="kernel-livepatch-5_14_21-150500_55_94-default is &gt;=5-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014534" version="1" comment="kernel-livepatch-5_14_21-150500_55_97-default is &gt;=5-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014535" version="1" comment="kernel-livepatch-6_4_0-150600_23_14-default is &gt;=19-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014536" version="1" comment="kernel-livepatch-6_4_0-150600_23_17-default is &gt;=19-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014537" version="1" comment="kernel-livepatch-6_4_0-150600_23_22-default is &gt;=15-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014538" version="1" comment="kernel-livepatch-6_4_0-150600_23_25-default is &gt;=14-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014755" version="1" comment="kernel-livepatch-6_4_0-150600_23_30-default is &gt;=10-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014539" version="1" comment="kernel-livepatch-6_4_0-150600_23_33-default is &gt;=10-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014540" version="1" comment="kernel-livepatch-6_4_0-150600_23_38-default is &gt;=5-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014674" version="1" comment="kernel-livepatch-6_4_0-150600_23_42-default is &gt;=5-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014675" version="1" comment="kernel-livepatch-6_4_0-150600_23_47-default is &gt;=4-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014676" version="1" comment="kernel-livepatch-6_4_0-150600_23_50-default is &gt;=3-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017107" version="1" comment="bpftool is &lt;3.10.0-1160.138.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017108" version="1" comment="kernel is &lt;3.10.0-1160.138.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017109" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1160.138.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017110" version="1" comment="kernel-debug is &lt;3.10.0-1160.138.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017113" version="1" comment="kernel-doc is &lt;3.10.0-1160.138.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017114" version="1" comment="kernel-headers is &lt;3.10.0-1160.138.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017115" version="1" comment="kernel-tools is &lt;3.10.0-1160.138.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017116" version="1" comment="kernel-tools-libs is &lt;3.10.0-1160.138.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017118" version="1" comment="perf is &lt;3.10.0-1160.138.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017119" version="1" comment="python-perf is &lt;3.10.0-1160.138.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014756" version="1" comment="kernel-livepatch-6_4_0-150600_23_53-default is &gt;=3-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020716" version="1" comment="kernel-livepatch-6_4_0-150600_23_47-default is &gt;=7-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020717" version="1" comment="kernel-livepatch-6_4_0-150600_23_50-default is &gt;=6-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020718" version="1" comment="kernel-livepatch-6_4_0-150600_23_53-default is &gt;=6-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019749" version="1" comment="kernel-default is &lt;6.4.0-150600.23.53.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020207" version="1" comment="kernel-livepatch-6_4_0-150700_5-rt is &gt;=5-150700.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020719" version="1" comment="kernel-livepatch-6_4_0-150700_53_3-default is &gt;=5-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019746" version="1" comment="kernel-livepatch-6_4_0-150600_23_38-default is &gt;=7-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019717" version="1" comment="kernel-livepatch-6_4_0-150600_23_42-default is &gt;=7-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019718" version="1" comment="kernel-livepatch-6_4_0-150600_23_47-default is &gt;=6-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019747" version="1" comment="kernel-livepatch-6_4_0-150600_23_50-default is &gt;=5-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019748" version="1" comment="kernel-livepatch-6_4_0-150600_23_53-default is &gt;=5-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018809" version="1" comment="kernel-livepatch-6_4_0-150700_5-rt is &gt;=4-150700.3.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019750" version="1" comment="kernel-livepatch-6_4_0-150700_51-default is &gt;=4-150700.3.9.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019751" version="1" comment="kernel-livepatch-6_4_0-150700_53_3-default is &gt;=4-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023030" version="1" comment="kernel-livepatch-6_4_0-150600_23_47-default is &gt;=8-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023031" version="1" comment="kernel-livepatch-6_4_0-150600_23_50-default is &gt;=7-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023032" version="1" comment="kernel-livepatch-6_4_0-150600_23_53-default is &gt;=7-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022250" version="1" comment="kernel-livepatch-6_4_0-150700_5-rt is &gt;=6-150700.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023340" version="1" comment="kernel-livepatch-6_4_0-150700_53_3-default is &gt;=6-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043987" version="1" comment="kernel-livepatch-6_4_0-150600_23_33-default is &gt;=18-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044018" version="1" comment="kernel-livepatch-6_4_0-150600_23_38-default is &gt;=13-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043988" version="1" comment="kernel-livepatch-6_4_0-150600_23_42-default is &gt;=13-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044019" version="1" comment="kernel-livepatch-6_4_0-150600_23_47-default is &gt;=12-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043989" version="1" comment="kernel-livepatch-6_4_0-150600_23_50-default is &gt;=11-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044020" version="1" comment="kernel-livepatch-6_4_0-150600_23_53-default is &gt;=11-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043649" version="1" comment="kernel-livepatch-6_4_0-150700_5-rt is &gt;=10-150700.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044021" version="1" comment="kernel-livepatch-6_4_0-150700_51-default is &gt;=10-150700.3.27.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044022" version="1" comment="kernel-livepatch-6_4_0-150700_53_3-default is &gt;=10-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046340" version="1" comment="kernel-livepatch-6_4_0-150600_23_38-default is &gt;=14-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046341" version="1" comment="kernel-livepatch-6_4_0-150600_23_42-default is &gt;=14-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046294" version="1" comment="kernel-livepatch-6_4_0-150600_23_47-default is &gt;=13-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046342" version="1" comment="kernel-livepatch-6_4_0-150600_23_50-default is &gt;=12-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046343" version="1" comment="kernel-livepatch-6_4_0-150600_23_53-default is &gt;=12-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045281" version="1" comment="kernel-livepatch-6_4_0-150700_5-rt is &gt;=11-150700.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046344" version="1" comment="kernel-livepatch-6_4_0-150700_51-default is &gt;=11-150700.3.30.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046345" version="1" comment="kernel-livepatch-6_4_0-150700_53_3-default is &gt;=11-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050992" version="1" comment="kernel-livepatch-6_4_0-150600_23_42-default is &gt;=15-150600.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050993" version="1" comment="kernel-livepatch-6_4_0-150600_23_47-default is &gt;=14-150600.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050994" version="1" comment="kernel-livepatch-6_4_0-150600_23_50-default is &gt;=13-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051499" version="1" comment="kernel-livepatch-6_4_0-150600_23_53-default is &gt;=13-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049627" version="1" comment="kernel-livepatch-6_4_0-150700_5-rt is &gt;=12-150700.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051500" version="1" comment="kernel-livepatch-6_4_0-150700_51-default is &gt;=12-150700.3.33.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050995" version="1" comment="kernel-livepatch-6_4_0-150700_53_3-default is &gt;=12-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019244" version="1" comment="kgraft-patch-4_12_14-122_234-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019245" version="1" comment="kgraft-patch-4_12_14-122_237-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019246" version="1" comment="kgraft-patch-4_12_14-122_244-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019247" version="1" comment="kgraft-patch-4_12_14-122_247-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019248" version="1" comment="kgraft-patch-4_12_14-122_250-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019249" version="1" comment="kgraft-patch-4_12_14-122_255-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019250" version="1" comment="kgraft-patch-4_12_14-122_258-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019408" version="1" comment="kernel-livepatch-5_3_18-150300_59_182-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019409" version="1" comment="kernel-livepatch-5_3_18-150300_59_185-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019460" version="1" comment="kernel-livepatch-5_3_18-150300_59_188-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019410" version="1" comment="kernel-livepatch-5_3_18-150300_59_195-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019752" version="1" comment="kernel-livepatch-5_3_18-150300_59_198-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019753" version="1" comment="kernel-livepatch-5_3_18-150300_59_201-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019461" version="1" comment="kernel-livepatch-5_3_18-150300_59_204-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019462" version="1" comment="kernel-livepatch-5_3_18-150300_59_207-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019754" version="1" comment="kernel-default is &lt;6.4.0-150600.23.50.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019251" version="1" comment="kgraft-patch-4_12_14-122_261-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019411" version="1" comment="kgraft-patch-4_12_14-122_266-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019463" version="1" comment="kernel-livepatch-5_3_18-150300_59_211-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019464" version="1" comment="kernel-livepatch-5_14_21-150400_24_170-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019720" version="1" comment="kernel-livepatch-5_14_21-150500_55_113-default is &gt;=5-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023033" version="1" comment="kernel-livepatch-6_4_0-150600_23_60-default is &gt;=6-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019759" version="1" comment="kernel-default is &lt;6.4.0-150600.23.60.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023341" version="1" comment="kernel-livepatch-6_4_0-150700_53_6-default is &gt;=6-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017418" version="1" comment="kgraft-patch-4_12_14-122_266-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017419" version="1" comment="kernel-livepatch-5_3_18-150300_59_211-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017679" version="1" comment="kernel-livepatch-5_14_21-150400_24_170-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017982" version="1" comment="kernel-livepatch-6_4_0-150600_23_60-default is &gt;=3-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018031" version="1" comment="kernel-livepatch-6_4_0-150700_53_6-default is &gt;=3-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017846" version="1" comment="bpftool is &lt;3.10.0-1160.139.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017847" version="1" comment="kernel is &lt;3.10.0-1160.139.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017848" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1160.139.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017849" version="1" comment="kernel-debug is &lt;3.10.0-1160.139.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017852" version="1" comment="kernel-doc is &lt;3.10.0-1160.139.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017853" version="1" comment="kernel-headers is &lt;3.10.0-1160.139.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017854" version="1" comment="kernel-tools is &lt;3.10.0-1160.139.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017855" version="1" comment="kernel-tools-libs is &lt;3.10.0-1160.139.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017857" version="1" comment="perf is &lt;3.10.0-1160.139.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017858" version="1" comment="python-perf is &lt;3.10.0-1160.139.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019467" version="1" comment="kernel-default is &lt;4.12.14-122.269.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043990" version="1" comment="kernel-livepatch-6_4_0-150600_23_60-default is &gt;=10-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044023" version="1" comment="kernel-livepatch-6_4_0-150700_53_6-default is &gt;=10-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024448" version="1" comment="kernel-livepatch-6_4_0-150700_5-rt is &gt;=7-150700.5.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025537" version="1" comment="kernel-livepatch-6_4_0-150700_51-default is &gt;=7-150700.3.18.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025167" version="1" comment="kernel-livepatch-6_4_0-150700_53_3-default is &gt;=7-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025111" version="1" comment="kernel-livepatch-6_4_0-150700_53_6-default is &gt;=7-150700.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020311" version="1" comment="kgraft-patch-4_12_14-122_261-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020208" version="1" comment="kgraft-patch-4_12_14-122_266-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020744" version="1" comment="kernel-livepatch-5_3_18-150300_59_207-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020745" version="1" comment="kernel-livepatch-5_3_18-150300_59_211-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020746" version="1" comment="kernel-livepatch-5_3_18-150300_59_215-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020682" version="1" comment="kernel-livepatch-5_14_21-150400_24_167-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020683" version="1" comment="kernel-livepatch-5_14_21-150400_24_170-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020720" version="1" comment="kernel-livepatch-5_14_21-150500_55_110-default is &gt;=6-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020684" version="1" comment="kernel-livepatch-5_14_21-150500_55_113-default is &gt;=6-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020685" version="1" comment="kernel-livepatch-5_14_21-150500_55_116-default is &gt;=4-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020721" version="1" comment="kernel-livepatch-6_4_0-150600_23_60-default is &gt;=5-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020722" version="1" comment="kernel-livepatch-6_4_0-150700_53_6-default is &gt;=5-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050996" version="1" comment="kernel-livepatch-6_4_0-150600_23_60-default is &gt;=11-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050997" version="1" comment="kernel-livepatch-6_4_0-150600_23_65-default is &gt;=7-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050998" version="1" comment="kernel-livepatch-6_4_0-150600_23_70-default is &gt;=7-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023350" version="1" comment="kernel-default is &lt;6.4.0-150600.23.70.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051501" version="1" comment="kernel-livepatch-6_4_0-150700_53_11-default is &gt;=7-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051502" version="1" comment="kernel-livepatch-6_4_0-150700_53_16-default is &gt;=7-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051503" version="1" comment="kernel-livepatch-6_4_0-150700_53_6-default is &gt;=11-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014543" version="1" comment="kernel-livepatch-5_14_21-150500_55_116-default is &gt;=2-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014545" version="1" comment="kernel-livepatch-6_4_0-150600_23_60-default is &gt;=2-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014758" version="1" comment="kernel-livepatch-6_4_0-150700_53_6-default is &gt;=2-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019466" version="1" comment="kgraft-patch-4_12_14-122_269-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019756" version="1" comment="kernel-livepatch-5_3_18-150300_59_215-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019722" version="1" comment="kernel-livepatch-5_14_21-150400_24_173-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019758" version="1" comment="kernel-livepatch-6_4_0-150600_23_60-default is &gt;=4-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019760" version="1" comment="kernel-livepatch-6_4_0-150700_53_6-default is &gt;=4-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022815" version="1" comment="kernel-livepatch-5_14_21-150400_24_173-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023343" version="1" comment="kernel-livepatch-6_4_0-150600_23_65-default is &gt;=2-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023344" version="1" comment="kernel-default is &lt;6.4.0-150600.23.65.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023035" version="1" comment="kernel-livepatch-6_4_0-150700_53_11-default is &gt;=2-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031658" version="1" comment="kernel-livepatch-6_4_0-150600_23_50-default is &gt;=9-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031477" version="1" comment="kernel-livepatch-6_4_0-150600_23_53-default is &gt;=9-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031478" version="1" comment="kernel-livepatch-6_4_0-150600_23_60-default is &gt;=8-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031479" version="1" comment="kernel-livepatch-6_4_0-150600_23_65-default is &gt;=4-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031907" version="1" comment="kernel-livepatch-6_4_0-150700_53_11-default is &gt;=4-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031908" version="1" comment="kernel-livepatch-6_4_0-150700_53_3-default is &gt;=8-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031909" version="1" comment="kernel-livepatch-6_4_0-150700_53_6-default is &gt;=8-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031659" version="1" comment="kernel-livepatch-6_4_0-150600_23_70-default is &gt;=4-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031910" version="1" comment="kernel-livepatch-6_4_0-150700_53_16-default is &gt;=4-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024670" version="1" comment="kernel-livepatch-6_4_0-150600_23_38-default is &gt;=10-150600.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024671" version="1" comment="kernel-livepatch-6_4_0-150600_23_42-default is &gt;=10-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024672" version="1" comment="kernel-livepatch-6_4_0-150600_23_47-default is &gt;=9-150600.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024673" version="1" comment="kernel-livepatch-6_4_0-150600_23_50-default is &gt;=8-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024674" version="1" comment="kernel-livepatch-6_4_0-150600_23_53-default is &gt;=8-150600.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024675" version="1" comment="kernel-livepatch-6_4_0-150600_23_60-default is &gt;=7-150600.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025538" version="1" comment="kernel-livepatch-6_4_0-150600_23_65-default is &gt;=3-150600.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025112" version="1" comment="kernel-livepatch-6_4_0-150700_53_11-default is &gt;=3-150700.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024676" version="1" comment="kernel-livepatch-6_4_0-150600_23_70-default is &gt;=3-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025113" version="1" comment="kernel-livepatch-6_4_0-150700_53_16-default is &gt;=3-150700.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023346" version="1" comment="kernel-livepatch-5_14_21-150400_24_176-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023038" version="1" comment="kernel-livepatch-5_14_21-150500_55_121-default is &gt;=2-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023349" version="1" comment="kernel-livepatch-6_4_0-150600_23_70-default is &gt;=2-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023040" version="1" comment="kernel-livepatch-6_4_0-150700_53_16-default is &gt;=2-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043991" version="1" comment="kernel-livepatch-5_14_21-150400_24_179-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043992" version="1" comment="kernel-livepatch-5_14_21-150500_55_124-default is &gt;=4-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044024" version="1" comment="kernel-livepatch-6_4_0-150600_23_65-default is &gt;=6-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044025" version="1" comment="kernel-livepatch-6_4_0-150700_53_11-default is &gt;=6-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042403" version="1" comment="bpftool is &lt;3.10.0-1160.146.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042404" version="1" comment="kernel is &lt;3.10.0-1160.146.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042405" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1160.146.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042406" version="1" comment="kernel-debug is &lt;3.10.0-1160.146.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042409" version="1" comment="kernel-doc is &lt;3.10.0-1160.146.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042410" version="1" comment="kernel-headers is &lt;3.10.0-1160.146.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042411" version="1" comment="kernel-tools is &lt;3.10.0-1160.146.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042412" version="1" comment="kernel-tools-libs is &lt;3.10.0-1160.146.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042414" version="1" comment="perf is &lt;3.10.0-1160.146.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042415" version="1" comment="python-perf is &lt;3.10.0-1160.146.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056187" version="1" comment="kernel-livepatch-5_14_21-150400_24_153-default is &gt;=17-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056188" version="1" comment="kernel-livepatch-5_14_21-150400_24_158-default is &gt;=16-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056189" version="1" comment="kernel-livepatch-5_14_21-150400_24_161-default is &gt;=16-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053078" version="1" comment="kernel-livepatch-5_14_21-150400_24_164-default is &gt;=16-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056190" version="1" comment="kernel-livepatch-5_14_21-150400_24_167-default is &gt;=15-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056289" version="1" comment="kernel-livepatch-5_14_21-150400_24_170-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053244" version="1" comment="kernel-livepatch-5_14_21-150400_24_173-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053079" version="1" comment="kernel-livepatch-5_14_21-150400_24_176-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053245" version="1" comment="kernel-livepatch-5_14_21-150400_24_179-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056191" version="1" comment="kernel-livepatch-5_14_21-150500_55_100-default is &gt;=16-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053498" version="1" comment="kernel-livepatch-5_14_21-150500_55_103-default is &gt;=16-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053499" version="1" comment="kernel-livepatch-5_14_21-150500_55_110-default is &gt;=15-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053500" version="1" comment="kernel-livepatch-5_14_21-150500_55_113-default is &gt;=14-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053501" version="1" comment="kernel-livepatch-5_14_21-150500_55_116-default is &gt;=12-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053080" version="1" comment="kernel-livepatch-5_14_21-150500_55_121-default is &gt;=9-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053081" version="1" comment="kernel-livepatch-5_14_21-150500_55_124-default is &gt;=7-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053246" version="1" comment="kernel-livepatch-5_14_21-150500_55_97-default is &gt;=17-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053502" version="1" comment="kernel-livepatch-6_4_0-150600_23_42-default is &gt;=16-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053247" version="1" comment="kernel-livepatch-6_4_0-150600_23_47-default is &gt;=15-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053248" version="1" comment="kernel-livepatch-6_4_0-150600_23_50-default is &gt;=14-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053249" version="1" comment="kernel-livepatch-6_4_0-150600_23_53-default is &gt;=14-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056290" version="1" comment="kernel-livepatch-6_4_0-150600_23_60-default is &gt;=12-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056192" version="1" comment="kernel-livepatch-6_4_0-150600_23_65-default is &gt;=8-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053083" version="1" comment="kernel-livepatch-6_4_0-150600_23_70-default is &gt;=8-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053084" version="1" comment="kernel-livepatch-6_4_0-150600_23_73-default is &gt;=5-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052765" version="1" comment="kernel-livepatch-6_4_0-150700_5-rt is &gt;=13-150700.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056291" version="1" comment="kernel-livepatch-6_4_0-150700_51-default is &gt;=13-150700.3.36.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056193" version="1" comment="kernel-livepatch-6_4_0-150700_53_11-default is &gt;=8-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053503" version="1" comment="kernel-livepatch-6_4_0-150700_53_16-default is &gt;=8-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056194" version="1" comment="kernel-livepatch-6_4_0-150700_53_19-default is &gt;=5-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056195" version="1" comment="kernel-livepatch-6_4_0-150700_53_3-default is &gt;=13-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056196" version="1" comment="kernel-livepatch-6_4_0-150700_53_6-default is &gt;=12-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044026" version="1" comment="kernel-livepatch-6_4_0-150600_23_70-default is &gt;=6-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044027" version="1" comment="kernel-livepatch-6_4_0-150600_23_73-default is &gt;=3-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044028" version="1" comment="kernel-livepatch-6_4_0-150700_53_16-default is &gt;=6-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044029" version="1" comment="kernel-livepatch-6_4_0-150700_53_19-default is &gt;=3-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051000" version="1" comment="kernel-default is ==6.4.0-150600.23.78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053504" version="1" comment="kernel-livepatch-6_4_0-150600_23_78-default is &gt;=3-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051005" version="1" comment="kernel-default is &lt;6.4.0-150600.23.78.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051505" version="1" comment="kernel-default is ==6.4.0-150700.53.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053505" version="1" comment="kernel-livepatch-6_4_0-150700_53_22-default is &gt;=3-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043870" version="1" comment="kgraft-patch-4_12_14-122_275-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050999" version="1" comment="kernel-livepatch-6_4_0-150600_23_73-default is &gt;=4-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051001" version="1" comment="kernel-livepatch-6_4_0-150600_23_78-default is &gt;=2-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051002" version="1" comment="kernel-default is ==6.4.0-150600.23.81.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051003" version="1" comment="kernel-livepatch-6_4_0-150600_23_81-default is &gt;=2-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051004" version="1" comment="kernel-default is &lt;6.4.0-150600.23.81.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051504" version="1" comment="kernel-livepatch-6_4_0-150700_53_19-default is &gt;=4-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051506" version="1" comment="kernel-livepatch-6_4_0-150700_53_22-default is &gt;=2-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051507" version="1" comment="kernel-default is ==6.4.0-150700.53.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051508" version="1" comment="kernel-livepatch-6_4_0-150700_53_25-default is &gt;=2-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033792" version="1" comment="bind is &lt;9.11.4-26.P2.el7_9.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033793" version="1" comment="bind-chroot is &lt;9.11.4-26.P2.el7_9.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033794" version="1" comment="bind-devel is &lt;9.11.4-26.P2.el7_9.19 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033795" version="1" comment="bind-export-devel is &lt;9.11.4-26.P2.el7_9.19 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033796" version="1" comment="bind-export-libs is &lt;9.11.4-26.P2.el7_9.19 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033797" version="1" comment="bind-libs is &lt;9.11.4-26.P2.el7_9.19 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033798" version="1" comment="bind-libs-lite is &lt;9.11.4-26.P2.el7_9.19 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033799" version="1" comment="bind-license is &lt;9.11.4-26.P2.el7_9.19 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033800" version="1" comment="bind-lite-devel is &lt;9.11.4-26.P2.el7_9.19 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033801" version="1" comment="bind-pkcs11 is &lt;9.11.4-26.P2.el7_9.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033802" version="1" comment="bind-pkcs11-devel is &lt;9.11.4-26.P2.el7_9.19 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033803" version="1" comment="bind-pkcs11-libs is &lt;9.11.4-26.P2.el7_9.19 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033804" version="1" comment="bind-pkcs11-utils is &lt;9.11.4-26.P2.el7_9.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033805" version="1" comment="bind-sdb is &lt;9.11.4-26.P2.el7_9.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033806" version="1" comment="bind-sdb-chroot is &lt;9.11.4-26.P2.el7_9.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033807" version="1" comment="bind-utils is &lt;9.11.4-26.P2.el7_9.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986261" version="1" comment="perl-FCGI is &lt;0.74-8.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013083" version="1" comment="python-setuptools is &lt;0.9.8-7.el7_9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014484" version="1" comment="python3-setuptools is &lt;39.2.0-10.el7_9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007991" version="1" comment="glibc is &lt;2.17-326.el7_9.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007992" version="1" comment="glibc-common is &lt;2.17-326.el7_9.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007993" version="1" comment="glibc-devel is &lt;2.17-326.el7_9.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007994" version="1" comment="glibc-headers is &lt;2.17-326.el7_9.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007995" version="1" comment="glibc-static is &lt;2.17-326.el7_9.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007996" version="1" comment="glibc-utils is &lt;2.17-326.el7_9.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007997" version="1" comment="nscd is &lt;2.17-326.el7_9.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014485" version="1" comment="emacs-git is &lt;1.8.3.1-25.el7_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014486" version="1" comment="emacs-git-el is &lt;1.8.3.1-25.el7_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014487" version="1" comment="git is &lt;1.8.3.1-25.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014488" version="1" comment="git-all is &lt;1.8.3.1-25.el7_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014489" version="1" comment="git-bzr is &lt;1.8.3.1-25.el7_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014490" version="1" comment="git-cvs is &lt;1.8.3.1-25.el7_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014491" version="1" comment="git-daemon is &lt;1.8.3.1-25.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014492" version="1" comment="git-email is &lt;1.8.3.1-25.el7_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014493" version="1" comment="git-gnome-keyring is &lt;1.8.3.1-25.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014494" version="1" comment="git-gui is &lt;1.8.3.1-25.el7_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014495" version="1" comment="git-hg is &lt;1.8.3.1-25.el7_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014496" version="1" comment="git-instaweb is &lt;1.8.3.1-25.el7_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014497" version="1" comment="git-p4 is &lt;1.8.3.1-25.el7_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014498" version="1" comment="git-svn is &lt;1.8.3.1-25.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014499" version="1" comment="gitk is &lt;1.8.3.1-25.el7_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014500" version="1" comment="gitweb is &lt;1.8.3.1-25.el7_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014501" version="1" comment="perl-Git is &lt;1.8.3.1-25.el7_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014502" version="1" comment="perl-Git-SVN is &lt;1.8.3.1-25.el7_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014503" version="1" comment="gimp is &lt;2.8.22-1.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014504" version="1" comment="gimp-devel is &lt;2.8.22-1.el7_9.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014505" version="1" comment="gimp-devel-tools is &lt;2.8.22-1.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014506" version="1" comment="gimp-libs is &lt;2.8.22-1.el7_9.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011942" version="1" comment="konsole is &lt;4.10.5-5.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011943" version="1" comment="konsole-part is &lt;4.10.5-5.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009444" version="1" comment="tigervnc is &lt;1.8.0-36.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009445" version="1" comment="tigervnc-icons is &lt;1.8.0-36.el7_9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009446" version="1" comment="tigervnc-license is &lt;1.8.0-36.el7_9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009447" version="1" comment="tigervnc-server is &lt;1.8.0-36.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009448" version="1" comment="tigervnc-server-applet is &lt;1.8.0-36.el7_9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009449" version="1" comment="tigervnc-server-minimal is &lt;1.8.0-36.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009450" version="1" comment="tigervnc-server-module is &lt;1.8.0-36.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009435" version="1" comment="xorg-x11-server-Xdmx is &lt;1.20.4-32.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009436" version="1" comment="xorg-x11-server-Xephyr is &lt;1.20.4-32.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009437" version="1" comment="xorg-x11-server-Xnest is &lt;1.20.4-32.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009438" version="1" comment="xorg-x11-server-Xorg is &lt;1.20.4-32.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009439" version="1" comment="xorg-x11-server-Xvfb is &lt;1.20.4-32.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009440" version="1" comment="xorg-x11-server-Xwayland is &lt;1.20.4-32.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009441" version="1" comment="xorg-x11-server-common is &lt;1.20.4-32.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009442" version="1" comment="xorg-x11-server-devel is &lt;1.20.4-32.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009443" version="1" comment="xorg-x11-server-source is &lt;1.20.4-32.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009451" version="1" comment="libvpx is &lt;1.3.0-8.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009452" version="1" comment="libvpx-devel is &lt;1.3.0-8.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009453" version="1" comment="libvpx-utils is &lt;1.3.0-8.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024098" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.472.b08-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024099" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.472.b08-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024100" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.472.b08-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024101" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.472.b08-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024102" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.472.b08-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024103" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.472.b08-1.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024104" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.472.b08-1.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024105" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.472.b08-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025493" version="1" comment="java-11-openjdk is &lt;11.0.29.0.7-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025494" version="1" comment="java-11-openjdk-debug is &lt;11.0.29.0.7-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025495" version="1" comment="java-11-openjdk-demo is &lt;11.0.29.0.7-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025496" version="1" comment="java-11-openjdk-demo-debug is &lt;11.0.29.0.7-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025499" version="1" comment="java-11-openjdk-devel is &lt;11.0.29.0.7-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025500" version="1" comment="java-11-openjdk-devel-debug is &lt;11.0.29.0.7-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025504" version="1" comment="java-11-openjdk-headless is &lt;11.0.29.0.7-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025505" version="1" comment="java-11-openjdk-headless-debug is &lt;11.0.29.0.7-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025508" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.29.0.7-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025509" version="1" comment="java-11-openjdk-javadoc-debug is &lt;11.0.29.0.7-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025510" version="1" comment="java-11-openjdk-javadoc-zip is &lt;11.0.29.0.7-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025511" version="1" comment="java-11-openjdk-javadoc-zip-debug is &lt;11.0.29.0.7-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025512" version="1" comment="java-11-openjdk-jmods is &lt;11.0.29.0.7-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025513" version="1" comment="java-11-openjdk-jmods-debug is &lt;11.0.29.0.7-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025517" version="1" comment="java-11-openjdk-src is &lt;11.0.29.0.7-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025518" version="1" comment="java-11-openjdk-src-debug is &lt;11.0.29.0.7-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025521" version="1" comment="java-11-openjdk-static-libs is &lt;11.0.29.0.7-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025522" version="1" comment="java-11-openjdk-static-libs-debug is &lt;11.0.29.0.7-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022020" version="1" comment="cups is &lt;1.6.3-52.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022021" version="1" comment="cups-client is &lt;1.6.3-52.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022022" version="1" comment="cups-devel is &lt;1.6.3-52.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022023" version="1" comment="cups-filesystem is &lt;1.6.3-52.el7_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022024" version="1" comment="cups-ipptool is &lt;1.6.3-52.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022025" version="1" comment="cups-libs is &lt;1.6.3-52.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022026" version="1" comment="cups-lpd is &lt;1.6.3-52.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039781" version="1" comment="httpd is &lt;2.4.6-99.el7_9.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039782" version="1" comment="httpd-devel is &lt;2.4.6-99.el7_9.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039783" version="1" comment="httpd-manual is &lt;2.4.6-99.el7_9.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039784" version="1" comment="httpd-tools is &lt;2.4.6-99.el7_9.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039785" version="1" comment="mod_ldap is &lt;2.4.6-99.el7_9.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039786" version="1" comment="mod_proxy_html is &lt;2.4.6-99.el7_9.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039787" version="1" comment="mod_session is &lt;2.4.6-99.el7_9.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039788" version="1" comment="mod_ssl is &lt;2.4.6-99.el7_9.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020503" version="1" comment="bsdcpio is &lt;3.1.2-14.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020504" version="1" comment="bsdtar is &lt;3.1.2-14.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020505" version="1" comment="libarchive is &lt;3.1.2-14.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020506" version="1" comment="libarchive-devel is &lt;3.1.2-14.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042371" version="1" comment="libblockdev is &lt;2.18-5.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042372" version="1" comment="libblockdev-btrfs is &lt;2.18-5.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042373" version="1" comment="libblockdev-btrfs-devel is &lt;2.18-5.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042374" version="1" comment="libblockdev-crypto is &lt;2.18-5.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042375" version="1" comment="libblockdev-crypto-devel is &lt;2.18-5.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042376" version="1" comment="libblockdev-devel is &lt;2.18-5.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042377" version="1" comment="libblockdev-dm is &lt;2.18-5.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042378" version="1" comment="libblockdev-dm-devel is &lt;2.18-5.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042379" version="1" comment="libblockdev-fs is &lt;2.18-5.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042380" version="1" comment="libblockdev-fs-devel is &lt;2.18-5.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042381" version="1" comment="libblockdev-kbd is &lt;2.18-5.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042382" version="1" comment="libblockdev-kbd-devel is &lt;2.18-5.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042383" version="1" comment="libblockdev-loop is &lt;2.18-5.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042384" version="1" comment="libblockdev-loop-devel is &lt;2.18-5.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042385" version="1" comment="libblockdev-lvm is &lt;2.18-5.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042386" version="1" comment="libblockdev-lvm-devel is &lt;2.18-5.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042387" version="1" comment="libblockdev-mdraid is &lt;2.18-5.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042388" version="1" comment="libblockdev-mdraid-devel is &lt;2.18-5.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042389" version="1" comment="libblockdev-mpath is &lt;2.18-5.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042390" version="1" comment="libblockdev-mpath-devel is &lt;2.18-5.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042391" version="1" comment="libblockdev-nvdimm is &lt;2.18-5.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042392" version="1" comment="libblockdev-nvdimm-devel is &lt;2.18-5.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042393" version="1" comment="libblockdev-part is &lt;2.18-5.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042394" version="1" comment="libblockdev-part-devel is &lt;2.18-5.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042395" version="1" comment="libblockdev-plugins-all is &lt;2.18-5.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042396" version="1" comment="libblockdev-swap is &lt;2.18-5.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042397" version="1" comment="libblockdev-swap-devel is &lt;2.18-5.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042398" version="1" comment="libblockdev-utils is &lt;2.18-5.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042399" version="1" comment="libblockdev-utils-devel is &lt;2.18-5.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042400" version="1" comment="libblockdev-vdo is &lt;2.18-5.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042401" version="1" comment="libblockdev-vdo-devel is &lt;2.18-5.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042402" version="1" comment="python2-blockdev is &lt;2.18-5.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009433" version="1" comment="pam is &lt;1.1.8-23.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009434" version="1" comment="pam-devel is &lt;1.1.8-23.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050055" version="1" comment="grub2 is &lt;2.02-0.87.0.5.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050056" version="1" comment="grub2-common is &lt;2.02-0.87.0.5.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050057" version="1" comment="grub2-efi-ia32 is &lt;2.02-0.87.0.5.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050058" version="1" comment="grub2-efi-ia32-cdboot is &lt;2.02-0.87.0.5.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050059" version="1" comment="grub2-efi-ia32-modules is &lt;2.02-0.87.0.5.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050060" version="1" comment="grub2-efi-x64 is &lt;2.02-0.87.0.5.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050061" version="1" comment="grub2-efi-x64-cdboot is &lt;2.02-0.87.0.5.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050062" version="1" comment="grub2-efi-x64-modules is &lt;2.02-0.87.0.5.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050063" version="1" comment="grub2-pc is &lt;2.02-0.87.0.5.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050064" version="1" comment="grub2-pc-modules is &lt;2.02-0.87.0.5.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050065" version="1" comment="grub2-tools is &lt;2.02-0.87.0.5.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050066" version="1" comment="grub2-tools-extra is &lt;2.02-0.87.0.5.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050067" version="1" comment="grub2-tools-minimal is &lt;2.02-0.87.0.5.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031899" version="1" comment="tigervnc is &lt;1.8.0-36.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031900" version="1" comment="tigervnc-icons is &lt;1.8.0-36.el7_9.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031901" version="1" comment="tigervnc-license is &lt;1.8.0-36.el7_9.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031902" version="1" comment="tigervnc-server is &lt;1.8.0-36.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031903" version="1" comment="tigervnc-server-applet is &lt;1.8.0-36.el7_9.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031904" version="1" comment="tigervnc-server-minimal is &lt;1.8.0-36.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031905" version="1" comment="tigervnc-server-module is &lt;1.8.0-36.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030661" version="1" comment="iwl100-firmware is &lt;39.31.5.1-999.44.1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030662" version="1" comment="iwl1000-firmware is &lt;39.31.5.1-999.44.1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030663" version="1" comment="iwl105-firmware is &lt;18.168.6.1-999.44.1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030664" version="1" comment="iwl135-firmware is &lt;18.168.6.1-999.44.1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030665" version="1" comment="iwl2000-firmware is &lt;18.168.6.1-999.44.1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030666" version="1" comment="iwl2030-firmware is &lt;18.168.6.1-999.44.1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030667" version="1" comment="iwl3160-firmware is &lt;22.0.7.0-999.44.1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030668" version="1" comment="iwl3945-firmware is &lt;15.32.2.9-999.44.1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030669" version="1" comment="iwl4965-firmware is &lt;228.61.2.24-999.44.1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030670" version="1" comment="iwl5000-firmware is &lt;8.83.5.1_1-999.44.1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030671" version="1" comment="iwl5150-firmware is &lt;8.24.2.2-999.44.1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030672" version="1" comment="iwl6000-firmware is &lt;9.221.4.1-999.44.1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030673" version="1" comment="iwl6000g2a-firmware is &lt;17.168.5.3-999.44.1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030674" version="1" comment="iwl6000g2b-firmware is &lt;17.168.5.2-999.44.1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030675" version="1" comment="iwl6050-firmware is &lt;41.28.5.1-999.44.1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030676" version="1" comment="iwl7260-firmware is &lt;22.0.7.0-999.44.1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030677" version="1" comment="iwlax2xx-firmware is &lt;20251030-999.44.1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030678" version="1" comment="linux-firmware is &lt;20251030-999.44.1.gite9292517.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043365" version="1" comment="java-11-openjdk is &lt;11.0.30.0.7-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043334" version="1" comment="java-11-openjdk-debug is &lt;11.0.30.0.7-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043366" version="1" comment="java-11-openjdk-demo is &lt;11.0.30.0.7-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043336" version="1" comment="java-11-openjdk-demo-debug is &lt;11.0.30.0.7-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043367" version="1" comment="java-11-openjdk-devel is &lt;11.0.30.0.7-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043340" version="1" comment="java-11-openjdk-devel-debug is &lt;11.0.30.0.7-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043368" version="1" comment="java-11-openjdk-headless is &lt;11.0.30.0.7-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043345" version="1" comment="java-11-openjdk-headless-debug is &lt;11.0.30.0.7-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043369" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.30.0.7-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043349" version="1" comment="java-11-openjdk-javadoc-debug is &lt;11.0.30.0.7-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043370" version="1" comment="java-11-openjdk-javadoc-zip is &lt;11.0.30.0.7-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043351" version="1" comment="java-11-openjdk-javadoc-zip-debug is &lt;11.0.30.0.7-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043371" version="1" comment="java-11-openjdk-jmods is &lt;11.0.30.0.7-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043353" version="1" comment="java-11-openjdk-jmods-debug is &lt;11.0.30.0.7-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043372" version="1" comment="java-11-openjdk-src is &lt;11.0.30.0.7-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043358" version="1" comment="java-11-openjdk-src-debug is &lt;11.0.30.0.7-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043373" version="1" comment="java-11-openjdk-static-libs is &lt;11.0.30.0.7-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043362" version="1" comment="java-11-openjdk-static-libs-debug is &lt;11.0.30.0.7-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051006" version="1" comment="kernel-default is ==6.4.0-150600.23.84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051007" version="1" comment="kernel-livepatch-6_4_0-150600_23_84-default is &gt;=2-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051008" version="1" comment="kernel-default is &lt;6.4.0-150600.23.84.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051509" version="1" comment="kernel-default is ==6.4.0-150700.53.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051510" version="1" comment="kernel-livepatch-6_4_0-150700_53_28-default is &gt;=2-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012367" version="1" comment="lemon is &lt;3.7.17-9.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012368" version="1" comment="sqlite is &lt;3.7.17-9.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012369" version="1" comment="sqlite-devel is &lt;3.7.17-9.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012370" version="1" comment="sqlite-doc is &lt;3.7.17-9.el7_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012371" version="1" comment="sqlite-tcl is &lt;3.7.17-9.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056197" version="1" comment="kernel-livepatch-5_14_21-150400_24_184-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053250" version="1" comment="kernel-livepatch-5_14_21-150400_24_187-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053507" version="1" comment="kernel-livepatch-5_14_21-150500_55_127-default is &gt;=4-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056198" version="1" comment="kernel-livepatch-5_14_21-150500_55_130-default is &gt;=4-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053508" version="1" comment="kernel-livepatch-5_14_21-150500_55_133-default is &gt;=4-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056199" version="1" comment="kernel-livepatch-6_4_0-150600_23_81-default is &gt;=3-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056200" version="1" comment="kernel-livepatch-6_4_0-150600_23_84-default is &gt;=3-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056292" version="1" comment="kernel-livepatch-6_4_0-150700_53_25-default is &gt;=3-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056201" version="1" comment="kernel-livepatch-6_4_0-150700_53_28-default is &gt;=3-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020296" version="1" comment="postgresql is &lt;9.2.24-9.el7_9.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020297" version="1" comment="postgresql-contrib is &lt;9.2.24-9.el7_9.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020298" version="1" comment="postgresql-devel is &lt;9.2.24-9.el7_9.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020299" version="1" comment="postgresql-docs is &lt;9.2.24-9.el7_9.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020300" version="1" comment="postgresql-libs is &lt;9.2.24-9.el7_9.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020301" version="1" comment="postgresql-plperl is &lt;9.2.24-9.el7_9.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020302" version="1" comment="postgresql-plpython is &lt;9.2.24-9.el7_9.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020303" version="1" comment="postgresql-pltcl is &lt;9.2.24-9.el7_9.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020304" version="1" comment="postgresql-server is &lt;9.2.24-9.el7_9.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020305" version="1" comment="postgresql-static is &lt;9.2.24-9.el7_9.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020306" version="1" comment="postgresql-test is &lt;9.2.24-9.el7_9.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020307" version="1" comment="postgresql-upgrade is &lt;9.2.24-9.el7_9.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017231" version="1" comment="pam is &lt;1.1.8-23.el7_9.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017232" version="1" comment="pam-devel is &lt;1.1.8-23.el7_9.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041699" version="1" comment="openssl is &lt;1.0.2k-26.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041700" version="1" comment="openssl-devel is &lt;1.0.2k-26.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041701" version="1" comment="openssl-libs is &lt;1.0.2k-26.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041702" version="1" comment="openssl-perl is &lt;1.0.2k-26.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041703" version="1" comment="openssl-static is &lt;1.0.2k-26.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041186" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.482.b08-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041187" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.482.b08-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041188" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.482.b08-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041189" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.482.b08-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041190" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.482.b08-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041191" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.482.b08-1.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041192" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.482.b08-1.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041193" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.482.b08-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053509" version="1" comment="kernel-livepatch-5_14_21-150500_55_136-default is &gt;=3-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056202" version="1" comment="kernel-default is ==6.4.0-150600.23.87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056203" version="1" comment="kernel-livepatch-6_4_0-150600_23_87-default is &gt;=2-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056204" version="1" comment="kernel-default is &lt;6.4.0-150600.23.87.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053510" version="1" comment="kernel-default is ==6.4.0-150700.53.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053511" version="1" comment="kernel-livepatch-6_4_0-150700_53_31-default is &gt;=2-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053251" version="1" comment="kernel-default is ==5.14.21-150400.24.194.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053252" version="1" comment="kernel-livepatch-5_14_21-150400_24_194-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053253" version="1" comment="kernel-default is &lt;5.14.21-150400.24.194.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050068" version="1" comment="python2-pyasn1 is &lt;0.1.9-7.el7_9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050069" version="1" comment="python2-pyasn1-modules is &lt;0.1.9-7.el7_9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248995"/>
	</rpminfo_test>
</tests>
<objects>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mailx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sles_es-release-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.6.0-openjdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.6.0-openjdk-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.6.0-openjdk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.6.0-openjdk-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.6.0-openjdk-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.7.0-openjdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.7.0-openjdk-accessibility</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.7.0-openjdk-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.7.0-openjdk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.7.0-openjdk-headless</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.7.0-openjdk-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.7.0-openjdk-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.8.0-openjdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.8.0-openjdk-accessibility</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.8.0-openjdk-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.8.0-openjdk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.8.0-openjdk-headless</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.8.0-openjdk-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.8.0-openjdk-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipa-admintools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipa-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipa-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipa-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipa-server-trust-ad</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-abi-whitelists</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-headers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-tools-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-perf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-File-Find-Rule</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-File-Find-Rule-Perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xfsprogs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xfsprogs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xfsprogs-qa-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-bundler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-bundler-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-thor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-thor-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tkinter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsrtp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsrtp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xerces-j2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xerces-j2-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xerces-j2-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcacard</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcacard-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcacard-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-guest-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-img</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-kvm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-kvm-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-kvm-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-admin-webapps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-docs-webapp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-el-2.2-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-jsp-2.2-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-jsvc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-lib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-servlet-3.0-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-webapps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>httpd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>httpd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>httpd-manual</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>httpd-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mod_ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mod_proxy_html</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mod_session</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mod_ssl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-cups</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-gtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>json-c</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>json-c-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>json-c-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-apidocs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-build</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-build-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-cron</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-sign</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-bcmath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-cli</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-dba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-embedded</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-enchant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-fpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-gd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-intl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-mbstring</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-mysqlnd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-odbc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-pdo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-process</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-pspell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-recode</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-soap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-xml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-xmlrpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-headers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nscd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_38-44-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_39-47-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_43-52_6-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_44-52_10-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_44-52_18-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_48-52_27-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_49-11-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_51-52_31-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_51-52_34-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_51-52_39-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_51-60_20-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_51-60_25-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_53-60_30-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_57-60_35-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_59-60_41-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_59-60_45-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbclient</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbclient-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwbclient</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwbclient-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-dc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-dc-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-pidl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-test-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-vfs-glusterfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-winbind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-winbind-clients</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-winbind-krb5-locator</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-winbind-modules</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-config-network</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-config-nwfilter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-interface</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-lxc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-network</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-nodedev</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-nwfilter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-qemu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-secret</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-kvm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-lxc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-lock-sanlock</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-login-shell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>file</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>file-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>file-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>file-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-magic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXfont</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXfont-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl098e</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mod_wsgi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-bench</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-embedded</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-embedded-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zsh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zsh-html</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nss-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nss-pkcs11-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nss-softokn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nss-softokn-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nss-softokn-freebl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nss-softokn-freebl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nss-sysinit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nss-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nss-util</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nss-util-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xulrunner</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xulrunner-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-askpass</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-clients</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-keycat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-server-sysvinit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_ssh_agent_auth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnutls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnutls-c++</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnutls-dane</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnutls-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnutls-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtasn1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtasn1-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtasn1-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>resteasy-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>resteasy-base-atom-provider</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>resteasy-base-jackson-provider</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>resteasy-base-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>resteasy-base-jaxb-provider</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>resteasy-base-jaxrs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>resteasy-base-jaxrs-all</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>resteasy-base-jaxrs-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>resteasy-base-jettison-provider</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>resteasy-base-providers-pom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>resteasy-base-tjws</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mod_dav_svn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-javahl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-kde</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-ruby</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net-snmp-agent-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net-snmp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net-snmp-gui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net-snmp-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net-snmp-perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net-snmp-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net-snmp-sysvinit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net-snmp-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>httpcomponents-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>httpcomponents-client-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jakarta-commons-httpclient</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jakarta-commons-httpclient-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jakarta-commons-httpclient-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jakarta-commons-httpclient-manual</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>squid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>squid-sysvinit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>curl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>procmail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-crypto</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-elasticsearch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-gnutls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-gssapi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-libdbi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-mmaudit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-mmjsonparse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-mmnormalize</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-mmsnmptrapd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-relp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-udpspoof</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wpa_supplicant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_32-33-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>finch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>finch-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-tcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pidgin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pidgin-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pidgin-perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-filters</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-filters-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-filters-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-pkinit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-server-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-workstation</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wget</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby-irb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby-tcltk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-bigdecimal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-io-console</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-json</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-minitest</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-psych</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-rake</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-rdoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygems</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygems-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>polkit-qt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>polkit-qt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>polkit-qt-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvncserver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvncserver-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdenetwork</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdenetwork-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdenetwork-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdenetwork-fileshare-samba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdenetwork-kdnssd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdenetwork-kget</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdenetwork-kget-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdenetwork-kopete</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdenetwork-kopete-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdenetwork-kopete-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdenetwork-krdc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdenetwork-krdc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdenetwork-krdc-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdenetwork-krfb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdenetwork-krfb-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>haproxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bash</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bash-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wireshark</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wireshark-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wireshark-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>clutter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>clutter-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>clutter-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cogl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cogl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cogl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-browser-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mutter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mutter-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_36-38-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-Xdmx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-Xephyr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-Xnest</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-Xorg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-Xvfb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-source</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>389-ds-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>389-ds-base-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>389-ds-base-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcf-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcf-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jasper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jasper-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jasper-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jasper-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unzip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-plperl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-plpython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-pltcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-upgrade</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>autofs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblouis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblouis-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblouis-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblouis-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblouis-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tigervnc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tigervnc-icons</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tigervnc-license</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tigervnc-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tigervnc-server-applet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tigervnc-server-minimal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tigervnc-server-module</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>binutils-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-chroot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-libs-lite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-license</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-lite-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-sdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-sdb-chroot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unbound</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unbound-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unbound-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unbound-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flac-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flac-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcre</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcre-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcre-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcre-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cpio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libyaml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libyaml-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hivex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hivex-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocaml-hivex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocaml-hivex-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-hivex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-hivex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby-hivex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ntp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ntp-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ntp-perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ntpdate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sntp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mpfr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mpfr-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetype</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetype-demos</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetype-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-filesystem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-ipptool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-lpd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-git</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-git-el</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-all</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-bzr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-cvs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-daemon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-email</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-gui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-hg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-p4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-svn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gitk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gitweb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Git</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Git-SVN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xerces-c</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xerces-c-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xerces-c-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jakarta-taglibs-standard</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jakarta-taglibs-standard-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tcpdump</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kexec-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kexec-tools-anaconda-addon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kexec-tools-eppic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ModemManager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ModemManager-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ModemManager-glib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ModemManager-glib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ModemManager-vala</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-adsl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-bluetooth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-config-routing-rules</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-config-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-glib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-glib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-libnm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-libnm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-libreswan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-libreswan-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-team</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-tui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-wifi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-wwan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnm-gtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnm-gtk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>network-manager-applet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nm-connection-editor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slapi-nis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>thunderbird</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwmf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwmf-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwmf-lite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grep</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh2-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>setroubleshoot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>setroubleshoot-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>chrony</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-clufter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pacemaker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pacemaker-cli</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pacemaker-cluster-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pacemaker-cts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pacemaker-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pacemaker-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pacemaker-libs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pacemaker-nagios-plugins-metadata</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pacemaker-remote</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>abrt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>abrt-addon-ccpp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>abrt-addon-kerneloops</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>abrt-addon-pstoreoops</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>abrt-addon-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>abrt-addon-upload-watch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>abrt-addon-vmcore</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>abrt-addon-xorg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>abrt-cli</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>abrt-console-notification</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>abrt-dbus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>abrt-desktop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>abrt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>abrt-gui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>abrt-gui-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>abrt-gui-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>abrt-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>abrt-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>abrt-python-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>abrt-retrace-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>abrt-tui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreport</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreport-anaconda</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreport-cli</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreport-compat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreport-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreport-filesystem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreport-gtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreport-gtk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreport-newt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreport-plugin-bugzilla</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreport-plugin-kerneloops</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreport-plugin-logger</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreport-plugin-mailx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreport-plugin-reportuploader</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreport-plugin-ureport</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreport-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreport-web</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreport-web-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rest</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rest-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>realmd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>realmd-devel-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>expat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>expat-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>expat-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mailman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreswan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ctdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ctdb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ctdb-tests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ldb-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pyldb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pyldb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-client-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-common-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-common-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-test-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuser</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuser-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuser-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spice-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spice-server-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openhpi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openhpi-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openhpi-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>polkit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>polkit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>polkit-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap-clients</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap-servers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap-servers-sql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lemon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sqlite-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sqlite-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sqlite-tcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-nss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-efi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-efi-modules</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libipa_hbac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libipa_hbac-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_idmap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_idmap-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_nss_idmap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_nss_idmap-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_simpleifp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_simpleifp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-libipa_hbac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-libsss_nss_idmap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-sss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-sss-murmur</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-sssdconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-ad</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-common-pac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-dbus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-ipa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-krb5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-krb5-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-libwbclient</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-libwbclient-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-proxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipa-server-dns</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtalloc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtalloc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtdb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtevent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtevent-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openchange</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openchange-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openchange-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openchange-devel-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pytalloc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pytalloc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-tdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-tevent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tdb-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nspr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nspr-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpcbind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-session</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-session-custom-session</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-session-xsession</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-collections</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-collections-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-collections-testframework</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-collections-testframework-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sos</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.8.0-openjdk-accessibility-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.8.0-openjdk-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.8.0-openjdk-demo-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.8.0-openjdk-devel-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.8.0-openjdk-headless-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.8.0-openjdk-javadoc-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.8.0-openjdk-src-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng12-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-pkcs11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-pkcs11-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-pkcs11-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-pkcs11-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nettle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nettle-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bpftool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>poppler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>poppler-cpp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>poppler-cpp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>poppler-demos</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>poppler-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>poppler-glib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>poppler-glib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>poppler-qt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>poppler-qt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>poppler-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs-gfs2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs-gobject</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs-gobject-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs-gobject-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs-inspect-icons</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs-java</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs-java-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs-man-pages-ja</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs-man-pages-uk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs-rescue</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs-rsync</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs-tools-c</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs-xfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lua-guestfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocaml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocaml-camlp4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocaml-camlp4-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocaml-compiler-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocaml-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocaml-emacs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocaml-labltk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocaml-labltk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocaml-libguestfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocaml-libguestfs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocaml-ocamldoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocaml-runtime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocaml-source</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocaml-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Sys-Guestfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-libguestfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby-libguestfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virt-dib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virt-v2v</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick-c++</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick-c++-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick-perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bsdcpio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bsdtar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libarchive</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libarchive-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipa-client-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipa-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipa-python-compat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipa-server-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-ipaclient</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-ipalib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-ipaserver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>drm-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>egl-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeglut</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeglut-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glx-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>intel-gpu-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXcursor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXcursor-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXfont2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXfont2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXres</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXres-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdrm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdrm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libepoxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libepoxy-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libglvnd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libglvnd-core-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libglvnd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libglvnd-egl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libglvnd-gles</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libglvnd-glx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libglvnd-opengl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libinput</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libinput-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwacom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwacom-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwacom-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mesa-demos</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mesa-dri-drivers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mesa-filesystem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mesa-libEGL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mesa-libEGL-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mesa-libGL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mesa-libGL-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mesa-libGLES</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mesa-libGLES-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mesa-libOSMesa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mesa-libOSMesa-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mesa-libgbm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mesa-libgbm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mesa-libglapi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mesa-libwayland-egl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mesa-libwayland-egl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mesa-libxatracker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mesa-libxatracker-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mesa-vdpau-drivers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mesa-vulkan-drivers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vulkan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vulkan-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vulkan-filesystem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xcb-proto</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xkeyboard-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xkeyboard-config-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-drv-ati</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-drv-dummy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-drv-evdev</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-drv-evdev-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-drv-fbdev</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-drv-intel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-drv-intel-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-drv-libinput</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-drv-libinput-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-drv-mouse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-drv-mouse-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-drv-nouveau</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-drv-openchrome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-drv-openchrome-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-drv-qxl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-drv-synaptics</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-drv-synaptics-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-drv-v4l</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-drv-vesa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-drv-vmmouse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-drv-vmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-drv-void</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-drv-wacom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-drv-wacom-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-font-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-proto-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-Xspice</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-Xwayland</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-xkb-extras</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-xkb-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-xkb-utils-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit-command-not-found</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit-cron</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit-glib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit-glib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit-gstreamer-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit-gtk3-module</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit-yum</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit-yum-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>accountsservice</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>accountsservice-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>accountsservice-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>adwaita-cursor-theme</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>adwaita-gtk2-theme</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>adwaita-icon-theme</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>adwaita-icon-theme-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>appstream-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>at-spi2-atk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>at-spi2-atk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>at-spi2-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>at-spi2-core-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>atk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>atk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>baobab</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bolt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>brasero</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>brasero-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>brasero-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>brasero-nautilus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cairo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cairo-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cairo-gobject</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cairo-gobject-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cairo-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cheese</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cheese-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cheese-libs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>clutter-gst3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>clutter-gst3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>compat-exiv2-023</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>compat-libical1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>control-center</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>control-center-filesystem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dconf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dconf-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dconf-editor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>devhelp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>devhelp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>devhelp-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ekiga</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>empathy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eog</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eog-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-browser-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-dvi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-nautilus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-bogofilter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-data-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-data-server-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-data-server-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-data-server-langpacks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-data-server-perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-data-server-tests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-devel-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-ews</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-ews-langpacks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-help</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-langpacks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-mapi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-mapi-langpacks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-pst</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-spamassassin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-tests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>file-roller</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>file-roller-nautilus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flatpak</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flatpak-builder</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flatpak-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flatpak-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>folks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>folks-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>folks-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fontconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fontconfig-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fontconfig-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fribidi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fribidi-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fwupd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fwupd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fwupdate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fwupdate-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fwupdate-efi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fwupdate-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcr-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf2-tests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdm-pam-extensions-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gedit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gedit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gedit-plugin-bookmarks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gedit-plugin-bracketcompletion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gedit-plugin-charmap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gedit-plugin-codecomment</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gedit-plugin-colorpicker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gedit-plugin-colorschemer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gedit-plugin-commander</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gedit-plugin-drawspaces</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gedit-plugin-findinfiles</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gedit-plugin-joinlines</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gedit-plugin-multiedit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gedit-plugin-smartspaces</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gedit-plugin-synctex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gedit-plugin-terminal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gedit-plugin-textsize</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gedit-plugin-translate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gedit-plugin-wordcompletion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gedit-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gedit-plugins-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>geoclue2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>geoclue2-demos</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>geoclue2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>geoclue2-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>geocode-glib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>geocode-glib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gjs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gjs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gjs-tests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glade</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glade-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glade-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib-networking</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib-networking-tests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-fam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-tests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibmm24</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibmm24-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibmm24-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-backgrounds</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-bluetooth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-bluetooth-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-bluetooth-libs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-boxes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-calculator</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-classic-session</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-clocks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-color-manager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-contacts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-desktop3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-desktop3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-desktop3-tests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-devel-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-dictionary</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-disk-utility</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-documents</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-documents-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-font-viewer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-getting-started-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-getting-started-docs-cs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-getting-started-docs-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-getting-started-docs-es</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-getting-started-docs-fr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-getting-started-docs-gl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-getting-started-docs-hu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-getting-started-docs-it</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-getting-started-docs-pl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-getting-started-docs-pt_BR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-getting-started-docs-ru</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-initial-setup</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-keyring</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-keyring-pam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-online-accounts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-online-accounts-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-online-miners</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-packagekit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-packagekit-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-packagekit-installer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-packagekit-updater</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-screenshot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-session-wayland-session</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-settings-daemon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-settings-daemon-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-extension-alternate-tab</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-extension-apps-menu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-extension-auto-move-windows</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-extension-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-extension-dash-to-dock</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-extension-drive-menu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-extension-launch-new-instance</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-extension-native-window-placement</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-extension-no-hot-corner</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-extension-panel-favorites</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-extension-places-menu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-extension-screenshot-window-sizer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-extension-systemMonitor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-extension-top-icons</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-extension-updates-dialog</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-extension-user-theme</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-extension-window-list</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-extension-windowsNavigator</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-extension-workspace-indicator</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-software</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-software-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-software-editor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-system-monitor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-terminal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-terminal-nautilus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-themes-standard</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-tweak-tool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-user-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnote</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gobject-introspection</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gobject-introspection-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gom-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>google-noto-emoji-color-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>google-noto-emoji-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grilo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grilo-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grilo-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gsettings-desktop-schemas</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gsettings-desktop-schemas-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gspell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gspell-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gspell-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gssdp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gssdp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gssdp-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gssdp-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer1-plugins-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer1-plugins-base-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer1-plugins-base-devel-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer1-plugins-base-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk-update-icon-cache</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-devel-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-immodule-xim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-immodules</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-tests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtksourceview3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtksourceview3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtksourceview3-tests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gucharmap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gucharmap-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gucharmap-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gupnp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gupnp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gupnp-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gupnp-igd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gupnp-igd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gupnp-igd-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvfs-afc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvfs-afp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvfs-archive</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvfs-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvfs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvfs-fuse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvfs-goa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvfs-gphoto2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvfs-mtp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvfs-smb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvfs-tests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>harfbuzz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>harfbuzz-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>harfbuzz-icu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>json-glib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>json-glib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>json-glib-tests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libappstream-glib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libappstream-glib-builder</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libappstream-glib-builder-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libappstream-glib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libchamplain</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libchamplain-demos</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libchamplain-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libchamplain-gtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcroco</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcroco-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgdata</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgdata-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgee</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgee-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgepub</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgepub-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgexiv2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgexiv2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnomekbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnomekbd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgovirt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgovirt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgtop2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgtop2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgweather</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgweather-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgxps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgxps-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgxps-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libical</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libical-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libical-glib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libical-glib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libical-glib-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg-turbo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg-turbo-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg-turbo-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg-turbo-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmediaart</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmediaart-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmediaart-tests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libosinfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libosinfo-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libosinfo-vala</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpeas</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpeas-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpeas-gtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpeas-loader-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librsvg2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librsvg2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librsvg2-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsecret</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsecret-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoup</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoup-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwayland-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwayland-cursor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwayland-egl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwayland-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwnck3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwnck3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozjs52</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozjs52-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nautilus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nautilus-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nautilus-extensions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nautilus-sendto</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>osinfo-db</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pango</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pango-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pango-tests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-gexiv2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-pyatspi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rhythmbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rhythmbox-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>seahorse-nautilus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>shotwell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sushi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>totem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>totem-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>totem-nautilus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>totem-pl-parser</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>totem-pl-parser-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>turbojpeg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>turbojpeg-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>upower</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>upower-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>upower-devel-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vala</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vala-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vala-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>valadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>valadoc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vino</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vte-profile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vte291</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vte291-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wayland-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wayland-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wayland-protocols-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webkitgtk4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webkitgtk4-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webkitgtk4-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webkitgtk4-jsc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webkitgtk4-jsc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webkitgtk4-plugin-process-gtk2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xdg-desktop-portal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xdg-desktop-portal-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xdg-desktop-portal-gtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yelp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yelp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yelp-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yelp-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yelp-xsl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yelp-xsl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zenity</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-dispatcher-routing-rules</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnl3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnl3-cli</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnl3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnl3-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnma</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnma-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-twisted-web</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>squid-migration-script</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-cavs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_21-69-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_21-81-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_21-84-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_21-90-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_38-93-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libICE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libICE-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXaw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXaw-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXdmcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXdmcp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXfixes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXfixes-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXi-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXpm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXrandr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXrandr-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXrender</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXrender-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXtst</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXtst-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXv-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXvMC</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXvMC-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXxf86vm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXxf86vm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libevdev</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libevdev-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libevdev-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfontenc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfontenc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvdpau</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvdpau-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvdpau-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxkbcommon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxkbcommon-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxkbcommon-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxkbcommon-x11-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxkbfile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxkbfile-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mesa-private-llvm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mesa-private-llvm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>clutter-gst2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>clutter-gst2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-video-effects</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-bad-free</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-bad-free-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-bad-free-devel-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-good</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-good-devel-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer1-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer1-devel-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer1-plugins-bad-free</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer1-plugins-bad-free-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer1-plugins-bad-free-gtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer1-plugins-good</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>orc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>orc-compiler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>orc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>orc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fltk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fltk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fltk-fluid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fltk-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>doxygen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>doxygen-doxywizard</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>doxygen-latex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>patch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-jinja2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vim-X11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vim-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vim-enhanced</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vim-filesystem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vim-minimal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphite2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphite2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-krb5-printing</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-python-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhclient</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-mercurial</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-mercurial-el</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mercurial</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mercurial-hgk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mod_nss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkadm5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>setroubleshoot-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>389-ds-base-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-devel-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-help</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-help-ca</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-help-da</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-help-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-help-el</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-help-en_GB</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-help-es</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-help-fr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-help-it</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-help-ja</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-help-ko</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-help-nl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-help-nn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-help-pt_BR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-help-ru</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-help-sl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-help-sv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-help-zh_CN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmlrpc-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmlrpc-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmlrpc-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmlrpc-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblkid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblkid-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmount</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmount-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuuid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuuid-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>util-linux</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>uuidd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openjpeg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openjpeg-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openjpeg-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_62-60_62-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>golang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>golang-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>golang-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>golang-misc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>golang-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>golang-tests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firewall-applet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firewall-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firewalld</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firewalld-filesystem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-firewall</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.8.0-openjdk-javadoc-zip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.8.0-openjdk-javadoc-zip-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gd-progs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_62-60_64_8-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>groovy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>groovy-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sudo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sudo-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>resteasy-base-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>resteasy-base-resteasy-pom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>policycoreutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>policycoreutils-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>policycoreutils-gui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>policycoreutils-newrole</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>policycoreutils-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>policycoreutils-restorecond</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>policycoreutils-sandbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgudev1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgudev1-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-journal-gateway</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-networkd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-resolved</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-sysv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_67-60_64_18-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipsilon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipsilon-authform</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipsilon-authgssapi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipsilon-authldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipsilon-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipsilon-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipsilon-filesystem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipsilon-infosssd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipsilon-persona</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipsilon-saml2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipsilon-saml2-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipsilon-tools-ipa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>memcached</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>memcached-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_67-60_64_21-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>minizip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>minizip-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zlib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zlib-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvpx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvpx-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvpx-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-ppp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_103-6_33-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_103-6_38-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_82-6_3-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_82-6_6-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_82-6_9-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_92-6_18-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_92-6_30-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmlsec1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmlsec1-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmlsec1-gcrypt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmlsec1-gcrypt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmlsec1-gnutls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmlsec1-gnutls-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmlsec1-nss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmlsec1-nss-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmlsec1-openssl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmlsec1-openssl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_49-92_11-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_49-92_14-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_59-92_17-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_59-92_20-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_59-92_24-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_74-92_29-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_74-92_32-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_74-92_35-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_74-92_38-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bluez</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bluez-cups</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bluez-hid2hci</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bluez-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bluez-libs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_90-92_45-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_40-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-120-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_7-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_41-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_26-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>autotrace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>autotrace-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-el</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-filesystem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-nox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-terminal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>inkscape</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>inkscape-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>inkscape-view</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-krb5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-unixODBC</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cpp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-c++</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-gfortran</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-gnat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-go</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-objc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-objc++</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-plugin-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasan-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libatomic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libatomic-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgfortran</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgfortran-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnat-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnat-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgo-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgo-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgomp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libitm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libitm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libitm-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmudflap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmudflap-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmudflap-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libobjc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libquadmath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libquadmath-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libquadmath-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtsan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtsan-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_autofs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_certmap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_certmap-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_sudo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-kcm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-polkit-rules</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-winbind-idmap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apr-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_114-94_11-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_114-94_14-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dnsmasq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dnsmasq-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>keycloak-httpd-client-install</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-keycloak-httpd-client-install</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xdg-user-dirs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spamassassin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_103-92_53-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_103-92_56-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_90-92_50-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>exiv2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>exiv2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>exiv2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>exiv2-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openslp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openslp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openslp-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sox-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcdio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcdio-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>exempi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>exempi-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-23-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-25_3-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icoutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>log4j</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>log4j-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>log4j-manual</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iwl100-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iwl1000-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iwl105-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iwl135-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iwl2000-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iwl2030-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iwl3160-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iwl3945-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iwl4965-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iwl5000-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iwl5150-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iwl6000-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iwl6000g2a-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iwl6000g2b-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iwl6050-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iwl7260-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iwl7265-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-admin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>linux-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>microcode_ctl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OVMF</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk-vnc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk-vnc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk-vnc-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk-vnc2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk-vnc2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvnc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvnc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvnc-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvncpulse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvncpulse-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_67-60_64_24-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_69-60_64_29-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mod_auth_openidc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-autoipd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-compat-howl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-compat-howl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-compat-libdns_sd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-compat-libdns_sd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-dnsconfd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-glib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-glib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-gobject</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-gobject-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-qt3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-qt3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-qt4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-qt4-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-ui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-ui-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-ui-gtk3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-ui-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_69-60_64_32-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_69-60_64_35-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>authconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>authconfig-gtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_73-5-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pki-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pki-base-java</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pki-ca</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pki-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pki-kra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pki-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pki-symkey</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pki-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>augeas</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>augeas-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>augeas-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs-apidocs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs-ktexteditor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtirpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtirpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nss-pem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcs-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librelp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librelp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_120-94_17-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_126-94_22-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_19-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_24-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_29-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_32-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_37-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_45-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_48-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_51-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_12-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_17-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_20-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_22-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_27-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_32-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_35-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_38-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_47-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-195-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_10-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_15-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_18-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_21-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_29-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_34-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_37-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_4-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_40-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_7-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>okular</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>okular-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>okular-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>okular-part</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-paramiko</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-paramiko-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freerdp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freerdp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freerdp-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwinpr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwinpr-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vinagre</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plexus-archiver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plexus-archiver-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpdk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpdk-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpdk-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-disk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-gluster</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-iscsi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-logical</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-mpath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-rbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-scsi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>blktrace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>corosync</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>corosync-qdevice</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>corosync-qnetd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>corosynclib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>corosynclib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_131-94_29-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_132-94_33-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-25_13-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-25_6-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spice-glib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spice-glib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spice-gtk-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spice-gtk3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spice-gtk3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spice-gtk3-vala</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spice-vdagent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virt-viewer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cloud-init</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yum-NetworkManager-dispatcher</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yum-plugin-aliases</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yum-plugin-auto-update-debug-info</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yum-plugin-changelog</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yum-plugin-copr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yum-plugin-fastestmirror</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yum-plugin-filter-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yum-plugin-fs-snapshot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yum-plugin-keys</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yum-plugin-list-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yum-plugin-local</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yum-plugin-merge-conf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yum-plugin-ovl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yum-plugin-post-transaction-actions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yum-plugin-pre-transaction-actions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yum-plugin-priorities</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yum-plugin-protectbase</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yum-plugin-ps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yum-plugin-remove-with-leaves</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yum-plugin-rpm-warm-cache</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yum-plugin-show-leaves</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yum-plugin-tmprepo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yum-plugin-tsflags</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yum-plugin-upgrade-helper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yum-plugin-verify</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yum-plugin-versionlock</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yum-updateonboot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yum-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_138-94_39-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_140-94_42-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_143-94_47-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fuse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fuse-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fuse-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glusterfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glusterfs-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glusterfs-api-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glusterfs-cli</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glusterfs-client-xlators</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glusterfs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glusterfs-fuse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glusterfs-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glusterfs-rdma</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-gluster</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lftp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lftp-scripts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-25_16-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>setup</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>procps-ng</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>procps-ng-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>procps-ng-i18n</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>taglib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>taglib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>taglib-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Archive-Tar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnupg2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnupg2-smime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>http-parser</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>http-parser-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsndfile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsndfile-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsndfile-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>audiofile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>audiofile-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcgroup</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcgroup-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcgroup-pam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcgroup-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mutt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mesa-libGLw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mesa-libGLw-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_155-94_50-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_156-94_57-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_156-94_61-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_156-94_64-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-25_19-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sos-collector</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmspack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmspack-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt-assistant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt-demos</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt-devel-private</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt-odbc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt-qdbusviewer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt-qvfb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-assistant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-designer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-doctools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-linguist</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qdbusviewer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qt3d</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qt3d-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qt3d-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qt3d-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtbase</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtbase-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtbase-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtbase-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtbase-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtbase-gui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtbase-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtbase-odbc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtbase-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtbase-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtcanvas3d</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtcanvas3d-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtcanvas3d-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtconnectivity</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtconnectivity-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtconnectivity-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtconnectivity-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtdeclarative</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtdeclarative-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtdeclarative-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtdeclarative-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtdeclarative-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtdoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtgraphicaleffects</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtgraphicaleffects-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtimageformats</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtimageformats-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtlocation</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtlocation-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtlocation-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtlocation-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtmultimedia</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtmultimedia-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtmultimedia-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtmultimedia-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtquickcontrols</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtquickcontrols-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtquickcontrols-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtquickcontrols2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtquickcontrols2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtquickcontrols2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtquickcontrols2-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtscript</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtscript-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtscript-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtscript-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtsensors</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtsensors-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtsensors-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtsensors-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtserialbus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtserialbus-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtserialbus-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtserialbus-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtserialport</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtserialport-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtserialport-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtserialport-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtsvg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtsvg-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtsvg-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtsvg-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qttools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qttools-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qttools-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qttools-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qttools-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qttools-libs-designer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qttools-libs-designercomponents</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qttools-libs-help</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qttools-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qttranslations</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtwayland</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtwayland-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtwayland-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtwayland-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtwebchannel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtwebchannel-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtwebchannel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtwebchannel-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtwebsockets</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtwebsockets-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtwebsockets-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtwebsockets-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtx11extras</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtx11extras-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtx11extras-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtxmlpatterns</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtxmlpatterns-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtxmlpatterns-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtxmlpatterns-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-rpm-macros</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-ovs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>elfutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>elfutils-default-yama-scope</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>elfutils-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>elfutils-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>elfutils-libelf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>elfutils-libelf-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>elfutils-libelf-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>elfutils-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opensc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zziplib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zziplib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zziplib-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-94_41-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_3-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_6-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-25_28-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-kafka</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-mmkubernetes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_162-94_69-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_162-94_72-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-25_22-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-25_25-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudisks2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudisks2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udisks2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udisks2-iscsi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udisks2-lsm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udisks2-lvm2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-adjustbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-adjustbox-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ae-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-algorithms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-algorithms-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-amscls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-amscls-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-amsfonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-amsfonts-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-amsmath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-amsmath-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-anysize</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-anysize-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-appendix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-appendix-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-arabxetex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-arabxetex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-arphic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-arphic-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-attachfile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-attachfile-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-avantgar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babelbib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babelbib-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beamer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beamer-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bera</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bera-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beton</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beton-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bibtex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bibtex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bibtex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bibtopic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bibtopic-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bidi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bidi-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bigfoot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bigfoot-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bookman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-booktabs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-booktabs-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-breakurl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-breakurl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-caption</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-caption-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-carlisle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-carlisle-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-changebar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-changebar-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-changepage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-changepage-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-charter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-charter-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chngcntr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chngcntr-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cite-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cjk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cjk-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cm-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cm-lgc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cm-lgc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cm-super</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cm-super-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cmap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cmap-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cmextra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cns</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cns-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collectbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collectbox-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-basic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-documentation-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-fontsrecommended</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-htmlxml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-latex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-latexrecommended</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-xetex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-colortbl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-colortbl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-courier</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-crop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-crop-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-csquotes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-csquotes-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ctable</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ctable-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-currfile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-currfile-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dvipdfm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dvipdfm-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dvipdfm-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dvipdfmx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dvipdfmx-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dvipdfmx-def</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dvipdfmx-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dvipng</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dvipng-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dvipng-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dvips</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dvips-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dvips-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ec</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ec-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eepic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eepic-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-enctex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-enctex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-enumitem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-enumitem-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-epsf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-epsf-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-epstopdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-epstopdf-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-epstopdf-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eso-pic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eso-pic-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-etex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-etex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-etex-pkg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-etex-pkg-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-etoolbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-etoolbox-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-euenc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-euenc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-euler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-euler-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-euro</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-euro-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eurosym</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eurosym-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-extsizes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-extsizes-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fancybox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fancybox-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fancyhdr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fancyhdr-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fancyref</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fancyref-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fancyvrb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fancyvrb-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-filecontents</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-filecontents-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-filehook</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-filehook-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fix2col</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fix2col-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fixlatvian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fixlatvian-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-float</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-float-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fmtcount</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fmtcount-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fncychap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fncychap-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fontbook</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fontbook-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fontspec</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fontspec-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fontware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fontware-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fontwrap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fontwrap-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-footmisc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-footmisc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fp-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fpl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fpl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-framed</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-framed-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-garuda-c90</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-geometry</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-geometry-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-glyphlist</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-graphics</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-graphics-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gsftopk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gsftopk-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-helvetic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyperref</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyperref-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyph-utf8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyph-utf8-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphenat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphenat-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ifetex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ifetex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ifluatex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ifluatex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ifmtarg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ifmtarg-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ifoddpage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ifoddpage-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-iftex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-iftex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ifxetex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ifxetex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-index</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-index-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-jadetex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-jadetex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-jadetex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-jknapltx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-jknapltx-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kastrup</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kastrup-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kerkis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kerkis-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-koma-script</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kpathsea</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kpathsea-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kpathsea-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kpathsea-lib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kpathsea-lib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-l3experimental</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-l3experimental-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-l3kernel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-l3kernel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-l3packages</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-l3packages-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lastpage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lastpage-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex-bin-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex-fonts-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latexconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lettrine</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lettrine-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-listings</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-listings-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lm-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lm-math</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lm-math-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ltxmisc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lua-alt-getopt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lua-alt-getopt-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lualatex-math</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lualatex-math-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luaotfload</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luaotfload-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luaotfload-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luatex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luatex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luatex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luatexbase</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luatexbase-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-makecmds</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-makecmds-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-makeindex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-makeindex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-makeindex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-marginnote</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-marginnote-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-marvosym</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-marvosym-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mathpazo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mathpazo-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mathspec</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mathspec-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mdwtools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mdwtools-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-memoir</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-memoir-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-metafont</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-metafont-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-metalogo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-metalogo-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-metapost</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-metapost-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-metapost-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-metapost-examples-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mflogo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mflogo-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mfnfss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mfnfss-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mfware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mfware-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mh-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-microtype</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-microtype-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-misc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mnsymbol</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mnsymbol-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mparhack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mparhack-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mptopdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mptopdf-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ms-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-multido</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-multido-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-multirow</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-multirow-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-natbib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-natbib-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ncctools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ncctools-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ncntrsbk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-norasi-c90</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ntgclass</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ntgclass-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-oberdiek</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-oberdiek-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-overpic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-overpic-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-palatino</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-paralist</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-paralist-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-parallel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-parallel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-parskip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-parskip-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-passivetex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdfpages</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdfpages-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdftex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdftex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdftex-def</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdftex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pgf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pgf-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-philokalia</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-philokalia-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-placeins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-placeins-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-plain</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-polyglossia</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-polyglossia-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-powerdot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-powerdot-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-preprint</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-preprint-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-psfrag</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-psfrag-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pslatex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-psnfss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-psnfss-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pspicture</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pspicture-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-3d</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-3d-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-blur</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-blur-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-coil</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-coil-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-eps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-eps-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-fill</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-fill-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-grad</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-grad-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-math</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-math-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-node</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-node-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-plot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-plot-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-slpe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-slpe-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-text</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-text-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-tree</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-tree-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pstricks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pstricks-add</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pstricks-add-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pstricks-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ptext</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ptext-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pxfonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pxfonts-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-qstest</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-qstest-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rcs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rcs-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-realscripts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-realscripts-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rotating</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rotating-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rsfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rsfs-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sansmath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sansmath-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sauerj</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sauerj-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-scheme-basic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-section</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-section-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sectsty</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sectsty-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-seminar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-seminar-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sepnum</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sepnum-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-setspace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-setspace-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-showexpl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-showexpl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-soul</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-soul-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-stmaryrd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-stmaryrd-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-subfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-subfig-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-subfigure</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-subfigure-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-svn-prov</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-svn-prov-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-symbol</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-t2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-t2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tetex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tetex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tetex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tex-gyre</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tex-gyre-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tex-gyre-math</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tex-gyre-math-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tex4ht</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tex4ht-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tex4ht-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texconfig-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texlive.infra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texlive.infra-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texlive.infra-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-textcase</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-textcase-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-textpos</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-textpos-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-thailatex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-thailatex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-threeparttable</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-threeparttable-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-thumbpdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-thumbpdf-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-thumbpdf-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-times</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tipa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tipa-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-titlesec</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-titlesec-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-titling</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-titling-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tocloft</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tocloft-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tools-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-txfonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-txfonts-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-type1cm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-type1cm-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-typehtml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-typehtml-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ucharclasses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ucharclasses-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ucs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ucs-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uhc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uhc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ulem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ulem-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-underscore</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-underscore-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-unicode-math</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-unicode-math-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-unisugar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-unisugar-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-url</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-url-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-utopia</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-utopia-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-varwidth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-varwidth-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-wadalab</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-wadalab-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-was</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-was-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-wasy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-wasy-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-wasysym</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-wasysym-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-wrapfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-wrapfig-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xcolor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xcolor-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xdvi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xdvi-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xecjk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xecjk-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xecolor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xecolor-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xecyr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xecyr-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xeindex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xeindex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xepersian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xepersian-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xesearch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xesearch-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xetex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xetex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xetex-def</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xetex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xetex-itrans</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xetex-itrans-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xetex-pstricks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xetex-pstricks-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xetex-tibetan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xetex-tibetan-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xetexconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xetexfontinfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xetexfontinfo-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xifthen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xifthen-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xkeyval</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xkeyval-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xltxtra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xltxtra-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xmltex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xmltex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xmltex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xstring</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xstring-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xtab</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xtab-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xunicode</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xunicode-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-zapfchan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-zapfding</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-gnome-keyring</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-instaweb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-requests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-CPAN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-ExtUtils-CBuilder</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-ExtUtils-Embed</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-ExtUtils-Install</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-IO-Zlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Locale-Maketext-Simple</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Module-CoreList</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Module-Loaded</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Object-Accessor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Package-Constants</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Pod-Escapes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Time-Piece</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-macros</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-tests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-gettext</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gettext</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gettext-common-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gettext-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gettext-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>keepalived</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>uriparser</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>uriparser-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwpd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwpd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwpd-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwpd-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-urllib3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-virtualenv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-pip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsolv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsolv-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsolv-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsolv-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-solv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-idle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-tkinter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebp-java</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebp-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_68-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_71-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_74-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_77-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_80-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_83-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_66-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_69-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_72-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_75-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_78-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-demo-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-devel-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-headless</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-headless-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-javadoc-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-javadoc-zip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-javadoc-zip-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-jmods</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-jmods-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-src-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbis-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbis-devel-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcab</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcab1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcab1-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>quagga</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>quagga-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>quagga-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-export-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-export-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkdcraw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkdcraw-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kcm_colors</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde-settings</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde-settings-ksplash</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde-settings-minimal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde-settings-plasma</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde-settings-pulseaudio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde-style-oxygen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde-workspace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde-workspace-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde-workspace-ksplash-themes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde-workspace-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdeclassic-cursor-theme</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgreeter-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>khotkeys</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>khotkeys-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kinfocenter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kmag</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kmenuedit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ksysguard</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ksysguard-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ksysguardd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kwin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kwin-gles</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kwin-gles-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kwin-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkworkspace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>oxygen-cursor-themes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plasma-scriptengine-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plasma-scriptengine-ruby</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt-settings</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtuoso-opensource</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtuoso-opensource-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unixODBC</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unixODBC-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>compat-libtiff3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slf4j</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slf4j-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slf4j-manual</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freerdp-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-beanutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-beanutils-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-aliyun</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-all</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-amt-ws</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-apc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-apc-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-aws</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-azure-arm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-bladecenter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-brocade</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-cisco-mds</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-cisco-ucs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-compute</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-drac5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-eaton-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-emerson</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-eps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-gce</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-heuristics-ping</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-hpblade</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-ibmblade</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-ifmib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-ilo-moonshot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-ilo-mp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-ilo-ssh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-ilo2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-intelmodular</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-ipdu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-ipmilan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-kdump</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-mpath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-redfish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-rhevm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-rsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-rsb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-sbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-scsi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-virsh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-vmware-rest</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-vmware-soap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-wti</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icedtea-web</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icedtea-web-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icedtea-web-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_13-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_16-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_14-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_17-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_175-94_79-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_176-94_88-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_178-94_91-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_180-94_97-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot-pigeonhole</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibus-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibus-devel-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibus-gtk2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibus-gtk3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibus-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibus-pygtk2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibus-setup</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-tests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mod_auth_mellon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mod_auth_mellon-diagnostics</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>SDL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>SDL-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>SDL-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jss-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nbdkit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nbdkit-basic-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nbdkit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nbdkit-example-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nbdkit-plugin-python-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nbdkit-plugin-python2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nbdkit-plugin-vddk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ksh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hunspell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hunspell-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_54-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_52-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-pillow</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-pillow-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-pillow-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-pillow-qt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-pillow-sane</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-pillow-tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-reportlab</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-reportlab-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librabbitmq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librabbitmq-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librabbitmq-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-conf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-export-pcp2elasticsearch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-export-pcp2graphite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-export-pcp2influxdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-export-pcp2json</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-export-pcp2spark</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-export-pcp2xml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-export-pcp2zabbix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-export-zabbix-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-gui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-import-collectl2pcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-import-ganglia2pcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-import-iostat2pcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-import-mrtg2pcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-import-sar2pcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-libs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-manager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-activemq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-apache</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-bash</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-bcc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-bind2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-bonding</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-cifs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-cisco</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-dbping</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-dm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-docker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-ds389</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-ds389log</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-elasticsearch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-gfs2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-gluster</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-gpfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-gpsd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-haproxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-infiniband</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-json</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-libvirt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-lio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-lmsensors</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-logger</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-lustre</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-lustrecomm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-mailq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-memcache</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-mic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-mounts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-named</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-netfilter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-news</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-nfsclient</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-nginx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-nvidia-gpu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-oracle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-pdns</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-perfevent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-postfix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-prometheus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-redis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-roomtemp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-rpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-rsyslog</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-samba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-sendmail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-shping</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-slurm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-smart</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-summary</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-systemd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-trace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-unbound</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-vmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-weblog</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-zimbra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-zswap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-selinux</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-system-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-testsuite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-webapi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-webapp-blinkenlights</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-webapp-grafana</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-webapp-graphite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-webapp-vector</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-webjs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-zeroconf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-PCP-LogImport</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-PCP-LogSummary</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-PCP-MMV</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-PCP-PMDA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-pcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwsman-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwsman1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openwsman-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openwsman-perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openwsman-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openwsman-ruby</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openwsman-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>LibRaw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>LibRaw-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>LibRaw-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>colord</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>colord-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>colord-devel-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>colord-extra-profiles</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>colord-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-extension-disable-screenshield</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-extension-extra-osk-keys</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-extension-horizontal-workspaces</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-extension-window-grouper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcanberra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcanberra-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcanberra-gtk2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcanberra-gtk3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>shared-mime-info</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tracker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tracker-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tracker-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tracker-needle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tracker-preferences</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xchat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xchat-tcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>e2fsprogs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>e2fsprogs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>e2fsprogs-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>e2fsprogs-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcom_err</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcom_err-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libss-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>advancecomp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexif</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexif-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexif-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs-winsupport</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_57-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_60-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_55-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_58-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_63-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_65-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_23-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_26-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_29-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_32-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_37-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_41-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_46-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_51-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_54-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_45-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_48-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_51-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_56-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_61-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_64-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_67-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_72-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_75-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-22-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_12-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_15-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_9-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_24-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_29-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_34-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_37-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_43-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>telnet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>telnet-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-lpar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>resource-agents</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>resource-agents-aliyun</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenEXR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenEXR-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenEXR-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-jdbc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-jdbc-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>targetcli</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-rtslib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-rtslib-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librepo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librepo-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-librepo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-efi-ia32</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-efi-ia32-cdboot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-efi-ia32-modules</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-efi-x64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-efi-x64-cdboot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-efi-x64-modules</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-pc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-pc-modules</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-tools-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-tools-minimal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-static-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_60-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_63-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_83-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_86-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_49-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_52-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-57-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xstream-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_57-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_78-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-pear</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_46-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_66-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_53_4-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_71-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_74-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_77-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_89-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_92-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_61-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_64-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_67-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_102-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_105-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_88-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_93-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_96-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_99-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_103-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_106-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_110-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_113-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_116-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_121-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_124-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_127-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_130-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_88-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_91-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_98-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150000_150_89-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150000_150_92-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150000_150_95-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150000_150_98-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_83-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_86-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_111-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_114-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_117-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_120-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_102-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_105-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_108-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_112-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_115-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_126-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_102-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_107-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_83-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_86-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_93-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_96-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_99-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_43-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_46-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_49-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_54-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_60-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_63-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_68-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_71-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_76-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_87-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-59_24-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-59_27-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-59_34-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-59_37-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-59_40-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_22-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_11-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_18-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_80-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_83-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_99-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_70-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_75-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_78-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-59_10-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-59_13-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-59_16-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-59_19-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-59_5-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bmc-snmp-proxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>exchange-bmc-os-info</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipmitool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fontforge</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fontforge-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openjpeg2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openjpeg2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openjpeg2-devel-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openjpeg2-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ppp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ppp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-plugin-systemd-inhibit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>screen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xterm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lasso</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lasso-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lasso-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>compat-exiv2-026</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>linuxptp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_129-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_134-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_90-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_93-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_98-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_21-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_28-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_33-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aide</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gegl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gegl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_162-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_165-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_173-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_176-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_179-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_183-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_186-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_189-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_194-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_201-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_216-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_154-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_157-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_160-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_163-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_166-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_169-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_172-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_175-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_178-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_183-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_188-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_124-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_127-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_130-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_133-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_138-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_141-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_144-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_147-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_150-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_153-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_158-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_161-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_191-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_194-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_197-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_164-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_167-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_36-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_39-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_44-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_49-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_52-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_59-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_62-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_65-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_68-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_73-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_100-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_103-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_108-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_111-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_116-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_119-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_122-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_125-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_88-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_92-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_97-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_28-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_31-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gzip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xz-compat-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xz-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xz-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xz-lzma-compat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-gs2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-gssapi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-lib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-md5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-ntlm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-plain</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-scram</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-sql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apr-util</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apr-util-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apr-util-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apr-util-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apr-util-nss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apr-util-odbc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apr-util-openssl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apr-util-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apr-util-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_101-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsync</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>open-vm-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>open-vm-tools-desktop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>open-vm-tools-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>open-vm-tools-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_108-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_111-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_133-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_136-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_123-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_126-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libksba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libksba-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150000_150_101-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150000_150_104-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pesign</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_114-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_139-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_144-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_131-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_139-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hsqldb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hsqldb-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hsqldb-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hsqldb-manual</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>device-mapper-multipath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>device-mapper-multipath-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>device-mapper-multipath-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>device-mapper-multipath-sysvinit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kpartx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdmmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdmmp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bcel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bcel-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_38-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_142-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_145-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_106-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_109-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_112-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_115-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_159-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_151-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_121-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_60-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_63-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_66-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_69-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_74-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_81-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_11-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_53-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_12-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_19-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_7-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_219-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_222-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_225-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_228-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_170-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_174-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_128-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_133-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_80-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_231-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_179-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_136-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_83-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_234-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_237-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_244-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_247-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_250-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_182-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_185-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_188-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_195-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_198-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_141-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_144-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_147-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_150-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_153-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_158-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_88-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_91-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_94-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_97-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_255-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_258-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_261-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_266-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_269-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_272-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_161-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_164-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_167-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_170-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_173-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_176-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_201-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_204-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_207-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_211-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_215-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_218-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_100-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_103-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_110-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_113-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_116-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_121-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_275-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_179-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_124-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_221-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_280-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_283-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_290-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_184-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_187-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_127-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_130-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_133-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_41-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_147-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_15_11-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_46-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_55-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_117-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_134-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_150-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_153-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_156-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_137-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_142-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_145-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_148-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_118-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_120-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_157-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_148-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_151-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_154-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_160-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_165-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_168-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iwlax2xx-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_125-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>c-ares</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>c-ares-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iperf3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iperf3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mokutil</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>shim-ia32</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>shim-x64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-dyndb-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150600_21-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150600_23_14-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150600_23_17-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150600_23_22-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150600_23_7-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150600_8-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150600_23_30-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150600_23_33-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150600_23_38-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150600_23_42-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150600_23_47-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150600_23_50-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150600_23_53-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150600_23_60-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150600_23_65-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150600_23_70-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150600_23_73-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150700_5-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150700_51-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150700_53_11-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150700_53_16-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150700_53_19-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150700_53_3-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150700_53_6-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_293-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker-logrotate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker-lvm-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker-novolume-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker-v1.10-migrator</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>runc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>less</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-idna</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_200-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150600_23_25-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tuned</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tuned-gtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tuned-profiles-atomic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tuned-profiles-compat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tuned-profiles-cpu-partitioning</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tuned-profiles-mssql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tuned-profiles-oracle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tuned-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tuned-utils-systemtap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>raptor2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>raptor2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-setuptools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-setuptools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-static-libs-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_136-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150600_23_78-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150700_53_22-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150600_23_81-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150700_53_25-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-FCGI</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>konsole</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>konsole-part</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-btrfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-btrfs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-crypto</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-crypto-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-dm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-dm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-fs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-fs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-kbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-kbd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-loop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-loop-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-lvm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-lvm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-mdraid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-mdraid-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-mpath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-mpath-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-nvdimm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-nvdimm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-part</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-part-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-plugins-all</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-swap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-swap-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-utils-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-vdo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-vdo-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-blockdev</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150600_23_84-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150700_53_28-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150600_23_87-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150700_53_31-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_194-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-pyasn1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-pyasn1-modules</name>
	</rpminfo_object>
</objects>
<states>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.5-12.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0.35-1.13.7.1.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.79-2.5.5.1.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.79-2.5.5.1.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.45-30.b13.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.45-30.b13.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1e-34.el7_0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1e-34.el7_0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.0-18.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-327.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-327.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.33-5.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13-2.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.2-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.8-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.19.1-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.5-34.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.5-34.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.4-11.20101004cvs.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-123.13.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-123.13.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.0-17.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-60.el7_0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-60.el7_0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.42-5.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-514.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-514.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.6-18.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.6-18.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.07-20.el7_3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.07-20.el7_3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.07-20.el7_3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.6-31.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.6-31.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11-4.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11-4.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.11.1-18.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.11.1-18.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.11.1-18.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.16-23.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17-105.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17-105.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.38-44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.39-47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.43-52.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.44-52.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.44-52.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.48-52.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.49-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-14.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.51-52.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.51-52.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.51-52.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.51-60.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.51-60.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.53-60.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.57-60.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.59-60.41.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.59-60.45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.59-60.45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.42-6.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.42-8.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.1-35.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.1-35.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1-29.el7_0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1-29.el7_0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-123.6.3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-123.6.3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-5.el7_1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-5.el7_1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-123.1.2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-123.1.2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-123.4.2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-123.4.2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.11-31.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.11-31.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.11-31.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.7-2.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8e-29.el7_0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.54-2.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4-12.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.37-1.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.37-1.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0.0-6.1.13.3.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.55-2.4.7.2.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.55-2.4.7.2.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17-55.el7_0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17-55.el7_0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.2-31.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16.2-2.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16.2-1.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16.2-2.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16.2-7.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16.2-7.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.2.0-3.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.2.0-1.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.3.0-3.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.40-1.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.40-1.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.16-23.el7_0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6.1p1-11.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.3-9.11.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-60.el7_0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-60.el7_0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.18-9.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.18-9.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3-5.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3-5.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.5-3.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.1-22.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1e-34.el7_0.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1e-34.el7_0.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.14-7.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.14-7.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.1-37.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.1-37.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.7.2-24.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.7.2-24.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0.34-1.13.6.1.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.75-2.5.4.2.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.75-2.5.4.2.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1e-34.el7_0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1e-34.el7_0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5-5.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1-16.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.8-12.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-123.9.2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-123.9.2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.29.0-25.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.29.0-25.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-60.el7_0.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-60.el7_0.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.22-34.el7_0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1-29.el7_0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1-29.el7_0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.7-7.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-86.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-86.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-5.el7_0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-5.el7_0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.16-23.el7_0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0-13.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.32-33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.32-33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-229.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-229.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.11-5.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.11-5.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-123.8.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-123.8.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-123.20.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-123.20.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.35-15.el7_0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.35-15.el7_0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.2-14.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.2-14.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-123.4.4.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-123.4.4.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14-10.el7_0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0.353-22.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0.353-22.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0.353-22.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-22.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.2-22.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.7-22.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.2-22.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-22.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.6-22.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.0-22.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.14-22.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.103.0-10.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.103.0-10.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.2-10.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.2-10.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17-78.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17-78.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.9-9.el7_0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.5-8.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.5-8.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.5-8.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.2-3.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.45-5.el7_0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.3-12.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.3-12.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0.33-1.13.5.0.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.71-2.5.3.1.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.71-2.5.3.1.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.41-2.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.41-2.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.4-12.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.4-12.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.0-6.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.0-6.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.4-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.4-16.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.54-8.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17-55.el7_0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17-55.el7_0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.36-38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.36-38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1-29.el7_0.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1-29.el7_0.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-693.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-693.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.0-7.el7_0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.0-7.el7_0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.0-7.el7_0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.3.1-13.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.8-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.8-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3-25.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3-25.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.8-16.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.8-16.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.1-26.el7_0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.1-26.el7_0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0-15.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.16-36.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.1-26.el7_0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.1-26.el7_0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-7.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-10.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.39-47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-229.1.2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-229.1.2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.10-2.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.10-2.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.7-54.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1e-42.el7_1.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1e-42.el7_1.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.2-11.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.2-11.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.2-11.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.1-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.1-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.23.52.0.1-55.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.23.52.0.1-55.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4-14.el7_0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4-14.el7_0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4-14.el7_0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-229.20.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-229.20.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.18-10.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.18-10.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.20-26.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.20-26.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.4.0-1.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.14-7.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.14-7.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0-5.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0-5.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.32-14.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.32-14.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11-24.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.4-11.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.10-5.7.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.10-5.7.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.6p5-19.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.6p5-19.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.6p5-22.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.6p5-22.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-123.13.2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-123.13.2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.5-58.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.5-58.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17-222.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17-222.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-229.7.2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-229.7.2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.1-4.el7_9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-229.14.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-229.14.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.11-10.el7_1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.11-10.el7_1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-17.el7_1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-17.el7_1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-17.el7_1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-229.11.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-229.11.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17-196.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17-196.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3.1-11.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3.1-11.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1e-42.el7_1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1e-42.el7_1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17-55.el7_0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17-55.el7_0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.1-38.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.1-38.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.14-7.el7_1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.14-7.el7_1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.1-7.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.1-7.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.2-14.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.0-33.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.0-33.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.0-33.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.0-5.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.7-19.el7_1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.0-8.git20130913.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.0-8.git20130913.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.6-27.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.6-27.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.6-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.6-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.6-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.0-18.el7_1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.54-3.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8e-29.el7_2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.44-1.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.44-1.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.0-3.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.6.0-2.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.6.0-1.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.5.3-3.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.5.0-2.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.5.0-2.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.5.0-1.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.8.4-41.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.20-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4-18.el7_1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4-18.el7_1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4-18.el7_1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-86.el7_1.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-86.el7_1.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3-10.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3-10.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.7-3.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.43-52.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.17-4.1.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.el7_2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.el7_2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.1-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.137-13.el7_1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.3.1-16.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0-17.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.13-10.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.13-10.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.11-22.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.11-22.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.11-22.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.11-23.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.11-23.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.32-15.el7_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.32-15.el7_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0.36-1.13.8.1.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.85-2.6.1.2.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.85-2.6.1.2.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.51-1.b16.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.51-1.b16.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.92-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.16.1-5.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.7.0-1.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-11.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.1.0-1.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.8.0-1.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16.2.3-13.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.15-21.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-5.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.49-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.13-1.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.13-1.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.6-31.el7_1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.6-31.el7_1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1e-51.el7_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1e-51.el7_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1e-51.el7_2.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1e-51.el7_2.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12-10.1.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.4-12.el7_1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.4-12.el7_1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-86.el7_1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-86.el7_1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.3-11.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.3-11.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.20-1.el7_2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.20-1.el7_2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.3-11.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.143-15.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.8-12.el7_1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15-5.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.60-7.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.60-7.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.4-9.el7_1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.0-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.112-6.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.112-6.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.35-21.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.35-21.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.40-8.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.40-8.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.4-4.el7_1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-229.4.2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-229.4.2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.17-6.el7_1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.17-6.el7_1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.17-6.el7_1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.8-26.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-86.el7_1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-86.el7_1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.19.1-3.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.19.1-3.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.19.1-1.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1e-42.el7_1.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1e-42.el7_1.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.2.0-4.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.2.0-1.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.2-5.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.1.1-1.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.2.1-1.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.3.0-2.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.3.0-1.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.4.0-1.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.4.0-1.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4-18.el7_1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4-18.el7_1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4-18.el7_1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0.37-1.13.9.4.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.91-2.6.2.1.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.91-2.6.2.1.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.65-2.b17.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.65-2.b17.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.47-1.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.47-1.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.95-2.6.4.0.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.95-2.6.4.0.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-327.10.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-327.10.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-10.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-10.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-86.el7_1.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-86.el7_1.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.69-10.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.137-13.el7_1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.6p5-25.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.6p5-25.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.1-30.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.1-30.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17-106.el7_2.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17-106.el7_2.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.4-9.el7_1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.11-35.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.11-35.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.11-35.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.11-31.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.11-31.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17-106.el7_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17-106.el7_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02-0.29.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.14-1.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.14-1.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.0-40.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.0-40.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.0-40.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.6p5-19.el7_1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.6p5-19.el7_1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-327.3.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-327.3.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.10-6.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.10-6.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.0-15.el7_2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.25-1.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.25-1.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.5-1.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.8-1.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.26-1.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0-10.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0-10.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0-10.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.26-1.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.10-6.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.8-1.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4-18.el7_1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4-18.el7_1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4-18.el7_1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6.1p1-22.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.3-9.22.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.7.2-20.el7_1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.7.2-20.el7_1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.44-52.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4-18.el7_1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4-18.el7_1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4-18.el7_1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.39-7.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.39-7.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.8-2.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.19.1-7.el7_1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.19.1-7.el7_1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.19.1-4.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.5.0-3.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.5.0-1.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.0-33.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.22.3-11.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.22.3-4.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.1-22.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2-35.el7_2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.3-12.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.3-12.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.3-12.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.8-14.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.8-14.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.71-2.b15.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.71-2.b15.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.19.1-19.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.19.1-19.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1e-51.el7_2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1e-51.el7_2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.50-7.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4-29.el7_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4-29.el7_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4-29.el7_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.51-60.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.el7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.el7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.13-7.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.6p5-22.el7_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.6p5-22.el7_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6.1p1-31.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.3-9.31.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02-0.33.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.51-60.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-693.17.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-693.17.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.2-12.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.2-12.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-8.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-327.28.2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-327.28.2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4-29.el7_2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4-29.el7_2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4-29.el7_2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-11.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.53-60.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-327.22.2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-327.22.2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.1-8.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-957.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-957.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.26.5-16.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.26.5-16.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.32.7-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.32.7-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.01.0-22.7.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3-27.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3-27.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.7.8.9-15.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.7.8.9-15.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.2-10.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.2-10.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.8-5.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.8-5.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.91-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.3.0-10.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.0-8.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.99.917-28.20180530.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.5-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.5-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.15-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.4-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.3-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.91-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.2-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1-0.8.git5baa1e5.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.7-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.30-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.30-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:18.0.5-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:18.0.5-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0-13.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0-13.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.73.0-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.73.0-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:18.0.1-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.7-1.el7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.6-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.6-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.0-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.99.917-28.20180530.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.27.1-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.27.1-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.2-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.2-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.15-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.0-3.el7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.5-4.el7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.0-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.0-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.0-49.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.0-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.1.0-1.el7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.2.1-1.el7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.1-2.el7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.36.1-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.36.1-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.5-21.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2018.4-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.1-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.1-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.1-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.5-23.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.7-14.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.7-14.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1127.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1127.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.10-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.10-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.50-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.50-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.0-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7-20180614.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26.2-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.0-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.1-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.0-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.2-5.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.2-5.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.12-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.0-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.0-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.26-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.23-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.1-4.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.1-4.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.28.0-4.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.1-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.1-8.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.13-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.3-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.2-5.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.2-5.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.5-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.5-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.5-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.5-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.5-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.5-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.3-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.3-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.1-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.4-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.13.0-4.3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.13.0-4.3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8-12.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8-12.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.8-4.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12-5.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.36.12-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.36.12-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.2-9.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.1-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.8-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.8-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.26.0-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.52.3-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.52.3-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.22.1-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.22.1-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.56.1-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.56.1-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.56.1-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.56.1-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.56.1-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.56.0-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.56.0-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.2-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.2-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.1-5.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.2-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.2-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.26.1-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.3-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.2-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.26.0-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.1-5.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.1-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.3-6.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.2-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.1-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.56.1-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.56.1-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.3-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20180508-4.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.6-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.7-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.0-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.4-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.4-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.4-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.28-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.22.30-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.22.30-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.24.8-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.24.8-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.4-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2-5.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2-5.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.5-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.5-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.36.2-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.36.2-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.5-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.8-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.16-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.16-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.12-4.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.17.9-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.20.1-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.0-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.8-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.26.0-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.4-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.38.0-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.0-4.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.0-4.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.3-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.3-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.90-6.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.90-6.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.4-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.4-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.0-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.0-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.0-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.40.20-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.40.20-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.18.6-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.62.2-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.0-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.24.1-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.9.0-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.3-4.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.26.3.1-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.6-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20180531-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.42.4-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.42.4-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.26.5-20.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.26.5-20.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.8-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26.0-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.1-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.2-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.92-11.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.28.4-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.26.2-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.26.1-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.7-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.7-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.40.8-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.40.8-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.22.0-7.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.52.2-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.52.2-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.0-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.20.5-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.20.5-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0.38-1.13.10.0.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.46-28.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.99-2.6.5.0.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.99-2.6.5.0.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.77-0.b03.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.77-0.b03.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.50-1.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.50-1.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0.39-1.13.11.0.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.101-2.6.6.1.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.101-2.6.6.1.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.91-0.b14.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.91-0.b14.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-10.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.152-10.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-327.4.5.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-327.4.5.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.1-8.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.1-8.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.6-45.el7_3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.6-45.el7_3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.4.0-26.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.4-15.el7_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-327.18.2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-327.18.2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.76-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.0-12.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.0-12.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.0-12.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.4-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.28-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.28-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.0-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.0-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.15-1.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.15-1.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6.1p1-23.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.3-9.23.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3-10.el7_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3-10.el7_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1e-51.el7_2.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1e-51.el7_2.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.5-38.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.5-38.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.1.0-5.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.20-2.el7_3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4p1-11.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.3-1.11.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.21-69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.21-81.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.21-84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.21-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.38-93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.38-93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.74-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.9-9.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.5-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.5-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.13-4.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.14-8.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.2-6.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.3-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.1-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.9-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.12-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.1-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.10-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.5-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.3-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.11-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.10-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.4-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.74-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.1-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.6-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.6-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.3-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.24-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.24-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.1-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.9-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.1-6.20170307.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.1-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.1-6.20170307.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.39.1-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.39.1-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.20-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.7-20.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.16-43.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.1.0-1.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.18-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.3-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.23-23.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.23-23.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.31-13.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.31-13.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.4-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.4-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.4-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.26-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.26-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.26-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.4-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.4-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-514.21.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-514.21.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.5-4.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.1-11.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17-292.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17-292.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.2-3.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.160-1.el7_3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4-29.el7_2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4-29.el7_2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4-29.el7_2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.6.1-1.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.6-1.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.6p5-22.el7_2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.6p5-22.el7_2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.57-60.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-105.el7_2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-105.el7_2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.el7_2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.el7_2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6.1p1-25.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.3-9.25.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.6.0-1.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.6.0-1.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.19.1-9.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.7.0-1.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.7.0-1.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.11.0-1.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.21.0-9.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16.2.3-14.2.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.21.0-9.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.21.0-2.2.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-126.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.10-7.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.10-7.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.10-7.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.16-17.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.16-17.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.16-17.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4-13.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4-13.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4-13.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1e-51.el7_2.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1e-51.el7_2.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.5-69.el7_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.5-69.el7_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3.1-6.el7_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3.1-6.el7_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.20-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5-47.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5-47.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4-29.el7_2.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4-29.el7_2.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4-29.el7_2.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.1.0-1.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.8.0-1.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.2.0-1.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.2-1.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.3.0-1.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.21.3-2.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.21.3-2.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.21.3-1.1.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.3.0-1.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-126.el7_3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-6.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17-157.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17-157.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.14-7.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.1-26.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.1-26.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-327.36.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-327.36.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3-32.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3-32.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0.40-1.13.12.5.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.111-2.6.7.2.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.111-2.6.7.2.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.101-3.b13.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.101-3.b13.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.52-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.52-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.90-8.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.90-8.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-862.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-862.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2-6.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-105.el7_2.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-105.el7_2.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.7.8.9-13.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.7.8.9-13.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-141.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.8-26.el7_2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.24-4.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.59-2.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.1-9.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.1-9.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.el7_9.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.el7_9.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14-13.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.5.10-11.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.16-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.16-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.2-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-17.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.59-60.41.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.3-9.el7_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.23.2-33.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.23.2-33.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-105.el7_2.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-105.el7_2.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.1-16.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.1-16.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-20.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.62-60.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-5.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.62-60.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-327.36.3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-327.36.3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.4.0-1.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.4.0-1.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.5.0-1.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.5.0-1.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15-8.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.95-10.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.95-10.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.16-36.3.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-1.el7_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-1.el7_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.6-40.el7_2.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.6-40.el7_2.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.16-42.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.0-15.el7_2.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.3.2-8.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.29.0-35.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.29.0-35.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.18-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.18-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0.41-1.13.13.1.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.121-2.6.8.0.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.121-2.6.8.0.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.111-1.b15.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.111-1.b15.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.131-2.6.9.0.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.131-2.6.9.0.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.121-0.b13.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.121-0.b13.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.121-0.b13.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.5-48.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.5-48.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.35-27.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.35-27.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.5.0-1.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-13.el7_3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-9.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.62-60.64.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.62-60.64.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.56-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.56-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.9-8.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.69-11.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-514.6.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-514.6.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.15-30.el7_9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-14.el7_3.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-14.el7_3.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.6p7-21.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.6p7-21.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.15-11.el7_3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.15-11.el7_3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-327.36.2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-327.36.2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.6-4.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.6p7-20.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.6p7-20.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-23.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.29.0-42.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.29.0-42.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.6p5-25.el7_3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.6p5-25.el7_3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.26-9.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.26-9.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5-9.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5-9.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:219-30.el7_3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:219-30.el7_3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.15-11.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.15-11.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-693.5.2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-693.5.2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1e-60.el7_3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1e-60.el7_3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-514.10.2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-514.10.2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.67-60.64.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.21-81.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-13.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-514.16.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-514.16.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.15-10.el7_3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.15-10.el7_3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4-38.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4-38.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4-38.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.5.1-1.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.5.1-1.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4-38.el7_3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4-38.el7_3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4-38.el7_3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.1-33.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.1-33.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.23-22.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.23-22.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.5-6.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.67-60.64.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.21-84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.4-20.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-126.el7_3.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.31-12.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.31-12.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.5-3.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.7-21.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.6.0-1.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.6.0-1.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0-8.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0-8.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0-9.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0-9.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0-9.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.4-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.28-4.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.28-4.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.103-6.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.103-6.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.82-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.82-6.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.82-6.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.92-6.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.92-6.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.92-6.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0.648-33.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0.648-33.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0.648-33.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-33.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.2-33.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.7-33.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.2-33.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-33.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.6-33.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.0-33.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.14.1-33.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.20-7.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.22.1-5.2.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.22.1-5.2.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-18.10.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.49-92.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.49-92.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.59-92.17.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.59-92.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.59-92.24.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.74-92.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.74-92.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.74-92.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.74-92.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.74-92.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-8.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3.1-12.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3.1-12.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.44-4.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.44-4.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-18.13.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.74-92.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.82-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-693.2.2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-693.2.2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.29.0-42.el7_4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.29.0-42.el7_4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-21.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.59-92.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-514.21.2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-514.21.2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17-157.el7_3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17-157.el7_3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.6p7-22.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.6p7-22.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.6p7-23.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.6p7-23.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-693.11.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-693.11.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.90-92.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.90-92.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.92-6.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-120.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-21.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.9.10.68-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.9.10.68-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.31.1-38.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.3-23.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:24.3-23.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.92.2-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.151-2.6.11.1.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.151-2.6.11.1.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.141-1.b16.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.141-1.b16.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.141-1.b16.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.161-2.6.12.0.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.161-2.6.12.0.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.60-1.el7_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.60-1.el7_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.151-1.b12.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.151-1.b12.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.59-92.24.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-141.el7_4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.13-8.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.13-8.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.1-18.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.1-18.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.82-6.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-862.6.3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-862.6.3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.5-28.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.5-28.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.2-11.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.2-11.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.2-11.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.23-3.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.23-3.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.2-50.el7_4.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.2-50.el7_4.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.2-50.el7_4.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-693.21.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-693.21.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.8-3.el7_4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.76-3.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.13-8.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-5.el7_4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14-15.el7_4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.114-94.11.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.114-94.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-862.11.6.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-862.11.6.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-156.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-141.el7_4.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.3-20.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:24.3-20.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.76-2.el7_4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.2-12.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.2-12.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.22.3-4.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.2-12.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.2-12.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.2-12.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.4-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.2-12.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.2-12.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.2-12.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.15-5.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.6.1-26.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.6.1-28.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.21-69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.0-4.el7_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.6-93.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.6-93.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.6-95.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.6-95.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4p1-16.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.3-2.16.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.2.0-1.el7_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.2.1-4.el7_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.22-36.el7_4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-862.2.3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-862.2.3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17-260.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17-260.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.103-92.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.103-92.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.90-92.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.90-92.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.27.0-2.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.27.0-2.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.27.0-2.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0.648-36.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0.648-36.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0.648-36.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-36.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.2-36.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.7-36.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.2-36.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-36.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.6-36.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.0-36.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.14.1-36.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-7.el7_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-7.el7_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.4.1-7.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-51.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-51.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-51.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.92-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.0-9.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-25.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-25.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1127.8.2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1127.8.2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.9-14.el7_8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-514.26.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-514.26.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-14.el7_3.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-14.el7_3.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-126.el7_3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.23.2-33.el7_3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.23.2-33.el7_3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-18.7.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.49-92.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.5.10-20.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.56.0-4.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4-38.el7_3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4-38.el7_3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4-38.el7_3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4-38.el7_3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4-38.el7_3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4-38.el7_3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4-50.el7_3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4-50.el7_3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4-50.el7_3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5-58.el7_4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5-58.el7_4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4-51.el7_4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4-51.el7_4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4-51.el7_4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.6-67.el7_4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.6-67.el7_4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.141-2.6.10.1.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.141-2.6.10.1.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.131-2.b11.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.131-2.b11.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.131-2.b11.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2k-16.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2k-16.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2k-12.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2k-12.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.31.3-1.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.7.0-1.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.7.0-1.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.0-4.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.8.0-1.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.0-5.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.1.0-2.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.4-1.0.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.4-1.0.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.2.0-1.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.2.0-1.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.17-16.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.69-12.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:39.31.5.1-58.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:18.168.6.1-58.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:22.0.7.0-58.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:15.32.2.9-58.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:228.61.2.24-58.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.83.5.1_1-58.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.24.2.2-58.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.221.4.1-58.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:17.168.5.3-58.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:17.168.5.2-58.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:41.28.5.1-58.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-693.11.6.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-693.11.6.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.0-14.el7_4.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.0-14.el7_4.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20170606-58.gitc990aae.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1-22.5.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-141.el7_4.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20180508-6.gitee3198e672e2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.0-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.0-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.67-60.64.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.69-60.64.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-11.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.8-5.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-514.6.2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-514.6.2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.6p5-28.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.6p5-28.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.31-20.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.31-20.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.69-60.64.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.07-28.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.07-28.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.07-28.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.69-60.64.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.49-92.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.21-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.21-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.8-30.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4-14.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4-14.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4-14.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.4-1.2.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.4-1.2.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.8-2.el7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.74-92.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.73-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-2.3.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.73-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-693.1.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-693.1.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.4.1-11.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.4.1-11.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.23-1.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.23-1.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.0-2.el7_4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.0-2.el7_4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-126.el7_3.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.3.0-2.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.3.0-1.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.1.0-4.el7_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.10-1.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.4.0-1.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.4.0-2.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.4-12.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.4-12.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.5.0-1.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.5.0-1.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.5.2-1.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.5.1-1.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.16-43.el7_4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.07-20.el7_3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.07-20.el7_3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.07-20.el7_3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.14.8-6.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.14.8-6.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.14.8-6.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.4-0.8.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.0-38.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.4-8.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.4-8.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.44-5.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.44-5.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.2-8.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.2-8.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.2-8.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-7.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-126.el7_3.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.26.5-17.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.26.5-17.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.6-67.el7_4.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.6-67.el7_4.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.14-11.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.14-11.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14-18.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.21.0-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.44.0-4.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.44.0-5.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.44.0-4.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.44.0-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.15-30.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2k-19.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2k-19.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20180508-3.gitee3198e672e2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.29.0-51.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.29.0-51.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.3-5.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.20-15.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.162-5.el7_5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-10.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.12-1.el7_5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.1-10.el7_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.120-94.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.126-94.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-12.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-195.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-34.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.5-8.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.5-8.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.1-9.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-1.rc4.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-1.rc4.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.22.0-12.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.27-41.base.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.27-41.base.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.2-5.el7_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.07-29.el7_5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.07-29.el7_5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.07-29.el7_5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.11-36.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.11-36.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.11-36.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.27-34.base.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.27-34.base.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:219-42.el7_4.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:219-42.el7_4.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.3-4.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.3-4.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.3-4.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.16-48.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.11-11.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:17.11-11.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.5-76.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.5-76.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5-22.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5-22.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.0-14.el7_5.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.0-14.el7_5.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.5-9.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.5.1-13.1.el7_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.5.1-13.1.el7_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.3-2.el7_5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.3-2.el7_5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.29-8.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.29-8.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.7.5-28.el7_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.2-13.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.2-13.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.2-13.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.131-94.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.132-94.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-25.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-25.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-25.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1062.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1062.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.34-3.el7_5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.34-3.el7_5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.14.0-2.el7_5.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.7.5-21.el7_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.4-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.35-4.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.35-4.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.14.0-18.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0-15.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:19.4-7.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.31-46.el7_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.138-94.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.140-94.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.143-94.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-10.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.2-11.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.2-11.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.44-6.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.44-6.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.2-18.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.24-1.el7_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.24-1.el7_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.8-12.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.8-12.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-25.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.5-2.el7_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.5-2.el7_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5-68.el7_5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5-68.el7_5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.71-10.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.112-26.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.112-26.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.10-26.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.10-26.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3.1-14.el7_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3.1-14.el7_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.10-17.el7_5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.10-17.el7_5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.14-24.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.14-24.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8-8.20130218git.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8-8.20130218git.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.25-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.25-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.25-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.14-16.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.14-16.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.76-9.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-156.el7_5.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.92-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.22-5.el7_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-957.12.2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-957.12.2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.0-10.el7_6.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.0-10.el7_6.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-160.el7_6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20180508-3.gitee3198e672e2.el7_6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1062.4.2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1062.4.2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-25.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.6p5-29.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.6p5-29.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.9.1-1.el7_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.2.1-1.el7_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.36.0-7.el7_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.36.0-7.el7_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.2.2-1.el7_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.3.0-1.el7_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.3.0-1.el7_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.4.0-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.4.0-1.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.76-9.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.1-10.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.1-10.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.6-89.el7_6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.6-89.el7_6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.25-11.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.25-11.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.2-33.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.76-8.el7_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.6-9.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.41-21.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.41-21.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.21-28.el7_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.21-29.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-12.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.2-16.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.7-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.7-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.1-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.0-5.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:19.0.1-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.0-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.36.1-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.36.1-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.4-7.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.4-7.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.4-7.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.29.0-51.el7_6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.29.0-51.el7_6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.155-94.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.156-94.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.156-94.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.156-94.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-13.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-25.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-957.1.3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-957.1.3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-862.14.4.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-862.14.4.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.5-86.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.5-86.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.8.4-15.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5-3.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.1-5.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.1-5.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.1-5.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5-0.6.alpha.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.140-94.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-28.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.9-13.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-7.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4p1-21.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.3-2.21.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.7-8.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.7-8.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.7-8.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9.7-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9.7-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9.7-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9.7-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9.7-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9.7-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.1-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.5-8.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.5-8.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.5-4.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.5-4.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.5-4.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.5-8.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.5-5.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.5-5.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:219-67.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:219-67.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.0-8.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.0-8.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.0-8.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:219-62.el7_6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:219-62.el7_6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-175.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.07-31.el7_6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.07-31.el7_6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.07-31.el7_6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.07-31.el7_6.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.07-31.el7_6.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.07-31.el7_6.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.176-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.176-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.176-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.19.0-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0.648-34.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0.648-34.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0.648-34.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-34.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.2-34.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.7-34.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.2-34.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-34.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.6-34.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.0-34.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.14.1-34.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.07-31.el7_6.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.07-31.el7_6.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.07-31.el7_6.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.13.62-11.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.13.62-11.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.2-8.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.2-8.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.5-7.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.5-7.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.26.5-38.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.26.5-38.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.4-21.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.4-21.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.4-21.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.29.0-54.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.29.0-54.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.07-31.el7_6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.07-31.el7_6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.07-31.el7_6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-94.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-2.25.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-2.5-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-2.5-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-25.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-25.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-957.27.2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-957.27.2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.24.0-38.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.24.0-38.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.162-94.69.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.162-94.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.162-94.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-2.7.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-22.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-25.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-25.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.3-9.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.3-9.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2012-45.20130427_r30134.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn26555.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn15878.1.4-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn15878.0.1-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn29207.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn29208.3.04-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn29327.2.14-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn15878.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn15878.1.2b-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn17470.v1.1.4-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn21866.v1.5b-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn28614.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn24756.3.8m-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn25245.1.31-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2012-45.20130427_r30134.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn29349.3.26-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn20031.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn26689.0.99d-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:svn26509.0-45.20130427_r30134.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn15878.1.1a-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn29650.12.2-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn15878.1.61803-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn15878.1.30-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn29026.3.3__2013_02_03_-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn18258.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn29349.3.5c-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn15878.1.0c-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn17157.1.0a-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn19955.5.3-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn26296.4.8.3-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn29581.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn28250.0.5-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn26568.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn14075.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn26557.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn26314.0-45.20130427_r30134.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn17091.0-45.20130427_r30134.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn28082.0-45.20130427_r30134.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn28251.0-45.20130427_r30134.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn25030.0-45.20130427_r30134.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn25795.0-45.20130427_r30134.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn29634.0-45.20130427_r30134.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn25394.v1.0a-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn15878.1.5-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn24393.5.1d-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn26694.1.23-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn29012.0.7b-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn19834.2.58-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn26689.0.13.2d-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn13663.0-45.20130427_r30134.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn26765.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn26689.1.14-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn29585.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn25033.1.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn15878.1.1e-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn28602.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn24146.3.5.2-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn21461.2.7.4-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn26577.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn18336.0-45.20130427_r30134.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn21515.2.0c-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn22198.2.1-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn15878.2.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn20922.2.1-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn19795.0.1h-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn17261.2.5-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn22191.1.1-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn17265.1.4_subrfix-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn17263.1.4a-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn18304.1.4-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn15878.3.1-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn15878.0.9c-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn18492.2.8-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn24250.1.3-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn24280.0.5d-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn17133.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn21631.1a-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn15878.1.3d-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn28068.2.02-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn20710.v1.34-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn23608.0.2-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn29412.v2.3a-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn26689.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn23330.5.5b-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn15878.1.002-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn26789.0.96-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn19716.5.6-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn28576.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn25405.1.0o-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn26689.1.19.2-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn28213.6.83m-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn29641.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn29197.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn15878.2.3c-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn24853.1.2-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn26725.1.3-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn19363.1.2a-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn23979.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn29654.0.2-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn19685.0.5-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn24099.4.1beta-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn23409.3.13-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn3006.0-45.20130427_r30134.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn19440.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn27255.3.11b-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn28792.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:svn27347.0-45.20130427_r30134.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2012-45.20130427_r30134.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn29361.SVN_4467-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn29409.SVN_4469-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn28985.1.2l-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn27907.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn14050.0-45.20130427_r30134.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn28888.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn28991.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn29391.1.64-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn28119.2.004-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn29044.1.958-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn21927.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn29349.0.7.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn29346.1.2-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn26718.1.26-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn18579.0-45.20130427_r30134.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn26689.0.70.1-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:svn26912.0-45.20130427_r30134.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn22560.0.31-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn26689.2.12-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn25880.v1.1i-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn29349.2.2a-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn15878.1.003-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn15878.0.2-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn15878.1.05.4-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn21638.3.6j_patch_6.0g-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn26689.2.718281-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn18611.0.12-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn26689.1.212-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn17487.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn19410.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn29420.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn29392.2.5-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn24955.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn18651.1.4-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn18674.0-45.20130427_r30134.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn24467.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn18302.1.42-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn17256.1.6-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn20668.8.31b-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn15878.3.5-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn26725.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn19712.0.53-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn15878.2.3b-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn19963.2.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn27574.0.4t-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn29585.1.40.11-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:svn27321.0-45.20130427_r30134.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn22653.0.06d-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn22614.2.10-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn18651.1.1-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn19848.2.2-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn26647.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn26163.v1.2.1-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn25656.1.4i-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn16085.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn15878.3.04-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn16416.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn23394.9.2a-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn17257.1.10-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn24020.1.06-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn15878.1.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn15878.1.01-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn15878.1.06-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn20176.0.61-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn27799.1.25-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn28729.1.44-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn24391.1.31-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn15878.1.00-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn24142.1.12-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn29678.2.39-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn28750.3.59-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn28124.1-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn29423.0.3b-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn16832.2.16b-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn17997.1.1-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn25923.0-45.20130427_r30134.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn20180.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn15878.2.0.2-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn18322.1.5-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn20186.2.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn24881.6.7a-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn27790.v0.3j-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn15878.2.4-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn22027.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn15878.1.3-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn15878.2.1.5-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn18017.3.1862-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn29349.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn29585.3.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn27344.0-45.20130427_r30134.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn26689.3.1415926-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn18651.2.004-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn29045.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn29474.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn28217.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:svn22566.0-45.20130427_r30134.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn28261.1.7h-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn29349.0.5.1-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn17383.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn26689.3.15-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn6898.0-45.20130427_r30134.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn29349.1.3-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn24852.2.10.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn15878.2.1d-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn20084.2.3e-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn26263.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn21820.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn17134.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn27820.2.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn27549.2.1-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn16791.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn26785.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn18261.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn29413.0.7d-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn22357.0.92-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn16864.3.2-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn24104.0.92-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn22576.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn21439.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn22048.3.6-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn15878.2.11-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn26689.22.85-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn28816.3.1.2-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn29660.0.1-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn20221.1.1-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn16760.0.2-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn29661.12.1-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn16041.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn26330.0.9997.5-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn29154.0.95-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn24105.4.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn17055.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn28847.0.1-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn28819.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn27995.2.6a-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn19809.0.5e-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn28273.0.8-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn29258.1.7a-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn23347.2.3f-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn23897.0.981-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3.1-20.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3.1-20.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.13.62-12.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.13.62-12.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-957.10.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-957.10.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.7.2-47.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.7.2-47.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.0-5.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.16.3-294.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9800-294.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.28.2.6-294.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.30-294.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.58-294.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10-294.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.21-294.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.76.02-294.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.08-294.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.42-294.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.02-294.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.04-294.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.1-294.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.16.3-294.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.5.1-1.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0-20.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-16.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-957.5.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-957.5.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.5.0-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.6.0-3.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.6.1-1.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.7.0-1.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.7.0-1.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5-0.7.alpha.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.19.8.1-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.19.8.1-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.19.8.1-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.5-16.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.5-8.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.5-10.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.0-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.0-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.0-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.2-4.el7_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.25-12.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.25-12.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.112-22.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.112-22.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.2-7.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:15.1.0-4.el7_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.3-7.el7_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.34-4.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.34-4.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4p1-23.el7_9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.3-2.23.el7_9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-12.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.5-88.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.5-88.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.8-13.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1062.4.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1062.4.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.1-12.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.2-9.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.26.5-42.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.26.5-42.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.0-10.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.0-10.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9.7-2.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9.7-2.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.83.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.83.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.75.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.7-20.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.171-2.6.13.0.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.171-2.6.13.0.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.161-0.b14.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.161-0.b14.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.181-2.6.14.5.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.181-2.6.14.5.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.171-7.b10.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.171-7.b10.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.191-2.6.15.4.el7_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.191-2.6.15.4.el7_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.181-3.b13.el7_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.181-3.b13.el7_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.64-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.64-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.201-2.6.16.1.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.201-2.6.16.1.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.191.b12-0.el7_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.191.b12-0.el7_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.1.13-3.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.181-2.6.14.8.el7_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.181-2.6.14.8.el7_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.171-8.b10.el7_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.171-8.b10.el7_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.0-14.el7_5.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.0-14.el7_5.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-156.el7_5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-2.5-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-2.5-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-2.5-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-2.5-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-2.5-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-862.3.3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-862.3.3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-43.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-43.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-43.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.6.0-1.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.6.0-1.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.7.0-1.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.7.0-1.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.7.2-1.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.3-8.el7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.3-8.el7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.7.3-1.el7_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.8.0-1.el7_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.8.0-1.el7_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7-4.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7-4.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.22.4-5.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.22.4-5.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:39.31.5.1-72.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:18.168.6.1-72.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:22.0.7.0-72.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:15.32.2.9-72.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:228.61.2.24-72.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.83.5.1_1-72.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.24.2.2-72.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.221.4.1-72.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:17.168.5.3-72.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:17.168.5.2-72.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:41.28.5.1-72.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20190429-72.gitddde598.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2k-16.el7_6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2k-16.el7_6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.1-34.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.1-34.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5-58.el7_4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5-58.el7_4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4-61.el7_5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4-61.el7_5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4-61.el7_5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.4-9.P2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.4-9.P2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.4-9.P2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4-73.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4-73.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4-73.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4-74.el7_6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4-74.el7_6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4-74.el7_6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.4-16.P2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.4-16.P2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.4-16.P2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.5-5.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.132-94.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-19.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.15-26.el7_4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.8-4.el7_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.0-10.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.0-10.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.11.19-13.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:19-23.9.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.11.19-13.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.11.19-13.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.14.8-10.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.14.8-10.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.14.8-10.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.5-4.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.1.6-7.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.9-12.el7_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.1-14.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.4-12.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.13.62-9.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.13.62-9.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-156.el7_5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.4-4.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2-15.el7_6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2-15.el7_6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-15.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-120.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1062.4.3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1062.4.3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.6-90.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.6-90.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:18.2-1.el7_6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2-5.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-5.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-15.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.42.4-4.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.42.4-4.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5-0.8.alpha.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.0-10.el7_6.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.0-10.el7_6.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.13-15.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.13-15.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.5.18-12.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.5.18-12.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-24.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.5-80.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.5-80.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.0-10.el7_6.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.0-10.el7_6.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1-2.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1-2.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.5-11.el7_7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.5-11.el7_7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.4-10.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.4-10.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.4-10.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.24-6.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.24-6.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.25-2.el7_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.25-2.el7_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.25-2.el7_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-2.5-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.16-46.1.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.28-6.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.28-6.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.2-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.2-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-2.13.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-167.el7_7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.13-10.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.13-10.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1062.1.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1062.1.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.169-3.el7_9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.175-94.79.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.176-94.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.178-94.91.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.178-94.91.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-2.16.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-10.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-195.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-957.21.3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-957.21.3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.180-94.97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1062.18.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1062.18.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.36-3.el7_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.36-3.el7_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.7.2-2.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.7.2-1.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.8.0-1.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.8.0-1.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.25.0-2.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.53.1-3.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.53.1-6.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.53.1-3.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.53.1-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.44.0-7.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.44.0-8.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.44.0-7.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.44.0-4.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.9.0-1.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.9.0-1.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.2.0-1.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.2.0-1.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-167.el7_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.1.0-6.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.0-6.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.56.1-7.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.56.1-7.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.56.1-7.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.17-11.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.17-11.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.20-15.el7_8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.20-17.el7_9.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.160-6.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.160-6.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.24-15.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.24-15.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.24-15.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1-9.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-7.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.14.0-8.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0-21.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.0-5.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.0-5.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.15-14.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.17-8.el7_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.17-8.el7_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.17-8.el7_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3.1-21.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3.1-21.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.23-4.el7_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.23-4.el7_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.2-10.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.2-10.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.26.5-43.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.26.5-43.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:19-23.10.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.14.8-11.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.14.8-11.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.14.8-11.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.25-2.el7_7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.25-2.el7_7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.25-2.el7_7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1062.12.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1062.12.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1062.7.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1062.7.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.6-3.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.9.1-12.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.76-16.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-2.19.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-16.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1062.1.2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1062.1.2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.8-7.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11-28.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20120801-140.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.25-2.el7_7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.25-2.el7_7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.25-2.el7_7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.15-15.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.16-5.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.16-5.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.16-5.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3-35.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3-35.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.1-8.el7_7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.9-14.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0-21.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0-21.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.2-16.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-20.gitd1c6db8.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-20.gitd1c6db8.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.5-89.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.5-89.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.8-17.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686)</arch>
   <evr datatype="evr_string" operation="less than">0:68.3.0-1.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.3.0-1.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.4.1-1.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.4.1-2.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.24.0-52.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.24.0-52.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-2.22.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-19.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.27.0-3.el7_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.27.0-3.el7_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.27.0-3.el7_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0-4.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0-4.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.76-15.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5-9.el7_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.11.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.11.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2-1.el7_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.2-14.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.2-14.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.0-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.0-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.23-4.el7_7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.23-4.el7_7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17-317.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17-317.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5-11.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1127.18.2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1127.18.2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.21.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.21.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.el7.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.el7.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.2-34.el7_7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:219-78.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:219-78.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.0-36.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.0-36.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.6.0-1.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.6.0-1.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.6.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.6.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.5-90.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.5-90.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.8-18.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:15.1.0-7.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.36.2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.36.2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.211-2.6.17.1.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.211-2.6.17.1.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.201.b09-0.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.201.b09-0.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.2.7-0.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17-322.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17-322.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.221-2.6.18.0.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.221-2.6.18.0.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.212.b04-0.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.212.b04-0.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.3.7-0.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.65-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.65-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.231-2.6.19.1.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.231-2.6.19.1.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.222.b10-0.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.222.b10-0.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.4.11-0.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.241-2.6.20.0.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.241-2.6.20.0.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.232.b09-0.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.232.b09-0.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.5.10-0.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.68-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.68-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.2-12.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.2-12.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.2-12.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.14.0-6.el7_6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.36-6.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.36-6.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:219-62.el7_6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:219-62.el7_6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.3-6.git4391e5c.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.3-6.git4391e5c.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.19.4-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.50-7.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.50-7.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.4-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.4-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.4-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.1-6.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.1-6.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.2-22.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.1-11.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.1-8.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.3-24.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.1-7.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.0-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.22.30-5.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.22.30-5.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.30-9.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.2-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.3-20.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.26.3.1-7.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20190805-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8-5.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.5-8.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.5-8.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.5-8.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.8-25.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.36.2-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.36.2-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.3-7.git4391e5c.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.3-7.git4391e5c.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.07-31.el7_6.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.07-31.el7_6.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.07-31.el7_6.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.07-31.el7_6.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.07-31.el7_6.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.07-31.el7_6.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.0-23.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.0-23.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3-12.el7_6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3-12.el7_6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3-12.el7_6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3-12.el7_6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.14.0-2.el7_6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.1-6.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.1-6.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.1-6.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.8.4-25.1.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.42.9-19.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.42.9-19.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-6.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-28.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.29.0-57.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.29.0-57.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.29.0-59.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.29.0-59.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-8.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-8.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14-18.el7_6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4p1-16.el7.PTF.1122802.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.3-2.16.el7.PTF.1122802.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.112-18.el7_6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.112-18.el7_6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:219-62.el7_6.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:219-62.el7_6.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5-77.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5-77.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-160.el7_6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-2.10.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-957.12.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-957.12.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.8.4-44.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.15-17.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2-4.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-4.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0.648-35.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0.648-35.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0.648-35.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-35.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.2-35.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.7-35.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.2-35.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-35.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.6-35.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.0-35.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.14.1-35.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15-21.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15-22.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.175-94.79.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.22-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.22-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.5-77.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.5-77.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.6.1-1.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-167.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.46-34.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-18.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.22-2.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.22-2.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.51.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.67.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.75.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.75.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-22.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-5.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.59.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.59.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.29.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.43.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1-73.11.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.44-7.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.44-7.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9.7-4.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9.7-4.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9.7-4.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.1.0-7.el7_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.17-65.el7_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:50.2-4.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:50.2-4.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:50.2-4.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.16.3-299.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9800-299.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.28.2.6-299.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.30-299.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.58-299.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10-299.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.21-299.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.76.02-299.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.08-299.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.42-299.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.02-299.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.04-299.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.1-299.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.16.3-299.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.8-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.8-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.8-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.6-5.el7_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.6-5.el7_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3.1-23.el7_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3.1-23.el7_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.1-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.1-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-41.el7_9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.1-61.el7_9.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1-8.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1-8.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.6p5-29.el7_8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.6p5-29.el7_8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.24-14.el7_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.24-14.el7_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.24-14.el7_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.36-6.el7_8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.36-6.el7_8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.44-22.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.44-22.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:39.31.5.1-80.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:18.168.6.1-80.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:25.30.13.0-80.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:15.32.2.9-80.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:228.61.2.24-80.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.83.5.1_1-80.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.24.2.2-80.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.221.4.1-80.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:41.28.5.1-80.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20200421-80.git78c0348.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.31.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.31.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.8.0-1.el7_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.8.0-1.el7_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.9.0-1.el7_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.9.0-1.el7_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.10.0-1.el7_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.10.0-1.el7_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.3.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-9.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-31.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.6-4.el7_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.6-4.el7_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.12-6.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1127.13.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1127.13.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.21-7.el7_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.21-7.el7_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-4.rc4.el7_8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-4.rc4.el7_8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.1002-8.el7_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-175.el7_9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.53-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.74-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.16-9.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.16-9.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.16-9.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-5.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.4-12.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.4-12.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.4-12.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.4-15.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.4-15.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.4-15.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.1-8.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.1-8.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.35-5.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.35-5.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.14.0-9.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.7-3.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.7-3.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-175.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02-0.87.el7_9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02-0.87.el7_9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.262.b10-0.el7_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.262.b10-0.el7_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.8.10-0.el7_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.272.b10-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.272.b10-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.9.11-0.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.15.2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.15.2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.11.0-1.el7_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.11.0-1.el7_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.12.0-1.el7_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.12.0-1.el7_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.3.1-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.4.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.4.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.7.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-22.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.7.2-49.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.7.2-49.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8-14.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8-14.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.5.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.5.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.6.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.6.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.6.1-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.6.1-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.7-9.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.7-9.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.7-9.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9.7-5.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9.7-5.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9.7-5.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.76-16.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.76-11.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2k-21.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2k-21.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0-4.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0-4.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1-73.9.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.20-17.el7_9.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.0-36.el7_9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.0-36.el7_9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.53.1-7.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.53.1-7.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.23-1.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.23-1.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-3.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.67.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-5.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.86.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.86.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.49.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-57.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-3.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-57.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.76-16.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.44-23.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.44-23.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.53.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.53.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.44-25.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.44-25.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.8-5.el7_9.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.8-5.el7_9.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.251-2.6.21.0.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.251-2.6.21.0.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.242.b08-0.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.242.b08-0.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.6.10-1.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.5-92.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.5-92.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.1-12.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.4.1-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.4.3-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.5.1-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.7.0-2.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.252.b09-2.el7_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.252.b09-2.el7_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.7.10-4.el7_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.261-2.6.22.2.el7_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.261-2.6.22.2.el7_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.41.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.41.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-5.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.4-23.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-5.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-175.el7_9.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.9.10.68-5.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.9.10.68-5.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.6-99.el7_9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.6-99.el7_9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.10.2-12.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.66.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.66.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-5.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.53.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.89.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.92.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.92.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-5.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.67.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.49.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.49.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.102.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.105.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.96.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.99.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.99.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.103.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.106.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.110.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.113.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.116.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.121.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.124.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.127.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.130.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.91.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.98.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.98.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150000.150.89.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150000.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150000.150.92.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150000.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150000.150.95.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150000.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150000.150.98.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150000.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150000.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.86.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150000.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.86.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.111.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.114.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.117.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.120.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.102.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.105.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.108.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.108.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.112.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.115.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.126.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.102.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.107.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.83.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.86.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.96.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.99.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.99.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.60.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.71.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.76.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.87.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-59.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-59.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-59.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-59.37.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-59.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-59.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150400.4.12.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150000.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150000.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150000.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150000.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.118.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.118.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.75.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.99.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.99.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.75.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-59.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-59.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-59.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-59.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-59.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-59.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.18-9.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.18-9.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3.1-22.el7_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3.1-22.el7_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-21.gitd1c6db8.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-21.gitd1c6db8.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20120731b-13.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.5.0-1.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.5.0-2.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.6.1-1.el7_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.7.0-1.el7_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.7.0-2.el7_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.1-2.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.1-2.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-173.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.1-3.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.1-3.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.29.0-59.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.29.0-59.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.5-34.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.5-34.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-173.el7_8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.4-16.P2.el7_8.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.4-16.P2.el7_8.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.4-16.P2.el7_8.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.4-26.P2.el7_9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.4-26.P2.el7_9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.4-26.P2.el7_9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.4-26.P2.el7_9.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.4-26.P2.el7_9.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.4-26.P2.el7_9.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.5-9.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.5-9.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.76-12.el7_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-5.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.53.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.16-15.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.16-15.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.16-15.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.11.3-48.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.11.3-48.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.11.3-48.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.4-2.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.4-2.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.1-9.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.9-10.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-10.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.1-13.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.9-11.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-11.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.292.b10-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.292.b10-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.11.0.9-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.75.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.45.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.45.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.89.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.302.b08-0.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.302.b08-0.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.12.0.7-0.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2k-22.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2k-22.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.10.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.10.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.8.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.8.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.9.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.9.0-3.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.9.1-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.4-26.P2.el7_9.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.4-26.P2.el7_9.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.4-26.P2.el7_9.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.4-26.P2.el7_9.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.4-26.P2.el7_9.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.4-26.P2.el7_9.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5-83.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5-83.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.4-26.P2.el7_9.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.4-26.P2.el7_9.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.4-26.P2.el7_9.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.83.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.83.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.6-97.el7_9.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.6-97.el7_9.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-5.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.0-0.27.20120314git3c2946.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:295-3.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.56.1-9.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.56.1-9.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.56.1-9.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-5.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.24.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.24.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-12.el7_9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.1-8.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.1-8.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.1-14.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.11.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.11.0-3.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.12.0-2.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.12.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.13.0-2.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.13.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.2-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.2-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.23-2.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.26-3.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.27.0-4.el7_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.27.0-4.el7_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.27.0-4.el7_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.7-4.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.7-4.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.23-10.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.23-10.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.24-7.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.24-7.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.19.4-2.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-5.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.25-12.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.25-12.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.2.0-4.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.2.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2-6.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2-6.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:18-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:17-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:18-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:17-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150400.4.21.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.4-16.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.4-16.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.4-16.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.56.5-4.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-3.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.10-6.11.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.10-6.11.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.312.b07-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.312.b07-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.13.0.8-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0-2.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.5-10.el7_9.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.5-10.el7_9.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.5-10.el7_9.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.10-6.12.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.10-6.12.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.10.2-13.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-3.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2k-23.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2k-23.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.42.2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.42.2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.1-51.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.1-51.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.14.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.14.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.3.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.3.0-2.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.1-16.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.129.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.134.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.98.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150200.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150400.4.3.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.21.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.33.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.33.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.96.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150000.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150000.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150000.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150000.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150200.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.4-17.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.4-17.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.4-17.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.9.10.68-7.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.9.10.68-7.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.62.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.62.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.112-26.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.112-26.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.6-97.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.6-97.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.96.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-3.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.10.2-15.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.9-12.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-12.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.1-5.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.1-5.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.5.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.5.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4p1-22.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.3-2.22.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.91.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.86.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.27-44.base.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.27-44.base.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.67.0-4.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.67.0-4.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.4.0-3.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.4.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.16-18.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.16-18.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.16-18.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.15.1-13.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.0-19.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-14.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.20-17.el7_9.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.162.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.165.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.173.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.176.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.179.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.183.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.186.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.189.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.194.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.201.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-8.10.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.216.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-8.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.216.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.154.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.157.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.160.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.163.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.166.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.169.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.172.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.175.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.178.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.183.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150200.5.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.188.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150200.5.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.188.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.124.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.127.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.130.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.133.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.138.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.141.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.144.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.147.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.150.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.153.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150300.7.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.158.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150300.7.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.158.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:18-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.161.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.161.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.191.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150200.5.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.194.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150200.5.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.197.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150200.5.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.197.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150300.7.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.164.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150300.7.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.167.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150300.7.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.167.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.191.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150500.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150500.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150500.11.8.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150500.11.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150500.11.10.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.62.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150500.11.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150500.11.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.73.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150500.11.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.73.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.100.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.103.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.108.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150400.9.8.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.111.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150400.9.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.116.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150400.9.8.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.119.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150400.9.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.122.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150400.9.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.125.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150400.9.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.92.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150500.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150500.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150000.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150000.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150000.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150200.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150000.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150000.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.66.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.66.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.7.0-2.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2k-25.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2k-25.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.10.2-16.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150200.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.123.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.123.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150000.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150000.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150000.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:18-150200.3.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.8.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.8.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:19-150200.3.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5-11.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.2-2.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.2-2.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:17-150200.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:17-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150000.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150000.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.9.0-3.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.9.1-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.9.1-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.24-8.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.24-8.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150400.4.15.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150400.4.9.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:18-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:17-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150000.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150000.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150000.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150000.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150000.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150100.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150100.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150100.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150100.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150100.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:18-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:17-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150300.3.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:18-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:17-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150400.4.6.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.71.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.71.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.10.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.76.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.76.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.322.b06-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.322.b06-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.14.0.9-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:18.11.8-2.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:18.11.8-2.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.332.b09-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.332.b09-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.15.0.9-2.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.342.b07-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.342.b07-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.16.0.8-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.17.0.8-2.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.352.b08-2.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.352.b08-2.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.11.0-2.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.11.0-2.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.6-97.el7_9.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.6-97.el7_9.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.6.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.6.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-23.gitd1c6db8.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-23.gitd1c6db8.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.4-18.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.4-18.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.4-18.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3.1-24.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3.1-24.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.80.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.80.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.5.18-23.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.5.18-23.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.5.18-24.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.5.18-24.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.26-24.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.1.0-8.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.24.0-57.el7_9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.24.0-57.el7_9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.12.0-2.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.12.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.2-6.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.2-6.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.7.0-3.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:219-78.el7_9.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:219-78.el7_9.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02-0.87.el7_9.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02-0.87.el7_9.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.101.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.98.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009174881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150400.4.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009174882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:39.31.5.1-83.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:18.168.6.1-83.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:25.30.13.0-83.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:15.32.2.9-83.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:228.61.2.24-83.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.83.5.1_1-83.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.24.2.2-83.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.221.4.1-83.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:41.28.5.1-83.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20200421-83.git78c0348.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150000.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150000.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.10.2-17.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02-0.87.el7_9.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02-0.87.el7_9.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.2-11.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150000.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:19-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.9.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.130.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.120.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.126.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.3.0-3.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150000.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.5-3.el7_9.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.10.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.108.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.111.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.133.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.136.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.136.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.123.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.126.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0-6.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150000.150.101.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150000.150.104.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150400.4.24.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.4-19.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.4-19.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.4-19.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.109-11.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.114.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.139.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.144.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.144.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.131.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.139.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009174858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.107.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150400.7.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.95.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.95.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.143.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.143.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.7-21.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.16-24.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.16-24.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.16-24.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.4-26.P2.el7_9.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.4-26.P2.el7_9.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.4-26.P2.el7_9.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.13.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.13.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150400.4.18.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.21.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.4.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-15.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.3.0-7.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.3.0-4.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.3.0-6.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.105.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.105.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.20-17.el7_9.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.1.3-15.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.9-136.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.9-136.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.5-10.el7_9.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.5-10.el7_9.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.5-10.el7_9.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.88.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.88.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0-23.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0-23.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.4-21.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.4-21.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.4-21.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.114.2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.114.2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.1-55.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.1-55.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2-19.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.4.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.29.0-59.el7_9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.29.0-59.el7_9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.90.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.90.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009174883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009174884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.5.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.5.0-2.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.6.0-2.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.7.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.7.1-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.6.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.142.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.145.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.145.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.106.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.109.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.112.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.115.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150400.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0-7.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.3-23.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:24.3-23.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.159.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.201.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.151.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.121.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.81.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150500.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.53.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150500.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150500.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150500.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150500.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150500.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150500.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150500.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150500.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150500.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150500.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150500.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150500.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150500.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150500.9.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.53.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.141.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.141.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.219.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.222.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.225.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.228.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.228.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.170.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.170.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.222.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.12-2.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.174.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.174.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.128.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.133.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.133.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150500.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.80.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150500.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.80.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:17-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.128.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150500.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-8.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-8.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-8.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-8.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.231.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:18-4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.231.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150300.7.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150300.7.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.179.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150300.7.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.179.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150400.9.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150400.9.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.136.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.136.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150500.11.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.142.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.142.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.234.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.237.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.244.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.247.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.250.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.250.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.182.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.185.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.188.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.195.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.198.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.198.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.141.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.144.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.147.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.150.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.153.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.158.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.158.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.91.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.94.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:17-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.247.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.195.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:18-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.150.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:17-150500.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150500.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150500.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150500.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150500.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.94.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:18-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.255.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.255.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:18-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.137.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.137.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.136.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.136.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.258.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.261.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.266.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.269.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.272.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.272.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:19-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.161.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.164.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.167.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.170.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.173.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.176.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.176.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:19-150300.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:17-150300.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150300.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150300.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.201.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150300.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.204.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.207.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150300.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.211.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.215.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.218.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.218.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:18-150400.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:17-150400.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150400.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150400.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150400.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150400.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150400.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150400.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150400.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.100.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150500.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.103.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.110.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150500.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.113.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.116.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150500.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.121.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150500.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:18-150500.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150500.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150500.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.275.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.275.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.179.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.179.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.124.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150500.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:17-150500.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.144.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.144.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.221.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.221.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.147.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.147.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.280.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.283.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.290.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.290.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.184.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.187.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.187.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150500.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.127.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.130.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.133.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.283.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150500.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.147.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.147.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.139.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150400.10.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150400.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150400.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150400.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150400.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150400.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150400.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2k-26.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2k-26.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.15.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150400.16.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150400.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150400.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150400.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.55.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150400.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.7.1-2.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009180976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150500.6.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0-24.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0-24.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.4-22.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.4-22.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.4-22.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.10.0-2.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.117.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.134.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.134.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.142.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150400.13.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.8.0-2.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.8.0-2.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.79.0-5.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.79.0-5.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.150.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.153.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.156.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.162.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150100.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.137.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.142.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.145.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.145.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.148.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.154.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.118.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150500.6.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.120.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.150.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.179.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.157.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.157.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.55.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.120.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.153.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.137.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0-25.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0-25.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.4-23.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.4-23.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.4-23.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.148.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009185167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.151.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.154.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.160.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.165.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.168.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.168.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150500.9.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.148.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.10.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.156.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.142.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.0-11.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.0-11.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.148.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150500.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:39.31.5.1-81.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:18.168.6.1-81.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:25.30.13.0-81.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:15.32.2.9-81.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:228.61.2.24-81.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.83.5.1_1-81.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.24.2.2-81.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.221.4.1-81.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:41.28.5.1-81.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20200421-81.git78c0348.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:39.31.5.1-82.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:18.168.6.1-82.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:25.30.13.0-82.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:15.32.2.9-82.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:228.61.2.24-82.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.83.5.1_1-82.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.24.2.2-82.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.221.4.1-82.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:41.28.5.1-82.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20200421-82.git78c0348.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.99.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.99.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.5-3.el7_9.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.5-3.el7_9.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.166.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.138.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.92.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150500.15.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.159.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.362.b08-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.362.b08-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.18.0.10-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.372.b07-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.372.b07-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.19.0.7-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.20.0.8-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.382.b05-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.382.b05-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.392.b08-2.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.392.b08-2.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.21.0.9-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.23-10.el7_9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.23-10.el7_9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.151.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.114.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.131.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.5-93.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.5-93.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.8-19.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3.1-25.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3.1-25.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.6-98.el7_9.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.6-98.el7_9.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.9.0-3.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.9.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150100.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150100.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150100.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150100.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:219-78.el7_9.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:219-78.el7_9.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.4-26.P2.el7_9.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.4-26.P2.el7_9.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.4-26.P2.el7_9.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:39.31.5.1-999.34.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:18.168.6.1-999.34.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:22.0.7.0-999.34.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:15.32.2.9-999.34.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:228.61.2.24-999.34.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.83.5.1_1-999.34.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.24.2.2-999.34.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.221.4.1-999.34.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:17.168.5.3-999.34.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:17.168.5.2-999.34.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:41.28.5.1-999.34.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20240715-999.34.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20240715-999.34.git4c8fb21e.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.125.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.125.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.16.3-299.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9800-299.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.28.2.6-299.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.30-299.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.58-299.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10-299.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.21-299.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.76.02-299.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.08-299.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.42-299.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.02-299.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.04-299.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.1-299.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.16.3-299.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.0-3.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.11.0-2.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.11.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.102.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.102.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-52.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-52.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-52.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.4-26.P2.el7_9.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.4-26.P2.el7_9.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.4-26.P2.el7_9.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.157.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150300.2.4-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150300.2.4-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150300.2.4-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150400.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150500.12.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.5-3.el7_9.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.14.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.12.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.12.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1-73.23.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.165.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009185168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.151.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.3.1-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.3.1-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.81.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.13.0-2.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.13.0-2.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.2-6.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.1-10.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.1-10.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.173.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.154.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.7-3.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4p1-23.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.3-2.23.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150500.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150500.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150500.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150500.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.183.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.169.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.141.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150500.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.5-94.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.5-94.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.8-21.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.14.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.15.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.15.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15.8-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.160.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.163.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.133.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150500.9.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150500.9.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.108.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.108.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.4-26.P2.el7_9.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.4-26.P2.el7_9.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.1-7.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.4-26.P2.el7_9.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5-83.el7_9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5-83.el7_9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-24.gitd1c6db8.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-24.gitd1c6db8.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.23-24.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.23-24.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.4-4.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.4.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.176.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150100.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150100.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.20-17.el7_9.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.20-17.el7_9.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.5.18-32.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.5.18-32.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.15.1-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.15.1-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.6-5.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.6-5.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-25.gitd1c6db8.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-25.gitd1c6db8.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.6.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.186.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.172.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.144.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150500.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150500.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.189.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.175.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.147.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.194.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.178.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.150.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.219.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.194.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.164.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150600.21.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150600.4.10.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150600.23.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150600.13.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150600.23.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150600.23.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150600.13.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150600.23.7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150600.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150600.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.0-150600.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150600.1.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150600.3.3.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150600.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.0-150600.23.7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.133.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.133.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:18-150500.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:17-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0-26.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0-26.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.4-24.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.4-24.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.4-24.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.145.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.145.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150600.23.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:17-150600.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150600.23.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150600.23.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150600.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150600.23.42.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150600.23.47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150600.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150600.23.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150600.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150600.23.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150600.23.60.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150600.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150600.23.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150600.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150600.23.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150600.23.73.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.0-150600.23.73.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150700.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150700.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150700.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150700.3.24.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150700.53.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150700.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150700.53.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150700.53.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150700.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150700.53.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150700.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150700.53.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.0-150700.53.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.293.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.293.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.9.1-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.9.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.8-5.el7_9.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.8-5.el7_9.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150500.12.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150500.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.24-9.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.24-9.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.5.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.5.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0-28.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0-28.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.4-25.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.4-25.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.4-25.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.183.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.153.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0-31.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0-31.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.4-27.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.4-27.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.4-27.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.6.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.165.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.7.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.7.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150500.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.24-9.el7_9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.24-9.el7_9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.4-26.P2.el7_9.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.4-26.P2.el7_9.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.4-26.P2.el7_9.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.2-12.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.2-12.el7_9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.8.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.8.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.4-26.P2.el7_9.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.4-26.P2.el7_9.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.4-26.P2.el7_9.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.402.b06-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.402.b06-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.22.0.7-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.412.b08-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.412.b08-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.23.0.9-2.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.422.b05-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.422.b05-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.24.0.8-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.1-210.git7d71120.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-70.rc10.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.11.1-5.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.125.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.125.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150500.9.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150500.12.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.10.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.167.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:18-150600.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:19-150600.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.0-150600.21.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150600.4.19.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1-73.24.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17-326.el7_9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17-326.el7_9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0-33.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0-33.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.4-29.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.4-29.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.4-29.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.8-5.el7_9.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.8-5.el7_9.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.9-13.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-13.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:458-10.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.25-5.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.25-5.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.25-5.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.122.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150600.4.25.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150600.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150600.3.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150600.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.119.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150600.4.13.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150600.3.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.13-15.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.13-15.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.1-55.el7_9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.1-55.el7_9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4-2.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150600.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:20-150600.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.125.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.207.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.1-55.el7_9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.1-55.el7_9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.6-99.el7_9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.6-99.el7_9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.6-99.el7_9.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.6-99.el7_9.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9.7-6.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9.7-6.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9.7-6.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:19-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:17-150500.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:18-150600.4.46.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150600.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:17-150600.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.225.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150600.4.31.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150600.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150600.4.34.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150600.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150600.4.28.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150600.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:19-150600.4.49.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:18-150600.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.9-15.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-15.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.11.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.11.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.200.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150200.5.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.200.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:17-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:18-150500.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150600.4.40.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150600.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150600.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.234.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150600.4.22.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150600.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150600.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150600.23.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150600.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150600.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02-0.87.0.4.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02-0.87.0.4.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.20-17.el7_9.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150600.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.35-29.el7_9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.35-29.el7_9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.6-99.el7_9.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.6-99.el7_9.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:20-150600.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150600.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:21-150600.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:17-150600.4.43.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150600.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150600.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150600.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150600.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.0-150600.23.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:19-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:19-150600.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.0-150600.23.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.182.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.141.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150500.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150600.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150500.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150600.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150600.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150400.9.8.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150600.4.16.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150600.13.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150600.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.0-13.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.62.2-3.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150600.4.37.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150600.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.188.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.147.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.132.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.132.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150600.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:19-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.237.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.0-150600.23.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.135.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.135.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.185.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.144.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.134.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.134.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.211.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.170.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150600.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.0-150600.23.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.91.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.258.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.204.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.164.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.7-3.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:15.1.0-7.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.28-9.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2-10.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.el7_9.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.el7_9.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.2-5.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150600.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.244.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150600.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150500.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.12.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.12.1-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.1.6-8.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.9-5.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.153.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150600.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150600.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.173.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.11.1-6.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8-7.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:39.2.0-10.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.24-9.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.24-9.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.11.1-7.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.4-4.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0-34.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0-34.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.24-9.el7_9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.24-9.el7_9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.5-10.el7_9.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.5-10.el7_9.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.5-10.el7_9.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.5-94.el7_9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.5-94.el7_9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.8-21.el7_9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.3-23.el7_9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:24.3-23.el7_9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.56.1-11.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.56.1-11.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.56.1-11.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.5-94.el7_9.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.5-94.el7_9.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.8-21.el7_9.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.452.b09-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.452.b09-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.27.0.6-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150700.3.6.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.0-150700.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.0-150600.23.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150700.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150700.3.3.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.136.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.201.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.161.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.0-150600.23.42.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.261.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.215.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150700.3.15.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150700.3.12.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.0-150600.23.47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150700.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150700.3.21.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.1-55.el7_9.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.1-55.el7_9.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.28-8.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.28-8.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0-36.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0-36.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.4-30.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.4-30.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.4-30.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8-15.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.62.2-6.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.462.b08-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.462.b08-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.28.0.6-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.el7_9.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.el7_9.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.el7_9.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.el7_9.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009239794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.23-10.el7_9.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009239795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.23-10.el7_9.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.0-150700.53.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150700.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150700.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.266.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.138.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.138.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.0-150600.23.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150700.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150700.3.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150700.3.9.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150700.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150700.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150700.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150700.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150700.3.27.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150700.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150700.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150700.3.30.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150700.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150600.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150700.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150700.3.33.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150700.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.0-150600.23.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.0-150600.23.60.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.139.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.139.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.269.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150700.5.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150700.3.18.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150700.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150700.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.0-150600.23.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.0-150600.23.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150700.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150600.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150600.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150600.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150600.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150600.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150700.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.146.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.146.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150700.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150700.3.36.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150700.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150600.23.78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.0-150600.23.78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150700.53.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150600.23.81.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.0-150600.23.81.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150700.53.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.4-26.P2.el7_9.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.4-26.P2.el7_9.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.4-26.P2.el7_9.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.74-8.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8-7.el7_9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:39.2.0-10.el7_9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17-326.el7_9.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17-326.el7_9.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3.1-25.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3.1-25.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.22-1.el7_9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.22-1.el7_9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.5-5.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0-36.el7_9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0-36.el7_9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.4-32.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.4-32.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.4-32.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0-8.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0-8.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.472.b08-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.472.b08-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.29.0.7-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-52.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-52.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-52.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.6-99.el7_9.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.6-99.el7_9.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.2-14.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.2-14.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18-5.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18-5.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.8-23.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02-0.87.0.5.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02-0.87.0.5.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0-36.el7_9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0-36.el7_9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:39.31.5.1-999.44.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:18.168.6.1-999.44.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:22.0.7.0-999.44.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:15.32.2.9-999.44.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:228.61.2.24-999.44.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.83.5.1_1-999.44.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.24.2.2-999.44.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.221.4.1-999.44.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:17.168.5.3-999.44.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:17.168.5.2-999.44.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:41.28.5.1-999.44.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20251030-999.44.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20251030-999.44.1.gite9292517.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.30.0.7-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150600.23.84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.0-150600.23.84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150700.53.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.17-9.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.17-9.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.17-9.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.24-9.el7_9.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.24-9.el7_9.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.8-23.el7_9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2k-26.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2k-26.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.482.b08-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.482.b08-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150600.23.87.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.0-150600.23.87.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150700.53.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.194.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.194.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.9-7.el7_9.2</evr>
  </rpminfo_state>
</states>
</oval_definitions>
